Assignment 9c - Personal Pages Index

advertisement
ACCT341, Chapter 9, Reference 9c
Assignment 9c
1. Read the article below entitled “Lapping It Up” by Joseph Wells.
(A) Define lapping.
(B) Why do virtually all lapping schemes eventually reveal themselves?
(C) In the story, what were the:
(1) incentives/pressure to commit the fraud.
(2) opportunities to commit fraud (i.e. which controls were weak)
(D) How was Nelson punished?
2. Read the article below entitled “. . . And One For Me” by Joseph Wells.
(A) Define skimming. Give an example.
(B) What are the three principal skimming targets?
(C) In the story, what were the:
(1) incentives/pressure to commit the fraud.
(2) opportunities to commit fraud (i.e. which controls were weak)
(D) How was Roger punished?
3. Read the article below entitled “Billing Schemes, Part 1: Shell Companies That Don’t Deliver”
by Joseph Wells.
(A) What steps need to be taken to create a “shell” company?
(B) What are four billing ploys used by employees to cheat an employer?
(C) In the story, what were the:
(1) incentives/pressure to commit the fraud.
(2) opportunities to commit fraud (i.e. which controls were weak)
(D) What ended up happening to Stanley?
4. Read the article below entitled “Billing Schemes, Part 2: Pass-Throughs” by Joseph Wells.
(A) In the story, what were the:
(1) incentives/pressure to commit the fraud.
(2) opportunities to commit fraud (i.e. which controls were weak)
(B) What ended up happening to Lincoln?
5. Read the article below entitled “Billing Schemes, Part 3: Pay-and-Return Invoice” by Joseph
Wells.
(A) In the story, what were the:
(1) incentives/pressure to commit the fraud.
(2) opportunities to commit fraud (i.e. which controls were weak)
(B) What ended up happening to Veronica?
(C) How effective are hot lines? What are three kinds?
6. Read the article below entitled “Billing Schemes, Part 4: Personal Purchase” by Joseph Wells.
(A) In the story, what were the:
(1) incentives/pressure to commit the fraud.
(2) opportunities to commit fraud (i.e. which controls were weak)
(B) Approximately what percent of employees who commit fraud did so at previous jobs?
Journal of Accountancy
A skimming method doomed to failure over time.
Lapping It Up
BY JOSEPH T. WELLS
elson, a computer programmer for a financial institution in New Orleans, sat
across the desk from his boss. Nelson flinched when the boss told him the news that
he, an 11-year company veteran, was in trouble with the home office in Dallas
because of irresponsible behavior.
More than a year ago, Nelson had accepted a promotion requiring a transfer to New Orleans
from Dallas. The company extended him a $15,000 bridge loan, temporary funds to cover
moving and household expenses. Nelson never paid back the loan, however, even after
repeated requests to do so.
Unbeknownst to the company, Nelson had been in serious hock for years. He and his wife just
couldn’t seem to control their spending. With creditors hounding him, Nelson had taken the
$15,000 and paid some of his most pressing debts. Now, with the boss facing him, he didn’t
know what excuse to use this time for not paying back the company.
But the boss was beyond being mollified with any more excuses. “Nelson,” he said, “the
company has made it pretty clear: If you don’t get this debt taken care of, it’s going to cost
you your job. Do you understand?” Nelson understood.
Necessity being the mother of invention, Nelson concocted a plan made possible only by an
internal control deficiency at the company big enough to drive a truck through: unrestricted
access to “live” data (read: customer accounts). Even as the bank’s chief programmer, Nelson
never should have had access to such data, but he did. That could have been because he was
the principal architect of the entire computer system.
Skimming Schemes
Comparison of median losses
Source: Occupational Fraud and Abuse, by Joseph T. Wells, Obsidian Publishing
Co., 1997.
The first step of Nelson’s plan involved opening a savings account at the bank under someone
else’s name. In this case, he chose the ID of his own elderly, infirm uncle. Once the account
was active, Nelson set about reprogramming the bank’s computers to accommodate a highly
complex and seemingly foolproof lapping scheme.
Because Nelson needed $15,000 all at once, he easily located a customer checking account
with a large balance. But since he knew a funds transfer would create a record on the
customer’s statement, he removed the funds from the “ending balance” field on the statement
itself. He transferred the money to the uncle’s account, over which he had signature authority.
Nelson debited the uncle’s account and credited his own, using the proceeds to pay his bills.
The bank’s computers were programmed to print account statements throughout the month
(for example, customer A’s statement mailed on the first day of the month, customer B’s on
the second and the last one on the 30th). That being the case, Nelson figured he would have
use of the funds for 29 days—no more. So he programmed the computer to simply “roll” the
$15,000 through the ending balance field on other checking accounts according to a
predetermined schedule. Nelson’s plan, in effect, was to let the money bounce throughout the
computer program until he could legitimately repay his “loan.”
Alas, this method was too easy for Nelson, and therefore too tempting. He rationalized that the
bank wouldn’t find out or even miss the cash. So he continued to “loan” himself more money
to pay off other pressing obligations.
When the amount ballooned to $150,000 and involved thousands of customer checking
accounts, Nelson’s ingenious 29-day computer program failed to reverse some transactions in
time to avoid detection. In his haste, he forgot there were only 28 days in February. Customers
started pouring into the bank with statements in hand showing a major discrepancy: Their
ending balances last month were different from the beginning balances this month—a
mathematical impossibility.
Although Nelson initially blamed the problem on a programming error, he finally confessed to
his boss what happened. He had always planned to pay the money back, Nelson promised
solemnly, but he was at a loss to explain exactly how he could do that.
Ever the nice guy, Nelson helped the authorities gather the evidence to convict him of
embezzlement. It’s a good thing he did, too. Chasing down every single transaction would
have been extremely time-consuming. Nelson’s cooperation got him only 15 months as a
guest of the Louisiana penal system.
ROBBING PETER BUT FORGETTING TO PAY PAUL
If Nelson had been anything other than a rank amateur, he never would have picked lapping as
the scheme of choice for covering cash thefts. Although he managed to lap customer checking
accounts for about nine months—no small chore—Nelson’s plan was probably doomed from
the outset.
That’s because lapping almost always goes beyond robbing Peter to pay Paul. Once the first
attempt is successful, lapping tends to increase at exponential rates. Now, the fraudster has to
steal from other customers. Then, there are many accounts to keep track of. Therein lies the
fraudster’s pact with the devil: The more lapping occurs, the greater the chance of making a
mistake.
