4. Manipulation of inventory counts/records. The fraudster in this scheme will falsify the requisition documents to get physical access to items. That request should create the required entry in the perpetual records. Manipulation of inventory also includes recording the financial side of the purchase so the supplier gets paid, but not record the receipt of the theft items in the perpetual records.
4. Manipulation of inventory counts/records. The fraudster in this scheme will falsify the requisition documents to get physical access to items. That request should create the required entry in the perpetual records. Manipulation of inventory also includes recording the financial side of the purchase so the supplier gets paid, but not record the receipt of the theft items in the perpetual records.