Mitigating fraud waste_misuse

16
Mitigating Fraud, Waste and Misuse within the Procurement Function A Case Study of P-Card Adoption within the U.S. Government

description

The U.S. Government was one of the earliest adopters of the P-Card. The program has grown exponentially since with approximately $17 billion in purchases in 2005 and an cost-savings of $1.2 billion annually.However, implementation of a streamlined procurement process was not without it's missteps. This paper will discuss how to optimize the benefits of a streamlined purchasing process while minimizing risk / exposure, using the U.S. Government as a case study.

Transcript of Mitigating fraud waste_misuse

Page 1: Mitigating fraud waste_misuse

Mitigating Fraud, Waste and Misusewithin the Procurement Function

A Case Study of P-Card Adoption within the U.S. Government

Page 2: Mitigating fraud waste_misuse

The Continuous Balancing Act

• The traditional P.O.-driven transaction costs $93 over and above the cost of the good or service purchased (from sourcing to payment).1

• The P-Card decreases the average cost of transaction by more than 75%.2

• However, 73% of organizations surveyed experienced attempted or actual payment fraud in 2009.3

These figures illustrate the importance of thoughtful and thorough implementation of fraud prevention policies, but not without considering the value of a streamlined and cost-efficient procurement program.

Purchasing Convenience vs. Purchasing Control

Page 3: Mitigating fraud waste_misuse

The U.S. Government as a Case StudyThe U.S. Government was one of the earliest adopters of the P-Card. The

program has grown exponentially since with approximately $17 billion in purchases in 2005 and an cost-savings of $1.2 billion annually.

Exe

cuti

ve o

rder

en

cou

rag

es “

mo

re

effi

cien

t” s

mal

l p

urc

has

e p

rocu

rem

ent

op

tio

ns

Dep

art

men

t o

f C

om

mer

ce c

on

du

cts

pil

ot

pro

gra

m

Gen

eral

Ser

vic

es A

dm

inis

trat

ion

as

sig

ne

d t

o m

an

agem

ent

of

PT

F c

ard

p

rog

ram

s

Nat

ion

al P

erf

orm

ance

rev

iew

du

bs

P

-ca

rd a

“p

rom

isin

g i

nit

iati

ve

Fed

eral

Ac

qu

isit

ion

Str

eam

lin

ing

Act

Fed

eral

Ac

qu

isit

ion

Re

form

Act

Sta

nd

ard

s fo

r In

tern

al C

on

tro

l i

n t

he

Fed

eral

Go

vern

me

nt

Page 4: Mitigating fraud waste_misuse

Card Issuing and User Training

In 2001 and 2002 the GAO identifies a significant portion of issued cards for which there was no transaction history (the cards had never been used) or there was no documentation justifying that the cardholder should need a purchasing card.

As the result of these audits, several military agencies cut back their cardholders and implemented strict card issuance policies.

Over a six-year period, total federal cardholders dropped from 586,000 to 357,000.5

Limiting Risk

Page 5: Mitigating fraud waste_misuse

Card Issuing and User Training

A study conducted in 2008 reviewed the stagnation of P-card use in the federal government as the result of new card issuance policies.

Estimated cost savings that could have been achieved through additional cardholders and transactions during this six-year timeframe were estimated to be $5.4 billion.

Rebate revenue left unearned over this time period was estimated at $26 million.5

Optimizing Value

Page 6: Mitigating fraud waste_misuse

Card Issuing and User Training

Ensuring that only the most appropriate employees are issued card / account responsibility limits financial exposure.

However, new payment methods such as e-cards, virtual cards, and one-time use cards ensure that “casual” users have access to streamlined payment tools while agencies reap the benefit of administrative cost savings – without overexposure to risk.

Formal training on appropriate use of the account and purchasing procedures should be conducted and documented for each cardholder.

Finding the Balance

Page 7: Mitigating fraud waste_misuse

Purchase Controls / Purchase Authorization

A 2002 audit of one federal department noted that 10 out of 14 offices studied disregarded the department’s purchasing policy requiring that all purchases of items over $1,000 be requested and approved in writing by an executive officer prior to purchase. 6

That same year, two employees within another department maderepeated micro-purchases, adding up to over $121,000 in computer equipment.

The total purchase clearly exceeding the cardholders’ established purchase limits and was deemed a misuse of the purchasing cards.6

A 2008 audit of government wide purchasing card programs estimated that nearly 41% of the transactions sampled from 2005-2006 failed to show that the transaction was properly authorized and that an individual other than the cardholder signed for the item once the product was delivered. 9

With Convenience Comes Risk.

Page 8: Mitigating fraud waste_misuse

Purchase Controls / Purchase Authorization

MCC Blocking in an Open-loop card program limits the type of companies a cardholder can purchase from based upon the company’s merchant category codes.

Closed-loop card networks hand pick a select group of merchants with which a cardholder may conduct business (i.e. fuel stations, retail locations of a preferred supplier, parts and service shops).

One government agency has implemented an order-to-payment e-procurement platform. Users are classified hierarchically and guided through the procurement process to ensure compliance with procurement policies. Zero instances of fraud have been identified on this system since launch.7

Automating Controls.

Page 9: Mitigating fraud waste_misuse

Purchase Controls / Purchase Authorization

Additional user-level purchasing controls are also available today:

• Transaction volume or frequency limitations,• Single transaction minimum or maximum values,• Product code limitations,• Purchase order (PO) requirements and even PO

format requirements,• Hierarchical structures,• Reference number requirements such as unit

number, department number, vehicle identification number (VIN) and more.

Automating Controls.

Page 10: Mitigating fraud waste_misuse

Monitoring Tools and Alerts

Backend technologies in new payment technologies can monitorthe transaction database for pre-established conditions,indicating fraud, waste or misuse.

A payment program for one government agency incorporates more than 250 unique invoice verification data points alone into its verification program. Over a 5-year period, the system identified more than 54,000 errors before transaction information was ever submitted for payment

approval.8

Mitigating Risk.

Page 11: Mitigating fraud waste_misuse

Monitoring Tools and Alerts

Agencies are also able to develop exception alerts and reports, which call attention to purchases that may or may not have been made for approved government use (i.e. home furnishings, toys, cosmetics), been purchased from designated government sources, or obtained at excessive cost. Alerts may be prompted when indicators of split procurements such as sequential invoice numbers, receipts issued within specific time periods of one another, and sequential PO numbers for similar items purchased are present.

Mitigating Risk.

Page 12: Mitigating fraud waste_misuse

Review and Approval

A 2002 GAO audit reviewing 5 months of cardholder statements at onegovernment department identified that 1 out of 3 statements had not beenapproved by the appropriate official. The unapproved statements totaled

$1.8 million. Even after a new approval process was implemented, the GAO noted that officials were not ensuring that each statement was supported by adequate documentation.6

Another agency had instituted a broad policy allowing the AO to presume that any transactions made were appropriate / authorized unless the AO was notified to the contrary by the cardholder. 6

Similarly, a 2010 audit of an additional agency noted that more than 75% of obligations allowed one official to act in two or more functions throughout the procurement function: request, authorization of purchase, recording the obligation of funds, verifying arrival of goods, and approving payment.9

Catching the Excess.

Page 13: Mitigating fraud waste_misuse

Review and Approval

In most of the above cases, it was found that AOs were overburdened by anexcessive number of cardholder statements, leading to oversights within or a

complete abandonment of appropriate approval policies. The GAO recommends a ratio of 5-7 cardholders to one approving official within a high-frequency transaction program.6

For low-frequency, high-value transaction programs, a transaction-by-transaction approval process may be the best measure against inappropriate use of funds. One procurement agency implemented a fully-prompted e-procurement platform which prompts the approving official via email to review and approve transaction details prior to invoice submission to payables. This same system compiles supporting documentation for each transaction within the system, recording the competitive bidding process, sole-source justifications, purchase logs, object-class codes, invoices, MSDSs, etc. in an auditable trail for the AO’s review.

Opportunity for Refinement.

Page 14: Mitigating fraud waste_misuse

Conclusion

Step by step, here are six methods to optimize the benefits of astreamlined purchasing process while minimizing risk exposure.

1. Evaluate departmental, agency and individual purchasing requirements to determine appropriate accountholders, accepting locations, credit line requirements and risk exposure.

2. Ensure that policies are established, shared and easily referenced by any accountholder or AO.

3. Ensure that AOs are knowledgeable of procurement policies and trained on how to perform their responsibilities.

4. Determine and implement appropriate automations and front-end purchase authorization features to minimize opportunity for fraud, waste and misuse.

5. Establish criteria to help identify account misuse and implement automated alerts and / or reports to notify the appropriate official when such instances occur.

6. Establish minimum account review and auditing expectations and ensure an appropriate ratio of accounts to accountable officials.

Page 15: Mitigating fraud waste_misuse

Visually, you can think of each step in the process as a filter, siphoning out inappropriate spending.

Page 16: Mitigating fraud waste_misuse

Resources

1 Palmer, Richard and Mehendra Gupta. 2010 Purchasing Card Benchmark Survey Results. MG Research Corporation. Rpmgresearch.net.

2 2010 AFP Payment Fraud and Control Survey. Report of Survey Results.

3 United States Department of Defense. Office of Inspector General. “Fraud Indicators in Procurement and Other Defense Activities: Fraud, Waste, and Abuse Defined.”http://www.dodig.mil/inspections/apo/fraud/fraud_defined.html.

4 AGA Corporate Partner Advisory Research Group. The Federal Purchase Card: Use, Policy and Best Practice. AGA CPAG Research Series: Report No. 4. April 2006.

5 Palmer, Richard J., Mehendra Gupta and Rodney Dawson. U.S. Government Use of Commercial Card Technology: A Case for Change in Military Card Distribution Policy. Defense AR Journal. Volume 17, Number 3, Issue 55, July 2010. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA523651&Location=U2&doc=GetTRDoc.pdf

6 Calbom, Linda M. United States GAO. Testimony Before the Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives. Government Purchase Cards: Control Weaknesses Expose Agencies to Fraud and Abuse. May 1, 2002.

7 A Better Procurement Process. Multi Service Corporation. March 2010. http://www.multiservice.com/knowledge-center/thought-leadership/request-article.html?downloadArticleID=367

8 Multi Service Corporation (2010). Retrieved April, 2010.(Rack11D) Multi Service database.

9 Ragland, Susan. US GAO. Testimony Before the Committee on Veteran Affairs, House of Representatives, Department of Veteran Affairs: Longstanding Weaknesses in Miscellaneous Obligations and Financial Reporting Controls. July 2010.

10. Inspection and Evaluation Committee. A Practical Guide for Reviewing Government Purchase Card Programs. June 2002.