Chapter 11

advertisement
Chapter 11
Cash Receipt Schemes and
Other Asset Misappropriations
A Case of Taking from the Poor
to Give to the Rich
• Non-profit organization for families of 9/11 victims
• Anonymous tip alerted Board of Directors of misappropriation
of funds
• Corporate officers were using organization’s income for
personal use
• Inconsistent records with vendors
• Two sets of financial records
• Some transactions didn’t appear in original journals and ledgers
• Unauthorized personal expenditures on credit
Critical Thinking Exercises
Far off in the woods, there is a cabin. The
cabin contains 3 people. Two are in one room;
the other is alone in another room. All doors
to the cabin are locked tight and have not
been opened. All three people are dead.
There was no sign of violence in this cabin.
How did they die?
Skimming Schemes
• Theft of cash from a victim entity prior to its entry in an
accounting system
• “Off-book” fraud
• No direct audit trail
• Can occur at any point where funds enter a business
• Subdivided based on whether they target Sales or Receivables
Sales Skimming
• Most basic skimming scheme
• Collect customer payment at point of sale and make
no record of transaction
• Cash register manipulation
• After-hours sales
• Skimming by off-site employees
• Poor collection procedures
• Understated sales
• Check-for-currency substitutions
• Theft in the mail room – incoming checks
Preventing and Detecting
Sales Skimming
• Viable oversight presence when cash enters
organization
– Management
– Video cameras
•
•
•
•
Customer complaints and tips
Cash register log-in and log-out times
Activity logs for off-site personnel
Reduce perceived opportunity to steal
Receivables Skimming
• More difficult than skimming sales
• Receivable payments aren’t logged into
accounting system
• Lapping
• Force balancing
• Stolen statements
• Fraudulent write-offs or discounts
• Debiting the wrong account
• Destroying or altering records of the transaction
Preventing and Detecting
Receivables Skimming
•
•
•
•
•
Strong internal controls
Separation of duties
Regularly rotate job duties
Make employees take yearly vacation
Supervisory approval for write-offs or
discounts
• Properly trained audit staff
• Automated tests
• Trend analysis on aging of customer accounts
Proactive Computer Audit Tests
to Detect Skimming
See details in chapter
Cash Larceny Schemes
• Intentional taking away of an employer’s cash
without consent and against will of employer
• Money has already appeared on victim’s books
• Can take place whenever employee has access to
cash
• Most larceny schemes involve the theft of cash
– At point of sale
– From incoming receivables
– From the victim organization’s bank deposits
Larceny at the Point of Sale
• Large percentage of cash larceny schemes
occur at point of sale
• That’s where the money is
• Thefts from other registers
• Death by a thousand cuts
• Reversing transactions
• Altering cash counts or cash register tape
• Destroying register tapes
Preventing and Detecting
Cash Larceny at the Point of Sale
• Strong internal controls
• Segregation of duties
• Discrepancies between sales records and cash on
hand
• Reports of discounts, returns, adjustments, and
other concealing transactions
Larceny of Receivables
• Steal customer’s incoming payments
• Hide imbalances cause by the fraud
• Force balancing
• Reversing entries
• Destruction of records
Cash Larceny from the Deposit
• Taking money prior to depositing it
• Difficult to conceal
• Deposit lapping
• Deposits in transit
Preventing and Detecting
Cash Larceny from the Deposit
• Separating duties
• Itemized deposit slip
• Compare authenticated deposit slip to
organization’s copy of deposit slip, remittance
list, and general ledger posting
• Deliver 2 copies of bank statement to different
people in organization
Proactive Computer Audit Tests
Detecting Cash Larceny
See details in chapter
Noncash Misappropriation Schemes
• Misappropriation of inventory, supplies,
equipment, and other noncash assets
• Noncash misappropriations fall into the
following categories
– Misuse
– Unconcealed larceny
– Asset requisitions and transfers
– Purchasing and receiving schemes
– Fraudulent shipments
Misuse of Noncash Assets
• Two ways to misappropriate a company asset
– Misuse
– Steal
• Unauthorized use of a company asset with
false statement
• Use of office equipment to do personal work
on company time
• The costs of inventory misuse
Unconcealed Larceny Schemes
• Employee takes property from the company
premises without attempting to conceal it in
the books and records
• Take company assets without trying to justify
their absence
• Most noncash larceny schemes are committed
by employees with access to inventory
• “Management vs labor” mentality
• The fake sale
Preventing and Detecting
Larceny of Noncash Assets
• Segregation of duties
– Requisitioning
– Purchasing
– Receiving
• Physical controls
– Merchandise should be guarded and locked
– Restrict access to authorized personnel
• Installation of security cameras
• Physical inventory counts on a periodic basis
• Mechanism for receiving customer complaints
Asset Requisitions and Transfers
• Use of internal documents to gain access to
merchandise
• Move noncash assets from one location to
another
• Overstate supplies or equipment for project
and pilfer excess
• Falsify forms and remove noncash assets from
warehouse or stockroom
Purchasing and Receiving Schemes
• Purchasing and receiving functions are used to
facilitate theft of noncash assets
• False billings
– Purchase merchandise that company doesn’t need
• Noncash misappropriations
– Intentionally purchased but misappropriated by
the fraudster
• Falsifying incoming shipments
False Shipments of Inventory
and Other Assets
• Fraudster creates false shipping and sales
documents to make it appear that inventory
was sold not stolen
• No risk of being caught stealing on site
• Victim company unknowingly delivers
targeted assets
• Understate legitimate sales so accomplice is
billed for less
Other Schemes
• Employees tailor their thefts to the
organization
– Security systems
– Record-keeping systems
– Building layout
– Day-to-day operations
• Write off assets to make them available for
theft
Concealing Inventory Shrinkage
• Unaccounted-for reduction in inventory
• Shrinkage is one of the red flags that signal
fraud
– “Where did inventory go?”
•
•
•
•
Altered inventory records
Fictitious sales and accounts receivables
Write off inventory and other assets
Physical padding
Altered inventory records
• Change the perpetual inventory record so that
it will match the physical inventory count
(a.k.a “forced reconciliation”)
• Result: appearance that no shortage exists
Fictitious sales
and accounts receivable
• Create fake sales to mask the theft of assets
• Debit accounts receivable (cash)
Credit sales account
• Issues created: Uncollectible accounts receivable (or
missing cash)
• Solution:
– “Sell” to a large client who may not notice and will
pay for the fake sale
– Write-off the receivable after an appropriate
period of time
Write-off inventory
and other assets
• Write off inventory as “obsolete”
• Result: Remove assets from the books before
or after they are stolen – no shortage
Physical padding
• Make it appear that there are more assets
present
• Example:
– Empty boxes in warehouse
– Set up a “wall” of product where nothing behind
the wall exists
Preventing and Detecting Noncash Thefts
That are Concealed by Fraudulent Support
• Separate duties of ordering goods, receiving
goods, maintaining perpetual inventory
records, and issuing payments
• Match invoices to receiving reports before
payments are issued
• Match packing slip to purchase order to
prevent
• Monitor increases in bad debts expense
Preventing and Detecting Noncash Thefts
That are Concealed by Fraudulent Support
(Continued)
• Reductions to perpetual inventory should be
properly supported
• Reconcile materials ordered for projects to the
actual work done
• Periodically perform trend analysis on
inventory designated as scrap
• Only remove assets with proper authority
Proactive Computer Audit Tests for
Detecting Noncash Misappropriations
See details in chapter
Download