Matakuliah Tahun : V0254 - Operational Tata Hidang II : 2010 Maintaining and Improving the Revenue Control System Pertemuan 11 Revenue Security • Errors in revenue collection can come from simple employee mistakes or, in some cases, outright theft by either guests or employees. Bina Nusantara University 3 Revenue Security • In its simplest form, revenue control and security is a matter of matching products sold with funds received. Thus, an effective revenue security system ensures that the following formula reflects what really happens in your foodservice operation. Product Issues = Guest Charges = Sales Receipts = Sales Deposits =Accounts Payable • The potential for guest, employee, or supplier theft or fraud exists in all of these areas. Bina Nusantara University 4 External Threats to Revenue Security • A guest said to have walked, or skipped a check when he or she has consumed a product but has left the foodservice operation without paying the bill. (See Steps to Reduce Guest Walks or Skips) Bina Nusantara University 5 External Threats to Revenue Security • Another form of guest theft is that of fraudulent payment. This includes passing counterfeit money, bad checks, or most commonly, the use of invalid credit or debit cards. • A credit card, is simply a system by which banks loan money to consumer as the consumer makes a purchase. • Travel and entertainment cards are a payment system by which the card issuer collects full payment from the card users on a monthly basis. • A debit card is a form of guest payment in which the funds needed to cover the user’s purchase are automatically transferred from the user’s bank account to the entity issuing the debit card. Bina Nusantara University 6 External Threats to Revenue Security • If restaurant managers are to ensure that they collect all of the money that are due from payment card companies, they must effectively manage the interface (electronic connection) between the various payment card issuers and their restaurant. • The merchant service provider (MSP) plays an important role as the restaurant’s coordinator/manager of payment card acceptance and funds collection. Bina Nusantara University 7 External Threats to Revenue Security • A restaurant accepting payment cards does not actually receive immediate cash from its card sales, but rather it will be credited via electronic funds transfer (EFT) the money it is due after all fees have been paid. • All businesses that accept cards – credit or debit - are charged fees for every transaction. Theses fees are called interchange rates, and are a percentage of the value of the transaction. Bina Nusantara University 8 External Threats to Revenue Security • If you agree to accept checks, you will experience some loss. • Another method of guest theft you must be aware of is that used by the quick-change artist. A quick-change artist is a guest who, having practiced the routine many times, attempts to confuse the cashier. In his or her confusion, the cashier gives the guest too much change. Bina Nusantara University 9 Internal Threats to Revenue Security • Service personnel can use a variety of techniques to cheat an operation of small amounts of money at a time. • Complete revenue control is a matter of developing the checks and balances necessary to ensure that the value of products sold and the amount of revenue received do indeed equal each other. Bina Nusantara University 10 Internal Threats to Revenue Security • Servers can misrepresent the amount they charge guests. • Food operations should require a written guest check recording each sale. A guest check is simply a written record of what the guest purchases and how much the guest was charged for the item(s). • Hard copy guest checks should be recorded by number and then safely stored or destroyed, as management policy dictates. Bina Nusantara University 11 Internal Threats to Revenue Security • A method of service personnel fraud is one in which the server gives the proper guest check to the guest, collects payment, and destroys the guest check but keeps the money. • For this reason, many operators implement a precheck/postcheck system for guest checks. Bina Nusantara University 12 Internal Threats to Revenue Security • A user workstation, that is, a terminal primarily being used only to ring orders, may be utilized. The guest check will then be taken to a cashier terminal for settlement. • There are a variety of components available to you as you seek to design a good guest check control system. These can include the use of management issued guest checks, multi-copy guest checks (carbonless paper), and guest checks generated by computerized POS systems. Bina Nusantara University 13 Internal Threats to Revenue Security • Service personnel may charge the guest for a higher priced item while serving a lower priced one, and then keep the difference in selling price. • In some operations, even sales that were originally properly recorded can become a source of theft. This is so because these operations allow changes to be made to previous rounds. A previous round is a service round that occurred before the most recent service total. Bina Nusantara University 14 Internal Threats to Revenue Security • Not all service personnel are dishonest, of course, and sometimes honest mistakes can be made. This usually occurs when service personnel are required to total their guest checks by hand. • It is important to remember, that even sophisticated computerized systems hold the potential for employee fraud. Bina Nusantara University 15 Internal Threats to Revenue Security • If a cashier is responsible for the collection of money, several areas of potential fraud can exists. The cashier may collect payment from a guest but proceed to destroy the guest check that recorded the sales. Another method of cashier theft involves failing to ring up the sale indicated by the guest check while pocketing the money. Bina Nusantara University 16 Internal Threats to Revenue Security • In addition to theft of your own business financial assets, the hospitality industry affords some employees the opportunity to defraud guests as well. Some techniques include: • Charging guests for items not purchased, then keeping the • overcharge. Charging the totals on credit card charges after the guest has left, or adding credit card charges and pocketing the cash difference. Bina Nusantara University 17 Internal Threats to Revenue Security • Misadding legitimate charges to create a higher than appropriate • • total, with the intent of keeping the overcharge. Purposely shortchanging guests when giving back change, with the intent of keeping the extra change. Charging higher than authorized prices for products or services, recording the proper price, then keeping the overcharge. Bina Nusantara University 18 Internal Threats to Revenue Security • Cashiers rarely steal sums directly from the cash drawer because such theft is easily detected. • Management can compare the sales recorded by the cash register with the money actually contained in the cash register. If it contains less than sales recorded, it is said to be short, if it contains more than sales recorded, it is said to be over. • Consistent cash shortages may be an indication of employee theft or carelessness. Bina Nusantara University 19 Internal Threats to Revenue Security • If the cash register has a void key, a dishonest cashier could enter a sales amount, collect for it, and then void, or erase, the sale after the guest has departed. • Another method of cashier theft involves the manipulation of complimentary meals or meal coupons. • It is important to remember that even good revenue control systems present the opportunity for theft if management is not vigilant of if two or more employees conspire to defraud the operation. Bina Nusantara University 20 Internal Threats to Revenue Security • Bonding is simply a matter of purchasing an insurance policy against the possibility that an employee will steal. • If an employee has been bonded and an operation can determine that he or she was indeed involved in a theft of a specific amount of money, the operation will be reimbursed for the loss by the bonding company. Bina Nusantara University 21 Developing the Revenue Security System • An effective revenue security system will help you accomplish the following important tasks: – – – – – Verification Verification Verification Verification Verification Bina Nusantara University of of of of of product issues guest charges sales receipts sales deposits accounts payable 22 Developing the Revenue Security System • Verification of product issues • The key to verification of product issues in the revenue security system is to follow one basic rule: • No product should be issued from the kitchen or bar unless a permanent record of issue is made. Documented Product Requests = Product Issues Bina Nusantara University 23 Developing the Revenue Security System • Verification of guest charges • When the production staff is required to distribute products only in response to a documented request, it is critical that those documented request result in charges to the guest. • Product issues must equal guest charges. • Each guest check must be accounted for, and employees must know that they will be held responsible for each check they are issued. Product Issues = Guest Charges Bina Nusantara University 24 Developing the Revenue Security System • Verification of sales receipts • Sales receipts refer to actual revenue received by the cashier or other designated personnel, in payment for products served. • Both cashier and a supervisor must verify sales receipts. Guest Charges = Sales Receipts • Sales receipts refer to all forms of revenue, such as cash, checks (if accepted), or bank cards. Bina Nusantara University 25 Developing the Revenue Security System • In general, there are four basic payment arrangements in use in the typical foodservice operation. They are as follows: – – – – Guest Guest Guest Guest pays cashier. pays service personnel, who pay cashier. pays service personnel, who have already paid cashier. is directly billed. • Accounts receivable is the term used to refer to guest charges that have been billed to the guest but not yet collected. Bina Nusantara University 26 Developing the Revenue Security System • Verification of sales deposits • The deposit slip may be completed by a cashier or other clerical assistant, but management alone should bear the responsibility for monitoring the actual deposit of sales. • Management must personally verify all bank deposits. • This involves the actual verification of the contents of the deposit and the process of matching bank deposits with actual sales. Bina Nusantara University 27 Developing the Revenue Security System • Embezzlement is the term used to describe theft of a type where the money, although legally possessed by the embezzler, is diverted to the embezzler by his or her fraudulent action. • Falsification of bank deposits is a common method of embezzlement. To prevent this activity, you should take the following steps to protect your deposits: – Make bank deposits daily if possible. – Ensure that the individual making the daily deposits is bonded. Bina Nusantara University 28 Developing the Revenue Security System 3. Establish written polices for completing bank reconciliations (comparison of monthly bank statements vs. daily deposits). 4. Review and approve bank statement reconciliations each month. 5. Employ an outside auditor to examine the accuracy of deposits on an annual basis. • If verification of sales deposits is done correctly and no embezzlement is occurring, the following formula should hold true: Sales Receipts = Sales Deposits Bina Nusantara University 29 Developing the Revenue Security System • Verification of accounts payable • Accounts payable refers to the legitimate amount owed to a vendor for products or services rendered. • The authorized purchaser must verify the legitimacy of accounts payable to be paid out of sales deposits. • In a revenue system that is working properly, the following formula should be in effect: Sales Deposits = Accounts Payable for Legitimate Expenses Bina Nusantara University 30 Developing the Revenue Security System • Supplier Fraud • The typical supplier scam involves goods or services that you would routinely order. • These dishonest suppliers take advantage of weaknesses in an organization's purchasing procedures or of unsuspecting employees who may not be aware of their fraudulent practices. • Scams initiated by vendors can take several forms such as phony-invoice scams, unauthorized buyer scams, and the gift-horse scam. Bina Nusantara University 31 Developing the Revenue Security System • Phony-invoice schemers know that restaurants sometimes make mistakes or can be careless in accounting, so they prey on these weaknesses. The invoice may be a solicitation in disguise and in very fine print contain the following disclaimer: “This is a solicitation. You are under no obligation to pay unless you accept this offer.” Bina Nusantara University 32 Developing the Revenue Security System • With unauthorized buyer scams, the supplier secures the name of an employee before products are shipped and the restaurant is billed for unordered goods or services. The invoice, which includes an identified employee’s name as the “authorized” buyer, arrives several weeks (or more) later, for three reasons. – The inflated price, as much as 10 times what should be paid to a legitimate supplier, is less obvious if the invoice arrives well after the merchandise has been received. – The chances are good that the restaurant has used the merchandise before the invoice arrives. – The supplier will claim that the time which it could have accepted returned goods has long passed. Bina Nusantara University 33 Developing the Revenue Security System • The gift-horse scam starts when a caller tricks an employee (or manager) into accepting a modest gift or a free promotional item, with a passing reference to merchandise or services. The restaurant then receives overpriced, unordered merchandise, followed weeks later by an invoice that includes the employee's name as the authorized buyer. Bina Nusantara University 34 Developing the Revenue Security System • When an alert foodservice manager protests that he or she did not authorize the purchase and delivery of the overpriced merchandise and thus should not have to pay for it, the supplier will respond in fairly predictable ways. These include: • Bullying: The seller argues that the products were ordered. • Negotiating: Here the seller expresses sympathy for the “misunderstanding” that has occurred and offers to settle the bill at a reduced (but still inflated!) price if payment is made immediately. • Charge for Returning: In this case, the seller offers to allow the restaurant to return the merchandise but only if they pay a significant restocking or shipping fee. Bina Nusantara University 35 Developing the Revenue Security System • You can protect your revenue from vendors who would attempt to defraud you. Here are steps you can take: – – – – Know your rights Assign designated buyers and utilize purchase orders at all times Check the documentation before paying bills Train your staff Bina Nusantara University 36 The Complete Revenue Security System • The five key principles of a revenue security system are as follows: – No product shall be issued from the kitchen or bar unless a permanent record of the issue is made. – Product issues must equal guest charges. – Both the cashier and a member of management must verify sales receipts. – Management must personally verify all bank deposits – The authorized purchaser must verify the legitimacy of accounts payable to be paid out of sales deposits. Bina Nusantara University 37 The Complete Revenue Security System • It is possible to develop and maintain a completely manual revenue control system. • However, when properly selected and understood, technology enhanced systems can be a powerful ally in the cost control/revenue security system. Bina Nusantara University 38 Technology Tools • Protecting sales revenue from external and internal threats of theft requires diligence and attention to detail. • Software and specialized hardware now on the market that can help in this area included those that: 1. Maintain daily cash balances from all sources, including those of multi-unit and international operations. 2. Reconcile inventory reductions with product issues from kitchen. Bina Nusantara University 39 Technology Tools 3. Reconcile product issues from kitchen with guest check totals. 4. Reconcile guest check totals with revenue totals. 5. Create over and short computations by server, shift, and day. 6. Balance daily bank deposits with daily sales revenue and identify variances. 7. Maintain database of returned checks. 8. Maintain accounts receivable records. 9. Maintain accounts payable records. Bina Nusantara University Bina Nusantara University 40 40 Technology Tools 10.Interface back office accounting systems with data compiled by the operation's POS system. 11.Interface budgeting software with revenue generation software. 12.Create income statements, statements of cash flows, and balance sheets. Bina Nusantara University 41 Bina Nusantara University 42