12.07.2015 Views

acfe fraud prevention check-up - BKD

acfe fraud prevention check-up - BKD

acfe fraud prevention check-up - BKD

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Organizations should apply a framework to document their <strong>fraud</strong> risk assessment. The framework below illustrateshow the elements of <strong>fraud</strong> risk identification, assessment, and response are applied in a rational, structuredapproach. This example begins with a list of identified <strong>fraud</strong> risks and schemes, which are then assessed for relativelikelihood and significance of occurrence. Next, the risks and schemes are mapped to the people and/or departmentsthat may be impacted and to relevant controls, which are evaluated for design effectiveness and tested to validateoperating effectiveness. Lastly, residual risks are identified, and a <strong>fraud</strong> risk response is developed. 32IdentifiedFraud Risks and SchemesLikelihoodSignificancePeople and/orDepartmentExistingAnti-<strong>fraud</strong>ControlsControlsEffectivenessAssessmentResidualRisksFraud RiskResponseFinancial reportingRevenue recognition- Backdating agreements- Channel stuffing- Inducing distributors toaccept more product thannecessary- Holding books open- Via recording detailtransactions in a sub-ledger- Via recording top-sidejournal entries- Additional revenue risksManagement estimates- Self insurance- Altering underlying detailclaims and estimate data- Fraudulently changingunderlying assumptions inestimation of liability- Allowance for bad debts- Altering underlying A/Raging to manipulatecomputation- Fraudulent input fromsales persons or creditdepartment on credit quality- Additional estimatesDisclosures- Footnotes- Additional disclosuresMisappropriation of assetsCash/<strong>check</strong>- Point of sale- Accounts receivable applicationprocess- Master vendor file controlsoverride- Additional risks- Inventory- Theft by customers- Theft by employees- Other assets at riskCorr<strong>up</strong>tion- Bribery- Aiding and abettingOther Risks32Refer to Appendix D of this document for an example of the use of this framework.21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!