Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Procurement Fraud in
Consumer Companies
Preventing, Detecting and Taking Action
K P M G I NT E R N AT I O N A L
ii P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
This paper shares the insight and experience of some of KPMG firms leading
forensic and contract compliance professionals who assist companies in the food,
drink, consumer goods (FDCG) and retail sectors with addressing procurement
fraud issues. In addition, the report summarizes and analyzes the results from a
poll of over 460 FDCG and retail sector procurement and other executives who
attended a KPMG Global Consumer Markets webcast on this topic earlier this
year. These poll results provide the first-hand perspectives of your industry peers
on how their own companies are affected by and dealing with procurement fraud.
I trust that the information herein, on the key procurement fraud risks, leading antifraud procurement practices and cross-departmental approaches to procurement
fraud, supported by the feedback and insights shared by the KPMG webcast
participants, will provide you with relevant and useful guidance that you can
apply in your organization.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
Contents
2 Introduction
3 Procurement fraud risks and
22 Conclusion
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
Introduction
I have seen more
incidents of serious
procurement fraud
in each of the last
two years than in
any of the previous
eighteen.
Amanda Aldridge
G
lobal Forensic Lead, Consumer
M
arkets, KPMG in the UK
Association of Certified Fraud Examiners (ACFE) 2008 Report to the Nation on Occupational Fraud and Abuse
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
Procurement
fraud risks
and ways to
reduce your
exposure
Referring again to the survey by the ACFE mentioned in the Introduction, the
most common fraud scheme (cited 27 percent of the time) was corruption,
including purchase schemes, invoice kickbacks and bid rigging. Schemes involving
fraudulent disbursements of cash were cited more than 50 percent of the time
with respect to asset misappropriations. Respondents cited a lack of adequate
internal controls as the biggest single contributing factor to occupational fraud.
One of the keys to reducing those losses therefore lies in managing the risks of
fraud and abuse and, clearly, in focusing on the procurement process.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
4 P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
This is not a static process. There will likely be ongoing opportunities to reduce
cost. As businesses change (products, geography, etc.), consumer markets
organizations will need to evaluate their vendors and related processes
continuously. Many companies establish specific metrics against which they
monitor and evaluate their vendors and spending. Again, this is a continuous
process and, to manage it, an organization should constantly assess its supplier
relationships and look for opportunities to create value.
Figure 1: The procurement value cycle
Performance
Management
n
tio
ment
lfill
Fu
Cash
Performance
Quality
Va
lu
e
Requisition
Request
Proposals
Sou r c i ng
Purchase
Order
Specification
Manageme
lue
nt
Va
Value
Cr
ea
Pur c has i ng
Receipt/
Pay
Identify
Opportunities
Negotiate
Catalogue
Contract
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
This is a continuous
process and, to
manage it, an
organization should
constantly assess its
supplier relationships
and look for
opportunities to
create value.
A grey market where companies can suffer losses through counterfeits and
knock-offs or where suppliers generate unauthorized production, putting a
companys real products at risk
Failure to meet contract specifications resulting in substandard products
and sometimes dangerous goods
Bribery and corruption especially in higher-risk geographies
Unauthorized disbursements.
The structure and nature of the business can also provide opportunities for fraud.
It is our firms experience that there is a higher risk of fraud in widely decentralized
operations, especially in some emerging economies. Procurement fraud tends to
occur where there is an opportunity, and these opportunities can emerge as a
company changes and grows. Keeping controls up to date with technology and
the growth cycle of the business is critically important.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
6 P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
Figure 2 identifies some methods that a company might utilize to improve its
procurement processes. What drives each organizations choice of strategies
and when to implement them will depend on the following:
where the company is in terms of already making improvements
the relevance the industry leading practices have to its various systems
the balance of risk (often in terms of cost or disruption to existing systems) vs.
reward for making such changes.
Figure 2: Purchase to Pay Leading and Common Practices
Wave 2
Core
Supplier
relationship
management
Good practice
Electronic
procurement
catalogue
Purchasing
cards
Supplier
relationship
management
Work flow
control
Shared
services
Future
Strategic
sourcing
Common
processes
Technology
enabled
procurement
More integrated
systems can lead to
better measurement
of effectiveness and
promote the right
buying behavior
among procurement
personnel.
Wave 1
eAuctions
Management
by exception
Outsourcing
Low
Process
automation
& work flow
Medium
High
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
The delineation between Wave 1 and Wave 2 will be different for each organization.
Wave 1 strategies can often be considered as the lowest hanging fruit those
that will result in the shortest-term gains on a cost-effective basis.
More integrated systems can lead to better measurement of effectiveness and
promote the right buying behavior among procurement personnel. In addition,
better scrutiny of spending and real-time reporting will lead to more timely
and more effective management by exception. This can be used to identify
unauthorized variances in pricing, purchases from non-approved vendors and
inappropriate/excessive quantities of purchases compared with inventory levels
or forecasted demand.
Many consumer markets companies seem to lack a strategic approach to
managing procurement. In a poll during the recent KPMG webcast on
Procurement Fraud, only 19 percent of over 300 respondents from the FDCG
and retail sectors said their companies had a comprehensive strategic sourcing
initiative in place. Another 30 percent said that their processes needed
improvement (see Poll Question 1).
Poll Question 1: Extent of current processes
19
26
24
30
0%
10%
20%
30%
40%
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
8 P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
Proper purchasing procedures require defined protocols around tendering and the
bidding process. However, in our firms experience, far too many organizations
do not keep the results of the procurement process or what we would call
an audit trail to confirm that the process is working as it should. If there is
no requirement to keep these documents, there is a greater risk of abuse of the
system, making it that much harder to recognize exceptions and violations.
Another area where companies can fall short is in performing due diligence on
their suppliers to fully understand with whom they are doing business. Industry
leading practice suggests that there should be a defined process, with a process
owner and a system for archiving the results of the background reviews. This
reduces the risk of fictitious vendors being set up on the vendor master file and
can reveal situations where potentially inappropriate payments might be made by
a distant subsidiary.
Red flags
There are several red flags that should alert companies to potential fraud. Some
of the most common red flags seen by our firms professionals include:
Close socialization with government officials with gifts, expenses, etc., incurred
A losing bidder being hired by a winning bidder, suggesting collusion or that
the winning bidder really did not have the capability to deliver the product or
service
A losing bidder that is not listed in business directories, which might suggest
that the bidder was fictitious and was only put into the process to make it look
as if there was a competitive process
A low initial bid but many change orders, which may appear as collusion with
the buyer
Consumer markets
companies should
be well-informed
about their
customers and
vendors, and in
some countries they
should be especially
wary in their
dealings with
government officials.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
10 P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
Case study
A company had observed that when one of its buyers was moved to a different
category as part of a planned move, a number of the suppliers appeared
to move with him. This was peculiar and was raised as a red flag since the
categories of goods were very different. One would expect that if the category
of goods is very different, so too would be the appropriate suppliers. It was
ultimately discovered through investigation that some of the suppliers were
nothing more than middlemen sourcing product for the buyer. At a minimum,
the company incurred costs that it should not have incurred, and at worst,
the company was defrauded. In this example, moving the buyer and effectively
monitoring the spend paid dividends.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N 11
This example shows that there is an increasing role for internal auditors, who
better understand the challenges that lay before them and the specific risks that
procurement presents. Before conducting an internal audit for a particular location,
KPMG firms professionals see it as preferred practice to brainstorm the specific
risks that might be present in the market, as well as discussing and finalizing key
indicators for the internal audit team. If possible, we would also suggest having a
discussion with someone who is very experienced and knowledgeable about the
market, but is also independent. This would provide additional perspective on local
schemes and related risks making the audit more effective and efficient.
When asked who is primarily responsible for the management of fraud and
misconduct risk in their procurement process, 31 percent of the survey
respondents from consumer markets companies indicated that this was the
responsibility of internal audit and 33 percent said it was down to the function
itself. These are very interesting responses since in the first instance, the role
of internal audits is generally limited to monitoring and testing of controls, and in
the second, there may be an inherent conflict if the same function is responsible
for controlling itself (see Poll Question 2).
Poll Question 2: Primary responsibility for management
Internal audit
31
Procurement
33
Accounting
14
Legal/compliance
10
0%
10%
20%
30%
40%
50%
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
Using
technology
to detect
procurement
fraud
Forensic data analysis
Companies often
overlook other
valuable sources of
information, such as
itemized phone call
listings, access
control logs for
offices and other
publicly available
databases.
One of the key technology tools for detecting procurement fraud and abuse is
forensic data analysis where the focus is on being proactive. Companies collect
vast amounts of data on a daily basis for the purposes of running their businesses.
But are they extracting additional value from this data that could help them identify
fraud or misconduct?
Proactive forensic data analysis is a powerful weapon against fraud and misconduct.
A holistic approach is necessary (Figure 3) and this includes the use of more
traditional methods of fraud control, such as the use of telephone hotlines and
fraud risk assessment programs.
Figure 3: Forensic data analysis as part of a holistic approach
Prevention
Response
Detection
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N 13
Not at all
18
Very limited
47
26
0%
10%
20%
30%
40%
50%
Rules-based analysis
There are many different approaches to proactive forensic data analysis. All
approaches are based on a basic set of principles and knowledge.
The first level of analysis combines knowledge of known fraud schemes and
indicators, with a knowledge of business systems and principles. Figure 4 on
the next page depicts a procurement scenario where the skilled analyst uses
knowledge of how a business process should be conducted to develop and
implement tests which help to identify deviations from the norm.
Tests can be developed to determine whether invoices were received after
payment had been made, and even if orders appear to have been split, to
defeat the limits on delegation.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
14 P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
PO splitting
Requisition
PO
PO after
receipt
Receipt
Payment
before invoice
Invoice
Break-point
analysis
Payment
Test VAT
number validity
Payment for
un-cleared PO
Suspicious
keywords
Combining and
scoring allows
identification
of potentially
anomalous
behaviors, and
reduces the number
of potential false
positives
reducing the
investigative burden.
Case study
In one investigation carried out by a KPMG member firm, knowledge of the
format used to create VAT numbers helped to identify fictitious vendors.
These vendors had been added to the vendor master file to facilitate payment
to an employee whose bank details were loaded as the vendors bank details.
False positives
An important factor to consider is that with this approach there is a risk of a
large number of false positives a large number of exceptions or irregularities
identified are not really problems, but justified business peculiarities that can be
explained easily. Therefore, the approach needs to be enhanced, ensuring that
the exceptions identified are meaningful and warrant further investigation.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N 15
Invoice
12345A
98765S
Processed at night
Unauthorized approval
Score
If we look at each test in isolation, we can expect to find that the number of
exceptions for each test is generally large and, for example, if we take the test of
paid within a week, it may not be practical to investigate all invoices paid within
a week. But when the results are combined in a scoring matrix, the problem
invoices quickly come to the fore. The second invoice, 98765S, has a score of
four and clearly merits further investigation. By scoring and selecting invoices in
this way, we can reduce the number of false positives requiring investigation
allowing for better allocation of limited resources.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
16 P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
In our poll of
procurement
specialists, we
learned that
17 percent did
not know which
employees were
processing
transactions on
their systems.
Invoice ID Amount
G67689
D678D
T7852H
AA4567
B45632
G78512
O3214
D254K
E0987
Z12369
T7852H
B87765
L36985
O3693
S87654
U7536
K09870
U3567
AA1234
G46523
140,317
66,340
4,272
3,105
4,828
4,272
48,282
42,724
Vendor
CostCentre
Gamma Plc
Delta SA
Theta & Sons
Alpha Ltd
Beta Ltd
Gamma Plc
Omega Co
Delta SA
Catering
Catering
Maintenance
Catering
Catering
Catering
Maintenance
Catering
Invoice ID Amount
AA1234
B87765
G67689
D678D
K09870
AA4567
B45632
G78512
G46523
D254K
E0987
Z12369
T7852H
T7852H
O3693
L36985
U3567
S87654
O3214
U7536
16,947
Alpha Ltd
Catering
3,234
Beta Ltd
Catering
140,317
Gamma Plc
Catering
66,340
Delta SA
Catering
265,491
Kappa Co
Catering
3,105
Alpha Ltd
Catering
4,828
Beta Ltd
Catering
4,272
Gamma Plc
Catering
3,105
Gamma Plc
Catering
42,724
Delta SA
Catering
48,282 Epsilon Partners
Catering
4,828
Zeta Inc Maintenance
4,272
Theta & Sons Maintenance
48,282
Theta & Sons Maintenance
42,724
Omega Co Maintenance
3,105
Lambda Ltd Maintenance
4,828
Upsilon Ltd Maintenance
4,272
Sigma BV Maintenance
48,282
Omega Co Maintenance
42,724
Upsilon Ltd Maintenance
Food Suppliers
Food Suppliers
Food Suppliers
Food Suppliers
Food Suppliers
Food Suppliers
Food Suppliers
Food Suppliers
Food Suppliers
Food Suppliers
Automotive
Building Materials
Building Materials
Building Materials
Building Materials
Building Materials
Building Materials
Building Materials
Building Materials
Building Materials
If the company were then to combine this information with the employee master file
information and itemized telephone listings, it could identify a potentially suspicious
relationship between a vendor and an employee in a position of influence.
Similarly, collecting publicly available information on company directorships and
combining it with data on the vendor master file might help to identify possible
conflicts of interests. Taking this approach even further, companies could add
geographical data and visualization to examine a population of data for trends or
groupings which appear unusual.
When investigating these unusual transactions it is important to be able to trace
the entire life cycle of the transaction. One needs to identify the persons initiating,
capturing and approving the transactions. In our poll of procurement specialists,
17 percent of the respondents did not know which employees were processing
transactions on their systems. Eighty-two percent of the respondents reported to
have audit trails and well-defined control policies in place (Poll Question 4). The
next step for these respondents would be to determine whether the audit logs
are actively monitored for red flags.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N 17
No
17
82
0%
20%
40%
60%
80%
100%
This proactive data analysis requires a systematic approach once all available
knowledge has been gathered. The first step of the approach, as illustrated in
Figure 7, is to identify specific risks through knowledge of the business environment.
Figure 7: Systematic approach
Identify specific
risks
Define potential
schemes
Determine event
indicators
Determine
routines
The next step is to define potential schemes through good industry knowledge.
A good understanding of the industry is essential, which will then determine
event indicators and alert the organization to problem areas.
Finally, by using this library of knowledge it is then possible to determine specific
routines, with the assistance of scoring and data enhancement, as part of the
holistic approach in preventing and detecting procurement fraud, in conjunction
with a documented response plan.
Case study
In a recent investigation, KPMG firms performed data analysis on the
procurement data at one regional cluster of a global organization. The results
of the test were used to help the company set a benchmark for comparison.
We then developed automation, to run the same sets of analysis routines on
the procurement data, at each of the organizations other regional clusters.
This allowed for comparisons against the benchmark and for the prioritization
of precious internal audit resources improving the fraud risk environment.
The organization now has the ability to re-run the same analysis every month
to track the effectiveness of its corrective measures and identify the regional
clusters with the biggest problems. In this way, proactive data analysis not only
highlighted indicators of fraud, but also helped the organization to manage its
resources and realign its approach.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
Making use
of supplier
audits to
counter fraud
and loss
The credit crunch,
the increase
in regulation
surrounding antibribery and
corruption, and data
privacy and security,
have all added to
the burden of
managing and
monitoring
suppliers.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N 19
Internal audit
40
Procurement
27
Operational management
20
11
0%
10%
20%
30%
40%
50%
The purpose of a supplier audit is to give an organization comfort that its suppliers
are only billing it for what it has received and that it is paying the right price as
agreed in the contract. Supplier audits are not about putting the squeeze on
suppliers; they are more about keeping suppliers honest.
Case study
In 2005, a global marketing and advertising group had to refund around GBP250
million to consumer markets and other clients around the world, of which three
million was given to a single supermarket chain. The money had been built-up in
the marketing and advertising groups balance sheet, from credits and rebates
from media owners that were not passed back to its clients.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
20 P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
In KPMG firms
experience, when
we conduct
supplier audits, we
find that more than
70 percent of the
third parties we
review have made
errors in their selfreporting, filed
inappropriate
claims, charged
inappropriate prices
or all of the above.
SUPPLIER
TRANSACTIONS
BETWEEN PARTIES
(common data and
understanding)
SUPPLIERS
INTERNAL DATA
(Visible to
supplier only)
CUSTOMERS
DATA AND
PROCESSES
(Visible to
customer only)
UNDETECTED
ERRORS
(Visible to neither
party without detailed
investigation)
CUSTOMER
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N 21
13
44
Not at all
36
0%
10%
20%
30%
40%
50%
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
Conclusion
Procurement is where the money is and, therefore, an area ripe for fraud
and misconduct. The procurement process is growing in importance as many
organizations aim to improve the value they can create. There are several steps
organizations can take to tighten existing controls, many of which have been
described by the preferred leading practices outlined in this paper.
Proactive forensic data analysis can be used to detect fraud and misconduct
through a systematic analysis of the available data, which includes data that
is both internal and external to an organization.
Unless companies exercise their rights of audit, they cannot be sure their
suppliers are billing in line with the contract. While many companies may have
concerns about the impact of an audit on their relationships with suppliers, our
firms experience suggests audits can enhance relationships by creating a more
balanced relationship between the supplier and customer.
Forensic Services
Our Forensic services are aimed at helping our firms consumer markets clients:
prevent instances of fraud and misconduct from occurring in the first place,
detect instances when they do occur,
respond appropriately, and
take corrective action when instances arise.
Professionals in KPMGs Forensic practice draw upon extensive experience in
forensic accounting, law enforcement, fraud and misconduct control assessments,
legal damage quantification and analysis, expert witness testimony, international
arbitration, asset tracing, computer forensics and forensic data analysis.
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N 23
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
24 P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N
Contact us
For more information about the detection and prevention of procurement fraud in
your company, please contact any of the following KPMG professionals:
Willy Kruh
Global Chair, Consumer Markets
KPMG in Canada
+1 416 777 8710
wkruh@kpmg.ca
Amanda Aldridge
Global Forensic Lead, Consumer Markets
KPMG in the UK
+44 20 7311 8073
amanda.aldridge@kpmg.co.uk
Grant Jamieson
KPMG in China
+852 2140 2804
grant.jamieson@kpmg.com.hk
Graham Murphy
KPMG in the US
+1 312 665 1840
grahammurphy@kpmg.com
Kajen Subramoney
KPMG in the UAE
+971 (4) 424 8900
kajen@kpmg.com
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
P R O C U R E M E N T F R A U D I N C O N S U M E R C O M P A N I E S : P R E V E N T I N G , D E T E C T I N G A N D T A K I N G A C T I O N 25
2010 KPMG International Cooperative (KPMG International), a Swiss entity. Member firms of the KPMG network of independent firms are
affiliated with KPMG International. KPMG International provides no client services. All rights reserved.
kpmg.com
The information contained herein is of a general nature and is not intended to address the
circumstances of any particular individual or entity. Although we endeavour to provide accurate and
timely information, there can be no guarantee that such information is accurate as of the date it is
received or that it will continue to be accurate in the future. No one should act on such information
without appropriate professional advice after a thorough examination of the particular situation.