1 / 31

Fraud Detection and Deterrence GAAF December 7, 2011 Presented by Rod Ballard

Fraud Detection and Deterrence GAAF December 7, 2011 Presented by Rod Ballard. The First 48 Hours Maintain Secrecy Contact Corporate Attorney Contact Fraud Examiner Retain Documents. The First 48 Hours Control Physical Access Control Electronic Access Memorialize events

alpha
Download Presentation

Fraud Detection and Deterrence GAAF December 7, 2011 Presented by Rod Ballard

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fraud Detection and Deterrence GAAF December 7, 2011 Presented by Rod Ballard

  2. The First 48 Hours • Maintain Secrecy • Contact Corporate Attorney • Contact Fraud Examiner • Retain Documents

  3. The First 48 Hours • Control Physical Access • Control Electronic Access • Memorialize events • Chain of Custody

  4. The Element of Surprise • “Need to Know” basis • Avoid drastic changes • Team needs non-threatening cover

  5. Legal Cover • Privilege & Confidentiality • Right to Privacy • Future Claims & Actions

  6. Business Crime Scene Investigator • Chain of Custody • Accounting issues • Interview skills

  7. Record Retention • Invoices, Bank Statements, Credit Card Statements • Contracts, Spreadsheets, Receipts • Memos, emails, messages

  8. Control Physical Access • Review surveillance film • Take inventory of keys • Note variances

  9. Control Electronic Access • Change key passwords • Load mirror programs • Note variances

  10. Memorialize Key Facts • Write down sequence of events • Record names, dates, amounts • Any detail can become important

  11. Control Evidence • Note date obtained and key facts • Lock up and protect • Limit handling

  12. Fraud Categories • Asset misappropriations • Corruption • Fraudulent statements

  13. Asset Misappropriations • Theft or misuse of an organization’s assets. • Skimming revenues • Stealing inventory • Payroll fraud

  14. Corruption • Misuse of influence • To procure some benefit • For themselves or another person, • Contrary to their duty • Accepting kickbacks • Engaging in conflicts of interest

  15. Fraudulent Statements • Falsification of an organization’s financial statements. • Overstating revenues • Understating liabilities or expenses

  16. 2010 Report to the Nations • Association of Certified Fraud Examiners (ACFE) • $652 Billion or 5% of GDP in total cost of fraud • $159,000 median loss per incident • $82,000 median loss per incident for Government

  17. Department • Accounting • $199,000 per incident • 30% frequency • Executive • $900,000 per incident • 21% frequency • Purchasing • $1,000,000 per incident • 3% frequency

  18. The Fraud Triangle Incentive Opportunity Rationalization

  19. Risk Analysis What is the probability? • Remote • More than remote • Probable

  20. Risk Analysis (cont) What is the significance? • Inconsequential • More than inconsequential • Material

  21. Risk Analysis (cont)

  22. Brainstorm • Conduct session at least annually • Think like a perpetrator • Perform in conjunction with corporate attorney • Address vulnerable areas

  23. Vulnerable Areas • Which assets are most susceptible to misappropriation? • The answer will vary slightly from organization to organization, but the most common ones are • Cash • Inventory • Assets easily converted into cash • Equipment that is readily marketable

  24. Corporate Accountability Programs • Tone at the Top • Policies & Procedures • Effective Monitoring • Regulations and Laws

  25. Tone at the Top • Goes beyond the code of ethics • Creates positive work environment • Increases deterrence effectiveness

  26. Policies & Procedures • Code of Ethics/Ethics Statement • Internal controls • “Fraud, Waste, and Abuse” reporting mechanism

  27. Effective Monitoring • Internal Audit • Rewards & Punishment • Anonymous Tip Hotline

  28. Regulations & Laws • Competitive Bids • Lobbying & Gifts • Private Use of Public Assets

  29. Elements for an Effective Program • Tone at the top • Anonymous hotline • Internal Audit • Workplace conditions • Employee education • Open communication • Hiring independent external auditors • Active Board • Active audit committee

  30. Resources • “Guide to Internal Control and Fraud Prevention” • The ACFE Report to the Nation 2010 • The COSO Report www.coso.org • Jackson Thornton Corporate Governance • Rod.Ballard@jacksonthornton.com • 334-240-3622

More Related