What steps would take to investigate suspected embezzlement

Assignment Help Auditing
Reference no: EM131116266

Question 1

While auditing the accounts payable of a large clothing manufacturer, you discover that four of the company's vendors have checks sent to a post office (PO) box. After further investigation, you discover that one box is registered under the same name as the CFO's son (age 3), and another is registered under the same name as his daughter (age 5). Finding this highly suspicious, you begin questioning the employees who work directly with the CFO to determine if fraud is occurring in this case. After searching through the documentation of vendor transactions, the investigation leads you to suspect that the CFO is sending checks to the PO Box of fictitious vendors to be collected and then deposited in his own account. Over two weeks, you and your engagement team compile a large body of evidence implicating the CFO in the fraud. After this evidence has been gathered, you ask him to come to your office for questioning.

Upon his arrival, and without wasting any time, you present all the evidence against him and ask him about his involvement in stealing money from the company. The responses you receive are defensive and antagonistic. The CFO says that he has heard that you and your engagement team have been "snooping" around the office, protests his innocence, and threatens to file suit against you for slander and libel if you pursue this absurd investigation that is trying to label him a criminal. Not expecting this reaction, and being frustrated that the interview is not going as you intended, you say that you have had enough for one day and cut the interview short.

What steps need to be taken before interviewing a person you suspect of committing fraud in a company?

What are some effective methods that could have helped in dealing with an interview subject from whom you are seeking an admission?

Question 2

You are an internal auditor at Dunder Company. An employee of Dunder has phoned in an anonymous tip that a fellow worker, Jane, might be embezzling money. Jane has been a trusted employee of the company for 13 years; she quickly moved through the ranks of the company to become vice president over treasury because of her exemplary record. Your internal audit team has conducted thorough audits of her department for years and found its control environment to be exceptional. In addition, she is a good friend of the CEO and CFO. They have tremendous confidence in her abilities and honesty, and she is being groomed to succeed the current CFO when he retires. The person making the anonymous tip claims to have noticed large fluctuations in certain financial statement accounts. Accompanying these fluctuations are unexplainable debits and credits that were all entered by Jane. The person also alleges that Jane's behavior has been erratic. She is usually kind and patient, but recently, she has flown off the handle for no explainable reason. She insists on balancing certain accounts herself because she claims that they are too critical to trust with anyone else. Finally, the informant believes that Jane's lifestyle as a single mother is well above what her salary can support. Investigating allegations against such a trusted person in the company will cause considerable disruption. If you investigate, you will have to proceed very carefully, especially since you have only the word of one employee who could have ulterior motives.

What steps would you take to investigate this suspected embezzlement?

As a first step in your investigation, would you interview Jane about the problem? Why or why not?

How would you conduct Jane's admission-seeking interview in order to be most effective?

Reference no: EM131116266

Questions Cloud

Differences in boiling point of a five carbon alkene : Explain the differences in boiling point of a five carbon alkene, alkyl bromide, and alcohol. What intermolecular forces are involved in holding the molecules in the liquid form?
Prepare the journal entry to record the purchase : What was the effect on net income of entering into the derivative transaction for the period January 2 to March 31, 2010? (Ignore tax effects.)
People are carrying too much weight : 1. Fat has a lot of kcal, and many people are carrying too much weight. Should humans consume fat? If so, what kind (be specific, using the names [not just types] of the fatty acids) and why.
Evaluate different aspects of organizational change : All sources used must be referenced; paraphrased and quoted material must have accompanying citations in APA format.
What steps would take to investigate suspected embezzlement : What steps would you take to investigate this suspected embezzlement? As a first step in your investigation, would you interview Jane about the problem? Why or why not? How would you conduct Jane's admission-seeking interview in order to be most effe..
Find the average of the molar mass : we have to calculate this for both trials as well as molar mass of acid if monoprotic also for both trials and then the last question we need to find the average of the molar mass.
Discuss methods of measuring intellectual functioning : Provide a brief overview of at least two theories of intelligence related to the content of your selected articles to help your audience understand what intelligence testing accomplishes.
Metabolism of glucose : The metabolism of glucose, C6H12O6, yields carbon dioxide, CO2(g), and water, H2O(l), as products. Energy released in this metabolic process is converted to useful work, w, with about 76.0 %  efficiency.  Use the data below to answer questions abo..
Dawson elects to use the fair value option whenever possible : Dawson elects to use the fair value option whenever possible. Assuming that Dawson's net income is $100,000 in 2010 before reporting any securities gains or losses, determine Dawson's net income for 2010.

Reviews

Write a Review

Auditing Questions & Answers

  What is the best way to enable access-denied assistant

What is the best way to enable Access-Denied Assistant for all of your file servers? Which two commands allow you to specify the cache size for BranchCache hosted cache server?

  Governance of an audit client

Examine both sets of annual reports for information about the governance structure of these companies and identify whether these companies have an audit committee and/or a risk committee

  Create false claims for credit on goods returned

Identify the accounts affected and whether this will be an overstatement or understatement.

  Deal with the problems faced by alabama industries

What sort of prevent control could be used to deal with the problems faced by Alabama industries? Explain how the control would work ?

  Standard unqualified audit report

Determine if a qualified opinion, adverse opinion, or a disclaimer of opinion would be issued for each of the above occurrences. Identify the contents of each part.

  Create slides - microsoft powerpoint presentation for the

create slides - microsoft powerpoint presentation for the newly elected board members using same cafr from week

  Investigator to understand the possible security risks

It is critical for the investigator to understand the possible security risks that computer and network users face before conducting computer forensic investigations.

  What was the ethical dilemma faced by susan birkerts friend

What was the ethical dilemma faced by Susan Birkert's friend when that fellow auditor learned of Birkert's ethical wrongdoing?

  Explain the difference between relevance and reliability

Explain the difference between relevance and reliability. How does an auditor determine the reliability of potential audit evidence?

  Describe your thoughts about having outside auditor review

Describe your thoughts about having an outside auditor review your financial management of your department. What would be your reaction if the auditor found that supplies were unaccounted for, and what causes would you consider for this finding?

  Question 1a identify and define the components of the

question 1.a identify and define the components of the quantified audit risk model.b indicate which of these components

  Audits-cpa-financial-compliance-operational

Explain what the following five words mean to you non CPA audit, financial audit, compliance audit, operational audit, fraud audit

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd