Question

In: Accounting

If a fraudster does not have legitimate access to check stock, what are three ways blank...

If a fraudster does not have legitimate access to check stock, what are three ways blank checks can be fraudulently obtained? What measures could an organization take to prevent the three ways you mention?

Solutions

Expert Solution

Check fraud may be defined as use of checks for the purpose of committing fraud.

Following are the ways by which blank checks can be fraudulently obtained:-

1). Theft:- Stealing checks to use for fraudulent purposes.

2). Washing:- Using various types of chemicals to remove the information from a check.

3). Counterfeiting:- Printing checks illegally by fraudulently using the information of victim.

Following are the measures that an organization could take to prevent the three ways above mentioned:-

  1. Vet anyone who enters your premises:- If you allow any person inside your organisation and especially at the place where your important documents are kept,run them through a background check to determine how trustworthy they may be. And keep all the important documents locked up.
  2. Watch for “Check washing”:- Write your check using “fraud prevention pens” which contain ink that is not possible or relatively more difficult to change because fraudsters use chemicals and solvents to erase or alter check information.
  3. Protect your checks:- Protect your all the information that a thief would need to print a fake check because checks are relatively easy to reproduce.

Related Solutions

Give three ways to check for outliers in a regression analysis.
Give three ways to check for outliers in a regression analysis.
- What is the order of precedence between discretionary access check and Mandatory integrity check? Please...
- What is the order of precedence between discretionary access check and Mandatory integrity check? Please explain? - Suppose kkk.exe running with low integrity downloads an executable from unknownsite.com. can the download executable write to %SystemRoot%\System32? Why or Why not?
Does an employer have a legitimate business interest in videotaping its employees while on the job?
Does an employer have a legitimate business interest in videotaping its employees while on the job?
what are the most important issues in balancing cost, quality, and access? What are the ways...
what are the most important issues in balancing cost, quality, and access? What are the ways to solve or overcome these issues? Please support your answers with credible evidence.
In what ways is this antibiotic resistance acquired specifically? What genetic elements does it have and...
In what ways is this antibiotic resistance acquired specifically? What genetic elements does it have and what resistance mechanisms do these confer?
If the analyst does not have the security permissions to access the data directly, then a...
If the analyst does not have the security permissions to access the data directly, then a data request form is required. There are a number of fields that the analyst is required to complete. What fields are necessary in a data request form? Who needs to be included in the routing of this form? Explain the form and the approval process you would recommend. Adapted from Richardson, V. J., Teeter, R., & Terrell, K. (n.d.). Data analytics for accounting. Problems...
In what ways does the discipline of nursing today reflect or refute the discipline’s original three...
In what ways does the discipline of nursing today reflect or refute the discipline’s original three themes identified in Donaldson and Crowley’s seminal article of 1978. it in chapter 1 page 2 interpersonal relationships profesionalcommunication skills it just a brief from the article. you dont have get the article.
What does a companies accounting have to do with its stock price?
What does a companies accounting have to do with its stock price?
In what ways is preferred stock like long-term debt? In what ways is it like equity?...
In what ways is preferred stock like long-term debt? In what ways is it like equity? Explain why companies may prefer to issue preferred rather than common stock. Support your answers with some examples.
What is true about Random Access Files? Check all that apply. 1. The program can read...
What is true about Random Access Files? Check all that apply. 1. The program can read file data anywhere the read location is positioned. 2. Data must be sorted to to use random access functions. 3. Data can be read in any order specified in the program. 4. seekp and seekg can be used to access files by a given position.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT