SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Solution Overview                                                              WWW.SYMSURE.COM




Payroll Fraud Monitoring



Payroll Fraud                                                  Payroll Monitoring Solution
One constant across all businesses is Payroll. As one of the   The focus of the SymSure Payroll Fraud Monitoring solution
primary expenditures in many organizations, payroll is often   is to define and automate tests for the controls within the
the subject of error, fraud and theft. Variables such as       organization’s payroll processes.
complex tax regulations, time tracking, attendance,
                                                               As outlined in Figure 1, the organization is allowed to define
incentive based pay and changes in contractual salary          the control environment from employee records creation to
agreements, added to the high volume and frequency of          final payments to employees. Once completed, SymSure’s
transactions, make payroll an intricate task to process.       monitoring framework examines all master data and
                                                               transaction records to detect control breaches and alert the
According to the Association of Certified Fraud Examiners      relevant persons automatically.
(ACFE), companies lose 7% of their annual revenues to
occupational fraud.                                            SymSure Monitor is compatible with any source of data,
                                                               including ERP and bespoke applications. By continuously
                                                               monitoring the systems and applying a comprehensive
Occupational fraud and abuse schemes are numerous and
                                                               resolution workflow, the audit and compliance process
varied. For example:
                                                               becomes independent and auditable.
• Adding fictitious (ghost) employees to the payroll.          This solution is deployed to all the relevant stakeholders;
• Submitting dubious overtime claims.                          assigning them fraud mitigation tasks and ensuring that
• Claiming for unauthorized personal expenses.                 they are addressed in a timely manner. Financial and
• Making unauthorized changes to employee records,             business process managers can focus on optimizing
  earnings, rates, etc.                                        business performance and maximizing profits while
                                                               mitigating the risk of fraud.
Preventative Controls
A key feature of payroll controls monitoring in SymSure is the ability to detect erroneous, suspicious and fraudulent
activities before payments are made. This provides organization with valuable window of time to investigate exceptions
to prevent losses due to error or fraud.




                                         SymSure™ Framework
      Governance, Risk & Controls           Remediation – Routing, Alerts,         Reporting and Visualization –
       Definition and Monitoring             Follow-up, Escalations, etc.            Compliance, Regulatory,
                                                                                      Dashboards, Metrics
                                                      Employee
                                                     Information


                  Earnings                                                                 Payments


                                                       Payroll                             Statutory
                Deductions                           Processing                           Compliance


                Attendance
                                                                                          G/L Entries
                  & Leave


                                                 Loans & Advances




                                    Figure 1 – SymSure Monitoring Business Process




SymSure Workflow and Reporting

 When a breach occurs relevant alerts are triggered and a      Reports include:
 stringent remediation process is followed to ensure that      • Key payroll metrics
 high risk activities are addressed as stipulated by the       • Payroll expense trending
 business process owners.                                      • Bank Account and G/L reconciliations
                                                               • Best practice comparisons
 Other key aspects of the solution are the automation of      Standard dashboards are included in the framework:
 reporting and visualization of the control environment.      • Trending of results across dates
 SymSure automates key reporting for stakeholders, 1 – Payroll• Grouping by risk ranking
                                               Figure          Processing
 including statutory and regulatory bodies.                   • Grouping by status (new, pending, overdue, etc.)
                                                               • Comparisons across processes and users



                                                 2   SOLUTION OVERVIEW
Sample of Tests
Master Data Amendments
Changes in bank account numbers        Test to return all employees with changes in their bank account number.
Employees added                        Check for employees that have been added to the payroll over a period.
Employees removed                      Check for employees removed or made inactive from the payroll over a
                                       period.
Payroll codes added                    Reports all payroll codes that have been added to payroll over a period.
Changes in taxation methods            Reports any differences in the method used to calculate payroll taxes.
Reactivation of payroll codes          Highlights all payroll codes that were not being used for a period and
                                       are now reactivated.
Master Data Exceptions
Duplicate bank account details         Reports all cases of duplicated bank account details.
Missing bank account details           Reports all cases where bank account details are missing.
Potentially duplicated payroll codes   Return all cases where there are payroll codes appear to be duplicated
                                       based on description of usage.
Duplicate payments                     Reports all cases where there is a suspected duplicate payment to an
                                       employee.
Duplicate Tax ID                       Reports all cases where tax data appears to be conflicting and/or
                                       duplicated.
Tax ID Errors                          Reports all instances where the Tax ID does not conform to the code
                                       composition.
Segregation of Duties (SoD)
SoD conflicts                          Reports all cases where there are potential SoD conflicts.
Overtime Exceptions
Overtime abuse                         Return employees who have submitted overtime hours that are
                                       considered excessive.
Overtime rate exceptions               Return exceptions in the hourly rate used to calculate overtime
                                       payments.
Suspicious Activities
Active employees not paid              Returns all employees that are active and are not receiving a basic
                                       salary.
Payments after contract ends           Returns all employees being paid after their employment contract has
                                       ended.
Ghost employees                        Reports payments being made to employees that are not reconciling to
                                       other independent employee data sources.
Irregular payments                     Reports Employees with irregular payments. For example an employee
                                       being paid January to June and then August to December.
Changes in Basic Pay                   Returns detail report of changes to employee’s basic salaries and rates.
Inconsistent earnings or deductions    Earnings and deductions that do not conform to business rules. For
                                       example bonuses being paid more than x times per year or deductions
                                       entered with a negative amount (effectively an earning).




                                          3   SOLUTION OVERVIEW
Figure 1 – SymSure Monitoring Business Process


Benefits
  Business Challenge                                                 SymSure Solution
  STAKEHOLDERS’ REQUIREMENTS
  Escalating risk and compliance requirements                        • Provide enterprise wide definition and
                                                                       monitoring of controls and assurances that
                                                                       they are effectively implemented across all
                                                                       business processes

  AUTOMATION
  Automating control breach detection and remediation                • Detects breaches at the data source
                                                                     • Distributes results across the enterprise by
                                                                       customer-defined rules via dashboards,
                                                                       e-mail, SMS
                                                                     • Provides workflow for remediation including
                                                                       automatic detection of resolution of errors
                                                                     • Allows the user to define controls in multiple
                                                                       business processes with a consolidated view
                                                                     • Increases efficiency by making analytics
                                                                       repeatable with the ability to adjust tolerances
                                                                     • Business rules and parameters are
                                                                       customizable and new logic can be built by
                                                                       the organization
                                                                     • Monitoring can also be applied to business
                                                                       metrics
                                                                     • Issues are identified as soon as they occur

  INTEGRATION
  Seamlessly integrate into existing solutions                       • No changes required to underlying systems
                                                                       being monitored
                                                                     • Non-intrusive access to data and cannot
                                                                       amend source data
                                                                     • User and group security with LDAP support
                                                                     • Strong encryption

  PROCESS OPTIMIZATION
  Makes the process more efficient and less costly                   • Issues detected more timely
                                                                     • Lower recovery costs
                                                                     • Greater level of automation
                                                                     • Compliance and other reporting automatically
                                                                       generated
                                                                     • Knowledge and expertise captured in the
                                                                       control systems and made repeatable




Copyright © 2009 SymSure Limited.
All rights reserved. No part of this manual may be transmitted, in
any form or by any means (photocopying, electronic, mechanical,
recording or otherwise) or reproduced, stored in a retrieval
system, without permission in writing from the publisher.
All trademarks are the property of their respective companies.

                                                                                             CONTACT US:
                                                                                             + 1 416 530 4567
                                                                                             email: info@symsure.com

Contenu connexe

En vedette

Caricaturas220713 cc
Caricaturas220713 ccCaricaturas220713 cc
Caricaturas220713 ccORTIZ
 
Fausto210713
Fausto210713Fausto210713
Fausto210713ORTIZ
 
Naturalezaveracruzanaes [autoguardado]
Naturalezaveracruzanaes [autoguardado]Naturalezaveracruzanaes [autoguardado]
Naturalezaveracruzanaes [autoguardado]ORTIZ
 
Typography
TypographyTypography
Typographyrehmannb
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
NUBES DIALOGANDO
NUBES DIALOGANDONUBES DIALOGANDO
NUBES DIALOGANDOORTIZ
 
George Zimmerman 2ed degree murder affidavit
George Zimmerman 2ed degree murder affidavitGeorge Zimmerman 2ed degree murder affidavit
George Zimmerman 2ed degree murder affidavitCarter Cole
 
The AOL Way - Leaked Plan
The AOL Way - Leaked PlanThe AOL Way - Leaked Plan
The AOL Way - Leaked PlanCarter Cole
 
Convos for Companies
Convos for CompaniesConvos for Companies
Convos for CompaniesColin Brauns
 
Onlinetoekomst voor Netwerk (NCRV/EO)
Onlinetoekomst voor Netwerk (NCRV/EO)Onlinetoekomst voor Netwerk (NCRV/EO)
Onlinetoekomst voor Netwerk (NCRV/EO)guest8abb13
 

En vedette (16)

Caricaturas220713 cc
Caricaturas220713 ccCaricaturas220713 cc
Caricaturas220713 cc
 
Cv
CvCv
Cv
 
Trial 3
Trial 3Trial 3
Trial 3
 
42qu for 163
42qu for 16342qu for 163
42qu for 163
 
Fausto210713
Fausto210713Fausto210713
Fausto210713
 
Naturalezaveracruzanaes [autoguardado]
Naturalezaveracruzanaes [autoguardado]Naturalezaveracruzanaes [autoguardado]
Naturalezaveracruzanaes [autoguardado]
 
Treasury
TreasuryTreasury
Treasury
 
Typography
TypographyTypography
Typography
 
Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
NUBES DIALOGANDO
NUBES DIALOGANDONUBES DIALOGANDO
NUBES DIALOGANDO
 
George Zimmerman 2ed degree murder affidavit
George Zimmerman 2ed degree murder affidavitGeorge Zimmerman 2ed degree murder affidavit
George Zimmerman 2ed degree murder affidavit
 
The AOL Way - Leaked Plan
The AOL Way - Leaked PlanThe AOL Way - Leaked Plan
The AOL Way - Leaked Plan
 
Convos for Companies
Convos for CompaniesConvos for Companies
Convos for Companies
 
Treasury
TreasuryTreasury
Treasury
 
Rti act
Rti actRti act
Rti act
 
Onlinetoekomst voor Netwerk (NCRV/EO)
Onlinetoekomst voor Netwerk (NCRV/EO)Onlinetoekomst voor Netwerk (NCRV/EO)
Onlinetoekomst voor Netwerk (NCRV/EO)
 

Similaire à Sym Sure Payroll Monitoring

Sym Sure Revenue Assurance
Sym Sure Revenue AssuranceSym Sure Revenue Assurance
Sym Sure Revenue Assurancejjfrec07
 
Sym Sure Loan Portfolio
Sym Sure Loan PortfolioSym Sure Loan Portfolio
Sym Sure Loan Portfoliojjfrec07
 
Sym Sure Loan Portfolio
Sym Sure Loan PortfolioSym Sure Loan Portfolio
Sym Sure Loan Portfoliojjfrec07
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)Abid Khan
 
Whitepaper: Revenue leakage at Professional Services Organiztion
Whitepaper: Revenue leakage at Professional Services OrganiztionWhitepaper: Revenue leakage at Professional Services Organiztion
Whitepaper: Revenue leakage at Professional Services OrganiztionSevera PSA
 
White Paper on Revenue Leakage in Prossional Services Firm
White Paper on Revenue Leakage in Prossional Services FirmWhite Paper on Revenue Leakage in Prossional Services Firm
White Paper on Revenue Leakage in Prossional Services FirmSevera PSA
 
Managing The Less Visible Processes
Managing The Less Visible ProcessesManaging The Less Visible Processes
Managing The Less Visible Processesoniboks
 
Topic 3 Accounting System And Control
Topic 3 Accounting System And ControlTopic 3 Accounting System And Control
Topic 3 Accounting System And Controlmandalina landy
 
Payroll process presentation For Payroll Management Software
Payroll  process presentation For Payroll Management SoftwarePayroll  process presentation For Payroll Management Software
Payroll process presentation For Payroll Management SoftwareManish Mishra
 
Payroll process presentation
Payroll  process presentationPayroll  process presentation
Payroll process presentationManish Mishra
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and complianceMagdalena Matell
 
Saddling the Recuperating Force of Equine Treatment.docx
Saddling the Recuperating Force of Equine Treatment.docxSaddling the Recuperating Force of Equine Treatment.docx
Saddling the Recuperating Force of Equine Treatment.docxjoybrady84
 
Manoj Yadav- Resume
Manoj Yadav- ResumeManoj Yadav- Resume
Manoj Yadav- ResumeManoj Yadav
 
5 Reasons - Payroll System Important for All Companies
5 Reasons - Payroll System Important for All Companies5 Reasons - Payroll System Important for All Companies
5 Reasons - Payroll System Important for All CompaniesNYGGS Automation Suite
 

Similaire à Sym Sure Payroll Monitoring (20)

Sym Sure Revenue Assurance
Sym Sure Revenue AssuranceSym Sure Revenue Assurance
Sym Sure Revenue Assurance
 
Sym Sure Loan Portfolio
Sym Sure Loan PortfolioSym Sure Loan Portfolio
Sym Sure Loan Portfolio
 
