SlideShare a Scribd company logo
1 of 3
Download to read offline
Read the following accounting case and then answer the questions thoroughly. Questions are
listed below the case.
Taylor and Ryan co-own and operate Hatfield Office Equipment (HOE) for 30 years. A local
bank has continually financed HOE, which has an inventory worth millions of dollars. The
siblings share ownership of the business. They hired James, Taylor’s son, to handle the
company’s bookkeeping responsibilities.
James, 30, had been working in various jobs at the business since high school. He eventually was
entrusted with all aspects of bookkeeping for the business: accounts payable, accounts
receivable, payroll, and all account and bank reconciliations. Taylor and Ryan gave him check-
signing ability and a business credit card.
After becoming the bookkeeper, James married and began a family. As his personal monthly
expenses increased, he found it difficult to maintain the lifestyle he had known when he was
single and living with his parents.
The fraud scheme began simply. At first, James began illegally using his business p-card (or
purchasing card) for small personal expenses, such as gas for his personal vehicle and fast food
meals. After several months, his charges for personal expenses increased in number and dollar
amount, including charges for taking out his wife and children to fine restaurants, clothing for
himself and his family, and even high-end electronic products. No one at HOE noticed the
continual increase in charges for personal items because James controlled all payment checks to
the credit card company.
James’ fraudulent activities expanded. He began embezzling from the payroll system. Because
he was a manager, he didn’t have to use the time clock and began to pay himself for excessive
overtime pay. He would give himself paychecks in lieu of not taking vacation time, even though
he took all his vacation days. HOE management, Ryan and Taylor were oblivious to what was
happening.
James then began writing checks payable to himself, but he would write a regular recurring
vendor’s name on each check stub and hand-key it into the computer system. When the bank
statements came each month, James would alter the images of the checks on the statements to
match the vendors on the check stubs and in the system. Then he would hide evidence of the
fraudulent checks he had cashed by photocopying the altered pages of the bank statements and
shredding the original statements.
Crafty James wasn’t done yet. He opened a new personal credit card at the business’ bank. Now
it was easy for him to electronically make bank drafts for paying the business’ monthly credit
card statements and then write company checks to pay his personal card. If anyone reviewed the
check stubs, it would only appear that one credit card invoice had been paid each month. James
could charge the company’s credit card for his personal expenses and charge additional
purchases to this new credit card. He used company funds to pay off both cards. Sweet deal.
Some fraudsters rationalize their thefts as “temporary” loans they will repay later. James
executed his frauds without any intention of returning the money. His thefts from the company
for 2½ years were eventually large enough to create company cash flow problems.
Taylor accidently discovered the crimes when she was searching the business’ online banking
system for a canceled check and discovered that several checks in one month had been payable
to and signed by James.
Ryan and Taylor didn’t contact law enforcement nor engage an outside accountant. During its
internal investigation, the family determined that it had lost at least $90,000 (though it was
probably quite a bit more than that).
When confronted, James confessed and explained how he had stolen the money. The business
fired him after he signed an agreement for restitution, which stipulated that the business wouldn’t
prosecute.
Before they discovered James’ crimes, Ryan and Taylor had attributed cash-flow problems to a
downturn in the economy. And James, of course, concurred. HOE had to lay off employees and
cut or reduce employee benefits. The company still hasn’t recovered from James’ fraud schemes.
Discussion Questions: Detailed Explination is Requried
Was the theft preventable? Defend your position by addressing the following:
What internal control weaknesses facilitated the thefts?
What internal controls policies should be implemented to prevent future theft?
Solution
Yes, the theft was preventable.
Frauds are intentional and wilfulful acts that are taken care of while performing in order not to be
revelead. It is difficult to find the existnece of fruad. However, when there exists a circumstance
that leads to generation of doubt in the mind about the existence of fraud that could result in
embezlement of cash or assets or any mistatement, it to be looked at with great care.
The circumstances in the current scenario also indicate that if the effectiveness and eficiency of
the internal controls are checked properly, the problem could have been discovered much earlier
in point of time.
What internal control wekaness facilitated the theft?
Seggregation of duties
As it is clear from the information given, the missing internal control is seggregation of duties.
Lack of seggregation of duties is usually prevalant in small organisations where one or few
employees perform multiple tasks. We can learn that James was concerned with all the book
keeping activities and also he had teh authority to control the payment checks to the credit card
company. He was also the manager that made him take advantage of paying himslef for the
vacations taken too. He was also given the responsibility to have the custody of the bank
statements and the original documents of the vendors that he could easily embezzle. Assigning
different people with responsibilities like authorising transactions, recording transactions,
maintaining custody of assets such as creddit cards and bank statements helps prevent fraud as
there exists internal check where every employee's work is checked by another employee in the
way the work is allotted.
What internal control policies should be implemented to prevent future theft?
1. No one person should be responsible for a transaction from its origination to end. If
bookkeeping is someone's responsibility, another person should be responsible for maintaining
purchase or sale books, authorise purchases, sales and another person should be in charge of the
physical custody fo the goods.
2. All the payments made on purchasing credit cards issued to employees should be carefully
scrutinized to see if those involve personal expenses that have been charged to office expenses.
Also, proper authorisation of these cards is to be considered.
3.Payroll is one area that requires specfic attention. It is to be looked into that there are no
dummy payments made to ghost workers or to the genuine workers for time not worked.
4. Ensure that payment is always made based on original documents and the duplicate documents
are kept for reference and are not used to embezzle any cash.

More Related Content

Similar to Read the following accounting case and then answer the questions tho.pdf

Legal Ease 0709 Beware of Payday Loans
Legal Ease 0709 Beware of Payday LoansLegal Ease 0709 Beware of Payday Loans
Legal Ease 0709 Beware of Payday LoansJanette Levey Frisch
 
Mel OConner owns rental properties in Michigan. Each property has .pdf
Mel OConner owns rental properties in Michigan. Each property has .pdfMel OConner owns rental properties in Michigan. Each property has .pdf
Mel OConner owns rental properties in Michigan. Each property has .pdfAkashayhandicraft789
 
Quizzle's credit reports & scores basics
Quizzle's credit reports & scores basicsQuizzle's credit reports & scores basics
Quizzle's credit reports & scores basicsquizzle
 
A Secure httpsereader.chegg.com#books9781305465114cfi 5. EXPE.pdf
A Secure httpsereader.chegg.com#books9781305465114cfi 5. EXPE.pdfA Secure httpsereader.chegg.com#books9781305465114cfi 5. EXPE.pdf
A Secure httpsereader.chegg.com#books9781305465114cfi 5. EXPE.pdfmallik3000
 
Fraud Case Study
Fraud Case StudyFraud Case Study
Fraud Case StudyAngela Hays
 
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdfCORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdfJOHN BABATUNDE LEE
 
1. How to Embezzle Money” There are a myriad of techniques for e.docx
1. How to Embezzle Money” There are a myriad of techniques for e.docx1. How to Embezzle Money” There are a myriad of techniques for e.docx
1. How to Embezzle Money” There are a myriad of techniques for e.docxSONU61709
 
Running head Cardinal Wholesalers’ Case .docx
Running head Cardinal Wholesalers’ Case                    .docxRunning head Cardinal Wholesalers’ Case                    .docx
Running head Cardinal Wholesalers’ Case .docxtodd271
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptxRandyKuswanto
 
Commingling Items
Commingling ItemsCommingling Items
Commingling ItemsMang Engkus
 
How can credit monitoring protect your fiscal assets
How can credit monitoring protect your fiscal assetsHow can credit monitoring protect your fiscal assets
How can credit monitoring protect your fiscal assetsmaliciousoptimi47
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen- Mark - Fullbright
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theftFlora Runyenje
 
