April 17, 2015
Post Master’s Certificate
Degree: Northcentral University: Business Administration: Specialization:
Advanced Accounting
Miss Bayo Elizabeth Cary,
A.A., B.A., M.L.I.S.
Home/Cell:
001-352-262-9733 Toll Free U.S.A.: 1-888-571-0119 Fax: 1-352-433-1875
Mailing Address:
Miss Bayo E. Cary
1005 NW 39th
Avenue
Gainesville, FL 32609
Assignment 8: Fraud
Resolution: Fraud Prevention and Detection: Final Assignment
Write a paper to provide
a detailed explanation of how the knowledge gained in this course provided you
with an understanding of the different types and varieties of fraud and how
they affect you, your company, and community and society as a whole. How would
you define instances of fraud and then if fraud occurred, how would you
mitigate and report the situation to help bring about resolution?
The knowledge gained in this course,
fraud: prevention, detection, and resolution, prepared me for work, as an under-cover
fraud investigator, at my first job in the United States, since 2008. I was
recently hired by the hiring manager at Walgreens, located at 13th Street,
and 39th Avenue, in Gainesville, FL. I used, my letter of
recommendation, from the instructor for my course: Dr. Wendy Achilles, to land the
job. I worked for two days only, on April 15, and April 16, 2015, prior to
compiling, my conclusions, and final report.
Ms. Patty, Cell: 386-965-2259, the
hiring manager, at Walgreens, located at 13th street, and 39th
Avenue, in Gainesville, FL, U.S.A.: Store: 12316 Phone: 352-327-9805, hired me,
as an under-cover fraud investigator, in the position of an employee, to find
out, why her store, was losing sales, and why her cosmetics department, was not
selling many products. I went into the store, the first day of work, and
engaged in the legally required training, to work in the store, and then, I was
placed on the front door cash register, with: Meme, and Daniel, to complete my
training, in how to use, a Walgreens cash register.
The first day of work, went really well.
There were a number of customers, who came into the store, to purchase, a large
variety of products. I was surprised, however, at how many people came into
Walgreens, to purchase cigarettes, and to receive large amounts of cash back.
The cigarettes, are very expensive. People who bought cigarettes from
Walgreens-on my first day of work, spent almost $ 100.00 dollars U.S.D.,
sometimes-on cigarettes, if they purchased, an entire carton. One customer,
insisted that he open his smokeless cigarette in the store to test it, and
began-against Walgreens company policy, to smoke, his smokeless cigarette, in
the store. Then too, there were several customers, who made very small
purchases, to receive: $ 50.00 dollars U.S.D., cash back-when, the total cash
back, per purchase limit at the Walgreens where I worked, was: $ 20.00 dollars
U.S.D., per purchase.
I had fun working with both: Meme and
Daniel, and I successfully mastered the Walgreens cash register. The second
day, that I came into work, I was scheduled to work at the cosmetics counter, with
a woman named: Lucy. Lucy, I was told, is head of cosmetics, at the Walgreens,
where I was working. I was told, by Kat-the onsite assistant manager, that Lucy
was supposed to train me in cosmetics, because Lucy, was the best sales person,
at her job, and therefore, the head of the cosmetics department. When I
initially met Lucy, on my second day of work, for training to work at the cosmetics
counter, I thought she might be Latina-however, later on, I had a very
different opinion.
Lucy had a very heavy accent. It was
very difficult to understand her English, when she spoke. The English was
broken-meaning that Lucy spoke, with every other word, instead of using proper
English syntax and semantics. Lucy, had a long list of jobs, that had to be
completed, on the 16th day of April, 2015, and told me, that she
wanted me to assist with the assignments, and that she would train me for the
position, at the cosmetics counter, while I helped her with the long list of
tasks, that she had to accomplish. Carla, one of the managers at Walgreens that
morning, told me, that I would be on the cash register again-like I had been
the previous day, except, that I would be assisting customers, from the
cosmetics counter cash register instead.
Lucy began telling me what to do, to
assist with the long list of tasks, which had to be completed. However, when I
had a question, Lucy refused to answer me, or to provide me with any direction,
or training. Lucy assigned, a particularly hard task for me-to hang, and
re-hang display boxes, that came from a marketing group, to display some of the
new products, in the store. Due to the fact, that Lucy was not willing, and/or
not able, to provide me with the instructions and directions, to complete the
task, that she assigned for me, I had to ask Carla-one of the managers on
duty-how to complete the task.
Lucy, was very aggressive with the
customers in the store. She was not providing me with any training, and, she
was almost chasing after customers, to provide service for them, at the
cosmetics counter. Lucy told me, that it was store policy, to bring customers
over from the front check-out, if there was no one behind the front cashier
counter, to ring the customers up, at the cosmetics counter. Lucy also told me,
that it was store policy, to encourage all customers purchasing cosmetics
items, to have their purchases rung up, in the cosmetics department.
Lucy had a box of coupons, under the cosmetics
counter, that were supposed to be next to products in the store, that were for
sale on the cosmetics isle, and in other store locations, and she would tell
customers, if you come over to cosmetics, to ring up your sale, I might be able
to offer you a discount, with a coupon. In addition, Lucy had a box, behind the
counter, of sample size: shampoo, body wash, tooth paste, and other items, that
Walgreens intended, would be given away to customers for free-that, Lucy only
gave to customers, if they made a purchase. Finally, along with the free
samples of hygiene products, behind the cosmetics counter, there was also an
open package, of adult diapers.
I tried on several occasions, to assist customers, and to ring them up,
at the cosmetics counter. However, Lucy, who had other tasks to complete in the
store, would not allow me to assist customers-although, I had no problem
working the cash register, on my own. Lucy, was refusing to train me, and, she
would send me off, to work on one of her assignments-with no directions, while
she logged on to the cosmetics counter cash register, and rung up all of the
customers. When I walked away from the
cosmetics counter, I could not hear what Lucy was saying to the customers, however,
I noticed, very disgruntled expressions, from several of the customers, that
Lucy assisted.
Then, Lucy intentionally jammed the cash
register drawer shut, at the cosmetics counter, after she made a sale. I
watched her tapping the computer screen, of the cash register, and she was
hitting the wrong buttons, in order to re-open, the cash register drawer. I,
therefore, told Lucy how to re-open, the cash register draw, to deposit, the
money from the sale she just made. Lucy was obviously upset with me, for
providing her with the correct instructions, on how to place the money from the
sale, into the cash register drawer-and this bothered me some. I saw a: “Red
Flag.”
I decided, at that point, that I did
not want to work, at the same cash register, as Lucy. I immediately suspected
Lucy for acts of fraud, in the workplace, because it was an extremely suspicious
act, when she jammed the cash register draw shut, and then pretended, like she
had no idea, how to open the cash register draw back up. I knew, right then,
and there, that I would have to report Lucy, to Ms. Patty, the hiring manager, and
to Kat, the assistant manager, for suspected acts of fraud, in the workplace.
However, before I went to Kat, the assistant
manager on duty, to complain about what Lucy had just done, I asked Lucy, about
what else had to be done, on the list of assignments, that had to be completed,
on the 16th of April, 2015. I pointed to some words on the page, of
the list of assigned tasks, and asked Lucy, why baby med.s, were located on the
baby isle, and Lucy told me, that the word I was reading, did not say
med.s-that it said needs. I told Lucy, that she was incorrect, that the word
required two “e’s.” Lucy, did not even notice, that the word also required, an “n”
instead of an “m.” It was then that I realized, that Lucy, could not really
speak or read English very well.
I then went to Kat, the assistant
manager on duty, and complained to Kat, about working with Lucy, because: she
was not training me, she was not allowing me to us the cash register to ring up
customers, at the cosmetics counter, and, she was very difficult to understand,
because of her broken English. Kat became very defensive, and did not want to
hear my complaints. I asked if I could work at the front cash register, with:
Meme and Daniel instead, and Kat said, that we would have to talk it over, the
next day with Ms. Patty, when she came in, because, Ms. Patty was the one
responsible for hiring me.
Then
Kat told me, to go do some of the Walgreens training exercises on the computer,
in the store office, until my shift was over. I walked out of the store room,
away from Kat right away, to head back to the Walgreens store office, to
complete the online training exercises, as Kate suggested I do, but then, when
I left the store room, Kat yelled out-very loudly: “Do you have a problem with
me?” I was startled, and replied: “No, I have no problems with you, I was
simply going to begin the store training exercises, as you instructed me, to do
so.”
I was perplexed, as to how
Lucy, could have passed the exams, at the end of the training videos, for the
Walgreens cosmetics department, when she does not speak, or read English very
well. I began taking a new training video, and at first, I got all of the
answers correct, and then, I began intentionally missing questions, to see what
would happen, with the results of the exam, if I missed too many.
After I failed a training exam, on the
Walgreens computer, I was given as many opportunities as I required, in order to
pass the exam. All I had to do, was remember which questions I missed, and
then, select a different answer, the next time, I went through the exam. It
took me four times, to pass one exam, passing it, by trying different answers,
to the questions I missed, until I had selected the correct answer. I was not
penalized, for all of the extra attempts, on the exam.
I had been in the Walgreens store
office, for less than half an hour, playing around, and experimenting, with the
Walgreens online computer training program, when, both: Kat and Carla, came
into the back office, because Kat wanted to speak with me again. Kat told me,
in front of Carla, that Lucy wanted to sue me, for harassment, because I told
her, that I did not want her training me, because her English, was too difficult,
for me to understand. I thought that was completely outrageous.
Kat told me, that the store is all
inclusive, and that there was no way, for me to work in cosmetics, without
working with Lucy. That was a change, from when I came into the office, that
morning-when she asked me, how much longer, I thought I would need assistance,
learning how to use the cash register. That morning, Kat made it sound like,
after I was trained, that I would be working in cosmetics alone, and then, that
afternoon, she was telling me, that I had to work with Lucy.
I asked again, if I could be moved,
from the cosmetics counter, to the front of the store, to work with: Meme, and
Daniel instead, and Kat said, that I would have to come in the following day,
and speak to both: her, and Ms. Patty, about being moved to the front cash
register. Then Kat said, that she was not aware of any employment openings, at
that position, and therefore, she thought it would be best, if I learned to
understand Lucy-which I was not willing to do. I did not want to tell Kat, why
Patty had hired me, or, that I was really uncomfortable, with the open bag of
adult diapers, that Lucy had behind the cosmetics counter, and, that I was
really uncomfortable, with sharing a cash register with Lucy, because, I
suspected, that she may be stealing, from the cash register in cosmetics.
Then Kat proceeded to tell me, that
she felt like I was attacking her, when I was complaining to her, about trying
to work with Lucy-in the Walgreens store room. I was on the other side of the
Walgreens store room, when I was talking to Kat. I was not really arguing with
her-I was just explaining the situation to her. I never raised my voice. I
never said anything sarcastic. I never called Kat a name. I never lunged at
Kat, or reached out to touch her. I had no idea, what Kat was talking about,
when she told me, that she felt like I was attacking her, when I was
complaining about working with Lucy. I felt frustrated, and, I was thinking
about quitting.
All morning long, while I had been
completing assignments for Lucy, she was not following Walgreens store
protocol. Lucy forced me to leave carts in the isle, and assignments
unfinished, and at one point, Lucy left the package, of open adult diapers, on
the cosmetics counter, where customers, are supposed to place their items, from
cosmetics, for purchase. I was alarmed. I was also embarrassed-although, I
personally, do not need adult diapers.
I
thought it was incredibly inappropriate, for Lucy to leave, an open package, of
adult diapers, on the cosmetics counter, however-it did not phase Lucy, at all.
Then I wondered, if Lucy was passing out the adult diapers for free, at the
cosmetics counter, along with, the free: shampoo samples, toothpaste, body wash
etc. .I wondered, if Lucy was trying to attract customers to the cosmetics
counter, by leaving the open package, of adult diapers, in plain sight, for the
cosmetic customers to see?
After Kat was done talking to me, in
the Walgreens store office, she and Carla left the office, and I continued
working on the training activities, on the computer. Then, Lucy and Carla,
entered the Walgreens store office together. By that time, Lucy already knew,
that I could not really understand her broken English. I hardly spoke to Lucy
all day. I do, however, speak some Spanish. When I told Lucy, that I was having
a difficult time understanding her English, I thought that maybe she would try to
explain things to me in Spanish. Carla, the other manager working that day,
also speaks some Spanish. However, Lucy never tried to speak to me, in Spanish,
and Lucy never spoke to Carla in Spanish, in front of me.
When Lucy, came back to the Walgreens
store office, with Carla, I looked at her very carefully. I was extremely
uncomfortable, being in the office with her, because she told Kat, that she
wanted to sue me for harassment, because I said it was too difficult to
understand her broken English. When I looked more closely, at Lucy, I realized,
that she might really be from the Middle East, instead of from a Spanish
speaking country. She showed me her son’s name, and it was a very unusual
name-it was not a typical male name, for a Latino child. When Carla decided to
leave the Walgreens store office, where I was training on the computer, Lucy
did not want to leave with her, and that was when, I decided to quit working at
Walgreens. I did not want to be alone with Lucy.
When I got home, I Facebooked, and
Tweeted, about my highly unusual day at work, at Walgreens, at 13th street,
and 39th Avenue, in Gainesville, FL, U.S.A., and, I sent a text
message to Ms. Patty, to give her the final results, of my under-cover fraud investigation.
I told Ms. Patty, that I thought that Lucy, was the cause, of Walgreens losing business,
and, of the cosmetics department at that Walgreens location, losing sales. I
told Ms. Patty, that Lucy had very broken English, which was difficult to
understand, that Lucy did not read English very well either. I told Ms. Patty,
that Lucy was only passing out items, which Walgreens intended customers to
have for free, if customers made a purchase, in the cosmetics department. I
told Ms. Patty, that I saw Lucy, intentionally lock herself out of the
cosmetics counter cash register, and, therefore, I suspected, that she was
stealing cash, from the cosmetics cash register, and, I told Ms. Patty, that I
strongly suspected, that Lucy, was passing out free adult diapers, at the
cosmetics counter, with cosmetic’s purchases, and possibly encouraging the
customers to prostitute.
I told Ms. Patty, that Americans, do not
want to shop at a store, where they are given a free adult diaper, along with a
cosmetics purchase. Prostitution, is illegal in the U.S. .Too often, people
immigrate to the United States, from other parts of the world, and they refuse
to acculturate-they do not want to learn, or to abide by: U.S.: laws, rules,
and regulations. Although, Kat said Lucy, was doing a wonderful job, selling
products at the cosmetics counter. Ms. Patty told me, that sales were down for
the entire store, and in particular, for the cosmetics counter.
When I asked Carla about the situation, I
asked her if she thought that C.V.S., being directly across the street, was a
factor for slow sales at Walgreens, and Carla said, that C.V.S., was not a
factor. I think that Lucy, on her own, may be the reason, why Walgreens, was losing
sales, and why sales were down in the cosmetics department-specifically,
however, I was really very uncomfortable with Kat, and how she interacted with
me, because she defended Lucy-over, and over again.
According to James Tackett (May/June 2008),
covert investigations occur in the workplace, on a regular basis these days, in
both: small, and large companies (p. 1). Covert investigations, are dangerous,
and therefore must be carried out carefully (p.1). There are certain legal
guidelines, which must be strictly adhered to, in order for a covert
investigation to be successful. Studies show, that amateur investigators, can
make mistakes, with invasion of privacy, and evidence collection, which can
make evidence, insubmissible in court. If evidence is collected incorrectly,
then, an employee can sue the company, for not following the legal guidelines,
that are in place, to protect, the suspected fraudster. In a worst case
scenario, a fraud investigation, gone wrong, can lead to serious “injuries,” or
even “death (p. 1).”
What causes and/or evidence, must an
employer have, to justify, a fraud investigation? According to James Tackett
(May/June 2008):
Employers have broad powers to
investigate improprieties within their organizations, provided they have
“probable cause.” Probable cause exists when a reasonable person would conclude
that illegal or improper activities are likely occurring within the
organization. (p. 1)
The bottom-line, is that, if you
suspect, that an employee at your company, is engaging in an act, or acts, of
fraud, then, management has sufficient probable cause, to initiate, a covert
investigation (Tackett, 2008, p. 1).
There are three basic kinds of fraud, which can occur, in connection with
a company:
1. Accounting Fraud;
2. Consumer Fraud; and
3. Organizational Fraud.
Accounting fraud occurs, when a
company decides to: “cook the books,” and to lie about on their financial
accounting statements, in order to make their company, look better, to:
consumers, investor, shareholders, and to financiers. Companies, that are not
meeting their revenue sales goals, often engage in a practice known as: “earnings
management,” in order to make the company’s financial records and outlook,
appear, to be in better condition, than in reality, they are.
When a company commits, an earnings
management, act of fraud, money is moved, from fund accounts, where it is being
held indefinitely, to pay for: warantee coverage, or for restricted use, or,
sometimes, a payment that is due, or that is paid, is credited to the wrong pay
period, to improve the overall picture, of the financial accounting records,
and financial statement, for a particular pay period. Sometimes financial
accounting entries, are just plain falsified. Companies that engage in earnings
management acts of fraud, are usually-eventually caught, because an employee,
who is a whistleblower, provides a suspected fraud tip, to management, or,
because an auditor, or an investigator, spots anomalous entries, in the company’s
financial statements.
Consumer fraud occurs, when consumers,
are cheated or stolen from, by vendors, who offer specific products, or
services, for an agreed amount of money, and then, the products, or services
that are provided, are of poor quality, not in a timely manner, or simply not
provided for the consumer at all. Additionally, identity theft, is considered
consumer fraud. Identity theft, is when fraudsters, collect bits and pieces, of
personal information from people, and then, they either sell the personal
information, on the Black market, to the highest bidder, or, the fraudster,
utilizes the personal information, to steal money from the victim, to open bank
accounts in the victim’s name, to apply for employment in the victim’s name,
etc..
There are a number of protections,
against consumer fraud, in the United States. There are government agencies, in
the U.S., that are supposed to track and follow, consumer fraud problems here,
and, that are supposed to assist Americans, with preventing consumer fraud. The
consumer fraud protections, which are in place, in the U.S., at this time, are
not that effective, because of the poor policy choices, of the Obama
administration. At this point in time, the best an American consumer can do, in
regards to consumer fraud, and consumer fraud protections, is to be proactive,
and to be careful. Consumers should not:
1. Share personal identification
information with strangers, through: phone, email, online chatting, etc.;
2. Share personal access codes, or
PINs, to personal accounts;
3. Throw away papers or other items,
that contain personal, identifying information-shred it, etc..
Organizational fraud, is fraud that
occurs, at a company, and that usually involves, more than one employee-or the
fraud involves both: employees, and management. Organizational fraud, is very
often, collusive, and, can be caused, by a third-party, that is acting against
a company, as well. The fraud that I investigated, at Walgreens, in
Gainesville, FL U.S.A., at 13th Street and 39th Avenue,
is an organizational fraud. Although, it appeared to me, that Lucy, was the
only employee, that was possibly stealing cash from the cash register, and,
handing out adult diapers for free, with cosmetics purchases-Lucy, could have
been fired, a long time ago, and someone, in management-I suspect the assistant
manager Kat, decided not to fire Lucy-even though, her behaviors, and her
actions, are inappropriate, by American standards, and, that makes the
Walgreens suspected acts of fraud, a collusive-an organizational fraud.
Therefore, because Lucy was not fired by Kat, for her acts of fraud in the
workplace, both Kat, and Lucy, must be investigated, for suspected acts of
fraud, in the workplace.
