1 chapter 3 ethics, fraud, and internal control. 2 objectives for chapter 3 zbroad issues pertaining...

48
1 Chapter 3 Ethics, Fraud, and Internal Control

Upload: priscilla-oliver

Post on 18-Jan-2018

219 views

Category:

Documents


0 download

DESCRIPTION

3 Business Ethics Why should we be concerned about ethics in the business world? zEthics are needed when ___________________________________ zIn business, conflicts may arise between: y zLitigation What are the four main areas of business ethics? zEquity zRights zHonesty of management zExercise of corporate power

TRANSCRIPT

Page 1: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

1

Chapter 3

Ethics, Fraud, and Internal Control

Page 2: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

2

Objectives for Chapter 3 Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in information technology Management fraud and employee fraud Common fraud techniques in manual and computer-based

systems The expectations gap between financial statements users

and auditors’ abilities SAS No. 78 Implications of computer technology on the internal control

structure

Page 3: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

3

Business EthicsWhy should we be concerned about ethics in the

business world? Ethics are needed when ___________________________________ In business, conflicts may arise between:

LitigationWhat are the four main areas of business ethics? Equity Rights Honesty of management

Exercise of corporate power

Page 4: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

4

Business EthicsWhy should we be concerned about ethics in the

business world? Ethics are needed when conflicts arise--the need to choose In business, conflicts may arise between:

employees management stakeholders

LitigationWhat are the four main areas of business ethics? Equity Rights Honesty of management

Exercise of corporate power

Page 5: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

5

Business EthicsWhy should we be concerned about ethics in the

business world? Ethics are needed when conflicts arise--the need to choose In business, conflicts may arise between:

employees management stakeholders

LitigationWhat are the four main areas of business ethics? Equity in salaries and product pricing Rights of employees Honesty of management relating to employees, advertising, foreign

policy, and financial reporting to external entities Exercise of corporate power involving safety, environmental

concerns, local community issues, and political persuasion

Page 6: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

6

Computer Ethicsconcerns the social impact of computer technology

(hardware, software, and telecommunications).What are the main computer ethics issues?

Privacy Security and accuracy Ownership of property Environmental issues Equity in access Artificial intelligence Unemployment and displacement Computer misuse Internal control integrity

Page 7: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

7

What is Fraud?Five Conditions of Fraud

false representation - false statement or disclosure

material fact - a fact must be substantial in inducing someone to act

intent to deceive must exist the misrepresentation must have resulted

in justifiable reliance upon information, which caused someone to act

the misrepresentation must have caused injury or loss

Page 8: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

8

1996 CFE Study of Fraud

Loss due to fraud equal to 6% of revenues

Loss by position within the company:

Other results: higher losses due to men, married employees, employees with advance degrees

POSITION PERCENT OF FRAUDS DOLLAR VALUE

Owners 12 $1,000,000

Management 30 250,000

Employees 58 60,000

Page 9: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

9

Why Fraud Occurs

FuelOxygen

Spark

Fire needs...

Page 10: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

10

Why Fraud OccursWhat are the 3 prerequisites of fraud?

Page 11: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

11

Why Fraud Occurs

Situational Pressures an employee is experiencing financial difficulties

Available Opportunities

poor internal controls

Personal Characteristics personal morals of individual employees

Page 12: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

12

Employee Fraud

Committed by?non-management personnel

Usually consists of: an employee taking cash or other

assets for personal gain by circumventing a company’s system of internal controls

Page 13: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

13

Management FraudIt is perpetrated at levels of management

above the one to which internal control structure relates.

It frequently involves using the financial statements to create an illusion that an entity is more healthy and prosperous than it actually is.

If it involves misappropriation of assets, it frequently is shrouded in a maze of complex business transactions.

Page 14: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

14

Fraud Schemes

Three categories of fraud schemes according to the Association of Certified Fraud Examiners:

A. Fraudulent statementsB. CorruptionC. Asset misappropriation

Page 15: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

15

A. Fraudulent Statements

Misstating the financial statements to make the copy appear better than it is

Usually occurs as management fraudMay be tied to focus on short-term

financial measures for successMay also be related to management

bonus packages being tied to financial statements

Page 16: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

16

B. CorruptionExamples:

Bribery Illegal gratuities Conflicts of interest Economic extortion

Foreign Corrupt Practice Act of 1977: indicative of extent of corruption in business world impacted accounting by requiring accurate

records and internal controls

Page 17: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

17

C. Asset MisappropriationMost common type of fraud and often

occurs as employee fraud.Examples:

Making charges to expense accounts to cover theft of asset (especially cash)

Lapping: using customer’s check from one account to cover theft from a different account

Transaction fraud: deleting, altering, or adding false transactions to steal assets

Page 18: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

18

Computer FraudTheft, misuse, or misappropriation of assets

by altering computer data Theft, misuse, or misappropriation of assets

by altering software programmingTheft or illegal use of computer

data/informationTheft, corruption, illegal copying or

destruction of software or hardwareTheft, misuse, or misappropriation of

computer hardware

Page 19: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

19

The Facts on Software Piracy, 1998

Of the 615 million new business software applications installed worldwide, 231 million or 38% were pirated --$11 billion in lost revenues.

The U.S. accounted for $2.9 billion of the losses, up slightly from the 1997 figure of $2.7 billion. The dollar losses reflect a 25% piracy rate (or one in every four applications) in the United States, coupled with a market that represents 43% of the business software in use globally.

Software piracy cost U.S. businesses $4.5 million in fines and legal fees in 1998. In the U.S., software piracy cost 109,000 jobs in 1998.

Page 20: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

Using the general IS model, explain how fraud can occur at the different stages of information processing?

The InformationSystem

DatabaseManagement

DataCollection

DataProcessing

InformationGeneration

The External Environment

InternalSources of Data

InternalEnd Users

ExternalDataSources

ExternalEnd Users

Feedback

The Business Organization

Feedback

Page 21: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

21

Data Collection Fraud

This phase of the system is most vulnerable because it is very easy to change data as it is being entered into the system.

Also, GIGO (garbage in, garbage out) reminds us that if the input data is inaccurate, processing will result in inaccurate output.

Page 22: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

22

Data Processing Fraud

Program Fraudsaltering programs to allow illegal access to

and/or manipulation of data filesdestroying programs with a virusOperations Fraudsmisuse of company computer resources,

such as using the computer for personal business

Page 23: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

23

Database Management Fraud

altering, deleting, corrupting, destroying, or stealing an

organization’s dataoftentimes conducted by disgruntled

or ex-employee

Page 24: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

24

Information Generation Fraud

stealing, misdirecting, or misusing computer output

Scavengingsearching through the trash cans on

the computer center for discarded output (the output should be shredded, but frequently is not)

Page 25: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

25

Internal Control Objectives According to SAS No. 78

1. safeguard assets of the firm2. ensure accuracy and reliability of

accounting records and information3. promote efficiency of the firm’s

operations4. measure compliance with

management’s prescribed policies and procedures

Page 26: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

26

Modifying Assumptions to the Internal Control Objectives

Management Responsibility The establishment and maintenance of a system of

internal control is the responsibility of management.Reasonable Assurance The cost of achieving the objectives of internal control

should not outweigh its benefits.Methods of Data Processing The techniques of achieving the objectives will vary

with different types of technology.

Page 27: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

27

Limitations of Internal Controls

Possibility of?honest errors

Circumvention via? collusion

Management overrideChanging conditions--especially in

companies with high growth

Page 28: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

28

Exposures of Weak Internal Controls [=Risk!]

destruction of __________

theft of _____________

corruption of______________________

disruption of______________________

the asset

the asset

the information system

the information system

Page 29: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

Preventive Preventive Preventive Preventive

Detective Detective Detective

Corrective Corrective Corrective

Undesirable Events

Levelsof Control

Page 30: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

30

Auditing Standards

Auditors are guided by GAAS (Generally Accepted Auditing Standards)

3 classes of standards general qualification standards field work standards reporting standards

For specific guidance, auditors use the AICPA’s SASs (Statements on Auditing Standards)

Page 31: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

31

SAS No. 78Describes the relationship between

the firm’sinternal control structure,auditor’s assessment of risk, andthe planning of audit procedures

How do these three interrelate?The weaker the internal control structure, the higher the assessed level of risk; the higher the risk, the more auditor procedures applied in the audit. AIS is particularly concerned with the internal control structure.

Page 32: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

32

Five Internal Control Components: SAS No. 78

1. control environment2. risk assessment3. information and

communication4. monitoring5. control activities

Page 33: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

33

1: The Control Environmentintegrity and ethics of managementorganizational structurerole of the board of directors and the

audit committeemanagement’s policies and philosophydelegation of responsibility and authorityperformance evaluation measuresexternal influences--regulatory agenciespolicies and practices managing human

resources

Page 34: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

34

2: Risk Assessmentidentify, analyze, and manage

risks relevant to financial reporting (e.g.): changes in external environment risky foreign markets significant and rapid growth that strain

internal controls new product lines restructuring, downsizing changes in accounting policies

Page 35: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

35

3: Information and CommunicationThe AIS should produce high quality

information which identifies and records all valid transactions provides timely information in appropriate

detail to permit proper classification and financial reporting

accurately measures the financial value of transactions, and

accurately records transactions in the time period in which they occurred

Page 36: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

36

Information and Communication

Auditors must obtain sufficient knowledge of the IS to understand: (red shows relationship to the AIS model) the classes of transactions that are material

how these transactions are initiated [Input]the associated accounting records and accounts

used in processing [Input] the transaction processing steps involved from the

initiation of a transaction to its inclusion in the financial statements [Process]

the financial reporting process used to compile financial statements, disclosures, and estimates [Output]

Page 37: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

37

4: Monitoring

The process for assessing the quality of internal control design and operation

[This is feedback in the general AIS model.] separate procedures--test of controls by internal

auditors ongoing monitoring:

computer modules integrated into routine operations

management reports which highlight trends and exceptions from normal performance

Page 38: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

38

5: Control ActivitiesPolicies and procedures to ensure that

the appropriate actions are taken in response to identified risks performance reviews--results vs. forecasts information processing

general controls applications controls

segregation of duties physical controls

Page 39: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

39

In manual system, separation between: authorizing and processing a transaction custody and recordkeeping of the asset subtasks

In computerized system, segregation should exist between: program coding program processing program maintenance

Segregation of Duties

Page 40: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

Authorization

Authorization

Journals

Processing

Custody Recording

Task 1 Task 2 Task 2Task 1

Nested Control Objectives for Nested Control Objectives for TransactionsTransactions

ControlObjective 1

ControlObjective 2

Control Objective 3

Custody Recording

Page 41: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

41

Physical ControlsAuthorizationused to ensure that employees are

carrying out only authorized transactions Authorizations may be general (everyday

procedures) or specific (non-routine transactions).

Supervisiona compensation for lack of segregation;

some may be built into computer systems

Page 42: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

42

Accounting Recordsprovide an audit trailAccess Controlshelp to safeguard assets by restricting

physical access to themIndependent Verificationreviewing batch totals or reconciling

subsidiary accounts with control accounts

Physical Controls

Page 43: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

43

Internal Controls in CBISs

Transaction Authorizationthe rules are often embedded

within computer programs EDI/JIT: automated re-ordering of

inventory without human intervention

Page 44: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

44

Internal Controls in CBISs

Segregation of Duties a computer program may perform

many tasks that are deemed incompatible

thus the crucial need to separate program development, program operations, and program maintenance

Page 45: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

45

Internal Controls in CBISs

Supervision the ability to assess competent

employees becomes more challenging due to the greater technical knowledge required

Page 46: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

46

Internal Controls in CBISs

Accounting Records ledger accounts and sometimes source

documents are kept magnetically, and no audit trail is readily apparent

Page 47: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

47

Internal Controls in CBISs

Access Control data consolidation exposes the

organization to computer fraud and excessive losses from disaster

Page 48: 1 Chapter 3 Ethics, Fraud, and Internal Control. 2 Objectives for Chapter 3 zBroad issues pertaining to business ethics zEthics in accounting information

48

Internal Controls in CBISs

Independent Verification many of these tasks are performed by

the computer rather than manually, and the need for an independent check on tasks performed by the computer is not necessary (however, the programs themselves are checked).