Ch 9 - Non-Cash Asset Theft Flashcards

1
Q

What are the 5 categories for the misappropriation of noncash assets?

A
  1. Misuse
  2. Unconcealed larceny
  3. Asset requisitions and transfers
  4. Purchasing and receiving schemes
  5. Fraudulent shipment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Misuse of Noncash Assets

A

This is the inappropriate use of a company’s assets which typically include, company cars, supplies, computers and other office-equipment. The employee could be using their work computer to print invoices, write letters or do other work that is for a business that employee is running on the side. It would also be considered misuse of noncash assets if an employee is scrolling through social media while on their work computer on the clock.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unconcealed Larceny Schemes

A
  • Where an employee simply takes property from the company premises without attempting to conceal it in the books.
  • Often perpetrated by highly trusted employees/ they leave the assets out in plain sight to steal later
  • Assets misappropriated after hours by employees who keys to the building or perpetrator mailed the assets to themselves or another location where they could pick it up
  • “The Fake Sale”- where an employee has an accomplice that they will make a “sale” to, but not actually ring up a sale. The bag up the merchandise and the accomplice will leave with stolen goods. To the casual observer, it’s as if a legitimate sale was made.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Preventing and/or detecting unconcealed larceny of non-cash assets

A
  1. The jobs of requisitioning, purchasing and receiving assets should all be segregated. To provide additional checks and balances, the payables function should be segregated from all purchasing and receiving duties. (preventative)
  2. Physical inventory should be guarded and locked, with access restricted to authorized personnel only. (preventative)
  3. Access logs should be used to track those who enter restricted areas or each authorized personnel should have their own unique access code that can identify them as they enter. (preventative and detective)
  4. Security cameras should be installed in warehouses and sales floors. (preventative and detective)
  5. Organizations should conduct physical inventory counts on a periodic basis, and someone independent of the purchasing and warehousing functions should conduct these counts. (detective)
  6. Organizations need to put in place a mechanism to receive customer complaints and an independent employee should be assigned to follow up on these complaints. (detective)
  7. Customer shipping addresses can be matched against employee addresses. (detective)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asset Requisitions and Transfers

A
  • inventory held in multiple locations creates opportunities
  • Asset requisitions or other documentation that enable non-cash assets to be moved from one location in a company to another can be used to facilitate the misappropriation of those assets. In the process of moving the assets from one location to another using this documentation, the fraudster takes the merchandise for himself.
  • the basic scheme is to requisition assets for a work-related project, then steal the materials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Preventing and/or detecting asset requisitions and transfers

A
  1. Reconcile requested materials to actual jobs or work completed. This way if more were requested than was used on the project, this could be an indication of fraud. (detective)
  2. Authorizations should be required of requested materials (preventative)
  3. Require both signatures of requestor and approver(preventative/ detective)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Purchasing and receiving schemes

A

The purchasing and receiving functions can also be manipulated by a dishonest employee to facilitate the theft of non-cash assets.

  • assets are intentionally purchased by the company, then are misappropriated.
  • “falsifying incoming shipments”: where the employee charged with receiving goods falsifies the records of incoming shipments. The fraudster may also reject portions of the shipment as not being up to quality standards, then keep the “substandard” material rather than sending it back to the supplier.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purchasing and receiving noncash asset scheme vs. purchasing and receiving billing scheme:

A

The difference between these two is that purchasing and receiving as a noncash scheme is where the company intentionally purchases assets and then they are misappropriated. Billing schemes are different because they require the purchase of UNNECESSARY materials.

If an employee causes his company to purchase merchandise that the company does not need, this is a false billing scheme: the harm to the company comes in paying for assets for which it has no use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

False Shipments of Inventory and Other Assets

A
  • False shipping and sales documents are created to make it appear that the inventory was sold
  • False packing slips can allow the inventory to be delivered to a fraudster or accomplice
  • To hide the theft a false sale is created
  • Receivable is aged and written off
  • Sometimes a legitimate sale is made but understated

Red flag: increase in bad debt expense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventing and/or detecting purchasing & receiving and fraudulent shipping schemes

A
  1. Match invoices to receiving reports before payments are issued to prevent inventory from being stolen from incoming shipments. (preventative)
  2. Match every packing slip (sales order) to an approved purchase order, and that every outgoing shipment is matched to the sales order before the merchandise goes out. (preventative)
  3. Shipments of inventory should be periodically matched to sales records to detect signs of fraud. (detective)
  4. Evaluate bad debt (detective)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Concealing Inventory Shrinkage

A
  • physical count of inventory detects shrinkage
  • Altered inventory records: one of the simplest ways to conceal shrinkage is to change the perpetual inventory records to match the physical count, known as “forced reconciliation.”
  • Fictitious sales and accounts receivables: where the fraudster creates fake sales and fake receivable accounts to conceal the theft of inventory. Sometimes they even charge the fake sales to real accounts receivable customers whose account balances are so high that the addition will go unnoticed.
  • Write off inventory and other assets: writing off inventory and other assets is a common way for fraudsters to remove assets from the books before or after they are stolen.
  • Physical Padding: a concealment scheme in which fraudsters try to create the appearance that there are more assets on hand in a stockroom or warehouse than there actually are. This can be done by stocking empty boxes to make it look like there is extra inventory.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Misappropriation of Intangible Assets (2 types)

A
  1. Misappropriation of information: -Includes theft of competitively sensitive information (e.g., trade secrets, customer lists, marketing strategies, new products)
    - Can undermine value, reputation, and competitive advantage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Controls to prevent misappropriation of intangible assets

A
  • Limited access
  • Firewalls
  • Confidentiality agreements
  • Background checks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Misappropriation of Securities

A

Where a fraudster sells securities, without being authorized to do so, and keeps the proceeds for himself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Controls to prevent misappropriation of securities

A

-Proper internal controls over the investment portfolio need to be maintained, such as separation of duties, restricted access to investment accounts and periodic account reconciliations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

5 Categories of Tangible Non-Cash Misappropriations

A
1 Misuse
2 Unconcealed Larceny
3 Asset Requisitions and Transfers
4 Purchasing and Receiving Schemes
5 Fraudulent Shipments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Negative Effects of Non-Cash Asset Misuse

A

Inventory Shrinkage
Lost Productivity
Diversion of Capital for Inventory Replacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

2 Ways to Misappropriate a Company Asset

A
1 Misuse (Borrow)
2 Steal
19
Q

The Cost of Inventory Misuse

A
  • Lower Productivity
  • Diversion of Capital to Additional Employee
    wages
  • Loss Business Due To Competition From
    Employee’s Business
  • Additional Wear and Tear on Equipment
20
Q

Unconcealed Larceny (as used herein)

A

An employee takes property from company without attempting to conceal the theft by the act of manipulating the books and records.

21
Q

Fake Sale

A

Accomplice purchases merchandise but employee does not ring it up; accomplice takes the merchandise without paying for it.

22
Q

Prevention of Non-Cash Larceny

A
Segregate
Requisitioning of assets,
Purchasing of assets,
Receiving of these assets
Payables function from all purchasing and receiving functions
23
Q

Physical Controls

A
Cameras
Security Guards
Keep assets under lock and key
Restrict access
Log book for access to assets
Preforming Inventory counts on a regular basis
24
Q

Asset Requisitions & Transfers

A

Fictitiously requisitioning an overstated amount or a non-necessary, non-cash asset to the fraudsters location or work site, with the intent to pilfer the overage of assets or the entire amount.

25
Q

Concealment of Inventory Theft

A

Creating fictitious shipping documents and sales documents

26
Q

False Shipments of Inventory and Other Assets

A

Fictitious Shipping Documents (Fictitious Packing Slips) {Benefit-unsuspecting employee pulls the inventory and ships it to the perpetrator or accomplice} To further conceal the perpetrator creates a false sales record to account for the inventory.

27
Q

Concealing Inventory Shrinkage

A
  • Altering Inventory Records
  • Fictitious Sales & Accounts Receivable
  • Write Off Inventory and Other Assets
  • Physical Padding
28
Q

Inventory Shrinkage

A

Unaccounted-for reduction in a companies inventory due to theft.

29
Q

Inventory 2-Part Process

A
  1. The perpetual accounting of incoming and outgoing inventory
  2. The act of physically counting the inventory
    (Illuminates Shrinkage)
30
Q

Preventing and Detecting Concealed Non-Cash Thefts

A

Segregate Duties- Purchasing, Receiving, Inventory
Match Invoices and Receiving Reports
Match PO to Packing Slip and Sales Order
Monitor Increases to Bad Debt Expense
Watch for Employee address matching Shipment Address
Review Unexplained Perpetual Inventory Entries
Compare Material Orders to Actual Work
Trend Analysis of Type and Frequency of Inventory Reorder as well as Write-Off

31
Q

Physical Padding

A

Concealment of inventory fraud by creating a false appearance of having more assets on hand then there actually are. (Stacking empty boxes)

32
Q

Non-cash theft facts

A

most commonly thefts include equipment and inventory

not as common as cash schemes

33
Q

Tangible non-cash assets

A

inventory, equipment, and other physical assets other than cash

34
Q

Noncash Assets; Information

A

customer lists, trade secrets, new products, etc.

35
Q

Noncash Assets; Securities

A

investments

not as common but has the highest dollar thefts

36
Q

Noncash Tangible Asset Schemes

A
  1. misuse
  2. unconcealed larceny
  3. asset requisitions and transfers
  4. purchasing and receiving schemes
  5. fraudulent shipments
37
Q

Concealing inventory shrinkage

A

alter inventory records

physical padding

fictitious sales and Accounts Receivable

38
Q

Shrinkage is a key red flag of asset misappropriation.

True or false

A

True

39
Q

Inventory counts plans should include part one

A
  1. names of employees responsible for performing and supervising counts
  2. date and location
  3. detailed instructions on how counts were made
  4. provisions for handling receipts and shipments during counts
  5. sealed boxes
  6. segregation or ID of goods not owned
  7. investigation of significant difference
40
Q

True or False: If possible prefer employees independent of purchasing and warehouse functions to do inventory counts

A

True

41
Q

The count

A

issue tags or count sheets to individuals and assign count areas

1 person counts, 1 person documents info on tag or sheet. Attach original tag to inventory and keep copy to turn in

42
Q

Tags or Count Sheets

A

need to be prenumbered

make final of all used, unused, and voided tags

significant frauds have occurred when auditors or investigators have not adequately controlled for tags or counts sheets

may be necessary to perform test on inventory to see if inventory taking was done according to plan

43
Q

Auditor Observation of how inventory is counted

A

scrutinize the care with which employees follow the plan

see that all merchandise is tagged and no items are double-tagged

determine that prenumbered tags and count sheets are properly controlled

make same test counts and trace quantities to compilation sheets

be alert for empty containers and hollow squares

watch damaged and obsolete items

appraise the general condition of the inventory

ID the last receiving and shipping docs and determine that goods received during the count are properly segregated

inquire about the existence of slow-moving inventory items