That’s exactly what happened to Nelson. In his case, even his “move-the-money-around”
program couldn’t keep track of the thousands of transactions. So when an accounting student
once asked me the best way to detect lapping schemes, I couldn’t help myself: “Time,” I
replied, only partially in jest. “In time, lapping schemes will invariably reveal themselves.”
A LIST OF SINS
Because of Nelson’s sins, a lot of people in his company suffered. The boss lost a valuable
computer programmer and long-term employee. Since the prosecution of Nelson drew
headlines, the bank lost credibility with some of its customers, likely costing it many multiples
of the $150,000 he stole. Nelson’s coworkers at the bank suffered a loss of morale.
Management was embarrassed. Nelson’s family had to ask for public assistance while he was
imprisoned.
But Nelson wasn’t the only one at fault in this case. Take, for example, the bank’s upper
management. It is ultimately responsible for the flawed system of internal control that
permitted Nelson to commit his crime in the first place. Not only were there computer system
problems, but the bank never should have allowed Nelson to open an account using the
identification of a relative 40 years his senior.
And management did not recognize the signs of a financially strapped employee. Had
someone done so, the company might have sought an alternative to forcing Nelson into a tight
corner; desperate people do desperate things. Many large companies, for example, provide
financial counseling to troubled debtors.
The bank’s external auditors should have detected the fact that Nelson could both program and
modify customer accounts—a serious deficiency. The internal auditors should have spotted
the glaring control weakness long before that.
TURNING WATER INTO WINE
To the bank’s credit, it decided to do something positive after Nelson’s fall from grace. First,
it closed the internal-control hole. Second, the company appointed an ombudsman to counsel
employees in times of stress—financial and otherwise. Most important, it implemented
companywide antifraud training to sensitize its managers and employees to not only how
workers commit fraud, but why they do it in the first place.
When putting together its employee video-training program, the bank went looking for an
expert to talk about the fraud problem. It found one: From behind prison walls, Nelson—now
full of remorse—volunteered. He looked directly at the camera and, through the tears, told his
own story.
The Lap Trap
Lapping is the fraudster’s version of “robbing Peter to pay Paul”
skimming. It is the extraction of money from one account to
cover shortages in another account. For example, a fraudster
steals the payment intended for customer A’s account. When a
payment is received from customer B, the thief credits it to A’s
account. And when customer C pays, that money is credited to B.
Repeated many times, lapping is difficult for the dishonest
employee to keep track of. As a result, almost all lapping
schemes quickly reveal themselves.
All material cash misappropriations send telltale signs: reduced
cash combined with increased expenses and/or decreased revenue
(see “Enemies Within,” JofA, Dec.01, page 31). Most lapping
occurs because of inadequate control over incoming payments.
Following are some classic “red flags” of lapping:
Excessive billing errors.
Slowing accounts receivable turnover.
Excessive writeoffs of accounts receivable.
Delays in posting customer payments.
Accounts receivable detail doesn’t agree with general
ledger.
A trend of decreasing payments on accounts receivable.
Customer complaints.
2002 Joseph T. Wells
JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified
Fraud Examiners, Austin, Texas. Mr. Wells’ article “So That’s Why They Call It a Pyramid
Scheme” (JofA Oct.00, page 91) won the Lawler Award for best article in the JofA in 2000.
His e-mail address is joe@cfenet.com.
Journal of Accountancy
Skimming is by far the most popular method for
stealing an organization’s cash.
… And One for Me
BY JOSEPH T. WELLS
oger had worked hard to earn his CPA. He had big dreams—he had planned to use his
newfound financial expertise after college to build a fortune. But 10 years later, here he
was, stuck as the controller for a midsize soft drink bottler and distributor in the South,
going nowhere fast. It wasn’t fair, Roger reasoned. Besides, he thought his boss was
ignorant and didn’t have a fraction of Roger’s accounting knowledge.
A beverage company generates a lot of currency, and Roger’s primary responsibility was to keep track
of it. The cash came from three principal sources: customer payments on accounts receivable, direct
sales to customers (supermarkets) and vending machine collections. Payments on account usually came
through the mail, while customer sales and vending machine currency was collected by route salesmen.
No matter where the cash came from, it all arrived on Roger’s desk daily. He was the last person to see
the money before it was deposited in the bank.
At the end of one particularly distressing day, Roger noticed a deposit slip with a math error: There was
exactly $1,000 more in cash than reflected on the deposit. At first irritated at the notion of having to
correct the mistake, Roger stopped and smiled. And then he put 50 twenty-dollar bills in the top of his
desk drawer, locked it, went home and didn’t look back. Two years and $475,000 later, Roger still
didn’t feel good about his job, he hated working in this company, and he despised the boss more than
ever.
For Roger, being able to skim money had been no real challenge. He thought the boss should have
noticed the glaring internal control deficiency in the operation and that his controller had unrestricted
access to cash since he had unrestricted access to the books. On top of that, the company wasn’t
audited. But so it is with many small to midsize businesses.
Roger’s skimming scheme was the essence of simplicity. The daily bank deposits that arrived on his
desk had already been prepared by a bookkeeper. Attached to the deposit slip was documentation in
two forms: The bookkeeper prepared a list of payments on accounts receivable and each route salesman
prepared a deposit for the cash he had collected. Roger left the accounts receivable alone. But for the
route deposits (cash sales) he kept a handy supply of blank forms in his desk. After everyone went
home, Roger simply removed cash from one of the route deposits and prepared a new form showing the
lower deposit amount. Then he’d throw away the deposit slip prepared by the bookkeeper and fill out
another in his own handwriting. In an effort to avoid detection, Roger rotated the route salesman he
shorted and he took cash on an irregular basis. His scheme seemed to be working. But despite all of that
money, Roger still had a serious attitude problem.
Source: Reprinted from “Occupational Fraud and Abuse,” by Joseph
T. Wells. Obsidian Publishing Co., 1997.
The boss noticed how screwy Roger had been acting for months. Things weren’t getting done.
Financial statements were late. Tax returns were overdue. Roger had not conducted a serious inventory
in a year. He was missing more and more work. When the boss would point out all these problems,
Roger would just glare at his desk. But in one final fit of anger, the boss fired Roger—effective on
Friday. The following Monday, the boss called his CPAs for some temporary help until Roger could be
replaced. By that afternoon, one of the CPAs spotted a journal entry of just over $380,000 made by
Roger the previous Friday: He debited cost of sales and credited the same amount to inventory. Roger
described the reason for the journal as, “To adjust inventory to actual value.” That one journal entry
wiped out half the bottling company’s profits.
