Chapter 2

CASH DISBURSEMENTS CYCLE

LEARNING OBJECTIVES

After completing this section, you should be able to do the following:

     Recall typical controls in the cash disbursements cycle.

     Identify various forms (electronic or paper) used in the cash disbursements cycle.

     Recall the processes in the cash disbursements cycle's various phases.

     Identify various types of errors or fraud that can occur if the cash disbursements cycle does not have adequate procedures or adequate segregation of duties in the ordering, receiving, and warehousing phases.

Cash Disbursements

The cash disbursements cycle encompasses payments that originate from various accounting subsystems. For example, cash disbursements transactions for goods purchased for resale in a retail store originate in the company's purchasing and receiving subsystems of the acquisitions cycle. Cash disbursements for payroll originate in the personnel and payroll subsystems. Some cash disbursements are based upon loan obligations and require periodic payments of interest and principal on either secured or unsecured debt (financing subsystem). In addition, funds are paid for property, plant, and equipment and investments (investing subsystem).

Cash disbursements can be made in different ways. Many smaller companies use the traditional method for cash disbursements, which requires the generation of paper checks that are mailed to vendors. Larger companies use a cash disbursements method that has existed for decades—Electronic Data Interchange (EDI). Oftentimes companies do not issue paper checks or make electronic disbursements as they have their bank account drafted for recurring payments—such as rent or utilities.1 Many payroll systems do not require the issuance of a paper check, but rather an electronic transaction file is generated which provides direct deposit to the employee's bank account. In addition, for other expenses, many profit and not-for-profit entities provide their employees with procurement cards to purchase items of a relatively low dollar amount.

The types of controls that should exist in a cash disbursement system vary widely depending upon the system from which the cash disbursement originates and how the cash disbursement is made. However, certain controls, such as segregation of duties, should be established in all types of cash disbursement systems. A typical cash disbursement system that focuses on segregation of duties is discussed in the following text.

Typical Cash Disbursements System

RETAIL STORE EXAMPLE

A retail store's largest volume of cash disbursements is for purchases of inventory. A retail store's purchasing department orders inventory from approved suppliers. A sequentially numbered purchase order is sent from the purchasing department to the vendor, receiving department, and accounts payable. For illustrative purposes, assume all goods are shipped FOB shipping point.2 When received by the retail store, the receiving department will inspect and count the goods, complete a numerically sequenced receiving report, and forward a copy of the receiving report and packing slip (exhibit 2-1) to accounts payable.3 The packing slip contains information as to the items that were shipped, items on backorder, shipping address, billing address, customer purchase order number, and vendor contact information.

The accounts payable department receives invoices (exhibit 2-2) from vendors which contain, among other items, payment terms (such as 2/10, Net 304), a list of goods that were shipped, purchase discounts (if any), and total amount due. An employee in the accounts payable department matches the appropriate purchase orders, packing slips, receiving reports, and vendor invoices. This provides evidence that the purchase was authorized and the goods were received. The vendor's packing slip and invoice also provide evidence as to the quantity of goods that were shipped. The accounts payable department then forwards copies of the invoices to the general ledger department to update the accounts payable control accounts. The accounts payable department then updates the accounts payable subsidiary accounts based upon a review of all documents.

In many formal payment systems (such as those used by government entities), a formal voucher packet is created for all disbursements, including purchases from vendors. The numerically sequenced voucher packet for purchase of vendor goods typically contains the purchase order, receiving report, packing slip, and vendor invoice. A voucher form on the front of the voucher packet includes information such as the relevant purchase order number, account distribution, method of payment (check, direct deposit, EDI, and so on), vendor invoice number, and approval signature. An example of a voucher form is contained in exhibit 2-3.5 As in the non-voucher system discussed previously, the accounts payable department will forward a copy of the invoice to the general ledger department to update the accounts payable control account.

Many companies do not maintain a separate accounts payable account for each vendor because they pay by invoice, not by vendor statement. The total of all outstanding invoices by vendor would equal total accounts payable. Some companies maintain both a file of outstanding invoices by vendor and an accounts payable file for each vendor, as well as a related accounts payable control account within the general ledger.6 An accounts payable account for each vendor allows the retail store to review all transactions with each vendor, including purchases, payments, discounts taken, and more. Periodically, the balance of all subsidiary accounts payable accounts should be reconciled to the accounts payable general ledger account. Any differences should be resolved by appropriate personnel.

Most vendors send monthly statements that contain their customers' beginning balances of accounts receivable (accounts payable for the buyer), transactions that occurred during the month, and ending balances of accounts receivable. Accounts payable (of the buyer) should reconcile their balance of accounts payable with the balance of accounts receivable contained on the monthly statement provided by the vendor. Note that the companies that do not have a subsidiary or control account for accounts payable will find this reconciliation to the vendors' statements difficult to perform. Without a control account, the reconciliation process is typically a manual process as all of a particular vendor's invoices need to be added to create the accounts payable balance for each vendor.

In the example of the retail store, the accounts payable department forwards an approved voucher package to the cashier and a copy of the voucher form to the general ledger department. Note that the accounts payable and general ledger departments report to the controller. The cashier reports to the treasurer. The cashier will prepare a check based upon the information on the voucher package. The voucher package and check are sent by the cashier to an authorized employee in the treasurer's department who will review the documentation that supports the check.7 This authorized employee will sign the check and the check will be mailed by another employee. Checks over a certain dollar limit should require dual signatures. To prevent paying the same invoice twice, the voucher package is cancelled by the check signer and returned to the accounts payable department. A payment notice is sent from the check signer to the general ledger department to update the accounts payable control account.

The cashier and the check signer will account for the numerical sequence of the voucher packages. The accounts payable department will account for the numerical sequence of cancelled voucher packages.

A flowchart of the cash disbursement cycle (where no voucher payable system is maintained) is presented in exhibit 2-4.8

KNOWLEDGE CHECK

1.     The accounts payable and general ledger departments should be under which division?

a.     Treasurer.

b.     Controller.

c.     Chief Executive Officer.

d.     Chief Legal Officer.

2.     What document is forwarded from the accounts payable department to the cashier?

a.     Voucher package.

b.     A completed check, except for signature.

c.     A sales order.

d.     A bill of lading.

OTHER CONTROLS

Some additional controls that are relevant to the cash disbursements process not included in the flowchart include the generation of a check register for all issued checks and the periodic reconciliation of the bank account by an independent employee.

In the retail store example, all goods are shipped to the retailer FOB shipping point. This means that the sale occurs at the point the goods leave the vendor's dock. In order to provide assurance that the retail store's accounts payable is not understated at year-end, the retail store should perform purchase cut-off procedures. These procedures require the retail store to examine all numerically sequenced receiving reports for several days after year-end to assess if the received goods were shipped on or before the year-end date. This information should be contained on the bill of lading that is provided by the common carrier. The bill of lading should be attached to the receiving report. The retail store should record a liability (increase accounts payable) and increase inventory for all goods that were shipped FOB shipping point on or before the year-end date for those purchases that had yet to be recorded.

image Exhibit 2-1 Packing Slip

image

image Exhibit 2-2 Vendor Invoice

image

image Exhibit 2-3 Voucher Example

image

image Exhibit 2-4 Cash Disbursements

image

Internal Controls in the Example Retail System

SEGREGATION OF DUTIES

Segregation of duties (using the example retail system) exists between bookkeeping, access to assets, independent reconciliation, and authorization of transactions. These duties are segregated as follows:

     Bookkeeping — Performed by the accounts payable and general ledger departments. These departments are under the controller's division.

     Access to assets — Checks are prepared by the cashier's department. Checks are signed by an approved check signer. Checks over a certain dollar amount require an additional signature by an appropriate employee. Checks are mailed either by the check signer or his or her subordinate promptly after they are signed. Both the cashier and the check signer are under the treasurer's division.

     Authorization of transactions — All transactions are approved both by the requesting department and the purchasing department. A list of approved vendors is maintained and purchases may only be made from vendors on this list.

     Independent reconciliation — Periodically, the subsidiary accounts payable is reconciled to the control account. The bank account is reconciled by an independent employee.

OTHER CONTROLS

In addition to separation of duties, there are numerous other controls present in the various cash disbursement systems presented previously. These controls include the following:

     Accounts payable matches the vendor's invoice with the respective receiving report, purchase order, and packing slip.

     The accounts payable department updates the subsidiary accounts payable account based upon a review of the receiving report, purchase order, vendor invoice, and packing slip.

     A copy of the voucher form is transmitted to the general ledger department so that the accounts payable control account can be updated.

     The cashier prepares a check based upon a review of the voucher package received from the accounts payable department.

     The cashier and the check signer account for the numerical sequence of the voucher packages.

     The check is recorded in a check register.

     The check signer signs the check after a review of all supporting documentation.

     The voucher package is cancelled by the check signer and returned to accounts payable.

     A payment notice is sent to the general ledger department to update the accounts payable control account.

     The subsidiary accounts payable is totaled and the total is compared to the amount in the accounts payable control account.

     The vendor's statement is compared to the balance in the subsidiary accounts payable account. Any differences are reconciled.

     Purchase discounts are taken based upon the terms of the discount and company policy.

There are additional controls surrounding checks which should be incorporated into a cash disbursements system. These controls include the following:

     Checks should not be made payable to cash.

     Checks should not be signed in advance of preparation of the check. (No signing of blank checks.)

     Long outstanding checks should be investigated by employees independent of the accounts payable and cash disbursements functions.

     Voided checks should be cancelled and retained.

     Unissued checks should be safeguarded. (Note that payee positive pay will be addressed later in this course as an additional control.)

     Journal entries to cash accounts should be reviewed by supervisory personnel.

     Checks to unknown vendors should be investigated by appropriate personnel.

     Any check that is to be mailed to a vendor's address other than the address that has been used consistently for vendor payments should be investigated.

     Checks that are written to employees for other than payroll or expense reimbursement should be reviewed by appropriate personnel.

     Any out-of-sequence checks should be investigated.

Errors, Fraud, and Controls

A large number of errors and frauds could occur in the cash disbursement cycle if the controls discussed previously are not implemented. The types of errors and fraud that might occur are addressed in the following section.

SEGREGATION OF DUTIES

If there is not adequate segregation of duties between the bookkeeping, authorization of transactions, access to assets, and independent reconciliation functions then any of the following could occur (the list is not exhaustive):

If the duties are not separated between the check signer and the cashier, then the cashier could write a check in an amount greater than the amount on the voucher package and mail the check to a valid vendor. The cashier could then receive a kickback from the vendor for the amount paid in excess of the valid amount contained on the voucher package.

The individual reconciling the bank account could detect this fraud, as the amount of cash in the bank would be less than the amount of cash in the bank on the general ledger. This is because the check would have cleared the bank at a greater amount than the general ledger department recorded (because the general ledger account recorded the amount listed on the invoice). If the general ledger department received a payment notice that did not equal the amount on the invoice copy then this would be a red flag that the cashier or check signer had either made an error or perpetrated a fraud.

Additionally, if the person performing the independent reconciliation compared the amount of the check with the amount in the check register then the fraud would be detected. The amount of the check in the check register would be less than the amount contained on the cancelled check.

If the duties are not separated between the cashier and the accounts payable bookkeeper then the person with these combined duties could create a fictitious voucher package (creating a fictitious receiving report, shipping notice, and purchase order) and submit the voucher package and a check to the check signer. The voucher package could have a mailing address that is not the real address for a valid vendor, but rather an address that causes the check to ultimately be delivered to the cashier or accounts payable bookkeeper.9 The bank account would reconcile. The general ledger department would receive a payment notice from the check signer for the same amount that is indicated on the invoice copy provided by the cashier or accounts payable bookkeeper.

The fraud might be discovered if the check signer compared the address on the vendor address to the address on the vendor invoice and noticed the differences in addresses. This fraud might also be discovered when a physical inventory is taken and the actual amount of inventory is lower than what is recorded on the books.10

Assume that the check signer does not promptly mail the check. Rather, the check signer returns the signed check for mailing to the cashier. Additionally, the voucher package is also given to the cashier for cancellation. The cashier transmits the cancelled voucher package to accounts payable.

What could happen? The cashier, after receiving the check and voucher package back from the check signer, could change the valid vendor's name imprinted on the check to a “knock off” name. For example, if the vendor's name was j. H. Amos then the knock off name of j. H. Amostoine could be created by the cashier typing the letters ”toine" after Amos on the check. The check to J. H. Amostoine could have a forged endorsement of J. H. Amostoine and the check could be deposited to a coconspirator's account or cashed (through the use of a second endorsement). Additionally, the cashier would not stamp “cancelled” on the voucher package because it will be submitted a second time for payment as described more fully in the following paragraph.

However, the valid vendor is still expecting payment. The cashier would then resubmit the same uncancelled voucher package to the check signer and then follow proper procedures of mailing the check and transmitting the cancelled voucher package to the accounts payable department and a payment notice to the general ledger department. The bank account would not reconcile as the amount of cash in bank on the books would be more than the actual amount of cash in the bank by the amount of the forged check to J. H. Amostoine. This fraud might also be detected if the check signer accounted for the numerical sequence of all voucher packages and noticed that he or she was approving the same voucher twice.

If duties are not separated between the accounts payable bookkeeper and the check signer then, similar to situation number 1, the perpetrator could create a fictitious voucher package. This fictitious package could include a fictitious invoice that would cause the check to be mailed to the perpetrator or an accomplice. However, unlike situation number 1 mentioned previously, this fraud would not be detected by an independent reconciliation of the bank statement.

The bank account would balance. The general ledger department would receive a payment notice from the cashier that equaled the amount on the invoice copy sent to the general ledger department by the accounts payable bookkeeper or check signer. The accounts payable bookkeeper or check signer cancels and retains the fictitious voucher package.

This fraud might be discovered if the account charged for the fictitious acquisition was reviewed by management personnel for reasonableness. Additionally, an attentive general ledger department employee might notice that the account classification did not correlate with the information on the invoice. A comparison of the vendor with the approved list of vendors by an independent employee might also detect this type of fraud.

If the accounts payable employee was also in charge of the general ledger then the perpetrator could create a fictitious voucher package and cause a check to be sent to either the perpetrator or an accomplice. The fraud could be spread out across multiple general ledger accounts such that no one account would appear to be significantly out of line with expectations.

This fraud could be detected if either the cashier or the check signer compared the payee and payee's address with information on the approved vendors list.

Other types of fraud or errors that could occur that are not due to inadequate separation of duties are addressed in the following list. This list is not exhaustive.

If accounts payable does not match the vendor's invoice with the respective receiving report, purchase order, and packing slip then the entity might pay for goods that were not received or goods that were received that were of a substandard quality. Additionally, the invoice might have a pricing error or a price that is greater than the price contained on the purchase order.

If the accounts payable department updates the subsidiary account based solely upon the vendor's invoice, and the invoice is incorrect due to an incorrect number of items shipped or pricing errors, then accounts payable in the subsidiary and general ledger would be either over or understated depending upon the nature of the error.

If the cashier prepares a check and the check signer signs a check based upon review of an invoice and not a voucher package, then, similar to situation number 2 noted previously, the vendor might be overpaid or underpaid.

If the cashier and the check signer do not account for the numerical sequence of voucher packages then a voucher package might be missing and not found in time to take advantage of cash discounts. Additionally, as noted previously in the separation of duties examples, it might be discovered that the same voucher package is being submitted twice, which might be indicative of internal fraud (check being mailed to the perpetrator for a fake vendor) or collusion with a vendor (kickbacks for duplicate payment).

If a payment notice is not sent to the general ledger department to update the accounts payable control account then the subsidiary accounts will not balance to the general ledger account. In addition, financial statements might be produced that contain material misstatements of accounts payable and cash.

If the subsidiary accounts payable is not reconciled to the general ledger accounts payable control account then posting errors could occur in either the subsidiary or control account and not be detected on a timely basis. This might result in the production of materially misstated financial statements.

If the bank statement is not reconciled by an independent employee then errors in either cash disbursements or cash receipts might not be detected in a timely manner. In addition, an independent bank reconciliation might detect errors and frauds, which were previously discussed in the separation of duties section.

If the vendor's statement is not reconciled to the accounts payable subsidiary ledger then errors in accounts payable might not be detected in a timely manner.

If purchase discounts are not taken then the company might be paying an excessive imputed interest rate for short-term financing.

If checks are made payable to cash, then anyone could cash the check. For example, the bookkeeper, who has access to the checks, could make payments of personal expenses by taking a check, making it payable to cash, and then either cashing the check or giving it to whomever the bookkeeper is indebted. This fraud would be caught if there were a separate independent reconciliation of the bank statement as cancelled checks are typically reviewed by the reconciler. A check made payable to cash would arouse suspicion.

If checks are signed in advance of preparation of the check, as might be done in many small businesses when all check signers need to be absent for a period of time, then a dishonest cashier could take the check and make it payable either to cash, to a fictitious vendor, or to an accomplice. As in the preceding situation, this fraud may be detected by an independent bank reconciliation via review of the cancelled checks by the reconciler.

Long-outstanding checks should be investigated as to why they have not been cashed. For example, the entity might have issued a check to a vendor that states “paid in full” and the vendor may not cash the check as the vendor's books indicate that, in order for the account to be paid in full, the amount of the check should be higher than what is on the check.

Another possible reason that the check has not been submitted for payment in a timely manner is that the check could have been lost or stolen. All long-outstanding checks should have a stop payment order issued to the bank just in case the check had been stolen or lost. If the long-outstanding check is not cancelled then the amount of the check might, depending upon the jurisdiction, be escheated to the state.

If voided checks are not cancelled and retained, then a perpetrator could steal a check and state that it was voided and discarded. This fraud could be detected by an independent bank reconciliation as the bank account balance would be lower than the amount of cash on the books by the amount that is on the “voided” check.

Unissued checks should be physically safeguarded to prevent their theft. A periodic accounting for the numerical sequence of unissued checks should be considered depending upon an assessment of the risk of theft of checks.11

Journal entries to cash should be reviewed for appropriateness by supervisory personnel. For example, a bookkeeper who writes checks and also reconciles the bank statement could steal cash by debiting miscellaneous expense and crediting cash for a check issued to either the bookkeeper or an accomplice.

