Professional Documents
Culture Documents
The
Revenue
Cycle
S a le s O rd e r
1
C re d it / C u s to m e r
S e rv ic e R EV EN U E C Y C LE
2 (S U B S Y S T E M )
C a s h R e c e ip ts /
C o lle c tio n s
6
S h ip p in g
3
B illin g / A c c o u n ts
R e c e iv a b le
4 /5
Revenue Cycle (Subsystem)
Databases
• Master files • Other Files
– customer master file – shipping and price data
– accounts receivable master reference file
file – credit reference file (may
– merchandise inventory master not be needed)
file – salesperson file (may be a
master file)
• Transaction and Open – Sales history file
Document Files – cash receipts history file
– sales order transaction file – accounts receivable
• open sales order transaction reports file
file
– sales invoice transaction file
– cash receipts transaction file
DFD of Sales Order Process
DFD of Cash Receipts Process
Summary of Internal Controls
Authorization Controls
• Proper authorization of transactions (documentation) should
occur so that only valid transactions get processed.
• Within the revenue cycle, authorization should take place
when:
– a sale is made on credit (authorization)
– a cash refund is requested (authorization)
– posting a cash payment received to a customer’s account
(cash pre-list)
Segregation of Functions
Three Rules
1. Transaction authorization should be
separate from transaction processing.
2. Asset custody should be separate from
asset record-keeping.
3. The organization should be so
structured that the perpetration of a
fraud requires collusion between two or
more individuals.
Segregation of Functions
EDI EDI
Translation Translation
Software Software
Direct Connection
Communications Communications
Software Software
Other
Mailbox
Other
Mailbox
Control Considerations for
Computer-Based Systems
• Authorization - in real-time systems,
authorizations are automated:
programmed decision rules must be
closely monitored
• Segregation of Functions - some
consolidation of tasks by the computer;
protect the computer programs--coding,
processing and maintenance should be
separated
Control Considerations for
Computer-Based Systems
• Supervision - in POS systems, the cash
register’s internal tape or database is an
added form of supervision
• Access Control - magnetic records are
vulnerable to both authorized and
unauthorized exposure and should be
protected
– must have limited file accessibility
– must safeguard and monitor computer programs
Control Considerations for
Computer-Based Systems
• Accounting Records - rest on reliability
and security of magnetically stored data.
The accountant should be skeptical about
accepting the accuracy of hard-copy
printouts of journals and ledgers.
• Backup is a concern for direct access
files, and the system needs to ensure that
backup of all files is continuously kept.