DEVELOPING INTERNAL CONTROLS TO PREVENT FRAUD. Neal Crowley Office of University Audits

Similar documents
The Commonwealth of Massachusetts DEPARTMENT OF PUBLIC UTILITIES TRANSPORTATION NETWORK COMPANY DIVISION DISQUALIFYING CONDITIONS

WINNING LAW ENFORCEMENT OVER TO YOUR SIDE. Presented by EDWARD R. SMITH, CFE, LPD

Interviewing vs. Interrogation

KNOW THE SIGNS OF DECEPTION TOP 10 SIGNS YOU ARE BEING LIED TO

IAASB Main Agenda (September 2005) Page Agenda Item. Analysis of ISA 330 and Mapping Document

IAASB Main Agenda (February 2007) Page Agenda Item PROPOSED INTERNATIONAL STANDARD ON AUDITING 530 (REDRAFTED)

IIA News & Chapter Report

MINT Incorporated Code of Ethics Adopted April 7, 2009, Ratified by the membership September 12, 2009

Maryland State Commission on Criminal Sentencing Policy

Ten Steps to a Successful Investigation

SRI LANKA AUDITING STANDARD 530 AUDIT SAMPLING CONTENTS

Audit of the Dallas Police Department s Records Management System 1

Class I misdemeanor Class IV felony. Class I misdemeanor Class IV felony. Class I misdemeanor. Class IV felony. Class I misdemeanor

Safety & Accountability Audit

THE IMPORTANCE OF ETHICS IN EVERYDAY DECISIONS

STATE OF NORTH CAROLINA

UNDERSTAND RISK AND YOU WILL UNDERSTAND FRAUD

International Standard on Auditing (UK) 530

SWALLOWING THE WRONG PILL Criminal Drug Diversion By Physicians and Other Medical Professionals A Prosecutor s Perspective

******************************************************************* MINUTES OF SYMMES TOWNSHIP SPECIAL MEETING

QUALITY REVIEW PROGRAM REVIEW OF FORENSIC ACCOUNTING ENGAGEMENT QUESTIONNAIRE

Corrections, Public Safety and Policing

The FDA Food Safety Modernization Act: The Key New Requirements

WHO DO I CONTACT WITH QUESTIONS? Our team is happy to answer any questions or address any concerns that you may have.

SAS 112: Communicating Internal Control Related Matters Identified in an Audit

NO. OF PAGES: 1-CORE-4D-14, 1-CORE-4D-15, 1-CORE-4D-16 5

Chapter 2 WHY DO WE PUNISH? Introduction to Corrections CJC 2000 Darren Mingear

September 5-7, 2018 St. Pete Beach, Florida. Building Tomorrow s Leaders Today. In the Eye of the Storm: Crisis Media Management for Executives

ANNUAL CORRUPTION CASE REPORT 2017

Campus Crime Brochure for academic year

IDEAS FOR LEADERSHIP

A. The unlawful possession, use, distribution, manufacture, or dispensing of illicit drugs on EVMS property or at an EVMS off-campus activity.

58 th Annual Air Safety Forum. August 6-9, 2012

CONDUCTING SUICIDE RISK ASSESSMENT: REALITY AND REMEDY ROBERT I. SIMON, M.D.*

Investigative Report. Hector Collazo Jr. Inspector General/Chief Audit Executive.

SANDESTIN WINE FESTIVAL RESPONSIBLE VENDOR OUTLINE

Campus Crime Brochure

The Insanity Defense Not a Solid Strategy. jail card. However, this argument is questionable itself. It is often ignored that in order to apply

Controlled Substances Program. For Academic Units

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION. Case No. Class E Felony. Class C Felony

SEXUAL HARASSMENT POLICY

Community Partnerships Division. Monitoring Visit Administrative Review Results for Ryan White Part A Provider

RHS Town Hall Meeting December 4, 2015

The Art of Interviewing

Training on Victimization Surveys. Seong-Jin Yeon, Ph.D. Director of International Strategic Research Center Korean Institute of Criminology

DATE ISSUED: 3/28/ of 5 UPDATE 31 FLB(LOCAL)-X

Restorative Justice. Principles are:

Standards, Education, Verification. Patient Focused Certification

Digital Evidence Management Plan

Los Angeles Valley College Emergency Services Department

Financial Administration and Control of Research and Special Funds

Sex Crimes: Definitions and Penalties Indiana

Ethics: Handling Allegations of Officer Untruthfulness

VERSION 2016 INVESTIGATIONS CHAPTER 15 UTAH STATE BOARD OF EDUCATION CAREER AND TECHNICAL EDUCATION

The Psychology of Fraud

FREQUENTLY ASKED QUESTIONS

INTERVIEWING TECHNIQUES

Litigation Services and Fraud Cases: Perspective of the Forensic Accountant Abstract Keywords 1.0 Introduction

CODE OF ETHICS FOR ALCOHOL AND DRUG COUNSELORS

TRUSTEE RECRUITMENT PACK

CDL Drivers Controlled Substance and Alcohol Policy

(4) Coercion unreasonable, intimidating or forcible pressure for sexual activity.

Link full download:

SEXUAL HARASSMENT i POLICY ARGENTA-OREANA PUBLIC LIBRARY DISTRICT

III. Reinstatement Review. Inventory At times I worry about what people think or say about me. 12. I have a drug problem.

Tobacco Retailer Kit

MS Society Safeguarding Adults Policy and Procedure (Scotland)

5/27/15. Instructor Michael Brownlee B.Comm(Hons),CGA Course AU1. Exam 3 hours Wednesday eve 6:30-9:30pm June 11 check your schedule

Chapter 02 Ethical Decision-Making: Personal and Professional Contexts

Is Your Sample Representative?

ALIBI BELIEVABILITY: THE IMPACT OF SALACIOUS ALIBI ACTIVITIES

1. A Proceed cautiously. If a scenario is legal and profitable, one should proceed with caution as it may be infringing on ethical grounds.

2017 MADD Sponsorship Proposal

The Speed of??? Robyn Roett

THE INSTITUTE OF INTERNAL AUDITORS INSTRUCTOR CODE OF CONDUCT & ETHICS

JUNE 2013 EXAMINATION DATE: 11 JUNE 2013 DURATION: 2 HOURS PASS MARK: 40% (UU-50)

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL. SEXUAL MISCONDUCT Effective September 25, 2014 Policy 3-44 Page 1 of 8

Mayor s Gang Prevention Task Force

SENATE, No. 359 STATE OF NEW JERSEY. 217th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2016 SESSION

VACCINES FOR CHILDREN (VFC) DISCREPANCY OR MISUSE POLICY

Performance Audit. Department of Health and Human Services Division of Public and Behavioral Health Medical Marijuana Program 2017

POLICY ON SUBSTANCE ABUSE FOR FACULTY, STAFF, AND STUDENTS

State of Alaska Department of Corrections Policies and Procedures Chapter: Subject:

Elder Abuse: Causing Physical and Financial Devastation

BIIAB LEVEL 1 AWARD IN RESPONSIBLE ALCOHOL RETAILING. Specimen Examination Paper


Associates, llc, for its Complaint against the defendants, Gary K. DeJohn, Sr. and DeJohn

WHO DO I CONTACT WITH QUESTIONS? Our team is happy to answer any questions or address any concerns that you may have.

5H Amendments. Age (5H1.1) Mental and Emotional Conditions (5H1.3) Physical Condition, Including Drug or Alcohol Dependence or Abuse (5H1.

SOCIAL-PSYCHOLOGY BEHAVIORS: AN UNDERUTILIZED TOOL FOR INTERVIEWERS

FrontLine. Video Test Preparation Booklet. Video Testing System for Law Enforcement

What the CEO needs you to know

Goals of the Workshop. Criminal personality profiling: State of the science. Conflict of Interest. September 30, 2012

CHAPTER 1 An Evidence-Based Approach to Corrections

Pledge Processing Manual

Conflict of Interest Policy

POLICY ON SEXUAL HARASSMENT FOR STUDENTS CHARLESTON SOUTHERN UNIVERSITY

Teaching Statistics with Coins and Playing Cards Going Beyond Probabilities

POLICY of 5. Students SEXUAL HARASSMENT OF STUDENTS

BEST PRACTICES: FOLLOW THE LEADER CRIMINAL BEHAVIOR

Transcription:

DEVELOPING INTERNAL CONTROLS TO PREVENT FRAUD Neal Crowley Office of University Audits 1

Objectives What is fraud. Reasons to commit fraud. Elements necessary for fraud to occur. Behavior of fraudsters. Red flag fraud indicators. Internal control and its types. Walkthrough an example of internal control design. (Audience participation). Internal Control limitations. Interactive - ask questions 2

Our Office assists UI Management and the UIC Police in fraud investigations It is after the fact. It consumes a lot of resources. It never seems to end. 3

What is Fraud? Honestly, there is no right definition for the many unique instances that are difficult to detect. 4

Fraud defined by Black s Law Dictionary is: all multifarious means which human ingenuity can devise, and which are resorted to by one individual to get an advantage over another by false suggestions or suppression of the truth. It includes all surprise, trick, cunning, or dissembling, and any unfair way by which another is cheated. 5

