Vonya Global is an international consulting firm specialized in internal audit and enhancing corporate governance. (www.vonyaglobal.com)
We would love to get your feedback on this blog. You may also submit topics for us to consider or submit articles for us to post. We would be delighted to hear from you!
Tuesday, December 29, 2009
The 2009 Ponzi Collapse
Was the Ponzi collapse a result of better governance or stricter enforcement? No. The economic situation created conditions which made it impossible for the schemes to continue. We still need better corporate governance, enhanced enforcement, and improved detection.
Monday, December 28, 2009
2009 - The Great Recession, 2010 - The Great Litigation?
"Judges and lawyers say the tales behind any number of cases, including low-level offenses like turnstile jumping and petty theft, are often a barometer of bad times. And they said that the data showed that courts nationally would be working through the recession’s consequences for years, much as they did with the flood of cases stemming from the crack cocaine epidemic of the 1980s, even after the epidemic had slowed."
Read the article for yourself and make up your own mind -
NY Times Article.
Wednesday, November 18, 2009
Corporate Crime Task Force Created
The L.A. Times reported, "The Financial Fraud Enforcement Task Force will attack what Holder called "unscrupulous executives, Ponzi scheme operators and common criminals" in much the same way that a similar task force created in 2002 by former President George W. Bush went after corporate malfeasance following the accounting scandals at Enron Corp. and WorldCom Inc."
The article continued: "The Fraud Enforcement and Recovery Act authorized $245 million annually in 2010 and 2011 to hire hundreds of prosecutors, agents and other federal officials to pursue financial fraud. It also strengthened and expanded money laundering laws and other statutes to apply to fraud committed by private mortgage lenders."
Is this something that should worry executives and corporate boards? Or... is this much ado about nothing?
Tuesday, November 17, 2009
A Proactive Response to Fraud Risk and Fraud Detection - The Fraud Penetration Study
There are six steps to the Fraud Penetration Study: Risk Identification, Scenario Development, Concealment Analysis, Scoping, Data Mining, and Fraud Analysis.
- Fraud risk identification starts with understanding the types of fraud risk. The starting point is accepting the concept of inherent fraud schemes. Once this concept is accepted, the auditor must understand how the scheme would occur in the specific business system; often times referred a fraud scenario.
- The fraud scenario is built from understanding the variations of the scheme based on the opportunities for fraud, entities involved, internal controls in place, and business processes currently performed. In essence, the fraud scenario is how the inherent fraud scheme would occur in a company’s business process.
- After the fraud scenario is developed, the auditor must identify and understand the common concealment strategies used to hide the fraud in this scenario. Common fraud concealment strategies are false documents, false representations and false approvals. The auditor should identify the red flags associated with the concealment strategies.
- The structure of the fraud scenario defines the audit scope for the audit plan. The audit plan may have several fraud scenarios, but each fraud scenario needs its own data mining plan and its own fraud audit procedures. Also, the audit plan provides the auditor with the necessary information to find and reveal the fraud scenario.
- Using a data mining tool like ACL(1) or IDEA(1), a sample of vendors would be selected consistent with the fraud data profile for the identified fraud scenario. Building the fraud data profile is the most important step in the fraud audit process. The goal is to select a biased and discreet number of transactions that are more likely to be fraudulent on which fraud audit procedures can be performed.
- The purpose of the fraud audit procedure is to gather evidence that is created and stored external to the perpetrator to form the basis of the Fraud Analysis. The procedure should be designed to pierce the concealment strategy. In the false billing scheme, the weakness of the concealment strategy is that the vendor does not exist. If the auditor develops an audit procedure to show that the entity does not exist, the concealment strategy will be unveiled, and the fraud exposed.
Using this methodology, you will find out if there is fraud in your business and if done well, you will find it within the first 3 days of analysis.
1 ACL is a registered trademark of ACL Corporation and IDEA is a registered trademark of Caseware IDEA.
Tuesday, November 10, 2009
Looking for Ghost Employees in a Retail Environment
What can be done?
A large retail organization, one of the Fortune 500 with well over 200,000 employees, has retained Vonya Global to search for Fraud in Payroll. Specifically we will be looking for Ghost Employees which (in our methodology) includes Fictitious Ghosts, No-Show Ghosts, Pre-employment Ghosts, Terminated Ghosts, Temporary Ghosts, Family/Friend Ghosts, and Temp Agency Ghosts.
Unlike an investigation, this project is a proactive approach to fraud detection. The company has no evidence or indication that payroll fraud is occurring, however they understand that based on their size and their industry they are susceptible. Our approach takes an inventory of all payroll data and files. Once we have all the information we will segregate it into groups with similar characteristics and through detailed data analysis we will identify anomalies. We are confident that we will identify Ghost Employees and as a result return hundreds of thousands of dollars to the company.
Contact us if you would like to find out more about this project or how we would help you identify fraud in your business.
Wednesday, November 4, 2009
House Financial Services Committee passes Garrett-Adler amendment
Is this amendment a good thing? You can start a discussion here or follow the one going on now on LinkedIn.
Monday, November 2, 2009
Investors Opposed to Further SOX Delays
Investor groups quickly voiced their opposition to the amendments in an Oct. 26 letter to several key members of Congress. Signed by leaders from the Council of Institutional Investors, the Consumer Federation of America, the American Association of Individual Investors, and the CFA Centre for Financial Market Integrity, the letter opposes any effort to further defer or exempt any public companies from the internal control requirements of Section 404, which they say “would do a grave disservice to investors whose trust in the markets is an essential ingredient in any financial recovery.”
“It is our view that the Section 404(b) requirements under SOX provide significant benefits to investors, are valuable regardless of a company’s size and represent an appropriate use of a company’s resources given the importance a strong system of internal controls has in producing reliable financial reporting,” the letter states.
Excerpt taken from October 30, 2009 Compliance Week article written by Melissa Klein Aguilar
A roll-call vote is slated for November 4th.
Wednesday, October 28, 2009
Construction Auditing: the Foundation to Risk Management and Internal Control
While a multimillion dollar project represents one of a company’s largest capital expenditures, it is sometime on of the least controlled expenditures. On October 21st, the Senior Supervisors Group issued a report on the financial crisis and in it they stated, “…weaknesses in risk management and internal controls contributed to industry distress during the financial crisis.” Similarly, weak risk management practices and internal controls could lead to significant losses or delays in a large construction project.
Companies need to learn the lessons of the financial crisis and embed risk management and internal control into all processes, especially construction. The first step to improving risk management and internal control is to leverage the principals of audit. An audit, in this case a construction audit, provides the foundation.
Construction Auditing starts with the Construction Contract
A construction contract will include a variety items such as project description, project timeline, cost estimate, payment terms, documentation requirements and sections on insurance and indemnification. However, the contract should also include certain provisions to specifically protect the owner’s interest. The American Institute of Architects provides a series of standard construction contracts which can be used as a template for construction projects. While these templates provide a solid framework, they are not necessarily written with a bias towards owners rights. Provisions such as “Right-to-Audit” and “Change Orders” plus other internal control enhancements need to be customized. These modifications will improve the owner’s control over project costs, allow for recoveries, and are necessary to strengthen the ability to audit.
"The audit is an integral part of the construction project process. Performed well by seasoned professionals it will assure the Owner that financially they received the product contracted and paid for."
Knowing what to modify and even how to modify is not common knowledge and can’t be done through the legal review process. It is critical to have this review completed by an experienced construction audit professional and it should be done prior to executing the contract. Doing so will save thousands, if not hundreds of thousands of dollars throughout the project.
Pro Bono Construction Contract Health Check
Are you confident in your construction contracts, but would like a second look? For a limited time, Vonya Global will provide a pro bono review of your construction contracts. Certain limitations apply, please call or email for additional information.
