SlideShare a Scribd company logo
Don’t like risk? Stop
gambling in your
accounts payable
and start to take
systematic control.
Presented by Mitzi Mitchell




                              11/7/2012   1
Agenda

Company and Payables Environment Overview

Risk Program Highlight

Case Study #1 Payment Approval

Case Study #2 3-Way Match Exceptions and Long Approval Time

Case Study #3 Out-of-Pocket Expenses

Case Study #4 Duplicate Payments/Invoices

Case Study #5 Fraud Monitoring Program




                              Confidential and Proprietary Information of T-Mobile USA   2
Company Overview
Headquarter: Bellevue, WA
Customers: 30 million
Coverage: USA and PR
Largest 4G Network
Value Plans




                            Confidential and Proprietary Information of T-Mobile USA   3
Payables Environment Overview
 No. of countries serviced: 1 with some Euro transactions
 Main P2P technologies used:
        OCR IBM Filenet “Doculink”,
        EDI, ERS in SAP,
        ACH & Merchant Card through JPMC Xign,
        Expenses & Travel through Concur
        Duplicate analysis through APEX
 Main ERP: SAP
 Volume of Annual AP Invoices:
        500K paper, 1 million electronic invoices
 # of vendors – 40K, # of employees – 36K
 $16B in annual payment
 One thing we are most proud of:
        We employ best practices for duplicate prevention.
        External recovery audits are now standard operations.



                                  Confidential and Proprietary Information of T-Mobile USA   4
Risk Program Highlight                                            COSO Cube -
                                                                    Internal Controls
                                                                    Framework


Supporting     Fraud       Leverage
 Internal                 Third Party
Customers     Analytics    Vendors




 Control                  Cover AP,
              Monthly       TE&C,
 Design                   Treasury &
Evaluation   Scorecard
                            Others




 Testing     Dept Risk     Supports
                             Gap
 Program      Training    Remediation




                                    Confidential and Proprietary Information of T-Mobile USA   5
P2P Risk Objectives                                                Tiered Control
                                                                      Structure
 All transactions are         Obtain most
     recorded and        economical value out                           SOX/BUS Controls
reflected on financial    of the P2P process.
 statement correctly.          (operations)


                                                                              Key Controls
 Prevent fraud- no
                          Maintain cash flow
 fraudulent vendor,
                             objectives.
employees , invoices,
                            (operations)
    expenses etc.                                                     Operational Controls



                           Do not over pay,
Pay correct amount,      double pay, or pay for
pay correct vendor.      goods or services not
                            yet delivered.




                                         Confidential and Proprietary Information of T-Mobile USA   6
Controls Definition                                            Examples
                                                               Segregation of duties
                                                               System validation
         Apply to all                                          3 way match
                          Can be consistently
   transactions/process
                            performed and
    in scope to achieve
                              monitored                        Invoice entry rules
        the objective
                                                               Invoice Post Audit
                                                               Approval of PO and
                                                               invoices and vendor setup
                                                               T&E, Corporate Card,
                                                               Signing Authority Policies
                               Evidence of                     Expense Audit
   Can be preventative
                          performance need be
      or detective
                                retained




                                   Confidential and Proprietary Information of T-Mobile USA   7
Case#1- Payment and Vendor
Approval
       No consistent approval requirements
           throughout the enterprise for
               invoices and vendors



       Automation/ Policy/Process Change/
                   Outsource




         Cost, Enterprise Impact, Buy-In.



                       Confidential and Proprietary Information of T-Mobile USA   8
Case#1-Solution




                              Broadly distributed approval
                             authority implemented through
                                       HR system.                          Manual approval validation
                                                                             where not automated.
 Approval Authority Policy
                               Systematic feed of SAP HR
                                data to all expenses, PO,
   Vendor Setup Policy
                              invoice processing systems.                Manual approval validation for
                                                                                vendor setup.
                             Vendor Approval Workflow – to
                                        come




                                           Confidential and Proprietary Information of T-Mobile USA       9
Case#2- 3 Way Match
Exceptions, Long Approval Time
              • Aged, large $ and volume of 3 way match
                exceptions. Goods receipt are not
   Issue        performed.
              • Long approval timing for non-PO invoices.



              • Automation/Policy/Process
  Options       Change/Outsource




              • Audience size, resource availability,
 Challenges     approach.




