Procurement and Contract Fraud is usually off -the books- and difficult to detect and investigate

In this interconnected, interdependent global world, the need for contracting procurement of any goods or services is strong and indispensable. However, the benefits of this feature notwithstanding, there are several loopholes in the procurement and contracting activity. Outsourcing and contracting, by their very nature, are vulnerable to fraud. Fraud can happen at any stage of the procurement and contract process.

Common sources of procurement and contract frauds

A very common reason for procurement and contract frauds is when vendors and contractors collude with employees that are in charge of purchasing and administrating contracts. Another source of these procurement and contract frauds is the employee on whose request goods or services are purchased. Yet other procurement and contract frauds happen when solicited contractors work hand in glove with the bidding contractors. The Association of Certified Fraud Examiners (ACFE) estimates that as much as five percent of a business’ revenue is lost to procurement and contract frauds.

Since most of these procurement and contract frauds are based on off-the-books records, they go unnoticed for a good part, despite the fact that governments the world over have deployed scores of auditors and investigators with complete oversight of detecting and controlling procurement and contract frauds.

Plugging the loopholes

The many gaps in the contacting and procuring process need to be plugged if procurement and contract frauds have to be prevented. In addition, once these procurement and contract frauds happen, there need to be a few mechanisms to ensure that the procurement and contract frauds investigation is done thoroughly. Only this ensures that procurement and contract frauds do not go on to cause the kind of damage they normally do.

The first step to detecting, preventing and getting procurement and contract frauds right is to gain an understanding of the nature of the fraud. This understanding is the basis to gaining insights on how to deal with procurement and contract frauds. Many small and medium scale businesses suffer from procurement and contract frauds because are ill-equipped to deal with procurement and contract frauds, lacking as they do the knowledge needed to understand the nature of this activity.

A valuable learning session on procurement and contract frauds

A webinar from Compliance4All, a leading provider of professional trainings for all the areas of regulatory compliance, will impart lessons on how to understand deal with procurement and contract frauds. John E. Grimes III, who has over 45 years of law enforcement, criminal investigation, loss prevention, fraud examination experience, and teaching, will be the speaker at this session. In order to gain knowledge of the way in which the system of procurement and contract works and to understand how to prevent frauds, please register for this webinar by logging on to http://www.compliance4all.com/control/w_product/~product_id=501272LIVE?Wordpress-SEO Since the foundation to detecting and preventing procurement and contract frauds is a proper understanding of the various procurement and contract fraud hazards and schemes that are responsible for these frauds; John will start with giving offering knowledge of this aspect. He will explain which steps in the procurement chain procurement and contract frauds are most likely to occur.

Best practices for dealing with procurement and contract frauds

John will offer an understanding and awareness of the procurement fraud hazards that businesses or organizations that purchase materials are vulnerable to. He will also equip them with strategies that are aimed at detecting and preventing procurement and contract frauds, which will prevent them from sustaining huge losses. Also offered at this learning session is a set of proven best practices in investigative strategies that helps look into allegations of procurement and contract frauds.

At this highly valuable learning session on procurement and contract frauds, John will cover the following areas:

  • Basic Steps in the Procurement Process
  • Procurement Policies and Procedures
  • Conflict of Interest Policy
  • The various Procurement and Contract Fraud Hazards and what step in the procurement chain they occur.
  • Fraud Hazards in the Requirement Step
  • Conflict of Interest
  • Bribery, Kickbacks
  • Fraud Hazards in the Section Step
  • Bid Manipulation
  • Sole Source Awards
  • Fraud Hazards in the Post Award Step
  • Change Order Fraud
  • Phantom Employees and Equipment
  • Failure to meet Contract Specifications
  • Product Substitution
  • Fraud Hazards in the Payment Step
  • False, Inflated, or duplicate invoices
  • Three Cases Studies involving Conflict of Interest, Bribery, and Kickbacks.
  • Preventing and Detecting Procurement and Contract Fraud
  • Preliminary Steps
  • Pre-Award
  • Post Award
  • Conducting Procurement and Contract Fraud Investigations
  • Remedies

http://www.fraudconference.com/uploadedfiles/fraud_conference/content/course-materials/presentations/22nd/ppt/5a_paul_zikmund.pdf

https://www.cips.org/Documents/Knowledge/Chapter_12_Guile%20Procurement%20Fraud.pdf

http://www.acfe.com/topic.aspx?id=2722

Today’s Pre control and Statistical Process Control (SPC)

Pre control and Statistical Process Control (SPC) are key tools for determining the process that goes into a product.

SPC is a key ingredient of Quality. It is an important step in reducing nonconformities and defects in any manufacturing process. SPC charts help to detect assignable causes of a process change in a timely fashion. SPC helps to identify root causes and take corrective actions before the development of the product has reached such a stage that carrying changes out is neither practicable nor useful.

Examples of process changes that SPC helps to detect include trends, shifts and variation. Three items are needed for SPC to meet its goal:

o  A system that measures effectiveness in real-time

o  Tolerance that is practical and is connected to customer keenness and satisfaction

o  A dial indicator that comes with an anticipated response.

All these help SPC to determine whether a process is stable and requires no adjustment, is incapable of performing its functions altogether, or is deviating but capable.

And now, pre-control

Pre-control, on the other hand, inspects the units and adjusts the process and the succeeding sampling procedures assuming where the measurements are placed in relation to the specification limits. The focus of pre-control is individual measurements.

It uses a set of probabilities, based on assumed distributions and the location of the process, to estimate where there is a justification for the process adjustments. Since decisions concerning pre-control are based broadly, i.e., on the area in which the measurements; it obviates the need for charting, as it is very responsive to the process signals right from the start.

SPC or pre-control?

There are arguments for and against the use of SPC and pre-control as an effective means of ensuring that the process is right and that it results in the desired quality for the product.

At a webinar that is being organized by Compliance4All, a leading provider of professional trainings for all the areas of regulatory compliance, the speaker, Jd Marhevko, who has been involved in Operations and Quality/Lean/Six Sigma efforts across a variety of industries for more than 25 years, will explain all the aspects of pre-control. To hear her perspective of pre-control, please register for this webinar by visiting http://www.compliance4all.com/control/w_product/~product_id=501074?Linkedin-SEO

What makes this webinar special is that it has consistently ranked in the top 1-5% at previous conferences at more than five venues. It was featured in ASQ QMD’s special edition of the Quality Management Forum’s 2015 Spring edition (ASQ-QM.org). A webinar of this topic was provided in 2015 via the ASQ QMD Linkage Technical Committee to over 1300 respondents through the IMA and ASQ QMD.

Tools needed for pre-control

At this hour-long session, Jd will explain all the elements of pre-control in Quality. she will show to participants the way of drafting and creating a pre-control chart. She will run a process in which to model the next steps and decisions.

The aim of this session is to equip participants with the knowledge needed for reducing the complexity of the system and bringing about an improvement in the effectiveness and efficiency of their Quality Management Systems.

A session packed with interaction and practical application of principles

A major component of this webinar on SPC and pre-control is that Jd will share the result of case studies. The knowledge gained at this webinar can be applied immediately at their work in respect to the following:

–       Measurement System Analysis (MSA): Jd will conduct a high level overview of MSA. This will help the participants get a grasp of the need for putting an effective measuring system in place ahead of implementing pre-control

–       Cpk Overview: To help participants gain baseline capability in advance of implementation of pre-control, a high level Cpk overview will be conducted

–       Normal Distribution: The way in which the cumulative distribution function of the normal distribution is to be used for estimating and establishing the zones on a pre-control chart

–       Pre-Control Chart: Jd will show participants how to apply the concepts listed above with the use of a mock pre-control chart where the process will be demonstrated based on the “go/no go” zones that are established.

At this webinar, Jd will cover the following areas of pre-control:

o  Reduce process complexity and minimize risk

o  Increase affectivity of a Core Tool

o  Increase personnel compliance in proactive process management.

https://www.isixsigma.com/tools-templates/control-charts/using-control-charts-or-pre-control-charts/

http://www.symphonytech.com/articles/pdfs/precontrol.pdf

http://www.winspc.com/what-is-spc/ask-the-expert/400-pre-control-no-substitute-for-statistical-process-control

http://www.qualitymag.com/articles/86794-pre-control-may-be-the-solution

Optimizing the use of Microsoft Outlook

From the time of its introduction by Microsoft in the late 1990’s, Microsoft Outlook has been a standard package for innumerable organizations around the world. Part of the world famous Microsoft Office system, Microsoft Outlook is a very popular personal information manager.

In the two decades of its launch, Microsoft Outlook has undergone various improvements. The additions that are made to it are aimed at improving user experience and adding features that go on to make it more useful for users.

Needs to be put to full use

Despite its being in the market for such a long time, many users do not know the full extent to which Microsoft Outlook can be put. When explored fully, Microsoft Outlook offers a bouquet of features that go beyond just sending and receiving mails and making appointments on the calendar.

The ways of optimizing Microsoft Outlook for office use and making it a more useful personal information manager will be the content of a webinar that is being organized by Compliance4All, a leading provider of very cost-effective professional trainings in all the areas of regulatory compliance.

Understand the ways of optimizing the use of Microsoft Outlook

At this webinar, Mike Thomas, a subject matter expert in a range of technologies including Microsoft Office and Apple Mac, who is a Fellow of The Learning and Performance Institute and has worked with and for a large number of global and UK-based companies and organizations across a diverse range of sectors, will be the speaker.

To get a better understanding of how to put your Microsoft Outlook package to much better use, please register for this webinar by logging on to

http://www.compliance4all.com/control/w_product/~product_id=501148LIVE?Wordpress-SEO

Control Microsoft Outlook; don’t let it control you

Mike will offer simple and easy guidance on how to put Microsoft Outlook to far greater use than people are normally used to. Microsoft Outlook. The point about Microsoft Outlook is that if it is put to the right use, it facilitates a number of functions that the user will find thorough useful and beneficial.

If it is not, Microsoft Outlook has the potential to throw the user’s work schedule into disorder, as many of its functions can confuse the user who does not know how to use it to the maximum.

Mike will show participants of this webinar the simple way of controlling Microsoft Outlook, rather than letting Microsoft Outlook control the user. He will cover the following areas at this session:

o  The 4D’s of email management

o  Configure Outlook for distraction free productivity

o  How to use Rules to automate email processing

o  How to use Quick Steps to automate a series of actions

o  The benefits of Tables

o  Creating data visualizations using Shapes and SmartArt

o  Converting emails into Tasks

o  Using Categories to tag emails, calendar items and Tasks

o  Using Views to display information in a way that suits you.

It is necessary to understand the nature of the differences between GMP and GLP

Differences between GMP and GLP are important to understand for professionals who work in areas which involve these two different, yet related practices. Since the two appear somewhat similar in terms of their application and nomenclature; there is considerable scope for misunderstanding and confusion.

It is necessary to understand the nature of the differences between GMP and GLP because those who are involved in these two practices have different roles to perform in the course of their work.

 

Differences between GMP and GLP are pronounced in laboratory testing

The differences between GMP and GLP are pronounced in laboratory testing, in which they serve different purposes.

This is how one can understand the differences between GMP and GLP: While GLP is concerned with preclinical development; GMP is related to manufacturing. In other words, GLP is based on study, while GMP is based on process.

Another area of understanding the differences between GMP and GLP is that the chief purpose behind designing GMP is to show to the regulatory bodies such as the FDA or the EPA whether or not individual lots or batches of any regulated manufactured product have met the criteria for manufacturing set out by these agencies.

On the other hand, the core purpose of GLPs is the protection of the integrity of scientific data. They are meant to provide regulatory agencies with data that helps the agencies scrutinize and audit the scientific validity of research studies.

Not so clear-cut in the areas of validation

However, the differences between GMP and GLP are not so clear-cut in the area of the application of validation. There is some lack of clarity on which areas of validation studies should be done under GLP and which, under GMP. When it comes to this area, it all depends on what is being validated. This factor dictates whether it is a GMP or a GLP is to be applied, based on what the professional considers appropriate for the occasion.

GMP precedes GLP

The fact that GMP precedes GLP is a commonsensical way of understanding the differences between GMP and GLP. Generally, GMP governs the earlier stage of testing. The testing of release lots and the proof of their conformity to standards set out by the regulatory bodies are done by GMP.

The next stage of this process, namely the testing of these products’ safety and efficacy, is done as part of GLP. This is another aspect at which the differences between GMP and GLP can be highlighted.

 

 

 

A learning session

Compliance4All, a leading provider of professional trainings for areas of regulatory compliance, will be organizing a webinar, at which the differences between GLP and GMP will be explained. Joy McElroy, a senior professional in the pharmaceutical industry, will be the speaker at this learning session.

To enroll for this webinar, just visit http://www.compliance4all.com/control/w_product/~product_id=501116LIVE/~sel=LIVE/~Joy_McElroy/~GLPs:_How_are_they_Associated_with_GMPs_and_SOPs

At this webinar, while explaining the difference between GLPs and GMPs and how they are associated with SOPs; Joy will cover the following areas:

o  What are Good Laboratory Practices

o  Why were they created

o  What is the objective of GLPs and how are they associated with GMPs and SOPs

o  Statistical Procedures for data Evaluation

o  Instrumentation Validation

o  Analytical and laboratory Certification

o  Documentation and Maintenance of Records

o  Consequences of Noncompliance

o  Disqualification and Reinstatement

Making Big Data big in terms of effectiveness

Our world today is unthinkable without data. We seem to be flooded by it. Day in and day out, the world processes trillions of bytes. Big Data seems to be everywhere and has compounded our already heavy reliance on data.

But has this proliferation of data made any significant difference to our lives? Has it made our business decision-making any more effective or insightful? What has this surfeit of data meant in terms of usefulness and value? Does reliance on Big Data necessarily mean better business decisions?

Making sense of data

Translating tomes and tomes of this data into something that is useful is a big challenge in today’s world. This is a capability that needs to be translated into tangible, competitive strength, if quality and compliance have to be improved. Data Management and Quality metrics are important tools that can help in a host of important functions such as forecasting, resource allocation, risk management, decision making, and continuous improvement.

Susanne Manz, who is an accomplished leader in the medical device industry emphasizing on quality, compliance, and Six Sigma, will impart the insightfulness needed to make sense of Big Data to participants of a webinar that Compliance4All, a highly popular provider of professional trainings for all the areas of regulatory compliance, is organizing.

In order to understand what perceptiveness can be inculcated into understanding and analyzing Big Data to aid in decision-making, just log on to http://www.compliance4all.com/control/w_product/~product_id=501044 to register.

Absolutely useful aid in decision-making for management review

Management Review, among the fundamental requirements of a suitable Quality System; relies on timely, accurate and complete information to make risk-based decisions. An organization that is immersed in data that leads nowhere in helping it with the critical information to ensure product safety and effectiveness has no use from this kind of Big Data.

Organizations need to have not heaps of data, but what in it gives them the ability to measure to understand quality, compliance, and customer satisfaction. This is the test of the accuracy, completeness and timeliness of their data. The aim of this webinar is to help participants develop the data management processes that help them optimize their quality system efficiency and effectiveness.

Susanne will cover the following areas at this webinar:

o  What metrics are needed for quality and compliance success

o  Sources of data

o  Analytics capabilities

o  Descriptive and Predictive Data

o  Structure and process for managing data

o  Data Governance

o  Data Preparation

o  Using data for forecasting, continuous improvement, and management review.

Elements of a Cyber Security Incident Response Program

A Cyber Security Incident Response Program (CSIRP) or a Cyber Security Incident Response Team (CSIRT) that anticipates and neutralizes a cyber-incident is a critical need for organizations, because an Internet or network security breach results in loss of valuable data, as well as several resources and the organization’s reputation, and could potentially invite lawsuits.

While putting a CSIRP in place, the management has to take into consideration the fact that Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. It has to decide who in the organization has the key responsibility towards developing an information security governance program. It has to also review existing Information Security policies and standards to gauge their sufficiency vis-à-vis industry best practices, and update them as needed, while meeting the requirements set out by compliance regulations.

A webinar to help understand CSIRP

The effective ways of doing this will be the focus of a webinar that is being organized by Compliance4All, a highly popular provider of professional trainings for all areas of regulatory compliance. Dr. (Ms.) Michael Redmond, CEO and Lead Consultant for Redmond Worldwide, who served as an Adjunct Professor for Continuity Management at New York University and the Master’s program at John Jay College, will be the speaker at this webinar. More details of this course can be had from http://www.compliance4all.com/control/w_product/~product_id=500982LIVE/~sel=LIVE/~Ms.%20Michael_Redmond/~Developing_a_Cyber_Incident_Response_Program

Scope of the training session

Michael will teach participants of this webinar the ways by which their organizations can put a CSIRP in place. She will help them establish Key Performance Indicators (KPI) to determine if their CSIRP meets business objectives and operational metrics for effecting process improvement. She will also show participating organizations the ways of tailoring and enhancing their existing CSIRP and requirements for specific audiences based on the sensitivity of the information for which they are granted based on policies.

Other important learning outcomes offered at this session include how to strengthen IT Risk Management, which involves integrating information security risk management with Enterprise Risk Management and requires using common business terminology, congruent methods, and common or linked risk register, and establishing mechanisms for risk acceptance.

Ms. Redmond will also explain to participants how they can build an IS regulation review process, schedule regulation requirements and put in place a set of procedures that help to deal with a breach, malware and related issues. This webinar is of immense value to professionals who hold positions such as Information Security Managers, CEO, CIO, CFO, CSO, Technology Managers, and Auditors.

Michael will cover the following areas at this webinar:

o  Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program

o  Outlining the critical actions to take if an event affects the company or its partners

o  Understanding an organization’s susceptibility to a Cyber Attack

o  Cyber Incident Response: Getting started, research, training, testing and maintaining