Tuesday, October 13, 2009
Fraud Detection Workshop in Chicago October 27 - Afternoon Session Added
About the Workshop
Fraud schemes are not complex. Yet, fraud is rarely caught until it is too late. Why? Understanding the fraud scheme is not enough. Identifying the fraud concealment strategy and how it is portrayed in data is the only way to detect fraud. It is essential to learn how to detect fraud before it is too late.
Data mining is the key tool to locate and recognize fraudulent transactions. This workshop will demonstrate:
- How to build a fraud scenario approach
- How to map data fields to fraud scenarios
- How to interpret data for patterns and frequency of fictitious vendors
- How to build the fraud audit plan to include data mining
Please visit the Vonya Global website to register or request additional information.
Thursday, October 8, 2009
SEC: In-House 404 Costs Top Audit Fees (from CFO.com)
"Although larger companies incur higher compliance costs, smaller companies incur higher scaled costs (i.e., relative to their assets) on average," the SEC wrote in a report released Friday.
Second, internal SOX compliance costs are larger than external audit fees by a large percentage. This comes directly from the CFO.com article:
"What may come as a surprise is that the majority of Sarbox-compliance costs aren't going into auditors' pockets; rather, companies' in-house work to follow the 2002 law's internal-controls provision — Section 404 — is more largely to blame for the expense. The highest cost of Sarbox, the SEC said, is "internal labor costs," followed by audit fees and then costs related to another third party, such as a consultancy, used for help with compliance."
This all comes on the heels of the 4th extension the SEC has given Small Caps to comply with Section 404 of the Sarbanes-Oxley Act. As stated in an earlier post, Vonya Global has a proprietary methodology for helping Small Caps and IPO companies comply with the rigors of Sarbanes-Oxley. Sox OnPOINT™ is a top-down risk based approach which streamlines the compliance effort and is consistent with the PCAOB Audit Standard Number 5. Sox OnPOINT™ helps our clients reduce the cost of compliance.
For more information please visit our website or send us an email.
Wednesday, October 7, 2009
Small Caps Get Another SOX Reprieve
http://www.vonyaglobal.com/sarbanes-oxley-sox-sarbox.html
The full release from the SEC can be found at: http://www.sec.gov/news/press/2009/2009-213.htm
Tuesday, September 29, 2009
2010 Hot Internal Audit Topics - what will be on top of your list?
Monday, September 28, 2009
FINAL REPORT: Strategic Plan for Fraud Prevention, Fraud Detection, and Fraud Deterrence
"Companies should do more to deter and detect fraud. Costs go far beyond the simple dollars someone steals or gains through materially misstated financial statements. Loss to employees and stockholders can be substantial.”
- Internal Auditor Response
Historically, there have been several studies conducted about fraud and fraud statistics, but none that deal directly with the strategic plans to manage fraud risks. The timing of this study is appropriate due to the heightened sensitivity to fraud due to the economic conditions. It seems more groups, including regulatory bodies, investors, clients, and suppliers are increasingly concerned about the ability to demonstrate effective fraud prevention and fraud detection strategies.
One of the goals of this report is to help organizations begin to evaluate the investment in fraud prevention, fraud detection, and fraud deterrence to determine if there are more effective ways to manage fraud risk.
A copy of the full report can be downloaded by following this link: Fraud Prevention, Fraud Detection, & Fraud Deterrence Report
Tuesday, September 22, 2009
Fraud Detection: An Executive Briefing on Data Mining Techniques
Fraud Detection Workshop, October 27, 2009
Fraud schemes are not complex. Yet, fraud is rarely caught until it is too late. Why? Understanding the fraud scheme is not enough. Identifying the fraud concealment strategy and how it is portrayed in data is the only way to detect fraud. It is essential to learn how to detect fraud before it is too late.
Data mining is the key tool to locate and recognize fraudulent transactions. This workshop will demonstrate:
- How to build a fraud scenario approach
- How to map data fields to fraud scenarios
- How to interpret data for patterns and frequency of fictitious vendors
- How to build the fraud audit plan to include data mining
The workshop will be held in