Fraud
Fraud
Fraud is defined as an intentional, deceitful act for gain with concealment. As such, it is
more than theft. Defalcation is theft by a person in a position of trust. Often, the fraudster has
access to details that the intended victim does not, enabling him to trick the victim. At its heart, a
fraudster exploits information asymmetry, namely, the fact that the resource cost of updating and
checking the information may be high enough to generate a disincentive to completely invest in
fraud prevention.
Management is responsible for the detection and prevention of fraud, misappropriations,
and other irregularities. Each member of the management team will be familiar with the types of
improprieties that might occur within his or her area of responsibility and be alert for any
indication of irregularity.
Fraud may be perpetrated by one person working on his or her own, but many frauds are
able to occur only as a result of collusion—between collateral associates working in different
positions within the business, between a manager and someone reporting to that manager, or
between an insider and an outsider. There may be mass collusion, for instance, between many
salespeople and many customers, even to the extent that the fraud tacitly may have become
regarded as a regular perk.
There are a number of ways in which a corporation can commit fraud. Corporate fraud
can encompass the loss of assets by the business, acts perpetrated by the corporation to take
funds from others, or the falsification of its reported results and financial position. Here are
several examples.
Personal Purchases
An employee can divert funds to buy goods or services on his own behalf. This is usually
done by approving his own expense reports or supplier invoices. The person must hold a
sufficiently senior position to be able to browbeat other employees into participating in this
diversion of assets. Usually, the potential amount of funds diverted increases with the seniority
of the job title of the individual committing the fraud.
Ghost Employees
The payroll staff can create fake employees and then pay these "ghost employees,"
directing the funds into their own bank accounts. Weak controls over the payment of employees
makes this type of fraud more likely.
Skimming
Incoming funds are intercepted before they can be recorded in a company's accounting
records. This is usually caused when a person is allowed to both open the mail and record
accounting transactions. This fraud typically occurs in either the mail room or the accounting
department.
Tax Avoidance
A company can alter its tax returns to reveal less taxable corporate income than is really
the case, resulting in lower tax remittances. This can only be done with the connivance of senior
management, which typically signs off on the tax returns.
Asset Theft
Any employee can steal from an organization by making off with assets, such as cash or
fixed assets. Weak controls can encourage employees to engage in this activity.
Unauthorized Use
An employee may use company assets in an unauthorized manner, such as driving a
company car for personal use, or using a company condominium for personal use. Though the
asset is not stolen, it is being consumed, so its value lessens over time.
These components work to establish the foundation for sound internal control within the
company through directed leadership, shared values and a culture that emphasizes accountability
for control. The various risks facing the company are identified and assessed routinely at all
levels and within all functions in the organization. Control activities and other mechanisms are
proactively designed to address and mitigate the significant risks. Information critical to
identifying risks and meeting business objectives is communicated through established channels
across the company. The entire system of internal control is monitored continuously, and
problems are addressed timely.
We may classify fraud as:
management fraud, for instance fraudulent financial reporting
employee fraud
outsider fraud
collusive fraud
Some fraud, especially computer program frauds, may be continuous, working for the
defrauder indefinitely into the future. Some continuous frauds require no further direct action by
the defrauder once they have been set up, as they continue working automatically. Some
continuous frauds require constant maintenance by the defrauder, such as teeming and lading
frauds. Other frauds are not continuous but have a “smash and grab” character with the defrauder
absconding with the gains in a carefully timed way just before the perhaps inevitable detection.
One important deterrent for fraud is for the business to have a good record of detecting
fraud. If a prospective defrauder knows there is a high risk of detection and that the
consequences upon detection will not be pleasant, then that person will be less likely to engage
in the fraud. Given a personal need, an opportunity to perpetrate a fraud and a conviction that
detection is most unlikely or that the consequences upon detection would not be too disgraceful,
then many ordinary people will be sorely tempted to engage in fraud. It is up to management to
make sure that these ingredients are not present in their business.
Only through diligent and ongoing effort can an organization protect itself against
significant acts of fraud. Key principles for proactively establishing an environment to
effectively manage an organization’s fraud risk include:
Principle 1: As part of an organization’s governance structure, a fraud risk management
program should be in place, including a written policy (or policies) to convey the expectations of
the board of directors and senior management regarding managing fraud risk.
