Premium Essay

Anti-Fraud

In:

Submitted By annettedowell
Words 7003
Pages 29
The IUCN Anti-Fraud Policy
February 2008 – Version 1.0

Office of the Director General

The World Conservation Union Rue Mauverney 28 1196 Gland, Switzerland Tel: +41 22 999 0296 Fax: +41 22 999 0029 www.iucn.org

Policy Version Control and Document History: The IUCN Anti-Fraud Policy Title Version Source language Published in French under the title Published in Spanish under the title Responsible Unit Developed by Subject (Taxonomy) Date approved Approved by Applicable to Purpose IUCN Anti – Fraud Policy 1.0 released February 2008 English Politique de l’UICN de lutte contre la fraude Política para la Prevención de Fraudes de la UICN Office of the Director General IUCN Oversight Unit Fraud, Internal Control, Risk Management November 2007 Director General and Global Management Team All IUCN Staff Members world-wide The aim of the IUCN Anti-Fraud Policy is to safeguard the reputation and financial viability of IUCN through improved management of fraud risk. It sets out explicit steps to be taken in response to reported or suspected fraud, as well as measures that will be taken to prevent or minimize the risk of fraud. IUCN Internal Control Policy Framework COSO Standards IUCN Code of Conduct and Professional Ethics for the Secretariat Sent to all staff members world-wide, available on the IUCN Knowledge Network (intranet), provided for information to all partner organizations and suppliers with contracts with IUCN, and available publicly on request.

Is part of Conforms to Related Documents Distribution

Document History Version 1.0 Released February 2008

For further information contact: IUCN Oversight Unit ++ 41 22 999 0271 or Reception ++ 41 22 999 0001

IUCN Anti-Fraud Policy

Page 2 of 18

Version 1.0 / February 2008

Table of Contents

Similar Documents

Premium Essay

The Main Strengths and Weaknesses of Sanction Policies

...The main strengths and weaknesses of sanction policies June 2015 Student ID: Acronyms CIPFA: Chartered Institute of Public finance and Accounting DWP: Department of Works and Pension LCFS: Local Counter Fraud Specialist NAO: National Audit Office NFA: National Fraud Authority NHS: National Health Service NHS CFSMS: National Health Service Counter Fraud and Security Management Services XXXXX: XXXXX ousing Gr Table of Contents 1.Executive Summary.................................................................................................. 4 2.Introduction.............................................................................................................. 6 2.1 Objective of XXXXX sanction policy............................................................ 6 3.Literature Review.................................................................................................... . 7 3.1 Definition of fraud.................................................................................... 7 3.2 Examples of fraud ................................................................................... 8 3.3 Sanction.................................................................................................... 8 3.4 Definition of sanction............................................................................

Words: 2844 - Pages: 12

Free Essay

Fraud

...prison in the Satyam fraud case. The court also imposed a fine of Rs 5 crore on Ramalinga Raju, the Satyam Computer Services Ltd's founder and former chairman, and his brother B Rama Raju and Rs 20-25 lakh each on the remaining accused. HT presents a lowdown of the country's biggest-ever corporate accounting scandal . What is the Satyam scam about? It is about corporate governance and fraudulent auditing practices allegedly in connivance with auditors and chartered accountants. The company misrepresented its accounts both to its board, stock exchanges, regulators, investors and all other stakeholders. Is this an accounting fraud, a market manipulation/fraud or both? It is a fraud, which misled the market and other stakeholders by lying about the company’s financial health. Even basic facts such as revenues, operating profits, interest liabilities and cash balances were grossly inflated to show the company in good health. Who is to blame here? The promoters? The promoters are primary culprits, although it is almost impossible to misrepresent such facts without the connivance of the auditors and some executive board members. Independent directors, it seems, were kept in the dark about the actual books of accounts. What about the auditors? The role of external third party auditors, who were tasked to ensure that no financial bungling is undertaken to carry out promoters’ interest or hide facts, have also been brought to question. Anatomy of a fraud 1. Maintaining...

Words: 3344 - Pages: 14

Premium Essay

Social Insurance Fraud Research Paper

...various diverse ways. The laws in regards to social insurance misrepresentation differ by purview, however both state and government laws are set up to diminish and rebuff this wrongdoing. Fraud in medicinal services can expect differing frames. As indicated by the National Health Care Anti-Fraud Association, the most widely recognized is charging for medicinal services benefits that were never rendered, either by adding charges to honest claims, or by utilizing genuine patient names and medical coverage data to create claims. Up coding is the second most normal; third is the ponder arrangement of medicinally superfluous administrations, which incorporate tests, surgeries, and different methods....

