SlideShare uma empresa Scribd logo
1 de 38
FRAUD ENGAGEMENT
  FROM A TO Z


                 SAMUEL BOWERCRAFT, MSIS, CISA

                 &

                 DAVID HAMMARBERG,

                 CPA, CFE, CISSP, MCSE, WXYZ




            13
      1 / 20
3/2
/   13
     / 25
03
/   13
     / 25
03
SKIMMING
WHAT THE AUDITORS MISS



                           JIM SHELLENBERGER, CPA
                 DAVID HAMMARBERG, CPA, CFE, CISSP

            13
      1 / 20
3/2
A BIT ABOUT US
       Jim Shellenberger
        Senior Manager
        Audit
                          Dave Hammarberg
                        Director of IT/Sr. Mgr.
            Accounting and Fraud Certification
ABOUT MCKONLY & ASBURY

•   Audit, Tax, and Risk Management Firm.
•   Regional presence in Pennsylvania.
•   Clients ranging from large construction, manufacturing, and other industries.
•   Special capabilities in the risk management area.
•   Best Places to Work and Best Accounting Firm.
FRAUD IN FINANCIAL
  STATEMENT AUDITS




            13
      1 / 20
3/2
FINANCIAL STATEMENT AUDIT
• Performed in accordance with auditing standards
  generally accepted in the United States of America
• Statement on Auditing Standards No. 99
  Issued by AICPA in 2002
  Effective for audits of financial statements for periods beginning
   on or after December 15, 2002
AUDITOR’S RESPONSIBILITY
• Plan and perform the financial statement audit to obtain
  reasonable assurance that the financial statements are
  free of material misstatement caused by:
  Errors (unintentional misstatements or omissions)
  Fraud (intentional misstatements or omissions)
  Noncompliance with laws and regulations
MANAGEMENT’S RESPONSIBILITY
From Independent Auditor’s Report:
  Management is responsible for the preparation and fair
  presentation of these financial statements in accordance with
  accounting principles generally accepted in the United States of
  America; this includes the design, implementation, and
  maintenance of internal control relevant to the preparation and
  fair presentation of financial statements that are free from material
  misstatement, whether due to fraud or error.
FINANCIAL STATEMENT FRAUD DEFINED
• An intentional act by one or more individuals among management,
  those charged with governance, employees, or third parties,
  involving the use of deception that results in a misstatement in
  financial statements that are subject of an audit. (AU-C-240.11)

Although auditor may suspect or identify the occurrence of fraud,
   auditor does not make a legal determination of whether fraud
   has actually occurred.
TYPES OF FRAUD IN A FINANCIAL STATEMENT AUDIT

Fraudulent Financial Reporting            Misappropriation of Assets
• Deceive financial statement users       • Embezzling receipts
• Manipulation of accounting records      • Stealing physical assets or intellectual
  and supporting documents                  property
• Misrepresentation or intentional        • Using company’s assets for personal
  omissions of events, transactions, or     use
  facts
• Management override of controls         • Usually accompanied by false or
                                            misleading records
AUDITOR’S “FRAUD” OBJECTIVES IN A FINANCIAL
STATEMENT AUDIT
• Identify and assess the risks of material misstatement of
  the financial statements due to fraud
• Design and implement appropriate responses to the
  assessed risks of material misstatement due to fraud and
  obtain sufficient appropriate audit evidence
• Appropriately respond to identified or suspected fraud
FRAUD REQUIREMENTS DURING A FINANCIAL
STATEMENT AUDIT
• Maintain Professional Skepticism
• Engagement Team “Brainstorming” Discussion
• Inquires of Management and Others
• Assess Fraud Risk
  Preliminary analytical procedures, including procedures related to revenue
  Other information obtained (not just inquires and brainstorming)
  Presumption that there is a risk of material misstatement due to fraud relating
   to revenue recognition
FRAUD REQUIREMENTS DURING A FINANCIAL
STATEMENT AUDIT
• Respond to Fraud Risk
   Incorporate element of unpredictability
   Can include test of controls, or substantive procedures
• Management Override of Controls
   Journal entry testing
• Evaluate Audit Evidence and Identified Misstatements for
  Indication of Fraud
• Communicate
COMMON EXAMPLE
• Unauthorized Disbursements
• Common to many business, often due to a lack of
  segregation of duties
• If there is risk of material misstatement, audit
  response is required.
FRAUD ENGAGEMENTS
  AND FRAUD
  INVESTIGATIONS