Checks made payable to unknown vendors should be investigated by appropriate personnel. A control would be to require all vendors be on an approved-vendors list.

Checks should be reviewed to assess if vendors are having checks mailed consistently to the same address. If this is not done then a check could be made out to a valid vendor but intercepted by a perpetrator. The check could also be sent to the perpetrator's address.

All checks written to employees for other than payroll or expense reimbursement should be investigated.

If a cancelled check is not in the bank statement (or a check image is not provided), an investigation should take place. This could be a red flag for fraud.

A failure to mail checks promptly after they are signed might cause the entity to forego early-payment discounts. This also could allow for a kiting scheme.

Out of sequence checks should be investigated to assess if they were possibly stolen from the check stock.

All voided sales should require proper approvals. If a voided sale is not approved by a supervisor then, for example, at a retail store, the cash register clerk could void a valid sale and steal cash that is equal to the amount of the voided sale.

CHECK IMAGES

It should be noted that many entities do not receive cancelled paper checks or paper bank statements. Instead, these entities receive scanned images of checks and electronic bank statements. Auditors and others in the control community should be advised not to rely upon images of checks and bank statements without understanding and testing the system and controls used to obtain and retain the integrity of these documents (such as passwords and other access controls to these electronic documents). These images can easily be modified with the use of software that allows a user to modify PDF and similar files. Bluebeam software is an example of this type of software (see: www.bluebeam.com).

Control Matrix

An example of a control matrix that lists several controls presented in the cash disbursements cycle is presented in exhibit 2-5. Note that one control can achieve multiple objectives or assertions. Also note that the controls listed may address objectives or assertions in other cycles and objectives or assertions outside of purely financial reporting risks.

image Exhibit 2-5 Control Matrix

Cash Disbursements Cycle (not a complete list)

Cash disbursements are for goods received (occurrence) Cash disbursements are recorded (completeness) Cash disbursements are recorded accurately (accuracy) Cash disbursements are classified correctly (classification) Cash disbursements are recorded in the proper time period (cutoff)
Control Activities
Receiving report is sent to A/P X
Matching of purchase order, receiving report, and vendor invoice X X X
Accounting for the numerical sequence of receiving reports, purchase requisitions, and purchase orders X
Purchase cutoff procedures are employed at period end X
Vendors' invoices are reconciled to subsidiary A/P X X X

Services

Many businesses have increased the nature and extent of outsourcing for services. Unlike the acquisition of goods, it is oftentimes more difficult to determine if services of a certain quality were actually provided. If substandard goods are acquired and resold, then the company might experience a higher rate of sales returns when compared with either expectations or historical performance. If goods are stolen or never received (such as in a vendor kickback scheme) then this is generally discovered when an independent count of inventory is made. Unfortunately, it is much more difficult for companies to assess if a service of a certain quality was provided.

For example, a branch location might inform the corporate office that a janitorial service company was engaged to perform cleaning services five days a week. The janitorial service would send an invoice for cleaning five days a week and the fee might appear reasonable to supervisory personnel at the corporate office. However, the branch manager could be in collusion with the janitorial service and the service might only actually clean two or three days a week. The branch manager could be paid a kickback for the extra days that the janitorial service was paid for providing a service but, in reality, did not provide the service.

Some controls over service acquisitions include the following:

     Require a minimum number of bids for all new services.

     Require re-bids for continuing services every few years.

     Have supervisory personnel or internal audit (or both) conduct surprise visits on the days services are to be provided.

     Have supervisory personnel or internal audit (or both) review the quality of the services that are provided.

     Determine if company employees have any ownership or other related-party interests in the companies that provide services.

     Require contracts for all services that specify expectations (service performance deadlines, quality of service, and so on).

     Establish budgets for all services and investigate variances from budget.

     If applicable, use webcams to observe performance of the service, such as a lawn service applying fertilizer to the company's greenspace.

Electronic Data Interchange (EDI) Overview

EDI is a variation of the cash disbursements methods that were discussed previously. EDI is employed by many larger entities. A brief overview of EDI is provided in the following paragraphs.

Many larger entities began using EDI in the banking and automobile manufacturing industries in the 1960s. EDI is the electronic exchange of business transactions, in a standard format, from one entity's computer to another entity's computer through an electronic communications network. A special type of EDI is electronic funds transfer (EFT), which is a money transfer system that banking and financial institutions provide worldwide. EFT is considered the settlement of an EDI transaction.