Words: 426 - Pages: 2

Premium Essay

History

...|ethical issues internationally | |ETHICAL ISSUES INTERNATIONALLY | | | | | |Zach Thompson | | | |Assignment 1, Org 320, February 17, 2009 | | | |Brevard College | | | |B. B. Boerner ...

Words: 1334 - Pages: 6

Premium Essay

Report to Nations

...REPORT TO THE NATIONS O N O C C U PAT I O N A L F R A U D A N D A B U S E 2012 GLOBAL FRAUD STUDY Letter from the President & CEO More than 15 years ago, the ACFE’s founder and Chairman, Dr. Joseph T. Wells, CFE, CPA, conceptualized a groundbreaking research project to study the costs, methodologies and perpetrators of fraud within organizations. The result was the 1996 publication of the ACFE’s first Report to the Nation on Occupational Fraud and Abuse. Since then, we have released six additional Reports that have each expanded our knowledge and understanding of the tremendous financial impact occupational fraud and abuse has on businesses and organizations. We are proud to say that the information contained in the original Report and its successors has become the most authoritative and widely quoted body of research on occupational fraud. The data presented in our 2012 Report is based on 1,388 cases of occupational fraud that were reported by the Certified Fraud Examiners (CFEs) who investigated them. These offenses occurred in nearly 100 countries on six continents, offering readers a view into the global nature of occupational fraud. As in previous years, what is perhaps most striking about the data we gathered is how consistent the patterns of fraud are around the globe and over time. We believe this consistency reaffirms the value of our research efforts and the reliability of our findings as truly representative of the characteristics of occupational fraudsters...

Words: 5423 - Pages: 22

Free Essay

Corporate Fraud

...Introduction: Corporate fraud is the activities that are not accepted ethically and legally, which are done in a dishonest manner to give the person/firm an advantage by manipulating the firm’s information for their own benefits. It is also related to adverse selection problem which is a situation in which insiders, with inside information, earn more profits at the expense of outside investors. Similarly, corporate fraud involves deception to make personal/firm profits at the cost of others. Corporate fraud can happen in all organizations, regardless of their size, type (private or public corporation), industry (production or services) in any country. Corporate fraud could be either for personal gains, where managers use earnings management for their own benefits to maximize their utility while shirking, or to bail out a firm which performance is not up to par. The likelihood of fraud is increased in economic downturn and recession. As companies downsize in recession, cutbacks and cost control measures will often find employees with less than expected earnings, that will result in lowered utility and shirking. “Fraud is often explained in terms of the fraud triangle which describes that fraud is most likely to occur when there is an overlap of an incentive or pressure to commit fraud, the opportunity to commit fraud, and arationalisation therefore. Surveys are regularly carried out to estimate the true scale and cost of fraud to business and society. While findings vary...

Words: 685 - Pages: 3

Premium Essay

Check Tampering - Ms. Sherelle Brugin-Evans

...husband whom the U.S Marshals refer to as the “modern day Bonnie and Clyde” (Department of Justice, U.S. Marshals Task Force, 2013). Ms. Evans created her own opportunity of access to checks by creating her own. She collected individual data for checks and bank accounts in two ways, falsifying social security numbers which she used to obtain false driver’s licenses. She was eventually detected at the Ohio Bureau of Motor Vehicles which finally identified her use of false social securities numbers. Ms. Evans would use her false identification cards to forge documents. She and her husband ran a gang that used fake W-2s to obtain false checks from the state. However, this was only one of the many check tampering frauds she committed. The second such fraud was for her and her gang to produce fake checks and have members of the gang cash the checks around town. She had a history of forging the SSNs and licenses. Although not highlighted in the article, it would be within her to use the falsified identities on the checks to ensure they could be cashed. The use of these identities would also assist her and her group to get around internal controls of banks or stores and help her conceal the theft. Lastly, she is accused of using company bank account information to forge checks (Ferrise, 2013). She established a pattern of forging checks. She caused companies and people to lose money based on stolen or tampered checks. Therefore completing two types of check tampering:...

Words: 826 - Pages: 4

Premium Essay

Fraud Essay

...to forge checks payable to her own name. According to the 2010 Report to the Nations on Occupational Fraud and Abuse the perpetrator committed fraud by an asset misappropriation scheme in which the perpetrator steals or misuses an organization’s resources. Asset misappropriation is broken down into some sub-schemes like skimming, cash larceny, billing, expense reimbursement, check tampering. She was a well-trusted employee and even had previously caught other employees involved in embezzlement and frauds. So there was no reason to expect her of committing a fraud, costing the Company $204,000.00. In the Reports to the Nations study, the average organization annually loses were 5 % of its revenues due to fraud. This is an important topic and individuals have been committing these acts for as long as records have been kept. It is important to implement fraud programs to help reduce or eliminate fraud loses. One of the major things the Company could do to help prevent any future fraudulent activities is start educating the employees on preventing and detecting fraud. Employees should be trained in what constitutes fraud, how it hurts everyone in the company and how to report any questionable activities. According to the Report to the Nations on Occupational Fraud and Abuse organizations that have anti-fraud training for employees and managers experience lower fraud losses. Another thing that the Company could do is start utilizing surprise audits. The case...

Words: 948 - Pages: 4

Premium Essay

Cyber Scam

...CYBER SCAM AND ITS EFFECTS November 27, 2011 SUBMITTED BY: FETALVER, FRANCIS VIOLETA, ROGENE CRIS SUBMITTED TO: MRS. MARY GRACE P. ALFANTA I Introduction Background of the Study Experts and law-enforcement officials who track Internet crime say scams have intensified in the past six months, as fraudsters take advantage of economic confusion and anxiety to target both consumers and businesses. Thieves are sending out phony emails and putting up fake Web sites pretending to be banks, mortgage-service providers or even government agencies like the Federal Bureau of Investigation or the Federal Deposit Insurance Corp. Cell phones and Internet-based phone services have also been used to seek out victims. The object: to drain customer accounts of money or to gain information for identity theft. Most scams are done by e-mail (Spam). They entice users to give them critical information like usernames, passwords, credit card information, or other types of account information. Most of these e-mails can easily be identified as fraudulent, by identifying a couple of general characteristics. If someone pretending to represent a company or organization contact you by e-mail to supply them with usernames, passwords or other critical information by e-mail, then you can be certain it’s fraudulent. Today we have something we call SSL (Secure Socket Layer). E-mail is one of the most un-secure methods to send user information and passwords. Most organizations...

Words: 2516 - Pages: 11

Premium Essay

A&O Audit Report

...organizations that deal with the management of money. Among these organizations are credit unions, loans, banks, credit card companies, insurance companies, consumer finance companies, stock brokerages, investment funds and some government sponsored enterprises. A&O Financial Services Inc. works in Financial industry which means that they were receiving deposits from many depositors for the aim of investing them in safe investments for a definite period of time, and then to return back the money along with an additional amount of money as a return. Definition of Fraud: In criminal law, a fraud is an intentional deception made for personal gain or to damage another individual. The specific legal definition varies by legal jurisdiction. Fraud is a crime, and also a civil law violation. Defrauding people or entities of money or valuables is a common purpose of fraud. In the simplest terms, fraud occurs when someone knowingly lies to obtain benefit or advantage or to cause some benefit that is due to be denied. The Fraudulent Case: On September 28, 2011, in Richmond, Adley H. Abdulwahab, of Houston, Texas, a hedge fund manager and part owner of A&O, and...

Words: 2765 - Pages: 12

Premium Essay

Tft2 Task 4

...online banking site. Further investigation showed that there was not adequate virus protection on these PCs. The key-logging virus originated from a phishing email impersonating VL Bank and asking the customer to load the latest security software to protect from identity theft. The customers reported the fund transfer immediately (within 48 hours) and they are protected under the Electronic Fund Transfer Act (EFTA). This states that as long as the fraudulent wire transfer is reporting in a timely manner that the customer will not be held responsible for the amount. Depending on the length of time between the fraudulent activity and the reporting of the fraudulent activity the customer could bear a portion of the responsibility. If the fraud is reported within 2 business days the...