            13
      1 / 20
3/2
WHAT DOES A FRAUD ENGAGEMENT OR
INVESTIGATION COVER?
• No two fraud engagement are alike
• Usually a fraud engagement will focus around a specific
  area of the organization where irregularities were
  found.
• Usually evidence found in a fraud engagement will
  guide the rest of the engagement.
• Misallocation or Reporting Fraud.
SKIMMING – AN AREA OF FRAUD THAT MAY NOT
BE UNCOVERED DURING A NORMAL AUDIT
Wikipedia definition
 A form of white-collar crime, skimming is a slang term that refers to taking cash "off
  the top" of the daily receipts of a business (or from any cash transaction involving a
  third interested party) and officially reporting a lower total; the formal legal term is
  defalcation
 Skimming is the theft of money before it has been recorded in the books of a business
  as being received. Skimming sales is the theft of money received from a sale of goods
  or services before it has been recorded. The 'sales' part of the name is simply a
  description of what money is targeted (sales) and the 'skimming' part is a description
  of when the attack takes place (before recording). A different fraud - usually a billing
  fraud - is necessary once the receipt has been recorded and banked.
SKIMMING FACTS
• Skimming frauds are never meant to be discovered or paid back.
• In some cases frauds do not need to be hidden, and this is one of
  those cases. This will depend on the controls over inventory or
  whether a good or service was sold.
• Gateway Fraud – this type of fraud often leads to larger more
  extensive frauds.
SKIMMING FACTS (CONT.)
• Hard to detect – often times cash is taken prior to the
  recording of the transaction.
• Most common fraud in a cash business
• If a business owner fails to "ring up" a transaction and
  pockets the cash the crime becomes tax evasion.
SKIMMING FACTS (CONT.)
• Skimming may additionally be the direct theft of the cash.
• In addition to hiding it from tax authorities, the perpetrator
  hides the taking from an employer, business partners, or
  shareholders.
• Other related usages can include things such as corrupt
  government officials in a poor country "skimming" cash
  received as foreign aid.
EXAMPLES OF SKIMMING
• School store
• Ice Cream Parlor
• Bar
HOW TO DETECT SKIMMING
• Company Hotline
• Surveillance
• Comparisons/Trending
HOW TO PREVENT SKIMMING
• Training
• Company Hotline
• Surveillance
• Job rotation
• Segregation of duties
OBSERVATIONS
• Money/cash is vulnerable to fraud whenever it is handled by employees.
• Attacks on receipts can occur at any point of the business cycle. The two major areas are:
         • (a) where sales (cash or otherwise) are made; and
         • (b) where debtor's receipts are collected.
• Businesses without proper controls and those that are too reliant upon (trusting) one or a
  few employees handling money and recording transactions provide an opportunity for this
  fraud.
• Thefts can be hidden by the lapping of a series individual frauds, each covering the last.
  Lapping is most easily uncovered by separating or rotating duties amongst employees, thus
  taking away the opportunity of the fraudster to continue with the scheme.
ANOTHER TYPE OF SKIMMING: CREDIT CARD FRAUD
(OFTEN REPORTED BY THE MEDIA)
• Skimming has been described as one of the most
  significant problems facing the credit card industry, as
  it can happen anywhere a credit card is accepted.
• The best way for consumers to protect themselves
  from skimming is by paying attention to the details of
  credit card usage.
SKIMMING – CREDIT CARD FRAUD (CONT.)
• When a credit card is skimmed, data on the card, including the
  account number, is electronically transmitted or stored.
• The credit card information can then be encoded onto a lost,
  stolen, or counterfeit credit card and used anywhere in the
  world.
• The best way for consumers to protect themselves from
  skimming is by paying attention to the details of credit card
  usage.
CREDIT CARD FRAUD SKIMMING EXAMPLES
• A collusive store employee completes a valid sale, and then captures a
  second (unauthorized) swipe covertly on a portable device before
  returning the card to the cardholder.
• A skimming device is added to the front of an ATM or gas pump and
  captures the credit card information as the consumer attempts to use
  the machine.
• A skimming device is added inside an ATM or gas pump and captures
  information during a valid transaction. In many cases a covert camera is
  also set up to capture the card holder’s personal identification (PIN)
  number.
ATM 'SKIMMING' FRAUD SUSPECTED
IN LAKE FOREST
• Someone installed a hidden “skimming” device on a Lake Forest, IL ATM to steal
  private information from bank customers, Lake Forest police announced
  Thursday February 7, 2013.
• Police said the device likely was attached to an ATM in the lobby of Northern
  Trust Bank, 265 E. Deerpath Rd. Police said it recorded customers’ account
  numbers, PIN numbers or both during the last two to three months.
• That information was then used to make fraudulent withdrawals at numerous
  ATMs in the Chicago area, police said in a release.
• Deputy Police Chief Karl Walldorf said the device was removed before bank
  officials could recover it.
FOUR CHARGED IN MCDONALD'S CREDIT CARD
SKIMMING SCAM
Would you like some fraud with that?
• Four men have been charged with using a handheld skimming device to clone
  nearly 300 cards from customers at a Tulsa, Okla., McDonald's. The alleged
  crooks, the Associated Press reported, enlisted an unnamed employee at a South
  Zurich Avenue outpost of the fast food chain to capture the customer's card
  numbers for three weeks.
• Daniel Jefferson, 20, allegedly gave the McDonald's employee the skimming
  device, and came to the employee's apartment after work each day to download
  the skimmed credit card numbers — about 282 of them — onto a laptop. He
  then cloned the cards and used the new fraudulent ones to buy iPads and
  laptops.
WHAT DOES CREDIT CARD SKIMMING MEAN FOR YOUR
BUSINESS?
• Loss of business due to a bad reputation.
• Potential legal action by customers
HOW TO PREVENT CREDIT CARD FRAUD SKIMMING FOR
YOUR BUSINESS
•   Surveillance cameras at each cash registers.
•   Dummy cameras at each cash registers.
•   Training for employees
•   Fraud hotline

Note: This fraud is difficult to stop if employees are determined to
  profit from the information they have access to (credit card
  numbers).
HOW CAN YOU PREVENT OR DETECT CREDIT CARD FRAUD
SKIMMING FOR YOURSELF?
•   Ensure your credit card is swiped only once at a register.
•   Conceal your PIN as you enter it into an ATM or credit card reader.
•   Subscribe to a service that checks your credit. (LifeLock)
•   Review your credit card statements.
/   13
     / 25
03
QUESTIONS
      Jim Shellenberger
       Senior Manager
       Audit
                         Dave Hammarberg
                         Director of IT/Sr. Mgr.
             Accounting and Fraud Certification
/   13
     / 25
03
FRAUD ENGAGEMENT
  FROM A TO Z


                 SAMUEL BOWERCRAFT, MSIS, CISA

                 &

                 DAVID HAMMARBERG,

                 CPA, CFE, CISSP, MCSE, WXYZ




            13
      1 / 20
3/2

Mais conteúdo relacionado

Mais procurados

Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
Ron Steinkamp
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
Blackbaud
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
Ron Steinkamp
 

Mais procurados (20)

Q1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk ManagementQ1 2016 Fraud Detection, Prevention & Risk Management
Q1 2016 Fraud Detection, Prevention & Risk Management
 
7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting7 Keys to Fraud Prevention, Detection and Reporting
7 Keys to Fraud Prevention, Detection and Reporting
 
Fraud Investigation Process And Procedures
Fraud Investigation Process And ProceduresFraud Investigation Process And Procedures
Fraud Investigation Process And Procedures
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud principles1
Fraud principles1Fraud principles1
Fraud principles1
 
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk AssessmentACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
ACCA-IIA Singapore Seminar 2015 Part 3 Fraud Risk Assessment
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with Facts
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Fraud risk management
Fraud risk management Fraud risk management
Fraud risk management
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2, Fraud Risk Assessment- detection and prevention- Part- 2,
Fraud Risk Assessment- detection and prevention- Part- 2,
 
Fraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good PracticeFraud & Risk Management - A Guide to Good Practice
Fraud & Risk Management - A Guide to Good Practice
 
Auditing for Internal Fraud
Auditing for Internal FraudAuditing for Internal Fraud
Auditing for Internal Fraud
 
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill AcuffFraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
Fraud and Internal Controls: A Forensic Accountant's Perspective - Bill Acuff
 
Fraud Investigation,A claims handlers guide 2009 -3rd Edition
Fraud Investigation,A claims handlers guide 2009 -3rd EditionFraud Investigation,A claims handlers guide 2009 -3rd Edition
Fraud Investigation,A claims handlers guide 2009 -3rd Edition
 
Fraud & Internal Controls
Fraud & Internal ControlsFraud & Internal Controls
Fraud & Internal Controls
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
How to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your OrganizationHow to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your Organization
 

Destaque

Skimming 1
Skimming 1Skimming 1
Skimming 1
Ayarell
 
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Ralph Schneider
 
Prot Abdome
Prot AbdomeProt Abdome
Prot Abdome
fabarros
 

Destaque (20)

Skimming 1
Skimming 1Skimming 1
Skimming 1
 
Product life cycle
Product life cycleProduct life cycle
Product life cycle
 
Skimming - スキミング
Skimming - スキミングSkimming - スキミング
Skimming - スキミング
 
Scanning and skimming
Scanning and skimmingScanning and skimming
Scanning and skimming
 
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
Floating Horizon - Robotic-Skimmer collecting marine litter samples, particle...
 