                            Confidential and Proprietary Information of T-Mobile USA   10
Case#2-Solution




                                                                  Outstanding open
                          Require POs for all
        EDI –                                                 payables communication
                          purchases, switch
Large volume, high $                                            for unmatched items.
                          vendor set up and
vendors targeted first.                                       Dedicated contacts from
                           approval timing.
                                                              each business segment.
                                                                    SLA involved.




                                   Confidential and Proprietary Information of T-Mobile USA   11
Case #3 – Out-of-Pocket Expenses

           Large $ spend on personal card. Evasion of vendor
            setup approval, PO/Invoice approval requirement.
                       Loss of credit card rebate.




                Policy/Automation/Outsourcing/Process




              Resistance against enforcement . Culture that
           allows local decisions and flexibility. Ownership for
                    enforcement can not be decided.



                             Confidential and Proprietary Information of T-Mobile USA   12
Case#3-Solution




                         Policy change to                          Monthly
 Systematic triggers
                        mandate corporate                     communication for
   implemented for
                          card usage vs.                        large $ out-of-
 high $ out-of-pocket
                          personal card                          pocket spend
      expenses.
                              usage.                              employees.




                               Confidential and Proprietary Information of T-Mobile USA   13
Case Study #4 – Duplicate
Payments/Duplicate Invoices

                  Duplicate Payments




          Automation/Policy/Process/Outsource




                    Labor intensive




                            Confidential and Proprietary Information of T-Mobile USA   14
Case#4 Solution




 Using recovery audit                                         Systematic prevention
                           Implemented invoice
  firms. Implemented                                             for SAP invoice
                          numbering convention.
   five year duplicate                                               posting.
                             Implemented daily
 payment review and
                             manual review for
statement audit. (First                                         APEX First Strike for
                            possible duplicates.
     and second tier)                                            additional review.




                                       Confidential and Proprietary Information of T-Mobile USA   15
Case #5 – Fraud Monitoring
Program
       Unusual transactions within T&E system. High ranking
        employees sharing passwords with Administrative
                 Assistant. Possible fake receipts.

             No process in place to evaluate vendor risks.




               Automation, Policy, Process, Outsource




          Data mining expertise needed. Multiple databases.
               Customer service vs. enforcer mentality.

       Labor intensive analysis with no guarantee of results.
       No control over vendor contract or relationship. Large
                   volume of results for analysis.




                                     Confidential and Proprietary Information of T-Mobile USA   16
Case #5 Solution




                              Lowered credit line for all
 T&E Concur Reporting.         corporate card holders.                   T&E: 100% audit on all AA
 JPMC Level 3 Activities                                                expenses. Periodic review of
      Reporting.                                                          T&E database for fraud.
                               Provided enterprise
                              management expenses
                                                                       AP: Periodic vendor/employee
                                approval training.
                                                                              match exercise.
APEX First Strike Analytics                                             Periodic vendor risk analysis
  Vendor Risk Analysis.                                                   using APEX First Strike




                                            Confidential and Proprietary Information of T-Mobile USA    17
Lessons Learned
                                          No sure fire
                                            way to
                                           address
      Risk Strategies                        each
                                           situation


*Automation of approval or
workflow processes                                 Resource
*Policy changes                                    priority is
                                                   always an
                                                     issue
*Process, personnel changes
*Training

                                           Consultant
                                            vs. Cop?




                              Confidential and Proprietary Information of T-Mobile USA   18
Contact information:

425-383-5933
qin.mitchell@t-mobile.com




Thank you!

More Related Content

PDF
Challenges financial information_systems_a_clarke
PDF
MNP – Network Implementation & Systems Integration
PDF
Csu second quarter results
PDF
Strategies For Growth Post Sepa Deutsche Brendan Reilly
PDF
Reunião com investidores somente em inglês
PDF
2006 investor’s meeting presentation
PDF
Oracle in the Financial Service Industry
PPTX
Oracle erf overview v4
Challenges financial information_systems_a_clarke
MNP – Network Implementation & Systems Integration
Csu second quarter results
Strategies For Growth Post Sepa Deutsche Brendan Reilly
Reunião com investidores somente em inglês
2006 investor’s meeting presentation
Oracle in the Financial Service Industry
Oracle erf overview v4

What's hot (13)

PDF
Fraud in Telecoms
PPTX
ECM: Bridging Content Process and Compliance Divide
PDF
ESEconf2011 - Buzzi Andreas: "Schrittweise Modernisierung von komplexen Mainf...
PDF
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...
PDF
Credit Suisse Presentation
PPTX
Wholesale Fraud - Jason Lane-Sellers of cVidya
PDF
Neos ofsa - info age.
PPTX
Corp govissiwrcc2010
PDF
DecisionPoint Investor Presentation-January 2011
PDF
Customer Experience: Data-Driven Customer Satisfaction at TD Ameritrade
PDF
FD50
PPT
European Business Rules Conference 2005 : Rule Standards
PDF
Sym Sure Revenue Assurance
Fraud in Telecoms
ECM: Bridging Content Process and Compliance Divide
ESEconf2011 - Buzzi Andreas: "Schrittweise Modernisierung von komplexen Mainf...
121010_Mobile Banking & Payments for Emerging Asia Summit 2012_A Risk-Based A...
Credit Suisse Presentation
Wholesale Fraud - Jason Lane-Sellers of cVidya
Neos ofsa - info age.
Corp govissiwrcc2010
DecisionPoint Investor Presentation-January 2011
Customer Experience: Data-Driven Customer Satisfaction at TD Ameritrade
FD50
European Business Rules Conference 2005 : Rule Standards
Sym Sure Revenue Assurance
Ad

Similar to Don’t like risk? Stop gambling in your accounts payable and start to take systematic control (20)

PDF
Jini Books Presentation in PDF format
PDF
Jini Books Presentation
PDF
PartnerTEL TEM Services
PDF
Cptl Wem Presentation 2009 Final V2
PDF
Where Do We Go From Here?
PDF
Where do we go from here?
PPTX
10 Strategies for Resolving Common Fleet Management Challenges
PDF
Best Practices in Spend Management - Case Study by Apptricity
PDF
Milli Apps Enabling Sap On I Phone
PDF
Case Study: Telecom Provider Leverages Actuate to Drive Sales Performance and...
PDF
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
PDF
Business cases are not a dark art: the science behind the numbers
PDF
Pinnacle online
PDF
Building a business case for SAP FSCM
PDF
OUTSOURCING ASSURANCE
PDF
Maximizing the Revenue from Your Digital Goods Principles of High Performance...
PPTX
Complexity and Risk: Effective Business Community Management through Integration
PDF
First Data C-Store
PDF
Company Overview F
PDF
Sym Sure Loan Portfolio
Jini Books Presentation in PDF format
Jini Books Presentation
PartnerTEL TEM Services
Cptl Wem Presentation 2009 Final V2
Where Do We Go From Here?
Where do we go from here?
10 Strategies for Resolving Common Fleet Management Challenges
Best Practices in Spend Management - Case Study by Apptricity
Milli Apps Enabling Sap On I Phone
Case Study: Telecom Provider Leverages Actuate to Drive Sales Performance and...
Purchasing, Procurement, Vendor, Contract and RFP Process Management with Sha...
Business cases are not a dark art: the science behind the numbers
Pinnacle online
Building a business case for SAP FSCM
OUTSOURCING ASSURANCE
Maximizing the Revenue from Your Digital Goods Principles of High Performance...
Complexity and Risk: Effective Business Community Management through Integration
First Data C-Store
Company Overview F
Sym Sure Loan Portfolio
Ad

More from sharedserviceslink.com (20)

PDF
Does simultaneous outsourcing of all your purchase-to-pay processes and achie...
PDF
Are P-cards the answer to making payments easy? What about losing control? An...
PDF
Exceptions are inevitable. But does your struggle against them have to be?
PDF
Still have procurement outside shared services? Ever ask yourself why?
PDF
Touching your invoices? You don’t need to. 14 'how to’s' to touchless processing
PDF
The power that comes from linking departments
PDF
T&E – total control across your organization
PDF
Process improvement without technology investments?
PDF
Supply chain finance models Part 1: bank-agnostic models, bank-funded and man...
PDF
Governing your realm to ensure your customers are consistently delighted with...
PDF
Why move your SSC to a high-cost location?
PDF
Nokia’s procurement shared services story and its ‘3C formula’ for success
PDF
Petra williams final
PDF
How to improve your supplier relationships while lowering invoice handling costs
PDF
Smoothly passing the baton from captive to outsourced service delivery in jus...
PDF
How can you make process improvements easier to realise?
PDF
The 9 big issues of shared services and outsourcing: research insights from ACCA
PDF
The seven culture traits to take you to a customer-focused shared services op...
PDF
Customer service management under the new economic conditions – a time for focus
PDF
Jumpstart an ailing shared services with finance transformation
Does simultaneous outsourcing of all your purchase-to-pay processes and achie...
Are P-cards the answer to making payments easy? What about losing control? An...
Exceptions are inevitable. But does your struggle against them have to be?
Still have procurement outside shared services? Ever ask yourself why?
Touching your invoices? You don’t need to. 14 'how to’s' to touchless processing
The power that comes from linking departments
T&E – total control across your organization
Process improvement without technology investments?
Supply chain finance models Part 1: bank-agnostic models, bank-funded and man...
Governing your realm to ensure your customers are consistently delighted with...
Why move your SSC to a high-cost location?
Nokia’s procurement shared services story and its ‘3C formula’ for success
Petra williams final
How to improve your supplier relationships while lowering invoice handling costs
Smoothly passing the baton from captive to outsourced service delivery in jus...
How can you make process improvements easier to realise?
The 9 big issues of shared services and outsourcing: research insights from ACCA
The seven culture traits to take you to a customer-focused shared services op...
Customer service management under the new economic conditions – a time for focus
Jumpstart an ailing shared services with finance transformation

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Classroom Observation Tools for Teachers
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Basic Mud Logging Guide for educational purpose
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Business Ethics Teaching Materials for college
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Pre independence Education in Inndia.pdf
RMMM.pdf make it easy to upload and study
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
O7-L3 Supply Chain Operations - ICLT Program
human mycosis Human fungal infections are called human mycosis..pptx
Classroom Observation Tools for Teachers
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Final Presentation General Medicine 03-08-2024.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Basic Mud Logging Guide for educational purpose
TR - Agricultural Crops Production NC III.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Business Ethics Teaching Materials for college
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Anesthesia in Laparoscopic Surgery in India
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Pre independence Education in Inndia.pdf

Don’t like risk? Stop gambling in your accounts payable and start to take systematic control

  • 1. Don’t like risk? Stop gambling in your accounts payable and start to take systematic control. Presented by Mitzi Mitchell 11/7/2012 1
  • 2. Agenda Company and Payables Environment Overview Risk Program Highlight Case Study #1 Payment Approval Case Study #2 3-Way Match Exceptions and Long Approval Time Case Study #3 Out-of-Pocket Expenses Case Study #4 Duplicate Payments/Invoices Case Study #5 Fraud Monitoring Program Confidential and Proprietary Information of T-Mobile USA 2
  • 3. Company Overview Headquarter: Bellevue, WA Customers: 30 million Coverage: USA and PR Largest 4G Network Value Plans Confidential and Proprietary Information of T-Mobile USA 3
  • 4. Payables Environment Overview  No. of countries serviced: 1 with some Euro transactions  Main P2P technologies used: OCR IBM Filenet “Doculink”, EDI, ERS in SAP, ACH & Merchant Card through JPMC Xign, Expenses & Travel through Concur Duplicate analysis through APEX  Main ERP: SAP  Volume of Annual AP Invoices: 500K paper, 1 million electronic invoices  # of vendors – 40K, # of employees – 36K  $16B in annual payment  One thing we are most proud of: We employ best practices for duplicate prevention. External recovery audits are now standard operations. Confidential and Proprietary Information of T-Mobile USA 4
  • 5. Risk Program Highlight COSO Cube - Internal Controls Framework Supporting Fraud Leverage Internal Third Party Customers Analytics Vendors Control Cover AP, Monthly TE&C, Design Treasury & Evaluation Scorecard Others Testing Dept Risk Supports Gap Program Training Remediation Confidential and Proprietary Information of T-Mobile USA 5
  • 6. P2P Risk Objectives Tiered Control Structure All transactions are Obtain most recorded and economical value out SOX/BUS Controls reflected on financial of the P2P process. statement correctly. (operations) Key Controls Prevent fraud- no Maintain cash flow fraudulent vendor, objectives. employees , invoices, (operations) expenses etc. Operational Controls Do not over pay, Pay correct amount, double pay, or pay for pay correct vendor. goods or services not yet delivered. Confidential and Proprietary Information of T-Mobile USA 6
  • 7. Controls Definition Examples Segregation of duties System validation Apply to all 3 way match Can be consistently transactions/process performed and in scope to achieve monitored Invoice entry rules the objective Invoice Post Audit Approval of PO and invoices and vendor setup T&E, Corporate Card, Signing Authority Policies Evidence of Expense Audit Can be preventative performance need be or detective retained Confidential and Proprietary Information of T-Mobile USA 7
  • 8. Case#1- Payment and Vendor Approval No consistent approval requirements throughout the enterprise for invoices and vendors Automation/ Policy/Process Change/ Outsource Cost, Enterprise Impact, Buy-In. Confidential and Proprietary Information of T-Mobile USA 8
  • 9. Case#1-Solution Broadly distributed approval authority implemented through HR system. Manual approval validation where not automated. Approval Authority Policy Systematic feed of SAP HR data to all expenses, PO, Vendor Setup Policy invoice processing systems. Manual approval validation for vendor setup. Vendor Approval Workflow – to come Confidential and Proprietary Information of T-Mobile USA 9
  • 10. Case#2- 3 Way Match Exceptions, Long Approval Time • Aged, large $ and volume of 3 way match exceptions. Goods receipt are not Issue performed. • Long approval timing for non-PO invoices. • Automation/Policy/Process Options Change/Outsource • Audience size, resource availability, Challenges approach. Confidential and Proprietary Information of T-Mobile USA 10
  • 11. Case#2-Solution Outstanding open Require POs for all EDI – payables communication purchases, switch Large volume, high $ for unmatched items. vendor set up and vendors targeted first. Dedicated contacts from approval timing. each business segment. SLA involved. Confidential and Proprietary Information of T-Mobile USA 11
  • 12. Case #3 – Out-of-Pocket Expenses Large $ spend on personal card. Evasion of vendor setup approval, PO/Invoice approval requirement. Loss of credit card rebate. Policy/Automation/Outsourcing/Process Resistance against enforcement . Culture that allows local decisions and flexibility. Ownership for enforcement can not be decided. Confidential and Proprietary Information of T-Mobile USA 12
  • 13. Case#3-Solution Policy change to Monthly Systematic triggers mandate corporate communication for implemented for card usage vs. large $ out-of- high $ out-of-pocket personal card pocket spend expenses. usage. employees. Confidential and Proprietary Information of T-Mobile USA 13
  • 14. Case Study #4 – Duplicate Payments/Duplicate Invoices Duplicate Payments Automation/Policy/Process/Outsource Labor intensive Confidential and Proprietary Information of T-Mobile USA 14
  • 15. Case#4 Solution Using recovery audit Systematic prevention Implemented invoice firms. Implemented for SAP invoice numbering convention. five year duplicate posting. Implemented daily payment review and manual review for statement audit. (First APEX First Strike for possible duplicates. and second tier) additional review. Confidential and Proprietary Information of T-Mobile USA 15
  • 16. Case #5 – Fraud Monitoring Program Unusual transactions within T&E system. High ranking employees sharing passwords with Administrative Assistant. Possible fake receipts. No process in place to evaluate vendor risks. Automation, Policy, Process, Outsource Data mining expertise needed. Multiple databases. Customer service vs. enforcer mentality. Labor intensive analysis with no guarantee of results. No control over vendor contract or relationship. Large volume of results for analysis. Confidential and Proprietary Information of T-Mobile USA 16
  • 17. Case #5 Solution Lowered credit line for all T&E Concur Reporting. corporate card holders. T&E: 100% audit on all AA JPMC Level 3 Activities expenses. Periodic review of Reporting. T&E database for fraud. Provided enterprise management expenses AP: Periodic vendor/employee approval training. match exercise. APEX First Strike Analytics Periodic vendor risk analysis Vendor Risk Analysis. using APEX First Strike Confidential and Proprietary Information of T-Mobile USA 17
  • 18. Lessons Learned No sure fire way to address Risk Strategies each situation *Automation of approval or workflow processes Resource *Policy changes priority is always an issue *Process, personnel changes *Training Consultant vs. Cop? Confidential and Proprietary Information of T-Mobile USA 18