Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

CHAPTER 4: The Revenue Cycle PICK GOODS.

The receive order activity forwards the stock release


Revenue Cycle- it is the direct exchange of finished goods or services for document (also called the picking ticket) to the pick goods function in the
cash in a single transaction between a seller and a buyer. warehouse.
Verified stock release- After picking the stock, the order is verified
Overview… for accuracy
Revenue Transaction into two phases: Back-order record - a record which stays on file until the inventories
(1) Physical Phase- involving the transfer of assets or services from the seller arrive from the supplier. Back-ordered items are shipped before new sales
to the buyer are processed.
(2) Financial Phase- involving the receipt of cash by the seller in payment of SHIP GOODS. Before the arrival of the goods and the verified stock release
the accounts receivable document, the shipping department receives the packing slip and shipping
notice from the receive order function.
Revenue Cycle consists of two major sub systems: Bill of Lading – it is a formal contract between the seller and the shipping
(1) the sales order processing subsystem company (carrier) to transport the goods to the customer.
(2) the cash receipts subsystem BILL CUSTOMER. The shipment of goods marks the completion of the
economic event and the point at which the customer should be billed.
Two objectives of this chapter: The billing function performs the following record-keeping tasks:
>The first is to illustrate system functionality, efficiency issues, and workflow • Sends the stock release document to the update inventory records task.
characteristics of different technologies. • Forwards the ledger copy of the sales order to the update accounts
>The second is to demonstrate how internal control issues differ between receivable task.
systems at various points on the technology/human continuum. • Records the sale in the sales journal.
Sales Journal – it is a special journal used for recording completed sales
“SALES ORDER PROCEDURE” transactions. The details of sales invoices are entered in the journal
The tasks involved in receiving and processing a customer order, filling the individually.
order and shipping products to the customer, billing the customer at the Journal Voucher – summarized entries
proper time, and correctly accounting for the transaction. Accounts Receivable—Control XXXX.XX
RECEIVE ORDER. The sales process begins with the receipt of a Sales XXXX.XX
customer order indicating the type and quantity of merchandise desired. The journal voucher system eliminates the need for a formal general
SALES ORDER contains information such as the customer’s name, journal, which is replaced by a journal voucher file.
address, and account number; the name, number, and description of the UPDATE INVENTORY RECORDS. The inventory control function updates
items sold; and the quantities and unit prices of item. inventory subsidiary ledger accounts from information contained in the
CHECK CREDIT. Before processing the order further, the customer’s stock release document.
creditworthiness needs to be established. Cost of Goods Sold XXX.XX
Credit Approval Process - it is an authorization control and should Inventory—Control XXX.XX
be performed as a function separate from the sales activity.
UPDATE ACCOUNTS RECEIVABLE RECORDS. Customer records in the UPDATE INVENTORY AND AR RECORDS. The inventory control function
accounts receivable (AR) subsidiary ledger are updated from information adjusts the inventory records and forwards the credit memo to accounts
provided by the sales order (ledger copy). receivable, where the customer’s account is also adjusted.
POST TO GENERAL LEDGER. By the close of the transaction processing UPDATE GENERAL LEDGER. Upon receipt of the journal voucher and
period, the general ledger function has received journal vouchers from the account summary information, the general ledger function reconciles the
billing and inventory control tasks and an account summary from the AR figures and posts to the following control accounts:
function. Inventory-Control XXX.XX
2 purposes: Sales Returns and Allowances XXXX.XX
1)The general ledger uses the journal vouchers to post to the following Cost of Goods Sold XXX.XX
control accounts Accounts Receivable—Control XXXX.XX
DR CR Accounts Receivable—Control XXXX.XX “Cash Receipts Procedures”
Cost of Goods Sold XXX.XX OPEN MAIL AND PREPARE REMITTANCE LIST. A mail room employee opens
Inventory Control XXX.XX envelopes containing customers’ payments and remittance advices.
Sales XXXX.XX Remittance advices-contain information needed to service individual
2) This information supports an important independent verification control. customers’ accounts. This includes payment date, account number, amount
paid, and customer check number.
“Sales Return Procedures” Remittance list (or cash prelist)-a form where the clerk records each checks
An organization can expect that a certain percentage of its sales will be RECORD AND DEPOSIT CHECKS . A cash receipts employee verifies the
returned. This occurs for a number of reasons, some of which are as follows: accuracy and completeness of the checks against the prelist.
• The company shipped the customer the wrong merchandise. Cash Receipts Journal-it is where all cash receipts transactions, including
• The goods were defective. cash sales, miscellaneous cash receipts, and cash received on account are
• The product was damaged in shipment. recorded.
