SlideShare a Scribd company logo
Chapter 2
Internal control
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
meaning
• Internal control, as defined in accounting and auditing, is
a process for assuring achievement of an organization's
objectives in operational effectiveness and efficiency,
reliable financial reporting, and compliance with laws,
regulations and policies.
• It is a means by which an organization's resources are
directed, monitored, and measured. It plays an important
role in detecting and preventing fraud and protecting the
organization's resources, both physical (e.g., machinery
and property) and intangible (e.g., reputation or
intellectual property such as trademarks).
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Framework for internal control
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Steps to evaluate internal control
system
Organize the process
Segment the company
Develop a schedule for vulnerability
Conduct vulnerability assessments
Establish plans for subsequent actions
Conduct internal reviews
Take corrective action
Prepare summary reports on internal control
Periodical test internal controls of high risk areasMANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Objectives of internal control
• To evaluate the efficiency of performance in the various of
the business.
• To ensure orderly, efficient and economic conduct of the
business
• To see that access to and use of assets are made only with
proper authorization.
• To safe guard the assets of the organization by preventing
frauds wastes and inefficiency
• To ensure that there is periodical verification and
comparison of assets in existence with those of accounting
records and appropriate action taken.
• To ensure that transactions are recorded in the proper
books of accounts regularly, correctly and systematically.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Types of internal controls
• A Vulnerability is a defect in a process, system, application or other asset that creates the potential
for loss or harm. Vulnerabilities are measured primarily through the identification of control
deficiencies (defects or weaknesses) to determine a system's or process' propensity for fIn terms of
taxonomy, there are three, commonly accepted forms of Controls:
• Administrative - These are the laws, regulations, policies, practices and guidelines that govern the
overall requirements and controls for an Information Security or other operational risk program.
For example, a law or regulation may require merchants and financial institutions to protect and
implement controls for customer account data to prevent identity theft. The business, in order to
comply with the law or regulation, may adopt policies and procedures laying out the internal
requirements for protecting this data, which requirements are a form of control.
• Logical - These are the virtual, application and technical controls (systems and software), such as
firewalls, anti virus software, encryption and maker/checker application routines.
• Physical - Whereas a firewall provides a "logical" key to obtain access to a network, a "physical" key
to a door can be used to gain access to an office space or storage room. Other examples of physical
controls are video surveillance systems, gates and barricades, the use of guards or other personnel
to govern access to an office, and remote backup facilities
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Types of internal controls
Detective
preventive
corrective
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
• All three of these elements are critical to the creation of an effective control
environment. However, these elements do not provide clear guidance on
measuring the degree to which the controls mitigate the risk. Instead, the Simple
Risk Model utilizes an alternative set of elements that provide a better means of
weighting the level of mitigation:
• Preventive - These are controls that prevent the loss or harm from occurring. For
example, a control that enforces segregation of responsibilities (one person can
submit a payment request, but a second person must authorize it), minimizes the
chance an employee can issue fraudulent payments.
• Detective - These controls monitor activity to identify instances where practices or
procedures were not followed. For example, a business might reconcile the
general ledger or review payment request audit logs to identify fraudulent
payments.
• Corrective - Corrective controls restore the system or process back to the state
prior to a harmful event. For example, a business may implement a full restoration
of a system from backup tapes after evidence is found that someone has
improperly altered the payment data.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Detective Controls
• Detective Controls are designed to find errors or irregularities after
they have occurred. Examples of detective controls are:
• Reviews of Performance: Management compares information
about current performance to budgets, forecasts, prior periods, or
other benchmarks to measure the extent to which goals and
objectives are being achieved and to identify unexpected results or
unusual conditions that require follow-up.
• Reconciliations: An employee relates different sets of data to one
another, identifies and investigates differences, and takes corrective
action, when necessary.
• Physical Inventories
• Audits
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Preventive Controls
• Preventive Controls are designed to discourage errors or irregularities from
occurring. They are proactive controls that help to ensure departmental objectives
are being met. Examples of preventive controls are:
• Segregation of Duties: Duties are segregated among different people to
reduce the risk of error or inappropriate action. Normally, responsibilities for
authorizing transactions (approval), recording transactions (accounting) and
handling the related asset (custody) are divided.
• Approvals, Authorizations, and Verifications: Management authorizes employees
to perform certain activities and to execute certain transactions within limited
parameters. In addition, management specifies those activities or transactions that
need supervisory approval before they are performed or executed by employees.
A supervisor’s approval (manual or electronic) implies that he or she has verified
and validated that the activity or transaction conforms to established policies and
procedures.
• Security of Assets (Preventive and Detective): Access to equipment, inventories,
securities, cash and other assets is restricted; assets are periodically counted and
compared to amounts shown on control records.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Corrective controls
Corrective — Coupled with preventive and detective controls,
corrective controls help mitigate damage once a risk has
materialized. An organization can document its policies and
procedures, enforcing them by means of warnings and
employee termination when appropriate. When
managers wisely back up data they can restore a functioning
system in the event of a crash. If a disaster strikes, business
recovery can take place when an effective continuity and
disaster management plan is in place and followed.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
