Beruflich Dokumente
Kultur Dokumente
10 - 2
10 - 3
Collection Fraud
Basic
Sales Skimming Advanced Sales Skimming Cheques Swapped for Cash Cash Box Robbery Shortchange Sales Mail Room Theft
10 - 4
Cash
stolen in transmission Lapping of accounts receivables Short bank deposits Noncustodial theft of money
10 - 5
Cheque Washing
10 - 6
credit approvals Dishonest employees could intentionally engage in fraudulent credit approval by granting credit accounts to fictitious customers. Improper credits Accounts receivable clerks could make improper credits to friends accounts. Improper write-offs Employees also could make improper write-offs to friends accounts instead of sending the accounts to collection.
10 - 7
Purchases and Payments Unauthorized Purchases Fraudulent Purchases to Related Parties Misappropriation of Petty Cash Abuse of Company Credit Cards or Expense Accounts Unauthorized Payments
10 - 8
Theft
of Company Checks Fraudulent Returns Theft of Inventory and Other Assets Payroll Fraud
Improper
hiring Improper changes to employee personnel files for pay raises Improper work-related reporting
10 - 9
Statement Fraud Insider Trading Employee Fraud in General Many other employee fraud schemes do exist.
10 - 10
Chain
of Custody is part of the audit trail. Authorizations and approvals are also important parts of the audit trail.
The
internal audit helps ensure that the audit trail is generated. Physical Security and Monitoring Fraud Reporting Hotlines, Training, and Education
10 - 11
Vendor Frauds
Short
shipments A company is susceptible to paying for goods not received if it does not count its incoming shipments and match the counts against purchase orders and vendors invoices. Balance due billing Some vendors send their customers statements that show only the balance due. Companies whose vendors bill this way are at high risk for being overbilled. Substandard goods Vendors can ship substandard goods if the receiving company does not have a method of receiving and inspecting goods. Fraudulent cost-plus billing
10 - 12
File Alteration (bypass normal access software) Program Alteration (requires access and technical skill) Data Theft (hard to detect and prove) Sabotage (typically by disgruntled employees)
10 - 13
Tasks
What
are the ways in which a company can be defrauded by its competitors? can customers defraud an entity?
How