Professional Documents
Culture Documents
Failure to collect cash on credit sales is a threat in the revenue cycle. What controls
can be used to help neutralize this threat?
Answer:
Both accounts receivable and cash flows should be monitored. Segregation of duty
controls should always be implemented and monitored for compliance. Also, a control
used to deal with accounts receivable (which directly impacts cash flow) is to use an
accounts receivable aging schedule. This schedule lists customer account balances by
length of time outstanding and provides information for estimating bad debts. It can
also assist in evaluating credit policies and specific customer credit limits. Also, a
cash budget can be used to provide a more precise estimate of cash inflows (cash
collected from sales) and cash outflow (outstanding payables). An organization can be
alerted to a pending cash flow shortage, thus enabling it to secure short-term financing
at competitive rates to deal with the problem in a timely manner.
Question 2
Give internal control recommendations for each threat in the sales/collection process.
Threat 1: Sales to customers with poor credit
1
Answer:
Threat 1: Sales to customers with poor credit controls: Having an independent credit
approval function and maintaining good customer accounting can help to prevent problems.
Threat 2: Shipping errors Controls: Reconciling shipping notices with picking tickets (lists);
bar-code scanners; and data entry application controls will help to catch these errors.
Threat 3: Theft of inventory Controls: Secure the location of inventory and document
transfers; release only with valid shipping orders; have good accountability for picking and
shipping; and finally, periodically reconcile records with a physical count.
Threat 4: Failure to bill customers Controls: Separating shipping and billing and
pre-numbering of shipping documents helps along with reconciliation of all sales documents.
Threat 5: Billing errors Controls: Reconciliation of picking tickets (lists) and bills of lading
with sales orders; data entry edit controls; and price lists may prevent billing errors.
Threat 6: Theft of cash Controls: Segregation of duties is essential to prevent this serious
problem (the following duties should be separate: handling cash and posting to customer
accounts; handling cash and authorizing credit memos and adjustments; issuing credit
memos and maintaining customer accounts); use of lockboxes for receipts and EFT for
disbursements; mailing customer statements monthly; use cash registers in retail operations
where cash payments are received; deposit cash daily in the bank; and have the bank
reconciliation function performed by independent third parties.
Threat 7: Posting errors in updating accounts receivable Controls: Use of editing and batch
totals is essential here.
Threat 8: Loss of data Controls: Regular backups are essential with one copy stored off-site;
and logical and physical access controls to prevent leakage to competitors and irregularities.
2
Question 3
Since opening its doors in Hawaii two years ago, Oriental Trading has enjoyed
tremendous success. Oriental Trading purchases textiles from Asia and resells them to
local retail shops. To keep up with the strong demand, Oriental Trading is expanding
its local operations, including a new information system to handle the tremendous
increase in purchase.
The following is a summary of your interview with department supervisors who
interact with the acquisition/payment system:
3
Inventory Vendor
File File
1.0
Prepare
Purchase
Order &
Notification
Purchase Order
Purchase Requisition
Vendor
Acknowledgement Inventory
Vendor
System
P.O. Notification
Vendor
Invoice
Receiving Report
Vendor Invoices
Accounts
Payable
Payment Authorization
Master
File
Check 3.0
Pay Vendor
General
Ledger
4
Question 4:
As the internal auditor for No-Wear products, you have been asked to document the
company’s payroll processing system. Based on your documentation, No-Wear hopes
to develop a plan for revising the current system to eliminate unnecessary delays in
paycheck processing. The head payroll clerk explained the system:
The payroll processing system at No-Wear Products is fairly simple. Time data are
recorded in each department using time cards and clocks. It is annoying, however,
when people forget to punch out at night, and we have to record their time by hand. At
the end of the period, our payroll clerks enter the time card data into a payroll file for
processing. Our clerks are pretty good – though I’ve had to make my share of
corrections when they mess up the data entry.
Before the payroll file is processed for the current period, human resources send us
personnel changes, such as increases in pay rates and new employees. Our clerks
enter this information into payroll file. Usually, when mistakes get back to us, it’s
because human resources is recording the wrong pay rate or an employee has left and
the department forgets to remove the record.
The data are processed and individual employee paychecks are generated. Several
reports are generated for management – though I don’t know what they do with them.
In addition, the government requires regular federal and sate withholding reports for
tax purposes. Currently, the system generates these reports automatically, which is
nice.
5
6
Question 5:
Lancaster Company makes electrical parts for contractors and home improvement retail
stores. After their annual audit, Lancaster’s auditors commented on the following items
regarding internal controls over equipment:
3. When equipment arrives, the user department installs it. The property, plant,
and equipment control accounts are supported by schedules organized by year
of acquisition. The schedules are used to record depreciation using standard
rates, depreciation methods, and salvage values for each type of fixed asset.
These rates, methods, and salvage values were set 10 years ago during the
company’s initial year of operation.
7
Answer:
Weakness Recommendation
1. No authorization form The purchase requisition should include an item
describing the item to be description, why the item is needed, estimated
acquired, why it is needed, costs and benefits, account code, useful life,
expected costs, and benefits. depreciation method, and management approval.
6. Equipment is not tagged and All new machinery and equipment should be
controlled to prevent theft. assigned a control number and tagged at the time
of receipt.
7. Plant engineering is not helping
with the equipment Plant engineering should help with the
8
installations. equipment installations to ensure expensive
equipment is not damaged.
Question 6
Traffic accidents increase for many commuters in Philadelphia and result in a series of
legal and insurance steps. There are more than 70,000 automobile accidents reported
each year in Philadelphia, and the city’s police department prepares a report for each
accident. Accident reports are necessary for insurance companies to process claims
and ultimately pay settlements to their customers. Until recently, processing an
accident report was a costly, time-consuming process, taking up to six weeks for a
paper copy to become available. Thanks to the efforts of a unique public/private
partnership and the power of Internet technology, Philadelphia accident reports are
now available to insurance companies in less than one week.
Required:
How would workers in the case have used the SDLC to make the changes described?
Answer:
In the accident reporting system, workers would have identified a need for faster,
more reliable information (initiation / planning).
They would ask system users and potential users about desirable qualities in the new
9
system (requirements analysis).
Based on those requirements, designers would lay out database specifications,
prototypes of screen layouts and other elements of the system (design).
A team would use those specifications to build the system (build),
after which it would be tested by a group of users (test).
After further revision based on testing feedback, the system would be deployed
throughout the organization (implementation).
Finally, the system would be run, maintained and updated as necessary (operations /
maintenance).
10