limitations
Limitations of Internal Controls:
• No matter how well internal controls are designed, they can only provide reasonable
assurance that objectives have been achieved. Some limitations are inherent in all internal
control systems. These include:
• Judgment: The effectiveness of controls will be limited by decisions made with human
judgment under pressures to conduct business based on the information at hand.
• Breakdowns: Even well designed internal controls can break down. Employees sometimes
misunderstand instructions or simply make mistakes. Errors may also result from new
technology and the complexity of computerized information systems.
• Management Override: High level personnel may be able to override prescribed policies and
procedures for personal gain or advantage. This should not be confused with management
intervention, which represents management actions to depart from prescribed policies and
procedures for legitimate purposes.
• Collusion: Control systems can be circumvented by employee collusion. Individuals acting
collectively can alter financial data or other management information in a manner that
cannot be identified by control systems.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Internal check
• Internal check is the process of
arrangement of duties of various staffs of
a business in such way that work is
automatically checked by the next staff
while performing their duties. Frauds
which are committed by a staff are
automatically detected and corrected by
the another staff.
• A division of duties that does
not permit one individual to carry out
all stages of a transaction. An internal
check is intended to prevent fraud and
minimize errors.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Objectives Of Internal Check
Objectives Of Internal Check
Following are the objectives of internal check system:
• 1. To eliminate the frauds and errors which may be committed by the staffs.
• 2. To prevent misappropriation of cash or stock.
• 3. To ensure the reliability of information produced by the accounting system.
• 4. To detect errors and frauds promptly which helps to minimize their effects in
long term.
• 5. To exercise moral pressure over the staffs.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Essential Characteristics Of Internal Check System
Essential Characteristics Of Internal Check System
Certain qualities are needed to make an internal check system more effective and efficient. Such qualities
are known as features of internal check system which are as follows:
• 1. Division Of Work
Before applying test check it is necessary to divide the entire tasks among the staffs in such a way so that
work can be checked automatically by the another staff. Like, when staff takes the responsibility of
purchase, then another staff should make its payment.
• 2. Provision Of Check
An organization should set up such provision, so that work can be checked by the another staff. An officer
can check the work of one staff by transferring to the staffs and again.
• 3. Use Of Devices
In this modern world, various devices can be used to do various function like use of time record machine,
wage determination machine etc. An organization should use such machines which help to make work of
internal check easier.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
• 4. Self-balancing System
An organization can use self-balancing ledger accounts which helps to make the work of internal
check easier. Its effectiveness depends on its management.
• 5. Change In Work
An organization needs to transfer the staffs from one place to another place so that the work of
previous staffs can be checked by the later staff which helps to make the internal check system
effective.
• 6. Specialization
Every staff may not have such specialized knowledge to maintain accounts properly. So, an
organization should give training to increase their skill so that internal check can be made more
effective.
• 7. Control
There is more chance of frauds where there is direct contact of consumer or public. So, a manager
can keep eyes in those works so that internal check system can be made more effectively.
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Internal Check as regards to Cash
• Receipts against cash
• Rough Cash Book
• Remittances – opened before officer
• Automatic tills or cash register
• Deposit all cash receipt every day
• BRS prepared regularly
• Issue of Cheque – authorized by the
officer
• Independent check of Castings of Cash
Book
• Preparation of Wage sheet
• Payment by cheques except petty
• Collection by travellers
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Internal Check as regard to
PURCHASES
• Orders – 2 copies (Supplier &
Reference)
• On Receipt – Goods Receipt Book
• Invoice – Goods Receipt Book
Verified
• Check Calculations in Invoice
• Invoice Copy – Person in charge
• Clerk – Purchases Book
• Initial the invoice copy
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Duty of an Auditor – CREDIT
PURCHASES
• In clients name
• Authorize person in charge
• Date of Invoice – Period under review
• Review of Verification
• Goods on Invoice – Capital
• Test Check – Purchases Book
• Expenses Debited to Purchases
Account
• Compare the Books
• Stamp, Check Mark, Initial
• Duplicates
• Credit Conformation Statement
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Internal Check as Regard to WAGES
• Check inclusion for Dummy Workers
• Errors or Fraud – piece work records
• Clerical Works
• Dispensed Employees – Retained
• Over Stating – Rates
• Over Stating Hours/days of Work
• Conversion of unpaid wages
• Over footing of pay roll sheets
• Understatement of deduction
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Duties of an Auditor - WAGES
• Check Loop hole
• Wage Sheet or Wage Book
• Calculation are Correct
• Wages payable, paid & unpaid
• Dummy Workers
• Initialed
• ID verification
• Authorized Number of workers
• Wage sheet – ESI Card, PF Account
• Total wages – estimates of costing department
• Duly signed - comparison
• Leave register
• Wage payment vs. advance payment
• Employment of Casual Labourer
• Test Check
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Internal Check as regard to SALES
• Order – Order Received Book
(Name, Particulars of Goods, Date
& Mode of Transport)
• Copy – Dispatch Department
• Clerk compares goods in order
packed by DD
• Rate of charge – Responsible
officer
• Preparation of Invoice – 2/3
copies
• One copy – clerk – sales book
• One copy – gatekeeper – goods
outward book
• Traveler Sales Man – 3 copies
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
Duties of an Auditor – CREDIT SALES
• Review Internal Check System in Place
• Invoice – Sales Book Compare
• Order Received Book, Goods Outward Book, Gatekeeper’s
Outward Book, Delivery Note etc
• Sale of Asset – treated as a ordinary sale
• Statement of accounts from client
• Check sales during last days and weeks
• Cancelled invoice – duplicates
• Sales Tax & Insurance etc debited & credited into
appropriate accounts
• Sales to sister concerns and associates
• Different trade discounts - examined
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in
MANU H NATESH MBA,M.Com. BMSEAC
manu@bmsec.ac.in

More Related Content

What's hot

Auditor's Report
Auditor's  ReportAuditor's  Report
Auditor's Report
Bikash Kumar
 
Internal control
Internal controlInternal control
Audit working papers
Audit working papersAudit working papers
Audit working papers
student
 
Chapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentationChapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentation
Thane
 
Types of accounts
Types of accountsTypes of accounts
Types of accounts
Dr Khyati Boriya -BDS (MHA)
 
Chapter 7 Payroll & Personnel Cycle
Chapter 7 Payroll & Personnel CycleChapter 7 Payroll & Personnel Cycle
Chapter 7 Payroll & Personnel Cycle
Nina Ellina
 
Internal check audit (ppt)
Internal check audit (ppt)Internal check audit (ppt)
Internal check audit (ppt)
MahithaKatragadda
 
Unit 1 Introduction to Auditing
Unit 1 Introduction to AuditingUnit 1 Introduction to Auditing
Unit 1 Introduction to Auditing
Radhika Gohel
 
Financial Statements Audit
Financial Statements AuditFinancial Statements Audit
Financial Statements Audit
Salih Islam
 
9. audit evidence
9. audit evidence9. audit evidence
9. audit evidence
Syed Osama Rizvi
 
Ch 5. assurance 5 Introduction to Internal Control
Ch 5. assurance 5 Introduction to Internal ControlCh 5. assurance 5 Introduction to Internal Control
Ch 5. assurance 5 Introduction to Internal Control
Sazzad Hossain, ITP, MBA, CSCA™
 
11. materiality and audit risk
11. materiality and audit risk11. materiality and audit risk
11. materiality and audit risk
Syed Osama Rizvi
 