Effective business ethics programs can serve as the foundation for preventing, detecting,
and deterring fraudulent and criminal acts. An organization’s ethical treatment of employees,
customers, vendors, and other partners will influence those receiving such treatment. These
ethics programs create an environment where making the right decision is implicit. The laws of
most countries prohibit theft, corruption, and financial statement fraud. Government regulations
worldwide have increased criminal penalties that can be levied against companies and
individuals who participate in fraud schemes at the corporate level, and civil settlements brought
by shareholders of public companies or lenders have rocketed to record amounts.
Most organizations have some form of written policies and procedures to manage fraud
risks. However, few have developed a concise summary of these activities and documents to help
them communicate and evaluate their processes. We refer to the aggregate of these as the fraud
risk management program, even if the organization has not formally designated it as such.
While each organization needs to consider its size and complexity when determining
what type of formal documentation is most appropriate, the following elements should be found
within a fraud risk management program:
1. Roles and responsibilities. To help ensure an organization’s fraud risk management
program effective, it is important to understand the roles and responsibilities that personnel at all
levels of the organization have with respect to fraud risk management. Policies, job descriptions,
charters, and/or delegations of authority should define roles and responsibilities related to fraud
risk management.
The board also has the responsibility to ensure that management designs effective fraud
risk management documentation to encourage ethical behavior and to empower employees,
customers, and vendors to insist those standards are met every day. The board should:
• Understand fraud risks.
• Maintain oversight of the fraud risk assessment by ensuring that fraud risk has been
considered as part of the organization’s risk assessment and strategic plans. This responsibility
should be addressed under a periodic agenda item at board meetings when general risks to the
organization are considered.
• Monitor management’s reports on fraud risks, policies, and control activities, which
include obtaining assurance that the controls are effective. The board also should establish
mechanisms to ensure it is receiving accurate and timely information from management,
employees, internal and external auditors, and other stakeholders regarding potential fraud
occurrences.
• Oversee the internal controls established by management.
• Set the appropriate tone at the top through the CEO job description, hiring, evaluation,
and succession planning processes.
• Have the ability to retain and pay outside experts where needed.
• Provide external auditors with evidence regarding the board’s active involvement and
concern about fraud risk management.
2. Commitment. The board and senior management should communicate their
commitment to fraud risk management. One method would be to embed this commitment in the
organization’s values or principles and code of conduct.
3. Fraud awareness. An ongoing awareness program is a key enabler to convey fraud risk
management expectations, as well as an effective preventive control. Awareness of fraud and
misconduct schemes is developed through periodic assessment, training, and frequent
communication. An organization’s fraud risk management program will assist the organization
with fraud awareness. Documentation to support fraud awareness should define and describe
fraud and fraud risks. It should also provide examples of the types of fraud that could occur and
identify potential perpetrators of fraud.
4. Affirmation process. An organization should determine whether there are any legal
issues involved with having an affirmation process, which is the requirement for directors,
employees, and contractors to acknowledge they have read, understood, and complied with the
code of conduct, a fraud control policy, and other such documentation to support the
organization’s fraud risk management program.
5. Conflict disclosure. The disclosure of a potential conflict of interest and management’s
decision should be documented and disclosed to legal counsel. Any constraints placed on the
situation need to be monitored. For example, a buyer who has recently been hired in the
purchasing department is responsible for all purchases in Division A. His brother has a local
hardware store that supplies product to Division A. The buyer discloses the potential conflict of
interest and is told that transactions with the hardware store are permitted, as long as the
department supervisor monitors a monthly report of all activity with the hardware store to ensure
the activity and price levels are reasonable and competitive. When the buyer is promoted or
transferred, the constraints may be removed or altered.
11. Continuous monitoring. The fraud risk management program, including related
documents, should be revised and reviewed based on the changing needs of the organization,
recognizing that documentation is static, while organizations are dynamic. Fraud risk
management program documentation should be updated on an ongoing basis to reflect current
conditions and to reflect the organization’s continuing commitment to the fraud risk management
program.
Principle 2: Fraud risk exposure should be assessed periodically by the organization to identify
specific potential schemes and events that the organization needs to mitigate.
A fraud risk assessment generally includes three key elements:
• Identify inherent fraud risk — Gather information to obtain the population of fraud risks
that could apply to the organization. Included in this process is the explicit consideration of all
types of fraud schemes and scenarios; incentives, pressures, and opportunities to commit fraud;
and IT fraud risks specific to the organization.
• Assess likelihood and significance of inherent fraud risk — Assess the relative
likelihood and potential significance of identified fraud risks based on historical information,
known fraud schemes, and interviews with staff, including business process owners.
• Respond to reasonably likely and significant inherent and residual fraud risks —
Decide what the response should be to address the identified risks and perform a cost-benefit
analysis of fraud risks over which the organization wants to implement controls or specific fraud
detection procedures.