Tips On How You Can Go From A Negative Credit Rating To A Positive Credit Rat...
Tips On How You Can Go From A Negative Credit Rating To A Positive Credit Rat...Tips On How You Can Go From A Negative Credit Rating To A Positive Credit Rat...
Tips On How You Can Go From A Negative Credit Rating To A Positive Credit Rat...The Credit Redeemer
 

Similar to Read the following accounting case and then answer the questions tho.pdf (20)

1. chapter 7.pdf
1. chapter 7.pdf1. chapter 7.pdf
1. chapter 7.pdf
 
Bad credit payday loans
Bad credit payday loansBad credit payday loans
Bad credit payday loans
 
Legal Ease 0709 Beware of Payday Loans
Legal Ease 0709 Beware of Payday LoansLegal Ease 0709 Beware of Payday Loans
Legal Ease 0709 Beware of Payday Loans
 
Mel OConner owns rental properties in Michigan. Each property has .pdf
Mel OConner owns rental properties in Michigan. Each property has .pdfMel OConner owns rental properties in Michigan. Each property has .pdf
Mel OConner owns rental properties in Michigan. Each property has .pdf
 
Quizzle's credit reports & scores basics
Quizzle's credit reports & scores basicsQuizzle's credit reports & scores basics
Quizzle's credit reports & scores basics
 
A Secure httpsereader.chegg.com#books9781305465114cfi 5. EXPE.pdf
A Secure httpsereader.chegg.com#books9781305465114cfi 5. EXPE.pdfA Secure httpsereader.chegg.com#books9781305465114cfi 5. EXPE.pdf
A Secure httpsereader.chegg.com#books9781305465114cfi 5. EXPE.pdf
 
Fraud Case Study
Fraud Case StudyFraud Case Study
Fraud Case Study
 
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdfCORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
CORPORATE WAYS TO PREVENT FRAUD IN YOUR BUSINESS.pdf
 
1. How to Embezzle Money” There are a myriad of techniques for e.docx
1. How to Embezzle Money” There are a myriad of techniques for e.docx1. How to Embezzle Money” There are a myriad of techniques for e.docx
1. How to Embezzle Money” There are a myriad of techniques for e.docx
 
Running head Cardinal Wholesalers’ Case .docx
Running head Cardinal Wholesalers’ Case                    .docxRunning head Cardinal Wholesalers’ Case                    .docx
Running head Cardinal Wholesalers’ Case .docx
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
Credit
CreditCredit
Credit
 
Why do people commit fraud.pdf
Why do people commit fraud.pdfWhy do people commit fraud.pdf
Why do people commit fraud.pdf
 
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
 
Commingling Items
Commingling ItemsCommingling Items
Commingling Items
 
How can credit monitoring protect your fiscal assets
How can credit monitoring protect your fiscal assetsHow can credit monitoring protect your fiscal assets
How can credit monitoring protect your fiscal assets
 
Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Tips On How You Can Go From A Negative Credit Rating To A Positive Credit Rat...
Tips On How You Can Go From A Negative Credit Rating To A Positive Credit Rat...Tips On How You Can Go From A Negative Credit Rating To A Positive Credit Rat...
Tips On How You Can Go From A Negative Credit Rating To A Positive Credit Rat...
 

More from petercoiffeur18

John, a sociologist, will be focusing on how larger societal institu.pdf
John, a sociologist, will be focusing on how larger societal institu.pdfJohn, a sociologist, will be focusing on how larger societal institu.pdf
John, a sociologist, will be focusing on how larger societal institu.pdfpetercoiffeur18
 
Implement the ListArray ADT-Implement the following operations.pdf
Implement the ListArray ADT-Implement the following operations.pdfImplement the ListArray ADT-Implement the following operations.pdf
Implement the ListArray ADT-Implement the following operations.pdfpetercoiffeur18
 
In what ways do humans effect the environment Explain in 200 words.pdf
In what ways do humans effect the environment Explain in 200 words.pdfIn what ways do humans effect the environment Explain in 200 words.pdf
In what ways do humans effect the environment Explain in 200 words.pdfpetercoiffeur18
 
i need a taking turn method for a player vs computer battleship game.pdf
i need a taking turn method for a player vs computer battleship game.pdfi need a taking turn method for a player vs computer battleship game.pdf
i need a taking turn method for a player vs computer battleship game.pdfpetercoiffeur18
 
I am trying to change this code from STRUCTS to CLASSES, the members.pdf
I am trying to change this code from STRUCTS to CLASSES, the members.pdfI am trying to change this code from STRUCTS to CLASSES, the members.pdf
I am trying to change this code from STRUCTS to CLASSES, the members.pdfpetercoiffeur18
 
how internal resources and capabilities can be a source of sustainab.pdf
how internal resources and capabilities can be a source of sustainab.pdfhow internal resources and capabilities can be a source of sustainab.pdf
how internal resources and capabilities can be a source of sustainab.pdfpetercoiffeur18
 
For an organism that is growing using glucose as the electron donor, .pdf
For an organism that is growing using glucose as the electron donor, .pdfFor an organism that is growing using glucose as the electron donor, .pdf
For an organism that is growing using glucose as the electron donor, .pdfpetercoiffeur18
 
Exercise 5.6.28. For each of the following descriptions of a function.pdf
Exercise 5.6.28. For each of the following descriptions of a function.pdfExercise 5.6.28. For each of the following descriptions of a function.pdf
Exercise 5.6.28. For each of the following descriptions of a function.pdfpetercoiffeur18
 
Discuss concepts associated with mercantilism demonstrating key poli.pdf
Discuss concepts associated with mercantilism demonstrating key poli.pdfDiscuss concepts associated with mercantilism demonstrating key poli.pdf
Discuss concepts associated with mercantilism demonstrating key poli.pdfpetercoiffeur18
 
C++ Caesar Cipher project. Write your codes for the following functi.pdf
C++ Caesar Cipher project. Write your codes for the following functi.pdfC++ Caesar Cipher project. Write your codes for the following functi.pdf
C++ Caesar Cipher project. Write your codes for the following functi.pdfpetercoiffeur18
 
any idea#includeiostream using stdcout; using stdendl; .pdf
any idea#includeiostream using stdcout; using stdendl; .pdfany idea#includeiostream using stdcout; using stdendl; .pdf
any idea#includeiostream using stdcout; using stdendl; .pdfpetercoiffeur18
 
a) Use Newton’s Polynomials for Evenly Spaced data to derive the O(h.pdf
a) Use Newton’s Polynomials for Evenly Spaced data to derive the O(h.pdfa) Use Newton’s Polynomials for Evenly Spaced data to derive the O(h.pdf
a) Use Newton’s Polynomials for Evenly Spaced data to derive the O(h.pdfpetercoiffeur18
 
A radio station has a power output of 200 watts. What is the intensit.pdf
A radio station has a power output of 200 watts. What is the intensit.pdfA radio station has a power output of 200 watts. What is the intensit.pdf
A radio station has a power output of 200 watts. What is the intensit.pdfpetercoiffeur18
 
21) What are the fundamental particles of lepton and quarks How man.pdf
21) What are the fundamental particles of lepton and quarks How man.pdf21) What are the fundamental particles of lepton and quarks How man.pdf
21) What are the fundamental particles of lepton and quarks How man.pdfpetercoiffeur18
 
Case 1-A Transition to SupervisorTristan came in on the ground fl.pdf
Case 1-A Transition to SupervisorTristan came in on the ground fl.pdfCase 1-A Transition to SupervisorTristan came in on the ground fl.pdf
Case 1-A Transition to SupervisorTristan came in on the ground fl.pdfpetercoiffeur18
 
x , y Midterm Exsm-201840x Exam C httpsbb-montgomerycollege.blac.pdf
x , y Midterm Exsm-201840x Exam C httpsbb-montgomerycollege.blac.pdfx , y Midterm Exsm-201840x Exam C httpsbb-montgomerycollege.blac.pdf
x , y Midterm Exsm-201840x Exam C httpsbb-montgomerycollege.blac.pdfpetercoiffeur18
 