Basics of accounting
Basics of accountingBasics of accounting
Basics of accounting
srajpatnaik
 
Lecture slide, chapter 3,Professional Ethics, Independence and Audit Quality
Lecture slide, chapter 3,Professional Ethics, Independence and Audit QualityLecture slide, chapter 3,Professional Ethics, Independence and Audit Quality
Lecture slide, chapter 3,Professional Ethics, Independence and Audit Quality
Sazzad Hossain, ITP, MBA, CSCA™
 
Audit, investigation & forensic accounting: Exploring the nexus
Audit, investigation & forensic accounting: Exploring the nexusAudit, investigation & forensic accounting: Exploring the nexus
Audit, investigation & forensic accounting: Exploring the nexus
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
 
Nature of auditing and few important concepts
Nature of auditing and few important conceptsNature of auditing and few important concepts
Nature of auditing and few important concepts
Dr. Soheli Ghose Banerjee
 
Gaap (generally accepted accounting principles)
Gaap (generally accepted accounting principles)Gaap (generally accepted accounting principles)
Gaap (generally accepted accounting principles)Muhammad Sher
 
Lecture 6, part b, Chapter 10, Materiality and Audit Evidence
Lecture 6, part b, Chapter 10, Materiality and  Audit EvidenceLecture 6, part b, Chapter 10, Materiality and  Audit Evidence
Lecture 6, part b, Chapter 10, Materiality and Audit Evidence
Sazzad Hossain, ITP, MBA, CSCA™
 
Audit committee
Audit committeeAudit committee
Audit committee
Nabilatul Husna
 

What's hot (20)

Auditor's Report
Auditor's  ReportAuditor's  Report
Auditor's Report
 
Internal control
Internal controlInternal control
Internal control
 
Materiality
MaterialityMateriality
Materiality
 
Audit working papers
Audit working papersAudit working papers
Audit working papers
 
Chapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentationChapter 2. audit planning procedures & documentation
Chapter 2. audit planning procedures & documentation
 
Types of accounts
Types of accountsTypes of accounts
Types of accounts
 
Chapter 7 Payroll & Personnel Cycle
Chapter 7 Payroll & Personnel CycleChapter 7 Payroll & Personnel Cycle
Chapter 7 Payroll & Personnel Cycle
 
Internal check audit (ppt)
Internal check audit (ppt)Internal check audit (ppt)
Internal check audit (ppt)
 
Unit 1 Introduction to Auditing
Unit 1 Introduction to AuditingUnit 1 Introduction to Auditing
Unit 1 Introduction to Auditing
 
Financial Statements Audit
Financial Statements AuditFinancial Statements Audit
Financial Statements Audit
 
9. audit evidence
9. audit evidence9. audit evidence
9. audit evidence
 
Ch 5. assurance 5 Introduction to Internal Control
Ch 5. assurance 5 Introduction to Internal ControlCh 5. assurance 5 Introduction to Internal Control
Ch 5. assurance 5 Introduction to Internal Control
 
11. materiality and audit risk
11. materiality and audit risk11. materiality and audit risk
11. materiality and audit risk
 
Basics of accounting
Basics of accountingBasics of accounting
Basics of accounting
 
Lecture slide, chapter 3,Professional Ethics, Independence and Audit Quality
Lecture slide, chapter 3,Professional Ethics, Independence and Audit QualityLecture slide, chapter 3,Professional Ethics, Independence and Audit Quality
Lecture slide, chapter 3,Professional Ethics, Independence and Audit Quality
 
Audit, investigation & forensic accounting: Exploring the nexus
Audit, investigation & forensic accounting: Exploring the nexusAudit, investigation & forensic accounting: Exploring the nexus
Audit, investigation & forensic accounting: Exploring the nexus
 
Nature of auditing and few important concepts
Nature of auditing and few important conceptsNature of auditing and few important concepts
Nature of auditing and few important concepts
 
Gaap (generally accepted accounting principles)
Gaap (generally accepted accounting principles)Gaap (generally accepted accounting principles)
Gaap (generally accepted accounting principles)
 
Lecture 6, part b, Chapter 10, Materiality and Audit Evidence
Lecture 6, part b, Chapter 10, Materiality and  Audit EvidenceLecture 6, part b, Chapter 10, Materiality and  Audit Evidence
Lecture 6, part b, Chapter 10, Materiality and Audit Evidence
 
Audit committee
Audit committeeAudit committee
Audit committee
 

Similar to Chapter 2 internal control

Sarbanes oxley internal controls
Sarbanes oxley internal controlsSarbanes oxley internal controls
Sarbanes oxley internal controls
Illumeo
 
Business Accounting Internal Control Procedures
Business Accounting Internal Control Procedures Business Accounting Internal Control Procedures
Business Accounting Internal Control Procedures
DaveSmith635157
 
Implementing Internal Controls The Necessities of Financial Security.pdf
Implementing Internal Controls  The Necessities of Financial Security.pdfImplementing Internal Controls  The Necessities of Financial Security.pdf
Implementing Internal Controls The Necessities of Financial Security.pdf
IPPCGroup
 
topic 3 internal controls..audit.pptx
topic 3 internal controls..audit.pptxtopic 3 internal controls..audit.pptx
topic 3 internal controls..audit.pptx
vailethmwaisanila
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
Sharing Slides Training
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
sharing notes123
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
sharing notes123
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
Sharing Slides Training
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
Ros Dina
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
ShivamSharma909
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
InfosecTrain
 
Internal control system
Internal control systemInternal control system
Internal control system
Madiha Hassan
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components ii
Ashish Desai
 
Assessing risks and internal controls training
Assessing  risks and internal controls   trainingAssessing  risks and internal controls   training
Assessing risks and internal controls trainingshifataraislam
 
Controlling
ControllingControlling
Controlling
rmkcet
 
Managerial control
Managerial controlManagerial control
Managerial control
Parul Tandan
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
Marie Pagnotta
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
joellemurphey
 

Similar to Chapter 2 internal control (20)

Sarbanes oxley internal controls
Sarbanes oxley internal controlsSarbanes oxley internal controls
Sarbanes oxley internal controls
 
Business Accounting Internal Control Procedures
Business Accounting Internal Control Procedures Business Accounting Internal Control Procedures
Business Accounting Internal Control Procedures
 
Implementing Internal Controls The Necessities of Financial Security.pdf
Implementing Internal Controls  The Necessities of Financial Security.pdfImplementing Internal Controls  The Necessities of Financial Security.pdf
Implementing Internal Controls The Necessities of Financial Security.pdf
 
topic 3 internal controls..audit.pptx
topic 3 internal controls..audit.pptxtopic 3 internal controls..audit.pptx
topic 3 internal controls..audit.pptx
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
CONTROL AND AUDIT
CONTROL AND AUDITCONTROL AND AUDIT
CONTROL AND AUDIT
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Information systems and its components ii
Information systems and its components   iiInformation systems and its components   ii
Information systems and its components ii
 
Assessing risks and internal controls training
Assessing  risks and internal controls   trainingAssessing  risks and internal controls   training
Assessing risks and internal controls training
 
Controlling
ControllingControlling
Controlling
 
1auditconcepts
1auditconcepts1auditconcepts
1auditconcepts
 
Managerial control
Managerial controlManagerial control
Managerial control
 
Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk Emerging Contractors Mitigating Control Risk
Emerging Contractors Mitigating Control Risk
 
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS              .docxRunning head AUDITING INFORMATION SYSTEMS PROCESS              .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
 

More from Dr Manu H Natesh

environmental analysis
environmental analysisenvironmental analysis
environmental analysis
Dr Manu H Natesh
 
Strategic mgt
Strategic mgtStrategic mgt
Strategic mgt
Dr Manu H Natesh
 
MARKETING MIX 4ps
MARKETING MIX 4psMARKETING MIX 4ps
MARKETING MIX 4ps
Dr Manu H Natesh
 
Planning ppt
Planning pptPlanning ppt
Planning ppt
Dr Manu H Natesh
 
Intro to mgt
Intro to mgtIntro to mgt
Intro to mgt
Dr Manu H Natesh
 
Creativity
CreativityCreativity
Creativity
Dr Manu H Natesh
 
Business ethics
Business ethicsBusiness ethics
Business ethics
Dr Manu H Natesh
 
Chap 1
Chap 1Chap 1
Chapter 1
Chapter 1Chapter 1
Chapter 1
Dr Manu H Natesh
 
Public relations and media mgt
Public relations and media mgtPublic relations and media mgt
Public relations and media mgt
Dr Manu H Natesh
 
Chapter 3 vouching
Chapter 3 vouchingChapter 3 vouching
Chapter 3 vouching
Dr Manu H Natesh
 
Event mgt chap 3
Event mgt chap 3Event mgt chap 3
Event mgt chap 3
Dr Manu H Natesh
 
small scale industries
small scale industries small scale industries
small scale industries
Dr Manu H Natesh
 
Chap 2 procedure
Chap 2 procedureChap 2 procedure
Chap 2 procedure
Dr Manu H Natesh
 
Evt mngt ch 1
Evt mngt ch 1Evt mngt ch 1
Evt mngt ch 1
Dr Manu H Natesh
 
Chap 2
Chap 2Chap 2

More from Dr Manu H Natesh (16)

environmental analysis
environmental analysisenvironmental analysis
environmental analysis
 
Strategic mgt
Strategic mgtStrategic mgt
Strategic mgt
 
MARKETING MIX 4ps
MARKETING MIX 4psMARKETING MIX 4ps
MARKETING MIX 4ps
 
Planning ppt
Planning pptPlanning ppt
Planning ppt
 
Intro to mgt
Intro to mgtIntro to mgt
Intro to mgt
 
Creativity
CreativityCreativity
Creativity
 
Business ethics
Business ethicsBusiness ethics
Business ethics
 
Chap 1
Chap 1Chap 1
Chap 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Public relations and media mgt
Public relations and media mgtPublic relations and media mgt
Public relations and media mgt
 
Chapter 3 vouching
Chapter 3 vouchingChapter 3 vouching
Chapter 3 vouching
 
Event mgt chap 3
Event mgt chap 3Event mgt chap 3
Event mgt chap 3
 
small scale industries
small scale industries small scale industries
small scale industries
 
Chap 2 procedure
Chap 2 procedureChap 2 procedure
Chap 2 procedure
 
Evt mngt ch 1
Evt mngt ch 1Evt mngt ch 1
Evt mngt ch 1
 
Chap 2
Chap 2Chap 2
Chap 2
 

Recently uploaded

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

Chapter 2 internal control

  • 1. Chapter 2 Internal control MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 2. meaning • Internal control, as defined in accounting and auditing, is a process for assuring achievement of an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. • It is a means by which an organization's resources are directed, monitored, and measured. It plays an important role in detecting and preventing fraud and protecting the organization's resources, both physical (e.g., machinery and property) and intangible (e.g., reputation or intellectual property such as trademarks). MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 3. Framework for internal control MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 4. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 5. Steps to evaluate internal control system Organize the process Segment the company Develop a schedule for vulnerability Conduct vulnerability assessments Establish plans for subsequent actions Conduct internal reviews Take corrective action Prepare summary reports on internal control Periodical test internal controls of high risk areasMANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 6. Objectives of internal control • To evaluate the efficiency of performance in the various of the business. • To ensure orderly, efficient and economic conduct of the business • To see that access to and use of assets are made only with proper authorization. • To safe guard the assets of the organization by preventing frauds wastes and inefficiency • To ensure that there is periodical verification and comparison of assets in existence with those of accounting records and appropriate action taken. • To ensure that transactions are recorded in the proper books of accounts regularly, correctly and systematically. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 7. Types of internal controls • A Vulnerability is a defect in a process, system, application or other asset that creates the potential for loss or harm. Vulnerabilities are measured primarily through the identification of control deficiencies (defects or weaknesses) to determine a system's or process' propensity for fIn terms of taxonomy, there are three, commonly accepted forms of Controls: • Administrative - These are the laws, regulations, policies, practices and guidelines that govern the overall requirements and controls for an Information Security or other operational risk program. For example, a law or regulation may require merchants and financial institutions to protect and implement controls for customer account data to prevent identity theft. The business, in order to comply with the law or regulation, may adopt policies and procedures laying out the internal requirements for protecting this data, which requirements are a form of control. • Logical - These are the virtual, application and technical controls (systems and software), such as firewalls, anti virus software, encryption and maker/checker application routines. • Physical - Whereas a firewall provides a "logical" key to obtain access to a network, a "physical" key to a door can be used to gain access to an office space or storage room. Other examples of physical controls are video surveillance systems, gates and barricades, the use of guards or other personnel to govern access to an office, and remote backup facilities MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 8. Types of internal controls Detective preventive corrective MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 9. • All three of these elements are critical to the creation of an effective control environment. However, these elements do not provide clear guidance on measuring the degree to which the controls mitigate the risk. Instead, the Simple Risk Model utilizes an alternative set of elements that provide a better means of weighting the level of mitigation: • Preventive - These are controls that prevent the loss or harm from occurring. For example, a control that enforces segregation of responsibilities (one person can submit a payment request, but a second person must authorize it), minimizes the chance an employee can issue fraudulent payments. • Detective - These controls monitor activity to identify instances where practices or procedures were not followed. For example, a business might reconcile the general ledger or review payment request audit logs to identify fraudulent payments. • Corrective - Corrective controls restore the system or process back to the state prior to a harmful event. For example, a business may implement a full restoration of a system from backup tapes after evidence is found that someone has improperly altered the payment data. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 10. Detective Controls • Detective Controls are designed to find errors or irregularities after they have occurred. Examples of detective controls are: • Reviews of Performance: Management compares information about current performance to budgets, forecasts, prior periods, or other benchmarks to measure the extent to which goals and objectives are being achieved and to identify unexpected results or unusual conditions that require follow-up. • Reconciliations: An employee relates different sets of data to one another, identifies and investigates differences, and takes corrective action, when necessary. • Physical Inventories • Audits MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 11. Preventive Controls • Preventive Controls are designed to discourage errors or irregularities from occurring. They are proactive controls that help to ensure departmental objectives are being met. Examples of preventive controls are: • Segregation of Duties: Duties are segregated among different people to reduce the risk of error or inappropriate action. Normally, responsibilities for authorizing transactions (approval), recording transactions (accounting) and handling the related asset (custody) are divided. • Approvals, Authorizations, and Verifications: Management authorizes employees to perform certain activities and to execute certain transactions within limited parameters. In addition, management specifies those activities or transactions that need supervisory approval before they are performed or executed by employees. A supervisor’s approval (manual or electronic) implies that he or she has verified and validated that the activity or transaction conforms to established policies and procedures. • Security of Assets (Preventive and Detective): Access to equipment, inventories, securities, cash and other assets is restricted; assets are periodically counted and compared to amounts shown on control records. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 12. Corrective controls Corrective — Coupled with preventive and detective controls, corrective controls help mitigate damage once a risk has materialized. An organization can document its policies and procedures, enforcing them by means of warnings and employee termination when appropriate. When managers wisely back up data they can restore a functioning system in the event of a crash. If a disaster strikes, business recovery can take place when an effective continuity and disaster management plan is in place and followed. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 13. limitations Limitations of Internal Controls: • No matter how well internal controls are designed, they can only provide reasonable assurance that objectives have been achieved. Some limitations are inherent in all internal control systems. These include: • Judgment: The effectiveness of controls will be limited by decisions made with human judgment under pressures to conduct business based on the information at hand. • Breakdowns: Even well designed internal controls can break down. Employees sometimes misunderstand instructions or simply make mistakes. Errors may also result from new technology and the complexity of computerized information systems. • Management Override: High level personnel may be able to override prescribed policies and procedures for personal gain or advantage. This should not be confused with management intervention, which represents management actions to depart from prescribed policies and procedures for legitimate purposes. • Collusion: Control systems can be circumvented by employee collusion. Individuals acting collectively can alter financial data or other management information in a manner that cannot be identified by control systems. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 14. Internal check • Internal check is the process of arrangement of duties of various staffs of a business in such way that work is automatically checked by the next staff while performing their duties. Frauds which are committed by a staff are automatically detected and corrected by the another staff. • A division of duties that does not permit one individual to carry out all stages of a transaction. An internal check is intended to prevent fraud and minimize errors. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 15. Objectives Of Internal Check Objectives Of Internal Check Following are the objectives of internal check system: • 1. To eliminate the frauds and errors which may be committed by the staffs. • 2. To prevent misappropriation of cash or stock. • 3. To ensure the reliability of information produced by the accounting system. • 4. To detect errors and frauds promptly which helps to minimize their effects in long term. • 5. To exercise moral pressure over the staffs. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 16. Essential Characteristics Of Internal Check System Essential Characteristics Of Internal Check System Certain qualities are needed to make an internal check system more effective and efficient. Such qualities are known as features of internal check system which are as follows: • 1. Division Of Work Before applying test check it is necessary to divide the entire tasks among the staffs in such a way so that work can be checked automatically by the another staff. Like, when staff takes the responsibility of purchase, then another staff should make its payment. • 2. Provision Of Check An organization should set up such provision, so that work can be checked by the another staff. An officer can check the work of one staff by transferring to the staffs and again. • 3. Use Of Devices In this modern world, various devices can be used to do various function like use of time record machine, wage determination machine etc. An organization should use such machines which help to make work of internal check easier. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 17. • 4. Self-balancing System An organization can use self-balancing ledger accounts which helps to make the work of internal check easier. Its effectiveness depends on its management. • 5. Change In Work An organization needs to transfer the staffs from one place to another place so that the work of previous staffs can be checked by the later staff which helps to make the internal check system effective. • 6. Specialization Every staff may not have such specialized knowledge to maintain accounts properly. So, an organization should give training to increase their skill so that internal check can be made more effective. • 7. Control There is more chance of frauds where there is direct contact of consumer or public. So, a manager can keep eyes in those works so that internal check system can be made more effectively. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 18. Internal Check as regards to Cash • Receipts against cash • Rough Cash Book • Remittances – opened before officer • Automatic tills or cash register • Deposit all cash receipt every day • BRS prepared regularly • Issue of Cheque – authorized by the officer • Independent check of Castings of Cash Book • Preparation of Wage sheet • Payment by cheques except petty • Collection by travellers MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 19. Internal Check as regard to PURCHASES • Orders – 2 copies (Supplier & Reference) • On Receipt – Goods Receipt Book • Invoice – Goods Receipt Book Verified • Check Calculations in Invoice • Invoice Copy – Person in charge • Clerk – Purchases Book • Initial the invoice copy MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 20. Duty of an Auditor – CREDIT PURCHASES • In clients name • Authorize person in charge • Date of Invoice – Period under review • Review of Verification • Goods on Invoice – Capital • Test Check – Purchases Book • Expenses Debited to Purchases Account • Compare the Books • Stamp, Check Mark, Initial • Duplicates • Credit Conformation Statement MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 21. Internal Check as Regard to WAGES • Check inclusion for Dummy Workers • Errors or Fraud – piece work records • Clerical Works • Dispensed Employees – Retained • Over Stating – Rates • Over Stating Hours/days of Work • Conversion of unpaid wages • Over footing of pay roll sheets • Understatement of deduction MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 22. Duties of an Auditor - WAGES • Check Loop hole • Wage Sheet or Wage Book • Calculation are Correct • Wages payable, paid & unpaid • Dummy Workers • Initialed • ID verification • Authorized Number of workers • Wage sheet – ESI Card, PF Account • Total wages – estimates of costing department • Duly signed - comparison • Leave register • Wage payment vs. advance payment • Employment of Casual Labourer • Test Check MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 23. Internal Check as regard to SALES • Order – Order Received Book (Name, Particulars of Goods, Date & Mode of Transport) • Copy – Dispatch Department • Clerk compares goods in order packed by DD • Rate of charge – Responsible officer • Preparation of Invoice – 2/3 copies • One copy – clerk – sales book • One copy – gatekeeper – goods outward book • Traveler Sales Man – 3 copies MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 24. Duties of an Auditor – CREDIT SALES • Review Internal Check System in Place • Invoice – Sales Book Compare • Order Received Book, Goods Outward Book, Gatekeeper’s Outward Book, Delivery Note etc • Sale of Asset – treated as a ordinary sale • Statement of accounts from client • Check sales during last days and weeks • Cancelled invoice – duplicates • Sales Tax & Insurance etc debited & credited into appropriate accounts • Sales to sister concerns and associates • Different trade discounts - examined MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in
  • 25. MANU H NATESH MBA,M.Com. BMSEAC manu@bmsec.ac.in