PART II CONTROL AND AUDIT OF ACCOUNTING INFORMATION SYSTEMS
for
authorizing the hiring of employees and for
recording employee hours, he did not need to prepare or handle the paychecks. The company mailed the checks to the address he specified.
In a system with effective separation of duties, it is difficult for any single employee to embezzle successfully. Detecting fraud where two or more people are in
collusion to override controls is more difficult because it is much easier to commit and conceal the fraud. For example, two women at a credit card company colluded. One woman authorized
new credit card accounts, and the other wrote off unpaid accounts of less than $1,000. The first woman created anew account for each of them using fictitious data. When the amounts outstanding neared the $1,000 limit, the woman in collections wrote them off. The process would then be repeated. They were caught when a jilted boyfriend seeking revenge reported the scheme to the credit card company.
Employees can collude with other employees, customers, or vendors. The most frequent employee/vendor collusion includes billing at inflated prices, performing substandard work and receiving full payment, payment for nonperformance,
duplicate billings, and improperly purchasing more goods from a colluding company. The most frequent employee/customer collusion includes unauthorized loans or insurance payments, receipt of assets or services at unauthorized discount prices, forgiveness of amounts owed, and unauthorized extension of due dates.
SEGREGATION OF SYSTEMS DUTIES In an information system, procedures once performed by separate individuals are combined. Therefore, any person who has unrestricted
access to the computer, its programs, and live data could perpetrate and conceal fraud. To combat this threat, organizations implement
segregation of systems duties. Authority and responsibility should be divided clearly among the following functions:
Share with your friends: