Loading…

Fraud & Scam Protection

Protecting Your Non-profit from Vendor Fraud and Invoice Scams

April 14, 2018 GrantFunds Editorial Team

Protecting Your Non-profit from Vendor Fraud and Invoice Scams

The Vendor Fraud Threat Landscape

Vendor fraud — the misappropriation of organizational funds through fictitious vendor accounts, inflated vendor invoices, or manipulation of legitimate vendor relationships — represents one of the most common categories of financial fraud at non-profit organizations, and one of the most difficult to detect without robust internal controls. The ACFE's Occupational Fraud report consistently shows billing schemes (which include vendor fraud) as among the most prevalent fraud types across all organizations. Non-profits are particularly vulnerable because they often have limited procurement infrastructure, small finance teams where the same person may both set up vendor accounts and process payments, and high trust cultures that reduce the skepticism that would otherwise catch suspicious vendor activity. The financial losses from undetected vendor fraud compound over time — schemes that run for two or more years before detection produce dramatically higher total losses than those caught in the first months — making prevention far more cost-effective than investigation and recovery.

Fictitious Vendor Schemes

Fictitious vendor schemes — in which an insider creates a vendor account for a company that does not actually provide goods or services to the organization, then processes invoices and collects payments from that account — are a classic insider fraud pattern that exploits weak vendor setup and invoice approval controls. The fictitious vendor is typically registered under a name that sounds like a legitimate service provider (a generic consulting firm name, an IT services name, a maintenance company name), often at an address that is a P.O. box or the perpetrator's home address, and sometimes with a name similar to but slightly different from a genuine vendor the organization uses. Payments to the fictitious vendor are approved and processed by the same individual who set up the account, because there is no segregation of duties between vendor account management and payment processing. Detection requires: independent verification of all new vendor accounts before approval, including verification that the vendor exists and is not connected to any organizational employee; regular reconciliation of vendor payments against specific deliverable documentation; and periodic audit of vendor accounts by someone other than the person who manages vendor setup and payments.

Advertisement
Discover thousands of grant opportunities

Invoice Manipulation and Billing Inflation

Invoice manipulation fraud — in which legitimate vendors are paid more than they actually charged, with the difference diverted to the perpetrator — is more difficult to detect than fictitious vendor fraud because it involves genuine vendors and genuine services. Schemes include: altering vendor invoices after receipt (changing the amount due before recording in the accounting system); arranging for vendors to submit inflated invoices in exchange for a kickback to the approving employee; and creating duplicate payments for the same invoice. Detecting invoice manipulation requires: three-way matching (verifying that each invoice matches a pre-approved purchase order and a received goods or services confirmation) for all significant vendor payments; regular vendor statement reconciliation that catches discrepancies between vendor records and organizational accounting records; and periodic direct communication with key vendors to verify that amounts paid match their records. Organizations that conduct periodic vendor statement reconciliations frequently discover discrepancies that, on investigation, reveal either fraud or accounting errors that have been silently accumulating.

Procurement Policy and Competitive Bidding

The most effective systemic protection against vendor fraud is a robust procurement policy that requires competitive bidding for all purchases above a specified threshold, documents the bidding process, requires independent approval of vendor selection decisions, and explicitly addresses conflict of interest (the obligation of staff to disclose and recuse from procurement decisions involving vendors they have personal or financial relationships with). Organizations that implement competitive bidding policies with genuine enforcement — where board members and the executive director follow the same procedures as program staff, where exceptions require documented board approval, and where procurement records are maintained and available for audit review — create an environment where vendor fraud is both harder to perpetrate and more likely to be detected. For organizations receiving government grants, competitive procurement is not just best practice but a regulatory requirement that grant auditors specifically review — failure to conduct required procurement processes is an audit finding that can result in grant fund recovery requirements regardless of whether fraud actually occurred.

Found this helpful? Share it: