Fraud Risk Management
Fraud Risk Management
Fraud Risk Management
This guide is based on the first edition of Fraud Risk Management: A Guide to Good Practice. The first edition was
prepared by a Fraud and Risk Management Working Group, which was established to look at ways of helping
management accountants to be more effective in countering fraud and managing risk in their organisations.
This second edition of Fraud Risk Management: A Guide to Good Practice has been updated by Helenne Doody, a
specialist within CIMA Innovation and Development. Helenne specialises in Fraud Risk Management, having worked
in related fields for the past nine years, both in the UK and other countries. Helenne also has a graduate certificate
in Fraud Investigation through La Trobe University in Australia and a graduate certificate in Fraud Management
through the University of Teeside in the UK.
For their contributions in updating the guide to produce this second edition, CIMA would like to thank:
Martin Birch FCMA, MBA Director – Finance and Information Management, Christian Aid.
Roy Katzenberg Chief Financial Officer, RITC Syndicate Management Limited.
Judy Finn Senior Lecturer, Southampton Solent University.
Dr Stephen Hill E-crime and Fraud Manager, Chantrey Vellacott DFK.
Richard Sharp BSc, FCMA, MBA Assistant Finance Director (Governance), Kingston Hospital NHS Trust.
Allan McDonagh Managing Director, Hibis Europe Ltd.
Martin Robinson and
Mia Campbell on behalf of the Fraud Advisory Panel.
CIMA would like also to thank those who contributed to the first edition of the guide.
About CIMA
CIMA, the Chartered Institute of Management Accountants, is the only international accountancy body with a key
focus on business. It is a world leading professional institute that offers an internationally recognised qualification
in management accounting, with a full focus on business, in both the private and public sectors. With 164,000
members and students in 161 countries, CIMA is committed to upholding the highest ethical and professional
standards of its members and students.
© CIMA 2008. All rights reserved. This booklet does not necessarily represent the views of the Council of the
Institute and no responsibility for loss associated to any person acting or refraining from acting as a result of any
material in this publication can be accepted by the authors or publishers.
1
Fraud risk management: a guide to good practice
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3 Fraud prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.1 A strategy to combat fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.2 Developing a sound ethical culture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.3 Sound internal control systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
4 Fraud detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.1 Detection methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.2 Indicators and warnings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
4.3 Tools and techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
4.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
5 Responding to fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.1 Purpose of the fraud response plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.2 Corporate policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5.3 Definition of fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
5.4 Roles and responsibilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
5.5 The response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
5.6 The investigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
5.7 Organisation’s objectives with respect to dealing with fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.8 Follow-up action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
2
Appendices
Appendix 1 Fraud and the law . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Appendix 2 Examples of common types of internal fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Appendix 3 Example of a risk analysis. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Appendix 4 A sample fraud policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Appendix 5 Sample whistleblowing policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Appendix 6 Examples of fraud indicators, risks and controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Appendix 7 A 16 step fraud prevention plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Appendix 8 Outline fraud response plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Appendix 9 Example of a fraud response plan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Appendix 10 References and further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Appendix 11 Listed abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Figures
Figure 1 Types of internal fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Figure 2 The fraud triangle. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Figure 3 The CIMA risk management cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Figure 4 Anti-fraud strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Figure 5 Ethics advice/services provided . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Figure 6 Methods of fraud detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Case Studies
Case study 1 Fraud doesn’t involve just money . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Case study 2 Size really doesn’t matter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Case study 3 A breach of trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Case study 4 Management risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Case study 5 A fine warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Case study 6 Vet or regret? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Case study 7 Tipped off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Case study 8 Risk or returns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Case study 9 Reporting fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Case study 10 TNT roots our fraud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3
4
Introduction
Periodically, the latest major fraud hits the headlines Despite the serious risk that fraud presents to business,
as other organisations sit back and watch, telling many organisations still do not have formal systems
themselves that ‘it couldn’t happen here.’ But the and procedures in place to prevent, detect and respond
reality is that fraud can happen anywhere. While to fraud. While no system is completely foolproof,
only relatively few major frauds are picked up by the there are steps which can be taken to deter fraud and
media, huge sums are lost by all kinds of businesses as make it much less attractive to commit. It is in assisting
a result of the high number of smaller frauds that are organisations in taking such steps that this guide should
committed. prove valuable.
Surveys are regularly carried out in an attempt to The original guide to good practice was based on the
estimate the true scale and cost of fraud to business work of CIMA’s Fraud and Risk Management Working
and society. Findings vary, and it is difficult to obtain a Group that was established as part of the Institute’s
complete picture as to the full extent of the issue, but response to the problem of fraud. Since the publication
these surveys all indicate that fraud is prevalent within of the original guide, we have continued to see high
organisations and remains a serious and costly problem. profile accounting scandals and unacceptable levels of
The risks of fraud may only be increasing, as we see fraudulent behaviour. This second edition of the guide
growing globalisation, more competitive markets, rapid includes updates to reflect the many changes in the
developments in technology, and periods of economic legal environment and governance agenda in recent
difficulty. years, aimed at tackling the ongoing problem of fraud.
Among other findings, the various surveys highlight The guide starts by defining fraud and giving an
that: overview of the extent of fraud, its causes and its
• organisations may be losing as much as 7% of their effects. The initial chapters of the guide also set
annual turnover as a result of fraud out the legal environment with respect to fraud,
• corruption is estimated to cost the global economy corporate governance requirements and general
about $1.5 trillion each year risk management principles. The guide goes on to
• only a small percentage of losses from fraud are discuss the key components of an anti-fraud strategy
recovered by organisations and outlines methods for preventing, detecting and
• a high percentage of frauds are committed by senior responding to fraud. A number of case studies are
management and executives included throughout the guide to support the text,
• greed is one of the main motivators for committing demonstrating real life problems that fraud presents
fraud and giving examples of actions organisations are taking
• fraudsters often work in the finance function to fight fraud.
• fraud losses are not restricted to a particular sector
or country
• the prevalence of fraud is increasing in emerging
markets.
5
Fraud risk management: a guide to good practice
6
1 Fraud: its extent, patterns and causes
7
Fraud risk management: a guide to good practice
This guide focuses on fraud against businesses, typically The final of the three fraud categories is corruption.
by those internal to the organisation. According This includes activities such as the use of bribes or
to the Association of Certified Fraud Examiners acceptance of ‘kickbacks’, improper use of confidential
(ACFE), there are three main categories of fraud information, conflicts of interest and collusive
that affect organisations. The first of these is asset tendering. These types of internal fraud are summarised
misappropriations, which involves the theft or misuse in Figure 1.
of an organisation’s assets. Examples include theft
of plant, inventory or cash, false invoicing, accounts Surveys have shown that asset misappropriation is the
receivable fraud, and payroll fraud. most widely reported type of fraud in UK, although
corruption and bribery are growing the most rapidly.
The second category of fraud is fraudulent statements.
This is usually in the form of falsification of financial Further information on common types of internal fraud,
statements in order to obtain some form of improper and methods by which they may be perpetrated, is
benefit. It also includes falsifying documents such as included in Appendix 2.
employee credentials.
Internal fraud
Asset Fraudulent
Corruption
misappropriation statements
8
1.2 The scale of the problem
There have been many attempts to measure the According to the UK report of PwC’s survey, the average
true extent of fraud, but compiling reliable statistics direct loss per company over a two year period as a
around fraud is not easy. As one of the key aspects of result of fraud has risen to £1.75 million, increasing
fraud is deception, it can be difficult to identify and from £0.8 million in the equivalent 2005 survey. These
survey results often only reflect the instances of fraud figures exclude undetected losses and indirect costs to
that have actually been discovered. It is estimated the business such as management costs or damage to
that the majority of frauds go undetected and, even reputation, which can be significant. Management costs
when a fraud has been found, it may not be reported. alone were estimated to be on average another £0.75
One reason for this may be that a company that has million. Participants of the ACFE Report to the Nation
been a victim of fraud does not want to risk negative 2008 (ACFE report) estimated that organisations lose
publicity. Also, it is often hard to distinguish fraud from 7% of their annual revenues to fraud.
carelessness and poor record keeping.
It is difficult to put a total cost on fraud, although many
Although survey results and research may not give a studies have tried to. For example an independent
complete picture, the various statistics do offer a useful report by the Association of Chief Police Officers (the
indication as to the extend of the problem. There can ACPO) in 2007 revealed that fraud results in losses
be no doubt that fraud is prevalent within organisations of £20 billion each year in the UK. The World Bank
and remains a serious issue. PricewaterhouseCooper’s has estimated that the global cost of corruption and
Global Economic Crime Survey (PwC’s survey) in 2007 bribery is about 5% of the value of the world economy
found that over 43% of international businesses were or about $1.5 trillion per year. It is thought that these
victims of fraud during the previous two years. In the estimates are conservative, and they also exclude other
UK, the figures were higher than the global average, types of fraud such as misappropriation of assets.
with 48% of companies having fallen victim to fraud.
While it may be impossible to calculate the total cost
Some surveys put the figures much higher. For example, of fraud, it is said to be more significant than the total
during 2008, Kroll commissioned the Economist cost of most other crimes. According to the Attorney
Intelligence Unit (EIU) to poll nearly 900 senior General in the UK, fraud is an area of crime which is
executives across the world. The EIU found that 85% of second only to drug trafficking in terms of causing harm
companies had suffered from at least one fraud in the to the economy and society2.
past three years1. This figure had risen from 80% in a
similar poll in 2007. KPMG’s Fraud Barometer, which has
been running since 1987, has also shown a considerable
increase in the number of frauds committed in the UK
in recent years, including a 50% rise in fraud cases in
the first half of 2008.
9
Fraud risk management: a guide to good practice
Fraud is often mistakenly considered a victimless Taxpayers also suffer due to reduced payments of
crime. However, fraud can have considerable social corporation tax from businesses that have suffered
and psychological effects on individuals, businesses losses. Fraud drains resources, affects public services
and society. For example, when a fraud causes the and, perhaps of more concern, may fund other criminal
collapse of a major company, numerous individuals and terrorist activity. According to the Fraud Review,
and businesses can be affected. In addition to the fraud is a major and growing threat to public safety and
company’s own employees, employees of suppliers prosperity. Case study 1 demonstrates just how much
can be affected by the loss of large orders, and of a threat fraud can be to public safety and that there
other creditors, such as banks, can be indirectly truly are victims of fraud.
affected by huge losses on loans. Consumers have
to pay a premium for goods and services, in order to
compensate for the costs of fraud losses and for money
spent on investigations and additional security.