• The buyer refused delivery because the seller shipped the goods too late UPDATE ACCOUNTS RECEIVABLE RECORDS. The remittance advices are
or they were delayed in transit. used to post to the customers’ accounts in the AR subsidiary ledger.
PREPARE RETURN SLIP. When items are returned, the receiving department UPDATE GENERAL LEDGER. Upon receipt of the journal voucher and the
employee counts, inspects, and prepares a return slip describing the items. account summary, the general ledger function reconciles the figures, posts
PREPARE CREDIT MEMO. Upon receipt of the return slip, the sales to the cash and AR control accounts, and files the journal voucher.
employee prepares a credit memo. This document is the authorization for RECONCILE CASH RECEIPTS AND DEPOSITS. Periodically, a clerk from the
the customer to receive credit for the merchandise returned. controller’s office (or an employee not involved with the cash receipts
APPROVE CREDIT MEMO. The credit manager evaluates the circumstances procedures) reconciles cash receipts by comparing the following
of the return and makes a judgment to grant (or disapprove) credit. The documents: (1) a copy of the prelist, (2) deposit slips received from the
manager then returns the approved credit memo to the sales department. bank, and (3) related journal vouchers.
UPDATE SALES JOURNAL. Upon receipt of the approved credit memo, the
transaction is recorded in the sales journal as a contra entry.
Physical Systems-Physical accounting information systems are a 4. The shipping department performs its usual task of reconciling the goods
combination of computer technology and human activity. This with the packing slip, preparing them for shipment, and selecting a carrier.
technology/human mix creates a continuum of alternative design options 5. Upon receipt of the shipping notice, the system automatically performs
BASIC TECHNOLOGY REVENUE CYCLE-This section presents examples of the following accounting tasks:
basic technology revenue cycle systems. The computers used in these • Updates the customer’s credit history record
systems are independent (nonnetworked) personal computers (PCs). • Reduces the quantity-on-hand
BASIC TECHNOLOGY SALES ORDER PROCESSING SYSTEM-the system that • Determines if the inventory quantity-on-hand has fallen below the
shows the processes, documents, and data files of a basic technology sales reorder point and, if so, adds a record to the purchase requisition file.
order system. The following sections outline the key activities in this system. • Places an “on-order” flag
1. Sales Department • Inserts a shipped date in sales invoice record
2. Credit Department Approval • Updates the GL accounts
3. Warehouse Procedures • The system produces and distributes various management reports
4. The Shipping Department INTEGRATED CASH RECEIPTS SYSTEM-The system presented here and the
5. The Billing Department discussion presented further in the text assumes an organization in which
6. Accounts Receivable, Inventory Control, and General Ledger customers make payments on account with physical checks that are mailed
Departments to the company.
BASIC TECHNOLOGY CASH RECEIPTS SYSTEM 1. Mail Room
1. Mail Room 2. Cash Receipts Department
2. Cash Receipts 3. Automatic Data Processing Procedures
3. Accounts Receivable • Closes the sales invoices
4. General Ledger Department • Posts to the GL accounts.
5. Controller’s Office • Prepares and distributes various management reports
ADVANCED TECHNOLOGY REVENUE CYCLE-Advanced technologies allow 4. Controller’s Office-a clerk in the controller’s office periodically
systems designers to integrate accounting and other business functions performs a reconciliation of remittance lists, bank deposit slips, cash
through a common information system. receipts journals, and the GL cash accounts.
INTEGRATED SALES ORDER PROCESSING SYSTEM-Notice that the functions REVENUE CYCLE RISKS AND INTERNAL CONTROLS
of credit checking, accounts receivable updating, customer billing, inventory The following are the primary risks associated with revenue cycle
updating, and posting to the general ledger are performed automatically by transactions:
the central computer system • Selling to un-creditworthy customers
”Sales Procedures” • Shipping customers the wrong items or incorrect quantities
1. The system accesses the inventory subsidiary file and checks the • Inaccurately recording sales and cash receipts transactions in journals and
availability of the inventory items requested. accounts
2. If credit is approved, the system adds a record to the sales invoice file • Misappropriation of cash receipts and inventory
3. The warehouse clerk’s produces a hard-copy printout of the electronically • Unauthorized access to accounting records and confidential report
transmitted stock release document.
Internal Control Activities as consisting of two major categories: reduction in inventory drops the inventory quantity-on-hand to a point
(1) physical controls and (2) information technology (IT) controls. below the inventory reorder point.
These consist of six classes of internal control activities: transaction *If Quantity-on-Hand < Reorder Point AND On-Order field=zero
authorization, segregation of duties, supervision, accounting records, access
control, and independent verification. “Risk of Inaccurately Recording Transactions in Journals and Accounts”
The following outlines some common revenue cycle errors but is not
SUMMARY OF REVENUE CYCLE RISKS AND CONTROLS intended to be an exhaustive list:
• Sales to customers are incorrectly calculated.
”Risk of Selling to Un-Creditworthy Customers” • Sales are recorded in the wrong period.
Selling on credit to customers who have not been properly vetted can lead • Customers are billed for items they did not receive (back ordered).
to excessive bad debt losses. • Customer cash receipts are inaccurately posted to accounts
Physical Controls • Summaries of sales, accounts receivable, cash receipts, and inventory
TRANSACTION AUTHORIZATION. The objective of transaction authorization levels are incorrectly posted to their respective GL accounts
is to ensure that only valid transactions are processed. Physical Controls
SEGREGATION OF DUTIES. An objective of segregation of duties as stated in TRANSACTION AUTHORIZATION. Cash prelist provides a means for verifying
Chapter 3 is to separate transaction authorization from transaction that customer checks and remittance advices match in amount.
processing. ACCOUNTING RECORDS. How a firm’s source documents, journals, and
IT Controls ledgers form an audit trail that allows independent auditors to trace
AUTOMATED CREDIT CHECKING. Credit checking may be performed transactions through various stages of processing.
automatically by the system as a programmed process control. PRENUMBERED DOCUMENTS. (sales orders, shipping notices, remittance
advices, etc.) are sequentially numbered
“Risk of Shipping Customers Incorrect Items or Quantities” SPECIAL JOURNALS. By grouping similar transactions together into special
Shipping customers the wrong items or incorrect quantities may result in journals
damaged customer relations, excessive sales returns, lost future sales, and GENERAL LEDGERS. basis for financial statement preparation.
accounting errors. FILES. The revenue cycle employs several temporary and permanent files
Physical Controls that contribute to the audit trail. The following are typical examples:
INDEPENDENT VERIFICATION. The shipping function verifies that the goods • Customer order file shows the status of customer orders.
sent from the warehouse are correct in type and quantity. • Shipping log specifies orders shipped during the period.
IT Controls • Customer records file provides customer credit data.
SCANNER TECHNOLOGY. Product code scanners in the warehouse and • Back-order file contains customer orders for out-of-stock items.
shipping department will reduce the risk of human error in picking and • Journal voucher file is a compilation of all journal vouchers.
shipping incorrect products. INDEPENDENT VERIFICATION. The objective of independent verification is
AUTOMATED INVENTORY ORDERING. When an inventory record is updated to verify the accuracy and completeness of tasks performed by other
to reflect a sale, the computer logic should check to determine if the functions in the process.
Independent verification controls in the revenue cycle exist at the following • Depositing cash daily in the bank.
points: • Using a safe or night deposit box for cash.
1) The shipping department reconciles the goods being shipped against the • Locking cash drawers and safes in the cash receipts department.
packing slip SEGREGATION OF DUTIES. ensures that no single individual or department
2) The billing function reconciles the original sales order with the shipping processes a transaction in its entirety.
notice IT Controls
3) Prior to posting to control accounts, the general ledger function MULTILEVEL SECURITY. In a basic technology environment, segregation of
reconciles journal vouchers and summary reports prepared independently duties is accomplished by physically separating individuals and the data over
in different functional areas. which they have custody.
IT Controls
DATA INPUT EDITS. A basic assumption in transaction processing system “Risk of Unauthorized Access to Accounting Records and Reports”
design is that master files, such as inventory, accounts receivable, and the Accounting information is at risk to unauthorized access from outsiders as
general ledger, are “clean” and error free. The following input controls, or well as employees of the organization. The motives for accessing accounting
edits, are programmed into the system to minimize the risk from data input information include:
errors: • Attempts to perpetrate a fraud such as creating a false sales order
1. Checks for missing data, numeric-alphabetic data, and valid data values • Theft of data
2. Check digit edits provide control over accessing the wrong accounts when • Malicious acts such as corrupting and deleting financial data.
posting customer sales and cash receipts transactions. Physical Controls
AUTOMATED POSTING TO SUBSIDIARY AND GL ACCOUNTS. The record- ACCESS CONTROLS. Source documents and accounting records need to be
keeping functions, which in the basic technology system were performed physically protected..
manually by accounting clerks, are automated in the advanced technology SEGREGATION OF DUTIES. The organization should be so structured that
system. the perpetration of a fraud requires collusion between two or more
FILE BACKUP. To reduce the risk of data loss, backup procedures need to be individuals.
in place. IT Controls
“Risk of Misappropriation of Cash Receipts and Inventory” PASSWORDS. Digital accounting records are vulnerable to unauthorized and
Cash and inventory are the physical assets at risk in the revenue cycle. undetected access.
