SlideShare a Scribd company logo
1 of 17
Download to read offline
Establishing an
Organization Wide Fraud
Policy
October 8, 2013
Special Guest Panelist:
Paul McCormack, CFE

Copyright © 2013 FraudResourceNet™ LLC

About Jim Kaplan, MSc, CIA, CFE
 President and Founder of
AuditNet®, the global resource
for auditors
 Auditor, Web Site Guru,
Internet for Auditors Pioneer
Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
 Author of “The Auditor’s
Guide to Internet Resources”
2nd Edition
Copyright © 2013 FraudResourceNet™ LLC
About Paul McCormack, CFE


18 years of fraud, litigation and business
consulting experience



Worked directly with agents from federal, state
and local law enforcement agencies including
the F.B.I., G.B.I., D.E.A., and the Secret Service



Previously managed fraud departments for
SunTrust Bank, & Delta Air Lines



Frequently writes and speaks on topics
involving fraud, cyber security, intellectual
property theft and money laundering



Certified Fraud Examiner since 2002
Copyright © 2013 FraudResourceNet™ LLC

Webinar Housekeeping
This webinar and its material are the property of FraudResourceNet LLC.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We will be recording the webinar and you will be provided access to
that recording within 5-7 business days after the webinar. Downloading or
otherwise duplicating the webinar recording is expressly prohibited.
Please complete the evaluation to help us continuously improve our Webinars.
Unless you are participating in a group that is viewing this Webinar on a
common computer screen, you must answer the polling questions to qualify for
CPE per NASBA.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
If GTW stops working you may need to close and restart. You can always dial
in and listen and follow along with the handout.

Copyright © 2013 FraudResourceNet™ LLC
Disclaimers


The views expressed by the presenters do not necessarily represent the
views, positions, or opinions of FraudResourceNet LLC (FRN) or the
presenters’ respective organizations. These materials, and the oral
presentation accompanying them, are for educational purposes only and do
not constitute accounting or legal advice or create an accountant-client
relationship.
While FRN makes every effort to ensure information is accurate and
complete, FRN makes no representations, guarantees, or warranties as to
the accuracy or completeness of the information provided via this
presentation. FRN specifically disclaims all liability for any claims or
damages that may result from the information contained in this
presentation, including any websites maintained by third parties and linked
to the FRN website
Any mention of commercial products is for information only; it does not
imply recommendation or endorsement by FraudResourceNet LLC
Copyright © 2013 FraudResourceNet™ LLC

4

Today’s Agenda
 Introduction: Fraud Statistics: The Growing Fraud
Threat
 Auditing for Fraud: Standards & Essentials
 Ethics policy vs. Fraud policy
 Components of a fraud policy
 Pros & Cons of a fraud policy
 Creation and ownership – best practices
 “Behind the scenes” – making the policy work
 Traps to avoid
 Embedding the policy in the corporate DNA
 Your Questions
 Conclusion
Copyright © 2013 FraudResourceNet™ LLC
Fraud: The Big Picture
According to major accounting firms, professional fraud
examiners and law enforcement:

 Fraud jumps significantly during tough economic times
 Business losses due to fraud increased 20% in last 12
months, from $1.4 million to $1.7 million per billion dollars of
sales. (Kroll 2010/2011 Global Fraud Report)
 Average cost to for each incident of fraud is $160,000
(ACFE) Of Financial Statement fraud: $2 million
 Approx. 60% of corporate fraud committed by insiders (PwC)
 Approx. 50% of employees who commit fraud have been
with their employers for over 5 years (ACFE)
Copyright © 2013 FraudResourceNet™ LLC

The Auditor’s Role
 1200: Proficiency and Due
Professional Care
 1220: Due Professional Care
 2060: Reporting to Senior
Management and the Board
 2120: Risk Management
 2210: Engagement
Objectives

Copyright © 2013 FraudResourceNet™ LLC
Ethics Policy vs. Fraud Policy
 Fraud, ethics and code of conduct are often used
interchangeably – not always correct to do so
 Ethics policy is a set of principles of conduct within an
organization - guide “day to day” decision making and
behavior. It serves as the “moral compass” for the
organization
 A fraud policy has a much narrower focus. It addresses
fraudulent conduct by employees and third parties
 Creating a stand alone fraud policy shines a much needed
light on fraud prevention
Copyright © 2013 FraudResourceNet™ LLC

Fraud Policy – One Element of Ethics /
Code of Conduct

Ethics Program
Discrimination &
Harassment
Information
Security

Compliance
with Laws

Copyright © 2013 FraudResourceNet™ LLC

Conflict of
Interest
Fraud
Policy
Fraud Policy – Pros & Cons

• Establishes expectations
• Creates basis for HR discipline

Pros

• Ensures consistent approach
• Enhances “perception of detection” and
prevents fraud

• Can alienate employees

Cons

• Creates expectations that the company may
not always meet
• Can be time consuming to create and monitor
over time

Copyright © 2013 FraudResourceNet™ LLC

So what does a fraud policy include?
A fraud policy contains the following:
 Details on what constitutes fraud and to whom the policy
applies
 Details employees’ / management’s responsibility to report
fraud
 List of channels available to report suspect activity –
multiple and independent
 Areas within the company that are responsible for
investigating fraud (note: it is not a “regular” employee’s
job)
 Statement that all investigations will be conducted in a
consistent manner without consideration of rank or tenure
Copyright © 2013 FraudResourceNet™ LLC
Polling Question 1
An organization’s fraud policy should be _________
its Ethics Program
A. Part of
B. Supplemental to
C. Completely separate from

Copyright © 2013 FraudResourceNet™ LLC

So what does a fraud policy include?
(cont.)
A fraud policy contains the following:
 Details of organization’s tip-reporting channels (hotline,
website, Email, phone, etc) and how to use them
 Retaliation / Cover up not permitted
 Commitment to cooperate with law enforcement as
appropriate
 Disciplinary ramifications for committing fraud
 Periodic reporting requirements
Copyright © 2013 FraudResourceNet™ LLC
Creation and ownership – who’s on
first?
• Cross divisional impact – need to ensure everyone on
board
• Executive management, HR, Legal, Internal Audit,
Corporate Security

Identify stakeholders

• Detail why a fraud policy is needed
• Clearly define goals and objectives

Develop a charter

• Who will create the content? Who will approve the final
version within each department?
• “Behind the Scenes” - document the investigation
process

Assign roles
Secure final executive
approval

• Which executives will approve the policy?
• How will the new policy be communicated?

Develop a follow up
process

• Develop a timetable to follow up and revisit the
overall effectiveness of the fraud policy

Copyright © 2013 FraudResourceNet™ LLC

Implementation
Initial Assessment

Detailed Analysis

• If applicable, review existing fraud
policies and procedures
• Review fraud prevention training / new
hire process

• Review information gathered during
initial assessment for gaps
• Document gaps and share with
stakeholder. Include
recommendations to bridge gaps

• Management knowledge, investment
and oversight

Future State Design and
Development
• Use results of the initial assessment
and gap analysis to develop fraud
policy
• Prior to implementation, share fraud
policy with stakeholders/executive
sponsor for approval

Implementation
• Once approved, develop
implementation timetable and
communicate to steering committee
• Track and report status, including
roadblocks encountered with
stakeholders

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 2
A basic fraud policy should include which of the
following?
A. Retaliation / Cover up not permitted
B. Commitment to cooperate with law enforcement as
appropriate
C. Disciplinary ramifications for committing fraud
D. Periodic reporting requirements
E. All of the above

Copyright © 2013 FraudResourceNet™ LLC

“Behind the Scenes” – Clear Lines of
Responsibility

Copyright © 2013 FraudResourceNet™ LLC
Sample Fraud Policy from ACFE

Copyright © 2013 FraudResourceNet™ LLC

Sample Fraud Policy from ACFE

Copyright © 2013 FraudResourceNet™ LLC
Sample Fraud Policy from ACFE

Copyright © 2013 FraudResourceNet™ LLC

Sample Fraud Policy from ACFE

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 3
Accoording to the ACFE, ________________ is
responsible for detection and prevention of fraud
A.
B.
C.
D.

Internal audit
Management
Audit Committee
Everyone who works for the organization

Copyright © 2013 FraudResourceNet™ LLC

Sample Fraud Policy from ACFE

Copyright © 2013 FraudResourceNet™ LLC
Sample Fraud Policy from ACFE

Copyright © 2013 FraudResourceNet™ LLC

Sample Fraud Policy from ACFE

Copyright © 2013 FraudResourceNet™ LLC
Traps to avoid
 Strike the right tone – Fraud policy is designed to
protect the company and its employees. Avoid
treating all employees as “guilty until proven
innocent”
 Make sure everyone is on board – Fully address
concerns raised by senior executives early in the
process
 Don’t forget foreign operations – If your company
operates overseas, make sure that the policy is
legally applicable
 Practice what you preach – Departures from policy
should be few and far between. If too prescriptive,
leave it out
 “Out of sight, out of mind” – Don’t create then
ignore the policy
Copyright © 2013 FraudResourceNet™ LLC

Polling Question 4
An employee who reports a possible fraud should
never be told not to discuss the incident with
anyone else in the organization
A.
B.

True
False

Copyright © 2013 FraudResourceNet™ LLC
Embedding the policy in the corporate
DNA
 Include the fraud policy as a separate section
within the code of conduct or ethics policy.
Cross-reference where appropriate
 Include discussion of the fraud policy/code of
conduct during new hire orientation
 Once a year, require mandatory training on the
code of conduct (online or face to face). Training
should include a final exam that includes
scenarios to test the employee’s application of
the code
 Include a “signed” affirmation of the employee’s
participation in the course as well as their final
exam within their personnel file (an actual or
electronic signature is appropriate)
Copyright © 2013 FraudResourceNet™ LLC

Embedding the policy in the corporate
DNA (cont.)
 Adhere to the fraud policy in all respects.
Example: If the fraud policy stipulates that all allegations will be
investigated within X of days, make sure that takes place
 Without naming names, publicize instances where the fraud policy was
used to terminate an employee
 Ensure that senior executives routinely mention the company’s code of
conduct in their speeches and written communications to employees
 Display code of conduct related posters in employee break rooms. (Make
sure they are replaced if damaged or appear worn)

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 5
Fraud policies should always avoid taking the
tone of
A. Innocent until proven guilty
B. Guilty until proven innocent
C. Everyone in the organization should be part of the
detection and prevention effort
D. None of the above

Copyright © 2013 FraudResourceNet™ LLC

Questions?
 Any Questions?
Don’t be Shy!

Copyright © 2013 FraudResourceNet™ LLC
Thank You!

Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com
Paul McCormack CFE
paulmccor2008@gmail.com
Copyright © 2013 FraudResourceNet™ LLC

Coming Up This Month

 “Using Data Analytics to Detect
and Deter Procure-to-Pay Fraud”,
with Rich Lanza, October 30

Copyright © 2013 FraudResourceNet™ LLC

More Related Content

What's hot

Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...EC-Council
 
Cyber Security breakfast briefing - Exeter
Cyber Security breakfast briefing - ExeterCyber Security breakfast briefing - Exeter
Cyber Security breakfast briefing - ExeterPKF Francis Clark
 
Cyber Security breakfast briefing - Bournemouth
Cyber Security breakfast briefing - BournemouthCyber Security breakfast briefing - Bournemouth
Cyber Security breakfast briefing - BournemouthPKF Francis Clark
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
The State of Corporate Fraud, Survey 2018
The State of Corporate Fraud, Survey 2018The State of Corporate Fraud, Survey 2018
The State of Corporate Fraud, Survey 2018aakash malhotra
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Bryan Smith
 
Presentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligencePresentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligenceethiXbase
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_readingseadeloitte
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Shawn Tuma
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudFraudBusters
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixFixNix Inc.,
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesBusiness Controls, Inc.
 
Third Party Due Diligence - Case Study Discussion
Third Party Due Diligence - Case Study DiscussionThird Party Due Diligence - Case Study Discussion
Third Party Due Diligence - Case Study DiscussionSam Gibbins 紀俊森
 

What's hot (20)

Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
 
Cyber Security breakfast briefing - Exeter
Cyber Security breakfast briefing - ExeterCyber Security breakfast briefing - Exeter
Cyber Security breakfast briefing - Exeter
 
Cyber Security breakfast briefing - Bournemouth
Cyber Security breakfast briefing - BournemouthCyber Security breakfast briefing - Bournemouth
Cyber Security breakfast briefing - Bournemouth
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
The State of Corporate Fraud, Survey 2018
The State of Corporate Fraud, Survey 2018The State of Corporate Fraud, Survey 2018
The State of Corporate Fraud, Survey 2018
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016
 
Presentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due DiligencePresentation: Compliance & Third Party Due Diligence
Presentation: Compliance & Third Party Due Diligence
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_reading
 
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
Collin County Bench Bar Conference: Cybersecurity Mitigation & Compliance Str...
 
Vc us v4.0
Vc us v4.0Vc us v4.0
Vc us v4.0
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
Lets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNixLets understand the GRC market well with Ponemon analysis- FixNix
Lets understand the GRC market well with Ponemon analysis- FixNix
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace Issues
 
Do you have an identity theft protection plan
Do you have an identity theft protection planDo you have an identity theft protection plan
Do you have an identity theft protection plan
 
Third Party Due Diligence - Case Study Discussion
Third Party Due Diligence - Case Study DiscussionThird Party Due Diligence - Case Study Discussion
Third Party Due Diligence - Case Study Discussion
 

Similar to Establishing an Organization Wide Fraud Policy

Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraudBusters
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudFraudBusters
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataFraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsFraudBusters
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughFraudBusters
 
Anti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud CultureAnti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud CultureFraudBusters
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisFraudBusters
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...Craig Taggart MBA
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsAbhishek Bali
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning EssentialsFraudBusters
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Craig Taggart MBA
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudFraudBusters
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...Craig Taggart
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...FraudBusters
 

Similar to Establishing an Organization Wide Fraud Policy (20)

Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card FraudUsing Data Analytics to Detect and Prevent Corporate and P-Card Fraud
Using Data Analytics to Detect and Prevent Corporate and P-Card Fraud
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
Anti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud CultureAnti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
Anti-Fraud Professional’s Guide to Building an Anti- Fraud Culture
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
Financial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR AdvisorsFinancial crimes compliance Brochure - BMR Advisors
Financial crimes compliance Brochure - BMR Advisors
 
Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
Society of Corporate Compliance and Ethics SCCE 2015 developing an effective ...
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
ComplianceOnline PPT Format 2015 Developing an Effective Fraud Risk Managemen...
 
Anti-Malvertising Guidelines
Anti-Malvertising GuidelinesAnti-Malvertising Guidelines
Anti-Malvertising Guidelines
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 

More from FraudBusters

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterFraudBusters
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsFraudBusters
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud DetectionFraudBusters
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsFraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudFraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best PracticesFraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsFraudBusters
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsFraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisFraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudBusters
 

More from FraudBusters (13)

Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Think Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a FraudsterThink Like a Fraudster to Catch a Fraudster
Think Like a Fraudster to Catch a Fraudster
 
Catch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data AnalyticsCatch T&E and P-Card Fraudsters Using Data Analytics
Catch T&E and P-Card Fraudsters Using Data Analytics
 
Quick Response Fraud Detection
Quick Response Fraud DetectionQuick Response Fraud Detection
Quick Response Fraud Detection
 
Finding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit SoftwareFinding Payroll Fraud Using Audit Software
Finding Payroll Fraud Using Audit Software
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data AnalyticsIs Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Recently uploaded

The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfGale Pooley
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceanilsa9823
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfGale Pooley
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Call Girls in Nagpur High Profile
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfGale Pooley
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Pooja Nehwal
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfGale Pooley
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modellingbaijup5
 

Recently uploaded (20)

The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
The Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdfThe Economic History of the U.S. Lecture 17.pdf
The Economic History of the U.S. Lecture 17.pdf
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
 
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
Independent Call Girl Number in Kurla Mumbai📲 Pooja Nehwal 9892124323 💞 Full ...
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
VIP Call Girl in Mira Road 💧 9920725232 ( Call Me ) Get A New Crush Everyday ...
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
The Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdfThe Economic History of the U.S. Lecture 21.pdf
The Economic History of the U.S. Lecture 21.pdf
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
Basic concepts related to Financial modelling
Basic concepts related to Financial modellingBasic concepts related to Financial modelling
Basic concepts related to Financial modelling
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 

Establishing an Organization Wide Fraud Policy

  • 1. Establishing an Organization Wide Fraud Policy October 8, 2013 Special Guest Panelist: Paul McCormack, CFE Copyright © 2013 FraudResourceNet™ LLC About Jim Kaplan, MSc, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors  Auditor, Web Site Guru, Internet for Auditors Pioneer Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Copyright © 2013 FraudResourceNet™ LLC
  • 2. About Paul McCormack, CFE  18 years of fraud, litigation and business consulting experience  Worked directly with agents from federal, state and local law enforcement agencies including the F.B.I., G.B.I., D.E.A., and the Secret Service  Previously managed fraud departments for SunTrust Bank, & Delta Air Lines  Frequently writes and speaks on topics involving fraud, cyber security, intellectual property theft and money laundering  Certified Fraud Examiner since 2002 Copyright © 2013 FraudResourceNet™ LLC Webinar Housekeeping This webinar and its material are the property of FraudResourceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We will be recording the webinar and you will be provided access to that recording within 5-7 business days after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Please complete the evaluation to help us continuously improve our Webinars. Unless you are participating in a group that is viewing this Webinar on a common computer screen, you must answer the polling questions to qualify for CPE per NASBA. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet™ LLC
  • 3. Disclaimers  The views expressed by the presenters do not necessarily represent the views, positions, or opinions of FraudResourceNet LLC (FRN) or the presenters’ respective organizations. These materials, and the oral presentation accompanying them, are for educational purposes only and do not constitute accounting or legal advice or create an accountant-client relationship. While FRN makes every effort to ensure information is accurate and complete, FRN makes no representations, guarantees, or warranties as to the accuracy or completeness of the information provided via this presentation. FRN specifically disclaims all liability for any claims or damages that may result from the information contained in this presentation, including any websites maintained by third parties and linked to the FRN website Any mention of commercial products is for information only; it does not imply recommendation or endorsement by FraudResourceNet LLC Copyright © 2013 FraudResourceNet™ LLC 4 Today’s Agenda  Introduction: Fraud Statistics: The Growing Fraud Threat  Auditing for Fraud: Standards & Essentials  Ethics policy vs. Fraud policy  Components of a fraud policy  Pros & Cons of a fraud policy  Creation and ownership – best practices  “Behind the scenes” – making the policy work  Traps to avoid  Embedding the policy in the corporate DNA  Your Questions  Conclusion Copyright © 2013 FraudResourceNet™ LLC
  • 4. Fraud: The Big Picture According to major accounting firms, professional fraud examiners and law enforcement:  Fraud jumps significantly during tough economic times  Business losses due to fraud increased 20% in last 12 months, from $1.4 million to $1.7 million per billion dollars of sales. (Kroll 2010/2011 Global Fraud Report)  Average cost to for each incident of fraud is $160,000 (ACFE) Of Financial Statement fraud: $2 million  Approx. 60% of corporate fraud committed by insiders (PwC)  Approx. 50% of employees who commit fraud have been with their employers for over 5 years (ACFE) Copyright © 2013 FraudResourceNet™ LLC The Auditor’s Role  1200: Proficiency and Due Professional Care  1220: Due Professional Care  2060: Reporting to Senior Management and the Board  2120: Risk Management  2210: Engagement Objectives Copyright © 2013 FraudResourceNet™ LLC
  • 5. Ethics Policy vs. Fraud Policy  Fraud, ethics and code of conduct are often used interchangeably – not always correct to do so  Ethics policy is a set of principles of conduct within an organization - guide “day to day” decision making and behavior. It serves as the “moral compass” for the organization  A fraud policy has a much narrower focus. It addresses fraudulent conduct by employees and third parties  Creating a stand alone fraud policy shines a much needed light on fraud prevention Copyright © 2013 FraudResourceNet™ LLC Fraud Policy – One Element of Ethics / Code of Conduct Ethics Program Discrimination & Harassment Information Security Compliance with Laws Copyright © 2013 FraudResourceNet™ LLC Conflict of Interest Fraud Policy
  • 6. Fraud Policy – Pros & Cons • Establishes expectations • Creates basis for HR discipline Pros • Ensures consistent approach • Enhances “perception of detection” and prevents fraud • Can alienate employees Cons • Creates expectations that the company may not always meet • Can be time consuming to create and monitor over time Copyright © 2013 FraudResourceNet™ LLC So what does a fraud policy include? A fraud policy contains the following:  Details on what constitutes fraud and to whom the policy applies  Details employees’ / management’s responsibility to report fraud  List of channels available to report suspect activity – multiple and independent  Areas within the company that are responsible for investigating fraud (note: it is not a “regular” employee’s job)  Statement that all investigations will be conducted in a consistent manner without consideration of rank or tenure Copyright © 2013 FraudResourceNet™ LLC
  • 7. Polling Question 1 An organization’s fraud policy should be _________ its Ethics Program A. Part of B. Supplemental to C. Completely separate from Copyright © 2013 FraudResourceNet™ LLC So what does a fraud policy include? (cont.) A fraud policy contains the following:  Details of organization’s tip-reporting channels (hotline, website, Email, phone, etc) and how to use them  Retaliation / Cover up not permitted  Commitment to cooperate with law enforcement as appropriate  Disciplinary ramifications for committing fraud  Periodic reporting requirements Copyright © 2013 FraudResourceNet™ LLC
  • 8. Creation and ownership – who’s on first? • Cross divisional impact – need to ensure everyone on board • Executive management, HR, Legal, Internal Audit, Corporate Security Identify stakeholders • Detail why a fraud policy is needed • Clearly define goals and objectives Develop a charter • Who will create the content? Who will approve the final version within each department? • “Behind the Scenes” - document the investigation process Assign roles Secure final executive approval • Which executives will approve the policy? • How will the new policy be communicated? Develop a follow up process • Develop a timetable to follow up and revisit the overall effectiveness of the fraud policy Copyright © 2013 FraudResourceNet™ LLC Implementation Initial Assessment Detailed Analysis • If applicable, review existing fraud policies and procedures • Review fraud prevention training / new hire process • Review information gathered during initial assessment for gaps • Document gaps and share with stakeholder. Include recommendations to bridge gaps • Management knowledge, investment and oversight Future State Design and Development • Use results of the initial assessment and gap analysis to develop fraud policy • Prior to implementation, share fraud policy with stakeholders/executive sponsor for approval Implementation • Once approved, develop implementation timetable and communicate to steering committee • Track and report status, including roadblocks encountered with stakeholders Copyright © 2013 FraudResourceNet™ LLC
  • 9. Polling Question 2 A basic fraud policy should include which of the following? A. Retaliation / Cover up not permitted B. Commitment to cooperate with law enforcement as appropriate C. Disciplinary ramifications for committing fraud D. Periodic reporting requirements E. All of the above Copyright © 2013 FraudResourceNet™ LLC “Behind the Scenes” – Clear Lines of Responsibility Copyright © 2013 FraudResourceNet™ LLC
  • 10. Sample Fraud Policy from ACFE Copyright © 2013 FraudResourceNet™ LLC Sample Fraud Policy from ACFE Copyright © 2013 FraudResourceNet™ LLC
  • 11. Sample Fraud Policy from ACFE Copyright © 2013 FraudResourceNet™ LLC Sample Fraud Policy from ACFE Copyright © 2013 FraudResourceNet™ LLC
  • 12. Polling Question 3 Accoording to the ACFE, ________________ is responsible for detection and prevention of fraud A. B. C. D. Internal audit Management Audit Committee Everyone who works for the organization Copyright © 2013 FraudResourceNet™ LLC Sample Fraud Policy from ACFE Copyright © 2013 FraudResourceNet™ LLC
  • 13. Sample Fraud Policy from ACFE Copyright © 2013 FraudResourceNet™ LLC Sample Fraud Policy from ACFE Copyright © 2013 FraudResourceNet™ LLC
  • 14. Traps to avoid  Strike the right tone – Fraud policy is designed to protect the company and its employees. Avoid treating all employees as “guilty until proven innocent”  Make sure everyone is on board – Fully address concerns raised by senior executives early in the process  Don’t forget foreign operations – If your company operates overseas, make sure that the policy is legally applicable  Practice what you preach – Departures from policy should be few and far between. If too prescriptive, leave it out  “Out of sight, out of mind” – Don’t create then ignore the policy Copyright © 2013 FraudResourceNet™ LLC Polling Question 4 An employee who reports a possible fraud should never be told not to discuss the incident with anyone else in the organization A. B. True False Copyright © 2013 FraudResourceNet™ LLC
  • 15. Embedding the policy in the corporate DNA  Include the fraud policy as a separate section within the code of conduct or ethics policy. Cross-reference where appropriate  Include discussion of the fraud policy/code of conduct during new hire orientation  Once a year, require mandatory training on the code of conduct (online or face to face). Training should include a final exam that includes scenarios to test the employee’s application of the code  Include a “signed” affirmation of the employee’s participation in the course as well as their final exam within their personnel file (an actual or electronic signature is appropriate) Copyright © 2013 FraudResourceNet™ LLC Embedding the policy in the corporate DNA (cont.)  Adhere to the fraud policy in all respects. Example: If the fraud policy stipulates that all allegations will be investigated within X of days, make sure that takes place  Without naming names, publicize instances where the fraud policy was used to terminate an employee  Ensure that senior executives routinely mention the company’s code of conduct in their speeches and written communications to employees  Display code of conduct related posters in employee break rooms. (Make sure they are replaced if damaged or appear worn) Copyright © 2013 FraudResourceNet™ LLC
  • 16. Polling Question 5 Fraud policies should always avoid taking the tone of A. Innocent until proven guilty B. Guilty until proven innocent C. Everyone in the organization should be part of the detection and prevention effort D. None of the above Copyright © 2013 FraudResourceNet™ LLC Questions?  Any Questions? Don’t be Shy! Copyright © 2013 FraudResourceNet™ LLC
  • 17. Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Paul McCormack CFE paulmccor2008@gmail.com Copyright © 2013 FraudResourceNet™ LLC Coming Up This Month  “Using Data Analytics to Detect and Deter Procure-to-Pay Fraud”, with Rich Lanza, October 30 Copyright © 2013 FraudResourceNet™ LLC