Are Your Employees Stealing From You? by B2B CFO - HTML preview

PLEASE NOTE: This is an HTML preview only and some elements such as links or page numbers may be incorrect.
Download the book in PDF, ePub, Kindle for a complete version.

Top 10 Ways Employees Steal From Their Employers

According to the Association of Certified Fraud Examiners, total business fraud in 2009

was $2.9 trillion dollars; small business, defined as less than 100 employees, accounted for 30% of all frauds or $870 billion dollars! The median loss at small businesses was $200 thousand dollars and was typically taken over a two or three year period. 82% of small to mid-size businesses report they have experienced employee theft. We all want to believe it can’t happen to us, but with these numbers, the odds are very much against us.

The vast majority of employees are honest and hardworking. Unfortunately, it may only take one dishonest employee to put your business in serious trouble or even destroy it.

The methods used are only limited by a dishonest employee’s creativity. Don’t assume you can “profile” an employee thief. Many frauds are perpetrated by long-term employees that no one ever thought could be involved in fraud.

One of my favorite fraud stories is about a parking lot outside Britain’s Bristol Zoo.

Allegedly, for 25 years, 7 days a week, approximately $500 was collected in parking fees every day. The attendant never took a day off and then one day he didn’t show up for work. When the zoo called the city about a replacement, they were told he was not a city employee and the zoo was responsible. The zoo was shocked that the attendant was not a city employee because he certainly was not a zoo employee! At $500 a day, 7 days a week for 25 years, that equates to $4.6 million dollars! Although the veracity of this story has been challenged, the lesson to be learned rings true. Many times a fraud may be right under our nose and we may not see it! Be professionally skeptical, follow up on anomalies, and respect your instincts.

I think we can broadly characterize most employee fraud into 10 categories. If you know what broad types of fraud schemes exist and have some basic knowledge of internal control, perhaps it can help you prevent employee fraud at your company.

I’ll provide the broad categories here and then briefly explore each of them in additional detail.

1. Help Yourself!

2. Fake Documents

3. Fake Vendors or Fake Employees

4. Misapplying Customer Remittances

5. Bribes, Bid-Rigging, and Kickbacks

6. Purchasing Goods for Personal Use with Company Funds 7. Data Manipulation

8. Fraudulent Expense Reports

9. Manipulate the Machines

10. Salami Fraud

Know that many controls are easy to establish while others may be too elaborate or expensive for your business. For smaller businesses, it’s sometimes difficult to properly segregate duties for good internal control. Think hard about this because it’s a major reason smaller businesses are hit so hard by employee fraud.

Segregation of duties between employees having physical control of your assets and recordkeeping for those assets is absolutely critical.

Regardless of the amount of time and money you spend, you’ll never be able to be completely fraud-proof your company. Having said that, employee theft is a crime of opportunity. If you take small, simple steps, you can create a healthier internal control system and help discourage employee fraud at your company.

Top 10 Ways Employees Steal From Their Employers

Method 1- Help Yourself!

Many times security and controls are so poor, employees simply walk out the door with your cash, inventory, or other assets. Ignoring fraud or denying it can happen at your company is foolish and is inviting loss.

Number one, establish physical access controls. Segregating and restricting access to high value inventory should be considered. If you have high value inventory, especially small items like jewelry, you should physically segregate it and lock it up.

You should establish physical control and limit employee access to a small number of employees. Ideally you should set up the control so all employee access is through a card reader that logs time, place, and employees in and out. All inventory removed should be logged with time, purpose, requisition and job/order number and requisitioning employee. Limiting access to inventory will reduce loss potential, both in terms of theft occurrence and severity.

Is your facility protected with card keys? This technology is relatively cheap and can tell you exactly who went where and when. If all employees do not need access to all areas of your facility, the system can be set up on a need to access basis. Can you control regular building egress so that employees will all have to leave at one exit which can be monitored, as opposed to employees “going out the back door?”

By the way, a favorite trick of dishonest employees is to take inventory out the back door and put it in the dumpster for retrieval after hours. To foil this, it doesn’t take much effort to simply lock the dumpster at the end of every day.

Do you take a physical inventory annually? Large inventory shrink may be a sign of employee theft. Unexplained empty boxes in the warehouses?

Periodic inventory cycle counts may also help uncover problems. Cycle counts are simply counting a portion of the inventory on a rolling basis. Don’t publicize a schedule in advance but conduct the counts regularly and try to count it all at least once a year.

When was the last time you did a fixed asset inventory? Do you know what you currently have? Have the fixed assets been tagged or otherwise identified as company property? Do you have procedures for disposal of excess or obsolete fixed assets? All fixed asset disposals or sales should require appropriate documentation and approval. Accounting should get notification so they can adjust the records. They can also compute a gain or loss on disposal which should be known in advance of the sale or disposal.

If you utilize anti-theft tags, think about who has access to the tools which can remove the tags. Again, a simple roadblock that may discourage a casual theft.

With today’s technology, it’s easy and inexpensive to put in cameras in key locations at your facilities. This should not only help reduce employee theft but increase facility security and help protect your employees.

Can your office employees walk out the door with your cash? What are your check signing procedures? For a smaller company, perhaps the owner/CEO signs all the checks. This may provide some protection but it’s hardly fool-proof. Larger companies may utilize check signing machines which afford some protection as long as the signing meter is controlled and logged. In no event should you permit employees to utilize rubber stamps to sign checks.

In accounts payable, once the checks are signed, they should be mailed out directly to the payee and not be returned to the check requisitioner. Consider having your accounts payable checks taken directly to the post office. I once worked at a company which gave the outgoing checks to the mailman as he delivered the incoming mail. Unfortunately, the mailman had itchy fingers and stole some of the checks, altered them for his own benefit and then cashed them. After that episode, one designated employee hand carried the checks directly to the post office every day.

Can an employee write themselves a check and cover it up by making fictitious accounting entries? Know that banks can’t be counted on to authenticate check signatures. You need to set up job responsibilities such that the person having custody of an asset also does not have recordkeeping responsibility.

Smaller companies should consider having bank and credit card statements sent directly to the business owner’s home address. This may help internal control if the owner scrutinizes the spending each month before doing the bank reconciliation.

Are bank reconciliations done promptly and reviewed?

For petty cash, utilize an imprest system. Keep the cash under lock and key and make one employee responsible. When the funds needs to be replenished, the cashier should produce receipts to substantiate the fund replenishment and so accounting can make the appropriate journal entries.

Diamond Graphics, a Minneapolis company, was recently bilked out of $1.9 million dollars by their accountant. Apparently he was able to divert accounts payable checks intended for certain vendors to his personal bank account. Because he had control of the books and the checks, he was able to conceal the fraud for years by making fictitious accounting entries.

Ask Callan Western Sales, a Los Alamitos, California sporting goods store, if separation of duties is a good idea. Authorities say that a clerk there was given access to company checks and on-line bank accounts and stole $400,000. The indictment alleges that the clerk attempted to cover her theft by altering records and intercepting company credit card statements. Authorities say that financial pressures forced the family owned company to close in 2007. The owners didn’t notice the fraud until after the business was forced to close.

Who’s watching your accountants?

Top 10 Ways Employees Steal From Their Employers

Method 2- Fake Documents

This is one area where technology can work against you. Even an employee with low technology skills can easily get a printer and create fake documents which could fool an expert. Document falsification typically may include checks with altered payees or amounts, fake voided checks, fake or duplicate purchase orders, invoices, receiving documents, or altered time cards.

Your internal control needs to be developed with a good understanding of your work flow and processes.

One technique that can help you enhance accounts payable internal control is a

“three way match.” This refers to matching an invoice with a receiving document and a purchase order before an item is paid in accounts payable. The more documents that need to be forged, the lower the probability.

