Using Topside Journal Entries to Conceal Fraud

Similar documents
Financial Statement Fraud

The Auditor s Responsibilities. Audit of Financial Statements

AN ANALYSIS OF SMALL COMPANY FRAUDS AND IMPLICATONS FOR AUDITORS IN DETECTING FRAUDS

"Observations On Auditors' Implementation Of PCAOB Standards Relating To Auditors' Responsibilities With Respect To Fraud"

International Standard on Auditing (Ireland) 240

FRAUD IN THE FINANCIAL STATEMENTS IS AN ELUSIVE THING

Finacial Statement Fraud. Peter N Munachewa, CFE Risk Management Consultant

INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

International Standard on Auditing (UK) 240 (Revised June 2016)

Chapter 6 Earnings Management 6-1

Auditing and Assurance Standards Council

SXU Financial Statement Fraud

Report on Inspection of Deloitte & Touche LLP. Public Company Accounting Oversight Board

Financial Statement Fraud. Improper Recording of Liabilities

FINANCIAL STATEMENT FRAUD: DETAILED LOOK AT UNCOVERING CREATIVE ACCOUNTING FRAUD: P R E S E N T E D B Y : J O H N E K A D A H

STATE OF NEW MEXICO Office of the State Auditor

The Auditor s Responsibility to Consider Fraud in an Audit of Financial Statements

ECON132 Exam #1 Summer 2005 Session B

HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES

Financial Accounting, 1e Chapter 6: Ethics, Internal Control, and IFRS Test Item File

Chapter 9. #17 is a bad question if it is changed as follows the answer is d

7 2010, 2011, 2012 & 2013 AICPA

Fraud Risk Assessment CARRIE KENNEDY, PARTNER DUSTIN BIRASHK, PARTNER

FINANCIAL FRAUDS INVESTIGATION USING COMPANY BUDGETS INFORMATION

WILLIAM I. ESKIN, CPA. Presentation to : Southeastern Accounting Show FINANCIAL STATEMENT ANALYSIS/FRAUD. August 18, 2011.

APPENDIX D Examples of Significant Deficiencies and Material Weaknesses

November 16 or 17 Las Vegas Accounts Conf, Trial Slide Set 7/26/2017. Financial Statement Types. Financial Statement Fraud

MANAGED EARNINGS OR FRAUD: WHERE DO WE DRAW THE LINE?

2 4 Generally accepted auditing standards are the Statements on Auditing Standards issued by the Auditing Standards Board.

LIFE, C T-0Tr UNITED STATES DV T T SOUTHERN DISTRI 'ATE RK. Civil Action No.

Preview of Observations from 2016 Inspections of Auditors of Issuers

) ) ) ) ) ) ) ) ) ) )

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE

Report on Inspection of Grant Thornton LLP (Headquartered in Chicago, Illinois) Public Company Accounting Oversight Board

ANNUAL REPORT ON THE INTERIM INSPECTION PROGRAM RELATED TO AUDITS OF BROKERS AND DEALERS

The two most common types of fraud that impact financial statements are:

Does Immateriality Matter? Evidence from Accountants Concerning the Acceptability of Questionable Accounting Practices

Auditing and Assurance Services, 15e

An entity s ability to maintain its short-term debt-paying ability is important to all

Forensic Evidence-Gathering Procedures for Employee Stock Options. Zabihollah Rezaee *

UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION

UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION

Campus Financial Sub-Certification - Explanation

Report on Inspection of Ernst & Young LLP (Headquartered in New York, New York) Public Company Accounting Oversight Board

) ) ) ) ) ) ) ) ) ) II.

Lecture Notes for How to Steal $500 Million

Report on Internal Control Over Statewide Financial Reporting. Year Ended June 30, 2011

Global Policy on Anti-Bribery and Anti-Corruption

GOVERNMENT OF GUAM RETIREMENT FUND (A Public Corporation) Schedule of Findings. September 30, 2001 and 2000

) ) ) ) ) ) ) ) ) ) )

Practice Multiple Choice Questions

Solutions. I. Auditing Cash and Cash Equivalents. A. Learning Question Answers

Case 2:09-cv RJB Document 1 Filed 07/22/09 Page 1 of 17

STANDING ADVISORY GROUP MEETING AUDITING FINANCIAL STATEMENT DISCLOSURES MARCH 24, 2011

UNITED STATES OF AMERICA Before the SECURITIES AND EXCHANGE COMMISSION. SECURITIES EXCHANGE ACT OF 1934 Release No / April 8, 2011

Illustrate by way of some example how Fraudulent Financial Reporting and Misappropriation of Asset can be done?

) ) ) ) ) ) ) ) ) ) )

ADMS 4590 M Professor Narmin Multani

Fin621 Online Quizzes & Papers GURU

Chapter 2 Professional Standards

ASB Meeting October 16-19, 2017

COMPANION POLICY CP TO NATIONAL INSTRUMENT CERTIFICATION OF DISCLOSURE IN ISSUERS ANNUAL AND INTERIM FILINGS TABLE OF CONTENTS

A DISCUSSION OF THIRTEEN FINANCIAL ACCOUNTING TOPICS. by Jordan Barr. Oxford May 2017

information from which financial statements are prepared Deliberate misapplication of accounting principles, policies,

UNITED WAY OF GREATER KNOXVILLE, INC. AND ITS OPERATING DIVISIONS. Financial Statements. Years Ended March 31, 2016 and 2015

Identifying Risk: Understanding the Entity and its Environment

Financial reports give a snapshot of a company s value at the end of a

Accounting 408 Exam 1, Chapters 1, 2, 12, A, B, D Fall 2017

IMPRESSION 5 SCIENCE CENTER REPORT ON FINANCIAL STATEMENTS YEARS ENDED SEPTEMBER 30, 2017 AND 2016

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ALABAMA. ) Civil Action No. ) CV-03-J-0615-S. Defendants. )

WorldCom: A Simple Recipe for Cooking the Books

Accounting Concepts, Time Value of Money, and Financial Analysis & Reporting BUS512M. November 23, 2013 Session 3 7:00-10:30 Susan Crosson

ARSC Meeting May 10-12, 2011

TOOLS FOR FRAUD DETERRENCE AND DETECTION BUILDING A HOUSE OF CARDS: USING THE REVERSE ENTRY TO HIDE FRAUD

KEEP AUSTIN BEAUTIFUL, INC. Financial Statements (With Independent Auditors Report Thereon)

COUNT ONE. (Conspiracy to Commit Securities Fraud) RELEVANT PERSONS AND ENTITIES

Presentation to. Forensic Investigations of Financial Statement Fraud: PBS&J A Case Study September 26, Mitchell E.

) ) ) ) ) ) ) ) ) ) II.

) ) ) ) ) ) ) ) ) ) II.

Financial Transactions and Fraud Schemes

Excellence. Achieving. in Financial Reporting and Auditing. IN FOCUS INTERVIEWS Leslie F. Seidman Cynthia M. Fornelli. Analysis of PCAOB Inspections

STANDING ADVISORY GROUP MEETING

CHAPTER 7 INHERENT RISK ASSESSMENT AND MATERIALITY

Information about 2017 Inspections

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud

2006 NON PROFIT MANAGEMENT CENTER. August 2006

Report on Inspection of McGladrey LLP (Headquartered in Chicago, Illinois) Public Company Accounting Oversight Board

1 See Staff Inspection Brief, Preview of Observations from 2015 Inspections of Auditors of Issuers, Vol. 2016/1, issued in April of

PRINCIPLES OF ACCOUNTS

Cash and Financial Investments

If no board of directors exists, identify the equivalent body with oversight responsibility.

IAASB CAG REFERENCE PAPER IAASB CAG Agenda (December 2005) Agenda Item I.2 Accounting Estimates October 2005 IAASB Agenda Item 2-B

Consideration of Laws and Regulations in an Audit of Financial Statements

AN INVESTIGATION OF FINANCIAL ACCOUNTING STATEMENTS AND REPORTING TECHNIQUES. By: Rachel Ann May. Oxford, MS May 2017

IS THIS AN ERROR OR A FRAUD? A CASE OF REVENUE RECOGNITION- GROUP ON

Sarbanes-Oxley Simplified

Fraud in Financial Statements

DOI: /iace Xerox, Inc. Edward Seipp, Sean Kinsella, and Deborah L. Lindberg

FINANCIAL STATEMENT RELIABILITY UNDER IFRS: REAL-LIFE CASE STUDY OF VOLKSWAGEN GROUP

An Audit of Internal Control Over Financial Reporting That Is Integrated With an Audit of Financial Statements

Transcription:

University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange University of Tennessee Honors Thesis Projects University of Tennessee Honors Program 4-2004 Using Topside Journal Entries to Conceal Fraud Jordan Ray Marshall University of Tennessee - Knoxville Follow this and additional works at: http://trace.tennessee.edu/utk_chanhonoproj Part of the Accounting Commons Recommended Citation Marshall, Jordan Ray, "Using Topside Journal Entries to Conceal Fraud" (2004). University of Tennessee Honors Thesis Projects. http://trace.tennessee.edu/utk_chanhonoproj/766 This is brought to you for free and open access by the University of Tennessee Honors Program at Trace: Tennessee Research and Creative Exchange. It has been accepted for inclusion in University of Tennessee Honors Thesis Projects by an authorized administrator of Trace: Tennessee Research and Creative Exchange. For more information, please contact trace@utk.edu.

UNIVERSITY HONORS PROGRANI SENIOR PROJECT - APPROVAL Name: J () ~ dan K i!lar.!...!.'i h-,-=j.-=----t-=-( College: ---go$'-1ii!''s5 AJH f;'tv,'s/"'.ipi7t Department: ~(/4~" (f,.,frth;jjm I'IlMII.Se-Ift,.J" Faculty Mentor: JA &~ : K j e r PROJECTTITLE: ~U_S'_~~j~_Tc~~re5~'~'~~~J_o~V_(~_J_I ~ h_'_ ~~J ~~ ~_ _~~c~~_~~ PI A,,-f I have reviewed this completed senior honors thesis with this student and certify that it is a project commensurate with honors level undergraduate research in this field. Signed: ~ 7. ' Faculty Mentor Date: l.f.. - ). ~ - () 'f Comments (Optional):

USING TOPSIDE JOURNAL ENTRIES TO CONCEAL FRAUD Jordan R. Marshall Mentor: Jack E. Kiger April 22, 2004

ABSTRACT For my senior project, T chose to do an investigation on topside journal entries. Topside journal entries are adjusting entries made by a parent company to the books of its subsidiaries when preparing consolidated financial statements. Topside journal entries are a normal and necessary part of accounting. For instance, topside journal entries can be used to allocate income or expenses from a parent company to its subsidiaries. Such practice falls within the scope ofgaap. Due to their relative ease of concealment, however, topside journal entries have often been used to perpetrate fraud as well by increasing revenues and decreasing expenses with no valid basis under GAAP. Topside journal entries are most frequently used in fraud when management is under high pressure to conform its financial statements to earnings expectations. Fraudulent misuse of topside journal entries is also common in companies undergoing mergers, acquisitions, or restructuring. Cendant Corporation and Symbol Technologies, Inc. are two companies whose managers were guilty of using topside journal entries fraudulently to boost financial statement information. While the specific methods offraud were slightly different, the underlying motives and strategies for committing the respective frauds were striking similar. AU 316 states that three conditions must exist in order for fraud to occur: 1) Management is under pressure or has an incentive to commit fraud, 2) An opportunity to perpetrate fraud exists, and 3) Perpetrators can rationalize committing fraud. All three conditions were present in the two aforementioned cases. While the fraudulent misuse of topside journal entries might not seem like fraud to some at first impression, it is important to realize that reclassifying real expenses (which are costs incurred to earn past revenues) to assets (which have future value and should generate future revenues) misleads readers of financial statements and is illegal. Such activity promotes a false sense of security among investors and leads to inflated valuation for companies. Furthermore, creating false receivables or booking false transactions is illegal for obvious reasons. Therefore, when examined closely, it is easy to see how such misuse of topside journal entries can result in substantial acts of fraud.

