Feeds

NEC accuses hungry, thirsty worker of stealing $300m

A man has to eat

Choosing a cloud hosting partner with confidence

NEC this week warned that it will need to restate past financial results after a worker allegedly booked some $310m in faked transactions over three years. The reason for such abuse? NEC claims the worker wanted the money for "drinking and eating".

You can't make this stuff up.

In a lengthy statement, NEC accuses an unnamed male employee in its semiconductor design group of creating a string of "fictitious transactions." The worker would allegedly create a fake purchase order, push it through NEC's accounting system and then weirdest of all actually receive payments for the products from customers.

"The false transactions relate to certain sales of products, which were actually not delivered, and were fabricated by creating fictitious 'round-trip' transactions among NEC Engineering and its vendors and purchasers," NEC said. "The fictitious transactions were first recorded in March 2002 and recorded repeatedly until December 2005."

Oddly, NEC never explains why a customer would pay for made up product. The customers, however, appeared impressed with the fake gear with all of them paying for the equipment on time, according to NEC.

NEC management caught wind of the sketchy transactions and kicked off an internal investigation into the matter. The company hired independent lawyers and accountants to sort through the mess.

"Based on these findings, NEC Engineering will take any necessary actions, including filing criminal actions, against the employee," NEC said.

NEC plans to restate its financial results once auditors have finished looking into the matter, and the company vowed to institute tighter financial controls.

According to Japanese media, NEC claimed that the employee said he needed the extra money for "drinking and eating." A diet of caviar stuffed panda lips and champagne soaked aye-aye testicles can be very expensive. ®

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.