Chapter 5 Check Tampering.

Slides:



Advertisements
Similar presentations
Checks & Payment Methods Ch PoB The First Deposit Starts with providing personal data and a sample of your signature Signature Card – document.
Advertisements

The Expenditure Cycle: Purchasing to Cash Disbursements
Basic Fraud Audit Pertemuan X Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
RED FLAGS OF OCCUPATIONAL FRAUD Caroline Burnell, CFE, CGFM.
The Office Procedures and Technology
Chapter 5 Check Tampering.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
1 Expense Reimbursement Schemes Chapter 7. 2 Explain what constitutes expense reimbursement fraud. Discuss the data on expense reimbursement fraud from.
Cash Receipt Schemes and Other Asset Misappropriations
Chapter 2 Skimming.
Chapter 12 Cash Disbursement Schemes
Cash Control and Banking Activities
Register Disbursement Schemes
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Chapter 9 Non-Cash Assets.
Chapter 3 Cash Larceny.
CHAPTER 8 INTERNAL CONTROL AND CASH After studying this chapter, you should be able to: 1 Define internal control. 2 Identify the principles of internal.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
The Islamic University of Gaza
Cash Management: Revenue Deposits Financial Affairs Office of the Bursar.
No Fraud Left Behind Fraud Risks and Prevention (Info gathered from the Association of Certified Fraud Examiners) Runyon Kersteen Ouellette.
1 Cash Handling – It’s my job Whether you take in lots of money or … you collect “pennies”
Chapter 3 Cash Larceny.
Chapters 8 Acquisition and Expenditure Cycle Accounting 4081Chapters 8.
Chapter 10: Auditing the Expenditure Cycle
Internal Controls Mississippi Conference UMC David Stotts, CPA Treasurer/Director of Financial Administration.
Billing Schemes. O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Chapter 07 Cash Objectives Cash Rules for Cash Checks Deposit Slips Types of Endorsements Steps in Reconciling the Cash Ledger account and the Bank Statement.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Chapter 4 Billing Schemes.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Cash and Financial Investments. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved Internal Control Over --Cash Receipts.
Business Math, Eighth Edition Cleaves/Hobbs © 2009 Pearson Education, Inc. Upper Saddle River, NJ All Rights Reserved Bank Records Checking account.
Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.Glencoe Accounting Internal controls are steps taken to protect assets and keep reliable.
10-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 10 Cash and Financial Investments McGraw-Hill/Irwin
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
Chapter 5 – The Banking System Lesson 5-1: Checking Accounts
1 Business Math Chapter 4: Banking. Cleaves/Hobbs: Business Math, 7e Copyright 2005 by Pearson Education, Inc. Upper Saddle River, NJ All Rights.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Chapter 8: Payroll and Expense Reimbursement Schemes
1 Planning and Control of Cash and Short term Investments ACCT7320-Dr. Bailey-Fall 2009 Thanks for the contributions of Michelle Strickland and Michelle.
CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.
Cash Control and Banking Activities Making Accounting Relevant Businesses deposit all cash and checks into a bank account and make payments using checks.
CHAPTER 4 – Banking Instructor: Dr.Gehan Shanmuganathan.
Ms. Smith. 1. Choose a bank. 2. Pick the product you want (individual or joint). 3. Provide your information. 4. Agree to terms. 5. Congratulate yourself!
0 Glencoe Accounting Unit 2 Chapter 11 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Protecting Cash In any business, cash is used.
CJ 125 UNIT TWO SKIMMING AND LARCENY. REVIEW THREE MAJOR CATEGORIES OF FRAUD WHAT ARE THEY?
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
Chapter  Convenient  Safe  Proof of payment  Record for financial management.
8-1. Unit 8 Paying Employees McGraw-Hill/Irwin Copyright © 2006 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 6 Payroll Schemes.
Cash Control and Banking Activities Making Accounting Relevant Businesses deposit all cash and checks into a bank account and make payments using checks.
PARTS OF A PAYCHECK. Parts of a Check ■Check Number –Checks are numbered for easy identification ■ABA Number –The American Bankers Association (ABA) number.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
0 Glencoe Accounting Unit 2 Chapter 11 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Cash Control and Banking Activities.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Introduction to Fraud Examination
Acquisition and Expenditure Cycle
Accounts Receivable, Accounts Payable & Cash
Chapter 9 Non-Cash Assets.
Cash Control and Banking Activities
Chapter 9 Non-Cash Assets.
Fraud Presentation By Tim Stepp.
Parts of a Paycheck.
Cash Control and Banking Activities
Ch. 5 Cash Control Systems
Agency Account Training
Presentation transcript:

Chapter 5 Check Tampering

Learning Objectives Define check tampering. Understand the five principal categories of check tampering. Detail the means by which employees fraudulently obtain company checks. Understand how forged signatures are created on blank check stock. Be familiar with the methods identified in this chapter for preventing and ­detecting forged maker schemes. Differentiate between forged maker and forged endorsement schemes.

Learning Objectives Detail the methods employees use to intercept outgoing checks before they are delivered to the intended payee. Be able to discuss methods that can be used to prevent and detect the theft and/or alteration of outgoing company checks. Understand how authorized maker schemes work and why they are especially difficult to prevent. Understand how check tampering is hidden in a company’s accounting records. Be familiar with proactive audit tests that can be used to detect check ­tampering.

