Cover Image
close this bookCARE Food Manual (CARE , 1998, 355 p.)
close this folderChapter 11 - Food Distribution To Sites
close this folderIV. Registering Beneficiaries
close this folderC. Controlling Abuses of the Registration System
View the document1. Types of Abuses
View the document2. Detecting Abuses
View the document3. Preventing Abuses

3. Preventing Abuses

· In small operations, eligible and ineligible individuals may be identified by sight.

· Roll calls and/or card validation before distributions.

· The beneficiary must leave some sort of receipt at the distribution site after the ration is received, such as a coupon or token. This way the distribution staff can also check who has not yet received the ration, from unpunched cards, tokens or tickets. Fingerprints and signatures are sometimes used for verification of receipt.

· The total amounts of food given out should be compared with the total recorded number of eligible persons collecting the rations.

· If the registration is computerized, cards reported to be stolen must be entered into the system to identify if, when, where and by whom the stolen cards are being used.

· Distributions must also be verified through end-use interviews of a sample of the target population and review of distribution site records by CARE monitors (See Monitoring Project Sites).

Internal Control

One system of preventing abuses is for one distribution staff member to serve a standard sized ration to all beneficiaries while another makes a record of all who have collected the ration. The amounts are tallied and compared to the remaining stock at the end of the day by an independent party. If token or coupons are used, these may also be tallied at the end of the distribution.