No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights

Combating P-Card Fraud

by Chris Stewart-Smith
January 14, 2014
in Uncategorized
woman holding credit card

According to the Association of Certified Fraud Examiners, fraudulent use of purchase cards, or p-cards, is one of the most commonly occurring types of employee fraud, and a 2013 survey of 2,200 audit, risk management and compliance professionals reveals that risk related to internal fraud and abuse is an area of highest concern.

On the positive end of the spectrum, p-cards can help employers increase efficiency by automating supplier and vendor payments, eliminating unnecessary paperwork and trimming costs tied to administrative efforts. On the other hand, regardless of the size of an organization, whether p-card access is provided to 50 or 5,000 employees, the risk for misuse is high.

Employees can be tempted to abuse p-card program controls and in extreme cases, commit sophisticated, high-level fraud.

If any risk exists for this type of activity to become widespread within an organization, not only can the total monetary losses become considerable, but a culture that promotes fraudulent behavior can also become prevalent.

It’s critical that the risk management, compliance and audit departments have this threat on their radar. But it’s also important for the executives and senior-level management of an organization to have a sense of where the areas of risk are and how to identify red flags before they become material problems.

Monitoring for suspicious activity within a p-card program can be extremely labor intensive if performed manually, generating high costs and low productivity. In order to ensure that issues are identified immediately, it’s advantageous for a company to employ a continuous monitoring system that uses data analytics. In addition, if management sets the tone at the top by letting everyone know that they are keeping a close eye on p-card use, an ethical culture will emerge and employees will be less likely to engage in troublesome behavior.

Data analytics deliver a powerful method for minimizing an organization’s risk exposure and validating internal controls. Analytics support business assurance by providing:

  • Independent control testing
  • 100 percent data review with cross-platform analysis
  • Prompt notification of key exceptions
  • Predefined and tailored analysis of pain points

When it comes to p-card programs, analytics are typically designed to cover each of the four major components of the p-card process:

  1. Managing cards
  2. Managing merchants
  3. Managing transactions
  4. Conducting review and analysis

Effective analytics might test for invalid employees and duplicate purchase cards using name and address matches, for example. Other key analyses include validating card limit changes, pinpointing blocked merchant categories and key words (such as alcohol, clothing and casinos), and looking for unusual behavior patterns (such as using cards during weekends and holidays for employees not known to travel). The opportunities are endless, but first, let’s look at data analytics in action.

Streamlined efforts produce big results

Global security and technology firm Lockheed Martin offers a nice example of how to develop a coordinated p-card monitoring process. The company created a Commercial Card Operations division to maximize its commercial card value proposition and minimize risk. The p-card program covers:

  • 90,000 cardholders across multiple continents
  • 2.5 million transactions per year
  • Four primary cards – travel, meeting, fleet and purchasing

The Commercial Card Operations division implemented data analytics to create an early warning system that flags suspicious transactions on a near real-time basis. When unusual transactions occur, cardholders receive a message requesting additional details on a fixed timeline. The program quickly made a powerful impression on cardholders. As auditors know firsthand, people are far more likely to follow the rules when they know someone is watching.

Start small and keep sharpening your analytics

Automating p-card control validations is clearly an effective audit strategy, but a well-designed monitoring program driven by analytic technology can provide significant value when applied to business processes across the organization. Analytics can find money, increase efficiency, reduce risk, and identify problems before they snowball into crises. They also provide evidence and support for internal and external audits.

If you’re eyeing your p-card program and looking for a concrete plan, the key is to start with simple tests that you can continue optimizing for long-term value. Identify just a handful of areas and launch simple, specific analytics based on pain points, risk areas, and top opportunities for improving processes.

Next, be sure to leverage other people’s expertise to get your plan up and running. There are terrific industry associations – such as the NAPCP – and user groups out there that can offer a helping hand.

Finally, it’s critical to benchmark your work against past experiences. Look at the time it takes to audit transactions, the number and quality of issues you identify and the risks mitigated. Detailed anecdotes will also make it easier to get buy-in from senior management.

Analytics aside, one reliable way to reduce leakage though p-cards is to “leak” the fact that a comprehensive program for p-cards is about to begin: this notion on its own has reduced fraud and “discrepancies” in many companies.


Previous Post

G8 Open Data Charter – The Implications for Due Diligence

Next Post

What is the FCPA? CCI Video Training Series Kicks off Today

Chris Stewart-Smith

Chris Stewart-Smith

About the Author Chris Stewart-Smith is Manager of ACL’s Global Solutions Consulting group and works with clients worldwide to help them realize the benefits of data analytics and GRC technology, thereby bridging the knowledge gap between IT and business leaders. With over 15 years’ experience in software consulting across a broad range of industries, Chris is a frequent speaker and educator on the topics of Data-Driven GRC and Continuous Monitoring. For more information, visit www.acl.com.

Related Posts

low battery on iphone warning

Ethics Fatigue: The Burnout That’s Putting Your Organization at Risk

by Nick Gallo
June 20, 2025

The psychology behind why ethics professionals are exhausted and what companies risk when they let it go unchecked

news roundup new

Few Business Leaders Feel Fully Prepared for Challenges of 2025

by Staff and Wire Reports
June 20, 2025

Data center operators not using full slate of available sustainability tactics; companies continue to use AI without policies

SmartSearch Daon Partnership

SmartSearch Partners With Daon for Enhanced ID Verification

by Corporate Compliance Insights
June 19, 2025

UK digital compliance provider SmartSearch has partnered with digital identity company Daon to integrate AI-powered biometric identity technology into its...

Ondato Media Screening Launch

Ondato Launches AI-Powered Adverse Media Screening for AML Compliance

by Corporate Compliance Insights
June 19, 2025

Global online ID verification provider Ondato has released an AI-powered adverse media screening feature that automatically scans online sources for...

Next Post

What is the FCPA? CCI Video Training Series Kicks off Today

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights