Good Internal Control Practices and Fraud Prevention Tips
Good Internal Control Practices and Fraud Prevention Tips
Good Internal Control Practices and Fraud Prevention Tips
Table of Contents
Introduction ..................................................................................................................1
Course Objectives ................................................................................................................ 3
What are internal controls? ..........................................................................................5
A Broad Definition of Internal Controls ................................................................................... 7
Five Components of Internal Control ...................................................................................... 8
Why are internal controls necessary? ........................................................................13
Who is responsible for internal controls? ...................................................................17
Roles and Responsibilities ................................................................................................... 19
How do I implement internal controls in my department? ........................................21
Type of Controls ................................................................................................................ 23
Control Design and Operating Effectiveness .......................................................................... 23
Basic Elements of Internal Control ....................................................................................... 24
Separation of Duties: Checks and Balances ........................................................................... 25
Authorization ..................................................................................................................... 26
Documentation .................................................................................................................. 27
Reconciliation and Review ................................................................................................... 28
Monitoring ......................................................................................................................... 29
Safeguarding of Assets and Records .................................................................................... 30
Information Systems Security .............................................................................................. 31
Common Causes of Internal Control Breakdowns .................................................................. 33
A Guide to Creating Your Own System of Internal Controls .................................................... 34
Fraud ...........................................................................................................................35
What Is Fraud? .................................................................................................................. 37
Fraud Reporting ................................................................................................................. 39
Types of Fraud................................................................................................................... 40
Types of Fraud Perpetrators ................................................................................................ 40
Consistent Patterns in Fraud Cases ...................................................................................... 41
Fraud Prevention Tips .................................................................................................43
Payroll............................................................................................................................... 45
Purchasing: Departmental Revolving Fund ............................................................................ 48
Purchasing......................................................................................................................... 50
Purchasing: ProCard ........................................................................................................... 51
Purchasing......................................................................................................................... 52
Cash Receipts .................................................................................................................... 54
Refunds............................................................................................................................. 58
Appendix .....................................................................................................................59
Introduction
Course Objectives
Provide guidelines for evaluating and enhancing internal controls in your unit.
Implement procedures that can prevent fraud.
Operations
Reporting
Compliance
Effected by people. It is not merely about policy manuals, systems, and forms, but
about people at every level of an organization that impact internal control.
Control Environment
Risk Assessment
Control Activities
Monitoring
Control Environment
Foundation for all other components of internal control
Commitment to competence
Risk Assessment
Identify/analyze relevant internal and external risks to achievement of objectives
Control Activities
Policies and procedures that help ensure that necessary actions are taken to address
risks/achieve objectives
All personnel must receive a clear message that control responsibility is taken
seriously, understand their own role in the internal control, and how their activities
relate to the activities of others
Effective communication flows to external parties, and internally up, down, and
across all levels
Monitoring
Processes used to assess the quality of internal control performance over time
Provide information on the entity’s progress, or lack of it, towards achieving goals
Prevent, detect, and correct Controls are designed primarily to prevent errors
errors and irregularities (fraud) and improper conduct. However, controls should
also be designed to detect and correct.
Avoid cost of investigations and If fraud is prevented, the University will spend less
other related costs time and money investigating, litigating, and
correcting.
Promote efficiency and cost Citizens and donors entrust resources to the
effectiveness University for specific purposes. It is not enough to
simply safeguard assets; money must be used
efficiently and effectively to achieve its intended
purpose.
Provide reliable financial/ Decisions are as good as the information they are
statistical reports based on. Therefore, it is essential that we provide
decision-makers with reliable data. The University
has the responsibility to report on its stewardship
of various resources. Reliable data is essential
when reporting to sponsors and donors.
Ensure compliance with laws and The University's use of government resources is
regulations tightly controlled and limited by legal and
contractual restrictions. Policies and procedures
must ensure compliance with applicable laws and
regulations.
Subtle Reasons…The Human Factor
Avoid public embarrassment Frauds that have occurred in the past few years
and loss of public confidence have brought increased media attention and
scrutiny. Instances of fraud call into question the
public’s trust in the University.
The CEO is ultimately responsible for the effectiveness of the internal control
system.
Type of Controls
Manual Controls
Automated Controls
To meet objectives and mitigate risks, the controls must be adequately designed,
and operate as designed
One design does not fit all; design depends on objectives, risks, circumstances
Can have adequate control design, but if not operating as designed, objectives are
not met, and risks are not mitigated
Can have adequate control operating effectiveness, but without adequate design,
objectives are not met, and risks are not mitigated
Separation of duties
Authorization
Documentation
Monitoring
Safeguarding of assets
and records
Information systems
security
No one person should have complete control over all aspects of a financial transaction. Ideally,
no single individual should be able to:
Authorize a transaction,
Why?
Protects employees
Things to Remember
The cost of internal controls should never exceed the expected benefit. Sometimes
realignment of duty assignment may be all that is necessary to accomplish the
objective.
Management should take a more active role in overseeing operations when fiscal
office staffing prohibits or restricts appropriate separation of duties.
Mandatory vacation policy, periodic rotation of duties, and analytic reviews are
useful tools if appropriate separation of duties is not practical.
Authorization
Transactions should be authorized and executed by persons acting within the scope of their
authority.
Why?
Prevents invalid transactions
Things to Remember
Individuals should understand the significance of what they are approving, as well as
their responsibility and accountability in the approval process.
Policies and procedures should clearly state which individuals have the authority to
approve different types of transactions.
Approvers should review supporting information to verify the propriety and validity
of transactions, or should have first-hand knowledge of transactions being approved.
Ensure that inappropriate charges cannot be made to a document after it has been
authorized.
Documentation
Internal control systems and all transactions are to be clearly documented and the
documentation should be readily available for examination.
Why?
Systems Documentation:
Avoids disruption of activities in case of employee turnover.
Serves as a reference tool for employees seeking guidance on the handling of less
frequently encountered transactions/situations.
The internal control system (policies, procedures) should be documented and made
available to all employees.
Transaction Documentation:
Ensures accuracy and completeness of transactions.
Things to Remember
Recorded in ink.
Documentation should include sufficient detail to support the transaction and any
amendments.
Key documents should be sequentially numbered to ensure that all documents can
be accounted for.
Reconciliation: The process of comparing accounting data with the underlying items they
represent, e.g., reconciling payroll records to MyFD.
Review: An inspection or examination that takes place for the purpose of evaluating
something.
Why?
Ensures accuracy of information
Things to Remember
Reconciliation and review should be done on a timely basis.
Routinely review “high risk” or unusual transactions, e.g., excessive voids on cash
register tapes.
Monitoring
Examples:
Access to assets and records should be limited to authorized individuals. Accountability for
custody and use of resources should be assigned and tracked.
Why?
Protects assets and records from unauthorized use, loss, or theft
Things to Remember
Deposit cash receipts in a timely manner.
Sensitive items should be kept in a locked storage area at all times when not in use.
Access (i.e. safes, files) should be limited to minimum number of individuals and
based on job duties.
It is best to keep confidential records separate from the rest of the files.
Information stored and sent via computer is at risk of disclosure or modification. The
confidentiality and sensitivity of the data should be assessed to determine what controls should
be in place to protect the information.
Why?
Secure sensitive and confidential information
Availability of data
Things to Remember
Data and Records Management (sensitive, confidential, financial, and research data)
Public
Restricted
Confidential
Store and manage data in compliance with UW records management and retention
policies. (Records Management web page http://f2.washington.edu/fm/recmgt/)
Access Controls
Close all accounts and remove all access capabilities related to separated employees.
User data access and modification privileges should support other internal controls:
Segregation of duties
Protection of assets
Transaction authorization
Physical Security
Critical computers and servers must be housed in protected areas that are away
from heavy traffic patterns, and restricted to authorized individuals.
UW laptops, wireless services, and other mobile computing devices should have
check out procedures and identification marks/tags to prevent their theft or
compromise.
Lack of communication/collaboration
“Not my problem”
Understaffed
Collusion
To err is human
7. Determine the cost of such procedures and compare them to the estimated
benefits of implementing the procedures (cost vs. benefit).
10. Obtain feedback, analyze and evaluate the effectiveness of the new procedures,
and take corrective action, if necessary.
11.
Fraud
What Is Fraud?
Forgery or alteration of reports, documents, or computer files
Other related illegal acts (i.e., misuse of a U-PASS, email account, or the
Internet)
Fraud Triangle
Opportunity
Pressure Rationalization
Fraud Reporting
Types of Fraud
Simple methods
Repeat offenders
The employee seldom takes leave and/or nobody does the employee’s duties
when absent
Payroll
A foreign research scientist received an extra $1,450 when he was put on the
payroll 21 days before he started work as a mechanism to pay his graduate
school tuition.
Red Flags
Employee is not on site, or is not known to other
department personnel.
Information in the personnel file does not agree with
payroll records.
Hours entered are unusual (e.g., 16.43; 20.56).
Payroll
Red Flags
Same overtime hours each pay period.
Employees may have easy access to websites and/or software that generate
false receipts.
Red Flags
Description on the petty cash form does not match the
receipt.
The top part of the cash register tape is cut off.
Same transaction number.
Unusual vendor/store location.
The person who authorizes petty cash should review supporting documents for
reasonableness. (Supporting documents include cash register receipts, invoices,
and certain credit card slips.)
The person who reconciles the MyFD should investigate and resolve such things
as missing supporting documentation and unusual or missing approval
signatures.
Red Flags
Custodian is frequently “out of money” and tells employees
they will have to wait for reimbursement.
Custodian works many evenings and weekends “to get work
done.”
Custodian rarely takes time off.
Checks written to “cash.”
Checks written to custodian.
Overdraft notices from the bank.
Checks used out of sequence.
Missing supporting documentation.
What can you do to prevent this type of fraud?
Controls: Separation, Reconciliation, Review
A manager or principal investigator should review for reasonableness and
authorize petty cash reimbursement requests.
Verify that deposits to the account are supported with a petty cash
reimbursement. (No other funds should be deposited to the account.)
Purchasing
Red Flags
One individual had full control of the purchasing process
Monitoring – reviewers not knowledgeable of department
activities
Purchasing: ProCard
Red Flags
Missing supporting documentation to support UW purpose.
Credit, error, repayment notation.
Explanations do not make sense.
Questionable vendor/merchant name and location.
Cardholder approved own purchases.
Reconciler could not access PaymentNet transactions.
Cardholder supervised reconciler.
Lack of understanding of reasonability.
Print, sign, and date monthly statement to indicate reconciliation was performed
by the cardholder and reviewer.
Purchasing
Employees were able to purchase items using University budgets and then sell
them on eBay or return to vendor for personal gain.
Red Flags
The budget used for the purchase.
The quantity of items purchased.
Destination to/from on shipping invoices.
Purchasing Review
The person who authorizes/reconciles purchases should review the following:
Whether the description on the cash register or credit card receipt matches the
description on the petty cash voucher, ProCard notes, or reimbursement request
Cash Receipts
Red Flags
Larger than normal daily shortages from cash register till.
There was no accountability by cashier.
The safe was left on "day lock."
Keys to the money bags were left on top of the safe.
Management should review reports that are over and short, and look for
unusual trends.
Cash Receipts
An employee was able to misappropriate $6,600 in 18 months from key
deposits.
Red Flags
The department received overdraft notices for the key
deposit bank account.
Reconcile deposits to bank with the source document (i.e. cash receipt book,
cash register “z” reading).
Travel
A traveler was reimbursed $800 for personal travel that was combined with
University travel (airfare, hotel, per diem, parking).
A traveler was reimbursed $900 for travel from an outside agency for presenting
a talk. The University also reimbursed him.
Red Flags
No business connections or purpose at travel
destination.
Insufficient documentation for UW business purpose.
Traveler presenting a “paper” or “talk.”
Travel to the same location several times.
Travel approved by subordinate.
Person who approves eTravel should ask the traveler if he/she was reimbursed
by another party.
Travel
Individual CTA (travel visa card) used for personal use
Free airline tickets for being “bumped” used for personal use
Airline tickets cancelled due to personal reasons, kept for personal use
Refunds
Red Flags
Unrestricted access to the card machine
No monitoring of monthly budget activity
No daily reconciliation of sales and refund activity
Appendix
Verify that sales tax, budget Ensure funds are properly Reconciler Reconciler
number, and object code for charged to budgets.
each transaction are properly
applied.
