New Governances
New Governances
identifies, manages, and mitigates fraud risks. Here’s a detailed look at the roles and
responsibilities within an organization, the Three Lines Model, and the essentials of a
robust fraud risk governance framework:
a. Board of Directors
• Oversight: The Board is responsible for setting the tone at the top and
providing oversight on fraud risk management. They should ensure that
appropriate policies and controls are in place and that management is
effectively implementing them.
• Approval: The Board must approve the organization’s fraud risk management
policies and procedures.
• Review: They should review regular reports on fraud risk management and
any significant fraud incidents.
b. Audit Committee
• Monitoring: This committee monitors the effectiveness of the internal control
systems, including those designed to prevent and detect fraud.
• Reporting: It reviews and assesses the effectiveness of fraud risk management
and makes recommendations for improvements.
• Oversight: Ensures that there is an independent internal audit function that
evaluates the adequacy of fraud prevention and detection measures.
c. Senior Management
• Implementation: Senior management is responsible for implementing fraud
risk management policies and procedures.
• Culture: They should foster an ethical culture and ensure that employees are
aware of fraud risks and the mechanisms for reporting suspicious activities.
• Resources: Allocate necessary resources for effective fraud risk management
and internal controls.
d. Internal Audit
• Assessment: Internal auditors assess the effectiveness of the fraud risk
management processes and controls.
• Evaluation: They conduct audits to identify vulnerabilities and provide
recommendations to strengthen fraud prevention and detection.
• Reporting: Report findings and suggest improvements to senior management
and the Audit Committee.
e. Compliance Officer
• Compliance: Ensures that the organization adheres to relevant laws and
regulations related to fraud.
• Training: Develops and delivers training programs on fraud awareness and
prevention.
• Monitoring: Monitors compliance with fraud-related policies and procedures.
f. Employees
• Reporting: Employees have a responsibility to report suspicious activities or
concerns about potential fraud.
• Compliance: They should adhere to the organization's policies and procedures
related to fraud risk management.
• Awareness: Engage in training and remain vigilant about fraud risks.
e. Reporting Mechanisms
• Whistle-blower Systems: Establish confidential and accessible reporting
mechanisms for employees and stakeholders to report suspected fraud.
• Follow-Up: Ensure that all reports are investigated thoroughly and in a timely
manner.
3. Fraud Prevention
Strong internal controls are the first line of defence against fraud. This includes
• segregation of duties,
• authorization processes,
• reconciliations, and
• access controls to prevent unauthorized activities.
Employee Training and Awareness: Regular training programs should be conducted to educate
employees about
• the risks of fraud,
• how to recognize suspicious activities, and
• the importance of ethical conduct.
Organizations should also assess the fraud risks associated with vendors, contractors, and
other third parties, implementing appropriate controls to manage these risks.
4. Fraud Detection
Continuous monitoring of transactions, behaviours, and systems can help in detecting unusual
patterns or anomalies that may indicate fraud.
Advanced data analytics and forensic tools (Splunk, Palantir Foundry, IBM i2 Analyst’s
Notebook, Forensic Toolkit, SAS Analytics, etc) can be used to identify red fl ags and potentially
fraudulent activities by analyzing large volumes of data for inconsistencies.
Whistle-blower Mechanisms: Establishing confidential reporting channels, such as hotlines or
anonymous reporting systems, encourages employees and others to report suspicious
activities without fear of retaliation.
5. Fraud Investigation
When potential fraud is detected, it’s crucial to have clear protocols in place for conducting
investigations. This includes defining
✓ the roles and responsibilities of investigators,
✓ securing evidence, and
✓ maintaining confidentiality.
Depending on the findings, appropriate legal actions and disciplinary measures should be
taken against those involved in fraudulent activities. This may involve coordination with law
enforcement agencies.
8. Regulatory Compliance
The program should comply with relevant Laws, Regulations, and Industry Standards related
to fraud risk management. This may include requirements set by regulatory bodies .
Organizations must be aware of any reporting obligations related to fraud incidents, both
internally and to external stakeholders, including regulators, shareholders, and the public.
Likelihood Assessment
• High: The risk is likely to occur.
• M edium: The risk is possible to occur.
• Low: The risk is unlikely to occur.
This step involves estimating the probability of each identified fraud risk scenario
occurring. Factors to consider include:
• Historical Occurrence: Has this type of fraud occurred before within the organization or
industry?
• Nature of the Business: Is the organization’s industry particularly prone to certain types
of fraud (e.g., financial services, retail)?
• Complexity of Processes: Are the processes involved in the scenario complex, making it
difficult to monitor and control?
• Level of Internal Controls: Are there existing controls that can effectively prevent or
detect the fraud? The absence or weakness of controls increases the likelihood.
• Fraud Triangle Factors: Consider the factors of pressure, opportunity, and rationalization
that could lead individuals to commit fraud.
1. Preventive Controls
Preventive controls are measures designed to prevent fraud from occurring in the first place
by reducing opportunities and dissuading potential fraudsters. Key preventive controls
include:
• Segregation of Duties: Ensuring that no single individual has control over all aspects of
a financial transaction (e.g., authorization, recording, and custody of assets). This
minimizes the risk of fraud by requiring collusion for fraud to occur.
• Authorization and Approval Processes: Establishing clear authority levels and requiring
approvals for financial transactions, contracts, or other critical decisions to ensure that
multiple layers of oversight are in place.
• Access Controls: Limiting access to sensitive systems, data, and assets based on an
individual’s role and responsibilities. Implementing strong passwords, encryption, and
physical security measures can help prevent unauthorized access.
• Employee Background Checks: Conducting thorough background checks on new hires,
especially those in sensitive positions, to reduce the risk of hiring individuals with a
history of fraudulent behavior.
• Training and Awareness Programs: Regularly educating employees about the
organization’s code of conduct, anti-fraud policies, and the importance of ethical
behavior. Training can also cover how to recognize and report suspicious activities.
• Anti-Fraud Policies: Developing and enforcing policies that clearly communicate the
organization’s stance on fraud, including consequences for fraudulent behavior. Policies
might include conflict-of-interest declarations, gift policies, and whistle-blower
protections.
2. Detective Controls
Detective controls are mechanisms that help identify fraud if it occurs, allowing for timely
intervention and response. These controls include:
• Internal Audits: Conducting regular and surprise audits to examine financial
transactions, processes, and records. Audits can detect discrepancies, irregularities, or
patterns indicative of fraud.
• Reconciliations: Performing regular reconciliations of accounts, such as comparing bank
statements with accounting records, to identify any discrepancies that may indicate
fraud.
• Data Analytics and Continuous M onitoring: Using data analytics tools to monitor
transactions and financial data for unusual patterns, trends, or anomalies that could
suggest fraudulent activity. Continuous monitoring provides real-time detection of
potential fraud.
• Surveillance and M onitoring Systems: Implementing surveillance measures such as
video monitoring in sensitive areas (e.g., cash handling) and tracking employee activity
in critical IT systems to detect unauthorized actions.
• Whistle-blower Hotlines: Establishing confidential reporting mechanisms (e.g., hotlines,
online portals) that allow employees, customers, or third parties to report suspected
fraud anonymously. Whistle-blower reports can provide early warning signs of fraud.
3. Leveraging Technology
Technology plays a crucial role in both preventing and detecting fraud. By leveraging
advanced tools and software, organizations can enhance their fraud risk mitigation efforts:
• Fraud Detection Software: Utilizing specialized software that uses algorithms and
machine learning to detect suspicious transactions or behaviours in real time. These
tools can analyze large datasets to identify patterns associated with fraud.
• Automated Controls: Implementing automated workflows and approval processes to
ensure compliance with policies and reduce the risk of manual errors or manipulation.
• Blockchain Technology: Using blockchain for transactions to ensure transparency,
immutability, and traceability. Blockchain can reduce the risk of fraudulent alterations
to records.
• Artificial Intelligence (AI) and Machine Learning: Applying AI and machine learning to
detect unusual patterns or behaviours in data that may indicate fraud. These
technologies can also adapt and improve over time, becoming more effective at
identifying potential fraud.
• Digital Identity Verification: Using biometric authentication, two-factor authentication,
and other digital identity verification tools to prevent unauthorized access and reduce
the risk of identity fraud.
Conclusion
Mitigating fraud risk requires a comprehensive approach that combines preventive and
detective controls, leverages advanced technology, and remains vigilant for red flags. By
implementing these strategies, organizations can significantly reduce the likelih ood of
fraud and minimize its impact when it does occur.