sitemapHome | Registration | Job Portal for CA's | Expert Exchange | Currency Converter | Post Matrimonial Ads | Post Property Ads
News shortcuts: From the Courts | News Headlines | VAT (Value Added Tax) | Placements & Empanelment | Various Acts & Rules | Latest Circulars | New Forms | Forex | Auditing | Direct Tax | Customs and Excise | ICAI | Corporate Law | Markets | Students | General | Mergers and Acquisitions | Continuing Prof. Edu. | Budget Extravaganza | Transfer Pricing | GST - Goods and Services Tax
Latest Expert Exchange
News Headlines »
 How to submit Form 15H, Form 15G to avoid TDS on interest income
 What is tax deducted at source (TDS)?
 Income Tax Return filing 2018: Here are some important tips for you
 Change in Examination Venue in Thane, Zone – II, May 2018 Examinations
 Here’s all you need to know New Income Tax return for salaried class available on IT portal
 What to do if you missed the (second) tax deadline
 Income-tax (5th Amendment) Rules, 2018 - Notification under section 9A (3) of the Income-tax Act, 1961 in respect of Fund Manager Regime
 Income Tax department warns salaried class again filing wrong ITRs
 ITR-1 form for AY 18-19 now available for e-filing
 New Income Tax Return Form for Salaried Class available in Portal
 Income Tax Return: ITR-1 ready for e-filing, says I-T department

Act proactively to pre-empt fraudulent behaviour
June, 07th 2007
A number of players in the knowledge processing outsourcing space in India do not allow their analysts access to local hard drives, disable the use of pen drives and prevent access to Internet mail. MR R. BENTON ARMSTRONG, GLOBAL LEADER, FORENSIC TECHNOLOGY SERVICES, PRICEWATERHOUSECOOPERS.

MR R. BENTON ARMSTRONG, Global Leader, Forensic Technology Services, PricewaterhouseCoopers.

The corporate world is facing a growing incidence of fraud, where the source is internal or external, apart from encountering issues around recent phenomena like phishing and skimming and whistle-blowing on suspicion of fraud.

In this context, forensic technology services assume greater relevance, according to Mr R. Benton Armstrong, Global Leader, Forensic Technology Services, PricewaterhouseCoopers (PwC).

Speaking to Business Line on the PwC division's operations in India and the challenges arising out of corporate fraud, he said that forensic technology services (FTS) are also relevant to American multinationals operating in India, as they need to comply with the Foreign Corrupt Practices Act (FCPA) and anti-money laundering (AML) standards. "Besides, AML could also be enacted as a requirement for Indian banks."

On the kinds of fraud PwC has grappled with in India, he said that there are particular patterns of fraud that happen, but these do not necessarily follow an industry pattern.

"For instance, the US-based Association of Certified Fraud Examiners has established a fraud taxonomy. This typically includes asset misappropriation, credit card fraud, etc."

Citing the example of the telecom industry, he said that certain frauds happen at the subscriber level, where subscribers and a cartel of dealers form a pseudo-churn situation, "where the same customer reappears under different names. As a result, the provider pays the cartel money for introducing new customers, when it is actually the same customer. But this is now taken care of by most telecom fraud management systems."

According to Mr Armstrong, the PwC global forensic technology practice works with forensic accountants, finance professionals and corporate and outside counsel to help clients "proactively detect" potentially fraudulent activity within the organisation and respond to "unplanned events such as corporate investigations and other crisis situations."

The practice brings together data analysis techniques with proprietary software and hardware to identify, seize, secure and analyse evidence located on computer systems or other storage media.

"Sources of information often include e-mail, accounting data and other financial information. Our team provides support to various groups such as dispute analysis and investigations and internal audit services."

The domains requiring PwC expertise could range from bribery and corruption claims, suspicion of accounting manipulation and inappropriate/inadequate disclosure, to dealing with major insurance claims, ensuring royalty income is correct and auditing licensing contracts.

The division also works in the areas of independent evaluation of loss and damage arising from a breach of contract, litigation and international arbitration, compliance with financial crime regulations and checking for effectiveness of anti-fraud programmes.

"Often, companies seek counsel from FTS to understand what policies and procedures can be put in place in order to stop the occurrence of fraud. Our findings are used to deliver better compliance structures."

Besides, many companies have weak data retention policies and tend to store "either too much information, or in the cases of some regulated industries, too little."

Also, he added, most companies do not actively enforce their policies. "We work with clients to assess their existing IT environment and help develop reasonable and enforceable policies."

Mr Armstrong is confident that the use of technology and FTS will only increase in the years to come, since increasingly complex fraudulent practices need technology to determine preventive as well as detection mechanisms.

"In industries such as telecom and banking, complex data analysis tools and methodologies are required to sift through large volumes of data in order to detect patterns. Besides, detection and prevention will become more and more real-time."

According to him, it is difficult to estimate the magnitude of occurrence in any country, as it is an unplanned event.

However, a PwC global survey on crime reported that 40 per cent of respondents reported significant damage to their brand or reputation, a decline in staff morale or impaired business relations.

Regardless of size and frequency of occurrence in the industry or country, it is in a company's best interest to act proactively so as to pre-empt fraudulent behaviour.

In this context, companies are investing in various platforms that help them strengthen their security and controls and make perpetration of fraud a lot more difficult, said Mr Armstrong.

"For example, a number of players in the knowledge processing outsourcing space in India do not allow their analysts access to local hard drives, disable the use of pen drives and prevent access to Internet mail. All these measures make it difficult for anyone to ship data out of the centre, which can be used for fraudulent purposes."

He added that in general, companies often lack the resources to effectively mine their own data.

"As yet, there are no effective tools that can effectively be `bolted on' to a company's ERP system to perform that analysis for them."

In conclusion, he said that companies must invest in the time to extract that information from their systems, review evidence from past behaviour to identify indicators of fraudulent activity and continuously audit their own data and identify non-compliant behaviour.

D. Murali
C. Ramesh

Home | About Us | Terms and Conditions | Contact Us
Copyright 2018 CAinINDIA All Right Reserved.
Designed and Developed by Binarysoft Technologies Pvt. Ltd.
Custom Software Development Outsourcing Custom Software Development Offshore Cus

Transfer Pricing | International Taxation | Business Consulting | Corporate Compliance and Consulting | Assurance and Risk Advisory | Indirect Taxes | Direct Taxes | Transaction Advisory | Regular Compliance and Reporting | Tax Assessments | International Taxation Advisory | Capital Structuring | Withholding tax advisory | Expatriate Tax Reporting | Litigation | Badges | Club Badges | Seals | Military Insignias | Emblems | Family Crest | Software Development India | Software Development Company | SEO Company | Web Application Development | MLM Software | MLM Solutions