You are on page 1of 22

AIS Information in Business

CHAPTER 1  Information is a business resource that:


 needs to be appropriately managed
THE INFORMATION ENVIRONMENT
 is vital to the survival of contemporary
The pyramid shows the business organization divided
businesses
horizontally into several levels of activity. Business operations
 Management information is thus more summarized
form the base of the pyramid. These activities consist of the
and oriented toward reporting on overall
product-oriented work of the organization, such as
performance and problems rather than routine
manufacturing, sales, and distribution. Operations
operations. The information
management is directly responsible for controlling day-to-day
must identify potential problems in time for
operations. Middle management is accountable for the short-
management to take corrective action.
term planning and coordination of activities necessary to
What is a System?
accomplish organizational objectives. Top management is
 A group of interrelated multiple components or
responsible for longer-term
Internal & External planning and setting
Information Flows subsystems that serve a common purpose
organizational objectives.
 System or subsystem?
 A system is called a subsystem when it is
viewed as a component of a larger system.
 A subsystem is considered a system when it
is the focus of attention.
Elements of a System
 MULTIPLE COMPONENTS. A system must contain
more than one part.
 RELATEDNESS. A common purpose relates the
multiple parts of the system.
 SYSTEM VERSUS SUBSYSTEM.
 PURPOSE. A system must serve at least one
purpose, but it may serve several.
Internal Information Flows System Decomposition versus System Interdependency
 Horizontal flows of information used primarily at the  System Decomposition
operations level to capture transaction and  the process of dividing the system into
operations data. Horizontal flow supports smaller subsystem parts
operations-level tasks with highly detailed  System Interdependency
information about the many business transactions  distinct parts are not self-contained
affecting the firm. This includes information about  they are reliant upon the functioning of the
events such as the sale and shipment of goods, the other parts of the system
use of labor and materials in the production process,  all distinct parts must be functioning or the
and internal transfers of resources from one system will fail
department to another. What is an Information System?
 Vertical flows of information An information system is the set of formal procedures by
 downward flows — instructions, quotas, and which data are collected, processed into information, and
budgets distributed to users.
 upward flows — aggregated transaction and Transactions
operations data  A transaction is a business event.
 External users fall into two groups: trading partners  Financial transactions
and stakeholders.  economic events that affect the assets and
 Exchanges with trading partners include customer equities of the organization
sales and billing information, purchase information  e.g., purchase of an airline ticket
for suppliers, and inventory receipts information.  Nonfinancial transactions
Information Requirements  all other events processed by the
 Each user group has unique information organization’s information system
requirements.  e.g., an airline reservation — no
 The higher the level of the organization, the greater commitment by the customer
the need for more aggregated information and less
need for detail.
What is an Accounting Information System?
 Accounting is an information system. The elements of the general model:
 It identifies, collects, processes, and  End Users - External users include creditors,
communicates economic information about stockholders, potential investors, regulatory agencies,
a firm using a wide variety of technologies. tax authorities, suppliers, and customers. Internal users
 It captures and records the financial effects include management at every level of the organization,
of the firm’s transactions. as well as operations personnel.
 It distributes transaction information to  Data are facts, which may or may not be processed
operations personnel to coordinate many (edited, summarized, or refined) and have no direct
key tasks. effect on the user. By contrast, information causes the
AIS versus MIS user to take an action that he or she otherwise could not,
 Accounting Information Systems (AIS) process or would not, have taken. Information is often defined
 financial transactions; e.g., sale of goods simply as processed data.
 nonfinancial transactions that directly affect  Data Processing
the processing of financial transactions; e.g.,  Database Management - The organization’s database is
addition of newly approved vendors its physical repository for financial and nonfinancial data.
 Management Information Systems (MIS) process We use the term database in the generic sense. It can be
 nonfinancial transactions that are not a filing cabinet or a computer disk.
normally processed by traditional AIS; e.g.,  DATA ATTRIBUTE - The data attribute is the most
tracking customer complaints elemental piece of potentially useful data in the
AIS Subsystems database. An attribute is a logical and relevant
 Transaction processing system (TPS) - supports daily characteristic of an entity about which the firm captures
business operations. central to the overall function of the data.
information system by converting economic events into  RECORD - A record is a complete set of attributes for a
financial transactions, recording financial transactions in single occurrence within an entity class.
the accounting records (journals and ledgers), and  FILES. A file is a complete set of records of an identical
distributing essential financial information to operations class.
personnel to support their daily operations. The TPS
consists of three transaction cycles: the revenue cycle,
the expenditure cycle, and the conversion cycle. Each
cycle captures and processes different types of financial
transactions.
 General Ledger/ Financial Reporting System (GL/FRS) -
produces financial statements and reports. Summaries of
transaction cycle activity are processed by the GLS to
update the general ledger control accounts.
 Management Reporting System (MRS) - produces
special-purpose reports for internal use. This type of
reporting is called discretionary reporting because the Data Sources
organization can choose what information to report and  Data sources are financial transactions that enter the
how to present it. information system from internal and external
sources.
General Model for AIS  External financial transactions are the most
common source of data for most organizations.
• E.g., sale of goods and services, purchase of
inventory, receipt of cash, and
disbursement of cash (including payroll)
 Internal financial transactions involve the
exchange or movement of resources within the
organization.
• E.g., movement of raw materials into work-
in-process (WIP), application of labor and
overhead to WIP, transfer of WIP into
finished goods inventory, and depreciation  Segmenting by business function is a very common
of equipment method of organizing.
Transforming the Data into Information Functional Areas
Functions for transforming data into information  Inventory/Materials Management - The objective of
according to the general AIS model: materials management is to plan and control the
1. Data Collection materials inventory of the company.
 Capturing transaction data  Purchasing - responsible for ordering inventory from
 Recording data onto forms vendors when inventory levels fall to their reorder
 Validating and editing the data points.
2. Data Processing  Receiving - the task of accepting the inventory
previously ordered by purchasing. Receiving
 Classifying  Merging activities include counting and checking the physical
 Transcribing  Calculating
condition of these items.
 Sorting  Summarizing
 Stores - takes physical custody of the inventory
 Batching  Comparing
received and releases these resources into the
3. Data Management production process as needed.
 Storing - task assigns keys to new records and stores  Production - production planning, quality control, and
them in their proper location in the database maintenance
 Retrieving - the task of locating and extracting an  Marketing - The marketing function deals with the
existing record from the database for processing. strategic problems of product promotion, advertising,
After processing is complete, the storage task and market research.
restores the updated record to it place in the  Distribution - the activity of getting the product to the
database. customer after the sale. This is a critical step.
 Deleting - the task of permanently removing obsolete  Personnel - Competent and reliable employees are a
or redundant records from the database. valuable resource to a business. The objective of the
4. Information Generation personnel function is to effectively manage this resource.
 Compiling  Finance - The finance function manages the financial
 Arranging resources of the firm through banking and treasury
 Formatting activities, portfolio management, credit evaluation, cash
 Presenting disbursements, and cash receipts.
Characteristics of Useful Information  Accounting - manages the financial information resource
 Regardless of physical form or technology, useful of the firm. In this regard, it plays two important roles in
information has the following characteristics: transaction processing. First, accounting captures and
 Relevance: serves a purpose records the financial effects of the firm’s transactions.
 Timeliness: no older than the time period of Second, the accounting function distributes transaction
the action it supports information to operations personnel to coordinate many
 Accuracy: free from material errors of their key tasks.
 Completeness: all information essential to a  Computer Services
decision or task is present Accounting Independence
 Summarization: aggregated in accordance  Information reliability requires accounting
with the user’s needs independence.
 Feedback is a form of output that is sent back to the  Accounting activities must be separate and
system as a source of data. Feedback may be internal or independent of the functional areas
external and is used to initiate or alter a process. maintaining resources.
Information System Objectives in a Business Context  Accounting supports these functions with
