Internal Control
Internal Control
Fraud is any activity that relies on deception in order to achieve a gain. It is an intentional act
of deceit designed to reward the perpetrator or to deny the rights of a victim. Any deceit with
an intent to illegally gain a financial advantage over a person or entity is a fraud.
For an act to constitute fraud
a) The perpetrator must be aware the statement that the action, statement or claim is
false or altered
b) There is an intent to deceive for economic benefit
Many scientists have proposed theories to explain the reasons why fraud persists. According
to Donald R. Cressey, a renowned criminologist, a person is most likely to commit fraud
when he has enough motivation or pressure (financial pressure); an opportunity presents itself
(opportunity), and there is enough justification for acting (rationalisation).
Historically, fraud dates back to human existence but the documented cases was in 300 BC,
two Greek sea merchants, Hegestratos and Zenosthemis, devised a plan to enrich themselves
by taking out a bottomry, an insurance policy on their ship and cargo. According to the
agreement, they were required to repay loaned money with interest after selling their
merchandise. If they failed to repay the loan, the lender would gain possession of the ship and
its cargo.
After leaving the dock, both men decided to sink the ship so they could pocket all the loaned
money. However, they were caught in the act; Hegestratos lost his life while attempting to
escape, and Zenosthemis faced the law’s wrath in the Athenian courts.
Most common fraud types
Fraud can take different forms- insurance scams like the one Hegestratos tried to pull off is
just one of over 40 types of fraud today. For simplicity, we will touch on the most prevalent
ones:
● Phishing, smishing and vishing ● Credit card and debit card fraud ● Remote banking fraud
● Identity theft and identity fraud ● Advance fee fraud ● APP fraud ● Account takeover
● Card not present (CNP) fraud ● Covid 19 fraud ● Cyber fraud
● Ponzi schemes or other investment fraud
Fraud Triangle
Business owners are interested in understanding the mind set behind employee fraud because
it provides opportunity to put in place preventive measures.
In the 1970s, criminologist Donald R. Cressey published a model called the “fraud triangle.”
The fraud triangle outlines the three conditions that lead to higher instances of occupational
fraud: motivation, opportunity, and rationalization. When an employee has a reason for
committing fraud, gets a chance to do so without getting caught, and can come up with a
justification for their behaviour, they’re more likely to commit an occupational crime. Studies
affirmed that 80% of fraud occur when the three conditions avails.
Motivation
There are as many different motivations for fraud as there are people in the world, but they
can be sorted into a few main categories:
Sudden changes in circumstances: a partner’s job loss, a surprise medical bill
Disgruntlement: A sense of being wronged, being passed over for a promotion or
denied a raise
Survival: inability to afford life-saving medicines or to put food on the table
Status pressure: feeling compelled to keep up with peers’ earning or spending
Peer pressure
Personality trait
Addition
Opportunity
Perhaps the easiest piece of the triangle for business owners to control is opportunity. No
matter how disgruntled or desperate an employee might feel, they can only commit fraud if
they’re given the chance to do so.
Standardized processes and rigorous oversight procedures are key to keeping operations
invulnerable to fraud. However, it’s not enough to just put these systems in place: the
opportunity for fraud still exists if security protocols are present but unmonitored, ineffective,
or unenforced. Similarly, lack of surveillance, internal control, regular audits among others
could give room for fraud to occur
Rationalization
The final piece of the fraud triangle is rationalization. Even when people have motivation and
opportunity, most will not choose to act unless they can justify to themselves why their fraud
is “okay.” Even those who could be incentivized to break the law given the right motivation
usually wouldn’t be willing to do so if it meant they were harming someone else.
But when it comes to defrauding a company, many fraudsters can convince themselves that
theirs is a victimless crime.
For instance, An accountant who sees how much their sales department spends entertaining
potential clients may justify skimming a few funds here and there for themselves.
Or an account lead on a work trip might charge unnecessary extras to their hotel room
because “everyone does it; it’s one of the perks of the job.”