Physical Controls MULTILEVEL SECURITY. Employs programmed techniques that permit
TRANSACTION AUTHORIZATION. The remittance list provides a control simultaneous access to a central system
against the loss or theft of checks and remittance advices as they flow Two common methods for achieving multilevel security:
through the system. Access control list (ACL) - method assigns privileges, such as the right to
SUPERVISION. The individual who opens the mail has access both to cash perform computer program procedures and access data files, directly to the
(the asset) and to the remittance advice (the record of the transaction). individual.
ACCESS CONTROLS. The following physical access controls should be in Role-based access control (RBAC)- involves creating standard tasks (e.g.,
place to help prevent and detect unauthorized access to the firm’s assets: cash receipts processing) called roles.
• Warehouse security, such as fences, alarms, and guards.
*Role is assigned access privileges to specific data and procedures, CHAPTER 5: The Expenditure Cycle Part I: Purchases and Cash
such as the right to add a record to the cash receipts journal. Disbursements Procedures
Overview….
POINT-OF-SALE (POS) SYSTEMS-are used extensively in grocery stores, The objective of the expenditure cycle is to convert the organization’s cash
department stores, and other types of retail organizations. In this example, into physical materials and human resources it needs to conduct business.
the organization maintains no customer accounts receivable; all >The time lag between these events splits the procurement process into
transactions are for cash, checks, or bank credit/debit cards. two phases: (1) the physical phase, involving the acquisition of the resource,
and (2) the financial phase, involving the disbursement of cash.
DAILY PROCEDURES >The principal features of the two major subsystems that constitute the
First, the checkout clerk scans the Universal Product Code (UPC) label on expenditure cycle: (1) the purchases processing subsystem and (2) the cash
the items being purchased with a laser light scanner. The scanner, which is disbursements subsystem.
the primary input device in the POS system, may be handheld or mounted >This chapter is organized into two main sections. The first section provides
on the checkout counter. an overview of the conceptual system, including the logical tasks, the key
END-OF-DAY PROCEDURES. At the end of the day (it’s night entities, the sources and uses of information, and the flow of key documents
HAHAHAHAHA), the cash receipts clerk prepares a three-part deposit slip for through an organization. The second section deals with physical systems,
the total amount of the cash received. One copy is filed and the other two which are composed, to varying degrees, of technology and human activity.
accompany the cash to the bank.
“THE CONCEPTUAL SYSTEM”
POINT-OF-SALE CONTROL ISSUES. The POS environment, however, is “Purchases Processing Procedures “-
associated with unique risks that give rise to the need for additional -include the tasks involved in identifying inventory needs, placing the order,
physical controls. receiving the inventory, and recognizing the liability.
• Authorization MONITOR INVENTORY RECORDS. Firms deplete their inventories by
• Supervision transferring raw materials into the production process (the conversion
• Access Control cycle) and by selling finished goods to customers (revenue cycle).
• Accounting Records PREPARE PURCHASE ORDER. The prepare purchase order function receives
• Independent Verification the purchase requisitions, which are then sorted by the vendor if necessary.
REENGINEERING USING EDI (electronic data interchange) RECEIVE GOODS. Most firms encounter a time lag (sometimes a significant
Doing Business via EDI one) between placing the order and receiving the inventory.
EDI technology was devised to expedite routine transactions between *blind copy-contains no quantity or price information about the
manufacturers and wholesalers, and between wholesalers and retailers. products being received. Purpose: to force the receiving clerk to count and
REENGINEERING USING THE INTERNET inspect inventories prior to completing the receiving report
Doing Business on the Internet UPDATE INVENTORY RECORDS.
Thousands of organizations worldwide have home pages on the Internet to -standard cost system carry their inventories at a predetermined
promote their products and solicit sales. standard value regardless of the price actually paid to the vendor
-actual cost inventory ledger requires additional financial (2) demonstrate how the internal control profile changes as the
information, such as a copy of the supplier’s invoice when it arrives. technology/human mix changes.
SET UP ACCOUNTS PAYABLE. During the course of this transaction, the set BASIC TECHNOLOGY EXPENDITURE CYCLE
up AP function has received and temporarily filed copies of the PO and This section presents examples of basic technology expenditure cycle
receiving report systems. The computers used in these systems are independent (non-
networked) PCs.
