Sunday, May 26, 2019
Report on Financial Statement Fraud Scheme Case Study
Report on Financial Statement Fraud Scheme Case Study The impressiveness of Timing ACC/556 Professor University of Phoenix December 19, 2011 Memo To The Management From Forensic Auditor Date 12/19/2011 Subject Case Study on the Importance of Timing and Financial Statement Fraud Scheme As our fraternity is in process of conducting investigation to detect any financial bid fraud or abuse, I have come across the case where expenses were preserve in the financial statement under the period it was disbursed to vendor and authentic services occurred in next or other financial socio-economic class period.Its a get aheadst the regulation of SEC and GAAP guidelines. In this particular case the neutering were completed in current year and vendor was prepaid for services in full last year financial period, which a violation by recording expenses in the wrong period. No oneness took the funds and commit fraud but it shows inaccurate expenses and revenue in financial statement for twain current and past years. It was done to maintain the repair budget for last year as on that point was room to spend more last year , so the plant supervisor and purchase manager decided to pay in advance last year and actual services were occurred this year.As per scope of test a phoner idler lose a substantial amount of revenue through occupational fraud and abuse. There is several deterrence methods can be implemented by a company to avoid frauds and abuse by employees. This direct financial statement fraud may impact our companys investment potential, credit worthiness, credit line operation, and employee morale (Wells, 2005). The SEC Acts of 1933 and 1934 were passed by Congress of United States to provide sources of potential liability for accountants to command protection for investors and for facilitation of refined capital markets (Lowers, Ramsey, Sinason & Strawser, 2007).These acts enforce accountability on accountants to practice integrity when working for clients and financial institutions by reporting misstatement disclosures in financial statements. As a forensic auditor I collect evidence from companys employees, customers, vendors, and anonymous sources. The sampling tools and techniques used in this investigation consists systematic random selection of data from selected sources. The forensic accountant use computer forensics, data analytics and interviews to allow them to assemble much of the required evidence for an investigation.This abuse was detected when we see the invoice of monstrous amount paid by end of the last year without any inspection report or repair completion document in file. The gain investigation showed it was done later this year. No employee took any funds to commit financial fraud or larceny but the financial statement were misleading to the users of those statements. A company may experience such type of abuse or corruption schemes developed at any given time, more than one bea or all over the company.Corrup tion can be performed by fraudster employees who intentionally and wrongfully use their influence to gain personal financial gain from company business transaction. It can be limited to a particular department or it may exist in all structural levels. It is decisive for a company to review financial status routinely to ensure proper accounting and reporting procedures are followed in entirety of company business transactions. It is extremely important to review before an end of year transactions with heavy amounts to ensure validity of amount and services occurred in that financial year.There are many other red flags an investigator or auditor can find to detect such recording of expenses in wrong period. For example when there is an abnormal growth in number of days sales in receivable or decline in days purchases in accounts payable. These abnormalities and abuse can be avoided through reviewing acquisitions ledger, general ledger and accounts payable master file to ensure that t here are no large or unusual amounts. Also review vendors invoices, receiving reports, purchase orders and purchase requisitions to aver that they are valid and are for reasonable amounts.Trace inventory acquisitions to the inventory master file to verify that items recorded as inventory are all valid. Trace receiving reports and vendors invoices to the acquisitions journal to verify that all received goods have been properly recorded. Compare transactions recorded in the acquisitions journal to the vendors invoices, receiving reports, purchase orders, and purchase requisitions to verify that they have been recorded at their correct amounts, date, and quantities.Other factors that aided in this investigation are from checking cash, and disbursement journal entries to be dated with the date of the check. The associate monthly general ledger summary entries shall carry the date of the month summarized. Procedures that need to be implemented to ensure that fraudulent processing of ve ndor invoices does not exists would consist of Only original invoices being processed for payment right(a) authorization obtained for price differences on invoices Proper authorization obtained for quantity differences on invoices Invoices received from authorized vendors Check stock should have pre-printed sequential numbers and logged in a register Separation of obligation for printing and mailing of vendor checks Separation of duty for computer vendor masters listing and updates Ensure merchandise is properly delivered to a company facility. Reviewing general ledger entries for unusual amount and date of the year.The substantive procedures to test effectiveness of internal controls for recording expense is to examine accounting records, reports, documents, control related activities, and client procedures. The implementation of above mentioned procedures will decrease the risk of fraud and abuse in an organization. References Wells, J. T. (2005). Principles of Fraud Exa mination. Hoboken, NJ McGraw-Hill. Mulford, C. W. , & Comiskey, E. E. (2002). The Financial Numbers Game. Hoboken, NJ prank Wiley & Sons, Inc.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.