Reading skills (skimming and scanning)
Reading skills (skimming and scanning)Reading skills (skimming and scanning)
Reading skills (skimming and scanning)
 
Lesson 3 Skimming and Scanning 1
Lesson 3 Skimming and Scanning 1Lesson 3 Skimming and Scanning 1
Lesson 3 Skimming and Scanning 1
 
Tcp aula 4
Tcp aula 4Tcp aula 4
Tcp aula 4
 
Prot Abdome
Prot AbdomeProt Abdome
Prot Abdome
 
Skimming y scanning ss
Skimming y scanning ssSkimming y scanning ss
Skimming y scanning ss
 
Eng7 skimming
Eng7 skimmingEng7 skimming
Eng7 skimming
 
SKIMMIMG AND SCANNING
SKIMMIMG AND SCANNINGSKIMMIMG AND SCANNING
SKIMMIMG AND SCANNING
 
Pricing Analytics: Price Skimming
Pricing Analytics: Price SkimmingPricing Analytics: Price Skimming
Pricing Analytics: Price Skimming
 
Student lesson 2 prereading skimming scanning
Student lesson 2 prereading skimming scanningStudent lesson 2 prereading skimming scanning
Student lesson 2 prereading skimming scanning
 
Know about ATM skimming Devices
Know about ATM skimming Devices Know about ATM skimming Devices
Know about ATM skimming Devices
 
Skimming y scanning
Skimming y scanningSkimming y scanning
Skimming y scanning
 
FUNDING OF HCFC PHASE OUT
FUNDING OF HCFC PHASE OUTFUNDING OF HCFC PHASE OUT
FUNDING OF HCFC PHASE OUT
 
Delitos financieros
Delitos financieros Delitos financieros
Delitos financieros
 
skimming and scanning
skimming and scanningskimming and scanning
skimming and scanning
 
Scanning and skimming (Ingles 2)
Scanning and skimming (Ingles 2)Scanning and skimming (Ingles 2)
Scanning and skimming (Ingles 2)
 

Semelhante a McKonly & Asbury Webinar - Skimming: What the Auditor's Miss

Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815
Steve Hazan
 
Revised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalRevised Fraud Powerpoint Final
Revised Fraud Powerpoint Final
Toni Smart
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
Pairat Srivilairit
 
What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014
Ron Steinkamp
 
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
saafdn
 
EFTRAC_Canada.pdf
EFTRAC_Canada.pdfEFTRAC_Canada.pdf
EFTRAC_Canada.pdf
AnisunB
 

Semelhante a McKonly & Asbury Webinar - Skimming: What the Auditor's Miss (20)

Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815
 
Revised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalRevised Fraud Powerpoint Final
Revised Fraud Powerpoint Final
 
AreFundsInJeopardy.pptx
AreFundsInJeopardy.pptxAreFundsInJeopardy.pptx
AreFundsInJeopardy.pptx
 
Forensic Accounting- Introduction
Forensic Accounting- IntroductionForensic Accounting- Introduction
Forensic Accounting- Introduction
 
Navigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management ProgramNavigate the Financial Crime Landscape with a Vendor Management Program
Navigate the Financial Crime Landscape with a Vendor Management Program
 
Ethical issue in finance
Ethical issue in financeEthical issue in finance
Ethical issue in finance
 
Workshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTXWorkshop_on_Forensic_Audit.PPTX
Workshop_on_Forensic_Audit.PPTX
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
financial ethical issues Ihsanullah mansoor
financial ethical issues Ihsanullah  mansoorfinancial ethical issues Ihsanullah  mansoor
financial ethical issues Ihsanullah mansoor
 
BKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic AccountingBKMSH Basics of Forensic Accounting
BKMSH Basics of Forensic Accounting
 
What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014What You Need to Know About Occupational Fraud in Government - 2014
What You Need to Know About Occupational Fraud in Government - 2014
 
Forensic Audit.pptx
Forensic Audit.pptxForensic Audit.pptx
Forensic Audit.pptx
 
Preventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingPreventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document Processing
 
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
21st Annual Legal & Accounting Institute: Putting Internal Controls in Place
 
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud RiskThe CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
The CFO’s Safe: Treasury’s Best Practices for Reducing Fraud Risk
 
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
 
EFTRAC_Canada.pdf
EFTRAC_Canada.pdfEFTRAC_Canada.pdf
EFTRAC_Canada.pdf
 
Introduction to auditing
Introduction to auditingIntroduction to auditing
Introduction to auditing
 

Mais de McKonly & Asbury, LLP

Mais de McKonly & Asbury, LLP (20)

Ethics: A Focus on the 7 Threats
Ethics: A Focus on the 7 ThreatsEthics: A Focus on the 7 Threats
Ethics: A Focus on the 7 Threats
 
Ratio Analysis and Business Performance – Why Should I Care – Part 2?
Ratio Analysis and Business Performance – Why Should I Care – Part 2?Ratio Analysis and Business Performance – Why Should I Care – Part 2?
Ratio Analysis and Business Performance – Why Should I Care – Part 2?
 
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
 
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
 
Leasing: A New Standard is Finally Here
Leasing: A New Standard is Finally HereLeasing: A New Standard is Finally Here
Leasing: A New Standard is Finally Here
 
Business Valuation Update & Impact of the Tax Cuts and Jobs Act
Business Valuation Update & Impact of the Tax Cuts and Jobs ActBusiness Valuation Update & Impact of the Tax Cuts and Jobs Act
Business Valuation Update & Impact of the Tax Cuts and Jobs Act
 
Tax Cut and Jobs Act: What You Need to Know
Tax Cut and Jobs Act: What You Need to KnowTax Cut and Jobs Act: What You Need to Know
Tax Cut and Jobs Act: What You Need to Know
 
Business Ethics & The Three Monkeys in the Room
Business Ethics & The Three Monkeys in the RoomBusiness Ethics & The Three Monkeys in the Room
Business Ethics & The Three Monkeys in the Room
 
Modern Trust Laws: Delivering Direction and Control
Modern Trust Laws: Delivering Direction and ControlModern Trust Laws: Delivering Direction and Control
Modern Trust Laws: Delivering Direction and Control
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Professional Ethics for CPAs - What the Rules Say and How to Interpret Them
Professional Ethics for CPAs - What the Rules Say and How to Interpret ThemProfessional Ethics for CPAs - What the Rules Say and How to Interpret Them
Professional Ethics for CPAs - What the Rules Say and How to Interpret Them
 
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
 
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
 
Navigating the new Trust Services Criteria
Navigating the new Trust Services CriteriaNavigating the new Trust Services Criteria
Navigating the new Trust Services Criteria
 
Tax Credit Opportunities for Historic Building Rehabilitations
Tax Credit Opportunities for Historic Building RehabilitationsTax Credit Opportunities for Historic Building Rehabilitations
Tax Credit Opportunities for Historic Building Rehabilitations
 
Preparing to Buy? Topics and Tips for Buying a Business
Preparing to Buy? Topics and Tips for Buying a BusinessPreparing to Buy? Topics and Tips for Buying a Business
Preparing to Buy? Topics and Tips for Buying a Business
 
Data Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better BusinessData Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better Business
 
Tax Reform Legislation Analysis - Part 2
Tax Reform Legislation Analysis - Part 2Tax Reform Legislation Analysis - Part 2
Tax Reform Legislation Analysis - Part 2
 
Tax Reform Legislation Analysis
Tax Reform Legislation AnalysisTax Reform Legislation Analysis
Tax Reform Legislation Analysis
 
Preparing to Buy or Sell? Topics and Tips for a Successful Transition
Preparing to Buy or Sell? Topics and Tips for a Successful TransitionPreparing to Buy or Sell? Topics and Tips for a Successful Transition
Preparing to Buy or Sell? Topics and Tips for a Successful Transition
 

Último

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 

Último (20)

RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 

McKonly & Asbury Webinar - Skimming: What the Auditor's Miss

  • 1. FRAUD ENGAGEMENT FROM A TO Z SAMUEL BOWERCRAFT, MSIS, CISA & DAVID HAMMARBERG, CPA, CFE, CISSP, MCSE, WXYZ 13 1 / 20 3/2
  • 2. / 13 / 25 03
  • 3. / 13 / 25 03
  • 4. SKIMMING WHAT THE AUDITORS MISS JIM SHELLENBERGER, CPA DAVID HAMMARBERG, CPA, CFE, CISSP 13 1 / 20 3/2
  • 5. A BIT ABOUT US Jim Shellenberger  Senior Manager  Audit Dave Hammarberg  Director of IT/Sr. Mgr.  Accounting and Fraud Certification
  • 6. ABOUT MCKONLY & ASBURY • Audit, Tax, and Risk Management Firm. • Regional presence in Pennsylvania. • Clients ranging from large construction, manufacturing, and other industries. • Special capabilities in the risk management area. • Best Places to Work and Best Accounting Firm.
  • 7. FRAUD IN FINANCIAL STATEMENT AUDITS 13 1 / 20 3/2
  • 8. FINANCIAL STATEMENT AUDIT • Performed in accordance with auditing standards generally accepted in the United States of America • Statement on Auditing Standards No. 99  Issued by AICPA in 2002  Effective for audits of financial statements for periods beginning on or after December 15, 2002
  • 9. AUDITOR’S RESPONSIBILITY • Plan and perform the financial statement audit to obtain reasonable assurance that the financial statements are free of material misstatement caused by:  Errors (unintentional misstatements or omissions)  Fraud (intentional misstatements or omissions)  Noncompliance with laws and regulations
  • 10. MANAGEMENT’S RESPONSIBILITY From Independent Auditor’s Report: Management is responsible for the preparation and fair presentation of these financial statements in accordance with accounting principles generally accepted in the United States of America; this includes the design, implementation, and maintenance of internal control relevant to the preparation and fair presentation of financial statements that are free from material misstatement, whether due to fraud or error.
  • 11. FINANCIAL STATEMENT FRAUD DEFINED • An intentional act by one or more individuals among management, those charged with governance, employees, or third parties, involving the use of deception that results in a misstatement in financial statements that are subject of an audit. (AU-C-240.11) Although auditor may suspect or identify the occurrence of fraud, auditor does not make a legal determination of whether fraud has actually occurred.
  • 12. TYPES OF FRAUD IN A FINANCIAL STATEMENT AUDIT Fraudulent Financial Reporting Misappropriation of Assets • Deceive financial statement users • Embezzling receipts • Manipulation of accounting records • Stealing physical assets or intellectual and supporting documents property • Misrepresentation or intentional • Using company’s assets for personal omissions of events, transactions, or use facts • Management override of controls • Usually accompanied by false or misleading records
  • 13. AUDITOR’S “FRAUD” OBJECTIVES IN A FINANCIAL STATEMENT AUDIT • Identify and assess the risks of material misstatement of the financial statements due to fraud • Design and implement appropriate responses to the assessed risks of material misstatement due to fraud and obtain sufficient appropriate audit evidence • Appropriately respond to identified or suspected fraud
  • 14. FRAUD REQUIREMENTS DURING A FINANCIAL STATEMENT AUDIT • Maintain Professional Skepticism • Engagement Team “Brainstorming” Discussion • Inquires of Management and Others • Assess Fraud Risk  Preliminary analytical procedures, including procedures related to revenue  Other information obtained (not just inquires and brainstorming)  Presumption that there is a risk of material misstatement due to fraud relating to revenue recognition
  • 15. FRAUD REQUIREMENTS DURING A FINANCIAL STATEMENT AUDIT • Respond to Fraud Risk  Incorporate element of unpredictability  Can include test of controls, or substantive procedures • Management Override of Controls  Journal entry testing • Evaluate Audit Evidence and Identified Misstatements for Indication of Fraud • Communicate
  • 16. COMMON EXAMPLE • Unauthorized Disbursements • Common to many business, often due to a lack of segregation of duties • If there is risk of material misstatement, audit response is required.
  • 17. FRAUD ENGAGEMENTS AND FRAUD INVESTIGATIONS 13 1 / 20 3/2
  • 18. WHAT DOES A FRAUD ENGAGEMENT OR INVESTIGATION COVER? • No two fraud engagement are alike • Usually a fraud engagement will focus around a specific area of the organization where irregularities were found. • Usually evidence found in a fraud engagement will guide the rest of the engagement. • Misallocation or Reporting Fraud.
  • 19. SKIMMING – AN AREA OF FRAUD THAT MAY NOT BE UNCOVERED DURING A NORMAL AUDIT Wikipedia definition  A form of white-collar crime, skimming is a slang term that refers to taking cash "off the top" of the daily receipts of a business (or from any cash transaction involving a third interested party) and officially reporting a lower total; the formal legal term is defalcation  Skimming is the theft of money before it has been recorded in the books of a business as being received. Skimming sales is the theft of money received from a sale of goods or services before it has been recorded. The 'sales' part of the name is simply a description of what money is targeted (sales) and the 'skimming' part is a description of when the attack takes place (before recording). A different fraud - usually a billing fraud - is necessary once the receipt has been recorded and banked.
  • 20. SKIMMING FACTS • Skimming frauds are never meant to be discovered or paid back. • In some cases frauds do not need to be hidden, and this is one of those cases. This will depend on the controls over inventory or whether a good or service was sold. • Gateway Fraud – this type of fraud often leads to larger more extensive frauds.
  • 21. SKIMMING FACTS (CONT.) • Hard to detect – often times cash is taken prior to the recording of the transaction. • Most common fraud in a cash business • If a business owner fails to "ring up" a transaction and pockets the cash the crime becomes tax evasion.
  • 22. SKIMMING FACTS (CONT.) • Skimming may additionally be the direct theft of the cash. • In addition to hiding it from tax authorities, the perpetrator hides the taking from an employer, business partners, or shareholders. • Other related usages can include things such as corrupt government officials in a poor country "skimming" cash received as foreign aid.
  • 23. EXAMPLES OF SKIMMING • School store • Ice Cream Parlor • Bar
  • 24. HOW TO DETECT SKIMMING • Company Hotline • Surveillance • Comparisons/Trending
  • 25. HOW TO PREVENT SKIMMING • Training • Company Hotline • Surveillance • Job rotation • Segregation of duties
  • 26. OBSERVATIONS • Money/cash is vulnerable to fraud whenever it is handled by employees. • Attacks on receipts can occur at any point of the business cycle. The two major areas are: • (a) where sales (cash or otherwise) are made; and • (b) where debtor's receipts are collected. • Businesses without proper controls and those that are too reliant upon (trusting) one or a few employees handling money and recording transactions provide an opportunity for this fraud. • Thefts can be hidden by the lapping of a series individual frauds, each covering the last. Lapping is most easily uncovered by separating or rotating duties amongst employees, thus taking away the opportunity of the fraudster to continue with the scheme.
  • 27. ANOTHER TYPE OF SKIMMING: CREDIT CARD FRAUD (OFTEN REPORTED BY THE MEDIA) • Skimming has been described as one of the most significant problems facing the credit card industry, as it can happen anywhere a credit card is accepted. • The best way for consumers to protect themselves from skimming is by paying attention to the details of credit card usage.
  • 28. SKIMMING – CREDIT CARD FRAUD (CONT.) • When a credit card is skimmed, data on the card, including the account number, is electronically transmitted or stored. • The credit card information can then be encoded onto a lost, stolen, or counterfeit credit card and used anywhere in the world. • The best way for consumers to protect themselves from skimming is by paying attention to the details of credit card usage.
  • 29. CREDIT CARD FRAUD SKIMMING EXAMPLES • A collusive store employee completes a valid sale, and then captures a second (unauthorized) swipe covertly on a portable device before returning the card to the cardholder. • A skimming device is added to the front of an ATM or gas pump and captures the credit card information as the consumer attempts to use the machine. • A skimming device is added inside an ATM or gas pump and captures information during a valid transaction. In many cases a covert camera is also set up to capture the card holder’s personal identification (PIN) number.
  • 30. ATM 'SKIMMING' FRAUD SUSPECTED IN LAKE FOREST • Someone installed a hidden “skimming” device on a Lake Forest, IL ATM to steal private information from bank customers, Lake Forest police announced Thursday February 7, 2013. • Police said the device likely was attached to an ATM in the lobby of Northern Trust Bank, 265 E. Deerpath Rd. Police said it recorded customers’ account numbers, PIN numbers or both during the last two to three months. • That information was then used to make fraudulent withdrawals at numerous ATMs in the Chicago area, police said in a release. • Deputy Police Chief Karl Walldorf said the device was removed before bank officials could recover it.
  • 31. FOUR CHARGED IN MCDONALD'S CREDIT CARD SKIMMING SCAM Would you like some fraud with that? • Four men have been charged with using a handheld skimming device to clone nearly 300 cards from customers at a Tulsa, Okla., McDonald's. The alleged crooks, the Associated Press reported, enlisted an unnamed employee at a South Zurich Avenue outpost of the fast food chain to capture the customer's card numbers for three weeks. • Daniel Jefferson, 20, allegedly gave the McDonald's employee the skimming device, and came to the employee's apartment after work each day to download the skimmed credit card numbers — about 282 of them — onto a laptop. He then cloned the cards and used the new fraudulent ones to buy iPads and laptops.
  • 32. WHAT DOES CREDIT CARD SKIMMING MEAN FOR YOUR BUSINESS? • Loss of business due to a bad reputation. • Potential legal action by customers
  • 33. HOW TO PREVENT CREDIT CARD FRAUD SKIMMING FOR YOUR BUSINESS • Surveillance cameras at each cash registers. • Dummy cameras at each cash registers. • Training for employees • Fraud hotline Note: This fraud is difficult to stop if employees are determined to profit from the information they have access to (credit card numbers).
  • 34. HOW CAN YOU PREVENT OR DETECT CREDIT CARD FRAUD SKIMMING FOR YOURSELF? • Ensure your credit card is swiped only once at a register. • Conceal your PIN as you enter it into an ATM or credit card reader. • Subscribe to a service that checks your credit. (LifeLock) • Review your credit card statements.
  • 35. / 13 / 25 03
  • 36. QUESTIONS Jim Shellenberger  Senior Manager  Audit Dave Hammarberg  Director of IT/Sr. Mgr.  Accounting and Fraud Certification
  • 37. / 13 / 25 03
  • 38. FRAUD ENGAGEMENT FROM A TO Z SAMUEL BOWERCRAFT, MSIS, CISA & DAVID HAMMARBERG, CPA, CFE, CISSP, MCSE, WXYZ 13 1 / 20 3/2

