Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

BUSINESS ETHICS legitimate interests of the system’s

constituencies.
Ethics pertains to the principles of
conduct that individuals use in making choices  Ownership of Property
and guiding their behavior in situations that
involve the concepts of right and wrong. Laws designed to preserve real property rights
have been extended to cover what is referred to
Making Ethical Decisions as intellectual property, that is, software.

Business organizations have conflicting  Equity in Access


responsibilities to their employees,
shareholders, customers, and the public. Every Some barriers to access are intrinsic to the
major decision has consequences that technology of information systems, but some
potentially harm or benefit these constituents. are avoidable through careful system design.
Seeking a balance between these consequences Several factors, some of which are not unique
is the managers’ ethical responsibility. to information systems, can limit access to
computing technology.
Ethical Principles
 Environmental Issues
PROPORTIONALITY. The benefit from a decision
must outweigh the risks. Furthermore, there Computers with high-speed printers allow for
must be no alternative decision that provides the production of printed documents faster
the same or greater benefit with less risk. than ever before.

Several issues of concern for students of  Artificial Intelligence


accounting information systems
A new set of social and ethical issues has arisen
 Privacy out of the popularity of expert systems.
Because of the way these systems have been
People desire to be in full control of what and marketed—that is, as decision makers or
how much information about themselves is replacements for experts—some people rely on
available to others, and to whom it is available. them significantly.
This is the issue of privacy. The creation and
maintenance of huge, shared databases make it  Unemployment and Displacement
necessary to protect people from the potential
Many jobs have been and are being changed as
misuse of data.
a result of the availability of computer
 Security (Accuracy and Confidentiality) technology. People unable or unprepared to
change are displaced.
Computer security is an attempt to avoid such
undesirable events as a loss of confidentiality or  Misuse of Computers
data integrity. Security systems attempt to
Computers can be misused in many ways.
prevent fraud and other misuse of computer
Copying proprietary software, using a
systems; they act to protect and further the
company’s computer for personal benefit, and
snooping through other people’s files are just a
few obvious examples.

SARBANES-OXLEY ACT AND ETHICAL ISSUES


Fraud and Accountants
 CONFLICTS OF INTEREST.
Fraud denotes a false representation of
The company’s code of ethics should outline a material fact made by one party to another
procedures for dealing with actual or apparent party with the intent to deceive and induce the
conflicts of interest between personal and other party to justifiably rely on the fact to his
professional relationships. or her detriment. According to common law, a
fraudulent act must meet the following five
 FULL AND FAIR DISCLOSURES. conditions:
This provision states that the organization 1. False representation. There must be a
should provide full, fair, accurate, timely, and false statement or a nondisclosure.
understandable disclosures in the documents,
reports, and financial statements that it submits 2. Material fact. A fact must be a
to the SEC and to the public. Overly complex substantial factor in inducing someone to act.
and misleading accounting techniques were
3. Intent. There must be the intent to
used to camouflage questionable activities that
deceive or the knowledge that one’s statement
lie at the heart of many recent financial
is false.
scandals. The objective of this rule is to ensure
that future disclosures are candid, open, 4. Justifiable reliance. The
truthful, and void of such deceptions. misrepresentation must have been a substantial
factor on which the injured party relied.
 LEGAL COMPLIANCE.
5. Injury or loss. The deception must
Codes of ethics should require employees to
have caused injury or loss to the victim of the
follow applicable governmental laws, rules, and
fraud.
regulations.
Employee fraud, or fraud by non management
 INTERNAL REPORTING OF CODE
employees, is generally designed to directly
VIOLATIONS.
convert cash or other assets to the employee’s
The code of ethics must provide a mechanism personal benefit. Typically, the employee
to permit prompt internal reporting of ethics circumvents the company’s internal control
violations. system for personal gain. If a company has an
effective system of internal control, defalcations
 ACCOUNTABILITY. or embezzlements can usually be prevented or
detected. Employee fraud usually involves three
An effective ethics program must take
steps:
appropriate action when code violations occur.
This will include various disciplinary measures,
including dismissal.
(1) stealing something of value (an asset), FINANCIAL LOSSES FROM FRAUD

(2) converting the asset to a usable form (cash), The actual cost of fraud is, however, difficult to
and quantify for a number of reasons:

(3) concealing the crime to avoid detection. (1) not all fraud is detected;

Management fraud is more insidious than (2) of that detected, not all is reported;
employee fraud because it often escapes
detection until the organization has suffered (3) in many fraud cases, incomplete information
is gathered;
irreparable damage or loss. Management fraud
usually does not involve the direct theft of (4) information is not properly distributed to
assets. Management fraud typically contains management or law enforcement authorities;
three special characteristics: and
1. The fraud is perpetrated at levels of (5) too often, business organizations decide to
management above the one to which take no civil or criminal action against the
internal control structures generally perpetrator(s) of fraud.
relate.
THE PERPETRATORS OF FRAUDS
2. The fraud frequently involves using
the financial statements to create an  Fraud Losses by Position within the
illusion that an entity is healthier and Organization
more prosperous than, in fact, it is.  Fraud Losses and the Collusion Effect
 Fraud Losses by Gender
3. If the fraud involves misappropriation
 Fraud Losses by Age
of assets, it frequently is shrouded in a
 Fraud Losses by Education
maze of complex business transactions,
often involving related third parties. Position. Individuals in the highest positions
within an organization are beyond the internal
THE FRAUD TRIANGLE
control structure and have the greatest access
(1) situational pressure, which includes to company funds and assets.
personal or job-related stresses that
Gender. Women are not fundamentally more
could coerce an individual to act
honest than men, but men occupy high
dishonestly;
corporate positions in greater numbers than
(2) opportunity, which involves direct women. This affords men greater access to
access to assets and/or access to assets.
information that controls assets, and;
Age. Older employees tend to occupy higher-
(3) ethics, which pertains to one’s character ranking positions and therefore generally have
and degree of moral opposition to acts of greater access to company assets.
dishonesty.
Education. Generally, those with more
education occupy higher positions in their
organizations and therefore have greater access discharge of his or her duties or has self-interest
to company funds and other assets. in the activity being performed.

Collusion. One reason for segregating ECONOMIC EXTORTION. Economic


occupational duties is to deny potential extortion is the use (or threat) of force
perpetrators the opportunity they need to (including economic sanctions) by an individual
commit fraud. When individuals in critical or organization to obtain something of value.
positions collude, they create opportunities to The item of value could be a financial or
control or gain access to assets that otherwise economic asset, information, or cooperation to
would not exist. obtain a favorable decision on some matter
under review.
FRAUD SCHEMES
Asset Misappropriation
Fraudulent Statements
The most common fraud schemes involve some
Fraudulent statements are associated with form of asset misappropriation in which assets
management fraud. Whereas all fraud involves are either directly or indirectly diverted to the
some form of financial misstatement, to meet perpetrator’s benefit. Ninety percent of the
the definition under this class of fraud scheme frauds included in the ACFE study fall in this
the statement itself must bring direct or indirect general category.
financial benefit to the perpetrator.
Skimming .Skimming involves stealing
Corruption cash from an organization before it is recorded
Corruption involves an executive, manager, or on the organization’s books and records. One
employee of the organization in collusion with example of skimming is an employee who
an outsider. accepts payment from a customer but does not
record the sale.
BRIBERY. Bribery involves giving,
offering, soliciting, or receiving things of value Cash Larceny. Cash larceny involves
to influence an official in the performance of his schemes in which cash receipts are stolen from
or her lawful duties. an organization after they have been recorded
in the organization’s books and records. An
ILLEGAL GRATUITIES. An illegal gratuity example of this is lapping, in which the cash
involves giving, receiving, offering, or soliciting receipts clerk first steals and cashes a check
something of value because of an official act from Customer A.
that has been taken. This is similar to a bribe,
but the transaction occurs after the fact. Billing Schemes

CONFLICTS OF INTEREST. Every Billing schemes, also known as vendor fraud,


employer should expect that his or her are perpetrated by employees who causes their
employees will conduct their duties in a way employer to issue a payment to a false supplier
that serves the interests of the employer. A or vendor by submitting invoices for fictitious
conflict of interest occurs when an employee goods or services, inflated invoices, or invoices
acts on behalf of a third party during the for personal purchases.
 shell company fraud first requires that Non-cash fraud schemes involve the theft or
the perpetrator establish a false misuse of the victim organization’s non-cash
supplier on the books of the victim assets.
company
Computer Fraud
 pass through fraud is similar to the shell
company fraud with the exception that Because computers lie at the heart of modern
a transaction actually takes place. The accounting information systems, the topic of
false vendor charges the victim computer fraud is of importance to auditors.
company a much higher than market
price for the items, but pays only the THE UNDERLYING PROBLEMS.
market price to the legitimate vendor.
 Lack of Auditor Independence.
 pay-and-return scheme is a third form
 Lack of Director Independence.
of vendor fraud. This typically involves a
 Questionable Executive Compensation
clerk with check writing authority who
Schemes.
pays a vendor twice for the same
 Inappropriate Accounting Practices.
products (inventory or supplies)
received. Internal Control Concepts and Techniques
Check Tampering
The internal control system comprises policies,
Check tampering involves forging or changing in practices, and procedures employed by the
some material way a check that the organization to achieve four broad objectives:
organization has written to a legitimate payee.
 To safeguard assets of the firm.
Payroll Fraud  To ensure the accuracy and reliability of
Payroll fraud is the distribution of fraudulent accounting records and information.
paychecks to existent and/or nonexistent  To promote efficiency in the firm’s
employees. operations.
 To measure compliance with
Expense Reimbursements management’s prescribed policies and
procedures.
Expense reimbursement frauds are schemes in
which an employee makes a claim for Modifying Assumptions
reimbursement of fictitious or inflated business
expenses.  MANAGEMENT RESPONSIBILITY.
 REASONABLE ASSURANCE.
Thefts of Cash  METHODS OF DATA PROCESSING.
 LIMITATIONS.
Thefts of cash are schemes that involve the
direct theft of cash on hand in the organization. Undesirable Events

Non-Cash Misappropriations  Access


 Fraud
 Errors
 Mischief SAS 78/COSO INTERNAL CONTROL
FRAMEWORK
The absence or weakness of a control is called
an exposure. The SAS 78/COSO framework consists of five
components: the control environment, risk
Types of risks:
assessment, information and communication,
 Destruction of assets (both physical monitoring, and control activities.
assets and information).
 Theft of assets.
 Corruption of information or the The Control Environment
information system.
 Disruption of the information system. The control environment is the foundation for
the other four control components. The control
Levels of Control environment sets the tone for the organization
and influences the control awareness of its
 PREVENTIVE CONTROLS. Prevention is management and employees.
the first line of defense in the control
structure. Preventive controls are Risk Assessment
passive techniques designed to reduce
Organizations must perform a risk assessment
the frequency of occurrence of
to identify, analyze, and manage risks relevant
undesirable events.
to financial reporting.
 DETECTIVE CONTROLS. Detective
controls form the second line of Monitoring is the process by which the quality
defense. These are devices, techniques, of internal control design and operation can be
and procedures designed to identify assessed.
and expose undesirable events that
elude preventive controls. Control Activities
 CORRECTIVE CONTROLS. Corrective
Control activities are the policies and
controls are actions taken to reverse
procedures used to ensure that appropriate
the effects of errors detected in the
actions are taken to deal with the organization’s
previous step. There is an important
identified risks.
distinction between detective controls
and corrective controls. Detective  IT CONTROLS. IT controls relate
controls identify anomalies and draw specifically to the computer
attention to them; corrective controls environment. They fall into two broad
actually fix the problem. groups: general controls and application
controls. General controls pertain to
Sarbanes-Oxley and Internal Control
entity-wide concerns such as controls
Sarbanes-Oxley legislation requires over the data center, organization
management of public companies to implement databases, systems development, and
an adequate system of internal controls over program maintenance. Application
their financial reporting process. controls ensure the integrity of specific
systems such as sales order processing, SUPERVISION. An underlying assumption of
accounts payable, and payroll supervision control is that the firm employs
applications competent and trustworthy personnel.
 PHYSICAL CONTROLS. This class of
ACCOUNTING RECORDS. The accounting
controls relates primarily to the human
records of an organization consist of source
activities employed in accounting
documents, journals, and ledgers. These records
systems. These activities may be purely
capture the economic essence of transactions
manual, such as the physical custody of
and provide an audit trail of economic events.
assets, or they may involve the physical
use of computers to record transactions ACCESS CONTROL. The purpose of access
or update accounts. Physical controls do controls is to ensure that only authorized
not relate to the computer logic that personnel have access to the firm’s assets.
actually performs accounting tasks. Unauthorized access exposes assets to
Rather, they relate to the human misappropriation, damage, and theft.
activities that trigger and utilize the
results of those tasks. In other words, INDEPENDENT VERIFICATION. Verification
physical controls focus on people, but procedures are independent checks of the
are not restricted to an environment in accounting system to identify errors and
which clerks update paper accounts misrepresentations. Verification differs from
with pen and ink. supervision because it takes place after the fact,
by an individual who is not directly involved
TRANSACTION AUTHORIZATION. The purpose with the transaction or task being verified.
of transaction authorization is to ensure that all
material transactions processed by the SARBANES-OXLEY ACT AND FRAUD.
information system are valid and in accordance
1. Accounting Oversight Board. SOX created a
with management’s objectives.
Public Company Accounting Oversight Board
 General authority is granted to (PCAOB). The PCAOB is empowered to set
operations personnel to perform day- auditing, quality control, and ethics standards;
to-day operations. to inspect registered accounting firms; to
 Specific authorizations deal with case- conduct investigations; and to take disciplinary
by-case decisions associated with actions.
nonroutine transactions.
2. Auditor Independence. The act addresses
SEGREGATION OF DUTIES. One of the most auditor independence by creating more
important control activities is the segregation of separation between a firm’s attestation and
employee duties to minimize incompatible nonauditing activities. This is intended to
functions. Segregation of duties can take many specify categories of services that a public
forms, depending on the specific duties to be accounting firm cannot perform for its client.
controlled. These include the following nine functions:

a. Bookkeeping or other services related to the


accounting records or financial statements
b. Financial information systems design and 4. Issuer and Management Disclosure. SOX
implementation imposes new corporate disclosure
requirements, including:
c. Appraisal or valuation services, fairness
opinions, or contribution-in-kind reports a. Public companies must report all off-balance-
sheet transactions.
d. Actuarial services
b. Annual reports filed with the SEC must
e. Internal audit outsourcing services include a statement by management asserting
f. Management functions or human resources that it is responsible for creating and
maintaining adequate internal controls and
g. Broker or dealer, investment adviser, or asserting to the effectiveness of those controls.
investment banking services c. Officers must certify that the company’s
accounts ‘‘fairly present’’ the firm’s financial
h. Legal services and expert services unrelated
condition and results of operations.
to the audit
d. Knowingly filing a false certification is a
i. Any other service that the PCAOB determines
criminal offense.
is impermissible
5. Fraud and Criminal Penalties. SOX imposes a
Whereas SOX prohibits auditors from providing
range of new criminal penalties for fraud and
these services to their audit clients, they are not
other wrongful acts. In particular, the act
prohibited from performing such services for
creates new federal crimes relating to the
nonaudit clients or privately held companies.
destruction of documents or audit work papers,
3. Corporate Governance and Responsibility. securities fraud, tampering with documents to
The act requires all audit committee members be used in an official proceeding, and actions
to be independent and requires the audit against whistle-blowers.
committee to hire and oversee the external
auditors. This provision is consistent with many
investors who consider the board composition
to be a critical investment factor. For example, a
Thomson Financial survey revealed that most
institutional investors want corporate boards to
be composed of at least 75 percent
independent directors.

Two other significant provisions of the act


relating to corporate governance are (1) public
companies are prohibited from making loans to
executive officers and directors, and (2) the act
requires attorneys to report evidence of a
material violation of securities laws or breaches
of fiduciary duty to the CEO, CFO, or the PCAOB.

You might also like