 The goal of an information system is to support information but does not actively
 the stewardship function of management participate.
 management decision making  Decisions makers in these functions require
 the firm’s day-to-day operations that such vital information be supplied by an
Organizational Structure independent source to ensure its integrity.
 The structure of an organization helps to allocate The Computer Services Function
 responsibility 1. Distributed Data Processing - Reorganizing the
 authority computer services function into small information
 accountability processing units that are distributed to end users
and placed under their control
2. Centralized Data Processing - All data processing is  Data Storage - excessive storage costs of paper
performed by one or more large computers housed documents and/or magnetic form
at a central site that serves users throughout the  Data Updating - changes or additions must be
organization. Primary areas database administration performed multiple times
data processing systems development systems  Currency of Information - potential problem of failing
maintenance. to update all affected files
 Task-Data Dependency - user’s inability to obtain
 DATABASE ADMINISTRATION. Centrally
additional information as needs change
organized companies maintain their data
 Data Integration - separate files are difficult to
resources in a central location that is shared by
integrate across multiple users
all end users
THE DATABASE MODEL
 DATA PROCESSING. The data processing group
 An organization can overcome the problems
manages the computer resources used to
associated with flat files by implementing the
perform the day-to-day processing of
database model to data management.
transactions. It may consist of the following
REA Model
functions: data control, data conversion,
 The REA model is an accounting framework for
computer operations, and the data library.
modeling an organization’s
 SYSTEMS DEVELOPMENT AND MAINTENANCE.
a. economic resources; e.g., assets
The information needs of users are met by two
b. economic events; i.e., affect changes in
related functions: systems development and
resources
systems maintenance
c. economic agents; i.e., individuals and
Potential Advantages of DDP departments that participate in an economic
 Cost reductions in hardware and data entry tasks event
 Improved cost control responsibility d. Interrelationships among resources, events
 Improved user satisfaction since control is closer to and agents
the user level  Entity-relationship diagrams (ERD) are often used to
 Backup of data can be improved through the use of model these relationships.
multiple data storage sites
Accountants as Information System Users
Potential Disadvantages of DDP  Accountants must be able to clearly convey their
 Loss of control needs to the systems professionals who design the
 Mismanagement of company resources system.
 Hardware and software incompatibility  The accountant should actively participate
 Redundant tasks and data in systems development projects to ensure
 Consolidating tasks usually segregated appropriate systems design.
 Difficulty attracting qualified personnel
Accountants as System Designers
 Lack of standards
 The accounting function is responsible for the
Manual Process Model conceptual system, while the computer function is
 Transaction processing, information processing, and responsible for the physical system.
accounting are physically performed by people,  The conceptual system determines the nature of the
usually using paper documents. information required, its sources, its destination, and
 Useful to study because: the accounting rules that must be applied.
a. helps link AIS courses to other accounting
Accountants as System Auditors
courses
 External Auditors
b. often easier to understand business
 attest to fairness of financial statements
processes when not shrouded in technology
 assurance service: broader in scope than
c. facilitates understanding internal controls
traditional attestation audit
 The Flat-File Model - The flat-file model describes an
 IT Auditors
environment in which individual data files are not related
 evaluate IT, often as part of external audit
to other files. End users in this environment own their data
 Internal Auditors
files rather than share them with other users. Thus, stand-
 in-house IS and IT appraisal services
alone applications rather than integrated systems perform
CHAPTER 2
data processing.
TRANSACTION PROCESSING
Data Redundancy Problems
A Financial Transaction is...
 an economic event that affects the assets and  Fixed asset system. A firm’s fixed asset system
equities of the firm, is reflected in its accounts, and processes transactions pertaining to the
is measured in monetary terms. acquisition, maintenance, and disposal of its fixed
 similar types of transactions are grouped together assets.
into three transaction cycles:  Conversion Cycle:
 the expenditure cycle  the production system (planning, scheduling,
 the conversion cycle and control of the physical product through
 the revenue cycle the manufacturing process)
The most common financial transactions are economic  the cost accounting system (monitors the
exchanges with external parties. flow of cost information related to
Financial transactions also include certain internal events production)
such  Revenue Cycle: time lag between the two due to
as the depreciation of fixed assets; the application of labor, credit relations with customers:
raw materials, and overhead to the production  physical component (sales order processing)
process; and the transfer of inventory from one department  financial component (cash receipts)
to another.  Sales order processing. The majority of business
Relationship between Transaction Cycles sales are made on credit and involve tasks such
as preparing sales orders, granting credit,
shipping products (or rendering of a service) to
the customer, billing customers, and recording
the transaction in the accounts (accounts
receivable, inventory, expenses, and sales).
 Cash receipts. Cash receipts processing includes
collecting cash, depositing cash in the bank, and
recording these events in the accounts (accounts
receivable and cash).
Manual System Accounting Records
A document provides evidence of an economic event and
may be used to initiate transaction processing. Some
documents are a result of transaction processing
 Source Documents - used to capture and formalize
transaction data needed for transaction processing
Each Cycle has Two Primary Subsystems
 Expenditure Cycle: time lag between the two due to
credit relations with suppliers:
 physical component (acquisition of goods)
 financial component (cash disbursements to
the supplier)
 Purchases/accounts payable system. This system
recognizes the need to acquire physical inventory
(such as raw materials) and places an order with
the vendor.
 Product Documents - the result of transaction
 Cash disbursements system. When the obligation
processing
created in the purchases system is due, the cash
disbursements system authorizes the payment,
disburses the funds to the vendor, and records the
transaction by reducing the cash and accounts
payable accounts.
 Payroll system. The payroll system collects labor
usage data for each employee, computes the
payroll, and disburses paychecks to the
employees. Conceptually, payroll is a special-case
purchases and cash disbursements system.
 Turnaround Documents - a product document of one
system that becomes a source document for
another system
 Journals - a record of chronological entry
 special journals - specific classes of transactions
that occur in high frequency
 general journal - nonrecurring, infrequent, and
dissimilar transactions
 REGISTER. The term register is often used to
denote certain types of special journals. For
example, the payroll journal is often called the
payroll register.
 Ledger - a book of financial accounts
 general ledger - shows activity for each account Computer-Based Systems
listed on the chart of accounts  The audit trail is less observable in computer-based
 subsidiary ledger - shows activity by detail for systems than traditional manual systems.
each account type  The data entry and computer programs are the physical
Flow of Information from Economic Event into the General trail.
Ledger  The data are stored in magnetic files.
Computer Files
 Master File - generally contains account data (e.g.,
general ledger and subsidiary file)
 Transaction File - a temporary file containing transactions
since the last update
 Reference File - contains relatively constant information
used in processing (e.g., tax tables, customer addresses)
 Archive File - contains past transactions for reference
purposes
Documentation Techniques
Audit Trail  Documentation in a CB environment is necessary for
The accounting records described previously provide an many reasons.
audit trail for tracing transactions from source documents to  Five common documentation techniques:
the financial statements. Of the many purposes of the audit  Entity Relationship Diagram
trail, most important to accountants is the year-end audit.  Data Flow Diagrams
Although the study of financial auditing falls outside the scope  Document Flowcharts
of this text, the following thumbnail sketch of the audit  System Flowcharts
process will demonstrate the importance of the audit trail.  Program Flowcharts
The external auditor periodically evaluates the financial Entity Relationship Diagram (ERD)
statements of publicly held business organizations on behalf  A documentation technique to represent the
of its stockholders and other interested parties. relationship between entities in a system.
 The REA model version of ERD is widely used in AIS.
REA uses 3 types of entities:
 resources (cash, raw materials)
 events (release of raw materials into the
production process)
 agents (inventory control clerk, vendor,
production worker)
Cardinalities
 Represent the numerical mapping between entities:
 one-to-one
Example of Tracing an Audit Trail
 one-to-many
Verifying Accounts Receivable
 many-to-many
 are used to represent the relationship between the key
elements--input sources, programs, and output
products--of computer systems
 depict the type of media being used (paper, magnetic
tape, magnetic disks, and terminals)
 in practice, not much difference between document and
system flowcharts
Symbol Set for Representing Computer Processes

