Sie verwenden eine veraltete Browser-Version. Dies kann unter Umständen zu Einschränkungen in der Funktion sowie Darstellung führen. Daher empfehlen wir Ihnen, einen aktuellen Browser wie z.B. Microsoft Edge zu verwenden.
Serie 05.10.2017 Corruption - The Ignored Reality
Anthony R. Williams
General Manager ARW European Security Consulting
- Financial Statement Fraud: The Costly Game
- Inventory and Other Non-Cash Assets Fraud: The Real Internal Thief
- Disbursem*nt Fraud: The Ultimate Violation of Trust
- Shimming – When Employees take it Off the Top
- Insider Fraud and the Need for Compliance
- The Evolution of Laws and Compliance
![Non-Cash Assets Fraud: The Real Internal Fraud (2) Non-Cash Assets Fraud: The Real Internal Fraud (2)](https://i0.wp.com/www.haufe.de/image/1163002-250032-5.jpg?trafo=21x10&width=300&digest=-J6TvfUw_XFxGXJpPfgUziY0cAiLYMN-04-SNcC-ORw%3D)
Inventory and non-cash assets theft schemes pose a complex problem for loss prevention and compliance professionals, because this form of crime can only be committed by employees, an inside job.
This form of asset misappropriation takes place on every continent ranging from 16,8% of all asset misappropriation crimes in the United States to 26,6 % in the Middle East, with medium losses up to $275,000 per reported incident. Losses in this magnitude can prove unbearable for small and mid-sized businesses, therefore prevention is very important.
Definition of Inventory and Non-Cash Assets Fraud
Inventory and non-cash assets fraud occurs when employees steal, misappropriate, or embezzle their company’s non-cash assets such as inventory, equipment, services, etc. One of the key issues of this form of crime is that it is not necessary that the dishonest employee physically steal the asset, they can use it without authorization for personal reasons.
Theft of Physical Assets
Physical assets can be misappropriated by employees in two ways. First is good old fashioned theft. The theft can occur as the result of opportunity or may be the result of premeditated criminal energy. In either case, the thief will use any weakness in property accountability and security to steal or misuse company property. Such non-cash assets are easy to abuse; perhaps that is why this type of crime is so common. The losses as the result of misusing company property are difficult to deduce, especially if the crime goes undetected for an extended period of time. Automobiles of all types, passenger cars, small and large trucks, manufacturing machinery, service machines have been misused in general everywhere. The cost of these abuses is very difficult to sum up, due to the complexity of the service and repair requirements of such devices. In short, all of the aforementioned company property requires routine scheduled maintenance and periodic repair. When dishonest employees use (borrow) company equipment, the cost of maintenance and repair will increase and there is no profit to the company associated with the use of the property. In addition, if the company property is damaged during unauthorized use, the dishonest employee will probably not report the abuse of the property, for obvious reasons.
Some examples of misuse of company property are:
- Company vehicles: Company delivery truck used to move a relative’s household.
- Construction materials: Stolen from the company and used to performed construction work for the employee’s customer.
- Company machinery used to complete private work of an employee.
- Company computer and time used to write a book.
All of the above referenced instances can also be used by employees in direct competition with their company, when the dishonest employee produces goods and services with company property that they then sell to the public in general or to company’s customers.
In addition, internal thieves often steal inventory from company warehouses or storage areas. This happens not just in retail and manufacturing, but in service companies as well. Sadly, employees who work in the company logistics, shipping, and receiving, have the most opportunity to commit this type of fraud. The most frequent methods of stealing inventory are:
- Stealing Items from Warehouse and Storage Areas (Items can be taken out of containers and empty containers used in inventory to conceal fraud)
- Stealing Company Property from Colleagues
- False Inventory Schemes
- False Shipments of Inventory and Other Assets (Company property is shipped to the wrong address and stolen there)
- Purchasing and Receiving Schemes
Case in point
Workers responsible for loading goods on a truck to be delivered at another company location saw a weakness in the company logistic system. They placed the ordered material on the loading platform which was checked by their supervisor. Because the material remained on the platform before loading for several hours, the fraudsters added more cases of product to the waiting approved load. The unaccounted for property was then loaded on the truck and delivered. Once delivered, an accomplice at the other end removed the extra boxes which they sold later and divided the proceeds with the workers at the other loading dock. In this manner the company lost $200,000.00. The truck drivers who were involved in this collusion would be contacted at home by one of the dock workers, and alerted that they had extra product on their trucks. The next day, the drivers would sell the extra product for cash and split the proceeds with their warehouse accomplices.
Detection and Prevention of Inventory and Non-Cash Assets Fraud
Detection and prevention of Inventory and Non-Cash Assets Fraud requires planning and discipline on the part of compliance, loss prevention, security (Physical and IT) and management. Again, referring to the Fraud Triangle), opportunity is the factor that the company can directly control. Therefore the primary methods of preventing and detecting this form of fraud must be centered on restricting the opportunity of fraudsters to steal. The ultimate challenge is finding the balance of removing the opportunity to steal, while not restricting company productivity.
