Internal Controls

25
Internal Controls from a Non-IT Perspective Presented By Michelle Pyan, LPI, MBA Commercial Investigations LLC September 22, 2011 Making Your Business Secure: What’s Enough?

description

 

Transcript of Internal Controls

Page 1: Internal Controls

Internal Controls from a Non-IT Perspective

Presented ByMichelle Pyan, LPI, MBA

Commercial Investigations LLC

September 22, 2011

Making Your Business Secure: What’s Enough?

Page 2: Internal Controls

His presentation

Page 3: Internal Controls

Check references and do background checks before hiring employees.• Your Employees• Your Client’s Employees

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

BACKGROUND INVESTIGATIONS

Page 4: Internal Controls

• Making the Case– Discourages Undesirable Applicant’s– Encourages Open Communication– Eliminates Uncertainty– Demonstrates Due Diligence– Promotes Workplace Safety– Excellent Return on Investment

BACKGROUND INVESTIGATIONSInternal Controls from a Non-IT Perspective

Making Your Business Secure: What’s Enough?

Page 5: Internal Controls

• ROI / Cost Benefit– Employee Pilferage– Commercial Bribery– Embezzlement– Vandalism– Burglary– Insurance/Workers Compensation fraud– Arson– Computer Fraud

BACKGROUND INVESTIGATIONSInternal Controls from a Non-IT Perspective

Making Your Business Secure: What’s Enough?

Page 6: Internal Controls

• Credit Reports– Determine if employee is living within their means– Deters employee fraud– Must be job related• Crucial for Payroll Handling Employees• Crucial for management or any other executive

involved in signing off on payroll documentation

Making Your Business Secure: What’s Enough?

BACKGROUND INVESTIGATIONSInternal Controls from a Non-IT Perspective

Page 7: Internal Controls

• Drug Testing– Employee Habits Such as Drug Abuse can

Induce Fraud– A Complete Background Check will Include

a Drug Test

Making Your Business Secure: What’s Enough?

BACKGROUND INVESTIGATIONSInternal Controls from a Non-IT Perspective

Page 8: Internal Controls

PAYROLL FRAUD

• Ghost Employee• False Wage Claim• False Expense

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 9: Internal Controls

PAYROLL FRAUD

• Ghost Employee– What

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 10: Internal Controls

PAYROLL FRAUD

• Ghost Employee– How• Add to Payroll• False Time Sheet• Issue Wage Payment• Collect the Payment

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 11: Internal Controls

PAYROLL FRAUD• Ghost Employee– Prevent• No Cash Payments• Supervisors Approve Payroll• Add Employees Only with Approval• Performance Reviews Based on Payroll Register• Rotate Responsibility for Payroll Functions• Have Management Check the Payroll

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 12: Internal Controls

PAYROLL FRAUD

• False Wage Claim– What

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 13: Internal Controls

PAYROLL FRAUD

• False Wage Claim– How• Altering Time Sheets

– How are the Hours Recorded

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 14: Internal Controls

PAYROLL FRAUD

• False Wage Claim– Prevent• Move Employees to Salary• Strict Controls on Overtime• Control the Recording of Hours Actually Worked

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 15: Internal Controls

PAYROLL FRAUD

• False Expense– What• Mischaracterized Expenses• Inflated Expenses• False Expenses• Multiple Claims

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 16: Internal Controls

PAYROLL FRAUD• False Expense– How• Mischaracterized Expenses• Inflated Expenses• False Expenses• Multiple Claims

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 17: Internal Controls

PAYROLL FRAUD• False Expense– Who• Employees who are Reimbursed• Employees that Process Expense Claims

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 18: Internal Controls

PAYROLL FRAUD• Lessons Learned– Not all Frauds Involve Employees Directly Stealing

Money or Assets– Not all Frauds Occur Once and in Large Amounts– Employees Charged with Protecting the Payroll

System are Best Placed to Defraud the System and Hide the Evidence

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 19: Internal Controls

PAYROLL FRAUD• Anonymous Hotlines– More Frauds are Uncovered via Tips than any

other Method– Accidental Discovery is the Second Most Common

Method of Detecting Fraudulent Activity

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 20: Internal Controls

CLIENT VETTINGDoes the company exist in state corporate records?Is the signatory a principal of the company?

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 21: Internal Controls

• Tips– Cursory searches • White Pages• Google• Pipl• Etc. . . .

– Experian Biz Apps Reports– Third Party Site Inspection

CLIENT VETTINGInternal Controls from a Non-IT Perspective

Making Your Business Secure: What’s Enough?

Page 22: Internal Controls

CLIENT VETTING

Screen your prospects.

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 23: Internal Controls

QUESTIONS AND ANSWERSInternal Controls from a Non-IT Perspective

Making Your Business Secure: What’s Enough?

Page 24: Internal Controls

DISCLAIMERThe information provided in this presentation does not constitute legal or accounting advise. It is for information and discussion purposes only. This presentation may not be reproduced without the written consent of the author.

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?

Page 25: Internal Controls

THANK YOU!Michelle L. Pyan, LPI MBA

PresidentCommercial Investigations LLC

Licensed Private Investigative Agency

www.commercialinvestigationsllc.com(800) 284-0906

[email protected]

Internal Controls from a Non-IT PerspectiveMaking Your Business Secure: What’s Enough?