#TaxmannPPT | Combatting 'Procurement Fraud' – Key Risk | Mitigation Strategies

Page 1


COMBATTING PROCUREMENT FRAUDS

WHAT IS FRAUD?

WHAT IS FRAUD?

Universal

Our Belief

Financial

air

Reward

ecovery

Acquired

cquired

Under

nder Unfair

Deception

octrine

MATHSONFRAUD=MQ<(O+P)R

MQ – Moral Quotient = (W * IQ)

O – OPPORTUNITY, P – Pressure, R – Rationalisation

CLASSIFICATION OF FRAUD

PROCUREMENT FRAUD STATISTICS

Total Department wise fraud analysis (ACFE)

Types of Fraud

ATYPICAL FORENSICAPPROACH

ATYPICALAPPROACH– 7 EYE THEORY

Your Eye

❖ Skeptical Attitude

❖ Connecting Dots Perspective

❖ Investigative approach

Data Eye

❖ Data analytics - To identify duplications , irregularities , trends & patterns , Link Analysis , Joining Files , Fund Trail etc

Evidence Eye

Theory Eye .

❖ Without Evidence entire exercise is futile.

❖ Need to be proven in court of law

Digital Eye

❖ Digital Forensic is scanning of emails , hard disk , mobile phones and recovery of deleted files , password cracker & so on

❖ Gun Powder Theory

❖ Time Bomb Theory

❖ Inverse Logic Theory ❖ RSF Theory

❖ Benford’s Law Theory

Tool Eye

.

Network Eye

❖ Market Intelligence

❖ Surveillance & Covert Operations

❖ Tools play an important role while using investigative techniques –

❖ GST , Logistics Tracking Tool, Background Verification Tool etc.

PROCUREMENT FRAUD CYCLE

(Highlighted in

Start

Start

Submit request to purchasing department

Vendor Assessment & Due diligence

Vendor onboarding

Purchase Requisition

Submit request to purchasing department

Quotation (Comparison & Finalization)

Purchase Order

P2P –ASSOCIATED RISKS

✓Inflation of Procurement Budget

✓No /Faulty due diligence conducted

✓PO approved without PR and quotation –

Order in excess of needs

✓Vendor Creation prior to PO/GRN

✓Inadequate quotations obtained

✓Quotation comparison manipulations

✓Lack of industry healthcheck- Rate Variance

✓Vendor Favoritism- collusion with employee

✓Open PO for substantially higher period

✓Feeble vendor assessment –

Existing vendors

✓ Non adherence to DOA/SOP

✓Non-adherence to tolerance limit

✓On account payments

✓Regularization of backdated PO creation

✓Substantial Credit Notes

✓No blacklisting of inactive vendors

✓QC clearance on defective goods/Non-existence of QC process

Fraud by Vendors

Product substitution/ Inferior quality

Monopoly and price inflation

Collusion among vendors

Procurement Fraud

Fraud by Employees

Collusion between employees & Vendors

Fraudulent employees

Sequential invoices

Colluding on fixed prices

Kickbacks & Bribery

Bid Rigging

Duplicate Payments

Phantom Vendors

Conflict of Interest

Fictitious invoices

Falsifying vendor information

Falsifying vendor master details

PRACTICAL CASE STUDIES

Disclaimer : Names in following slides have either been masked or renamed for confidentiality purposes

(Vendor)-

1. ROTTENAPPLE CASE

Social Media profiling exhibiting relation between Mr. Aman and Mrs. Riya

Possibly Fabricated Evidences for RottenApples

2. FAMILY CARTEL – SHELL COMPANIES

SN’s Family Tree

Bivi Shahul H S Begum
Sindha Midar

3. PHANTOM VENDORS – VENDOR

INCAPABILITY & CONFLICT OF INTEREST

Snapshot of financials files by vendor

GRN as per MB51 of company data

Address of the aforesaid vendor raising suspicion over vendor capability

Rate Variation from average rate

4. VENDOR FAVOURITISM & KICKBACKS

Vendor

Helium Labs

Annexure A

Vendor

XYZ PROJECTS

Murti Institute

Annexure B

Sushmita Shah Utkarsh Shah

Director Director

Rajkumar Singh
Son of R.D Shah (Dean of Murti Institute)

5. VENDOR REONBOARDING CASE

Modis Operandi

JJAdvertising was identified earlier as a suspected vendor due to multiple malpractices and was blacklisted.

Onboarding of new vendor – Bakshi Media with same owner

Social Media Search for JJAdvertising shows Bakshi Media as a new brand of JJAdvertising.

Mr.Sharma is identified as the owner of JJAdvertising & Bakshi

Media along with identification of similar nature of services

Invoice verification highlighting that the invoices had same contact number & authorized signatory i.e.Mr. Ketu

Post blacklisting of Bakshi, same owner third another company

“XYZ Limited”

7. BID RIGGING

8. PROCUREMENTATTRIBUTING PERSONALADVANTAGE

Marketing Vendor

9. VENDOR VIGILANCE

RM Vendor

Equipment vendor

Vendor Surveillance Activity

Mystery Eye

❑Retail Shops

❑Unreasonable Structures

❑Part time business ❑Residential premises

Traders

Zero age business

Relocation

Malpractices

Non existence

Rate Variation

Rate Benchmarking

10. VENUE HIRE – COUNTERFEIT

INVOICES

MITIGATION STRATEGIES

PREVENTIVE

DETECTIVE

CORRECTIVE

Stringent Vendor Due Diligence Process

InternalAudit

Training &Awareness

Enabling quotation health check process

Surprise Vendor Surveillances

Frequent VendorAssessments

Pretext Operations – Rate Variance

Revisiting RiskAppetite at company level

Data analytics to find potential exceptions of perpetrator of fraud case & keep them under watch list

Segregation of Duties & RPA

(Robotic ProcessAutomation)

Implementing Whistle blower mechanisms

Implementing ABAC policy &

Taking action against violators

Frequently Asked Questions

What are some recent procurement fraud cases / What are some red flags?

What are the tools available in market for streamlining procurement process?

What are some other departments who can have connivance with purchase departments? What are some inherent risks that would not be mitigated even after deploying proper procedures?

PROSPECTS & DIRECTORIES

❖ ABAC- Revolutionary Regulation

❖ MCAstringent action on removal of shell companies

❖ Introduction of Forensic Standards

❖ AI and Data mining in forensic

.

❖ Men to men marking theory.

❖ Cluster Theory

❖ Un-orthodox Theory.

❖ Connect the dot theory

❖ Confirmation Bias Theory

❖ Time Bomb Theory

❖ Corporate Espionage

❖ Hydro Theory

❖ Orphan Fund Theory

❖Maths on fraud

❖ 7 Eye’s on fraud detection

❖CVC technique for fraud prevention

❖In-house Tools like- Mail

Scanning, SCAN, Mind Muneem

❖ Whistle – blow mechanismWhistle-Eye

❖Identification of procurement red flags

❖Practical Knowledge

❖Eye for detail readiness

❖ Procurement Tools & Software Knowledge

❖Leveraging social media for fraud identification

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.