lOMoARcPSD|36723730 CIS Final - lecturee notes Intermediate Accounting 2 (Virgen Milagrosa University Foundation) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 Chapter 12: Business Ethics, Fraud and Fraud Detection ETHICAL ISSUES IN BUSINESS Ethics: Principles of conduct used in making choices and behavior in situations involving right and wrong. Business ethics involves two questions: -How do managers decide on what is right in conducting business? -Once managers have recognized what is right, how to they achieve it? ● Firm has conflicting responsibilities to employees , shareholders, customers and the public. ● Decisions have consequences that benefit or harm each group. ● Seeking a balance is the manager’s ethical responsibility. ● Benefits of decisions must outweigh risks and be fairly distributed to those who share the risk. Decisions should be implemented to minimize and avoid all unnecessary risks. EQUITY •Executive Salaries •Comparable Worth •Product Pricing HONESTY •Employee and Management Conflicts of Interest •Security of Organization Data and Records •Misleading Advertising •Questionable Business Practices in Foreign Countries •Accurate Reporting of Shareholder Interest RIGHTS •Corporate due process •Employee Health Screening •Employee Privacy •Sexual Harassment •Diversity •Equal Employment Opportunity •Whistleblowing EXERCISE OF CORPORATE POWER •Political Action Committees •Workplace Safety •Product Safety •Environmental Issues •Corporate Political Contributions MAKING ETHICAL DECISIONS PROPORTIONALITY The benefit from a decision must outweigh the risk JUSTICE The benefit of the decision should be distributed fairly to those who share the risk MINIMIZE RISK Even if judged acceptable by the principles, the decision should be implemented so as t minimize all of the risks and avoid any unnecessary risks. COMPUTER ETHICS • The analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. Three levels of computer ethics: Pop computer ethics Para computer ethics Theoretical computer ethics COMPUTER ETHICS A New Problem or Just a New Twist on an Old Problem? Although computer programs are a new type of asset, many believe that they should not be considered as different from other forms of property. Some argue that all pertinent ethical issues have already been examined in some other domain. Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 PRIVACY ● People prefer to be in full control of what and how much information about themselves is available to others, and to whom it is available. (Issue of Privacy) ● The creation and maintenance of huge, shared databases makes it necessary to protect people from the potential misuse of data. (Issue of ownership in the personal information industry) SECURITY Computer security is an attempt to avoid such undesirable events as a loss of confidentiality or data integrity. OWNERSHIP OF PROPERTY Laws designed to preserve real property rights have been extended to cover what is referred to as intellectual property – SOFTWARE. EQUITY IN ACCESS The economic status of the individual or the affluence of an organization will determine the ability to obtain information technology. ENVIRONMENTAL ISSUES Computers with high-speed printers allow for the production of printed documents faster than ever before. ● Intent ● Justifiable reliance ● Injury or loss EMPLOYEE FRAUD Employee fraud generally designed to convert cash or other assets to the employee's personal benefit. -Can usually be prevented or detected if an effective system of internal controls is in place. - Involves (1) theft of asset, (2) conversion of asset to cash and (3) concealment of crime. MANAGEMENT FRAUD Management fraud often escapes detection until damage or loss has occurred. Three characteristics: -Perpetrated at levels of management above the one to which internal controls structures generally relate. -Frequently involves using the financial statements to create false image of corporate financial health -If fraud involves asset misappropriation, shrouded in maze of complex business transactions, often involving third parties. FRAUD TRIANGLE FRAUD & ACCOUNTANTS The lack of ethical standards is fundamental to the occurrence of business fraud. No major aspect of the independent