The concealment of receivables skimming can be difficult because

Theft of cash prior to its entry into the accounting system

Skimming that involves the theft of sales receipts as opposed to payments on accounts receivable Sales skimming schemes leave the victim organization book in balance because neither the sales transaction nor the stolen funds are ever recorded

A fraud that occurs outside the financial system and therefore has no direct audit trail. There are several kinds of off-book frauds that will be discussed in this book. Skimming is the most common off-book fraud

A variation of a sales skimming scheme in which only a portion of the cash received in a sales transaction is stolen. this type of fraud is not off-book, because the transaction is posted to the victim organizations books but for a lower amount than the perpetrator collected from the customer.

Check- for-Currency Substitution

A skimming method whereby the fraudster steals an unrecorded check and substitutes it for recorded currency in the same amount

Skimming that involves the theft of incoming payments on accounts receivable. This form of skimming is more difficult to hide than sales skimming, because the receivalbe are already recorded on the victim organizations books. in other words the incoming payments are expected by the victim organization. the key to a receivables skimming scheme is to conceal either that the payment was stolen or that the payment was due.

A method of concealing the theft of cash designated for accounts receivable by crediting one account while abstracting money from a different account. this process must be continuously repeated to avoid detection.

A method of concealing receivables skimming whereby the fraudster falsifies account totals to conceal the theft of funds. This is also sometimes known as "plugging". Typically the fraudster will steal a customers account so that the account does not age past due. this causes an imbalance in the cash account.

The theft of an organizations cash after it has been recorded in the accounting system.

Frauds that target incoming sales or receivables. Typically the perpetrators in these schemes physically abscond with the victim organizations cash instead of relying on phony documents to justify the disbursement of the funds. Cash receipts frauds generally fall into two categories Skimming and Cash Larceny

A method of concealing deposit theft that occurs when an employee steals part or all of the deposit from one day and then replaces it with receipts from subsequent days

Schemes in which an employee illegally or improperly causes the distribution of funds in a way that appears to be legitimate. Funds can be obtained by forging checks, submitting false invoices, or falsifying time records.

A method used to conceal cash larceny. The perpetrator processes false transactions to void a sale to refund cash, which causes sales records to reconcile to the amount of cash on hand after the theft.

INTRODUCTION TO FRAUD EXAMINATION

INTRODUCTION TO FRAUD EXAMINATION GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed

More information

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and

More information

Office of the Inspector General

Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April

More information

2008 Report to the Nation

2008 Report to the Nation on Occupational Fraud & Abuse Letter from the President When the Association of Certified Fraud Examiners was founded 20 years ago, we knew that occupational fraud was a significant

More information

Internal Controls Best Practices

Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most

More information

BRIBERY AND CORRUPTION

FRAUD SCHEMES Fraud An intentional act by one or more individuals among management, those charged with governance, employees, or third parties, involving the use of deception to obtain an unjust or illegal

More information

Accounts Payable Best Practices

Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can

More information

Office of the Inspector General

Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs Second Edition American Recovery and Reinvestment

More information

Fraud Awareness Training

UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for

More information

Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.

Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current

More information

How To Handle A Fraud At Psc

FRAUD POLICY Purpose and Background PSC is committed to the highest standards of moral and ethical behavior. The purpose of PSC s Fraud Policy is to foster an environment that promotes awareness to fraudulent

More information

The Practice of Internal Controls

Office of the New York State Comptroller Division of Local Government and School Accountability LOCAL GOVERNMENT MANAGEMENT GUIDE The Practice of Internal Controls Thomas P. DiNapoli State Comptroller

More information

IDENTITY THEFT PROCEDURES

IDENTITY THEFT PROCEDURES FREQUENTLY ASKED QUESTIONS ABOUT IDENTITY THEFT INCIDENTS AND RED FLAGS Q1: How is a Red Flags incident different from a data security breach? A1: A data security breach is the

More information

II. F. Identity Theft Prevention

II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal

More information

Number: 56.300. Index

Identity Theft Prevention Program Section: General Operations Title: Identity Theft Prevention Program Number: 56.300 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND

More information

Identity Theft Prevention Program

Identity Theft Prevention Program DATE: 10/22/2015 VERSION 2015-1.0 Abstract Purpose of this document is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity

More information

IDENTITY THEFT DETECTION POLICY

IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)

More information

Identity Theft Prevention Program

Identity Theft Prevention Program I. PROGRAM PURPOSE AND DEFINITIONS The purpose of this Identity Theft Prevention Program ( Program ) is to detect, prevent and mitigate identity theft in connection with

More information

MOTLOW STATE COMMUNITY COLLEGE

Page 1 of 5 MOTLOW STATE COMMUNITY COLLEGE SUBJECT: FACTA Red Flag Rule and Identity Theft Prevention Program I. BACKGROUND In late 2007 the Federal Trade Commission (FTC) and Federal banking agencies

More information

Fraud Control Theory

13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts

More information

Internal Control Guidelines

Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth

More information

T H E A S S O C I A T I O N

A B O U T T H E A S S O C I A T I O N Since 1988 there has been only one organization whose main focus is to train anti-fraud professionals in their fight against economic crime: the Association of Certified

More information

IDENTITY THEFT PREVENTION

IDENTITY THEFT PREVENTION Policy Title: Identity Theft Prevention Program Policy Type: Administrative Policy Number: #41-07 (2014) Approval Date: 05/12/2015 Responsible Office: University Controller Responsible

More information

IDENTITY THEFT PREVENTION PROGRAM

LEGAL REQUIREMENTS Section 114 of the Federal Trade Commission s Fair and Accurate Credit Transactions Act of 2003 created the Red Flags Rule. This regulation requires the College to have an Identity Theft

More information

What is receivables skimming?

An employee who is skimming receivables is intercepting payments from customers and pocketing the cash. The fact that skimming fraud is done before the payment enters the company's accounting system is what separates it from cash larceny.

What techniques are generally used to conceal a receivables skimming scheme?

Lapping is the crediting of one account through the abstraction of money from another account. It is used to conceal receivables skimming because the fraudster will use a customers paying to cover-up a stolen payment from another customer.

Which of the following computer audit tests can be used to detect skimming schemes?

Which of the following computer audit tests can be used to detect skimming schemes? Computing the percentage of assigned time to unassigned time for employees is one method to detect an employee skimming scheme.

What is the primary difference between cash larceny and skimming?

The difference in the two types of fraud depends completely on when the cash is stolen. Cash larceny is the theft of money that has already appeared on a victim organization's books, while skimming is the theft of cash that has not yet been recorded in the accounting system.

Related Posts

Toplist

Latest post

TAGs