In order to execute, an undercover
fraud investigation, as previously stated, according to Tackett (2008), the
privacy rights, of the suspected fraudster, must not be violated (p. 2). In America,
employees at a company, have generally expected rights to privacy. According to
Tackett (2008), reasonable privacy rights, in-so-far as surveillance equipment
is concerned, must follow, the following guidelines:
Physical surveillance, including
videotaping, would be acceptable in public places or open work areas, but these
methods would be prohibited in lavatories or locker rooms. Similarly, outdoor
surveillance of parking lots or shipping and receiving areas is acceptable, but
surveillance through the windows of a private residence is not allowed. Employee
offices, desks, and filing cabinets may be acceptable surveillance targets
depending on the circumstances—consult legal counsel. (p. 2)
There are different legal guidelines
in place, for taping, of conversations. According to Tackett (2008), the
following guidelines, are applicable, to taping employee conversations, in the
workplace, during covert investigations:
Recording conversations has greater
legal complexities, and this activity must be approved in advance by legal
counsel. Yet, even here, many employers have the legal right to record the
conversations of their employees (verbal, telephone, e-mail) while they are
working. It is legal to record the conversations of others providing you are a
party to the conversation in most states. In the remaining states—referred to
as all-party states (California, Connecticut, Delaware, Florida, Massachusetts,
Maryland, Michigan, Montana, New Hampshire, Pennsylvania, and Washington), you
must inform the other parties that you are recording the conversation. (p. 2)
There is a significant difference,
between individuals, who are hired by a company, as a professional fraud
investigator, and, individuals, who agree to investigate a fraud, as an under-cover
fraud investigator, and an employee. According to Smith (2012), undetected
evidence collection, is the primary reason, for an under-cover fraud
investigation (p.3). I am not, a professional investigator. While I have
academic training, in the field of: fraud, fraud prevention, fraud detection,
and fraud resolution, I am not a: C.P.A., or any other type, of certified and
trained expert, in the field, of fraud investigation.
I was hired, for the most basic of
investigative positions-the “discreet observation” position (Tackett, 2008, p.
2):
The most basic form of covert
investigation involves discreet observations by company personnel who appear to
be carrying out their routine responsibilities. When investigative observers
feign their attention elsewhere, malfeasant employees can be surprisingly
brazen. Professional investigators are obviously not required for such simple
observations, and all that is needed is a confirmation that employee privacy
rights are not being violated. (p. 2)
I investigated the situation at
Walgreens, as an under-cover fraud investigator, who was hired as an employee,
for: “discreet observations.” Professionally, I work as a freelancer:
researcher, writer, investigator, photographer, and reporter, and, I am looking
for a professional: editor and/or publisher, for my news stories:
Miss Bayo Elizabeth Cary, A.A.,
B.A., M.L.I.S.
1005 N.W. 39th Avenue
Gainesville, FL 32609
Student: Northcentral University,
Post Master’s Certificate, Business Administration, Specialization: Advanced
Accounting 2015
bayo.cary@yahoo.com
Home/Cell: 001-352-262-9733 Google Blogger: bayocary.blogspot.com Toll Free
U.S.: 1-888-571-0019 Fax: 1-352-433-1875 Please contact me, if you are willing
to consider printing, one of my stories, or, if you are interested in hiring
me, for an investigation, or a news story.
While I was able to observe, and to
collect a great deal of information, and training, in regards to the Walgreens
work environment, in just two days, as previously stated, I am not trained, as
a professional investigator. Professional investigators, have specialized, expert
skills, and training, which allow them to both: collect culpable evidence, of
fraud in a workplace, and, to testify in court, for the prosecutor, as an expert
witness. According to Tackett (2008), the following, is an abridged list, of
some of the skills, and qualifications, that a professional fraud investigator,
should possess:
Professional investigators of
workplace misconduct have received specialized training in covert methods,
courtroom procedure, litigation avoidance, evidence accumulation, and many
other topics that go beyond the training of a typical CPA or internal auditor.
They frequently have occupational fraud investigative certifications such as
Certified Fraud Examiner or Certified Forensic Accountant. Many are experts in
interviewing and interrogation techniques, which are highly useful in
extracting legal confessions when the covert investigation migrates into an
open inquiry. Professional investigators can operate in a supportive role,
giving advice and counsel, or they can conduct the covert investigation
themselves. (p. 2)
According to Tackett (2008), a fraud
investigation, covert, or otherwise, should be ended immediately, if:
. . .any routine covert
investigation, such as theft of merchandise by employees, with signs of
escalating threats or potential violence should be discontinued until both
legal counsel and professionals are consulted. (p. 3)
On the second day, that I worked at
Walgreens, as an under-cover fraud investigator, I had to quit the job. The
work became too dangerous for me, in only two days. Lucy, as previously stated,
threatened to sue me, for harassment, for telling her, that she could not train
me, to work at the cosmetics counter, because I could not understand her
English well enough. Additionally, Kat-the assistant manager, telling me, that
she felt like I was attacking her, when in fact, I was merely having a
conversation with her, made the work environment at Walgreens, too dangerous,
and too unfriendly, for me to continue working there, as an employee.
When an under-cover fraud investigator,
or an employee, reports an act of suspected fraud, by another employee, or by
management-in the case of Walgreens, as previously stated-I recommend, that
both: Lucy, and Kat, be investigated-then, management, has an obligation to the
company: Walgreens, to follow through, with a full fraud investigation of the
workplace. According to Tackett (2008), in order to resolve, an act, or acts of
fraud in the workplace, management, must follow through, with an investigation:
. . .almost every successful covert
investigation eventually becomes an open inquiry when the desired evidence is
obtained. At this point, the focus shifts from evidence accumulation to
interviews and the interrogation of suspects. The suspect interrogation area
can have legal complexities that require professionals. (p. 3)
A fraud investigator, must be hired,
to conduct a full fraud investigation. According to Tackett (2008), there are
certain skills, qualifications, and recommendations, to look for, in a professional
fraud investigator:
When choosing a professional
investigator, experience and reputation should be taken into consideration. Ask
for references and general descriptions of prior experience with covert
investigations. Engagement details such as their willingness to testify in
court or any subsequent legal proceedings should be verified in advance. (p. 3)
When a fraud investigation, of a
suspected fraudster is recommended, the investigation, must be conducted, to
fulfill certain: ethical, moral, and legal obligations, which management, and
employees, have towards the company, which they work for. “Unlike an audit, in
which the client’s cooperation is essential, fraud examination involves dealing
with potentially uncooperative individuals-even liars, cheats, and thieves (Wells,
2009, p. 1).”
What is a professional fraud investigation? According to Smith (2012), a
fraud investigation and examination:
Fraud examination is the process of
identifying and determining whether fraud has occurred. This process includes
collecting and analyzing documentary evidence, interviewing key personnel
within an organization and suspects of fraud, reporting on observations, and
testifying on conclusions. (p. 2)
Because of the fact, that a fraud
investigation, often times, involves collecting information, from dishonest
people, sometimes, various techniques are applied, to the information
collection, so that the most accurate information possible, may be obtained. “If
your client authorizes you to conduct a full investigation and you accept, your
work could easily end up being reviewed in court, so approach the case with
that thought uppermost in your mind (Wells, 2009, p. 1).
There are fundamental, and, there are
State and Federal: laws, rules, and regulations, which guide, how information,
can be legally collected, from a suspected fraudster, and others, during a
fraud investigation. According to Wells (2009), the following, are some of the
guidelines pertaining to, the legal collection of information, during a
professional fraud investigation:
1. Conducting pre-text interviews,
under-cover operations, and other investigative trickery can be perfectly
legal;
2. Using the name of a law enforcement
agency is considered “impersonation,” and it’s a crime;
3. If you use a real company name, for
a cover, then, that company can sue you. (p. 2)
4. You need to have a clear
understanding with the client as to whether it is necessary to protect their
identity. If so, you must protect it;
5. You should not disclose information,
which you have gathered in other interviews;
6. Abide by the privacy regulations and
guidelines pertaining to personal information collection. (p. 3)
If you are a qualified professional
fraud investigator, then, you are constrained by certain reporting obligations,
because of the professional license that you hold, in order to investigate cases,
of suspected fraud, in the workplace. A C.P.A.-if fraud is discovered, and the
fraud involves management, at a company-according to Wells (2009), is required
to report, to the company’s board of directors.
Additionally, according to Wells (2009), if a C.P.A., investigates a
fraud, and discovers corroborating evidence, that fraud did indeed occur, at a
public company, and management was involved, then, the fraudulent situation, must
be reported, to both: the F.B.I., in the United States, and to, the S.E.C., in
the U.S. . “A CFE, engaging in a fraud investigation, is obligated to inform
the client, prior to beginning the investigation, that, if the client-him or
herself, is found guilty of fraud, the fraud will be reported, to the proper
authorities (Wells, 2009, p. 3).” I will be sending in copies of my report, as
soon as I complete it, to both: the F.B.I. and the S.E.C., because Kat, the assistant
manager, was too sympathetic, towards Lucy.
The resolution process of a fraud investigation, often times, involves
taking the case to court. In order to send, a clear message, to other
employees, at the company, that fraud will not be tolerated, in the workplace,
the company, where fraud is suspected, is obligated, to conduct a full,
professional investigation, and, if culpable evidence is collected, the company
is obligated, to take the case to court, to prosecute. According to Smith
(2012), the following, are the consequences, associated, with committing an act
of fraud, in the workplace, in the United States:
Consequences of fraud include
criminal and civil enforcement actions, profit disgorgements, fines, prison terms
for employees, and reputation-damaging headlines for the organization. To limit
these consequences, senior management might conduct a fraud examination and might
consider implementing an antifraud program to prevent, deter, and detect improper
conduct by employees and agents. (p. 3)
According to Albrecht,& Hoopes
(2014), sometimes, when fraud is discovered, in a workplace, a company may
attempt to blame an auditor, for not discovering the fraudulent acts first.
Auditors, cannot guarantee, that all acts of fraud, will be detected, during an
audit. There are certain types of fraud, which occur in the workplace, that are
very difficult, for auditors to detect. Many times, when a devastating act of
fraud, is discovered at a company, shareholders, will decide to sue the
auditing company, for failing to detect the fraud, prior to severe financial
losses (p. 3).
