Occupational Fraud. Asset Misappropriation Fraudulent Statements Corruption 3/20/ ACFE Report to the Nations
|
|
- Jade Hodge
- 5 years ago
- Views:
Transcription
1 Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Occupational Fraud Asset Misappropriation Fraudulent Statements Corruption 2012 ACFE Report to the Nations The typical organization loses 5% of its annual revenue to fraud. Frauds last a median of 18 months prior to detection. Asset misappropriation most common. Small organizations disproportionately victimized by occupational fraud. 85% fraudsters never charged or convicted previously. 1
2 Asset Misappropriations Cash Skimming Larceny Billing Disbursements Payroll SKIMMING Theft of cash BEFORE it enters the accounting system. (UNRECORDED SALES). Most difficult misappropriation to prove because usually there are no records of cash. Lapping Schemes Penn State kids cancer drive, local fire department BOOT drive, Salvation Army Red Kettle Campaign, kids sports team fundraisers. Middle School Secretary (Moon Township)~ $50,000 skimmed cash from kids fundraiser deposits. Convenience store manager(penn Hills) ~ $60,000 not ring up sales in register and pocketing money during register reconciliation. Inventory shortages Bookkeeper for medical practice pocketed customer co-pays and cash payments totaling $108, Church Volunteer(downtown) ~ $220,000 stole proceeds from gift card fundraisers. A/R Clerk (Downtown) ~ $51,000 stole incoming rental payments paid by cash. 2
3 LARCENY Theft of cash AFTER it is entered into the accounting system. Stealing money from the bank deposit. Reversing transactions (register voids). Usually requires journal entries to hide Car Dealer A/R Clerk ~ 80,000 stole cash from vehicle purchase and parts/service transactions and created false accounting entries to cover theft. Office Manager (Vet) ~ $425,000 stole cash receipts and used future check to cover shortage. Bank Teller ~ $93,500 cash withdrawals from elderly account holders. BILLING Perpetrator uses false documents (invoice, purchase order, credit card bill) to cause his employer/customer to issue a payment for what appears to be a fraudulent dl purpose. 3 types: Shell Company (usually provides service) Vendor Schemes Personal Purchases 3
4 EMS Secretary ~ $77,000 used EMS account debit card for her personal expenses. Meadows Purchasing Manager ~ $250,000 created 2 shell companies to provide cleaning to satellite locations. Office Manager ~ $57,000 personal expenses charged on company credit cards. Goodwill Controller ~ $50,000 Opened AMEX card in company name and used it for her personal expenses. PAYROLL 3 Types of schemes: Ghost Employee Commission Falsified Hours and Salary Schemes Medical Supply Company salesman ~ $79,000 created false invoices to obtain fraudulent commission. Shipped orders to UPS store and hid them in storage facilities. Payroll Clerk ~ $150,000 Extra and increased payroll. Trucking company payroll clerk ~ $200,000 extra payroll checks and stolen company checks. Office Manager/Payroll Clerk (vet multiple locations) ~$137,000 & $216,000 increased their payroll. Payroll billing company ~ $81,000 ghost employees. 4
5 DISBURSEMENTS Check Tampering Forged Maker Authorized Maker Altered Payee Forged Endorser Expense Reimbursements Borough Manager ~ $17, wrote checks to herself. Office Manager (Optometrist) ~ $200,000 wrote checks to herself and her creditors. Borough Manager ~ $180, wrote extra checks to herself and used borough credit cards/bank accounts for personal expenses. VP of Sales Manufacturing Company ~ $250,000 used same or fake receipts for monthly expense reimbursement request. Corruption Bribery Conflict of Interest Kickbacks Bid Rigging 5
6 Fictitious Revenues Fraudulent Statementst t Asset/Revenue Overstatement Concealed Liabilities or Expenses Timing Differences Fraudulent Statements Enron ~ Ken Lay, Jeff Skillings and Andy Fastow Adelphia ~ John and Timothy Rigas LeNature ~ Potlucky Family Crazy Eddies ~ Sam Anatar Fraud Triangle Pressure Opportunity Rationalization 6
7 Typical Offender Male Age years on the job College degree Accounting, Operations or Sales Department Initial Detection of Fraud Tip (50%) Management Review Internal Audit Accident Account Reconciliation Document Examination External Audit Monitoring Most Vulnerable Organizations Small Companies!!!! Banking/Financial Services Manufacturing Government and Public Administration Retail Healthcare Insurance Construction Technology 7
8 Organizational Red Flags Too much trust in key employees Lack of procedures for authorization No separation of duties Lack of independent checks on performance Department often skipped by auditors Lack of clear lines of authority Inadequate attention to details Individual Red Flags Employee living beyond his means (lifestyle) Overwhelming desire for personal gain Financial difficulties/high personal ldebt Control issues (unwilling to share duties) Refusal to take time off Unusual close association to vendor/customer Pay given not appropriate for responsibilities Undue family or peer pressure to achieve No recognition for job performance Addiction/Gambling Most Frauds Occur due to: Lack of internal controls Override of existing internal controls Lack of management oversight Poor corporate culture/tone at the top Lack of independent checks or audits Lack of employee education Lack of reporting mechanism 8
9 Internal Controls: Billing Install surveillance cameras Segregation of duties Review journal entries for write-off and force balancing entries Bank Reconciliations Review credit card bills Maintain and update an approved vendor list. Cross check employee SS numbers and addresses to vendor ID numbers and addresses. Review the back of all cancelled checks. Purchase authorization Payroll Employee must pick up his own paycheck Separate HR and payroll functions Review payroll checks and payroll summary sheets Segregation of duties Review 1099s at year end Track uncollected sales generated by salesman Randomly sample customers AR balances Check tampering Dual signature required No signature stamp Inspect cancelled checks Compare cancelled checks to accounting system entries Secure unused checks No checks to payable to Cash policy Require vendor checks to be mailed out Segregation of duties Positive Pay at bank 9
10 Expense Reimbursements Require detailed expense reports with original receipts Check receipts against employee vacation schedule and calendar Use travel agency for all travel expenses Require original ticket stubs for air and rail Look for: Amounts ending in 0 or 5 Reimbursements that fall just below the company approval limit Receipts that do not look professional Consecutively numbered receipts Better management oversight Fraud Prevention Tools On-going employee training Hotlines Increase perception of detection Segregation of duties Anti-fraud (Ethics) policies Rewards system Job rotation/cross training Mandatory vacations Surprise Audits Best Practices: Implement internal controls now ~ regardless of the size of the company. Separate staff duties immediately. A trusted employee is valuable but never let any one have the Keys to the Kingdom! Trust no one! Just because an employee has been a valuable employee does not mean that they would not steal from you. Trust your gut instinct. If something does not feel quite right, ask questions. Look at financial documents from 3 rd parties. 10
11 Identity Theft: World s Fastest Growing Crime!! Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person s personal data in some way that involves fraud or deception, typically for economic gain. -U.S. Department of Justice For the 13 th year in a row, identity theft was the #1 consumer complaint to the FTC. In 2012, identity theft reports increased by 32% to 12.6 million cases. Approximately 7% of adults in the United States were affected by identity theft. Florida, Georgia & California top 3 states. Florida double the reports than California. 70% of victims reported difficulty removing information stemming from ID theft from their credit report. Most at risk? Children 35% higher risk than adults. Smart phone owners 33% higher risk than general public. Persons with personal information on a social media site. Deceased people account for 25% of all identity theft. College students because they have good credit. Victims of data breaches have 9.5% higher risk 11
12 Discovery Is KEY!! 50% of victims discover their identity has been stolen within three months. 15% of victims do not discover their identity has been stolen for 4 or more years. Over 50 million Americans are utilizing a credit monitoring service. 44% of consumers view their credit reports using AnnualCreditReport.com or CreditKarma.com Personal Information is Everywhere! Billboard campaign in Western PA features deceased s name, address, date of birth, partial DL number and partial signature. On the Internet Public records on the Internet Free and easy access from home Information such as property ownership, tax assessments and civil court documents. 12