USING TOPSIDE JOURNAL ENTRIES TO CONCEAL FRAUD In light of recent fraud cases that have plagued business, managers have been forced to realize the importance of the auditing profession now more than ever. In turn, auditors have been forced to reexamine their own profession in order to ensure that their services adequately comply with the needs of their clients. With the passage of the Sarbanes-Oxley Act, managers and auditors alike have been required to change several procedures in their respective professions. Aside from legal decrees, however, understanding past occurrences of fraud and recognizing them in the future is now of utmost importance to auditors. An alarming phenomenon in accounting in recent years has been the misuse of topside journal entries to perpetrate fraud. Perhaps even more alarming is the failure of the auditing profession as a whole to adequately address this issue. Topside journal entries are adjusting entries made by a parent company to the accounting records of its subsidiaries when preparing consolidated fmancial statements. Managers can legitimately use topside journal entries for such tasks as allocating expenses (e.g. technology cost, interest expense) and income (e.g. sales, miscellaneous income) from a parent company to its subsidiaries. Such journal entries are normal entries in the course of business and fall completely within the scope of generally accepted accounting principles (GAAP). Due to the relative ease of concealment, however, managers have repeatedly used topside journal entries to perpetrate extensive frauds. AU 316 AU 316 states that three conditions must exist in order for fraud to occur: 1) Management is under pressure or has an incentive to commit fraud, 2) An opportunity to

perpetrate fraud exists, and 3) Perpetrators can rationalize committing fraud. Recently, managers at two separate companies, Cendant Corporation and Symbol Technologies, Inc., were under intense pressure to ensure that quarterly financial results met Wall Street analysts' expectations. As a result of such burdens, managers at these companies were able to rationalize committing frauds in order to achieve the desired outcomes on their respective financial statements. Managers at both Cendant and Symbol fraudulently misused topside journal entries to inflate financial statement infonnation. Thus, the cases of Cendant and Symbol provide prime examples of how managers can use topside journal entries to engage in substantial acts of fraud. FRAUD AT CENDANT CORPORATION Cendant merged with another company in December 1997. Before the merger, Cendant had established a merger reserve to account for anticipated costs related to the upcoming merger. Managers at Cendant used the pooling-of-interests method of accounting to establish the merger reserve and to account for the merger in 1997. This method of accounting, pennitted by GAAP at the time, consists of recording certain anticipated costs as liabilities prior to actually incurring these costs. In the case of Cendant, managers did use the merger reserve to record future liabilities related to the merger, but they frequently manipulated this accowlt through the misuse of topside journal entries. Furthennore, managers used another reserve account, the membership cancellation reserve, in a similar manner to carry out their fraudulent activities. The fraud took place from the years 1995 through 1997. As is the trend with most frauds, managers at Cendant were continually forced to make larger topside adjustments as time progressed in order to inflate annual earnings to expected levels. By the time the 2

fraud was discovered and Cendant was forced to make a public announcement concerning the fraud, managers at Cendant had overstated the company's operating income for the three-year period by hundreds of millions of dollars. The problem occurred when managers at Cendant began to routinely overstate restructuring charges in order to increase the merger reserve. Managers also frequently increased the merger reserve by writing off assets they characterized as impaired (as a result ofthe merger) when, in reality, most of these assets were not impaired. Managers would then use the merger reserve to offset normal operating expenses, a process not acceptable under GAAP. In essence, Cendant created its merger reserve with the intent to use the account not only to record anticipated costs related to the merger, but to fraudulently offset operating expenses unrelated to the merger as well. Using topside journal entries to accomplish this scheme, managers at Cendant were able to improperly manage earnings during the three-year period and had intentions to continue their actions. The auditors of Cendant were also unwise in certain actions of their own regarding management's misuse of the merger reserve. For instance, auditors provided accounting advice to Cendant's managers concerning costs that are typical in corporate restructurings. Unfortunately, such costs are often subjective in nature and difficult to test. These costs require auditors to rely more heavily on managers' representations than on specific audit evidence. Managers at Cendant were able to use the subjective nature of these costs to conceal various expenses through the misuse of topside journal entries. Auditors also failed to recognize various other actions of management that did not conform to GAAP. For instance, managers provided the auditors ofcendant with contradictory drafts of schedules when the auditors requested support for the 3

