Term
|
Definition
These are schemes which include the theft of company assets such as cash or inventory, and the misuse of company assets, such as using a company car for a personal trip. |
|
|
Term
TYPES OF
ASSET MISAPPROPRIATION
|
|
Definition
- Skimming
- Cash Larceny
- Fraudulent Disbursements
|
|
|
Term
|
Definition
Skimming is the process by which cash is removed from the entity before it enters the accounting system. This is an off-book scheme because the receipt of the cash is never reported to the entity. |
|
|
Term
|
Definition
· Unrecorded sales
· Understated sales and receivables
· Theft of checks through the mail
· Short-term skimming
|
|
|
Term
|
Definition
An employee sells goods or services to a customer, collects the customer’s payment at the point of sale, but makes no record of the transaction.
|
|
|
Term
METHODS OF
UNRECORDED SALES |
|
Definition
Register Manipulation
In order to conceal their thefts, some employees might ring a “no sale” or other non cash transaction to mask the theft of sales.
|
|
|
Term
UNDERSTATED
SALES AND RECEIVABLES |
|
Definition
This is the posting of transactions to the books, but for a lower amount than the perpetrator collected from the customer. |
|
|
Term
METHODS OF UNDERSTATED
SALES AND RECEIVABLES |
|
Definition
False Discounts:
Finally, sales or receivables might be understated by the use of false discounts. Employees with the authority to grant discounts may use this authority to skim revenues. |
|
|
Term
THEFT OF CHEQUES
THROUGH THE MAIL |
|
Definition
Theft of incoming checks usually occurs when a single employee is in charge of opening the mail and recording the receipt of payments. This employee simply takes one or more of the incoming checks; since these checks are not logged as received, the payment is not posted to the customer account. |
|
|
Term
|
Definition
Short-term skimming is the use of skimmed money. The fraudster keeps the stolen money only for a short while before eventually passing the payment on to the employer. The employee merely delays the posting. |
|
|
Term
CONVERTING STOLEN CHEQUES |
|
Definition
Intelligent fraudsters generally prefer to skim currency rather than checks, if given the opportunity as currency is harder to trace than a check. |
|
|
Term
METHODS OF
CONVERTING STOLEN CHEQUES |
|
Definition
Dual Endorsements
When checks are payable to a business, they can be
endorsed simply by writing the company’s name on the back
of the check.
The company’s endorsement only provides for
the check to be deposited into a company account.
A second endorsement will be required if the employees are
to cash the check or deposit it into an account they control. |
|
|
Term
METHODS OF CONVERTING
STOLEN CHEQUES |
|
Definition
False Company Accounts
Some cases involve the use of “similar name” accounts to launder skimmed funds. A similar name account is one that fraudster’s open independently of the company in order to deposit cheques with ease.
|
|
|
Term
METHODS OF CONVERTING
STOLEN CHEQUES |
|
Definition
Altered Payee Designation
A more direct way for an employee to convert a stolen check is to alter the check so that it is payable to that employee or an accomplice.
|
|
|
Term
METHODS OF CONVERTING
STOLEN CHEQUES |
|
Definition
Cheque for currency substitutions
Converting cheque to cash by swapping/ substituting cheques for receipted cash |
|
|
Term
|
Definition
Destroying or altering records of transaction
e.g discarding register
tapes resulting in no trail leading to the perpetrator. |
|
|
Term
CONCEALING RECEIVABLES
SKIMMING FRAUD |
|
Definition
Lapping
Robbing Peter to pay Paul, crediting an account through the abstraction of money from another account. It continues indefinitely until;
· Someone discovers the scheme
· Restitution is made to the account
· Some concealing entry is made to adjust the accounts receivable balances. |
|
|
Term
METHODS OF CONCEALING RECEIVABLES
SKIMMING FRAUD |
|
Definition
Stolen Statements
Theft or alteration of accounting statements. |
|
|
Term
CONCEALING RECEIVABLES
SKIMMING FRAUD |
|
Definition
False account entries
Making false entries in a victim company’s accounting system through:
· Debit accounts: unsupported debit entries in the accounting system of a company. For example debiting an expense account.
· Debiting existing or fictitious accounts
· Writing off account balances: writing off account balances as bad debt. |
|
|
Term
CONCEALING RECEIVABLES
SKIMMING FRAUD |
|
Definition
Inventory Padding
Off book sales of goods which lead to inventory shortage or shrinkage. Does not occur with sales of services. High levels of shrinkage serve as a warning of fraudulent activities in a accompany. |
|
|
Term
|
Definition
Larceny is the taking away of cash or cash equivalents without the consent and against the will of the employer. Cash larceny schemes involve the theft of money that has already appeared on a company’s books. |
|
|
Term
|
Definition
Write Off Schemes: Debtor pays, employee pockets money and writes off amount as bad debt.
Lapping Schemes: Extraction of money from one account to credit another account. Robbing peter to pay Paul
Unconcealed: Physically taking an asset and walking away. |
|
|
Term
METHODS: THEFT OF CASH
FROM THE REGISTER |
|
Definition
Theft from other registers:
Taking money from someone else’s register. This deflects attention from the real thief.
Death by a thousand cuts:
An unsophisticated method of stealing money. Stealing money in small amounts over a long period of time. |
|
|
Term
METHODS: THEFT OF CASH
FROM THE REGISTER |
|
Definition
Altering Cash counts/ Cash register tapes
Altering cash counts to hide the difference
in figures between register tapes and actual cash.
|
|
|
Term
METHODS: THEFT OF
CASH FROM REGISTER |
|
Definition
Reversing transactions:
Going back after a sale to alter records through the use of discounts for example, employee pockets.
Destroying register tapes:
Getting rid of register tapes to hide fraud |
|
|
Term
METHODS OF
CONCEALING OF LARCENY |
|
Definition
Force Balancing:
Making unsupported entries in the company’s books to produce a
fictitious balance between receipts and ledgers. As a result of poor
segregation of duties.
Reversing entries:
Used to balance company accounts by using discounts for example |
|
|
Term
|
Definition
Destruction of records:
Discarding of fraudulent records.
Cash larceny from the deposit:
Stealing of money by employee assigned to
deposit funds in the bank. |
|
|
Term
CONCEALING OF
LARCENY FROM DEPOSIT |
|
Definition
Lapping with subsequent receipts:
Taking today's deposit to cover yesterday’s. Post missing money as deposit in transit |
|
|
Term
METHODS OF
UNRECORDED SALES |
|
Definition
Skimming During Non-business Hours:
conducting sales during non-business hours. For instance, some employees have been caught running their employers’ stores on weekends or after hours without the knowledge of the owners.
|
|
|
Term
METHODS OF
UNRECORDED SALES |
|
Definition
Skimming of Off-Site Sales
skimming of sales by off-site employees.
|
|
|
Term
METHODS OF
UNRECORDED SALES |
|
Definition
Poor Collection Procedures
Poor collection and recording procedures can make it easy for an employee to skim sales or receivables. |
|
|
Term
|
Definition
An employee submits a report detailing an expense incurred for a bus purpose. It explains purpose, time, date and location here it was incurred. |
|
|
Term
METHODS OF
EXPENSE REIMBURSEMENT
|
|
Definition
1. Mischaracterised expenses
2. Overstated expenses
3. Fictitious expense schemes
4. Multiple reimbursements |
|
|
Term
MIS-CHARACTERISED
EXPENSES |
|
Definition
Requesting reimbursement
for personal expense
claiming to be business related |
|
|
Term
OVERSTATED
EXPENSE REPORTS |
|
Definition
The actual business cost is overstated through;
· Altered receipts, to reflect a higher cost than what was actually paid.
· Over purchasing. Paying less and getting an expensive receipt.
· Overstating another employees expenses.
· Orders to overstate expenses. Inflate expenses by the boss and return the proceeds to them. |
|
|
Term
PROCESS OF FICTITIOUS
EXPENSE SCHEMES |
|
Definition
- Creating a purchase that needs reimbursement
- Producing fictitious receipts
- Obtaining blank receipts from vendors and filling the amount to be reimbursed
|
|
|
Term
FICTITIOUS
EXPENSE SCHEMES |
|
Definition
- Claiming expenses of others –actual receipts paid by others and basing your claim on them.
- Receiving a reimbursement without actually incurring a business expense
|
|
|
Term
|
Definition
One expense is submitted several times.
The victim company pays twice or more for the same expense |
|
|
Term
PAYROLL AND EXPENSE
REIMBURSEMENT SCHEMES |
|
Definition
1. Ghost employees
2. Commission schemes
3. Falsified wages |
|
|
Term
|
Definition
Fictitious or real person not working for the victim company but gets paid by it. |
|
|
Term
METHODS OF GHOST
EMPLOYEE SCHEMES |
|
Definition
Fraudster makes sure the following methods are followed;
Addition to payroll
Time keeping and wage rate information must be collected
A pay check is then issued for ghost employee
Cheque must be delivered to perpetrator or accomplice |
|
|
Term
OTHER METHODS OF GHOST
EMPLOYEE SCHEMES |
|
Definition
Create name similar to existing employee
Delay submission of resignation notices and falsifies time sheets
Taking paid leave but no deduction from allotted days, sort of unsanctioned bonus
Change pay rate to receive higher amounts |
|
|
Term
|
Definition
Commission are wages as a percentage of amounts an employee generates (sales) |
|
|
Term
METHODS OF
COMMISSION SCHEMES |
|
Definition
· Falsifying or altering the amount of sales made-altering the sales figures made and converting the sales of others
· Increasing rate of commission |
|
|
Term
|
Definition
This is a fraud that attacks the payments system of a business. It is designed to cause the business to make a fraudulent payment to the employee, whilst recording the payment as a legitimate business expense. |
|
|
Term
|
Definition
Shell company schemes: Occur when an employee submits invoices for payment from a fictitious company controlled by the employee. Use a fake entity established by a dishonest employee to bill a company for goods or services it does not receive. The employee converts the payment to his or her own benefit. |
|
|
Term
METHODS OF
SHELL COMPANY SCHEMES |
|
Definition
i. Forming a shell company
ii. Submitting false invoices
iii. Safe approval of fraudulent invoices
iv. Rubber stamps supervisors |
|
|
Term
METHODS OF
SHELL COMPANY SCHEMES |
|
Definition
i. Reliance on false documents
ii. Collusion
iii. Purchases of services rather than goods
iv. Pass through schemes |
|
|
Term
NON-ACCOMPLICE
VENDOR SCHEMES |
|
Definition
Occur when an employee arranges for overpayment of a vendor invoice and pockets the overpayment amount when it is returned to the company. |
|
|
Term
METHODS OF
NON-ACCOMPLICE
VENDOR SCHEMES |
|
Definition
i. Pay and return schemes
ii. Overbilling with a non-accomplice vendor invoices |
|
|
Term
PERSONAL
PURCHASE SCHEMES |
|
Definition
Occur when an employee submits an invoice or credit card for personal purchases to the company for payment. |
|
|
Term
METHODS OF PERSONAL
PURCHASE SCHEMES |
|
Definition
Personal purchases through false invoicing
· Fraudster as authorised on invoices
· Falsifying documents to obtain authorisation
· Altering existing purchase orders
· False purchase repositions |
|
|
Term
METHODS OF PERSONAL
PURCHASE SCHEMES |
|
Definition
Personal purchase on credit cards or other company accounts
· Charge accounts
· Returning merchandise for cash |
|
|
Term
|
Definition
- Forged Marker
- Forged Endorsement
- Altered Payee
- Concealed Cheques
- Authorised Marker
|
|
|
Term
|
Definition
Forging an authorised signature on a company check.
For this to occur, the employee must have:
– Convincing forgery of the authorisor / maker’s signature
– Access to a blank cheque |
|
|
Term
|
Definition
Employees with access to company cheques
–usually in relevant position of authority e.g. office managers |
|
|
Term
|
Definition
Employees lacking official access to company cheques
–steal one if cheque book poorly guarded (or steal one returned by another)
–produce counterfeit cheques
»using printer and PC/professional printers
»relatively difficult to forge cheque with the organisation’s bank details |
|
|
Term
FORGED ENDORSEMENTS /
INTERCEPTED CHEQUE
SCHEMES |
|
Definition
Perpetrator intercept cheques and steal before they are delivered to the intended payees. Then they forged signatures for endorsements. |
|
|
Term
FORGED ENDORSEMENTS /
INTERCEPTED CHEQUE
SCHEMES |
|
Definition
–intercepts a company cheque intended for a third party
–mail room personnel can open and steal outgoing mail containing signed cheques
–converts the cheque by forging the signature of the third party’s (payees) name on the back of the cheque
–forges recipient’s signature not that of maker |
|
|
Term
|
Definition
Employee intercepts company cheques intended for third party. Changes the payee designation on the check to the perpetrator or an accomplice.
|
|
|
Term
|
Definition
A check tampering scheme whereby an employee prepares a fraudulent check(Stolen or Forged) and submits the concealed check usually along with legitimate checks to an authorised maker who signs it without a proper review.
