Check ID in SAP

Protect any Function in SAP with 2FA / MFA

  • Home
  • About Us
  • Solutions Areas
    • Finance
    • Human Resources
    • Customer Service
    • Supply Chain
    • Data Security
  • Case Studies
    • Supply Chain
    • Banking Fraud
    • Procure-to-Pay
    • Payroll Fraud
    • Retail / POS
    • Employee Self-Service
    • Workflow Approvals
    • Perimeter Security
    • HIPAA Compliance
    • Public Sector Fraud
  • Multimedia
  • Contact
  • Partners

Payroll Fraud

Business Situation

The Association of Fraud Examiners defines payroll fraud as “any scheme in which an employee causes an employer to issue a payment by making false claims for compensation.” This means that every organization that pays employees can be a victim of fraud. Payroll fraud is a phenomenon that appears under many different forms. While this case concerns itself mainly with fraudulent overtime claims, there are many other ways that employees find to claim more pay than they deserve. This usually occurs in systems without true identity management, where it is possible for the dishonesty to be hidden behind a password access. Since passwords can be easily shared, guessed, or stolen, it is difficult to assign blame for fraud perpetrated via passwords. Several other key areas to be aware of in payroll fraud include “buddy-punching”, ghost workers, double transactions and more.

  • Growing student body
  • Budgetary restraints due to declining funding allocations
  • Declining capital spending putting more pressure on infrastructure
  • Salaries fixed by Collective Bargaining
  • Agreement – non-exempt overtime pay contributing to budget shortfall

Key Challenges

  • Non-exempt administrative workers overtime approval process flawed
  • This user has experienced instances of extensive fraud in the approval of overtime pay
  • SAP process for approval of overtime pay typically delegated to administrative assistants, creating a fraud opportunity
  • SAP passwords were the only security mechanism prior to bioLock

Implementation Highlights

  • Associate individual biometric user profiles with specific SAP tasks in HR/Payroll, defining any delegated tasks
  • Enforce biometric re-authentication for every sensitive task
  • Tamper-proof logging and audit trail for each protected transaction

Major Objectives

Overcome the limitations of password sharing in SAP payroll that were allowing junior administrators to impersonate supervisors and benefit from unearned overtime pay:

  • Provide indisputable identity management with biometrics
  • Control extended authorizations where a user executed transactions under a supervisor’s profile
  • Identify transactions executed under delegated authority
  • Create an indelible audit trail of activity
  • Ensure true segregation of duties (SoD) in the approval of overtime pay

Key Business Outcomes

  • Payroll overtime fraud has been eliminated
  • Payroll budget control has been regained using biometrics
  • Employees responsible for fraud were held accountable

Related Case Studies

  • Banking Fraud
  • Procure-to-Pay
  • Retail / POS

realtime

realtime helps its enterprise and public sector clients achieve dramatic security improvements via biometrics in SAP ERP systems and the HANA platform without affecting existing security processes. Enforce GRC, prevent Segregation of Duties violations, achieve regulatory compliance.

Solutions

Finance
Human Resources
Customer Service
Supply Chain
Data Security

Case Studies

Supply Chain
Banking Fraud
Procure-to-Pay
Payroll Fraud
Retail / POS
Employee Self-Service
Workflow Approvals
Perimeter Security
HIPAA Compliance
Public Sector Fraud

Follow us on Social Media

  • Email
  • Facebook
  • Instagram
  • LinkedIn
  • Medium
  • Twitter
  • YouTube

Copyright © 2025 · Legacy Theme on Genesis Framework · WordPress · Log in