Forms of Detection May Include:
- Statistical Sampling of Documents Used in Shipping, Receiving and Inventory
- Physical Inventory Counts
- Analytical Review
- Computer Generated Trend Analysis
- Detailed Audit Program
Forms of Prevention Include:
- Proper Documentation
- Segregation of Duties
- Independent Checks
- Physical Safeguards
- Crime Prevention Program
- Strict Internal Property Handling Policies
- Periodic Property Inventories
- Security Awareness Program
- Internal Fraud/Theft Reporting System
Conclusion
The harm caused to businesses in all industries by inventory and non-cash frauds is difficult to determine, but it should be apparent to all managers that prevention and detection efforts are important in keeping their companies profitable. Dishonest employees adjust to the security and crime prevention protocols of their employer, therefore the prevention and detection policies must be re-evaluated regularly to keep pace with thieves. Lastly, an atmosphere of loyalty and trust must be generated and maintained by senior management through strong leadership. Why - because a content employee is loyal, and a loyal employee will not steal.
German Summary
Der Diebstahl materieller Vermögenswerte ist ein gravierendes Problem-und zwarfür jeden Unternehmer in allen Industriebereichen. 26,6% aller Diebstähle fallen darunter. Diese Form von Wirtschaftsbetrug bezieht sich insbesondere auf Firmeneigentum wie z.B. Produktionsmaschinen, Kraftfahrzeuge oder Produkte.
Dementsprechend istes wichtig, dass Maßnahmen zur Prävention und Entdeckung von Missbrauch von Firmeneigentum entwickelt werden.
Beispiele vonbargeldlosemDiebstahl:
- Diebstahl von Firmenfahrzeuge, z.B. die Nutzung des Firmen-Lieferwagens für private Zwecke
- Nutzung von Baumaterial und Produktionsfirmen für eigene Zwecke und/oder Projekte
- Nutzung der Firmencomputer und Arbeitszeit, um z.B. ein Buch zu schreiben.
Gegenmaßnahmen:
- Einwandfreie Dokumentation
- Sicherheitsmaßnahmen
- Strenge Materialbehandlungsregeln
- Regelmäßige Inventur
- Sicherheitsbewußtseins-Training
- Internes Diebstahl-Meldungsverfahren
- 1
- 2(current)
- 3
- 4
- 5
- 6
- Zurück
- Weiter
Schlagworte zum Thema: Betrug, Compliance, Compliance-Management, Korruption
- Wann muss eine öffentliche Ausschreibung erfolgen?
2.060
- Mitarbeiterkontrollen durch den Arbeitgeber – Was ist unter welchen Voraussetzungen erlaubt?
1.909
- Compliance: Definition und Bedeutung für Unternehmen
1.573
- Diese Compliance-Regelungen gelten für Geschenke und Einladungen
1.031
- Welche Aufbewahrungsfristen für Bewerbungsunterlagen gelten
993
- Datenschutz und E-Mails am Arbeitsplatz
900
- Definition und Ziel von Corporate Governance
448
- Compliance-Regeln und -Richtlinien im Unternehmen einführen
405
- Datensicherheit: Maßnahmen definieren
325
- Unterschied zwischen Datenschutz und Datensicherheit
291
- Datenschutzkonforme Führungskräftebewertungen und Mitarbeiterumfragen
02.05.2024
- Dynamische Entwicklungen in Compliance und Corporate Governance
25.04.2024
- Mit dem richtigen Tool zum Erfolg: Wie Unternehmen Compliance mit KI optimieren
24.04.2024
- Krisenpräventionsumfrage 2023 zeigt die Herausforderungen des Krisenmanagements
17.04.2024
- Compliance als Grundstein der Unternehmenskultur
10.04.2024
- DIHK-Umfrage sieht Datenschutzgrundverordnung als Bürokratietreiber
03.04.2024
- Europaweite Datenschutzaktion zum Auskunftsrecht der Datenschutzgrundverordnung
27.03.2024
- Datenschutzbehörden führen automatisierte Prüfungen von Cookie-Bannern durch
26.03.2024
- Mitarbeiterkontrollen durch den Arbeitgeber – Was ist unter welchen Voraussetzungen erlaubt?
12.03.2024
- Wann muss eine öffentliche Ausschreibung erfolgen?
05.03.2024
Jetzt anmelden
Ihre Meinung ist uns wichtig
*Sollten Sie im Textfeld (optional) personenbezogene Daten übermitteln, beachten Sie bitte unsere Datenschutzerklärung
Bleiben Sie immer Up-to-date mit dem haufe.de Compliance Newsletter - kostenlos und unverbindlich
× Profitieren Sie von personalisierten Inhalten, Angeboten und Services!
Unser Ziel ist es, Ihnen eine auf Ihre Bedürfnisse zugeschnittene Website anzubieten. Um Ihnen relevante und nützliche Inhalte, Angebote und Services präsentieren zu können, benötigen wir Ihre Einwilligung zur Nutzung Ihrer Daten. Wir nutzen den Service eines Drittanbieters, um Ihre Aktivitäten auf unserer Website zu analysieren.
Mit Ihrer Einwilligung profitieren Sie von einem personalisierten Website-Erlebnis und Zugang zu spannenden Inhalten, die Sie informieren, inspirieren und bei Ihrer täglichen Arbeit unterstützen.
Wir respektieren Ihre Privatsphäre und schützen Ihre Daten. Sie können sich jederzeit darüber informieren, welche Daten wir erheben und wie wir sie verwenden. Sie können Ihre Einwilligung jederzeit widerrufen. Passen Sie Ihre Präferenzen dafür in den Cookie-Einstellungen an.
Mehr Informationen Nein, Danke Akzeptieren