A good risk assessment requires input from various sources. Before conducting a risk
assessment, management should identify a risk assessment team. This team should include
individuals from throughout the organization with different knowledge, skills, and perspectives
and should include a combination of internal and external resources such as:
• Accounting/finance personnel, who are familiar with the financial reporting process and
internal controls.
• Nonfinancial business unit and operations personnel, to leverage their knowledge of
day-to-day operations, customer and vendor interactions, and general awareness of issues within
the industry.
• Risk management personnel, to ensure that the fraud risk assessment process integrates
with the organization’s ERM program.
• Legal and compliance personnel, as the fraud risk assessment will identify risks that
give rise to potential criminal, civil, and regulatory liability if the fraud or misconduct were to
occur.
• Internal audit personnel, who will be familiar with the organization’s internal controls
and monitoring functions. In addition, internal auditors will be integral in developing and
executing responses to significant risks that cannot be mitigated practically by preventive and
detective controls.
• If expertise is not available internally, external consultants with expertise in applicable
standards, key risk indicators, anti-fraud methodology, control activities, and detection
procedures. Management, including senior management, business unit leaders, and significant
process owners (e.g., accounting, sales, procurement, and operations) should participate in the
assessment, as they are ultimately accountable for the effectiveness of the organization’s fraud
risk management efforts.
Principle 3: Prevention techniques to avoid potential key fraud risk events should be established,
where feasible, to mitigate possible impacts on the organization.
Prevention is the most proactive fraud-fighting measure. The design and implementation
of control activities should be a coordinated effort spearheaded by management with an
assembled cast of employees. Collectively, this cross section of the organization should be able
to address all of the identified risks, design and implement the control activities, and ensure that
the techniques used are adequate to prevent fraud from occurring in accordance with the
organization’s risk tolerance. The ongoing success of any fraud prevention program depends on
its continuous communication and reinforcement. Stressing the existence of a fraud prevention
program through a wide variety of media — posters on bulletin boards, flyers included with
invoices and vendor payments, and articles in internal and external communications — gets the
message out to both internal and external communities that the organization is committed to
preventing and deterring fraud.
Among the many elements in fraud prevention are HR procedures, authority limits, and
transaction level procedures.
Human Resources Procedures. It is important to know employees in order to evaluate
their credentials and competence, match skills to the job requirements, and be aware of
any issues of personal integrity that may impact their suitability for the position.
Principle 4: Detection techniques should be established to uncover fraud events when preventive
measures fail or unmitigated risks are realized.
Used in tandem with preventive controls, detective controls enhance a fraud risk
management program’s effectiveness by providing evidence that preventive controls are working
as intended and identifying fraud that occurs. Although detective controls may provide evidence
that fraud is occurring or has occurred, they are not intended to prevent fraud.
Documentation of Fraud Detection Techniques.
An organization should document the techniques developed and implemented to detect
fraud. This includes documenting processes used to monitor the performance of fraud detective
controls or to indicate when such controls are ineffective. Testing procedures conducted to
ensure adequate operation of fraud detective controls and the test results should also be
documented thoroughly.
Continuous Monitoring of Fraud Detection.
The organization should develop ongoing monitoring and measurements to evaluate,
remedy, and continuously improve the organization’s fraud detection techniques. If deficiencies
are found, management should ensure that improvements and corrections are made as soon as
possible. Management should institute a follow-up plan to verify that corrective or remedial
actions have been taken.
Principle 5: A reporting process should be in place to solicit input on potential fraud, and a
coordinated approach to investigation and corrective action should be used to help ensure
potential fraud is addressed appropriately and timely.
It is essential that any violations, deviations, or other breaches of the code of conduct or
controls, regardless of where in the organization, or by whom, they are committed, be reported
and dealt with in a timely manner. Appropriate punishment must be imposed, and suitable
remediation completed. The board should ensure that the same rules are applied at all levels of
the organization, including senior management.
Investigation.
The investigation team should establish the investigation tasks and assign each task to the
appropriate team members.
Corrective Action.
After the investigation has been completed, the organization will need to determine what
action to take in response to the findings. Any findings of actual or potential material impact may
need to be reported to the board, the audit committee, and the external auditor if they are not
receiving investigation reports directly. Notification may also be required to legal and regulatory
agencies and the organization’s insurers. In some cases, it may be necessary to take certain
actions before the investigation is complete (e.g., to preserve evidence, maintain confidence, or
mitigate losses). This could require suspension or reassignment of individuals or legal actions to
restrain assets.