SlideShare a Scribd company logo
1 of 29
Department of Textile Engineering
Presentation on
Fraud, Internal Control & Cash
• Presented by
Sakibul Islam: 120203034
Assaduzzaman Rony: 120103028
Golam Sarwar: 120103019
Tabiba Tabassum Bithi: 120103014
Content
• What is Fraud?
• Types of Fraud
• Fraud Triangle
• Fraud Triangle
• Internal Control
• Objectives of Internal Control
• Shield of Internal Control
• Components of Internal
Control
• Risk Assessment
• Information System and
Control Procedures
• Internal Control Procedures
• SCALP
• Information Technology (IT)
• Safeguard Controls
• Bank Account as Control
Device
• Internal Control over Cash
• Cash Receipts over the
Counter
• Cash Receipts by Mail
• Controls Over Payments by
Check
• Internal Control for
Purchasing
• Payment Packet
What is Fraud?
Dishonest act by an employee that results in
personal benefit to the employee at a cost to
the employer
Intentional misrepresentation of facts
Causes injury or damage to another party
Types of Fraud
Misappropriation of
assets
• Employees steal
assets from
company
• Cash
• Inventory
• False expense
reports
Fraudulent financial
reporting
• Managers make
false entries so
company appears
more profitable
• Deceives investors
and creditors
Fraud Triangle
Motive
RationalizationOpportunity
Internal Control
• Primary way fraud and errors are:
– Prevented
– Detected or
– Corrected
• Management and Board of Directors implement
a:
– Plan of organization
– System of procedures
Objectives of Internal Control
Safeguard
assets
Encourage
employees to
follow policy
Promote
operational
efficiency
Ensure
accurate,
reliable records
Comply with
legal
requirements
Shield of Internal Control
Internal
Controls
Fraud
Waste
Inefficiency
Company assets
Control Procedures
Monitoring
Information System
Control Environment
Risk Assessment
Components of Internal Control
Risk Assessment
• Identify business risks
• Establish procedures to deal with risks
Information System and Control
Procedures
• Information System
– How accounting information enters and exits
company
– System must capture, process, and report
transactions accurately
• Control procedures
– Built-in control environment and information
system
– How companies meet five objectives of internal
control
Internal Control Procedures
• Smart Hiring Practices
• Separation of Duties
– Asset handling
– Record keeping
– Transaction approval
• Comparison and Compliance Monitoring
– Operating and cash budgets
– Audits
– Manual or computer checks
Internal Control Procedures
• Adequate Records
– Hard copy or electronic
• Limited Access
– Assets by custodians
– Records by accounting department
• Proper Approvals
– The larger the transaction, the more specific
approval
SCALP
• Smart hiring practices and segregation of
duties
• Comparisons and compliance monitoring
• Adequate records
• Limited access
• Proper approvals
Information Technology (IT)
• Accounting systems rely on more than ever
before
• Examples:
– Electronic sensors
– Barcode scanning
• Basic attributes of internal control do not change
– Procedures to implement are different
• Use of computers can greatly improve speed and
accuracy
Safeguard Controls
Fireproof
vaults
Security
cameras
Fidelity bonds
Mandatory
vacations
Loss
prevention
specialists
Job rotation
Internal Controls for E-Commerce
• Pitfalls of e-commerce
– Stolen credit card numbers
– Computer viruses and Trojan Horses
– Phishing expeditions
• Security measures
– Encryption
– Firewalls
Bank Account as Control Device
Signature
card
Bank
statement
Deposit
ticket
Bank
reconciliation
Check
Bank Account Documents
• Signature card
– Protects against forgery
• Deposit ticket
– Proof of transaction
• Check
– Maker – signs the check
– Payee – to whom the check is paid
– Bank – where funds are drawn
Internal Control over Cash
• Cash is easy to steal
• All transactions ultimately affect cash
• Cash receipts should be deposited quickly
• Companies can receive cash
– Over the counter
– Through the mail
Cash Receipts over the Counter
• Point-of-sale terminals provide control over cash
receipts
– Also record sale, cost of item sold, and reduction to
inventory
• Customer issued a receipt as proof of purchase
• Sales associate turns in cash drawer at end of
shift
– Combined with other cash and deposited
• Accounting department reconciles sales per
terminal to cash in drawer
Cash Receipts by Mail
Mailroom
Checks
Remittance
advices
Accounting
Department
Treasurer
Debit to Cash
Deposit
receipt
Bank Controller
Controls Over Payments by Check
• Payment by check or EFT payment is an
important internal control
– Provides record of the payment
– Check must be signed by an authorized official
– EFT must be approved by an authorized official
– Should be supported by evidence payment
Cash Payments by Check
Receiving
Report
Invoice
Inventory
Purchase
Order
Check or
EFT
Company
A
Company
X
1
4
3
2
2
Internal Control for Purchasing
• Segregate the following duties:
– Purchasing
– Receiving
– Approving and Paying
Payment Packet
Receiving Report
Invoice
Purchase Order
Petty Cash
• Small fund to make minor purchases
• One employee is responsible for the
accounting
– Custodian
• Set amount of cash
• Voucher prepared for each payment
• Sum of fund plus paid voucher should equal
set amount
– Imprest system
…thanks for patient hearing
Any
Question
?