|
|
|
Term
AUTHORISED MARKER
SCHEMES |
|
Definition
When employees with signature authority write fraudulent cheques for their own benefit. |
|
|
Term
OVERRIDING CONTROLS
THROUGH INTIMIDATION |
|
Definition
- Easy for high ranking employees to obtain access to blank cheques
- Perpetrators use influence to override controls
|
|
|
Term
|
Definition
–In converting the cheque, the perpetrator must endorse it
–cheques made payable to “cash” require the endorsement of the person converting the cheque thus leaving a clue as to the identity of the forger
–In such cases, fake identification may be needed
|
|
|
Term
|
Definition
–One way to conceal the fraud is to miscode the cheque
–Miscoding is typically used as a concealment method only by those employees who have access to the cash disbursements journal
–If a forged maker scheme is undertaken by an employee without access to the cash disbursements journal
He/she usually makes no entry whatsoever to conceal her scheme |
|
|
Term
INVENTORY AND
NON-OTHER CASH ASSETS |
|
Definition
Involves misuse or theft of organisation’s non-cash assets i.e.
- physical assets (equipment and supplies, inventory for sale)
- information
- securities
Misuse = unauthorised use of firm’s assets (temporary)
Theft = unauthorised removal of firm’s assets (permanent)
|
|
|
Term
EXPLAIN MISAPPROPRIATION OF
INTANGIBLE
NON-CASH ASSETS |
|
Definition
organisations are vulnerable to theft of proprietary information
can undermine firm’s value, reputation, and competitive advantage
can result in legal liabilities
Two main forms:
–information
–securities
|
|
|
Term
MISAPPROPRIATION OF
INFORMATION |
|
Definition
employees often misappropriate valuable information
especially competitively sensitive information such as:
trade secrets (R & D)
marketing strategies
customer lists
Can result in legal liabilities
Companies must seek to identify most valuable information and take steps to protect it |
|
|
Term
MISAPPROPRIATION OF
SECURITIES |
|
Definition
Securities = financing or investment instruments bought and sold in financial markets, such as bonds, shares/stocks
Firm may hold securities as part of investment portfolio
One might include clients’ accounts (or even cheques) in a wide definition
|
|
|
Term
MISAPPROPRIATION OF
SECURITIES |
|
Definition
Fraudsters could trade/use these
Companies must maintain proper internal controls over their
– including separation of duties, restricted access, and account reconciliations |
|
|
Term
MISAPPROPRIATION OF
PHYSICAL
NON-CASH ASSETS |
|
Definition
Mis-use or theft of firm’s:
Vehicles »not so easy to steal
Office equipment »computers, printers, paper, pens etc. smaller, relatively easier to steal
Inventory (goods or services) »depends upon firm, relatively easier to steal |
|
|
Term
MISAPPROPRIATION OF
PHYSICAL NON-CASH
ASSETS EXAMPLES |
|
Definition
Example of Mis-use range from
–employees ‘borrowing’ tools to do work at home
–employees doing personal work on company time
–some have run own (competing) businesses on company time, using company equipment! |
|
|
Term
MIS-USE OF
PHYSICAL NON-CASH
ASSETS |
|
Definition
–unauthorised use of equipment can mean additional wear and tear.
–risks possible non-return (theft) of asset.
–loss of productivity (for example, working in firm’s time).
–may need to hire additional employees to compensate.
–even lost business if employee’s side-business competes.