13 At Work Outgoing Mail Businesses and places of employment. Co-workers and visitors have easy access to information. Trash Cans Post it notes Most Common Theft Methods: Skim information from transactions inside a store. Paper mail theft. Hacking computer networks and databases. Redundant IT equipment (external memory sources). Shoulder surfing Dumpster diving Department of Veteran s Affairs, Blue Cross and Blue Shield SC Department of Revenue Hacked Sony Twitter Adobe Systems (October 3, 2013) Citibank Chase Apple I-Phone 13
14 Types of Identity Theft Medical identity theft Child identity theft Senior identity theft Government identity theft Financial identity theft Medical Identity Theft 25,000 Americans are victims of medical identity theft each year. The most difficult identity theft to detect. Thieves steal identities for the purpose of receiving free medical care and as a result create a false medical record for the victim. Consequences include: Incorrect treatment for victims; False health insurance claims filed; Denial of legitimate medical claims. Child Identity Theft 14
15 Minor s identifying information used by another person for imposter s benefit. Perpetrator may be family member or someone known to the family. Daycare workers, nannies, school employees, babysitter, relative, family friend. Targets children because of the length of time it takes to discover the theft. Children were targeted by scammers 35 times more often than adults, with 15% of the victims under the age of five. Senior Identity Theft In 2010, reports of identity theft targeting people 50 and older represented about 28 percent of the total 236,765 cases. More susceptible to acts of deception and manipulation. Worked diligently their whole life to achieve good credit. Seniors rarely check their credit reports. Government Identity Theft Also known as Documents/Benefits Theft Stealing personal information to obtain government assistance such as: Social Security retirement benefits; Social Security disability benefits; Medical insurance; Welfare benefits. Stealing personal information to obtain fraudulent income tax returns IRS identified 642,000 fraudulent tax returns. This is a 3 fold increase over SSA and IRS do not make initial contact using . 15
16 Financial Identity Theft Individuals or businesses can be affected. Personal information everywhere! Billion dollar business. Most common type of identity theft! Retail Merchants and Their Employees Restaurant Employees Bank Employees Drug Abusers Terrorist Groups Organized Crime Members Illegal Immigrants Your Family Members Your Co-Workers Your Employees Neighbors WHO?? WHERE?? Your mailbox Your trash Retailers Restaurants Grocery stores Hospital or health care facilities Discarded/stolen computers Internet Your motor vehicle ATM machines On the telephone Software sharing programs 16
17 HOW?? Phishing Theft of your trash ( Dumpster Diving ) Purse or wallet theft Dishonest employees Public Records Shoulder surfing Pharming Skimming devises Counterfeit documents EBay & Craigslist scams Wedge Identity Theft Schemes Database Hacking Social Engineering Dumpster Diving Skimming Spam - Spyware Dishonest Employee Radio Wave Credit Cards Counterfeit Cards Counterfeit Checks Counterfeit Docs CARD SKIMMING Suspect uses a wedge to store information. contained on credit card strip. Downloads info later to computer. Uses info to create counterfeit cards with your personal information. 17
18 ATM SKIMMING INSTALLING SKIMMER AT THE DRIVE UP ATM CREDIT CARDS Magnetic strip on back made up of tracks similar to an audio tape Information read by swiping card through a reader device Information includes: Your name Account number Issuing bank Standard ATM machine? 18
19 False front is attached to ATM with card reader to copy magnetic strip info on your card Look at the pamphlet holder Note the hole in the side 19
20 Camera/transmitter housed inside Camera can view keypad and monitor and send wireless picture up to 200 meters. Digital Robbery Thermal Imaging Allows ATM Theft From a Distance ATM pins can be stolen using a thermal imaging camera. When ATM users press keys to enter their PIN, they leave behind a residual heat from their fingers. 20
21 TOOLS OF THE TRADE Consumers Rights for Unauthorized Debit and Credit Card Use Fair Credit Reporting Act (FCRA) governs consumers right for fraudulent use of credit cards. Electronic Funds Transfer Act (EFTA) governs consumers right for fraudulent use of debit cards. Consumer protection is stronger for credit cards: Charge-back rights; Credit dispute rights; Credit line available now. 21
22 Debit and Credit Cards Not Equal Debit Cards: If you report within 2 days of discovery, loss is limited to $50; If you report between 3-60 days, loss limited to $500; After 60 days, no protection for fraudulent use of card! Credit Cards: Regardless of report date, loss is limited to $50. If credit card company has a zero liability policy, you still must report losses within 60 days of the fraudulent charges. Safeguarding Information Keep only what personal information is necessary. Properly dispose of sensitive material by shredding it. Utilize anti-virus software and firewalls. Limit access of sensitive information. Conduct background checks on all potential employees. Regularly educate and train employees on security issues. Require strong passwords that are not to be shared. Have a plan to respond to security incidents. Social-Media and Identity Theft Fraudsters are taking note of personal information such as your birth date on social-media sites. Use the highest privacy setting available. Do not accept friend invites from strangers. ANTIVIRUS SOFTWARE! 22
23 PREVENTING IDENTITY THEFT Promptly remove mail from mailbox and deposit outgoing mail in secure receptacles. Empty your purse/wallet of extra credit or ID cards including your social security card. Make a copy of all items in your wallet and keep in secure location. Examine all credit card and bank statements each month. Do not use birthdates, phone numbers or house numbers as PIN. Never write down your PIN. Report stolen credit cards or any transactions that you did not make immediately. Never respond to unknown or phishing s. Shred all solicitations, bills and document with any financial information using a cross cut shredder when discarding. Make inquiries on unexpected bills. If providing financial information over the Internet, ensure the information is encrypted and the site is secure ( Never give out information over the phone. Always shield your hand and the screen when using the ATM machine, even if no one is around. Consider placing a fraud alert on your account with all three major credit bureaus. Never leave transaction receipts behind. Order and review your credit report once a year at or 23
24 IMPORTANT CONTACTS Equifax Experian Transunion FTC FTC-HELP IFCC For victims of fraud on the Internet REMEMBER... When it comes to preventing white collar crime, internal controls are essential! Regardless how small your company is never allow one employee to control all of its vital functions! ~ ~ ~ Get good anti-virus software on your computer and smart phone. Monitor your credit report at least once a year. ~~~ Use common sense if something sounds too good to be true it s a scam! Detective Jackelyn Weibel Allegheny County District Attorney s Office 1444 Hillsdale Avenue Pittsburgh, PA (412) jweibel@da.allegheny.pa.us 24
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types
More informationIdentity Theft: World s Fastest Growing Crime!!
Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements 2016 Association of Certified Fraud Examiners, Inc. Fraudulent Disbursement Schemes Register disbursement schemes
More informationIDENTITY THEFT PROTECT YOUR MONEY
IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that
More informationAsset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE
Asset Misappropriation Peter N. Munachewa, CICA, CFIP, CFE CORPORATE FRAUD AND ABUSE CLASSIFICATION SYSTEM Corruption Asset Misappropriation Fraudulent Statements Conflicts of Interest Purchasing Schemes
More informationc» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:
Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security
More informationSAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity
SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get
More information1/3/2013. Months. Other $75,000. Government $81,000. Non-Profit $100,000. Dollars. Public Company $127,000. Private Company $200,000
In its 2008 Report to the Nation, Occupational Fraud and Abuse, the Association of Certified Fraud Examiners (ACFE) - reported losses of 7% of revenue or $994 billion of US Gross Domestic Product lost
More informationProtect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently
Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity
More informationIdentity Protection 101: Protect your good name from identity theft.
Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social
More informationDescribe Fraud in the Context of Financial
Misappropriation of Assets and Fraudulent Financial Reporting Loscalzo s September 24, 2014 2012 Template for PowerPoint Slides A SmartPros Ltd. Company www.loscalzo.com (732) 741 1600 1 CPE Instructions
More informationIdentity Theft: Protecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA
More informationIDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018
IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,
More informationIdentity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office
Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission
More informationWHEN BAD THINGS HAPPEN TO YOUR GOOD NAME
WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card
More informationFRAUD AWARENESS & PREVENTION
FRAUD AWARENESS & PREVENTION Nancy Wonderlich Koonce, CPA/MBA/CVA/CFE nkoonce@idahocpa.com What is occupational fraud? The use of one s occupation for personal enrichment through the deliberate misuse
More informationUNIT 3-4 Preventing Identity Theft
UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information
More informationGREENPATH FINANCIAL WELLNESS SERIES
GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves
More informationDrexel and FMFCU. Presented By
Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission
More informationAn Expensive Problem. Fraud in Government A Growing Problem
Stuart T Stickel, CPA, CFE Deputy State Auditor West Virginia State Auditor s Office Charleston, WV An Expensive Problem Business fraud and abuse in the U.S. cost about $650 billion a year. Government
More informationFPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions
FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to
More informationChapter 2 Skimming. 2. To a fraudster, the principle advantage of skimming is the difficulty with which the scheme is detected. a. True b.
Chapter 2 Skimming 1. is the theft of cash from a victim entity prior to its entry in an accounting system. a. A fictitious disbursement b. Skimming c. Larceny d. Conversion 2. To a fraudster, the principle
More information2) The proper use and control of credit is the best way to build a good credit history. Answer: TRUE Diff: 1 Question Status: Previous edition
Personal Finance, 6e (Madura) Chapter 7 Assessing and Securing Your Credit 7.1 Background on Credit 1) If you refrain from using any credit, it will assure you the lowest possible interest rate when you
More informationContents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.
Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing
More informationFRAUD: A Web Of Deceit
FRAUD: A Web Of Deceit Presented by: Tessa Filippazzo, CPA, CFE Curtis Blakely & Co., P.C. PO Box 5486 Longview, TX 75608 (903) 758 0734 tfilippazzo@cbandco.com DEFINITION Intentional perversion of truth
More informationLecture notes for: Corporate Cons
Lecture notes for: Corporate Cons This video covers internal fraud schemes (as opposed to management trying to defraud investors - like the other two videos) Cash Internal fraud schemes: Accounts receivable
More information10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office
Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing
More informationLecture Notes for How to Steal $500 Million
Lecture Notes for How to Steal $500 Million These notes will be in the form of questions that you should try to answer while watching the video. The purpose is to make certain that you are paying attention
More informationTypes of Fraud, Detection and Mitigation Presentation by: Isaac Mutembei Murugu CIA, CISA 23 rd November Uphold public interest
Types of Fraud, Detection and Mitigation Presentation by: Isaac Mutembei Murugu CIA, CISA 23 rd November 2017 Uphold public interest Contents Types of fraud, their modes of detection and mitigation Contract
More informationOCCUPATIONAL FRAUD 9/20/2018
OCCUPATIONAL FRAUD Presented by Inv. Andrea Jacobson Alaska State Troopers Alaska Bureau of Investigation Financial Crimes Unit What does it look like? What do we do when we see it? How do we prevent it?
More informationGreenPath Financial Wellness Series
GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial
More informationSlide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?
Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is
More informationGet the most out of your membership
PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account
More informationIdentity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan
Identity Theft & Identity Fraud By Kevin Sullivan Page 1 Table of Contents What is Identity Theft?... 3 What is Identity Fraud?... 4 How is Personal Information Stolen?... 5 How Your Personal Information
More informationRecognizing Credit Card Fraud
1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended
More informationFraud Detection in Public Schools
Fraud Detection in Public Schools Goal: To learn how to prevent and detect fraud from actual evidence uncovered during fraud investigations Format: We will discuss three of the largest fraud cases over
More informationFraud Prevention for Nonprofits
Fraud Prevention for Nonprofits January 11, 2017 Fraud Myths It hardly ever happens to nonprofits. It won t happen in our organization. Jane is the most dedicated and honest person I ve ever met. Mary
More informationFraud & Forensic Accounting Update for CPAs
Fraud & Forensic Accounting Update for CPAs Presented by: Brett A. Johnson CPA/CFF, CFE, CFI Forensic Accounting Manager Background Eide Bailly LLP Top 25 CPA firm in the nation (Est. 1917) More than 49,000
More informationWHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise
WHAT DO MANY OF US HAVE IN COMMON WITH Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise IDENTITY THEFT: protecting ourselves and our clients Presented by: Eric Albert, Rhonda Davis, Kevin
More informationLearn about identity theft. Investor education
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationIdentity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation
Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an
More informationMitigating Fraud. June 22, Sept. 21, 2014
Mitigating Fraud June 22, 2016 Sept. 21, 2014 Agenda Overview of the 2016 Report to the Nations on Occupational Fraud and Abuse Real Life Fraud Cases Mitigation Tools Lone Star College s Ethics Hotline
More informationIts Not About If, Its About When! Learning how to protect your organization.
Learning how to protect your organization. Presentation Overview Summary off FFraud S d St Statistics ti ti Definitions of Fraud How and Why Fraud Happens Fraud Prevention and Deterrence Steps to Reducing
More informationIdentity Theft.
Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.
More informationReduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention
Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention Michigan Municipal Treasurers Association June 16, 2017 Scott Sternhagen, CPA Manager Ryan Ritchay, CPA, CFE Senior Accountant
More informationManaging Reputational Risk for Nonprofit Organizations. Best Practices for Fraud Prevention. July 14, Christopher W. Truman, CPA, Manager
Managing Reputational Risk for Nonprofit Organizations Best Practices for Fraud Prevention July 14, 2014 CLAconnect.com Presenters Christopher W. Truman, CPA, Manager 2 July 14, 2014 1 Things to Think
More informationHow To Protect Students Against Identity Theft and Complying with Safeguarding Regulations
How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT 888-692-3964 kreddick@ncmstl.com 1 WHAT DO THESE STARS HAVE
More informationProtecting Yourself from Fraud including Identity Theft Advanced Level
Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial
More informationWhat do they investigate
What is Forensic Accounting & What do they investigate Presented by: Doug Cash MBA, CFE, CFI, CFCI Manager Forensic Accounting & Investigative Services Specialization i What is Forensic Accounting? What
More informationTable 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud
Anchin Alert: ACFE Report to the Nations 2018 The Association of Certified Fraud Examiners ( ACFE ) recently published the Report to the Nations 2018 Global Study on Occupational Fraud and Abuse (the 2018
More informationAGA Risk and Fraud Webinar
AGA Risk and Fraud Webinar February 22, 2017 Let s Begin with the Basics 5% of revenues lost to fraud every year Median fraud duration from start to detection is 18 months Small organizations tend to suffer
More informationCOVERAGE FRAUD IN EMPLOYEE BENEFIT PLANS 5/15/2014. Where employee benefit fraud is likely. Internal controls that help prevent fraud
FRAUD IN EMPLOYEE BENEFIT PLANS COVERAGE Where employee benefit fraud is likely Internal controls that help prevent fraud What should management have done? Schemes and war stories 1 FRAUD TRIANGLE Incentive/pressure
More informationEverything You Didn t Want To Know About Employee Crime
Everything You Didn t Want To Know About Employee Crime It's something employers don't want to have to think about: employee crime. Finding out that trusted, long-term employees have been stealing from
More informationID Theft Security. Michael G. Solomon. CISSP PMP CISM
ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible
More informationUnit 5 - Your Money: Keeping it Safe and Secure
Unit 5 - Your Money: Keeping it Safe and Secure Credit Unions and Banks Banks For-profit companies owned by shareholders Credit Unions Not-for for-profit institutions owned and controlled by its own customers,
More informationFraudulent Check, Credit Card Fraud and ID Theft Guide
Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not
More informationChapter 2 Skimming 1
Chapter 2 Skimming 1 Define skimming. Chapter Objectives List and understand the two principal categories of skimming schemes. Understand how sales skimming is committed and concealed. Understand schemes
More informationIt s not going away. (c) 2014 huberis.net. Identity Theft
It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity
More informationFraud Prevention & Detection. Eric Conforti, CPA, CFE April 17, 2018
Fraud Prevention & Detection Eric Conforti, CPA, CFE April 17, 2018 1 Recent Trends Prevention and Detection Methods Common Schemes Case Studies Throughout 2 ACFE Report to the Nations 3 ACFE Report to
More informationWelcome to Money Essentials SM!
Money Essentials SM Welcome to Money Essentials SM! Money Essentials provides you with a valuable, easy to understand introduction to financial services and is designed to give you realistic choices in
More informationFRAUD EXAMINERS MANUAL INTERNATIONAL EDITION
TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...
More informationOAPT June 9, Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1
OAPT June 9, 2015 Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1 Fraud can happen at any entity, at any time with the right circumstance Be Vigilant and Skeptical of what
More informationThree D s of safeguarding your personal data
Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D
More informationHere is some more information on the Equifax Breach and how you may protect yourself in the aftermath...
UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal
More informationHOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES
HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES For Government Entities and Nonprofit Organizations November 15, 2017 Presenters Bruce V. Bush Bruce is a Senior Director in RSM s Financial Investigations
More informationIdentity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.
Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should
More informationTax-Related Identity Theft
Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman
More informationJason B. Freeman, J.D., CPA
Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman
More informationMMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath
MMAAA Annual Meeting Conducting an Investigative Audit June 13, 2017 Presented by: John J. Sullivan, CFE Melanson Heath Association of Certified Fraud Examiners 2016 Global Fraud Study Figure 1. Statistics
More informationCall for assistance with registration and activation. You will be asked for your Access Code if registering by phone.
Your Community West Credit Union checking account is about to work for you. Now it s time to start taking advantage of the benefits and features your account offers: IDPROTECT identity theft monitoring
More informationREPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING:
SUBJECT: Identity Theft Identity theft REPAIR KIT BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: fastest growing white-collar crime in the US IDENTITY THEFT Message from your Attorney
More informationSCTEM. Preventing Fraud and Misuse in Your Card Program. Presented By: Gonca Latif-Schmitt, Managing Director Citi
SCTEM Preventing Fraud and Misuse in Your Card Program Presented By: Gonca Latif-Schmitt, Managing Director Citi Agenda Card Misuse vs. Card Fraud - Definition Card Misuse Card Program Risks Fraud Types
More informationIdentity Theft. Help Your Students Avoid This Epidemic Sun Ow
Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution
More informationYour Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges
Your Guide to Credit Card Skimming: How to Spot and Avoid Fraudulent Charges The term skimming, as applied to credit cards, involves stealing card account data during a legitimate transaction. It is then
More informationFraud in Government. Mike Nolan, CPA, CFE, CGMA. CCACC & CCA&RMC Conference Monterey, CA September 2014
Fraud in Government Mike Nolan, CPA, CFE, CGMA CCACC & CCA&RMC Conference Monterey, CA September 2014 Headlines Former New Orleans Mayor Ray Nagin convicted of corruption City of Bell California Public
More informationResources for Victims of IDENTITY THEFT. HENNEPIN COUNTY CHIEFS OF POLICE and HENNEPIN COUNTY ATTORNEY S OFFICE
Resources for Victims of IDENTITY THEFT HENNEPIN COUNTY CHIEFS OF POLICE and HENNEPIN COUNTY ATTORNEY S OFFICE Fraud and financial crimes are a form of theft that occur when a person or entity takes money
More information11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW!
Fraud in Non-profit Organizations: What You Need to Know NOW! The CFE Credential The Certified Fraud Examiner (CFE) credential denotes proven expertise in fraud prevention, detection and deterrence. CFEs
More informationCREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1
CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1 DO NOW: T/F? 1. Using credit can lead to serious problems. 2. When you charge a purchase with a credit card, you can withhold payment if the product is defective.
More informationIdentity Fraud Endorsement
220 Commercial Street P.O. Box 10 Berwick, NS B0P 1E0 www.kingsmutual.ns.ca TF: 1.800.565.7220 EO-0870-0612 Identity Fraud Endorsement Insuring Agreement If the Declaration Page shows that the Identity
More informationPRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.
PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity
More informationGood From The Inside Out. Saturday, April 8, 2017
Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU
More informationOhio Conference of Payroll Professionals
Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number
More informationINTERNAL FRAUD PREVENTION:
INTERNAL FRAUD PREVENTION: COMMON FRAUDS AND THE ABSOLUTES OF INTERNAL CONTROL DESIGN Presented for the 2018 Telergee Alliance CFO & Controllers Conference Presented by STEVE DAWSON, CPA, CFE 1 The Not
More informationCharge It Right. FDIC Money Smart for Young Adults. Building: Knowledge, Security, Confidence
Charge It Right FDIC Money Smart for Young Adults PNC is proud to work with the FDIC to offer their Money Smart program to our customers, to support lifelong learning in Financial Education. Building:
More informationID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
More informationIdentity Theft: Help Your Students Avoid This Epidemic
Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity
More informationSENIOR SAFETY PRESENTATION
SENIOR SAFETY PRESENTATION Presentation Overview Elder Abuse Problem How the Calgary Police Service responds to this issue Most Prevalent Frauds/Scams Case Studies Contributing Societal Trends Elder Abuse
More informationOLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE
OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS
More informationFraud prevention for credit unions
Fraud prevention for credit unions Deposit Insurance Corporation of Ontario November 12, 2013 2 Agenda The cost of fraud Internal fraud The risks of external fraud facing credit unions Fraud prevention
More informationUniversity System of Georgia s 2016 Georgia Summit Fraud in Higher Education
University System of Georgia s 2016 Georgia Summit Fraud in Higher Education How to Protect your Institutions! September 14 2016 Jeff Fucito, CPA Aleisa Howell, CPA Jon Schultz, CPA Augusta Marriott at
More information11/14/ FNBT FACT ACT
1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.
More informationFraud in the Government Realm. Introduction. What is Fraud? My career began with a local government fraud in 1993
Fraud in the Government Realm Introduction My career began with a local government fraud in 1993 2 What is Fraud? 3 1 Two Types of Fraud 4 Fraud Do not be think it is not happening 5 Your employees? 6
More informationFRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION)
TABLE OF CONTENTS SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES OCCUPATIONAL FRAUDS ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 FINANCIAL STATEMENT FRAUD What Is Financial
More informationFINANCIAL FITNESS EDUCATION
(Agency s Name & Logo) FINANCIAL FITNESS EDUCATION Sponsored by BETTER FORTUNES Control Your Money Control Your Life Knowing the difference can make all the difference Chapter One ECONOMIC WAY OF THINKING
More informationThe fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers
The fastest growing white-collar crime in the US. Identity theft REPAIR KIT brought to you by: Colorado Attorney General John Suthers Message from Attorney General John Suthers Dear Coloradoans: Identity
More informationCredit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016
Quick Response Explain how you think credit cards work. How much do you have to pay every month? What happens if you pay late? What kinds of fees are involved? Unit 4 - Good Debt, Bad Debt: Using Credit
More informationFraud Prevention and Detection. Lisa dewit, Sr Project Manager (3-5631) Formation Review 20 Oct 17 Prepared for: IIA Annual Fraud Seminar
Fraud Prevention and Detection Lisa dewit, Sr Project Manager (3-5631) Formation Review 20 Oct 17 Prepared for: IIA Annual Fraud Seminar Opening Remarks Fraud - what is it? Fraud Risk Management Fraud
More informationCONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA
CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. CREDIT CARD FRAUD SCHEMES Introduction Consumers make purchases using credit every day. Credit card companies
More informationFraud Examination. Prevention, Detection, and Investigation. Steven M. Bragg
Fraud Examination Prevention, Detection, and Investigation Steven M. Bragg Chapter 1 Introduction to Fraud... 1 Learning Objectives... 1 Introduction... 1 What is Fraud?... 1 Confidence... 1 The Effects
More information