More Related Content

What's hot

Chapter 08 Managing Front Office Operations HOT 333
Chapter 08 Managing Front Office Operations HOT 333Chapter 08 Managing Front Office Operations HOT 333
Chapter 08 Managing Front Office Operations HOT 333Syed Qasim Anwar
 
A Brief About Forensic Accounting
A Brief About Forensic AccountingA Brief About Forensic Accounting
A Brief About Forensic AccountingA Wolf Bookkeeping
 
Awara purchase manager for controllers
Awara purchase manager for controllersAwara purchase manager for controllers
Awara purchase manager for controllersAwara Direct Search
 
Front office accounting
Front office accountingFront office accounting
Front office accountingBhavess
 
Chapter 11 Managing Front Office Operations HOT 333
Chapter 11 Managing Front Office Operations HOT 333Chapter 11 Managing Front Office Operations HOT 333
Chapter 11 Managing Front Office Operations HOT 333Syed Qasim Anwar
 
Chapter 8: Front Office Accounting
Chapter 8: Front Office AccountingChapter 8: Front Office Accounting
Chapter 8: Front Office AccountingNicole Hay-Walters
 
Chapter 09 Managing Front Office Operations HOT 333
Chapter 09 Managing Front Office Operations HOT 333Chapter 09 Managing Front Office Operations HOT 333
Chapter 09 Managing Front Office Operations HOT 333Syed Qasim Anwar
 
Checkout and settlement process
Checkout and settlement processCheckout and settlement process
Checkout and settlement processBhavess
 
What is Accounting and Business Structures
What is Accounting and Business StructuresWhat is Accounting and Business Structures
What is Accounting and Business Structuressmaloneyaustralia
 

What's hot (20)

Chapter 08 Managing Front Office Operations HOT 333
Chapter 08 Managing Front Office Operations HOT 333Chapter 08 Managing Front Office Operations HOT 333
Chapter 08 Managing Front Office Operations HOT 333
 
A Brief About Forensic Accounting
A Brief About Forensic AccountingA Brief About Forensic Accounting
A Brief About Forensic Accounting
 
Awara purchase manager for controllers
Awara purchase manager for controllersAwara purchase manager for controllers
Awara purchase manager for controllers
 
Front office accounting
Front office accountingFront office accounting
Front office accounting
 
Chapter 11 Managing Front Office Operations HOT 333
Chapter 11 Managing Front Office Operations HOT 333Chapter 11 Managing Front Office Operations HOT 333
Chapter 11 Managing Front Office Operations HOT 333
 
Chapter 8: Front Office Accounting
Chapter 8: Front Office AccountingChapter 8: Front Office Accounting
Chapter 8: Front Office Accounting
 
Accounting Systems
Accounting SystemsAccounting Systems
Accounting Systems
 
Plugin ch05
Plugin ch05Plugin ch05
Plugin ch05
 
Chapter 09 Managing Front Office Operations HOT 333
Chapter 09 Managing Front Office Operations HOT 333Chapter 09 Managing Front Office Operations HOT 333
Chapter 09 Managing Front Office Operations HOT 333
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
IMPLEMENTATION OF FORENSIC ACCOUNTING ON FRAUD DETECTION: CASE STUDY OF LAGOS...
 
Pp 04-new revised by hall
Pp 04-new revised by hallPp 04-new revised by hall
Pp 04-new revised by hall
 
Introduction to Forensic Accounting
Introduction to Forensic AccountingIntroduction to Forensic Accounting
Introduction to Forensic Accounting
 
Whbc01 final
Whbc01 finalWhbc01 final
Whbc01 final
 
Checkout and settlement process
Checkout and settlement processCheckout and settlement process
Checkout and settlement process
 
Forensic audit
Forensic auditForensic audit
Forensic audit
 
Forensic accounting
Forensic accountingForensic accounting
Forensic accounting
 
What is Accounting and Business Structures
What is Accounting and Business StructuresWhat is Accounting and Business Structures
What is Accounting and Business Structures
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Careers in the field of accounting
Careers in the field of accountingCareers in the field of accounting
Careers in the field of accounting
 

Viewers also liked

2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The FraudRaffa Learning Community
 
Internal Controls to Prevent and Detect Fraud
Internal Controls to Prevent and Detect FraudInternal Controls to Prevent and Detect Fraud
Internal Controls to Prevent and Detect FraudDecosimoCPAs
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolHaládik Consulting, s.r.o.
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...Ron Steinkamp
 
2016 Occupational Fraud - Trends and Developments_Henne
2016 Occupational Fraud - Trends and Developments_Henne2016 Occupational Fraud - Trends and Developments_Henne
2016 Occupational Fraud - Trends and Developments_HenneJohn Michael Henne, CPA
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our ResponsibilitiesJason Lundell
 
INTERNAL CONTROL SYSTEM -QUESTIONNAIRE
INTERNAL CONTROL SYSTEM -QUESTIONNAIREINTERNAL CONTROL SYSTEM -QUESTIONNAIRE
INTERNAL CONTROL SYSTEM -QUESTIONNAIRESREENIVAS IYER
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditingHardik Shah
 
Internal Control Questionnaires (ICQs)
Internal Control Questionnaires (ICQs)Internal Control Questionnaires (ICQs)
Internal Control Questionnaires (ICQs)Ahmad Tariq Bhatti
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlDominic Sroda Korkoryi
 

Viewers also liked (12)

2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud2014-10-02 Nonprofit Fraud: Part I - The Fraud
2014-10-02 Nonprofit Fraud: Part I - The Fraud
 
Internal Controls to Prevent and Detect Fraud
Internal Controls to Prevent and Detect FraudInternal Controls to Prevent and Detect Fraud
Internal Controls to Prevent and Detect Fraud
 
Contract Risks
Contract RisksContract Risks
Contract Risks
 
Forensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection toolForensic line - fraud prevention and detection tool
Forensic line - fraud prevention and detection tool
 
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
2016 - Fraud Detection & Prevention with Internal Controls (Updated for 2016 ...
 
2016 Occupational Fraud - Trends and Developments_Henne
2016 Occupational Fraud - Trends and Developments_Henne2016 Occupational Fraud - Trends and Developments_Henne
2016 Occupational Fraud - Trends and Developments_Henne
 
COSO 2013 and The Auditor
COSO 2013 and The AuditorCOSO 2013 and The Auditor
COSO 2013 and The Auditor
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
INTERNAL CONTROL SYSTEM -QUESTIONNAIRE
INTERNAL CONTROL SYSTEM -QUESTIONNAIREINTERNAL CONTROL SYSTEM -QUESTIONNAIRE
INTERNAL CONTROL SYSTEM -QUESTIONNAIRE
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditing
 
Internal Control Questionnaires (ICQs)
Internal Control Questionnaires (ICQs)Internal Control Questionnaires (ICQs)
Internal Control Questionnaires (ICQs)
 
Presentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & controlPresentation on fraud prevention, detection & control
Presentation on fraud prevention, detection & control
 

Similar to Fraud, Internal Controls & Cash (40

Preventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingPreventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingInfrrdInc
 
Internal Control Unit 2 Part 1.pptx
Internal Control Unit 2 Part 1.pptxInternal Control Unit 2 Part 1.pptx
Internal Control Unit 2 Part 1.pptxDr. Nidhi Raj Gupta
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled PresentationRand Safi
 
Managing Front Office.pdf
Managing Front Office.pdfManaging Front Office.pdf
Managing Front Office.pdfssuseracd7e6
 
How Trek Bicycles Enhanced Its Operations Globally While Mitigating Payment F...
How Trek Bicycles Enhanced Its Operations Globally While Mitigating Payment F...How Trek Bicycles Enhanced Its Operations Globally While Mitigating Payment F...
How Trek Bicycles Enhanced Its Operations Globally While Mitigating Payment F...Kyriba Corporation
 
02 Accounting & Reporting Systems
02 Accounting & Reporting Systems02 Accounting & Reporting Systems
02 Accounting & Reporting Systemsb_instructor
 
Whitinger & Company Fraud Seminar
Whitinger & Company Fraud SeminarWhitinger & Company Fraud Seminar
Whitinger & Company Fraud Seminarwss310
 
Revised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalRevised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalToni Smart
 
Bank frauds vk (2)
Bank frauds vk (2)Bank frauds vk (2)
Bank frauds vk (2)Prashant raj
 
Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Steve Hazan
 
09.2 audit siklus pembelian dan pembayaran
09.2 audit siklus pembelian dan pembayaran09.2 audit siklus pembelian dan pembayaran
09.2 audit siklus pembelian dan pembayaranMulyadi Yusuf
 
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...Gross, Mendelsohn & Associates
 
53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdfKritiChoudhary9
 

Similar to Fraud, Internal Controls & Cash (40 (20)

How to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your OrganizationHow to Prevent and Detect Fraud in Your Organization
How to Prevent and Detect Fraud in Your Organization
 
Preventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document ProcessingPreventing Invoice Fraud with Intelligent Document Processing
Preventing Invoice Fraud with Intelligent Document Processing
 
Audit:2
Audit:2Audit:2
Audit:2
 
Internal Control Unit 2 Part 1.pptx
Internal Control Unit 2 Part 1.pptxInternal Control Unit 2 Part 1.pptx
Internal Control Unit 2 Part 1.pptx
 
Acquisition Payment Process
Acquisition Payment ProcessAcquisition Payment Process
Acquisition Payment Process
 
presentation.pptx
presentation.pptxpresentation.pptx
presentation.pptx
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Managing Front Office.pdf
Managing Front Office.pdfManaging Front Office.pdf
Managing Front Office.pdf
 
How Trek Bicycles Enhanced Its Operations Globally While Mitigating Payment F...
How Trek Bicycles Enhanced Its Operations Globally While Mitigating Payment F...How Trek Bicycles Enhanced Its Operations Globally While Mitigating Payment F...
How Trek Bicycles Enhanced Its Operations Globally While Mitigating Payment F...
 