Check Tampering Forged Maker Forged Endorsement Altered Payee Concealed Checks Authorized Maker

Frequency of Fraudulent Disbursements

Comparison of Median Loss of Fraudulent Disbursements

Dollar Loss Distribution- Check Tampering Schemes

Detection of Check Tampering Schemes

Perpetrators of Check Tampering Schemes

Median Loss By Position Check Tampering Schemes

Size of Victim Check Tampering Schemes

Median Loss by Number of Employees – Check Tampering Schemes

Check Tampering Schemes Perpetrator physically prepares the fraudulent check Must have: Access to checks Access to bank statements Ability to forge signatures or alter other information on the check

Forged Maker Schemes An employee misappropriates a check and fraudulently affixes the signature of an authorized maker Must have: Access to a blank check Convincing forgery of an authorized signature Ability to conceal the crime

Obtaining the Check Employees having access to company checks A/P clerks, office managers, bookkeepers Employees lacking access to company checks Checks poorly guarded Producing counterfeit checks

Safeguarding the Check Stock Maintained under lock and key Access limited to those with check preparation duties Boxes of blank checks should be sealed with security tape Periodically check the security of unused checks Voided check should be promptly destroyed Checks should be printed on watermark paper with security threads and distinctly marked paper Out-of-sequence canceled checks and duplicate check numbers should be investigated Each day the first check of the day should be reconciled to the last check written the previous day

To Whom Is The Check Made Payable? Perpetrator Accomplice “Cash” Vendors

Forging the Signature Free-hand forgery Photocopied forgeries May not need to be particularly accurate Photocopied forgeries Photocopies are made of legitimate signatures and fixed to the check Automatic check-signing instruments Produce perfect forgeries

Preventing and Detecting Forged Maker Schemes Safeguard blank check stock Establish rules for custody of checks that have been prepared but not signed Separation of duties of check preparer and check signers Rotate authorized check signers when possible and keep track of authorized signers Strictly limit access to signature stamps

Forged Maker Schemes Miscoding fraudulent checks Concealing the check Means of hiding the fraudulent nature of the check Concealing the check Fake identification may be needed Checks made payable to “cash” require the endorsement of the person converting the check thus leaving a clue as to the identity of the forger

Forged Endorsement Schemes Employee intercepts a company check intended for a third party Signs the third party’s name on the endorsement line of the check

Intercepting Checks Before Delivery Employee involved in delivery of checks Poor controls of signed checks Theft of returned checks Rerouting the delivery of checks Converting the stolen check

Preventing and Detecting the Theft of Outgoing Company Checks Separate the functions of cutting checks, check signing, and delivery of checks Employees should be trained to look for schemes involving check theft Investigate vendor and customer complaints Accounting system should have an edit that will identify duplicate payments

Preventing and Detecting the Theft of Outgoing Company Checks Authority to make changes to vendor records should be restricted Periodic report listing all changes to vendor records should be generated to determine if there is an unusual number of changes made Investigate canceled checks with dual endorsements and non-payroll checks signed by an employee Chart the date of mailing for every outgoing check so that if a check is stolen, you can determine who worked in the mailroom on the date it was stolen

Altered Payee Schemes Employee intercepts a company check intended for a third party Payee designation is altered so the check can be converted Less chance of discovery unless canceled checks are reviewed during reconciliation

Altering Checks Prepared by Others Inserting a new payee Insert a false payee’s name in place of the true payee’s Accounts payable system is manipulated and the payee’s name is changed “Tacking on” Adding letters or words to the end of the real payee designation

Altering Checks Prepared by the Fraudster Erasable ink Erasing typewriters Erasable pens Pencils Blank checks Authorized signer signs a check left blank to be filled in by the fraudster

Preventing and Detecting Altered Company Checks Separation of duties of the check writing process Check preparation, signing, and delivery Separation of duties of the check reconciliation process Check preparation and check reconciliation Check the canceled check against the entry in the books Consider using carbon copy checks to check against canceled checks for discrepancies

Concealed Check Schemes Employee prepares a fraudulent check and submits it along with legitimate checks Check is payable to the employee, accomplice, a fictitious person, or fictitious business Occurs when checks are signed without proper review or reviewer is busy In many cases, only the signature line is exposed and the payee is concealed

Authorized Maker Schemes Employee with signature authority writes a fraudulent check Overriding controls through intimidation High level managers can make employees afraid to question suspicious transactions Can happen when ownership is absent or inattentive Poor controls Failure to closely monitor accounts Lack of separation of duties

Preventing and Detecting Check Tampering by Authorized Makers Difficult to detect because check signer is relied on to serve as a control Separate the duties of the check writing function Check preparer and check signer Check signers should not have access to blank checks Require dual signatures for disbursements over a certain amount Maintain up-to-date vendor lists and confirm all disbursements to the lists, scrutinizing checks to unknown vendors

Concealing Check Tampering Forged endorsement schemes and altered payee schemes creates a problem for the fraudster because the checks are intended for a legitimate recipient who will complain if a payment isn’t received An investigation could be triggered and the fraud discovered

Concealing Check Tampering Fraudster reconciling the bank statement Fraudulent check can be removed Doctor the bank statement Code it as “void” or not include it in the disbursements journal Re-alteration of checks Check is changed back to the rightful payee when returned from the bank Re-altered checks will match the names of the legitimate payees listed in the disbursements journal

Concealing Check Tampering Falsifying the disbursements journal Check made payable to the perpetrator but a different person is listed as the payee in the books Amount of the check can also be falsified in the disbursements journal Existing accounts that are rarely reviewed or are very active are preferred

Concealing Check Tampering Reissuing intercepted checks New checks are issued to replace the ones that the vendor did not received The original invoice is changed in a manner that avoids a duplicate check for new check New check issued and a stop payment is supposed to have been made Bogus supporting documents Fake support is needed to support the check False payment vouchers, invoices, purchase orders, receiving reports are submitted