“Vouchers Payable System”
-Under this system, the AP department uses cash disbursement vouchers Basic Technology Purchases Processing System-The following sections
and maintains a voucher register. outline the key activities in this system.
*vouchers payable file. This file is equivalent to the open AP INVENTORY CONTROL. The process begins when the inventory control clerk
POST TO GENERAL LEDGER. The general ledger function receives a journal prints purchase requisitions
voucher from the AP department and an account summary from inventory PURCHASING DEPARTMENT. receives the purchase requisitions, sorts them
control. by vendor, and adds a record to the digital open purchase order file
RECEIVING. The clerk receives the goods and the packing slip from the
“The Cash Disbursements System” vendor and reconciles the goods with the blind copy of the PO.
The cash disbursements system processes the payment of obligations AP DEPARTMENT. When the supplier’s invoice arrives, the AP clerk
created in the purchases system. reconciles the invoice, purchase order, and receiving report (three-way
IDENTIFY LIABILITIES DUE. Each day the AP clerk reviews the open AP file match) and prepares an AP packet, which in this paper-oriented system is
for items due for payment. simply a folder containing the reconciled supporting documents.
PREPARE CASH DISBURSEMENT. The cash disbursements clerk receives the GENERAL LEDGER DEPARTMENT. Receives a journal voucher from the AP
AP packet and reviews the documents for completeness and clerical department and an account summary from inventory control.
accuracy.
*check register/cash disbursements journal – where in the clerk Basic Technology Cash Disbursements System-The tasks performed in each
prepares a check and records the check number, dollar amount, and other of the key processes are discussed next.
pertinent data recorded AP DEPARTMENT. AP clerk reviews the AP packets in the open AP file for
UPDATE AP RECORD. The AP packet is then filed in the closed AP file, and an items due, and sends the supporting docs to the cash disbursements dep’t
account summary is prepared and sent to the general ledger function. CASH DISBURSEMENTS DEPARTMENT. The clerk receives the AP packets
POST TO GENERAL LEDGER. The approved journal voucher is then filed. This and reviews the documents for completeness and clerical accuracy.
concludes the cash disbursements procedures. AP DEPARTMENT. Upon receipt of the AP packet, the AP clerk removes the
liability by debiting the vendor’s digital AP subsidiary record.
“Physical Systems” GENERAL LEDGER DEPARTMENT. Based on the journal voucher from cash
The objectives of this section are to: disbursements and the account summary from accounts payable, the
(1) illustrate accounting information systems (AIS) functionality and work general ledger clerk uses the department PC to post to the GL control
flow patterns under different levels of technology and accounts and files the documents. This concludes the cash disbursements
procedures.
ADVANCED TECHNOLOGY EXPENDITURE CYCLE-Integration improves 4. Assuming no discrepancies that demand the AP clerk’s
operational performance and reduces costs by eliminating non value-added intervention, the system automatically approves payment and sets a
tasks. Integration improves operational performance and reduces costs by payment due date.
eliminating non value-added tasks.
INTEGRATED PURCHASES PROCESSING SYSTEM-Labor-intensive activities INTEGRATED CASH DISBURSEMENTS SYSTEM
that characterize the basic technology system add greatly to the cost of The following procedures are performed on items that are due:
system operation and result in human error. 1. Checks are automatically printed, signed, and distributed to the mail
room for mailing to vendors.
Computer Operations -The purchases computer application performs the 2. The payments are automatically recorded in the check register file.
following tasks automatically: 3. Vendor invoices are closed by placing the check number in the closed flag
1. The system reads the purchases requisition file for items that field.
need to be replenished. 4. The general ledger AP control and cash accounts are updated.
2. Hard-copy purchase orders are prepared and sent to the vendor. 5. Reports detailing these transactions are transmitted via a terminal to the
3. A record is added to the open PO file. AP and cash disbursements departments for management review and filing.
4. A digital transaction listing of POs is created
Receiving Department - When the goods arrive, the receiving clerk accesses EXPENDITURE CYCLE RISKS AND INTERNAL CONTROLS
a blind copy of the open PO file in real time by entering the PO number The following are the primary risks associated with expenditure cycle
taken from the packing slip. The following tasks are performed transactions:
automatically by the system: • Unauthorized inventory purchases
1. A record is added to the receiving report file. • Receiving wrong items, incorrect quantities, or damaged goods
2. Quantities of items received are matched against the open PO • Inaccurately recording purchases and cash disbursement transactions in
record, and the PO is closed by placing the receiving report number journals and accounts
in the PO closed flag. • Misappropriation of cash and inventory
3. The inventory subsidiary records are updated to reflect the • Unauthorized access to accounting records and confidential reports.
receipt of the inventory items.
4. The general ledger inventory control account is updated. “Risk of Unauthorized Inventory Purchases”
Accounts Payable Department-The following tasks are performed Physical Controls
automatically by the system: TRANSACTION AUTHORIZATION. to ensure that only valid transactions are
1. Using the PO number as a common attribute, the system links the processed.
vendor invoice to the associated purchase order and receiving IT Controls
report records. AUTOMATED PURCHASE APPROVAL. The objective of automated purchase
2. The system reconciles the supporting documents and creates a approval is to prevent unauthorized purchases from unapproved vendors
virtual AP packet to authorize payment.
3. The system displays the virtual AP packet on the AP clerk’s “Risk of Receiving Incorrect Items, Quantities, or Damaged Goods”
computer screen for review. Physical Controls
INDEPENDENT VERIFICATION. When goods arrive from the supplier, AUTOMATED POSTINGS TO SUBSIDIARY AND GL ACCOUNTS. Works that
receiving clerks verify that the items are correct in type and quantity and performed manually by accounting clerks, are automated in the advanced
inspect them for condition. technology system.
SUPERVISION. to ensure that the clerks properly carry out these important
duties. ” Risk of Misappropriation of Cash and Inventory”
IT Controls The greatest risk of inventory theft occurs in the receiving department and
SCANNER TECHNOLOGY. The basic concept of inspection can be enhanced the warehouse.
through the use of IT controls. Physical Controls
SUPERVISION. Inadequate supervision can create an environment
” Risk of Inaccurately Recording Transactions in Journals and Ledgers” conducive to the theft of inventories in transit.
The following outlines some common expenditure cycle errors but is not INDEPENDENT VERIFICATION. This control is called a three-way match and
intended to be an exhaustive list: involves the following three documents:
• Purchases from vendors are incorrectly calculated. 1. The PO, which shows that the purchasing agent ordered only the
• Accounts payable go unrecorded or are recorded in the wrong period. needed inventories from a valid vendor.
• Vendor bills customers for items they did not receive (back ordered). 2. The receiving report, which is evidence of the physical receipt of
• Vendor cash payments are inaccurately posted to accounts payable. the goods, their condition, and the quantities received.
• Summaries are incorrectly posted to their respective GL accounts. 3. The supplier’s invoice, which provides the financial information
Physical Controls needed to record the obligation as an account payable.
TRANSACTION AUTHORIZATION. The AP function authorizes cash SEGREGATION OF DUTIES—INV. CONTROL FROM INV. WAREHOUSE-an
disbursements via the AP packet. auditor should be able to reconcile inventory records to the physical
ACCOUNTING RECORDS. Tto maintain an audit trail adequate for tracing a inventory
transaction from its source document to the financial statements SEGREGATION OF DUTIES—AP FROM CASH DISBURSEMENTS-Segregating
INDEPENDENT VERIFICATION. The general ledger function provides an these functions greatly reduces the potential for this type of fraud.
important independent verification in the system. IT Controls
IT Controls AUTOMATED THREE-WAY MATCH AND PAYMENT APPROVAL. An
INPUT DATA EDITS. Input controls are edits that focus on the integrity of automated three way match replicates the manual counterpart as follows:
transaction data being entered into the application. The following edits are When the AP clerk receives the supplier’s invoice, the clerk accesses the
to minimize input errors. system and adds a record to the vendor invoice file.
1. Controls, including checks for missing data, numeric-alphabetic MULTILEVEL SECURITY. It allows multiple individuals to simultaneously
data, and invalid data values. access a system, but provides segregation of duties to limit their access
2. Check digit control will provide control over accessing the wrong privileges and activities.
accounts.
ERROR MESSAGES. Any mismatch conditions should produce an error “Risk of Unauthorized Access to Accounting Records and Reports”
message to the computer operator. Accounting information is at risk to unauthorized access from outsiders as
well as employees of the organization. The motives for accessing accounting CHAPTER 6: The Expenditure Cycle Part II: Payroll Processing and
information include: Fixed Asset Procedures
• Attempts to perpetrate a vendor fraud. The Conceptual Payroll System
• Theft of physical inventory. Access to inventory records allows the The nature of payroll processing, however, creates the need for specialized
perpetrator to conceal the theft. procedures for the following reasons
• Malicious acts such as corrupting or deleting financial data. 1. A firm can design general purchasing and disbursement procedures that
Physical Controls apply to all vendors and inventory items.