Why would a cell want to express genes in an operon Why notSol.pdf
Why would a cell want to express genes in an operon Why notSol.pdfWhy would a cell want to express genes in an operon Why notSol.pdf
Why would a cell want to express genes in an operon Why notSol.pdfpetercoiffeur18
 
When discussing the epidemiology of virus infections, the CDC often .pdf
When discussing the epidemiology of virus infections, the CDC often .pdfWhen discussing the epidemiology of virus infections, the CDC often .pdf
When discussing the epidemiology of virus infections, the CDC often .pdfpetercoiffeur18
 
What relationship is there between gobalization and development.pdf
What relationship is there between gobalization and development.pdfWhat relationship is there between gobalization and development.pdf
What relationship is there between gobalization and development.pdfpetercoiffeur18
 
what is the number between 4.5 and 4.75 on the number linew.pdf
what is the number between 4.5 and 4.75 on the number linew.pdfwhat is the number between 4.5 and 4.75 on the number linew.pdf
what is the number between 4.5 and 4.75 on the number linew.pdfpetercoiffeur18
 

More from petercoiffeur18 (20)

John, a sociologist, will be focusing on how larger societal institu.pdf
John, a sociologist, will be focusing on how larger societal institu.pdfJohn, a sociologist, will be focusing on how larger societal institu.pdf
John, a sociologist, will be focusing on how larger societal institu.pdf
 
Implement the ListArray ADT-Implement the following operations.pdf
Implement the ListArray ADT-Implement the following operations.pdfImplement the ListArray ADT-Implement the following operations.pdf
Implement the ListArray ADT-Implement the following operations.pdf
 
In what ways do humans effect the environment Explain in 200 words.pdf
In what ways do humans effect the environment Explain in 200 words.pdfIn what ways do humans effect the environment Explain in 200 words.pdf
In what ways do humans effect the environment Explain in 200 words.pdf
 
i need a taking turn method for a player vs computer battleship game.pdf
i need a taking turn method for a player vs computer battleship game.pdfi need a taking turn method for a player vs computer battleship game.pdf
i need a taking turn method for a player vs computer battleship game.pdf
 
I am trying to change this code from STRUCTS to CLASSES, the members.pdf
I am trying to change this code from STRUCTS to CLASSES, the members.pdfI am trying to change this code from STRUCTS to CLASSES, the members.pdf
I am trying to change this code from STRUCTS to CLASSES, the members.pdf
 
how internal resources and capabilities can be a source of sustainab.pdf
how internal resources and capabilities can be a source of sustainab.pdfhow internal resources and capabilities can be a source of sustainab.pdf
how internal resources and capabilities can be a source of sustainab.pdf
 
For an organism that is growing using glucose as the electron donor, .pdf
For an organism that is growing using glucose as the electron donor, .pdfFor an organism that is growing using glucose as the electron donor, .pdf
For an organism that is growing using glucose as the electron donor, .pdf
 
Exercise 5.6.28. For each of the following descriptions of a function.pdf
Exercise 5.6.28. For each of the following descriptions of a function.pdfExercise 5.6.28. For each of the following descriptions of a function.pdf
Exercise 5.6.28. For each of the following descriptions of a function.pdf
 
Discuss concepts associated with mercantilism demonstrating key poli.pdf
Discuss concepts associated with mercantilism demonstrating key poli.pdfDiscuss concepts associated with mercantilism demonstrating key poli.pdf
Discuss concepts associated with mercantilism demonstrating key poli.pdf
 
C++ Caesar Cipher project. Write your codes for the following functi.pdf
C++ Caesar Cipher project. Write your codes for the following functi.pdfC++ Caesar Cipher project. Write your codes for the following functi.pdf
C++ Caesar Cipher project. Write your codes for the following functi.pdf
 
any idea#includeiostream using stdcout; using stdendl; .pdf
any idea#includeiostream using stdcout; using stdendl; .pdfany idea#includeiostream using stdcout; using stdendl; .pdf
any idea#includeiostream using stdcout; using stdendl; .pdf
 
a) Use Newton’s Polynomials for Evenly Spaced data to derive the O(h.pdf
a) Use Newton’s Polynomials for Evenly Spaced data to derive the O(h.pdfa) Use Newton’s Polynomials for Evenly Spaced data to derive the O(h.pdf
a) Use Newton’s Polynomials for Evenly Spaced data to derive the O(h.pdf
 
A radio station has a power output of 200 watts. What is the intensit.pdf
A radio station has a power output of 200 watts. What is the intensit.pdfA radio station has a power output of 200 watts. What is the intensit.pdf
A radio station has a power output of 200 watts. What is the intensit.pdf
 
21) What are the fundamental particles of lepton and quarks How man.pdf
21) What are the fundamental particles of lepton and quarks How man.pdf21) What are the fundamental particles of lepton and quarks How man.pdf
21) What are the fundamental particles of lepton and quarks How man.pdf
 
Case 1-A Transition to SupervisorTristan came in on the ground fl.pdf
Case 1-A Transition to SupervisorTristan came in on the ground fl.pdfCase 1-A Transition to SupervisorTristan came in on the ground fl.pdf
Case 1-A Transition to SupervisorTristan came in on the ground fl.pdf
 
x , y Midterm Exsm-201840x Exam C httpsbb-montgomerycollege.blac.pdf
x , y Midterm Exsm-201840x Exam C httpsbb-montgomerycollege.blac.pdfx , y Midterm Exsm-201840x Exam C httpsbb-montgomerycollege.blac.pdf
x , y Midterm Exsm-201840x Exam C httpsbb-montgomerycollege.blac.pdf
 
Why would a cell want to express genes in an operon Why notSol.pdf
Why would a cell want to express genes in an operon Why notSol.pdfWhy would a cell want to express genes in an operon Why notSol.pdf
Why would a cell want to express genes in an operon Why notSol.pdf
 
When discussing the epidemiology of virus infections, the CDC often .pdf
When discussing the epidemiology of virus infections, the CDC often .pdfWhen discussing the epidemiology of virus infections, the CDC often .pdf
When discussing the epidemiology of virus infections, the CDC often .pdf
 
What relationship is there between gobalization and development.pdf
What relationship is there between gobalization and development.pdfWhat relationship is there between gobalization and development.pdf
What relationship is there between gobalization and development.pdf
 
what is the number between 4.5 and 4.75 on the number linew.pdf
what is the number between 4.5 and 4.75 on the number linew.pdfwhat is the number between 4.5 and 4.75 on the number linew.pdf
what is the number between 4.5 and 4.75 on the number linew.pdf
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Read the following accounting case and then answer the questions tho.pdf