|
|
|
Term
|
Definition
Greater concern than mis-use of assets because theft = permanent
TWO types
Unconcealed
Involves taking of assets without attempting to conceal
–i.e. no change to firm’s record/books
Concealed |
|
|
Term
UNCONCEALED LARCENY (THEFT)
IN BROAD DAY LIGHT |
|
Definition
co-workers do not suspect mis-use/theft
–people tend to think that their co-workers are acting honestly
–assume the culprit has a legitimate reason to remove the asset
|
|
|
Term
UNCONCEALED LARCENY (THEFT)
IN BROAD DAY LIGHT |
|
Definition
co-workers do suspect but ignore illegal conduct because of:
–collusion i.e. participate
–loyalty to friends
–sympathy to plight of fellow worker (us vs. them (management) mentality)
–intimidation by perpetrator (esp. if in senior position)
–don’t feel confident in informing (lack of proper whistle blowing procedures) |
|
|
Term
|
Definition
most schemes are not complex
often done in
–broad day light /full view of others / colleagues otherwise
–after-hours (when colleagues have gone home) or
–disguised (mailed off-site so no colleagues watching)
|
|
|
Term
|
Definition
use external mail to send to a location where they can be collected
use internal delivery system to send to a less / un-supervised site
–latter riskier need to gain authorisation to get items delivered |
|
|
Term
ASSET REQUISITIONS
AND TRANSFERS |
|
Definition
fraudsters often move physical non-cash assets to less secure by:
–fabricating a project in a safe(r) location
–exaggerating supplies needed for a project in a safe(r) location
|
|
|
Term
ASSET REQUISITIONS
AND TRANSFERS |
|
Definition
–need to be in position of authority (often need accomplice who steals)
–if not accomplice in authority - need to falsifying or forge property transfer forms
self-authorised transfer documents may raise suspicion, sometimes forge documents
|
|
|
Term
FAKE SALE OF
NON CASH ASSETS |
|
Definition
employee “sells” merchandise to outside accomplice but either:
accomplice does not pay
–sometimes returns it later to get refund (depends if receipt required)
employee does not ring up the sale (less obvious) |
|
|
Term
FAKE SALE OF
NON CASH ASSETS |
|
Definition
either way, accomplice takes the merchandise without paying
conduct transaction so that looks normal to casual by-stander
then split profits |
|
|
Term
|
Definition
Involves stealing assets from inventory then concealing the theft by creating false shipping and sales documents to make it appear that the inventory was sold. |
|
|
Term
CONCEALMENT OF
FAKE SHIPPING
AND SALES |
|
Definition
To hide the theft a ‘false sale’ is created
–so that is appears that the missing inventory is shipped to the customer
Fake receivable goes into the books
–fake receivable is then aged and written off
|
|
|
Term
CONCEALMENT OF
FAKE SHIPPING
AND SALES |
|
Definition
Variation = Understate legitimate sale
i.e. send amount
bill accomplice in another firm for less than amount delivered
share profits from difference (inventory delivered but not paid for) |
|
|
Term
PURCHASING AND RECEIVING
SCHEMES |
|
Definition
Manipulate firm’s purchasing/receiving functions to facilitate theft
Person in charge of receiving goods falsifies records of incoming shipments
–marks the shipments as "short" and steal the excess
–reject portion of the shipment as being substandard and steal “substandard”
|
|
|
Term
PURCHASING AND RECEIVING
SCHEMES |
|
Definition
Concealment issue
– if the receiving report does not match the vendor’s invoice, there will be a problem with payment |
|
|
Term
|
Definition
assets can be
–written-off in order to make them available for theft
–declared as scrap (employee allowed to dispose)
new replacement equipment can be ordered for the company
–new equipment is sent elsewhere for collection by internal fraudster leaving old equipment in place |
|
|
Term
CONCEALING SHRINKAGE
IN NON-CASH ASSET
MISAPPROPRIATION
SCHEMES |
|
Definition
Alter inventory records
Create fictitious sales and adjust accounts receivable
Write off inventory and other assets
Physical padding |
|
|
Term
|
Definition
Change inventory record so that it will match the physical inventory count (inventory on hand )
i.e. forced reconciliation of the account
Deleting or covering up the correct totals and entering new totals
Need to have access to accounts (and feel one can get away with it) |
|
|
Term
CREATE FICTITIOUS SALES
AND ADJUST
RECEIVABLE
|
|
Definition
Charge sale to existing account
–in some cases the fraudster charge fake sale to existing receivables that are so large that the additional stolen asset is no noticed
|
|
|
Term
WRITE OFF INVENTORY
AND OTHER ASSETS
|
|
Definition
Writing off inventory as "obsolete" or “damaged” (as opposed to charging to accounts that will be written off).
fraudster can write supplies off as lost or destroyed and can proceed to sell the supplies through his/her own company for his/her own gain.
common way to remove assets from the books eliminates the inherent problem of shrinkage in asset misappropriation schemes.
|
|
|
Term
|
Definition
Creates the illusion more inventory
exists than is actually on hand
Examples:
–empty boxes may be stacked on shelves and create an illusion inventory is there
–Stealing some items, leave some real good at top, replace stolen with worthless padding |
|
|
Term
CREATE FICTITIOUS SALES
AND ADJUST
RECEIVABLES |
|
Definition
The fraudster can charge the “sales” to accounts that are already aging and will soon be written off
Write-off to discounts and allowances or bad debt expense
usually need to have access to accounts (and feel one can get away with it) |
|
|