Data Flow Diagrams (DFD)…


 use symbols to represent the processes, data sources,
data flows, and entities in a system
 represent the logical elements of the system
 do not represent the physical system
Data Flow Diagram Symbols

Program Flowcharts…
 illustrate the logic used in programs
Program Flowchart Symbols

System Flowcharts…
 illustrate the relationship among processes and the
documents that flow between them
 contain more details than data flow diagrams
 clearly depict the separation of functions in a system

Modern Systems versus Legacy Systems


 Modern systems characteristics:
 client-server based and process transactions in
real time
Symbol Set for Representing
 use relational database tables
Manual Procedures
 have high degree of process integration and data
sharing
 some are mainframe based and use batch
processing
 Some firms employ legacy systems for certain aspects
of their data processing.
 Accountants need to understand legacy systems.
 Legacy systems characteristics:
 mainframe-based applications
 batch oriented
 early legacy systems use flat files for data storage
 later legacy systems use hierarchical and network
databases
 data storage systems promote a single-user
environment that discourages information
integration
System Flowcharts… Computer-Based Accounting Systems
 Two broad classes of systems:
 batch systems Why should we be concerned about ethics in the business
 real-time systems world?
Batch Processing  Ethics are needed when conflicts arise—the need to
 A batch is a group of similar transactions that are choose
accumulated over time and then processed together.  In business, conflicts may arise between:
 The transactions must be independent of one another  employees
during the time period over which the transactions are  management
accumulated in order for batch processing to be  stakeholders
appropriate.  Litigation
 A time lag exists between the event and the Business ethics involves finding the answers to two
processing. questions:
 How do managers decide on what is right in
Steps in Batch Processing/Sequential File
conducting their business?
 Keystroke - source documents are transcribed by
 Once managers have recognized what is right, how
clerks to magnetic tape for processing later do they achieve it?
 Edit Run - identifies clerical errors in the batch and  Four Main Areas of Business Ethics
places them into an error file
 Sort Run - places the transaction file in the same order
as the master file using a primary key
 Update Run - changes the value of appropriate fields
in the master file to reflect the transaction
 Backup Procedure - the original master continues to
exist and a new master file is created
Advantages of Batch Processing
 Organizations can increase efficiency by grouping
large numbers of transactions into batches rather
than processing each event separately.
 Batch processing provides control over the
transaction process via control figures.
Real-Time Systems…
 process transactions individually at the moment the
economic event occurs PROPORTIONALITY. The benefit from a decision must
 have no time lag between the economic event and outweigh the risks. Furthermore, there must be no
the processing alternative decision that provides the same or greater
 generally, require greater resources than batch benefit with less risk.
processing since they require dedicated processing  Justice. The benefits of the decision should be
capacity; however, these cost differentials are distributed fairly to those who share the risks. Those
decreasing who do not benefit should not carry the burden of
 oftentimes have longer systems development time risk.
 Minimize risk. Even if judged acceptable by the
principles, the decision should be implemented so as
================================================= to minimize all of the risks and avoid any
unnecessary risks.
CHAPTER 3
Computer Ethics
Ethics, Fraud and Internal Control
 The analysis of the nature and social impact of
Ethical Standards
computer technology and the corresponding
Ethical standards are derived from societal mores and
formulation and justification of policies for the ethical
deep-rooted personal beliefs about issues of right and wrong
use of such technology.… [This includes] concerns
that are not universally agreed upon.
about software as well as hardware and concerns
Business Ethics
about networks connecting computers as well as
Ethics pertains to the principles of conduct that individuals
computers themselves.’’
use in making choices and guiding their behavior in situations
 concerns the social impact of computer technology
that involve the concepts of right and wrong.
(hardware, software, and telecommunications).
 Three levels of computer ethics: pop, para, and
theoretical.4
 Pop computer ethics is simply the exposure to
stories and reports found in the popular media
regarding the good or bad ramifications of
computer technology.
 Para computer ethics involves taking a real interest
in computer ethics cases and acquiring some level
of skill and knowledge in the field.
 The third level, theoretical computer ethics, is of Enron, WorldCom, Adelphia - Underlying Problems
interest to multidisciplinary researchers who apply Lack of Auditor Independence: auditing firms also engaged by
the theories of philosophy, sociology, and their clients to perform non accounting activities
psychology to computer science with the goal of Lack of Director Independence: directors who also serve on
bringing some new understanding to the field. the boards of other companies, have a business trading
What are the main computer ethics issues? relationship, have a financial relationship as stockholders or
 Privacy - The creation and maintenance of huge, have received personal loans, or have an operational
shared databases make it necessary to protect people relationship as employees
from the potential misuse of data. Questionable Executive Compensation Schemes: short-term
 Security—accuracy and confidentiality - Computer stock options as compensation result in short-term
security is an attempt to avoid such undesirable strategies aimed at driving up stock prices at the expense of
events as a loss of confidentiality or data integrity. the firm’s long-term health
Security systems attempt to prevent fraud and other Inappropriate Accounting Practices: a characteristic common
misuse of computer systems; they act to protect and to many financial statement fraud schemes
further the legitimate interests of the system’s  Enron made elaborate use of special purpose
constituencies. entities.
 Ownership of property - Laws designed to preserve  WorldCom transferred transmission line costs from
real property rights have been extended to cover current expense accounts to capital accounts.
what is referred to as intellectual property, that is, Sarbanes-Oxley Act of 2002 - Its principal reforms pertain to:
software.  Creation of the Public Company Accounting
 Equity in access Oversight Board (PCAOB)
 Environmental issues  Auditor independence—more separation between a
 Artificial intelligence firm’s attestation and non-auditing activities
 Unemployment and displacement - Many jobs have  Corporate governance and responsibility—audit
been and are being changed as a result of the committee members must be independent and the
availability of computer technology. People unable or audit committee must oversee the external auditors
unprepared to change are displaced.  Disclosure requirements—increase issuer and
management disclosure
 Misuse of computer
 New federal crimes for the destruction of or
Legal Definition of Fraud
tampering with documents, securities fraud, and
 False representation - false statement or disclosure
actions against whistleblowers
 Material fact - a fact must be substantial in inducing
someone to act
Employee Fraud
 Intent to deceive must exist
 Committed by non-management personnel
 The misrepresentation must have resulted in
 Usually consists of: an employee taking cash or other
justifiable reliance upon information, which caused
assets for personal gain by circumventing a
someone to act
company’s system of internal controls
 The misrepresentation must have caused injury or
loss
Management Fraud
 Perpetrated at levels of management above the one
to which internal control structure relates
 Frequently involves using financial statements to
create an illusion that an entity is healthier and
prosperous than it actually is
