Professional Documents
Culture Documents
System
Chapter 16
Threats Controls
1. Inaccurate updating of 1 a. Data entry processing
general ledger integrity controls
2. Unauthorized journal entries b. Reconciliations of accounts
from subsidiary journals to
general ledger accounts
(e.g., Accounts payable)
c. Audit trail
2 a. Access controls
b. Reconciliations and control
reports
Copyright © 2015 Pearson Education, Inc. c. Audit trail 16-5
Adjusting Entries
• Accruals
▫ Made at end of accounting period to reflect events that have
occurred but are not in the financial statements (e.g., wages payable)
• Deferrals
▫ Made at end of accounting period to reflect exchange of cash prior to
performance of related event (e.g., rent)
• Estimates
▫ Portion of expenses expected to occur over a number of accounting
periods (e.g., depreciation)
• Revaluations
▫ Entries made to reflect differences between actual and recorded
value of an asset or change in accounting principle
• Corrections
▫ Entries made to counteract effects of errors found in the general
ledger
Copyright © 2015 Pearson Education, Inc.
16-6
Post Adjusting Entries
Threats Controls
1. Inaccurate adjusting entries 1 a. Data entry processing
2. Unauthorized adjusting integrity controls
entries b. Spreadsheet error protection
controls
c. Standard adjusting entries
2 a. Access controls
b. Reconciliations and control
reports
c. Audit trail creation and
review
Copyright © 2015 Pearson Education, Inc.
16-7
Prepare Financial Statements
Produce Managerial Reports
Threats Controls
1. Inaccurate financial 1 a. Processing integrity controls
statements b. Use of packaged software
2. Fraudulent financial c. Training and audits
reporting 2 a. Audits
3. Poorly designed reports and 3 a. Responsibility accounting
graphs b. Balanced scorecard
c. Training on proper graph
design