EDI can be used for a wide range of activities. However, it is commonly used for purchasing, processing accounts payable, invoicing, and financial applications. In these systems, EDI replaces paper purchase orders, invoices, shipping forms, and other documents with electronic transactions that conform to a standard format. EDI systems may change an entity's workflow, as they typically do not use paper documents to initiate transactions, but rather use electronic records transmitted between trading partners.

EDI continues to be a major method used by many businesses to facilitate the completion of electronic purchasing transactions. Many of these EDI systems interface with entities' existing legacy systems. Many companies still have not incurred the costs to migrate from traditional EDI systems to more advanced types of systems utilizing the internet. EDI serves as a model for other types of e-commerce that have emerged in the latter part of the twentieth century and are emerging in the twenty-first century. Additionally, many smaller businesses that supply larger businesses and government agencies have been pressured to conduct transactions with their customers using EDI or risk losing the revenues provided by larger entities.

Many of the controls associated with paper-based cash disbursements systems are also appropriate in a predominantly electronic environment. For example, all purchases should be approved by an appropriate employee and there should be an approved list of vendors. Received goods should be counted and inspected for quality. A receiving notification should be sent to accounts payable, together with the receiving report. With EDI, the vendor sends an electronic invoice to the customer. An electronic payment should be made to the vendor only after matching of the purchase order, receiving report, and invoice has taken place. A physical inventory should be conducted periodically. There should be an accounting for the numerical sequence of all transactions. Budgets should be established for all acquisitions, and variances should be investigated by appropriate supervisory personnel.

Cash Disbursements Fraud Statistics

The Association of Certified Fraud Examiners issues an annual report based upon the results of a survey to its members. The “Report to the Nations on Occupational Fraud and Abuse” 2016 Global Fraud Study reported median losses and length of fraud for the cash disbursement frauds involving billing, check tampering, expense reimbursements, payroll, cash register disbursements, and cash on hand. Statistics concerning these types of cash disbursements frauds are contained in exhibits 2-6 and 2-7.12

Billing frauds (previously discussed) could include creation of a fictitious vendor by internal personnel. Additionally, employees could receive kickbacks from vendors due to the vendors' charging above-market prices, shipping substandard products, or shipping less than what was ordered.

image Exhibit 2-6 Median Loss by Type of Cash Disbursement Fraud

Cash Disbursement Fraud Scheme
Median Loss   
Billing – Payment of invoices for fictitious goods or services, inflated invoices, or personal purchases
$100,000   
Check tampering - Forgery or alteration of checks; stealing legitimate check to another payee
158,000   
Expense reimbursements - Employee claims reimbursement for fictitious or inflated business expense
40,000   
Payroll - Issuing payment for false claims for compensation
90,000   
Cash register disbursements - False entries on a cash register to hide theft of cash
30,000   
Cash on hand - Theft of cash on hand (for example, vault cash)
18,000   

image Exhibit 2-7 Length of Time Fraud Went Undetected

Cash Disbursement Fraud Scheme Median Duration of Fraud (In Months)
Billing - Payment of invoices for fictitious goods or services, inflated invoices, or personal purchases 24
Check tampering - Forgery or alteration of checks; stealing legitimate check to another payee 24
Expense reimbursements - Employee claims reimbursement for fictitious or inflated business expense 24
Payroll - Issuing payment for false claims for compensation 24
Cash register disbursements - False entries on a cash register to hide theft of cash 13
Cash on hand - Theft of cash on hand (for example, vault cash) 19

KNOWLEDGE CHECK

3.     According to the Association of Certified Fraud Examiners study, the largest median loss of cash disbursement frauds was due to

a.     Payroll schemes.

b.     Check tampering.

c.     Cash on hand.

d.     Expense reimbursements.

Cash Disbursement Frauds Other Than Billing

CHECK TAMPERING

Check tampering frauds were listed as a major category of cash disbursement frauds in the Association of Certified Fraud Examiners study. According to this study, check tampering schemes have the highest median loss of fraud and is one of the longest running schemes. Even though there has been an increase in the use of debit cards and electronic banking to pay bills, checks still are used for many consumer-to-business and business-to-business transactions. Many small businesses still use paper checks to pay vendor invoices. Larger entities typically use electronic payment methods, such as EDI, and thus avoid many types of fraud due to check tampering that are discussed in the following paragraphs.

There are numerous ways a perpetrator can steal cash from a business by tampering with checks. Usually check tampering schemes can occur and not be detected if there is not adequate separation of duties in the cash disbursement cycle. For example, an employee who prepares the check, provides the check to an approved signer, mails the check, and reconciles the bank account can write checks to themselves or a fictitious vendor, cash the checks, and not be detected. In this system, the employee could bypass the control that requires an approved signer to sign the check by forging the signer's signature.

Another common check-tampering scheme, mentioned previously, is when a perpetrator prepares a check and related fraudulent supporting documentation for a valid vendor, but provides a payment address that is not the vendor's real payment address—but one used by the perpetrator.

INTERESTING FACTS ABOUT CHECK VOLUME AND FRAUD SCHEME

Various organizations have conducted studies on check volume and fraud payment schemes. Highlights of some of these studies are presented subsequently.

Unlike many consumer-to-business transactions, many businesses still issue paper checks.

The 2016 Federal Reserve's Payments Study noted the following:

The number of check payments fell to 17.3 billion from 2015 to 2016 with a value of $26.83 trillion, down 2.5 billion or $0.38 trillion since 2012. Check payments fell at an annual rate of 4.4 percent by number or 0.5 percent by value from 2012 to 2015. The decline of checks over the period 2014 to 2015 was slower than previous studies had shown for prior periods since 2003.

Notable in the data for the 2016 study, however, is that the decline in check payments has leveled off somewhat, with the annual rate of decline by number dropping to 4.4 percent from 2012 to 2015 compared with 6.2 percent from 2000 to 2012. The annual number of check payments is estimated to have declined by 0.8 billion per year since 2012, in contrast to the 2000—12 period when check payments are estimated to have declined by about 1.9 billion per year.

While checks start out as paper, since the Check 21 law went into effect in late 2004, check clearing has changed. Checks are overwhelmingly processed electronically once they enter the banking system and are increasingly being scanned and deposited electronically by businesses, often using accounting applications, and individual payees using mobile devices.13

A study by Association or Financial Professionals, 2016 Payments Fraud and Control Survey, noted that there was a significant increase in payments fraud between 2014 and 2015 as 62 percent of those organizations surveyed had experienced actual or attempted payments fraud in 2014 and this increased to 73 percent of those surveyed in 2015. Another interesting finding is that there is an increase in Business Email Compromise (BEC) fraud where a perpetrator tricks an employee to make fraudulent payments.14

CHECK FRAUD CASE

A cash disbursement fraud scheme does not require a perpetrator to use a company check to steal from the corporate bank account. The perpetrator only needs to know the victim's checking account bank routing number and account number. The perpetrator can then input the victim's bank routing number and account number on a form at an online check supply company, such as www.checks.com, and create fictitious checks. Alternatively, the perpetrator could go to a local office supply store, obtain blank check stock, and print their own checks with the victim's bank routing number and account number. See exhibit 2-8 for an example of a fictitious check created from a website.

How does a thief obtain funds from a victim's bank account? One method requires the perpetrator to place the victim's bank routing number and account number along with a fake name and address on the check. The check is then taken to a local retailer who will process the check (run it through a reader and encode the amount) and hand the check back to the perpetrator. The store employee might request the perpetrator to provide an identification card. The perpetrator will then provide a forged identification card with the perpetrator's picture and the same fictitious name and address that is on the check. The victim's bank account is ultimately debited for the amount of the check. If the victim's bank account balance is more than the check amount then the check will clear. The victim or company will not discover the fraud until the entity's bank account is reconciled.

A control that could help mitigate this type of fraud is positive pay.

KNOWLEDGE CHECK

4.     Which fraud scheme uses email to deceive an employee to make fraudulent payments?

a.     BEC.

b.     ATM.

c.     Check 21.

d.     EDI.

image Exhibit 2-8 Fictitious Check

image

WHAT IS POSITIVE PAY?

Positive Pay is an automated fraud-detection tool offered by most banks. Entities send electronic files to the bank which list the checks they have written. When the bank receives the actual checks for processing, the bank matches the account number, payee, check number, and dollar amount of each check presented for payment against the electronic file sent by the entity. If the account number, payee, check number, and dollar amount on the check presented for payment does not match the information in the electronic file, then the bank will not honor (pay) the check.

It is important to note that some positive pay systems do not match the payee information. A seminar participant in Jackson, Mississippi, noted that his company had sent a check to a vendor in the amount of $70,000 and that the company's positive pay system did not match the payee information — just the check number, account number, and dollar amount. One of the vendor's employees intercepted the check, changed the payee information to the perpetrator's name, and absconded with the $70,000.15

HOW DOES POSITIVE PAY WORK?

An exception occurs when a check is presented for payment that is not preapproved by the bank's customer. Typically, the bank sends a fax or an image of the exception check to the bank customer. The bank's customer will review the exception check and then authorize the bank to pay or return the check.

