ELECTRONIC SALES SUPPRESSION: A THREAT TO TAX REVENUES
ELECTRONIC SALES SUPPRESSION: A THREAT TO TAX REVENUES
ELECTRONIC SALES SUPPRESSION: A THREAT TO TAX REVENUES
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
2 – TABLE OF CONTENTS<br />
Table of contents<br />
Executive Summary ........................................................................................................... 3<br />
Introduction ....................................................................................................................... 5<br />
Background .......................................................................................................................... 5<br />
Other related work ............................................................................................................... 6<br />
Estimates of tax loss and other fraud ................................................................................... 6<br />
Point of Sales Systems ....................................................................................................... 9<br />
POS systems ........................................................................................................................ 9<br />
Auditing POS systems– the legal framework ...................................................................... 9<br />
Tax audit requirements ...................................................................................................... 10<br />
POS system risks ............................................................................................................... 11<br />
Electronic Sales Suppression Techniques ...................................................................... 13<br />
Misuse of functions within the ECR/POS software........................................................... 14<br />
Phantomware ..................................................................................................................... 14<br />
Zappers .............................................................................................................................. 15<br />
Summary of techniques ..................................................................................................... 16<br />
Detection Strategies ......................................................................................................... 17<br />
Financial audit ................................................................................................................... 17<br />
E-Audit .............................................................................................................................. 18<br />
Computer forensic investigation ........................................................................................ 18<br />
Detecting traces ................................................................................................................. 18<br />
Criminal investigation techniques ..................................................................................... 18<br />
Investigating traces ............................................................................................................ 19<br />
Seizing digital sources ....................................................................................................... 20<br />
Analysis of digital information .......................................................................................... 20<br />
Government Responses ................................................................................................... 23<br />
Strategic approach ............................................................................................................. 23<br />
Strengthen compliance ...................................................................................................... 24<br />
Raise awareness ................................................................................................................. 26<br />
Audit and investigation ...................................................................................................... 28<br />
Sources of intelligence ....................................................................................................... 31<br />
Fiscal tills and certified POS systems ................................................................................ 32<br />
Conclusions ...................................................................................................................... 35<br />
Recommendations ............................................................................................................. 35<br />
Annex: Fiscal Tills and Certified POS systems ............................................................. 37<br />
Fiscal Tills ......................................................................................................................... 37<br />
Certified POS systems ....................................................................................................... 38<br />
<strong>ELECTRONIC</strong> <strong>SALES</strong> <strong>SUPPRESSION</strong>: A <strong>THREAT</strong> <strong>TO</strong> <strong>TAX</strong> <strong>REVENUES</strong> © OECD 2013