2013 03 18 webinar 2013 combating revenue leakage

decision/analysis partners
decision/analysis partnersdecision/analysis partners
Prepared by
With the Assistance of
Chris Paterson
JP Ducasse
Combating Revenue Leakage
Webinar Outline
Leakage – definition and overview
Overview of a general framework to combat leakage
Measuring leakage
Establishing mitigation policies
Combating leakage
What you should consider
2
Combating revenue leakage
Definition*
Combating revenue leakage consists of
engaging in activities that help a Post:
Collect all the postage revenue owed to it, and
Curb the sources/reasons of leakage.
Leakage stems from one of four main risks
Counterfeit (e.g., illegal issues, fake imprints)
Bypass mail (e.g., mail inducted without any form
of payment)
Shortpaid or underpaid (e.g., mail tendered with
insufficient postage)
Problems related to billing or postage collection
(e.g., bad cheques; accounting errors)
Combating revenue leakage consists of setting
policies to mitigate the sources of risks
3
* Source: UPU Consultative Committee – Postal Revenue Protection Working Group
Steps in the right direction
4
But room for improvement
Recent trends
• Global awareness of leakage
issues has increased (75% of posts
admit they experience leakage)
• Posts have heavily invested in
revenue protection technology,
making some channels more
secure (meters, stamps)
• Verification technologies (e.g.,
OCR-based) becoming more
effective and/or more affordable
and scalable
• Not all posts have established a well-
structured revenue protection function
• Fraudsters too leverage technologies...
• New products may not be ‘leakage-free’
• ROI of technology solutions is still an
issue, e.g., for smaller posts
• Mail acceptance and verification is still
very much manual and time consuming,
and often plagued with inconsistencies in
performance.
A broader choice of technologies is
now available to fight leakage
5
Evidencing
• Deployment of digital meters in smaller emerging markets
• Anti-fraud security measures (special inks, holograms…) for stamps
Acceptance/verification
• E-documentation
• Sorters/counting machines for piece count (for sampling, verification
or terminal dues purposes)
• Modular dimensions/weight/data capture solutions for use in post
offices
Processing
• Lower-end sorters suitable for mid-tier posts
• Large CFC with on the fly weighing of parcels or letters
• Capability to trace back an item to a specific sender
Billing/reconciling software solutions
(e.g., USPS Permit RP project)
A few
examples
Two main challenges
Measuring and identification is difficult
A touchy issue : leakages relate to posts’ weaknesses - a mix of fraud
and (operational or accounting) issues;
Amounts recovered are just the tip of the iceberg;
Posts use multiple channels and processes;
Data sources are diverse (spot checks, sampling, data from operations
and from accounting systems) and don’t necessarily match.
There is no off the shelf mitigation
Optimal responses will depend on :
Products’ terms and conditions (e.g., preparation requirements);
Product and channel mix (stamps, permit mail, metered mail, web
based payments), letters vs. parcels…
Post’s use of technology (sorting, barcoding, accounting systems) vs.
use of manual processes.
6
Global posts’ top concerns :
identification and controls, HR
issues, streamlining operations
7
Top 5 concerns
expressed by
Posts worldwide
Typical leakage issues
Problems
Accuracy of discounts claimed vs. postage
paid (non-compliance with preparation
requirements)
Actual number of bulk mail items entered vs.
number on mailing statement
Underpaid (shortpaid) mail
Bulk mail deposited at “wrong” places (e.g.,
collection boxes) – “bypass mail”
Malicious duplication of e-parcels / PC
postage/meter imprints (fraud)
Errors/discrepancies in
reconciliation/invoicing/payment process
Multiple root causes
Overly complex (or poorly understood)
product terms and conditions
Fraud (on the part of mailers or postal staff)
Acceptance, verification and billing
processes poorly documented OR not
followed by postal staff
Poorly designed or executed sampling plans
Lack of integration of the Post’s information
systems (data from operations, accounting)
– islands of automation in oceans of paper
forms
8
Combating revenue leakage
A framework
9
Measure &
Identify
Leakage
Establish
Mitigation
Policies
Combat
Leakage
Measuring and identifying leakage
Methodological approach
10
Measure &
Identify
Leakage
• Identify critical
dimensions of the
mail flow to
ensure adequate
representation
• Develop a
targeted working
plan
• Which
measurements?
When? How? By
whom?
• Conduct pilot
studies to:
a. Generate optimal
sample sizes
(Understand
variability);
b. Assess the
constraints for
sampling
• Physical sampling is
administered
• Engage in real time
revenue leakage
estimation
• Update skips
quarterly to retain
optimum currency
and integrity
• Leakage
estimation is
not revenue
recovery
• Effective
estimation
precedes
and
facilitates
recovery.
• Random
monitoring of
physical
sampling.
• Validating data
integrities
ensures
sampling occurs
as intended.
Audit
Existing
Systems
Identify
Critical
Dimensions
Develop a
Sampling
Regime
Sampling
and
Estimation
Monitoring
&
Validation
Audit Existing Systems
Existing revenue recovery mechanisms tend to exhibit a bias to higher
risk customers which is at odds with a simple random sampling approach
across the entire mail flow.
Assess the appropriateness for leakage measurement of the existing
revenue checking system, if it does exist.
Systems configured for revenue recovery only may not be suitable for
measurement.
Effective leakage measurement depends on identifying the critical
dimensions of the mail flow.
11
Measure &
Identify
Leakage
Audit
Existing
Systems
Identify the critical dimensions
How then do we identify the critical
dimensions of the mail flow?
A stratification process delineates the
levels where leakages emanate from.
There is a need for adequate
sampling across each of these
dimensions.
This then provides postal
organizations with an estimate of
revenue leakage at each dimension.
In understanding revenue leakage at
these sub-levels then combative
policies may be devised to target
problematic areas.
12
Measure &
Identify
Leakage
Defining Objectives
Physical Sampling and
estimation process.
Estimate Revenue Leakage Risk
Letters Parcels
Conceptualisation will differ
slightly in content to Letters.
M
A
I
L
T
Y
P
E
Facilities by
Geographical
Location
M1Bulk
Facility
Sort Center
Delivery Unit
Segmented Sampling
Frame
Adopted to ensure each
critical component in the
composition of mail is
captured.
M2
Mn
Level 1 Stratification
ensures each
lodgement facility is
captured across each
wide geographical unit.
Level 2 Stratification:
Ensure each product segment
relevant to a specific facility is
captured.
Time Dependant Elements
Cross representation of time of the day, days in the week,
months and quarters of the year.
Time Dependant Elements
Identify
Critical
Dimensions
Develop a sampling regime
Determine optimal sample sizes on a rolling basis using
The underlying sample data
Advanced distribution-free statistical methodologies
Seek to estimate leakage at 95% confidence and within +/-5% precision
Design a sampling system that is capable of dealing with the practical
impediments of data collection, that may alter the degree of data integrity
Tight processing windows
Resourcing constraints
Sample space issues.
13
Develop a
Sampling
RegimeMeasure &
Identify
Leakage
Implement an estimation framework
Collect, record, and transmit sample
information to generate final estimates at a
variety of levels
Integrated algorithms can generate final
estimates at a variety of levels
Take action via policy responses to
mitigate revenue leakage in a targeted
manner
The rolling nature of the estimation
facilitates the benchmarking of policy
effectiveness
14
Implement
Estimation
FrameworkMeasure &
Identify
Leakage
Sample
Compute
Estimates
Define
Policies
Processing Center
Letters Flats Parcels
Stamped
%
Leakage
%
Leakage
%
Leakage
Metered
%
Leakage
%
Leakage
%
Leakage
Permit
%
Leakage
%
Leakage
%
Leakage
Combating revenue leakage
A framework
15
Measure &
Identify
Leakage
Establish
Mitigation
Policies
Combat
Leakage
Effective revenue protection policies
have impacts across the board
Customer relations
Impact on mailers’ mail production processes, training requirements, compliance costs
(new investment)
Changes to terms and conditions impact product convenience and demand
Business processes
Impact on quality of service and personnel costs (overtime)
Major initiatives such as “seamless acceptance” impact work positions (e.g., for
verification clerks)
Impact on information systems (turning new data into revenue recoveries…)
Technology solutions
A different response for each channel (e.g., retail vs bulk mail)
Measuring the ROI of proposed technology solution vs. improving/fine-tuning current
processes
People and training
Rev Pro awareness + training on current and new processes
Setting KPI and monitoring compliance with processes
Foster cooperation between R&D, marketing, operations, and finance
16
Establish
Mitigation
Policies
Combating revenue leakage
A framework
17
Measure &
Identify
Leakage
Establish
Mitigation
Policies
Combat
Leakage
Discussing “acceptable” tolerance
levels – Royal Mail
Background
Royal Mail “reversions” have increased dramatically as part of its program to improve
operational efficiencies.
Mailers called for more “transparency” and “proportionality” (of fines) while RM insisted 100%
compliance was needed for both revenue protection and operational purposes.
In 2012 industry outcry prompted RM to launch industry-wide discussions .
There is no “perfect mailing”
What evidence should be provided by the Post’s revenue protection teams to mailers ?
Which mail attributes should rev pro teams focus on ?
RM has temporarily lifted specific non-compliance penalties (on sealing specs).
Policy Implications
Review terms and conditions and make them more explicit to increase transparency ?
Reposition/strengthen revenue protection units on customers’ premises ?
18
Combat
Leakage
Detecting unpaid/underpaid mail: PostNL
19
Moving from manual to
automated detection of
underpaid mail (19 CFC being
installed)
Automated recovery process for
single piece mail : payment
card, online payment by
recipient
Policy implications
Need to balance identification
costs with recovery costs.
Combat
Leakage
Balancing technology and better controls :
SAPO (South African Post)
Bulk mail is #1 priority, other
streams will follow
20
First mile automation: electronic
manifesting (‘eBDN’)
Optimized sampling plans and
processes
Well-trained regional revenue
protection teams
2 to 3 m USD recovered every
year
Policy implications:
developing revenue protection
capability as a step-by-step
journey
Combat
Leakage
Posts in Least Developed Countries still
need to lay the ground work
21
Combat
Leakage
Carrying out revenue protection audits
To identify/confirm main issues
To assess robustness of current controls
Prepare and execute revenue protection plans
Documenting current product terms and conditions, product
specifications, and ensuring they are met;
Documenting processes and standards (including sampling)
communicating on them, monitoring compliance;
Training staff along the revenue protection along the value chain/creating teams;
Putting in place management processes/measurement and reporting systems to ensure
that revenue protection is managed appropriately and leakage detected;
Longer-term, considering the RoI of low-cost technology / rev pro devices – from
cardboard letter scales to lower-end sorters to digital meters at counters.
Policy implications
In LDCs streamlining current processes is a priority,
not technology
Traditional bulk mail acceptance
Paper or electronic (e-Doc)
documentation submitted with mailing
Acceptance clerk samples mailing, and
verifies documentation for accuracy
Acceptance of statement = proof of
mailing and payment
Mailing is inducted after acceptance
Seamless acceptance
On the fly verification from scans during
processing
22
Source : USPS (2012)
Policy Implications
- Building mailers’ confidence in new tracking/reporting system
- Joint post/industry collaboration is essential (e.g., MTAC in the U.S.)
- Automation is just part of the equation, adaptation of information systems is key + HR implications
Revenue protection moving forward :
Eliminating manual verification ?
– U.S.P.S.
Combat
Leakage
2013 03 18 webinar 2013   combating revenue leakage
ERROR:stackunderflow
OFFENDINGCOMMAND:~
STACK:
1 of 24

Recommended

Dap webinar automation for emerging economies by
Dap webinar   automation for emerging economiesDap webinar   automation for emerging economies
Dap webinar automation for emerging economiesdecision/analysis partners
1.6K views33 slides
Webinar 2013 delivery operations by
Webinar 2013   delivery operationsWebinar 2013   delivery operations
Webinar 2013 delivery operationsdecision/analysis partners
1.4K views22 slides
Webinar 2013 delivery sequencing webinar by
Webinar 2013   delivery sequencing webinarWebinar 2013   delivery sequencing webinar
Webinar 2013 delivery sequencing webinardecision/analysis partners LLC
1.1K views29 slides
Carrier owned delivery routes webinar final version by
Carrier owned delivery routes webinar final versionCarrier owned delivery routes webinar final version
Carrier owned delivery routes webinar final versiondecision/analysis partners
1.7K views25 slides
Postal Performance Measurement slideshare by
Postal Performance Measurement slidesharePostal Performance Measurement slideshare
Postal Performance Measurement slidesharedecision/analysis partners LLC
2K views26 slides
Webinar business models for parcels terminals by
Webinar business models for parcels terminalsWebinar business models for parcels terminals
Webinar business models for parcels terminalsdecision/analysis partners
1.7K views20 slides

More Related Content

What's hot

postponement in supplychain by
postponement in supplychainpostponement in supplychain
postponement in supplychainManoj Jhawar
3.6K views10 slides
Supply chain design and operation by
Supply chain design and operationSupply chain design and operation
Supply chain design and operationAngelainBay
2K views45 slides
Design of supply chain networks by
Design of supply chain networksDesign of supply chain networks
Design of supply chain networkssalagrama subrahmanya satya gopal
8.2K views17 slides
Analysis of service supply chains in the telecommunication sector by
Analysis of service supply chains in the telecommunication sectorAnalysis of service supply chains in the telecommunication sector
Analysis of service supply chains in the telecommunication sectorAshish Sethi
9.3K views23 slides
Supply Chain Best Practices by
Supply Chain Best Practices Supply Chain Best Practices
Supply Chain Best Practices carlgiardina
1.3K views10 slides