ACCESS CONTROL. A firm must limit access to documents that control its 2. General expenditure activities constitute a relatively steady stream of
physical assets purchasing and disbursing transactions
SEGREGATION OF DUTIES. 3. Writing checks to employees requires special controls. Combining payroll
IT Controls and trade transactions can encourage payroll fraud.
PASSWORD CONTROL
MULTILEVEL SECURITY. PAYROLL SYSTEM GENERAL TASKS
Personnel Department-The personnel department prepares and submits
personnel action forms to the prepare payroll function
Production Department- the employees prepare two types of time records:
job tickets and time cards. Job tickets capture the time that individual
workers spend on each production job. Time cards capture the time the
employee is at work.
Update WIP Account-After cost accounting allocates labor costs to the WIP
accounts, the charges are summarized in a labor distribution summary and
forwarded to the general ledger function
Prepare Payroll-they receive pay rate and withholding data from the
personnel department and hours-worked data from the production
department. A clerk in the payroll department then performs the following
tasks:
1. Prepares the payroll register, showing gross pay, deductions, overtime
pay, and net pay.
2. Enters this information into the employee payroll records
3. Prepares employee paychecks
4. Sends the paychecks to the distribute paycheck function.
5. Files the time cards, personnel action form, and copy of the payroll
register (not shown).
Distribute Paycheck -A form of payroll fraud involves submitting time cards Employee Timekeeping- Modern business is increasingly characterized by
for nonexistent employees. telecommuting employees working from multiple locations, both
Prepare Accounts Payable The clerk reviews the payroll register for domestically and internationally.
correctness and prepares copies of a cash disbursement voucher for the Biometric time clocks/Magnetic swipe ID cards/Proximity
total amount of the payroll. cards/Mobile remote devices
Prepare Cash Disbursement-Upon receipt of the voucher packet, the cash Data Processing-At the end of the work period, the following tasks are
disbursement function prepares a single check for the entire amount of the performed in a batch process:
payroll and deposits it in the payroll imprest account. 1. Labor costs are distributed to various WIP, overhead, and expense
UPDATE GENERAL LEDGER They receive the labor distribution summary accounts.
from cost accounting, the disbursement voucher from accounts payable, 2. An online labor distribution summary file is created.
and the journal voucher from cash disbursement. 3. Payroll is calculated, and an online payroll register is created from the
time and attendance file and the employee records file.
THE PHYSICAL PAYROLL SYSTEM 4. The employee records file is updated.
BASIC TECHNOLOGY PAYROLL SYSTEM-The following key tasks are 5. Paychecks are prepared, signed, and distributed to the employees.
represented in the flowchart: 6. Funds sufficient to cover the full amount of the payroll are transferred to
1. Personnel action and time and attendance information from the the payroll imprest account
personnel and production departments 7. Digital journal vouchers are entered into the journal voucher file.
2. The payroll department reconciles this information, calculates the payroll,
and sends the paychecks to the paymaster for distribution to employees. PAYROLL SYSTEM RISKS AND INTERNAL CONTROLS
3. Cost accounting receives information regarding the time spent on each As noted in previous chapters, an objective of internal control is to mitigate
job from production. the risk from errors and fraud. The following are the primary risks
4. Accounts payable receives payroll summary information (payroll register) associated with payroll system transactions:
5. The general ledger department reconciles summary information from • Inaccurately recording payroll transactions in accounts.
cost accounting and accounts payable. • Misappropriation of cash through payroll fraud.
ADVANCED TECHNOLOGY PAYROLL SYSTEM For moderate-sized and large • Unauthorized access to payroll records and confidential employee data.
organizations, payroll processing is often integrated within the human
resource management (HRM) system. The HRM system captures and “Risk of Inaccurately Recording Transactions”-The following outlines some
processes a wide range of personnel-related data, including employee possible payroll system errors:
benefits, labor resource planning, employee relations, employee skills, • Time and attendance data are incorrectly calculated.
internal training, and personnel actions. • Wages payable go unrecorded or are recorded in the wrong period.
Human Resources-HR clerks enter data into the employee records file in • Employee earnings and cash payments are inaccurately posted to
real time from terminals employee records or are posted to the wrong employee.
Cost Accounting-The cost accounting department enters job cost data in • Payroll register, AP, and cash disbursements amounts are incorrectly
real time to create the labor usage file. posted to their respective GL accounts
Physical Controls SEGREGATION OF DUTIES-The following segregations of duties reduce the
ACCOUNTING RECORDS. The control objective of accounting records is to risk of various forms of payroll fraud:
maintain an audit trail. The audit trail for payroll includes the following 1. The timekeeping function and the personnel function should be
documents: separated.
1. Time cards, job tickets, and disbursement vouchers. 2. The individual employee paychecks are not negotiable instruments until
2. Journal information the payroll check is deposited into the imprest account at the bank.
3. Subsidiary ledger accounts 3. The use of an independent paymaster to distribute checks (rather than
4. GL accounts the employee’s supervisor) helps verify the existence of employees.
INDEPENDENT VERIFICATION. The following are examples of independent SUPERVISION. Sometimes, employees clock in for another worker who is
verification controls in the payroll system: late or absent.
1. Time and Attendance. Before submitting time cards to payroll, the ACCESS CONTROL. The assets associated with the payroll system are labor
supervisor must verify their accuracy and sign them. and cash.
2. Accounts Payable. The AP clerk verifies the accuracy of the payroll IT Control
register before creating a disbursement voucher that transfers funds to the Input controls to reduce these risks include the following:
imprest account. 1. Limit tests to detect excessive hours reported per period.
3. General Ledger. The general ledger department provides verification of 2. Biometric scanners, swipe cards, and PINs
the overall process by reconciling the labor distribution summary and the 3. Automated tests to validate employee time cards
payroll disbursement voucher. 4. Paycheck direct deposit options for employees
IT Controls
DATA INPUT EDITS. Input controls verify the integrity of transaction data “Risk of Unauthorized Access to Payroll Records and Confidential
being entered into the application. Employee Data”- Payroll information is at risk to unauthorized access from
ERROR MESSAGES. Any mismatch when posting time card or personnel outsiders as well as employees of the organization. The motives for
action data to employee records should produce an error message to the accessing accounting information include:
computer operator. • Malicious acts such as corrupting or deleting payroll data.
FILE BACKUP. Backup procedures need to be in place to reduce the risk of • Theft of confidential employee information
data •Attempts to perpetrate a payroll fraud.
AUTOMATED POSTING TO ACCOUNTS. IT Controls
PASSWORDS.
“Risk of Misappropriation of Cash through Payroll Fraud”-Payroll frauds MULTILEVEL SECURITY.
come in two general forms:
1. The first is the nonexistent employee who receives a paycheck. Outsourcing the Payroll Function-Many organizations outsource their
2. The second type of payroll fraud involves overpayment of an employee. payroll function by transferring all payroll processing tasks to a third-party
Physical Controls provider.
TRANSACTION AUTHORIZATION.The personnel action form helps payroll
keep current the employee records.
Advantages and Risks Associated with Payroll Outsourcing The primary (2) updating the accumulated depreciation and book value fields in the
advantage of payroll outsourcing is cost savings. subsidiary records,
(3) posting the total amount of depreciation to the affected GL accounts
The Conceptual Fixed Asset System (depreciation expense and accumulated depreciation), and
Fixed assets are the property, plant, and equipment used in the operation (4) recording the depreciation transaction by adding a record to the journal
of a business. The specific objectives of the fixed asset system are to: voucher file
1. Process the acquisition of fixed assets as needed and in accordance with Disposal Procedures-When the clerk deletes the record from the fixed asset
formal management approval and procedures. subsidiary ledger, the system automatically
2. Maintain adequate accounting records of asset acquisition, cost, (1) posts an adjusting entry to the fixed asset control account in the general
description, and physical location in the organization. ledger,
3. Maintain accurate depreciation records for depreciable assets in (2) records loss or gain associated with the disposal
accordance with acceptable methods. (3) prepares a journal voucher
4. Provide management with information to help plan for future fixed asset
investments. FIXED ASSET SYSTEM RISKS AND CONTROLS
5. Properly record the retirement and disposal of fixed assets. • Authorization Controls
• Supervision Controls
THE LOGIC OF A FIXED ASSET SYSTEM • Independent Verification Controls
The process involves three categories of tasks: asset acquisition, asset
maintenance, and asset disposal
Asset acquisition usually begins with the departmental manager (user)
recognizing the need to obtain a new asset or replace an existing one.
Asset maintenance involves adjusting the fixed asset subsidiary account
balances as the assets (excluding land) depreciate over time or with usage.
Asset Disposal When an asset has reached the end of its useful life or when
management decides to dispose of it, the asset must be removed from the
fixed asset subsidiary ledger.

THE PHYSICAL FIXED ASSET SYSTEM


Acquisition Procedures- the process begins when the fixed asset accounting
clerk receives a receiving report and a cash disbursement voucher.
Asset Maintenance The fixed asset system uses the depreciation schedules
to record end-of-period depreciation transactions automatically. The
specific tasks include
(1) calculating the current period’s depreciation,

You might also like