14
Post-Conference Auditing and Investigating Fraud Seminar Auditing Track Corruption Schemes

Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

Post-Conference

Auditing and Investigating Fraud

Seminar

Auditing Track

Corruption Schemes

Page 2: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

2 of 14

Introduction to Corruption

The employee’s use of his influence in business

transactions in a way that violates his duty to

the employer for the purpose of obtaining a

benefit for himself or someone else

Page 3: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

3 of 14

Corruption Schemes

Bribery and kickbacks

Illegal gratuities

Economic extortion

Conflicts of interest

Page 4: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

4 of 14

Bribery and Kickbacks

Payments, gifts, or gratuities given to

employees from contractors or vendors in

order to influence a business transaction

Involves collusion between employees and

vendors

Usually attacks the purchasing function of the

victim company

Can be very difficult to detect

Page 5: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

5 of 14

Illegal Gratuity

Something of value

given to an employee

to reward a decision

after it has been made

Similar to bribery

schemes, but does not

require proof of intent

to influence

Page 6: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

6 of 14

Economic Extortion

Use of actual or threatened force or fear to

demand money or some other consideration to

make a particular business decision

Often the other side of a bribery case

Page 7: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

7 of 14

Conflict of Interest

Employee or agent of the contracting company

(or a spouse or close family member) has an

undisclosed financial interest in a contract or

contractor

Page 8: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

8 of 14

Detection of Corruption Schemes

Typical auditing procedures fall short

Most often detected through tips from honest

and disgruntled coworkers or vendors

Strongest indicators:

• Contractor(s) receiving unexplained favorable

treatment from contracting employee

• Continued purchase of high-priced, low-quality

goods or services, without objection or returns

Page 9: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

9 of 14

Detection of Bribery and Kickback Schemes

Compare prices paid for goods and services to

market rates.

Analyze purchase levels by vendor.

Analyze inventory overstocks and shortages.

Identify continued purchases of inferior-quality

goods.

Page 10: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

10 of 14

Detection of Conflict of Interest Schemes

Identify tips and complaints that might indicate

that a conflict of interest is occurring.

• Typically come from employees who are aware of a

coworker’s self-dealing

Compare vendor and employee addresses and

phone numbers.

Page 11: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

11 of 14

Methods of Making Illegal Payments

Gifts, travel, and entertainment

Cash payments

Checks and other financial instruments

Hidden interests

Loans

Payment of credit card bills

Transfers at other than FMV

Promises of favorable treatment

Page 12: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

12 of 14

Techniques to Identify Illicit Income

Prove illicit income by showing that the

subject’s assets/expenditures for a given

period exceed that which can be accounted

for from admitted sources of income.

Begin by compiling suspect’s financial profile

(net worth).

Page 13: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

13 of 14

Net Worth—Asset Method

Assets

– Liabilities

= Net worth

– Prior year’s net worth

= Net worth increase

+ Living expenses

= Net income (or expenditures)

– Funds from known sources

= Funds from unknown sources

Best when subject has

purchased assets

Assets valued at cost

Funds from known

sources estimated

generously

Living expenses estimated

conservatively

Page 14: Post-Conference Auditing and Investigating Fraud Seminar · 2 of 14 Introduction to Corruption The employee’s use of his influence in business transactions in a way that violates

14 of 14

Net Worth—Expenditures Method

Best when subject has spent illicit income on

consumables that would not cause an increase

in net worth

Known expenditures

– Funds from known sources

= Funds from unknown sources