Note: Cardholders should not reconcile or approve their own transactions. For example, a
reconciler who is also a cardholder should have their supervisor review and approve their
transaction log.
This matrix is a guide. Separation of duties may vary depending
PETTY CASH
on the organizational unit’s structure and the number of
FUNCTIONS employees available to perform petty cash functions.
WHAT WHY WHO
To Do To Do It Should Do It
This matrix is a guide. Separation of duties may vary depending
CASH RECEIPT
on the organizational unit’s structure and the number of
FUNCTIONS employees available to perform cash receipts.
WHAT WHY WHO
To Do To Do It Should Do It
Approve changes. Ensure employee and pay is valid, and Supervisor Supervisor
pay is accurate (correct classification,
rate, and budget).
Approve time records. Ensure records reflect actual hours Supervisor Supervisor
worked and leave taken. Ensure timely
completion of forms.
Pick up and distribute checks. Ensure payment is to valid employee. Payroll Someone not
Coordinator involved with
payroll function
Reconcile time records and Ensure information is accurate. Payroll Someone not
payroll adjustments (i.e. RST). Coordinator involved with
payroll function
Authorize monthly Grant & Ensure payroll charged to grant is Principal Principal
Contract Certification Reports. accurate. Investigator Investigator
Payroll
Authorization
Timesheets are not approved by employees and by supervisors with first-hand
knowledge of hours worked.
Grant and Contract Certification Reports are not approved by the Principal
Investigator.
Documentation
Reconciliation/Review
Excessive overtime is not being monitored.
Departments do not review hours to ensure compliance with the 1,050 Rule for
hourly employees.
Safeguarding
Departments do not have formal checkout procedures when employees leave the
department.
Purchasing/Petty Cash
Separation of Duties
Departmental Petty Cash
The same person makes payouts and reconciles the bank statements to the check
register, and to the authorized fund amount.
The same person approves and processes reimbursements from the petty cash fund
and authorizes the State of Washington invoice voucher to reimburse the fund.
Purchasing
The person authorized to approve purchases online is the same person who
reconciles transactions to MyFD.
Authorization
Purchases are approved by individuals not familiar with the program or project.
Travel is approved by an individual reporting to the claimant.
Delegations of signature authority are not in writing or not updated.
Petty cash voucher is returned to the requester after approval.
Unauthorized cash funds.
Prior approval is not obtained from sponsors when required (e.g., purchase of
general purpose equipment).
Safeguarding
The cashier reconciles cash received with revenue records without proper
supervisory review.
The cashier maintains the accounts receivable records.
The cashier authorizes adjustments/cancellations of accounts receivable.
The cashier authorizes voids and adjustments to the cash register.
The cashier accepts and resolves customer complaints.
Authorization
Voids, paid-outs, and other adjustments to cash receipts are not approved.
Receivable write-offs and other adjustments to billings are not approved.
Voids, paid-outs, and adjustments are not properly supported.
Non-numbered Rediform receipts are used.
“Z” readings of cash register machines are not accounted for, or non-resettable
cumulative totals are not used during the reconciliation process.
The “Z” tape is not used to reconcile deposit amounts.
Deposits are not reconciled to source documents, such as pre-numbered cash
receipts.
Departments do not use the cashier-validated cash transmittal or bank-validated
deposit slips when reconciling deposits to MyFD.
Safeguarding
Deposits are not done daily or when $500 accumulates.
Safe combination is not changed when a staff member with knowledge leaves.
Access to the safe is not restricted.
Equipment
Separation of Duties
Equipment is not tagged upon receipt. Departments often wait for the asset control
sheet before equipment is tagged.
Reconciliation and Reviews
Biennial physical inventories are not done in a timely manner or are not done at all.
Pre-tag items are not cleared on a timely basis.
It is unknown how and where employees are storing sensitive and confidential data.
Access Controls
The database does not have unique user logon identification and password
authentication controls.
The department does not document the authorization that is needed to establish
accountability and issue, alter, or revoke user access.