Words: 1413 - Pages: 6

Free Essay

Legal Elements of Fraud

...Elements of Fraud Instructor: Jeffrey Beck Phase 2 DB 1: Legal Sources for Fraud Nina A. Lugo October 12, 2011 In Madrid Spain, Escala, a Connecticut based business with a global network of companies and parent company Afinsa Bienes Tangibles, a Spanish company involved in commercial and trading activities were caught in a fraudulent scheme which allowed them to increase their revenues to over eighty million in 2004 and 2005. These transactions allowed them to meet their earnings forecast for 2004 and first quarter in 2005. As a result of these transactions, Escala’s share prices rose from 1.47 per share to 32.00 per share, when merged with Afinsa. Both companies were able to get these results by committing fraudulent acts which included the manipulation of collectable stamp values and their appraisals. Escala and Afinsa failed to disclose their involvement with Barrett & Warren, a small publishing company in which they initially gained control of the stamp collection. Escala was guilty of selling Afinsa’s investors the stamps at arm’s length prices. Escala also was guilty of selling back inventory to Afinsa which is considered a round trip transaction. They were also guilty of falsely reporting a payment for business combination related expense as the sale of certain antiques. Escala violated the antifraud and reporting provisions of the federal securities law according the SEC complaints. The SEC charged Escala with accounting and disclosure fraud concerning...

Words: 578 - Pages: 3

Free Essay

The Threat of Fraud

...The Threat of Fraud Tracey Brewer American InterContinental University Security and Loss Prevention CRJS270-1301B-01 Jade Pumphrey March 28, 2013 Abstract Identity theft, whether on a personal or business level is a criminal act. So, for many years individuals have plotted and schemed to come up with scams to obtain personal information from other individuals or organization to either sabotage one’s reputation or obtain financial gain. Either way, this wave of criminal activity is wreaking havoc to innocent people and successful organizations everywhere. The Threat of Fraud Introduction Corporate fraud and executive identity theft are crimes that are on the rise. I don’t think corporations understand the impact this crime can have on their business. It only takes a few measures to ensure that the company is protecting against someone being able to access information that could bring the entire corporation to the ground. It can takes years to establish credit, build clientele and provide a service to the country or a community, however, it can only take the click of a mouse, that one email attachment or that one dishonest employee and your entire businesses financial data has been obtained, used or sold for the sole purpose of financial gain. Therefore, to protection your organization’s personal information. Well, it’s time to get the facts, take the necessary precautions, and start the process for what could be the first steps in protecting your organization...

Words: 1599 - Pages: 7

Premium Essay

Ais Attack

...tougher battles. (Kitten, 2012) In one such case, here in Georgia, a man has pleaded guilty for the role he played in a $1.3 million phishing scheme that targeted customers of Chase, Bank of America, ADP and Branch Bank & Trust. In his plea, Waya Nwaki admitted to using stolen log-in credentials to intercept and respond to e-mails sent by banks to customers when unfamiliar computers or IP addresses were used to access online accounts. He also admitted to impersonating payroll officers in conversations he had with ADP, which is based in New Jersey. The case resulted from a collaboration between the banks and the Federal Bureau of Investigation against Nwaki, a.k.a. Shawn Conley, who was arrested in December on charges of wire fraud conspiracy, wire fraud, aggravated identity theft, and conspiracy to gain unauthorized access to computers. Each count, to which Nwaki pleaded guilty, carries a maximum sentence of 20 years in prison and a maximum fine of $250,000; sentencing is set for Aug. 15, 2012. According to court records, Nwaki and six co-conspirators, between August 2000 and June 2010, worked across three continents to launch phishing attacks through spoofed websites designed to mimic banks and payroll processors such as ADP. When online users visited the spoofed pages, they were asked to provide confidential personal and financial information, such as dates of birth, Social Security numbers, mothers' maiden names, and online account user names and passwords. Having obtained...

Words: 1059 - Pages: 5

Premium Essay

Tft2 Task 4

...online banking site. Further investigation showed that there was not adequate virus protection on these PCs. The key-logging virus originated from a phishing email impersonating VL Bank and asking the customer to load the latest security software to protect from identity theft. The customers reported the fund transfer immediately (within 48 hours) and they are protected under the Electronic Fund Transfer Act (EFTA). This states that as long as the fraudulent wire transfer is reporting in a timely manner that the customer will not be held responsible for the amount. Depending on the length of time between the fraudulent activity and the reporting of the fraudulent activity the customer could bear a portion of the responsibility. If the fraud is reported within 2 business days the customer could be responsible for up to $50. If reported...

Words: 1403 - Pages: 6