Watch Your Back: Protecting Your Business Against Back-Office Fraud Steve Schottenfeld TraceTech Solutions, LLC.

Slides:



Advertisements
Similar presentations
A Do-It Yourself Guide (Sort of…) Veritas Solutions Group, LLC
Advertisements

1 thepayrollfactory.com THE PAYROLL FACTORY thepayrollfactory.com.
Director Session #1 Anne B. Wall, CPA & Thomas P. Smith, CPA Robinson, Farmer, Cox Associates.
Basic Fraud Audit Pertemuan X Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
RED FLAGS OF OCCUPATIONAL FRAUD Caroline Burnell, CFE, CGFM.
The Office Procedures and Technology
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
1 Expense Reimbursement Schemes Chapter 7. 2 Explain what constitutes expense reimbursement fraud. Discuss the data on expense reimbursement fraud from.
Introduction to the Investigative Audit Services Group.
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 12 Cash Disbursement Schemes
Appendix D 1. Appendix D 2 Payroll Accounting Financial Accounting, Seventh Edition Appendix D.
Financial Accounting, Sixth Edition
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Fraud in Nonprofits: Real Stories Presented by: Mike Hablewitz, CPA, Senior Manager.
No Fraud Left Behind Fraud Risks and Prevention (Info gathered from the Association of Certified Fraud Examiners) Runyon Kersteen Ouellette.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Chapter 4 Billing Schemes.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Presented to: ASSOCIATION OF CREDIT UNION INTERNAL AUDITORS 22 nd ANNUAL CONFERENCE Presented By: Tiffany R. Couch, CPA/CFF, CFE Principal, Acuity Group.
Presented to: OCHIN 11/17/2012 Presented By: Tiffany Couch Acuity Group PLLC HOW SECURE IS YOUR PRACTICE?
CASH CONTROLS AT OSU. WHAT IS “CASH”? Currency, coin, and cash equivalents: Checks Traveler’s checks Cashier’s checks Credit card records EFTs: ACH and.
Internal Controls NAPPA FALL DISTRICT MEETING OCTOBER 24, 2014 LEE RAY – HUNTSVILLE UTILITIES.
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
Security Issues with Vendors, Employees, and Customers Chapter 10.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
Employee theft and embezzlement: Could this happen at your practice? Barr, Anderson & Roberts, PSC CPAs and Business Advisors Matthew S. Smith, CPA, CFE.
Winter Conference February 2, Dealing with the Ugly Face of Fraud Holly Frook Graham, CPA, CFE Arizona Office of the Auditor General.
Expense Reimbursement Schemes
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Chapter 16: Audit of Cash Balances
CASH RISK ASSESSMENT. Fraud OverviewFraud SchemesWhen & How Fraud HappensOur Approach to Fraud Deterrence Overview.
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.
5-1 Electronic Presentation by Douglas Cloud Pepperdine University Carl S.Warren Survey of Accounting.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Fraud, Ethics, and Controls.
INTERNAL CONTROL AND CASH Friday, we will meet in room 217 CHAPTER 7.
©2012 Association of Certified Fraud Examiners, Inc. 2 More than one-fifth of frauds in our study caused at least $1 million in losses. Executive Summary.
Chapter 6 Payroll Schemes.
What is Fraud? MRWA 35 th Annual Conference December 9, 2015.
Copyright © 2007 Pearson Education Canada 1 Chapter 15: Audit of Cash Balances.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
7-1 FRAUD, INTERNAL CONTROL, AND CASH 7 Remember… people will lie, cheat and steal! Not everybody…. and not all the time.… but they do….
Best Practices in Finance for Volunteers Brandy Vannoy, CPA Tim Rodgers, CPA July 26, 2008.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Fraud Examination, 3E Chapter 14: Fraud Against Organizations COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Occupational FRAUD in the Governmental Sector Ronny Daigle, PhD, CPA (AL), CFE, CGMA Professor of Accounting
Fraud Detection Presented by: Nancy Young, CPA, CISA, CFE.
Fraud: An Auditor’s Perspective
Managing the Risk of Fraud in Higher Education
Fraud Presentation By Tim Stepp.
WHO IS STEALING FROM YOU
Financial Accounting, Fifth Edition
Fraud Presentation By Tim Stepp.
Defining Internal Control
Eric Kinsherf, CPA MMAAA Conference June 12, 2018
Internal Controls The comments made by the presenter represent the presenter’s opinions only; these comments and opinions do not necessarily represent.
Internal Controls.
Presentation transcript:

Watch Your Back: Protecting Your Business Against Back-Office Fraud Steve Schottenfeld TraceTech Solutions, LLC

In January, 2010, a Michigan man was sentenced to one year in prison after he and his wife (a bookkeeper for a McDonald’s franchise owner) admitted to stealing $441, from the business. Over a nine-month period she wrote 42 unauthorized checks to herself and her husband

In June, 2008, a payroll and benefits coordinator for Cavicchio Greenhouses, Inc. in Sudbury, MA pleaded guilty to stealing more that $290,000 from the firm She had created and “paid” two ghost employees The scheme went undetected for four years

In May, 2008, a bookkeeper at Maine’s Winslow Aluminum, Inc. pleaded guilty to stealing $900,000 from the company The bookkeeper was the company president’s daughter

A Florida magazine publisher’s CFO was recently found guilty of setting up bogus accounts that only he had access to, and depositing forged checks into those accounts After four years he had stolen $1,500,000 from the company

In August, 2009 a former bookkeeper for several Planet Fitness clubs in Texas and Oklahoma was sentenced to 41 months in prison and ordered to pay restitution 0f $600,000. Over a 30-month period she made out checks payable to cash, to herself, and to her then-husband

In May, 2009, an accounts payable clerk at Drytac, Corp., a small Virginia manufacturer, pleaded guilty to embezzling $151,000 from the firm She had been with the firm for ten years The theft was discovered only when she left a counterfeit check on the copier before she went on vacation

A bookkeeper for a California orchard grower recently pleaded guilty to writing additional payroll checks to herself Before the scheme was uncovered she had stolen $470,000 from the company over a five-year period

You’ll Lear n About …  the risks of employing a dishonest person  low-cost ways to mitigate that risk  how to deal with fraud after it’s been detected

Agenda  The human aspect of fraud  The statistics  Combating back-office fraud  Responding to fraud

The Perpetrators  Trusted employees  Financial responsibilities: bookkeepers, accountants, A/P clerks, A/R clerks, payroll managers, CFOs bookkeepers, accountants, A/P clerks, A/R clerks, payroll managers, CFOs  Familiar with the business’ financial controls

The Perpetrators  Typically female  Age:  Frequently living beyond their means or experiencing financial difficulties  First-time offender

The Fraud Recipe PRESSURERATIONALIZATIONOPPORTUNITY $ THEFT

Statistics (period from 2006 to 2007)  Average fraud loss: 7% of annual revenues *7% of annual revenues * $200,000 over 2 years$200,000 over 2 years  Average fraud scheme duration: over 2 years* over 2 years* *** Based on the “2008 Report to the Nation on Occupational Fraud and Abuse”, Association of Certified Fraud Examiners

Fraud Risk  Less-effective or non-existent fraud prevention and detection controls  Unwarranted reliance on external auditors to detect fraud Small businesses are high fraud risks

Red Flags  Financials do not adhere to norms  Employees living beyond expectations  Employees who refuse vacations  Lack of complete and timely reconciliation of assets

Mitigating Small Business Fraud Risk  Environmental Establish a culture of honesty and ethics Establish a culture of honesty and ethics Extend behavioral expectations to vendors, contractors, customers, volunteers, interns and others Extend behavioral expectations to vendors, contractors, customers, volunteers, interns and others  Specific Policies, procedures, controls to counter common schemes Policies, procedures, controls to counter common schemes

Common Small Business Fraud Schemes  Check Tampering  Fraudulent Billing  Payroll Fraud … many others

Check Tampering Intercepting, forging or altering a check drawn on one of the organization’s bank accounts

Mitigating the Risk  Keep checkbooks under lock and key (if practical)  Sign all checks, and only with proper documentation  Segregate check-writing and bank reconciliation duties (if practical)  Examine disbursements (check images and electronic transfer descriptions) in bank statements to determine actual payees

Fraudulent Billing Any scheme in which a person causes an employer to issue a payment by submitting invoices for fictitious goods or services, inflated invoices or invoices for personal purchases

Mitigating the Risk  Vet every new vendor Segregate responsibilities of initiating and vetting new vendors (if practical) Segregate responsibilities of initiating and vetting new vendors (if practical)  Examine a vendor report from the accounting system annually Pay special attention to unfamiliar service providers Pay special attention to unfamiliar service providers  Examine credit card statements monthly Look for unauthorized, personal purchases Look for unauthorized, personal purchases

Payroll Fraud Any scheme in which an employee causes his/her employer to issue a payment by making false claims for compensation

Mitigating the Risk  Regularly examine payroll reports. Look for: Unexpectedly high salaries, wages commissions and bonuses Unexpectedly high salaries, wages commissions and bonuses Ghost employees Ghost employees Employees with few or no deductions Employees with few or no deductions

Establishing Financial Controls Accountants can provide excellent, independent advice on strengthening your business’ financial controls.

When Fraud Is Suspected  “Suspected” is different than “Proven”  The extent of the fraud may be unknown  The highest priority is protecting the innocent  Seek help Accounting Accounting Legal Legal Human Resources Human Resources

Parting Thoughts  Small business, back-office fraud is a problem that can significantly impact cash flow, profit and employee relations  Small business, back-office frauds are perpetrated by the least-suspected employees  Good preventive and deterrent controls don’t negate the need for vigilance. Trust but Verify.