You are on page 1of 2

Rico, Jalaica B.

– BSA 2

Answers:
Problem 1 – PAYROLL FRAUD
Required:
1. Describe two control techniques to prevent or detect this fraud scheme.

 A personnel department employee action report should include a list of all current workers.
When reconciling time cards with the personnel report, time cards for dismissed or nonexistent
workers should be recognized.
 Wages should be distributed to employees by an impartial paymaster. If an employee does not
appear to get his or her paycheck, it should be returned to the payroll department.

Problem 2 – PAYROLL PROCEDURES


Required:
a. Analyze the internal control weaknesses in the system. Model your response according to the six
categories of physical control activities specified in the SAS 78/COSO control mode.

CONTROL ACTIVITIES WEAKNESS SUGGESTIONS


Transaction Authorization There is a shortage of personnel Payroll preparation should
action forms from Human involve the Human Resource
Resources, which raises the Department since it helps to
possibility of illegitimate avoid payroll fraud by identifying
employees collecting salaries. only authorized workers to
receive a paycheck.
Segregation of Duties None None
Supervision Employees punch their To avoid this, timekeepers must
timecards in an unsupervised reconcile timecards with actual
area at a time clock. Because the attendance in order to maintain
time clock is in an unsupervised track of the time. Furthermore,
location, it is conceivable for an employing new hardware and
employee to clock in for another software technologies, the
who is absent or late. manual timekeeping procedure
should be automated.
Accounting Records Due to the lack of a payroll When obtaining the Accounts
imprest account, ABC Payable summary, ABC Company
Manufacturing is unable to keep should utilize a payroll imprest
a complete payroll audit. account since it prevents the
General Ledger Department
from distinguishing between
checks to workers and payments
to suppliers.
Access Control None None
Independent Verification None None
b. Make recommendations for improving the system

Some of the recommendations for improving the system are given below.

1. Biometric time clocks are used to identify personnel using fingerprints or band vein scan
technology. Instead of keeping actual fingerprints in the database, a mathematical method is
utilized for verification. As a result, employee privacy is protected.

2. Magnetic swipe cards are used in the same way as a credit card. Each employee receives an
identification card. Employee information is stored on a magnetic strip on the card. When an
employee swipes his or her card through the time clock, the time is recorded both in and out.
Additional verification may be requested in the form of a password or PIN.

3. Proximity cards are identical to swipe cards, with the exception that instead of swiping, these
cards must be put in front of the scanner to record in and out time. Even through wallets,
handbags, and card holders, these cards may be read.

4. Mobile remote devices can be used to keep track of time when employees are forced to travel
often in order to fulfill their job tasks. Employees may clock in and out using their mobile phones
or computers in this manner.

You might also like