The existing procedures of MAs can be amended to clarify the concepts of inherent risks, root causes, red flags and control activities. Developing and updating reference materials on common and actual fraud and corruption schemes, along with mitigating actions to detect and prevent risks, can also improve identification of inherent risks. For example, providing information on real cases that show the interconnected nature of fraud and corruption risks, schemes, red flags and control measures can inform the risk management working groups’ activities at the stage of inherent risk identification. To this end, guidance, reference materials and inputs to the risk management working groups could include the following components:
prominent fraud and corruption risks across all stages of the ESI-funded project cycle, with a description of fraud and corruption schemes at each stage, submitted by managing authorities
red flags for fraud and corruption risks at each stage of the project cycle, supported by data and indicators that can be used to detect them
detailed case studies that demonstrate how a particular fraud or corruption operation was carried out, by whom, and how the fraud or corruption occurred
good practices for preventing and mitigating fraud and corruption risks at each stage of the project cycle, including control measures and activities.
EC guidance places importance on including specific fraud risks identified through knowledge of previous fraudulent cases, as well as commonly recognised and recurring fraud schemes throughout all stages of the project cycle. The EGESIF guidelines on fraud risk assessments includes the fraud schemes and risks that are observed across OPs and EU Member States, including applicant selection, project implementation, and certification of costs and payments (European Commission, 2014[15]). According to EGESIF, MAs should adopt adequate preventive controls and detection measures, undertake thorough fraud risk assessments, provide timely responses to fraud risks and suspicions of fraud, and undertake investigations where appropriate. EGESIF also notes that anti-fraud measures should be proportionate to the risks identified.
MAs mostly adhere to and use the EGESIF guidelines as a baseline when developing risk assessments. Some MAs, however, have missed numerous significant fraud risks and schemes that are outlined in EGESIF and that may affect their OPs. To help focus the risk assessments, the MAs can review the identified risks against the recommended fraud risks in the EGESIF tool, and add other known risks for their specific OPs taking into account the ESI Funds project cycle, as illustrated in Chapter 1. However, it is critical that the MAs avoid simply replicating the risks in EGESIF and taking a “check-the-box” approach. Below are several common fraud and corruption risks identified by the OECD as having been omitted by at least two of the MAs.
Applicant selection stage
Members of the MA or Evaluation Committees intentionally influence the selection of applications so as to favour certain applicants during shortlist approval and appraisal, influencing other decision makers in the process.
An entity applies for funding for the same project from several EU funds without declaring multiple applications.
Implementation stage
A beneficiary avoids the required competitive procedure to favour a particular applicant by splitting purchases, unjustified single source award (when contracts are awarded directly to a bidder without meeting the competitive requirements), avoidance of a tendering process or extension/modification of the contract to elude the re-tendering process.
A beneficiary favours an applicant/tenderer because of an undeclared conflict of interest, bribes or kickbacks.
A beneficiary favours a tenderer in a competitive procedure through rigged specifications, leaking bid data or manipulation of bids.
Bidders manipulate a competitive procedure organised by a beneficiary to win a contract by setting up fake bidders, collusive bidding or creating phantom service providers.
A contractor manipulates cost claims or invoices to overcharge or recharge incurred costs.
A beneficiary violates the contract conditions by non-delivery of the agreed project due to the non-existence of products or underperformed operation in relation to the agreement.
A contractor intentionally overstates the activities of provided personnel to claim them as eligible costs or a beneficiary knowingly claims false labour costs not in line with the contract.
Certification/payment stage
The list above is not exhaustive. Beyond EGESIF, there are opportunities for MAs to update their risk catalogues to focus on the most common and severe types of fraud and corruption risks. The list should not be too extensive: a “reasonable” number of risks is subjective, but as a guiding principle, the risk catalogue should promote a concise overview of material risks linking to the broader objectives for managing fraud and corruption risks with ESI Funds. MAs can introduce other methods of conducting risk assessments and understand the root causes of risks to complement the existing survey-based electronic process. For instance, various tools can support the MAs and OPs to assess internal and external context, as well as the root causes of risks to better understand why a risk occurs.1 Such tools can help to promote communication among stakeholders from different ministries and teams. Similarly, increased use of interviews would also promote engagement with key stakeholders, and allow risk managers to ask follow-up questions, probe for underlying issues, and increase foresight regarding potential future events. Facilitated workshops can foster exchange among experienced participants, potentially uncover hidden risks, and build consensus around risk prioritisation. Chapter 3 delves more deeply into the priorities and key actions for developing skills and knowledge.