Professional Documents
Culture Documents
On
Fraud detection and Control Techniques
in
Government Agencies
Presented by
Emeka Ogwu
E- Mail: fesass@yahoo.com
V-Mail: 08033105711,
08088745335
Agenda: Day 1
1.0. Introduction
1.1. Fraud.
- Brief overview
1. 2 A Civil Wrong
– Tea-Break
1.3 Criminal Offence
1.4 A non Common law System
1.5 Remedies of Fraud – Legal Perspective
Launch
• Brain Storming Section
• Participants Opinion
DAY 1
• FRAUD - A LEGAL FRAME WORK
victim.
• AS A CIVIL WRONG
etc, are very good red flag flyers. These abbreviations are usually not
the real names of the companies but are used to conform to names
payment cheques.
• During the past year, stock prices have plummeted, the housing
market has collapsed, and the economy has faltered. The ripple
effects from these events have caused significant financial
difficulties for many people. Accordingly, the temptation for
employees to commit fraud schemes as a quick way of getting cash
has increased significantly.
• This financial pressure to commit fraud is one of the three
components of the “fraud triangle,” along with rationalization and
the perceived opportunity to commit fraud. These three components
are present in every fraud.
• While pressure and rationalization are largely out
of a government’s hands, governments do have
the ability to reduce perceived and actual
opportunity.
• FRAUD TRIANGLE
•
PROTECT YOUR BUSINESS
AGAINST FRAUD
• BRIAN STORMING
QUIZ SECTION
• It is evidently clear that there was no dispute about the forgery –
the signature wasn't even close. And the bank admitted that it did
not verify the signature before cashing the cheque, and then
allowed it to clear. Nonetheless, the client's responsibility was also
clear – he should have ensured the blank cheques were secure.
• In our interview with the client, he confirmed that he did not
remember receiving the blank cheques. He then suggested several
places where they might have been stored in his home, but he
couldn't be sure. We also considered that on the specific cheque
used in the transaction, the forger had to add the name and
address manually, which was correctly done.
• REQUIREMENT
fraudulent one. It can only indicate that this object is more likely to
• 4.0. Accountability
• 4.1. Overview
• 4.2. The Scope
• Tea Break
• 4.3. Finger Prints of Fraud
• 4.4. Nature of Accountability
• Lunch
• 4.5. Fraud and Accountability
• Brain Storming Section
• Participants Opinion
ACCOUNTABILITY AS FRAUD
DETECTION AND
CONTROL TECHNIQUE:
• OVERVIEW
• One of the major attributes that have eluded the Nigerian policy
transparency.
Each of these components has four attributes
(ANOVA)
of the data.
• 1. There must be timely, honest, accurate, complete, adequate and
relevant information on the actions of those entrusted with public
fund.
• II. There must be external auditor’s independence of the
organization/ ministry/departments being entrusted.
iv. A system must exist which makes all the three elements above
interact.
FRAUD AND ACCOUNTABILITY
The effective performance of the functions of financial management
is today faced with serious challenges of an increasing tide of fraud
in our society. To ensure accountability, fraud must be viewed as
real threat to good governance, effective management and as
enemy of progress in the society as a whole.
• Attitudes and
• Awareness.
• REQUIRED:
– List the procedures you will take to investigate this matter.
– Review the matter before you and document your findings
– Take a decision with respect to this matter, based on your
findings.
Question Time
Agenda: Day 5
appointed by the ruling body. The following are procedures that the
internal audit
committee should perform, as recommended by Edward J.
McMillan, CFE:
to ensure that all that signs are authorised and that there are
no unauthorised accounts.
Meet with the insurance agent to ascertain that coverage is
adequate for all policies, with particular attention to fidelity
bonds.
The internal audit committee should report its findings to the governing
PROMOTING TIPS
The ACFE study noted that 50 percent of uncovered fraud schemes
in the government sector were initially detected through employee
tips. Governments should encourage such tips by developing a
formal whistleblower policy. This policy should describe the method
in which employees can report fraud without fear of retaliation. In
order to make the process more confidential, the government should
consider using a third party “whistleblower hotline.” Under such a
system, a vendor receives phone calls directly from whistleblowers,
logs the information gained from these calls, and reports the issues
to the appropriate government official. Whistleblowers may report
their tips anonymously if they so choose.
For most such hotlines, the costs of implementation and ongoing usage
are not significant.
• CONCLUSION
Location –
Mandate Garden Hotel,
Question Time