 Involves misappropriation of assets, it frequently is  Cash larceny involves schemes in which cash receipts
shrouded in a maze of complex business are stolen from an organization after they have been
transactions recorded in the organization’s books and records. An
Fraud Schemes example of this is lapping, in which the cash receipts
Three categories of fraud schemes according to the clerk first steals and cashes a check from Customer A.
Association of Certified Fraud Examiners:  Check tampering involves forging or changing in some
A. fraudulent statements - are associated with material way a check that the organization has
management fraud. written to a legitimate payee.
B. corruption - involves an executive, manager, or  Payroll fraud is the distribution of fraudulent
employee of the organization in collusion with an paychecks to existent and/or nonexistent employees.
outsider. Most common type of fraud and often occurs as
C. asset misappropriation - The most common fraud employee fraud
schemes involve some form of asset misappropriation in  Examples:
which assets are either directly or indirectly diverted to  making charges to expense accounts to
the perpetrator’s benefit. cover theft of asset (especially cash)
A. Fraudulent Statements  lapping: using customer’s check from one
 Misstating the financial statements to make the copy account to cover theft from a different
appear better than it is account
 Usually occurs as management fraud  transaction fraud: deleting, altering, or
 May be tied to focus on short-term financial adding false transactions to steal assets
measures for success Internal Control Objectives According to AICPA SAS
 May also be related to management bonus packages 1. Safeguard assets of the firm
being tied to financial statements 2. Ensure accuracy and reliability of accounting records
B. Corruption and information
 BRIBERY. Bribery involves giving, offering, soliciting, or 3. Promote efficiency of the firm’s operations
receiving things of value to influence an official in the 4. Measure compliance with management’s prescribed
performance of his or her lawful duties policies and procedures
 ILLEGAL GRATUITIES. An illegal gratuity involves giving, Modifying Assumptions to the Internal Control Objectives
receiving, offering, or soliciting something of value  Management Responsibility
because of an official act that has been taken. This is The establishment and maintenance of a system of internal
similar to a bribe, but the transaction occurs after the control is the responsibility of management.
fact  Reasonable Assurance
 CONFLICTS OF INTEREST. Every employer should The cost of achieving the objectives of internal control
expect that his or her employees will conduct their should not outweigh its benefits.
duties in a way that serves the interests of the  Methods of Data Processing
employer. A conflict of interest occurs when an The techniques of achieving the objectives will vary with
employee acts on behalf of a third party during the different types of technology.
discharge of his or her duties or has self-interest in Limitations of Internal Controls
the activity being performed  Possibility of honest errors
 ECONOMIC EXTORTION. Economic extortion is the use  Circumvention via collusion
(or threat) of force (including economic sanctions) by  Management override
an individual or organization to obtain something of  Changing conditions--especially in companies with
value. The item of value could be a financial or high growth
economic asset, information, or cooperation to Exposures of Weak Internal Controls (Risk)
obtain a favorable decision on some matter under  Destruction of an asset
review.  Theft of an asset
 Corruption of information
 Foreign Corrupt Practice Act of 1977:  Disruption of the information system
 indicative of corruption in business world Preventive, Detective, and Corrective Controls
 impacted accounting by requiring accurate
records and internal controls
C. Asset Misappropriation
 Skimming involves stealing cash from an organization
before it is recorded on the organization’s books and
records.
 how these transactions are initiated [input]
 the associated accounting records and accounts
used in processing [input]
 the transaction processing steps involved from the
initiation of a transaction to its inclusion in the
SAS 78 / COSO financial statements [process]
Describes the relationship between the firm’s…  the financial reporting process used to compile
 internal control structure, financial statements, disclosures, and estimates
 auditor’s assessment of risk, and [output]
 the planning of audit procedures [red shows relationship to the general AIS model]
How do these three interrelate? 4: Monitoring
The weaker the internal control structure, the higher the The process for assessing the quality of internal control
assessed level of risk; the higher the risk, the more auditor design and operation
procedures applied in the audit. [This is feedback in the general AIS model.]
Five Internal Control Components: SAS 78 / COSO  Separate procedures—test of controls by internal
1. Control environment auditors
2. Risk assessment  Ongoing monitoring:
3. Information and communication  computer modules integrated into routine
4. Monitoring operations
5. Control activities  management reports which highlight trends
1: The Control Environment and exceptions from normal performance
 Integrity and ethics of management [red shows relationship to the general AIS model]
 Organizational structure
 Role of the board of directors and the audit 5: Control Activities
committee  Policies and procedures to ensure that the
 Management’s policies and philosophy appropriate actions are taken in response to
 Delegation of responsibility and authority identified risks
 Performance evaluation measures  Fall into two distinct categories:
 External influences—regulatory agencies  IT controls—relate specifically to the
 Policies and practices managing human resources computer environment
2: Risk Assessment  Physical controls—primarily pertain to
 Identify, analyze and manage risks relevant to human activities
financial reporting: Two Types of IT Controls
 changes in external environment  General controls—pertain to the entity wide
 risky foreign markets computer environment
 significant and rapid growth that strain  Examples: controls over the data center,
internal controls organization databases, systems
 new product lines development, and program maintenance
 restructuring, downsizing  Application controls—ensure the integrity of specific
 changes in accounting policies systems
3: Information and Communication  Examples: controls over sales order
 The AIS should produce high quality information processing, accounts payable, and payroll
which: applications
 identifies and records all valid transactions Six Types of Physical Controls
 provides timely information in appropriate  Transaction Authorization
detail to permit proper classification and  Segregation of Duties
financial reporting  Supervision
 accurately measures the financial value of  Accounting Records
transactions  Access Control
 accurately records transactions in the time  Independent Verification
period in which they occurred Physical Controls
Information and Communication Transaction Authorization
 Auditors must obtain sufficient knowledge of the IS to  used to ensure that employees are carrying out only
understand: authorized transactions
 the classes of transactions that are material
 general (everyday procedures) or specific (non- Independent Verification
routine transactions) authorizations  When tasks are performed by the computer rather
Segregation of Duties than manually, the need for an independent check is
 In manual systems, separation between: not necessary.
 authorizing and processing a transaction  However, the programs themselves are checked.
 custody and recordkeeping of the asset
 subtasks
 In computerized systems, separation between: CHAPTER 4
 program coding The Revenue Cycle
 program processing
 program maintenance
Supervision Sales Order
 a compensation for lack of segregation; some may 1
be built into computer systems Credit / Customer
Accounting Records Service REVENUE CYCLE
2
 provide an audit trail (SUBSYSTEM)
Cash Receipts/
Access Controls Collections

 help to safeguard assets by restricting physical 6

access to them Shipping


Independent Verification 3
 reviewing batch totals or reconciling subsidiary
accounts with control accounts Billing/ Accounts
Receivable
4/5

