{"id":872,"date":"2015-07-10T14:50:46","date_gmt":"2015-07-10T07:50:46","guid":{"rendered":"http:\/\/library.uc.ac.id\/?p=872"},"modified":"2025-05-01T12:19:41","modified_gmt":"2025-05-01T05:19:41","slug":"to-catch-a-thief","status":"publish","type":"post","link":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/","title":{"rendered":"To Catch a Thief"},"content":{"rendered":"<p><a ref=\"magnificPopup\" href=\"https:\/\/dieng.blob.core.windows.net\/library\/2015\/07\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-72.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-873\" src=\"https:\/\/dieng.blob.core.windows.net\/library\/2015\/07\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-72.jpg\" alt=\"To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-72\" width=\"925\" height=\"1262\" \/><\/a><\/p>\n<p><strong>Q : Which internal accounting controls can help prevent fraud?<\/strong><\/p>\n<p>By Joe Worth<\/p>\n<p>&nbsp;<\/p>\n<p><strong>A:<\/strong> This is a vast topic covered by countless books and consultants, so let\u2019s narrow it down to employee fraud and theft. Aside from the obvious \u2013 conducting regular inventory checks and book audits, reconciling cash daily, and personally reviewing financial statements each month \u2013 there are several actions you can take to protect yourself and your business.<\/p>\n<p><strong>Establish a code of conduct.<\/strong><\/p>\n<p>Did you know that Walmart employees are not allowed to accept a bottle of water or cup of coffee from a vendor at a meeting without paying for it? That\u2019s what I mean by a code of conduct. It\u2019s a statement that you will not tolerate unethical or illegal behaviour toward anyone \u2013 customers, uppliers, employees or the company itself.<\/p>\n<p>While you may not be as strict as Walmart, you should write and post a code of conduct that clearly spells out the rules for employees and the repercussions for not following them. Give the code to everyone upon hire, and periodically thereafter, and require written acknowledgement that they have read, understand and agree to comply with it.<\/p>\n<p>Now look in the mirror. It\u2019s one thing to demand honesty from your employees, but the code of conduct goes both ways. So you, as the enforcer of the code, need to follow it to the letter. If employees see you take home merchandise or use company property for personal reasons, they may follow your lead \u2013 or worse. If you treat employees with respect, compensate them appropriately and offer opportunities to advance their careers, they\u2019ll have less motivation to steal or cheat.<\/p>\n<p><strong>Set up organizational checks and balances.<\/strong><\/p>\n<p>In a small business, one peron may wear many hats. But the most dangerous multitasker is a solitary administrator\/bookkeeper who opens the mail, handles deposits and payments and files transaction documents. No one person should control that many aspects of the business \u2013 it\u2019s asking for trouble.<\/p>\n<p>At one of my companies that processed a high volume of mail, we conveed a dozen senior managers and their assistants to open the mail everyday. With all those hands, the task took about 15 minutes. All checks were set aside, with a tape of their total run. When the day\u2019s bank deposit was prepared, the total had to match the tape run earlier.<\/p>\n<p>Also avoid assiggning the same person to handle purchasing and vendor payments, or allowing the same employee to manage accounts payable and accounts receivable. If you\u2019re manufacturer or distributor, you should have separate people managing receiving, warehousing and shipping.<\/p>\n<p>At the very least, set up an operation in which one person controls what comes in (cash, checks, merchandise, supplies) and another handles what goes out (payments, orders, finishhed products).<\/p>\n<p><strong>Institute policies and procedures.<\/strong><\/p>\n<p><strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>Someone other than the bookkeeper should settle bank and credit card statements every month \u2013 and the person who reconciles the bank statements should not have the ability to enter or modify transactions in the accounting system.<\/p>\n<p>Here\u2019s why : One of my partners started working with a new client and began routinely looking at their credit card statements. For one card, there were no records of purchase that matched the charges. An investigation uncovered that the client\u2019s former controller had taken a company card with him when he left and had run up more than $200,000.<\/p>\n<p>Another way to rein in fraud is to have payroll prepared and authorized by HR but entered by accounting, then checked by management before the funds are sent to the payroll company.<\/p>\n<p>Also, keep everything locked up that should be locked up, and enforce rigorous key control and computer \u2013 system access, especially for departing employees. Changing locks and passwords company wide when someone leaves or is dismissed is not an overreaction \u2013 it\u2019s smart.<\/p>\n<p><strong>Watch employees\u2019 behavior.<\/strong><\/p>\n<p>If you notice changes in an employee\u2019s behavior \u2013 files have been misplaced; they don\u2019t want help with a project; they\u2019re giving a customer excessive attention \u2013 look into it. The same goes for an employee with access to critical parts of the company\u2019s operations or finances who never takes vacation time, or who routinely works early or late when no one else is around.<\/p>\n<p>Trust me, they\u2019re not working those extra hours because they love their job. It might be because they don\u2019t want anyone else to see what they\u2019re doing. Insist that people usa their vacation time and stick to regular business hours.<\/p>\n<p>Pay attention to any blips in your operation, no matter how minor. At one manufacturing company I worked for, a customer sent back an expensive item for warranty repair. We couldn\u2019t find any record of the sale. Upon further inquiry with the customer, we discovered that our vice president of manufacturing and a foreman were building equipment inside the company, then shipping units out the back door along with their own company\u2019s invoices. We were able to recover hundreds of thousands of dollars in losses berfore turning the two over to the police.<\/p>\n<p>The key in all this is to trust your gut and recognize that no one knows your company as well as you do. If something doesn\u2019t look or feel right, it\u2019s probably not. By all means, investigate.<\/p>\n<p>JOE WORTH IS VICE PRESIDENT OF OPERATIONS AND PARTNER AT B2B CFO. @BCBCFO_NJ<\/p>\n<p>&nbsp;<\/p>\n<p><strong>UC Lib-Collect<\/strong><\/p>\n<p><strong>Entrepreneur.May 2015.Hal.72<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Q : Which internal accounting controls can help prevent fraud? By Joe Worth &nbsp; A: This is a vast topic covered by countless books and consultants, so let\u2019s narrow it down to employee fraud and theft. Aside from the obvious \u2013 conducting regular inventory checks and book audits, reconciling cash daily, and personally reviewing financial&#8230;<\/p>\n","protected":false},"author":1,"featured_media":4292,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artikel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>To Catch a Thief - Library<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"To Catch a Thief - Library\" \/>\n<meta property=\"og:description\" content=\"Q : Which internal accounting controls can help prevent fraud? By Joe Worth &nbsp; A: This is a vast topic covered by countless books and consultants, so let\u2019s narrow it down to employee fraud and theft. Aside from the obvious \u2013 conducting regular inventory checks and book audits, reconciling cash daily, and personally reviewing financial...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/\" \/>\n<meta property=\"og:site_name\" content=\"Library\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-10T07:50:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-01T05:19:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ciputra.ac.id\/library\/wp-content\/uploads\/2015\/07\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"426\" \/>\n\t<meta property=\"og:image:height\" content=\"307\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin_library\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin_library\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/\"},\"author\":{\"name\":\"admin_library\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#\\\/schema\\\/person\\\/4cffc04a138a391647832a76dc126824\"},\"headline\":\"To Catch a Thief\",\"datePublished\":\"2015-07-10T07:50:46+00:00\",\"dateModified\":\"2025-05-01T05:19:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/\"},\"wordCount\":912,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg\",\"articleSection\":[\"Artikel Koran\"],\"inLanguage\":\"id\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/\",\"url\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/\",\"name\":\"To Catch a Thief - Library\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg\",\"datePublished\":\"2015-07-10T07:50:46+00:00\",\"dateModified\":\"2025-05-01T05:19:41+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#\\\/schema\\\/person\\\/4cffc04a138a391647832a76dc126824\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg\",\"width\":426,\"height\":307},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/to-catch-a-thief\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"To Catch a Thief\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#website\",\"url\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/\",\"name\":\"Library\",\"description\":\"UC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/#\\\/schema\\\/person\\\/4cffc04a138a391647832a76dc126824\",\"name\":\"admin_library\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g\",\"caption\":\"admin_library\"},\"url\":\"https:\\\/\\\/www.ciputra.ac.id\\\/library\\\/author\\\/admin_library\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"To Catch a Thief - Library","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/","og_locale":"id_ID","og_type":"article","og_title":"To Catch a Thief - Library","og_description":"Q : Which internal accounting controls can help prevent fraud? By Joe Worth &nbsp; A: This is a vast topic covered by countless books and consultants, so let\u2019s narrow it down to employee fraud and theft. Aside from the obvious \u2013 conducting regular inventory checks and book audits, reconciling cash daily, and personally reviewing financial...","og_url":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/","og_site_name":"Library","article_published_time":"2015-07-10T07:50:46+00:00","article_modified_time":"2025-05-01T05:19:41+00:00","og_image":[{"width":426,"height":307,"url":"https:\/\/www.ciputra.ac.id\/library\/wp-content\/uploads\/2015\/07\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg","type":"image\/jpeg"}],"author":"admin_library","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"admin_library","Estimasi waktu membaca":"5 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/#article","isPartOf":{"@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/"},"author":{"name":"admin_library","@id":"https:\/\/www.ciputra.ac.id\/library\/#\/schema\/person\/4cffc04a138a391647832a76dc126824"},"headline":"To Catch a Thief","datePublished":"2015-07-10T07:50:46+00:00","dateModified":"2025-05-01T05:19:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/"},"wordCount":912,"commentCount":0,"image":{"@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ciputra.ac.id\/library\/wp-content\/uploads\/2015\/07\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg","articleSection":["Artikel Koran"],"inLanguage":"id"},{"@type":"WebPage","@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/","url":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/","name":"To Catch a Thief - Library","isPartOf":{"@id":"https:\/\/www.ciputra.ac.id\/library\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/#primaryimage"},"image":{"@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ciputra.ac.id\/library\/wp-content\/uploads\/2015\/07\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg","datePublished":"2015-07-10T07:50:46+00:00","dateModified":"2025-05-01T05:19:41+00:00","author":{"@id":"https:\/\/www.ciputra.ac.id\/library\/#\/schema\/person\/4cffc04a138a391647832a76dc126824"},"breadcrumb":{"@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/#primaryimage","url":"https:\/\/www.ciputra.ac.id\/library\/wp-content\/uploads\/2015\/07\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg","contentUrl":"https:\/\/www.ciputra.ac.id\/library\/wp-content\/uploads\/2015\/07\/To-catch-a-thief.Entrepreneur-eds-Mei.2015.pg-721.jpg","width":426,"height":307},{"@type":"BreadcrumbList","@id":"https:\/\/www.ciputra.ac.id\/library\/to-catch-a-thief\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ciputra.ac.id\/library\/"},{"@type":"ListItem","position":2,"name":"To Catch a Thief"}]},{"@type":"WebSite","@id":"https:\/\/www.ciputra.ac.id\/library\/#website","url":"https:\/\/www.ciputra.ac.id\/library\/","name":"Library","description":"UC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ciputra.ac.id\/library\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/www.ciputra.ac.id\/library\/#\/schema\/person\/4cffc04a138a391647832a76dc126824","name":"admin_library","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/secure.gravatar.com\/avatar\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/75781214a801ee0700a52770a6367c89fe1bf1dccd2c5f0a079ece6c531f4bae?s=96&d=mm&r=g","caption":"admin_library"},"url":"https:\/\/www.ciputra.ac.id\/library\/author\/admin_library\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/posts\/872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/comments?post=872"}],"version-history":[{"count":2,"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/posts\/872\/revisions"}],"predecessor-version":[{"id":2995,"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/posts\/872\/revisions\/2995"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/media\/4292"}],"wp:attachment":[{"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/media?parent=872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/categories?post=872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ciputra.ac.id\/library\/wp-json\/wp\/v2\/tags?post=872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}