Candidate fraud is a supplier risk. The weakest verification standard becomes your standard.

Candidate fraud is a supplier risk. The weakest verification standard becomes your standard.

Bottom line

Candidate fraud behaves like supplier risk. When verification standards vary by supplier, channel, or hiring manager, the weakest standard in your supply chain becomes your effective standard. The solution is not more friction. It is consistent requirements and evidence of execution.

Why procurement should own this

Procurement already manages third-party risk by reducing variance. The same logic applies to the people your suppliers place. Candidate fraud concentrates where three things collide:

  • Responsibilities are unclear across parties
  • Standards vary by supplier or sourcing channel
  • Controls are assumed rather than validated

In most enterprise programs, that includes a mix of staffing suppliers, EOR and AOR flows, and manager-directed sourcing. If one pathway operates with weaker verification, it becomes the easiest entry point. Not because anyone chose it deliberately — but because variance in a supply chain is always exploited at the margin.

When suppliers and channels operate to different verification standards, the enterprise absorbs the risk. The weakest standard in the chain becomes your effective standard.

What fraud looks like in the talent supply chain

Procurement does not need to become a fraud function. But it helps to recognize the patterns that can be governed against:

  • Identity substitution — the person who performs the work is not the person who interviewed
  • Interview proxying — a proxy participates in assessments or screening on behalf of the placed worker
  • Credential fabrication — employment history, qualifications, or references are manufactured
  • Location and authorization misrepresentation — where the worker is located or eligible to work differs from what was stated
  • Unauthorized subcontracting — the contracted worker passes work to a third party the organization never vetted

None of these patterns are new. What has changed is the scale and repeatability. AI tools have lowered the cost of fraudulent presentation. Remote delivery has reduced the natural friction that used to catch substitution. And multi-party supply chains create handoff gaps that these patterns exploit.

A field example

A contractor interviews well and is selected quickly through a high-velocity sourcing channel. Two weeks after onboarding, delivery quality drops sharply. The manager escalates as a performance issue. Security later flags inconsistent access patterns. When the parties compare notes, it is unclear who verified identity, when it happened, and what evidence exists. The issue is not just the individual. It is the process gap.

A simple model: Verification variance equals risk

Fraud exposure increases when three things collide in the same engagement:

Procurement can reduce exposure quickly by standardizing requirements by role tier and requiring evidence of execution — not just policy commitment.

Minimum supplier standard

Use this as a starting point for your procurement requirements. The goal is not to add friction to every placement. It is to ensure that the controls your suppliers claim to have are actually being executed — and that evidence exists if questions arise.

  • Identity verification completed before system access for designated role tiers
  • A defined approach to reduce interview proxying for higher-risk roles
  • Clear prohibition and detection approach for unauthorized subcontracting
  • Documented chain of custody: who sourced, screened, presented, and verified
  • Supplier attestation that the worker performing the work is the worker contracted
  • Reverification at onboarding for designated role tiers
  • Defined post-start triggers for investigation: location mismatch, access anomalies, early performance cliff
  • Clear incident notification expectations and escalation path
  • Evidence retention expectations: what can be produced if questioned
  • Audit cooperation language that validates execution, not just policy

Questions worth asking internally

These are designed for procurement leaders who want to understand where their verification variance sits before it becomes a visible incident.

  1. Do your staffing suppliers and EOR/AOR providers operate to the same verification standard — or do you assume they do?
  2. If a fraud incident happened through a manager-directed sourcing channel, would anyone know which party owned verification?
  3. When did you last audit whether your supplier controls are being executed consistently, versus just documented in contracts?
  4. Which of your sourcing channels has the highest placement velocity — and does that channel also have the most consistent verification?
  5. If a supplier had a substitution event last quarter, would your current contract give you the right to audit their verification process?

Start here

Map where verification standards differ across your staffing suppliers, EOR and AOR flows, and manager-directed sourcing channels. The biggest variance is usually where risk concentrates — and where a minimum standard will have the most immediate impact.

Go deeper

Procom has published a full framework for assessing your organization’s fraud risk posture — including the financial modeling behind each cost level and a self-assessment tool you can run internally. Download the whitepaper.

candidate-fraud-cover-300.png

If any of this maps to what you’re seeing in your program, I’m happy to compare notes. [email protected]  or connect with me on LinkedIn.

Ready to Connect?
Contact Us
simon-gray-linkedin-1.png

About the author

Simon Gray

With over 25 years of experience in strategic staffing, Simon leads Procom’s Workforce Solutions division to help clients hire quickly and compliantly.

Ready to connect?

Related Articles & Insights

Verification isn’t a step. It’s a lifecycle system.

Verification isn’t a step. It’s a lifecycle system.

Point-in-time verification fails because modern fraud unfolds across phases, not at a single moment. A contractor who clears your pre-hire screen can still substitute at onboarding. An access profile granted on day one can drift for months without review. When each party believes someone else owns the next step, no one owns the full picture.

Read more
Mar. 2026