What's hot(20)

postponement in supplychain by Manoj Jhawar
postponement in supplychainpostponement in supplychain
postponement in supplychain
Manoj Jhawar3.6K views
Supply chain design and operation by AngelainBay
Supply chain design and operationSupply chain design and operation
Supply chain design and operation
AngelainBay2K views
Analysis of service supply chains in the telecommunication sector by Ashish Sethi
Analysis of service supply chains in the telecommunication sectorAnalysis of service supply chains in the telecommunication sector
Analysis of service supply chains in the telecommunication sector
Ashish Sethi9.3K views
Supply Chain Best Practices by carlgiardina
Supply Chain Best Practices Supply Chain Best Practices
Supply Chain Best Practices
carlgiardina1.3K views
Supply Chain Best Practices by Tom Craig
Supply Chain Best PracticesSupply Chain Best Practices
Supply Chain Best Practices
Tom Craig14.3K views
Supply chain management ppt @ doms by Babasab Patil
Supply chain management ppt @ doms Supply chain management ppt @ doms
Supply chain management ppt @ doms
Babasab Patil7K views
Ibcs nov2011 by Meera Das
Ibcs nov2011Ibcs nov2011
Ibcs nov2011
Meera Das 1.8K views
NMIT-SUPPLY-CHAIN-MANAGEMENT-Lesson7 by Jacqueline Quek
NMIT-SUPPLY-CHAIN-MANAGEMENT-Lesson7NMIT-SUPPLY-CHAIN-MANAGEMENT-Lesson7
NMIT-SUPPLY-CHAIN-MANAGEMENT-Lesson7
Jacqueline Quek1.7K views
Introduction to LeanLogistics by gstegmier
Introduction to LeanLogisticsIntroduction to LeanLogistics
Introduction to LeanLogistics
gstegmier1.7K views
supply chain management by Vipul Sharma
supply chain management supply chain management
supply chain management
Vipul Sharma2.7K views
Unit 4 logistics performance lscm (13 pages) by Suzana Vaidya
Unit 4 logistics performance   lscm (13 pages)Unit 4 logistics performance   lscm (13 pages)
Unit 4 logistics performance lscm (13 pages)
Suzana Vaidya2.1K views
Managing demand and capacity and waiting line strategies by Dr. Sneha Sharma
Managing demand and capacity and waiting line strategiesManaging demand and capacity and waiting line strategies
Managing demand and capacity and waiting line strategies
Dr. Sneha Sharma12.2K views
International lean supply chain management by Tom Craig
International lean supply chain managementInternational lean supply chain management
International lean supply chain management
Tom Craig238 views
Introduction to supply chain management by Kwanda Matiwane
Introduction to supply chain managementIntroduction to supply chain management
Introduction to supply chain management
Kwanda Matiwane1K views

Viewers also liked

Webinar 2013 performance measurement slideshare by
Webinar 2013   performance measurement slideshareWebinar 2013   performance measurement slideshare
Webinar 2013 performance measurement slidesharedecision/analysis partners
1.6K views26 slides
Capability plant and work center design by
Capability   plant and work center designCapability   plant and work center design
Capability plant and work center designdecision/analysis partners LLC
1.4K views2 slides
The Adaptable Post by
The Adaptable PostThe Adaptable Post
The Adaptable Postdecision/analysis partners LLC
1.4K views4 slides
The Concept of Postal Platform and Its Applications by
The Concept of Postal Platform and Its ApplicationsThe Concept of Postal Platform and Its Applications
The Concept of Postal Platform and Its Applicationsdecision/analysis partners
1.8K views27 slides
The Adaptable Post by
The Adaptable PostThe Adaptable Post
The Adaptable Postdecision/analysis partners
1.3K views24 slides
Webinar 2013 delivery sequencing vslideshare by
Webinar 2013   delivery sequencing vslideshareWebinar 2013   delivery sequencing vslideshare
Webinar 2013 delivery sequencing vslidesharedecision/analysis partners
1.6K views29 slides

Similar to 2013 03 18 webinar 2013 combating revenue leakage

Combating Revenue Leakage 2013 03 18 webinar 2013 by
 Combating Revenue Leakage 2013 03 18 webinar 2013    Combating Revenue Leakage 2013 03 18 webinar 2013
Combating Revenue Leakage 2013 03 18 webinar 2013 decision/analysis partners LLC
4K views24 slides
Risk Management -- Business Continuity Planning and Management.pptx by
Risk Management -- Business Continuity Planning and Management.pptxRisk Management -- Business Continuity Planning and Management.pptx
Risk Management -- Business Continuity Planning and Management.pptxCody Shive
18 views45 slides
Risk Management Training by
Risk Management TrainingRisk Management Training
Risk Management TrainingQuality Improvement Consulting
10.4K views27 slides
Implementing Anti-Money Laundering and Know Your Customer Managed Services So... by
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...accenture
6K views22 slides
Six Sigma by
Six SigmaSix Sigma
Six SigmaRavinder Tulsiani
776 views38 slides
Moving Towards an industry utility for Compliance - Guy Sheppard by
Moving Towards an industry utility for Compliance - Guy SheppardMoving Towards an industry utility for Compliance - Guy Sheppard
Moving Towards an industry utility for Compliance - Guy SheppardSWIFT
313 views13 slides

Similar to 2013 03 18 webinar 2013 combating revenue leakage(20)

Risk Management -- Business Continuity Planning and Management.pptx by Cody Shive
Risk Management -- Business Continuity Planning and Management.pptxRisk Management -- Business Continuity Planning and Management.pptx
Risk Management -- Business Continuity Planning and Management.pptx
Cody Shive18 views
Implementing Anti-Money Laundering and Know Your Customer Managed Services So... by accenture
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
Implementing Anti-Money Laundering and Know Your Customer Managed Services So...
accenture6K views
Moving Towards an industry utility for Compliance - Guy Sheppard by SWIFT
Moving Towards an industry utility for Compliance - Guy SheppardMoving Towards an industry utility for Compliance - Guy Sheppard
Moving Towards an industry utility for Compliance - Guy Sheppard
SWIFT313 views
Complaints Management Part 2 by Dr. Ted Marra
Complaints Management Part 2Complaints Management Part 2
Complaints Management Part 2
Dr. Ted Marra298 views
Value Stream Mapping in Anatomic Pathology by guest389e15
Value Stream Mapping in Anatomic PathologyValue Stream Mapping in Anatomic Pathology
Value Stream Mapping in Anatomic Pathology
guest389e157.9K views
Froehling Value Stream Mapping G2 2008 Final Version by hfroehling1
Froehling Value Stream Mapping G2 2008 Final VersionFroehling Value Stream Mapping G2 2008 Final Version
Froehling Value Stream Mapping G2 2008 Final Version
hfroehling11.5K views
Health & Status Monitoring (2010-v8) by Robert Grossman
Health & Status Monitoring (2010-v8)Health & Status Monitoring (2010-v8)
Health & Status Monitoring (2010-v8)
Robert Grossman619 views
Six Sigma for Beginners- Yellow and Green Belt by Rajiv Tiwari
Six Sigma for Beginners- Yellow and Green BeltSix Sigma for Beginners- Yellow and Green Belt
Six Sigma for Beginners- Yellow and Green Belt
Rajiv Tiwari4.9K views
Process Mining and AI for Continuous Process Improvement by Marlon Dumas
Process Mining and AI for Continuous Process ImprovementProcess Mining and AI for Continuous Process Improvement
Process Mining and AI for Continuous Process Improvement
Marlon Dumas207 views
Taxologist 4 steps to evaluating tax technology by Paul Authachinda
Taxologist 4 steps to evaluating tax technologyTaxologist 4 steps to evaluating tax technology
Taxologist 4 steps to evaluating tax technology
Paul Authachinda228 views
Exploring Relationship Between Risk & Compliance by ComplianceTrack
Exploring Relationship Between Risk & ComplianceExploring Relationship Between Risk & Compliance
Exploring Relationship Between Risk & Compliance
ComplianceTrack3.7K views
Operational Risk : Take a look at the raw canvas by Treat Risk
Operational Risk : Take a look at the raw canvasOperational Risk : Take a look at the raw canvas
Operational Risk : Take a look at the raw canvas
Treat Risk1.1K views
Effective Cost Measurement through DMAIC. by Kaustav Lahiri
Effective Cost Measurement through DMAIC.Effective Cost Measurement through DMAIC.
Effective Cost Measurement through DMAIC.
Kaustav Lahiri921 views

Recently uploaded

Engaging Senior Leaders to Accelerate Your Continuous Improvement Program by
Engaging Senior Leaders to Accelerate Your Continuous Improvement ProgramEngaging Senior Leaders to Accelerate Your Continuous Improvement Program
Engaging Senior Leaders to Accelerate Your Continuous Improvement ProgramKaiNexus
61 views29 slides
Why are KPIs(key performance indicators) important? by
Why are KPIs(key performance indicators) important? Why are KPIs(key performance indicators) important?
Why are KPIs(key performance indicators) important? Epixel MLM Software
22 views17 slides
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re... by
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...Ilia Bider
15 views17 slides
Digital Strategic Business Planning Methodology by
Digital Strategic Business Planning MethodologyDigital Strategic Business Planning Methodology
Digital Strategic Business Planning MethodologyOperational Excellence Consulting (Singapore)
11 views23 slides
R. S GROUP.pptx by
R. S GROUP.pptxR. S GROUP.pptx
R. S GROUP.pptxitzrajeshsuthar
10 views14 slides
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptx by
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptxGross_TownHall_Summit Conf 2023 BRC Intro slides.pptx
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptxbradgallagher6
41 views5 slides

