Jump to content

Embezzlement: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
SmackBot (talk | contribs)
m Date/fix the maintenance tags or gen fixes
add link
Line 19: Line 19:
{{refend}}
{{refend}}
{{Unreferenced|article|date=June 2007}}
{{Unreferenced|article|date=June 2007}}

==Links==
* [http://www.schleimerlaw.com/BHBA%20CLE%20INDEX.htm "Stalkers, Embezzler & Extortionists: A Forum on Protecting the Artist,"] Moderator: Joseph D. Schleimer, Esq. Beverly Hills Bar Association, February 18, 2004 [Video-on-demand CLE: http://westlegaledcenter.com/program_guide/course_detail.jsp?page=prgmgd&classroomCourseId=0&videoCourseId=27346&audioCourseId=0&textCourseId=0&intCourseId=0]



== See Also ==
== See Also ==

Revision as of 15:46, 17 July 2007

Embezzlement is the fraudulent appropriation by a person to his or her own use of property or money entrusted to that person's care but owned by someone else. For instance, a clerk or cashier can embezzle money from his or her employer; a civil servant can embezzle funds from the treasury.

Embezzlement differs from larceny in two ways. First, in embezzlement, an actual conversion must occur; second, the original taking must not be trespassory. That is, the embezzler must have had the right to possess the item, and used that position of trust to convert the property. Embezzlement may range from the very minor, involving only a very small amount, to immense, involving very large sums and very sophisticated schemes.

Conversion requires that the theft seriously interfere with the property, rather than just relocate it. As in larceny, the measure is not by the gain to the thief, but the loss to the true owner. Embezzlement was statutorily created to deal with situations where theft could occur while the thief himself was innocent of larceny — typically because of the "lawful possession" element. That is, embezzlement fills in the blanks where larceny cannot.

Embezzlement sometimes involves falsification of records in order to conceal the theft. Embezzlers commonly steal relatively small amounts repeatedly over a long period, although some embezzlers steal one large sum at once. Some very successful embezzlement schemes have continued for many years before being detected due to the skill of the embezzler in concealing the nature of the transactions.

One of the most common methods of embezzlement is to under-report income, and pocket the difference. For example, in 2005, several managers of the service provider Aramark were found to be underreporting profits from a string of vending machine locations in the eastern United States. While the amount stolen from each machine was relatively small, the total amount taken from many machines over a length of time was very large.

Another method is to create a false vendor account, and to supply false bills to the company being embezzled so that the checks that are cut appear completely legitimate. Yet another method is to create phantom employees, who are then paid with payroll checks.

The latter two methods should be uncovered by routine audits, but often aren't if the audit is not sufficiently in-depth, because the paperwork appears to be in order. The first method is easier to detect if all transactions are by check or other instrument, but if many transactions are in cash, it is much more difficult to identify. Employers have developed a number of strategies to deal with this problem. In fact, cash registers were invented just for this reason.

References


See Also