Case study 1
Counterfeiting is one example of fraud that can have extremely serious consequences. Technology is ever
improving, making it easier for counterfeiters to produce realistic looking packaging and fool legitimate
wholesalers and retailers. Counterfeiting is a potentially lucrative business for the fraudster, with possibilities
of large commercial profits, and it is a problem affecting a wide range of industries including wines and
spirits, pharmaceuticals, electrical goods, and fashion. However, there are often many victims affected by
such a fraud and not just the business that has been duped or had their brand exploited. For some, the
outcome of counterfeiting goes way beyond financial losses and can even be fatal:
• In late 2006, 14 Siberian towns declared a state of emergency due to mass poisonings caused by fake
vodka. Around 900 people were hospitalised with liver failure after drinking industrial solvent that was
being sold as vodka. This is not a one off problem and sales of fake alcohol have been known to kill people.
• Also in 2006, a counterfeit product did result in more tragic consequences. At least 100 children died after
ingesting cough syrup that had been mixed with counterfeit glycerine. The counterfeit compound, actually
a dangerous solvent, had been used in place of more expensive glycerine. The manufacturing process had
been sourced to China and the syrup passed through trading companies in Beijing and Barcelona before
reaching its final destination in Panama. The certificate attesting to the product’s purity was falsified and
not one of the trading companies tested the syrup to confirm its contents along the way. It is thought that
the number of deaths is likely to be much higher than the 100 cases that have been confirmed.
10
1.3 Which businesses are affected?
Fraud is an issue that all organisations may face commissioned by Kroll in 2007 found that respondents
regardless of size, industry or country. If the in countries such as India and China have seen a
organisation has valuable property (cash, goods, significant increase in the prevalence of corporate fraud
information or services), then fraud may be attempted. in the last three years and this trend is likely to increase
It is often high profile frauds in large multi-national in businesses operating in emerging markets3.
organisations that are reported on in the media and
smaller organisations may feel they are unlikely to be Although fraud is prevalent across organisations of all
a target of fraudsters. However, according to the ACFE sizes and in all sectors and locations, research shows
report, small businesses (classified as those with less that certain business models will involve greater levels
than 100 employees) suffer fraud more frequently than of fraud risk than others. The control environment
large organisations and are hit by higher average losses. should be adjusted to fit with the degree of risk
When small companies are hit by large fraud losses, exposure. Further guidance on risk assessment and
they are less likely to be able to absorb the damage controls is given in later chapters.
than a larger company and may even go out of business
as a result.
11
Fraud risk management: a guide to good practice
Case study 2
Adapted from ‘FraudTrack 5 Fraud: A Global Challenge’ published by BDO Stoy Hayward
Former WorldCom chief executive Bernie Ebbers resigned in April 2002 amid questions about US$366 million
in personal loans from the company and a federal probe of its accounting practices. Ebbers was subsequently
charged with conspiracy to commit securities fraud and filing misleading data with the Securities and
Exchange Commission (SEC) and was sentenced to 25 years in prison. Scott Sullivan, former Chief Financial
Officer, pleaded guilty to three criminal charges and was sentenced to five years in prison. Ultimately, losses
to WorldCom shareholders were close to US$180 billion and the fraud also resulted in the loss of 17,000 jobs.
The SEC said that WorldCom had committed ‘accounting improprieties of unprecedented magnitude’ – proof,
it said, of the need for reform in the regulation of corporate accounting.
Adapted from CIMA Official Learning System, Management Accounting Risk and Control Strategy
12
1.4 Why do people commit fraud?
Opportunity Rationalisation
13
Fraud risk management: a guide to good practice
Case study 3
A breach of trust
A good example of the fraud triangle in practice is the highly publicised case of the secretary that stole over
£4.3 million from her bosses at Goldman Sachs.
Motivation
There were some suggestions that Joyti De-Laurey originally started down her fraudulent path because
of financial difficulties she found herself in before starting work at the investment bank. De-Laurey had
previously run her own sandwich bar business, but it was closed down due to insufficient finances. According
to her defence, De-Laurey’s ‘first bitter experience of financial turmoil coincided with a novel introduction to
a Dallas-type world where huge, unthinkable amounts of money stared her in the face, day in and day out.’
The motive behind the fraud was primarily greed though, with De-Laurey spending her ill gotten gains on a
luxury lifestyle, including villas, cars, jewellery, designer clothes and first class holidays. De-Laurey has even
admitted that she did not steal because she needed to, but because she could. She explained that she first
started taking money simply to find out if she could get away with it. She says that it then became ‘a bit
addictive’ and that she ‘got a huge buzz from knowing they had no idea what I was doing.’
Opportunity
In terms of opportunity, De-Laurey’s bosses trusted her and held her in high regard. She had proved herself
indispensable, on both business and personal fronts, and was given access to their cheque books in order to
settle their domestic bills and personal finances.
A little over a year after starting at Goldman Sachs, De-Laurey began forging her bosses’ signatures on
personal cheques to make payments into her own accounts. Realising she had got away with it, De-Laurey
continued to steal money by issuing forged cheques and making false money transfers. Before long she was
forging signatures on a string of cash transfer authorities, siphoning off up to £2.5 million at a time from
supposedly secure New York investments.
Rationalisation
De-Laurey was able to rationalise her actions by convincing herself that she had earned the money she stole.
De-Laurey believed that she deserved the plundered amounts as a just reward for her dedication, discretion
and loyalty, and claims that she had the consent of her bosses to take money in return for her ‘indispensable
services’. The fact that they were so rich they did not even notice the money was missing, only served to
fuel De-Laurey’s fraudulent activities. She justified her actions through the belief that her bosses had cash to
spare. According to De-Laurey; ‘They could afford to lose that money.’
Caught out
After four years of siphoning off vast amounts of money, De-Laurey was eventually caught when her boss
at the time decided to make a six-figure donation to his former college. He took a look at his bank accounts
to see if he could cover the donation and was surprised to find the balance on the accounts so low. He
investigated further and realised that large sums had been transferred to an unknown account. De-Laurey
was the obvious suspect. By this time, De-Laurey had actually stolen around £3.3 million from this particular
boss.
De-Laurey was the first woman in the UK to be accused of embezzling such a large sum and, after a long and
high profile trial in 2004, she was sentenced to seven years imprisonment.
Various sources including The Guardian, The Times, The Independent and the BBC News
14
One of the most effective ways to tackle the problem In 2007, KPMG carried out research on the Profile of a
of fraud is to adopt methods that will decrease motive Fraudster (KPMG survey), using details of fraud cases
or opportunity, or preferably both. Rationalisation is in Europe, India, the Middle East and South Africa. The
personal to the individual and more difficult to combat, ACFE carried out similar research on frauds committed
although ensuring that the company has a strong in the US. These surveys highlight the following facts
ethical culture and clear values should help. These and figures in relation to fraudsters:
methods and principles are developed further in later • perpetrators are typically college educated white
chapters of this guide. male
• most fraudsters are aged between 36 and 55
• the majority of frauds are committed by men
1.5 Who commits fraud? • median losses caused by men are twice as great as
those caused by women
Different types of fraudster • a high percentage of frauds are committed by senior
Fraudsters usually fall into one of three categories: management (including owners and executives)
• losses caused by managers are generally more than
1 Pre-planned fraudsters, who start out from the double those caused by employees
beginning intending to commit fraud. These can be • average losses caused by owners and executives are
short-term players, like many who use stolen credit nearly 12 times those of employees
cards or false social security numbers; or can be • longer term employees tend to commit much larger
longer-term, like bankruptcy fraudsters and those frauds
who execute complex money laundering schemes. • fraudsters most often work in the finance
department, operations/sales or as the CEO.
2 Intermediate fraudsters, who start off honest but
turn to fraud when times get hard or when life The ACFE report also found that the type of person
events, such as irritation at being passed over for committing the offence depends on the nature of the
promotion or the need to pay for care for a family fraud being perpetrated. Employees are most likely
member, change the normal mode. to be involved in asset misappropriation, whereas
owners and executives are responsible for the majority
3 Slippery-slope fraudsters, who simply carry on of financial statement frauds. Of the employees,
trading even when, objectively, they are not in a the highest percentage of schemes involved those
position to pay their debts. This can apply to ordinary in the accounting department. These employees
traders or to major business people. are responsible for processing and recording the
organisation’s financial transactions and so often have
the greatest access to its financial assets and more
opportunity to conceal the fraud.
15
Fraud risk management: a guide to good practice
Case study 4
Management risk
In 2007, a major British construction firm suffered from extensive fraud committed by management
at one of its subsidiaries. Accounting irregularities dating back to 2003 were said to include systematic
misrepresentation of production volumes and sales by a number of senior figures at the division.
Management at the subsidiary attempted to cover their behaviour by selling materials at a discounted price
and the fraud went undetected for several years despite internal and external audits. The irregularities were
eventually uncovered by an internal team sent to investigate a mismatch between orders and sales.
Following an initial internal investigation, a team of external experts and the police were brought in to
identify the full extent of malpractice. The investigation found that the organisation was defrauded of nearly
£23 million, but the fraud was said to cost the company closer to £40 million due to the written down value
of the business and factoring in the cost of the investigation. The managing director of the subsidiary was
dismissed, another manager faced disciplinary action and five others left before disciplinary proceedings
could be commenced. Civil proceedings were ruled out on the basis that losses were unlikely to be recovered.
Operations at the centre of the incident had to be temporarily closed and more than 160 jobs were cut at the
business.
In addition to individual fraudsters, there has also The main way of achieving this must be to establish a
been an increase in fraud being committed by gangs of comprehensive system of control which aims to prevent
organised criminals. Examples include false or stolen fraud, and where fraud is not prevented, increases the
identities being used to defraud banks, and forms of likelihood of detection and increases the cost to the
e-fraud exploiting the use of internet by commercial fraudster.
businesses. SOCA is responsible for responding to such
threats, with the support of the victim organisations. Later chapters of this guide set out some of the
measures which can be put in place to minimise fraud
1.6 Summary risks to the organisation. Before looking specifically
at fraud risk, the guide considers risk management in
A major reason why people commit fraud is because general.
they are allowed to do so. There are a wide range
of threats facing businesses. The threat of fraud can
come from inside or outside the organisation, but the
likelihood that a fraud will be committed is greatly
decreased if the potential fraudster believes that the
rewards will be modest, that they will be detected or
that the potential punishment will be unacceptably
high.
16
2 Risk management – an overview
Risk management is defined as the ‘process of Risk management is an increasingly important process
understanding and managing risks that the entity in many businesses and the process fits in well with the
is inevitably subject to in attempting to achieve its precepts of good corporate governance. In recent years,
corporate objectives’ (CIMA Official Terminology, the issue of corporate governance has been a major
2005). area for concern in many countries. In the UK, the first
corporate governance report and code of best practice
For an organisation, risks are potential events that is considered to be the Cadbury Report in 1992, which
could influence the achievement of the organisation’s was produced in response to a string of corporate
objectives. Risk management is about understanding collapses. There have been a number of reports since,
the nature of such events and, where they represent covering provisions around areas such as executive
threats, making positive plans to mitigate them. Fraud remuneration, non-executive directors, and audit
is a major risk that threatens the business, not only committees. The principles of these various reports
in terms of financial health but also its image and have been brought together to form the Combined
reputation. Code on Corporate Governance (Combined Code).
This guide is primarily focused on managing the risk The Combined Code was first introduced in 1998 and
of fraud, but first, this chapter looks at more general among other matters, calls for boards to establish
aspects of risk management and corporate governance. systems of internal control and to review the
effectiveness of these systems on a regular basis. UK
listed companies are required to provide a statement
in their annual reports confirming that they comply
with the Combined Code, and where they do not, they
must provide an explanation for departures from it
(the ‘comply or explain’ principle). The assessment of
internal controls should be included in the report to
shareholders. The Combined Code is reviewed regularly
and the most recent version was published in June
2008.
17
Fraud risk management: a guide to good practice
18
2.3 The risk management cycle
Establish risk
management group Identify risk areas
and set goals
Implementation
Develop risk response
and monitoring of
strategy
controls
Implement strategy
and allocate
responsibilities
19
Fraud risk management: a guide to good practice
2.4 Establish a risk management group 2.6 Understand and assess the scale of risk
and set goals
A risk management group should be established whose Once risks have been identified, an assessment
task it is to facilitate and co-ordinate the overall risk of possible impact and corresponding likelihood
management process. Possible members of the group of occurrence should be made using consistent
could include a chief risk officer, a non executive parameters that will enable the development of
director, finance director, internal auditor, heads of a prioritised risk analysis. In the planning stage,
planning and sales, treasurer and operational staff. management should agree on the most appropriate
Depending on the size and nature of the organisation, definition and number of categories to be used when
the risk management group may be in the form of a assessing both likelihood and impact.
committee who meet from time to time.
The assessment of the impact of the risk should not
The risk management group will promote the simply take account of the financial impact but should
understanding and assessment of risk, and facilitate the also consider the organisation’s viability and reputation,
development of a strategy for dealing with the risks and recognise the political and commercial sensitivities
identified. They may also be responsible for conducting involved. The analysis should either be qualitative
reviews of systems and procedures to identify and or quantitative, and should be consistent to allow
assess risks faced by the business, which include the comparisons. The qualitative approach usually involves
risk of fraud, and introducing the controls that are best grading risks in high, medium and low categories.
suited to the business unit. However, line managers and
their staff may also be involved in the risk identification Impact
and assessment process, with the risk management The assessment of the potential impact of a particular
group providing guidance. risk may be complicated by the fact that a range of
possible outcomes may exist or that the risk may occur
a number of times in a given period of time. Such
2.5 Identify risk areas complications should be anticipated and a consistent
approach adopted which, for example, may seek to
Each risk in the overall risk model should be explored estimate a worst case scenario over, say, a 12 month
to identify how it potentially evolves through the time period.
organisation. It is important to ensure that the risk is
carefully defined and explained to facilitate further Likelihood of occurrence
analysis. The likelihood of a risk occurring should be assessed on
a gross, a net and a target basis.
The techniques of analysis include:
• workshops and interviews The gross basis assesses the inherent likelihood of the
• brainstorming event occurring in the absence of any processes which
• questionnaires the organisation may have in place to reduce that
• process mapping likelihood.
• comparisons with other organisations
• discussions with peers. The net basis assesses the likelihood, taking into
account current conditions and processes to mitigate
the chance of the event occurring.
20
Where the net likelihood and the target likelihood for Analysing fraud risks
a particular risk differ, this would indicate the need to Fraud risk is one component of operational risk.
alter the risk profile accordingly. Operational risk focuses on the risks associated with
errors or events in transaction processing or other
It is common practice to assess likelihood in terms of: business operations. A fraud risk review considers
• high – probable whether these errors or events could be the result of a
• moderate – possible deliberate act designed to benefit the perpetrator. As
• low – remote. a result, fraud risk reviews should be detailed exercises
conducted by teams combining in depth knowledge of
An example of a risk analysis is contained in Appendix the business and market with detailed knowledge and
3. The resulting document is often referred to as a experience of fraud.
risk register. The overall risk registers at organisational
and operational levels should include the risk of fraud Risks such as false accounting or the theft of cash
being perpetrated. Some organisations also prepare or assets need to be considered for each part of the
detailed fraud risk registers that consider possible organisation’s business. Frequently, businesses focus on
fraudulent activity. The fraud risk register often directs a limited number of risks, most commonly on third-
the majority of proactive fraud risk management work party thefts. To avoid this, the risks should be classified
undertaken by an organisation. by reference to the possible type of offence and the
potential perpetrator(s).
21
Fraud risk management: a guide to good practice
2.7 Develop a risk response strategy 2.9 Implement and monitor suggested
controls
Once the risks have been identified and assessed, The chosen strategy may require the implementation
strategies to deal with each risk identified can be of new controls or the modification of existing controls.
developed by line management, with guidance from the Businesses are dynamic and the controls that are in
risk management group. place will need to be monitored to assess whether or
not they are succeeding in their objectives. The risk
Strategies for responding to risk generally fall into one management group should be empowered to monitor
of the following categories: the effectiveness of the actions being taken in each
• risk retention (e.g. choosing to accept small risks) specific area, as these can be affected by internal and
• risk avoidance (e.g. stopping sale of certain products external factors, such as changes in the marketplace or
to avoid the risk to occurring) the introduction of new computer systems.
• risk reduction (e.g. through implementing controls
and procedures)
• risk transfer (e.g. contractual transfer of risk; 2.10 Review and refine and do it again
transferring risks to insurers).
All of the elements outlined above form part of an
Before strategies are developed, it is necessary to iterative cycle where risk management is continually
establish the risk appetite of the organisation. Risk reviewed and developed. As the cycle continues, risk
appetite is the level of risk that the organisation is management should increasingly become embedded
prepared to accept and this should be determined in the organisation so that it really becomes part of
by the board. The appetite for risk will influence the everyone’s job.
strategies to be developed for managing risk. It is
worth noting that a board’s risk appetite may vary for
different types of risk and over time. For example, the 2.11 Information for decision making
board may have a low risk tolerance on compliance and
regulatory issues, but be prepared to take significant Risk management should form a key part of the
strategic risks. The board may also reduce their risk organisation’s decision-making process. Information is
appetite as the external environment changes, such as gathered at all stages of the risk management cycle and
in times of recession. this information should be fed into the decision-making
mechanisms.
2.8 Implement the strategy and allocate For more information on risk management, please refer
responsibilities to CIMA’s publication Risk Management: A guide to good
The chosen strategy should be allocated practice.
and communicated to those responsible for
implementation. For the plan to be effective it is
essential that responsibility for each specific action is
assigned to the appropriate operational manager and
that clear target dates are established for each action.
It is also important to obtain the co-operation of those
responsible for the strategy, by formal communication,
seminars, action plans and adjustments to budgets.
22
2.12 Summary
23
Fraud risk management: a guide to good practice
3 Fraud prevention
24
An anti-fraud strategy It is clear from Figure 4 that the various elements of an
An effective anti-fraud strategy in fact has four main effective anti-fraud strategy are all closely interlinked
components: and each plays a significant role in combating fraud.
• prevention Fraud detection acts as a deterrent by sending a
• detection message to likely fraudsters that the organisation
• deterrence is actively fighting fraud and that procedures are in
• response. place to identify any illegal activity that has occurred.
The possibility of being caught will often persuade
The following diagram summarises these components a potential perpetrator not to commit a fraud.
and the context within which an anti-fraud strategy Complementary detection controls should also be in
sits. place to counter the fact that the prevention controls
may be insufficient in some cases.
�����������
����� �����
�������
���������� ���������
���������������
�����
��������
����������
�����
��������
�����
���������������
25
Fraud risk management: a guide to good practice
A consistent and comprehensive response to suspected Attitudes within an organisation often lay the
and detected incidents of fraud is also important. This foundation for a high or low fraud risk environment.
sends a message that fraud is taken seriously and that Where minor unethical practices may be overlooked
action will be taken against perpetrators. Each case (e.g. petty theft, expenses frauds), larger frauds
that is detected and investigated should reinforce committed by higher levels of management may
this deterrent and, therefore, act as a form of fraud also be treated in a similar lenient fashion. In this
prevention. environment there may be a risk of total collapse of
the organisation either through a single catastrophic
The various components of an effective anti-fraud fraud or through the combined weight of many smaller
strategy are discussed over the next few chapters. The frauds.
remainder of this chapter examines some of the main
preventative approaches which can be implemented to Organisations which have taken the time to consider
minimise the occurrence and cost of fraud within an where they stand on ethical issues have come to
organisation. These approaches are generic and can be realise that high ethical standards bring long term
applied, as appropriate, to different organisations and benefits as customers, suppliers, employees and
particular circumstances. the community realise that they are dealing with a
trustworthy organisation. They have also realised that
dubious ethical or fraudulent practices cause serious
adverse consequences to the people and organisations
concerned when exposed.
26
Organisations which have created a positive ethical
BT’s business principles culture have normally either been driven by a
committed chief executive or have been forced to do so
• Legal because of incidents which caused, or almost caused,
We will act within the law, our licensing/ significant loss to the organisation.
authorisations obligations and any other
regulations. With regards to establishing a sound ethical culture,
• Compete fairly CIMA recommends that organisations have:
Compete vigorously but fairly in our markets,
being honest and trustworthy in all our dealings. • a mission statement that refers to quality or, more
• Inducements unusually, to ethics and defines how the organisation
Not offer or accept gifts, hospitality or other wants to be regarded externally
inducements which encourage or reward a • clear policy statements on business ethics and
decision, or engage in any form of bribery. anti-fraud, with explanations about acceptable
Report and record any incident. behaviour in risk prone circumstances (a sample fraud
• Conflicts policy is included at Appendix 4)
Avoid or declare conflicts of interest that may • a route through which suspected fraud can be
lead (or be seen to lead) to divided personal reported
loyalties. • a process of reminders about ethical and fraud
• Commitments policies – e.g. annual letter and/or declarations
Ensure others have confidence in the • an aggressive audit process which concentrates on
commitments we make on behalf of BT, and that areas of risk
agreements are suitably authorised. • management who are seen to be committed through
• Risks their actions.
Assess and manage risks to our business.
• Assets IFAC’s Professional Accountants in Business (PAIB)
Protect our brand, physical, financial and Committee has produced guidance that focuses on the
intellectual assets. role of accountants in developing and promoting codes
• Information of conduct within their business (see Further Reading
Protect the confidentiality of company, in Appendix 10 for more detail). CIMA members
employee and customer information. should also bear in mind the CIMA Code of Ethics for
• Communication Professional Accountants, which sets out standards
Be truthful, helpful and accurate in our around ethical conduct and acting with integrity and
communication. objectivity, even in potentially difficult circumstances.
• Diversity For example, the CIMA Code of Ethics deals with
Treat all individuals fairly and impartially, safeguarding assets, potential conflicts, preparation
without prejudice, and never tolerate harassment and reporting of information, threats of financial self
in any form. interest, inducements, and confidentiality. Members
• Health and safety of other professional bodies are likely to be bound by
Care for the health and safety of each other, our similar codes.
products and our operations.
• Environment
Minimise the potential harmful effects of our
activities on the environment.
27
Fraud risk management: a guide to good practice
A code of ethics or an anti-fraud policy is not sufficient with the IBE, found that although most organisations
to prevent fraud though. Ethical behaviour needs to have adopted a code of ethics, many are not backing up
be embedded within the culture of an organisation. their written statements with action. Less than half of
Commitment from senior management and ‘tone at the respondents’ organisations provide ethics training
the top’ is key. Employees are more likely to do what or a hotline for reporting unethical conduct, and only
they see their superiors doing than follow an ethics a few offer incentives for employees to uphold ethical
policy, and it is essential that management do not apply standards. These results are summarised in Figure 5.
double standards.
In addition to encouraging senior management to
To demonstrate commitment, resources should be set ethical examples by their actions, organisations
allocated to communicating ethics and values to should ensure that senior management are committed
all employees, suppliers and business partners, and to controlling the risks of fraud. Senior management
providing training programmes where necessary. should be assigned with responsibility for fraud
Research by the Institute of Business Ethics (IBE) has prevention, as this sends a message to employees that
demonstrated that, through helping to establish an the organisation is serious about fraud and ensures
ethical culture, there is a correlation between ethics that tackling fraud will be considered at senior levels.
training and improved financial performance4. However, Adherence to policies and codes should be regularly
a recent survey conducted by CIMA, in conjunction monitored and policed by appropriate people within
28
the organisation (such as management and/or internal it is important to raise awareness through a formal
audit), and the documents themselves should also be education and training programme as part of the
regularly reviewed and amended. overall risk management strategy. Particular attention
should be paid to those managers and staff operating
Periodic assessment of fraud risk in high risk areas, such as procurement and bill paying,
In order to manage fraud risk, organisations should and to those with a role in the prevention and detection
periodically identify the risks of fraud within their of fraud, for example human resources and staff with
organisation, using the process set out in Chapter investigation responsibility.
2. Fraud risks should be identified for all areas and
processes of the business and then be assessed in terms There are arguments about how far training on fraud
of impact and likelihood. In addition to the monetary risk management should go within an organisation
impact, the assessment should consider non financial beyond the audit group – for example a question
factors such as reputation. often raised is whether management and staff who
have been trained in fraud prevention techniques will
An effective fraud risk assessment will highlight risks then use the knowledge to commit fraud. Fraud is
previously unidentified and strengthen the ability for often highlighted through a tip off and therefore it is
timely prevention and detection of fraud. Opportunities essential that all employees are made aware of what
for cost savings may also be identified as a result of constitutes fraud, how to identify fraudulent behaviour,
conducting the fraud risk assessment. and how to respond if they suspect or detect instances
of fraud. There is advantage in covering the subject of
Fraud risk training and awareness fraud in generic terms, the corporate ethic, the audit
Almost every time a major fraud occurs many people approach and the types of checks and balances built
who were unwittingly close to it are shocked that into processes. Such training is more likely to decrease
they were unaware of what was happening. Therefore, rather than increase the number of fraudulent incidents.
It is too often presumed that there should be one set of rules for ordinary people and another for their leaders.
Such attitudes breed cynicism and resentment. Though there will be some valid exceptions, leaders must
almost always live by the rules they impose on others. Amongst other things this means taking a firm line on
fraud by senior executives.
Reproduced with kind permission of the Fraud Advisory Panel from its Ninth Annual Review 2006-2007
‘Ethical behaviour is the best defence against fraud’
Employees may be educated through a number of In this area there are many conflicting emotions
mediums, such as formal training sessions, group influencing the potential ‘whistleblower’:
meetings, posters, employee newsletters, payroll • working group/family loyalties
bulletins or awareness pages on internal websites. • disinterest/sneaking admiration
Communication should be ongoing and a combination • fear of consequences
of methods is usually most successful. For example, • suspicion rather than proof.
the UK’s National Health Service (NHS) uses several
different media to raise fraud risk awareness, including The organisation’s anti-fraud culture and reporting
a quarterly staff newsletter called Insight that covers processes can be a major influence on the
topics such as training updates, fraud case studies, risk whistleblower, as it is often fear of the consequences
measurement and prosecution examples. that has the impact. To the whistleblower the impact
of speaking out can be traumatic, ranging from being
It is clear that spending money on preventing fraud dismissed to being shunned by other employees.
brings many benefits – but the cost benefit analysis
is not easy to construct. The downside risk of fraud Where fraud is committed by senior managers (and
prevention is that excessive and expensive controls may this can be as high as the chief executive), then the
be created, which reduce efficiency and demotivate predicament faced by the whistleblower is exacerbated.
staff. However, the head of fraud investigation for a And this is where management’s greatest challenge
major bank made the following observation: ‘A £1m lies – to convince staff that everyone is responsible
increase in expenditure on fraud prevention has led to a for combating fraud and that the good health of the
£25m increase in profits.’ organisation, and potentially their future employment,
could be at risk from fraud. Organisations that
Reporting mechanisms and whistleblowing encourage openness and can overcome the culture of
Establishing effective reporting mechanisms is one of silence are likely to benefit in many ways (see box on
the key elements of a fraud prevention programme page 31).
and can have a positive impact on fraud detection.
Many frauds are known or suspected by people who
are not involved. The challenge for management is
to encourage these ‘innocent’ people to speak out
– to demonstrate that it is very much in their own
interest. Research by the IBE has shown that although
one in four employees are aware of misconduct in the
workplace, over half of those people stay silent6.
An organisation where the value of open whistleblowing is recognised will be better able to:
• deter wrongdoing
• pick up potential problems early
• enable critical information to get to the people who need to know and can address the issue
• demonstrate to stakeholders, regulators, and the courts that they are accountable and well managed
• reduce the risk of anonymous and malicious leaks
• minimise costs and compensation from accidents, investigations, litigation and regulatory inspections
• maintain and enhance its reputation.
Enlightened organisations implement whistleblowing arrangements because they recognise that it makes good
business sense.
In the UK, there is legislation protecting whistleblowers, The British Standards Institute (BSI) has recently
known as PIDA. Further information on PIDA is given published a Publicly Available Specification (PAS),
in Appendix 1. Other countries also have legislation developed by Public Concern at Work, that gives
protecting whistleblowers, for example this is covered guidance on ‘good practice for the introduction,
by Sarbox in the US. Legal redress should be a last revision, operation and review of effective
resort though, and organisations should strive for a whistleblowing arrangements’ (PAS 1998:2008
culture that actively encourages people to speak up and Whistleblowing Arrangements Code of Practice). The
challenge inappropriate behaviour. nature of the whistleblowing arrangements will be
determined by an organisation’s size, structure, culture,
Although PIDA exists to protect whistleblowers, there nature of the risks that it faces and the legal framework
is no statutory requirement for a whistleblowing in which it operates.
policy under the legislation. However, organisations
are encouraged to develop a written policy statement, A confidential 24/7 hotline is said to be one of the best
and corporate governance codes in the UK provide methods for reporting fraud. However, open channels
more direction on this. Under the Combined Code, of communication from employees to management
listed companies are obliged to have whistleblowing are also essential in creating an environment that
arrangements or explain why they do not, and public encourages fraud prevention and detection. An open
bodies are expected to have a policy in place, which and honest culture should improve morale among
are assessed regularly as part of the external audit and employees and give them the confidence to come
review of local authorities and NHS bodies. Companies forward with concerns.
captured under Sarbox are also required to have
whistleblowing arrangements. A sample whistleblowing
policy can be found in Appendix 5.
31
Fraud risk management: a guide to good practice
32
Although primary responsibility for fraud prevention In addition to the international auditing standard,
and detection does not sit with the auditor, ISA 240 some countries also have their own auditing standards
does call for auditors to include methods for identifying that give further direction on roles and responsibilities
potential cases of fraud when planning and conducting in relation to fraud. For example, in October 2002,
the audit. It requires auditors to: the US issued Statement on Auditing Standards No.
• discuss the risk of fraud with management and those 99 Consideration of Fraud in a Financial Statement
charged with governance Audit (SAS 99), partly in response to accounting
• discuss with the audit team the susceptibility of the scandals such as Enron and WorldCom. SAS 99 is more
accounts to material misstatements due to fraud prescriptive about the role of the auditor in preventing
• consider whether one or more fraud risk factors are and detecting fraud and error than ISA 240 and was
present designed to create a substantial change in auditors’
• perform audit procedures to address the risk of performance, thereby improving the likelihood that
management override auditors will detect material misstatements due to
• test journal entries and review accounting estimates fraud.
for bias
• understand the business rationale for transactions The requirements do not only affect auditors. Given the
outside the normal course of business nature and extent of the new procedures in both ISA
• obtain representations from management 240 and SAS 99, management should plan to provide
• bear in mind the implications for money laundering auditors with more information and open themselves
reporting (taking care not to tip off the client). up to more extensive fraud detection procedures.
Extract from ISA 240 The Auditor’s Responsibilities Relating to Fraud in an Audit of Financial Statements
(redrafted)
This involves a commitment to creating a culture of honesty and ethical behavior which can be reinforced by
an active oversight by those charged with governance. In exercising oversight responsibility, those charged
with governance consider the potential for override of controls or other inappropriate influence over the
financial reporting process, such as efforts by management to manage earnings in order to influence the
perceptions of analysts as to the entity’s performance and profitability.