Recently uploaded(20)

Engaging Senior Leaders to Accelerate Your Continuous Improvement Program by KaiNexus
Engaging Senior Leaders to Accelerate Your Continuous Improvement ProgramEngaging Senior Leaders to Accelerate Your Continuous Improvement Program
Engaging Senior Leaders to Accelerate Your Continuous Improvement Program
KaiNexus61 views
Why are KPIs(key performance indicators) important? by Epixel MLM Software
Why are KPIs(key performance indicators) important? Why are KPIs(key performance indicators) important?
Why are KPIs(key performance indicators) important?
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re... by Ilia Bider
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
On the Concept of Discovery Power of Enterprise Modeling Languages and its Re...
Ilia Bider15 views
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptx by bradgallagher6
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptxGross_TownHall_Summit Conf 2023 BRC Intro slides.pptx
Gross_TownHall_Summit Conf 2023 BRC Intro slides.pptx
bradgallagher641 views
Nevigating Sucess.pdf by TEWMAGAZINE
Nevigating Sucess.pdfNevigating Sucess.pdf
Nevigating Sucess.pdf
TEWMAGAZINE27 views
The Truth About Customer Journey Mapping by Aggregage
The Truth About Customer Journey MappingThe Truth About Customer Journey Mapping
The Truth About Customer Journey Mapping
Aggregage133 views
Monthly Social Media Update November 2023 copy.pptx by Andy Lambert
Monthly Social Media Update November 2023 copy.pptxMonthly Social Media Update November 2023 copy.pptx
Monthly Social Media Update November 2023 copy.pptx
Andy Lambert34 views
December 2023 - Meat on the Bones by NZSG
December 2023 - Meat on the BonesDecember 2023 - Meat on the Bones
December 2023 - Meat on the Bones
NZSG29 views
Integrating Talent Management Practices by Seta Wicaksana
Integrating Talent Management PracticesIntegrating Talent Management Practices
Integrating Talent Management Practices
Seta Wicaksana157 views
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen... by morshedislam3
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...
morshedislam320 views
Imports Next Level.pdf by Bloomerang
Imports Next Level.pdfImports Next Level.pdf
Imports Next Level.pdf
Bloomerang161 views
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf by Bloomerang
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdfBloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang186 views
Presentation on proposed acquisition of leading European asset manager Aermon... by KeppelCorporation
Presentation on proposed acquisition of leading European asset manager Aermon...Presentation on proposed acquisition of leading European asset manager Aermon...
Presentation on proposed acquisition of leading European asset manager Aermon...
KeppelCorporation315 views