Prevention and Detection
Skimming, the single most common form of cash misappropriation,
occurs when employees of organizations steal incoming funds. The
term comes from the fact that money is taken off the top, the same
way cream is skimmed from milk. By understanding the basics,
auditors can more easily recognize skimming schemes.
There are three principal skimming targets: revenue, refunds and
accounts receivable Revenue or sales skimming is by far the most
popular method, accounting for two-thirds of the incidents and
preferred by the crooked employee because the other two schemes
require alteration of the books and records to avoid immediate
detection. Since any employee who comes in contact with cash can,
in theory, skim money, the usual suspects are salespeople, cashiers,
mail clerks, bookkeepers and accountants. But be aware that top
executives, who can easily override controls, also skim. When they
do, the losses are invariably large.
Regardless of who skims money or the method used, the
accounting effect is the same: Revenue will be lower than it should
be but the cost of producing that revenue will remain constant.
Therefore, be alert to the following indicators. The greater the
number of indicators, the greater the risk that skimming is
occurring:
Flat or declining revenue.
Increasing cost of sales.
Excessive or increasing inventory shrinkage.
Ratio of cash sales to credit card sales decreasing.
Ratio of cash sales to total sales decreasing.
Ratio of gross sales to net sales increasing.
Discrepancies between customer receipt and company receipt.
Customer complaints and inquiries.
Forged, missing or altered refund documents.
It was a pretty simple matter for the CPAs to unravel the scheme. First, they conducted a complete
physical inventory of the operation. Next, they examined—by hand—every deposit slip for a three-year
period. They located over a hundred bank deposit slips seemingly prepared in Roger’s own
handwriting. Then, the CPAs traced the bank deposits to their corresponding route deposits. In each
case, at least one route deposit was prepared in Roger’s writing. Finally, they pulled the deliverymen’s
copies of their original route deposits. In each and every case, the copy of the original route deposit was
higher than the forged copy by exact multiples of $1,000. The CPAs’ report helped prosecutors convict
Roger of embezzlement. Roger had used the proceeds of his thefts in the classic manner: a new car, a
better lifestyle and frequent trips to Las Vegas. Roger’s trial defense was twofold: First, he’d won quite
a bit of money gambling, and second, anyone could have taken the money. He was unable to explain
the stupid journal entry he made on his last day of work. Perhaps he had a compelling need to be
precise. Because he was a first-time offender, Roger didn’t do any jail time, but he now owes Uncle
Sam about $1.4 million. The boss learned a very important lesson about the value of independent
oversight. Although the size of the business did not justify a full audit, the CPAs convinced the boss to
do three simple things: First, separate the accounting functions from cash handling; that becomes
especially important if the CFO is in a position to seriously abuse the trust placed in him or her.
Second, hire an independent contractor on an annual basis to take a complete inventory. Finally, have a
CPA review the company’s bank statements on a regular basis.
JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified Fraud
Examiners, Austin, Texas. Mr. Wells’ article “So That’s Why They Call It a Pyramid Scheme” (JofA
Oct.00, page 91) has won the Lawler Award for best article in the JofA in 2000. His e-mail address is
joe@cfenet.com.
Journal of Accountancy
These scams are among the most costly asset
misappropriations.
Billing Schemes, Part 1:
Shell Companies
That Don’t Deliver
BY JOSEPH T. WELLS
This is the first article in a four-part series on identifying false
invoices and their issuers. This and next month’s columns focus
on billing schemes that involve shell companies. Articles in the
September and October issues explain how to detect and prevent
two scams that use other, completely different phony-bill
strategies.
s he left the county clerk’s office, Stanley, a creative writer at a large
advertising firm, gazed at the paper he’d just obtained and smiled to himself. For
$35, it was easily the best investment he had ever made. Stanley pocketed the
document and drove straight to his bank. Less than 30 minutes after presenting the
paper to an official, he opened a business account in the name of SRJ Enterprises—a
title that reflected his initials. The simple document—known as a fictitious-name or
DBA (doing business as) certificate—was the key to his grand plan to defraud his
employer.
Such documents, available for a modest cost at any county courthouse, allow a person to do
business under a different name. Many small business owners choose to obtain an assumedname certificate instead of incorporating, which can cost thousands of dollars. For example, if
Bob Black wanted to open Bob’s Body Shop, all he would have to do is go to the courthouse,
fill out a simple form and pay a small fee for a document he could use to open a bank account.
Voila! He’d be in business.
In this study of an actual case, CPAs will learn the first of two ways employees use shell
companies to defraud organizations. Moreover, auditors will learn how to set up effective
internal controls to prevent these costly occupational crimes.
EASY AS 1-2-3
Maybe starting a business was
what Stanley had in mind when
he established SJR Enterprises,
maybe not. But, fiddling with his
wedding ring when he opened
the bank account with a $100
cash deposit, Stanley said his
“business” was located at what
was actually the home address of
his girlfriend, Phoebe, a
disgruntled colleague from his
employer’s accounting
department.
Ways to Cheat an
Employer
In billing schemes a company
pays invoices an employee
fraudulently submits to obtain
payments he or she is not
entitled to receive. There are
four major types of such ploys,
which are by far the most
expensive asset
misappropriations.
Shell company schemes use a
fake entity established by a
dishonest employee to bill a
On one occasion Stanley had told
company for goods or services
Phoebe of his latest brainstorm:
it does not receive. The
If he submitted phony invoices to
employee converts the payment
the company they worked for,
to his or her own benefit.
she could get them approved and
paid. It didn’t take them long to
Pass-through schemes use a
conclude there was little risk of
shell company established by
getting caught, especially if they
an employee to purchase goods
discreetly saved their illicit gains
or services for the employer,
in a local bank and later used
which are then marked up and
them to start new lives
sold to the employer through
elsewhere.
the shell. The employee
converts the mark-up to his or
SMOOTH SAILING
her own benefit.
Implementing the scheme was
simple. On his home computer
Pay-and-return schemes
Stanley printed an invoice under
involve an employee purposely
the name of SJR Enterprises.
causing an overpayment to a
Following Phoebe’s instructions,
legitimate vendor. When the
he billed their employer $4,900
vendor returns the overpayment
for “services performed under
to the company, the employee
contract 15-822,” a description
embezzles the refund.
similar to that found on many
other invoices. Phoebe had
Personal-purchase schemes
chosen that amount because the
consist of an employee’s
company rarely scrutinized
ordering personal merchandise
invoices for amounts less than
and charging it to the company.
$5,000. She then created a “new
In some instances, the crook
vendor” file and phony
keeps the merchandise; other
documents to go with it. Once
times, he or she returns it for a
SJR Enterprises was recorded in
cash refund.
the computer as a vendor, Phoebe
simply put the SJR invoice into a
stack of much larger invoices for
approval and payment. Right
from the start, their plan worked
flawlessly.
In fact, the scheme worked so well Phoebe and Stanley tried it again—and again and again.
Ultimately, they bilked the company out of almost $700,000 in cash over two years. To Stanley
and Phoebe, it was a lot of money. But as far as the company’s total revenues were concerned,
it was insignificant. As long as they didn’t get too greedy, Stanley and Phoebe could have gone
on billing their $100 million advertising agency indefinitely. But soon two people would foil
Stanley and Phoebe’s plans—Vivian, Stanley’s wife, and Dennis, the advertising agency’s
internal auditor.
Fake Billing: It’s Not Small Change
Source: Occupational Fraud and Abuse, by Joseph T. Wells, Obsidian Publishing
Co., Inc., 1997.
SUSPICIONS GROW
Vivian had known for some time Stanley was being unfaithful. He displayed the classic signs:
a lack of interest in her, late “meetings” at the office, vague business trips on the weekend. But
Vivian knew there was more. For the last two years, Stanley had ceded control of their joint
checking account to her and no longer asked for spending money.
Vivian considered the possibility that Stanley was stealing from his company. Where else
would he get money? If Stanley was embezzling funds to support a girlfriend, that would be
the last straw, Vivian thought. In a fit of anger, she called Dennis, whom she had met several
times at company social functions.
Dennis, who was also a CPA, listened carefully to Vivian’s sketchy evidence and said he
would look into it. After her call, Dennis gave the matter some thought and reasoned that if
Stanley was stealing company money, he most likely was engaged in some sort of fraudulent
disbursement scheme. Since Stanley didn’t work with the company’s money himself, Dennis
figured he would need an accomplice who did. And that person would have left a paper trail of
phony records. The challenge would be to find the bogus paperwork among all the company’s
legitimate transactions.
CRACKING THE SHELL
Acting on the fraudulent
disbursement theory, Dennis
took three separate steps to
uncover the billing scheme.
First, he examined the
company’s line-item costs over a
five-year period, looking for
anomalies. This revealed a small
uptick in consulting expenses,
which led him to the second
step: a detailed examination of
vendors.
The billings from SJR
Enterprises stood out like a sore
thumb. Phoebe had put SJR on
the books as a vendor nearly 24
months earlier. Since that time,
its billings had increased in both
frequency and amount. Dennis
correctly reasoned that
consultants generally don’t bill
more than once a month, nor do
they normally quadruple their
billings in one year’s time. He
also noted that some SJR
invoices weren’t folded and
wondered whether that meant
they hadn’t even been mailed.
Furthermore, SJR Enterprises
wasn’t in the phone book.
The third and final step in
Dennis’s plan was to compare
vendor addresses with
employees’ home addresses.
Bingo! Dennis knew he had
found Stanley’s accomplice.
Before consulting legal counsel,
Dennis went to the courthouse
and obtained a copy of Stanley’s
assumed-name certificate—a
document of public record. One
look at it removed any doubt
that Stanley and SJR Enterprises
were one and the same.
Red Flags
Signs of billing schemes
include
Invoices for
unspecified consulting
or other poorly defined services.
Unfamiliar vendors.
Vendors that have only a postoffice-box address.
Vendors with company names
consisting only of initials. Many
such companies are legitimate,
but crooks commonly use this
naming convention.
Rapidly increasing purchases
from one vendor.
Vendor billings more than
once a month.
Vendor addresses that match
employee addresses.
Large billings broken into
multiple smaller invoices, each
of which is for an amount that
will not attract attention.
Internal control deficiencies
such as allowing a person who
processes payments to approve
new vendors.
Upon reviewing the evidence, the company’s lawyer didn’t need much convincing. He gave
Dennis the go-ahead to confront Phoebe and Stanley. They both confessed and returned their
nest egg—practically all of the $700,000 they’d stolen. Due to the magnitude of their crime,
the pair faced jail time, but—because they were first-time offenders—the judge sentenced them
to probation.
The story doesn’t end there, though: Both Phoebe and Vivian dumped Stanley. And today,
menially employed, he lives in a cramped garage apartment. Alone, he wonders where he went
wrong, both morally and strategically.
But Dennis, the internal auditor, knows where he erred and realizes he should’ve seen the
connection between the internal control deficiency that allowed Phoebe to add new vendors
and the small increase in consulting expenses. “Soft” billings—for consulting, advertising and
similar services—are ripe targets for this kind of fraud because they typically describe
functions that are difficult to quantify, which makes it harder to assess their validity.
Simple procedures might have prevented this scheme. A credit check on SJR Enterprises would
have revealed this shell company had no history. And looking in the phone book would have
shown there was no listing for the bogus enterprise. Plus, comparing vendor addresses with
home addresses of employees before approving new vendors would have drawn attention to
SJR immediately.
In retrospect, Dennis considers himself lucky. Unlike most fraud cases, the company got most
of its money back. Dennis also learned how to prevent future billing schemes. But he feels
especially fortunate to still have his job.
JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified Fraud
Examiners in Austin, Texas, and professor of fraud examination at the University of Texas. Mr.
Wells’ article, “So That’s Why They Call It a Pyramid Scheme” (JofA, Oct.00, page 91), won
the Lawler Award for the best article in the JofA in 2000. His e-mail address is
joe@cfenet.com.
Journal of Accountancy
Auditors should scrutinize steep fluctuations in the
cost of goods sold.
Billing Schemes, Part 2:
Pass-Throughs
BY JOSEPH T. WELLS
This is the second article in a four-part series on identifying false
invoices and their issuers. July’s and August’s columns focus on billing
schemes involving shell companies criminals set up to facilitate fraud.
Articles in the September and October issues will explain how to detect
and prevent two scams that employ other, completely different phonybill strategies. This month’s case study shows auditors and CPAs how
to recognize the pass-through billing schemes crooked purchasing
agents and others sometimes use to illegally line their pockets.
en, a recent accounting graduate, was on his first real auditing assignment at
a West Virginia manufacturer of prepackaged cement. Because Ben was a rookie,
his supervisors naturally assigned him tasks they didn’t want to perform. That
explains why he was standing atop one of the company’s seven huge cement silos
on the morning of December 31, his teeth chattering in the cold wind as he
observed employees taking inventory. As workers sounded, or measured, each
silo’s contents, Ben watched dutifully and then double-checked every
measurement they made.
Later that day, he reported the
inventory tallies to Julia, his
audit supervisor, and vouched for
their accuracy. But on January 3,
Julia called Ben into her office to
talk about the cement
manufacturer’s expenditures for
raw materials; they were much
higher than in previous periods.
MAKING SENSE OF THE
NUMBERS
How to Sniff Out Phony
Vendors
CPAs can help prevent false
billing schemes by establishing
good controls over their
employer’s or their clients’
vendor-approval processes.
Ensure those involved in
purchasing cannot approve
“Are you sure these inventory
counts are correct?” Julia asked.
“The client’s total spending on
raw materials soared last year.
So, I expected a roughly
proportionate increase in
inventory. But the numbers you
reported are only slightly
different from the prior
period’s.”
vendors.
Before approving a new
vendor, evaluate its legitimacy
by
Obtaining its corporate
records and other relevant
documents.
Checking its credit rating.
Ben nodded affirmatively, but
hoped he had not made any kind Confirming that it is listed in
of egregious error. He was
telephone directories.
mindful of his lack of experience
and had been careful, gazing into Contacting its references from
each silo and confirming every clients and others.
sounding.
Julia frowned. “Well, if the
ending inventory is correct, then
we need to look at what the client
is paying to manufacture cement.
Maybe the unit cost of raw
materials has gone up sharply.
Let’s go talk to the client’s
purchasing department.”
Soon Ben and Julia were sitting
across a desk from Lincoln, the
manufacturer’s chief purchasing
agent. He confirmed the cost of
limestone—a key ingredient in
cement—had jumped nearly 50%
in the last year. As they were
about to leave, Lincoln
volunteered something that
caught Julia’s attention: “I don’t
know why the price increased so
much last year, but it’s probably
temporary.”
As soon as the two auditors were
out of earshot, Julia pulled Ben
aside. “Something’s fishy about
this,” she said. “If anyone in the
company should know why the
cost of limestone has jumped so
Being particularly cautious
about a vendor with a postoffice-box address or a name
composed entirely of initials.
Determining whether its
business address matches any
employee’s home address.
Once the company approves a
new vendor, the CPA should
closely monitor the account by
Watching for increases in the
amount or frequency of
billings.
Observing variances from
budgets or projections.
Comparing its prices with
those charged by other sources.
much, it’s Lincoln. And since he
didn’t know why the price went
up, how could he know it’ll go
down?”
SIFTING FOR CLUES
All weekend, Ben and the rest of the audit staff pored over the company’s limestone
purchase invoices. By Sunday night, they had a pretty good picture of what was happening.
For one thing, about a year ago, Lincoln had personally authorized the addition of a new
limestone supplier—Majors and Co.—to the company’s list of approved vendors.
The audit’s documentation also reflected that—within just a few months—Majors had
become the company’s sole source of limestone, at prices approximately 50% higher than
the company had been paying elsewhere.
Close-Up on False Billing
Source: Occupational Fraud and Abuse, by Joseph T. Wells, Obsidian
Publishing Co. Inc., 1997.
Julia came right to the point: “I think we might find Lincoln is connected to Majors and Co.,
which may be buying limestone from someone else, marking up the price and reselling it to
the cement company.”
On Monday morning, carrying a large stack of invoices from Majors and Co., Julia met with
the company president, who listened to what she had to say. After a few minutes, the
president said: “I wonder if Lincoln is trying to get back at us. About a year ago, the board
of directors passed him over for a promotion to vice-president.”
POURING THE FOUNDATION OF A CASE
Julia, a CPA and certified fraud examiner, explained to the president how she could expand
the current audit to detect any fraudulent business practices or transactions. The president
quickly authorized the additional work.
As proper evidence-gathering procedures require, the audit team collected every original
invoice from Majors and Co. along with the vendor file showing Lincoln’s approvals. The
team prepared a log describing each document and its source. They photocopied them and
stored the duplicates at their offices.
Next, Julia assigned Ben to take a close look at Lincoln’s personnel file. In it he discovered
a name that stood out like neon: Linda Majors—Lincoln’s wife. Other members of the team
turned up even more evidence: Majors and Co. was legally incorporated, and related
documents from the Secretary of State’s office bore the signatures of both Linda Majors and
Lincoln as corporate officers.
Finally, the team obtained price quotes from five nearby limestone suppliers. On average
Majors and Co. charged 60 percent more than its competitors. Julia was satisfied she had
enough documentary evidence to prove the existence of a pass-through billing scheme.
COMING CLEAN
Julia arranged a face-to-face meeting with Lincoln that began with an exchange of
pleasantries. As Ben watched, Julia posed carefully constructed, point-blank questions. (For
examples, see ‘“Why Ask?’ You Ask,” JofA, Sep.01, page 88.) She also showed Lincoln a
copy of Majors and Co.’s articles of incorporation, which bore his name and signature.
Lincoln’s face fell. For a few minutes he acted as if he didn’t understand, but gradually he
admitted everything, encouraged by Julia’s low-key technique. Not once did she show any
disapproval of Lincoln or what he had done. Instead, Julia was personable and professional
throughout the two-hour interview, allowing Lincoln to present his side of the story. In this
unthreatening setting, Lincoln told a classic tale of revenge, revealing all the details of his
pass-thorough billing scheme and why he set it up. Sure enough, the whole thing started
about 18 months ago when Lincoln realized the company wasn’t going to promote him to
vice-president. He saw this as a betrayal of his more than 10 years of service.
Like many purchasing agents, he was a constant target for temptation—vendors made it no
secret they’d be glad to pay him under the table for favorable consideration when the
company awarded business contracts—but he had never accepted.
LESSONS LEARNED AND IGNORED
Ben’s participation in this audit and investigation taught him never to judge the significance
of current findings without examining prior-period results and looking for suspicious
changes that could indicate fraud.
But the client company was interested only in getting its money back. In just over a year,
Lincoln’s “take” had been a cool $1.3 million, which he had saved to finance a new business
for himself. In exchange for his returning it all, the company agreed—against Julia’s
advice—not to prosecute Lincoln. Even worse, the company kept quiet about his
transgression, enabling him to move up to a better job—ironically, as chief purchasing agent
for a limestone vendor.
JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified
Fraud Examiners in Austin, Texas, and professor of fraud examination at the University of
Texas. Mr. Wells’ article, “So That’s Why They Call It a Pyramid Scheme” (JofA, Oct.00,
page 91), won the Lawler Award for the best article in the JofA in 2000. His e-mail address
is joe@cfenet.com.
Journal of Accountancy
Anonymous tips are an important source of
information on employee theft.
Billing Schemes, Part 3:
Pay-and-Return Invoicing
BY JOSEPH T. WELLS
This is the third article in a four-part series on identifying false
invoices and their issuers. It explains the pay-and-return billing
scheme, in which an employee creates an overpayment to a
vendor and pockets the subsequent refund. The other stories
focus on shell companies (See JofA, Jul.02, page 76 or
www.icpa.org/pubs/jofa/jul2002/wells.htm), pass-through billing
schemes (See JofA, Aug.02, page 72 or
www.aicpa.org/pubs/jofa/aug2002/wells.htm) and personal
purchase schemes, which will be the subject of “The Fraud Beat”
in October.
philosopher once said the road to hell is paved with good intentions. As all
fraud examiners know, given the right circumstances—for example, a personal
financial crisis coupled with weak internal controls on the job—many otherwise
law-abiding employees will rationalize their way into stealing from the companies
they work for.
The following case study illustrates such a situation and shows how CPAs can protect their
clients and employers from pay-and-return billing scams. This particular ruse shouldn’t have
lasted as long as it did; a simple, inexpensive service could’ve stopped it much earlier.
NO WAY OUT
As Veronica, an accounting clerk at a dental supply wholesaler, hung up the phone, her
cheeks reddened with anger and embarrassment. She knew her coworkers at the dozen or so
desks nearby had heard everything—as usual. This call had been from yet another of her
husband’s many frustrated creditors, who demanded money she didn’t have. The outstanding
debts arose from a business that was operated strictly by her spouse, not her. But as
Veronica knew so well, in the community property state where she and Les lived, his debts
were her debts, too.
When Veronica married Les eight years ago, he had been a fast-talking hustler. But success
had eluded him; one after another his business ventures failed. Then, three years ago, to get a
fresh start, the couple filed for personal bankruptcy. Yet, somehow, they again had gotten
over their heads in debt. This time, though, because you can declare bankruptcy only once
every seven years, they became desperate.
AN APPARENT IMPROVEMENT
In the office, Veronica’s colleague, Jenny, had tried not to eavesdrop. But the low partition
between their cubicles ensured she would hear most, if not all, of the calls Veronica received
from creditors. Since Jenny knew her friend was in trouble, she wasn’t surprised when
Veronica time and again shared her tale of financial woe. But as the months passed,
Veronica simply stopped talking about her debts.
A DIFFICULT CHOICE
More than a year later, Jenny accidentally discovered why Veronica was silent on the
subject. At the end of one workday, when no one else was around, Jenny clearly saw
Veronica slip a vendor check into her purse. Now it began to make sense: Veronica was
stealing from the company. Jenny was incensed and couldn’t think of anything else for
several days. Still, the thought of turning in Veronica made her ill. But after being with the
company nearly 10 years, Jenny had a personal stake in it. However, she reasoned, if
Veronica kept stealing, it
would only worsen her
problems, so Jenny decided to
report her friend
anonymously. First she
thought of phoning her boss
but realized he’d recognize her
voice. Then it hit her: She
would call the company’s
CPA firm; they surely would
want to know about this, and
they wouldn’t know who she
was.
Calling from a pay phone,
Jenny was questioned by a
manager at the firm.
“How do you know she’s stealing?” he demanded.
“Because I saw her,” Jenny replied defensively.
“And who are you?” the manager wanted to know.
The conversation ended when Jenny refused to identify herself.
The manager said: “You tell me you witnessed a theft, but you won’t say who you are. You
could be anybody. I can’t take this further unless I have more evidence.”
Jenny refused to say anything more and hung up.
Jenny never confronted Veronica with what she knew, but she wanted no more to do with
her. Although Jenny saw Veronica steal another check about six months later, she clenched
her teeth and kept her mouth shut. That is until several weeks later when Claude, a CPA
recently hired as the company’s internal auditor, invited her into his office.
ON THE TRAIL TO DISCOVERY
With records in his cubbyhole office already piled high around him, Claude explained to
Jenny that—as part of his new responsibilities—he was meeting with a number of
employees to get their opinions on the company’s accounting operation.
During his discussion with Jenny, Claude wanted to focus on fraud by company employees.
So he introduced the subject by asking her if she had known one of the company’s
purchasing agents took several hundred thousand dollars in kickbacks to award favorable
manufacturing contracts. Jenny said everyone in the company had heard the rumor. To avoid
publicity, the company had decided not to prosecute. It also hired Claude to help prevent
such future incidents.
Finally, he got to the point. “Has anyone in the company ever asked you to do something
that you thought was illegal or unethical?” Jenny didn’t have to think long about that. “No,”
she said quickly.
Then Claude asked, “Do you suspect anyone in the company is committing fraud?” Jenny
sat silently for a moment. “Should I tell him what I know?” she wondered.
Looking at Jenny’s face, Claude didn’t need to hear an answer. He knew something was
wrong and started digging further. Although Jenny said nothing more, Claude immediately
reviewed Jenny’s job functions and those of the accounting clerks who worked with her. He
found nothing unusual until he came to Veronica’s job description, which was disturbing:
Her primary responsibility was processing invoices for payment, but she also handled the
occasional overpayment received in the mail. This was clearly a breach of security that
needed prompt attention.
Claude’s subsequent investigation revealed that Veronica was processing certain invoices
twice. When confronted, she seemed relieved and confessed everything, admitting her
favorite target was her employer’s largest supplier, a dental appliance manufacturer that
printed its simple invoices in black ink on plain paper. When strapped for money, Veronica
said, she’d make a copy of the manufacturer’s invoice before stamping the original. The two
were almost indistinguishable. Then she’d process the first invoice, send it on for approval,
and process the invoice again a few days later using the copy she’d made. To further
disguise her scheme, Veronica always put the copied invoice in a stack of others waiting to
be processed for payment.
The company would pay the bill twice. When the supplier realized the overpayment, it sent a
refund check that landed on Veronica’s desk. She in turn slipped the extra check into her
purse and later turned it over to Les, who forged her company’s endorsement with a
specially made rubber stamp and deposited the check in his business account.
In less than two years, Veronica had embezzled more than a quarter-million dollars. True to
form, she saved her husband from jail by claiming the whole scheme was her idea. But
because Veronica was a first-time offender, she got several years’ probation and served only
six months in a halfway house.
BETTER LATE THAN NEVER
Claude took some basic steps to prevent such fraud in the future. First, he instructed the
accounting department to be on the lookout for copies of original invoices. Poor quality
duplicates can be detected with the naked eye, but some reproductions are good enough to
escape all but the most detailed inspection. So, as an added safeguard, Claude installed
controls that would warn him if the accounting department tried to process the same invoice
amount and/or number twice. This required nothing more than adding an automated
procedure to the invoice payment system. Before printing a check, the system would scan
previous payments to see whether any were issued for the same bill. If questionable items
turned up, Claude would review them and determine how to proceed.
Second, he reassigned the responsibility for depositing refund checks to a staff member who
didn’t deal with invoices, thus separating critical job functions and correcting a serious
control deficiency.
Finally, because some of the most valuable information on suspected employee crime comes
from workers concerned about reprisals, Claude established a telephone hot line (see
“What’s So Hot About Hot Lines?”) so employees can report suspicions promptly without
fear for their personal safety or job security. He also recommended that management instruct
the CPA firm to accept and immediately inform the company of all calls and reports of
suspected fraud.
What’s So Hot About Hot Lines?
From the search for the Unabomber to the Enron inquiry, investigators have found
“inside” information from family members and coworkers to be especially valuable.
One way to obtain tips from such knowledgeable sources is to establish telephone “hot
lines” that are convenient and guarantee callers’ anonymity.
To encourage their use, hot lines must let callers furnish information without fear of
reprisal. Since many employees who want to report misdeeds may be afraid—for fear of
discovery—to call a hot line at work, such services must be available 24 hours a day.
Although callers report a wide variety of petty grievances, one simple fact remains:
Some crimes are not discovered any other way.
There are three types of hot lines.
Full-time, in-house. The most expensive and effective hot lines are staffed—around the
clock—by live personnel who can answer the caller’s questions and concerns. Usually
only the largest companies maintain full-time hot lines.
Third-party providers. Many third parties provide hot line services that are available at
all times. When an individual calls to make a report, the provider takes down the
information and relays it to the client company. Although this type of service is less
expensive than an in-house version, the employer—not the service provider—is
responsible for informing employees of its availability and contact information.
Part-time, in-house. Many companies have a tip line answered by company
employees—usually in the internal audit or security departments—during working
hours. At other times, callers are able to leave a voice-mail message. Although
inexpensive, this method is not as effective as the other two types of hot line because—
as explained above—it isn’t sufficiently confidential and doesn’t give callers a chance to
ask questions before they give information.
JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified
Fraud Examiners in Austin, Texas, and professor of fraud examination at the University of
Texas. Mr. Wells’ article, “So That’s Why It's Called a Pyramid Scheme” (JofA, Oct.00,
page 91), won the Lawler Award for the best article in the JofA in 2000. His e-mail address
is joe@cfenet.com.
Journal of Accountancy
Maintain your standards on routine business tasks or
suffer the consequences.
Billing Schemes, Part 4:
Personal Purchases
BY JOSEPH T. WELLS
This is the final installment in a four-part series on identifying false invoices and their
issuers. The July and August columns focused on billing schemes involving shell
companies criminals set up to facilitate fraud. Articles in this issue and September explain
how to detect and prevent two scams that employ other, completely different phony-bill
strategies.
This month’s case study shows CPAs the far-reaching consequences of not setting up
controls in a business to detect and prevent seemingly immaterial frauds.
ost business owners enjoy their leadership role. But wearing the boss’s hat means
shouldering diverse responsibilities, and many entrepreneurs don’t have time to manage
human resources and other important administrative functions. So they often hire someone
to do these jobs for them. If at first all goes well, the boss may no longer check to see if his
or her managers follow proper supervisory procedures. That’s when trouble brews.
The following case study isn’t just for auditors,
but rather for the thousands of CPAs heading
their own businesses, occupying other
management positions or advising businessowner clients. It demonstrates how “immaterial”
fraud—especially in small organizations—can
have companywide consequences.
How Crooks Help Themselves to
Company Funds
Some employees can’t resist temptation
and use their employers’ money to buy
things for themselves. They do it in one
or more of four ways.
THE PERFECT APPLICANT?
A Midwestern CPA firm with about 50 full-time
employees needed someone to run office
errands. Deidre, a member of its bookkeeping
staff, thought she knew the ideal candidate: a
Fraudulently authorizing invoices by
an appropriate party. In many
occupational fraud cases, the culprit’s
duties include authorizing purchases,
and his or her conscience is the only
young man named Mark, who lived in her
apartment complex. So she recommended him control in place.
for an employment interview during which he
Falsifying documents to obtain
appeared bright, energetic and sincere—
everything the firm wanted. Gladys, the partner authorization. If the fraudster is not the
authorizer of invoices, he or she often will
in charge, hired him on the spot.
forge a supervisor’s approval signature
on purchase requisitions and other
documents.
Altering legitimate purchase orders.
In some cases, a crooked employee
alters a legitimate purchase order,
increasing the quantity of merchandise
requested. When the goods arrive, the
employee takes the excess items or
returns them for a refund.
Misusing company credit cards. If a
company has weak controls over the use
of credit cards, some employees take
advantage and buy everything from fuel
for their automobiles to furniture for their
homes.
The following Monday Mark began work enthusiastically: He hand-delivered urgent
documents, used the company car to pick up visitors arriving from out of town and shopped
for miscellaneous office supplies and groceries. The weeks passed swiftly as Mark got
better at his job. Management even trusted him with making bank deposits, and after six
months of exemplary performance, he received a positive evaluation and a modest raise.
CLAY FEET REVEALED
One day, as Mark’s first anniversary
neared, his good start came to a bad end.
On the way back from picking up supplies
at the supermarket, he stowed some of
them in his car before bringing the rest to
the office. But unfortunately for Mark, the
firm’s receptionist saw what he had done
and promptly informed the office
manager, Harriett.
Given the firm’s lax purchase approval
procedures, Mark had had no trouble
using company funds to buy things for
himself. Each time he made a list of
necessary supplies and prepared to go
shopping, Harriet issued Mark a blank,
signed check. When he returned, Mark
submitted the receipt for his purchases.
Because the office supplies and groceries
weren’t particularly expensive, Harriett
rarely examined the cash-register tapes—
a fact that hadn’t escaped Mark’s
Source: Occupational Fraud and Abuse, by
attention. After the receptionist’s visit,
Joseph T. Wells, Obsidian Publishing Co. Inc.,
though, Harriett scanned several of
1997.
Mark’s receipts. She was shocked to
discover that in addition to items for the
office, Mark had been buying beer,
cigarettes and other personal items
without reimbursing the firm for them.
Taking a deep breath, Harriet reported
the embarrassing facts to Gladys, who
didn’t take the news well. Individually,
Mark’s thefts weren’t material, but they
would force Gladys to make a difficult
decision. Although she couldn’t just
reprimand Mark, she hesitated to fire him.
And yet it was important to set an
example that would deter other
employees from committing fraud.
THE TRUTH HURTS
The choice turned out to be clearer than Gladys expected, but it still was painful. After
glancing at Mark’s personnel file, she summoned him to her office and closed the door.
When he was seated she said she needed his help on a problem. Gladys paused and
looked Mark right in the eye. “What would you do if you were the boss and you learned a
valuable employee was stealing from the firm?” she asked.
Mark’s gaze wandered around the room. He frowned and said in a low voice, “I guess I’d
call him in and ask him about it.” After five minutes of patient questioning, Gladys got Mark
to confess. When she asked for a motive, he said the stolen items “weren’t expensive” and
the company could “easily afford them.”
Hearing this casual admission, Gladys resisted an urge to shout at Mark in frustration. “We
all liked and trusted this young man,” Gladys thought. “He’s been a good employee in every
other way—he has a near-perfect attendance record, gets along well with everyone and
makes a good impression on clients.”
But Gladys knew retaining Mark would set a dangerous legal precedent. If she let one
thieving employee stay and in the future fired another for similar misdeeds, the firm would
be vulnerable to a wrongful discharge suit. It was clear Mark had to go.
Gladys’s eyes moved again to Mark’s personnel file,
open on her desk, with his employment application
on top. She noticed Mark previously had worked for
a nearby computer manufacturer. On a hunch, she
asked, “What would your former employer say if I
called and asked why you left?” She was struck by
Mark’s curious reply: “I didn’t do it.”
As she said “I’m terminating you immediately for
stealing from the company, Mark,” she realized it
mattered more to her than it did to him.
How to Prevent and Detect
Personal Purchases
Ensure company policy clearly
prohibits all personal purchases
with company funds.
Do not permit the same employee
to originate purchases and approve
them.
Separate the invoice approval
function from the payment and
receiving function.
Before leaving the boss’s office, Mark admitted the
computer maker also had fired him for stealing.
Gladys silently cursed herself for not instructing the
Establish maximum purchasing
staff to put Mark through a normal preemployment
limits
for each employee.
background check. Instead, she had trusted
Deidre’s judgment and recommendation. At the time
Install controls to detect multiple
it seemed reasonable; Deidre had been with the
purchases just below employees’
company for more than four years and was an
approval limits.
outstanding employee.
Establish procedures to routinely
check for deliveries of companyordered goods to external
addresses. And look for matches
between invoice delivery addresses
and employees’ home addresses.
Examine shipment receiving
reports for merchandise ordered
and paid for but not delivered.
Check invoices for vendors that
are not usually associated with the
company’s business. For example,
it would be suspicious for a
manufacturer to order goods from a
department store.
Routinely examine individual
employees’ buying habits, looking
for increases in the amount or
frequency of purchases.
Carefully control access to, and
purchases that are made from,
company credit cards. Be especially
alert to purchases in round
amounts, which might indicate false
or inappropriate charges.
Gladys knew that in today’s litigious environment, Mark’s previous employer probably would
not have revealed the true reason for his departure, even if her firm had asked. But the
computer manufacturer’s HR manager probably would have admitted he would not rehire
Mark, and that would have been a red flag.
ONE MISTAKE, MANY CONSEQUENCES
Minutes after finishing with Mark, the boss called in Deidre, who, having heard the rumor
quickly spreading through the office, was in tears and revealed—to Gladys’s growing
anxiety—she and Mark had been dating for months. When questioned, Deidre admitted she
knew Mark was pilfering groceries and said she had encouraged him to stop. But Mark
continued stealing, and Deidre said she couldn’t bring herself to turn him in. Dazed, Gladys
wondered if she’d checked her own brains at the door the day the firm hired Mark without
knowing more about him. But she gritted her teeth and fired Deidre, too, for her ethical
lapse.
But what of Gladys’s managerial error? The price for the firm’s slack cost controls and
failure to follow appropriate hiring procedures was significant: Although Mark’s thefts were
petty, two workers lost their jobs. Deidre had been next in line to head the bookkeeping
department.
Furthermore, although Deidre’s coworkers knew why she was leaving, her popularity did not
diminish and a blue mood pervaded her team for weeks. Gladys learned the hard way how a
good employee’s departure under bad circumstances can foster low morale that, along with
the cost of training replacements, burdens a firm with avoidable difficulties.
The moral? When it comes to fraud, do sweat the small stuff.
Checking References
Approximately 7% of employees who commit fraud did so at previous jobs, according to
the Association of Certified Fraud Examiners’ 2002 Report to the Nation on Occupational
Fraud and Abuse. To avoid hiring these high-risk workers, consider the following
recommendations.
On the company’s employment application form, request information on all jobs held in
the last seven years or longer.
Look for chronological gaps on an employee’s application, which may indicate he or she
wants to avoid disclosing information about a particular position held or a criminal
conviction.
Confirm all employment-history information. If possible, interview the applicant’s
immediate supervisor. Fearful of employee litigation, most organizations will provide only
basic information. But often they will reveal whether they would rehire the employee—a
valuable indication of the circumstances under which he or she left the company.
JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified
Fraud Examiners in Austin, Texas, and professor of fraud examination at the University of
Texas. Mr. Wells’ article, “ So That’s Why It's Called a Pyramid Scheme ” ( JofA , Oct.00,
page 91), won the Lawler Award for the best article in the JofA in 2000. His e-mail address
is joe@cfenet.com .
Download