SlideShare a Scribd company logo
PROCUREMENT ANTI-CORRUPTION & ANTI-FRAUD TRAINING 
VS 
Prepared and Presented by 
Myron. D. B. Betshanger 
Independent Procurement Consultant 
Vs
Why Importance of Procurement Anti-Corruption & Anti-Fraud ?
Why Importance of Procurement Anti-Corruption & Anti-Fraud ? 
REPORTED INCREASES OF CORRUPTION & FRAUD AMONG S.A. BUSINESSES 
- Asset misappropriation 77% (69% *) 
- Procurement fraud 59% (29%*) 
- Bribery and corruption 52% (27%*) 
- Human resources fraud 42% (15%*) 
- Cybercrime 26% (24%*) 
- Money-laundering 14% (11%*) 
- Tax fraud 11% (6%*) 
- Illegal insider trading 9% (5%*) 
*Indicates Global Averages. 
Data provided by PwC – Global Economic Crime Survey 2014 available at http://www.pwc.com/gx/en/economic-crime-survey/ 
downloads.jhtml
THE OBJECTIVES / OUTCOMES OF THIS TRAINING COURSE / WORKSHOP 
WE WILL DISCUSS AND TREAT – 
 What Procurement Corruption and Fraud Looks Like in The Business Environment. 
 Which Phases of The Procurement Cycle Is Procurement Fraud / Corruption Likely to 
Occur. 
 How to Identify The Risks of Procurement Fraud and Corruption. 
 What are the “RED FLAGS” of Procurement Fraud. 
 What are the “Best Practices” in Procurement Anti-Corruption and Anti-Fraud 
Controls. 
 How to Develop and Implement an Effective Counter Procurement Corruption and 
Fraud Strategy.
Why Does Procurement Corruption/Fraud Occur?
Why Does Procurement Corruption/Fraud Occur? 
 Procurement Systems Overrides or Control Failures. 
 Traditional Fraud / Corruption Controls Do Not Cover Procurement Corruption / Fraud. 
 Lack of Segregation of Duties. 
 Lack of Proper Application of Procure-to-Pay Controls. 
 Inconsistent Application of 3 –Way Match Approach. 
 Delegated Procurement Authority Overridden / Undue Interference In Procurement. 
 Frequent Bypassing of Procurement Process and Procedures by End-Users. 
 Extraordinary Splitting of Orders. 
 Unauthorized Inputs Into Vendor / Supplier Master Data.
Why Does Procurement Corruption/Fraud Occur? 
 Frequent Bypassing of Procurement Process and Procedures by End-Users. 
 Extraordinary Splitting of Orders. 
 Unauthorized Inputs Into Vendor / Supplier Master Data. 
 Adding/Deleting of Supplier Details Without Proper Authorization. 
 Overriding of Financial Controls. 
 Social Engineering.
PHASES IN PROCUREMENT CYCLE WHERE CORRUPTION / FRAUD MAY OCCURE 
PLANNING BIDDING PHASE EVALUATION CONTRACT MGT 
PROCUREMENT PLAN 
ADVERTISEMENT 
BIDDING DOCUMENTS 
SHORT-LISTING (PRE-QUALIFICATION) 
PRE-BID CONFERENCE 
BID SUBMISSIONS 
BID/TENDER OPENING 
EVALUATION 
COMMITTEE 
EVALUATION REPORT 
TENDER (AWARD) 
COMMITTEE 
CONTRACT DRAFTING 
CONTRACT DELIVERY 
/EXECUTION 
CONTRACT CHANGES / 
VARIATIONS
TYPES OF PROCUREMENT CORRUPTION & FRAUD PRACTICES 
• Bid Manipulation 
• Bid Rigging 
• Rigged Specifications 
• Bid Rotation 
• Bid Suppression 
• Bribery 
• Cartels 
• Market Sharing 
• Complementary (Cover) Bidding 
• Price Fixing 
• Product Substitution 
• Purchases for Personal / Resale 
• Split Purchasing 
• Unjustified Sole Sourcing 
• Fictitious Vendors / Suppliers 
• Ghost / Shell Companies
TYPES OF PROCUREMENT CORRUPTION & FRAUD PRACTICES 
• Abuse of contract variations 
• Manipulation of Deliveries 
• False Invoicing 
• Inappropriate Bundling 
• Unnecessary or Inappropriate Line 
Items 
• Restricted Bid Solicitation Circulation 
• Biased Evaluation Criteria 
• Unbalanced Bidding 
• Leakage of Insider / Confidential 
Information 
• Exclusion of Qualifying Bidders 
• Bid Tempering 
• Inappropriate Contractual Terms 
• Acceptance of Late Bids 
• Hidden / Undeclared Interest in 
Bidding Company.
SESSION 1 - Procurement Fraud Typologies
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
1. BRIBERY & CORRUPTION 
- involves an offer, promise or payment, including the request or receipt of pecuniary and non-pecuniary 
advantage – purpose of influencing procurement process OR allow illicit 
overcharging, false invoicing, product substitution, or acceptance of sub-standard 
goods/materials/works/services within contract or during contract execution. 
“RED FLAGS” 
- Procurement staff, Senior Managers, Non-Procurement Functionaries attempting to “Force 
through” as supplier/contractor or purchase order despite objections. 
- Non-procurement staff chasing / “expediting” an order consistently. 
- Supplier(s) seems to be ordering work/services – Procurement staff place ex post facto orders. 
- Existence of too cosy, less than “arms length” relationship between supplier and critical 
decision-makers in procurement process. 
- Supplier control of meetings between Supplier and procurement functionary.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
“RED FLAGS” …. 
- Procurement staff, Senior Line Managers, Non-Procurement Functionaries appears to be living 
beyond means of income. 
- Purchase Orders (POs) to particular Supplier(s) frequently processed outside normal business / 
working hours without justifiable reasons. 
- Supplier(s) in possession of inside and confidential information it/they should not have, e.g. 
budget estimates. 
- Supplier chase Purchase Orders by making consistent inquiries. 
- Excessive gifts and hospitality provided by Supplier(s) to certain procurement personnel 
members. 
- Seeming reluctance on part of certain procurement staff members to take leave. 
- Frequent and deliberate circumvention of procurement process by staff.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
2. MANIPULATION OF SPECIFICATIONS 
* Specifications in Bid Solicitation Documents Drafted By a Particular Supplier. 
* Specifying use of particular “Brand Name” when not required / Items widely available in market. 
* Specifications are too broad or too narrow. 
* Specific components / parts / services can only be maintained by select group of individuals. 
“RED FLAGS” 
- Specifications of winning Bidder / Supplier similar / same as the organization’s requirements. 
- Tender Paperwork appears too perfect. 
- Fewer that expected Bidders respond to Tender Invitation. 
- Higher that usual number of non-responsive tender submission / No Bid Returns from Market.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
3. BID RIGGING 
Examples of Bid Rigging include: 
(a) Bid Suppression 
(b) Cover Bidding 
(c) Bid Rotation 
(d) Collusive Markets 
(e) Price Fixing 
“RED FLAGS” 
- Same company always winning bidder i.r.o. particular tender – even more suspicious when 
certain companies continually submit unsuccessful / non-responsive tenders. 
- Same suppliers submit bids, each company seems to take turns submitting “winning” bid. 
- Fewer then usual / expected number of competitors submit bids.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
“ RED FLAGS” … 
- Company / Companies appear to bidding substantially higher on some tenders than others 
without any apparent cost differences. 
- Unexpected / Unusual Drop in Bid Pricing whenever New of Infrequent Bidder Enters Market. 
- Same sub-contractor are listed on multiple bids. 
- Similar (spelling) mistakes, Financial Formulas, or unusual phrases used in tender documents 
submitted by different and apparently competing bidders. 
- Bids are awarded to unqualified contractors who were unlikely to be successful. 
- Apparently qualified companies decline to submit bids or withdraw bids previously 
submitted without legal or justifiable reasons.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
4. GHOST / SHELL COMPANIES 
- Set up / used to bid for tenders. 
- Concealment of true owners / beneficiaries. 
- Hide/Conceal Conflict of Interest. 
“RED FLAGS” 
- Company name is similar to well-known company/supplier. 
- Company Organogram not provided or incomplete ( lacks material information). 
- Company Website created to support appearance of legitimacy. 
- Company cannot readily provide all legal documentation, certificates, commercial 
documents, etc. 
- Company request payments in foreign currency and/or into offshore banking account into 
apparent tax haven.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
“RED FLAGS” …. 
- Goods / Services / Works either not delivered or provided OR only partially 
delivered/completed. 
- Company only provided Website/ E-mailing/Postal Address and Mobile Contact Numbers. 
- Company situated in residential area. 
- Company has no apparent clientele other than procuring organization. 
- Company has very little to no apparent assets. 
- Company’s financial statements and audit reports appear incomplete. 
- No apparent commercial activities.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
5. UNJUSTIFIED SOLE / SINGLE SOURCING 
- Where contract is awarded to particular supplier source where it could have been awarded to 
any of a number of other contractors /suppliers OR where the particular supplier has been 
awarded multiple single source packages in the past. 
“ RED FLEGS” 
- Product / Service has not been previously sole sourced. 
- No “Sole Source Justification Form” has been completed and authorized. 
- Supplier previously provided goods/works/services, but at a cheaper price. Absence of 
justification for price increases. 
- No documentary evidence to prove goods/works/services has been delivered/carried out. 
- Evidence of gifts or hospitality received from particular supplier at frequent/regular 
intervals.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
6. OVER-CHARGING 
- Often occurs as a result from a lack of proper oversight and Supplier/Contractor Performance 
Management (SPM) and/or Supplier Relationship Management (SRM) and Financial Controls. 
“RED FLAGS” 
- Contractor Management Staff evasive & unable to readily produce records and documents on 
request. 
- Timesheets submitted by contractor are illegible and/or incomplete. 
- Some timesheets are missing. 
- Timesheets contains one signature signing off on multiple staff attendance or controlled by 
single person. 
- Invoices for services are vague, e.g. consultant working for 10 hours off-site on project.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
“RED FLAGS” … 
- Electronic access controls & CCTV to record access to particular site appear to fail or are 
damaged on regular basis. 
- Inability of procuring entity to identify certain workers on submitted timesheets – possible 
“ghost workers” i.e. they don’t exist and have been added so extra charging can take place. 
- Volume of purchases do not appear to have discounts applied where such discounts were 
agreed upon and which have historically been given.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
7. FALSE CLAIMS 
- Are often present as a result of a corrupt agreement between organization insider and a 
supplier in terms of which the supplier is allowed to submit claims for goods/works/services 
either not delivered/completed at all or only partially delivered/completed. 
“RED FLAGS” … 
- Invoice does not match Purchase Order (PO) and the Purchase Requisition (PR). 
- Purchase Order does not correlate with an existing contract or is linked to older 
or inactive contract. 
- Items being charged for not appearing on asset register. 
- Invoices do not appear to follow the format that would normally be expected. 
- Absence of delivery note to evidence that the delivery took place. 
- No evidence to prove work was carried out, i.e. absence of certificates of completion.
PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 
8. AD-HOC / EMERGENCY ORDERS 
* Ad-hoc works are works that are not planned and budgeted for and facilitated as either a 
change order or through contract variations. 
* Emergency works are works that are required on an emergency basis – by very definition not 
works required on a regular basis. 
“RED FLAGS” 
- Last minute changes to specifications. Close link to “Manipulation of Specifications”. 
- Non-contractual “Scope encroachment”. 
- Deliberate creation of “emergency” in order to circumvent normal procurement processes. 
- A sub-standard product may have been substituted to replace a genuine specified product. 
- Product is not “fit-for-purpose”.
SESSION 2 – Procurement Corruption/Fraud Typologies 
The Phases in Typical Procurement Cycle Susceptible to Corruption/Fraud 
To Recap… 
PLANNING BIDDING PHASE EVALUATION CONTRACT MGT 
PROCUREMENT PLAN 
ADVERTISEMENT 
BIDDING DOCUMENTS
Corruption/Fraud Typologies In Procurement Planning 
PLANNING 
PROCUREMENT PLAN 
Scheme: Unnecessary Items 
Items included in specifications of contracts for goods/services/works which is not 
consistent with contract requirements. 
Scheme: Unjustified Sole Sourcing / Direct Purchasing 
* The SOW (Scope of Work) expanded significantly after tender and contract award 
taking contractual value from just below a set threshold to considerably above 
threshold for competitive bidding. 
* Unreasonably low Quality Specifications to allow an otherwise non-qualifying 
favoured bidder to qualify and be awarded the tender and subsequent tender. 
* Multiple sole source / direct contracting to same company where certain contract 
amendments would have benefitted from competition or where the items should 
have been procured separately.
Corruption/Fraud Typologies In Procurement Planning 
Scheme: Contract Splitting 
PROCUREMENT PLAN 
* Is the deliberate attempt to limit or entirely avoid competitive tender processes. By 
splitting contracts into smaller packages the need for a greater degree of review and 
less competitive procurement methods are made possible. 
* Unusual Splitting: Issuing two or more contracts for identical items over short period 
of time for no apparent reasons and which result in the application of less competitive 
procurement method. 
* Multiple Contract Award Just Below Threshold: Awarding an unreasonably large 
number of contracts just below procurement review thresholds by senior managers. 
* Excessive Shopping: Using shopping excessively for the purchase of identical/similar 
items. Two or more related and simultaneous purchases from same supplier in 
amounts just below the legal procurement threshold.
Corruption/Fraud Typologies In Procurement Planning 
PROCUREMENT PLAN 
Scheme: Inappropriate Bundling 
* Opposite of “Contract Splitting” – The tender bundles a wide variety of 
goods/works/services that have no relation with each other into one lot, e.g. building 
materials clustered with copper wires, computer equipment/software and CCTV 
equipment, with a particular provision that incomplete lots are not allowed and would 
be regarded as non-responsive. 
* Typically the contract is awarded to a favoured bidder at a price well above estimates. 
“RED FLAGS” 
- Complaints from one or more potential bidders about the bundling of goods/works/services. 
- Items to be procured within a proposed bundle completely unrelated. 
- Proposed bundling cannot be properly justified on basis of cost savings or reduced integration 
costs or risks.
Corruption/Fraud Typologies In Procurement Planning 
PLANNING 
TENDER ADVERTISEMENT 
Scheme: Restricted Circulation of Tender 
- Not advertising the request for expression of interest as required by company 
procurement policy – limited circulation by posting advertisement in local news media 
in circumstances where advertising in more broadly would have resulted in improve 
competition and better pricing. Purpose to give unfair advantage to favoured local 
supplier. 
Scheme: Short Notice 
- The period between the advertisement and bid submission deadline is very short – 
purpose – to place a favoured Supplier who had been given “insider” information in an 
unfair advantage and to eliminate competitors so that such favoured supplier be the 
only one submitting a responsive bid. 
Scheme: Inadequate Information 
- Provisioning of inadequate information – potential bidders do not know for example 
where to submit bids or from whom to request clarification. 
- Drafting overly vague description of works/goods/services required-potential bidders 
cannot determine their interest.
Corruption/Fraud Typologies In Procurement Planning 
Scheme: Unnecessary / Inappropriate Line Items 
- In order to “pad” the contract, corrupt official may add unnecessary items that can 
be omitted later without reducing contract amount and facilitate the payment of the 
bribe. 
“RED FLAGS” 
* Specific line items in BOQ not required to carry out the work – may have separate 
utility for officials or serve to facilitate the bribe. 
* Items creating conflicts of interest for example – provisions in contract requiring 
the contractor to pay for government officials and supervisor consultants in the 
works contract. 
PLANNING 
BIDDING DOCUMENTS
Corruption/Fraud Typologies In Procurement Planning 
Scheme: Rigged Specifications 
PLANNING 
BIDDING DOCUMENTS 
- In competitive market – specifications drafted that seem to favour a particular company. 
- Unduly vague or broad specifications which allow an non-qualifying bidder to compete or 
to justify fraudulent change order requests after contract has been awarded. 
- Specific favoured company is allowed to draft the specifications. 
“RED FLAGS” 
1. Tailored Specifications: Close similarity between the specifications and the winning bidder’s 
product/service. 
Specifications stipulate use of a brand name without stating 
“or equivalent” contrary to procurement policy. 
2. Poor Specifications: Vague, ambiguous or incomplete specifications 
Specifications are significantly narrower/broader than those used in 
previous similar procurement actions. 
3. Fewer Bids: Only few companies responds to bid solicitation/invitations. 
Relatively few companies submits bids compared to previous similar 
procurement actions.
Corruption/Fraud Typologies In Procurement Planning 
PLANNING 
BIDDING DOCUMENTS 
Scheme: Manipulation of Bid Evaluation Criteria 
- Instituting biased evaluation and qualification criteria another method used to 
steer contracts to favoured bidder. 
Scheme: Unbalanced Bidding 
- Under this scheme a favoured bidder is provided with “inside information” not 
available to other bidders, for example budget estimates or that specific line items 
will not be called for after the contract has been awarded or that a certain low-cost 
solution will be acceptable. The “inside information” will invariably give the 
favoured bidder an unfair advantage over other bidders by allowing it to lower is 
pricing or otherwise tailor its bid to defeat its uninformed competitors. 
Scheme: Leakage of Confidential Information - same as above.
Corruption/Fraud Typologies In Procurement Planning 
PLANNING 
END OF SESSION 2.
SESSION 3 – Procurement Corruption/Fraud Typologies 
The Phases in Typical Procurement Cycle Susceptible to Corruption/Fraud 
PLANNING BIDDING PHASE EVALUATION CONTRACT MGT 
SHORT-LISTING (PRE-QUALIFICATION) 
PRE-BID CONFERENCE 
BID SUBMISSIONS 
BID/TENDER OPENING
Corruption/Fraud Typologies In Procurement Planning 
BIDDING PHASE 
SHORT-LISTING (PRE-QUALIFICATION) 
-The short-listing and pre-qualification process can be used to exclude competitive bidders. 
- Exclusion of otherwise qualified bidders through the pre-qualification process could ensure that 
only preferred /favoured bidder in whose bid a corrupt procurement functionary may have 
hidden interest will submit a bid that fulfils all the requirements. 
-Where pre-qualification is required, prior review by senior management should be mandatory 
for all documentation and proposals related to the pre-qualification process. 
“RED FLAGS” 
* Questionable Evaluation Criteria: - Unusual or unreasonable evaluation criteria. 
- One or more short-listed companies do not have the 
appropriate qualifications for the assignment. 
- Unreasonable pre-qualification requirements. 
- Short-listed firms do not have similar qualifications or 
there is a wide and diverging gap in qualifications. 
- Highly qualifying firms which expressed interests are not 
short-listed.
Corruption/Fraud Typologies In Procurement Planning 
“RED FLAGS” 
BIDDING PHASE 
SHORT-LISTING (PRE-QUALIFICATION) 
* Hidden Interest In Bidding Company: 
- Company only has Postal Box / E-mail Address and Mobile Phone Numbers. 
- Complaints that procurement functionary owns or is otherwise linked to a bidding company. 
- Procurement official linked to contractor/bidder through company registration information / 
family relations or reports in market place. 
- Bidding company is not listed on Internet or business/telephone directories. 
- The Contractor/Bidder’s business address situated in residential and non-business area. 
- The Bidder provides a wide variety of disparate goods and services at high prices.
Corruption/Fraud Typologies In Procurement Planning 
BIDDING PHASE 
SHORT-LISTING (PRE-QUALIFICATION) 
Scheme: Exclusion of Qualified Bidders: 
- Procurement functionary / company officers can facilitate selection of favoured bidder 
by improperly excluding other qualified bidders. This may take place at any time from 
the drafting of the bidding documents to the receipt of bids. 
- Exclusion of qualified bidders often trigger complaints as potential bidders spend time 
and money preparing bids. 
“RED FLAGS” 
* Unreasonable Pre- and Post-Qualification Criteria - e.g. abnormally high annual turnover or 
liquidity reserve requirements, years experience in industry or country. 
* The Bid Evaluation Report (BER) provides no objective or poorly justified reasons for the 
rejection of certain bids – e.g. rejection on basis of trivial or arbitrary reasons. 
* Otherwise qualifying bidders fails to submit bids indicating bidding may have been rigged. 
* Company complaints about refusal/reluctance of procurement official(s) to make bidding 
documents available to potential bidders or to accept the submission of bids.
Corruption/Fraud Typologies In Procurement Planning 
Pre-Bid Conference 
BIDDING PHASE 
PRE-BID CONFERENCE / CLARIFICATIONS MEETING 
- often scheduled during bidding period to clarify any ambiguities/discrepancies in tender 
documents and to give potential bidders information on bidding process. 
- can be used to facilitate unbalanced bidding. 
“RED FLAGS” 
- TIMING: Pre-bid conference scheduled too close to bid submission deadline. 
Pre-bid conference may yield changes to specifications without changes to bid 
submission deadline. 
Pre-bid conference may be used to introduce new specifications not previously 
included in tender solicitation documents and if held too close to 
bid submission deadline may be used to exclude competitors of a 
favoured bidder who had been provided with insider information.
Corruption/Fraud Typologies In Procurement Planning 
“RED FLAGS” … 
BIDDING PHASE 
PRE-BID CONFERENCE / CLARIFICATIONS MEETING 
- Inadequate Information: Questions raised by potential bidders during clarification meetings 
are deliberately not addressed or there is a material delay in 
responses. 
- Answers to bidder questions during clarification provided in biased 
and discriminatory manner in favour of a preferred bidder. 
- Inadequate Transparency: Clarification and modifications to the bidding documents resulting 
from the pre-bid conference are not shared with all the 
prospective bidders.
Corruption/Fraud Typologies In Procurement Planning 
BIDDING PHASE 
BID SUBMISSIONS 
A variety of illicit activities may occur during the Bid Submission Phase. 
“ RED FLAGS” 
* Late Submissions: - Corrupt procurement functionary may accept late bid from favoured 
bidder. 
- Not all bids are brought to bid opening ceremony (i.e. public bid opening). 
- One or more bids lack a time and date stamp. 
* Bid Tampering: - A bid (of favoured bidder) not in a sealed envelope. 
- Received bids not kept in secure location with access limitations. 
* Bid Manipulation: - Bid submission deadline extended after some bids has already been 
received. 
- All bids are voided for “errors”. 
* Bid Exclusions: - Complaints from potential bidders that they were not allowed to submit 
bids. 
- The bid of a favoured bidder not among submitted bids during bid 
opening having been “forgotten” in the safe.
Corruption/Fraud Typologies In Procurement Planning 
“RED FLAGS” 
BIDDING PHASE 
BID/TENDER OPENING 
- A key risk factor in the bid opening phase is the manipulation of bid prices. 
* Submission: - Bids are not opened in public. 
* Tampering: - Original bid form and price schedule or BOQ of all bids not signed by all 
member of the bid opening committee. 
- Pages are missing from one or more bids. 
- Pages with a different type set are included in the bid. 
* Price Manipulation: - Changes to bid prices and bid security are handwritten. 
- The applicable currency is not stated in bidding documents. 
* Undue Influence: - Members of Bid Evaluation Committee (BEC) are present and 
participating in bid opening. 
- Lack of original signatures of company representatives supposedly 
present at the bid opening ceremony.
Corruption/Fraud Typologies In Procurement Planning 
BIDDING PHASE 
END OF SESSION 3.
SESSION 4 – Procurement Corruption/Fraud Typologies 
The Phases in Typical Procurement Cycle Susceptible to Corruption/Fraud 
PLANNING BIDDING PHASE EVALUATION CONTRACT MGT 
EVALUATION 
COMMITTEE 
EVALUATION REPORT 
TENDER (AWARD) 
COMMITTEE
Corruption/Fraud Typologies In Procurement Planning 
BBIIDD EDVAINLUGA TPIOHNA PSHEASE 
EVALUATION COMMITTEE 
- Bid Evaluation Committees evaluate and review the submitted bids and makes recommendation 
in respect of contract awards. 
- Bid Evaluation Committees has wide discretion in excluding bidders and can abuse authority as 
part of a corrupt scheme. 
“RED FLAGS” 
* Manipulation of BEC Selection Process: 
- The BEC members do not have the required technical expertise to properly evaluate 
submitted bids. 
- The utilization of a standing BEC regardless of what is being procured. 
- The BEC is too large or is being dominated by a single individual. 
* Same risks of corruption are applicable to Tender Award Committee.
Corruption/Fraud Typologies In Procurement Planning 
BID EVALUATION PHASE 
BID EVALUATION REPORT 
- A Bid Evaluation Report (BER) is prepared and presented by the BEC on completion of the bid 
evaluation process describing the results and process by which the BEC has evaluated the bids 
received. The BER may contain a number of indicators of Bid Rigging, e.g. questionable 
disqualifications and unusual bid patterns. 
“RED FLAGS” 
* Violation of Procurement Rules: 
- Evaluation criteria used differ from evaluation criteria stated in tender documents. 
- Inconsistencies exist between BER and supporting documents. 
- Improper/arbitrary evaluation sub-criteria or procedures are developed at time of 
evaluation that differ from the issued tender invitation documents. 
- BEC ignores stated evaluation criteria in issued tender documents and develops and 
implement its own method of evaluation. 
- The winning bidder is not on the short-list or not among list of pre-qualified companies.
Corruption/Fraud Typologies In Procurement Planning 
“RED FLAGS” … 
BID EVALUATION PHASE 
* Questionable Disqualifications: 
BID EVALUATION REPORT 
- Lowest priced bidder is declared as non-responsive. 
- High number of bids is declared non-responsive. 
- Recommendations and disqualifications are poorly justified. 
- Bids are rejected because of allegedly missing components, e.g. catalogues/brochures. 
- Changes in the scoring of bids or arbitrary scoring of bids. 
- Pressure by end-users, senior management, project official on BEC to select certain 
bidder. 
* Winning Bidder poorly justified: 
- Technical specifications are copied from the bidding documents or are incomplete. 
- The manufacturer’s authorization is missing, outdated or inadequate. 
- Winning Bid does not match requirements in terms of quality, qualifications, etc. 
- Pages in winning bid are missing, incomplete or unsigned where required.
Corruption/Fraud Typologies In Procurement Planning 
“RED FLAGS” … 
* Unusual Bid Patterns: 
BID EVALUATION PHASE 
BID EVALUATION REPORT 
- Same or similar addresses, telephone and facsimile numbers are shared by bidders. 
- Unusually high bid pricing by losing bidders without legitimate explanation and which 
cannot be attributed to error. 
- Bid prices of competing bidders differ by a set percentage. 
* Suspicious Bidders: 
- Discrepancy between the company address and its telephone number area code.
Corruption/Fraud Typologies In Procurement Planning 
The Phases in Typical Procurement Cycle Susceptible to Corruption/Fraud 
PLANNING BIDDING PHASE EVALUATION CONTRACT MGT 
CONTRACT DRAFTING 
CONTRACT DELIVERY 
/EXECUTION 
CONTRACT CHANGES / 
VARIATIONS
Corruption/Fraud Typologies In Procurement Planning 
CONTRACT MANAGEMENT PHASE 
CONTRACT DRAFTING 
* Regardless of which procurement schedule is used the terms and conditions of a contract cannot, 
without the contracting entity’s prior written approval, materially differ from those on which bids 
were prepared and submitted. 
“RED FLAGS” 
* Delays In Contract Award & Negotiations: 
- Long delays in contact award or finalization of negotiations. 
* Questionable Deviations from Tender Documents and Bid Proposals: 
- Changes to quality, quantity or specifications in contract deviating from those set out in 
bidding documents. 
- Price schedules in contract are not the same as that in the winning bid. 
- Unauthorized and arbitrary changes to contract type. 
- Unauthorized Changes to standard contract clauses. 
- Methodologies and Work Plan not attached to contract.
Corruption/Fraud Typologies In Procurement Planning 
CONTRACT MANAGEMENT PHASE 
CONTRACT DELIVERY /EXECUTION 
* A variety of corrupt /fraudulent activities may occur during the Contract Delivery / Execution. 
“RED FLAGS” 
* Failures: 
- Discrepancies between inspection findings, test results, contract specifications and 
contractor’s claims for payment. 
- Contractor’s work failed critical tests and inspections. 
- Consistent complaints from end-users about poor quality good/service/works from 
contractor. 
- Increased / Accelerated product failures or repair costs or re-works. 
* Inadequate supporting documentation: 
- Absent, inadequate or altered documentation submitted by contractor to support billing. 
- Indications from contractor’s financial and other records that it did not incur the cost 
required to comply with the contract specifications.
Corruption/Fraud Typologies In Procurement Planning 
“RED FLAGS” … 
CONTRACT MANAGEMENT PHASE 
CONTRACT DELIVERY /EXECUTION 
* Delays in Contract Execution: 
- Delayed start of works or the delivery of goods/services beyond specified time frames 
without just cause and subsequent price increases resulting from such delays. 
- Long delays in contract implementation. 
* Poor Reputation of Contractor: 
- Company has exaggerated or falsified its prior experience. 
* Product Substitution: 
- Contract may substitute contractually specified products with inferior and often cheaper 
products. 
* Sub-standard Work: 
- Failure of key controls. 
- Lack of independent oversight / supervision. 
- Bribery of supervisors or inspectors.
Corruption/Fraud Typologies In Procurement Planning 
“RED FLAGS” … 
* False Claims and Invoices: 
CONTRACT MANAGEMENT PHASE 
CONTRACT DELIVERY /EXECUTION 
- False Invoices: - Not receiving any reports for invoiced goods or services. 
- Invoiced goods or services cannot be located in inventory or otherwise 
accounted for. 
- No Purchase Order exists for the invoiced goods or services. 
- Inflated Invoices: - Invoiced prices, amounts item descriptions or terms exceeds BOQ or do 
not match with contract or PO terms, received goods, inventory or usage 
records or supporting documents submitted. 
- Duplicate Invoicing: - Multiple payments in same time period for the same or similar 
amount to the same vendor for the same invoice or PO, for the same 
goods or works. 
- Multiple invoices with the same description of goods/services, same 
amounts, same PO number, by the same vendor.
Corruption/Fraud Typologies In Procurement Planning 
CONTRACT MANAGEMENT PHASE 
CONTRACT CHANGES/AMENDMENTS 
* Contract amendments and change orders usually present legitimate modifications to signed 
contracts. However, they can be abused. A common scheme involves collusion between a favoured 
contractor and procurement functionaries, project officials, senior managers to award a contract 
a favoured contractor at low price, followed by promptly by one or a series of change orders. 
“RED FLAGS” 
- Abuse of Contract Change Orders: - Pattern of change orders just below the thresholds for 
review. 
- Changes in the scope of the contract and required outputs. 
- Changes in technical specifications. 
- Changes in Terms of Reference (TORs). 
- Increases in contract value. 
- Reductions in quantity of items to be delivered without 
commensurate reduction in disbursements to be made. 
- Substitution of materials and equipment
Corruption/Fraud Typologies In Procurement Planning 
END OF SESSION 4.
Thank You 
Myron . D. B. Betshanger 
Corporate Governance & Strategic Management, Ethics, Compliance 
& ERM Specialist, and Anti-Corruption Specialist, Procurement / Supplier Quality Assurer. 
Cell. +27 74 780 3862 / +27 76 228 6088 
E-mail: betshangermyron2@gmail.com 
@betshangermyron 
LinkedIn: http://www.linkedin.com/pub/myron-duncan-burton-betshanger/37/219/1b8

