3
Legal, Regulatory, and Professional Environment

According to US Legal.com, a Daubert challenge is a hearing conducted before a judge where the validity and admissibility of expert testimony are challenged by opposing counsel. The expert is required to demonstrate that his/her methodology and reasoning are scientifically valid and can be applied to the facts of the case. The term comes from the 1993 U.S. Supreme Court case, Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993), in which the Court articulated a new set of criteria for the admissibility of scientific expert testimony. In its 1999 Kumho Tire v. Carmichael opinion, the Court extended Daubert’s general holding to include nonscientific expert testimony as well.1 An expert who expects to testify in civil or criminal court about his or her work needs to be aware of and prepared for a Daubert challenge.

In a 2017 Fraud Magazine article, John D. Gill, ACFE Vice President of Education, penned an article titled: “The Fraud Triangle on Trial.” In his article, Gill examined several U.S. court opinions that refer to the fraud triangle and was surprised to find cases where judges denied the admission of expert testimony about the triangle because they deemed it to be “unreliable” scientific theory.2 The following are excerpts from Gill’s summaries of three cases:

  • Haupt v. Heaps, 131 P.3d 252 (2005). The appellate court “failed to locate even a single case in which the ‘fraud triangles’ [sic] theory has been adopted as a reliable scientific method in any court of law.” The (fraud triangle) evidence was rejected for that reason and because the court felt the testimony was more prejudicial than probative.
  • Travis v. State Farm Fire & Cas. Co., 2005 U.S. Dist. LEXIS 49957. “The trial judge excluded the (fraud triangle) testimony. In his opinion, the judge notes that applying the triangle relies more on professional judgment than “hard science.” The judge writes, “it is also unlikely that there is a known rate of error or specific objective controls associated with the application of the fraud triangle.” Further, Gill paraphrasing the judge: “expert evidence from fraud examiners is usually related to direct evidence that fraud has occurred or to descriptive evidence that will help the jury understand transactions and how they compare with or deviate from applicable standards.”
  • Kremsky v. Kremsky, 2017 U.S. Dist. LEXIS 22794. In its opinion, the court notes that an expert witness can’t speak to the subjective belief of a party because it would basically amount to unsupported speculation. The court writes, “Uncle [Stanton Kremsky] does not cite a case where an expert touting this ‘fraud triangle’ has been permitted to opine as to motive.” It further stated, “An expert cannot speak as to the subjective belief of a [party].”

Both the Daubert challenge and Gill’s cautionary tale are relevant to those professionals who conduct fraud examinations, especially those who give expert testimony in a court of law.

We’ll examine these and other topics associated with the legal, regulatory, and professional environment across several modules. Those modules, along with the learning objectives, include the following:

  • Module 1 provides an overview of the criminal and civil justice systems within which forensic accountants and fraud examiners operate. The objective is for the reader to be able to differentiate between the criminal and civil legal systems and to begin to develop an appreciation for the complexities of pursuing legal action.
  • Module 2 outlines the legal rights of individuals based on the U.S. Constitution. The goal in this module is for readers to be able to discuss the legal rights of individuals—related to employment, interviews, searches, surveillance, privileges, and standards—under the U.S. justice system.
  • Module 3 takes a look at U.S. Constitution Fourth Amendment rights associated with probable cause. The goal here is for the reader to identify the requirements associated with probable cause when collecting evidentiary materials.
  • Module 4 reviews the rules of evidence by considering the primary attributes of evidence, particularly those that allow evidentiary materials to be presented in a court of law. The take-away from module 4 will be the reader’s ability to describe the role of evidence and the elements to meet the criteria of what constitutes “evidence.”
  • Modules 5 and 6 offer overviews of the criminal (Module 5) and civil (Module 6) justice systems. The learning objective of these modules is for the reader to recognize the legal environment in which he is working and be able to articulate the similarities and differences of each system.
  • Module 7 takes an initial dive into basic accounting, including financial statements, offering a survival guide for those with more of a criminal justice, legal, or regulatory background, who have less familiarity with accounting principles. The goal here is to launch readers on a path toward the utilization of accounting data in forensic accounting engagements and fraud examinations.
  • Module 8 provides an overview of the key elements of the regulatory system in which financial information is developed, particularly financial statement information. Readers will be able to describe the primary environment in which financial numbers are developed and presented.
  • Module 9 provides an introduction to key organizational stakeholders, who oversee the development of accounting information, including responsibility for the internal control environment. The objective is for readers to identify the key players within the environment in which financial and nonfinancial information is generated.

Module 1: Introduction

Fraud may be prosecuted criminally or civilly. Almost any dispute between entities (individuals, businesses, organizations, government entities, etc.) can be prosecuted in civil court. Any time the legal issue at hand involves money, an opportunity arises for forensic accountant involvement. Similarly, any time the legal issue involves claims of fraudulent activity, fraud examiners and forensic accountants can play an important role in investigating and resolving the issue. In either case, the process begins when one or more parties make a claim against another.

In the criminal justice system, a person from the private sector may report a crime. Individuals, families, neighbors, businesses, charities, nonprofits, associations, industry, newspapers, TV, radio, and the Internet are some of the sources where a legal issue may come to light. These same organizations are part of the crime prevention fabric as well. One of the major crime prevention tools is the fear of getting caught. In fact, it is generally accepted that this fear is a greater deterrent than the fear of punishment. Most people think of law enforcement when they consider the legal environment, but other entities often play a part as well, such as public health departments, educational institutions, welfare and social justice organizations, public works departments, and public housing. The watchful eye of those members of the greater community is critical to the success of both the criminal and civil justice systems.

Furthermore, members of the community directly participate in the civil and criminal systems. They report crimes and civil actions; they serve as witnesses, jurors, and other officers of the court. One of the most important aspects of the American and Western judicial systems is the willingness to accept the outcomes of the legal process. Both sides to an issue are committed to their position; that is why they are in the civil or criminal justice system to begin with. Both sides commit considerable time and economic resources to pursuing their goals and positions. Yet despite the battles waged inside our courtrooms everyday—from local magistrates to the U.S. Supreme Court—when the final verdict is announced, generally the participants and society at large accept the outcomes. Another interesting aspect of our legal system is that most people are law-abiding citizens. If desired, many could get away with relatively minor crimes periodically and possibly even major crimes. But the vast majority of Americans and citizens of Western society agree to “play by the rules” because they believe that while some legal outcomes may be less than perfect, generally the system works, and our society is better off if everyone follows the rules.

Criminal cases are brought forth by the government through the criminal justice system. The government apprehends, tries, and punishes convicted individuals for criminal behavior. The foundation for this approach is that criminal behavior is considered a “crime against the state” as well as against individual victims. If the victims or others with a stake in the outcome are not satisfied with the results of the criminal justice system, they may pursue their claim through the civil justice system. Cases may also be pursued criminally and civilly at the same time. The primary difference between the criminal and civil systems is the potential remedy for the victim: the primary allowable remedy in the civil process is monetary damages, whereas the criminal justice system may result in fines, community service, probation, incarceration, censure, and even capital punishment. In the United States, however, there are no fraud crimes that carry the death penalty.

Most criminal cases never end up in the criminal justice system. This is known as the criminal justice funnel. The funnel analogy is derived from the fact that while many crimes go in the top at the wide part of the funnel, few come out at the bottom in the form of convictions and incarcerations. In fact, most crimes are not discovered, and many that are discovered are not reported. Reports from victims, other citizens, law enforcement personnel, informants, investigators, and intelligence activities may result in the observation of criminal behavior. Nevertheless, there is a tremendous amount of discretion inherent in the American and Western criminal justice systems. Just because a criminal or civil offense is observed does not mean that it will be reported or pursued. Even if an actual crime in observed, before the criminal justice system can pursue the matter, the suspect must be identified and apprehended.

In addition to the criminal and civil justice systems, regulatory agencies also play an important role in monitoring illegal activities and pursuing those responsible. The U.S. Securities and Exchange Commission (SEC) regulates securities exchanges, securities brokers and dealers, investment advisors, and mutual funds. The SEC may bring civil or administrative actions to seek remedies for violations of law or the Commission’s rules, and works closely with law enforcement agencies to bring criminal cases, when appropriate. The Public Company Accounting Oversight Board (PCAOB) was created by the Sarbanes–Oxley Act of 2002 to oversee the auditing firms of public companies. Its main purpose is to protect investors by promoting fair and informative financial reports. The board members are appointed by the SEC.

Governmental agencies regulate activities involving utilities, communications, and air transportation, to name a few. Taxpayer money provides the resources needed for government operations, and the Internal Revenue Service (IRS) is charged with collecting those taxes and enforcing the tax laws under the Internal Revenue Code. The IRS can also bring actions against taxpayers in civil and/or criminal court for noncompliance with the tax code.

Module 2: The Rights of Individuals

In this section, we discuss the right of the individual, particularly those persons accused of or potentially accused of committing a crime. Paul Cassell suggests that the “criminal justice system is shifting, at least to some modest degree, from a two-sided, “State v. Defendant” model to a three-sided model in which crime victims are free to enforce their own rights.” Mr. Cassell suggests that “this change is long overdue, as crime victims have their own independent concerns in the process that ought to be recognized.”3

In defense of his position, the author cites Paroline v. U.S. & Amy. Amy’s attorney submitted a detailed restitution request for Amy, a victim of child pornography crimes. The request was supported by a forensic psychological evaluation and econometric projection. Amy sought restitution in the amount of $3,367,854 for lifetime psychological counseling costs and lost income. The government supported Amy’s request. Following two evidentiary hearings, the district court denied Amy, finding that it was not possible to identify precisely what part of those losses was specifically attributable to the defendant, Paroline, as opposed to thousands of other criminals who were victimizing Amy. However, Amy sought review in the U.S. Court of Appeals for the Fifth Circuit that remanded the case to the district court for an award of full restitution.

When persons consider individual rights, most of those rights are associated with formal actions in the criminal and civil justice environments. Generally, individuals have far fewer rights as employees than as citizens. Most fundamentally, individual rights are grounded in four amendments to the U.S. Constitution associated with due process:

  • The Fourth Amendment prohibits unreasonable searches and seizures
  • The Fifth Amendment provides that a person cannot be compelled to provide incriminating information against himself in a criminal case
  • The Sixth Amendment provides that an individual has the right to an attorney to defend himself and the right to confront witnesses against him
  • The Fourteenth Amendment entitles a person to due process of law and equal protections under the law

As employees, individuals have an obligation to cooperate with their employer or be subject to dismissal. Other rights may be granted to employees as set out in employment contracts and collective bargaining agreements. Federal law and many state laws protect employees who report improper or illegal acts of their employer. Such laws normally protect the employee against overt retaliatory or punitive action by the employer, although as a practical matter, subtle forms of discrimination are hard to combat.

Interviews

An employee’s or individual suspect’s right to avoid self-incrimination applies to employers, investigators, and law enforcement personnel. An employee who refuses to cooperate during an interview while invoking the Fifth Amendment, however, may be subject to employment termination. In custodial settings by law enforcement, and in those settings where the suspected perpetrator has been taken into custody and denied freedom presumably against their will, federal law may require that a Miranda warning be read to the suspect. Because employers do not have the right to place employees in a custodial setting, an employee has limited Fifth Amendment rights. Public employers, however, are held to a higher standard, and their employees can invoke their Fifth Amendment protections without fear of reprisal.

The Miranda warnings consist of the following:

  • The interviewee has a right to remain silent
  • The interviewee’s answers may be used against him
  • The interviewee has a right to an attorney
  • If the interviewee cannot afford an attorney, one will be provided at no cost
  • The interviewee can decide at any time to invoke these rights

A second issue arises regarding employee interviews under the Sixth Amendment, and whether the employee has a right to legal counsel. As long as a nonpublic entity is conducting the interview, an employee does not have the right to have a lawyer present, nor does the employee have the right to consult his or her attorney prior to an interview. The employee maintains the right to consult an attorney if he or she requests one, however. With regard to the Fourteenth Amendment, private employers do not have to offer employees due process of law. In contrast, law enforcement and public entities have such an obligation under this amendment. For example, federal employees may have a right of notice of charges and may have the right to rebut any charges put forward.

The Fourth, Fifth, Sixth, and Fourteenth Amendments are all federal rights. In many cases, other federal and state laws regulate the rights of individuals. While such statutes and laws cannot have the impact of limiting federal constitutional rights, those rights may be expanded. Some of the common means by which federal rights are altered are via employment contracts, collective bargaining and other union agreements, various nondiscrimination statutes, and the Fair Labor Standards Act.

In addition, individuals may be entitled to various common law protections with regard to interviews. These include4:

  • Minimization of invasion of the employee’s privacy
  • Limitations on interview content to employee job duties and responsibilities
  • Limitations on public disclosure of the employee’s private facts
  • Limitations on intentional infliction of emotional distress on the employee
  • Limitations on defamation—unfounded facts and accusations made by the interviewer
  • A duty to deal fairly and in good faith
  • No false imprisonment—false imprisonment may be inferred based on the size, nature, and lighting of the room, the amount of force involved, any violent behavior by the interviewer, limitations of ability to leave the interview room, and number of persons involved

While interviews may be conducted subject to the rules, laws, and other issues cited above, confessions resulting from interviews and interrogations create additional challenges. First, in order for confessions to be valid, they must be deemed voluntary. Confessions cannot be obtained as a result of coercion or under threats of violence. Furthermore, promises by the interviewer of leniency can nullify a confession. Promises to recommend a lighter sentence or to report cooperation by the subject, however, are generally not thought to be coercive in nature. Courts have weighed the “substantial risk” of a false confession when determining whether a confession has been coerced.5 Small deceptions are generally permitted and will not risk the validity of the confession. With regard to deceptions, a simple rule is to ask yourself, “Is what I am about to do, or say, apt to make an innocent person confess?” If the answer is “yes,” the statement should not be made.6

Searches

The Fourth Amendment protects individuals against unreasonable searches and seizures. First, unreasonable searches and seizures are forbidden. All warrants for searches and arrest must be supported by probable cause, and all warrants must be reasonably specific as to persons, places, and things.7 The overriding rule is that individuals have a “reasonable expectation of privacy.” Whether a search or surveillance is reasonable is generally based on the totality of the circumstances. A search warrant based on probable cause has the effect of being reasonable. A major exception to the need for a warrant is in instances where law enforcement has reason to believe that a crime has been committed (or is about to be committed) and an immediate search is required.

Fourth Amendment protections are further refined in specific circumstances as follows.8 First, public employers, e.g., government, are not required to obtain a search warrant when they conduct workplace searches for investigations of workplace misconduct. The issue is that workplace investigations are substantially different from those conducted by law enforcement because the goal is not law enforcement but rather efficient office operations, a premise upheld by the U.S. Supreme Court. Furthermore, while individuals have a reasonable expectation of privacy in many places, such as homes and automobiles, such an expectation does not apply in the workplace. For example, items of a personal nature may be left at home and need not be stored in the confines of an office, desk, or filing cabinet.

A workplace search is considered reasonable under two circumstances:

  • The search must be justified at its inception because it is likely to reveal evidence of work-related misconduct. The requirement implies that a clear suspicion exists based on a preliminary review of the evidence.
  • The search is necessary to further the investigation. An example of this concept is that the investigator is able to obtain files that are a required part of the investigation. The requirement implies that the search is likely to reveal pertinent information.

Assuming that the search is reasonable based on these criteria; the scope of the search must be no broader than is necessary to serve the organization’s legitimate, work-related purpose. The investigator may, in fact, have no search limitations if the employee has no reasonable expectation of privacy in the place to be searched. For example, a general filing cabinet with travel reimbursement forms has no reasonable expectation of privacy whereas the individual’s desk is much more likely to yield items of a personal nature. Thus, many workplace areas have no reasonable expectation of privacy for any employee. The key factor is exclusive control. If the individual has exclusive control over a particular area, a reasonable expectation of privacy is more likely to become an issue. As noted above, even with exclusive control, the only standard that an employer must meet is that the search is reasonable based on the above guidelines.

A second area of special consideration for the Fourteenth Amendment is searches incidental to arrest. First, an arrest can only be made based on probable cause. (A citizen may make an arrest only for a crime committed in his or her presence.) As such, law enforcement officers may search an area within his or her immediate control at the time of the arrest without a warrant for the purposes of self-protection and to prevent the destruction of evidence. If the arrest is later invalidated, however, the search is also invalidated. This potential suppression of evidence can be very frustrating to law enforcement investigators. Of course, no warrant is required for evidence that is in plain view. Furthermore, borders and customs agents are provided an exception for searches without warrants.

Search of motor vehicles, including cars, truck, watercraft, and airplanes, may be conducted without a warrant if the law enforcement personnel believe that contraband is present or the vehicle contains other evidence of a crime. The risk of flight with regard to motorized vehicles makes them inherently more risky. Once moved, evidence may be removed or destroyed and such a risk necessitates prompt action. In addition, unlike a home where expectation of privacy is paramount, motorized vehicles are subject to a much lower expectation. The motorized vehicle may be moved to a police facility and inventoried prior to search, and law enforcement may proceed with the search without a warrant. The ability to search vehicles also applies to the contents of the vehicle (e.g., luggage) but does not extend to passengers. Passengers may not be searched without a prior arrest or warrant.

Individuals may waive their Fourth Amendment rights that prevent certain types of searches. Consent by an individual eliminates the need for a search warrant by law enforcement. Like confessions, the waiver of this right will be scrutinized to ensure that it was not coerced in any way. Thus, law enforcement personnel must be able to defend the waiver against claims of false imprisonment, force, violence, and limitations of ability to leave the area, as well as accusations of deceit, bribery, or misrepresentation. Unlike the Miranda warning related to statements, no warning must be made regarding an individual’s right to refuse a search. Illegally obtained evidence may not be introduced in court. Furthermore, any information derived from illegal evidence cannot be introduced. This is known as “fruit from the forbidden tree.”

Surveillance

Surveillance can be more complex than interviews and searches. Although the rules of conduct for interviews and searches have been defined through federal and state laws and interpretations by the U.S. Supreme Court, the conduct of surveillance has many more issues to consider. As such, counsel should be consulted when surveillance is contemplated. Such techniques include electronic surveillance, including audio and video monitoring and recording. Generally these techniques are not conducted by fraud examiners and forensic accountants because these professionals do not have the required training and skill set. Furthermore, such operations are more common when the suspected activity is complicated and involves multiple individuals, organizations, and jurisdictions. Many of these types of investigative operations are conducted by private investigators or law enforcement officers who have the necessary education, training, and experience.

Several types of surveillance are possible:

  • Fixed-point surveillance (e.g., stakeout) involves observing activity from a stationary, discreet location
  • Mobile surveillance
  • Videography (if audio is also captured during the surveillance, different laws, rules, and regulations are in effect, because audio surveillance has much more stringent requirements)
  • Audio or electronic surveillance (e.g., wiretapping)

Surveillance is generally legal. Once the investigator enters the realm of electronic (audio) surveillance, the laws and requirements become more complicated. Generally, federal law prevents the interception and/or recording of wire, oral, or electronic communications except by the following9:

  • Law enforcement officers with a warrant
  • Operator of a switchboard or common carrier providing services carrying out job duties and responsibilities
  • An employee of the FCC carrying out job duties and responsibilities
  • A party to a communication who has given prior consent to the interception (one-party consent)
  • A person acting under the Foreign Intelligence Act of 1978

The warrant requirement is the most complicated issue faced by forensic accountants and fraud examiners. With the exception of 13 states, any party to a conversation may record their own conversation. Although the interception and recording of live communication is generally forbidden by federal law without a warrant, stored communication (including voicemail and e-mail) is not nearly as well protected. For example, employers can access stored voicemail and e-mail on their own servers but cannot access the same communications stored by an outside provider (e.g., messages stored on Sprint voicemail). More interestingly, any party to the communication may provide the necessary permission and access to persons not party to the communication.

Generally, video surveillance is permissible as long as it does not violate a person’s reasonable expectation of privacy. Anyone in a public park, parking lot, or mall may be videotaped without violating any laws as long as no audio of the target is recorded. Where individuals have a reasonable expectation of privacy, however, such as in their own home, employee restrooms, employee locker rooms, or employee changing areas, video surveillance is not permitted without the existence of extenuating circumstances and a warrant.

Generally, a private employer is prohibited from conducting polygraph examinations (lie-detector tests) unless the employer has suffered economic loss and has reasonable suspicion that the particular employee was involved in the issue under investigation. Like other aspects of the investigation, reasonable suspicion is an evidence-based decision. Under no circumstances, however, can a nongovernment employer use a polygraph examination to screen applicants.

Discharging a Suspected Wrongdoer from Employment

Assuming that an internal, private investigation by an employer results in the conclusion that a particular individual committed a fraud act; can the employer dismiss that employee? Perhaps more intriguing, what if the suspected employee refuses to cooperate and that investigation cannot continue? What then? While public employers are governed by a stricter standard, employer rights are dictated by the jurisdiction in which they operate. Generally, employment is considered at will. This characteristic allows either the employee or the employer to sever the relationship at any time for almost any reason. Employees may have some protections against dismissal for improper reasons, however, even in at will states.

As such, it is advisable that employers document good cause for any termination in the employee’s personnel file. Good cause might include the following:

  • The employee’s conduct was against written policy
  • The employee’s conduct made for unsafe or inefficient business operations
  • The company completed a reasonable investigation to ensure that any such questionable act was committed by the employee and has evidence to support such a claim
  • The investigation was fair, objective, and evidence suggested the elimination of alternative suspects
  • The termination was nondiscriminatory, meaning that all persons committing such an act were or would be terminated
  • The punishment fits the crime, meaning that the punishment is reasonable given the nature of the offense

Such incidents and punitive actions by the company should be carefully considered and well documented. Nothing prevents an employee from suing a former employer in civil court, even if the termination is arguably a reasonable response to the alleged offense.

Privileges

Legal privileges are protections against certain types of testimony. With the exception of the privilege against compelled self-incrimination, most of the following privileges are not constitutionally based:

  • Attorney–client privilege
  • Attorney work-product privilege
  • Physician–patient privilege
  • Marital privileges
  • Miscellaneous privileges

Attorney–Client Privilege

The attorney–client privilege is the right to not disclose any confidential communication relating to the professional relationship, where the client can be an individual or a corporation. Interestingly, the privilege belongs to the client, and the client has the right to compel nondisclosure by the attorney, whereas the attorney may only assert the privilege if acting on behalf of the client. The attorney–client privilege applies only to communications that are intended to be confidential. This privilege does not permit an attorney to conceal physical evidence or documents and does not apply to future acts of a crime or fraud.

Attorney Work−Product Privilege

Attorneys have a work−product privilege. The privilege protects all materials prepared by an attorney in anticipation of litigation and is designed to preserve the adversarial trial process by shielding materials that would disclose the attorney’s theory of the case or trial strategy. Attorney work-product is defined as any written materials, charts, notes of conversations and investigations, and other materials directed toward preparation of a case. To preserve this privilege, the material must be prepared in anticipation of litigation or the factual context must make it probable that litigation will arise.

Physician–Patient Privilege

In most states, confidential communications made to a physician, as well as psychiatrists, psychotherapists, and psychologists, for the purpose of obtaining treatment or diagnosis are privileged. Consultations that take place with regard to litigation, however, are not covered (e.g., examinations by court-appointed physicians or expert witnesses). Furthermore, when patients are involved in litigation and put their medical condition at issue, they are deemed to have waived this privilege.

Marital Privileges

In some cases, marital privileges exist. The first is spousal immunity and protects a person from having to testify against his or her spouse—although such testimony is permitted, and cannot be stopped by the spouse. At the state level, a slight majority of states give the privilege to the spousal defendant, which protects them from adverse testimony. This privilege is usually allowed in both civil and criminal cases and covers statements made during the marriage and applies even if the parties are no longer married at the time of trial. Neither privilege applies to crimes or torts within a family.

Miscellaneous Privileges

Nearly all states recognize a privilege for confidential communications made to members of the clergy in their professional capacity as spiritual advisors. The government also has a variety of privileges that protect the disclosure of sensitive information in its possession. Finally, some courts recognize qualified privileges for trade secrets for businesses. Contrary to popular belief, there is no legal privilege for accountant–client relationships.

The Daubert Standard

According to the Wex Legal Information Institute at Cornell Law, the ruling in Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993) created what became known as the Daubert standard—the test currently used in the federal courts and some state courts related to the admissibility of expert testimony (expert opinions). Under the Daubert standard, the trial judge makes an assessment of whether an expert’s scientific testimony is based on reasoning or methodology that is scientifically valid and can properly be applied to the facts at issue. Under this standard, the factors that may be considered in determining whether the methodology is valid include the following:

  1. whether the theory or technique in question can be and has been tested;
  2. whether it has been subjected to peer review and publication
  3. its known or potential error rate
  4. the existence and maintenance of standards controlling its operation;
  5. whether it has attracted widespread acceptance within a relevant scientific community

In anticipation of a Daubert challenge, attorneys may ask a practicing forensic accountant or fraud examiner to provide the basis for their opinions by grounding them in textbook passages and chapters, professional guidance, journal articles, treatises, practitioner articles, and other materials that offer support for the expert’s application of particular material in a particular context.

For example, a case might involve assertions that weather created circumstances that prevented a party from completing outdoor work on-time or on-budget. The forensic accountant might pull historical nonfinancial data (metrics) from the National Weather Service on quantities of rain and compare historical data to the actual data during the construction period. This activity is comparable to comparing actual data to an expectation (a budget, created from historical data). The forensic accountants have to be careful that they do not project their work to be that of a meteorologist. Rather, they are simply comparing what a contractor working outdoors might anticipate compared to what happened. The data might show that rain was twice as high during the construction period in comparison to historical averages. In such case, it’s possible that construction dates were compromised and the contractor exceeded budget. Whether construction delays and cost overruns were explicitly associated with weather might require additional data analysis and examination. Nevertheless, it’s common for accounting professionals when explaining variances from budget to identify extenuating circumstances, such as weather, an employee stoppage, an environmental event, etc. It’s important to search for all possible causes and to rule out nonrelevant causes using data. It’s pertinent that the forensic accountant was testing the assertion for reasonableness by essentially comparing “budget” to “actual,” a common activity of accountants. Whether comparing historical weather data to actual would be admissible under the Daubert standard, in the end, is up to the judge.

In the Manpower case (U.S. court of Appeals for the Seventh Circuit, No. 12-2688, Manpower, Inc. v Insurance Company of the State of Pennsylvania, October 1, 2013), the appeals court reversed a lower court ruling concluding that the lower court’s exclusion of an accounting expert’s opinion was an inappropriate use of the Daubert standard. Specifically, the lower court had ruled that the expert had followed the prescribed methodology by calculating lost incremental profits by taking lost revenues minus noncontinuing expenses. Rather the lower court was concerned with the inputs to the calculations, suggesting that the result “turns on whether the expert used reliable methods when selecting the numbers used in his calculations—specifically, projected total revenues and projected total expenses.” The lower court was troubled by model inputs. The appeals court reversed the lower court decision, suggesting that the model inputs were judgments for which the jury could decide their appropriateness. From the appellate court’s opinion, “The district court usurps the role of the jury, and therefore abuses its discretion, if it unduly scrutinizes the quality of the expert’s data and conclusions rather than the reliability of the methodology the expert employed.”

It’s important for forensic accountants and fraud examiners to attempt to use appropriate methods and be able to explain why they selected their method for a particular case. It’s also important to use data, facts and circumstances, grounded in the evidence. At the same time, it’s prudent to expect that all of one’s will be carefully examined and scrutinized.

Module 3: Probable Cause

USA Today journalist Yu reports that “shares of Caterpillar fell 2% after a report commissioned by the government accuses the manufacturer of tax and accounting fraud.”10 According to Yu, Caterpillar, which makes construction equipment products, said it wasn’t given a copy of the report, which was viewed and originally reported by The New York Times. Law enforcement officials raided Caterpillar’s corporate headquarters and facilities in Peoria, Ill. last week to execute a search and seizure warrant. According to the article, Caterpillar made several statements:

  • The warrant is focused on the collection of documents and electronic information.
  • We are vigorously contesting the proposed increases to tax and penalties for these years of approximately $2 billion.
  • We believe that the relevant transactions complied with applicable tax laws and did not violate judicial doctrines.

Underlying any arrest or warrant is a probable cause. Probable cause is the standard by which law enforcement may make an arrest, conduct a personal or property search, or obtain a warrant. The term also refers to the standard used by grand juries when they believe that a crime has been committed. One of the first issues associated with probable cause is to define the players. A witness is a person who is not suspected of the crime at issue. As one moves to the top of the culpability scale, a target is believed to stand a better than fifty percent probability of being criminally charged with a crime. Somewhere between witnesses and targets are subjects. Subjects may have committed unethical conduct and may be involved in suspicious activity but they have not crossed the line to the point where their behavior is considered likely to be judged criminal (based on the current state of the investigation and the evidence). As evidence is developed and the investigation proceeds, players’ roles may change. For example, subjects may become targets or subjects may be relegated to witnesses.

The origins of probable cause rest with the Fourth Amendment to the U.S. Constitution, which states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” Despite this phraseology, the threshold for probable cause is not as high as one might expect.

In Terry v. Ohio (1968), the U.S. Supreme Court established that some brief seizures may be made without probable cause. Known as the Terry Stop, the court ruled that if a police officer has reasonable suspicion (not probable cause) that a crime has been committed or will soon be committed, that officer may briefly detain an individual, search him or her for weapons, and question the person.

In 1974, in The United States v. Matlock, the U.S. Supreme Court ruled that the co-occupant of a residence may permit a search in the absence of any other co-occupant. This rule is known as the co-occupant consent rule and established that an officer who makes a search with a reasonable belief that the search was consented to (i.e., voluntary) by a resident does not need to have probable cause for the search.

Finally, in Illinois v. Gates (1983), the U.S. Supreme Court lowered the threshold for probable cause by ruling that a “substantial chance” or “fair probability” of criminal activity could establish probable cause and that a better-than-even chance of criminal behavior is not required.

Related more specifically to fraud, financial crimes, and white-collar crime, in recent times, law enforcement and other investigators have resorted to more sophisticated methods for identifying and investigating fraud. They have, therefore, turned to tools traditionally set aside for organized crime, drug trafficking, and similar investigations such as wiretaps, video surveillance, undercover operations, seizure of records, and allowing less culpable individuals to plead guilty to lesser charges for their testimony against decision makers and those considered more culpable. In addition to these investigative techniques, alleged perpetrators also are pursued in both the civil and criminal justice systems. These tools and techniques allow investigators and prosecutors to gain leverage over the defendant, maximize pressure on alleged perpetrators, and achieve as much cooperation as possible. Charges of mail fraud, wire fraud, money laundering, racketeering, or conspiracy typically come from these investigations.

Not surprisingly, most frauds and financial crimes are solved using documentary and electronic evidence. Such evidence is typically the key to, or the basis for, most white-collar crime cases. The challenge, and where probable cause comes into play, is the issue of how to obtain the necessary evidence (i.e., physical and electronic). Generally, investigators can obtain documents and datafiles using three approaches:

  • Voluntary consent
  • Subpoena
  • Search warrant

Subpoenas are issued by grand juries and used to compel witnesses to testify. They may also be used to compel people to turn documents and electronic files over to the authorities (known as a subpoena duces tecum). While grand juries have great leeway related to issuing subpoenas, the Fourth Amendment requires reasonableness. To meet the reasonableness standard, the subpoena must be likely to generate evidence that is (a) relevant to the issue under consideration, (b) be particular and reasonably specific, and (c) be limited to a reasonable time frame. One of the shortcomings of the subpoena approach to obtaining documents is that the investigator is relying on the subpoena recipient to determine what documents fall under the subpoena’s particular details. An investigator reviewing the records may come to a different conclusion than a suspect or a suspect’s lawyer. Even assuming good faith on the part of the subpoena recipient, the person may not provide all the necessary or required evidence and the investigators would have no way of knowing what documents were missed. Given the above, subpoenas are best used for witnesses and subjects who are less likely to be adversarial to the receipt of the document and information request.

An issue arises concerning the choice of voluntary production of documents and physical evidence or grand jury subpoenas, especially when the subject offers to voluntarily supply evidence. Voluntary consent gives the defense lawyer and/or their client time to gather and review relevant documents, negotiate limitations on irrelevant material, copy documents that are essential to the operations of the client’s business, and schedule document production that does not disrupt day-to-day business operations. One of the shortcomings of the subpoena is that its use may prevent criminal investigators from sharing the documentary evidence with other government agencies that may be conducting parallel inquiries. One should note that the discovery process used to gather documents in civil actions is almost always through subpoena, and generally, each side is at the mercy of the other in the sense that they must trust that the other side has provided all available documents that meet the criteria set out in the subpoena.

Beyond subpoenas, search warrants may be used to obtain documents, other physical evidence, and electronic medium. Search warrants are issued by a judge based on probable cause and put the investigator in charge of the evidentiary search. As noted in the review of the three important court cases above, the threshold for probable cause is not overwhelmingly high: there must be some evidence (probable cause) that a crime has been committed and some belief (probable cause) that the search warrant will yield evidentiary support from the person or place that is the subject of the warrant that will help solve the crime. The limitations of the search warrant are in the details included in the warrant itself. It must include details of the place to be searched, the people involved, and types of evidence likely to be seized. As such, a search warrant requires a reasonable level of specificity. Assuming these items are covered by the warrant, the types of records seized include the following:

  • Any property that constitutes evidence of the commission of a criminal offense
  • Contraband, the fruits of crime, or things otherwise criminally possessed
  • Property designed or intended for use, or that are or have been used, as a means of committing a criminal offense

What is the threshold of probable cause in order to obtain a judge’s signature on a warrant? Generally, probable cause made through an affidavit is sufficient. Furthermore, a judge considering the warrant application may find probable cause based entirely on hearsay evidence. Finally, in extraordinary circumstances, warrants may even be issued based on an oral application. These are typically reserved for emergencies.

The warrant has several advantages over a subpoena. First, a warrant allows the holder of the warrant, not the target or the defense counsel, to decide which documents are relevant and must be produced. Second, a warrant avoids, but does not eliminate, the possibility of the destruction of evidence. An interesting attribute of a warrant is that while the search is being conducted, it gives the investigator the ability to interview key witnesses. If handled properly, those key witnesses will not have had the opportunity to consult with counsel or prepare for the interview. In law enforcement investigations where the target is operating an illegal enterprise or has an organization tied up in unlawful activities, the warrant permitting the seizure of documents provides tremendous advantages. By seizing documents and computers, as a practical matter, they take away an entity’s ability to continue their activities as a going concern. Regarding the seized items, all that is required is that the person holding the warrant provides the target with a written inventory of any property taken. The main disadvantage of the warrant is that this document can later be challenged because it lacks specificity.

Module 4: Rules of Evidence

As the headline depicts, a “Trail of evidence points to evangelist in DeKalb fraud scheme.”11 According to the article, DeKalb County cut big checks to an evangelist, month after month for two years, on faith that he did important work for Commissioner Elaine Boyer. The commissioner turned in invoices saying that Rooks Boynton, the head of a nonprofit ministry, gave her policy advice and did research. No one within the county government probed any further as she tapped taxpayers for installments of $1,500 to $5,000 at a time. What did Boynton do to earn that money, which topped $83,000? The Atlanta Journal-Constitution after months investigating found no reports, research materials, or memos from Boynton. No county e-mails documenting a working relationship. No policymakers who recall working with the evangelist and eventually, Commissioner Boyer admitted it was all a kickback scheme.

Without evidence there is no proof; without proof there are no convictions or civil verdicts. As the Bible says, “the truth shall set you free.” In the world of fraud and forensic accounting, truth needs to be grounded in evidence—physical and/or electronic. One of the surest ways to lose a conviction is to base a case on the “bad person” theory and not conduct a thorough and complete investigation. Conclusions must be grounded in the evidence.

Evidence is anything legally presented at trial to prove a contention and convince a jury. Generally, evidence is admissible in court if it is relevant, its probative value outweighs any prejudicial effects, and it is trustworthy, meaning that it is subject to examination and cross-examination. The definition and types of evidence will be further explored in Chapter 4. For the purposes of exploring the rules of evidence, evidence may be testimonial, real (e.g., documents) or demonstrative, or circumstantial or direct (e.g., testimony of an eye witness). At the federal level, rules of evidence apply in both civil and criminal courts. Most states have their own rules of evidence but those rules are generally modeled after the federal rules of evidence.

At trial, attorneys attempt to prove facts at issue. These facts at issue are not evidence, but facts supported by evidence. For example, whether or not the defendant was at the victim’s home on the night of a crime is a fact at issue; evidence (such as a fingerprint) is offered to prove or disprove the fact. The fingerprint is evidence; the fingerprint, while a fact, is not a fact at issue. The first hurdle for evidence is that it must be admissible. To gain admissibility, the evidence may not be irrelevant to the facts at issue, immaterial, or incompetent (impeachable). Prior to admissibility, the attorney must lay the foundation by demonstrating relevance, materiality, and competence (reliability). The threshold for relevance is that it must make a material fact more or less probable than without the evidence. Even relevant evidence, however, may be excluded from judicial proceedings if it is prejudicial, confusing, or misleading. Materiality refers to the potential impact that a piece of evidence may have. If the evidence has a tendency to affect the determination of the facts at issue, it is considered material. For evidence to be competent, it must be considered reliable. The ultimate value of any piece of evidence is in the eyes of the trier of fact (e.g., juror, judge, magistrate, etc.).

Real evidence is that evidence that “speaks for itself” and does not require explanatory testimony. A baseball bat with a victim’s blood, hair, and DNA on it speaks for itself. To be admissible, real evidence must be authenticated. Authentication is a function of several attributes. First, the evidence must be collected properly. For example, investigators should not overtly mark evidence (it should be discretely done) or leave their fingerprints on it during collection. Once collected, the evidence must be preserved so that it is not altered or damaged. The evidence must be identifiable as it moves through the judicial system. One of the common elements is that the chain of custody must be preserved. Even though real evidence speaks for itself, it is still subject to interpretation. Simply because a baseball bat was used as a weapon to kill a person and a third-party’s fingerprints are on the bat does not make the third person the killer. One of the strengths of real evidence is that jurors, judges, and other triers of fact can see, touch, feel, smell, and possibly hear or taste the evidence.

Demonstrative evidence is any evidence that purports to educate, summarize, or amplify real evidence. PowerPoint slides, summary schedules, graphics, pictures, reenactments, models, etc. are all forms of demonstrative evidence. Demonstrative evidence tends to tell a story and complements other forms of evidence such as real and testimonial evidence. Some examples of demonstrative evidence include the following:

  • Photographs and videotapes
  • Maps, charts, diagrams, and drawings
  • Scale models
  • Computer reconstructions or animation
  • Scientific tests or experiments

Because demonstrative evidence is not real, it must not create prejudice and it must not materially alter any significant aspect of the facts at issue. Thus, demonstrative evidence is subject to examination for representational faithfulness.

As noted above, documentary evidence is at the heart of most fraud and forensic accounting investigations. Five considerations must be given to any piece of documentary evidence:

  1. The document must not have been forged.
  2. Original documents are preferable.
  3. The document must not be hearsay or objectionable.
  4. The document needs to be authenticated.
  5. The document must be reliable.

While an original document is preferable, the best evidence rule allows copies to be presented at trial under certain circumstances. Mechanical copies of documents are generally allowed assuming that the copy can be authenticated. Note that copies can also qualify as real evidence if they are used to demonstrate that an original document was altered. Duplicates are typically accepted if they are copies of search warrants, mortgages, lease agreements, duplicate sales slips, official documents, public records, government sealed records, summaries, testimonies, and written admissions.

Chain of custody refers to those individuals who had possession of physical evidence and what they did with it. Essentially, fraud professionals and forensic accountants must be able to establish the origins of evidence and that the evidence has not been altered as a result of the investigation. The chain of custody protects against the possible corruption of evidence as a result of the investigators losing control of it. Close monitoring of all physical evidence is important in a fraud investigation. In civil litigation, much of the discovery work is done through copies transferred among parties. Although it is important to establish the integrity of evidence, generally, the chain of evidence does not normally play a central role in civil disputes. Attorneys for both sides typically stipulate that the evidence is valid.

Testimonial evidence brings about a discussion of hearsay. What happens if one person hears another person make a statement or one person makes a statement that so-and-so said something? Hearsay is a statement made other than those made during legal proceedings. Each person must testify based on his or her own first-hand experience. Presentation in court allows the jury to hear the evidence and allows opposing council to cross-examine the testimony. Despite the need to have live testimony, a number of hearsay exceptions exist. First, if the truth of the statement is not at issue and it does not impact actual guilt or innocence, the statement may be admissible. For example, a person’s statements about his or her frustration levels heard by another person (first-hand) is admissible because it is not about guilt or innocence, it’s about state of mind. Any statement, oral or written, that can be corroborated is generally admissible. Another interesting aspect of hearsay admissibility is statements against interest, defined as any statement that contradicts a prior statement. Such statements against interest are generally admissible. Other types of hearsay that are admissible include the following:

  • Business and government records
  • Absence of an entry in business records
  • Recorded recollections
  • Former testimony
  • Present sense impressions
  • Then existing mental, emotional, or physical condition
  • Statements to medical personnel
  • Printed matter, learned treatises, and refresher writings

Module 5: Criminal Justice System

According to Insurance Fraud News, a ringleader of a group that allegedly staged wrecks and accompanying injuries in Harrison, Marion, and Taylor counties in West Virginia to get insurance payouts pleaded guilty.12 Dallas Lewis, 55, of Clarksburg, entered a plea before U.S. Magistrate to felony conspiracy to commit mail fraud and will be sentenced at a later date by U.S. District Judge Irene M. Keeley. Lewis is likely to face a recommended sentence of somewhere around five years in prison due to the amount of money involved, the number of victims, and his role as an organizer.

Assistant U.S. Attorney, Traci Cook, explained that Lewis was involved directly in only one of the wrecks but he instructed others on how to stage the wrecks, arranged for drivers, victims inside the vehicles, and even witnesses. According to Cook, requests for damages from insurance companies totaled about $655,000. She cited the investigation by agents of the West Virginia Insurance Commission’s Fraud Unit and the U.S. Postal Inspection Service. Lewis was the fourth of the eight defendants in the case to plead guilty.

Most cases never end up in the criminal justice system. Those that do, however, follow a relatively generic path. Readers should keep in mind that each jurisdiction, federal, state, and local, will have their own specific procedures and are advised to consult attorneys in that jurisdiction regarding specific issues and concerns that may impact the case.13 Targets may enter the criminal justice system from three routes: a warrantless arrest by the police based upon probable cause, an investigation that leads to the filing of an Information (a brief, written complaint in support of an arrest by law enforcement), or a grand jury proceeding that leads to an indictment and a subsequent arrest warrant issued by a judge. Assuming an arrest, law enforcement personnel provide the investigative outcomes and evidence to the prosecuting attorney, who decides whether charges will be filed against the target. Those persons formally charged by the prosecutor must appear before a judge “without unnecessary delay.” Judges decide if probable cause exists to move forward. For less serious crimes, the judge may decide a verdict and penalty at this time. Another option is a diversion, where the defendant agrees to take some specified action to avoid prosecution.

For more serious crimes, a defense attorney may be assigned, or the defendant will be represented by an attorney of his or her choice. The following may also be evaluated at this time to determine pretrial release and bail: alleged drug use, residence, employment, family ties, and wealth. If the case comes to the criminal justice system through a grand jury, the jury panel decides if sufficient evidence exists to bring the case to trial. The choice of arrest or grand jury is a strategic one. In some cases, law enforcement and prosecutors may decide to let a grand jury prepare an indictment because of their subpoena power. The grand jury may also be used to investigate criminal activity, particularly in drug and other complex criminal organizations.

Assuming that the criminal case proceeds beyond the indictment stage where the defendant is officially charged, the next step is an arraignment hearing. During the arraignment, the defendant is informed of the crime and the charges against him, advised of his rights, and asked to enter a plea: guilty, not guilty, or Nolo Contendere, a plea in which the defendant accepts the penalty without admitting guilt. (A Nolo Contendere plea for all practical purposes is a plea of guilty.) If the judge accepts a guilty plea, a penalty will be issued and no trial will be scheduled. Assuming a “not guilty” plea or a plea of “guilty by reason of insanity,” the judge will put a trial date on the court calendar.

Unless the defendant chooses a bench trial (one where the judge alone presides), a trial by jury ensues. During a jury trial, the judge still decides matters of law, but the jury decides whether the evidence as presented is sufficient to convict the defendant. If the jury acquits the defendant, the person goes free. If the person is found guilty, a sentencing hearing is scheduled. The sentence may be determined by the jury or the judge, depending on the jurisdiction. During a sentencing hearing, aggravating and/or mitigating circumstances are presented, and often a presentence investigation is undertaken to identify those circumstances that may warrant consideration. That presentence investigation may include victim impact statements. Sentences are tied to the offense and include death sentences (there is no death sentence for fraud in the United States), incarceration, probation, fines, restitution, and other penalties such as drug treatment, house arrest, electronic monitoring, sanctions, denial of federal benefits, community service, and boot camps. For some crimes, incarceration may be mandated.

Subsequent to the guilty verdict and sentence, the convicted person may appeal the verdict, the sentence, or both. Although not applicable in fraud cases, death sentences have automatic appeal. Jail is reserved for sentences of less than one year’s duration, whereas prison is reserved for sentences greater than a year. The prison system has varying levels of custody, including community-based facilities, minimum security, medium security, and maximum security. Once a sentence has been fulfilled or is shortened for good behavior, the person is typically placed on parole. Often times, people confuse probation and parole. Probation is a penalty and is used as an alternative to prison, whereas parole is used to describe the corrections process subsequent to having served time in prison. Parole is often used as a reward for good behavior during time served. During the parole period, a parole officer is assigned.

Recidivism refers to the process in which a formerly convicted person reenters the criminal justice system. Unfortunately, many arrestees have a criminal history and the greater the number of prior arrests, the higher the probability of future arrests. Within the United States, more than half of convicted criminals will return to jail during their lifetime, frequently for more serious offenses. The criminal justice system is society and the government’s response to an unfortunate fact of life: people commit crimes. Despite the impact on the victims and society in general, the Constitution and case law dictates that law enforcement and grand juries must respect the rights of individuals. Most criminal justice actions are handled at the state and local levels. The U.S. Congress has established the federal response for crimes such as bank robbery, kidnapping, mail fraud, tax fraud, and interstate crimes, but state constitutions, counties, and municipalities further define and refine the criminal justice system. It should be understood that in criminal cases, dual jurisdiction often exists. For example, a bank fraud is not only a federal crime but also a local one. Law enforcement officials decide among themselves which agency will handle the investigation and prosecution.

The hallmark of the criminal justice system in the United States is discretion. At almost every level, people are the decision makers. For example, people, including victims, decide whether to report crimes; law enforcement decides if a crime occurred and what the official response should be. This discretion is pervasive throughout the system: police, other law enforcement, prosecutors, judges and magistrates, correctional officials, and parole authorities. The discretion creates a professional level of responsibility on the part of participants including training, supervision, and periodic performance assessment and reviews.

In the criminal justice system, not only may individuals be named as defendants, but businesses and other organizations may be prosecuted as well. Prosecution can be used to obtain punishment for the wrongdoing entities, and as a means for changing future behavior and forcing cultural changes. Assuming that appropriate cases are prosecuted, entity prosecutions might result in deterrence on a very large scale, possibly industry wide. Prosecution of the entity still allows for prosecution of individuals as well, such as board members, officers, executives, shareholders, and employees. Generally, businesses may be held liable, assuming that the scope of the infraction was within the duties of the individual who committed the crime, and the individual was acting as an agent for the entity. In addition, the agent’s action was intended to benefit the entity. Factors that affect the decision to prosecute an entity are similar to those for individual prosecution and include the sufficiency of evidence, likelihood of success at trial, probability of deterrence and rehabilitation, and adequacy of nonprosecutorial remediation options. Other factors are also considered:

  • Nature and seriousness of offense
  • Corporation’s history
  • Timely and voluntary disclosure
  • Willingness to cooperate
  • Corporate compliance program
  • Corporate remedial action(s)
  • Replacement of management
  • Discipline/termination of wrongdoers
  • Payment of restitution
  • Disproportionate harm to employees, shareholders, and pensioners
  • Adequacy of prosecution for individuals
  • Adequacy of other remedies: civil, regulatory
  • Consistent with the remainder of the criminal justice system, prosecutors have wide discretion in these types of situations

Module 6: Civil Justice System

As noted above, the government prosecutes criminal cases on behalf of society, including the victims. Private parties may also enter the justice system in an attempt to right a wrong or resolve a dispute through the civil justice system. Fraud is just one such wrong that may enter the civil justice system; others include torts, breach of contract, breach of implied contract, negligence, and misrepresentations. The primary purpose of a civil action is to recover losses and possibly reap punitive damages. In fact, money and other similar damages are the main outcome in the civil justice system. In civil cases, however, Cease and Desist Orders and similar penalties may be attached. The way a fraud perpetrator suffers the risk of incarceration is through the criminal justice system. Fraud examiners and forensic accountants often find their skills put to good use in the civil justice system, not only in matters where fraud claims are made but also where lost profits, wages, value, and other similar allegations are made on behalf of a victim plaintiff. Most civil actions are handled in state court in the jurisdiction of the plaintiff, the party prosecuting the civil case or the jurisdiction of the defendant. Federal courts may be used for larger cases (those involving more than $75,000 or those that are multi-jurisdictional) because the plaintiffs gain greater access to witnesses and documents due to the broad jurisdiction.

Complaints and Pretrial Activity

Civil lawsuits begin when the plaintiff files a complaint in an appropriate jurisdiction. The complaint must provide assurance to the court that it has jurisdiction, outline the grounds for relief, and make a demand for judgment. Because the complaint is filed before the plaintiff may have all of its facts (i.e., before discovery, which is discussed below), the complaint does not need to be overly particular. Interestingly, fraud civil complaints must be specific and outline the fraud misrepresentations (the act), to whom (the impacted victim), how the misrepresentations were false, and other particular details in order to understand the fraud act. Yet, because the plaintiff most likely does not have complete access to the defendant’s information and records, the plaintiff may not have a complete story. Normally the defendant files an answer to the complaint, denies liability, and may add counterclaims against the plaintiff or even ask the court for a dismissal. The process to file a complaint and to await the defendant’s response can be very time-consuming, and in very larges cases can extend over a year or more. Of course, time is money so the more time spent, the greater the legal fees to the plaintiff and defense lawyers and others involved in the case.

Once the complaint and answer have been filed (and assuming that the case continues in the civil courts) discovery begins. Discovery is the process by which each side may explore the merits of the other side’s arguments by obtaining documentary and testimonial evidence. Any matter or material relevant to the civil action that is not privileged is subject to discovery. Normally, discovery may take at least four forms.

Initially, interrogatories are passed to the opposing council. Interrogatories are questions that require answers and those answers become part of the testimonial record. As such, answers are provided under oath. Although interrogatories are one of the least expensive means to obtain evidence from the opposing party because of an inability to ask follow-up questions, except through additional interrogatories, they may not be effective. Opposing parties tend to provide truthful responses yet minimal information.

Subsequent to interrogatories, opposing parties submit “requests to produce documents” to one another. These requests may include copies of contracts, notes from meetings, calendars, invoices, and accounting records of all sorts including general ledgers, trial balances, journal entries, journal entry backup, financial statements, and tax returns. Just about any information that is captured in paper or electronic form is subject to discovery. In very complex cases, the review of discovered documents alone can take years. While attorneys and experts can become almost overwhelmed with produced documents, most are remiss to limit the amount of document production for fear of missing that critical piece of paper that blows their case wide open.

Third, attorneys start to take sworn testimony from opposing parties in the form of depositions. Depositions that are grounded in the evidence and documents are popular and provide very useful information. The format is that the deponent (the person being deposed) provides sworn testimony based on questions developed by opposing council. Assuming that the attorney is well prepared and accomplished, he or she can use the deposition exercise to evaluate a number of issues:

  • How good of a witness will this person be; how good will they come across in front of a jury; can I get this person angry, aggressive, defensive, or emotional?
  • What is the opposing side’s theory of the case; what arguments are they likely to make in court; how deep is the evidence trail behind their theory of the case?
  • Is their witness making informed statements grounded in the evidence, or is this person likely to shoot from the hip?
  • How does this person react when I propose or suggest my side’s theory of the case? Does this person refute my theory with evidence; are they dismissive; are they emotional?

Thus, the deposition process not only provides the opportunity to obtain additional evidence, it provides a good opportunity, especially with key witnesses, including fraud examiners and forensic accounting expert witnesses, to evaluate each side’s case and their witness quality. As depositions proceed, it is often common for each side to develop additional requests for the production of documents based on deposition testimony of various parties. For example, a former accountant may know of the existence of a box of records in a storage area that was previously overlooked in a prior request for the production of documents.

The fourth and last stage of discovery is an attempt by counsel to get the other side to agree to certain basic aspects and facts of the case through “requests for admission.” This process helps determine what issues are points of contention as the trial approaches, and what points can be agreed upon by both sides. Thus, a request for admission attempts to narrow the scope of the trial to its essential points of contention.

Negotiated Settlements

Once discovery is completed and before trial, judges will often attempt to cajole both sides into settling the case based on the relative merits of their evidence and legal positions. In fact, some attorneys estimate that fewer than five percent of civil actions ever come to trial. There are three major forms of negotiated remedies: out-of-court settlements, arbitration, and mediation. Out-of-court settlements occur when both sides come to a settlement position after examination of their own clients, the evidence, the qualities of their fact witnesses, the strength of their expert opinions, and other important aspects of the case. Assuming that the two sides are reasonably close, the attorneys will confer with their clients and negotiate with the opposing attorney. This process can take weeks or months and may even start during the deposition phase. Normally a negotiated settlement will not be achievable prior to the end of, or near the end of, discovery.

If a negotiated settlement between opposing attorneys in concert with their clients does not work, a second approach is mediation. In this environment, an independent, objective mediator will work with both sets of opposing counsel to help reach a settlement between the two (and their clients). The mediator does not decide who should win, but his or her responsibility is to assist both sides to more objectively assess the merits of their case and work toward a mutually agreeable resolution. Since the mediator has no authority on which to decide cases, any settlement is voluntary on the part of the opposing parties.

A third possibility is arbitration. Like a mediator, an arbitrator is an independent third party who has the authority to determine the outcome of the case. Thus, the arbitrator acts like the judge and jury, listening to the primary aspects of each side’s case and deciding what he or she believes to be the most appropriate outcome based on the merits of the cases presented. Arbitration may be binding, meaning that the “verdict” of the arbitrator is final, or it can be nonbinding. Even a nonbinding “verdict” may bring the parties closer together and may result in an out-of-court settlement because of the ability of the arbitrator to independently and objectively evaluate the merits of each side’s case.

Pretrial Motions and the Civil Trial

Assuming that the discovery process is complete and any out-of-court attempts to settle the case fail, a slew of pretrial motions are likely to follow:

  • Writ of Attachments to prevent defendants from disposing of assets
  • Sequestration, in which the court takes possession of certain assets pending the outcome of the trial
  • Motions for Injunctive Relief to prevent a defendant from transferring or moving assets pending the trial’s outcome
  • Motions to Dismiss
  • Motions to Make (some aspects of the civil action) More Definite and Certain
  • Motions in Limine to prohibit reference to prejudicial matte
  • Motions to Strike inflammatory, prejudicial, or irrelevant material from trial
  • Motions for Continuance to postpone a hearing or trial
  • Motions for Summary Judgment that request the judge to decide the merits of the case without a trial based on material and testimony submitted

Normally, counsel is going to object to motions proposed by the other side of the civil action and a judge will need to decide on the motions in advance of the trial.

It will take months, if not years, for a civil action to actually be heard in a court of law. While many aspects of the civil trial mirror that of a criminal trial, a few important differences exist. First, in most cases the jurors number six persons, and if the opposing attorneys agree, a unanimous verdict is not required. Furthermore, a civil action only requires a preponderance of the evidence, meaning that the evidence stacks up slightly more heavily on one side than the other. This contrasts with the criminal threshold of “beyond a reasonable doubt.” During civil trials the plaintiff goes first, followed by the defense. Then the plaintiff gets a chance to rebut the defense’s position. Once a verdict is received, either side may appeal the liability issues and/or the damages portion of the verdict. Furthermore, a plaintiff or defendant who wins monetary damages in a lawsuit will normally have to take additional steps to collect the award. Such steps may include obtaining a financial judgment, garnishing wages, and levying assets. A postjudgment discovery process may be necessary to locate assets available to satisfy a judgment or identify assets that have been moved or transferred in an attempt to avoid satisfying the judgment.

Basic Accounting Principles

Basic Accounting Principles—A Survivor’s Guide to Accounting

In this section, we present an overview of the accounting system that every fraud examiner or forensic accountant needs to understand for successfully navigating financial books and records. Figure 3-1 depicts the flow of accounting information.

Schematic of accounting and
nonfinancial
information flow
through books
and records

FIGURE 3-1 Accounting and nonfinancial information flow through books and records

Basic (accounting) bookkeeping involves the recording, classifying, and summarizing of economic events in a logical manner for the purpose of providing accounting, financial, and nonfinancial information for decision making.

Auditors are concerned with determining whether information recorded in the accounting books and records properly reflects the underlying economics of the transactions. Thus, auditors need to know how to audit and how to evaluate recorded activity for compliance with generally accepted accounting principles (GAAP). Like auditors, the fraud examiner and forensic professional need to have some understanding of transactions and how those transactions are reflected in the books and records. If the facts at issue are associated with allegations of financial statement fraud, the investigator needs to have a thorough understanding of GAAP, auditing procedures, and the impact of any applicable regulations. As noted in prior chapters and throughout this text, fraud examiners and forensic specialists must be able to follow the money. But they must also be able to recognize and identify red flags and anomalous situations where the accounting numbers and amount reflected in underlying accounting records do not make sense or do not seem to add up. Recognition and identification of red flags inherently assumes that the investigator has some expectation of how the numbers should look. This requires some knowledge of basic accounting as well as knowledge of expected relationships between accounting metrics and nonfinancial data generated inside and outside of the organization. Of course, the fraud examiner and forensic accountant must also possess expertise in accumulating and interpreting evidence. The antifraud professional must design procedures to identify anomalies, investigate those anomalies, form and test hypotheses, and evaluate the evidence generated.

As a starting point, activities occur between the company and its stakeholders (board of directors, executive team, management, employees, creditors, bankers, suppliers, employee recruits, customers, suppliers, communities, government agencies, labor unions, etc.). These interactions result from negotiations and generate paper and electronic documentation of the activities and financial details such as location, prices, quantities, and timing (e.g., dates). Some of the financial aspects of these activities are considered financial transactions, and from those, various forms of physical and electronic paperwork are created: receipts, invoices, contracts, requests for proposal, proposals, purchase orders, bills of lading, shipping documents, funds transfer authorizations, and other source documents. This documentation may be captured in physical form such as printed documents and receipts or entirely in electronic format. The physical and electronic documentation captures the essential terms of the transactions and provides a primary means of inputting data into the formal accounting system. In other cases, the passage of time generates the need for accounting transactions. An example is that over time, the value of a delivery truck declines in the pursuit of revenue. Accounting needs to capture the decline in value across time. In another example, the passage of time generates interest obligations owed to creditors. Again, issue is a result of an organization—stakeholder interactions in prior periods; yet, this obligation needs to be reflected in the accounting system.

Transactions are input (recorded) into the accounting system through journal entries and electronic interfaces with operational (nonaccounting) information systems and posted into the general ledger. The general ledger is analogous to a series of buckets where the accounting transactions are organized and stored. Periodically, the information in the general ledgers is reconciled back to the underlying source documents as well as information provided by nonaccounting systems and external stakeholders, such as banks, credit card companies, vendors, and customers. For example, banks provide monthly statements and the activities reflected on them can be reconciled to the cash “bucket” in the general ledger. The reconciliation process is conducted to ensure the integrity of the information in the general ledger. Once the entity’s financial managers are satisfied with the integrity of the general ledger, the financial statements, tax returns, and other summarized financial and nonfinancial information can be created, distributed, and shared for the purposes of performance assessment (evaluation) and decision making.

One of the critical general ledger “buckets” for the fraud examiner and forensic accountant is the cash general ledger account. Most antifraud professionals follow the money. The company receives cash from its customers in the form of currency, checks directly from customers, and checks and electronic deposits from credit card companies. Although fewer in number, entities also receive cash from stockholder investments, loans from creditors, and from sales of old or used equipment. Entities disburse cash by writing checks and distributing them to employees, suppliers, creditors, and others. Cash disbursements can be made via the U.S. Postal Service, wire transfers, and through electronic funds transfer (EFT). All of these cash transactions are captured with various physical and electronic medium and are input into the entity’s accounting system and ultimately into the cash general ledger account (“bucket”).

At the same time, the entity’s bank is capturing and recording the transaction as well. Optimally, good accounting practice mandates that these two systems (the company’s cash account and the bank’s records of those same transactions) be checked for agreement each month through a formal reconciliation. Similar to cash, most transactions are tracked not only by the company but also by other parties to the transaction, such as customers, vendors, and creditors. Thus, fraud examiners and forensic accountants review the company’s accounting books and records as well as the corresponding information from third parties to look for discrepancies from which fraud investigations are often launched.

Not only do fraud examiners and forensic accountants need to monitor transactions from the perspective of the company and corresponding outsiders but they also need to ensure that the accounting information corresponds to the company’s nonaccounting information because many business activities are not captured in the accounting system, but rather a function of operational management information systems and data from a variety of other sources. For example, a contract between a company and a customer to deliver goods and services next year is referred to as “backlog” and is not reflected in the accounting records until the company starts to fulfill its contractual obligation. Yet, backlog is a critical metric, the detail of which is carefully measured, monitored, and evaluated across time.

Notice how the information sources and flow are depicted in Figure 3.1 that starts on the left by capturing data reflecting financial transactions, nonfinancial operational systems, and the passage of time into the accounting system. Management information systems (MIS) are used to provide the data required by managers to run their operations. For example, a petroleum plant would carefully monitor raw materials inventory levels, the transfers of raw materials into the manufacturing process, and various aspects of production to ensure quality, the amount of manufacturing output, and inventory levels of finished product. These data are critical for plant managers; they could not do their job without detailed and accurate information. In some systems, data from the nonaccounting systems are designed to interface electronically with the accounting information systems. In others, summarized data from the MIS systems are used as a manual input into the accounting system. In either case, antifraud professionals and forensic accountants will use data from nonaccounting sources as a means of looking for discrepancies with data reflected in the accounting records, a source of red flags.

Nonfinancial data can be generated from many sources. As an example, consider a bar owner who is suspected of underpaying taxes. A method commonly used is to look for data that is not normally captured in the accounting system. To illustrate, as described in DiGabrile, one crafty fraud examiner took all of the invoices supporting cost of goods sold, added up the quantities purchased, and multiplied the quantities by the selling prices on the bar’s menu. The approach resulted in hundreds of thousands of dollars of underreported revenue. Because quantities presented on an accounting record (i.e., an invoice that describes prices, quantities, and dates) are not captured by the accounting system, it becomes a nonfinancial information source upon which to identify discrepancies. To be successful, fraud examiners and forensic accountants need to continually seek out information sources from independent third parties and from internal sources that are not directly reflected in the accounting system as a means of evaluating data captured and reported in accounting reports, such as financial statements and tax returns. Even the reconciliation of tax returns to financial statements often reveals discrepancies between the two that serve as red flags that require additional investigative inquiry.

Other basic but critical aspects of the accounting process that fraud examiners and forensic accountants need to know include the following:

  • Types of financial statements
  • How cash transactions are categorized: operating, investing, and financing activities
  • A second categorization approach: assets, liabilities, stockholders equity, revenues, and expenses
  • Every transaction affects at least two general ledger “buckets” (accounts)
  • Accrual accounting: the revenue recognition principle and the expense matching principle
  • Accounting choices and exceptions: materiality and conservatism
  • The importance of what’s not on the financial statements. Consider the following example:
Value of Checking Account?
Cash in from Owner $750
• Loan from Bank   0
 – Inflows $750
• Purchase Office Equipment $300
• Purchase Production Machine 250
• Rent 275
• Purchase Supplies   75
 – Outflows $900
• Inflows from Customers Sales $300
Remaining cash in checking $150

The checking account for this start-up business has an initial deposit of $750 from the owner, pays for various items totaling $900, and collects $300 from sales to customers. These transactions leave a month-end checking account balance of $150. The ultimate question: Is the business owner better off at the end of the month than at the beginning? On the one hand, he started with $750 in cash but only has $150 now; that doesn’t sound so good. On the other hand, the owner now has equipment and production machinery that have value and an ongoing business operation—also valuable. Another issue not addressed in the accounting system is the sales potential. Is a $300 sale per month a maximum or is that the result of a few days’ sales at the end of the first month of business after the infrastructure was put in place? While this example has only a few transactions, what if the business had 100, 1,000, or 10,000 cash transactions? The point is that simply looking at checking account information is not enough. The accounting profession has responded to this anomaly by transferring the above information into a series of financial statements: balance sheet, income statement, and the cash flow statement. These documents meaningfully reorganize the above data for effective performance assessment and decision making.

Balance Sheet

The balance sheet measures the financial condition of an entity at a point in time. It does this by measuring the resources that a business has, its assets, and compares the business’s resources (assets) to the sources from which those resources came. Resources are acquired with money provided from one of two sources: creditors (suppliers, banks, etc.) and the company’s owners. Amounts owed to creditors are liabilities, and funds contributed by the owner are the stockholders’ (or owner’s) equity. Although a little confusing, the owner’s contribution comes from two sources: investments of cash into the business and earnings (income) from prior periods that owners have left in the business (retained earnings) to fund additional investment and operational expansions. The balance sheet is set up in the fundamental accounting equation where assets must always equal liabilities plus owner’s equity. From the balance sheet, the financial condition can be evaluated. Too many liabilities make the company vulnerable to bankruptcy. Liabilities, however, reflect the owner’s ability to use “other people’s money” to fund the business, suggesting that more liabilities are good. Simplistically, one challenge for business owners is to balance liabilities against owner’s equity to maximize the use of other people’s money without increasing the business’s risk of bankruptcy. Of course, negative owner’s equity suggests that liabilities exceed the value of the assets as recorded on the balance sheet and that is seldom, if ever, good news.

Income Statement

The second major financial statement is the income statement. This summarizes information about a company’s financial performance over a period of time (e.g., month, quarter, year). The income statement measures inflow from customers arising from sales of goods and services (revenue) versus outflow required to operate the business (expenses). The terms inflows and outflows are carefully chosen because sometimes sales to customers result in receivables, not cash. Similarly, outflows consider the fact that some items required to run the business are paid in advance (e.g., insurance is often paid in advance of a six-month or one-year policy), while others are paid after they are used (e.g., employees are paid after they render services because it takes time to collect time cards, summarize the hours, input them into a payroll system, calculate taxes and other withholdings, and cut checks). We address the differences in timing between cash flows in more detail below (see accruals).

Statement of Cash Flows

The third and final major financial statement is the statement of cash flows. This takes each “cash” transaction and categorizes it into one of three categories after considering how it affects the business. The three categories are cash flow from operating activities, investing activities, and financing activities. Operating cash flows are those cash transactions associated with day-to-day business activities: production and sales of goods and services and cash outflows to pay for operational expenses. Net operating cash flows are expected to be positive because a business should be taking in more cash from its customers than it is paying out to suppliers, employees, and for other expenses necessary to operate the business. The second category of cash flows includes payments for the acquisition of long-term assets and cash received from the sale of older or obsolete long-term assets. These are referred to as investing activities and, generally, the net of these types of cash transactions are expected to be negative because companies should be expending cash on long-term assets to secure a productive future.

The last category of cash flows includes receipts and payments associated with business financing choices and have four major types of activities:

  1. Cash inflows from new loans.
  2. Cash outflows from the repayment of loans (excluding interest which is categorized as operating).
  3. Cash inflows from new stock investors.
  4. Cash outflows to stock investors in the form of dividends.

Given these types of receipts and payments, financing cash flow could be negative or positive. In the early years in the life of a business, financing cash flows are more likely to be positive and, as a company matures, financing cash flows may turn toward the negative.

One of the challenges of accounting data is that it can be evaluated from multiple perspectives. As noted above, all cash transactions can be categorized as operating, investing, or financing. Since that categorization is associated only with the cash flow statement, those same transactions can also be categorized based on their effect on the other two statements: balance sheet and income statement. More interestingly, when evaluating the impact of a transaction on the balance sheet and income statement, each transaction has at least two effects. Some examples might help.

Note that even though this transaction arose from a sale to a customer, sales were recorded in the prior month and there is no income statement impact in the current month.

Accrual Accounting

Examples one, four, five, and six bring up the issue of accrual accounting. It recognizes the impact of a company’s activities that affect its financial condition (balance sheet) or financial performance (income statements) that may not coincide with the timing of cash flows. Accruals are used to capture the financial impact of transactions for which the cash flows associated with the transaction are recorded in other periods (e.g., cash flows were in a prior month or year or the cash flow will occur in a future month or year). Whether or not a noncash transaction qualifies for treatment as an accrual transaction that must be recorded in the accounting books and records is determined by two matters: the revenue recognition principle and the matching principle.

The revenue recognition and matching principles are further refined through generally accepted accounting principles called Statements of Financial Accounting Standards, also known as SFASs, which are developed by the Financial Accounting Standards Board (FASB) as well as other authoritative guidance.15 While the revenue recognition and matching principles provide conceptual guidelines, the guidance contained in the SFASs and other authoritative guidelines takes precedence. The revenue recognition principle requires that the revenue be recorded in the period earned, and the expense matching principle requires that expenses be matched against the revenues they helped to generate. The intent of these two principles is that revenues and expenses are recorded in the proper period. More specifically, revenue is recognized when the following three criteria have been met:

  1. Customers have received goods or services.
  2. All material uncertainty (risk) has been passed along to the customer.
  3. Collection of cash related to revenue is likely.

Following revenue recognition, expenses are matched to revenue under three conditions:

  1. Costs are incurred to generate revenue (e.g., wages).
  2. Assets (capitalized costs) are no longer a resource with future value because they have been consumed to earn revenue (e.g., depreciation).
  3. Assets (capitalized costs) are no longer a resource with future value due to obsolescence.

Most people who are new to accounting believe that accounting is very rules driven and specific, and with regard to many aspects of accounting, they are correct. Such a belief, however, ignores the vast number of areas where management is required to exercise its judgment. The biggest problem area for accounting regulators is revenue recognition. Despite the above guidance, management has tremendous latitude related to the accounting principles they choose, the period that is most appropriate to record a specific type of transaction, the estimated useful life of an asset, and the estimated collectability of receivables from customers, to name a few.

Two additional conceptual principles provide accounting discretion. First, if a transaction or series of transactions are deemed “immaterial,” the accountants can handle the transaction in any manner they wish. The theory is that if the amount is immaterial, how it is accounted for has little or no significant impact on decision making. While no specific number is agreed upon, some general rules of thumb are one percent of assets, one percent of revenues (sales), or five percent of pretax net income. For billion-dollar companies, transactions deemed immaterial can have very large dollar amounts associated with those thresholds.

A third and final area of discretion is related to a principle called conservatism. It suggests that if two outcomes are equally likely, the one that has the more negative effect is the better choice in situations where negative impact includes understating assets and revenues and overstating liabilities and expenses. Recently, standard setters and regulators seem more interested in determining the best estimate of financial condition and performance versus presenting the most pessimistic picture, but conservatism remains an influential concept.

Performance Assessment and Decision Making

One of the primary benefits of the financial and nonfinancial data generated, examined, interpreted, and monitored through the accounting process is for their use as inputs in performance assessment and decision making. Importantly, performance evaluation and decision making are ultimately grounded in professional judgment. Judgment is a function of education, training, and experience. Often accounting and nonaccounting information serve as the foundation of assessment and decisions. As sometimes stated, the accounting and nonaccounting data and analysis will seldom tell one what to do, it will most often eliminate many bad courses of action, leaving management and stakeholders with a relatively few choices (e.g., two, three, or four) upon which decision makers can focus their attention. Evaluation is typically done at the internal (e.g., trends across time) and external (company comparison to the industry and/or key competitors) levels.

One analysis is to prepare common-sized financial statements: balance sheets, income statements, and cash flows. With common-sized statements, balance sheet line items are presented as a percentage of total assets, and income and cash flow statement line items are presented as a percentage of total net sales or gross revenue. The percentages can then be examined internally across time and temporally to competitors and industry metrics.

Ratio analysis is another evaluation technique. There are five categories of ratios:

  • Liquidity ratios
  • Operating efficiency ratios
  • Operating profitability ratios
  • Business risk (operating) analysis ratios
  • Financial risk (leverage) analysis ratios

Much has been written about these ratios, their calculation, use, and interpretation. In the following table, we will present each of the five categories, the specific ratios, and the usual formula for calculation.

Ratios Formulation
Liquidity Ratios
Current Ratio Current Assets/Current Liabilities
Quick Ratio Cash + Marketable Securities + Receivables/Current Liabilities
Days in Receivable 365/Net Sales/((Beginning A/R + Ending A/R) ÷ 2)
Days in Inventory 365/Cost of Goods Sold/((Beginning Inventory + Ending Inventory) ÷ 2)
Days in Accounts Payable 365/Accounts Payable/((Beginning Inventory + Ending Inventory) ÷ 2)
Cash Conversion Cycle Days in Inventory + Days in Receivable − Days in Accounts Payable
Operating Efficiency Ratios
 Fixed Asset Turnover Net Sales/((Beginning Fixed Assets + Ending Fixed Assets) ÷ 2)
 Asset Turnover Net Sales/((Beginning Assets + Ending Assets) ÷ 2)
Operating Profitability Ratios
 Cost of Sales/Sales (%) Cost of Goods Sold/Net Sales
 Gross Margin (%) Gross Profit (Net Sales – Cost of Goods Sold)/Net Sales
 Operating Profit Margin (%) Operating Profit (Net Sales – Operating Expenses)/Net Sales
 Profit Margin (%) Net Income/Net Sales
 Return on Assets (%) (ROA) Net Income/((Beginning Assets + Ending Assets) ÷ 2)
 Return on Equity (%) (ROE) Net Income/((Beginning Stockholders’ Equity + Ending Stockholders’ Equity) ÷ 2)
Business Risk (Operating) Ratios
 Operating Income (EBIT) Volatility
(Coefficient of Variation)
Average earnings before interest and taxes for several time periods/Standard deviation of earnings before interest and taxes for several time periods
 Sales Volatility
(Coefficient of Variation)
Average net sale for several time periods/Standard deviation of sales for several time periods
 Degree of Operating Leverage Percentage change in earnings before interest and taxes/Percentage change in sales
Financial Risk (Leverage) Analysis Ratios
 Debt to Assets Total Debt (short and long-term liabilities)/Assets
 Equity to Assets Stockholders’ Equity/Assets
 Debt to Equity Total Debt (short and long-term liabilities)/Stockholders’ Equity
 Interest Coverage Ratio Earnings before interest and taxes/Interest Expense
 Operating Cash Flow Ratio Operating cash flow/Current Liabilities

The Dupont model is a method of performance measurement that demonstrates how the tools of evaluation fit together for a more comprehensive analysis. For example, return on assets can be expressed as a function of net income, net sales, and assets as follows:

ROA=Profit Margin*Asset Turnover=(Net Income/Net Sales)*(Net Sales/Average Assets)

Return on assets can be also described as a function of net income, stockholders’ equity, and assets as follows:

ROA=ROE*Equity to Assets=(Net Income/Average Stockholders Equity)*(Stockholders Equity/Assets)

Further, return on equity can be also described as a function of net income, net sales, stockholders’ equity, and assets as follows:

ROE=Profit Margin*Asset Turnover*Equity to Assets=(Net Income/Net Sales)*(Net Sales/Average Assets)*(Stockholders Equity/Assets)

Of course, as noted throughout the discussion of accounting, financial and nonfinancial data, and analysis above and throughout this text, forensic accountants and fraud examiners are experts with metrics, numbers, and analysis. As such, the FAFE professional will be correlating financial and nonfinancial data, metrics, and numbers from a variety of sources to evaluate their reasonableness and compare hypotheses (fraud theories) and assertions (claims made by parties to a civil dispute). It’s important that the professional consider hypotheses and assertions from many angles and attempt to examine data and interpret findings with an open mind and let the evidence lead them to defensible conclusions and opinions.

Regulatory System

An understanding of the regulatory system—entities such as the SEC and Public Company Accounting Oversight Board (PCAOB), laws such as the Sarbanes–Oxley Act (SOX), and Dodd-Frank—is an important aspect of the fraud examiner’s and forensic accountant’s education related to fraud detection and deterrence. While accounting, per se, is not regulated, various aspects of the accounting profession and the financial reporting process come under the purview of multiple regulatory bodies.

The AICPA and Statement on Auditing Standards No. 99

While the FASB develops generally accepted accounting principles, the purview of auditing of nonpublic companies falls under the guidelines of the American Institute of Certified Public Accountants (AICPA).

Subsequent to the passage of the Sarbanes–Oxley Act of 2002, regulation of public companies became the responsibility of the newly created Public Company Accounting Oversight Board (PCAOB), but the AICPA retained the authority to set standards and make rules in five major areas:

  • Auditing standards (for nonpublic companies)
  • Compilation and review standards
  • Other attestation standards
  • Consulting standards
  • Code of professional conduct

An audit is performed to ensure that the financial statements are fairly presented and are free from material misstatement. Note that this does not imply that financial statements are entirely correct or accurate. More specifically related to fraud, AICPA Statement on Auditing Standards (SAS) No. 99 directs that an audit should be planned and performed to obtain “reasonable assurance” about whether the financial statements are free of material misstatements, whether caused by error or fraud.

Furthermore, auditing standards require that an audit be completed with due professional care, which, in turn, requires that the auditor exercises professional skepticism. The causes of misstatements are errors and fraud. Fraud can arise from one of two sources: misappropriation of assets that rises to the level of materiality or (material) financial reporting fraud. (The ACFE lists three sources of what it defines as occupational fraud: asset misappropriations, fraudulent financial statements, and corruption. The latter category is distinguished from the first two in that it requires a coconspirator, sometimes not employed by the entity.) Examples of financial reporting fraud include the falsification of underlying accounting books and records and omission of certain transactions.

Professional skepticism entails three overlapping concepts:

  • An attitude that includes a questioning mind and a critical assessment of audit evidence
  • Conducting of the engagement that recognizes the possibility of material misstatement due to fraud
  • Dissatisfaction with less-than-persuasive evidence

Stated more succinctly, an auditor should have a questioning mind, recognize that financial statements may be materially misstated, and require persuasive evidence (evidence-based decision making).

SAS No. 99 specifically recognizes the importance of the fraud triangle: incentives (pressures), opportunity, and rationalization. SAS No. 99 offers an eight-step approach when considering the risk of materially misstated financial statements due to fraud.

Step 1 states that at the outset of an audit engagement auditors should undertake a staff discussion concerning the risks of fraud. The staff discussion should consist of brainstorming as well as considering how and where the financial statements might be susceptible to fraud and emphasize the need for professional skepticism.

Step 2 involves gathering information necessary to identify fraud risks, including inquiries of management, the audit committee, internal auditors, and others; the results of analytical procedures; identified fraud risk factors; and other information that may be suggestive of fraud.

During Step 3, auditors attempt to identify risks that may result in fraud, giving consideration to the types of risks, the significance or magnitude of the risk, the likelihood of the risk, and the pervasiveness of the risk.

In Step 4, the auditor assesses fraud risks after consideration of programs and controls to prevent fraudulent financial reporting. The auditors must rely on their understanding of the systems of internal control and evaluate whether they actually address the fraud risks identified. Since internal controls are designed to reduce the opportunity for fraud, this reassessment after recognition of internal control policies and processes is an important step in the process.

Step 5 requires the auditor to develop specific responses to fraud risks. As the risk of materially misstated financial statements increases, the auditor may respond in several ways. For example, the auditor can assign more experienced staff to the engagement, give more attention to accounting policies and choices, and apply less predictable audit procedures. In short, the auditor needs to increase the amount and quality of audit evidence by altering the nature, timing, and extent of audit procedures. A critical aspect of step 5 is assessing the possibility of management override. Despite a well-designed and implemented system of internal controls, certain individuals in management and the executive suite have tremendous influence and control. At times, the influence and control is so powerful that some managers may be able to override the system of internal controls. Essentially, the system of internal controls operates fine but for the actions of a few select, powerful individuals. The risk of management override should not be underestimated even in the most successful and well-run entities. To address the issue of management override, auditors should examine adjusting journal entries, support for adjusting journal entries, accounting estimates, underlying rationale and support for accounting estimates, and unusual (one time), significant transactions and the underlying rationale and support for the accounting treatment of these transactions.

Step 6 considers the audit evidence and requires auditors to continually assess fraud risk throughout the audit. The auditor needs to evaluate analytical procedures performed as substantive tests, evaluate risk of fraud near completion of fieldwork, and respond to identified material misstatements.

In Step 7, the auditor must communicate his findings as follows:

  • All fraud to an appropriate level of management
  • All management fraud to the audit committee
  • All material fraud to management and the audit committee
  • If reportable conditions related to the internal control environment have been identified, the auditor must communicate those to the audit committee

Step 8 ensures that the auditor has documented each of these steps in the consideration of fraud:

  • Staff discussion
  • Information used to identify risk of fraud
  • Fraud risks identified
  • Assessed risks after considering programs and controls
  • Results of assessment of fraud risk
  • Evaluation of audit evidence
  • Communications requirements

The Sarbanes–Oxley Act of 2002

The Sarbanes–Oxley Act of 2002 was signed into law on July 30, 2002, to address corporate governance and accountability as well as public accounting responsibilities in improving the quality, reliability, integrity, and transparency of financial reports. The Act provides sweeping measures aimed at

  • Establishing higher standards for corporate governance and accountability
  • Creating an independent regulatory framework for the accounting profession
  • Enhancing the quality and transparency of financial reports
  • Developing severe civil and criminal penalties for corporate wrongdoers
  • Establishing new protections for corporate whistleblowers

The Act has authorized the SEC to issue implementation rules on many of its provisions intended to improve corporate governance, financial reporting, and audit functions. The SEC has issued the following implementation rules pertaining to the Act:

  • New standards of professional conduct for attorneys
  • Standards and procedures related to listed company audit committees
  • Strengthening of the commission’s requirements regarding auditor independence
  • Disclosure in management’s discussion and analysis about off-balance sheet arrangements and aggregate contractual obligations
  • Disclosures regarding a Code of Ethics for Senior Financial Officers and Audit Committee Financial Experts
  • Retention of records relevant to audits and reviews
  • Insider trades during pension fund blackout periods
  • Conditions for use of non-GAAP financial measures
  • Certifications of disclosure in companies’ quarterly and annual reports

These implementation rules are expected to create an environment that promotes strong marketplace integrity, new criminal and civil penalties for violations of securities laws, improve the probability of detection and deterrence of corporate misstatements, and restore public trust in the quality and transparency of financial information. Table 3-1 summarizes important provisions of the Act aimed at improving corporate governance, financial reports, and audit functions.

TABLE 3-1 Corporate governance and accounting provisions of the Sarbanes–Oxley Act of 2002

Sec. Provisions
101 Establishment of Public Company Accounting Oversight Board (PCAOB)
  1. The PCAOB will have five financially literate members.
  2. Members are appointed by the SEC for five-year terms, will serve on a full-time basis, and may be removed by the SEC “for good cause.”
  3. Two of the members must be or have been CPAs, and the remaining three must not be or have been CPAs.
  4. The chair may be held by one of the CPA members, who must not have been engaged as a practicing CPA for five years.
103 The PCAOB shall:
  1. Register public accounting firms (foreign and domestic) that prepare audit reports for issuers.
  2. Establish, or adopt, by rule, auditing, quality control, ethics, independence, and other standards relating to the preparation of audit reports for issuers.
  3. Conduct inspections of registered public accounting firms.
  4. Conduct investigations and disciplinary proceedings and impose appropriate sanctions.
  5. Enforce compliance with the Act, the rules of the Board, and other applicable rules and regulations.
  6. Establish budget and manage the operations of the Board and its staff.
107 Commission Oversight of the Board:
  1. The SEC shall have oversight and enforcement authority over the PCAOB.
  2. The SEC can, by rule or order, give the PCAOB additional responsibilities.
  3. The PCAOB is required to file proposed rules and proposed rule changes with the SEC.
  4. The SEC may approve, reject, or amend such rules.
  5. The PCAOB must notify the SEC of pending investigations and coordinate its investigation with the SEC Division of Enforcement.
  6. The PCAOB must notify the SEC when it imposes any final sanction on any accounting firm or associated person.
  7. The PCAOB findings and sanctions are subject to review by the SEC, which may enhance, modify, cancel, reduce, or require remission of such sanction.
108 Accounting Standards:
  1. The SEC may recognize as “generally accepted” any accounting principles that are established by a standard-setting body that meets the Act’s criteria.
  2. The SEC shall conduct a study on the adoption of a principles-based accounting system.
201 Auditor Independence: Services outside the Scope of Practice of Auditors:
  1. Registered public accounting firms are prohibited from providing any nonaudit services to an issuer contemporaneously with the audit including but not limited to (1) bookkeeping or other services related to the accounting record or financial statement of the audit client, (2) financial information systems design and implementation, (3) appraisal or valuation services, (4) actuarial services, (5) internal audit outsourcing services, (6) management functions or human resources, (7) broker or dealer, investment advisor, or investment banking, (8) legal services and expert services unrelated to the audit, and (9) any other services that the PCAOB determines, by regulation, to be impermissible.
  2. The PCAOB may, on a case-by-case basis, exempt from these prohibitions any person, issuer, public accounting firm, or transaction, subject to review by the SEC.
  3. Nonaudit services not explicitly prohibited by the Act, such as tax services, can be performed upon preapproval by the audit committee and full disclosure to investors.
203 Audit Partner Rotation:
The lead audit or coordinating partner and reviewing partner of the registered accounting firm must rotate off of the audit every five years.
204 Auditor Reports to Audit Committees:
The registered accounting firm must report to the Audit Committee
  1. All critical accounting policies and practices to be used
  2. All alternative treatments of financial information within generally accepted accounting principles, ramifications of the use of such alternative disclosures and treatments, and the preferred treatment
  3. Other material written communication between the auditor and management
206 Conflicts of Interest:
The registered accounting firm is prohibited from performing an audit for an issuer whose CEO, CFO, controller, chief accounting officer, or person in an equivalent capacity employed by the accounting firm during the one-year period preceding the audit.
207 Study of Mandatory Rotation of Registered Public Accounting Firms:
The Comptroller General of the United States will conduct a study on the potential effects of requiring the mandatory rotation of public accounting firms.
301 Public Company Audit Committees:
  1. Each member of the audit committee shall be an independent member of the board of directors.
  2. To be considered independent, the member of the audit committee should not receive any compensations other than for service on the board, not accept any consulting, advisory, or other compensatory fee from the company, and not be an affiliated person of the issuer or any subsidiary thereof.
  3. The SEC may make exemptions for certain individuals on a case-by-case basis.
  4. The audit committee shall be directly responsible for the appointment, compensation, and oversight of the work of any registered public accounting firm associated by the issuer.
  5. The audit committee shall establish procedures for the receipt, retention, and treatment of complaints received by the issuer regarding accounting, internal accounting controls, or auditing matters, and the confidential, anonymous submission by employees of the issuer or concerns regarding questionable accounting or auditing matters.
  6. The audit committee shall have the authority to engage independent counsel and other advisers necessary to carry out its duties.
  7. The audit committee shall be properly funded.
302 Corporate Responsibility for Financial Reports:
  1. The signing officers (e.g., CEO, CFO) shall certify in each annual or quarterly report filed with the SEC that (1) the report does not contain any untrue statement of a material fact or omitted material facts that cause the report to be misleading and that (2) financial statements and disclosures fairly present, in all material respects, the financial condition and results of operations of the issuer.
  2. The signing officers are responsible for establishing and maintaining adequate and effective controls to ensure reliability of financial statements and disclosures.
  3. The signing officers are responsible for proper design, periodic assessment of the effectiveness and disclosure of material deficiencies in internal controls to external auditors and the audit committee.
303 Improper Influence on Conduct of Audits:
It shall be unlawful for any officer or director of an issuer to take any action to fraudulently influence, coerce, manipulate, or mislead auditors in the performance of financial audit of the financial statements.
304 Forfeiture of Certain Bonuses and Profits:
  1. CEOs and CFOs who revise company financial statements for the material noncompliance with any financial reporting requirements must pay back any bonuses or stock options awarded because of the misstatements.
  2. CEOs and CFOs shall reimburse the issuer for any bonus or other incentive-based or equity-based compensation received or any profits realized from the sale of securities during that period for financial restatements due to material noncompliance with financial reporting and disclosure requirements.
306 Insider Trades During Pension Fund Blackout Periods:
  1. It shall be unlawful for any directors or executive officers directly or indirectly to purchase, sell, or otherwise acquire or transfer any equity security of the issuer during any blackout periods.
  2. Any profits resulting from sales in violation of this section shall inure to and be recoverable by the issuer.
401 Disclosures in Periodic Reports:
  1. Each financial report that is required to be prepared in accordance with GAAP shall reflect all material correcting adjustments that have been identified by the auditors.
  2. Each financial report (annual and quarterly) shall disclose all material off-balance-sheet transactions and other relationships with unconsolidated entities that may have a material current or future effect on the financial conditions of the issuer.
  3. The SEC shall issue final rules providing that pro forma financial information filed with the Commission (1) does not contain an untrue statement of a material fact or omitted material information and (2) reconciles with the financial condition and results of operations.
  4. The SEC shall study the extent of off-balance sheet transactions, including assets, liabilities, leases, losses, and the use of special purpose entities, and whether the use of GAAP reflects the economics of such off-balance sheet transactions.
402 Extended Conflict of Interest Provisions:
It is unlawful for the issuer to extend credit to any directors or executive officers.
404 Management Assessments of Internal Controls:
  1. Each annual report filed with the SEC shall contain an internal control report which shall (1) state the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting and (2) contain an assessment of the effectiveness of the internal control structure and procedures as of the end of the issuer’s fiscal year.
  2. Auditors shall attest to, and report on, the assessment of the adequacy and effectiveness of the issuer internal control structure and procedures as part of audit of financial reports in accordance with standards for attestation engagements.
406 Code of Ethics for Senior Financial Officers:
The SEC shall issue rules to require each issuer to disclose whether it has adopted a code of ethics for its senior financial officers and the nature and content of such code.
407 Disclosure of Audit Committee Financial Expert:
The SEC shall issue rules to require each issuer to disclose whether at least one member of its audit committee is a “financial” expert as defined by the Commission.
409 Real Time Issuer Disclosures:
Each issuer shall disclose information on material changes in the financial condition or operations of the issuer on a rapid and current basis.
501 Treatment of Securities Analysts:
Registered securities associations and national securities exchanges shall adopt rules designed to address conflicts of interest for research analysts who recommend equities in research reports.
601 SEC Resource and Authority:
SEC appropriations for 2003 are increased to $776,000,000, from which $98 million shall be used to hire an additional 200 employees to provide enhanced oversight of audit services.
602 Practice before the Commission:
  1. The SEC may censure any person, or temporarily bar or deny any person the right to appear or practice before the SEC if the person does not possess the requisite qualifications to represent others, has willfully violated Federal Securities laws, or lacks character or integrity.
  2. The SEC shall conduct a study of “Securities Professionals” (e.g., accountants, investment bankers, brokers, dealers, attorneys, investment advisors) who have been found to have aided and abetted a violation of Federal Securities laws.
  3. The SEC shall establish rules setting minimum standards for professional conduct for attorneys practicing before the commission.
701 GAO Study and Report Regarding Consolidation of Public Accounting Firms:
The GAO shall conduct a study regarding consolidation of public accounting firms since 1989 and determine the consequences of the consolidation, including the present and future impact and solutions to any problems that may result from the consolidation.
802 Criminal Penalties for Altering Documents:
  1. It is a felony to knowingly alter, destroy, falsify, cover up, conceal, or create documents to impede, obstruct, or influence any existing or contemplated federal investigation.
  2. Registered public accounting firms are required to maintain all audit or review work-papers for five years.
903 White Collar Crime Penalty Enhancements:
904906
  1. The maximum penalty for mail and wire fraud is ten years.
  2. The SEC may prohibit anyone convicted of securities fraud from being a director or officer of any public company.
  3. Financial reports filed with the SEC (annual, quarterly) must be certified by the CEO and CFO of the issuer. The certification must state that the financial statements and disclosures fully comply with provisions of Securities Acts and that they fairly present, in all material respects, financial results and conditions of the issuer. Maximum penalties for willful and knowing violations of these provisions of the Act are a fine of not more than $500,000 and/or imprisonment of up to five years.
1001 Corporate Tax Returns:
The federal income tax return of public corporations should be signed by the CEO of the issuer.
1005 Authority of the SEC:
The Commission may prohibit a person from serving as a director or officer of a publicly traded company if the person has committed securities fraud.

Certification Obligations for CEOs and CFOs

One of the most significant changes affected by the Sarbanes–Oxley Act is the requirement that the Chief Executive Officer and the Chief Financial Officer of public companies personally certify annual and quarterly SEC filings. These certifications essentially require CEOs and CFOs to take responsibility for their companies’ financial statements and prevent them from delegating this responsibility to their subordinates and then claiming ignorance when fraud is uncovered in the financial statements. There are two types of officer certifications mandated by Sarbanes–Oxley: criminal certifications, which are set forth in Section 906 of the Act and codified at 18 USC § 1350; and civil certifications, which are set forth in Section 302.

Criminal Certifications (§ 906)

Periodic filings with the SEC must be accompanied by a statement, signed by the CEO and CFO, which certifies that the report fully complies with the SEC’s periodic reporting requirements and that the information in the report fairly presents, in all material respects, the financial condition and results of operation of the company. These certifications are known as criminal certifications because the act imposes criminal penalties on officers who violate the certification requirements. Corporate officers who knowingly violate the certification requirements are subject to fines of up to $1,000,000 and up to ten years imprisonment, or both. Corporate officers who willfully violate the certification requirements are subject to fines of up to $5,000,000 and up to twenty years imprisonment, or both.

Civil Certifications (§ 302)

Section 302 of the Act requires the CEO and CFO to personally certify the following in their reports:

  1. They have personally reviewed the report.
  2. Based on their knowledge, the report does not contain any material misstatement that would render the financials misleading.
  3. Based on their knowledge, the financial information in the report fairly presents, in all material respects, the financial condition, results of operations, and cash flow of the company.
  4. They are responsible for designing, maintaining, and evaluating the company’s internal controls; they have evaluated the controls within ninety days prior to the report; and they have presented their conclusions about the effectiveness of those controls in the report.
  5. They have disclosed to the auditors and the audit committee any material weaknesses in the controls and any fraud, whether material or not, that involves management or other employees who have a significant role in the company’s internal controls.
  6. They have indicated in their report whether there have been significant changes in the company’s internal controls since the filing of the last report.

Note that in items two and three the CEO and CFO are not required to certify that the financials are accurate or that there is no misstatement. They are simply required to certify that to their knowledge the financials are materially representative and not misleading. This does not mean, however, that senior financial officers can simply plead ignorance about their companies’ SEC filings in order to avoid liability. The term fairly presents in item three is a broader standard than what is required by GAAP. In certifying that their SEC filings meet this standard, the CEO and CFO essentially must certify that the company (1) has selected appropriate accounting policies to ensure the material accuracy of the reports; (2) has properly applied those accounting standards; and (3) has disclosed financial information that reflects the underlying transactions and events of the company. Furthermore, the other new certification rules (see 1, and 4–6 above) mandate that CEOs and CFOs take an active role in their companies’ public reporting, and in the design and maintenance of internal controls.

It is significant that in item four, the CEO and CFO have to certify not only that they are responsible for their companies’ internal controls but also that they have evaluated the controls within ninety days prior to their quarterly or annual report. Essentially, this certification requirement mandates that companies actively and continually reevaluate their control structures to prevent fraud.

Item five requires the CEO and CFO to certify that they have disclosed to their auditors and their audit committee any material weaknesses in the company’s internal controls, and also any fraud, whether material or not, that involves management or other key employees. Obviously, this is a very broad reporting requirement that goes beyond the “material” standard contemplated in SAS 82. The CEO and CFO now must report to their auditors and audit committee any fraud committed by management. This places a greater burden on the CEO and CFO to take part in antifraud efforts and to be aware of fraudulent activity within their companies in order to meet this certification requirement.

Item six is significant because periodic SEC filings must include statements detailing significant changes to the internal controls of publicly traded companies.

Management Assessment of Internal Controls

In conjunction with the § 302 certification requirements on the responsibility of the CEO and CFO for internal controls, § 404 of SOX requires all annual reports to contain an internal control report that (1) states management’s responsibility for establishing and maintaining an adequate internal control structure and procedures for financial reporting and (2) contains an assessment of the effectiveness of the internal control structure and procedures of the company for financial reporting. The filing company’s independent auditor will also be required to issue an attestation report on management’s assessment of the company’s internal control over financial reporting. This attestation report must be filed with the SEC as part of the company’s annual report.

New Standards for Audit Committee Independence

Section 301 of the Act requires that the audit committee for each publicly traded company shall be directly responsible for appointing, compensating, and overseeing the work of the company’s outside auditors. The Act also mandates that the auditors must report directly to the audit committee—not management—and makes it the responsibility of the audit committee to resolve disputes between management and the auditors. Section 301 also requires that the audit committee must have the authority and funding to hire independent counsel and any other advisors it deems necessary to carry out its duties.

Composition of the Audit Committee

The Sarbanes–Oxley Act mandates that each member of a company’s audit committee must be a member of its board of directors and must otherwise be independent. The term independent means that the audit committee member can receive compensation from the company only for his or her service on the board of directors, the audit committee, or another committee of the board of directors. The company may not pay them for any other consulting or advisory work.

Financial Expert

Section 407 of the Act requires every public company to disclose in its periodic reports to the SEC whether or not the audit committee has at least one member who is a financial expert, and if not to explain the reasons why. The Act defines a financial expert as a person who, through education and experience as a public accountant or an auditor, or a CFO, comptroller, chief financial officer, or a similar position (1) has an understanding of generally accepted accounting principles and financial statements; (2) has experience in preparing or auditing financial statements of comparable companies and the application of such principles in accounting for estimates, accruals, and reserves; (3) has experience with internal controls; and (4) has an understanding of audit committee functions.

Establishing a Whistle-Blowing Structure

The Act makes it the responsibility of the audit committee to establish procedures (e.g., a hotline) for receiving and dealing with complaints and anonymous employee tips regarding irregularities in the company’s accounting methods, internal controls, or auditing matters.

New Standards for Auditor Independence

Perhaps the greatest concern arising out of the public accounting scandals of 2001 and 2002 was the fear that public accounting firms that received multimillion-dollar consulting fees from their public company clients could not maintain an appropriate level of objectivity and professional skepticism in conducting audits for those clients. In order to address this concern, Congress, in § 201 of the Sarbanes–Oxley Act, established a list of activities that public accounting firms are now prohibited from performing on behalf of their audit clients. The prohibited services are as follows:

  • Bookkeeping services
  • Financial information systems design and implementation
  • Appraisal or valuation services, fairness opinions, or contribution-in-kind reports
  • Actuarial services
  • Internal audit outsource services
  • Management functions or human resources
  • Broker or dealer, investment adviser, or investment banking services
  • Legal services and expert services unrelated to the audit
  • Any other service that the Public Company Accounting Oversight Board proscribes

There are certain other nonaudit services—most notably tax services—that are not expressly prohibited by Sarbanes–Oxley. In order for a public accounting firm to perform these services on behalf of an audit client; however, that service must be approved in advance by the client’s audit committee. Approval of the nonaudit services must be disclosed in the client’s periodic SEC reports.