Why commit fraud? 2 common justifications fraudsters give as reasons for their actions For the fraudster s personal enrichment (against the organization). For the betterment of the company (for the organization). Either way its wrong. 6

Circumstances necessary for fraud and white-collar crime to be Intent perpetrated and proved Disguise of purpose Reliance Voluntary victim action Concealment 7

Intent is to knowingly to commit a wrongful act or to achieve a purpose inconsistent with law or public policy. Common ways to show intent are proof that the accused: Make conflicting statements. Had no legitimacy for the wrongful actions. Repeatingly engaged in wrongful acts. Act to impede the investigation. Make blatantly false statements. Make an admission. 8

Disguise of purpose is falsities or misrepresentations employed to accomplish the scheme. This is shown by the facts that the representation was made and it was false, either by omission or commission. This means the fraudster gets trapped in their lies or complexity of trying to hide their wrongdoing. A confession is when this element is discovered. 9

Reliance By the offender on the ignorance or carelessness of the victim. Unwittingly, the unit being victimized assists the fraudster. An example would be a P-Cardholder using their assigned card for personal use. The cardholder is their own reconciler and reconciles the unit s financial statements. The unit s Director does not review the statements or expenditure supporting documentation and relies on information provided by the cardholder. 10

Voluntary victim action The unit being ripped off provides assistance to the offender. This assistance is usually in the form of fiduciary capacity. The unit gave the offender the authority to perform a business transaction did so trusting he/she would act in the best interests of the unit, however it does not review or verify transactions appropriate University business. 11

Concealment All frauds have concealment of the offense. This is what differentiates fraud from other crimes. Armed robbery is not concealed. The extent that fraudsters go to conceal their crime is quite extensive. They may create false invoices, vendors, or employees, to cover their tracks. 12

General Characteristics of Fraud Individual is trusted. Usually start small and then get greedy. Act is intentionally concealed. Employee doesn t take vacation. Never gives a definitive answer to direct questions. Never let others review their work. Perpetrator 13

General Characteristics of Fraud Perpetrator Works long hours; first in/last out. Always want to control their work with no supervision. Opposes cross training. Likeable and generous. Personality may change, moodiness may set in, when stress of the fraud catches up to them, or when they are about to be caught. Secretive, evasive and usually good at lying. 14

Fraud Red Flags Not separating functional responsibilities of authorization, custodianship, and record keeping. No one should be responsible for all aspects of a function from the beginning to the end of the process. Unrestricted access to assets or sensitive data (e.g., cash, personnel records, etc.). Not recording transactions resulting in lack of accountability. Not reconciling assets with the appropriate records. 15

More Red Flags Unauthorized transactions Controls not implemented due to lack of personnel or adequate training Walk through approvals Unimplemented Controls Living beyond one s means 16

What can you do about fraud? 17

Fraud deterrence starts with Management Management sets the tone of the organization. Strong internal control environment-review and monitoring of transactions. Communicating expectations. Analyzing variances. Balancing resources. 18

Types of Internal Controls Detective (rear view mirror) Designed to detect errors or irregularities that may have occurred. Preventive (thru the windshield) Designed to keep errors or irregularities from occurring in the first place. Corrective (ticket and fine) Designed to correct errors or irregularities that have been detected. 19

Detective Control Examples Account reviews and reconciliations. Periodic physical inventory counts. Transaction edits. Internal auditors. 20

Preventive Control Examples Restricted access. Credit checks. Job descriptions Required authorization signatures. Data entry checks. Physical control over assets to prevent their improper use. 21

Corrective Control Examples Budget variance reports. Formal Controlled Self-assessment programs. Quality circle teams. 22

Internal control design considerations Any control needs to fit your resources. Build in segregation of duties. Communicate to all employees how the particular business process is suppose to work. Management oversight. 23

Walkthrough the design of an internal control (Audience Participation) Need criteria for an example Business process Number of people involved Type of control wanted 24

Internal Control Limitations They can only provide reasonable assurance that objectives have been achieved. Inherent limitations include: Judgment Breakdowns Management override Collusion 25

Our office will provide training to Colleges and Schools that request it. Please contact me at 6-2748 or at ncrowley@uic.edu for further information. 26

Reference Links Fraud http://www.acfe.com/ http://www.fbi.gov/maj cases/fraud/fraudsche mes.htm http://www.pueblo.gsa. gov/scamsdesc.htm http://www.finaid.org/s cholarships/fraudact.p html Internal Control http://www.obfs.uillinoi s.edu/manual/index.ht ml http://www.audits.uillin ois.edu/ http://www.theiia.org/ http://www.pcaobus.or g/ http://www.coso.org/ http://www.sarbanesoxley.com/ 27

Questions??? There is no wrong question. 28