INTO THE DATA MINE www.ato.gov.au SEGMENTAUDIENCEDATE Presented by: Alicia Peters Fraud Prevention and Control Australian Taxation Office Into the (Data)

Slides:



Advertisements
Similar presentations
The Risk Management Process (AS/NZS 4360, Chapter 3)
Advertisements

IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
Training for the Work-Study Supervisor
GETTING IT RIGHT. Today we will - review or refresh your approach to making funding bids by: Not sure? Ask! And this is to remind me and you please to.
EXTERNAL Corruption Prevention NetworkJuly 2007Fraud Control Planning Tax Office Fraud Control Planning: Tools and Techniques PRESENTED BY: Annalissa Hilton.
© Safeguarding public health Adverse incident reporting now and the future, roles and responsibilities Mark Grumbridge.
NAU HIPAA Awareness Training
Hotel Billing Instructions
Internal Audit Awareness
INTRODUCTION o DISCUSS ADOPTION OF FRAUD AND THEFT POLICY o ASSIGNS RESPONSIBILITY FOR REPORTING FRAUD AND THEFT o PROVIDES GUIDELINES FOR INVESTIGATIONS.
Outcomes focused regulation and compliance in practice Peter Scott Peter Scott Consulting
Unit 7: Store and Retrieve it Database Management Systems (DBMS)
Presented by Cooperative Assurance Model Ben Heilbronn - Senior Business Analyst, Indirect Tax, Integrity of Business Systems Nigel Cousins – Director,
Cheating the System Estimated $166 million in overpayments for aid. Estimated $166 million in overpayments for aid. Prosecutors say most of the suspects.
Compliance Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
RJC Certification - (COP 9) Bribery and Facilitation Payments Training Module – March 2014.
1 The Social Security Number Verification Service (SSNVS) National Payroll Reporting Forum June 2, 2005.
Student Affairs Buying 101 Procurement Methods Students First Topic
GST INTERMEDIATE Presented by: Australian Taxation Office SEGMENTAUDIENCEDATE LEGAL PRACTITIONERS MARCH 2005PROFESSIONAL GST intermediate.
CS490D: Introduction to Data Mining Prof. Chris Clifton April 14, 2004 Fraud and Misuse Detection.
An Educational Computer Based Training Program CBTCBT.
Segregation of Duties– Sponsored Programs APM
© Pearson Education Copying permitted for purchasing institution only. This material is not copyright free. Functional areas Unit 1: Investigating.
GST BASICS Presented by: Australian Taxation Office SEGMENTAUDIENCEDATE LEGAL PRACTITIONERS MARCH 2005PROFESSIONAL GST basics Norman Kochannek.
Erica Cummings Grant Coordinator 1.  The New Mexico Department of Homeland Security and Emergency Management (DHSEM) is responsible for:  Monitoring.
ICT in Banking.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 10 Identifying and preventing fraud Qiang Jiang School of Business Sichuan University, China
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
Corporate Responsibility Regulatory Compliance “Systems that ensure all students are aware of laws and regulations and act in accordance of those regulations”
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Advertising. Why Advertise? To generate funds To give others information about products and services they want and will use To improve your advertiser’s.
UNIT 15 WEEK 9 CLASS 1 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The Audit as a Management Tool Vermont State Auditor’s Office – April 2009.
Prevent Information and Overview Updated October 2013, Education Office.
INTERNAL AUDIT AND INVESTIGATION SERVICES PRESENTATION TO THE PORTFOLIO COMMITTEE ON THE UNIT’S ACTIVITIES FOR THE YEAR ENDING 31 MARCH 2006 Z MXUNYELWA,
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Report Patient Questionnaire 2013 Dr S. J. Swinden Darnall Health Centre 2 York Road.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
Accounting & Financial Analysis 111 Lecture 8 Source Documents, Day accounts/Specialised Journals, Debtors & Creditors Subsidiary Ledgers.
Your health record How the local NHS uses and protects the information held about you Other ways that your records may be used Your local NHS services.
Glenwood Middle School Chaperone/Volunteer Training
THE TIPS PREVENTION PLATFORM Going live at ______________Schools on [DATE].
Going live at ______________Schools on [DATE]. At ______ Schools we are committed to providing a safe and secure environment for all of our students,
Chapter 16 – Technological Development Technological Development Employees, managers and organisations, as well as the population in general, take for.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Paper-Based Test Security Training for Districts.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
The Disclosure and Barring Service Taxi and PHV licensing conference Thursday 19 March 2015 Presented by:Ian Johnston - Director for Operations (Disclosure)
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Join Scouting Night (JSN) Registration Training This is to help commissioners and pack leaders know how to handle registration on Join Scouting Night (Both.
PRESENTATION TO THE PORTFOLIO COMMITTEE ON HOME AFFAIRS 18 SEPTEMBER 2012 GC KhwelaCONFIDENTIAL FRAUD DETECTION AND PREVENTION.
Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.
The Common Assessment Framework (CAF) & Lead Professional (LP)
1 Iowa Emergency Management Association Iowa Homeland Security and Emergency Management Department Emergency Management Program Development Course EMERGENCY.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
UI Eligibility Training for Workforce Centers 03/31/2016.
Prevention & Tackling Single Homelessness. Free available support and resources from NHAS NHAS Training for Local Authorities NHAS are developing and.
Component D: Activity D.3: Surveys Department EU Twinning Project.
Bookkeeping Gold Coast 101 – How Outsourcing Help Your Business.
Welcome to the ICT Department Unit 3_5 Security Policies.
Training Appendix for Adult Protective Services and Employment Supports June 2018.
Red Flags Rule An Introduction County College of Morris
Clemson University Red Flags Rule Training
Thames Valley Chamber / Claire Logic
Presentation transcript:

INTO THE DATA MINE SEGMENTAUDIENCEDATE Presented by: Alicia Peters Fraud Prevention and Control Australian Taxation Office Into the (Data) Mine! GENERALCorruption Prevention Network 14 September 2006

INTO THE DATA MINE Organisation Tax Office Executive (Audit Committee / Integrity Advisory Committee) Internal Assurance Branch Fraud Prevention and Control Intelligence and Analysis Investigations Fraud Control Planning Fraud Awareness Training Standards and Reporting Coordination Internal Audit Security Policy and Services Official Conduct Team

INTO THE DATA MINE What is data mining?  ‘The nontrivial extraction of implicit, previously unknown, and potentially useful information from data.’  ‘…analysing data to show patterns or relationships; sorting through large amounts of data; and picking out pieces of relative information or patterns that occur…’

INTO THE DATA MINE Data mining tools  There are many contemporary tools available  Tax Office -Microsoft Excel -Microsoft Access -ACL -Win IDEA

INTO THE DATA MINE The data  Who owns it? -Internal -External  Where is it?  Quality: -Duplicates -Inconsistencies -Incomplete

INTO THE DATA MINE What data mining can do  Compare different sets of data  Identify trends and outliers  Identify relationships

INTO THE DATA MINE What data mining can’t do  Data mining cannot -identify fraud in isolation – generally requires further scrutiny -verify individual transactions -avoid false positives and / or false negatives -work without access to data  Data mining is less effective if the quality and quantity of available data is reduced

INTO THE DATA MINE Outcomes  Data mining needs to be directed by the type of outcome sought -Identification of potential fraud incidents -Identification of fraud risks -Identification of system / process vulnerabilities

INTO THE DATA MINE Where do the ideas / projects come from?  Criminal’s perspective of our systems and processes  Communication between Internal Investigations, Fraud Control Planning and Official Conduct Team  External information from liaison with other departments  Research  Media

INTO THE DATA MINE Planning data mining projects  Projects are based on emerging risks  No strict work plan - maintains flexibility to deliver products and address emerging risks  Connections with Internal Audit

INTO THE DATA MINE What we do with the results  Suspected fraud incidents -Internal fraud investigation referrals  Fraud risks and vulnerabilities -System / process owners -Fraud Control Planning as an intelligence product -Tax Office Executive

INTO THE DATA MINE Products  Threat assessments  Data mining reports  Fraud investigation referrals  Tax Office Executive reports  Weekly staff newsletter articles

INTO THE DATA MINE Data mining in the Tax Office from an internal fraud perspective  Two types are undertaken -Departmental – What makes the department work -Administered – What the department exists for

