Anti-Fraud Measures – Ann Doerr

advertisement
AN EVALUATION OF THE EFFECTIVENESS OF ANTI-FRAUD MEASURES
WITHIN AN ORGANIZATION
By
Helen Ann Doerr
BS in Information Security and Intelligence
Ferris State University, 2010
BS
Murray State University, 1984
Advisor:
Dr. James H. Jones, Jr.
Assistant Professor
Accounting, Finance, and Information Systems Department
Fall Semester 2010
Ferris State University
Big Rapids, MI
1
DEDICATION
This is dedicated to my husband, Bret Doerr.
2
ACKNOWLEDGEMENTS
I would like to acknowledge Dr. Douglas Blakemore who was my instructor for the class
Fraud Examination. This class initiated my interest in the Information Security and
Intelligence program at Ferris State University.
3
TABLE OF CONTENTS
Page
List of Tables……………………………………………………………………………5
List of Figures…………………………………………………………………………...6
Abstract................................................................................................................……….7
Chapter 1 .......................................................................................................................…9
Chapter 2 .........................................................................................................................18
Chapter 3 .........................................................................................................................22
Chapter 4 ........................................................................................................................24
Chapter 5 .........................................................................................................................30
Appendices …………….………………………………………………………………32
List of References.……………………………………………………………………..36
4
LIST OF TABLES
Table
Page
Table 1: Asset Misappropriation Sub-Categories ............................................................ 14
Table 2: Percentage of Fraud Reports .............................................................................. 26
Table 3: How Hotlines are Communicated to Employees ................................................ 27
5
LIST OF FIGURES
Figure
Page
Figure 1: Types of Fraud by Occurrence .......................................................................... 12
Figure 2: Types of Fraud by Median Loss ........................................................................ 12
Figure 3: Percentage of Fraud Cases by Position ............................................................. 15
Figure 4: Median Loss by Position ................................................................................... 15
Figure 5: Reasons for Declining Legal Action ................................................................. 19
Figure 6: How Fraud is Detected ..................................................................................... 21
6
ABSTRACT
AN EVALUATION OF THE EFFECTIVENESS OF ANTI-FRAUD MEASURES
WITHIN AN ORGANIZATION
Helen Ann Doerr: BS
Ferris State University, 2010
Advisor: Dr. James H. Jones, Jr.
The main objective of this paper is to determine whether certain aspects of the SarbanesOxley Act (SOX) have been effective in preventing and detecting fraud. Prior to the
enactment of this Act, the business world within the United States had witnessed several
instances of fraud that would have catastrophic results. The purpose of SOX was, in part,
to address these issues through external auditing. Also included in SOX was the
implementation of hotlines, where “whistle blowers” could notify their company of
fraudulent activities. The methodology used to evaluate this topic was through online
research of various websites and articles and interviews with two experts in the area of
Accounting. Additional research was done by reviewing textbooks and notes from past
classes taken at Ferris State University. These classes included: Auditing, Accounting
Information Systems, Data Mining and Fraud Examination. From this research it was
determined while SOX did have an impact on the prevention and detection of fraud, there
7
were other measures that companies have chosen to implement. The use of technology is
now becoming a dominant factor in the prevention and detection of fraud. Hotlines
continue to be the number one source of fraud detection. However, companies must also
develop their own fraud control policies in order to protect their assets.
8
CHAPTER 1 - INTRODUCTION
During the last part of the 20th century and into the early years of the 21st century,
the business world was plagued with accounting scandals. Companies like Enron and
WorldCom that are publicly traded on the stock exchange, eventually were forced into
bankruptcy, while a leading accounting firm, Arthur Anderson LLP collapsed due to its
involvement with some of these companies. As a direct result of these scandals, congress
stepped in and in 2002 enacted the Sarbanes-Oxley Act (SOX). This Act was designed to
combat fraud and reform accounting, and financial report. However, since the enactment
a key question remains, was the Sarbanes-Oxley overkill or has it made an impact on
fraud control? This paper will focus on what companies are doing to protect themselves
from fraud. Two key aspects are key components found in SOX: Auditing and Hotlines,
while other technologies, such as the implementation of a Fraud Control Policy is not
mentioned in SOX.
SOX is a complex act containing 11 titles and each title containing multiple
sections. It is beyond the scope of this paper to fully analyze the efficacy of each title
and section. However, Title II Auditor Independence changed the way audits were
performed. The auditor was to remain independent from the company being audited by
9
reporting to an audit committee. The audit committee had to approve all audit and nonaudit services. Furthermore, the auditor must rotate off assignment every 5 years.
Auditors must complete detailed audits, and issue an audit report stating the findings.
But how effective are these audits in combating fraud? What about other types of audits,
ones conducted by the organization? Are they better in detecting fraud?
Also within SOX is another important area called Title III: Corporate
Responsibility. Section 301 of this Title states that “whistleblowing” mechanism must
be established where fraud and misconduct can be reported.
But since the implementation of SOX in 2002, how effective has it been in
reducing fraud? How do companies address the requirement for a “whistleblowing”
mechanism. If these titles are implemented, what has been the impact on fraud?
Finally, if SOX has not been effective in combating fraud, what are some
alternative measures that an organization can implement to combat and prevent fraud.
However, before we can fully evaluate the impact of these two titles, we must first
understand what fraud is and how serious it is in today’s work environment.
WHAT IS FRAUD
Fraud is still a serious problem in today’s work.
According to the 2010 Report
to the Nations on Occupational Fraud and Abuse published by the Association of
Certified Fraud Examiners (ACFE), it is estimated that an organization will lose
approximately 5% of its revenue to some type of fraud or abuse. But what does this in
terms of actual dollars? If we were to take this estimate and multiply it by the US Gross
World Product, we would project the cost of fraud to organization would exceed $2.9
10
trillion dollars. (Association of Certified Fraud Examiners, 2010). In comparison, the
2010 national defense budget was set at $ 663 billion dollars. Unfortunately, it is
unlikely, or even impossible to know what is the total cost of fraud might actually be
since it can go undetected for years within an organization.
But exactly what constitutes fraud? The definition for fraud is as follows:
The use of one’s occupation for personal enrichment through the
deliberate misuse or misapplication of the employing organization’s resources or
assets.
The definition of fraud is very broad, therefore a more detailed
explanation is necessary to understand what is fraud.
Fraud can be broken up into three categories



Corruption
Asset Misappropriations
Fraudulent Statements
A diagram illustrating the various examples of each category may be found in
Appendix B.
According to the ACFE 2010 Report to the Nations on Occupational Fraud and
Abuse, Asset Misappropriation account for more than 80% of all cases, however in terms
of losses, it is the lowest median loss as illustrated in Figure 1 and Figure 2.
11
Figure 1: Types of Fraud by Occurrence
Figure 2: Types of Fraud by Median Loss
12
Additionally, it is clear from Figure 1, that asset misappropriation is the most
common occurrence of fraud being committed. To understand how employees are
committing fraud it is also necessary to understand the different manners in which they
are doing so. Table 1 further provides the sub-categories, description and examples
associated with different types of asset misappropriation.
13
Table 1: Asset Misappropriation Sub-Categories
Asset Misappropriation Sub-Categories
Category
Description
Examples
Skimming
Cash is stolen before recorded on the
organization’s books
Employee accepts payment
from a customer but doesn’t
record the sale
Cash Larceny
Cash is stolen from an organization
after it is recorded on the books
Employee steals the cash
but before it is deposited in
the bank
Billing
A person causes his employer to issue
a payment by submitting invoices for
fictitious goods or services, inflated
invoices or invoices for personal
purchases.
Employee creates a shell
company and bills employer
for non-existent services
Expense
Reimbursement
A person makes a claim for
reimbursements of fictitious or
inflated business expenses
Employee files fraudulent
expense report
Check Tampering
A person steals employer’s funds by
intercepting, forging or altering a
check draw on the organization’s
bank account
Employee steals blank
checks and makes them out
to himself
Payroll
A person causes his employer to issue
a payment by making false claims for
compensation
Employee claims overtime
not worked
Cash Register
Disbursements
A person makes false entries on a
cash register to conceal the fraudulent
removal of cash
Employee fraudulent voids
a sale and steals the cash
Cash on Hand
A person misappropriates cash kept
Misappropriations on hand the organization’s premise
Employee steals cash from
the vault
Non-Cash
A person steals or misuses non-cash
Misappropriations assets of the organization
Employee steals or misuses
confidential customer
14
information
WHO COMMITS FRAUD
We also need to determine who is committing the fraud. Fraud is not limited to
offenses carried out by employees, but also it also may include managers, executives and
even the owners. While Figure 1 shows that the Owner/Executives account for only
19.3% of the number of cases of fraud, Figure 2 indicates the amount of fraud in dollars
is often larger when compared to the dollar amount committed by managers and
employees.
Figure 3: Percentage of Fraud Cases by Position
2006 National Fraud Survey: Percentage of Cases by Position
Figure 4: Median Loss by Position
2006 National Fraud Survey: Median Loss by Position
15
Based on the information provided, one might conclude that a large number of
asset misappropriations are being carried out by employees and managers. However, a
smaller amount of cases involve fraudulent misstatements which are typically carried out
by the owner executive and result in a much higher median loss.
Based on the background information on fraud, it is now time to ask some
questions.

How effective are aspects of the Sarbanes Oxley Act?

Are companies taking a more aggressive stand against fraud?

What kinds of technologies are available to companies to reduce the threat
of fraud?
16
GLOSSARY
Audit, External - Audits that are conducted by professional who evaluates the financial
statements of an organization. These professionals are independent of the organization
being audited.
Audit, Internal – Audits conducted by individuals employed by the organization to help
the organization achieve their state goals.
Data Mining - A profiling technique where artificial intelligence is used to analye large
volumes of data by considering the relationships between individual data items.
Internal Control – Are the set of procedures and policies adopted within an organization
to safeguard its assets, check the accuracy and reliability of its data, promote operation
efficiency and encourage adherence to prescribed managerial practices.
17
CHAPTER 2 – LITERATURE RESERACH
CORPORATE RESPONSIBLIY
Often without even knowing it, companies are actually encouraging fraud to happen
within their organization. But how can this be? Companies often do not have any policy
on what is expected of their employees in respect to responsibility and accountability.
Goals may not be established or monitored. There may not be written policies or
procedures for the establishment of internal controls such a segregation of duties. And
even if there is a company policy, it will be no good if it isn’t enforced consistently and
systematically.
Many times, if fraud does occur, management will often take the do nothing
attitude or not pursue any type of legal action. But why would a company do nothing?
According to the 2006 National Fraud Survey they may not want the negative publicity.
18
Figure 5: Reasons for Declining Legal Action
2006 National Fraud Surve: Reasons for Declining to Take Legal Action
But the tide may be turning, the schemes that fraudsters are now becoming more
elaborate and sophisticated. Additionally, the fraudsters are making sure they are
undetected so that the fraud scheme is active for a long as possible. Based on this fact as
well pressure from an organization’s board of directors, pressure from insurance
companies, new regulatory requirements for public companies and an increase in media
coverage, more organizations are now taking pro-active approach to the prevention and
detection of fraud. One way this can be achieved is the implementation of a Fraud
Control Policy
To assist in this change, Barack Ferrazzano Kirschbau and Negelberg LLP, a legal
firm located in Chicago has published a model Fraud Control Policy. The actual policy
19
may vary according to industry standards, type of organization, regulatory requirements
and geographic location. However, they should address some level the following: Fraud
Detection, Fraud Awareness, Fraud Reporting, Internal Controls, Procedures for
Reporting Potential Fraud, pre-employment and procedures for conducting internal and
external investigations. (Barack Ferrazzano Kirsch & Nagelberg LLP, 2008). The
outline of the policy can be found in Appendix with a link to the entire document.
As part of any Fraud Control policy, organizations also need to make assessment
on how fraud is actually detected. According to Figure 5, tips remain the most effective
measure of detecting fraud. Additionally, within the same report is states ,”
organizations could improve their detection efforts by establishing formal structures to
receive reports about fraudulent conduct”. By implementing a hotline, an organization
may be able to identify individual committing fraud and gather information to be used in
future investigations.
20
Figure 6: How Fraud is Detected
COMPANY HOTLINES
For a hotline to be effective, it must be accessible, ideally 24 hours a day and 7
days a week. According to an article written by David Slovin in Internal Auditor, “nearly
50% of all hotline calls are made at night or on weekends. It must also afford
confidentiality. Another benefit of using a third party hotline is that it will be staffed
with individuals who are trained interviewers. By using a standardized interviewing
process, the interviewer may cover the concern in a thorough and systematic manner.
(Sanzone, 2009)
21
CHAPTER 3 - METHODOLOGY
Research for the paper was based primarily from various online papers and
websites. Two separate studies provided much of the statistics found within the paper.
The first was The 2010 Report to the Nations on Occupational Fraud and Abuse
conducted by the Association of Certified Fraud examiners. The second study was the
2009 Corporate Governance and Compliance Hotline Benchmarking Report conducted
by BDO Consulting.
Additionally, interviews were conducted with two Ferris State University
professors: The first interview was conducted with Dr. Charles Wolgamott on September
21, 2010. Dr. Wolgamott teaches several Accounting classes at Ferris State University
including Forensic Accounting. He is also a Certified Fraud Examiner. During the
interview, there was a lengthy discussion fraud in general, much of what was also
identified in other resources. Key questions that were asked during the interview:



How do auditors proceed once fraud is suspected?
What happens after the primary investigation?
What types of documents are examined?
The second interview was with Robert Thompson on September 23, 2010. Mr.
Thompson teaches Governmental Accounting and Auditing classes at the University
22
Center in Traverse City, MI. In addition to his teaching duties, Mr. Thompson has been a
CPA at the accounting firm of Dennis, Gartland and Niergarth located in Traverse City,
MI since 1985. He has been a partner in the firm since 1994, specializing in audit and
accounting. Key questions that were asked during the interview include:




Has auditing reduced the occurrence of fraud?
What is the most effective detection of fraud?
What is the most effective prevention of fraud?
What are some “red flags” identified during an audit?
Additional resources also came from various classes such as: Fraud Examination,
Data Mining, Auditing and Accounting Information Systems.
23
CHAPTER 4 - FINDINGS
Deloitte
In 2007, the Deloitte Forensic Center, a think tank sponsored by Deloitte
Financial Advisor Services LLP, conducted a professional survey to evaluate how an
organizations practices compare to other organizations and successful are these practices.
The Deloitte Forensic Center received responses from 277 executives and how each rated
key areas of fraud control. The companies covered a broad range of sectors including
financial services, healthcare, retail, public sector, transportation and other services.
Sixty-four percent said their companies were subject to SOX, while 36% were
not.
Companies were categorized into more effective and less effective at fraud
control. The more effective companies gave their companies an average of 3.5 on a 5point scale in four areas: preventing internal fraud, detective internal fraud, preventing
external fraud, and detecting external fraud.
When asked of if the company has a formal Fraud Control Policy, 50% indicated
they did, with another 32% planning on implementing such a policy.
Another question that was asked was about the existence of a whistle-blower
hotline. 81% of respondents indicated there was a hotline in place, with another 9%
24
indicating there were plans to install one. Since tips are the primary way that fraud is
detected, whistle blower hotlines are an important way to address management override
of internal controls, improving their effectiveness creates an opportunity for fraud
control.
Companies that are more effective were more likely to have a better training
program for its employees than less effective companies. 54% of effective companies
felt their employees had a clear understanding of their responsibilities as compared to
only 20% of less effective companies.
Finally, based on the survey, it appears that the 35% of the more effective
companies utilized technology substantially in ongoing fraud monitoring while only 12%
of the less effective companies utilized technology. However, all companies indicated
the increased use of technology was extremely or very likely. (Deloitte Forensic Center,
2007)
2009 Corporate Governance and Compliance Hotline Benchmarking Report
In 2009 BDO Consulting, a division of BDO Seidman, LLP issued the 2009
Corporate Governance and Compliance Hotline Benchmarking Report. This report
covered a 5 year span starting in 2004 and ending in 2008. Over 1,300 organizations
were included covering a variety of industries such as retail trade, service industries;
transportation, communication as well as other industries.
The number of fraud related incidents has increased over time.
25
Table 2: Percentage of Fraud Reports
Quarter
Percent of Reports
Q1 2006
10.0
Q1 2007
14.3
Q1 2008
16.5
Q1 2009
21.0
By implementing an anonymous hotline, the organization can gather critical,
organizational feedback. Although it is required by publicly traded companies as
specified in SOX, other companies are now starting to realize positive benefits from
implementing a hotline.
When an organization benchmarks data obtained from a hotline, the company can
determine of organizational changes are needed. By continually monitoring the data, the
organization can assess new programs. This can easily be done by the use of data mining
software. Additionally, an organization can begin to assess the data and look for
relationships between data that has been collected. Another type of software that can be
used i2 which can graphically display large amounts of data and their relationships.
But the hotline is only useful, if employees are aware of it. Companies can
instruct employees on its use by a company handbook, brochure, or manager. However,
the most effective use of communication to the employees was through posters.
Although according to the study the trend of the poster is declining over the 5 year
26
period, the use of a company intranet is increasing even though it remains much lower
than the poster.
Table 3: How Hotlines are Communicated to Employees
Means
2004
2005
2006
2007
2008
Brochure
4%
3%
3%
2%
3%
Employee
14%
14%
15%
16%
14%
HR
4%
4%
4%
4%
4%
Handbook
9%
9%
10%
9%
10%
Intranet
4%
5%
5%
7%
9%
Manager
5%
6%
5%
6%
5%
Other
13%
13%
13%
13%
15%
Poster
39%
38%
37%
35%
31%
Sign
1%
1%
2%
2%
2%
Unknown
1%
1%
1%
2%
2%
Video
0%
0%
0%
0%
0%
Wallet Card
6%
6%
5%
4%
5%
(BDO Consulting, 2009)
Dr. Wolgamott Interview
One question asked during the interview with Dr. Wolgamott, was “What happens
once an auditor suspects an employee of fraud? The answer would depend a lot on the
27
type of fraud suspected as well as the position of the fraudster. However, in general
terms, the auditor would start asking questions of a general nature and then zero in on
more specific areas based on the responses. Dr. Wolgamott indicated that effective
interviewing skills played a critical part in investigating fraud. Questions would be asked
of the suspected fraudster as well as co-workers, supervisors, ex-spouses etc.
Another investigative technique was the examination of public records and
documents of the suspected fraudster. With more information made available due to
public records on the internet, it is easier to search for clues. By looking at real estate
transactions, an investigator might be able to see if a fraudster is living beyond what is
pay scale would allow.
After the fraudster is confronted by the auditor, it may be necessary for law
enforcement to get involved. A subpoena would be necessary for searches of any
computer device or other relative records
Robert Charles Thompson Interview
During the course of the interview with Mr. Thompson, I asked how effective was
auditing in the preventing and detecting fraud. The answer somewhat surprised me.
Based on the class in Auditing that I had previously taken with him, I understood how
detailed and complex it was, however, it actually based on his response, I learned that it
did not have the effect that I expected. This is due to the fact that once fraud in
uncovered during an audit, the damage has already been done.
28
A more effective way to address fraud was in the segregation of duties. By
segrating duties, this makes it more difficult for a fraud from occurring. An example of
segregation of duties would be that the individual who processes checks is not in charge
of bank reconciliation.
Another question that was discussed was whether companies were willing to
prosecute once a fraud was uncovered. Based on early research that I had conducted, I
believed that companies were reluctant to proceed with legal proceedings. While that
may have been true in the past, it appears that in recent years, more companies are willing
to prosecute. This may be driven by the insurance companies as a way to make
restitution.
Finally, there was a discussion on what might be some “red flags” for an auditor
to suspect fraud. One red flag might occur when examining two different shifts or two
different locations. If there are significant differences in how the two shifts or locations
operate, then more investigation might be warranted.
Mr. Thompson also stressed the importance of internal controls to prevent fraud.
While it may be more difficult for smaller businesses to have adequate internal controls
such as segregation of duties, the appearance of having internal controls, can be just as
effective. For example, a supervisor may not always review every invoice that has to be
paid, but if employees have to submit invoices for signature, then this may in fact prevent
faulty invoices being submitted for payment.
29
CHAPTER 5 - CONCLUSION
In conclusion, fraud has always and still is a serious threat in today’s business
world. However, in 2002, with the enactment of the Sarbanes-Oxley Act (SOX), the tide
began to turn. Even with that said, SOX is not the panacea for the detection or
prevention of fraud. It did place more responsibility on the corporate governance. No
longer can CEO use denial as a reason for fraud occurring in the workplace.
Auditing, which was also a key component of SOX has limited value in the
prevention of fraud. The main reason, is that by the time fraud has been detected during
the course of audit, the fraud usually has been going on for a while, and the damage is
already done.
Companies are now starting to realize that they must take a more hands on
approach in the detection and prevention of fraud. With the advances in technology,
companies now have more options than were available even 10 years ago. By using a
better method of screening potential employees, they may in fact avert fraud from ever
occurring. By using the hotline and data mining techniques, they may start to assimilate
a better picture of what is occurring in a larger situation. For example, trends and
patterns that normally aren’t identifiable, may now have significance in detecting fraud.
30
The future for different methods of the prevention and detection of fraud is
limited only to the existence of the technology. Employers may use video surveillance,
monitor an employee’s computer with key logging devices, search emails via packet
sniffers, or use smart card ID’s which are embedded with a computer chip that monitors
the movement of the employee while on the company property.
It is unlikely that fraud, will ever be eliminated entirely, but it is clear that it can
be reduced and brought into a controllable manner with the use of technology.
31
APPENDIX
FRAUD PREVENTION CHECKLIST
The most cost-effective way to limit fraud loses is to prevent fraud from occurring. This
checklist is designed to help organizations test the effectiveness of their fraud prevention
measures.
1
Is ongoing anti-fraud training provided to all employees of the organization
 Do employees understand what constitute fraud?
 Have the costs of fraud to the company and everyone in is – including
lost profits, adverse publicity, job loss and decreased morale and
productivity – been made clear to the employees?
 Do employees know where to seek advice when faced with uncertain
ethical decisions, and do they believe they can speak freely?
 Has a policy of zero-tolerance for fraud been communicated to
employees through words and actions?
2
Is an effective fraud reporting mechanism in place?
 Have employees been taught how to communicate concerns about
known or potential wrongdoing?
 Is there an anonymous reporting channel available to employees, such
as a third-party hotline?
 Do employees trust that they can report suspicious activity
anonymously and/or confidentially and without fear of reprisal?
 Has is been made clear to employees that reports of suspicious activity
will be promptly and thoroughly evaluated?
3
To increase employees’ perception of detection, are the following proactive
measures taken and publicized to employees?
 Is possible fraudulent conduct aggressively sought out, rather than
dealt with passively?
 Does the organization send the message that it actively seeks our
fraudulent conduct through fraud assessment questioning by auditors?
 Are surprise audits performed in addition to regularly scheduled fraud
audits?
32
 Is continuous auditing software used to detect fraud, and if so, has the
use of such software been made known through the organization?
4
Is the management climate/tone at the top one of honesty and integrity?
 Are employees surveyed to determine the extent to which they believe
management acts with honesty and integrity?
 Are performance goals realistic?
 Have fraud prevention goals been incorporated into the performance
measures against which managers are evaluated and which are used to
determine performance-related compensation?
 Has the organization established, implemented and tested a process for
oversight of fraud risks by the board of directors or others charged
with governance (e.g., the audit committee)?
5
Are fraud risk assessments performed to proactively identify and mitigate the
company’s vulnerability?
6
Are strong anti-fraud controls in place and operating effectively, including the
following?





Proper segregation of duties
Use of authorizations
Physical safeguards
Job rotations
Mandatory vacations
7
Does the internal audit department, if one exists, have adequate resources and
authority to operate effectively and without undue influence from senior
management?
8
Does the hiring policy include the following (where permitted by law)?






9
Past employment verification
Criminal and civil background checks
Credit checks
Drug screening
Education verification
Reference check
Are employee support programs in place to assist employees struggling with
addictions, mental/emotional health, family or financial problems?
33
10 Is an open-door policy in place that allows employees to speak freely about
pressures, providing management the opportunity to alleviate such pressures
before they become acute?
