Forensics Journal - Stevenson University 2013 | Page 40

FORENSICS JOURNAL complies with the purchase agreements. The religious organization should ensure they received the quality goods or services contracted for and not substandard, unwanted, or non-negotiated goods or services. In addition, detailed reviews of the vendor’s procurement history should be conducted to detect any unusual pricing or payments, which could indicate fraud. CASH DISTRIBUTION Similar to cash receipts, there are a variety of cash disbursements schemes, as well as various corruption schemes. In comparing the two types of schemes, the distinction is where and when they occur during the procurement process. Corruption schemes attempt to influence the purchasing process. Thus, when cash is disbursed to pay an invoice, the payment appears legitimate and justifiable. Cash disbursement schemes misdirect funds in the payment process. Unlike cash receipt frauds, internal controls cannot be limited to one or two schemes. Therefore, the Board must implement a network of controls to provide adequate fraud deterrence. • Controls to deter check tampering There are two primary methods used in check-tampering schemes. In the first method, the perpetrator uses blank checks to create personal payments. In the second method, the perpetrators redirect checks from vendors to themselves. Controls over blank checks and checks ready for mailing will deter most check-tampering schemes. The most common corruption schemes are kickbacks, bribery, bidding process fraud, and undisclosed conflicts of interest. Kickbacks are payments to staff members for approving payments on invoices for goods or services never delivered or with inflated pricing. Bribery occurs when staff members receive payments to influence the bidding process. The last corruption scheme occurs when staff members have a hidden economic or personal interest in the bidding process, which is adverse to the organization’s best interests. Religious organizations must start with control of blank checks. Most forgers will take the last check in a series of checks to create counterfeit checks. Therefore, the first step is to seal boxes of blank checks with security tape. Boxes with a broken seal are possible signs of stolen checks. The unused sealed boxes should be periodically checked for seals that have been tampered with or are broken. Next, the Treasurer should ensure checks are used in numerical sequence. This is especially important when a new box of checks is opened for use. Any non-sequential checks should be flagged for an audit of the check register for check sequence numbers. Lastly, any voided checks should be recorded and the checks destroyed. Primary cash disbursement schemes are check tampering, bil [