Fighting bribery and corruption with supplier integrity

0

Don't get buried in the media. Supplier integrity can help organizations stay on top of potential corruption. "Corruption box" by watchsmart is licensed under CC BY 2.0

Bribery and corruption continue to plague governments and organizations around the world. Brazil’s Operation Car Wash, the 1MDB scandal in Malaysia, the FIFA bribery case and many others continue to make headlines. The prevalence of widespread, coordinated corruption and bribery is alarming and seems to continue to grow, despite ongoing sanctions and fines meant to deter these actions. 

Money must be exchanged to prove bribery and corruption in a court of law, and often that money comes from an organization’s coffers. Although it's rare that a general ledger entry cites “bribe” in the memo line, it's still possible to identify illicit payments and unusual transactions that could be facilitating bribery and corruption. This type of fraud can appear in financials as one-time payments to third parties or can surface as overpayments on invoices.   

Where can an organization start to improve internal processes and controls to safeguard against these actions? 

Start with the suppliers

Supplier relationships offer an avenue for moving money to ‘pay for play’ or to flat-out bribe someone. We can better safeguard organizations from this type of fraud, and ensure supplier integrity, by more thoroughly vetting the supplier base and keeping a closer eye on the books.  

To make payments to outside entities, organizations must set up these payees in their ERP systems. Most organizations today have formal processes for onboarding new suppliers, either through due diligence or more rigorous reviews mandated by regulators. Regardless of an organizations approach, most entities only perform due diligence once and rarely continue monitoring the supplier base for risk. This can be a costly mistake.  

With the changing global economic climate and dynamic risks, its never been more important to monitor supplier integrity and audit the supply base. Just because a supplier is reputable and reliable now doesn’t mean someone won’t become desperate if the company starts taking losses.  

Supplier integrity risk changes over time. How can you keep up?

Some organizations are turning towards digital transformation programs to support supplier risk efforts, whereas others have adopted continuous monitoring programs to automate what typically is a time-consuming manual process. SAS helps clients use technology and analytics to not only automate these processes but also apply analytics to the various data streams to risk-score and prioritize vendors for audit and risk. 

Organization can dig deeper using transactional data available within an enterprise resource planning (ERP) system. The Procure-to-Pay cycle offers a treasure-trove of rich data that can help us better monitor supplier activities from keeping up on mergers and acquisitions to surveilling for fraud, waste and abuse. Ongoing business operations can feed an automated system to stay on top of variations across pricing, transactional anomalies, and even ineffective controls that can help to surface improper payments and risk within the supply chain. 

These patterns of activities can also point to unusual payments that can be linked to bribery and corruption, providing organizations the much-needed indicators and warnings to stay out of the headlines and keep the business free of fines and reputational damage. 

To learn more about how Supplier Integrity or Procurement Integrity can help your organization transform visit https://www.sas.com/en_us/software/continuous-monitoring-procurement-integrity.html 

 

  

Share

About Author

Jen Dunham

Principal Solutions Architect

As a Solution Specialist within the Security Intelligence Global Practice, Jen is focused on providing subject matter expertise and assistance to Government teams addressing various security risks such as Cyber Security, Insider Threat, Targeting/Lead Generation, and other Intelligence-specific applications of the SAS Security Intelligence Foundation. Having served as an all-source intelligence analyst in the United States Army, and having since worked closely with numerous law enforcement, defense, and intelligence organizations around the world, Jen has a unique and comprehensive view within these areas and how their tradecraft and missions vary. Jen has worked in mission areas to include; counterterrorism, counterespionage, counternarcotic, peacekeeping missions, priority intelligence requirements, and the Balkans (Bosnia-Herzegovina). Over the last 22 years, Jen has held a security clearance with numerous agencies supporting organizations such as FBI, DEA, NSA, CIA, NCTC, State Department, Department of Energy, and also State and Local Law Enforcement. Jen also has in-depth knowledge (through previous employment) of technology and information companies such as i2, Dun & Bradstreet, Choicepoint and Thompson Reuters.

Leave A Reply

Back to Top