More Related Content

What's hot

contract cases of invitation to treat
contract cases of invitation to treatcontract cases of invitation to treat
contract cases of invitation to treat
suhail qurban
 
Essential elements of a valid contract
Essential elements of a valid contractEssential elements of a valid contract
Essential elements of a valid contract
Sweetp999
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
Gerald Johnson
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
EMAC Consulting Group
 
What is fraud
What is fraudWhat is fraud
What is fraud
fraudwatch
 
Chapter 1: CRM, Database Marketing and Customer Value
Chapter 1: CRM,  Database Marketing   and Customer ValueChapter 1: CRM,  Database Marketing   and Customer Value
Chapter 1: CRM, Database Marketing and Customer Valueitsvineeth209
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
Inderjeet Singh
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Trade secrets and conflicts of interest
Trade secrets and conflicts of interestTrade secrets and conflicts of interest
Trade secrets and conflicts of interest
Hagi Sahib
 
AML and CFT.pptx
AML and CFT.pptxAML and CFT.pptx
AML and CFT.pptx
RpSer
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Chapter 4 supsicious transactions
Chapter 4   supsicious transactionsChapter 4   supsicious transactions
Chapter 4 supsicious transactions
Quan Risk
 
Fraud Risk Awareness
Fraud Risk AwarenessFraud Risk Awareness
Fraud Risk Awareness
Adnan Khuram Hayat
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
homeworkping4
 
solicitation presentation
solicitation presentationsolicitation presentation
solicitation presentationPatrick Ryan
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
Case IQ
 
E-procurement System PPT
E-procurement System PPTE-procurement System PPT
E-procurement System PPTNewGate India
 

What's hot (20)

contract cases of invitation to treat
contract cases of invitation to treatcontract cases of invitation to treat
contract cases of invitation to treat
 
Essential elements of a valid contract
Essential elements of a valid contractEssential elements of a valid contract
Essential elements of a valid contract
 
Fraud Prevention
Fraud PreventionFraud Prevention
Fraud Prevention
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
What is fraud
What is fraudWhat is fraud
What is fraud
 
Chapter 1: CRM, Database Marketing and Customer Value
Chapter 1: CRM,  Database Marketing   and Customer ValueChapter 1: CRM,  Database Marketing   and Customer Value
Chapter 1: CRM, Database Marketing and Customer Value
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Mortgage
MortgageMortgage
Mortgage
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Trade secrets and conflicts of interest
Trade secrets and conflicts of interestTrade secrets and conflicts of interest
Trade secrets and conflicts of interest
 
AML and CFT.pptx
AML and CFT.pptxAML and CFT.pptx
AML and CFT.pptx
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
E Procurement
E ProcurementE Procurement
E Procurement
 
Fraud Risk
Fraud RiskFraud Risk
Fraud Risk
 
Chapter 4 supsicious transactions
Chapter 4   supsicious transactionsChapter 4   supsicious transactions
Chapter 4 supsicious transactions
 
Fraud Risk Awareness
Fraud Risk AwarenessFraud Risk Awareness
Fraud Risk Awareness
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
solicitation presentation
solicitation presentationsolicitation presentation
solicitation presentation
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
E-procurement System PPT
E-procurement System PPTE-procurement System PPT
E-procurement System PPT
 

Viewers also liked

Makalah Masalah Korupsi Di Indonesia
Makalah Masalah Korupsi Di IndonesiaMakalah Masalah Korupsi Di Indonesia
Makalah Masalah Korupsi Di IndonesiaARY SETIADI
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud program
chris75308
 
Jakarta play therapy program info for parents
Jakarta play therapy program  info for parentsJakarta play therapy program  info for parents
Jakarta play therapy program info for parents
Jakarta Play Therapy
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
FraudBusters
 
1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATIONJoseph Callahan
 
Parul kumar hedge funds ppt
Parul kumar hedge funds pptParul kumar hedge funds ppt
Parul kumar hedge funds pptvaibhav Kukreja
 
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicSistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Charles Lim
 
Borobudur 11
Borobudur 11Borobudur 11
Borobudur 11
borobudurconsulting
 
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSIBUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSIReformasi Polri
 
Case Study - financial statement fraud
Case Study - financial statement fraudCase Study - financial statement fraud
Case Study - financial statement fraudVidhan Shah
 
2014-11-04 Fraud Risk Assessment - The Human Element
2014-11-04 Fraud Risk Assessment - The Human Element2014-11-04 Fraud Risk Assessment - The Human Element
2014-11-04 Fraud Risk Assessment - The Human ElementRaffa Learning Community
 
5.2.5 sending fraud templates
5.2.5 sending fraud templates5.2.5 sending fraud templates
5.2.5 sending fraud templatesFrankSobotka
 
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
IGN MANTRA
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawftii
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
IGF Indonesia
 
Anti Fraud
Anti FraudAnti Fraud
Anti Fraud
Denny Prasetya
 
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilienceID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
IGF Indonesia
 
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi MultilateralID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
IGF Indonesia
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of Things
PT Datacomm Diangraha
 

Viewers also liked (20)

Makalah Masalah Korupsi Di Indonesia
Makalah Masalah Korupsi Di IndonesiaMakalah Masalah Korupsi Di Indonesia
Makalah Masalah Korupsi Di Indonesia
 
Anti fraud program
Anti fraud programAnti fraud program
Anti fraud program
 
Jakarta play therapy program info for parents
Jakarta play therapy program  info for parentsJakarta play therapy program  info for parents
Jakarta play therapy program info for parents
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION1 INSURANCE FRAUD TRAINING PRESENTATION
1 INSURANCE FRAUD TRAINING PRESENTATION
 
Parul kumar hedge funds ppt
Parul kumar hedge funds pptParul kumar hedge funds ppt
Parul kumar hedge funds ppt
 
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru publicSistem pemantauan ancaman serangan siber di indonesia generasi baru public
Sistem pemantauan ancaman serangan siber di indonesia generasi baru public
 
Borobudur 11
Borobudur 11Borobudur 11
Borobudur 11
 
Turning an idea into impact
Turning an idea into impactTurning an idea into impact
Turning an idea into impact
 
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSIBUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
BUKU SAKU STRATEGI KOMUNIKASI PENDIDIKAN DAN BUDAYA ANTI KORUPSI
 
Case Study - financial statement fraud
Case Study - financial statement fraudCase Study - financial statement fraud
Case Study - financial statement fraud
 
2014-11-04 Fraud Risk Assessment - The Human Element
2014-11-04 Fraud Risk Assessment - The Human Element2014-11-04 Fraud Risk Assessment - The Human Element
2014-11-04 Fraud Risk Assessment - The Human Element
 
5.2.5 sending fraud templates
5.2.5 sending fraud templates5.2.5 sending fraud templates
5.2.5 sending fraud templates
 
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER“CYBER DEFENCE”   KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
“CYBER DEFENCE” KEAMANAN INFORMASI DAN KEDAULATAN NKRI MELALUI BATALYON CYBER
 
Presentasi ftii intlcyberlaw
Presentasi ftii intlcyberlawPresentasi ftii intlcyberlaw
Presentasi ftii intlcyberlaw
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
Anti Fraud
Anti FraudAnti Fraud
Anti Fraud
 
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilienceID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
ID IGF 2016 - Hukum 2 - HAM dan Cybersecurity + resilience
 
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi MultilateralID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
ID IGF 2016 - Hukum 3 - Cyberspace Perkembangan Diplomasi Multilateral
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of Things
 

Similar to Doc procurement anti fraud and anti-corruption

fraud_red_flags_procurement.pdf
fraud_red_flags_procurement.pdffraud_red_flags_procurement.pdf
fraud_red_flags_procurement.pdf
KhalidAhmadWahedi2
 
Contract Performance Fraud
Contract Performance FraudContract Performance Fraud
Contract Performance FraudRon Steinkamp
 
Why You Pay Too Much
Why You Pay Too MuchWhy You Pay Too Much
Why You Pay Too Much
Throwhammer
 
The Basics of Tendering & Bidding
The Basics of Tendering & BiddingThe Basics of Tendering & Bidding
The Basics of Tendering & Bidding
Moatasem Mabrouk
 
Raffles International Institute_Procurement methods
Raffles International  Institute_Procurement methodsRaffles International  Institute_Procurement methods
Raffles International Institute_Procurement methods
Sandra Draskovic
 
Accounts Payable Fraud: Keys to Detection and Prevention
Accounts Payable Fraud: Keys to Detection and PreventionAccounts Payable Fraud: Keys to Detection and Prevention
Accounts Payable Fraud: Keys to Detection and Prevention
Case IQ
 
Internal Procurement Audit
Internal Procurement AuditInternal Procurement Audit
Internal Procurement Audit
Justice Egege
 
Embedding anti corruption due diligence in procurement
Embedding anti corruption due diligence in procurementEmbedding anti corruption due diligence in procurement
Embedding anti corruption due diligence in procurementMyron Duncan Burton Betshanger
 
Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are Real
Tradeshift
 
Contract Procurement Fraud
Contract Procurement FraudContract Procurement Fraud
Contract Procurement FraudRon Steinkamp
 
Procurement Irregularities Source Excellence 1008 2010 Short
Procurement Irregularities Source Excellence 1008 2010 ShortProcurement Irregularities Source Excellence 1008 2010 Short
Procurement Irregularities Source Excellence 1008 2010 ShortPeter Soetevent
 
oig-webseite-qas-v03.pptx
oig-webseite-qas-v03.pptxoig-webseite-qas-v03.pptx
oig-webseite-qas-v03.pptx
HarshBrahamwanshi
 
Finding Fraud and What To Do With It.ppt
Finding Fraud and What To Do With It.pptFinding Fraud and What To Do With It.ppt
Finding Fraud and What To Do With It.ppt
nuredinabdella2
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
FraudBusters
 
How the M&A process works
How the M&A process worksHow the M&A process works
How the M&A process works
Tom Mckeown
 
#Risks in Procurement# By SN Panigrahi
#Risks in Procurement# By SN Panigrahi#Risks in Procurement# By SN Panigrahi
#Risks in Procurement# By SN Panigrahi
SN Panigrahi, PMP
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
Wilson Kao
 
2011 08-22-control-compliance-in-public-sector-procurement
2011 08-22-control-compliance-in-public-sector-procurement2011 08-22-control-compliance-in-public-sector-procurement
2011 08-22-control-compliance-in-public-sector-procurement
Ee Chuan Yoong
 
Due Diligence requirement for MF Distributors
Due Diligence requirement for MF DistributorsDue Diligence requirement for MF Distributors
Due Diligence requirement for MF Distributors
aditya72
 
Demonstrating Good Ethics in Business Valuation Modeling
Demonstrating Good Ethics in Business Valuation Modeling Demonstrating Good Ethics in Business Valuation Modeling
Demonstrating Good Ethics in Business Valuation Modeling
Ralph Colucci, CFA
 

Similar to Doc procurement anti fraud and anti-corruption (20)

fraud_red_flags_procurement.pdf
fraud_red_flags_procurement.pdffraud_red_flags_procurement.pdf
fraud_red_flags_procurement.pdf
 
Contract Performance Fraud
Contract Performance FraudContract Performance Fraud
Contract Performance Fraud
 
Why You Pay Too Much
Why You Pay Too MuchWhy You Pay Too Much
Why You Pay Too Much
 
The Basics of Tendering & Bidding
The Basics of Tendering & BiddingThe Basics of Tendering & Bidding
The Basics of Tendering & Bidding
 
Raffles International Institute_Procurement methods
Raffles International  Institute_Procurement methodsRaffles International  Institute_Procurement methods
Raffles International Institute_Procurement methods
 
Accounts Payable Fraud: Keys to Detection and Prevention
Accounts Payable Fraud: Keys to Detection and PreventionAccounts Payable Fraud: Keys to Detection and Prevention
Accounts Payable Fraud: Keys to Detection and Prevention
 
Internal Procurement Audit
Internal Procurement AuditInternal Procurement Audit
Internal Procurement Audit
 
Embedding anti corruption due diligence in procurement
Embedding anti corruption due diligence in procurementEmbedding anti corruption due diligence in procurement
Embedding anti corruption due diligence in procurement
 
Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are Real
 
Contract Procurement Fraud
Contract Procurement FraudContract Procurement Fraud
Contract Procurement Fraud
 
Procurement Irregularities Source Excellence 1008 2010 Short
Procurement Irregularities Source Excellence 1008 2010 ShortProcurement Irregularities Source Excellence 1008 2010 Short
Procurement Irregularities Source Excellence 1008 2010 Short
 
oig-webseite-qas-v03.pptx
oig-webseite-qas-v03.pptxoig-webseite-qas-v03.pptx
oig-webseite-qas-v03.pptx
 
Finding Fraud and What To Do With It.ppt
Finding Fraud and What To Do With It.pptFinding Fraud and What To Do With It.ppt
Finding Fraud and What To Do With It.ppt
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
How the M&A process works
How the M&A process worksHow the M&A process works
How the M&A process works
 
#Risks in Procurement# By SN Panigrahi
#Risks in Procurement# By SN Panigrahi#Risks in Procurement# By SN Panigrahi
#Risks in Procurement# By SN Panigrahi
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
2011 08-22-control-compliance-in-public-sector-procurement
2011 08-22-control-compliance-in-public-sector-procurement2011 08-22-control-compliance-in-public-sector-procurement
2011 08-22-control-compliance-in-public-sector-procurement
 
Due Diligence requirement for MF Distributors
Due Diligence requirement for MF DistributorsDue Diligence requirement for MF Distributors
Due Diligence requirement for MF Distributors
 
Demonstrating Good Ethics in Business Valuation Modeling
Demonstrating Good Ethics in Business Valuation Modeling Demonstrating Good Ethics in Business Valuation Modeling
Demonstrating Good Ethics in Business Valuation Modeling
 

More from Myron Duncan Burton Betshanger

Leverage Corporate Consultation - 7-01-2018
Leverage Corporate Consultation - 7-01-2018Leverage Corporate Consultation - 7-01-2018
Leverage Corporate Consultation - 7-01-2018
Myron Duncan Burton Betshanger
 
Leverage Corporate Consultation (Pty) Ltd - Corporate Brochure 2018
Leverage Corporate Consultation (Pty) Ltd - Corporate Brochure 2018  Leverage Corporate Consultation (Pty) Ltd - Corporate Brochure 2018
Leverage Corporate Consultation (Pty) Ltd - Corporate Brochure 2018
Myron Duncan Burton Betshanger
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
Myron Duncan Burton Betshanger
 
The Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCMThe Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCM
Myron Duncan Burton Betshanger
 
KING IV Report On Corporate Governance In South Africa Part I
KING IV Report On Corporate Governance In South Africa Part I KING IV Report On Corporate Governance In South Africa Part I
KING IV Report On Corporate Governance In South Africa Part I
Myron Duncan Burton Betshanger
 
Profile myron d. b. betshanger
Profile myron d. b. betshangerProfile myron d. b. betshanger
Profile myron d. b. betshanger
Myron Duncan Burton Betshanger
 
African mining security summit 2015 anti corruption workshop final draft
African mining security summit 2015 anti corruption workshop final draftAfrican mining security summit 2015 anti corruption workshop final draft
African mining security summit 2015 anti corruption workshop final draft
Myron Duncan Burton Betshanger
 
Westenburg secondary page 1
Westenburg secondary page 1Westenburg secondary page 1
Westenburg secondary page 1
Myron Duncan Burton Betshanger
 
Leverage corporate consultancy Pty Ltd
Leverage corporate consultancy Pty LtdLeverage corporate consultancy Pty Ltd
Leverage corporate consultancy Pty Ltd
Myron Duncan Burton Betshanger
 
Corruption & social dogmas in south africa
Corruption & social dogmas in south africaCorruption & social dogmas in south africa
Corruption & social dogmas in south africa
Myron Duncan Burton Betshanger
 
Leverage Corporate Consultancy Pty Ltd
Leverage Corporate Consultancy Pty Ltd Leverage Corporate Consultancy Pty Ltd
Leverage Corporate Consultancy Pty Ltd
Myron Duncan Burton Betshanger
 
Embedding quality assurance within procurement
Embedding quality assurance within procurementEmbedding quality assurance within procurement
Embedding quality assurance within procurement
Myron Duncan Burton Betshanger
 
Myron Betshanger Resume
Myron Betshanger ResumeMyron Betshanger Resume
Myron Betshanger Resume
Myron Duncan Burton Betshanger
 
Combating Fraud & Corruption In The Mining & Metals Industry -Re-engineering ...
Combating Fraud & Corruption In The Mining & Metals Industry -Re-engineering ...Combating Fraud & Corruption In The Mining & Metals Industry -Re-engineering ...
Combating Fraud & Corruption In The Mining & Metals Industry -Re-engineering ...
Myron Duncan Burton Betshanger
 
Audit risk management and governance summit (3)
Audit risk management and governance summit (3)Audit risk management and governance summit (3)
Audit risk management and governance summit (3)
Myron Duncan Burton Betshanger
 
Corporate Governance, Ethics, Corruption and Access to Capital
Corporate Governance, Ethics, Corruption and Access to CapitalCorporate Governance, Ethics, Corruption and Access to Capital
Corporate Governance, Ethics, Corruption and Access to Capital
Myron Duncan Burton Betshanger
 
Global Risks Through Intergrated Reporting
Global Risks Through Intergrated ReportingGlobal Risks Through Intergrated Reporting
Global Risks Through Intergrated Reporting
Myron Duncan Burton Betshanger
 

More from Myron Duncan Burton Betshanger (19)

Leverage Corporate Consultation - 7-01-2018
Leverage Corporate Consultation - 7-01-2018Leverage Corporate Consultation - 7-01-2018
Leverage Corporate Consultation - 7-01-2018
 
Leverage Corporate Consultation (Pty) Ltd - Corporate Brochure 2018
Leverage Corporate Consultation (Pty) Ltd - Corporate Brochure 2018  Leverage Corporate Consultation (Pty) Ltd - Corporate Brochure 2018
Leverage Corporate Consultation (Pty) Ltd - Corporate Brochure 2018
 
The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013The Protection of Personal Information Act 4 of 2013
The Protection of Personal Information Act 4 of 2013
 
The Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCMThe Popi Act 4 of 2013 - Implications for iSCM
The Popi Act 4 of 2013 - Implications for iSCM
 
KING IV Report On Corporate Governance In South Africa Part I
KING IV Report On Corporate Governance In South Africa Part I KING IV Report On Corporate Governance In South Africa Part I
KING IV Report On Corporate Governance In South Africa Part I
 
Profile myron d. b. betshanger
Profile myron d. b. betshangerProfile myron d. b. betshanger
Profile myron d. b. betshanger
 
African mining security summit 2015 anti corruption workshop final draft
African mining security summit 2015 anti corruption workshop final draftAfrican mining security summit 2015 anti corruption workshop final draft
African mining security summit 2015 anti corruption workshop final draft
 
Westenburg secondary page 1
Westenburg secondary page 1Westenburg secondary page 1
Westenburg secondary page 1
 
Leverage corporate consultancy Pty Ltd
Leverage corporate consultancy Pty LtdLeverage corporate consultancy Pty Ltd
Leverage corporate consultancy Pty Ltd
 
Corruption & social dogmas in south africa
Corruption & social dogmas in south africaCorruption & social dogmas in south africa
Corruption & social dogmas in south africa
 
Leverage Corporate Consultancy Pty Ltd
Leverage Corporate Consultancy Pty Ltd Leverage Corporate Consultancy Pty Ltd
Leverage Corporate Consultancy Pty Ltd
 
Embedding quality assurance within procurement
Embedding quality assurance within procurementEmbedding quality assurance within procurement
Embedding quality assurance within procurement
 
Myron Betshanger Resume
Myron Betshanger ResumeMyron Betshanger Resume
Myron Betshanger Resume
 
Combating Fraud & Corruption In The Mining & Metals Industry -Re-engineering ...
Combating Fraud & Corruption In The Mining & Metals Industry -Re-engineering ...Combating Fraud & Corruption In The Mining & Metals Industry -Re-engineering ...
Combating Fraud & Corruption In The Mining & Metals Industry -Re-engineering ...
 