auditor’s role has caused more difficulty for the public accounting profession than the responsibility for the detection of fraud during an audit. FRAUD A fraudulent act must meet the following 5 conditions: ● False representation ● Material fact FINANCIAL LOSSES FROM FRAUD ACFE 2010 research study estimated losses to be 5% of annual revenues. Translates to approximately $3.5 trillion in fraud losses for 2014. Actual cost of fraud is difficult to quantify: Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 ● Not all fraud is detected and not all detected fraud is reported. ● In many cases, incomplete information is gathered. Information not properly distributed to management or law enforcement authorities and, Sometimes business organizations take no civil or criminal action against the perpetrator of fraud. Indirect costs of fraud –reduced productivity, legal costs , increased unemployment and business disruptions –must also be considered. 20XX FINANCIAL LOSSES FROM FRAUD THE PERPETRATORS OF FRAUDS THE PERPETRATORS OF FRAUDS ● ● ● ● influenced by position, gender, age, and education. Highest positions in the organization are beyond the internal control structure and have the greatest access to assets. Men, older employees and those with higher levels of education tend to have more higher positions and thus more opportunities to commit fraud. One reason for segregating duties is to deny potential perpetrators the opportunity to commit fraud. When individuals in critical positions collude, opportunities to control or gain access to assets that would otherwise not exist are created FRAUDULENT STATEMENTS ● Management fraud that must bring direct or indirect financial benefit to the perpetrator. ● Accounts for 7.6% of fraud cases, but the median loss is significantly higher than other fraud schemes. ● Underlying problems: ● Lack of auditor independence. ● Lack of director independence. ● Questionable executive compensation schemes. ● Inappropriate accounting practices PCAOB created to set standards; inspect registered accounting firms; conduct investigations; take disciplinary actions. Act addresses auditor independence by creating more separation between a firm’s attestation and non auditing activities. Corporate governance and responsibility: CONCLUSIONS ● Greater access to assets (i.e. opportunity to commit fraud) is Requires audit committee independence, prohibits executive loans and requires attorneys Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 to report evidence of material violations of security laws or breaches of fiduciary duty. ● Issuer and management disclosure imposes new corporate disclosure requirements. ● Imposes a range of criminal penalties for fraud CORRUPTION Involves an executive, manager, or employee in collusion with an outsider. Types: ● Bribery involves giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawful duties. ● Illegal gratuity involves giving, offering, soliciting, or receiving something of value because an official act has been taken. ● Conflict of interest occurs when an employee acts on behalf of a third party when discharging his or her duties or has self-interest in the activity being performed. ● Economic extortion is the use (or threat) of force (including economic sanctions) to obtain something of value ASSET MISAPPROPRIATION Skimming involves stealing cash before it is recorded. Mailroom fraud occurs when employee opens mail, steals checks , and destroys remittance advices. Cash larceny involves stealing recorded cash. Lapping: Clerk uses customer’s check from one account to cover theft from a different account. Check tampering involves forging or changing checks written to legitimate payees. Payroll fraud is the distribution of fraudulent paychecks to existent or nonexistent employees Losses from Asset Misappropriation Schemes DATA COLLECTION AND DATA PROCESSING ● Data collection frauds involve entering falsified data into the system by deleting, altering or creating a transaction. ● Masquerading involves gaining remote access by pretending to bean authorized user. ● Piggybacking involves latching onto an authorized user in the system. ● Hacking involves both schemes motivated by the challenge of trying to access the system. Data processing frauds are in two classes: ● Program fraud includes creating illegal programs or destroying corrupting or altering computer logic to cause data to be processed incorrectly. ● Operations fraud is misuse or theft of computer resources Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 AUDITOR’S RESPONSE TO RISK ASSESSMENT Judgments about the risk of material misstatements may affect the audit in regards to: ● Engagement staffing, extent of supervision, professional skepticism , nature, timing, extent of procedures performed. ● Risk of material misstatement due to fraud always exists. Auditor: may determine currently planned audit procedures are sufficient to respond to risk factors. ● may determine to extend audit and modify planned procedures. ● may conclude procedures cannot be modified sufficiently to address risk and consider withdrawing AUDITOR’S RESPONSE TO DETECTED MISSTATEMENTS DUE TO FRAUD If no material effect: Refer matter to management and ensure implications to other aspects of audit have been addressed. If effect is material or undeterminable: ● Consider implications for other aspects of the audit. ● Discuss with senior management and audit committee. ● Attempt to determine if material effect. ● Suggest client consult with legal counsel. ● Working papers document criteria used for assessing fraud risk: ● Where risk factors are identified, documentation should include. (1)those risk factors identified and (2) auditor’s response to them FRAUD DETECTION TECHNIQUES USING ACL Payments to fictitious vendors: ● Sort records of the invoice file by invoice number and vendor number. ● Filter and verify the validity of vendors with P.O. boxes. ● Join the employee and vendor files to look matching addresses and review them. ● Use the duplicate function to search for multiple vendors with the same address. ● Create a value around the invoice threshold amount and sort payment records in this range by vendor FRAUD DETECTION TECHNIQUES USING ACL Payroll fraud: ● Use expression builder to test for excessive hours worked. ● Use duplicate function to test for duplicate payments. ● Use join function to link payroll and employee files to test for non-existent employees. ● Lapping Accounts Receivable: ● Use expression builder to locate and investigate invoices whoseRemittance Amount is less than the Invoice Amount. ● Calculate the amounts carried forward and use the duplicate command to search for carry-forward amounts that are the same Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 AUDIT OF THE REVENUE CYCLE Transaction cycle – the sequence of procedure applied in processing a particular type of transactions. ● Revenue (Sales and Collection) Cycle ● Acquisition (Purchases and Disbursements) Cycle ● Payroll Cycle ● Investing Cycle ● Financing Cycle The Cycle Approach the interrelationship of accounts in gathering evidences about assertions in the financial statements. Organizational Charts Revenue Processing “Different entities may have different revenue processes” Basic Revenue Transaction Process for Merchandisers 1. Controlling Customers’ Orders 2. Credit Approval 3. Issuing the Merchandise 4. Product Shipment 5. Customer Billing 6. Adjustments for Sales Return and Allowances and Doubtful Accounts 7. Collection of Receivables Issuing the Merchandise Inventory control function Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 Risk Assessment I. Inherent Risk REVENUE ◦ Improper revenue recognition ◦ Decline in sales Due to economic condition, product obsolescence, or competition ◦ Restrictions by laws and regulations ◦ Complexity of sales transactions ◦ Unusual sales terms For returns, warranties, leases, or recourse obligation ACCOUNTS RECEIVABLES ◦ Collectability of receivables ◦ Conditions for collection ◦ Pledging of receivables ◦ Insufficient uncollectible accounts II. Control Risk ◦ Document the understanding of controls ◦ Perform walk-throughs to determine the implementation of controls Assessing control risk requires knowledge of weaknesses in revenue control processes Audit Revenue Process a. Risk Assessment ● Understanding the client and its environment (assessing inherent risk) ● Understanding the client’s internal control (assessing control risk) b. Test of Controls Operating effectiveness of controls Most relevant assertions: ◦ 1. Existence of Revenue ◦ 2. Existence and Valuation of Accounts Receivable c. Substantive Procedures Obtaining direct evidence about financial statement assertions Revenue and Accounts Receivable are the most significant accounts III. Preliminary Analytical Procedures ◦ Unusual year-end sales ◦ Inconsistent revenue and receivable growth rates ◦ Unusual percentage of uncollectible ◦ Inconsistency with industry averages May indicate heightened risks of fraud IV. Fraud Risk Fraud Schemes ● ● ● ● ● ● ● Recognizing revenue on unshipped goods Recognizing revenue on consigned goods Creation of fictitious invoices Hidden agreements Lapping Understanding uncollectible accounts Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 The audit of revenue and receivables is often an area of significant risk Fraud Responses ● Overall response such as assignment of more experienced staff ● Response at the assertion level such as performing procedures at year-end rather than at interim date The auditor shall presume that there are risk of fraud in revenue recognition especially about overstatements V. Designing Further Procedures ◦ Deciding whether to perform test of controls related to revenue processing ◦ Relying on the result of prior test of controls ◦ Nature, timing and extent of substantive procedures including the reliance on analytical substantive procedures ◦ Need for special audit consideration for significant risks Initial assessment of control risk at below maximum will lead to the performance of test of controls Test of Controls I. Procedures ◦ Inquiries of client personnel ◦ Inspection of documents/reports ◦ Observation of application controls ◦ Reperformance of the controls Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 CHAPTER 10 : AUDITING THE CYCLE EXPENDITURE. EXPENDITURE CYCLE ACTIVITIES AND TECHNOLOGIES This section examines alternative information technologies used to support expenditure cycle activities. EXPENDITURE CYCLE ACTIVITIES AND TECHNOLOGIES 01 . Purchases And Cash Disbursement Procedures Using BAtCH Processing Technology ❖ ❖ ❖ ❖ VENDORS ACCOUNTS PAYABLE RECEIVING DATA PROCESSING ● PURCHASING DEPARTMENT Upon receipt of the purchase requisition, the purchasing department ● PREPARES AFIVE Part purchase order ALTERNATIVE APPROACHES AUTHORIZING AND ORDERING INVENTORIES This Approach Characterizes The Era Of Data Ownership In Which Files Were Designed Exclusively For The Use Of A Single user. ALTERNATIVE 1 PO are sent for review and signing before sending to v e n d o r s and internal users. 02 . Reengineering the purchases/ cash disbursement system A Modern System That Employs Real- Time Processing And Uses Direct Access Files Or Database ALTERNATIVE 2 Distributing the PO directly to vendors and internal users 03 . Overview of payroll procedures A Modern Payroll System That Uses Real Time Processing And Database Technology ALTERNATIVE 3 uses EDI; no physical documents produced . the entire ordering process is automate PURCHASES AND CASH DISBURSEMENT PROCEDURES USING BATCH PROCESSING TECHNOLOGY THIS TYPE OF SYSTEM IS AN EXAMPLE OF AN EARLY LEGACY SYSTEM. STEP 2 creation of open purchase order transfer of corresponding records ● purchasing ● accounts payable ● data processing Receiving department - when the goods arrive from vendors, the receiving clerk prepares a receiving report. DATA PROCESSING DEPARTMENT STEP 1 ● Monitoring of the inventory ● Records creation of open requisition file ● Preparation of purchase order Step 3 Updates the inventory subsidiary file Update the general ledger Closing of corresponding records ● open voucher file ● data processing Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 accounts payable - when the AP c l e r k receives the invoice, the clerk's reconciles the documents that were placed in the AP pending file and prepare a voucher. STEP 4 ● vali d at e s the v o u c h e r r e c o r d s ● prepare for posting in the ledger ● Data processing department- each day, the System scan items that are due and checks are printed for these items. REENGINEERING THE PURCHASE/ CASH DISBURSEMENT SYSTEM ● shows how reengineering the process can produce considerable savings. MAILING TO VENDORS. EDI VENDORS RECEIVE PAYMENT ELECTRONICALLY. 2. THE PAYMENTS ARE RECORDED IN THE CHECK REGISTER FILE. 3. ITEMS PAID ARE TRANSFERRED FROM THE OPEN ACCOUNTS PAYABLE FILE TO THE CLOSED ACCOUNT PAYABLE FILE. 4.THE GENERAL LEDGER ACCOUNTS PAYABLE AND CASH ACCOUNTS ARE UPDATED. 5.REPORTS DETAILING THESE TRANSACTIONS ARE TRANSMITTED VIA TERMINAL TO THE ACCOUNTS PAYABLE AND CASH DISBURSEMENTS DEPARTMENTS FOR THE MANAGEMENT'S REVIEW AND FILING. DATA P R O C E S S I N G the following task are performed automatically: 1. The inventory file is searched for the items that have fallen to their reorder point. 2. a record is entered in the purchase requisition file for each item to be replenished. 3. requisitions are then consolidated according to the vendor number. 4. vendor mailing information is retrieved from the valid vendor file. 5. purchase orders are prepared and sent to the vendor. alternatively, these may be transmitted Using edi technology. 6. a record of each transactions is a d d e d to the o p e n p u rc h a s e order file. 7.. a t transaction listing of p u rc h a s e order s is sent to the purchasing department for review. DATA PROCESSING THE FOLLOWING PROCEDURES ARE PERFORMED: 1. CHECKS ARE PRINTED, SIGNED AND DISTRIBUTED TO THE MAILROOM FOR Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 REENGINEERED PAYROLL SYSTEM FEATURES PERSONNEL THE PERSONNEL DEPARTMENT MAKES CHANGES TO THE EMPLOYEE FILE IN REAL TIME VIA TERMINALS COST ACCOUNTING THE COST ACCOUNTING DEPARTMENT ENTERS JOB COST DATA TO CREATE THE LABOR USAGE FILE TIMEKEEPING UPON RECEIPT OF THE APPROVED TIMECARDS FROM THE SUPERVISOR AT THE END OF THE WEEK, THE TIME KEEPING DEPARTMENT CREATES THE CURRENT ATTENDANCE FILE. DATA PROCESSING THE FOLLOWING PROCEDURES ARE PERFORMED IN A BATCH PROCESS: 1 . LABOR COST ARE DISTRIBUTED TO VARIOUS WORK-IN-PROCESS, OVERHEAD, AND EXPENSE ACCOUNTS. 2. AN ONLINE LABOR DISTRIBUTION SUMMARY FILE IS CREATED. COPIES OF THE FILE GO TO THE COST ACCOUNTING AND GENERAL LEDGER DEPARTMENTS. 3. AN ONLINE PAYROLL REGISTER IS CREATED FROM THE ATTENDANCE FILE AND THE EMPLOYEE FILE. 4. THE EMPLOYEE RECORDS FILE IS UPDATED. 5. PAYROLL CHECKS ARE PREPARED AND SIGNED. THEY ARE SENT TO THE TREASURER FOR REVIEW AND RECONCILIATION WITH THE PAYROLL REGISTER. THE PAYCHECKS ARE THEN DISTRIBUTED TO THE EMPLOYEES. 6. THE DISBURSEMENT VOUCHER FILE IS UPDATED AND A CHECK IS PREPARED FOR THE FUNDS TRANSFER TO THE PAYROLL IMPREST ACCOUNT. THE CHECK Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 AND A HARD COPY OF THE DISBURSEMENT VOUCHER GO TO CASH DISBURSEMENT. ONE COPY OF THE VOUCHER GOES TO THE GENERAL LEDGER DEPARTMENT, AND THE FINAL COPY GOES TO ACCOUNTS PAYABLE. 7. AT THE END OF THE PROCESSING, THE SYSTEM RETRIEVES THE LABOR DISTRIBUTION SUMMARY FILE AND THE DISBURSEMENT VOUCHER FILE AND UPDATES THE GENERAL LEDGER FILE. EXPENDITURE CYCLE AUDIT OBJECTIVES, CONTROLS, AND TEST OF CONTROLS RELATIONSHIP BETWEEN MANAGEMENT ASSERTIONS AND EXPENDITURE CYCLE AUDIT OBJECTIVES EXISTENCE AND OCCURRENCE - VERIFY THAT THE ACCOUNTS PAYABLE BALANCE REPRESENTS AMOUNTS ACTUALLY OWED BY THE ORGANIZATION AT THE BALANCE SHEET DATE. COMPLETENESS - VERIFY THAT THE FINANCIAL STATEMENTS REFLECT ALL WAGES FOR SERVICES PERFORMED DURING THE PERIOD COVERED. ACCURACY - VERIFY THAT PAYROLL AMOUNTS ARE BASED ON CORRECT PAY RATES AND HOURS WORKED AND ARE ACCURATELY COMPUTED. RIGHTS AND OBLIGATIONS - ESTABLISH THAT THE ACCOUNTS PAYABLE AND ACCRUED PAYROLL RECORDED AT THE BALANCE SHEET DATE ARE LEGAL OBLIGATIONS OF THE ORGANIZATIONS. VALUATION OR ALLOCATION - VERIFY THAT ACCOUNTS PAYABLE ARE STATED AT CORRECT AMOUNTS OWED. ACCURACY - ENSURE THAT ACCOUNTS PAYABLE, ACCRUED PAYROLL, AND EXPENSES REPORTED FOR THE PERIOD ARE PROPERLY DESCRIBED AND CLASSIFIED IN THE FINANCIAL STATEMENTS. INPUT CONTROL - DESIGNED TO ENSURE THAT TRANSACTIONS ARE VALID, ACCURATE, AND COMPLETE. DATA VALIDATION CONTROLS - INTENDED TO DETECT TRANSCRIPTION ERRORS IN TRANSACTION DATA BEFORE THEY ARE PROCESSED. TESTING VALIDATION CONTROLS - DATA ENTRY ERRORS THAT SLIP THROUGH EDIT PROGRAMS UNDETECTED CAN CAUSE RECORDED ACCOUNTS PAYABLE AND EXPENSE AMOUNTS TO BE MATERIALLY MISSTATED. BATCH CONTROLS - USED TO MANAGE HIGH VOLUMES OF TRANSACTION DATA THROUGH A SYSTEM. TESTING BATCH CONTROLS - PROVIDE THE AUDITOR WITH EVIDENCE RELATING TO THE ASSERTIONS OF COMPLETENESS AND ACCURACY. PURCHASES AUTHORIZATION CONTROLS - ACTUALLY OCCURS IN THE REVENUE CYCLE WHEN GOODS ARE SOLD TO CUSTOMERS. TESTING PURCHASES AUTHORIZATION CONTROLS - CONTROLS CAN CAUSE UNNECESSARY AND INCORRECT ORDERS TO BE PLACED WITH VENDORS. EMPLOYEE AUTHORIZATION - USED TO EFFECT CHANGES IN HOURLY PAY RATES, PAYROLL DEDUCTIONS, AND JOB CLASSIFICATION. Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 TESTING EMPLOYEE AUTHORIZATION PROCEDURES - IDENTIFY CURRENT EMPLOYEES, COMMUNICATE THEIR STATUS COMPLETELY AND CORRECTLY THE PAYROLL FUNCTION, AND MONITOR ADHERENCE TO EMPLOYEE AUTHORIZATION PROCEDURES. Process controls • Process controls include computerized procedures for updating files and restricting access to data. Depending on the level of computer technology in place, process controls may also include physical controls associated with manual activities. We begin by examining three control techniques related to file updating. Access and physical controls are examined later File update controls Run-to-run controls use batch control data discussed in the previous section to monitor the batch as it moves from one programmed procedure (run) to another. ● Sequence Check Control In systems that use sequential master files (mostly legacy systems), the order of the transaction records in the batch is critical to correct and complete processing. ● Liability Validation Control An important control in purchases/accounts payable systems is the validation of the liability prior to making payment. ● Valid Vendor File The valid vendor file is similar to the authorized employee file discussed earlier. ● Testing File Update Controls Failure of file update controls to function properly can result in transactions (1) not being processed (liabilities are not recognized and recorded), (2) being processed incorrectly (i.e., payments are approved for unauthorized recipients), or (3) being posted to the wrong supplier’s account.. Access controls • Access controls prevent and detect unauthorized and illegal access to the firm’s assets. Inventories and cash are the physical assets of the expenditure cycle. Traditional techniques used to limit access to these assets include: ● Warehouse security, such as fences, alarms, and guards. ● Moving assets promptly from the receiving dock to the warehouse. ● Paying employees by check rather than cash. Controlling access to accounting records is no less important. An individual with unrestricted access to data can manipulate the physical assets of the firm and cause financial statements to be materially misstated. Physical controls Purchases System Control • Segregation of Inventory control from warehouse. • Segregation of the general ledger and accounts payable from cash disbursements. • Supervision of the receiving department. • Inspection of assets • Theft of assets • Reconciliation of supporting documents. • The purchase order • The receiving report • The supplier’s invoice Payroll System Controls • Verification of timecards • Supervision • Paymaster • Payroll Imprest account Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 Output controls • Accounts Payable Change Report • This document is a summary report that shows the overall change to accounts payable. • Transaction Logs • Every transaction successfully processed by the system should be recorded on a transaction log, which serves as a journal. Understanding data • Transaction Listing • The system should produce a (hard copy) transaction listing of all successful transactions. Testing the accuracy and completeness assertions • The audit procedures described provide evidence relating to management assertions of accuracy and completeness. Auditors often precede substantive tests of details with an analytical review of account balances. Analytical procedures can identify relationships between accounts and risks • Log of Automatic Transactions • Some transactions are triggered internally by the system. • Unique Transaction Identifiers • Each transaction processed by the system must be uniquely identified with a transaction number. • Error Listing • A listing of all error records should go to the appropriate user to support error correction and resubmission. SUBSTANTIVE TEST OF EXPENDITURE CYCLE ACCOUNTS Expenditure cycle risks and audit concerns • External auditors are concerned primarily with the potential for understatement of liabilities and related expenses. Reported balances usually consist of items that have been reviewed, validated, and acknowledged by management. Attempts to improve financial statement presentation may involve actions to suppress the recognition and reporting of valid liabilities related to the period under review. Review disbursement vouchers for Unusual trend and exceptions • A useful audit procedure for identifying potential audit risks involves scanning data files for unusual transactions and account balances. For example, scanning accounts payable for excessively large balances may indicate abnormal dependency on a particular supplier. However, a high number of vendors with small balances may indicate the need to consolidate business activity. Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 Reviewing for accurate invoice prices • Comparing prices on supplier invoices to original purchase order prices provides evidence for testing the management assertion of accuracy. Significant discrepancies between expected prices and the prices actually charged may be due to clerical errors, failure to review supporting documents before authorizing payment, or accounts payable personnel exceeding their authority in dealing with price discrepancies Testing the Completeness, existence and right and obligations assertions • Searching for Unrecorded Liabilities • Searching for Unauthorized Disbursement Vouchers • Review for Multiple Checks to Vendors • Auditing Payroll and Related Accounts EXPENDITURE CYCLE Chapter 10 ● Purchases Processing Procedures ● Cash Disbursements Procedures Purchases Processing Manufacturing firms purchase raw materials for production, and their purchasing decisions are authorized by the production planning and control function. Merchandising firms purchase finished goods for resale. The inventory control function provides the purchase authorization for this type of firm. ❖ Monitor Inventory Records Firms deplete their inventories by transferring raw materials into the production process and by selling finished goods to customers. When inventories drop to a pre-determined reorder point, a purchase requisition is prepared and sent to the prepare purchase order function to initiate the purchase process. ❖ Prepare Purchase Order Receives the purchase requisitions that are sorted by vendor if necessary. Next, a purchase order (PO) is prepared for each vendor. A copy of the PO is sent to the vendor. In addition, a copy is sent to the set up accounts payable (AP) function for filing temporarily in the AP pending file, and a blind copy is sent to the receive goods function, where it is held until the inventories arrive. The last copy is filed in the open/closed purchase order file. ❖ Receive Goods At this point, the firm has received no inventories and incurred no financial obligation. Hence, there is no basis for making a formal entry into any accounting record. ❖ Upon completion of the physical count and inspection, the receiving clerk prepares a receiving report stating the quantity and condition of the inventories. ❖ One copy of the receiving report accompanies the physical inventories to either the raw materials storeroom or finished goods warehouse for safekeeping. ❖ Another copy is filed in the open/closed PO file to close out the purchase order. A third copy of the receiving report is sent to the AP department, where it is filed in the AP pending file. A fourth copy of the receiving report is sent to inventory control for updating the inventory records. Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 Finally, a copy of the receiving report is placed in the receiving report file. ❖ Update Inventory Records Depending on the inventory valuation method in place, the inventory control procedures may vary somewhat among firms. Organizations that use a standard cost system carry their inventories at a predetermined standard value regardless of the price actually paid to the vendor. ❖ Set Up Accounts Payable During the course of this transaction, the set up AP function has received and temporarily filed copies of the PO and receiving report. The organization has received inventories from the vendor and has incurred (realized) an obligation to pay for the goods. Voucher Payable System Each voucher is recorded in the voucher register. The voucher register reflects the AP liability of the firm. The sum of the unpaid vouchers in the register is the firm’s total AP balance. The AP clerk files the cash disbursement voucher, along with supporting source documents, in the vouchers payable file. This file is equivalent to the open AP file discussed earlier and also is organized by due date. ❖ Post to General Ledger The general ledger function receives a journal voucher from the AP department and an account summary from inventory control. The general ledger function posts from the journal voucher to the inventory and AP control accounts and reconciles the inventory control account and the inventory subsidiary summary. The approved journal vouchers are then posted to the journal voucher file. The Cash Disbursements Systems The cash disbursements system Processes the payment of obligations created in the purchases system. Ensure that only valid creditors receive payment and that amounts paid are timely and correct. If the system makes payments early, the firm forgoes interest income that it ★ Identify Liabilities Due The AP function reviews the open AP file (or vouchers payable file) for such items and sends payment approval in the form of a voucher packet (the voucher and/or supporting documents) to the cash disbursements department. ★ Prepare Cash Disbursement The cash disbursements clerk receives the voucher packet and reviews the documents for completeness and clerical accuracy. The clerk marks the documents in the voucher packets paid and returns them to the AP clerk. ★ Update AP Record Upon receipt of the voucher packet, the AP clerk removes the liability by debiting the AP subsidiary account or by recording the check number and payment date in the voucher register. ★ Post to General Ledger The general ledger function receives the journal voucher from cash disbursements and the account summary from AP. The voucher shows the total reductions in the firm’s obligations and cash account as a result of payments to suppliers. Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com) lOMoARcPSD|36723730 Overview of Payroll Activities Update WIP Account ● After cost accounting allocates labor costs to the WIP accounts, the charges are summarized in a labor distribution summary and forwarded to the general edger function. ● Prepare Payroll ● The payroll department receives pay rate and withholding data from the personnel department and hours-worked data from the production department. A clerk in payroll then performs the following tasks. 1. Prepares the payroll register 2. Enters the above information into the employee payroll records. 3. Prepares employee paychecks. 4. Sends the paychecks to the distribute paycheck function. 5. Files the time cards, personnel action form, and and copy of the payroll register. Prepare Accounts Payable ● The accounts payable (AP) clerk reviews the payroll register for correctness and prepares copies of a cash disbursement voucher for the amount of the payroll. The clerk records the voucher in the voucher register and submits the voucher packet (voucher and payroll register) to cash disbursements. A copy of the disbursement voucher is sent to the general ledger function. Prepare Cash Disbursement ● Upon receipt of the voucher packet, the cash disbursements function prepares a single check for the entire amount of the payroll and deposits it in the payroll imprest account. The employee paychecks are drawn on this account, which is used only for payroll. Funds must be transferred from the general cash account to this imprest account before the paychecks can be cashed. The clerk sends a copy of the check along with the disbursement voucher and the payroll register to the AP department, where they are filed. Update General Ledger ● Receives the labor distribution summary from cost accounting, the disbursement voucher from AP, and the journal voucher from cash disbursements. Downloaded by Hianjxmw Ug (Hianjxmw@gmail.com)