Skip to main content

Prevent duplicates

Type of countermeasure

This is a prevention countermeasure. Prevention countermeasures are the most common and cost-effective way to stop fraud. They prevent or limit the size of the fraud risk by reducing the likelihood and consequences of fraud.

decorative  prevention countermeasures

Summary

Have processes in place to prevent, identify and correct duplicate records, identities, requests or claims.

Why this countermeasure matters

Duplicated records, identities, requests or claims can lead to:

  • fraudulent payments made multiple times
  • dual claiming of different payments or benefit types
  • duplicate or ghost records being used to conceal activities or exploit processes
  • incorrect and inconsistent reporting and decision-making
  • other control weaknesses such as less effective fraud detection.

How you might apply this countermeasure

Some ways to implement this countermeasure include:

  • identifying and denying duplicate claims
  • flagging and reviewing potential duplicate vendor invoices
  • requiring staff to undertake thorough searches of existing customer records to avoid creating duplicate records
  • interrogating systems to identify, review and correct potential duplicate records.

How to check if your countermeasures are effective

Here are some ways to measure the effectiveness of this type of countermeasure:

  • confirm that clear and consistent processes exist for preventing, identifying and correcting duplicates
  • analyse data to confirm duplicates are being properly identified and corrected
  • consult subject matter experts on processes
  • conduct a system or process walkthrough by having staff show you the process for managing duplicates
  • review a sample of documentation to confirm compliance with policies and processes
  • review who has access to review and correct duplicates
  • check if and how duplicates are reported.

Related countermeasures

Develop clear instructions and guidance for activities and processes, such as instructions for collecting the right information to verify eligibility or entitlements, procedures to help staff apply consistent and correct processes and guidance to help staff make correct and ethical decisions.

Authenticate customer or third-party identities during each interaction to confirm the person owns the identity record they are trying to access.

Verify any requests or claim information you receive with an independent and credible source.

Match data with the authoritative source and verify relevant details or supporting evidence. Services such as the Identity Matching Service can be used to verify identity credentials back to the authoritative source when the information is an Australian or state and territory government issued identity credential. This countermeasure is supported by the Office of the Australian Information Commissioner's Guidelines on data matching in Australian government administration.

Related Fraudster Personas

Was this page helpful?