  • 1. Read the following accounting case and then answer the questions thoroughly. Questions are listed below the case. Taylor and Ryan co-own and operate Hatfield Office Equipment (HOE) for 30 years. A local bank has continually financed HOE, which has an inventory worth millions of dollars. The siblings share ownership of the business. They hired James, Taylor’s son, to handle the company’s bookkeeping responsibilities. James, 30, had been working in various jobs at the business since high school. He eventually was entrusted with all aspects of bookkeeping for the business: accounts payable, accounts receivable, payroll, and all account and bank reconciliations. Taylor and Ryan gave him check- signing ability and a business credit card. After becoming the bookkeeper, James married and began a family. As his personal monthly expenses increased, he found it difficult to maintain the lifestyle he had known when he was single and living with his parents. The fraud scheme began simply. At first, James began illegally using his business p-card (or purchasing card) for small personal expenses, such as gas for his personal vehicle and fast food meals. After several months, his charges for personal expenses increased in number and dollar amount, including charges for taking out his wife and children to fine restaurants, clothing for himself and his family, and even high-end electronic products. No one at HOE noticed the continual increase in charges for personal items because James controlled all payment checks to the credit card company. James’ fraudulent activities expanded. He began embezzling from the payroll system. Because he was a manager, he didn’t have to use the time clock and began to pay himself for excessive overtime pay. He would give himself paychecks in lieu of not taking vacation time, even though he took all his vacation days. HOE management, Ryan and Taylor were oblivious to what was happening. James then began writing checks payable to himself, but he would write a regular recurring vendor’s name on each check stub and hand-key it into the computer system. When the bank statements came each month, James would alter the images of the checks on the statements to match the vendors on the check stubs and in the system. Then he would hide evidence of the fraudulent checks he had cashed by photocopying the altered pages of the bank statements and shredding the original statements. Crafty James wasn’t done yet. He opened a new personal credit card at the business’ bank. Now it was easy for him to electronically make bank drafts for paying the business’ monthly credit card statements and then write company checks to pay his personal card. If anyone reviewed the check stubs, it would only appear that one credit card invoice had been paid each month. James
  • 2. could charge the company’s credit card for his personal expenses and charge additional purchases to this new credit card. He used company funds to pay off both cards. Sweet deal. Some fraudsters rationalize their thefts as “temporary” loans they will repay later. James executed his frauds without any intention of returning the money. His thefts from the company for 2½ years were eventually large enough to create company cash flow problems. Taylor accidently discovered the crimes when she was searching the business’ online banking system for a canceled check and discovered that several checks in one month had been payable to and signed by James. Ryan and Taylor didn’t contact law enforcement nor engage an outside accountant. During its internal investigation, the family determined that it had lost at least $90,000 (though it was probably quite a bit more than that). When confronted, James confessed and explained how he had stolen the money. The business fired him after he signed an agreement for restitution, which stipulated that the business wouldn’t prosecute. Before they discovered James’ crimes, Ryan and Taylor had attributed cash-flow problems to a downturn in the economy. And James, of course, concurred. HOE had to lay off employees and cut or reduce employee benefits. The company still hasn’t recovered from James’ fraud schemes. Discussion Questions: Detailed Explination is Requried Was the theft preventable? Defend your position by addressing the following: What internal control weaknesses facilitated the thefts? What internal controls policies should be implemented to prevent future theft? Solution Yes, the theft was preventable. Frauds are intentional and wilfulful acts that are taken care of while performing in order not to be revelead. It is difficult to find the existnece of fruad. However, when there exists a circumstance that leads to generation of doubt in the mind about the existence of fraud that could result in embezlement of cash or assets or any mistatement, it to be looked at with great care. The circumstances in the current scenario also indicate that if the effectiveness and eficiency of the internal controls are checked properly, the problem could have been discovered much earlier in point of time. What internal control wekaness facilitated the theft? Seggregation of duties As it is clear from the information given, the missing internal control is seggregation of duties. Lack of seggregation of duties is usually prevalant in small organisations where one or few
  • 3. employees perform multiple tasks. We can learn that James was concerned with all the book keeping activities and also he had teh authority to control the payment checks to the credit card company. He was also the manager that made him take advantage of paying himslef for the vacations taken too. He was also given the responsibility to have the custody of the bank statements and the original documents of the vendors that he could easily embezzle. Assigning different people with responsibilities like authorising transactions, recording transactions, maintaining custody of assets such as creddit cards and bank statements helps prevent fraud as there exists internal check where every employee's work is checked by another employee in the way the work is allotted. What internal control policies should be implemented to prevent future theft? 1. No one person should be responsible for a transaction from its origination to end. If bookkeeping is someone's responsibility, another person should be responsible for maintaining purchase or sale books, authorise purchases, sales and another person should be in charge of the physical custody fo the goods. 2. All the payments made on purchasing credit cards issued to employees should be carefully scrutinized to see if those involve personal expenses that have been charged to office expenses. Also, proper authorisation of these cards is to be considered. 3.Payroll is one area that requires specfic attention. It is to be looked into that there are no dummy payments made to ghost workers or to the genuine workers for time not worked. 4. Ensure that payment is always made based on original documents and the duplicate documents are kept for reference and are not used to embezzle any cash.