Notas do Editor

  1. An audit involves performing procedures to obtain audit evidence about amounts and disclosures in the financial statements. The procedures selected depend on the auditor’s judgment, including the assessment of the risks of material misstatement of the financial statements, whether due to fraud or error. In making those risk assessments, the auditor considers internal control relevant to the Partnership’s preparation and fair presentation of the financial statements in order to design audit procedures that are appropriate in the circumstances, but not for the purpose of expressing an opinion on the effectiveness of the Partnership’s internal control. Accordingly, we express no such opinion. An audit also includes evaluating the appropriateness of accounting policies used and the reasonableness of significant accounting estimates made by management, as well as evaluating the overall presentation of the financial statements.
  2. Management of the entity and those charged with its governance have the primary responsibility for the prevention and detection of fraud.
  3. Audit standards explicitly recognize that some misstatements might not be detected in a GAAS audit due to the inherent limitations of audits. The risk of not detecting a material misstatement resulting from fraud is higher than the risk of not detecting one from error due to attempts to conceal its detection. ( AU-C 240.05 -.06) Fraud may involve sophisticated and carefully organized ways to conceal it, deliberate failures to record transactions, or deliberate misrepresentations to the auditor.
  4. Fraudulent Financial Reporting – Intentional misstatement, including omissions of amounts or disclosures, in the financial statements. “Cooking the books” Misappropriation of Assets – involves the theft of a company’s assets resulting in materially misstated financial statements. (i.e. Stealing)
  5. Skepticism - Maintaining professional skepticism includes considering that there is a possibility of material misstatement due to fraud, regardless of the auditor's past experience with the honesty and integrity of the management and those charged with governance. Required to investigate and disclose if something doesn’t feel right Investigate responses that are inconsistent, vague, implausible, or otherwise unsatisfactory Engagement team brainstorming session - how and where the financial statements might be materially misstated due to fraud, how such a fraud might be perpetrated and concealed, and how assets could be misappropriated. Has to involve the partner Should ignore beliefs about the honesty and integrity of the client Ask a lot of “what if” questions Discuss known internal or external factors that might incentive, opportunity, or rationalization for committing fraud. Discuss management override of controls Inquires – Management, Internal Auditors (if any), Those Charged With Governance (different than management. i.e. Board, significant shareholders, general partner.) Actual, alleged, or suspected fraud Their views of where the financial statements could be materially misstatement due to fraud How management and others identify, respond to, and monitor risks of fraud Financial statement auditors are directed to “step outside” just the accounting department Assessing Fraud Risk – at the financial statement level, and at the assertion level for classes of transactions, account balances, and disclosures. Important: Not a conclusion about the level of fraud risk. Consider analytical procedures, including required Revenue Recognition Risk - Examples of inappropriate revenue recognition are recording fictitious revenues, prematurely recording revenue, or improperly shifting it to a later period. Audit procedures relevant to this risk include confirming certain contract terms with customers and observing shipments and performing appropriate sales cutoff procedures.
  6. Respond to Fraud Risk Appropriately assign and supervise staff. Use of specialized staff with certain skills Evaluate client’s selection and use of accounting policies…especially those that involve complex transactions, measurements, estimates Unpredictability – testing different accounts, new locations, different sampling methods, etc. Obtaining more audit evidence from independent third parties Computer assisted audit techniques to gather more extensive evidence Inquiring of non financial personnel Testing transactions at or near the end of the reporting period Increasing sample sizes More detailed analytical procedures A risk of management override of controls exists in all entities because management is in a unique position to manipulate accounting records and prepare fraudulent financial statements. Test journal entries Review accounting estimates for bias Evaluate business rationale for significant transactions Journal Entry Testing Understanding of the entity’s process and controls for journal entries Inquire of individuals about inappropriate or unusual journal entry activity Select journal entries or adjustments made near the end of a reporting period Professional judgement is used to determine the nature, timing, and extent of journal entry testing. Many factors. Communicate If the auditor has identified fraud or obtained information that fraud may exist, communicate it to an appropriate level of management as soon as practicable, even if the matter is inconsequential. Communication to those charged with governance (board) fraud matters
  7. Example, bookkeepers writing checks to themselves Substantive tests of the cash balance recorded in the financial statements may not be sufficient to respond to a material risk of fraudulent cash disbursements Consider the client's controls over disbursements: Segregation of duties and effective management oversight (for example, the owner/manager receives the bank statement unopened). Authorization and approval of transactions (for example, in purchasing or payroll disbursements) After considering controls, and in the auditor’s judgment, the risk that fraudulent disbursements could be material to the financial statements, an additional audit response is necessary. Auditors could perform all or some of following procedures : Performing extended analytical procedures on expense accounts. Reviewing selected disbursements for unusual payees, signatures, or endorsements. Reviewing vendor lists for unusual patterns. Reviewing payroll registers for unusual items. Performing paymaster procedures (that is, distributing payroll checks or observing their distribution). Proof of cash. Communication to those charged with governance regarding any significant deficiencies in internal control and if the results of the testing indicated that a fraud may have occurred.