exam 2 Flashcards
Fraud Legal Definition
- a false statement, representation, or disclosure is made
- The fact is a material fact that induces a person to act
- the fact was made with the intent to deceive
- a justifiable reliance on the fraudulent fact in which the person was taking action
- an injury or loss was suffered by the victim
Three sides of the fraud triangle
Opportunity, rationalization, pressure
Opportunity triangle
commit, conceal, convert
Rationalization triangle
attitude, lack of personal integrity, justification
employee pressure triangle (pressure)
financial, emotional, lifestyle incentives
financial statement pressure triangle
financial, management characteristics, industry conditions
missapropriation of assets
- theft of company assets
most common, smaller amounts with each instance
largest factors for theft of assets
- absence of internal controls system
- failure to enforce the internal control system
fraudulent financial reporting
intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements
corruption
- wrongful use of a position to procure benefits
- kickbacks, conflicts of interest
lapping
concealing the theft of cash through delays in posting collections to accounts recievable: often through applying payments to different customer balances
kiting
creating cash using the lagtime between when a check is deposited and the time it clears the bank
auditing standard SAS 99 (now AU-C 240)
- understand fraud
- discuss risks of material fraudulent statements amongst audit group
- obtain evidence supporting if fraud has occured or not
- evaluate the results of other audit tests
- document and communicate findings
- professional skepticism
- incorporate technology focus
input fraud
alteration or falsifying input of data in the AIS: you have the ability to input this data as a part of your responsibilites
Processor fraud
unauthorized system use, like using work computers for non-work activities or using access you incidentally have in the AIS but shouldnt be using
computer instruction fruad
modifying software to do unintended things, illegal copying of software, creating software to undergo unauthorized activities
output/data fraud
stealing, copying or missuing AIS reports/printouts or displaying information
Foreign Corrupt Practices Act (FCPA)
- first piece of regulation that required internal controls - 1970s
- did not require an audit of the controls
Sox act- MGMT rules
- Management is responsible for setting up internal controls over financial reporting, other operational controls are good just not necessary for SOX compliance
- auditors are told about material internal controls weaknesses and fraud even if its immaterial
Sox act- External audit
- Audit partners must rotate periodically
- prohibited from performing certain non- audit services (consulting)
SOX- new audit committee rules
- still part of board of directors with new independence rules ( cant be employees)
- one member must be a financial expert
- oversees external audit
Sox- Creation of PCAOB
- entity that oversees the external audit profession includingprocess review and approv
COSO
committee of sponsoring organizations, like US Gaap rules for internal controls
ERM Framework
broad focus on strategic planning, setting risk the company is willing to take on
Internal controls- integrated framework
this is the cube, many companies claim on their 10k that they follow the IC cube as a part of their internal controls
5 elements of the front of the cube
control environment, risk assessment, control activities, information and communication, monitoring activities
control environment
- how does management show “tone at the top”
- established by setting up board of directors, and independent audit, communication of ethics and values, organizational structure, HR activities
risk assessment
- event identification
- risk assessment
- risk response
impact risk assessment
how much money will you lose or how much will your reputation take a hit
likelihood risk assessment
how often will this risk happen
inherent risk response
cost potential if the risk is not controlled
residual risk response
remaining risk after the controls are put in place
cost of control
costs that go along with trying to implement a control and setting up cost benefit on this
control activities
when determined to be appropriate and cost effective internal controls are set into place- manual automatic, preventative or detective
information and communication
management should use a system that gathers information accurately and communicates it on demand
monitoring
the 4 above components should be monitored by the company to ensure they are in place and defecencies found in any component are communicated by auditors to the audit committee
top of the cube
- operations- day to day decisions and efficiency
- reporting- SOX
- compliance- OSHA, IRS, HIPAA, PCI
COSO-IC and COSO-ERM
Address organizational-wide internal controls
business process controls
designed to address specific financial risks
COBIT
focuses on information technology internal control
IT general control
- the risks that information stored electronically is complete and accurate
- developed by the information systems audit and control association (ISACA)
IT Controls
intended to secure information and protect the functionality of any financially impacted system- broad and not linked to just one cycle
Business process controls
intended to address a specific business process cycle risks. this may be automated or manual
IT department responsibility
recording and custody
accounting department responsibility of IT controls
Authorization
Risk: Innapropriate user gains access to the AIS or database
controls:
- each user given unique ID
- authentication layers
- new user ID should be approved prior to access
- User ID of employee who leaves should be promptly removed
- users who change job responsibility should have access to AIS updated
- access reviewed periodically
- ability to change user access is restricted
- strong passwords
- physical access to databases is limited
- employees required to take security training
tasks
the individual function a user can do in the AIS