Unit 2: Fraud and Risk Management Flashcards
Types of Fraud
-
Fraudulent Financial Reporting
- Most often committed by management.
- It is the focus of external auditors and the concern of regulatory bodies
-
Misappropriation of assets
- Most often committed by employees and results from theft, embezzlement or defalcation
- It can cause financial misstatements, but usually generate more internal than external problems.
- Once discovered the effects of misappropriation should be accounted in the financial statements.
- Management is to create controls to mitigate exposure to this fraud and to deal effectively once discovered.
Fraud Risk Model (Fraud Triangle)
Check for Rationalization (hardest to appraise but can be tackled) vs Pressure ( hardest to tackle )
- 3 characteristics of fraud (ORP)
- Opportunity
- Rationalization
- Pressure (motivation)
- Opportunity: not only to do it, but to conceal it, and is bolstered by the lack of oversight, inadequate internal controls or enforcement of these controls.
-
Rationalization (hardest to appraise because involves a personal / intimate knowledge of the perpetrator and its motivations): person’s ability to justify actions as consistent with his/her personal code of ethics.
- Some rationalizations:
- Underpaid or overworked.
- Feeling that everybody else is doing.
- Seek revenge
- Disgruntled (dissatisfied employee).
- Conviction that taking assets is a loan and will be paid back.
- How to avoid: strong ethical culture, code of conduct and providing ethics education.
- Some rationalizations:
-
Pressure (motivation)
- Typically motivated by the need of cash, but there can be other reasons: continued employment, respect or admiration.
- When the reward is economic gain, managers might feel pressured to manipulate financial reporting if compensation is tied to results
- Other motivations is meeting debt covenants, budgets or other financial goals.
- Biggest motivation for management is to meet or exceed earnings targets. Similarly, for larger public companies, the need to exceed forecasts is a major motivator.
- Organizations can seldom influence pressure since most businesses reward systems are still focused on financial goals.
Red flags for fraud (Financial Reporting Risks)
(Remember: most often committed by management)
- Financial reporting risks:
- Performances too bad or too good to be true
- Threat of imminent bankruptcy or hostile takeover.
- High turnover of senior management, counsel or board of members
- Strained relationship with the auditor
- Too much influence from nonfinancial managers on setting metrics.
- Track record of securities laws violations
- Industry or market declines
- Poor cashflows
- Highly complex operations
- Transactions in tax-haven jurisdictions
- Unrealistic sales or profitability incentives
- Unusually rapid growth
- Pressure to meet analysts expectations
Red flags for fraud - Misappropriation of Assets Risks
(Remember: Most often committed by employees)
- Missing documents for transactions
- Large amounts of cash on hand
- High value, small sized inventories or other assets.
- Unexplained budget variances.
- Unusual
- Failure of certain employees to take vacations.
“The profile of a typical fraudster is a long-serving, trusted employee, who works long hours and is reluctant to take their annual leave,”
- Unusual write-off of receivables
- Failure to follow up on past due-receivables
- Shortages in delivered or received goods
- Poor supervision
- Products or services purchased in excess of needs
- Payroll checks with a second endorsement
- Employees on the payroll who do not sign up for benefits (supervisor keeps their paycheck).
- Undocumented petty cash expenditures
- Common addresses on payables, refunds or payments
- Addresses or telephone numbers of employees that match with suppliers or others.
- Complaints by customers
Investigative Resources and Techniques
- Documents
- Provide a key source of evidence in most fraudulent investigations.
- Accountant should be alert for altered documents
- Documents can be altered in various ways such as erasure or forgery.
- False signatures (need expert to detect)
- Photocopies should be examined (check for trash-marks generated by copy of originals)
- Torn, smudged, faded, burned documents also should be examined for authenticity.
- Provide a key source of evidence in most fraudulent investigations.
- Public searches of information on fraudsters
- Civil and criminal actions
- Bankruptcy records
- Marriage licenses and divorces
- Property records
- Litigation history
- Social media is another source of potential information
- Private records (delicate due to privacy issues)
- Medical records
- Banking records
- Trust records
- Telephone records
- Passengers list
- Stock ownership
- Commercial online services with info on people.
- Electronic evidence (however hard to determine who really did it)
- Erased files
- Who, when, permissions, maintenance, and storage must be assessed.
-
Interviews (most efficient and useful evidence collection technique)
- Interviews should be:
- Of sufficient length and depth
- Objective and impartial
- Be conducted on a timely basis
- Signs of lying
- Shake of the head rather than a verbal response
- Responding to the interview with a question
- Sweating
- Denying an assertion while providing inconsistent nonverbal cues
- Looking down rather than at the interviewer
- Shifting and fidgeting
- Delaying responses to questions
- Fraud perpetrated by single individuals is easy to be detected than one done via collusion or conspiracy among a group of employees. Segregation of duties makes it easier to detect fraud perpetrated by one individual.