According to Albrecht,& Hoopes
(2014):
Despite the public’s view of the auditor as a
protector, the accounting and audit literature state that a company has the
primary duty to design, implement, and maintain a system of internal controls
that provide reasonable assurance that reliable financial statements can be
produced and that auditors have the responsibility to provide reasonable assurance
that the financial statements are prepared fairly in accordance with U.S. GAAP.
(p. 3)
Even with an auditor, exercising due
care, when conducting an audit, and, providing “reasonable assurance,”-according
to Albrecht,& Hoopes (2014), there are still four auditing situations, that
do frequently occur, whereby, it is extremely difficult, for an auditor, to
detect fraud: “Could The Auditor Have Detected Fraud?”:
. . .four factors that made it
extremely difficult—if not impossible—for even a properly designed and
performed financial statement audit to detect a material fraud:
- The nature of accounting records necessitates sampling
- The use of outsiders to help conceal the frauds
- Reluctance of people to disclose what they know
- Forgery and lying. (p. 4)
In cases, where an audit occurred,
and the auditors failed, because of lack of: skills, experience, training,
protocol, due effort, etc., to detect fraud, then, according to Fereance
(2015), there are steps that a company, can go through, in order to resolve the
matter, with the auditor, through the U.S. court system:
In such cases, plaintiff attorneys
may contend that the CPA failed to exercise due care in accordance with Article
V of the Principles of Professional Conduct, which are included in the AICPA
Code of Professional Conduct. Lawyers may allege that CPAs have a duty to
identify and inform clients of fraud red flags such as suspicious activities or
internal control deficiencies. (p. 1)
In cases, where the auditor is found
guilty, of not performing, an adequate audit, the company, is still liable, for
the fraud, which occurred on their premises, and by their employees, and/or
management. Fraud, has devastating consequences, which effect the entire
company, and all of the investors, and shareholders as well. Sometimes, if a
fraud occurs at a company, that is larger than most, the act of fraud at the
company, can impact, the entire U.S. stock market and therefore, the U.S.
economy.
Quite literally, the stability of the U.S. economy, could be shaken, by
one very large company, and, an unchecked act of fraud, that has drained the
company, of billions of dollars U.S.D. .Fraud prevention, is a responsibility,
of all businesses, within the United States. By ensuring, that companies in the
U.S., report financial accounting statements correctly, and in a timely manner,
and within U.S. business accounting guidelines: American companies, are
protecting: themselves, investors, shareholders, consumers, and the U.S.
economy.
In conclusion, according to Wells
(2009), in regards to a final statement, from an individual, such as myself,
who has participated, and conducted, and under-cover fraud investigation, as an
employee: “Reporting must normally be done in writing, and no issues, that were
detected, regarding possible acts of fraud, in the workplace, may be excluded
(p. 3).” This research paper, that you have just read, is my final, and
concluding report, for the under-cover fraud investigation, which I engaged in,
on April 15, and April 16, of 2015, at Walgreens, on 13th Street,
and 39th Avenue, in Gainesville, FL U.S.A. .
If you have any questions, regarding
my findings in the report, or, any of my final conclusions, please do not
hesitate, to contact me. Thank you for your time, and for your full
consideration, regarding the matters stated above. For additional information,
regarding fraud investigations, please refer to the direct quote notes, that I
compiled, in order to write my research paper-they are attached, at the end of
the paper, after the References section. Thank you again.
References
Albrecht,
W. Steve,& Hoopes, Jeffrey L. (Oct. 2014). Why Audits Cannot Detect All
Fraud.
CPA Journal, 84. Retrieved from http://eds.a.ebscohost.com.proxy1.ncu.edu/eds/pdfviewer/pdfviewer?vid=2&sid=e9212cf1-9aaf-4151-89e6-e52b02fc54be%40sessionmgr4004&hid=4111
Ference,
Sarah Beckett. (Feb.2015). Failure to Detect Theft and Fraud: It’s not just an
audit
issue. Journal
of Accountancy, 219. Retrieved from http://eds.a.ebscohost.com.proxy1.ncu.edu/eds/pdfviewer/pdfviewer?vid=4&sid=e9212cf1-9aaf-4151-89e6-e52b02fc54be%40sessionmgr4004&hid=4111
Smith,
Ernest Patrick. (June 2012). The Basics of Business Valuation, Fraud and
Forensic
Accounting, and
Dispute Resolution Services. CPA Journal, 82(6). Retrieved from http://eds.a.ebscohost.com.proxy1.ncu.edu/eds/pdfviewer/pdfviewer?vid=1&sid=45186db5-9fab-4cf6-a5be-b1787f96d8fd%40sessionmgr4001&hid=4211
Tackett,
James A. (May/June 2008). Covert Investigations In The Workplace. Journal of
Corporate
Accounting & Finance, 19, 7-11. doi: 10.1002/jcaf.20396.
Wells,
Joseph T. (June2009). Practical and Ethical Considerations In Fraud. CPA
Journal, 79 (6). Retrieved from http://eds.a.ebscohost.com.proxy1.ncu.edu/eds/pdfviewer/pdfviewer?vid=6&sid=25676ede-2b7c-419a-ad8b-a76c2cdfd05c%40sessionmgr4001&hid=4211
Appendix: Additional Reference Materials: Direct Quote
Notes:
Post Master’s Certificate Degree: Northcentral
University: Business Administration: Specialization: Advanced Accounting
Miss Bayo Elizabeth Cary, A.A., B.A., M.L.I.S.
Home/Cell: 001-352-262-9733 Toll Free U.S.A.:
1-888-571-0119 Fax: 1-352-433-1875
Mailing Address:
Miss Bayo E. Cary
1005 NW 39th Avenue
Gainesville, FL 32609
Assignment 8: Fraud Resolution: Fraud Prevention and
Detection: Final Assignment
Write a paper to provide a detailed explanation of how
the knowledge gained in this course provided you with an understanding of the
different types and varieties of fraud and how they affect you, your company, and
community and society as a whole. How would you define instances of fraud and
then if fraud occurred, how would you mitigate and report the situation to help
bring about resolution?
Covert Investigations In The Workplace
In reality, covert investigations
are far less glamorous—and have become routine in many large business
organizations. A covert investigation is designed to obtain evidence of
impropriety by discreet surveillance, forensic analysis, or undercover
operations. (p. 1)
Accordingly, always consult your
legal counsel before starting a covert investigation. (p. 1)
.
Undercover Fraud Investigations are
Dangerous
A carefully planned and executed
covert investigation can identify perpetrators and prevent the destruction of
incriminating evidence. However, a flawed inquiry can result in litigation
losses that far exceed the original theft or embezzlement that triggered the
probe. Even worse, a slipshod investigation can result in serious injury or
death. (p. 1)
Legal Issues
Employers have broad powers to
investigate improprieties within their organizations, provided they have
“probable cause.” Probable cause exists when a reasonable person would conclude
that illegal or improper activities are likely occurring within the
organization. (p. 1)
Some examples of probable cause
could include missing inventory, fictitious business
documents, or the deliberate
destruction of company property. Having probable cause, employers can conduct
open or covert investigations. (p. 1)
Do Not Violate Employee Privacy
Expectations
A key legal requirement in
conducting a covert investigation is to avoid violating an employee’s
reasonable expectation of privacy. Physical surveillance, including
videotaping, would be acceptable in public places or open work areas, but these
methods would be prohibited in lavatories or locker rooms. Similarly, outdoor
surveillance of parking lots or shipping and receiving areas is acceptable, but
surveillance through the windows of a private residence is not allowed. Employee
offices, desks, and filing cabinets may be acceptable surveillance targets
depending on the circumstances—consult legal counsel. (p. 2)
Legal Requirements for Recording
Conversations
Recording conversations has greater
legal complexities, and this activity must be approved in advance by legal
counsel. Yet, even here, many employers have the legal right to record the
conversations of their employees (verbal, telephone, e-mail) while they are
working. (p. 2)
It is legal to record the
conversations of others providing you are a party to the conversation in most
states. In the remaining states—referred to as all-party states
(California, Connecticut, Delaware,
Florida, Massachusetts, Maryland, Michigan, Montana, New Hampshire,
Pennsylvania, and Washington), you must inform the other parties that you are
recording the conversation. (p. 2)
Accordingly, audio surveillance can
be an effective means of gathering information, provided the investigator is a
party to the conversation and is not located in an all-party state. Some
all-party states—Pennsylvania, for example—create exceptions to the
notification rule if the conversation involves certain types of illegal
activity. Again, consult legal counsel for an accurate assessment of your
recording opportunities. (p. 2)
Professional Investigators
Every employer has the right to
monitor the working environment of his/her employees for purposes of quality
control and compliance with company policies.
(p. 2)
Most Basic Covert Investigation:
Discreet
The most
basic form of covert investigation involves discreet observations by company
personnel who appear to be carrying out their routine responsibilities. When
investigative observers feign their attention elsewhere, malfeasant employees
can be surprisingly brazen. Professional investigators are obviously not
required for such simple observations, and all that is needed is a confirmation
that employee privacy rights are not being violated. (p. 2)
Professional Private Investigators
and Covert Investigations
Professional investigators of
workplace misconduct have received specialized training in covert methods,
courtroom procedure, litigation avoidance, evidence accumulation, and many
other topics that go beyond the training of a typical CPA or internal auditor.
They frequently have occupational fraud investigative certifications such as
Certified
Fraud Examiner or Certified Forensic
Accountant. Many are experts in interviewing and interrogation techniques,
which are highly useful in extracting legal confessions when the covert
investigation migrates into an open inquiry. Professional investigators can
operate in a supportive role, giving advice and counsel, or they can conduct
the covert investigation themselves. (p. 2)
Amateur Investigator
First, amateur investigators are
more likely to commit legal errors in their zeal to gather incriminating
evidence. (p. 2)
For example, the failure to properly
document the chain of custody of physical evidence corruption. (p. 2-3)
Fourth, placing investigators in
harm’s way through undercover assignments or working with informants calls for
professionals. (p. 3)
Also, any routine covert
investigation, such as theft of merchandise by employees, with signs of
escalating threats or potential violence should be discontinued until both
legal counsel and professionals are consulted. (p. 3)
Fifth, professionals should be
consulted when high-tech surveillance, computer forensic, polygraph,
fingerprint, or other advanced techniques are desired. (p. 3)
Sixth, many larger organizations
employ internal investigators, such as internal auditors or loss prevention
specialists, who hold one of the recognized fraud investigation certifications.
Having such in-house talent gives them a clear advantage in conducting covert
investigations. (p. 3)
Finally, almost every successful
covert investigation eventually becomes an open inquiry when the desired
evidence is obtained. At this point, the focus shifts from evidence
accumulation to interviews and the interrogation of suspects. The suspect
interrogation area can have legal complexities that require professionals. (p.
3)
When choosing a professional
investigator, experience and reputation should be taken into consideration. Ask
for references and general descriptions of prior experience with covert
investigations. Engagement details such as their willingness to testify in
court or any subsequent legal proceedings should be verified in advance. (p. 3)
Nearly every state regulates private
investigators, and your legal counsel should review their license and the
adequacy of their liability insurance coverage. (p. 3)
Cameras To Deter Fraud
One strategy is to place the cameras
in plain view; this can serve as a powerful deterrent, but many cameras and
recorders will be required for adequate coverage. Also, clever fraudsters can
easily disable visible cameras, or modify their fraudulent methods to render
them impotent. (p. 3)
Covert Video Camera
In a covert operation, the camera
should be well hidden but still provide compelling evidence of wrongdoing if it
exists. (p. 3)
Computer Forensics Evidence
Commercial “spyware” programs, such
as Spector Pro 6, can silently timestamp and record which Web sites were
visited, which programs were used, and every stroke of the keyboard. However,
if serious legal action is contemplated, then a computer forensics specialist
should be retained to clone the hard drive and preserve the available evidence
in proper legal form. (p. 4)
Forged signatures and fictitious
documents present another type of problem; however, a covert examination of
questionable documentation is usually simple, provided a professional examiner
has unrestricted access. Fingerprints can be lifted off paper documents, and a
comparative microscope can flag bogus documents by examining their print and
paper characteristics at high magnification. (p. 4)
A cautionary note: if incriminating
evidence is discovered during a forensic document examination, the original
document may need to be seized as evidence, and this seizure could destroy the
“covert” element of the investigation. Under such circumstances, it may be
advisable to lock down all of the related records until their value as evidence
can be properly assessed.
(p. 4)
Otherwise, massive document
destruction, such as Arthur Andersen shredding Enron’s working papers, could
begin as perpetrators feel the heat of the investigation. (p. 4)
Undercover and Mobile Operations
However, there are times when
undercover operations or mobile surveillance become necessary. These are among
the most expensive and risky investigative methods, and they should only be
used when absolutely necessary to achieve a highly valued objective. (p. 4)
Undercover Investigations
Undercover operations establish a
fictitious identity for the investigator and then use that identity to directly
gather incriminating evidence from other persons. (p. 4)
Developing a Strategic Plan
Covert investigations can produce
results that are unachievable by any other means, and organizations need to
develop a plan for using them where appropriate. Large organizations with
internal auditing or loss prevention departments could consider hiring
permanent employees who possess significant fraud investigation expertise. (p.
4)
Alternatively, such organizations
could encourage their existing staff to earn one of the recognized fraud
investigation certifications. Employing fraud investigation professionals
internally can augment the antifraud and internal control provisions of the
Sarbanes-Oxley Act, as well as provide an expert opinion on a multitude of
investigative and legal questions. (p. 4)
Practical and Ethical Considerations
in Fraud Examinations
The various high-profile schemes
that have recently come to light across the country serve as a reminder that
all CPA’s should remain vigilant, looking out for the red flags that could
indicate fraud. (p. 1)
Discovery
What do you do, if you uncover a
suspected fraud?
The potential for serious problems
is due primarily to the adversarial nature of the fraud examination process.
(p. 1)
Unlike an audit, in which the
client’s cooperation is essential, fraud examination involves dealing with
potentially uncooperative individuals-even liars, cheats, and thieves. (p. 1)
Legal and Ethical Questions:
How do you legally collect evidence?
Witness Interviews, Suspects, Financial Institutions,& Credit Bureau
Reports, etc.?
Relations with Clients
If your client authorizes you to
conduct a full investigation and you accept, your work could easily end up
being reviewed in court, so approach the case with that thought uppermost in
your mind. (p. 1)
The failure or success of a fraud
case hinges on many factors beyond an auditor’s control, including the
availability of evidence, the cooperation of witnesses, and legal process. (p.
1-2)
Billing Ethics
If you bill by the hour, it would be
a violation of the Certified Fraud Examiner (CFE) Code of Professional Ethics
to promise the client guaranteed success in resolving the suspicion. (p. 2)
You can accept as payment a portion
of any recovery of loss resulting from your efforts, provided adequate
disclosure of the arrangement is made, where appropriate. (p. 2)
Disclosures to Your Client
All relevant facts, concerning the
alleged fraud must be revealed to the client. (p. 2)
Disclosures to Third Parties
What can you tell third-parties,
about what you are doing?
Conducting pre-text interviews,
under-cover operations, and other investigative trickery can be perfectly
legal. (p. 2)
Using the name of a law enforcement
agency is considered “impersonation,” and it’s a crime.
(p. 2)
If you use a real company name, for
a cover, then, that company can sue you. (p. 2)
Interviews and Legal Issues
You need to have a clear
understanding with the client as to whether it is necessary to protect their
identity. If so, you must protect it. (p. 3)
You should not disclose information,
which you have gathered in other interviews. (p. 3)
Client’s Participation in Illegal
Acts
If you are a CPA conducting an
investigation, and you client is involved in the act of fraud, then, you must
withdraw from the investigation, whoever, first, report to the board of
directors. (p. 3)
For a public company, the CPA, would
need to disclose, information pertaining to managements complicity, with
business fraud, to the following US regulating agencies: FBI and SEC. (p. 3)
A CFE, engaging in a fraud
investigation, is obligated to inform the client, prior to beginning the investigation,
that, if the client-him or herself, is found guilty of fraud, the fraud will be
reported, to the proper authorities. (p. 3)
Privacy Issues
Banking, credit, medical, and other
personal records are governed by various laws and statutes. (p. 3)
Reporting Issues
Reporting must normally be done in
writing, and no issues, that were detected, regarding possible acts of fraud,
in the workplace, may be excluded. (p. 3)
The Basics of Business Valuation,
Fraud and Forensic Accounting, and Dispute Resolution Services
Professional accounting services
have evolved significantly over the past three decades. One such service area,
well known by some but new to many, is business valuation, fraud and forensic
accounting, and dispute resolution (BVFDR) services. (p. 1)
Business Valuation
Business valuation is the process of
determining the estimated value of a business entity. It includes a detailed
understanding and analysis of the business being valued, the industry in which
it operates, and the local and national economic climates. A valuation
performed in accordance with a fair market value standard—both an art and a
science—represents the price at which a business interest would change hands
between a willing buyer and a willing seller that have reasonable knowledge of
the relevant facts. (p. 1)
What is the origin of business
valuation?
Business valuation services began in
the 1920s. In response to the Eighteenth Amendment, which enacted Prohibition,
the IRS issued Appeals and Revenue Memorandum (ARM) 34 to establish guidelines
and methodologies for determining the amount of loss sustained by a taxpayer as
a result. (p. 1)
What is business valuation used for?
Business valuations services are
utilized in a multitude of circumstances, including the following:
·
Mergers or acquisitions
·
Shareholder disputes
·
Buy-sell agreements
·
Gift and estate purposes
·
Employee stock option plans (ESOP)
- Divorce
- Litigation (p. 1)
What is the difference Between a
Conclusion of Value and a Calculation?
A Conclusion of Value
A conclusion of value is expressed
when a valuator is engaged to perform a valuation engagement (i.e., business
valuation); this requires that valuators consider all valuation approaches and
methods and use their judgment to determine which are most appropriate,
considering the facts and circumstances of the engagement. (p. 1)
A Calculation of Value
A calculation of value is determined
when a valuator is engaged to perform a calculation engagement; this occurs
when the valuator and client agree to specific valuation approaches and
methods, as well as the extent of selected procedures. Simply put, the valuator
will only perform the calculations agreed upon with the client. (p. 1)
What are different approaches to
Business Valuation?
The following are the three
approaches to business valuation:
■Asset approach
■Income approach
■Market approach. (p. 1)
It is the valuator’s responsibility
to choose the most appropriate methods, given the facts and circumstances of a
particular valuation (p. 1)
Asset Approach
The asset approach is a method of
determining the value of a business ownership interest, based upon the value of
the assets of the business net of liabilities. (p. 1)
This
approach includes an analysis of the business’s tangible, intangible, recorded,
and unrecorded assets, net of outstanding liabilities. The asset approach is
most often used for holding companies, companies with very poor financial
performance, or for liquidation purposes. Common asset methods include the
following:
■The book value method subtracts the book
value of a company’s liabilities from the book value of its assets.
■The adjusted net assets method
subtracts the fair market value of a company’s liabilities from the fair market
value of its assets.
■The liquidation method is the net amount that would be realized if a
business is terminated and the assets are sold
in a fragmented manner. Liquidation
can be
either orderly or forced. (p. 1-2)
Income Approach:
The income approach is a method of
determining the value of a business interest by converting anticipated economic
benefits into a present value. (p. 2)
Common income methods include the
following:
Capitalization of Earnings
The capitalization of earnings
method capitalizes
the estimated future benefits. (p. 2)
Discounted Cash Flow
The
discounted cash flow method presents
the value
of the business’s projected future earnings plus the present value of the
terminal value
(a value of stable future growth).The discounted cash flow method is the present value of the business’
projected future
earnings plus the present value of the terminal value (a value of stable future growth). (p. 2)
Excess Earnings
The excess earnings method combines both
the asset approach and the income approach by adding the adjusted net assets of
the business to the company’s capitalized earnings, in excess of a reasonable
rate of return on adjusted net assets. (p. 2)
Market Approach
The market approach is a method of
determining the value of a business interest by referring to comparable guideline
companies or actual merger/acquisition transactions of other comparable
companies. Common market methods include the following:
- The guideline public company method applies multiples to the business being valued for comparable guideline companies. This information is usually public and can be obtained through SEC filings (i.e.,10-Q, 10-K, 8-K). (p. 2)
- The merger and acquisition method applies multiples to the business being valued for sales of comparable companies. This information can be obtained through databases such as Pratt’s Stats, BizComps, and IBA Market Database. (p. 2)
What is SSVS 1?
Statement on
Standards for Valuation Services (SSVS) 1 is effective for engagements to
estimate value accepted after January 1, 2008; it is the AICPA professional
guidance applicable to members providing valuation services. SSVS 1 provides
guidance for determining when an engagement is considered a valuation
engagement. It was created to improve the consistency and quality of valuation
services. The standard specifically outlines when an estimate of value results
in a conclusion of value or a calculation of value, and it applies to all engagements
regarding the estimate of value of a business, business ownership interest,
security, or intangible asset. (p. 2)
What
professional certifications are offered?
The following is a list of business valuation
certifications from reputable associations that have experience, testing, and continuing
education requirements:
■The certified valuation analyst
(CVA) certification
is granted by the National Association
of Certified Valuators and Analysts
(NACVA). A CVA is required to hold a valid CPA license.
■The accredited in business valuation (ABV) certification is granted by
the AICPA.
A professional with an ABV is also required to hold a valid CPA license.
■The certified business appraiser
(CBA) certification
is granted by the Institute of Business Appraisers (IBA).
■The accredited senior appraiser (ASA) certification is granted by
the American
Society of Appraisers. (p. 2)
Fraud Examination
Fraud examination is the process of
identifying and determining whether fraud has occurred. This process includes
collecting and analyzing documentary evidence, interviewing key personnel
within an organization and suspects of fraud, reporting on observations, and
testifying on conclusions. (p. 2)
What occurs during a fraud
examination engagement?
During the initial phase of a fraud
examination, the client and examiner meet to discuss why the client believes
that fraud has taken place. During this meeting, the fraud examiner has the
opportunity to obtain documents and direct inquiries regarding the suspect’s
occupational duties and related transactional records. The purpose of these interviews
is to obtain knowledge about the suspicious fraudulent activity, any weaknesses
in the organization’s internal controls, misstatements in the financial
statements, or misappropriations in assets. (p. 2)
What is the fraud theory approach?
The fraud theory approached consists
of four parts: facts, assumptions, rationale, and conclusion (FARC). (p. 2)
During the examination, the fraud examiner
identifies and documents the following items:
Facts
A fact means an event or transaction
that has actually happened and is undisputed. The fraud examiner conducts a
financial analysis of the facts. (p. 2)
Assumptions
An assumption means the development
of a hypothesis. An assumption may also include a hypothetical fraud scheme
with unique red flags that would warrant further examination. (p. 3)
Rationale
Rationale means applying logic and
testing the assumptions. This is the process through which the fraud examiner determines
whether the facts and the assumptions lead to a conclusion. (p. 3)
Conclusion
Conclusion means a written summary
of the observations and results of the fraud examiner’s investigation and
analysis. (p. 3)
What are the tools used in a fraud
examination?
Analysis of Documents
Fraud examiners ensure that all
relevant and material evidence is obtained and that the chain of custody is
maintained for documents to be accepted by the court. (p. 3)
Evidence: Direct or Circumstantial?
Evidence is
either direct or circumstantial: direct evidence shows prima facie the facts at
issue, while circumstantial evidence is anything that indirectly shows
culpability. The fraud examiner maintains a chronology of the evidential matter
to show the trends of events leading to the conclusion. (p. 3)
Interviews
Fraud examiners conduct interviews
with potential witnesses to obtain relevant information. In addition, fraud
examiners plan and time the interviews in order to obtain information in a fair
and impartial manner. (p. 3)
During interviews, a fraud examiner
should also observe the respondent’s reactions, expressions, methods of
persuasion, and behavior. (p. 3)
Covert Examination
Fraud examiners might also employ
third-party agents to conduct undercover or surveillance services. The purpose
of these services is to obtain information that cannot be obtained through the
data analysis or interview process. (p. 3)
When is fraud examination necessary?
Conducted or Initiated by Senior Management
Legal requirements
Certain regulatory agencies require
an organization to provide accurate financial information and report any
misconduct. (p. 3)
Liability Concerns
Consequences of fraud include
criminal and civil enforcement actions, profit disgorgements, fines, prison terms
for employees, and reputation-damaging headlines for the organization. To limit
these consequences, senior management might conduct a fraud examination and might
consider implementing an antifraud program to prevent, deter, and detect improper
conduct by employees and agents. (p. 3)
Forensic Accounting
Definition
Forensic accounting is the comprehensive
view of a fraud investigation. It is the audit of accounting records to interpret
whether a fraud has occurred, the interview process of all related parties
involved in a fraud, and the act of serving as an expert witness (if
applicable). (p. 3)
What is the difference between fraud
examination, forensic accounting, and auditing?
Forensic Accounting
Forensic accounting is the
systematic collection of financial data to analyze and interpret complex
financial issues. Forensic accountants generally hold an accounting degree and
are engaged by insurance companies, banks, police forces, government agencies,
and other organizations. (p. 3)
Fraud Examinations
Fraud examinations can be conducted
by either accountants or other professionals by utilizing the forensic account to
their freedom or a financial award or loss. Forensic accountants can help a
variety of users determine whether fraud or any other wrongdoing has occurred,
as well as the financial impact of the fraud or wrongdoings. (p. 4)
What is a typical forensic
assignment and approach?
Forensic accountants perform each
assignment based upon the needs of the company or individual retaining their
services. They are utilized for the following:
Corporate investigations
Companies utilize forensic
accountants to react to concerns or issues, arising from various sources, that suggest
possible fraud, both inside and out-side of the corporate environment. (p. 4)
Litigation support
Forensic
accountants assist a company’s legal counsel in investigating and assessing the
integrity and amount of the financial impact of an investigation, which would
include areas such as loss of profits, construction claims, product liability,
shareholder disputes, bankruptcies, and breach of contract, among others. (p.
4)
Criminal matters
In these cases, forensic accountants
are utilized as expert witnesses, once they have analyzed and interpreted
relevant financial transactions related to allegations against individuals and
companies in various situations, such as fraud, scams, or stock market
manipulations. (p. 4)
Insurance claims
Forensic accountants also work on
behalf of insurance companies or policy-holders/claimants; in these situations,
they analyze the insured’s financial information to determine whether loss of income
is applicable to the losses claimed due to a specific incident, in which coverage
might be afforded to a respective policyholder or claimant. (p. 4)
Governmental issues.
Forensic accountants can assist
governments by ensuring that companies are following appropriate laws and
regulations. (p. 4)
What characteristics should a
forensic accountant possess?
Objectivity
and independence are vital in selecting a forensic accountant. One must also
consider the accountant’s education, training, and experience, especially with
respect to the specific type of assignment. One should choose a forensic
accountant with the background and professional experience needed to meet the
demands of the assignment at hand. (p. 4)
Forensic accountants should also
meet several criteria, discussed below.
Identify frauds with minimal initial
information. Forensic accountants need to be able to identify a possible
scheme, the manner in which it was perpetrated, and the effective procedures to
help prove or disprove the potential fraud. (p. 4)
Identify financial issues.
As soon as forensic accountants are
presented with a situation generated by a complaint, they must clearly identify
the financial impact. (p. 4)
Knowledge of investigative
techniques.
Once the issues have been
identified, it is important that further required information and documentation
be obtained in order to either support or refute the allegation or claim.
Forensic accountants need to know not only where to find this evidence, but
also the details of generally accepted accounting principles (GAAP), financial statement
disclosure, and systems of internal controls.
Knowledge of evidence.
Forensic accountants must understand
what is considered evidence, what is “primary” evidence, and the rules of evidence
within the court. (p. 4)
Interpretation of financial
information.
Forensic accountants must be
conscious of a natural bias that exists in the interpretation process. Because
a transaction or series of events might have more than one interpretation, it
is important that accountants view each from various viewpoints to ensure that
the ultimate interpretation of the presented information adheres to common
sense and business reality. (p. 4)
Presentation of findings.
Forensic accountants
must be able to clearly communicate their findings from the investigation in a
manner that an average person with no financial or accounting background can
understand. (p. 4)
Investigative skills.
Forensic accountants must apply
these skills throughout the entire assignment. (p. 5)
Investigative mentality.
Along with knowledge of accounting,
forensic accountants develop an investigative mentality that allows them to
look beyond the boundaries set out by either GAAP, generally accepted auditing
standards (GAAS), or any other basis of accounting. (p. 5)
Evidence for Court
Three principles in forensic
accounting are driven by the need to prove intent in court in order to prove
that fraud has occurred.
- First, scope is not restricted as a result of materiality.
- Second, the use of sampling is not accepted in establishing evidence.
- Third, there is an assumption of the integrity of management and documentation. (p. 5)
What professional designations can
be obtained in the fraud and forensic accounting field?
Certifications Required for Fraud
Investigators:
The following are three fraud and
forensic accounting designations from associations that have experience,
testing, and continuing education requirements:
The certified fraud examiner (CFE) designation
is granted by the Association of Certified Fraud Examiners (ACFE).
The certified in financial forensics
(CFF) designation is granted by the AICPA. A professional with a CFF
designation is required to hold a valid CPA license. (p. 5)
The certified forensic financial
analyst (CFFA) designation is granted by the
NACVA. A CFFA must also hold at
least one of the following certifications: ABV,
ASA, CBA, CFE, CPA, CVA, accredited member
(AM), accredited valuation analyst
(AVA), chartered accountant (CA),
chartered financial analyst (CFA), certified management accountant (CMA), or
certified forensic accountant (Cr.FA). (p. 5)
Dispute Resolution
Dispute resolution pertains to the
processes used to resolve disputes between parties, including litigation,
negotiation, mediation, and arbitration. In common terms, dispute resolution is
the process of resolving a dispute by addressing both parties’ needs and
interests. (p. 5)
What is the role of financial
experts in dispute resolution?