Audit risk management and governance summit (3)
Audit risk management and governance summit (3)Audit risk management and governance summit (3)
Audit risk management and governance summit (3)
 
Corporate Governance, Ethics, Corruption and Access to Capital
Corporate Governance, Ethics, Corruption and Access to CapitalCorporate Governance, Ethics, Corruption and Access to Capital
Corporate Governance, Ethics, Corruption and Access to Capital
 
Global Risks Through Intergrated Reporting
Global Risks Through Intergrated ReportingGlobal Risks Through Intergrated Reporting
Global Risks Through Intergrated Reporting
 
2013 Procurement Fraud Africa Summit
2013 Procurement Fraud Africa Summit 2013 Procurement Fraud Africa Summit
2013 Procurement Fraud Africa Summit
 
Role of internal audit
Role of internal auditRole of internal audit
Role of internal audit
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Doc procurement anti fraud and anti-corruption

  • 1. PROCUREMENT ANTI-CORRUPTION & ANTI-FRAUD TRAINING VS Prepared and Presented by Myron. D. B. Betshanger Independent Procurement Consultant Vs
  • 2. Why Importance of Procurement Anti-Corruption & Anti-Fraud ?
  • 3. Why Importance of Procurement Anti-Corruption & Anti-Fraud ? REPORTED INCREASES OF CORRUPTION & FRAUD AMONG S.A. BUSINESSES - Asset misappropriation 77% (69% *) - Procurement fraud 59% (29%*) - Bribery and corruption 52% (27%*) - Human resources fraud 42% (15%*) - Cybercrime 26% (24%*) - Money-laundering 14% (11%*) - Tax fraud 11% (6%*) - Illegal insider trading 9% (5%*) *Indicates Global Averages. Data provided by PwC – Global Economic Crime Survey 2014 available at http://www.pwc.com/gx/en/economic-crime-survey/ downloads.jhtml
  • 4. THE OBJECTIVES / OUTCOMES OF THIS TRAINING COURSE / WORKSHOP WE WILL DISCUSS AND TREAT –  What Procurement Corruption and Fraud Looks Like in The Business Environment.  Which Phases of The Procurement Cycle Is Procurement Fraud / Corruption Likely to Occur.  How to Identify The Risks of Procurement Fraud and Corruption.  What are the “RED FLAGS” of Procurement Fraud.  What are the “Best Practices” in Procurement Anti-Corruption and Anti-Fraud Controls.  How to Develop and Implement an Effective Counter Procurement Corruption and Fraud Strategy.
  • 5.
  • 6. Why Does Procurement Corruption/Fraud Occur?
  • 7. Why Does Procurement Corruption/Fraud Occur?  Procurement Systems Overrides or Control Failures.  Traditional Fraud / Corruption Controls Do Not Cover Procurement Corruption / Fraud.  Lack of Segregation of Duties.  Lack of Proper Application of Procure-to-Pay Controls.  Inconsistent Application of 3 –Way Match Approach.  Delegated Procurement Authority Overridden / Undue Interference In Procurement.  Frequent Bypassing of Procurement Process and Procedures by End-Users.  Extraordinary Splitting of Orders.  Unauthorized Inputs Into Vendor / Supplier Master Data.
  • 8. Why Does Procurement Corruption/Fraud Occur?  Frequent Bypassing of Procurement Process and Procedures by End-Users.  Extraordinary Splitting of Orders.  Unauthorized Inputs Into Vendor / Supplier Master Data.  Adding/Deleting of Supplier Details Without Proper Authorization.  Overriding of Financial Controls.  Social Engineering.
  • 9. PHASES IN PROCUREMENT CYCLE WHERE CORRUPTION / FRAUD MAY OCCURE PLANNING BIDDING PHASE EVALUATION CONTRACT MGT PROCUREMENT PLAN ADVERTISEMENT BIDDING DOCUMENTS SHORT-LISTING (PRE-QUALIFICATION) PRE-BID CONFERENCE BID SUBMISSIONS BID/TENDER OPENING EVALUATION COMMITTEE EVALUATION REPORT TENDER (AWARD) COMMITTEE CONTRACT DRAFTING CONTRACT DELIVERY /EXECUTION CONTRACT CHANGES / VARIATIONS
  • 10. TYPES OF PROCUREMENT CORRUPTION & FRAUD PRACTICES • Bid Manipulation • Bid Rigging • Rigged Specifications • Bid Rotation • Bid Suppression • Bribery • Cartels • Market Sharing • Complementary (Cover) Bidding • Price Fixing • Product Substitution • Purchases for Personal / Resale • Split Purchasing • Unjustified Sole Sourcing • Fictitious Vendors / Suppliers • Ghost / Shell Companies
  • 11. TYPES OF PROCUREMENT CORRUPTION & FRAUD PRACTICES • Abuse of contract variations • Manipulation of Deliveries • False Invoicing • Inappropriate Bundling • Unnecessary or Inappropriate Line Items • Restricted Bid Solicitation Circulation • Biased Evaluation Criteria • Unbalanced Bidding • Leakage of Insider / Confidential Information • Exclusion of Qualifying Bidders • Bid Tempering • Inappropriate Contractual Terms • Acceptance of Late Bids • Hidden / Undeclared Interest in Bidding Company.
  • 12. SESSION 1 - Procurement Fraud Typologies
  • 13. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 1. BRIBERY & CORRUPTION - involves an offer, promise or payment, including the request or receipt of pecuniary and non-pecuniary advantage – purpose of influencing procurement process OR allow illicit overcharging, false invoicing, product substitution, or acceptance of sub-standard goods/materials/works/services within contract or during contract execution. “RED FLAGS” - Procurement staff, Senior Managers, Non-Procurement Functionaries attempting to “Force through” as supplier/contractor or purchase order despite objections. - Non-procurement staff chasing / “expediting” an order consistently. - Supplier(s) seems to be ordering work/services – Procurement staff place ex post facto orders. - Existence of too cosy, less than “arms length” relationship between supplier and critical decision-makers in procurement process. - Supplier control of meetings between Supplier and procurement functionary.
  • 14. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES “RED FLAGS” …. - Procurement staff, Senior Line Managers, Non-Procurement Functionaries appears to be living beyond means of income. - Purchase Orders (POs) to particular Supplier(s) frequently processed outside normal business / working hours without justifiable reasons. - Supplier(s) in possession of inside and confidential information it/they should not have, e.g. budget estimates. - Supplier chase Purchase Orders by making consistent inquiries. - Excessive gifts and hospitality provided by Supplier(s) to certain procurement personnel members. - Seeming reluctance on part of certain procurement staff members to take leave. - Frequent and deliberate circumvention of procurement process by staff.
  • 15. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 2. MANIPULATION OF SPECIFICATIONS * Specifications in Bid Solicitation Documents Drafted By a Particular Supplier. * Specifying use of particular “Brand Name” when not required / Items widely available in market. * Specifications are too broad or too narrow. * Specific components / parts / services can only be maintained by select group of individuals. “RED FLAGS” - Specifications of winning Bidder / Supplier similar / same as the organization’s requirements. - Tender Paperwork appears too perfect. - Fewer that expected Bidders respond to Tender Invitation. - Higher that usual number of non-responsive tender submission / No Bid Returns from Market.
  • 16. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 3. BID RIGGING Examples of Bid Rigging include: (a) Bid Suppression (b) Cover Bidding (c) Bid Rotation (d) Collusive Markets (e) Price Fixing “RED FLAGS” - Same company always winning bidder i.r.o. particular tender – even more suspicious when certain companies continually submit unsuccessful / non-responsive tenders. - Same suppliers submit bids, each company seems to take turns submitting “winning” bid. - Fewer then usual / expected number of competitors submit bids.
  • 17. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES “ RED FLAGS” … - Company / Companies appear to bidding substantially higher on some tenders than others without any apparent cost differences. - Unexpected / Unusual Drop in Bid Pricing whenever New of Infrequent Bidder Enters Market. - Same sub-contractor are listed on multiple bids. - Similar (spelling) mistakes, Financial Formulas, or unusual phrases used in tender documents submitted by different and apparently competing bidders. - Bids are awarded to unqualified contractors who were unlikely to be successful. - Apparently qualified companies decline to submit bids or withdraw bids previously submitted without legal or justifiable reasons.
  • 18. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 4. GHOST / SHELL COMPANIES - Set up / used to bid for tenders. - Concealment of true owners / beneficiaries. - Hide/Conceal Conflict of Interest. “RED FLAGS” - Company name is similar to well-known company/supplier. - Company Organogram not provided or incomplete ( lacks material information). - Company Website created to support appearance of legitimacy. - Company cannot readily provide all legal documentation, certificates, commercial documents, etc. - Company request payments in foreign currency and/or into offshore banking account into apparent tax haven.
  • 19. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES “RED FLAGS” …. - Goods / Services / Works either not delivered or provided OR only partially delivered/completed. - Company only provided Website/ E-mailing/Postal Address and Mobile Contact Numbers. - Company situated in residential area. - Company has no apparent clientele other than procuring organization. - Company has very little to no apparent assets. - Company’s financial statements and audit reports appear incomplete. - No apparent commercial activities.
  • 20. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 5. UNJUSTIFIED SOLE / SINGLE SOURCING - Where contract is awarded to particular supplier source where it could have been awarded to any of a number of other contractors /suppliers OR where the particular supplier has been awarded multiple single source packages in the past. “ RED FLEGS” - Product / Service has not been previously sole sourced. - No “Sole Source Justification Form” has been completed and authorized. - Supplier previously provided goods/works/services, but at a cheaper price. Absence of justification for price increases. - No documentary evidence to prove goods/works/services has been delivered/carried out. - Evidence of gifts or hospitality received from particular supplier at frequent/regular intervals.
  • 21. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 6. OVER-CHARGING - Often occurs as a result from a lack of proper oversight and Supplier/Contractor Performance Management (SPM) and/or Supplier Relationship Management (SRM) and Financial Controls. “RED FLAGS” - Contractor Management Staff evasive & unable to readily produce records and documents on request. - Timesheets submitted by contractor are illegible and/or incomplete. - Some timesheets are missing. - Timesheets contains one signature signing off on multiple staff attendance or controlled by single person. - Invoices for services are vague, e.g. consultant working for 10 hours off-site on project.
  • 22. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES “RED FLAGS” … - Electronic access controls & CCTV to record access to particular site appear to fail or are damaged on regular basis. - Inability of procuring entity to identify certain workers on submitted timesheets – possible “ghost workers” i.e. they don’t exist and have been added so extra charging can take place. - Volume of purchases do not appear to have discounts applied where such discounts were agreed upon and which have historically been given.
  • 23. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 7. FALSE CLAIMS - Are often present as a result of a corrupt agreement between organization insider and a supplier in terms of which the supplier is allowed to submit claims for goods/works/services either not delivered/completed at all or only partially delivered/completed. “RED FLAGS” … - Invoice does not match Purchase Order (PO) and the Purchase Requisition (PR). - Purchase Order does not correlate with an existing contract or is linked to older or inactive contract. - Items being charged for not appearing on asset register. - Invoices do not appear to follow the format that would normally be expected. - Absence of delivery note to evidence that the delivery took place. - No evidence to prove work was carried out, i.e. absence of certificates of completion.
  • 24. PROCUREMENT CORRUPTION /FRAUD TYPOLOGIES 8. AD-HOC / EMERGENCY ORDERS * Ad-hoc works are works that are not planned and budgeted for and facilitated as either a change order or through contract variations. * Emergency works are works that are required on an emergency basis – by very definition not works required on a regular basis. “RED FLAGS” - Last minute changes to specifications. Close link to “Manipulation of Specifications”. - Non-contractual “Scope encroachment”. - Deliberate creation of “emergency” in order to circumvent normal procurement processes. - A sub-standard product may have been substituted to replace a genuine specified product. - Product is not “fit-for-purpose”.
  • 25. SESSION 2 – Procurement Corruption/Fraud Typologies The Phases in Typical Procurement Cycle Susceptible to Corruption/Fraud To Recap… PLANNING BIDDING PHASE EVALUATION CONTRACT MGT PROCUREMENT PLAN ADVERTISEMENT BIDDING DOCUMENTS
  • 26. Corruption/Fraud Typologies In Procurement Planning PLANNING PROCUREMENT PLAN Scheme: Unnecessary Items Items included in specifications of contracts for goods/services/works which is not consistent with contract requirements. Scheme: Unjustified Sole Sourcing / Direct Purchasing * The SOW (Scope of Work) expanded significantly after tender and contract award taking contractual value from just below a set threshold to considerably above threshold for competitive bidding. * Unreasonably low Quality Specifications to allow an otherwise non-qualifying favoured bidder to qualify and be awarded the tender and subsequent tender. * Multiple sole source / direct contracting to same company where certain contract amendments would have benefitted from competition or where the items should have been procured separately.
  • 27. Corruption/Fraud Typologies In Procurement Planning Scheme: Contract Splitting PROCUREMENT PLAN * Is the deliberate attempt to limit or entirely avoid competitive tender processes. By splitting contracts into smaller packages the need for a greater degree of review and less competitive procurement methods are made possible. * Unusual Splitting: Issuing two or more contracts for identical items over short period of time for no apparent reasons and which result in the application of less competitive procurement method. * Multiple Contract Award Just Below Threshold: Awarding an unreasonably large number of contracts just below procurement review thresholds by senior managers. * Excessive Shopping: Using shopping excessively for the purchase of identical/similar items. Two or more related and simultaneous purchases from same supplier in amounts just below the legal procurement threshold.
  • 28. Corruption/Fraud Typologies In Procurement Planning PROCUREMENT PLAN Scheme: Inappropriate Bundling * Opposite of “Contract Splitting” – The tender bundles a wide variety of goods/works/services that have no relation with each other into one lot, e.g. building materials clustered with copper wires, computer equipment/software and CCTV equipment, with a particular provision that incomplete lots are not allowed and would be regarded as non-responsive. * Typically the contract is awarded to a favoured bidder at a price well above estimates. “RED FLAGS” - Complaints from one or more potential bidders about the bundling of goods/works/services. - Items to be procured within a proposed bundle completely unrelated. - Proposed bundling cannot be properly justified on basis of cost savings or reduced integration costs or risks.
  • 29. Corruption/Fraud Typologies In Procurement Planning PLANNING TENDER ADVERTISEMENT Scheme: Restricted Circulation of Tender - Not advertising the request for expression of interest as required by company procurement policy – limited circulation by posting advertisement in local news media in circumstances where advertising in more broadly would have resulted in improve competition and better pricing. Purpose to give unfair advantage to favoured local supplier. Scheme: Short Notice - The period between the advertisement and bid submission deadline is very short – purpose – to place a favoured Supplier who had been given “insider” information in an unfair advantage and to eliminate competitors so that such favoured supplier be the only one submitting a responsive bid. Scheme: Inadequate Information - Provisioning of inadequate information – potential bidders do not know for example where to submit bids or from whom to request clarification. - Drafting overly vague description of works/goods/services required-potential bidders cannot determine their interest.
  • 30. Corruption/Fraud Typologies In Procurement Planning Scheme: Unnecessary / Inappropriate Line Items - In order to “pad” the contract, corrupt official may add unnecessary items that can be omitted later without reducing contract amount and facilitate the payment of the bribe. “RED FLAGS” * Specific line items in BOQ not required to carry out the work – may have separate utility for officials or serve to facilitate the bribe. * Items creating conflicts of interest for example – provisions in contract requiring the contractor to pay for government officials and supervisor consultants in the works contract. PLANNING BIDDING DOCUMENTS
  • 31. Corruption/Fraud Typologies In Procurement Planning Scheme: Rigged Specifications PLANNING BIDDING DOCUMENTS - In competitive market – specifications drafted that seem to favour a particular company. - Unduly vague or broad specifications which allow an non-qualifying bidder to compete or to justify fraudulent change order requests after contract has been awarded. - Specific favoured company is allowed to draft the specifications. “RED FLAGS” 1. Tailored Specifications: Close similarity between the specifications and the winning bidder’s product/service. Specifications stipulate use of a brand name without stating “or equivalent” contrary to procurement policy. 2. Poor Specifications: Vague, ambiguous or incomplete specifications Specifications are significantly narrower/broader than those used in previous similar procurement actions. 3. Fewer Bids: Only few companies responds to bid solicitation/invitations. Relatively few companies submits bids compared to previous similar procurement actions.
  • 32. Corruption/Fraud Typologies In Procurement Planning PLANNING BIDDING DOCUMENTS Scheme: Manipulation of Bid Evaluation Criteria - Instituting biased evaluation and qualification criteria another method used to steer contracts to favoured bidder. Scheme: Unbalanced Bidding - Under this scheme a favoured bidder is provided with “inside information” not available to other bidders, for example budget estimates or that specific line items will not be called for after the contract has been awarded or that a certain low-cost solution will be acceptable. The “inside information” will invariably give the favoured bidder an unfair advantage over other bidders by allowing it to lower is pricing or otherwise tailor its bid to defeat its uninformed competitors. Scheme: Leakage of Confidential Information - same as above.
  • 33. Corruption/Fraud Typologies In Procurement Planning PLANNING END OF SESSION 2.
  • 34. SESSION 3 – Procurement Corruption/Fraud Typologies The Phases in Typical Procurement Cycle Susceptible to Corruption/Fraud PLANNING BIDDING PHASE EVALUATION CONTRACT MGT SHORT-LISTING (PRE-QUALIFICATION) PRE-BID CONFERENCE BID SUBMISSIONS BID/TENDER OPENING
  • 35. Corruption/Fraud Typologies In Procurement Planning BIDDING PHASE SHORT-LISTING (PRE-QUALIFICATION) -The short-listing and pre-qualification process can be used to exclude competitive bidders. - Exclusion of otherwise qualified bidders through the pre-qualification process could ensure that only preferred /favoured bidder in whose bid a corrupt procurement functionary may have hidden interest will submit a bid that fulfils all the requirements. -Where pre-qualification is required, prior review by senior management should be mandatory for all documentation and proposals related to the pre-qualification process. “RED FLAGS” * Questionable Evaluation Criteria: - Unusual or unreasonable evaluation criteria. - One or more short-listed companies do not have the appropriate qualifications for the assignment. - Unreasonable pre-qualification requirements. - Short-listed firms do not have similar qualifications or there is a wide and diverging gap in qualifications. - Highly qualifying firms which expressed interests are not short-listed.
  • 36. Corruption/Fraud Typologies In Procurement Planning “RED FLAGS” BIDDING PHASE SHORT-LISTING (PRE-QUALIFICATION) * Hidden Interest In Bidding Company: - Company only has Postal Box / E-mail Address and Mobile Phone Numbers. - Complaints that procurement functionary owns or is otherwise linked to a bidding company. - Procurement official linked to contractor/bidder through company registration information / family relations or reports in market place. - Bidding company is not listed on Internet or business/telephone directories. - The Contractor/Bidder’s business address situated in residential and non-business area. - The Bidder provides a wide variety of disparate goods and services at high prices.
  • 37. Corruption/Fraud Typologies In Procurement Planning BIDDING PHASE SHORT-LISTING (PRE-QUALIFICATION) Scheme: Exclusion of Qualified Bidders: - Procurement functionary / company officers can facilitate selection of favoured bidder by improperly excluding other qualified bidders. This may take place at any time from the drafting of the bidding documents to the receipt of bids. - Exclusion of qualified bidders often trigger complaints as potential bidders spend time and money preparing bids. “RED FLAGS” * Unreasonable Pre- and Post-Qualification Criteria - e.g. abnormally high annual turnover or liquidity reserve requirements, years experience in industry or country. * The Bid Evaluation Report (BER) provides no objective or poorly justified reasons for the rejection of certain bids – e.g. rejection on basis of trivial or arbitrary reasons. * Otherwise qualifying bidders fails to submit bids indicating bidding may have been rigged. * Company complaints about refusal/reluctance of procurement official(s) to make bidding documents available to potential bidders or to accept the submission of bids.
  • 38. Corruption/Fraud Typologies In Procurement Planning Pre-Bid Conference BIDDING PHASE PRE-BID CONFERENCE / CLARIFICATIONS MEETING - often scheduled during bidding period to clarify any ambiguities/discrepancies in tender documents and to give potential bidders information on bidding process. - can be used to facilitate unbalanced bidding. “RED FLAGS” - TIMING: Pre-bid conference scheduled too close to bid submission deadline. Pre-bid conference may yield changes to specifications without changes to bid submission deadline. Pre-bid conference may be used to introduce new specifications not previously included in tender solicitation documents and if held too close to bid submission deadline may be used to exclude competitors of a favoured bidder who had been provided with insider information.
  • 39. Corruption/Fraud Typologies In Procurement Planning “RED FLAGS” … BIDDING PHASE PRE-BID CONFERENCE / CLARIFICATIONS MEETING - Inadequate Information: Questions raised by potential bidders during clarification meetings are deliberately not addressed or there is a material delay in responses. - Answers to bidder questions during clarification provided in biased and discriminatory manner in favour of a preferred bidder. - Inadequate Transparency: Clarification and modifications to the bidding documents resulting from the pre-bid conference are not shared with all the prospective bidders.
  • 40. Corruption/Fraud Typologies In Procurement Planning BIDDING PHASE BID SUBMISSIONS A variety of illicit activities may occur during the Bid Submission Phase. “ RED FLAGS” * Late Submissions: - Corrupt procurement functionary may accept late bid from favoured bidder. - Not all bids are brought to bid opening ceremony (i.e. public bid opening). - One or more bids lack a time and date stamp. * Bid Tampering: - A bid (of favoured bidder) not in a sealed envelope. - Received bids not kept in secure location with access limitations. * Bid Manipulation: - Bid submission deadline extended after some bids has already been received. - All bids are voided for “errors”. * Bid Exclusions: - Complaints from potential bidders that they were not allowed to submit bids. - The bid of a favoured bidder not among submitted bids during bid opening having been “forgotten” in the safe.
  • 41. Corruption/Fraud Typologies In Procurement Planning “RED FLAGS” BIDDING PHASE BID/TENDER OPENING - A key risk factor in the bid opening phase is the manipulation of bid prices. * Submission: - Bids are not opened in public. * Tampering: - Original bid form and price schedule or BOQ of all bids not signed by all member of the bid opening committee. - Pages are missing from one or more bids. - Pages with a different type set are included in the bid. * Price Manipulation: - Changes to bid prices and bid security are handwritten. - The applicable currency is not stated in bidding documents. * Undue Influence: - Members of Bid Evaluation Committee (BEC) are present and participating in bid opening. - Lack of original signatures of company representatives supposedly present at the bid opening ceremony.
  • 42. Corruption/Fraud Typologies In Procurement Planning BIDDING PHASE END OF SESSION 3.
  • 43. SESSION 4 – Procurement Corruption/Fraud Typologies The Phases in Typical Procurement Cycle Susceptible to Corruption/Fraud PLANNING BIDDING PHASE EVALUATION CONTRACT MGT EVALUATION COMMITTEE EVALUATION REPORT TENDER (AWARD) COMMITTEE
  • 44. Corruption/Fraud Typologies In Procurement Planning BBIIDD EDVAINLUGA TPIOHNA PSHEASE EVALUATION COMMITTEE - Bid Evaluation Committees evaluate and review the submitted bids and makes recommendation in respect of contract awards. - Bid Evaluation Committees has wide discretion in excluding bidders and can abuse authority as part of a corrupt scheme. “RED FLAGS” * Manipulation of BEC Selection Process: - The BEC members do not have the required technical expertise to properly evaluate submitted bids. - The utilization of a standing BEC regardless of what is being procured. - The BEC is too large or is being dominated by a single individual. * Same risks of corruption are applicable to Tender Award Committee.
  • 45. Corruption/Fraud Typologies In Procurement Planning BID EVALUATION PHASE BID EVALUATION REPORT - A Bid Evaluation Report (BER) is prepared and presented by the BEC on completion of the bid evaluation process describing the results and process by which the BEC has evaluated the bids received. The BER may contain a number of indicators of Bid Rigging, e.g. questionable disqualifications and unusual bid patterns. “RED FLAGS” * Violation of Procurement Rules: - Evaluation criteria used differ from evaluation criteria stated in tender documents. - Inconsistencies exist between BER and supporting documents. - Improper/arbitrary evaluation sub-criteria or procedures are developed at time of evaluation that differ from the issued tender invitation documents. - BEC ignores stated evaluation criteria in issued tender documents and develops and implement its own method of evaluation. - The winning bidder is not on the short-list or not among list of pre-qualified companies.
  • 46. Corruption/Fraud Typologies In Procurement Planning “RED FLAGS” … BID EVALUATION PHASE * Questionable Disqualifications: BID EVALUATION REPORT - Lowest priced bidder is declared as non-responsive. - High number of bids is declared non-responsive. - Recommendations and disqualifications are poorly justified. - Bids are rejected because of allegedly missing components, e.g. catalogues/brochures. - Changes in the scoring of bids or arbitrary scoring of bids. - Pressure by end-users, senior management, project official on BEC to select certain bidder. * Winning Bidder poorly justified: - Technical specifications are copied from the bidding documents or are incomplete. - The manufacturer’s authorization is missing, outdated or inadequate. - Winning Bid does not match requirements in terms of quality, qualifications, etc. - Pages in winning bid are missing, incomplete or unsigned where required.
  • 47. Corruption/Fraud Typologies In Procurement Planning “RED FLAGS” … * Unusual Bid Patterns: BID EVALUATION PHASE BID EVALUATION REPORT - Same or similar addresses, telephone and facsimile numbers are shared by bidders. - Unusually high bid pricing by losing bidders without legitimate explanation and which cannot be attributed to error. - Bid prices of competing bidders differ by a set percentage. * Suspicious Bidders: - Discrepancy between the company address and its telephone number area code.
  • 48. Corruption/Fraud Typologies In Procurement Planning The Phases in Typical Procurement Cycle Susceptible to Corruption/Fraud PLANNING BIDDING PHASE EVALUATION CONTRACT MGT CONTRACT DRAFTING CONTRACT DELIVERY /EXECUTION CONTRACT CHANGES / VARIATIONS
  • 49. Corruption/Fraud Typologies In Procurement Planning CONTRACT MANAGEMENT PHASE CONTRACT DRAFTING * Regardless of which procurement schedule is used the terms and conditions of a contract cannot, without the contracting entity’s prior written approval, materially differ from those on which bids were prepared and submitted. “RED FLAGS” * Delays In Contract Award & Negotiations: - Long delays in contact award or finalization of negotiations. * Questionable Deviations from Tender Documents and Bid Proposals: - Changes to quality, quantity or specifications in contract deviating from those set out in bidding documents. - Price schedules in contract are not the same as that in the winning bid. - Unauthorized and arbitrary changes to contract type. - Unauthorized Changes to standard contract clauses. - Methodologies and Work Plan not attached to contract.
  • 50. Corruption/Fraud Typologies In Procurement Planning CONTRACT MANAGEMENT PHASE CONTRACT DELIVERY /EXECUTION * A variety of corrupt /fraudulent activities may occur during the Contract Delivery / Execution. “RED FLAGS” * Failures: - Discrepancies between inspection findings, test results, contract specifications and contractor’s claims for payment. - Contractor’s work failed critical tests and inspections. - Consistent complaints from end-users about poor quality good/service/works from contractor. - Increased / Accelerated product failures or repair costs or re-works. * Inadequate supporting documentation: - Absent, inadequate or altered documentation submitted by contractor to support billing. - Indications from contractor’s financial and other records that it did not incur the cost required to comply with the contract specifications.
  • 51. Corruption/Fraud Typologies In Procurement Planning “RED FLAGS” … CONTRACT MANAGEMENT PHASE CONTRACT DELIVERY /EXECUTION * Delays in Contract Execution: - Delayed start of works or the delivery of goods/services beyond specified time frames without just cause and subsequent price increases resulting from such delays. - Long delays in contract implementation. * Poor Reputation of Contractor: - Company has exaggerated or falsified its prior experience. * Product Substitution: - Contract may substitute contractually specified products with inferior and often cheaper products. * Sub-standard Work: - Failure of key controls. - Lack of independent oversight / supervision. - Bribery of supervisors or inspectors.
  • 52. Corruption/Fraud Typologies In Procurement Planning “RED FLAGS” … * False Claims and Invoices: CONTRACT MANAGEMENT PHASE CONTRACT DELIVERY /EXECUTION - False Invoices: - Not receiving any reports for invoiced goods or services. - Invoiced goods or services cannot be located in inventory or otherwise accounted for. - No Purchase Order exists for the invoiced goods or services. - Inflated Invoices: - Invoiced prices, amounts item descriptions or terms exceeds BOQ or do not match with contract or PO terms, received goods, inventory or usage records or supporting documents submitted. - Duplicate Invoicing: - Multiple payments in same time period for the same or similar amount to the same vendor for the same invoice or PO, for the same goods or works. - Multiple invoices with the same description of goods/services, same amounts, same PO number, by the same vendor.
  • 53. Corruption/Fraud Typologies In Procurement Planning CONTRACT MANAGEMENT PHASE CONTRACT CHANGES/AMENDMENTS * Contract amendments and change orders usually present legitimate modifications to signed contracts. However, they can be abused. A common scheme involves collusion between a favoured contractor and procurement functionaries, project officials, senior managers to award a contract a favoured contractor at low price, followed by promptly by one or a series of change orders. “RED FLAGS” - Abuse of Contract Change Orders: - Pattern of change orders just below the thresholds for review. - Changes in the scope of the contract and required outputs. - Changes in technical specifications. - Changes in Terms of Reference (TORs). - Increases in contract value. - Reductions in quantity of items to be delivered without commensurate reduction in disbursements to be made. - Substitution of materials and equipment
  • 54.
  • 55.
  • 56. Corruption/Fraud Typologies In Procurement Planning END OF SESSION 4.
  • 57. Thank You Myron . D. B. Betshanger Corporate Governance & Strategic Management, Ethics, Compliance & ERM Specialist, and Anti-Corruption Specialist, Procurement / Supplier Quality Assurer. Cell. +27 74 780 3862 / +27 76 228 6088 E-mail: betshangermyron2@gmail.com @betshangermyron LinkedIn: http://www.linkedin.com/pub/myron-duncan-burton-betshanger/37/219/1b8