- Interviews should be:
Managing the risk of Fraud (establishing a system of control)
Types of Controls
- Primary controls:
- Preventive:
- Storing petty cash in a locked safe or segregation of duties
- Requiring two persons to open mail is an attempt to prevent misstatements of cash receipts.
- IT examples:
- Designing database so that users cannot enter letters in SS number
- Requiring the number of invoices in a batch to be entered before processing begins.
- Detective
- Rejection of batches by computer system.
- Hash totals are commonly used to detect data entry errors and completeness.
- A burglar alarm is another one.
- Corrective
- All cost variances above a certain limit to be explained.
- Directive controls
- Policy and procedure manuals.
- Preventive:
- Segregation of duties (enhance system security)
- ARC: separate Authorization, Recordkeeping and Custody.
- Secondary controls (when the primary is not effective)
- Compensatory: supervisory review if segregation of duties is not sufficient.
- Complementary: accounting and custody to be complemented by obtaining deposit slips validated by the bank.
- Independent checks and verification
- Reconciliation between recorded amounts and assets. The costs of this shouldn’t outweigh the benefits.
- Prenumbered forms can assist in reconciliation.
- Safeguarding controls
- Limits access of an organization’s assets to authorized personnel only (lockbox system).
ERM (Enterprise Risk Management) Approach
- Involves the identification of events with negative impacts on organizational objectives
- ERM approaches risk from an enterprise-wide perspective.
5 Types of Risk
- Hazard risks are insurable risks like natural disaster, impairment of physical assets, death of senior officers, and terrorism.
-
Financial risk (LINKED ONLY TO COMPANIES FINANCED BY DEBT CAPITAL) encompass:
- Interest rate risk
- Commodity risk
- Credit risk
- Liquidity risk
- Market risk
-
Operational risk linked to enterprise ongoing operations. Risk of loss from inadequate or failed internal processes, peoples and systems. Can result from:
- Human resources (bad hiring/training), business processes (poor internal controls), technology, product failure, occupational safety and health incidents, environmental damage and business continuity (power outage etc)
- Includes legal and compliance risk.
- CAN BE MANAGED WITH ADEQUATE INTERNAL CONTROLS, BUSINESS PROCESS REENGINEERING (BPR) and business continuity planning.
- Strategic risk include global economic risk, political risk, market conditions, leadership , brand and changing customer needs. ALSO LINKED TO CHANGE IN CUSTOMER PREFERENCES IMPACTING BUSINESS.
- Business risk: is the risk that a company will have lower than anticipated profits or will incur a loss.
5 Key Steps in Risk Management
Step zero (overarching step) : To start, management needs objectives that are impacted by potential events.
- Identify risk until the lowest operational unit
- Assess risk (probability vs potential impact) quantitatively and qualitatively.
- Prioritize risks (ERM committee can be assigned)
- Formulate risk responses (ERM propose adequate response strategies)
- Monitor risk responses
- Management of a unit (since is is the closest to the risk area)
- Audit function plays important role since operational managers might not always be objective.
Strategies for Risk Response
- Risk avoidance: ends the risk activity.
- Risk retention: accepting risk of an activity (“self-insurance” like auto owners with no car insurance).
- Risk reduction. DOES NOT ENCOMPASS RISK AVOIDANCE/ELIMINATION
- Risk sharing: transfer loss potential to another party (insurances, outsourcing activities, and entering into joint ventures).
- Risk exploitation: deliberate courting of risk in order to pursue a high return on investment.
Residual vs Inherent Risk
- Residual risk is the risk of an activity remaining after the effects of any risk responses.
- Inherent risk arises from the activity itself, and when management does not act to alter its severity. Handling Uraniumn AND Complex calculation like leases and pensions are prone to inherent risk..
Benefits of Risk Management
- Efficient use of resources ( resources directed to the greatest exposure risks )
- Fewer surprises.
- Reassuring investors (lower cost of capital).
Liability Insurance
- Liability insurance for faulty products for example or if an employee gets injured inside the companies premises.
Financial Risk Management Methods
-
Hedging:
-
Types
- Short (INVERSE)– value rises if price falls
- Long hedge – value rise if prices rise.
- Hedging instruments: options, future contracts and swaps.
-
Types
- Conventional methods:
- Sinking funds (fund to cover in case of default / depreciation).
- Policies regarding terms of short-term obligations (maturity matching).
Qualitative risk assessment tools
- Risk identification
- “what keeps you awake at night”
- General risk buckets definition
- Brainstormin session
- Risk ranking
- Risk mapping is a visual tool depicting relative risks.
- X axis: probabilities
- Y axis: severity