establishment of the merger reserve. Managers continually revised these schedules to satisfy the auditors' questions or to incorporate new information discovered by the auditors. The schedules, however, were inconsistent with regard to the nature and amount of the individual components of the reserve. Auditors repeatedly relied on these ever-changing representations of management, in part due to the aforementioned subjectivity, and therefore were unable to detect the fraud. Managers at Cendant manipulated another reserve account, the membership cancellation reserve, to inflate earnings as well. Managers created the membership cancellation reserve to account for members who canceled during their membership periods (and were therefore entitled to refunds) as well as members who were billed for memberships but never paid for them (essentially, bad debts). When members paid for their memberships, typically with credit cards, managers at Cendant would record an increase in both the revenue and cash accounts at the time the credit cards were charged. Issuers of members' credit cards would frequently reject these charges, however, on a monthly basis. Therefore, Cendant would not receive the rejected charges as payments. When confronted by auditors on this issue, managers falsely claimed that once they resubmitted these rejections to banks, Cendant would ultimately collect nearly all rejections within a three-month period. Furthermore, managers falsely claimed that they recorded a reduction in the cash account and a decrease to the membership cancellation reserve for each of the few uncollected rejections. At the end of each accounting period during the course of the fraud, however, managers failed to record three months of rejections. In other words, managers neither reduced the cash account nor decreased the membership cancellation reserve for the corresponding amounts of the rejections. 4

Managers at Cendant errantly reasoned that they did not need to record rejections that occurred during the final three months of the year because they would collect most of the rejections within a three-month period of the initial rejection. The three months of withheld rejections created a temporary difference at the end of the year between the cash balance reflected on Cendant's general ledger and the cash balance reported on its bank statements. Managers falsely claimed that the difference between the general ledger balance and the bank statement balance did not reflect an overstatement of the cash account nor an understatement in the membership cancellation reserve since most rejections would eventually be collected. In reality, however, Cendant never collected the majority of the rejections. By not recording these rejections during the final three months of the year, managers at Cendant drastically understated the membership cancellation reserve and overstated the cash balance. Therefore, managers were able to avoid the expense charges and journal entries necessary to rectify the membership cancellation reserve and cash accounts. As was the case with the merger reserve, auditors of Cendant relied primarily on managers' representations with respect to the membership cancellation reserve and the company's "successful" collection history. FRAUD AT SYMBOL TECHNOLOGIES, INC. Unfortunately, Cendant is not the only company whose managers have been guilty of misusing topside journal entries to perpetrate a sizeable fraud. Managers at Symbol Technologies, Inc. also used topside journal entries to perpetrate fraud, and the similarities between what occurred at Cendant and Symbol are striking. From 1998-2002, managers at Symbol perpetrated a fraud that inflated the reported fmancial results of their company. Managers manipulated reserves and made various improper topside 5

adjustments to ensure that the financial data of Symbol complied with market expectations. Managers made dozens of topside journal entries to the accounting records of Symbol that boosted net income and various other financial data by tens of millions of dollars. Throughout the duration of the fraud, managers at Symbol prepared what they called tango sheets. Tango sheets were schedules that compared the results of each quarter to market expectations. Included in the tango sheets were proposed topside adjustments to reserves and various other accounts that would better reflect market expectations. Such topside adjustments lacked valid support and were in gross violation of GAAP. When making the topside journal entries required to create such improper adjustments, managers knew that the results were already inflated due to fraudulent revenue recognition and other similar misconduct. Clearly, the misuse of topside journal entries played a substantial role in the perpetration of this fraud. Throughout the course of the fraud, managers at Symbol met in closing meetings during which they reviewed each division's results within the company. At the conclusion of these meetings, managers prepared consolidated financial statements consisting of the raw results obtained by the company. Managers then proposed specific topside journal entries based on the accounting "risks and opportunities" presented each quarter. After discussing the necessary topside journal entries, managers posted the entries to the general ledger without public disclosure. As a result of these topside journal entries, managers at Symbol understated expenses and overstated revenues and earrungs. 6

Symbol was a company that was driven by its financial nwnbers, particularly during the course of the fraud. The primary responsibility of managers was to ensure that the company's financial data met market expectations. Therefore, based on AU 316, the occurrence of fraud at Symbol is not surprising. Managers' response to these pressures was to create a fraudulent scheme that would create the illusion that Symbol had met or exceeded all market expectations. This scheme resulted in nwnerous misstatements of vital financial infonnation and consisted of blatant disregard for the policies outlined in GAAP. Similar to Cendant, reserves (often tenned "cookie jar" reserves by managers at Symbol), coupled with fraudulent misuse oftopside journal entries, were of central importance to the perpetration of this fraud. Symbol maintained a credit memo reserve to account for product returns from customers. Increases to this reserve decreased revenues by the corresponding amounts. When calculating this reserve, however, managers at Symbol did not do so in accordance with GAAP. Instead, managers set the reserve at a desirable level to achieve specific revenue targets. In effect, managers increased the reserve in increments lower than those required by GAAP, which in turn led to a material misstatement of revenues for the related accounting periods. When making increases to the credit memo reserve, managers simultaneously created a negative effect on both the cost of goods sold and inventory accounts, which in turn decreased gross profit. To lessen the effect such increases had on gross profit, managers at Symbol made additional fraudulent topside journal entries to the credit memo reserve that left the reported revenues unchanged while still improving the reported gross profit. Such adjustments were unfounded in GAAP and were made by 7

managers solely to present the appearance that Symbol had achieved the gross profit expected by the market. Managers at Symbol also created an excessive reserve for obsolete inventory in a gross inventory account maintained by the company's operations division. This "cookie jar" reserve was designed to account for obsolete inventory, but in reality it was used to help the operations division meet quarterly expectations. The reserve was beyond any reasonable estimate of the company's exposure for obsolete inventory, and managers at Symbol made topside journal entries to this account in order to significantly distort reported earnings. Symbol also offered a retirement plan to its senior executives and made annual contributions to the plan. In accordance with GAAP, Symbol created a reserve to account for the expenses associated with the annual contributions. During the time period in which the fraud occurred, some senior executives elected not to receive these benefits in lieu of other benefits offered by the company. Therefore, Symbol was no longer obligated to make annual contributions to the retirement plan for the benefit of those senior executives who had opted out of the plan. Even more importantly, Symbol was no longer obligated to pay retirement benefits to these senior executives. With these obligations erased, Symbol was left with millions of dollars in excess in the retirement plan reserve. Under such circumstances, GAAP requires managers to establish a schedule for the periodic release of these reserves into earnings. Managers at Symbol, however, chose to fraudulently use topside journal entries to release the unneeded funds in the retirement plan reserve during quarters where the raw financial 8