The department has a shared user logon ID and password that is used to gain
access to the University administrative systems. The user logon ID and password
were written on a piece of paper and the secure ID was left in a visible location.
The database does not have user access permissions that are based on the
principles of least privilege and separation of duties.
Physical Security
The servers, which contain sensitive and confidential data, are located in office areas
that are not restricted to authorized personnel, physically secured, or protected from
tampering and environmental hazards.
Former student and employee’s access to the file server was not revoked or
disabled.
Others
Separation of Duties
Authorization
Service center rates are not approved by Management Accounting and Analysis
annually.
Recharge center rates are not approved by the Dean’s Office annually.
Documentation
2. Definitions
a. Financial Irregularity
A loss of funds or assets of the University resulting from any dishonest, fraudulent, or other
related illegal act. Such acts include, but are not limited to:
Forgery or alteration of reports, documents, or computer files.
Misappropriation or misuse of University assets (i.e., equipment, supplies, cash).
Authorizing or receiving compensation for goods not received or services not
performed.
Authorizing or receiving compensation for hours not worked.
Any irregularity in the handling or reporting of money transactions.
Use of University facilities and equipment for private financial gain.
Acceptance of kickbacks or bribes.
Other related illegal acts (i.e., misuse of a U-PASS, email account, or the Internet).
Formerly numbered Operations Manual D47.0
3. Policy
Faculty and staff should immediately report suspected financial irregularities or other related
illegal acts to their department management or to the Department of Internal Audit. Once
department management becomes aware of a suspected financial irregularity or other related
illegal act, they must immediately report it to Internal Audit. If the discovery occurs after
normal business hours (when Internal Audit is not available), the report may be made to the
University Police who have a 24-hour-a-day response capability. This is particularly important if
there is concern over the recovery of assets or protection of vital records.
Department managers should protect the accounting records from loss or destruction, but
should not attempt to conduct their own investigation. Department managers should consult
with the appropriate University personnel official before taking any personnel action.
Upon learning of the suspected financial irregularity or other related illegal act, Internal Audit
will immediately notify:
The State Auditor's Office.
The University of Washington Division of the Attorney General's Office.
The University Police.
The University's Risk Management Office.
The appropriate University personnel official.
4. Investigation Procedures
Internal Audit, the University Police, and the UW Division of the Attorney General's Office will
conduct a preliminary investigation to determine:
Whether a financial loss has occurred;
The results of the preliminary investigation will determine if and when it is necessary to notify
other University officials or the Prosecuting Attorney.
At the conclusion of the investigation, Internal Audit issues a written report to the State
Auditor's Office, the University's Executive Vice President, and other appropriate University
officials.
5. Recovery of Loss
Department managers, on their own, are not authorized to enter into a settlement to recover
the suspected loss. All settlements for recovery of the loss must be approved by the State
Auditor's Office and the Attorney General.
If the investigation performed by Internal Audit reveals a loss occurred, the University will seek full recovery
which may include audit costs. The University's Student Fiscal Services, Receivables Unit, will coordinate the
recovery action (see Administrative Policy Statement 47.4, "Policy on Financial Irregularities and Other
Related Illegal Acts") and has the authority to approve recovery settlements on behalf of the University.
6. Responsibilities
a. Faculty and Staff
Report any instance of suspected financial irregularity or other related illegal act to your
management head or to Internal Audit (or the University Police, after normal business hours if
there is a concern over recovery of assets or protection of vital records).
b. Management Head
Immediately contact the Department of Internal Audit (or the University Police after
normal business hours if there is a concern over recovery of assets or protection of
vital records).
Consult with the appropriate University personnel official before taking any
personnel action.
c. Internal Audit
Notify the State Auditor's Office, the UW Division of the Attorney General's Office,
the University Police, the University's Risk Management Office, and the appropriate
University personnel official.
Issue a written report to the State Auditor's Office, the Senior Vice President for
Finance and Facilities, and other appropriate University officials.
7. Additional Information
Questions, reports or other communications regarding financial irregularities or other related
illegal acts should be directed to the Department of Internal Audit.
Phone: 206–543–4028
Email: [email protected]
If there is a concern over recovery of assets or protection of vital records after normal business
hours, contact the University Police.
Email: [email protected]