Saturday, September 14, 2019
Differentiate between fraud and abuse Essay
Fraud is any and all means a person uses to gain an unfair advantage over another person. In most cases, to be considered fraudulent, an act must involve: ââ¬â A false statement (oral or in writing)à ââ¬â About a material fact ââ¬â Knowledge that the statement was false when it was uttered (which implies an intent to deceive) ââ¬â A victim relies on the statement ââ¬â And suffers injury or loss as a result Abuse is to wrongly or improperly; misuse. ââ¬â abuse alcohol ââ¬â abuse privilege ââ¬â abuse drugs ââ¬â abuse authority Compare and contrast Sutherlandââ¬â¢s theory of differential association with Cresseyââ¬â¢s final hypothesis. What does Cressey mean by ââ¬Å"non-shareableâ⬠? Cressey however, took his own studies in a different direction from Sutherlandââ¬â¢s research. He was intrigued by embezzlers, whom he called ââ¬Å"trust violatorsâ⬠. He was especially interested in the circumstances that led them to be overcome by temptation. Upon completion of his research, he developed what still remains as the classic model for the occupational offender. His research was published in ââ¬Å"Other Peopleââ¬â¢s Money: As Study in the Social Psychology of Embezzlement.â⬠Non-shareable is a issue of concern which the individual directed affected believe that he cannot share with another person due to shame or guilt. Describe at least four proactive audit tests that could help detect a shell company scheme. â⬠¢ Maintain and regularly update an approved vendor list â⬠¢ Independently verify all vendors before payment â⬠¢ Identifying shell company invoices ââ¬â Lack of detail on the fraudulent invoice ââ¬â Invoice that lacks detailed descriptions of the items billed ââ¬â Mailing address may be an indicator of fraud ââ¬â Consecutively numbered invoices over a period of time ââ¬â Reviewing payables and sorting payments by vendor and invoice number â⬠¢ Testing for shell company schemes ââ¬â Investigate budget overruns and departments that regularly exceed their budget ââ¬â Conduct horizontal analysis of expenses ââ¬â Investigate unexplained increases in ââ¬Å"softâ⬠accounts ââ¬â Investigate unexplained increases in quantity of items purchased â⬠¢ Testing for shell company schemes ââ¬â Monitor trends in average unit price ââ¬â Investigate goods and services that would not normally be purchased ââ¬â Compare vendor addresses to employee addresses ââ¬â Run reports of average turnaround time for invoices to look for unusual payment patterns â⬠¢ Verifying whether a shell company exists ââ¬â Use the phone book to verify the vendor ââ¬â Contact others in the industry ââ¬â Conduct a site visit of the vendor â⬠¢ Identifying the employee behind a shell company ââ¬â Conduct a public records search of the companyââ¬â¢s registration ââ¬â Be alert for related names, addresses, phone numbers, Social Security numbers, and other identities. ââ¬â Match vendor checks with payroll checks. ââ¬â Conduct surveillance of mail drops to see who picks up the checks. Describe the five principal categories of check tampering schemes. Detail the methods used by perpetrators to affix a signature to the check. Check tampering is unique among fraudulent disbursements because it is the one group Of schemes in which the perpetrator physically prepares the fraudulent check. In most fraudulent disbursement schemes, the culprit generates a payment to himself by submitting some false document to the victim company such as an invoice or a timecard. The false document represents a claim for payment and causes the victim company to issues a check that the perpetrator then converts. These frauds essentially amount to trickery; the perpetrator fools the company into handing over its money. Check tampering schemes are fundamentally different. In these frauds the perpetrator takes physical control of a check and makes it payable to himself through one Of several methods. Check tampering schemes depend on factors such as access to the Companies check book, access to bank statements, and the ability to forge signatures or Alter other information on the face of the check. There are five principal methods used To commit check tampering: 1. Forged maker schemes 2. Forged endorsement schemes 3. Altered payee schemes 4. Concealed check schemes 5. Authorized maker schemes What internal controls can be implemented to minimize the ability to perpetrate a ghost employee scheme? Mandatory copies of employment picture I Dââ¬â¢s and forms and a second level of inspection of them. An employment picture stapled into employment file. Quarterly justification of employment files against payroll w/ a physical inspection of any new employees file. A second level of sign off on all the need for all new employees. For example, if your company has a janitorial staff. in order to hire a new janitor, require copies of the usual I9 IDââ¬â¢s, be included into personal file. Have a signoff sheet for two levels of hiring authorization with clear printed and signed names, justifying the new employee. Have a picture of the new employee attached to the file (a good practice for all employment circumstances, anyway). A quarterly comparing of payroll to new employees. make sure payroll has to get the new documentation signoff sheet and sign it themselves after verifying the two previous sigs., prior to actually placing any new employee on the payroll. And that signoff sheet is then sent to an office managerâ⬠¦ who has to quarterly check against the new employee files New employee files are kept separate, until 90 days (or whatever your temp. time is) If employee is terminated prior to end of quarter, file is still held separate from other terminations until manager does quarterly check. Iââ¬â¢ve been through a number of these, including one who hired a ghost and gave him the same name as a company vice president, just to confuse things more. Also watch out for time sheets being turned in after employee is not actually working there, but hasnââ¬â¢t been terminated on paper yet.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.