01.03.2013 Views

ELECTRONIC SALES SUPPRESSION: A THREAT TO TAX REVENUES

ELECTRONIC SALES SUPPRESSION: A THREAT TO TAX REVENUES

ELECTRONIC SALES SUPPRESSION: A THREAT TO TAX REVENUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2 – TABLE OF CONTENTS<br />

Table of contents<br />

Executive Summary ........................................................................................................... 3<br />

Introduction ....................................................................................................................... 5<br />

Background .......................................................................................................................... 5<br />

Other related work ............................................................................................................... 6<br />

Estimates of tax loss and other fraud ................................................................................... 6<br />

Point of Sales Systems ....................................................................................................... 9<br />

POS systems ........................................................................................................................ 9<br />

Auditing POS systems– the legal framework ...................................................................... 9<br />

Tax audit requirements ...................................................................................................... 10<br />

POS system risks ............................................................................................................... 11<br />

Electronic Sales Suppression Techniques ...................................................................... 13<br />

Misuse of functions within the ECR/POS software........................................................... 14<br />

Phantomware ..................................................................................................................... 14<br />

Zappers .............................................................................................................................. 15<br />

Summary of techniques ..................................................................................................... 16<br />

Detection Strategies ......................................................................................................... 17<br />

Financial audit ................................................................................................................... 17<br />

E-Audit .............................................................................................................................. 18<br />

Computer forensic investigation ........................................................................................ 18<br />

Detecting traces ................................................................................................................. 18<br />

Criminal investigation techniques ..................................................................................... 18<br />

Investigating traces ............................................................................................................ 19<br />

Seizing digital sources ....................................................................................................... 20<br />

Analysis of digital information .......................................................................................... 20<br />

Government Responses ................................................................................................... 23<br />

Strategic approach ............................................................................................................. 23<br />

Strengthen compliance ...................................................................................................... 24<br />

Raise awareness ................................................................................................................. 26<br />

Audit and investigation ...................................................................................................... 28<br />

Sources of intelligence ....................................................................................................... 31<br />

Fiscal tills and certified POS systems ................................................................................ 32<br />

Conclusions ...................................................................................................................... 35<br />

Recommendations ............................................................................................................. 35<br />

Annex: Fiscal Tills and Certified POS systems ............................................................. 37<br />

Fiscal Tills ......................................................................................................................... 37<br />

Certified POS systems ....................................................................................................... 38<br />

<strong>ELECTRONIC</strong> <strong>SALES</strong> <strong>SUPPRESSION</strong>: A <strong>THREAT</strong> <strong>TO</strong> <strong>TAX</strong> <strong>REVENUES</strong> © OECD 2013

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!