1 / 32

Chapter 11

Chapter 11. Cash Receipt Schemes and Other Asset Misappropriations. A Case of Taking from the Poor to Give to the Rich. Non-profit organization for families of 9/11 victims Anonymous tip alerted Board of Directors of misappropriation of funds

micheline
Download Presentation

Chapter 11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 11 Cash Receipt Schemes and Other Asset Misappropriations

  2. A Case of Taking from the Poor to Give to the Rich • Non-profit organization for families of 9/11 victims • Anonymous tip alerted Board of Directors of misappropriation of funds • Corporate officers were using organization’s income for personal use • Inconsistent records with vendors • Two sets of financial records • Some transactions didn’t appear in original journals and ledgers • Unauthorized personal expenditures on credit

  3. Critical Thinking Exercises Far off in the woods, there is a cabin. The cabin contains 3 people. Two are in one room; the other is alone in another room. All doors to the cabin are locked tight and have not been opened. All three people are dead. There was no sign of violence in this cabin. How did they die?

  4. Skimming Schemes • Theft of cash from a victim entity prior to its entry in an accounting system • “Off-book” fraud • No direct audit trail • Can occur at any point where funds enter a business • Subdivided based on whether they target Sales or Receivables

  5. Sales Skimming • Most basic skimming scheme • Collect customer payment at point of sale and make no record of transaction • Cash register manipulation • After-hours sales • Skimming by off-site employees • Poor collection procedures • Understated sales • Check-for-currency substitutions • Theft in the mail room – incoming checks

  6. Preventing and Detecting Sales Skimming • Viable oversight presence when cash enters organization • Management • Video cameras • Customer complaints and tips • Cash register log-in and log-out times • Activity logs for off-site personnel • Reduce perceived opportunity to steal

  7. Receivables Skimming • More difficult than skimming sales • Receivable payments aren’t logged into accounting system • Lapping • Force balancing • Stolen statements • Fraudulent write-offs or discounts • Debiting the wrong account • Destroying or altering records of the transaction

  8. Preventing and DetectingReceivables Skimming • Strong internal controls • Separation of duties • Regularly rotate job duties • Make employees take yearly vacation • Supervisory approval for write-offs or discounts • Properly trained audit staff • Automated tests • Trend analysis on aging of customer accounts

  9. Proactive Computer Audit Tests to Detect Skimming See details in chapter

  10. Cash Larceny Schemes • Intentional taking away of an employer’s cash without consent and against will of employer • Money has already appeared on victim’s books • Can take place whenever employee has access to cash • Most larceny schemes involve the theft of cash • At point of sale • From incoming receivables • From the victim organization’s bank deposits

  11. Larceny at the Point of Sale • Large percentage of cash larceny schemes occur at point of sale • That’s where the money is • Thefts from other registers • Death by a thousand cuts • Reversing transactions • Altering cash counts or cash register tape • Destroying register tapes

  12. Preventing and DetectingCash Larceny at the Point of Sale • Strong internal controls • Segregation of duties • Discrepancies between sales records and cash on hand • Reports of discounts, returns, adjustments, and other concealing transactions

  13. Larceny of Receivables • Steal customer’s incoming payments • Hide imbalances cause by the fraud • Force balancing • Reversing entries • Destruction of records

  14. Cash Larceny from the Deposit • Taking money prior to depositing it • Difficult to conceal • Deposit lapping • Deposits in transit

  15. Preventing and DetectingCash Larceny from the Deposit • Separating duties • Itemized deposit slip • Compare authenticated deposit slip to organization’s copy of deposit slip, remittance list, and general ledger posting • Deliver 2 copies of bank statement to different people in organization

  16. Proactive Computer Audit Tests Detecting Cash Larceny See details in chapter

  17. Noncash Misappropriation Schemes • Misappropriation of inventory, supplies, equipment, and other noncash assets • Noncash misappropriations fall into the following categories • Misuse • Unconcealed larceny • Asset requisitions and transfers • Purchasing and receiving schemes • Fraudulent shipments

  18. Misuse of Noncash Assets • Two ways to misappropriate a company asset • Misuse • Steal • Unauthorized use of a company asset with false statement • Use of office equipment to do personal work on company time • The costs of inventory misuse

  19. Unconcealed Larceny Schemes • Employee takes property from the company premises without attempting to conceal it in the books and records • Take company assets without trying to justify their absence • Most noncash larceny schemes are committed by employees with access to inventory • “Management vs labor” mentality • The fake sale

  20. Preventing and DetectingLarceny of Noncash Assets • Segregation of duties • Requisitioning • Purchasing • Receiving • Physical controls • Merchandise should be guarded and locked • Restrict access to authorized personnel • Installation of security cameras • Physical inventory counts on a periodic basis • Mechanism for receiving customer complaints

  21. Asset Requisitions and Transfers • Use of internal documents to gain access to merchandise • Move noncash assets from one location to another • Overstate supplies or equipment for project and pilfer excess • Falsify forms and remove noncash assets from warehouse or stockroom

  22. Purchasing and Receiving Schemes • Purchasing and receiving functions are used to facilitate theft of noncash assets • False billings • Purchase merchandise that company doesn’t need • Noncash misappropriations • Intentionally purchased but misappropriated by the fraudster • Falsifying incoming shipments

  23. False Shipments of Inventory and Other Assets • Fraudster creates false shipping and sales documents to make it appear that inventory was sold not stolen • No risk of being caught stealing on site • Victim company unknowingly delivers targeted assets • Understate legitimate sales so accomplice is billed for less

  24. Other Schemes • Employees tailor their thefts to the organization • Security systems • Record-keeping systems • Building layout • Day-to-day operations • Write off assets to make them available for theft

  25. Concealing Inventory Shrinkage • Unaccounted-for reduction in inventory • Shrinkage is one of the red flags that signal fraud • “Where did inventory go?” • Altered inventory records • Fictitious sales and accounts receivables • Write off inventory and other assets • Physical padding

  26. Altered inventory records • Change the perpetual inventory record so that it will match the physical inventory count (a.k.a “forced reconciliation”) • Result: appearance that no shortage exists

  27. Fictitious sales and accounts receivable • Create fake sales to mask the theft of assets • Debit accounts receivable (cash) Credit sales account • Issues created: Uncollectible accounts receivable (or missing cash) • Solution: • “Sell” to a large client who may not notice and will pay for the fake sale • Write-off the receivable after an appropriate period of time

  28. Write-off inventory and other assets • Write off inventory as “obsolete” • Result: Remove assets from the books before or after they are stolen – no shortage

  29. Physical padding • Make it appear that there are more assets present • Example: • Empty boxes in warehouse • Set up a “wall” of product where nothing behind the wall exists

  30. Preventing and Detecting Noncash Thefts That are Concealed by Fraudulent Support • Separate duties of ordering goods, receiving goods, maintaining perpetual inventory records, and issuing payments • Match invoices to receiving reports before payments are issued • Match packing slip to purchase order to prevent • Monitor increases in bad debts expense

  31. Preventing and Detecting Noncash Thefts That are Concealed by Fraudulent Support (Continued) • Reductions to perpetual inventory should be properly supported • Reconcile materials ordered for projects to the actual work done • Periodically perform trend analysis on inventory designated as scrap • Only remove assets with proper authority

  32. Proactive Computer Audit Tests for Detecting Noncash Misappropriations See details in chapter

More Related