Uploaded by baby shoebill

Part 2 - Revenue Cycle by Group 1

advertisement
Risk of
unauthorized
accessed to
accounting
records and
reports
Accounting
information is at
risk to unauthorized
access from
outsiders as well as
exployees.
The motives of accessing
information include:
- Attempts to
penetrate fraud
- Theft of data
- Malicious acts
Physical
controls
ACCESS CONTROLS
Source documents and accounting
records
need
protected.
to
be
physically
SEGREGATION OF DUTIES
The
organization
should
be
structured that the perpetration
of
a
fraud
requires
collusion
between two or more individuals.
IT
controls
PASSWORDS
The organization should implement
a robust password control policy
to prevent unauthorized access
to computer files and programs
that reside in each departments.
MULTILEVEL SECURITY
The
organization
programmed
should
techniques
implement
that
a
permits
simultaneous access to a central system bt
many users with different access privileges,
but prevents them from obtaining information
for which they lack authorization.
Two common Method for multilevel security
Access Control List - this method assigns
privilege to directly to individuals.
Role-based
Access
Control
-
involves
creating standard tasks called roles. Each
role is assigned access privileges.
Point-of-sale
Systems
Daily Procedure
- The Universal Product Code (UPC) is a label containing price
information
(and
other
data)
that
is
attached
to
purchased in a point of sale system.
- When all the UPCs are scanned, the system automatically
calculates taxes, discounts, and the total for the
transaction.
items
Daily Procedure
- The clerk enters the transaction into the POS system via
the register’s keypad, and a record of the sale is added to
the sales journal in real time.
- At the end of the clerk’s shift, a supervisor unlocks the
register and retrieves the internal tape.
End-Of-Day Procedure
- The cash receipts clerk prepares at three part deposit slip for
the total amount of the cash received.
-One copy is filed and the other two accompany the cash
to the bank.
-Because cash is involved, armed guards are often used to
escort the funds to the bank repository.
Point-of-sale
Control
Issues
Authorization
The
authorization
process
involves validating credit cards
charges and establishing that the
customer is the valid user of the
card.
Supervision
Supervision using surveillance
camera
and
shop
floor
security can reduce risks of
the store being stolen from.
Access Control
In this particular undertaking, the
concern
access
is
with
about
cash
the
risk
assets
of
and
inventory. In order for the POS
system to be protected, there is
a need for restriction to ensure
such risk never occurs.
Accounting records
The internal cash register's tape
is
an
important
accounting
document. The tape is a record
of
all
sales
transactions
processed at the register.
Independent verification
When the clerk whose shift has
ended takes the cash drawer to
the cash room, its content are
reconcilded against the internal
register tape.
Reengineering
using edi
Reengineering using Edi
Doing Business via EDI
- Electronic data interchange (EDI)
is the intercompany exchange of
computer
processable
business
information in standard format.
Reengineering using Edi
EDI is more than just a technology.
EDI poses unique control problems
for organizations.
Doing
Business Via
EDI
Doing Business on the
Internet
- Thousands of organizations worldwide have
home pages on the Internet to promote their
products and solicit sales.
- Typically, Internet sales are credit card
transactions that are sent to the seller’s e
mail file.
Doing Business on the
Internet
-- Unlike EDI, which is exclusively a B2B arrangement
between trading partners, Internet sales are both
B2B and business to consumer (B2C) transactions.
-
Connecting
to
the
Internet
exposes
the
organization to threats from computer hackers,
viruses, and transaction fraud.
Doing Business on the
Internet
-
Most
threats
organizations
seriously
and
take
these
implement
controls, including passwor techniques,
message encryption, and firewalls, to
minimize their risk.
By Group 1
Adriano, Dandred
Galang, Jeremy
Bitangcol, Hanna Dee
Nilo, Jane Dhalie
Download