04 Fraudulent Disbursements Flashcards
(58 cards)
White, an employee of ABC Corporation, intentionally issued two payments for the same invoice. After the checks had been mailed, White called the vendor and explained that a double payment had been made by mistake. She asked the vendor to return one of the checks to her attention. When the vendor returned the check, White took it and cashed it. This is an example of:
A. A receivables skimming scheme
B. A pay-and-return scheme
C. A pass-through scheme
D. A shell company scheme
B. A pay-and-return scheme
Instead of using shell companies in their overbilling schemes, some employees generate fraudulent disbursements by using the invoices of legitimate third-party vendors who are not a part of the fraud scheme. In a pay-and-return scheme, an employee intentionally mishandles payments that are owed to legitimate vendors. One way to do this is to purposely double-pay an invoice. For instance, a clerk might intentionally pay an invoice twice and then call the vendor and request that one of the checks be returned. The clerk then intercepts the returned check.
An excessive number of missing checks without stop payments issued to them is often a red flag of check tampering.
A. True
B. False
A. True
An excessive number of missing checks can be a red flag of a check tampering scheme, especially if stop payments haven’t been issued.
Which of the following is TRUE regarding an overstated refund scheme?
A. It requires collusion between the customer and the employee.
B. The company’s inventory balance on the books will be understated.
C. It is based on an entirely fictitious refund transaction.
D. An employee overstates the amount of a legitimate refund and keeps the excess cash.
D. An employee overstates the amount of a legitimate refund and keeps the excess cash.
Rather than create an entirely fictitious refund, some employees merely overstate the amount of a legitimate refund and steal the excess money. For example, if a customer returns $100 worth of merchandise, the employee might ring up a $200 return. The employee gives the customer $100 in return for the merchandise and then keeps the remaining $100. The customer might or might not be aware of the scheme taking place. This will result in shrinkage of $100 worth of inventory. In other words, the inventory balance on the books will be overstated by the amount of the excess refund.
Sheila, an accounts payable supervisor for ABC Company, bought supplies for a company she owned on the side. Sheila entered vouchers in ABC Company’s accounts payable system for the cost of the supplies. Checks were cut to pay for these unauthorized expenses during normal daily check runs. The goods were drop-shipped to a location where Sheila could collect them. What type of occupational fraud is this?
A. A pay-and-return scheme
B. An expense reimbursement scheme
C. An invoice kickback scheme
D. A personal purchases with company funds scheme
D. A personal purchases with company funds scheme
Instead of undertaking billing schemes to generate cash, many fraudsters simply purchase personal items with their company’s money. Company accounts are used to buy items for employees, their businesses, their families, and so on. This type of scheme is classified as a fraudulent billing scheme rather than theft of inventory. The heart of the scheme is not the theft of the items but rather the purchase of them. The perpetrator causes the victim company to purchase something it did not actually need, so the damage to the company is the money lost in purchasing the item.
Which of the following control procedures will NOT help prevent payroll fraud?
A. Prenumbering payroll checks and issuing them in numerical sequence
B. Maintaining personnel records separately from payroll and timekeeping functions
C. Having the employee who prepares the payroll also review and sign all payroll checks
D. Keeping the payroll accounting function independent of the general ledger function
C. Having the employee who prepares the payroll also review and sign all payroll checks
There are two basic preventive measures for payroll-related fraud: segregation of duties and periodic payroll review and analysis. The following activities should be separated:
* Payroll preparation
* Payroll disbursement (into payroll and withholding tax accounts)
* Payroll distribution
* Payroll bank reconciliations
* Human resource departmental functions
Therefore, the employee who prepares the payroll should NOT review or sign any payroll checks.
Pam is the purchasing manager at a retail store. She decides to form her own shell company and purchase merchandise through this entity. She then sells the merchandise to her employer at an inflated price as if she were a legitimate vendor. What type of scheme is Pam committing?
A. A pass-through scheme
B. A need recognition scheme
C. A pay-and-return scheme
D. A cash larceny scheme
A. A pass-through scheme
Pass-through schemes are usually undertaken by employees in charge of purchasing on the victim company’s behalf. Instead of buying merchandise directly from a vendor, the employee sets up a shell company and purchases the merchandise through that fictitious entity. He then resells the merchandise to his employer from the shell company at an inflated price, thereby making an unauthorized profit on the transaction.
The most effective way to prevent and detect electronic payment fraud is through proper separation of duties.
A. True
B. False
A. True
The most important practice for preventing and detecting electronic payment fraud is separation of duties. For example, in the case of online bill payments, such as those made through a bank’s website or a third-party business-to-business payment service, separate individuals should be responsible for maintaining payment templates, entering payments, and approving payments. For wire transfers, duties for creating, approving, and releasing wires should be segregated. And to prevent attempts to conceal fraudulent electronic payment activity, no individual involved in the payment process should reconcile the bank statement or even have access to it.
In addition to separating duties, companies should consider segregating their bank accounts to maintain better control over them—for example, separate accounts can be used for paper and electronic transactions.
Fraudulent disbursement schemes include which of the following?
A. Register disbursement schemes
B. Payroll schemes
C. Check tampering schemes
D. All of the above
D. All of the above
All of the following are types of fraudulent disbursement schemes:
* Register disbursement schemes
* Check tampering schemes
* Payroll schemes
* Billing schemes
* Expense reimbursement schemes
Baker, the managing partner in a small law firm, is the authorized signer on all company checks. When his personal phone bill arrived last month, Baker prepared and signed a company check to pay the bill. He did not disclose this payment to his partners. Baker committed:
A. A forged maker scheme
B. An authorized maker scheme
C. A false billing scheme
D. A mischaracterized expense scheme
B. An authorized maker scheme
An authorized maker scheme is a type of check tampering fraud in which an employee with signature authority on a company account writes fraudulent checks for his own benefit and signs his own name as the maker. The most common example occurs when a majority owner or sole shareholder uses his company to pay personal expenses directly out of company accounts. Baker’s scheme is not a billing scheme because he wrote the check himself and there is no indication that he submitted the phone bill to the firm’s regular payment cycle.
Tim, a cash register attendant at a department store, regularly inflates the amount of customer refunds. For instance, if a customer returns an item for $100, Tim records a $150 refund. Then Tim gives the customer $100 and keeps $50 for himself. This scheme is known as:
A. A fictitious refund scheme
B. An overstated refund scheme
C. A false void scheme
D. Skimming
B. An overstated refund scheme
One type of register disbursement scheme is the overstated refund. Rather than creating an entirely fictitious refund, a fraudster might overstate the value of a real customer’s refund, pay the customer the actual amount owed for the returned merchandise, and then keep the excess portion of the return.
In a fictitious refund scheme, an employee processes a transaction as if a customer were returning merchandise, even though there is no actual return. Then the employee takes cash from the register in the amount of the false return. The customer might or might not be aware of the scheme taking place.
Fictitious voids are similar to refund schemes in that they make fraudulent disbursements from the register appear to be legitimate. To process a false void, the first thing the perpetrator needs is the customer’s copy of the sales receipt. Typically, when an employee sets about processing a fictitious void, the employee simply withholds the customer’s receipt at the time of the sale. In many cases, customers do not notice that they are not given a receipt.
Skimming is the removal of cash from a victim entity prior to its entry in an accounting system.
Skimmed checks and false voids are types of check tampering schemes.
A. True
B. False
B. False
Neither skimmed checks nor false voids are types of check tampering schemes. Skimmed checks are a form of theft of incoming cash. False voids are a type of register disbursement scheme.
The four major categories of check tampering schemes include:
* Forged maker schemes
* Forged endorsements
* Altered payees
* Authorized maker schemes
Which of the following best describes a mischaracterized reimbursement expense scheme?
A. An employee submits a receipt for an item in one expense report and an email confirmation for the same item in the next period’s expense report.
B. An employee produces a fictitious receipt and includes it with an expense report.
C. An employee alters a receipt to reflect a higher cost than what the employee actually paid and submits it for reimbursement.
D. An employee who travels frequently on business submits receipts from a hotel stay during a family vacation as a business expense.
D. An employee who travels frequently on business submits receipts from a hotel stay during a family vacation as a business expense.
One of the most basic expense schemes is perpetrated by simply requesting reimbursement for a personal expense, claiming that it is business related. Examples of mischaracterized expenses include claiming personal travel as a business trip, listing dinner with a friend as “business development” or “client entertainment,” and so on. Fraudsters might submit the receipts from their personal expenses along with their reports and provide business reasons for the incurred costs.
Instead of seeking reimbursement for personal expenses, some employees overstate the cost of actual business expenses. This is considered an overstated expense reimbursement scheme.
In a fictitious expense reimbursement scheme, an employee seeks reimbursement for wholly fictitious expenses. Instead of overstating a real business expense or seeking reimbursement for a personal expense, an employee just invents an expense by producing a fictitious receipt and requests that it be reimbursed.
In a multiple reimbursement scheme, an employee submits several types of support for the same expense in order to get reimbursed multiple times.
Most shell company schemes involve the purchase of fictitious:
A. Services
B. Inventory
C. Goods
D. Supplies
A. Services
Most shell company schemes involve the purchase of services rather than goods. The primary reason for this is that services are not tangible. If an employee sets up a shell company to make fictitious sales of goods to his employer, these goods will obviously never arrive. By comparing its purchases to its inventory levels, the victim organization might detect the fraud. It is much more difficult for the victim organization to verify that the services were never rendered. For this reason, many employees involved in shell company schemes bill their employers for things like “consulting services
For employee expense reimbursement requests, electronic receipts are preferred to paper receipts because they are more difficult to alter or forge.
A. True
B. False
B. False
Requiring receipts to be submitted electronically is NOT a recommended form of expense reimbursement fraud prevention. In fact, electronic receipts are often much easier to forge or alter than paper receipts.
As a means to prevent check fraud, companies should establish maximum amounts above which the company’s bank will not accept checks drawn against the account.
A. True
B. False
A. True
Companies should work in a cooperative effort with banks to prevent check fraud. One way to do this is to establish maximum amounts above which the company’s bank will not accept checks drawn against the account.
Bank reconciliations should be performed by an authorized signatory on the account.
A. True
B. False
B. False
To prevent check fraud, bank reconciliations should NOT be performed by an authorized check signatory. Bank statements should be reviewed and reconciled by more than one person each month.
Which of the following methods would be useful in detecting a ghost employee scheme?
A. Analyzing payroll withholdings
B. Examining payroll checks for dual endorsements
C. Comparing personnel records to payroll data
D. All of the above
D. All of the above
Comparing personnel records maintained by the human resources department to payroll data can be useful in detecting ghost employee schemes. An analysis of payroll withholdings might also reveal either ghost employees or trust account abuses. Ghost employees often will have no withholding taxes, insurance, or other normal deductions. Therefore, a listing of any employee without these items might reveal a ghost employee. Another way to detect a ghost employee scheme is to examine paychecks for dual endorsements. This might indicate that the fraudster has forged an endorsement in order to deposit the ghost’s paychecks into the fraudster’s own account.
Which of the following schemes refers to the falsification of personnel or payroll records, causing paychecks to be generated to someone who does not actually work for the victim company?
A. Falsified salary scheme
B. Inflated commission scheme
C. Record alteration scheme
D. Ghost employee scheme
D. Ghost employee scheme
The term ghost employee refers to someone on the payroll who does not actually work for the victim company. Through the falsification of personnel or payroll records, a fraudster causes paychecks to be generated to a non-employee, or ghost. The fraudster or an accomplice then converts these paychecks. The ghost employee may be a fictitious person or a real individual who simply does not work for the victim employer.
How does positive pay help prevent check fraud?
A. The bank scans all checks presented for payment to determine whether the signatures are forged.
B. The bank verifies checks presented for payment against a list of approved checks provided by the company.
C. Positive pay controls which vendors the company’s bank can deposit checks from.
D. Positive pay establishes a maximum amount above which the company’s bank will not accept checks drawn against the account.
B. The bank verifies checks presented for payment against a list of approved checks provided by the company.
Positive pay allows a company and its bank to work together to detect fraudulent items presented for payment. The company provides the bank with a list of checks and amounts that are written each day. The bank verifies items presented for payment against the company’s list. The bank rejects items that are not on the list. Investigations are conducted as to the origin of the “non-listed” items.
Gaps in the sequence of transactions on the register log might indicate that a fraudulent register disbursement scheme is taking place.
A. True
B. False
A. True
Red flags of fraudulent register disbursements include the following:
Inappropriate separation of duties exists.
Cashiers, rather than supervisors, have access to the control keys necessary for refunds and voids.
Register employees have the authority to void their own transactions.
Register refunds are not carefully reviewed.
Multiple cashiers operate from a single cash drawer without separate access codes.
Personal checks from cashiers are found in the register.
Voided transactions are not properly documented or approved by a supervisor.
Voided cash receipt forms (manual systems) or supporting documents for voided transactions (cash register systems) are not retained on file.
Gaps exist in the sequence of transactions on the register log.
There is an excessive number of refunds, voids, or no-sales on the register log.
Inventory totals appear forced.
There are multiple refunds or voids for amounts just under the review limit.
A register disbursement scheme is easier to conceal when register employees have the authority to void their own transactions.
A. True
B. False
A. True
Red flags of fraudulent register disbursements include the following:
Inappropriate separation of duties exists.
Cashiers, rather than supervisors, have access to the control keys necessary for refunds and voids.
Register employees have the authority to void their own transactions.
Register refunds are not carefully reviewed.
Multiple cashiers operate from a single cash drawer without separate access codes.
Personal checks from cashiers are found in the register.
Voided transactions are not properly documented or approved by a supervisor.
Voided cash receipt forms (manual systems) or supporting documents for voided transactions (cash register systems) are not retained on file.
Gaps exist in the sequence of transactions on the register log.
There is an excessive number of refunds, voids, or no-sales on the register log.
Inventory totals appear forced.
There are multiple refunds or voids for amounts just under the review limit.
To prevent fraudulent register disbursements, an employee other than the register worker should be responsible for preparing register count sheets and agreeing them to register totals.
A. True
B. False
A. True
To prevent fraudulent register disbursements, an employee other than the register worker should be responsible for preparing register count sheets and agreeing them to register totals.
Duplicate check numbers in the listing of canceled checks are a potential sign of fraud.
A. True
B. False
A. True
Duplicate check numbers indicate potential fraud. These checks might be traceable to the depositor through bank check coding.
Pass-through schemes are usually undertaken by employees who receive inventory on the victim company’s behalf.
A. True
B. False
B. False
Pass-through schemes are usually undertaken by employees in charge of purchasing on the victim company’s behalf. Instead of buying merchandise directly from a vendor, the employee sets up a shell company and purchases the merchandise through that fictitious entity. He then resells the merchandise to his employer from the shell company at an inflated price, thereby making an unauthorized profit on the transaction.