Fraud Auditing, Detection, and Prevention Blog

Illustrating Fraud Action Statements Using the Payroll Function

Dec 16, 2022 7:39:28 AM / by Leonard W. Vona

 

In this blog, we're looking at how to write a fraud action statement using the payroll function as a way to understand the starting process for a fraud audit.

But first, here are the answers for the trivia from the last blog:

1. What was the biggest corporate lawsuit settlement? $206 billion, paid by the nation’s four largest tobacco companies.

 2. Excluding the tobacco lawsuit, what is the aggregate dollar value of the next 10 large corporate settlements? $88 billion dollars.

 3. What is a stockholder derivate lawsuit?   One brought by a shareholder or group of shareholders on behalf of the corporation against the corporation's directors, officers, or other third parties who breach their duties.

 4. Are banks being sued for how they administered the first-come first-serve provision of the PPP Loan program? Yes, customers of Bank of America, JP Morgan Chase, and Wells Fargo have sued the banks in federal court.

 5. What cost Walmart more money to settle the FCPA allegations - fines & penalties or forensic accounting and legal fees? The fines totaled $282 million whereas the professional fees totaled $870 million.

 6. Are lawsuits an indicator of weak internal controls? (This is an opinion question versus a fact statement). In my opinion, the answer is an unequivocal yes. My guess is that if you study large corporate lawsuits, you will find weaknesses in the governance aspect of COSO. My further guess is the tension between revenue generation and warranties for customers causes adverse tension. My last guess is that they all involve senior management, not necessarily all senior management, but one or more.

 Are you sure you are focusing on high-risk?

 

Fraud Action Statements in Payroll

 
In the last blog, we discussed the fraud action statement of the fraud risk statement. That is the “what” of the fraud scheme. As a follow up, let’s look at how to create fraud risk statements using the payroll function. 
 
As a reminder, the five elements of a fraud risk statement are
 
1. Person Committing
2. Entity
3. Fraud action statement
4. Purpose of the financial gain
5. Impact: Monetary or non-monetary. The monetary is typically the theft of funds or payment of a bribe, with the exception of the disguised compensation scheme
 
In this illustration, the primary is asset misappropriation, and the secondary is the theft of monetary funds.
 
  

Summary of Fraud Action Statement for the Payroll Function

 The following is a list of the top five fraud schemes involving payroll. The list does not include Human Resource schemes and the list could vary from small company to large company.
 
1. Ghost employee: Someone paid for services not performed.
 
  • Primary is the entity.
  • Secondary is the purpose of the financial gain. 

2. Overtime: paid for more hours than the employee works.
 
  • Primary is the person committing the scheme.
  • Secondary is the fraud action but focusing on the frequency or the amount of overtime.
 
3. False adjustment: unauthorized adjustment to gross payroll or net payroll.
 
  • Primary is the fraud action statement: gross pay, net pay, or withholdings.
  • Secondary is the fraud action but focusing on the frequency or amount of the false adjustment.
 
4. Disguised compensation: Occurs when a supervisor increases an employee’s net payroll without the employee directly participating in the scheme, but the employee receives the payroll payment. 
 
  • Primary is the fraud action statement.
  • Secondary is the purpose of the financial gain.
 
5. False payment: either an intentional duplicate payment, payment after termination or theft of a stale paper paycheck.
 
  • Primary is the fraud action statement.
  • Secondary is the financial gain as to paper check or electronic payment.
 
 

Creating the Ghost Employee Fraud Risk Statement

 Primary Element: Entity

 The entity segment is the primary element. So, our first step is to identify the entity permutations. In this step, I have identified the entity structure and provided a brief explanation of the entity structure.

 1. Fictitious employee occurs by creating an identity for a person that does not exist in real life. 

2. Assumed identity employee occurs by taking over the identity of a real person for either a temporary period or permanently. 

3. Assumed identity by reactivating a terminated employee for either a temporary or permanent period.

4. Assumed identity of a real person who is not complicit in the scheme and is added to your human resource database.

5. Real employee complicit in the fraud action. In payroll, complicity is defined as the real employee receiving the payroll payment.

6. Real employee not complicit in the fraud action. In payroll, complicity is defined as the real employee does not receive the payroll payment.

 Secondary Element: Financial Gain

 The secondary element is financial gain. I believe there are two primary items, theft of monetary funds or paying a bribe to someone.

 Person Committing Element

 The first person is always the person with direct access, so the correct answer is the payroll function. The next answer is the person with indirect access, so the correct answer is the department manager or senior member of manager. If we consider cybercrime, then we could state computer hacker. 

 Fraud Action Statement Element

 The fraud action statement is the same for every ghost employee fraud risk statement; “Paid for services not performed”.

 Fraud Risk Statement

 Now that we have identified all of the parts, it is time to combine the elements into a fraud risk statement. We start with the primary element and then change the person committing or the financial gain. The following four examples illustrate the methodology.

  •  Payroll function causes a fictitious person to be added to the payroll system and compensated for services not performed resulting in the theft of monetary funds.
  •  Senior members of management cause a fictitious person to be added to the payroll system and compensated for services not performed for the purpose of paying bribes.
  •  Computer hackers cause a fictitious person to be added to the payroll system and compensated for services not performed resulting in the theft of monetary funds.
  •  The payroll function causes a terminated employee to be reactivated (temporary or permanent?) and compensated for services not performed resulting in the theft of monetary funds.

 Etc.

 As a reminder, 

  •   In real life, your next step is to identify or understand the fraud scenarios for each fraud risk statement.
  •   A fraud scenario will identify how the fraud risk statement could occur in your organization.
  •  Your goal in the scenario stage is to understand how and where your organization is vulnerable.

 

Now we can start creating the fraud audit program.

 Next month we will show you how to link the audit program to the fraud risk statement.

 Trivia for the Holidays

 I thought we needed a break from fraud trivia, hope you enjoy it.

 1. Was Christmas ever illegal? True or False?

2. Is KFC one of the most popular Christmas meals in Japan? True or False?

3. What retail store created Rudolph the red nose reindeer?

4. Which band had the most Christmas hits?

5. Which countries write the most letters to Santa Claus?

6. Which country has the cleverest postal code for Santa Claus?

7. Who wrote the most Christmas songs?

8. Which food group is named after Christmas?

 FYI, I was surprised at most of the answers.

View Overbilling Example

Topics: Fraud Risk Statements, Fraud Auditing, Fraud Based Approach, Worked Example

Leonard W. Vona

Written by Leonard W. Vona

Leonard W. Vona has more than 40 years of diversified fraud auditing and forensic accounting experience. His firm, Fraud Auditing, Inc., advises clients in areas of fraud risk assessment, fraud data analytics, fraud auditing, fraud prevention and litigation support.