Most banks offer “Positive-Pay” checking accounts. Basically when you run your payables you transmit a control file to your bank with check numbers, payees, and amounts. As the checks clear, the bank matches the clearing checks to your control file. If an amount or payee does not match, you are immediately notified and you may elect to pay or bounce the check.

Unique form numbering schemes may make documents tougher to falsify and easier to spot fraudulent documents.

Accounts payable should only pay from an original invoice with an original authorizing signature of the person approving the payment. Again, once checks are signed, they should be mailed out directly and not returned to the check requestor.

Duplicate payments may be a sign of fraud. Your accounts payable system may be able to automatically check for potential duplicate payments by comparing invoice numbers, vendors, amounts, and purchase orders. You should scan the payment register and look for document number sequences that don’t look right. There are companies that will come in and do an accounts payable audit to check for duplicate payments. Many of these audits are priced on a contingency basis and you may only have to pay for the audit if they detect and recover duplicate payments.

Sales return documents, voided sale documents, and credit/discount documents may be falsified to steal money from your company. For example, an employee may record a sales return for a return that never happened. If your system is not properly controlled, the employee could then direct the refund into their own pocket.

You need to make sure you have proper segregation of duties to prevent this.

A former accountant at Ikea issued himself refunds for purchases made by customers. In less than one year he was able to steal $400,000. Basic return controls could have prevented this fraud. Refunds should not be processed until returned goods are received back in the warehouse.

Analysis of spending variances to budget and prior year can help root out fraud. In addition, a regular analysis of all balance sheet accounts may help detect fraud, if not deter it. If employees know that accounts are regularly analyzed and variances and anomalies are investigated, they may be discouraged from perpetrating a fraud.

Always analyze your processes and methodologies with a keen eye toward segregation of duties. The general rule is that asset custody (cash, checks, inventory, and other assets) and recordkeeping for those assets should always be done by different people.

Top 10 Ways Employees Steal From Their Employers

Method 3- Fake Vendors or Fake Employees

Many frauds are based upon setting up fake employees or fake vendors with an unscrupulous employee pocketing the payments made to them.

Who controls your accounts payable vendor master file? What are the policies and procedures to set up a new vendor? Again, think about separation of duties. No one person should be able to set up a new vendor, approve a payment to that vendor, and conceal it by making fictitious accounting entries.

Many fake vendor schemes utilize a variation of the name of a common, well known vendor. For example, instead of “Common Vendor, Inc.,” an unscrupulous employee may set up a vendor called “Common Vendor” and it likely would not arouse any suspicion. If a fraudster can establish a fake vendor and direct payments to that vendor, they may be able to then pocket the money without anyone noticing in the absence of other internal controls. A simple review of the vendor master file would show two nearly identical vendors which should then be investigated. That’s not to say it’s clearly an indication of fraud, but it may be.

A former Quest Diagnostic manager was able to steal $1.2 million dollars by setting up fake companies, fake invoices, and fraudulent expense reports. He was caught during a review of the accounts payable system when someone became suspicious of some fake vendor names the perpetrator had established. When they investigated the suspicious vendors, they found that the addresses did not match the name. Be wary of vendors that do not have a physical address. If you’re really sharp, a quick look at Google Maps may substantiate that the new vendor exists and resides where they claim to. Other business directory searches may further substantiate whether the business is legitimate or not. Some thieves may go to extraordinary lengths so you may even want to make sure the owner of the company isn’t one of your employees!

What are your procedures for establishing new employees? How are checks or pay receipts distributed? Paychecks or pay receipts should not be distributed by the same person that controls the employee master file and/or runs the payroll! If an independent person distributes the checks or pay receipts and has an extra check left over, then the

“ghost employee” scam may be caught and stopped. Again for both fake vendors or fake employees fraud schemes, analysis of your spending to budget and prior year may help prevent or detect this type of fraud.

Top 10 Ways Employees Steal From Their Employers

Method 4- Misapplying Customer Remittances

Think of this type of scheme as robbing Peter to pay Paul. Or think of it as the employee/company version of the classic investment Ponzi scheme. It basically involves deliberately mis-applying customer receipts in an attempt to disguise missing money. A classic case is to steal customer A’s remittance and then apply Customer B’s remittance to A’s account, apply Customer C’s remittance to customer B, etc. (AKA, check lapping).

An employee of CCU Associates embezzled $1.3 million dollars over a 25 year period through a lapping scheme. He was caught and is currently serving a 15 year prison term.

An administrative assistant at Beverly Hospital stole $230,000 from Sodexo, a hospital vendor through a lapping scheme. The scheme unraveled when the hospital decided to change vendors. As Sodexo was working through the final payments due them, they discovered there were many invoices they showed unpaid which the hospital claimed had been paid. When the checks were traced, the fraud was discovered.

Although lapping is a common fraud technique, it is rather clumsy and may be easier to detect than some other frauds. Require all employees to take vacation or make sure you have mandatory and periodic job rotation. This type of fraud requires high maintenance and when the perpetrator is absent, it may quickly unravel and be discovered.

You should also segregate recordkeeping and opening of mail containing customer remittances. At a minimum, one employee, with no other recordkeeping responsibilities, should open all the mail and make the bank deposit. In most companies there is no reason that the accounts receivable person needs the live check. If they really must have the check, have the other person make them a copy. You cannot mix recordkeeping and asset custody in one person! If you have enough incoming check volume, consider a bank lockbox. The bank will open your mail, deposit the checks and then send remittance data to your accounts receivable staff to update your records. As an added benefit, a lockbox will generally speed up the availability of your cash.

Encourage your customers to pay you electronically. Electronic remittances are generally available quicker than checks and may be less prone to unscrupulous diversion.

Do you send out customer statements? Many times if a customer sees misapplied or missing cash on their account they will sound the alarm. In addition, monthly customer statements may help you increase your cash flow. If you don’t send out customer statements, consider periodically sending out account confirmations. Again, if balances are misstated, your customer may call. Be sure to have the call back number on the confirmation directed to an independent person in your company not likely involved in such a scheme!

Who has the authority to write-off accounts or amounts and issue credits? If that employee also has access to cash or checks they may be able to divert the cash back to themselves.

Slowing customer collections may be a sign of check lapping, especially from an account that previously paid well. Periodic review of your accounts receivable accounts may also provide other clues of impropriety. If you see a lot of adjustments and credits, you should investigate. Again, not an absolute sign of impropriety but perhaps a clue.

Cash flow not quite what you were expecting? Make sure you don’t have your hard-earned cash diverted by an employee thief.

Know that over longer periods of time, cash and profits should have some correlation.

Differences in cash and accrual accounting reported profits are caused by timing differences in recognizing expenses and income. If you don’t have some correlation over time, you may have accounting problems or it could be another sign of fraud.

Top 10 Ways Employees Steal From Their Employers

Method 5- Bribes, Bid-Rigging and Kickbacks

This may also be known here in Northeast Ohio as the “Cuyahoga County Special,”

named after the criminals exposed recently in the Cuyahoga County government corruption scheme involving bribes, bid-rigging, and kickbacks.

The Cuyahoga County corruption was first reported several years ago and the investigation continues today. Some of the corruption has apparently been going on for a decade. The corruption involved top county officials, contractors, local school board officials, and judges. To date more than three dozen people have pleaded guilty to charges including bribery, contract-steering, bid-rigging, kickbacks, and other associated thievery. It’s hard to put a dollar amount on the damages but many believe it will be millions of dollars when all is said and done.

Really all you need is a sloppy bid process and an associate outside at one of the bidding companies. This method requires two or more people- at least one inside and one outside the company.

Do you have a formal bid process? Zero tolerance policies regarding bribes, bid-rigging, and kickbacks? Do you follow up on losing bids periodically with someone independent to ensure the bids were not altered? How “tight” are the price quotes?

If you see a particular vendor regularly winning bids by a small amount, you might want to examine the bid process closer. Employees giving your vendors a second bite of the apple may also be indicative of problems.

Do you have a no tolerance prohibition on accepting outsider’s gifts, entertainment, etc.? Do you have employees periodically state in writing that they understand the policies and are in compliance with these policies?

Do you properly and regularly oversee, review, or audit the purchasing department?

Are there employees obviously living beyond their means? Do you have a clerk in a Cadillac?

Do you do background checks and credit reports on all employees before they start at your company? Although that may be a good practice, don’t assume employee screening is fail-safe. For legal reasons, many companies today will only confirm prior employment and dates worked. Less than 10% of employees caught stealing had prior convictions.

Top 10 Ways Employees Steal From Their Employers

Method 6- Purchasing Goods for Personal Use with Company Funds Do you match all invoices to be paid with a report from your Receiving Department that the company has received the goods? Who approves your purchase orders? Who approves invoices to be paid- Is it a separate person from one who signs the checks?

Do you have a no tolerance policy regarding personal use of company funds?

Who makes the accounting entries to record the expenses? Does the account have a budget so that items not budgeted will trigger an analysis?

Have you noticed any employees apparently living beyond their means?

What is your policy on company credit cards? Consider having one employee maintain custody and be responsible for the company credit card if you only have one. If your business requires more than one credit card, have each employee needing one to have it issued in their name so accountability is established. It is possible to issue company credit cards either in the company name or in individual names. Know the advantages and disadvantages. Consider having employees use their own credit card and reimburse them through an expense report.

Review your accounts payable reports to see exactly what your company is buying, who you are paying, and where the goods/services are delivered. Depending on the nature of your business, drop shipments may need additional scrutiny.

I can’t emphasize enough the importance of preparing detailed operating budgets and regularly reviewing budget variances. Depending on fraud severity and frequency, budget variance analysis is a great tool to detect and even help prevent employee fraud. If the employees know all variances are followed up quickly and regularly, they may not perpetrate the fraud they were considering.

The former Chief Executive Officer of a Montana diary co-op is currently serving 4 years in prison for stealing $1.2 million dollars by using company credit cards to make personal purchases. There was inadequate segregation of duties. The CEO controlled the credit card and apparently had inadequate supervision until it was too late.

Regardless of an employee’s position, it is important that all spending is reviewed by someone other than the spender. You need to set an appropriate zero tolerance tone at the top and document business purpose for all spending, not only for good internal control, but also to avoid IRS problems.

Top 10 Ways Employees Steal From Their Employers

Method 7 –Data Manipulation

Data manipulation may involve anything from executing transactions outside the accounting/data collection system to altering the data that is in the system.

For example, recording fewer sales than were actually made and pocketing the difference. For a cashier, you need to ensure all sales are rung up. A security camera can help with internal control and also help protect employees.

Believe it or not, but there have been reports that some brazen employees brought in their own cash registers and used those to ring up some sales! Since this never enters the accounting/data collection system it may be difficult to detect. Of course, there may be signs like a large inventory shrink, declining sales, etc. Consider bonding employees that handle cash to help protect your company and also carry crime insurance.

Are all journal entries in your company books reviewed and approved by a person other than the initiator? Does the approver review for appropriate journal entry backup and document their review by initialing all entries to establish an audit trail?

Keep an eye out for accounting entries that have no documentation or that are in round dollars. Clear warning signs that, at best, you have a sloppy accounting system and, at worst- you have fraud.

What are your procedures for employee pay increases? Can one person change rates and run the payroll? Sometimes simple payroll control totals may help prevent this activity.

Fraudulent workers compensation claims cost employers millions of dollars annually in false or exaggerated claims. How do you manage claims? People injured on the job should be taken care of but those who claim on the job injuries when they weren’t, or who exaggerate their claims, should not be able to scam you.

Common workers compensation scams include exaggerating the severity of a workplace injury, staging an injury, claiming a personal injury was incurred at work, and failure to disclose a pre-existing condition. Manage these claims! Disability and workers compensation claims have exploded during this economic downturn. Common sense tells us that the large increases we’re currently seeing cannot possibly be all legitimate. Establish an injury reporting system that requires quick and accurate reporting of all job-related injuries and accidents. Consider returning injured employees to “light duty.” Many times it will not only help prevent malingerers, but also be welcomed by the vast majority of honest employees.

Top 10 Ways Employees Steal From Their Employers

Method 8- Fraudulent Expense Reports

Number one, have an expense report policy that details and documents exactly what expenses are reimbursable. Have a zero tolerance policy for any employee cheating on their expense report. If they cheat, they should be immediately terminated and prosecuted.

All expense reports should be approved by the submitter’s manager before payment.

Approval indicates adherence to policy and business purpose. Expense reports should be required promptly, at least once a month. All items should have documentation and a clear business purpose. This is important for internal control as well as for income tax purposes.

Be careful with expense reports if you have company credit cards. If no one is watching it’s very easy to claim airline tickets, hotels, etc. on an expense report when in fact they were paid by a company credit card or directly billed to your company. A rudimentary but effective fraud if no one is watching.

Fraudulent expense reports are a prime way employees “get even” if they feel the company has wronged them. I once worked for a company where a top salesman falsified his expense report by claiming business mileage he didn’t incur. This particular fraud was accidently discovered when the salesman’s boss was asked by a top customer how his salesman was doing as he had not seen him in some time. The sales boss recalled the salesman had just claimed mileage to visit this customer! When the salesman was confronted, he admitted he lied and was promptly dismissed. Apparently the salesman thought he was “entitled” to this since he was recently passed over for promotion.

Have an expense report policy, ensure there is a valid business purpose for all expenses submitted for reimbursement, and insist on original receipts. Compare spending to budget and prior year and follow up on discrepancies and variances.

The former President of a university in Kansas City is currently being sued by the university claiming she stole millions of dollars through fraudulent expense reports. It’s alleged that for 10 years the President routinely claimed meals and other expenses that were never incurred. The university claims that more than 70% of the claims on her expense report were fraudulent. Again, this fraud could have been easily prevented with some basic internal control.

Everyone’s expense report should be reviewed and approved before payment.

Top 10 Ways Employees Steal From Their Employers

Method 9 - Manipulate the Machines!

Many point of sale terminals and cash registers have reset buttons to “Z out” a machine to help ensure individual cashier accountability and reporting. This is a potential control issue if employees can Z out their own machine and the number of machine Z outs are not logged or controlled.

At the start of a shift, for example, a dishonest employee may ring up the first transactions and keep all the cash proceeds. Once they’ve had their fill for the day, they then Z out the machine and start over for the company “official sales.” The machine should have a counter that keeps track each time the machine is reset.

Ensure employees either cannot Z out their own machine or at least log the counter to ensure each cashier only “closes” once each day. If there is a need to close more than once, a supervisor should be required to log and document.

This type of fraud is not limited to cash registers but may extend to manipulation of other machines such as meters, gauges, etc. If you have homogenous inventory that “flows”, you may utilize gauges and meters to measure inventory, product flow, and sales. These are all subject to employee fraud. Many people assume the machine cannot be wrong, but many of the meters can be tampered with or turned off.

For example, consider a gas station. A gas station has sales that are largely related to gallons of gasoline pumped to their customers. Effective inventory/cash control should call for a reconciliation of gallons pumped to each shift’s gasoline sales.

Further, gasoline sold should track closely to new fuel delivery. With the cost of gasoline today, inventory shrink could eat all your profits and then some. Maybe that’s how the new employee keeps his Hummer full, and why he has so many happy friends that visit him so much at work…..

Top 10 Ways Employees Steal From Their Employers

Method 10 - Salami Fraud

So named because the big fraud is simply a collection of smaller items.

A former Calgary Transit employee stole from his company by taking coins home with him by hiding them in his bag. Over 7 years he took $375,000 or an average of $200 per day in quarters, dimes, and nickels!

Many times salami fraud is centered around computer applications and programs.

In a high volume automated environment, if one can divert a small piece of each transaction, it might not be detected.

A classic salami fraud is changing a rounding routine in a financial application program. If the program can be altered to change calculated amounts even a small amount, in a high volume environment, it could equate to big money for an unscrupulous employee. For example, there have been numerous reports about dishonest computer programmers who altered payroll computer programs. In one scheme, the programmer altered the program such that certain amounts, which were required to be rounded to the nearest penny, were all rounded down and the amount left over was put into the programmer’s personal bank account. In this very high volume environment, the money added up incredibly fast. Since many of the underlying reports tied out, it took a long time to discover this fraud. The lesson learned here is to ensure you have adequate controls over program changes and make sure the programs are adequately tested before they are put back into production.

Another reported fraud related to federal tax withholding reports sent to the government. The computer program was altered so that the federal tax payroll withholdings report to the IRS balanced to the payroll and other reports but the employees’ individual data were manipulated. All employees were credited with less withholdings, except for the scammer. The scammer’s account then was reported higher than actually was withheld. The total withheld balanced to the payroll but the scammer got credit with a higher amount than was actually withheld. At the end of the year, this came back to the scammer in the form of a bigger tax refund at the expense of the non-scamming employees. This scam unraveled when an employee noticed their W-2 statement did not match their pay stubs.

Many times the central issue allowing salami frauds is improper control of testing programs and how programs are placed back into production after alterations. Make sure that it takes at least two employees to perform such a task and establish an audit trail to help deter or detect this type of fraud.

Top 10 Ways Employees Steal From Their Employers

Protect Your Company!

So what can you do to protect your business? According to the Association of Certified Fraud Examiners the best anti-fraud controls are as follows-Employee hotlines & employee support programs

59% reduction

Surprise internal audits

52% reduction

Fraud education

50% reduction

Job rotation/mandatory vacation

47% reduction

Codes of conduct

47% reduction

Most fraud is uncovered by whistle blowers or by accident. The number one method for catching fraud is getting tips from employees.

Set up an anonymous reporting system so employees can voice their concerns and suspicions. Be careful with electronic employee fraud reporting systems. If employees do not trust that it is truly anonymous, they will not use it. They may be worried about retribution or making a mistake regarding their observations or allegations. To be effective, it should be absolutely guaranteed anonymous! If you can’t prove anonymity to the employees with an electronic system, go low tech. Consider a paper-based or phone system. Your employees must be confident the system is truly anonymous so they are secure and not afraid to report their suspicions. All allegations and suspicions must be investigated and followed up promptly for the system to be effective.

Set a tone at the top that any allegations regarding impropriety will be investigated, have a zero tolerance policy regarding employee fraud, establish an ethics policy, and have appropriate document retention policies so people can’t perpetrate fraud and destroy the evidence.

Consider annual employee meetings to discuss these policies and consider having all employees acknowledge that they have read the policies and understand the policies are a condition of employment.

Employee theft should result in immediate termination and prosecution.

Be careful who you hire and do business with! Employee background checks are important but you should also consider doing some investigative work on new and existing customers, suppliers, and other business partners.

Insist that asset recordkeeping and asset custody be performed by two or more separate people.

Study your business processes and try to think how the processes might be subverted by a dishonest employee and then try to design a simple control to prevent it. Most employees will be deterred if they think they will be caught.

Know that a financial statement audit is not designed to detect fraud. Some firms will perform a “fraud audit” separately but it is generally very expensive and there are no guarantees. You are generally much better off spending time and money on your internal control system. It’s always better to prevent the fraud than to detect it after the money is gone.

Don’t be penny-wise and pound foolish. Bring in a professional to help you design appropriate controls to help protect your company. It’s much easier to prevent fraud than to detect it; most fraud is discovered by accident. Taking sensible actions to protect your company may help you avoid being a statistic.

Top 10 Ways Employees Steal From Their Employers

Who Steals and Why do They Do It?

So who are these thieving employees? The sad fact is they can literally be anyone.

They may be at any level of the organization- from CEO’s and CFO’s to administrative assistants to clerical employees, to shop floor workers. To say it cannot happen at my company because I know everyone and we’re one big happy family is extremely naïve.

There are literally thousands of cases where the perpetrator was a long-term trusted employee that everyone thought was absolutely beyond reproach. Among financial fraud prevention professionals, there’s an old rule referred to as the 80-10-10 rule. This rule says that 10% of employees would never steal under any circumstance. Another 10% would steal at any opportunity they see. The remaining 80% can go either way, depending on opportunity, reward, the risk of being caught, and the probable penalty.

Although it’s literally impossible to profile an employee likely to steal, there is some data from studies that may help you better understand how a thief thinks. There have been several studies that have identified three factors in every employee fraud- motivation or need, opportunity, and rationalization.

Need may be related to an employee living beyond their means, vices such as alcohol, drugs, or gambling, and/or an unexpected crisis. The need is not always financial, some thieves do it for the challenge and the thrill.

Opportunity refers to a lack of controls which provide dishonest employees a chance to steal.

Rationalization means that most dishonest employees must be able to rationalize the act in their mind. They may tell themselves they are only borrowing the money, not stealing it. Many others may say they deserve it because they are under-appreciated at work, or otherwise somehow “deserve it.”

So, if this is true how can you use this knowledge to help deter employee fraud at your company?

Related to need or motivation, I don’t think you can do much. You might screen employees for drugs and alcohol issues and perhaps run a credit check on them.

Opportunity or lack of internal controls is where you should spend most of your effort.

There is a perception many times among employee thieves that the reward is better than the probability that they will get caught. Even if they get caught, many employers keep it quiet and simply fire the employee without prosecuting. I believe this is a mistake. It will quickly become known at the company why the employee was fired. If they see no prosecution, that doesn’t help much with deterrence. An unscrupulous employee will generally evaluate the circumstances before they act. If the perceived reward is greater than the probability of getting caught and the penalty if caught is perceived worth the risk, there are many people that will take advantage of you.

Spend some time on internal control and consider fraud prevention matters. It may be some of the best time you’ll ever spend.

There are three things in the world that deserve no mercy- hypocrisy, fraud, and tyranny.

Frederick William Robertson

You may also like...

  • Productivity: 24 Hacks To Improve Business Performance and Profits
    Productivity: 24 Hacks To Improve Business Performance and Profits Business by Geoff Greenwood FCCA MBA MSc
    Productivity: 24 Hacks To Improve Business Performance and Profits
    Productivity: 24 Hacks To Improve Business Performance and Profits

    Reads:
    780

    Pages:
    82

    Published:
    Jul 2017

    Fascinating book providing links between performance science & business profits. A new look at acquiring or sustaining competitive advantage for business of a...

    Formats: PDF, Epub, Kindle

  • The 100 Most Popular Financial Terms Explained
    The 100 Most Popular Financial Terms Explained Business by Thomas M. Herold
    The 100 Most Popular Financial Terms Explained
    The 100 Most Popular Financial Terms Explained

    Reads:
    897

    Pages:
    200

    Published:
    Jul 2017

    Understand Financial Terms - Make Better Financial Decisions. This practical financial dictionary helps you understand and comprehend more than 100 common fin...

    Formats: PDF, Epub, Kindle

  • My Startup Lessons
    My Startup Lessons Business by Viktor Cheng
    My Startup Lessons
    My Startup Lessons

    Reads:
    857

    Pages:
    72

    Published:
    Jun 2017

    In this book, I will share a lot of my personal experiences, rather than solely base it on theory, to help get my points across. Remember, my goal is not to i...

    Formats: PDF, Epub, Kindle, TXT

  • Business Loans Uncovered
    Business Loans Uncovered Business by Enhanced Business Solutions
    Business Loans Uncovered
    Business Loans Uncovered

    Reads:
    242

    Pages:
    50

    Published:
    Jun 2017

    Knowing if you qualify is one of the most important things to know when applying for a loan of any type. Blindly applying for a loan and being declined incre...

    Formats: PDF, Epub, Kindle