Term
|
Definition
| apply overall to the accounting system; they are not restricted to any particular accounting application |
|
|
Term
|
Definition
| intended to ensure that inputs and processing are accurate and complete and that outputs are properly distributed, controlled and disposed. |
|
|
Term
|
Definition
| careful and responsible oversight and use of assets entrusted to management |
|
|
Term
|
Definition
| help fulfill managements obligation to maintain accurate and complete accounting systems and protect assets |
|
|
Term
|
Definition
| theft, concealment, and conversion to person gain of another's money, physical assets, or information |
|
|
Term
| Misappropriation of assets |
|
Definition
| theft of any item of value. Also referred to as Defalcation or Internal Theft |
|
|
Term
|
Definition
| theft of any item of value. Also referred to as Misappropriation of funds or Internal Theft |
|
|
Term
|
Definition
| theft of any item of value. Also referred to as Misappropriation of funds or Defalcation |
|
|
Term
| Misstatement of financial records |
|
Definition
| Falsification of accounting reports. AKA: Earnings Management or Fraudulent financial Reporting |
|
|
Term
|
Definition
| consists of three parts: Incentive, Opportunity, and Rationalization |
|
|
Term
| Incentive (Fraud Triangle) |
|
Definition
| financial pressures, market pressures, job related failures, or addictive behaviors may create incentive |
|
|
Term
| Opportunity (Fraud Triangle) |
|
Definition
| circumstances may provide access to the assets or records that are the objects of fraudulent activity |
|
|
Term
| Rationalization (Fraud Triangle) |
|
Definition
| fraudsters typically justify their actions because of lack of moral character |
|
|
Term
|
Definition
| conducted by one or more top-level managers within the company |
|
|
Term
|
Definition
| involves top management's circumvention of the system or internal controls that are in place |
|
|
Term
|
Definition
| Employee steals cash or assets for personal gain. Examples: Inventory Theft, Cash Receipts Theft, Accounts Payable Fraud, Payroll Fraud, Expense Account Fraud |
|
|
Term
|
Definition
| cash payment that a vendor gives the employee in exchange for the sale |
|
|
Term
|
Definition
| stealing an organization's cash before it is entered into the accounting records |
|
|
Term
|
Definition
| stealing an organization's cash after it is entered into the accounts receivable records |
|
|
Term
|
Definition
| Two or more people work together to commit fraud |
|
|
Term
|
Definition
| customer improperly obtains cash or property from a company, or avoids a liability through deception |
|
|
Term
| Credit Card Fraud or Check Fraud |
|
Definition
| Customer's use of stolen or fraudulent credit cards or checks |
|
|
Term
|
Definition
| Customer tries to return stolen good to collect a cash refund |
|
|
Term
|
Definition
| occurs when vendors obtain payments to which they are not entitled |
|
|
Term
|
Definition
| examination of vendor records in support of amounts charged to the company |
|
|
Term
|
Definition
| theft of proprietary information by digging through the trash of the intended target company |
|
|
Term
|
Definition
| unlawful copying of software programs |
|
|
Term
|
Definition
| alteration of a program to slice a small amount from several accounts and then credit those small amounts to the perpetrator's benefit |
|
|
Term
|
Definition
| unauthorized program within a larger, legitimate program, used to manipulate the computer system to conduct fraud |
|
|
Term
|
Definition
| valid programming tool that is misused to commit fraud. Programmers use trap doors to enter the program. They should be removed before the program is used |
|
|
Term
|
Definition
| term commonly used for computer network break ins |
|
|
Term
|
Definition
| Is intended to overwhelm an intended target computer system with so much bogus network traffic that the system is unable to respond to valid network traffic |
|
|
Term
|
Definition
| Occurs when a person, through a computer system, pretends to be someone else. |
|
|
Term
| Sarbanes-Oxley Act of 2002 |
|
Definition
| The Act was intended to reform accounting, financial reporting, and auditing functions of companies that are publicly traded in stock exchanges |
|
|
Term
|
Definition
| Designed to avoid errors, fraud, or events not authorized by management. Intended to stop undesirable acts before they occur. |
|
|
Term
|
Definition
| Must be included in an internal control system. Help employees to uncover or discover errors, fraud, or unauthorized events. |
|
|
Term
|
Definition
| Those steps undertaken to correct an error or problem uncovered via detective controls. |
|
|
Term
| Committee of Sponsoring Organizations (COSO) |
|
Definition
| Due to ongoing problems with fraudulent financial reporting, this organization undertook a comprehensive study of internal control and in 1992 issued the COSO report. |
|
|
Term
|
Definition
| Has become the standard definition and description of internal control accepted by the accounting industry. |
|
|
Term
|
Definition
| Sets the tone of an organization and influences the control consciousness of its employees. It is the foundation for all other components of internal control. |
|
|
Term
|
Definition
| Existing threats and the potential for additional risks are assessed and management stands ready to respond should these events occur. |
|
|
Term
|
Definition
| The policies and procedures that help ensure that management directives are carried out and that management objectives are achieved. |
|
|
Term
|
Definition
| Refers to an approval, or endorsement, from a responsible person or department in the organization that has been sanctioned by top management. |
|
|
Term
|
Definition
| A set of guidelines that allows transactions to be completed as long as they fall within established parameters. |
|
|
Term
|
Definition
| Explicit authorization is needed for that single transaction to be completed. |
|
|
Term
|
Definition
| For any transaction, there are usually 3 parts: authorization of the transaction, recording, and custody of the related assets. |
|
|
Term
|
Definition
| Lessens the risk of negative effects when other controls are lacking. |
|
|
Term
|
Definition
| Presents verifiable information about the accuracy of accounting records. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Serve as a method to confirm the accuracy and completeness of data in the accounting system. |
|
|
Term
|
Definition
| Procedure that compares records from different sources. |
|
|
Term
|
Definition
| A summation of key items in the batch. |
|
|
Term
|
Definition
| The ongoing review and evaluation of the system. |
|
|
Term
|
Definition
| The controls achieve a sensible balance of reducing risk when compared with the cost of the control. |
|
|