Which of the following is a best practice to identify fraud from an employee in a sensitive position?