12.07.2015 Views

acfe fraud prevention check-up - BKD

acfe fraud prevention check-up - BKD

acfe fraud prevention check-up - BKD

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ecently been hired in the purchasing department is responsible for all purchases in Division A. His brother has alocal hardware store that s<strong>up</strong>plies product to Division A. The buyer discloses the potential conflict of interest andis told that transactions with the hardware store are permitted, as long as the department s<strong>up</strong>ervisor monitors amonthly report of all activity with the hardware store to ensure the activity and price levels are reasonable andcompetitive. When the buyer is promoted or transferred, the constraints may be removed or altered.Other disclosure processes may also exist, such as insider trading disclosures. Those processes that mitigatepotential <strong>fraud</strong> risk should be linked to the <strong>fraud</strong> risk management program. Organizations should evaluate thelegal requirements and/or business benefits of disclosing their code of conduct, <strong>fraud</strong> control policy, or relatedstatements to the public.Fraud Risk Assessment 25The foundations of an effective <strong>fraud</strong> risk management program are rooted in a risk assessment, overseen by theboard, which identifies where <strong>fraud</strong> may occur within the organization. A <strong>fraud</strong> risk assessment should be performedon a systematic and recurring basis, involve appropriate personnel, consider relevant <strong>fraud</strong> schemes and scenarios,and mapping those <strong>fraud</strong> schemes and scenarios to mitigating controls. The existence of a <strong>fraud</strong> risk assessment andthe fact that management is articulating its existence may even deter would-be <strong>fraud</strong> perpetrators.The system of internal controls in an organization is designed to address inherent business risks. The business risksare identified in the enterprise risk assessment protocol, and the controls associated with each risk are noted.COSO’s Enterprise Risk Management–Integrated Framework describes the essential ERM components, principles, andconcepts for all organizations, regardless of size.Reporting Procedures and Whistleblower ProtectionDocumentation should not only articulate the organization’s zero tolerance 26 for <strong>fraud</strong>, it should also establish theexpectation that suspected <strong>fraud</strong> must be reported immediately and provide the means to do so. The channels toreport suspected <strong>fraud</strong> issues should be clearly defined and communicated. These may be the same or different fromchannels for reporting other code of conduct violations.Considering that people commit <strong>fraud</strong> and that people are an organization’s best asset in preventing, detecting, anddeterring <strong>fraud</strong>, an organization should consider promoting available <strong>fraud</strong> reporting resources that individuals mayaccess, such as a <strong>fraud</strong> or ethics page on the organization’s Web site, an ombudsman, or a whistleblower hotline.To encourage timely reporting of suspected issues, the organization should communicate the protections affordedto the individual reporting the issue — often referred to as whistleblower protection. In some countries, securitiesregulations require organizations to have whistleblower protection.25For more information on <strong>fraud</strong> risk assessments, refer to Section 2: Fraud Risk Assessment.26ALARM (The National Forum for Risk Management in the Public Sector (UK)) lists a culture of zero tolerance as one of five essentialgovernance strategies to manage <strong>fraud</strong> risk. Other strategies include an embedded strategic approach to risk management, a sound counter<strong>fraud</strong>and corr<strong>up</strong>tion framework, strong systems of internal control, and close working relationships with partners regarding <strong>fraud</strong> riskmanagement activities.18

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!