11 Are anonymous surveys conducted to assess employee morale? (Association of
Certified Fraud Examiners, 2010)
34
Model Fraud Control Policy Outline
I. Summary of Policy
A. Overview
B. Definition of Fraud
C. Company’s Zero Tolerance of Fraud
II. Summary of Fraud Control Strategies
A. Appointment of a Fraud Control Officer
B. Fraud Detection
C. Fraud Risk Management
D. Fraud Awareness
E. Fraud Reporting
F. Internal Control Review Following Discovery of Fraud
III. Fraud Risk Management
A. Regular Fraud Risk Assessment
B. Fraud Risk Assessment
C. Implementation of Proposed Actions
IV. Pre-employment Screening
V. Conflict of Interest
VI. Procedures for Reporting Potential Fraud
A. Internal Reporting
B. Protection of Employees Reporting Suspected Fraud
C. Evaluation of Reports Received
D. Recovery of Losses by Fraud
VII.
Procedures for Fraud Investigation and Prosecution
A. Internal Investigation
B. External Investigative Resources
C. Disciplinary Proceedings (Barack Ferrazzano Kirsch & Nagelberg LLP,
2008)
The document may be viewed at in its entirety at:
http://www.boardmember.com/uploadedFiles/Home/Conferences/Conferences/Ten_Thin
gs_About_Fraud_Control/ModelFraudControlPolicy.pdf?n=4700
35
REFERENCES
Association of Certified Fraud Examiners. (2010). Report to the Nations on Occupational
Fraud and Abuse.
Barack Ferrazzano Kirsch & Nagelberg LLP. (2008). Model Control Policy. Retrieved
September 27, 2010, from Boardmember web site:
http://www.boardmember.com/uploadedFiles/Home/Conferences/Conferences/Ten_Thin
gs_About_Fraud_Control/ModelFraudControlPolicy.pdf?n=4700
BDO Consulting. (2009). 2009 Corporate Governance and Compliance Hotline
Benchmarking Report. Retrieved October 30, 2010, from BDO Consulting:
http://www.bdo.com/download/1084
Deloitte Forensic Center. (2007). Ten Things About Fraud Control. Retrieved October
30, 2010, from Deloitte Forensic Center: www.deloitte.com/us/forensiccenter
Embezzlement. (n.d.). Retrieved September 24, 2010, from Laywershop:
http://www.lawyershop.com/practice-areas/criminal-law/white-collarcrimes/embezzlement/
Ethicsline Hotline . (n.d.). Retrieved September 26, 2010, from Ethicsline website:
http://ethicsline.com/about-ethicsline/
Hopwood, W. S., Leiner, J. J., & Young, G. R. (2008). Forensic Accounting. New York,
NY: McGraw-Hill Irwin.
Privacy Rights Clearinghouse. (2010, April). Retrieved September 26, 2010, from Fact
Sheet Sheet 16: Employment Background Checks: http://www.privacyrights.org/fs/fs16bck.htm
Product List and Pricing. (n.d.). Retrieved September 26, 2010, from Info Cubic: 2010
Sanzone, K. (2009, February).
Combating Fraud - Whistleblower Hotlines. Retrieved September 24, 2010, from
Anguillare, Ruocco, Traiester and Company Website:
http://www.artcpas.com/Press/Whistleblower%20Hotlines.htm
36
Turner, L., & Weickgenannt, A. (2009). Accounting Information Systems. Hoboken, NJ:
John Wiley and Sons.
Wells, J. T. (2007). Corporate Fraud Handbook. Hoboken, NJ: John Wiley and Sons.
37
38
CURRICULUM VITAE
Ann Doerr
4066 Garden Court
Traverse City, MI 49684
Cell:231(702)3372
abenningfield@chartermi.net
EDUCATIONAL BACKGROUND
Ferris State University – University Center, Traverse City, MI
BS in Information Security and Intelligence, December 2010
Minor in Accounting
Northwestern Michigan College – Traverse City, MI
Various classes
AWARDS and HONORS:
Dean’s List at Ferris State University
Award for Academic Excellence (2009-2010)
Member of Phi Theta Gamma at NMC
ACTIVITIES
Student member of Association of Certified Fraud Examiners
39
40
Download