Mandatory Audit Partner Rotation

Section 203 of the Act requires public accounting firms to rotate the lead audit partner or the partner responsible for reviewing the audit every five years.

Conflict of Interest Provisions

Another provision of Sarbanes–Oxley aimed at improving auditor independence is § 206, which seeks to limit conflicts or potential conflicts that arise when auditors cross over to work for their former clients. The Act makes it unlawful for a public accounting firm to audit a company if—within the prior year—the client’s CEO, CFO, controller, or chief accounting officer worked for the accounting firm and participated in the company’s audit.

Auditor Reports to Audit Committees

Section 301 requires that auditors report directly to the audit committee, and § 204 makes certain requirements as to the contents of those reports. In order to help ensure that the audit committee is aware of questionable accounting policies or treatments that were used in the preparation of the company’s financial statements, § 204 states that auditors must make a timely report of the following to the audit committee:

  • All critical accounting policies and practices used
  • Alternative GAAP methods that were discussed with management, the ramifications of the use of those alternative treatments, and the treatment preferred by the auditors
  • Any other material written communications between the auditors and management

Auditors’ Attestation to Internal Controls

As was stated previously, § 404 of the Act requires every annual report to contain an internal control report, which states that the company’s management is responsible for internal controls and also assesses the effectiveness of the internal control structures. Section 404 requires the company’s external auditors to attest to and issue a report on management’s assessment of internal controls.

Improper Influence on Audits

The Act also makes it unlawful for any officer or director of a public company to take any action to fraudulently influence, coerce, manipulate, or mislead an auditor in the performance of an audit of the company’s financial statements. This is yet another attempt by Congress to ensure the independence and objectivity of audits in order to prevent accounting fraud and strengthen investor confidence in the reliability of public company financial statements.

Enhanced Financial Disclosure Requirements

Off-Balance Sheet Transactions

As directed by § 401 of the Act, the rules require disclosure of

all material off-balance sheet transactions, arrangements, obligations (including contingent obligations), and other relationships the company may have with unconsolidated entities or persons that may have a material current or future effect on the company’s financial condition, changes in financial condition, liquidity, capital expenditures, capital resources, or significant components of revenues or expenses.

These disclosures are required in all annual and quarterly SEC reports.

Pro Forma Financial Information

Section 401 also directs the SEC to issue rules on pro forma financial statements. These rules require that pro forma financials must not contain any untrue statements or omissions that would make them misleading, and that they are reconciled to GAAP. These rules apply to all pro forma financial statements that are filed with the SEC or that are included in any public disclosure or press release.

Prohibitions on Personal Loans to Executives

Section 402 makes it illegal for public companies to make personal loans or otherwise extend credit, either directly or indirectly, to or for any director or executive officer. There is an exception that applies to consumer lenders if the loans are consumer loans of the type the company normally makes to the public, and on the same terms.

Restrictions on Insider Trading

Section 403 establishes disclosure requirements for stock transactions by directors and officers of public companies, or by persons who own more than ten percent of a publicly traded company’s stock. Reports of changes in beneficial ownership by these persons must be filed with the SEC by the end of the second business day following the transaction.

Under § 306, directors and officers are also prohibited from trading in the company’s securities during any pension fund blackout periods. This restriction only applies to securities that were acquired as a result of their employment or service to the company. A blackout period is defined as any period of more than three consecutive business days in which at least 50% of the participants in the company’s retirement plan are restricted from trading in the company’s securities. If a director or officer violates this provision, he or she can be forced to disgorge to the company all profits received from the sale of securities during the blackout period.

Codes of Ethics for Senior Financial Officers

Pursuant to § 406 of the Act, the SEC establishes rules that require public companies to disclose whether they have adopted a code of ethics for their senior financial officers and if not, to explain the reasons why. The new rules also require immediate public disclosure any time there is a change of the code of ethics or a waiver of the code of ethics for a senior financial officer.

Enhanced Review of Periodic Filing

Section 408 of the Act requires the SEC to make regular and systematic reviews of disclosures made by public companies in their periodic reports to the SEC. Reviews of a company’s disclosures, including its financial statements, must be made at least once every three years. Prior to this enactment, reviews were typically minimal and tended to coincide with registered offerings.

Real-Time Disclosures

Under § 409, public companies must publicly disclose information concerning material changes in their financial condition or operations. These disclosures must be “in plain English” and must be made “on a rapid and current basis.”

Protections for Corporate Whistleblowers under Sarbanes–Oxley

The Sarbanes–Oxley Act establishes broad new protections for corporate whistleblowers. There are two sections of the Act that address whistleblower protections: Section 806 deals with civil protections and Section 1107 establishes criminal liability for those who retaliate against whistleblowers.

Civil Liability Whistleblower Protection

Section 806 of the Act, which is codified at 18 USC § 1514A, creates civil liability for companies that retaliate against whistleblowers. It should be noted that this provision does not provide universal whistleblower protection; it only protects employees of publicly traded companies. Section 806 makes it unlawful to fire, demote, suspend, threaten, harass, or in any other manner discriminate against an employee for providing information or aiding in an investigation of securities fraud. In order to trigger § 806 protections, the employee must report the suspected misconduct to a federal regulatory or law enforcement agency, a member of Congress or a committee of Congress, or a supervisor. Employees are also protected against retaliation for filing, testifying in, participating in, or otherwise assisting in a proceeding filed or about to be filed relating to an alleged violation of securities laws or SEC rules.

The whistleblower protections apply even if the company is ultimately found not to have committed securities fraud. As long as employees reasonably believe they are reporting conduct that constitutes a violation of various federal securities laws, then they are protected. The protections cover retaliatory acts not only by the company but also by any officer, employee, contractor, subcontractor, or agent of the company.

If a public company is found to have violated § 806, the Act provides for an award of compensatory damages sufficient to “make the employee whole.” Penalties include reinstatement; back pay with interest; and compensation for special damages including litigation costs, expert witness fees, and attorneys’ fees.

Criminal Sanction Whistleblower Protection

Section 1107 of Sarbanes–Oxley—codified at 18 USC § 1513—makes it a crime to knowingly, with the intent to retaliate, take any harmful action against a person for providing truthful information relating to the commission or possible commission of any federal offense. This protection is only triggered when information is provided to a law enforcement officer; it does not apply to reports made to supervisors or to members of Congress, as is the case under § 806.

In general, the coverage of § 1107 is much broader than the civil liability whistleblower protections of § 806. While the § 806 protections apply only to employees of publicly traded companies, § 1107’s criminal whistleblower protections cover all individuals (and organizations) regardless of where they work. Also, § 806 only applies to violations of securities laws or SEC rules and regulations. Section 1107, on the other hand, protects individuals who provide truthful information about the commission or possible commission of any federal offense. Violations of § 1107 can be punished by fines of up to $250,000 and up to ten years in prison for individuals. Corporations that violate the Act can be fined up to $500,000.

Enhanced Penalties for White-Collar Crime

As part of Congress’ general effort to deter corporate accounting fraud and other forms of white-collar crime, the Sarbanes–Oxley Act also enhances the criminal penalties for a number of white-collar offenses.

Attempt and Conspiracy

The Act amends the mail fraud provisions of the United States Code (Chapter 63) to make attempt and conspiracy to commit offenses subject to the same penalties as the offense itself. This applies to mail fraud, wire fraud, securities fraud, bank fraud, and health-care fraud.

Mail Fraud and Wire Fraud

Sarbanes–Oxley amends the mail fraud and wire fraud statutes (18 USC § 1341, 1343), increasing the maximum jail term from five to twenty years.

Securities Fraud

Section 807 of the Act makes securities fraud a crime under 18 USC § 1348, providing for fines up to $250,000 and up to twenty-five years in prison.

Document Destruction

Section 802 of the Act makes destroying evidence to obstruct an investigation or any other matter within the jurisdiction of any U.S. department illegal and punishable by a fine of up to $250,000 and up to twenty years in prison. This section also specifically requires that accountants who perform audits on publicly traded companies to maintain all audit or review work papers for a period of five years. Violations of this rule may be punished by fines up to $250,000 and up to ten years in jail for individuals, or fines up to $500,000 for corporations. (Although § 802 only requires work papers to be maintained for five years, keep in mind that under § 103 of the Act the Public Company Accounting Oversight Board is directed to set standards that require public accounting firms to maintain audit work papers for seven years. Accounting firms should design their document retention policies accordingly.) Section 1102 of the Act makes it a criminal offense to corruptly alter, destroy, mutilate, or conceal a record or document with the intent to impair its integrity or use in an official proceeding or to otherwise obstruct, influence, or impede any official proceeding or attempt to do so. Violations of this section are punishable by fines up to $250,000 and imprisonment for up to twenty years.

Freezing of Assets

During an investigation of possible securities violations by a publicly traded company or any of its officers, directors, partners, agents, controlling persons, or employees, the SEC can petition a federal court to issue a forty-five-day freeze on “extraordinary payments” to any of the foregoing persons. If granted, the payments will be placed in an interest-bearing escrow account when the investigation commences. This provision was enacted to prevent corporate assets from being improperly distributed while an investigation is underway.

Bankruptcy Loopholes

Section 803 amends the bankruptcy code so that judgments, settlements, damages, fines, penalties, restitution, and disgorgement payments resulting from violations of federal securities laws are nondischargeable. This is intended to prevent corporate wrongdoers from sheltering their assets under bankruptcy protection.

Disgorgement of Bonuses

One of the most unique aspects of the Sarbanes–Oxley Act is § 304, which states that if a publicly traded company is required to prepare an accounting restatement due to the company’s material noncompliance, as a result of misconduct, with any financial reporting requirement under securities laws, then the CEO and CFO must reimburse the company for

  • Any bonus or other incentive-based or equity-based compensation received during the twelve months after the initial filing of the report that requires restating
  • Any profits realized from the sale of the company’s securities during the same twelve-month period

While the Act requires the CEO and CFO to disgorge their bonuses if the company’s financial statements have to be restated because of misconduct, it makes no mention of whose misconduct triggers this provision. There is nothing in the text of § 304 that limits the disgorgement provision to instances of misconduct by the CEO and CFO. Presumably then, the CEO and CFO could be required to disgorge their bonuses and profits from the sale of company stock even if they had no knowledge of and took no part in the misconduct that made the restatement necessary.

Now that we understand the underlying accounting principles that allow financial statement frauds to occur and the impact of the Sarbanes–Oxley Act to discourage these acts, in Chapter 14 we will turn to the mechanics of how such frauds are committed.

The Public Company Accounting Oversight Board (PCAOB)

Title I of Sarbanes–Oxley establishes the Public Company Accounting Oversight Board whose purpose is

to oversee the audit of public companies that are subject to the securities laws, and related matters, in order to protect the interests of investors and further the public interest in the preparation of informative, accurate, and independent audit reports for companies the securities of which are sold to, and held by and for, public investors. (Section 101)

In short, the Board is charged with overseeing public company audits, setting audit standards, and investigating acts of noncompliance by auditors or audit firms. The Board is appointed and overseen by the Securities and Exchange Commission. It is made up of five persons, two who are or have been CPAs and three who have never been CPAs. The Act lists the Board’s duties, which include the following:

  • Registering public accounting firms that audit publicly traded companies
  • Establishing or adopting auditing, quality control, ethics, independence, and other standards relating to audits of publicly traded companies
  • Inspecting registered public accounting firms
  • Investigating registered public accounting firms and their employees, conducting disciplinary hearings, and imposing sanctions where justified
  • Performing such other duties as are necessary to promote high professional standards among registered accounting firms, to improve the quality of audit services offered by those firms, and to protect investors
  • Enforcing compliance with the Sarbanes–Oxley Act, the rules of the Board, professional standards, and securities laws relating to public company audits

Registration with the Board

Public accounting firms must be registered with the Public Company Accounting Oversight Board in order to legally prepare or issue an audit report on a publicly traded company. In order to become registered, accounting firms must disclose, among other things, the names of all public companies they audited in the preceding year; the names of all public companies they expect to audit in the current year; and the annual fees they received from each of their public audit clients for audit, accounting, and nonaudit services.

Auditing, Quality Control, and Independence Standards and Rules

Section 103 of the Act requires the Board to establish standards for auditing, quality control, ethics, independence, and other issues relating to audits of publicly traded companies. On December 18, 2003, the Board adopted Auditing Standard No. 1, References in Auditors’ Reports to the Standards of the Public Company Accounting Oversight Board. This standard requires that auditors’ reports on engagements conducted in accordance with the Board’s standards include a reference that the engagement was performed in accordance with the standards of the PCAOB. This supersedes historically requisite references to generally accepted auditing standards (GAAS). Adopted rules do not take effect until the SEC approves them, as detailed in § 107 of the Act. Although the Act places the responsibility on the Board to establish audit standards, it also sets forth certain rules that the Board is required to include in those auditing standards. These rules include the following:

  • Audit work papers must be maintained for at least seven years.
  • Auditing firms must include a concurring or second partner review and approval of audit reports, and concurring approval in the issuance of the audit report by a qualified person other than the person in charge of the audit.
  • All audit reports must describe the scope of testing of the company’s internal control structure and must present the auditor’s findings from the testing, including an evaluation of whether the internal control structure is acceptable, and a description of material weaknesses in internal controls and any material noncompliance with controls.

Inspections of Registered Public Accounting Firms

The Act also authorizes the Board to conduct regular inspections of public accounting firms to assess their degree of compliance with laws, rules, and professional standards regarding audits. Inspections are to be conducted once a year for firms that regularly audit more than 100 public companies and at least once every three years for firms that regularly audit 100 or fewer public companies.

Investigations and Disciplinary Proceedings

The Board has the authority to investigate registered public accounting firms (or their employees) for potential violations of the Sarbanes–Oxley Act, professional standards, any rules established by the Board, or any securities laws relating to the preparation and issuance of audit reports. During an investigation, the Board has the power to compel testimony and document production.

The Board has the power to issue sanctions for violations or for noncooperation with an investigation. Sanctions can include temporary or permanent suspension of a firm’s registration with the Board (which would mean that firm could no longer legally audit publicly traded companies), temporary or permanent suspension of a person’s right to be associated with a registered public accounting firm, prohibition from auditing public companies, and civil monetary penalties of up to $750,000 for an individual and up to $15,000,000 for a firm.

Dodd-Frank

The Dodd-Frank Wall Street Reform and Consumer Protection Act (generally referred to as Dodd-Frank) was signed into law on July 21, 2010, in response to the financial crisis of 2008. Major highlights of this financial reform legislation included the following:

  • Consumer Protection—The Consumer Financial Protection Bureau, housed within the Federal Reserve system, was established to ensure that consumers receive the financial information necessary to protect them from hidden fees, abusive credit terms, and deceptive lender practices.
  • Regulate Wall Street and Reduce Big Bonuses—A provision of this legislation gives shareholders the right to a nonbinding vote on executive pay (“say on pay”) and golden parachutes.
  • End Too-Big-To-Fail Bailouts—By imposing harsher capital and leverage requirements, Dodd-Frank seeks to discourage financial firms from becoming too large. It also develops a safe process to liquidate those firms that collapse, financially.
  • Identify and Prevent Future Financial Crises—The Financial Stability Oversight Council was established to monitor systemic risk and take action before large, complex organizations threaten U.S. economic stability.
  • Transparency and Accountability for Complex Financial Instruments—Closes loopholes that permit irresponsible and abusive practices for over-the-counter derivatives, asset-backed securities, hedge funds, and mortgage brokers.
  • Investor Protection—The Credit Rating Agency-related provisions increase the agencies’ liability for inaccurate ratings and give the SEC leverage in imposing sanctions and bringing cases against these agencies for material misstatements or fraud. Other noteworthy provisions within the law encourage whistleblower reports and increase SEC funding to strengthen investor protection activities.

Since the enactment of Dodd-Frank, approximately 30% of the regulations have yet to be implemented. Under the administration of President Donald J. Trump, however, it doesn’t seem likely that, at least, some of those rules will ever see the light of day. Regulatory policy is a function of the administration and political party in power. Currently, there are areas where rollbacks of the original legislation are being considered, including adjusting the size at which banks are subject to regulatory oversight and exempting “small” banks—banks with assets of less than $100 billion—from some loan, mortgage, and trading requirements. For example, the Volcker Rule, which prohibits making certain kinds of speculative investments with customers’ money, would not apply to small banks.

Committee of Sponsoring Organizations’ (COSO) Enterprise Risk Management Framework (ERM)

The Committee of Sponsoring Organizations (COSO) of the Treadway Commission is a joint initiative of the American Accounting Association (AAA), the American Institute of CPAs (AICPA), the Financial Executives Institute (FEI), the Institute for Management Accountants (IMA), and the Institute of Internal Auditors (IIA). In September 2004, COSO released their ERM framework, recognized by the SEC as the critical methodology for Sarbanes–Oxley Section 404 compliance. It outlined the principles and components of effective risk management processes. Furthermore, the ERM framework describes how risks should be identified, assessed, and addressed. Interestingly, the framework emphasizes not only how effective risk management processes work but also the possibility of enhanced profitability and return as a result of process evaluation and streamlining.