Journal Vouchers/Entries (How do we get them?)


 Billing Department prepares a journal voucher:
Accounts Receivable DR
Sales CR
 Inventory Control Dept. prepares a journal voucher:
Cost of Goods Sold DR
Inventory CR
 Cash Receipts prepares a journal voucher:
Physical Controls in IT Contexts
Cash DR
Transaction Authorization
Accounts Receivable CR
 The rules are often embedded within computer
programs.
Revenue Cycle Databases
 EDI/JIT: automated re-ordering of inventory
without human intervention
 Master files
Segregation of Duties
 customer master file
 A computer program may perform many tasks that
 accounts receivable master file
are deemed incompatible.
 merchandise inventory master file
 Thus the crucial need to separate program
 Transaction and Open Document Files
development, program operations, and program
 sales order transaction file
maintenance.
• open sales order transaction file
Supervision
 sales invoice transaction file
 The ability to assess competent employees becomes
 cash receipts transaction file
more challenging due to the greater technical
 Other Files
knowledge required.
 shipping and price data reference file
Accounting Records
 credit reference file (may not be needed)
 ledger accounts and sometimes source documents
 salesperson file (may be a master file)
are kept magnetically
 Sales history file
 no audit trail is readily apparent
 cash receipts history file
Access Control
 accounts receivable reports file
 Data consolidation exposes the organization to
Sales Order Processing
computer fraud and excessive losses from disaster.
Sales order procedures include the tasks involved in added to the invoice copy of the sales order. The
receiving and processing a customer order, filling the order completed sales invoice is the customer’s bill, which
and shipping products to the customer, billing the customer formally depicts the charges to the customer.
at the proper time, and correctly accounting for the  Billing compiles and reconciles the relevant facts and
transaction. issues an invoice to the customer and updates the
RECEIVE ORDER sales journal. Information is transferred to:
 Begins with a customer placing an order  Accounts Receivable (A/R)
 The sales department captures the essential  Inventory Control
details on a sales order form.  A/R records the information in the customer’s
 Sales Order - captures vital information such as the account in the accounts receivable subsidiary ledger.
customer’s name, address, and account number; the  Inventory Control adjusts the inventory subsidiary
name, number, and description of the items sold; and ledger.
the quantities and unit prices of each item sold  Billing, A/R, and Inventory Control submits summary
 After creating the sales order, a copy of it is placed in information to the General Ledger dept., which then
the customer open order file for future reference. The reconciles this data and posts to the control
open order file thus enables customer service accounts in the G/L.
employees to respond promptly and accurately to  The sales journal is a special journal used for recording
customer questions. completed sales transactions. The details of sales
CHECK CREDIT invoices are entered in the journal individually. At the
 The transaction is authorized by obtaining credit end of the period, these entries are summarized into a
approval by the credit department. sales journal voucher, which is sent to the general ledger
 The credit approval process is an authorization task for posting.
control and should be performed as a function  The AR summary figures should equal the total debits
separate from the sales activity. In our conceptual to AR reflected in the journal vouchers for the
system, the receive-order task sends the sales order transaction period. By reconciling these figures, the
(credit copy) to the check-credit task for approval. general ledger function can detect many types of errors.
 Sales information is released to: Sales Return Procedures
 Billing PREPARE RETURN SLIP.
 Warehouse (stock release or picking ticket) When items are returned, the receiving department
 Shipping (packing slip and shipping notice) employee counts, inspects, and prepares a return slip
PICK GOODS describing the items. The goods, along with a copy of the
 The receive order activity forwards the stock release return slip, go to the warehouse to be restocked. The
document (also called the picking ticket) to the pick employee then sends the second copy of the return slip to the
goods function, in the warehouse. sales function to prepare a credit memo.
 The merchandise is picked from the Warehouse and sent PREPARE CREDIT MEMO.
to Shipping. After picking the stock, the order is verified Upon receipt of the return slip, the sales employee
for accuracy and the goods and verified stock release prepares a credit memo. This document is the authorization
document are sent to the ship goods task. for the customer to receive credit for the merchandise
 Stock records are adjusted. returned.
SHIP GOODS APPROVE CREDIT MEMO.
 The merchandise, packing slip, and bill of lading are The credit manager evaluates the circumstances of the
prepared by Shipping and sent to the customer. return and makes a judgment to grant (or disapprove) credit.
 Shipping reconciles the merchandise received from The manager then returns the approved credit memo to the
the Warehouse with the sales information on the sales department.
packing slip. UPDATE SALES JOURNAL.
 Shipping information is sent to Billing. Upon receipt of the approved credit memo, the transaction
BILL CUSTOMER is recorded in the sales journal as a contra entry. The credit
 The billing function awaits notification from shipping memo is then forwarded to the inventory control function for
before it bills. The bill-customer function receives the posting. At the end of the period, total sales returns are
sales order (invoice copy) from the receive order task. summarized in a journal voucher and sent to the general
This document is placed in an S.O. pending file until ledger department.
receipt of the shipping notice, which describes the UPDATE INVENTORY AND AR RECORDS.
products that were actually shipped to the customer. The inventory control function adjusts the inventory
Upon arrival, the items shipped are reconciled with those records and forwards the credit memo to accounts receivable,
ordered and unit prices, taxes, and freight charges are where the customer’s account is also adjusted.
UPDATE GENERAL LEDGER. copies of the sales orders from the pending file and releases
Sales Return Journal Entry them to the billing, warehouse, and shipping departments.
G/L posts the following to control accounts: Warehouse Procedures
Inventory—Control DR The next step is to ship the merchandise, which should be
Sales Returns and Allowances DR done as soon after credit approval as possible. The warehouse
Cost of Goods Sold CR clerk receives the stock release copy of the sales order and
Accounts Receivable—Control CR uses this to locate the inventory. The inventory and stock
release are then sent to the shipping department. Finally, the
Cash Receipts Processes warehouse clerk records the inventory reduction in the stock
Involve receiving and securing the cash; depositing the records.
cash in the bank; matching the payment with the customer The Shipping Department
and adjusting the correct account; and properly accounting The shipping clerk reconciles the products received from
for and reconciling the financial details of the transaction. the warehouse with the shipping notice copy of the sales
OPEN MAIL AND PREPARE REMITTANCE ADVICE. order received earlier. When the order is correct, a bill of
A mail room employee opens envelopes containing lading is prepared, and the products are packaged and
customers’ payments and remittance advices. Remittance shipped via common carrier to the customer. The clerk then
advices contain information needed to service individual enters the transaction into the shipping log and sends the
customers’ accounts. This includes payment date, account shipping notice and stock release to the billing department.
number, amount paid, and customer check number. Mail The Billing Department
room personnel route the checks and remittance advices to The shipping notice is proof that the product has been
an administrative clerk who endorses the checks ‘‘For Deposit shipped and is the trigger document that initiates the billing
Only’’ and reconciles the amount on each remittance advice process. Upon receipt of the shipping notice and stock
with the corresponding check. The clerk then records each release, the billing clerk compiles the relevant facts about the
check on a form called a remittance list (or cash prelist), transaction (product prices, handling charges, freight, taxes,
where all cash received is logged. and discount terms) and bills the customer. The billing clerk
 A mail room clerk prepares a cash prelist and sends then enters the transaction into the sales journal and
the prelist and the checks to Cash Receipts. distribute documents to the AR and inventory control
 The cash prelist is also sent to A/R and the departments. Periodically, the clerk summarizes all
Controller. transactions into a journal voucher and sends this to the
RECORD AND DEPOSIT CHECKS. general ledger department.
 Cash Receipts: Accounts Receivable, Inventory Control, and General Ledger
 verifies the accuracy and completeness of Departments
the checks Upon receipt of sales documents from the billing
 updates the cash receipts journal department, the AR and inventory control clerks update their
 prepares a deposit slip respective subsidiary ledgers. Periodically they prepare
 prepares a journal voucher to send to G/L journal vouchers and account summaries, which they send to
 A/R posts from the remittance advices to the the general ledger department for reconciliation and posting
accounts receivable subsidiary ledger. to the control accounts.
 Periodically, a summary of the postings is SALES RETURN PROCEDURES
sent to G/L. Receiving Department
 G/L department: The sales return process begins in the receiving
 reconciles the journal voucher from Cash department, where personnel receive, count, inspect for
Receipts with the summaries from A/R damage, and send returned products to the warehouse. The
 updates the general ledger control accounts receiving clerk prepares a return slip, which is forwarded to
 The Controller reconciles the bank accounts. the sales department for processing.
SALES ORDER PROCESSING (Departments Involved) Sales Department
Sales Department Upon receipt of the return slip, the clerk prepares a credit
The sales process begins with a customer contacting the memo. Depending on the materiality and circumstance of the
sales department by telephone, mail, or in person. The sales return, company policy will dictate whether credit
department records the essential details on a sales order. department approval (not shown) is required.
Credit Department Approval Processing the Credit Memo
To provide independence to the credit authorization The objective of the sales return system is to reverse the
process, the credit department is organizationally and effects of the original sales transaction. Billing records a
physically segregated from the sales department. When credit contra entry into sales return, and allowance journal
is approved, the sales department clerk pulls the various
inventory control debits the inventory records to reflect the 2. Asset custody should be separate from asset record-
return of goods. The AR clerk credits the customer account keeping.
CASH RECEIPTS PROCEDURES 3. The organization should be so structured that the
Mail Room perpetration of a fraud requires collusion between
Customer payments and remittance advices arrive at the two or more individuals.
mail room, where the envelopes are opened. The checks are
sent to the cashier in the cash receipts department, and the  Sales Order Processing
remittance advices are sent to the AR department.  credit authorization separate from SO
Cash Receipts processing
The cashier records the checks in the cash receipts journal  inventory control separate from warehouse
and promptly sends them to the bank, accompanied by two  accounts receivable sub-ledger separate
copies of the deposit slip. Periodically, the employee prepares from general ledger control account
a journal voucher and sends it to the general ledger  Cash Receipts Processing
department.  cash receipts separate from accounting
Controller’s Office records
In this case, someone from the controller’s office  accounts receivable sub-ledger separate
periodically performs a bank reconciliation by comparing from general ledger
deposit slips returned from the bank, account summaries Supervision
used to post to the accounts, and journal vouchers.  Often used when unable to enact appropriate
segregation of duties.
Summary of Internal Controls  Supervision of employees serves as a deterrent to
dishonest acts and is particularly important in the
mailroom.
Accounting Records
 With a properly maintained audit trail, it is possible to
track transactions through the systems and to find
where and when errors were made:
 pre-numbered source documents - (sales orders,
shipping notices, remittance advices, and so on) are
sequentially numbered by the printer and allow every
transaction to be identified uniquely. This permits the
isolation and tracking of a single event (among many
thousands) through the accounting system.
 special journals - By grouping similar transactions
together into special journals, the system provides a
concise record of an entire class of events.
 subsidiary ledgers - These subsidiary records provide
links back to journal entries and to the source
documents that captured the events.
 general ledger - he general ledger control
accounts are the basis for financial statement
Authorization Controls preparation.
 Proper authorization of transactions  Files - The revenue cycle employs several temporary
(documentation) should occur so that only valid and permanent files that contribute to the audit trail.
transactions get processed. The following are typical examples:
 Within the revenue cycle, authorization should take  Open sales order file shows the status of
place when: customer orders.
 a sale is made on credit (authorization)  Shipping log specifies orders shipped during the
 a cash refund is requested (authorization) period.
 posting a cash payment received to a  Credit records file provides customer credit data.
customer’s account (cash pre-list)  Sales order pending file contains open orders not
yet shipped or billed.
Segregation of Functions (Three Rules)  Back-order file contains customer orders for out-
1. Transaction authorization should be separate from of-stock items.
transaction processing.
 b is a compilation of all journal vouchers posted
to the general ledger. Purchase Requisition Purchasing
Access Controls 1 2
 Access to assets and information (accounting
records) should be limited. PROCUREMENT CYCLE
(SUBSYSTEM)
 Within the revenue cycle, the assets to protect are Receiving/
cash and inventories and access to records such as Cash Disbursements Inspection
the accounts receivable subsidiary ledger and cash 3
5
journal should be restricted.
Independent Verification
 Physical procedures as well as record-keeping should
be independently reviewed at various points in the
system to check for accuracy and completeness: Accounts Payable
 shipping verifies the goods sent from the 4
warehouse are correct in type and quantity
 warehouse reconciles the stock release Goals of the Expenditure Cycle
document (picking slip) and packing slip  The goal of providing needed resources to
 billing reconciles the shipping notice with organization can be broken down into several
the sales invoice objectives:
 general ledger reconciles journal vouchers  purchase from reliable vendors
from billing, inventory control, cash receipts,  purchase high quality items
and accounts receivable  obtain best possible price
Automating the Revenue Cycle  purchase only items that are properly
 Authorizations and data access can be performed authorized
through computer screens.  have resources available when they are
 There is a decrease in the amount of paper. needed
 The manual journals and ledgers are changed to disk  receive only those items ordered
or tape transaction and master files.  ensure items are not lost, stolen,
 Input is still typically from a hard copy document and or broken
goes through one or more computerized processes.  pay for the items in a timely manner
 Processes store data in electronic files (the tape or
disk) or prepare data in the form of a hardcopy
report. A Purchase System
 Revenue cycle programs can include:  Begins in Inventory Control when inventory levels
 formatted screens for collecting data drop to reorder levels
 edit checks on the data entered  A purchase requisition (PR) is prepared and copies to
 instructions for processing and storing the be sent to Purchasing and Accounts Payable (A/P)
data  Purchasing prepares a purchase order (PO) for each
 security procedures (passwords or user IDs) vendor and sends copies to Inventory Control, A/P,
 steps for generating and displaying output and Receiving
 To understand files, you must consider the record  Upon receipt, Receiving counts and inspects the
design and layout. goods.
 The documents and the files used as input sources  A blind copy of the PO is used to force
must contain the data necessary to generate the workers to count the goods.
output reports.  A receiving report is prepared and copies sent to the
raw materials storeroom, Purchasing, Inventory
Control, and A/P.
CHAPTER 5  A/P eventually receives copies of the PR, PO,
Purchases and Cash Disbursements Procedures receiving report, and the supplier’s invoice.
 A/P reconciles these documents, posts to the
purchases journal, and records the liability in the
accounts payable subsidiary ledger.
 A/P periodically summarizes the entries in the
purchases journal as a journal voucher which is sent
to the General Ledger (G/L) department.
Inv-Control or Purchases DR When the invoice arrives, the AP clerk reconciles the
Accts Payable-Control CR financial information with the documents in the pending file,
 A/P also prepares a cash disbursements voucher and records the transaction in the purchases journal, and posts it
posts it in the voucher register. to the supplier’s account in the AP subsidiary ledger (voucher
 G/L department: register)
 posts from the accounts payable journal voucher to General Ledger Department
the general ledger The general ledger department receives a journal voucher
 reconciles the inventory amount with the account from the AP department and an account summary from
summary received from inventory control inventory control. The general ledger clerk reconciles these
DFD for Cash Disbursements System and posts to the inventory and AP control accounts. With this
Cash Disbursements System step, the purchases phase of the expenditure cycle is
 Periodically, A/P searches the open vouchers completed.
payable file for items with payments due: THE CASH DISBURSEMENTS SYSTEMS (Departments involved)
 A/P sends the voucher and supporting AP Department
documents to Cash Disbursements Each day, the AP clerk reviews the open vouchers payable
 A/P updates the accounts payable subsidiary (AP) file for items due and sends the vouchers and
ledger supporting documents to the cash disbursements
 Cash Disbursements: department.
 prepares the check Cash Disbursements Department
 records the information in a check register The cash disbursements clerk receives the voucher packets
(cash disbursements journal) and reviews the documents for completeness and clerical
 returns paid vouchers to accounts payable, accuracy. For each disbursement, the clerk prepares a three-
mails the check to the supplier part check and records the check number, dollar amount,
 sends a journal voucher to G/L: voucher number, and other pertinent data in the check
Accounts Payable DR register. The check, along with the supporting documents,
Cash CR goes to the cash disbursements department manager, or
 G/L department receives: treasurer, for his or her signature. The negotiable portion of
 the journal voucher from cash the check is mailed to the supplier. The clerk returns the
disbursements voucher packet and check copy to the AP department and files
 a summary of the accounts payable one copy of the check. Finally, the clerk summarizes the
subsidiary ledger from A/P entries made to the check register and sends a journal
 The journal voucher is used to update the general voucher to the general ledger department.
ledger. General Ledger Department
 The accounts payable control account is reconciled
with the subsidiary summary. Expenditure Cycle Database
AP & CASHDISBURSEMENT (Departments Involved)  Master Files
 supplier (vendor) master file
Inventory Control  accounts payable master file
Note that to provide proper authorization control, the  merchandise inventory master file
inventory control department is segregated from the  Transaction and Open Document Files
purchasing department, which executes the transaction.  purchase order file
Purchasing Department  open purchase order file
The purchasing department receives the purchase  supplier’s invoice file
requisitions, sorts them by vendor, and prepares a multipart  open vouchers file
PO for each vendor.  cash disbursements file
Receiving Department  Other Files
Goods arriving from the vendor are reconciled with the  supplier reference and history file
blind copy of the PO. Upon completion of the physical count  buyer file
and inspection, the receiving clerk prepares a multipart  accounts payable detail file
receiving report stating the quantity and condition of the
inventories. One copy of the receiving report accompanies
the physical inventories to the storeroom. Another copy is
sent to the purchasing department, where the purchasing Summary of Internal Controls
clerk reconciles it with the open PO.
AP Department General Internal Controls
 Organization controls The personnel department prepares and submits
 segregation of duties personnel action forms to the prepare payroll function. These
 Documentation documents identify employees authorized to receive a
 Asset Accountability Controls paycheck and are used to reflect changes in hourly pay rates,
 Management Practices payroll deductions, and job classification. Personnel action
 Data Center Operations Controls form is used to advise payroll of an increase in an employee’s
 Authorization Controls salary.
 Access Controls Production Department
Authorization Controls Production employees prepare two types of time records:
 Purchases of inventory should be authorized by the job tickets and time cards. Job tickets capture the time that
Inventory Control department, not by purchasing individual workers spend on each production job. Cost
agents accounting uses these documents to allocate direct labor
 Accounts Payable authorizes the payments of bills, charges to work-in-process (WIP) accounts. Time cards
not the cash disbursements clerk, who writes the capture the time the employee is at work. These are sent to
checks the prepare payroll function for calculating the amount of the
Traditional Segregation of Duties employee’s paycheck.
 Warehouse (stores) Update WIP Account (Cost Accounting Department)
 Inventory control After cost accounting allocates labor costs to the WIP
 Accounts payable accounts, the charges are summarized in a labor distribution
 General ledger summary and forwarded to the general ledger function.
 Requisitioning Prepare Payroll
 Purchases The payroll department receives pay rate and withholding
 Purchases returns and allowances data from the personnel department and hours worked data
 Cash disbursements from the production department. A clerk in payroll then
Supervision performs the following tasks.
 Within the expenditure cycle, supervision is of 1. Prepares the payroll register showing gross pay,
highest importance in the Receiving department, deductions, overtime pay, and net pay.
where the inventory arrives and is logged in by a 2. Enters this information into the employee payroll
receiving clerk. Need to minimize: records
 failures to properly inspect the assets 3. Prepares employee paychecks .
 theft of the assets 4. Sends the paychecks to the distribute paycheck function.
Access Controls 5. Files the time cards, personnel action form, and copy of
 Access to: the payroll register (not shown).
 inventories (direct) Distribute Paycheck
 cash (direct) A form of payroll fraud involves submitting time cards for
 accounting records (indirect) nonexistent employees. To prevent this, many companies use
Independent Verification a paymaster to distribute the paychecks to employees. This
 A/Payable dept. verifies much of the work done individual is independent of the payroll process—not involved
within the expenditure cycle. in payroll authorization or preparation tasks. If a valid
 PR, PO, receiving reports, and suppliers’ employee does not claim a paycheck, the paymaster returns
invoices must be checked and verified by the check to payroll. The reason the check went unclaimed
A/P. can then be investigated.
 G/Ledger dept. verifies: Prepare Accounts Payable (Accounts Payable Department)
 the total obligations recorded equal the The accounts payable (AP) clerk reviews the payroll register
total inventories received for correctness and prepares copies of a cash disbursement
 the total reductions in accounts payable voucher for the amount of the payroll. The clerk records the
equal the total disbursements of cash voucher in the voucher register and submits the voucher
packet (voucher and payroll register) to cash disbursements.
A copy of the disbursement voucher is sent to the general
CHAPTER 6 ledger function.
Payroll Processing and Fixed Asset Procedures Prepare Cash Disbursement (Cash Disbursement Department)
Upon receipt of the voucher packet, the cash
(Departments Involved) disbursements function prepares a single check for the entire
Personnel Department amount of the payroll and deposits it in the payroll imprest
account. The employee paychecks are drawn on this account,
which is used only for payroll. Funds must be transferred from Independent Verification
the general cash account to this imprest account before the The following are examples of independent verification
paychecks can be cashed. The clerk sends a copy of the check controls in the payroll system:
along with the disbursement voucher and the payroll register 1. Verification of time. Before sending time cards to payroll,
to the AP department, where they are filed (not shown). the supervisor must verify their accuracy and sign them.
Finally, a journal voucher is prepared and sent to the general 2. Paymaster. The use of an independent paymaster to
ledger function. distribute checks (rather than the normal supervisor) helps
Update General Ledger verify the existence of the employees. The supervisor may be
The general ledger function receives the labor distribution party to a payroll fraud by pretending to distribute paychecks
summary from cost accounting, the disbursement voucher to nonexistent employees.
from AP, and the journal voucher from cash disbursements. 3. Accounts payable. The AP clerk verifies the accuracy of the
With this information, the general ledger clerk makes the payroll register before creating a disbursement voucher that
following accounting entries: transfers funds to the imprest account.
From the Labor Distribution Summary 4. General ledger. The general ledger department provides
Work-in-Process (Direct labor) XXX.XX verification of the overall process by reconciling the labor
Factory Overhead (Indirect labor) XXX.XX distribution summary and the payroll disbursement voucher.
Wages Payable XXX.XX
FIXED ASSETS are the property, plant, and equipment used in
Transaction Authorization the operation of a business. These are relatively permanent
A form of payroll fraud involves submitting time cards for items that often collectively represent the largest financial
employees who no longer work for the firm. To prevent this, investment by the organization. Examples of fixed assets
the personnel action form helps payroll keep the employee include land, buildings, furniture, machinery, and motor
records current. This document describes additions, vehicles. A firm’s fixed asset system processes transactions
deletions, and other changes to the employee file and acts as pertaining to the acquisition, maintenance, and disposal of its
an important authorization control to ensure that only the fixed assets.
time cards of current and valid employees are processed. Asset Acquisition
Segregation of Duties Usually begins with the departmental manager (user)
The time-keeping function and the personnel function recognizing the need to obtain a new asset or replace an
should be separated. Segregating key aspects of the payroll existing one. Authorization and approval procedures over the
transaction between AP and cash disbursement functions transaction will depend on the asset’s value. Department
returns control to the process. AP reviews the work done by managers typically have authority to approve purchases
payroll (payroll register) and approves payment. Cash below a certain materiality limit. Capital expenditures above
disbursements then writes the check to cover the total the limit will require approval from the higher management
payroll. None of the employee paychecks is a negotiable levels. This may involve a formal cost-benefit analysis and the
instrument until the payroll check is deposited into the formal solicitation of bids from suppliers. Once the request is
imprest account. approved and a supplier is selected, the fixed asset acquisition
Supervision task is similar to the expenditure cycle procedures described
Sometimes employees will clock in for another worker who in Chapter 5, with two noteworthy differences. First, the
is late or absent. Supervisors should observe the time-keeping receiving department delivers the asset into the custody of
process and reconcile the time cards with actual attendance. the user/manager rather than a central store or warehouse.
Accounting Records Second, the fixed asset department, not inventory control,
The audit trail for payroll includes the following documents: performs the record-keeping function.
1. Time cards, job tickets, and disbursement vouchers. Asset Maintenance
2. Journal information, which comes from the labor Involves adjusting the fixed asset subsidiary account
distribution summary and the payroll register. balances as the assets (excluding land) depreciate over time
3. Subsidiary ledger accounts, which contain the employee or with usage. The method of depreciation and the period
records and various expense accounts. used should reflect, as closely as possible, the asset’s actual
4. The general ledger accounts: payroll control, cash, and the decline in utility to the firm. The depreciation of fixed assets
payroll clearing (imprest) account. used to manufacture products is charged to manufacturing
Access Controls overhead and then allocated to WIP. Depreciation charges
The assets associated with the payroll system are labor and from assets not used in manufacturing are treated as
cash. Both can be misappropriated through improper access expenses in the current period.
to accounting records. Similarly, control over access to all Depreciation calculations are transactions that the fixed
journals, ledgers, and source documents in the payroll system asset system must be designed to anticipate internally when
is important, as it is in all expenditure cycle systems. no external event (source document) triggers the action. An
important record used to initiate this task is the depreciation
schedule. Each subsidiary record should indicate the current
location of the asset. The ability to locate and verify the
physical existence of fixed assets is an important component
of the audit trail.
Asset Disposal
When an asset has reached the end of its useful life or
when management decides to dispose of it, the asset must be
removed from the fixed asset subsidiary ledger. It begins
when the responsible manager issues a request to dispose of
the asset. Like any other transaction, the disposal of an asset
requires proper approval. The disposal options open to the
firm are to sell, scrap, donate, or retire the asset in place. A
disposal report describing the final disposition of the asset is
sent to the fixed asset accounting department to authorize its
removal from the ledger.
Authorization Controls
Fixed asset acquisitions should be formal and explicitly
authorized. Each transaction should be initiated by a written
request from the user or department. In the case of high-
value items, there should be an independent approval process
that evaluates the merits of the request on a cost-benefit
basis.
Supervision Controls
Because capital assets are widely distributed throughout
the organization, they are more susceptible to theft and
misappropriation than inventories that are secured in a
warehouse. Therefore, management supervision is an
important element in the physical security of fixed assets.
Supervisors must ensure that fixed assets are being used in
accordance with the organization’s policies and business
practices.
Independent Verification Controls
Periodically, the internal auditor should review the asset
acquisition and approval procedures to determine the
reasonableness of factors used in the analysis. These include
the useful life of the asset, the original financial cost, the
proposed cost savings as a result of acquiring the asset, the
discount rate used, and the capital budgeting method used in
the analysis. The internal auditor should verify the location,
condition, and fair value of the organization’s fixed assets
against the fixed asset records in the subsidiary ledger. In
addition, the automatic depreciation charges calculated by
the fixed asset system should be reviewed and verified for
accuracy and completeness.

You might also like