results fell short of market expectations. Doing so allowed managers to fraudulently boost earnings when needed, again without proper disclosure. One year during the course of the fraud, Symbol paid bonuses to its employees for work completed in the previous year. As a result, Symbol was obligated to pay the Federal Insurance Contributions Act (FICA) insurance during the quarter in which the bonuses were paid. GAAP requires the recognition of this expense in the quarter in which it is incurred. Managers at Symbol, however, chose to make topside adjustments that deferred the FICA insurance expense to a later accounting period in order to boost net income during the quarter in which the expense was incurred. At the end of the same year, Symbol owed and needed to account for more ordinary performance bonuses, as well as some nonrecurring bonuses related to a corporate acquisition. According to GAAP, ordinary performance bonuses are classified as operating expenses to be recognized in the quarter in which they are incurred. To reduce this adverse impact on operating expenses, managers at Symbol made improper topside journal entries to reclassify some of the ordinary performance bonuses. Managers reclassified the ordinary performance bonuses as nonrecurring bonuses related to the corporate acquisition, which are excluded from operating expenses. Such actions significantly jnflated net earnings for the related quarter. Finally, in order to manipulate the gross profit margin that managers reported for the related year, managers at Symbol reclassified numerous expenses from cost of goods sold to operating expenses through the misuse of topside journal entries. Such actions artificially boosted gross profit margin and enabled managers at Symbol to conceal that a recent drop in prices had eroded sales profits. 9

PREVENTATIVE MEASURES As is evident in the two cases involving Cendant and Symbol, the fraudulent misuse of topside journal entries has been an alarming trend in recent years. This trend raises questions concerning the ability of auditors to detect such fraudulent activity. In the cases of Cendant and Symbol, very weak internal controls were in place. Therefore, auditors must ensure the existence and implementation of strong internal controls by company management. For instance, auditors should check for the existence of an internal audit department and should communicate regularly with those associated with the internal audit. Auditors should see that managers monitor and require authorization for all journal entries as well. Journal entries should be adequately supported and should accurately reflect the underlying events and transactions. Furthermore, auditors should familiarize themselves with company procedural manuals and make certain that managers enforce strict adherence to the procedures outlined in these manuals. Finally, auditors should take into account the process by which an entity prepares its financial statements and should ensure that proper controls are present in this process. Although collusion among managers can impede auditors' ability to detect fraudulent misuse of topside journal entries, management's failure to implement strong internal controls can often signal fraudulent activity. Aside from verifying that certain controls exist from management's perspective, auditors should make sure that they demonstrate a high degree of professional skepticism in their own work. They should design audits to closely examine irregular adjustments 10

and journal entries, particularly topside journal entries that seem to have no basis in GAAP (topside journal entries involving reserve accounts are frequent red flags). Auditors should also compare revenues and expenses from previous accounting periods and note any sizeable differences between amounts from period to period. When selecting items to test, auditors should identify the population of journal entries and adjustments that affect financial statements. Finally, auditors should be conscious of management's expectations and be particularly skeptical if managers are under intense pressure to obtain lofty financial results. REESTABLISHMENT OF PROFESSION The accounting frauds of the last decade have damaged the reputation of what was once a highly trusted profession. Managers now must realize the importance of auditors in maintaining the credibility and reputation of their respective companies. Auditors must also realize the importance of their responsibility to ensure the credibility of both the clients they audit and the auditing profession itself. The fraudulent misuse of topside journal entries has become a huge problem in recent years, and it demands the attention of both managers and auditors alike. Although not all topside journal entries are fraudulent, managers, and particularly auditors, should be keenly aware of all topside journal entries and examine them closely. By paying closer attention to the use oftopside journal entries, both managers and auditors can contribute to the reestablishment of character and trust that was once prevalent in the accounting profession. 11

REFERENCES American Institute of Certified Public Accountants. (2003). AICPA Professional Standards (Vol. 1) New York. American Institute of Certified Public Accountants. Practice Alert No. 03-2: Journal Entries and Other Adjustments. Carlin, Wayne M. "Complaint: Robert Korkuc." 19 Jun. 2003. United States Securities and Exchange Commission. <http://www.sec.gov/litigation/complaints/compi8194.htm>. DeVries, Delwyn D. and Kiger, Jack E. "Auditing Journal Entries and Other Adjustments." Journal of Corporate Accounting and Finance, May 2004. Newkirk, Thomas C. "Complaint: Kenneth Wilchfort and Marc Rabinowitz." 24 Apr. 2003. United States Securities and Exchange Commission. <http://www.sec.gov/litigation/complaints/compi8102.htm>. 12