The fundamental purpose of the ERM framework approach is to help entities ensure that they will be able to achieve their operational and financial objectives and goals including:

  • Achieving high-level strategic goals and the entity’s mission
  • Effective and efficient use of the company’s operational resources
  • Reliability of the company’s financial reporting systems
  • Compliance in meeting applicable laws and regulations
  • Safeguarding of company resources by preventing loss through fraud, theft, waste, inefficiency, bad business decisions, etc.

In order to achieve its objectives, the ERM framework outlines the various components of good risk management processes. Some of those components consider an entity’s risk tolerance and risk appetite. Other components evaluate the entity’s internal environment; its ability to set objective; the need to identify events that could have an effect on an entity’s ability to achieve its objectives; its risk assessment including response; its control environment, information, communication, and its ability to monitor activities and events.

The COSO ERM Framework also has some specific suggestions for creating an antifraud environment:

  • Consider and document fraud vulnerabilities
  • Consider and document strategic objectives, the entity’s risk appetite, risk tolerances, and consider them in the context of fraud probabilities
  • Identify and document events that create risks of fraud
  • Document enterprise risks by looking at the likelihood and impact of fraud vulnerabilities at all levels of the company
  • Evaluate possible responses to fraud risks
  • Implement and document antifraud control activities, policies, and procedures
  • Communicate fraud prevention information, policies, and procedures throughout the company
  • Monitor and document the success and failure of antifraud prevention controls and react to any findings

In 2017, COSO released Enterprise Risk Management–Integrating with Strategy and Performance. This new document builds on its 2004 guidance and is the first major design revision. It recognizes the evolving risks in a dynamic business environment. The updated edition is designed to help organizations create, preserve, and realize value while improving their approach to managing risk. The update, developed by PwC under the direction of the COSO Board, highlights the importance of enterprise risk management in strategic planning. It also emphasizes embedding ERM throughout an organization, as risk influences strategy and performance throughout the organization.

IIA Practice Advisories 1210.A1 and 1210.A2

Internal audit can be an integral resource in creating an antifraud environment. The Institute of Internal Auditors (IIA) has issued Practice Advisories 1210.A1 and 1210.A2 that address identification of fraud and the internal auditors’ responsibility for fraud detection, respectively. The IIA standards require the internal auditor to have sufficient knowledge to identify the indicators of fraud. The standards further recognize that fraud can be perpetrated for the benefit of, or to the detriment of, the organization and by individuals outside as well as inside the organization.

Examples of frauds designed to benefit the organization include the following:

  • Sale or assignment of fictitious or misrepresented assets
  • Improper payments such as illegal political contributions, bribes, kickbacks, and payoffs to government officials, intermediaries of government officials, customers, or suppliers
  • Intentional improper representation or valuation of transactions, assets, liabilities, or income
  • Intentional improper transfer pricing (e.g., valuation of goods exchanged between related organizations)
  • Intentional improper related-party transactions
  • Intentional failure to record or disclose significant information to outside parties
  • Prohibited business activities such as those that violate government statutes, rules, regulations, or contracts
  • Tax fraud

Examples of fraud perpetrated to the detriment of the organization include the following:

  • Acceptance of bribes or kickbacks
  • Diversion to an employee or outsider of a potentially profitable transaction
  • Embezzlement, including efforts to falsify financial records to cover up the act
  • Intentional concealment or misrepresentation of events or data
  • Claims submitted for services or goods not actually provided to the organization

Management and internal audit have differing roles with respect to fraud detection. The normal course of work for the internal audit activity is to provide an independent appraisal, examination, and evaluation of an organization’s activities as a service to the organization. The objective of internal auditing in fraud detection is to assist members of the organization in the effective discharge of their responsibilities by furnishing them with analyses, appraisals, recommendations, counsel, and information concerning the activities reviewed. The engagement objective includes promoting effective control at a reasonable cost. The IIA standards recognize that management has primary responsibility for the prevention, deterrence, and detection of fraud.

Nevertheless, in carrying out their responsibilities internal auditors should consider the following:

  • Whether the organizational environment fosters control consciousness (tone at the top)
  • Whether realistic organizational goals and objectives are set
  • Written policies (e.g., code of conduct) and the response to policy violations
  • Authorization for transactions, both existence and implementation
  • Policies, practices, procedures, reports, and other mechanisms are developed to monitor activities and safeguard assets, particularly in high-risk areas
  • Communication channels provide management with adequate and reliable information
  • The response to recommendations to establish or enhance cost-effective antifraud controls

When red flags are identified and the internal auditor suspects that fraud may have occurred, the appropriate levels of corporate governance should be informed. The chief audit executive has the responsibility to report immediately any significant fraud to senior management and the board. When the incidence of significant fraud has been established with reasonable certainty, senior management and the board should be notified immediately. When conducting fraud investigations, internal auditors should

  • Assess the probable level and the extent of complicity in the fraud within the organization
  • Determine the knowledge, skills, and other competencies needed to carry out the investigation effectively to ensure the appropriate types and levels of technical expertise
  • Design procedures to identify the perpetrators, the extent of the fraud, the techniques used to perpetrate the fraud, and the underlying causes
  • Coordinate activities with management personnel, legal counsel, and other specialists as appropriate
  • Be cognizant of the rights of alleged perpetrators and personnel and the reputation of the organization itself

Once a fraud investigation is concluded, internal auditors should assess the facts known to determine if controls need to be implemented or strengthened to reduce future vulnerability and design engagement tests that will help to disclose the existence of similar frauds. A draft of the proposed final communications on fraud should be submitted to legal counsel for review.

The Role of Corporate Governance

According to the COSO study, “Fraudulent Financial Reporting: 1998–2007,” one of the critical findings was that the SEC named the CEO and/or CFO for some level of involvement in 89% of the fraud cases, up from 83% of cases in 1987−1997. Within two years of the completion of the SEC’s investigation, about 20% of CEOs and/or CFOs had been indicted, and over 60% of those indicted were convicted. While the authors found relatively few differences in board of director characteristics between firms engaging in fraud and similar firms not engaging in fraud, 26% of the fraud firms changed auditors between the last clean financial statements and the last fraudulent financial statements; whereas, only 12% of no-fraud firms switched auditors during that same time. About 60% of the fraud firms that changed auditors did so during the fraud period, while the remaining 40% changed in the fiscal period just before the fraud began.16

The board of directors, the audit committee, executives, and management are responsible for the corporate governance environment in an organization.17 The primary role of corporate governance is to protect investors, create long-term shareholder value, ensure investor confidence, and support strong and efficient capital markets.18 Most of the board’s work regarding governance is discharged through committees. To effectively carry out its primary functions, a committee must ensure its independence. A good corporate governance environment will set the “tone at the top” by creating a culture of honesty and integrity, with the leadership of the organization practicing what they preach. As the saying goes, a fish starts to stink at the head, and if corporate leadership doesn’t act in a responsible manner, it is doubtful that their subordinates will act differently.

Corporate leadership should also strive to create a positive work environment with efforts to increase employee morale, hiring, and promoting employees who follow the company’s ethical guidelines, providing adequate supervision and training, and creating and monitoring antifraud programs and controls. Effective corporate governance mechanisms include:

  1. Organizational code of conduct supported by an embedded culture of honesty and ethical behavior.
  2. An independent and empowered board of directors.
  3. An independent and empowered audit committee.
  4. Organizational policies and reward systems that are consistent with espoused ethical values.
  5. Confidential disclosure methods.
  6. Effective legal risk assessment.

We have eight types of assignments for instructors to choose from:

  1. Critical Thinking
  2. Review Questions
  3. Multiple Choice Questions
  4. Fraud Casebook
  5. Brief Cases
  6. Major Case Investigation (MCI)
  7. IDEA Exercises
  8. Tableau Exercises

CRITICAL THINKING

  1. CT-1 This is an unusual paragraph. I’m curious how quickly you can find out what is so unusual about it. It looks so plain you would think nothing was wrong with it. In fact, nothing grammatical is wrong with it, nor are any words misspelled! It is unusual though. Study it, and think about it, but you still may not find anything odd. But if you work at it a bit, you might find out. Try to do so without any coaching! What is unusual about this passage?
  2. CT-2 Do they have a 4th of July in England?

REVIEW QUESTIONS

  1. What remedies are available through the civil and criminal justice systems?
  2. Under what circumstances would a Miranda Warning be required?
  3. What constitutes “good cause” in the discharge of an employee?
  4. What approaches are used by investigators to obtain documents?
  5. What is meant by demonstrative evidence? Give examples.
  6. In the criminal justice system, how is probation different from parole?
  7. What are the factors that affect the decision to prosecute an entity?
  8. What is the discovery process and how does it work?
  9. What are the three major types of negotiated remedies and how do they differ?
  10. How did the Sarbanes-Oxley Act address corporate governance and public accounting responsibilities?

MULTIPLE CHOICE QUESTIONS

  1. Which of the following statements is not true concerning the civil and criminal justice systems?
    1. In the criminal system, a convicted person must be sentenced to jail or probation.
    2. In both the criminal and civil systems, persons found guilty can be made to pay fines.
    3. In the civil system, a person found to be liable can be sentenced to jail or required to pay damages.
    4. The legal action in a criminal case is pursued on behalf of society.
  2. Which of the following is most accurate with regard to Miranda Warnings?
    1. A Miranda Warning is only required if the person arrested asks for it.
    2. A Miranda Warning is considered a privilege in the civil legal system.
    3. When a suspected perpetrator is taken into custody by law enforcement they must be given a Miranda Warning.
    4. Miranda Warnings are only required in the civil but not criminal legal system.
  3. Which statement regarding surveillance is least accurate?
    1. Warrants apply to law enforcement only.
    2. Audio capture is permitted in circumstances where video surveillance in also collected.
    3. Once the investigator enters the realm of electronic (audio) surveillance, the laws and requirements become more complicated.
    4. Generally federal law prevents the interception and/or recording of wire, oral, or electronic communications with certain exceptions, one except is an operator of a switchboard or common carrier.
  4. Of the following approaches, which is not used by investigators to obtain documents?
    1. Voluntary consent
    2. Search warrant
    3. Jury ruling
    4. Subpoena
  5. Of the following list of evidence, which is considered demonstrative?
    1. PowerPoint slides
    2. Fingerprints
    3. Official documents
    4. Testimony by a law enforcement officer with extensive use of hand motions and gestures to emphasize important points.
  6. Select the item that most accurately reflects the difference between probation and parole?
    1. There are no differences; probation and parole are the same thing.
    2. Parole is a form of limited incarceration.
    3. The outcome of both probation and parole is never recidivism.
    4. Probation is a form of punishment while parole only results after a period of incarceration.
  7. Which of the following is usually not a factor that affects the decision to prosecute an entity (organization)?
    1. The number of individuals complicit in the illegal act
    2. Remedial action(s) taken by the entity
    3. Nature and seriousness of the offense committed by the organization
    4. Offers of restitution by the organization or entity
  8. Which of the following statements is true with regard to accounting?
    1. Assets are resources under the entity’s control that have future value.
    2. Liabilities are obligations to suppliers, other creditors, and stockholders.
    3. Assets usually equal liabilities and stockholders’ equity but sometimes include net profits as well.
    4. Revenues and expenses, which net to profits, are more important pieces of information than assets, liabilities, and stockholders’ equity.
  9. Which of the following is not a means to a negotiated remedy?
    1. Arbitration
    2. Mediation
    3. Remediation
    4. Out-of-court settlements
  10. Which of the following did not result from Sarbanes–Oxley Act of 2002?
    1. Management’s assessment of internal controls
    2. Prohibitions on personal loans to executives
    3. Certification obligations for Chief Executive and Chief financial Officers
    4. Statement on Auditing Standards No. 99
  11. Individual rights associated with criminal law are grounded in the following four amendments to the U.S. Constitution:
    1. First, Fourth, Fifth, and Ninth
    2. Fourth, Fifth, Sixth, and Ninth
    3. Fourth, Fifth, Sixth, and Fourteenth
    4. Fifth, Sixth, Ninth, and Fourteenth

FRAUD CASEBOOK

Enron

Read the following articles or other related articles regarding the Enron case and then answer the questions below:

Sources:

Fusaro, Peter C. and Ross M. Miller, “What Went Wrong at Enron,” Wiley, 2002; Reinstein, Alan and Thomas Weirich, “Accounting Issues at Enron,” The CPA Journal, December 2002; Eichenwald, K., and Henriques, D.B. “Enron’s Many Strands: The Company Unravels; Enron Buffed Image to a Shine Even as It Rotted From Within.” New York Times, February 10, 2002.

Short Answer Questions

  1. What was Enron’s first successful market?
  2. What created to opportunity for Enron to trade in this market?
  3. What was the name of Enron’s Internet trading venture?
  4. What was the name of Enron’s fair value accounting model?
  5. What related party legal entity did Enron make famous?
  6. Who was the famous whistleblower who penned the memo “Has Enron Become a Risky Place to Work?”

Discussion Questions

  1. Was Enron an accounting fraud or a business failure concealed by fraud?
  2. Enron extensively used fair value accounting. What prevents companies from abusing fair value accounting the way that Enron did?
  3. Did Enron’s auditor fail or was the auditing firm a victim as well?

BRIEF CASES

  1. Assume that you have been asked to perform an examination and report on your findings, conclusions, and opinions. Assume the following:
    1. The industry is oil production (at a well-head), transportation, and refinement.
    2. The transporter and refiner are one company.
    3. The transporter refused to accept oil at the well-head for three months because of quality issues with oil from that well in previous months.
    4. The oil refinery was at 60% of capacity during three months for which oil was refused.

    Case discussion—Consider the following questions:

    1. Is it appropriate to examine whether the oil producer’s actions were justified? Why or why not?
    2. If oil quality is subjective, is it appropriate to examine oil quality? Why or why not?
    3. If oil quality is subject to machine testing and objective metrics, is it appropriate to examine oil quality? Why or why not?
    4. Is profitability and cost analysis of the oil production company during the three-month shutdown relevant? Why or why not?
    5. Is profitability and cost analysis of the oil production company during period before and after the three-month shutdown relevant? Why or why not?
  2. Assume that you have been asked to perform an examination and report on your findings, conclusions, and opinions. Assume that weather has been alleged as interfering with company performance and contractual arrangements clearly provide for additional compensation during periods of poor weather.

    Case discussion: Answer the following questions:

    1. Name at least five industries that might be affected by weather.
    2. Is it appropriate for the forensic accountant/fraud examiner to examine the effect of weather? Why? Why not?
    3. What if contractual provisions state that the contractor should consider, evaluate, and incorporate all aspects that might affect its ability to complete the work on-time and on-budget. Under those circumstances, is it appropriate for the forensic accountant/fraud examiner to examine the effect of weather? Why? Why not?

MAJOR CASE INVESTIGATION

In this chapter, the goal is to focus on the unusual disbursements. The following is the “inventory” of items received to continue the examination at Johnson Real Estate.

  • Johnson Real Estate, First Choice Bank account, January 20X9–January 20X0 Check Register
  • Memorandum to Case File: Johnson Real Estate Withdrawal Transactions

These items will be provided by the course instructor.

Assignment: Continuing to focus on evidence associated with the act, concealment and conversion, use the evidentiary material to continue the investigation. Your primary assignment is to confirm predication with regard to the possible fraud act of embezzlement through cash disbursements by check.

IDEA EXERCISES: ASSIGNMENT 3

Image described and surrounding text. Case background: See Chapter 1.

Question: Is Fairmont in compliance with Federal withholding requirements for FICA and Medicare?

Student task: Students should (a) present a listing of any payroll disbursements for which social security and Medicare are not being withheld and (b) discuss the finding and recommend investigative next steps.

Student Material for step-by-step screenshots for completing the assignment are available from your instructor.

TABLEAU EXERCISES: ASSIGNMENT 3

Image described and surrounding text. Case tableau background: See Chapter 1.

The forensic audit has determined that Fairmont is not in compliance with Federal withholding requirements for FICA and Medicare because FICA and Medicare were not withheld from employee paychecks (November 19–23, 2018).

Question: Can you present this result in a manner that is easy for the CEO, Controller, and Payroll Manager to see the anomaly?

Student task: Students should (a) present any payroll disbursements for which social security and Medicare are not being withheld and (b) discuss the finding and recommend investigative next steps.

Note: ALL charts now use the Extracted Data. The remove this data extraction, right-click on “Payroll and Sales Fairmo” and click “Use Extract” (this “un-checks” the “Use Extract” option).

Student Material for step-by-step screenshots for completing the assignment are available from your instructor.

Endnotes

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.93.133