FRAUDULENT DISBURSEMENTS Flashcards
There are two basic register disbursements schemes:
false refunds and false voids
Fictitious Refunds
In a fictitious refund scheme, an employee processes a transaction as if a customer were
returning merchandise, even though there is no actual return
Overstated Refunds
Rather than create an entirely fictitious refund, some employees merely overstate the amount
of a legitimate refund and steal the excess money.
Credit Card Refunds
Some dishonest employees process false refunds on credit card sales in lieu of processing a normal cash transaction.
One benefit of the credit card method is that the perpetrator does not have to physically take
cash from the register and carry it out of the store
False Voids
With the customer’s copy of the receipt in hand, the culprit rings a voided sale. Whatever money the customer paid for the item is removed from the register as though it is being returned to a customer. The copy of the customer’s receipt is attached to the void slip to verify the authenticity of the transaction.
Concealing Register Disbursement Schemes
keep the sizes of the disbursements low
destroy all records of the transaction
conceal inventory shrinkage
Fictitious refunds or voided sales can often be detected when
- closely examining the documentation submitted with the cash receipts
- One detection method is to evaluate the refunds or discounts given by each cashier or salesperson. This analysis may point out that a single employee or group of employees has a higher incidence of refunds or discounts than others. Further examination is then necessary to determine if the refunds are appropriate and properly documented.
- Signs in the register area asking customers to ask for and examine their receipts employ the customer as part of the internal control system. This helps ensure that the cashier or salesperson is properly accounting for the sale and prevents employees from using customer receipts as support for false void or refunds
- Random service calls to customers who have returned merchandise or voided sales can be used to verify the legitimacy of transactions.
There should be __ between sales and returns and allowances over a relevant range
a linear relationship
Register Disbursement Scheme Red Flags
• Inappropriate employee segregation of duties. For example, register counting and reconciling should not be done by the cashier.
• Cashiers, rather than supervisors, have access to the control keys that are necessary for
refunds and voids.
• Register employee has authority to void own transactions.
• Register refunds are not methodically reviewed.
• Multiple cashiers operate from a single cash drawer without separate access codes.
• Personal cheques from cashier found in register.
• Voided transactions are not properly documented or not approved by a supervisor.
• Voided cash receipt forms (manual systems) or supporting documents for voided transactions (cash register systems) are not retained on file.
• Missing or obviously altered register tapes.
• Gaps in the sequence of transactions on register tape.
• An inordinate number of refunds, voids, or no-sales on register tape.
• Inventory totals appear forced.
• Multiple refunds or voids for amounts just under the review limit.
Prevention of Register Disbursement Schemes
• Review the segregation of duties of key employees who staff the register as well as the
duties of their supervisors.
• As cash is received it is important to ensure that the employees responsible for completing these important tasks are informed of their responsibilities and properly supervised.
• An employee other than the register worker should be responsible for preparing register
count sheets and agreeing them to register totals.
• Complete register documentation and cash must be delivered to the appropriate personnel in a timely manner.
• Cash thefts are sometimes revealed by customers who have paid money on an account
and have not received credit, or in some cases, who have been credited for an amount that does not agree with the payment they have made. Complaints and inquiries are also received frequently from banks.
• Access to the register must be closely monitored and access codes must be kept secure.
• Quantity of refunds should be analysed to detect multiple small refunds.
• Communicate and adhere to company policy of performing unannounced cash counts.
• Maintain the presence of a manager or supervisor near the area of the cash register as a
deterrent to theft.
• Review supporting documents for voided and refunded transactions for propriety (i.e.,legitimacy and approvals).
• Review the numerical sequence and completeness of cash register tapes.
Cheque Tampering Schemes
In these schemes the perpetrator takes physical control of a cheque and makes it payable to himself through one of several methods
Forged Maker Schemes
cheque tampering scheme in which an employee
misappropriates a cheque and fraudulently affixes the signature of an authorised maker thereon
To Whom Is the Cheque Made Payable?
TO THE PERPETRATOR
TO AN ACCOMPLICE
TO “CASH”
TO VENDORS
Forging the Signature
FREE-HAND FORGERY
PHOTOCOPIED FORGERIES
AUTOMATIC CHEQUE-SIGNING INSTRUMENTS
Forged endorsements are those cheque tampering schemes in which
an employee intercepts a company cheque intended to pay a third party and converts the cheque by endorsing it in the third party’s name.
Altered Payee Schemes
This is a type of check tampering fraud in which an employee intercepts a company check intended for
a third party and alters the payee designation so that the check can be converted by the
employee or an accomplice
Altering Checks Prepared by Others: Inserting a New Payee
The first is to insert the false payee’s name in place of the true payee’s
A more intricate method occurs when the perpetrator of the fraud enters the
accounts payable system and changes the names of payees
Altering Checks Prepared by Others: ‘‘Tacking On’’
“tacking on” additional letters or words to the end of the real payee designation.
Intercepting Cheques
EMPLOYEES INVOLVED IN DELIVERY OF CHEQUES
POOR CONTROL OF SIGNED CHEQUES
Theft of Returned Cheques
Re-Routing the Delivery of Cheques
Altering Checks Prepared by the Fraudster: Erasable Ink
is to write or type the payee’s name (and possibly the amount) in erasable ink. After the check is signed by an authorized maker, the perpetrator retrieves the check, erases the payee’s name, and
inserts his own
Altering Checks Prepared by the Fraudster: Blank Checks
e in which the perpetrator prepares a check, leaves the payee designation blank, and submits it to an authorized maker who signs the check and returns it to the employee
Concealed Check Schemes
These are check tampering frauds in which an employee prepares a fraudulent check and submits it along with legitimate checks to an authorized
maker who signs it without a proper review
An authorized maker scheme is a type of check tampering fraud
in which an employee with signature authority on a company account writes fraudulent checks for his own benefit and signs his own name as the maker
Concealing Cheque Tampering Schemes
The Fraudster Reconciling the Bank Statement (remove the fraudulent cheques or doctor the bank statement or both; removes the fraudulent cheque from the stack of returned cheques and
destroys it; code it as “void” or to include no listing at all in the journal.)
Re-Alteration of Cheques (When the fraudulent cheques return with the bank statement, the employee erases his own name and re-enters the name of the proper payee)
Miscoding Fraudulent Cheques (write a cheque payable to himself but list a different person as the payee on the books or overstating the amounts of legitimate disbursements in the journal in order to absorb the cost of a fraudulent cheque.)
Re-Issuing Intercepted Cheques
Bogus Supporting Documents