Due to the high incidences of check frauds, many banks require their commercial customers to use positive pay. If the bank's commercial customers do not use positive pay then the commercial customer will bear the loss of the amount of the fraudulent checks paid by the bank.

Cash Register Disbursement Frauds and Theft of Cash on Hand

Cash register disbursement frauds and theft of cash on hand were also cited in the Association of Fraud Examiners study as two of the major categories of cash disbursement frauds. Controls to help prevent these two types of fraud are addressed in the following paragraphs.

The discussion of how a refund should be performed in a retail store will illustrate the types of controls that should be in place to help prevent cash register disbursement frauds. In a retail store, a customer might return merchandise and request either a cash refund or store credit. The customer should be directed to a separate customer service area that is dedicated to processing these types of transactions. The customer should present a sales receipt with the returned merchandise.16 The store employee should inspect the goods and then prepare documentation for either a cash refund or store credit. Based upon the amount of the cash refund or store credit either the store employee will approve the transaction or, if the amount is above a certain designated amount, the documentation will be reviewed and approved by supervisory personnel. If the customer is to be paid in cash then the customer should be required to sign a receipt form acknowledging the amount of cash received. In addition, surveillance cameras should be in place so that these transactions can be observed and recorded. Cash disbursements should not be made at cash registers that are used to process sales transactions.

Management should review these cash refund and store credit transactions to assess if any one customer was consistently obtaining refunds from the same employee. This might indicate that the customer stole the goods (or obtained the goods from a different retail store) and was in collusion with the store employee. The store employee may give the coconspirator cash refunds for stolen merchandise. (The coconspirator would have to present merchandise for a cash refund or store credit because all return transactions are monitored by surveillance cameras.) These perpetrators could conduct fraudulent transactions throughout the year. Each transaction may be of an amount below the threshold that requires supervisory approval. Each individual transaction may not be significant, but the aggregate of all these fraudulent transactions could be material.

Note that the following controls should be in place if the entity uses cash registers (or teller's cash drawers at a financial institution):

     A daily reconciliation of cash funds should be performed by comparing cash and charge tickets in the cash register with the cash register tape and reports provided by IT. This reconciliation should be performed by appropriate personnel, such as the employee who performs the daily sales audit. Any exception items should be investigated by the supervisor.

     Separate cash register drawers should be under the custody of each teller and cashier and the cash register should be closed out and balanced at the end of each shift.

     Cash over or short reporting should be maintained for each teller and cashier and reviewed by supervisory personnel.

     Tellers and cashiers should be prohibited from leaving “IOU” notes in the cash drawer for cash that they temporarily “borrowed.”

     Surprise cash counts of tellers' drawers should be performed throughout the year by internal audit and supervisory personnel.

     Vault cash should be under the custody of at least two employees and counted on a surprise basis by internal audit or supervisory personnel, or both.

Summary

This section addressed typical controls in the cash disbursement cycle of the acquisition process. The classical system requires a receiving report, purchase order, vendor invoice, and shipping document to be attached to a check request form as evidence that the received goods were authorized at an agreed-upon price. Variations of this system include using evaluated receipts settlement (which does not require a vendor's invoice for disbursement) or an all-electronic system such as EDI.

Numerous typical controls that should exist in a cash disbursements cycle were presented and the ramifications in terms of frauds and errors that could occur if the controls were not in place were discussed.

A control matrix was presented to illustrate controls in the cash disbursement phase and the financial statement assertions that were achieved due to the presence of these controls. Additionally, cash disbursement and check tampering fraud statistics were presented as evidence of the significant amount and incidences of these types of fraud.

Cash register disbursement and theft of cash on hand frauds and controls to mitigate these types of frauds were addressed. Surprise cash counts and reconciliation of the cash drawer at the end of each shift were mentioned as two controls to detect these types of fraud.

Practice Questions

1.     Map the following controls to the control objectives contained in the following control matrix. Place an “X” in the box if the control achieves the control objective. Note that one control can achieve several objectives.

Cash disbursements are for goods received (occurrence) Cash disbursements are recorded (completeness) Cash disbursement s are recorded accurately (accuracy) Cash disbursements are classified correctly (classification) Cash disbursements are recorded in the proper time period (cutoff)
Control Activities
Voucher packages are cancelled
The numerical sequence of voucher packages is accounted for by A/P
A check register is prepared
The bank account is reconciled by an independent employee
Checks are prepared based upon the voucher package cover sheet
The receiving department inspects and counts the goods

2.     How should duties be separated in the cash disbursements cycle?

3.     According to the Association of Fraud Examiners' survey, what are the top three median losses by type of cash disbursement fraud scheme?

4.     What is positive pay?

Notes

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset