Anda di halaman 1dari 2

Procurement fraud

Investigative techniques
to help mitigate risk
A whistleblower at a large manufacturer alleged that an The degree of risk a business may face can be assessed by
employee in the procurement department was colluding with examining Donald Cressey’s Fraud Triangle and determining
a vendor to bill the company for security services that were if any of its factors might be an issue for employees
allegedly never rendered. The investigation revealed several with purchasing responsibilities. Cressey proposed that
large round dollar invoices billed for security at events that employees are more likely to commit fraud if three factors
the company had no record of ever occurring. The vendor exist: 1) incentives and pressures, 2) opportunity and
admitted in an interview that some of the invoices were in 3) rationalization. Given the increased financial tension
fact fictitious while other invoices were for legitimate services in today’s economy, more and more employees could
rendered to the company. This scheme lasted several years and be feeling increased financial pressure and reductions in
cost the company hundreds of thousands of dollars before the resources due to layoffs may compromise segregation of
whistleblower, who worked for the employee in procurement, duties potentially creating more opportunity for dishonest
tipped off internal audit. behavior. In addition, because of the current economic
environment, some employees may feel they can justify, or
An analysis of purchases by the maintenance department rationalize, their behavior. This situation can be perceived
of another large company revealed that the price paid as an ideal opportunity by dishonest employees, including
for various supplies was two and sometimes three times those who might be involved in procurement duties within
higher than “market” value. An investigation revealed a an organization. If dishonest employees feel an increased
connection between the vendor and maintenance department pressure to perform or produce results, and if an organization
procurement officer. is simultaneously lacking appropriate controls and segregation
of duties, such employees might view this situation as an
These two real life examples have a common thread. Both opportunity to use their procurement role to commit fraud.
companies had controls in place such as segregation of duties
and supervisor approval that were either overridden by either Some of the methods a procurement employee may use to
collusion or abuse of approval authorities. Learning from the commit potential fraud include:
investigative process that uncovered the techniques used to • Kickbacks. Kickbacks are the giving or receiving anything
perpetrate the frauds, and employing similar investigative of value to influence a business decision. Kickbacks may be
techniques to assess procurement activity on a periodic, undisclosed payments made by vendors to employees in
proactive basis may be helpful in identifying anomalies like return for favorable treatment, such as bid rigging or inside
relationships between employees and vendors and anomalies bidding information. The vendor may also approach an
in the pattern of purchasing. employee about submitting or approving invoices for goods
or services that were never received, and in exchange the
The Association of Certified Fraud Examiners describes vendor provides the employee with a kickback. Kickbacks
occupational fraud as the use of one’s occupation for personal can be payments of cash, but can also be in a form that is
enrichment through the deliberate misuse or misapplication more difficult to detect, such as payment of personal loans
of the employing organization’s resources or assets. Fraud or credit card bills, transfers of property or vehicles at less
is a potential risk in most businesses. Organizations instill a than fair market value, lavish vacations, or a hidden interest
certain amount of trust in their employees in order to operate, in the vendor’s business.
and those within the procurement function are entrusted with • Conflicts of interest. If an employee has an interest in the
access to vendor selection, vendor files, accounts payable, financial well-being of a vendor, a conflict of interest could
invoice approval, and purchase orders, which can provide exist. This may take the form of being a part-owner in the
an opportunity to commit fraudulent activity such as bid vendor company, or knowing someone close, e.g., a spouse
rigging, false billing schemes, vendor kickbacks, and conflicts or other family member, who works for the vendor and can
of interest. Whether the employee is a purchasing agent, receive rewards for business the employee provides. Any of
controller, accounts payable manager, or any other employee these situations can impair a dishonest employee’s ability to
essential to the operations of a business, a dishonest employee conduct business with the organization’s best
can present a potential fraud risk for the organization. interests in mind.
It is important to be aware of anomalies in the purchasing suspicious about certain transactions. Interviews at all levels
function such as: within the company can give insight into the daily operations
• Expenditures do not make economic sense (dollar amount and can reveal fraud risks which may be otherwise unknown
and timing). to the organization.
• Orders are consistently made from one vendor without • Background checks can provide information on the
inquiring with other vendors for comparison purposes. background, integrity, and reputation of selected individuals
• Costs of goods or services are higher than and entities. A small amount of time spent performing a
competing vendors. background investigation, such as Secretary of State records
• Poor documentation for expenditures. searches, might reveal connections between employees
• One-time payments to vendors (vendor often not officially and vendors. Additionally, it can provide history on vendors’
set up and cleared through accounts payable). performance, legal proceedings, and other
• Large round-dollar payments. relevant information.
• Electronic discovery, such as extracting and analyzing email
Data analysis can help with identifying anomalies in files, can identify any questionable correspondence between
purchasing. For example, analyzing the vendor database, vendors and employees using an organization’s computers.
payroll database, and accounts payable database can assist
organizations identify potential undisclosed relationships These tools can be used proactively by organizations to help
between employees and vendors and identify anomalies in identify potential fraudulent activity. Recognizing the red flags
purchasing for potential follow-up such as: commonly associated with procurement fraud and using
• Common bank account, address, and phone numbers tools such as data analysis, in addition to other investigative
between vendors and employees that may indicate a techniques such as interviews and background checks, can
potential conflict of interest. go a long way in helping the organization mitigate the risk of
• Duplicate invoices with the same supplier. fraud in the procurement function.
• Invoices from different suppliers with the same dollar
amount, date and invoice number.
For more information, please contact:
Data analysis can provide trend data, such as the number of
invoices from suppliers over time, unusual invoice number Ron Schwartz
sequencing, and dollars spent for goods and services Partner
purchased from a particular vendor. This can assist with Deloitte Financial Advisory Services LLP
answering the question, “does the dollar amount and
+1 404 220 1540
timing of purchases from a particular vendor make sense?”
rschwartz@deloitte.com
Furthermore, analyzing the actual purchase orders and invoices
can assist with answering the question, “does the price paid
for the goods and services make sense?”

In addition to data analysis described above, some commonly


used investigative techniques can also be used to help identify
anomalies in purchasing:
• Employee interviews can be useful in discovering potential
procurement fraud. Interviewers sometimes find that
employees have information about potential inappropriate
relationships between employees and vendors or are

This paper contains general information only and is based on the experiences and research of Deloitte practitioners. Deloitte is not, by means of this
presentation, rendering accounting, auditing, business, financial, investment, legal or other professional advice or services. This presentation is not
a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before
making any decision or taking any action that may affect your business, you should consult a qualified professional advisor.

Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this paper.”

About Deloitte
Deloitte refers to one or more of Deloitte Touche Tohmatsu, a Swiss Verein, and its network of member firms, each of which is a legally separate and
independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu and its member
firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.

Copyright © 2010 Deloitte Development LLC. All rights reserved.


Member of Deloitte Touche Tohmatsu

Anda mungkin juga menyukai