Security and Loss Prevention: Expense Reimbursement Fraud Case Study

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Responsibility and sense of duty are two of the main tenants that a company managing staff member should have. In order to have a better, clearer, picture of the situation we need to describe it. This report will demonstrate that we are dealing with an orchestrated criminal activity that is described by law as fraud. It is an intentional fraudulent activity that the two mentioned persons have been consciously and intentionally planning and executing during 2007. Fraud is defined as “an intentional deception made for personal gain or to damage another individual. The specific legal definition varies by legal jurisdiction. Fraud is a crime, and is also a civil law violation” (Cohen, 2006).

Mr. Bob Smith, as the Associate Director of Purchasing Department, had the power to issue corporate purchases as prescribed in his labor duties. This ability was given to him on the condition to use those purchases for the benefit of the company. Lakes, Inc. maintains a physical asset database in which all non-disposable items with a purchase price of $1,000 or more are recorded. Each item is assigned a unique ID number and barcode label, which are used to track the item. His administrative assistant, Ms. Mary Bad, had the duty to record on file all the transactions along with their original invoices and copies.

Below we will describe in detail what happened.

The chronological narration of the case: the reimbursement fraudulent scheme

This report will demonstrate how Mr. Bob Smith, the Associate Director of Purchasing of the company, along with his administrative assistant, Ms. Mary Bad, were submitting false expense claims. We determined that up to $8,795.60 in false invoices had been submitted for reimbursement through the purchasing department.

During the last six months, records show that both partners in fraud have been using the corporate purchase card for personal purposes. Mr. Ted Jones, the manager of the local Sterns Company, the vendor, provided invoices demonstrating that there were five purchases made by the Purchasing Department of our company (authorized by Mr. Smith) in the last six months. The initial two were made by Mr. Smith himself, and the additional three by his administrative assistant. Records of our company’s Purchasing department show that there exist file copies which matched the original invoices presented by Mr. Jones. The difference was that the invoice number, date, and amount were different as to what was purchased. The common thing was that both in the original invoices and our company’s records, the purchases were made with the same purchase card and approved by Mr. Smith. The other major professional deficiency was that in our Purchasing Department we found only copies of invoices, no originals. Furthermore, these copies had none of the items contained in the original invoices. Company record copies show that the purchases were made for computer systems and a server needed for specific departments of the company. Instead, we find in the original invoices that (in chronological order) a notebook computer, a digital camera, a digital camcorder, a GPS system, and a home theater system, was purchased instead.

Mr. Jones also testified that for these five purchases he had been requested directly by Mr. Smith that the purchase be held for pick up by either him or his administrative assistant, Ms. Mary Bad. That was deviance to all the other company’s purchases.

Based on the facts mentioned above, we are legit to conclude that the two individuals mentioned have deliberately orchestrated and committed fraud against the company by inflicting it a financial loss of more than $8,000.

References

Cohen, F. (2006) Frauds, Spies, and Lies – and How to Defeat Them. ASP Press.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 12). Security and Loss Prevention: Expense Reimbursement Fraud. https://ivypanda.com/essays/security-and-loss-prevention-case-study/

Work Cited

"Security and Loss Prevention: Expense Reimbursement Fraud." IvyPanda, 12 Mar. 2022, ivypanda.com/essays/security-and-loss-prevention-case-study/.

References

IvyPanda. (2022) 'Security and Loss Prevention: Expense Reimbursement Fraud'. 12 March.

References

IvyPanda. 2022. "Security and Loss Prevention: Expense Reimbursement Fraud." March 12, 2022. https://ivypanda.com/essays/security-and-loss-prevention-case-study/.

1. IvyPanda. "Security and Loss Prevention: Expense Reimbursement Fraud." March 12, 2022. https://ivypanda.com/essays/security-and-loss-prevention-case-study/.


Bibliography


IvyPanda. "Security and Loss Prevention: Expense Reimbursement Fraud." March 12, 2022. https://ivypanda.com/essays/security-and-loss-prevention-case-study/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1