Mr. Goldmann

Security & Safety

Hotel Financial Security: Are Your Vendors Real?

By Peter Goldmann, President, FraudAware Hospitality

Despite the constant barrage of news about corporate theft and fraud, there are still far too many situations in which hospitality companies unknowingly pay criminally-minded individuals or phony companies posing as legitimate vendors.

How is it possible that "legitimate" companies have a private mailbox at the local UPS Store, a private residence, or even a prison address? Or that invoices a month apart with consecutive numbers both get paid? Or "invoices from a "vendor" whose address happens to match that of a company employee get paid?

To avoid such frauds your company must have in place tight controls for the...

Vendor Master Set-Up

The Vendor Master set-up process requires appropriate-and continuously enforced-segregation of duties.

Details: The individual or department authorizing a vendor should be in a department other than that of the team processing invoices and generating disbursements.

When establishing segregation of duties for the Vendor Master set-up, Christine Doxey, Vice President of Account Management at Apex analytix, a leading recovery audit consulting firm urges companies to include employees who are responsible for the business process and those who are provided with systems access.

Caution: Even where it may appear that segregation of duties exists, ensure that system access is controlled to allow use only by individuals authorized to process specific transactions.

In addition to the red flags of fraud mentioned above, says Doxey, any of the following details appearing in your payables process could indicate that your Vendor Master set-up process is vulnerable to financial abuse...

Additional controls to consider for the Vendor Master set-up process include:

Essential final step: Require vendors to complete a vendor profile form that provides information that further increases your ability to verify their legitimacy.

With a vendor profile, the vendor is required to provide certain documents that include sales tax certificate, city business license, names of key officers (to screen for conflict of interest), physical business address, daytime phone number, and other confirmable data. Example of a vendor profile form...

Continuous Monitoring

The process of continuously monitoring vendor transactions includes a review of the controls as noted above for the Vendor Master set-up process. The review should include selecting a sample of vendors as well as reviewing the supporting documentation for the validation of new vendors or changes of address.

All system-generated audit reports must be reviewed - not only for segregation of duties, but to determine if a vendor address has been fraudulently altered and then immediately changed back to the original address.

Important: Review invoice attributes throughout the process to determine if specific vendors may be perpetrating fraudulent activities. Common suspicious attributes...

Critical added control: Vendor Master clean-up. As part of its continuous monitoring process, the company should periodically review all duplicate vendors and initiate a vendor master clean-up procedure.

The clean-up process will alleviate duplicate vendors that have been set-up for the same vendor at the same address.

Example: There could be a slight difference in spelling or the use of abbreviation.

Key: It is much easier to control a smaller vendor master than a large one.

The Power of Real-Time Continuous Monitoring

Continuous monitoring on a real time basis quickly identifies potentially fraudulent vendors and determines whether your Vendor Master set-up controls are working properly. If there is a concern about a specific vendor, raise the issue with your internal controls or internal audit department after performing an evaluation of internal controls within the procure-to-pay process. If a control weakness is identified, immediately adjust the control and increase the sample size of the test. To choose the right continuous monitoring software vendor:

Peter Goldmann is the Developer of FraudAware/Hospitality, the first on-line fraud awareness training course for hospitality managers, supervisors and line employees. He is is the publisher of the monthly newsletters, White-Collar Crime Fighter and Cyber-Crime Fighter. His company, White-Collar Crime 101 LLC also is the developer of FraudAware/Hospitality, a customizable Web-based fraud awareness training course for managers, supervisors and line employees. He is a member of the Association of Certified Fraud Examiners, and The International Association of Financial Crimes Investigators. Mr. Goldmann can be contacted at 203-431-7657 or pgoldmann@wccfighter.com Extended Bio...

HotelExecutive.com retains the copyright to the articles published in the Hotel Business Review. Articles cannot be republished without prior written consent by HotelExecutive.com.

Receive our daily newsletter with the latest breaking news and hotel management best practices.
Hotel Business Review on Facebook
RESOURCE CENTER - SEARCH ARCHIVES
General Search:

DECEMBER: Hotel Law: The Biggest Challenges

Marjorie Obod

What steps do Hotel HR Managers need to take to determine if the Affordable Care Act (the “ACA”) requires that changes be made to the healthcare benefits offered to employees by January 1, 2015? Although the seasonal exception may apply to employees in the hotel industry, the fact that the definition for “full time” employees under the ACA lowers the threshold number of hours an employee needs to work to be considered a “full time” employee from 40 hours a week to 30 hours a week, requires that HR Managers recalculate whether the fifty (50) full-time of full-time equivalent employees cutoff has been met. In addition to factors that must be considered in determining if the ACA applies to your hotel, this article outlines what HR Managers need to do to prepare for the January 1, 2015 effective date of the ACA. Risks for non-compliance are outlined so that HR Managers are aware of how to act prudently in protecting businesses from unnecessary costs that can be avoided through understanding the law and taking responsive action. READ MORE

Banks Brown

As this article is being written, two armed police officers guard the front of the building that houses our law offices, and have been a fixture since the UN was in session over three weeks ago. The officers first appeared at the same time that government agents encased in flack jackets, bearing machine guns, and accompanied by canine units appeared on the streets outside of Grand Central Terminal and the New York Public Library. Last week also brought news that NYC’s Office of Emergency Management ran a training exercise that simulated an emergency response to a 10-kiloton nuclear device exploding in Times Square, which according to the simulation, killed 100,000 people instantly, took down skyscrapers for a half-mile radius and inflicted damage up to two miles away, all as a radiation cloud swept over the entire metropolitan region. No doubt, the nation’s safety and security are still critical issues. READ MORE

Andria Ryan

The problem of employee theft in hotels is an age-old problem. Businesses lose billions of dollars each year in employee theft. And hotels, by nature, present numerous opportunities for employee theft from guests and the house. Theft in a hotel can take many forms – from identity theft to credit card fraud to theft of merchandise and guest property. No employer hires an employee thinking that the employee is someday going to steal. Hotels need to take steps to prevent theft and be cautious in taking action against an employee after a suspected theft. Both have practice and legal implications. READ MORE

J.Thomas Cairns

New rules allowing the sale of condo hotel rooms as investment securities will affect not only the way that condo hotels are marketed, but the way they are structured. Mandatory participation by owners in a rental pool may allow hotel operators greater flexibility and control and ensure a critical mass of available room inventory and permit operation of a condo hotel as a true “common enterprise”. READ MORE

Coming Up In The January Online Hotel Business Review


Feature Focus
Mobile Technology: The Necessity for a Well-Defined Strategy
Mobile technology has altered the way the world does just about everything. With mobile devices in our hands (smart phones and tablets) and media and information up in The Cloud, the possibilities for immediate, worldwide, personal access are limitless. Smart mobile devices are dictating how we live our lives and as a result, these developments are game-changers for all businesses, but especially for service industries, including the hotel sector. These advancements are literally redefining how guests interact with a hotel in virtually every aspect of its operation, and savvy hoteliers who are implementing the latest mobile technologies and best practices in each critical channel will steal market share from their competitors, decrease dependency on their Online Travel Agents, and generate incremental revenues which will substantially increase their bottom line. A well-defined mobile strategy is no longer a "nice-to-have" but an essential weapon in an industry that is evolving at a blistering pace, and those operations that are slow to respond do so at their peril. The January Hotel Business Review will examine which mobile strategies some operators have adopted in order to meet these challenges, and will report on the solutions that are proving to be most advantageous for both companies and their guests.