The financial expert’s role in dispute
resolution is to explain the complex calculations of damages—including
technical accounting, financial, and business matters—to attorneys and other
nonfinancial parties. CPAs are professionals who can provide competent,
financial, and expert services to attorneys and clients involved in the
litigation process. In litigation services, the financial expert’s role is to
develop an objective opinion and testify before a judge or jury. Litigation
pertains to the process of a lawsuit for the purpose of resolving a dispute or
enforcing a right. (p. 5)
What services do financial experts
provide?
Document discovery assistance.
Dispute resolutions require
attorneys and financial experts to provide evidence of facts. As a result, attorneys
undertake voluminous document discovery and production processes.
Financial experts can assist by
formulating precise requests for documents. (p. 5)
Establishment of facts.
Based on the documents provided,
attorneys develop the facts and opinions. Financial experts can assist in
understanding, organizing, and explaining the information in these documents.
(p. 5)
Computation of damages.
Dispute resolution matters often
require financial experts to calculate damages from actual or expected losses.
Most calculations of damages require the “but for” approach and determine what
would have happened if questionable historic events had been different. (p. 5)
Strategy development.
Based upon an analysis of the
documents provided, financial experts can help attorneys identify strengths and
weaknesses in the business issues and develop a strategy for resolution. (p. 5)
Attest to GAAP/GAAS rules and compliance.
CPAs who serve as financial experts
can render opinions as to GAAP and GAAS. Financial experts can assist attorneys
by attesting to the financial statements provided during discovery.
(p. 5)
Expert opinion.
CPAs are
considered experts on accounting matters and can testify as to the economic,
financial, and statistical aspects of dispute resolution. They can provide
expert opinions on a dispute resolution matter because of their training,
skills, education, experience, observation, practice, and familiarity with the
subject matter. (p. 5)
What skills
must financial experts possess?
Auditing.
Financial experts should be familiar
with conducting investigations, analyzing financial statements, and developing
cash flow statements. (p. 5)
Financial analysis.
A dispute resolution matter might
require financial experts to conduct an analysis of earned income, business
operations, present value, production, and business valuations. (p. 5)
Marketing analysis.
Financial experts might also collect
and analyze market data and relative market share. (p. 5)
Statistics.
Financial experts often utilize statistical
tools to conduct an analysis, such as sampling, regression analysis, horizontal
and vertical analysis, and ratio analysis. (p. 5)
Looking to the Future
Why Audits Cannot Detect All Fraud
Certain factors can make fraud
nearly impossible to discover, even when a competent GAAS audit is performed,
and certain factors are often present when auditors should have detected fraud.
(p. 2)
The Auditors Role
Society has long believed that the
protector—that is, the “public watchdog” [U.S. v. Arthur Young & Co., 465
U.S. 805 (1984)]—against this dishonest minority is the independent financial
statement auditor. (p. 2)
Arthur Levitt, former SEC chairman,
articulated the auditor’s role: “America’s auditors were given a franchise by
the Securities Acts of 1933 and 1934 to provide the public with accurate audited
statements of companies. ... And their mission, the reason for all of that, was
to protect the public investor from financial fraud”
(http://www.pbs.org/wgbh/pages/
front tine/shows/regulation/interviews/levitt.html). (p. 2)
It is important that auditors take
AU 316 (SAS 99) seriously and conduct audits in a manner that makes it probable
fraud will be detected” (http://www.pcaobus.org/News_and_Events/Events/2003/Speech/12-12_Carmichael.aspx). (p. 3)
Indeed, William R. Kinney Jr. and
Mark W. Nelson indicated that “bank loan officers, bank regulators, members of
Congress and their staff, the SEC, GAO, financial writers, financial analysts,
judges, jurors, and ordinary investors appear to hold auditors responsible for higher
levels of disclosure and greater audit effectiveness than auditors believe is
appropriate” (“Outcome Information and the ‘Expectation Gap’: The Case of Loss Contingencies,”
Journal of Accounting Research, vol.
34, no. 2, Autumn 1996, pp.281–299). (p. 3)
Consistent with this belief, auditors
are usually sued in class action lawsuits on behalf of the shareholders in
cases of financial statement fraud. (p. 3)
Despite the public’s view of the
auditor as a protector, the accounting and audit literature state that a
company has the primary duty to design, implement, and maintain a system of
internal controls that provide reasonable assurance that reliable financial statements
can be produced and that auditors have the responsibility to provide reasonable
assurance that the financial statements are prepared fairly in accordance with U.S.
GAAP. (p. 3)
This is demonstrated by the language
used in the audit report that accompanies every 10-K filing and many auditing standards.
AU section 316, “Consideration of Fraud in a Financial Statement Audit”
[originally issued as Statement on Auditing Standards (SAS) 99, Consideration
of Fraud in a Financial Statement Audit], states that “even a properly planned
and performed audit may not detect a material misstatement resulting from
fraud.” (p. 3)
A fuller understanding of when
auditors can or cannot be expected to detect fraud should guide auditors,
expert witnesses, legal practitioners, policymakers, and the investing public
as they observe instances in which fraud is discovered in a company previously
subject to a financial statement audit and where auditor negligence is being
considered. (p. 3)
Background: Nature of the Audits
There are two types of financial
statement-related audits that are performed today—regular financial statement
audits and fraud audits. (p. 3)
The term “financial statement audit”
refers to an audit that looks at the financial statements in their entirety, on
a sample basis, with the goal of forming an opinion as to whether the financial
statements, as a whole, are fairly presented. (p. 3)
Financial Statement Audits
Financial statement audits involve
the examination, usually on a sample basis, of the entirety of the financial
statements and are performed according to promulgated standards set by the
PCAOB for public companies and by the Auditing Standards Board (ASB) for nonpublic,
nongovernmental organizations. (p. 3)
Financial Statement Fraud Audits
Fraud audits are much more detailed and
look in greater depth at specific elements that might be misstated. These
audits are designed to detect financial statement fraud, and they most often
only occur after there is suspicion (predication) of actual fraud. (p. 3)
The fraud auditors physically
confiscated all the computers of suspected perpetrators, interviewed hundreds
of individuals, and audited 100% of the transactions in the suspected accounts.
These steps are neither contemplated by GAAS or PCAOB auditing standards for a
regular financial statement audit, nor are they feasible for such audits. (p.
4)
Could The Auditor Have Detected
Fraud?
. . .four factors that made it
extremely difficult—if not impossible—for even a properly designed and
performed financial statement audit to detect a material fraud:
- The nature of accounting records necessitates sampling
- The use of outsiders to help conceal the frauds
- Reluctance of people to disclose what they know
- Forgery and lying. (p. 4)
Nature of Accounting Records
Too Large a Sample Size
The first reason why a
well-conducted GAAS audit did not detect material financial statement fraud was
the voluminous nature of accounting records and the economics of financial
statement audits. (p. 4)
Large Amount of Data to Be Audited
In another case, a large industrial
corporation was audited using proper techniques; however, the company concealed
fraud within vast amounts of data, and the valid random samples taken by the
auditor simply did not include fraudulent transactions. (p. 4)
Hidden Financial Information
In one case, the fraudsters hid the
fraudulent transactions in very minor and remote subsidiaries that were beyond
the scope normally examined by the auditors. (p. 4)
Spread Out Locations of Companies
Further complicating the nature of
audits is the fact that most large companies are spread out in various
locations. (p. 4)
While a single store probably could
not commit a fraud that would be material to Wal-Mart’s financial statements,
the company’s various divisions could. (p. 4)
Errors vs. Intentional Acts of Fraud
The audit scope assumes that errors
that fall beyond the scope of the audit are uncorrelated or random; however,
collusion among managers that turns errors into fraud can make this assumption
untrue. (p. 4)
Use of Outsiders To Help Conceal The
Fraud
Bribery and Deception
The bank’s president and executive
vice president—individuals completely unrelated to the general partners—had
been bribed by the partners to respond to the auditors and remove the liens for
one day; thus, they colluded with the general partners to deceive the auditors.
(p. 6)
GAAS and other auditing standards
allow auditors to accept confirmations as audit evidence.
(p. 6)
Collusion
Even when auditors go the extra mile,
as they did in this case, there is always one more deception, one more collusion,
one more forgery, or one more act of concealment that can be used to mislead financial
statement auditors. (p. 6)
The ability of perpetrators to rely
on unrelated outsiders to collude, forge, and use off-book entities makes some frauds
very difficult—if not impossible—to detect, even when an audit is performed in accordance
with professional standards. (p. 6)
Reluctance of People to Disclose
What They Know
A third problem that makes financial
statement fraud very difficult to detect is that company employees and others
who have knowledge of the fraud often do not help external auditors—indeed,
they often lie to protect their supervisors or colleagues, or they assume that
these supervisors or colleagues know what they’re talking about. (p. 6)
Uncertainty About Suspected Fraud
Another reason for not disclosing
suspicious activity is the difficulty in knowing for sure that a fraud has been
committed. (p. 6)
First Reaction to Fraud, at a
Company: Denial:
The first reaction of those
victimized by fraud is usually denial. They then generally attempt to try to
convince themselves that fraud could not be happening at their company, nor
could their trusted coworkers commit fraud; as a result, they don’t report
suspicious activity. (p. 7)
The five
distinct stages, of fraud victims: denial, anger, rationalization, depression,
and acceptance (W. Steve Albrecht and Timothy L. Williams, “Understanding
Reactions to Fraud,” Internal Auditor, vol. 47, no. 4, August 1990, pp. 45–51).]
(p. 7)
Whistleblower
Consequences
Even once they feel confident that something
is not right, employees of an otherwise normal-seeming company are often
hesitant to divulge information that may indicate fraud because they fear the
consequences. (p. 7)
Whistleblowers often lose their jobs
or see their companies experience serious financial and legal problems if
material financial statement fraud is found. (p. 8)
Before a fraud audit is conducted, a
fraud is generally already suspected. (p. 8)
Employee and Consumer Assistance in
Fraud Investigations
The resulting uncertainty and shift
in social attitudes toward disclosure make people more willing to tell what they
know and help the fraud auditors. The unwillingness of knowledgeable individuals
to assist is much more common in annual financial statement audits than in
fraud audits. (p. 8)
Concentric Circles of Knowledge
Surrounding Fraudulent Activities
In the authors’ experience, people
are aware of a fraud at different levels, which can be represented by
concentric circles. (p. 8)
Inner Circle:
The inner circle, which contains the
key perpetrators, usually involves only two or three individuals, often
including the CEO and CFO. (p. 8)
Next Circle:
The next circle, which includes
those individuals who were first recruited to help with the fraud, rarely see the
fraud in its entirety; rather, they are usually exposed to only a few
fraudulent elements, none of which seems too large or too egregious. (p. 8)
Next Circle:
Further removed from the key
perpetrators are those individuals asked to assist in making suspicious transactions
or other accounting entries in order to help with the fraud or concealment.
These individuals often do not suspect fraud but, instead, assume that, even
though management is asking them to do something unusual, it knows what it is
doing; therefore, they comply with the illicit requests. (p. 8)
Outer Circle:
Even further away are those who are
not directly involved in the fraud but who observe events and accounting
entries that appear questionable. Because these individuals do not see the entire
fraud and are not actually involved in perpetrating it, they usually dismiss
the questionable actions as something other than fraud. (p. 8)
First Time Offenders:
In addition, because fraud
perpetrators are usually first time offenders who cannot be distinguished from
nonperpetrators unless conspicuous red flags of egregious behavior are observed,
such observers often believe there is no reason to suspect fraud. (p. 8)
Forgery and Lying:
A fourth reason why auditors may not
detect a financial statement fraud is forgery and lying. Although it isn’t
their main purpose, GAAS auditors are always on the lookout for fraud symptoms,
including analytical symptoms, internal control symptoms, documentation or
records symptoms, lifestyle symptoms, behavioral symptoms, and tips or complaints—anything
that could be a red flag. (p. 8)
But regardless of how hard auditors
search for fraud symptoms, they often cannot be expected to find fraud that
involves forgery and lying. (p. 8)
Indeed, AU section 316 states that
auditors are not trained to be forgery experts. In paragraph 9, it continues:
“Employees or members of management who misappropriate cash might try to
conceal their thefts by forging signatures. (p. 8)
Sufficient Financial Statements
Audits Not Performed
. . .four factors—which are not
completely independent of each other—that existed in the financial statement
fraud cases where fraud was not detected, but where, in the author’s opinion, a
competent financial statement audit was not performed:
- Inadequate training and experience of the auditors
- Poor audit execution—planning, gathering evidence, and examining controls
- Failure to exercise due professional care
- Lack of independence.
Inadequate Training and Ability:
Field Time:
It is common for the youngest and most
inexperienced auditors to spend the most time in the field during an audit. As
a result, these auditors are most likely to have first-hand exposure to fraud
symptoms if they exist. On the other hand, the most experienced auditors typically
spend less time in the field; thus, they are less likely to see any fraud
symptoms. (p. 9)
Poor Audit Execution:
Field Work Auditing:
Fieldwork auditing standards require
that audits be properly planned, that internal controls be examined, and that
sufficient evidence be obtained. (p. 10)
Audit Failure: Management
Explanation:
Probably the most egregious audit
failure involving poor execution in our sample was a large fraud where the
auditors actually saw several red flags that fraud was occurring, asked management
about them, and then accepted management’s explanations without getting the corroborating
evidence that, in an expert’s opinion, would have been easily obtain able. (p.
10)
Failure To Exercise Due Professional
Care
Auditors cannot detect all material
financial statement frauds, but there is no excuse for not catching fraud
because of a failure to exercise due care. (p. 10)
Lack of Independence
Lack of independence ranges from
cases where auditors are willfully complicit in the fraud to those where
auditors might not be completely independent. Serious cases are relatively easy
to prove. The more difficult cases are those where auditors are not completely independent
and their mental state has been changed, perhaps even at an unconscious level,
allowing frauds to go undetected. (p. 10)
Closing the Expectation Gap
The investing public, as well as
lawmakers, juries, regulatory agencies, and others, often expect auditors to
detect all material financial statement fraud; however, the auditing standards
do not, and have never, indicated that detecting all material financial statement
fraud is possible. (p. 10)
This expectation gap often results
in costly auditor litigation, even when a financial statement audit has been
conducted in accordance with professional standards. (p. 10)
Failure To Detect Theft and Fraud:
It’s Not Just an Audit Issue
Commonly referred to as the
“expectation gap,” a disconnect sometimes exists between a CPA’s professional
responsibility for detecting theft and fraud and the general public’s
perception of a CPA’s duties. (p. 1)
However, claims made against CPAs in
the AICPA Professional Liability Insurance Program alleging failure to detect
theft and fraud emanate from all types of engagements, including those
generally regarded by CPAs as low-risk, such as
bookkeeping or tax compliance
services. (p. 1)
In such cases, plaintiff attorneys
may contend that the CPA failed to exercise due care in accordance with Article
V of the Principles of Professional Conduct, which are included in the AICPA
Code of Professional Conduct. Lawyers may allege that CPAs have a duty to
identify and inform clients of fraud red flags such as suspicious activities or
internal control deficiencies. (p. 1)
Limiting Risk Exposures
Regularly evaluate the risk of the
client and the engagement. Client and
engagement acceptance and continuance are not simply for audit engagements.
Regularly screen clients and consider the risks associated with both the client
and the services you are being engaged to perform. It should raise a red flag
for the CPA when clients dismiss internal control weaknesses brought to their
attention. Is this a situation where the client has an unreasonable service
expectation, or is it possibly one of questionable integrity? Either way, the
CPA should take precautions. (p. 2)
Use engagement letters on all
engagements. That’s correct—all engagements. A
well-crafted engagement letter can help reduce expectation gaps and can serve
as key evidence in the defense of a professional liability claim. The
engagement letter should include an understandable description of the scope and
limitation of services to be performed, a statement that the engagement is not
designed to detect theft or fraud, and the responsibilities of both the client
and the CPA. The engagement letter should also be renewed and signed by the
client annually. (p. 2)
Stay within the scope of the
engagement. An engagement letter is useful
only if the CPA adheres to the defined scope in rendering the professional
services. Additional services, or modifications to agreed-upon services, should
be memorialized in writing with the client, whether it’s through email, a new
engagement letter, or an amendment to the existing engagement letter. (p. 2)
Be fraud aware. Train all firm personnel, not only auditors, about potential
fraud risk factors and the “fraud risk triangle” (opportunity, rationalization,
and incentive/pressure). Learn about the risk factors associated with common
frauds, such as embezzlement by an unmonitored book keeper or controller with
excessive authority or access, or use of business credit cards for personal
expenses. Firm personnel should be educated about common internal control
weaknesses that create an opportunity for fraud to occur, such as a lack of
segregation of duties, poor tone at the top, or infrequent vacations taken by
key financial employees. (p. 2)
Apply professional skepticism to all
engagements. This is particularly important on
engagements with long-time clients, where a level of established comfort could
threaten objectivity. Trust your instincts and follow up on matters that don’t
seem quite right. (p. 2)
If you see something, say something. Management letters with suggestions for control or process
improvements are not designed solely for audit clients. If you observe a weakness
in internal controls or believe management should follow-up on an observation
noted, inform your client orally and in writing. If the weakness persists year
after year, keep telling the client both orally and in writing until the
deficiency is addressed. (p. 2)
Document, document, document. Contemporaneous documentation represents critical evidence
in the defense of professional liability claims. Strong documentation includes,
at a minimum, a well-crafted and detailed engagement letter, documentation
regarding client inquiries made and responses received, and communication of
internal control matters or suspicious activities noted. (p. 2)
References
Albrecht,
W. Steve,& Hoopes, Jeffrey L. (Oct. 2014). Why Audits Cannot Detect All
Fraud.
CPA
Journal, 84.
Retrieved from http://eds.a.ebscohost.com.proxy1.ncu.edu/eds/pdfviewer/pdfviewer?vid=2&sid=e9212cf1-9aaf-4151-89e6-e52b02fc54be%40sessionmgr4004&hid=4111
Ference,
Sarah Beckett. (Feb.2015). Failure to Detect Theft and Fraud: It’s not just an
audit
issue.
Journal of Accountancy, 219. Retrieved from http://eds.a.ebscohost.com.proxy1.ncu.edu/eds/pdfviewer/pdfviewer?vid=4&sid=e9212cf1-9aaf-4151-89e6-e52b02fc54be%40sessionmgr4004&hid=4111
Smith,
Ernest Patrick. (June 2012). The Basics of Business Valuation, Fraud and
Forensic
Accounting,
and Dispute Resolution Services. CPA Journal, 82(6). Retrieved from http://eds.a.ebscohost.com.proxy1.ncu.edu/eds/pdfviewer/pdfviewer?vid=1&sid=45186db5-9fab-4cf6-a5be-b1787f96d8fd%40sessionmgr4001&hid=4211
Tackett,
James A. (May/June 2008). Covert Investigations In The Workplace. Journal of
Corporate
Accounting & Finance, 19, 7-11. doi: 10.1002/jcaf.20396.
Wells,
Joseph T. (June2009). Practical and Ethical Considerations In Fraud. CPA
Journal, 79 (6). Retrieved from http://eds.a.ebscohost.com.proxy1.ncu.edu/eds/pdfviewer/pdfviewer?vid=6&sid=25676ede-2b7c-419a-ad8b-a76c2cdfd05c%40sessionmgr4001&hid=4211
No comments:
Post a Comment