Professional Documents
Culture Documents
Untitled Document
Untitled Document
INTERNAL CONTROLS
ELEMENTS
● IS A PROCESS
○ Improvement
○ Control problems
○ Judgment and Experience in designing and implementing
○ Periodically reviewed to ensure effectiveness
Adequate documentation - Can help you critiques internal controls and determine if they are
functioning effectively.
Background checks – essential for employees in sensitive positions, such as those who deals
with large amounts of money
Backup of computer files – ensures that no more than one day’s work is lost in an event of a
systems failure
Backup of power supplies – can give the user time to save any open files, ensuring they are
not lost
ciliation – account for timing differences between the account holder’s records and the bank’s
records of a cash account
Batch control totals - users can calculate various control totals to promote data integrity.
Example you could add up the invoice numbers for a group of sales invoices.
Data encryption - translates data into another form, or code, so that only people with access to
a secret key (formally called a decryption key) or password can read it.
Document matching - whether electronic or paper based, document matching helps ensure
that vendor invoices are only paid when merchandise has been properly ordered and invoiced.
Echo checks - That process allows you to edit the data for any errors or other changes.
Firewalls - They can prevent unauthorized intrusions into an accounting information system and
warn users when such intrusions are detected.
Internal audits - can reveal indications of fraud, waste, and inefficiency, thus strengthening
internal control.
Limit checks - An accounting information system can incorporate various kinds of limit checks.
Lockbox systems - help promote strong internal control over cash. Rather than remitting
payment directly to an organization, customers send their payment to a lockbox.
Physical Security - Simple actions such locking doors and securing computers and related
equipment can go a long way in safeguard assets.
Preformatted data entry screens- greatly improves data entry efficiency. Prenumbered
documents - Checks, purchase orders, sales invoices, and other documents should be
prenumbered strong internal control
Restrictive endorsement and daily deposits of checks received - give the bank more
specific instructions that limit the uses of the endorsed check: the most common is “for deposit
only”, often with an account number included.
Segregation of duties - means to the extent possible, three different people should take on one
responsibility with respect to a specific asset: authorization for use, physical custody, and
recordkeeping.
User training - all internal control processes in the world are virtually worthless if people don’t
know how to apply them. Employees should receive periodic training/reminders about
appropriate internal control procedures.
ETHICAL ISSUES IN BUSINESS
1. Equity
● Executive salaries
● Comparable worth
● Product pricing
2. Rights
● Corporate due process
● Employee health screening
● Employee privacy
● Sexual harassment
● Diversity
● Equal employment opportunity
● Whistle-blowing
3. Honesty
● Employee & management conflict of interest
● Security of organization data & records
● Misleading advertising
● Questionable business practices in foreign
● countries
● Accurate reporting on shareholders’ interest
4. Exercise of corporate
● Political action committees power
● Workplace safety
● Product safety
● Environmental issues
● Divestment of interest
● Corporate political contributions
● Downsizing and plant closures
BUSINESS ETHICS - pertains to the principles of conduct that individuals use in making
choices and guiding their behavior in situations that involve the concept of right and wrong.
1. Proportionality - The benefit from a decision must outweigh the risks. There must be no
alternative decision that provides the same or greater benefit with less risk.
2. Justice - The benefits of the decision should be distributed fairly to those who share the
risks. Those who do not benefit should not carry the burden of risk.
3. Minimize risk - Even if judged acceptable by the principle. The decision should be
implemented so as to minimize all the risks and and avoid any unnecessary risks.
4. Equity in access
Factors that can limit access to computing technology:
A. economic status of an individual/affluence of an organization
B. culture - documentation is prepared in ONLY one language or is poorly translated
C. Safety features or the lack thereof - pregnant women
D. Differences in physical or cognitive skills - “how can hardware
E. and software be designed to consider these difference?”
5. Environmental issues - Paper comes from trees, a natural resource, which if not properly
recycled will end up in landfills. limit printing? require recycling? How?
6. Artificial Intelligence - who is responsible for the completeness and appropriateness of the
knowledge base? who is responsible for the decisions made by an expert system that causes
harm when implemented? Who owns the expertise once it is coded into a knowledge base?
8. Misuse of computers - copying proprietary software using company computers for personal
benefits snooping through other people’s files
FRAUD - denotes a false representation of a material fact made by one party to another party
with the intent to deceive and induce the other party to justifiably rely on the fact to his/her
detriment.
Other names:
● white-collar crime
● defalcation
● embezzlement
● Irregularities
Management fraud - often escapes detection until the company has suffered irreparable
damage or loss
3 characteristics:
1. the fraud is perpetrated at levels of management above the one to which internal control
structures generally relate
2. the fraud frequently involves using the financial statements to create an illusion that an
entity is healthier and more prosperous than, in fact, it is
3. if the fraud involves misappropriation of assets, it frequently is shrouded in a maze of
complex business transactions, often involving related third parties.