An effective way to prevent these types of rationalizations is to champion transparency when
it comes to company finances. For instance, putting in place a policy that bonuses depend on
the company’s ability to hit a certain profit margin, employees will have a better
understanding of the importance of a few funds here and there.
When employees witness the company’s profits being reinvested in its workforce, they’re
more likely to engage emotionally in the success of the team.
Fraud Control
Fraud control is the process of preventing, detecting, and responding to fraudulent activities.
Organizations need to have fraud control policies that allow them to investigate and take
action against those suspected of fraud. They also need to implement internal controls that
make it harder for criminals to commit fraud and help them identify and minimize the losses
from fraud. Fraud control is an important element of fraud risk management and
organizational efficiency.
Fraud control policies allow organizations to have the power to investigate and react as
needed to those suspected of fraud, including possibly filing a lawsuit against them. In some
cases, alerting the police might be the appropriate response.
Fraud Prevention
Fraud prevention refers to a firm policy, functions and processes that keep fraud from
occurring. No strategy is fool proof, but Fraud prevention controls is an important element in
the overall fraud risk management framework. Organizations are required to continuously
assess the fraud risks and implement appropriate controls to prevent the occurrence of such
fraud risks.
Fraud prevention and detection are complementary strategies to reduce fraudulent activity
and losses. Fraud detection identifies fraudulent activity that has occurred or been attempted.
It responds to an existing threat. With fraud prevention, firms implement policies and
safeguards that make it harder for criminals to commit fraud
Effective internal controls help organizations prevent fraud and detect it early, thus mitigating
losses. A well-designed internal control system can lead to more effective and efficient
operations because, for example, it allows organizations to identify and improve upon
duplicate or unnecessary procedures and weaknesses in their systems.
Simply put, to protect an organization from fraud, it is necessary to lock down the system
of internal controls. Moreover, the internal control process should include three types of
internal controls: Preventive controls to prevent fraud from happening; Detective controls to
identify and minimize the harm of fraud that has already occurred; and Deterrence to attack
the root causes and enablers of fraud.
Fraud Detection
Fraud detection is defined as a process that detects scams and prevents fraudsters from
obtaining money or property through false means. Fraud is a serious business risk that needs
to be identified and mitigated in time, Fraud detection help to detects and prevents fraudsters
from obtaining money or property through false means. It is a set of activities undertaken to
detect and block the attempt of fraudsters from obtaining money or property fraudulently.
Fraud detection is prevalent across banking, insurance, medical, government, and public
sectors, as well as in law enforcement agencies.
While fraud detection identifies fraudulent activity that occurred or been attempted, Fraud
prevention form implement policies and safeguards that make it harder to commit fraud eg
screening, tech etc
Fraud detection generally involves data analysis-based techniques. These techniques are
broadly categorized as statistical data analysis techniques and artificial intelligence or AI-
based techniques
Fraud Deterrence
Fraud deterrence involves proactively identifying and removing the potential causes and
opportunities for fraud in an organisation. The goal is not only to prevent fraud from
occurring but also to discourage individuals within an organisation from attempting to
commit fraudulent acts. Elements of fraud deterrence strategy include
• Establishing a strong ethical culture
• Implementing internal control system
• Regularly monitoring and auditing
• Establishing reporting mechanism
• Enforcing consequences
• Risk assessments
INVESTIGATION TECHNIQUE
Fraud investigations aim to uncover what behaviours occurred, by whom, and how
Steps to Conducting a Successful Fraud Investigation
(1) Understanding Fraud and Its Implications
Fraud is a deliberate act of deception intended for personal gain or to cause a loss to another
party. It's a serious crime that can have far-reaching implications. The impact of fraud
extends beyond financial loss. It can damage the reputation of an organization, affect
employee morale, and even lead to legal consequences. Understanding the implications of
fraud is the first step towards conducting a successful investigation.
(2) Pre-Investigation: Setting the Stage
Before diving into a fraud investigation, it's crucial to set the stage properly. This involves
having a clear fraud policy in place and assembling a competent investigation team. A well-
defined process helps ensure that the investigation is thorough, legal, and effective. It also
provides a roadmap for the investigation team to follow. The pre-investigation stage is also
the time to consider the potential implications of the investigation. This includes the potential
impact on the reputation and the legal consequences of the investigation.
Establishing a Fraud Policy
A clear and documented fraud policy is a must for any organization. It defines what
constitutes fraud within the organization and outlines the steps to take when fraud is
suspected. Having a fraud policy in place provides guidance during an investigation and
serves as a deterrent to potential fraudsters.
Assembling the Investigation Team
The next step is to assemble an investigation team. The team must possess the required
knowledge to carry out the investigation. The team may include internal auditors, legal
advisors, human resources personnel, and external experts if necessary. The team's
composition may vary depending on the nature and complexity of the suspected fraud.
Remember, the team should always maintain secrecy and should be impartial during the
investigation.
Conclusion
In conclusion, conducting a successful fraud investigation is crucial for organizations to
protect their assets, reputation, and stakeholder trust. Conducting a successful fraud
examination and investigation requires careful planning, thorough execution, and diligent
follow-up. Organizations can effectively combat fraud, protect their resources, and maintain
the trust of their stakeholders by applying these steps.
It's important to ensure that these measures are fair, legal, and in line with the policies of the
organization. This helps maintain the integrity of the organization and deter future fraud.
INTERNAL CONTROL
Definition of internal control
Auditing Practices Committee defines internal control as “The whole system of controls,
financial and otherwise, established by the management in order to carry on the business of
the enterprise, in an orderly and efficient manner, ensure adherence to management policies,
safeguard the assets and secure as far as possible the completeness and accuracy of the record
International Standards on Auditing (ISA 400) states that internal control system means all
the policies and procedures adopted by the management of an entity to assist in achieving
management’s objective of ensuring, as far as practicable, the orderly and efficient conduct of
its business, including adherence to management policies, the safeguarding of assets, the
prevention and detection of fraud and error, the accuracy and completeness of the accounting
records and the timely preparation of reliable financial information
In other words, IC is a system that ensures the smooth efficient of a financial, operational and
strategic activities of an organisation. It aims to protect resources against waste, fraud and
efficiency; ensure accuracy and reliable accounting and operational data; compliance with
laid down policies and evaluation same intervally.
Main IC Categories
Preventive controls
Detective Controls and
Corrective controls
Objectives of internal control
Internal control is concerned with the controls operative in every area of corporate activity as
well as with the way in which individual controls inter-relate. The above definitions establish
four objectives of internal controls as:
a) Promoting operational efficiency
b) ensuring adherence to management policies
c) safeguarding the assets of the organisation and
d) to secure completeness and accuracy of the records, that is, ensuring the reliability of the
financial statement
Scope/components of internal control
There are five components of internal control, namely –
The control environment
The entity’s risk assessment process
The information systems relevant to financial reporting
Control activities and
Monitoring of controls
The Control Environment
The control environment is the framework within which controls operate. It includes the
governance and management functions and the attitudes, awareness, and actions of those
charged with governance and management concerning the entity’s internal control and its
importance to the entity. While a strong control environment does not, by itself, ensure the
effectiveness of the overall internal control system, it is a positive factor when assessing the
risks of material misstatement. Management attitude towards control is a significant factor in
determining how controls operate. Controls are more likely to operate well in an environment
where they are considered important. The existence of internal audit function and budgetary
system strengthen the control environment.
When assessing the effectiveness of the control environment, the auditor should pay attention
to the following elements of control environment:
1. Communication and enforcement of integrity and ethical values – these influence the
effectiveness of the design, administration and monitoring of controls;
2. Commitment to competence – Management’s consideration of the competence levels for
particular jobs and how such levels translate into requisite skills and knowledge;
3. Management’s philosophy and operating style – their approach to taking and managing
business risks, attitudes and actions towards financing reporting as well as attitudes towards
information processing and accounting functions and personnel;
4. Participation by those charged with governance – their independence from management,
experience and stature, extent of involvement in control activities and scrutiny of activities
and appropriateness of actions and interaction with internal and external auditors.
5. Organisational structure – The framework within which an entity’s activities are planned,
executed, controlled and reviewed.
6. Assignment of authority and responsibility - how authority and responsibility for operating
activities are assigned and how reporting relationships and authorization hierarchies are
established.
7. Human resource policies and practices – recruitment, orientation, training, evaluating,
counseling, promoting, compensation and remedial actions.
The auditor assesses whether these elements of the control environment have been
implemented using a combination of inquiries of management and observation and inspection
Entity’s Risk Assessment Process
ISA 315 requires the auditor to obtain an understanding of whether the entity has a process
for:
Identifying business risks relevant to financial reporting objectives;
Estimating the significance of the risks;
Assessing the likelihood of their occurrence;
Deciding upon actions to address those risks.
The auditor should note whether has established such a process or not, and discuss with
management whether relevant business risks have been identified and how they have been
addressed.
Information System relevant to Financial Reporting.
Information system relevant to financial reporting consists of the procedures and records to
initiate, record, process and report entity transactions and to maintain accountability for the
related assets, liabilities and equity.
In respect of this component, the auditor looks into the following areas:
The classes of transactions in the entity’s operations that are significant to the financial
statements.
The procedures by which those transactions are initiated, recorded, processed, corrected
and reported in the financial statements.
The related accounting records, supporting information, and specific accounts in the
financial statements, in respect of initiating, recording, processing and reporting transactions.
How the information system captures events and conditions, other than transactions, that
are significant to the financial statements.
The financial reporting process used to prepare the entity’s financial statements, including
significant accounting estimates and disclosures.
Controls surrounding journal entries used to record non-recurring, unusual transactions or
adjustments.
The auditor should note how the entity communicates financial reporting roles and
responsibilities and significant matters relating to financial reporting.
Control Activities.
Control activities are those policies and procedures that help ensure that management
directives are carried out. They include all activities designed to prevent or detect and correct
errors. The elements or types of control activities include:
Segregation of duties: This requires that no one person initiates, authorizes, processes,
records and maintains custody of assets arising from a transaction. That is, functions involved
in a given transaction should be separated and carried out by different persons.
Physical controls: This concerns physical custody of assets and the design of procedures to
limit access to authorized personnel only. It involves limiting direct access e.g. by locking up
documents and other values in safes or warehouses or through the use of usernames and
passwords and other digital techniques to restrict access to computer files etc.
Authorisation and Approval: Every transaction should require authorization or approval by an
appropriate person. Authorisation limits should also be specified.
Management controls: These include all supervisory controls by management over and above
daily routine supervision, performance reviews, internal audit and other special review
procedures.
Supervision: All the activities of staff should be supervised by appropriate line personnel.
Responsibilities for supervision should be communicated to people concerned.
Organisation: There should be functional organization chart, defining lines of authority and
responsibilities, including lines of reporting. The delegation of authority and responsibility
should be clearly specified.
Arithmetical and Accounting controls: These involve ensuring that all transactions are
authorized, completely captured, correctly recorded and accurately processed. Procedures
include checking the arithmetical accuracy of the records, reconciliations, use of control
accounts, sequence or continuity checks etc.
Personnel: Procedures should be designed to ensure that personnel have the appropriate skill
sets, are competent, possess integrity and are motivated to carry out the tasks assigned to
them. Systems are as good as the people operating them.
ISA 315 requires that the auditor obtains an understanding of control activities relevant to the
audit and how the entity responds to risks arising from IT.
Monitoring of Controls
Monitoring of controls is a process to assess the effectiveness of internal control performance
over time. It includes assessing the design and operation of controls on a timely basis and
taking necessary corrective actions modified for changes in conditions.
The auditor should obtain an understanding of the major control activities that the entity uses
to monitor internal control over financial reporting, and how the entity initiates corrective
actions to deficiencies in its controls. He should also understand the sources of information
used in monitoring activities and the basis on which management considers it reliable.