Internal Controls: The Unique Challenges of Small Firms Presented by Daniel J. Rozema, CPA FM01 Friday, 9/20/2013 10:30 AM - 11:45 AM Internal Controls: The Unique Challenges of Small Firms Topics • Common Internal Control Weaknesses • Preventing Asset Misappropriation Through Internal Controls • Considerations for all organizations regardless of size 1 Common Internal Control Weaknesses Common Internal Control Weaknesses • • • • • • Lack of segregation of duties Lack of physical safeguards Lack of independent checks Lack of proper authorization on documents, and records Overriding existing controls An inadequate accounting system 2 Lack of Segregation of Duties • Certain activities should not be performed by the same person or even by the same department. • If different personnel are assigned the functions of cash receipts and accounts receivable, respectively, then the opportunity to commit accounts receivable fraud has been substantially reduced . • Includes access to necessary accounting software modules. Lack of Physical Safeguards • Physical safeguards should be in place to protect the assets of an organization from theft or destruction. • Cash and marketable securities should be secured in a locked vault. • With access limited to approved personnel. 3 Lack of Independent Checks • Independent checks serve as a deterrent because if people know that their work is being watched, then they won’t commit fraud. • When this is not occurring or a review is conducted by a person who is not independent of the function, then the chances for fraud increase. Lack of Proper Authorization on Documents, and Records • Proper authorization and documentation is, and has always been a deterrent to fraud. • Documents and authorization create an audit trail, and thus a deterrent. 4 Overriding Existing Controls • When controls are overridden, especially when a pattern is found, a suspicion for fraud should exist. An Inadequate Accounting System • An effective accounting system will impede fraud because it provides an audit trail for discovery and makes it more difficult to hide. • With a weak accounting system, identifying fraud or determining if there is fraud or errors becomes more difficult. 5 Documentation of Policies and Procedures Minimum Suggested Documentation of Policies and Procedures • Overview of procedure for each significant process (cash receipts and billing, cash disbursements, and payroll) – More detail the better • Identify key controls in each process 6 Preventing Asset Misappropriation Through Internal Controls Preventing Asset Misappropriation Through Internal Controls Three major categories of employee fraud: • Financial statement fraud, • Asset misappropriations, and • Corruption. 7 Asset Misappropriation Schemes Can be broken down into two major categories: • cash schemes (stealing money) • non-cash schemes (theft or misuse of inventory and other physical assets) Three Categories of Cash Frauds • Skimming • Fraudulent disbursements • Cash larceny 8 Preventing Fraudulent Skimming and Disbursements Four categories of skimming and fraudulent disbursements are: • Billing schemes • Check tampering • Payroll schemes • Expense reimbursement schemes Billing Schemes • • • • • Shell company schemes Not recording invoices sent to clients Fictitious services Overpriced services Personal items which the fraudster charges to the employer and bills client 9 What red flags are associated with billing schemes? • No segregation of duties in the accounting, billing, and cash receipts function. • Aged client accounts receivable. • Duplicate payments to a vendor. • Unexplained decrease in revenues. How can billing schemes be prevented? • Adequate segregation of duties in the billings, accounting, and cash receipt function. • Periodically search for business licenses issued to entities with a similar name. • Review appropriateness of any write-off of accounts receivable. • Review aging of receivables. 10 Check Tampering Schemes • • • • • Forged maker schemes Forged endorsement schemes Altered payee schemes Concealed check schemes Authorized maker schemes What red flags are associated with check tampering? • No segregation of duties in the check cutting function. • Unusual or excessive number of journal entries to cash accounts. • Excessive number of voided checks. • Signatures on canceled checks that do not match the signature file. • Cash account shortages. 11 What red flags are associated with check tampering? • Any check payable to “cash” or non-payroll check payable to an employee. • Cancelled check that do not match postings in the disbursements journal. • Out-of-sequence checks or duplicate check numbers on the bank statement. • Payments to unknown vendors. • Unexplained increases in expenses. • Unexplained changes in vendor files such as temporarily changing the name or address. What red flags are associated with check tampering? • Cancelled checks that appear to have been printed on inferior stock. • Cancelled checks with dual endorsements. • Vendor complaints about non-payment. • Payments to unknown vendors. 12 Preventing check tampering • Adequate segregation of duties in the disbursements function. • Blank check stock should always be safeguarded and access restricted. • Those who sign company checks should not have access to blank checks and should not post disbursements. • Those who prepare checks for signature should not have access to checks after they have been signed. • Maintain an approved vendor list. Preventing check tampering • Checks should be mailed immediately after they are signed. • The bank statement should be reconciled by someone who is independent. • Access to vendor files should be restricted. • Establish a threshold amount over which dual signatures are required on a check. • Purchases should only be made with management approval. 13 Other schemes • Payroll – Ghost employees – Falsified hours • Expense reimbursement – Inflated or fictitious – Personnel in nature Other schemes (continued) • Trust fund misappropriation – “Borrowing” money from trust fund – Taking money from trust before it is earned – Trust account theft – Failing to properly track client funds • Not putting client name on trust fund checks • Failing to maintain an individual ledger for each client 14 Other schemes (continued) • Phishing – The act of attempting to acquire information such as usernames, passwords, bank or credit card account numbers, social security or other PII by masquerading as a trustworthy entity in an electronic communication. – Purporting to be IRS, banks, representatives of foreign governments. – Best method to combat training to recognizing phishing attempts. – Don’t assume spam software will prevent. Considerations for all Organizations Regardless of Size 15 Engaging the Partners • In most small law firms, the dominance of the managing partner’s attitude and actions determine the effectiveness of control procedures and monitoring activities. Engaging the Partners – Best Practices • If successful in engaging, consider the following be performed by the Partner: – Signing all checks with detail review of supporting documentation. – Determining or approving salaries and wages, reviewing payroll records periodically, and signing all paychecks. – Opening the mail. – Receiving bank statements directly and reviewing canceled checks and account activity. 16 Engaging the Partners – Best Practices • If successful in engaging, consider the following be performed by the Partner (continued): – Performing or monitoring credit and collection policies. – Handling inquires from clients or vendors regarding their accounts. – Reviewing bank reconciliations • This should be performed timely and not saved for slow periods. What to do When the Partners Will Not Engage 17 Make Use of All Firm Employees • Use the receptionist to open the mail and log cash receipts. • Use staff attorneys when appropriate. Selecting the Right Employee • • • • • • Past Employment Verification Criminal Conviction Checks Drug Screening Reference Checks Education and Certification Verification Get the Consent of the Candidate 18 Safeguarding Networks and Accounting Systems • Limit access to employees who need to work in system or module. • Grant appropriate access rights. – Make use of read only rights when appropriate. • Remote access should be controlled. • Access should be revoked immediately for terminated employees. • Utilize access and user logs when available. Increasing the Perception of Detection May well be the most effective fraud prevention method. • Employee education Management oversight Dishonest acts will be punished • Reporting activities • Hotlines • Rewards 19 Minimize Employee Pressures • Open-door policies • Employee support programs • Management tone • Ethics policy • Pro-active audit policies – Increased use of analytical review – Fraud assessment questioning – Enforcement of mandatory vacations – Job rotation – Surprise audits Ethics Program • A written ethics policy is an excellent method by which management can objectively communicate its philosophy and develop a successful Ethics Program. • The collection of a person’s beliefs and morals makes up a set of principles known as ethics. • Ethics are the judgments about right and wrong or, more specifically, a person’s moral obligations to society that determine a person’s actions. 20 12 components are necessary to develop, implement, and manage a comprehensive ethics program: 1. Focus on ethical leadership 2. Vision statement 3. Values statement 4. Code of ethics 5. Designated ethics official 6. Ethics task force or committee 7. Ethics communication strategy 8. Ethics training 9. Ethics help and fraud report telephone line 10. Ethical behaviour rewards and sanctions 11. Comprehensive system to monitor and track ethics data 12. Periodic evaluation of ethics efforts and data • Questions? 21 Thank you Presented by: Thank you Daniel J. Rozema Presented by KPMG, LLP drozema@kpmg.com Daniel J. Rozema KPMG LLP 907-265-1217 drozema@kpmg.com 22