INTO THE DATA MINE Data mining departmental systems  22,000 staff  60 locations around Australia  Projects -Cabcharge -Mobile telephones

INTO THE DATA MINE Cabcharge  Context -Cabcharge cards and vouchers -135,500 transactions a year

INTO THE DATA MINE Cabcharge Data:  Internal data quality was poor because of different management systems  Data sought directly from Cabcharge -Many duplicates -Incomplete data population -Inaccuracies around pick up and destination locations -Differences in data for card and voucher transactions  Imported 315,500 transactions into IDEA  Got rid of duplicates

INTO THE DATA MINE Cabcharge  Focus -Large single expenses on cabs -Use of Cabcharge cards on Saturday

INTO THE DATA MINE Cabcharge Validation process:  Large fares -35 s sent to managers to confirm expenditure  Weekend use s sent to managers to confirm expenditure

INTO THE DATA MINE Cabcharge Results  Fraud -Suspected personal travel  Fraud risks -Incorrect amounts approved  Observations -High traffic routes

INTO THE DATA MINE Cabcharge  Reporting -Tax Office Executive -Process owners -Article in weekly staff newsletter

INTO THE DATA MINE Mobile telephones  Liaison meeting with Defence  Identified personal use of mobile telephones as an emerging risk – especially in relation to ‘190’ numbers  Identified that these types of calls were not being checked

INTO THE DATA MINE Mobile telephones  Context -6,500 handsets -4 million transactions a year

INTO THE DATA MINE Mobile telephones  Data -Internal data quality was good but did not provide a means of identifying who destination numbers belonged to -Imported 8 million transactions into IDEA -Got rid of duplicates

INTO THE DATA MINE Mobile telephones  Focus -Calls to ‘190’ numbers

INTO THE DATA MINE Mobile telephones  Identified ‘190’ calls which reduced the population size to just under 3,000 transactions  Used Internet to identify the services provided by each ‘190’ number  Excluded reasonable personal uses such as time and weather services  Identified telephones used to access large volumes of adult content / gambling hotlines  Identified other uses which constituted code of conduct issues, for example, competition hotlines

INTO THE DATA MINE Mobile telephones Results:  Fraud -7 phones calling adult / gambling numbers  Misuse -14 phones calling other services  Fraud risks -No current review system  Observations -Reporting lost / stolen phones

INTO THE DATA MINE Mobile telephones  Reporting -7 internal fraud investigation referrals -14 letters to managers to deal with individual minor matters -Tax Office Executive -System owners -Article in weekly staff newsletter

INTO THE DATA MINE Data mining of administered systems  Longer term projects  Current project involving BAS processing -Initial data set – 6.5 million transactions -First cut – 3 million -11,000 records based on risk algorithm

INTO THE DATA MINE Conclusion  Focussed on emerging risks  Flexible approach  Requires intelligence support  Work with what you have  Takes time  Good planning  Record keeping  Information sharing  Marketing of results

INTO THE DATA MINE Thank You  Questions?

INTO THE DATA MINE We are committed to providing you with advice and information you can rely on. We make every effort to ensure that our advice and information is correct. If you follow advice in this publication and it turns out to be incorrect, or it is misleading and you make a mistake as a result, we must still apply the law correctly. If that means you owe us money, we must ask you to pay it. However, we will not charge you a penalty or interest if you acted reasonably and in good faith. If you make an honest mistake when you try to follow our advice and you owe us money as a result, we will not charge you a penalty. However, we will ask you to pay the money, and we may also charge you interest. If correcting the mistake means we owe you money, we will pay it to you. We will also pay you any interest you are entitled to. You are protected under GST law if you have acted on any GST advice in this publication. If you have relied on GST advice in this publication and that advice later changes, you will not have to pay any extra GST for the period up to the date of the change. Similarly, you will not have to pay any penalty or interest. If you feel this publication does not fully cover your circumstances, please seek help from the Tax Office or a professional adviser. The information in this publication is current at September We regularly revise our publications to take account of any changes to the law, so make sure that you have the latest information. If you are unsure, you can check for a more recent version on our website at or contact us. Our commitment to you