33
Fraud risk management: a guide to good practice
Internal control systems The number and type of internal controls that an
An internal control system comprises all those policies organisation can introduce will again depend on the
and procedures that taken together, support an nature and size of the organisations. Internal controls
organisation’s effective and efficient operation. Internal to minimise fraud should, where possible, address fraud
controls typically deal with factors such as approval red flags (see Chapter 4 and Appendix 6). Examples of
and authorisation processes, access restrictions and the variety of such controls include:
transaction controls, account reconciliations, and • requiring multiple signatories on high value
physical security. These procedures often include the transactions (e.g. within a finance or procurement
division of responsibilities and checks and balances department)
to reduce risk. The following box gives an example • enforcing employees to take holiday (e.g. many
of division of responsibilities within the purchasing employees in the banking sector must take a
process. minimum of two weeks holiday in a given period)
• restricting belongings that can be brought into the
office environment (e.g. many call centre employees
Division of responsibilities in the purchasing are not allowed to take in pens, paper or mobile
process phones, and some organisations have restricted the
use of USB sticks)
Ideally, the purchasing process would involve the • conducting random searches of staff (e.g. in factories,
following separate roles: distribution centres or retail outlets).
• the originator who specifies the goods or services
and probably price Wherever new internal control procedures are
• the superior who approves the purchase introduced, they should be documented clearly and
• the purchasing department who negotiate the simply, in order that any deviation can be identified.
best value through competitive quotations Internal controls should be regularly reviewed as part
• the recipient of goods or services who confirms of the risk management process, and there should be
that the invoice is in line with goods or services continual improvement of controls in light of new risks,
received such as new markets and technologies, changes in
• the purchase ledger/accounting department who structure, or innovative fraudsters. Not only does this
make entries in the accounts reflect good practice, but it is also a requirement of the
• the treasury manager who ensures that Combined Code and Sarbox. Ultimately, the internal
payments are properly supported and in line control system should be embedded within the culture
with policy and operations of an organisation.
• the management accountant who ensures that
costs are in line with budgets/standards and
purchase ledger payment statistics are in line
with policy.
34
Case study 5
A fine warning
A major European banking group has suffered in more ways than one from having weak internal controls.
In 2007, a senior employee at the bank was able to transfer £1.3 million out of client accounts without
permission. This was possible because the bank did not have effective review processes in place for
transactions over £10,000 and its checking procedures were unclear.
Not only did the organisation suffer from losses and reputational damage at the hand of the fraudster, but
the bank was also fined £350,000 by the FSA because of its ineffective anti-fraud measures. The bank had
been warned by the FSA in 2002 that its internal controls needed to be improved. However, no steps were
made to change the systems in place. Following the fine in 2007, the bank strengthened its controls and now
claims to be among the best in the industry.
This is the first fine that the FSA has issued against a private bank for weaknesses in anti-fraud controls but
it is stepping up its game in this area and this should serve as a caution for other organisations. The FSA has
warned that ‘senior management must make sure their firms have robust systems and controls to reduce the
risk of them being used to commit financial crime.’
Source: Weak anti-fraud measures earn bank hefty fine, CIMA Industry focus, 15 May 2007
35
Fraud risk management: a guide to good practice
Case study 6
Vet or regret?
Without a trace
A finance house needed an extra junior accountant for a short period of time. The company went to a
reputable agency and employed an appropriately qualified person. The company relied on the agency’s
screening policy which had failed to uncover a series of discrepancies in the accountant’s personal history,
including a false address. The accountant removed a company chequebook from his work place and used it
to make a series of high value purchases on his own behalf. The matter came to light when a routine enquiry
was made with the finance house to verify the issue of one of the cheques. By this time the temporary
accountant had left the company. He could not be traced and the matter was referred to the police.
3.4 Summary
36
4 Fraud detection
Hindsight is a wonderful thing! Fraud is always obvious The UK report of PwC’s survey looked at the method
to the fraudster’s colleagues after the event. Their of detection of the most serious frauds within
statements, and those of internal auditors, when taken organisations. The results are shown in Figure 6.
by the police or other investigatory bodies, frequently
highlight all the more common fraud indicators. It is clear from this, and other anecdotal evidence,
that external auditors do not generally find fraud. As
However, the mistake is always the same – fraud was mentioned in Chapter 3, it is not the external auditor’s
never considered a possibility. No matter how innocent responsibility to prevent and detect fraud, although
an action may be, or how plausible an explanation may they should be providing reasonable assurance that the
be, fraud is always a possibility! financial statements are free from material fraud and
error.
Whistleblowing hotline
Internal tip-off
By accident
External tip-off
Change of personnel/duties
Internal audit
External audit
Corporate security
Risk management
0 5 10 15 20
% of respondents
37
Fraud risk management: a guide to good practice
Although external auditors did not detect many cases A lot of frauds, however, are discovered accidentally or
of fraud, internal auditors on the other hand were found as a result of information received, either via a tip off
to be the most successful in identifying serious frauds. or through a whistleblowing hotline. In many cases,
Risk management procedures were also found to be one greater losses are suffered as a result of employees
of the more useful methods. If resources will allow it, at all levels ignoring the obvious. It is everyone’s
an organisation should establish a strong internal audit responsibility to find and report fraud and irregularity
function that monitors and advises on risk management within an organisation, and it is therefore essential that
and actively looks for instances of fraud. an organisation has appropriate reporting mechanisms
in place to facilitate this.
Frauds may also be discovered as a result of controls
and mechanisms put in place on the advice of internal
and external auditors.
Case study 7
Tipped off
A bank clerk who helped fraudsters to fleece customers out of nearly £500,000 was originally identified as
a result of a tip off. Ruth Akinyemi passed on the personal details of eight wealthy Barclays account holders,
including dates of birth and account passwords. The thieves to whom she gave the details then posed as real
customers and emptied vast amounts of money from the bank accounts. One victim lost nearly £400,000 in
just four days.
Investigators received an anonymous tip off that Akinyemi was the insider and she was suspended pending
investigation. Due to insufficient supporting evidence, the bank initially cleared Akinyemi of any involvement.
She simply switched branches and continued with the scam. The computer system revealed the involvement
of a bank insider in subsequent frauds and investigators were able to go through computer records and
identify the accounts that Akinyemi had accessed using her ID and password.
Akinyemi was convicted of conspiracy to steal and sentenced to 18 months imprisonment in September
2008. The operators of the fraud have never been traced and most of the money is still missing.
38
4.2 Indicators and warnings
39
Fraud risk management: a guide to good practice
40
4.3 Tools and techniques
The training received by management accountants Benchmarking: comparisons of one financial period
is a very good basis for implementing an anti-fraud with another; or the performance of one cost centre,
programme. The broad understanding of business or business unit, with another; or of overall business
processes, expected of a management accountant, performance with industry standards, can all highlight
is an important asset, as is their knowledge of the anomalies worthy of further investigation.
systems and procedures that should be in place within
an organisation, to allow it to operate efficiently and Systems analysis: it is important to examine the
effectively. A further asset is the ability to think and systems in place and identify any weaknesses that
act logically, which is something the management could be opportunities for the fraudster.
accountant develops with experience. Therefore, the
first important tool available is training and experience. Ratio analysis: can be used to identify any abnormal
trends or patterns.
The second tool is the necessary mindset – that fraud
is always a possibility. A healthy amount of professional Mathematical modelling: using the ‘sort’ tool
scepticism should be maintained when considering on a spreadsheet can help to identify patterns in
the potential for fraud. This does not mean that every expenditure, etc. There are also specialist mathematical
time someone seems to be working excessive overtime, models such as Benfords Law, a mathematical formula
without taking leave, they are in the process of which can help identify irregularities in accounts.
committing a fraud, or that inaccuracies in the accounts Database modelling can also be utilised.
are there to cover up a fraud. Nevertheless, they might.
Having considered the possibility of fraud, the next step Specialist software: such as audit tools for data
may be to undertake some further research or pass matching analysis can prove very useful. Other
concerns to a line manager. tools allow for analysis such as real time transaction
assessment, targeted post-transactional review, or
In addition to the tools described above, there strategic analysis of management accounts.
are everyday techniques available to help identify
irregularities which may be fraud, and research the Exception reporting: many systems can generate
anomaly to decide whether further action should be automatic reports for results that fall outside of
taken. Organisations should ensure that resources are predetermined threshold values (exceptions), enabling
allocated to identifying such anomalies and detecting immediate identification of results deviating from the
cases of fraud. norm. With today’s technology it is possible for an
email or text alert to be sent directly to a manager
Identifying anomalies when exceptions are identified.
Background reading: it is important to keep up to date
with fraud trends and issues. The general press can Many of these identification techniques can be
be a useful source of information for this, along with automated to make the process more efficient. Fraud
technical magazines, which often carry articles on fraud detection systems should be monitored and updated
and financial irregularity. Also useful is a subscription regularly to keep up with changing technology and new
to a publication specialising in fraud or buying a good methods of manipulation.
reference book. The Internet is also a valuable, and vast,
research tool.
41
Fraud risk management: a guide to good practice
Case study 8
Risk or returns
Many retail companies are investing in specialist fraud prevention and detection software and have quickly
seen the benefits from doing so:
• Within weeks of implementing new data-mining software, clothing retailer Peacocks dismissed five
employees for fraudulent activities identified by the fraud detection tool and a further 15 investigations
were underway based on information highlighted by the software. Employee were found to be involved in
activities such as processing genuine sales for customers then voiding the transaction, taking money from
the tills, and applying refunds to their own credit cards. Peacocks believe that the increased chances of
detection will stop some fraud before it is even committed. Peacocks are also using the system to pinpoint
process improvement and training requirements.
• Boots saw its investment in loss-prevention software ‘returned in only a matter of weeks’ and have found
that it continues to deliver reduced fraud losses that would have cost the business millions. The software
sends an automatic message to store managers when anomalies in till transactions are identified, such as
an above average number of refunds.
• In just over a year of using data-mining software, Lloydspharmacy identified around £400,000 of
‘previously invisible fraud’ and dismissed a number of ‘unscrupulous employee(s). One of the main types of
fraud suffered by Lloydspharmacy is where a till operator suspends a sale and then uses a ‘no-sale’ facility
to open the till drawer. The linked activity between suspended sales and no sales can be easily identified
using data-mining software though. The first investigation was within two weeks of the system going live
and in the following year there were more than 100 investigations. The investigation payback increased
through using data-mining software and further analysis showed that successful investigations have led
to higher sales figures in the stores concerned. Introduction of the software has also freed loss prevention
managers to focus on other activities, such as risk assessment and training.
• B&Q claims that its investment in a till monitoring system saved the company ‘£1 million on staff fraud in
a year’.
42
Analysing the anomaly – a methodical approach 6 Prepare schedules (include graphics)
All of the tools covered so far have their uses in Graphical and numerical schedules/spreadsheets should
identifying the irregularity, but to be effective they be prepared to support the analysis and findings. It is
must be combined with a methodical approach to the important to make it as easy as possible for those with
analysis of the problem identified. At this stage, it is not little or no financial knowledge to understand what
a fraud investigation or internal management review has occurred. These, when consolidated, would be in
but an analysis of a problem to decide whether such a the form of an audit pack detailing the documents that
review should be carried out. One approach which can have led to the formulation of the conclusions.
be considered is detailed below.
7 Prepare the report
1 Establish the objective In preparing the report it is important to bear in mind
The objective of the research must be clear as this that, whatever the original objective, there is always the
will enable decisions to be made about the best way possibility of it being used in evidence at some form of
forward. legal proceedings. The report should be factual as far as
possible, and where opinion is given, it should be clearly
2 Identify the systems and procedures identified as such – for example, professional opinion
Undertaking a systems and risk analysis, and comparing used in the conclusions of the report.
the laid-down systems and procedures that should have
been in place with those actually in use, can help to
identify system or procedural failures. 4.4 Summary
3 Establish the scale of the risk Included in this chapter and in Appendix 6 are examples
This involves identifying the potential loss and assessing of specific fraud alerts associated with activities
whether it is material. Actual losses should be identified common to most types of organisation. However, none
where possible. of these will be of any use unless it is accepted that
fraud is possible. It is that mindset, that awareness,
4 Situation analysis which will enable an organisation to stop an incidence
This involves background research, such as company of fraud before it becomes catastrophic. A warning
searches, and identifying those involved. sign is not effective unless it is appreciated as such and
this awareness can only be achieved by means of a
5 Analyse all available data continuing programme of education and training.
Analysis of all the data will give an understanding of
what has occurred and how it occurred.
43
Fraud risk management: a guide to good practice
5 Responding to fraud
An organisation’s approach to dealing with fraud The fraud response plan should reiterate the
should be clearly described in its fraud policy and fraud organisation’s commitment to high legal, ethical and
response plan. An outline fraud response plan and an moral standards in all its activities and its approach to
example of a fraud response plan are contained in dealing with those who fail to meet those standards. It
Appendices 8 and 9 respectively. Appendix 9 includes a is important that all those working in the organisation
series of flowcharts that help to highlight the decisions are aware of the risk of fraud and other illegal acts, such
an organisation might face when a fraud is suspected as dishonesty or damage to property. Organisations
and give guidance on process to follow in response to should be clear about the means of enforcing the rules
such suspicions. or controls which the organisation has in place to
counter such risks and be aware of how to report any
This chapter expands on parts of the outline fraud suspicions they may have. The fraud response plan is
response plan, where they have not already been the means by which this information is relayed to all
covered in earlier chapters, and highlights some issues members of staff and, possibly, other stakeholders, such
and considerations when dealing with fraud. Paragraph as customers, suppliers, and shareholders.
headings in this chapter are those which should form
the basis of the fraud response plan and relate to those One question worthy of consideration is – how much
in the outline response plan in Appendix 8. publicity should be given to exposed fraud? A publicised
successful fraud investigation can be a sharp reminder
to those who may be tempted and a warning to those
5.1 Purpose of the fraud response plan who are responsible for the management of controls.
While there may be embarrassment for those who were
The fraud response plan is a formal means of setting close to the fraud and did not identify it, and an adverse
down clearly the arrangements which are in place for impact on the organisation’s public image, there can be
dealing with detected or suspected cases of fraud. advantages in publishing internally the outcome of a
It is intended to provide procedures which allow for successful fraud investigation.
evidence gathering and collation in a manner which will
facilitate informed decision-making, while ensuring that Regulated financial services companies do not have
evidence gathered will be admissible in the event of any a choice on whether or not to keep identified cases
civil or criminal action. Other benefits arising from the of fraud an internal issue. These organisations are
publication of a corporate fraud response plan are its now legally obliged to report financial crime. Other
deterrence value and the likelihood that it will reduce businesses should follow this example and make it clear
the tendency to panic. It can help restrict damage that they will not sweep fraud under the carpet.
and minimise losses, enable the organisation to retain
market confidence, and help to ensure the integrity of
evidence.
44
Case study 9
Reporting fraud
It is possible to exaggerate the risks involved in reporting fraud. Aid to the Church in Need UK suffered a high
tech website attack in November 2005 which led to hundreds of its benefactors being defrauded. ‘The press
were surprised by how we went public and that we admitted what had happened – but as a Christian charity
we decided we had to be honest and we hope that others will learn from this case about the ‘conspiracy of
silence’ over internet fraud. 98% of people have been very understanding.’
Reproduced with kind permission of the Fraud Advisory Panel from its Ninth Annual Review 2006-2007
Ethical behaviour is the best defence against fraud
45
Fraud risk management: a guide to good practice
The fraud officer will manage any internal investigations director, the matter should be reported directly to the
and act as a liaison officer with all other interested chairman of the audit committee. In small companies
parties both internal and external, including police, a nominated non executive director may fulfil the
regulators and auditors. He should have his own job role of the audit committee. The audit committee
description, appropriate to the role, an extended list of is also responsible for reviewing and evaluating the
contacts and his own response card. One of his primary effectiveness of the internal audit function, where one
tasks would be the updating of the investigation log. exists.
46
5.5 The response
47
Fraud risk management: a guide to good practice
Case study 10
The security function of TNT, a leading global express and mail business, conducts professional investigations
into suspected cases of fraud and has embedded procedures for dealing with whistleblowers.
It has also taken the lead in developing proactive measures against fraud as a way of improving integrity for
all stakeholders. TNT carries out security financial reviews of its business units aimed at identifying, analysing
and dealing with the red flags of fraud.
Parallel with the security financial review, employers are trained through the TNT integrity programme, which
was developed by a newly created group integrity department in conjunction with other key departments,
including security and corporate audit.
Simon Scales, TNT’s Deputy Global Security and Compliance Director, says: ‘Prevention is better than cure.
It’s about doing the right things as well as doing things right.’
48
Physical evidence Principle 3
If an internal investigation is being conducted, then an An audit trial or other record of all processes applied to
organisation has a right to access its own records and computer based electronic evidence should be created
may bring disciplinary action against any member of and preserved. An independent third party should be
staff who tries to prevent this. Where physical evidence able to examine those processes and achieve the same
is owned or held by other organisations or individuals result.
who are not employees, it may be necessary to obtain
a court order or injunction to secure access to or to Principle 4
allow seizure of the evidence. The exact means of The person in charge of the investigation (the case
obtaining physical evidence depends on the particular officer) has overall responsibility for ensuring that the
circumstances of the case and whether criminal or civil law and these principles are adhered to.
action is being pursued, or both.
Interviews (general)
When taking control of any physical evidence, original Managers are quite entitled to interview staff under
material is essential. Photocopies are not acceptable. their direction and to ask them to account for
Records should be kept of when it was obtained and assets which were, or are, under their direct control,
the place that it was taken from. If evidence consists or to explain their performance in respect of the
of several items, for example many documents, management or supervision of specific employees.
each one should be tagged with a reference number However, the point at which it is considered that there
that corresponds with the written record. Taking are reasonable grounds for suspicion of an individual is
photographs or video recordings of the scene, such as the point where questioning should be stopped and the
the suspect’s office, may also prove helpful. individual advised that their actions will be the subject
of a formal investigation (should criminal prosecution
Electronic evidence be considered). From this moment on any interviews
In order to ensure case integrity and compliance with should be conducted by trained personnel or by police
current UK legislation, retrieval of electronic evidence officers. Detailed notes should be kept of questions and
should be treated in a similar manner to that of other answers, and interviews should be taped if possible.
physical evidence, although there will be some distinct
differences. These are covered in the UK Good Practice Statements from witnesses
Guide issued by the ACPO, which sets outs four If a witness is prepared to give a written statement, it
principles for dealing with computer-based electronic is good practice for someone else, normally a trained
evidence. These principles are as follows: or experienced manager, to take a chronological record
of events using the witness’s own words. The witness
Principle 1 must be happy to sign the resulting document as a
No action taken by law enforcement agencies or their true record. The involvement of an independent person
agents should change data held on a computer or usually helps to confine the statements to the relevant
storage media, which may be relied upon in court. facts and the witness should be given the opportunity
to be supported by a colleague, acquaintance or trade
Principle 2 union official.
In exceptional circumstances, where a person finds it
necessary to access original data held on a computer
or on storage media, that person MUST be competent
to do so and be able to give evidence explaining the
relevance and the implications of their actions.
49
Fraud risk management: a guide to good practice
50
5.9 Summary
Annual report
An investigations log should be maintained and an
annual report should be submitted to the board of
all investigations carried out, outcomes and lessons
learned.
Enforcement policies
A growing number of organisations are introducing
enforcement policies that highlight the organisation’s
zero tolerance approach to fraud and clearly state
that if a case of fraud is identified, appropriate action
will be taken and those responsible will be made an
example of, no matter who the perpetrator is. For
example, financial institutions are keen to demonstrate
a commitment to dealing with wrongdoers and are
increasingly prosecuting fraudulent employees rather
than ‘sweeping the matter under the carpet’.
51
Fraud risk management: a guide to good practice
UK law
52
Public Interest Disclosure Act (PIDA) Serious Crimes Act
PIDA is known as the whistleblowing law in the UK, The Serious Crimes Act aims to improve the ability of
as it offers protection to employees who blow the law enforcement agencies to tackle fraud and other
whistle in one of the ways set out in the Act. Under serious organised crime, and strengthen the recovery of
PIDA, employers should not victimise a ‘worker’ if they criminal assets. It also introduces additional measures
make ‘qualifying disclosures’. PIDA’s definition of a to prevent or disrupt serious crime, including the
worker covers all forms of employment but excludes prevention of fraud. Most of the provisions of the
Crown Servants whose work covers national security Serious Crimes Act came into force in early 2008 and
issues, police officers and employees who ordinarily make several radical changes to criminal law.
work outside the UK. Qualifying disclosures are defined
as information which, in the reasonable belief of the The Serious Crimes Act gives certain courts in the UK
worker making the disclosure, tends to show one or the ability to issue serious crime prevention orders.
more of the following is either happening now, has These create a new form of civil injunction, the breach
happened already or is likely to happen: of which is a criminal act punishable by imprisonment
and a fine. A prevention order can be imposed where
• a criminal offence the court is satisfied that a person (including an
• failure to comply with a legal obligation individual, a partnership or a company) has been
• a miscarriage of justice involved in a serious crime and where it has reasonable
• danger to the health and safety of an individual grounds to believe the order would protect the public
• damage to the environment by prohibiting or restricting the person’s activities,
• deliberate concealment of information tending to including financial holdings, business dealings, working
show any of the above. arrangements and communications. Serious crimes
covered by this Act include attempting, committing,
PIDA has a stepped disclosure regime, which helps facilitating or encouraging serious offences such as
to balance the public interest and the interests of fraud, money laundering, corruption and bribery.
employers. Under this regime, the worker will be
protected if the disclosure is made to their employer, With regard to additional measures, the Serious
some other responsible person if the disclosure is Crimes Act makes new provisions for disclosure and
relevant to that person, or to a third party, where this information sharing by public authorities to any
is in accordance with outlined and agreed procedures. anti-fraud organisation, in order to prevent fraud or
PIDA most readily protects workers where disclosures in relation to proceeds of crime. The government is
are made internally. to prepare a code of practice with respect to such
disclosure. The Act also authorises certain bodies to
With regard to internal disclosures, the worker is conduct data matching exercises for the purpose of
protected if the disclosure has been made in good preventing or detecting fraud. This provision puts a
faith and with reasonable belief that there has been statutory basis around the National Fraud Initiative that
wrongdoing. There are then different levels of external has operated in the UK for some years.
disclosure. Protection is given for disclosures to
prescribed regulators where the worker reasonably
believes that the information or allegation is
substantially true. Wider public disclosures (including to
the media or a consumer group) may still be protected
under PIDA, and more readily so where whistleblowing
arrangements are not in place within the organisation
or are ineffective. There must be justifiable cause for
going wider and the particular disclosure must be
reasonable.
53
Fraud risk management: a guide to good practice
54
US law
55
Fraud risk management: a guide to good practice
56
Appendix 2 Examples of common types of internal fraud
57
Fraud risk management: a guide to good practice
Payroll • Bill and hold transactions (where the seller bills the
• Fictitious (or ghost) employees on the payroll. customer for goods but does not ship the product
• Falsifying work hours to achieve fraudulent overtime until a later date).
payments. • Early delivery of product/services (e.g. partial
• Abuse of commission schemes. shipments, soft sales, contracts with multiple
• Improper changes in salary levels. deliverables, up front fees).
• Abuse of holiday leave or time off entitlements. • Channel stuffing or trade loading (where a company
• Submitting inflated or false expense claims. inflates its sales figures by forcing more products
• Adding private expenses to legitimate expense claims. through a distribution channel than the channel is
• Applying for multiple reimbursements of the same capable of selling).
expenses.
• False workers’ compensation claims. Misstatement of assets, liabilities and/or expenses
• Theft of employee contributions to benefit plans. • Fictitious fixed assets.
• Overstating assets acquired through merger and
acquisitions.
Fraudulent statements • Improper capitalisation of expenses as fixed assets
(software development, research and development,
Financial start up costs, interest costs, advertising costs).
• Manipulation of fixed asset valuations.
Improper revenue recognition • Schemes involving inappropriate depreciation or
• Holding the books open after the end of the amortisation.
accounting period. • Incorrect values attached to goodwill or other
• Inflation of sales figures which are credited out after intangibles.
the year end. • Fictitious investments.
• Backdating agreements. • Improper investment valuation (misclassification
• Recording fictitious sales and shipping. of investments, recording unrealised investments,
• Improper classification of revenues. declines in fair market value/overvaluation).
• Inappropriate estimates for returns, price adjustments • Fictitious bank accounts.
and other concessions. • Inflating inventory quantity through inclusion of
• Manipulation of rebates. fictitious inventory.
• Recognising revenue on disputed claims against • Improper valuation of inventory.
customers. • Fraudulent or improper capitalisation of inventory.
• Recognising income on products shipped for trial or • Manipulation of inventory counts.
evaluation purposes. • Accounts receivable schemes (e.g. creating fictitious
• Improper recording of consignment or contingency receivables or artificially inflating the value of
sales. receivables).
• Over/under estimating percentage of work completed • Misstatement of prepayments and accruals.
on long-term contracts. • Understating loans and payables.
• Incorrect inclusion of related party receivables • Fraudulent management estimates for provisions,
• Side letter agreements (agreements made outside of reserves, foreign currency translation, impairment,
formal contracts). etc.
• Round tripping (practice whereby two companies • Off balance sheet items.
buy and sell the same amount of a commodity • Delaying the recording of expenses to the next
at the same price at the same time. The trading accounting period.
lacks economic substance and results in overstated
revenues).
58
Other accounting misstatements Personal interests
• Improper treatment of inter-company accounts. • Collusion with customers and/or suppliers.
• Non clearance or improper clearance of suspense • Favouring a supplier in which the employee has a
accounts. financial interest.
• Misrepresentation of suspense accounts for • Employee setting up and using own consultancy
fraudulent activity. for personal gain (conflicts with the company’s
• Improper accounting for mergers, acquisitions, interests).
disposals and joint ventures. • Employee hiring someone close to them over another
• Manipulation of assumptions used for determining more qualified applicant.
fair value of share based payments. • Transfer of knowledge to a competitor by an
• Improper or inadequate disclosures. employee who intends to joins the competitor’s
• Fictitious general ledger accounts. company.
• Journal entry fraud (using accounting journal entries • Misrepresentation by insiders with regard to a
to fraudulently adjust financial statements). corporate merger, acquisition or investment.
• Concealment of losses. • Insider trading (using business information not
released to the public to gain profits from trading in
Non-financial the financial markets).
59
Fraud risk management: a guide to good practice
The risk analysis set out below is an example of the assessment of the controls in this area, and the net
results of an assessment by a risk management group of likely impact is an assessment of the likelihood of a
the fraud risks in the contracts function. This document fraud not being detected by the controls. At this stage
is a summary of the work undertaken by the risk the risks in the contracts area can be reviewed and
management group, and they will have working papers priorities set for action to address the risk.
to document their workings and assessments.
Take for example, the risks relating to an unchanging list
The risks identified are in the first column, and the of suppliers. The risk management group believes fraud
dates of the risk assessment in the second column. The has a high likelihood of occurring and if so, it could
column Probability/likelihood records the assessment of cause significant financial loss to the business. The
the likelihood of this risk occurring in the organisation. controls are thought to be weak and unlikely to reduce
The ratings are graded high, medium or low. The the risk. They have assessed the net likely impact to be
next column, impact, is an assessment of the impact high and recommend that this is an immediate priority
of a fraud in this area. The next column records the in the contracts area.
Factor/risk area and Date of Probability/ Impact Controls Net likely Action
description contracts assessment likelihood impact
Unchanging list of Priority –
2007 High High Low High
preferred suppliers immediate
Consistent list of single
2007 Medium High High Medium –
source suppliers
Changes in contract
2007 Low Low Medium Low –
specifications
Personal relationships Priority –
between staff and suppliers 2008 Low High Low High within
x months
60
Appendix 4 A sample fraud policy
61
Fraud risk management: a guide to good practice
62
How the matter will be handled Independent advice
Once an employee has informed the organisation of If an employee is unsure whether to use this procedure
his or her concern, the concerns will be examined and or wants independent advice at any stage, they may
the organisation will assess what action should be contact the independent charity Public Concern at
taken. This may involve an internal enquiry or a more Work on 020 7404 6609. Their lawyers can give free
formal investigation. The employee will be told who is confidential advice at any stage about how to raise
handling the matter, how they can contact him/her and a concern about serious malpractice at work. An
whether any further assistance may be needed. If the employee can, of course, also seek advice from a lawyer
employee has any personal interest in the matter, this of their own choice at their own expense.
should be declared by the employee at the outset. If
the employee’s concern falls more properly within the
grievance procedure, then they will be advised of this. External contacts
63
Fraud risk management: a guide to good practice
The following are examples of indicators for two After the award of contract
specific types of fraud – procurement fraud and fraud • Unexplained changes in the contract after its award.
in the selling process. There are many other types of • Contract awarded to a supplier with a poor
fraud and each will have its own set of indicators as performance record.
well as some of the general indicators that are set out • Split contracts to circumvent controls or contract
in Chapter 4. conditions.
• Suppliers who are awarded contracts
disproportionate to their size.
Example 1: Procurement fraud • Frequent increases in the limits of liability.
• Frequent increases in contract specifications.
Fraud in the purchasing or procurement function is a
particular risk. The following may be indicators of fraud Organisations may wish to consider at invitation to
in the tendering and contract award process. tender acknowledgement stage, or at bid submission,
formally requesting the tenderer to sign a document
Before contract award confirming that no fraud or corrupt practice has
• Disqualification of suitable tenderers. occurred when developing the bid.
• ‘Short’ invitation to tender list.
• Unchanging list of preferred suppliers. This has two effects:
• Consistent use of single source contracts.
• Contracts specifications that do not make 1 It acts as a deterrent – tenderers are alerted to the
commercial sense. fact that the client is aware of the risk of fraud and
• Contracts that include special, but unnecessary will be on the lookout for any evidence that it has
specifications, that only one supplier can meet. occurred.
• Personal relationships between staff and suppliers.
2 It ensures that should something fraudulent come to
During the contract award process light, tenderers can have no excuse that they were
• Withdrawal of a lower bidder without apparent unaware of the client’s policy.
reason and their subsequent sub-contracting to a
higher bidder.
• Flexible evaluation criteria.
• Acceptance of late bids.
• Changes in the specification after bids have been
opened.
• Consistently accurate estimates of tender costs.
• Poor documentation of the contract award process.
• Consistent favouring of one firm over others.
64
Activity Fraud risk Prevention
65
Fraud risk management: a guide to good practice
Tender procedure – audit checks Fraud risks also exist in the selling process. Those
Tender board: Should be chaired by senior manager. involved can include any combination of the clients’
management or staff and the organisation’s own
Tender register: Should be held and reviewed by a management or staff, with or without any collusion.
senior manager.
The following are indicators of fraud in the selling
Checks should include: process:
• Were all tenders secured in a locked cabinet/box prior • Overcharging from an approved list or standard profit
to opening? mark-up.
• Who had access to the keys/combination? • Short-changing by not delivering the contracted
• If no tender box/cabinet utilised, what is the quantity or quality.
procedure for dealing with tenders? • Diversion of orders to a competitor or associate.
• Does the tender register show an unbroken, • Bribery of a customer by one of the organisation’s
sequentially numbered and dated list of all tenders own sales representatives.
received? • Bribery of a customer by a competitor – no proper
• Were all the entries signed by the tender board explanation of why the contract went elsewhere.
chairperson? • Insider information by knowing competitor’s prices.
• Confirm that tender lists show no evidence of • False warranty claims that are made or paid.
patronage or incestuous relationships. • Over selling of goods or services that are not
• Confirm that firms which persistently fail to tender necessary.
are excluded from subsequent tender lists. • Giving of free issues/samples when not necessary
• Has relevant approval been obtained before accepting • Links with cartels or ‘rings’.
any tenders whose prices exceed approval limits? • Bribery to obtain contracts which would not
• Has relevant approval been obtained where the otherwise be awarded.
lowest compliant bid is not accepted? • Issuing invoices or credit notes which do not reflect
• In the event of a clear differential in bid prices reality and of which the ultimate payer is unaware.
confirm that the same tender specification has been • Issuing credit notes to hide additional discounts or
sent to all prospective tenderers. rebates.
• Confirm that there is no excessive use of single • The use of sales intermediaries (fixers).
sources of supply or tender action. • Sales commission gates, which can often cause
• Confirm that the tender board has been advised of misreporting of orders.
the signs which would indicate tender rigging/ringing.
• Confirm that the recommended method of
procurement has been followed.
• Confirm that the contract makes commercial sense.
66
Appendix 7 A 16 step fraud prevention plan
1 Consider fraud risk as an integral part of your overall corporate risk-management strategy.
3 Develop an ownership structure from the top to the bottom of the organisation.
10 Introduce a fraud response plan as an integral part of the organisation’s contingency plans.
67
Fraud risk management: a guide to good practice
1 Purpose of the fraud response plan 7 Organisation’s objectives with respect to fraud
• Internal report
2 Corporate policy – no further action
– disciplinary action
3 Definition of fraud • Civil response
– legal advisers’ control
4 Roles and responsibilities – legal submissions
• Managers and supervisors – case file
• Finance director • Criminal response
• Fraud officer – police controlled
• Human resources – case file
• Audit committee • Parallel response
• Internal auditors – civil recovery
• External auditors – criminal prosecution
• Legal advisers
• IS/IT staff 8 Follow up action
• Public relations • Lessons learned
• The police • Management response
• External consultants – internal reviews
• Insurers – implement changes
– annual report
5 The response – enforcement policies
• Reporting suspicions
• Establish an investigation team
– objectives
– reporting procedures
– responsibilities
– powers
– control
• Formulate a response
– in accordance with corporate policy
6 The investigation
• Preservation of evidence
• Physical evidence
• Electronic evidence
• Interviews (general)
• Statements from witnesses
• Statements from suspects
68
Appendix 9 Example of a fraud response plan
This example has been based on a response plan from The term fraud encompasses a number of criminal
an organisation within the UK’s NHS. offences involving the use of deception to obtain
benefit or causing detriment to individuals or
organisations.
1 Introduction
This document is intended to provide a framework
This document is intended to provide direction and help for investigating all suspected cases of fraud, theft or
to those officers and directors who find themselves corruption where:
having to deal with suspected cases of theft, fraud • the value of the organisation has suffered or may
or corruption. It gives a framework for a response have suffered; or
and provides information on various aspects of • has been misrepresented for personal gain
investigation. The document also contains a series of
flowcharts which provide a framework of procedures as a result of the actions or omissions of:
that allow evidence to be gathered and collated in a • directors and staff employed by the organisation; or
way which facilitates informed initial decisions, while • customers, contractors and other external
ensuring that evidence gathered will be admissible in stakeholders.
any future criminal or civil actions. This document is
not intended to provide direction on fraud prevention.
2 Corporate policy
69
Fraud risk management: a guide to good practice
Either/or
To Chart 2
70
Finance director Head of human resources
Responsibility for investigating fraud has been Where a member of staff is to be interviewed or
delegated to the finance director. Where appropriate/ disciplined the finance director and/or chief internal
necessary he is also responsible for informing third auditor will consult with, and take advice from, the
parties such as the external auditors or the police about head of human resources.
the investigations. The finance director will inform and
consult with the chief executive in cases where the loss The head of human resources will advise those involved
is potentially significant or where the incident may lead in the investigation in matters of employment law,
to adverse publicity. company policy and other procedural matters (such as
disciplinary or complaints procedures) as necessary.
The finance director will maintain a log of all reported
suspicions, including those dismissed as minor or Line and other managers
otherwise not investigated. The log will contain details If, in accordance with the organisation’s whistleblowing
of actions taken and conclusions reached and will policy, a member of staff raises a concern with their
be presented to the audit committee for inspection line manager, head of department or the head of
annually. human resources the details must be immediately
passed to the finance director for investigation. If a
The finance director will normally inform the chief concern involves the finance director, the matter should
internal auditor at the first opportunity. While the be reported directly to the audit committee.
finance director will retain overall responsibility,
responsibility for leading any investigation will be Staff
delegated to the chief internal auditor. Significant All staff have a responsibility to protect the assets of
matters will be reported to the board as soon as the organisation, including information and goodwill as
practical. well as property.
71
Fraud risk management: a guide to good practice
See Chart 2 – managing the investigation The disciplinary procedures of the organisation will
be followed in any disciplinary action taken towards
Investigations will try to establish at an early stage an employee. This will usually involve a disciplinary
whether it appears that a criminal act has taken place. hearing at which the results of the investigation will be
This will shape the way that the investigation is handled considered.
and determine the likely outcome and course of action.
Where, after having sought legal advice, the finance
If it appears that a criminal act has not taken place, an director judges it cost effective to do so, the
internal investigation will be undertaken to: organisation will normally pursue civil action in order
• determine the facts to recover any losses. The finance director will refer the
• consider what, if any, action should be taken against case to the organisation’s legal advisers for action.
those involved
• consider what may be done to recover any loss Where initial investigations point to the likelihood of
incurred a criminal act having taken place the chief internal
• identify any system weakness and look at how auditor will, with the agreement of the finance director,
internal controls could be improved to prevent a contact the police and the organisation’s legal advisers
recurrence. at once. The advice of the police will be followed in
taking forward the investigation.
The chief internal auditor will present the findings of
his investigation to the finance director who will make Where there are sufficient grounds, the organisation
the necessary decisions and maintain a record of the will, in addition to seeking recovery of losses through
subsequent actions in relation to closing the case. Once civil proceedings, also seek a criminal prosecution. The
concluded, details of such cases will be reported to the finance director will be guided by the police in arriving
audit committee on an annual basis for information. at his decision on whether a criminal prosecution is to
be pursued.
Where an investigation involves a member of staff and
it is determined that no criminal act has taken place Where appropriate the finance director will consider the
the finance director will liaise with the head of human possibility of recovering losses from the
resources and appropriate line manager to determine organisation’s insurers.
which of the following has occurred and therefore
whether, under the circumstances, disciplinary action is
appropriate:
• gross misconduct (i.e. acting dishonestly but without
criminal intent)
• negligence or error of judgement was seen to be
exercised
• nothing untoward occurred and therefore there is no
case to answer.
72
Chart 2 Managing the investigation
From Chart 1
No
Either Investigate Or
No case Gross From
internally to decide which
to answer misconduct Chart 4B
of the following
Or
FD and/or head of dept to
decide what, if any, action Error of judgement/
to take in conjunction with negligent conduct Consider
head of HR possibility of
No making good
Loss recovered? the loss
No including a
Consider possibility of civil action
making good the loss Loss recovered?
for recovery
From
Chart 4A Yes
Yes
In conjunction with head of Initiate
HR, implement disciplinary dismissal
procedures if appropriate procedures
73
Fraud risk management: a guide to good practice
6 The response
74
Chart 3 Gathering evidence
From
Chart 2
Is there No
any physical
evidence?
Yes
Are No
there any
witnesses?
Yes
No
To
Chart 4
75
Fraud risk management: a guide to good practice
From
Chart 3
No Does
matter warrant interview
of suspect?
Yes
Arrange a meeting at
Is Yes earliest practicable time,
suspected person willing to that allows suspect
be interviewed? opportunity to have
representative present
No
Is evidence Yes
Is there
gathered sufficient for Interview
a case to answer?
dismissal?
No
Confer with
FD, review Confer with FD and review events
events with No with Police
Police
To To
Chart 2B Chart 2A
76
Appendix 10 References and further reading
The Association of certified fraud examiners (ACFE), Felson, M. and Clarke, R., (1999), Opportunity Makes
(2008), Report to the Nation on Occupational Fraud and the Thief, Police Research Series 98, London: Home
Abuse, www.acfe.org Office.
The Association of certified fraud examiners, ACFE, Finn, J. and Cafferty, D., (September 2002), Defence
(2008), Fraud Examiners Manual. Mechanism, Financial Management.
BDO Stoy Hayward LLP, (January 2008), BDO Fisher, C. and Lovell, A., (2000), Accountants Responses
Fraudtrack 5: A global challenge, to Ethical Issues at Work.
www.bdo.co.uk/fraudtrack
Fraud Advisory Panel, (2006), Sample Fraud Policy
BT Group (2008), BT The way we work: a statement of Statements, www.fraudadvisorypanel.org
business practice, www.bt.com
Fraud Advisory Panel, (2006), Fighting Fraud: A guide for
BSi British Standards, (2008), Whistleblowing SME’s 2nd Edition.
Arrangements Code of Practice, PAS 1998-2008,
www.bsigroup.com/en/Standards-and- Fraud Advisory Panel, (2006-2007), Ninth Annual
Publications/Industry-Sectors/Risk/PAS-19982008- Review 2006-2007 Ethical behaviour is the best defence
Whistleblowing against fraud.
CIMA (2000), Corporate Governance – History, Practice HM Treasury, (May 2003), Managing the Risk of Fraud.
and Future.
Institute of Business Ethics, (2003), Developing a Code
CIMA, (2005), CIMA Official Terminology. of Business Ethics: A guide to best practice including the
IBE Illustrative Code of Business Ethics.
CIMA, (2002), Risk Management: A guide to good
practice. Institute of Business Ethics, (2007), Does Business Ethics
Pay?
CIMA and the IBE, (2008), Managing responsible
business. Institute of Business Ethics, Good Practice Guide, Speak
up Procedures www.ibe.org.uk/SpeakUp
Collier, P.M. and Agyei-Ampomah, S., (2007),
CIMA Official Learning System Management Accounting Institute of Business Ethics, Living Up to our values:
Risk and Control Strategy. developing ethical assurance,
www.ibe.org.uk/LUTOVcontents_overview.pdf
DirectNews, (2007), Weak anti-fraud measures earn
bank hefty fine, CIMA Industry Focus. The Institute of internal auditors, The Association
of certified public accountants, The Association of
Ernst & Young, (2003), Fraud, the Unmanaged Risk, certified public examiners, (2008), Managing the
www.ey.com business risk of fraud: A practical guide.
FEE Brussels, (2005), How SME’s can reduce the risk of International Federation of Accountants (IFAC), (2006),
fraud, www.fee.be/publications International Auditing and Assurance Standards Board,
ISA’s 240,300,315 and 330.
77
Fraud risk management: a guide to good practice
78
Organisations
ISACA: www.isaca.org
79
Fraud risk management: a guide to good practice
80
978-1-85971-611-3 (pdf)
January 2009
Chartered Institute of
Management Accountants
26 Chapter Street
London SW1P 4NP
United Kingdom
T. +44 (0)20 8849 2275
F. +44 (0)20 8849 2468
E. [email protected]
www.cimaglobal.com TEC050V0110