2004 acfe post-conference
TRANSCRIPT
![Page 1: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/1.jpg)
1
Non-Cash Assets
Chapter 9
![Page 2: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/2.jpg)
2
• List the five categories of tangible non-cash misappropriations discussed in this chapter.
• Discuss the data on non-cash misappropriations from the 2011 Global Fraud Survey.
• Explain how misuse of non-cash assets can negatively affect organizations.
• Understand how and why unconcealed larceny of non-cash assets occurs.
• Be familiar with internal controls and tests that can be used to prevent and detect non-cash larceny.
• Understand how weaknesses in internal asset requisition and transfer procedures can lead to the misappropriation of non-cash assets.
Learning Objectives
![Page 3: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/3.jpg)
3
• Explain how purchasing and receiving schemes are used to misappropriate non-cash assets.
• Understand how the theft of non-cash assets through the use of fraudulent shipments is accomplished.
• Define the term “shrinkage.”• Describe how fraudsters conceal the theft of non-cash assets on
the victim organization’s books.• Understand how fraudsters misappropriate intangible assets
and how companies can protect themselves.• Be familiar with proactive audit tests that can be used to detect
misappropriations of non-cash assets.
Learning Objectives
![Page 4: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/4.jpg)
4
Inventory and All Other Assets
LarcenyMisuse
Asset Req. &Transfers
False Sales & Shipping
Purchasing &Receiving
UnconcealedLarceny
![Page 5: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/5.jpg)
5
Cash vs. Non-Cash Schemes
2011 Global Fraud Survey
Scheme Type% of Asset
Misappropriation Cases
Median Loss
Cash Misappropriations 82.1% $100,000
Non-Cash Misappropriations 19.9% $58,000
![Page 6: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/6.jpg)
6
Non-Cash Cases by Type of Asset Misappropriated
8.4%
19.2%
75.3%
0% 20% 40% 60% 80%
Securities
Information
Physical assets
Percent of Noncash Cases
Ass
et T
arge
ted
![Page 7: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/7.jpg)
7
Median Loss by Type of Asset in Non-Cash Schemes
$49,000
$50,000
$330,000
$0 $100,000 $200,000 $300,000 $400,000
Information
Physical assets
Securities
Median Loss
Ass
et T
arge
ted
![Page 8: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/8.jpg)
8
Non-Cash Tangible Asset Misappropriations
• Misuse• Unconcealed larceny• Asset requisitions and transfers• Purchasing and receiving schemes• Fraudulent shipments
![Page 9: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/9.jpg)
9
Misuse of Non-Cash Tangible Assets
• Typical misuse– Company vehicles– Company supplies– Computers– Other office equipment
• Doing personal work on company time• Running side businesses
![Page 10: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/10.jpg)
10
The Costs of Inventory Misuse• Loss of productivity• Need to hire additional employees to
compensate• Lost business if employee’s business
competes• Unauthorized use of equipment can mean
additional wear and tear sooner or more often
![Page 11: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/11.jpg)
11
Unconcealed Larceny Schemes• Greater concern than misuse of assets• Most schemes are not complex• Some employees know their co-workers are
stealing but refrain from reporting it• Many of the employees who steal company
property are highly trusted• Assets misappropriated after-hours or
mailed to perpetrator
![Page 12: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/12.jpg)
12
The Fake Sale• Needs an accomplice• Sale is not rung up but the accomplice takes
the merchandise• Accomplice may return merchandise for
cash
![Page 13: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/13.jpg)
13
Preventing and Detecting Unconcealed Larceny of Non-Cash Tangible Assets• Segregate the duties of requisitioning, purchasing,
and receiving• Segregate the duties of payables, purchasing, and
receiving• Maintain physical security of merchandise• Track those who enter secure areas through access
logs• Install security cameras and let their presence be
known
![Page 14: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/14.jpg)
14
Preventing and Detecting Unconcealed Larceny of Non-Cash Tangible Assets
• Conduct inventory counts on a periodic basis by someone independent of the purchasing and warehousing functions
• Suspend shipping and receiving activities during physical counts
• Investigate significant discrepancies• Independently follow-up on customer complaints
![Page 15: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/15.jpg)
15
Asset Requisitions and Transfers
• Documentation enables non-cash assets to be moved from one location to another
• Internal documents can be used to fraudulently gain access to merchandise
• Basic scheme is to requisition materials to complete a work-related project, then steal the materials
• Inventory stored in multiple locations creates opportunities
![Page 16: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/16.jpg)
16
Purchasing and Receiving Schemes
• Assets were intentionally purchased by the company but misappropriated
• Falsifying incoming shipments– May also reject portion of the shipment as
being substandard– Perpetrator keeps the “substandard”
merchandise
![Page 17: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/17.jpg)
17
False Shipments of Inventory and Other Assets
• False shipping and sales documents are created to make it appear that the inventory was sold
• False packing slips can allow the inventory to be delivered to fraudster or accomplice
• To hide the theft a false sale is created• Receivable is aged and written off• Legitimate sale is understated
![Page 18: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/18.jpg)
18
Other Schemes• Assets are written off in order to make them
available for theft• Assets are declared as scrap and given to the
employee• New equipment is ordered for the company to
replace old – new equipment is sent to employee’s home leaving old equipment in place
![Page 19: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/19.jpg)
19
Concealing Inventory Theft
• Key concealment issue is shrinkage• Inventory shrinkage is the unaccounted-for
reduction in the company’s inventory due to theft
• Since shrinkage signals fraud, the fraudster must prevent anyone from looking for the missing assets
• Physical count of inventory detects shrinkage
![Page 20: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/20.jpg)
20
Concealing Inventory Theft
• Altered inventory records– Forced reconciliation– Deleting or covering up the correct totals and entering
new totals
• Fictitious sales and accounts receivable– Charge sale to existing account– Write-off to discounts and allowances or bad debt
expense
![Page 21: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/21.jpg)
21
Concealing Inventory Theft
• Write off inventory and other assets– Eliminates the problem of shrinkage
• Physical padding– Make it appear that there are more assets
present that there actually are
![Page 22: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/22.jpg)
22
Preventing and Detecting Thefts of Non-Cash Tangible Assets
• Separate the duties of:– Ordering goods– Receiving goods– Maintaining perpetual inventory records– Issuing payments
• Match the invoices to receiving reports before payments are issued
• Match the packing slip to an approved purchase order
![Page 23: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/23.jpg)
23
Preventing and Detecting Thefts of Non-Cash Tangible Assets
• Match outgoing shipments to sales orders before merchandise goes out
• Periodically match inventory shipments to sales records
• Investigate shipments that cannot be traced to a sale
• Check out unexplained increases in bad debt expense
![Page 24: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/24.jpg)
24
Preventing and Detecting Thefts of Non-Cash Tangible Assets
• Compare shipping addresses to employee addresses
• Review unexplained entries in perpetual inventory records
• Reconcile materials ordered for specific projects with actual work done
• Perform trend analysis on scrap inventory• Check to make sure that inventory removed from
inventory is properly approved
![Page 25: 2004 ACFE Post-Conference](https://reader030.vdocuments.site/reader030/viewer/2022011722/586a20fb1a28ab3f7c8bcad1/html5/thumbnails/25.jpg)
25
Misappropriation of Intangible Assets• Misappropriation of information
– Includes theft of competitively sensitive information, (e.g., trade secrets, customer lists, marketing strategies)
– Can undermine value, reputation, and competitive advantage
– Can result in legal liabilities– Identify most valuable information and take steps to
protect it• Misappropriation of securities
– Proper internal controls over investment portfolio