Sym Sure Loan Portfolio
Sym Sure Loan PortfolioSym Sure Loan Portfolio
Sym Sure Loan Portfolio
 
What is a payroll service provider.pptx
What is a payroll service provider.pptxWhat is a payroll service provider.pptx
What is a payroll service provider.pptx
 
What is a payroll service provider.pdf
What is a payroll service provider.pdfWhat is a payroll service provider.pdf
What is a payroll service provider.pdf
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Payroll Services
Payroll ServicesPayroll Services
Payroll Services
 
Hcl indian payroll_3
Hcl indian payroll_3Hcl indian payroll_3
Hcl indian payroll_3
 
Whitepaper: Revenue leakage at Professional Services Organiztion
Whitepaper: Revenue leakage at Professional Services OrganiztionWhitepaper: Revenue leakage at Professional Services Organiztion
Whitepaper: Revenue leakage at Professional Services Organiztion
 
White Paper on Revenue Leakage in Prossional Services Firm
White Paper on Revenue Leakage in Prossional Services FirmWhite Paper on Revenue Leakage in Prossional Services Firm
White Paper on Revenue Leakage in Prossional Services Firm
 
The Financial Advantage of Payroll Management Services!
The Financial Advantage of Payroll Management Services!The Financial Advantage of Payroll Management Services!
The Financial Advantage of Payroll Management Services!
 
Managing The Less Visible Processes
Managing The Less Visible ProcessesManaging The Less Visible Processes
Managing The Less Visible Processes
 
Topic 3 Accounting System And Control
Topic 3 Accounting System And ControlTopic 3 Accounting System And Control
Topic 3 Accounting System And Control
 
Payroll process presentation For Payroll Management Software
Payroll  process presentation For Payroll Management SoftwarePayroll  process presentation For Payroll Management Software
Payroll process presentation For Payroll Management Software
 
Payroll process presentation
Payroll  process presentationPayroll  process presentation
Payroll process presentation
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Governance risk and compliance
Governance risk and complianceGovernance risk and compliance
Governance risk and compliance
 
Saddling the Recuperating Force of Equine Treatment.docx
Saddling the Recuperating Force of Equine Treatment.docxSaddling the Recuperating Force of Equine Treatment.docx
Saddling the Recuperating Force of Equine Treatment.docx
 
Manoj Yadav- Resume
Manoj Yadav- ResumeManoj Yadav- Resume
Manoj Yadav- Resume
 
5 Reasons - Payroll System Important for All Companies
5 Reasons - Payroll System Important for All Companies5 Reasons - Payroll System Important for All Companies
5 Reasons - Payroll System Important for All Companies
 

Dernier

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Sym Sure Payroll Monitoring

  • 1. Solution Overview WWW.SYMSURE.COM Payroll Fraud Monitoring Payroll Fraud Payroll Monitoring Solution One constant across all businesses is Payroll. As one of the The focus of the SymSure Payroll Fraud Monitoring solution primary expenditures in many organizations, payroll is often is to define and automate tests for the controls within the the subject of error, fraud and theft. Variables such as organization’s payroll processes. complex tax regulations, time tracking, attendance, As outlined in Figure 1, the organization is allowed to define incentive based pay and changes in contractual salary the control environment from employee records creation to agreements, added to the high volume and frequency of final payments to employees. Once completed, SymSure’s transactions, make payroll an intricate task to process. monitoring framework examines all master data and transaction records to detect control breaches and alert the According to the Association of Certified Fraud Examiners relevant persons automatically. (ACFE), companies lose 7% of their annual revenues to occupational fraud. SymSure Monitor is compatible with any source of data, including ERP and bespoke applications. By continuously monitoring the systems and applying a comprehensive Occupational fraud and abuse schemes are numerous and resolution workflow, the audit and compliance process varied. For example: becomes independent and auditable. • Adding fictitious (ghost) employees to the payroll. This solution is deployed to all the relevant stakeholders; • Submitting dubious overtime claims. assigning them fraud mitigation tasks and ensuring that • Claiming for unauthorized personal expenses. they are addressed in a timely manner. Financial and • Making unauthorized changes to employee records, business process managers can focus on optimizing earnings, rates, etc. business performance and maximizing profits while mitigating the risk of fraud.
  • 2. Preventative Controls A key feature of payroll controls monitoring in SymSure is the ability to detect erroneous, suspicious and fraudulent activities before payments are made. This provides organization with valuable window of time to investigate exceptions to prevent losses due to error or fraud. SymSure™ Framework Governance, Risk & Controls Remediation – Routing, Alerts, Reporting and Visualization – Definition and Monitoring Follow-up, Escalations, etc. Compliance, Regulatory, Dashboards, Metrics Employee Information Earnings Payments Payroll Statutory Deductions Processing Compliance Attendance G/L Entries & Leave Loans & Advances Figure 1 – SymSure Monitoring Business Process SymSure Workflow and Reporting When a breach occurs relevant alerts are triggered and a Reports include: stringent remediation process is followed to ensure that • Key payroll metrics high risk activities are addressed as stipulated by the • Payroll expense trending business process owners. • Bank Account and G/L reconciliations • Best practice comparisons Other key aspects of the solution are the automation of Standard dashboards are included in the framework: reporting and visualization of the control environment. • Trending of results across dates SymSure automates key reporting for stakeholders, 1 – Payroll• Grouping by risk ranking Figure Processing including statutory and regulatory bodies. • Grouping by status (new, pending, overdue, etc.) • Comparisons across processes and users 2 SOLUTION OVERVIEW
  • 3. Sample of Tests Master Data Amendments Changes in bank account numbers Test to return all employees with changes in their bank account number. Employees added Check for employees that have been added to the payroll over a period. Employees removed Check for employees removed or made inactive from the payroll over a period. Payroll codes added Reports all payroll codes that have been added to payroll over a period. Changes in taxation methods Reports any differences in the method used to calculate payroll taxes. Reactivation of payroll codes Highlights all payroll codes that were not being used for a period and are now reactivated. Master Data Exceptions Duplicate bank account details Reports all cases of duplicated bank account details. Missing bank account details Reports all cases where bank account details are missing. Potentially duplicated payroll codes Return all cases where there are payroll codes appear to be duplicated based on description of usage. Duplicate payments Reports all cases where there is a suspected duplicate payment to an employee. Duplicate Tax ID Reports all cases where tax data appears to be conflicting and/or duplicated. Tax ID Errors Reports all instances where the Tax ID does not conform to the code composition. Segregation of Duties (SoD) SoD conflicts Reports all cases where there are potential SoD conflicts. Overtime Exceptions Overtime abuse Return employees who have submitted overtime hours that are considered excessive. Overtime rate exceptions Return exceptions in the hourly rate used to calculate overtime payments. Suspicious Activities Active employees not paid Returns all employees that are active and are not receiving a basic salary. Payments after contract ends Returns all employees being paid after their employment contract has ended. Ghost employees Reports payments being made to employees that are not reconciling to other independent employee data sources. Irregular payments Reports Employees with irregular payments. For example an employee being paid January to June and then August to December. Changes in Basic Pay Returns detail report of changes to employee’s basic salaries and rates. Inconsistent earnings or deductions Earnings and deductions that do not conform to business rules. For example bonuses being paid more than x times per year or deductions entered with a negative amount (effectively an earning). 3 SOLUTION OVERVIEW
  • 4. Figure 1 – SymSure Monitoring Business Process Benefits Business Challenge SymSure Solution STAKEHOLDERS’ REQUIREMENTS Escalating risk and compliance requirements • Provide enterprise wide definition and monitoring of controls and assurances that they are effectively implemented across all business processes AUTOMATION Automating control breach detection and remediation • Detects breaches at the data source • Distributes results across the enterprise by customer-defined rules via dashboards, e-mail, SMS • Provides workflow for remediation including automatic detection of resolution of errors • Allows the user to define controls in multiple business processes with a consolidated view • Increases efficiency by making analytics repeatable with the ability to adjust tolerances • Business rules and parameters are customizable and new logic can be built by the organization • Monitoring can also be applied to business metrics • Issues are identified as soon as they occur INTEGRATION Seamlessly integrate into existing solutions • No changes required to underlying systems being monitored • Non-intrusive access to data and cannot amend source data • User and group security with LDAP support • Strong encryption PROCESS OPTIMIZATION Makes the process more efficient and less costly • Issues detected more timely • Lower recovery costs • Greater level of automation • Compliance and other reporting automatically generated • Knowledge and expertise captured in the control systems and made repeatable Copyright © 2009 SymSure Limited. All rights reserved. No part of this manual may be transmitted, in any form or by any means (photocopying, electronic, mechanical, recording or otherwise) or reproduced, stored in a retrieval system, without permission in writing from the publisher. All trademarks are the property of their respective companies. CONTACT US: + 1 416 530 4567 email: info@symsure.com