2013 03 18 webinar 2013 combating revenue leakage

  • 1. Prepared by With the Assistance of Chris Paterson JP Ducasse Combating Revenue Leakage
  • 2. Webinar Outline Leakage – definition and overview Overview of a general framework to combat leakage Measuring leakage Establishing mitigation policies Combating leakage What you should consider 2
  • 3. Combating revenue leakage Definition* Combating revenue leakage consists of engaging in activities that help a Post: Collect all the postage revenue owed to it, and Curb the sources/reasons of leakage. Leakage stems from one of four main risks Counterfeit (e.g., illegal issues, fake imprints) Bypass mail (e.g., mail inducted without any form of payment) Shortpaid or underpaid (e.g., mail tendered with insufficient postage) Problems related to billing or postage collection (e.g., bad cheques; accounting errors) Combating revenue leakage consists of setting policies to mitigate the sources of risks 3 * Source: UPU Consultative Committee – Postal Revenue Protection Working Group
  • 4. Steps in the right direction 4 But room for improvement Recent trends • Global awareness of leakage issues has increased (75% of posts admit they experience leakage) • Posts have heavily invested in revenue protection technology, making some channels more secure (meters, stamps) • Verification technologies (e.g., OCR-based) becoming more effective and/or more affordable and scalable • Not all posts have established a well- structured revenue protection function • Fraudsters too leverage technologies... • New products may not be ‘leakage-free’ • ROI of technology solutions is still an issue, e.g., for smaller posts • Mail acceptance and verification is still very much manual and time consuming, and often plagued with inconsistencies in performance.
  • 5. A broader choice of technologies is now available to fight leakage 5 Evidencing • Deployment of digital meters in smaller emerging markets • Anti-fraud security measures (special inks, holograms…) for stamps Acceptance/verification • E-documentation • Sorters/counting machines for piece count (for sampling, verification or terminal dues purposes) • Modular dimensions/weight/data capture solutions for use in post offices Processing • Lower-end sorters suitable for mid-tier posts • Large CFC with on the fly weighing of parcels or letters • Capability to trace back an item to a specific sender Billing/reconciling software solutions (e.g., USPS Permit RP project) A few examples
  • 6. Two main challenges Measuring and identification is difficult A touchy issue : leakages relate to posts’ weaknesses - a mix of fraud and (operational or accounting) issues; Amounts recovered are just the tip of the iceberg; Posts use multiple channels and processes; Data sources are diverse (spot checks, sampling, data from operations and from accounting systems) and don’t necessarily match. There is no off the shelf mitigation Optimal responses will depend on : Products’ terms and conditions (e.g., preparation requirements); Product and channel mix (stamps, permit mail, metered mail, web based payments), letters vs. parcels… Post’s use of technology (sorting, barcoding, accounting systems) vs. use of manual processes. 6
  • 7. Global posts’ top concerns : identification and controls, HR issues, streamlining operations 7 Top 5 concerns expressed by Posts worldwide
  • 8. Typical leakage issues Problems Accuracy of discounts claimed vs. postage paid (non-compliance with preparation requirements) Actual number of bulk mail items entered vs. number on mailing statement Underpaid (shortpaid) mail Bulk mail deposited at “wrong” places (e.g., collection boxes) – “bypass mail” Malicious duplication of e-parcels / PC postage/meter imprints (fraud) Errors/discrepancies in reconciliation/invoicing/payment process Multiple root causes Overly complex (or poorly understood) product terms and conditions Fraud (on the part of mailers or postal staff) Acceptance, verification and billing processes poorly documented OR not followed by postal staff Poorly designed or executed sampling plans Lack of integration of the Post’s information systems (data from operations, accounting) – islands of automation in oceans of paper forms 8
  • 9. Combating revenue leakage A framework 9 Measure & Identify Leakage Establish Mitigation Policies Combat Leakage
  • 10. Measuring and identifying leakage Methodological approach 10 Measure & Identify Leakage • Identify critical dimensions of the mail flow to ensure adequate representation • Develop a targeted working plan • Which measurements? When? How? By whom? • Conduct pilot studies to: a. Generate optimal sample sizes (Understand variability); b. Assess the constraints for sampling • Physical sampling is administered • Engage in real time revenue leakage estimation • Update skips quarterly to retain optimum currency and integrity • Leakage estimation is not revenue recovery • Effective estimation precedes and facilitates recovery. • Random monitoring of physical sampling. • Validating data integrities ensures sampling occurs as intended. Audit Existing Systems Identify Critical Dimensions Develop a Sampling Regime Sampling and Estimation Monitoring & Validation
  • 11. Audit Existing Systems Existing revenue recovery mechanisms tend to exhibit a bias to higher risk customers which is at odds with a simple random sampling approach across the entire mail flow. Assess the appropriateness for leakage measurement of the existing revenue checking system, if it does exist. Systems configured for revenue recovery only may not be suitable for measurement. Effective leakage measurement depends on identifying the critical dimensions of the mail flow. 11 Measure & Identify Leakage Audit Existing Systems
  • 12. Identify the critical dimensions How then do we identify the critical dimensions of the mail flow? A stratification process delineates the levels where leakages emanate from. There is a need for adequate sampling across each of these dimensions. This then provides postal organizations with an estimate of revenue leakage at each dimension. In understanding revenue leakage at these sub-levels then combative policies may be devised to target problematic areas. 12 Measure & Identify Leakage Defining Objectives Physical Sampling and estimation process. Estimate Revenue Leakage Risk Letters Parcels Conceptualisation will differ slightly in content to Letters. M A I L T Y P E Facilities by Geographical Location M1Bulk Facility Sort Center Delivery Unit Segmented Sampling Frame Adopted to ensure each critical component in the composition of mail is captured. M2 Mn Level 1 Stratification ensures each lodgement facility is captured across each wide geographical unit. Level 2 Stratification: Ensure each product segment relevant to a specific facility is captured. Time Dependant Elements Cross representation of time of the day, days in the week, months and quarters of the year. Time Dependant Elements Identify Critical Dimensions
  • 13. Develop a sampling regime Determine optimal sample sizes on a rolling basis using The underlying sample data Advanced distribution-free statistical methodologies Seek to estimate leakage at 95% confidence and within +/-5% precision Design a sampling system that is capable of dealing with the practical impediments of data collection, that may alter the degree of data integrity Tight processing windows Resourcing constraints Sample space issues. 13 Develop a Sampling RegimeMeasure & Identify Leakage
  • 14. Implement an estimation framework Collect, record, and transmit sample information to generate final estimates at a variety of levels Integrated algorithms can generate final estimates at a variety of levels Take action via policy responses to mitigate revenue leakage in a targeted manner The rolling nature of the estimation facilitates the benchmarking of policy effectiveness 14 Implement Estimation FrameworkMeasure & Identify Leakage Sample Compute Estimates Define Policies Processing Center Letters Flats Parcels Stamped % Leakage % Leakage % Leakage Metered % Leakage % Leakage % Leakage Permit % Leakage % Leakage % Leakage
  • 15. Combating revenue leakage A framework 15 Measure & Identify Leakage Establish Mitigation Policies Combat Leakage
  • 16. Effective revenue protection policies have impacts across the board Customer relations Impact on mailers’ mail production processes, training requirements, compliance costs (new investment) Changes to terms and conditions impact product convenience and demand Business processes Impact on quality of service and personnel costs (overtime) Major initiatives such as “seamless acceptance” impact work positions (e.g., for verification clerks) Impact on information systems (turning new data into revenue recoveries…) Technology solutions A different response for each channel (e.g., retail vs bulk mail) Measuring the ROI of proposed technology solution vs. improving/fine-tuning current processes People and training Rev Pro awareness + training on current and new processes Setting KPI and monitoring compliance with processes Foster cooperation between R&D, marketing, operations, and finance 16 Establish Mitigation Policies
  • 17. Combating revenue leakage A framework 17 Measure & Identify Leakage Establish Mitigation Policies Combat Leakage
  • 18. Discussing “acceptable” tolerance levels – Royal Mail Background Royal Mail “reversions” have increased dramatically as part of its program to improve operational efficiencies. Mailers called for more “transparency” and “proportionality” (of fines) while RM insisted 100% compliance was needed for both revenue protection and operational purposes. In 2012 industry outcry prompted RM to launch industry-wide discussions . There is no “perfect mailing” What evidence should be provided by the Post’s revenue protection teams to mailers ? Which mail attributes should rev pro teams focus on ? RM has temporarily lifted specific non-compliance penalties (on sealing specs). Policy Implications Review terms and conditions and make them more explicit to increase transparency ? Reposition/strengthen revenue protection units on customers’ premises ? 18 Combat Leakage
  • 19. Detecting unpaid/underpaid mail: PostNL 19 Moving from manual to automated detection of underpaid mail (19 CFC being installed) Automated recovery process for single piece mail : payment card, online payment by recipient Policy implications Need to balance identification costs with recovery costs. Combat Leakage
  • 20. Balancing technology and better controls : SAPO (South African Post) Bulk mail is #1 priority, other streams will follow 20 First mile automation: electronic manifesting (‘eBDN’) Optimized sampling plans and processes Well-trained regional revenue protection teams 2 to 3 m USD recovered every year Policy implications: developing revenue protection capability as a step-by-step journey Combat Leakage
  • 21. Posts in Least Developed Countries still need to lay the ground work 21 Combat Leakage Carrying out revenue protection audits To identify/confirm main issues To assess robustness of current controls Prepare and execute revenue protection plans Documenting current product terms and conditions, product specifications, and ensuring they are met; Documenting processes and standards (including sampling) communicating on them, monitoring compliance; Training staff along the revenue protection along the value chain/creating teams; Putting in place management processes/measurement and reporting systems to ensure that revenue protection is managed appropriately and leakage detected; Longer-term, considering the RoI of low-cost technology / rev pro devices – from cardboard letter scales to lower-end sorters to digital meters at counters. Policy implications In LDCs streamlining current processes is a priority, not technology
  • 22. Traditional bulk mail acceptance Paper or electronic (e-Doc) documentation submitted with mailing Acceptance clerk samples mailing, and verifies documentation for accuracy Acceptance of statement = proof of mailing and payment Mailing is inducted after acceptance Seamless acceptance On the fly verification from scans during processing 22 Source : USPS (2012) Policy Implications - Building mailers’ confidence in new tracking/reporting system - Joint post/industry collaboration is essential (e.g., MTAC in the U.S.) - Automation is just part of the equation, adaptation of information systems is key + HR implications Revenue protection moving forward : Eliminating manual verification ? – U.S.P.S. Combat Leakage