02 Accounting & Reporting Systems
02 Accounting & Reporting Systems02 Accounting & Reporting Systems
02 Accounting & Reporting Systems
 
Whitinger & Company Fraud Seminar
Whitinger & Company Fraud SeminarWhitinger & Company Fraud Seminar
Whitinger & Company Fraud Seminar
 
Revised Fraud Powerpoint Final
Revised Fraud Powerpoint FinalRevised Fraud Powerpoint Final
Revised Fraud Powerpoint Final
 
Bank frauds vk (2)
Bank frauds vk (2)Bank frauds vk (2)
Bank frauds vk (2)
 
Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815 Fraud Protection Final 2 hour CPE- Hazan 122815
Fraud Protection Final 2 hour CPE- Hazan 122815
 
09.2 audit siklus pembelian dan pembayaran
09.2 audit siklus pembelian dan pembayaran09.2 audit siklus pembelian dan pembayaran
09.2 audit siklus pembelian dan pembayaran
 
Computerised Accounting
Computerised AccountingComputerised Accounting
Computerised Accounting
 
ss-Spiritual Squad.pptx
ss-Spiritual Squad.pptxss-Spiritual Squad.pptx
ss-Spiritual Squad.pptx
 
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
 
Legal Accounting
Legal AccountingLegal Accounting
Legal Accounting
 
53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf53064476-Frauds-in-Bank-ppt.pdf
53064476-Frauds-in-Bank-ppt.pdf
 

More from মোঃ গোলাম সারোয়ার (11)

T-Shirt Folding Machine
T-Shirt Folding MachineT-Shirt Folding Machine
T-Shirt Folding Machine
 
Jigger dyeing machine.
Jigger dyeing machine.Jigger dyeing machine.
Jigger dyeing machine.
 
Agrotech-Agro textiles
Agrotech-Agro textilesAgrotech-Agro textiles
Agrotech-Agro textiles
 
world heritage sites in bangladesh
world heritage sites in bangladeshworld heritage sites in bangladesh
world heritage sites in bangladesh
 
PDCA Cycle
PDCA CyclePDCA Cycle
PDCA Cycle
 
Viscosity Measurement-
Viscosity Measurement-Viscosity Measurement-
Viscosity Measurement-
 
FOAM DYEING TECHNOLOGY
FOAM  DYEING TECHNOLOGYFOAM  DYEING TECHNOLOGY
FOAM DYEING TECHNOLOGY
 
Green House Effect
Green House EffectGreen House Effect
Green House Effect
 
ANAEROBIC SLUDGE DIGESTION PROCESS
ANAEROBIC SLUDGE DIGESTION PROCESSANAEROBIC SLUDGE DIGESTION PROCESS
ANAEROBIC SLUDGE DIGESTION PROCESS
 
Measuring & improving drive performance
Measuring & improving drive performanceMeasuring & improving drive performance
Measuring & improving drive performance
 
Lyocell fiber
Lyocell fiberLyocell fiber
Lyocell fiber
 

Recently uploaded

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Fraud, Internal Controls & Cash (40

  • 1. Department of Textile Engineering Presentation on Fraud, Internal Control & Cash • Presented by Sakibul Islam: 120203034 Assaduzzaman Rony: 120103028 Golam Sarwar: 120103019 Tabiba Tabassum Bithi: 120103014
  • 2. Content • What is Fraud? • Types of Fraud • Fraud Triangle • Fraud Triangle • Internal Control • Objectives of Internal Control • Shield of Internal Control • Components of Internal Control • Risk Assessment • Information System and Control Procedures • Internal Control Procedures • SCALP • Information Technology (IT) • Safeguard Controls • Bank Account as Control Device • Internal Control over Cash • Cash Receipts over the Counter • Cash Receipts by Mail • Controls Over Payments by Check • Internal Control for Purchasing • Payment Packet
  • 3. What is Fraud? Dishonest act by an employee that results in personal benefit to the employee at a cost to the employer Intentional misrepresentation of facts Causes injury or damage to another party
  • 4. Types of Fraud Misappropriation of assets • Employees steal assets from company • Cash • Inventory • False expense reports Fraudulent financial reporting • Managers make false entries so company appears more profitable • Deceives investors and creditors
  • 6. Internal Control • Primary way fraud and errors are: – Prevented – Detected or – Corrected • Management and Board of Directors implement a: – Plan of organization – System of procedures
  • 7. Objectives of Internal Control Safeguard assets Encourage employees to follow policy Promote operational efficiency Ensure accurate, reliable records Comply with legal requirements
  • 8. Shield of Internal Control Internal Controls Fraud Waste Inefficiency Company assets
  • 9. Control Procedures Monitoring Information System Control Environment Risk Assessment Components of Internal Control
  • 10. Risk Assessment • Identify business risks • Establish procedures to deal with risks
  • 11. Information System and Control Procedures • Information System – How accounting information enters and exits company – System must capture, process, and report transactions accurately • Control procedures – Built-in control environment and information system – How companies meet five objectives of internal control
  • 12. Internal Control Procedures • Smart Hiring Practices • Separation of Duties – Asset handling – Record keeping – Transaction approval • Comparison and Compliance Monitoring – Operating and cash budgets – Audits – Manual or computer checks
  • 13. Internal Control Procedures • Adequate Records – Hard copy or electronic • Limited Access – Assets by custodians – Records by accounting department • Proper Approvals – The larger the transaction, the more specific approval
  • 14. SCALP • Smart hiring practices and segregation of duties • Comparisons and compliance monitoring • Adequate records • Limited access • Proper approvals
  • 15. Information Technology (IT) • Accounting systems rely on more than ever before • Examples: – Electronic sensors – Barcode scanning • Basic attributes of internal control do not change – Procedures to implement are different • Use of computers can greatly improve speed and accuracy
  • 17. Internal Controls for E-Commerce • Pitfalls of e-commerce – Stolen credit card numbers – Computer viruses and Trojan Horses – Phishing expeditions • Security measures – Encryption – Firewalls
  • 18. Bank Account as Control Device Signature card Bank statement Deposit ticket Bank reconciliation Check
  • 19. Bank Account Documents • Signature card – Protects against forgery • Deposit ticket – Proof of transaction • Check – Maker – signs the check – Payee – to whom the check is paid – Bank – where funds are drawn
  • 20. Internal Control over Cash • Cash is easy to steal • All transactions ultimately affect cash • Cash receipts should be deposited quickly • Companies can receive cash – Over the counter – Through the mail
  • 21. Cash Receipts over the Counter • Point-of-sale terminals provide control over cash receipts – Also record sale, cost of item sold, and reduction to inventory • Customer issued a receipt as proof of purchase • Sales associate turns in cash drawer at end of shift – Combined with other cash and deposited • Accounting department reconciles sales per terminal to cash in drawer
  • 22. Cash Receipts by Mail Mailroom Checks Remittance advices Accounting Department Treasurer Debit to Cash Deposit receipt Bank Controller
  • 23. Controls Over Payments by Check • Payment by check or EFT payment is an important internal control – Provides record of the payment – Check must be signed by an authorized official – EFT must be approved by an authorized official – Should be supported by evidence payment
  • 24. Cash Payments by Check Receiving Report Invoice Inventory Purchase Order Check or EFT Company A Company X 1 4 3 2 2
  • 25. Internal Control for Purchasing • Segregate the following duties: – Purchasing – Receiving – Approving and Paying
  • 27. Petty Cash • Small fund to make minor purchases • One employee is responsible for the accounting – Custodian • Set amount of cash • Voucher prepared for each payment • Sum of fund plus paid voucher should equal set amount – Imprest system

Editor's Notes

  1. There are many types of fraud. Some of the most common types are insurance fraud, check forgery, Medicare fraud, credit card fraud, and identity theft. The two most common types of fraud that impact financial statements are misappropriation of assets and fraudulent financial reporting. Misappropriation of assets is committed by employees of an entity who steal money from the company and cover it up through erroneous entries in the books. Other examples of asset misappropriation include employee theft of inventory, bribery or kickback schemes in the purchasing function, or employee overstatement of expense reimbursement requests. Sometimes employees act alone in the commission of fraud but often employees work together, or in collusion, to commit fraudulent acts against the company. For example, one person may misappropriate the assets and another cover it up by false recordkeeping. Fraudulent financial reporting is committed by company managers who make false and misleading entries in the books, making financial results of the company appear to be better than they actually are. The purpose of this type of fraud is to deceive investors and creditors into investing or loaning money to the company that they might not otherwise have invested or loaned. Both of these types of fraud involve making false or misleading entries in the books of the company. We call this cooking the books. Of these two types, asset misappropriation is the most common, but fraudulent financial reporting is by far the most expensive.
  2. This graphic forms the elements that make up virtually every fraud. We call it the fraud triangle. The first element in the fraud triangle is motive. This usually results from either critical need or greed on the part of the person who commits the fraud (the perpetrator). Sometimes it is a matter of just never having enough (because some persons who commit fraud are already rich by most people’s standards). Other times the perpetrator of the fraud might have a legitimate financial need, such as a medical emergency, but he or she uses illegitimate means to meet that need. The second element in the fraud triangle is opportunity. The opportunity to commit fraud usually arises through weak internal controls. It might be a break-down in a key element of controls, such as improper segregation of duties and/or improper access to assets. Or it might result from a weak control environment, such as a domineering CEO, a weak or conflicted board of directors, or lax ethical practices, allowing top management to override whatever controls the company has placed in operation for other transactions. The third element in the triangle is rationalization. The perpetrator engages in distorted thinking, such as: “I deserve this;” “Nobody treats me fairly;” “No one will ever know;” “Just this once, I won’t let it happen again;” or “Everyone else is doing it.”
  3. The primary way that fraud, as well as unintentional errors, is prevented, detected, or corrected in an organization is through a proper system of internal control. Internal control is a plan of organization, and a system of procedures, implemented by company management and the board of directors.
  4. Internal control is designed to accomplish five objectives: Safeguard assets: A company must safeguard its assets against waste, inefficiency, and fraud. If management fails to safeguard assets such as cash or inventory, those assets will slip away. Encourage employees to follow company policy: Everyone in an organization—managers and employees—needs to work toward the same goals. A proper system of controls provides clear policies that result in fair treatment of both customers and employees. 3. Promote operational efficiency: Companies cannot afford to waste resources. They work hard to make a sale, and they don’t want to waste any of the benefits. If the company can buy something for $30, why pay $35? Effective controls minimize waste, which lowers costs and increases profits. 4. Ensure accurate, reliable accounting records: Accurate records are essential. Without proper controls, records may be unreliable, making it impossible to tell which part of the business is profitable and which part needs improvement. A business could be losing money on every product it sells—unless it keeps accurate records for the cost of its products. 5. Comply with legal requirements: Companies, like people, are subject to laws, such as those of regulatory agencies like the SEC, the IRS, and state, local, and international governing bodies. Companies, like people, are subject to the law. When companies disobey the law, they are subject to fines, or in extreme cases, their top executives may even go to prison. Effective internal controls help ensure compliance with the law and avoidance of legal difficulties.
  5. This diagram depicts the shield that internal controls provide for an organization. Protected by this shield, which provides protection from fraud, waste, and inefficiency, companies can do business in a trustworthy manner that ensures public confidence—an extremely important element in maintaining the stability of financial markets around the world.
  6. Internal control can be broken down into five components: ■ Control environment ■ Risk assessment ■ Information system ■ Control procedures ■ Monitoring of controls
  7. Symbolized by the smoke rising from the chimney, assessment of risks that a company faces offers hints of where mistakes or fraud might arise. A company must be able to identify its business risks, as well as to establish procedures for dealing with those risks to minimize their impacts on the company. For example, Kraft Foods faces the risk that its food products may harm people. American Airlines planes may crash. And all companies face the risk of bankruptcy. The managements of companies, supported by their boards, have to identify these risks and do what they can to prevent those risks from causing financial or other harm to the company, its employees, its owners, and its creditors.
  8. Symbolized by the door of the building, the information system is the means by which accounting information enters and exits. The owner of a business needs accurate information to keep track of assets and measure profits and losses. Every system within the business that processes accounting data should have the ability to capture transactions as they occur, record (journalize) those transactions in an accurate and timely manner, summarize (post) those transactions in the books (ledgers), and report those transactions in the form of account balances or footnotes in the financial statements. Also symbolized by the door, control procedures built into the control environment and information system are the means by which companies gain access to the five objectives of internal controls discussed previously. Examples include proper separation of duties, comparison and other checks, adequate records, proper approvals, and physical safeguards to protect assets from theft.
  9. In a business with good internal controls, no important duty is overlooked. Each person in the information chain is important. The chain should start with hiring. Background checks should be conducted on job applicants. Proper training and supervision, as well as paying competitive salaries, helps ensure that all employees are sufficiently competent for their jobs. Employee responsibilities should be clearly laid out in position descriptions. For example, the treasurer’s department should be in charge of cash handling, as well as signing and approving checks. Warehouse personnel should be in charge of storing and keeping track of inventory. With clearly assigned responsibilities, all important jobs get done. In processing transactions, smart management separates three key duties: asset handling, record keeping, and transaction approval. For example, to avoid lapping of receivables, the duties of cash handling from record keeping for customer accounts receivable should be separated. Ideally, someone else should also review customer accounts for collectability and be in charge of writing them off if they become completely uncollectible. The accounting department should be completely separate from the operating departments, such as production and sales. What would happen if sales personnel, who were compensated based on a percentage of the amount of sales they made, approved the company’s sales transactions to customers? Sales figures could be inflated and might not reflect the eventual amount collected from customers. At all costs, accountants must not handle cash, and cash handlers must not have access to the accounting records. If one employee has both cash-handling and accounting duties, that person can steal cash and conceal the theft. For companies that are too small to hire separate persons to do all of these functions, the key to good internal control is getting the owner involved, usually by approving all large transactions, making bank deposits, or reconciling the monthly bank account. No person or department should be able to completely process a transaction from beginning to end without being cross-checked by another person or department. For example, some division of the treasurer’s department should be responsible for depositing daily cash receipts in the bank. The controller’s department should be responsible for recording customer collections to individual customer accounts receivable. A third employee (perhaps the person in the controller’s department who reconciles the bank statement) should compare the treasurer department’s daily records of cash deposited with totals of collections posted to individual customer accounts by the accounting department. One of the most effective tools for monitoring compliance with management’s policies is the use of operating budgets and cash budgets. Management may prepare these budgets on a yearly, quarterly, monthly, or more frequent basis. Operating budgets are budgets of future periods’ net income. They are prepared by line item of the income statement. Cash budgets are budgets of future periods’ cash receipts and cash disbursements. Often these budgets are “rolling,” being constantly updated by adding a time period a year away while dropping the time period that has just passed. Computer systems are programmed to prepare exception reports for data that are out of line with expectations. This data can include variances for each account from budgeted amounts. Department managers are required to explain the variances, and to take corrective actions in their operating plans to keep the budgets in line with expectations. This is an example of use of exception reporting. To validate the accounting records and monitor compliance with company policies, most companies have an audit. An audit is an examination of the company’s financial statements and its accounting system, including its controls. Audits can be internal or external. Internal auditors are employees of the business. They ensure that employees are following company policies and operations are running efficiently. Internal auditors also determine whether the company is following legal requirements. External auditors are completely independent of the business. They are hired to determine whether or not the company’s financial statements agree with generally accepted accounting principles. Auditors examine the client’s financial statements and the underlying transactions in order to form a professional opinion on the accuracy and reliability of the company’s financial statements.
  10. Accounting records provide the details of business transactions. The general rule is that all major groups of transactions should be supported by either hard copy documents or electronic records. Examples of documents include sales invoices, shipping records, customer remittance advices, purchase orders, vendor invoices, receiving reports, and canceled (paid) checks. Documents should be pre-numbered to assure completeness of processing and proper transaction cutoff, and to prevent theft and inefficiency. A gap in the numbered document sequence draws attention to the possibility that transactions might have been omitted from processing. To complement segregation of duties, company policy should limit access to assets only to those persons or departments that have custodial responsibilities. For example, access to cash should be limited to persons in the treasurer’s department. Cash receipts might be processed through a lock-box system. Access to inventory should be limited to persons in the company warehouse where inventories are stored, or to persons in the shipping and receiving functions. Likewise, the company should limit access to records to those persons who have record-keeping responsibilities. All manual records of the business should be protected by lock and key and electronic records should be protected by passwords. Only authorized persons should have access to certain records. Individual computers in the business should be protected by user identification and password. Electronic data files should be encrypted (processed through a special code) to prevent their recognition if accessed by a “hacker” or other unauthorized person. No transaction should be processed without management’s general or specific approval. The bigger the transaction, the more specific approval it should have. For individual small transactions, management might delegate approval to a specific department. For example: ■ Sales to customers on account should all be approved by a separate credit department that reviews all customers for creditworthiness before goods are shipped to customers on credit. This helps assure that the company doesn’t make sales to customers who cannot afford to pay their bills or have a poor payment history. ■ Purchases of all items on credit should be approved by a separate purchasing department that specializes in that function. Among other things, a purchasing department should only buy from approved vendors, on the basis of competitive bids, to assure that the company gets the highest quality products for the most competitive prices. ■ All personnel decisions, including hiring, firing, and pay adjustments, should be handled by a separate human resources (HR) department that specializes in personnel-related matters.
  11. What’s an easy way to remember the basic control procedures for any class of transactions? Look at the first letters of each of the headings in this section: Smart hiring practices and segregation of duties Comparisons and compliance monitoring Adequate records Limited access to both assets and records Proper approvals (either general or specific) for each class of transaction
  12. Accounting systems are relying less on manual procedures and more on information technology (IT) than ever before for record keeping, asset handling, approval, and monitoring, as well as physically safeguarding the assets. For example, retailers control inventory by attaching an electronic sensor to merchandise. The cashier must remove the sensor before the customer can walk out of the store. If a customer tries to leave the store with the sensor attached, an alarm sounds. According to Checkpoint Systems, these devices reduce theft by as much as 50%. Bar codes speed checkout at retail stores, performing multiple operations in a single step. When the sales associate scans the merchandise at the register, the computer records the sale, removes the item from inventory, and computes the amount of cash tendered. When a company employs sophisticated IT, the basic attributes of internal control (SCALP) do not change, but the procedures by which these attributes are implemented change substantially. For example, segregation of duties is often accomplished by separating mainframe computer departments from other user departments (i.e., controller, sales, purchasing, receiving, credit, HR, treasurer) and restricting access to the IT department only to authorized personnel. Within the computer department, programmers should be separated from computer operators and data librarians. Access to sensitive data files is protected by password and data encryption. Electronic records must be saved routinely, or they might be written over or erased. Comparisons of data (such as cash receipts with total credits to customer accounts) that might otherwise be done by hand are performed by the computer. Computers can monitor inventory levels by item, generating a purchase order for inventory when it reaches a certain level. The use of computers has the advantage of speed and accuracy (when programmed correctly). However, a computer that is not programmed correctly can corrupt all the data, making it unusable. It is therefore important to hire experienced and competent people to run the IT department, to restrict access to sensitive data and the IT department only to authorized personnel, to check data entered into and retrieved from the computer for accuracy and completeness, and to test and retest programs on a regular basis to assure data integrity and accuracy. In addition, it is important that users of the technology are properly trained and monitored because the quality of the output is only as good as the quality of the input.
  13. Businesses keep important documents in fireproof vaults. Burglar alarms safeguard buildings, and security cameras safeguard other property. Loss-prevention specialists train employees to spot suspicious activity. Employees who handle cash are in a tempting position. Many businesses purchase fidelity bonds on cashiers. The bond is an insurance policy that reimburses the company for any losses due to employee theft. Before issuing a fidelity bond, the insurance company investigates the employee’s background. Mandatory vacations and job rotation improve internal control. Companies move employees from job to job. This improves morale by giving employees a broad view of the business. Also, knowing someone else will do your job next month keeps you honest.
  14. E-commerce creates its own risks. Hackers may gain access to confidential information such as account numbers and passwords. E-commerce pitfalls include: ■ Stolen credit card numbers: Suppose you buy CDs from EMusic.com. To make the purchase, your credit card number must travel through cyberspace. Wireless networks (Wi-Fi) are creating new security hazards. ■ Computer viruses and Trojan Horses: A computer virus is a malicious program that (a) enters program code without consent and (b) performs destructive actions in the victim’s computer files or programs. A Trojan Horse is a malicious computer program that hides inside a legitimate program and works like a virus. Viruses can destroy or alter data, make bogus calculations, and infect files. Most firms have found a virus in their system at some point. ■ Phishing expeditions: Thieves phish by creating bogus Web sites. The neat-sounding Web site attracts lots of visitors, and the thieves obtain account numbers and passwords from unsuspecting people. The thieves then use the data for illicit purposes. To address the risks posed by e-commerce, companies have devised a number of security measures, including ■ Encryption: The server holding confidential information may not be secure. One technique for protecting customer data is encryption. Encryption rearranges messages by a mathematical process. The encrypted message can’t be read by those who don’t know the code. An accounting example uses check-sum digits for account numbers. Each account number has its last digit equal to the sum of the previous digits. For example, consider Customer Number 2237, where 2 + 2 + 3 = 7. Any account number that fails this test triggers an error message. ■ Firewalls: Firewalls limit access into a local network. Members can access the network but nonmembers can’t. Usually several firewalls are built into the system. Think of a fortress with multiple walls protecting the king’s chamber in the center. At the point of entry, passwords, PINs (personal identification numbers), and signatures are used. More sophisticated firewalls are used deeper in the network. Start with Firewall 1, and work toward the center.
  15. Cash is the most liquid asset because it’s the medium of exchange. Cash is easy to conceal and relatively easy to steal. As a result, most businesses create specific controls for cash. Keeping cash in a bank account helps control cash because banks have established practices for safeguarding customers’ money. The documents used to control a bank account include the: ■ Signature card ■ Bank statement ■ Deposit ticket ■ Bank reconciliation ■ Check
  16. Signature Card: Banks require each person authorized to sign on an account to provide a signature card. This protects against forgery. Banks will not cash checks that don’t bear an authorized signature and for checks presented at the bank in person will often check the signature against the one on file. Deposit Ticket: Banks supply standard forms such as deposit tickets. The customer fills in the amount of each deposit and lists the detailed amounts of each check being deposited and the amount of cash included in the deposit. As proof of the transaction, the customer keeps a deposit receipt. Check: To pay cash, the depositor can write a check, which tells the bank to pay the designated party a specified amount. There are three parties to a check: ■ the maker, who signs the check ■ the payee, to whom the check is paid ■ the bank on which the check is drawn Checks written by companies often have a stub attached, called a remittance advice, that tells the payee the purpose of the payment. The payee is required to endorse the back of the check when cashing it as proof that only the authorized payee received the funds.
  17. Cash requires some specific internal controls because cash is relatively easy to steal and it’s easy to convert to other forms of wealth. Moreover, all transactions ultimately affect cash. All cash receipts should be deposited for safekeeping in the bank—quickly. Companies receive cash over the counter and through the mail. Each source of cash has its own security measures.
  18. Imagine a cash receipt over the counter in a department store. The point-of-sale terminal provides control over the cash receipts, while also recording the sale and relieving inventory for the appropriate cost of the goods sold. For each transaction, a sales associate issues a receipt to the customer as proof of purchase. The cash drawer opens when the sales associate enters a transaction, and the machine electronically transmits a record of the sale to the store’s main computer. At the end of each shift, the sales associate delivers his or her cash drawer to the office, where it is combined with cash from all other terminals and delivered by armored car to the bank for deposit. Later, a separate employee in the accounting department reconciles the electronic record of the sales per terminal to the record of the cash turned in. These measures, coupled with oversight by a manager, discourage theft. Point-of-sale terminals also provide effective control over inventory. For example, in a restaurant, these devices track sales by menu item and total sales by cash, type of credit card, gift card redeemed, etc. They create the daily sales journal for that store, which, in turn, interfaces with the general ledger. Managers can use records produced by point-of-sale terminals to check inventory levels and compare them against sales records for accuracy.
  19. Many companies receive cash by mail. The exhibit above shows how companies control cash received by mail. All incoming mail is opened by a mailroom employee. The mailroom then sends all customer checks to the treasurer, who has the cashier deposit the money in the bank. The remittance advices go to the accounting department for journal entries to Cash and customer accounts receivable. As a final step, the controller compares the following records for the day: ■ Bank deposit amount from the treasurer ■ Debit to Cash from the accounting department The debit to Cash should equal the amount deposited in the bank. All cash receipts are safe in the bank, and the company books are up-to-date.
  20. Companies make most payments by check or electronic funds transfer (EFT). There should be a good separation of duties between (a) operations and (b) writing checks or authorizing EFTs for cash payments. Payment by check or EFT is an important internal control, as follows: ■ The check or EFT payment provides a record of the payment. ■ The check must be signed by an authorized official. The EFT must be approved by an authorized official. ■ Before signing the check or authorizing the EFT, the official should study the evidence supporting the payment. Types of satisfactory evidence that a payment is legitimate would be invoices, purchase orders, receiving reports (also known as packing slips), contracts, or approved payment vouchers.
  21. To illustrate the internal control over cash payments by check, suppose Company A Products buys some of its inventory from Company X. The purchasing and payment process follows these steps: Company A faxes or e-mails an electronic purchase order to Company X. Company X ships the goods and sends an electronic or paper invoice back to Company A. X sends the goods. 3. Company A receives the inventory and the invoice. It prepares a receiving report to list the goods received and compares the invoice to the purchase order and receiving report to make sure the goods invoiced were actually ordered and received. 4. After approving all documents, Company A sends a check to Company X, or authorizes an electronic funds transfer (EFT) directly from its bank to Company X’ s bank.
  22. For good internal control, the purchasing agent should neither receive the goods nor approve the payment. If these duties aren’t separated, a purchasing agent can buy goods and have them shipped to his or her home. Or a purchasing agent can spend too much on purchases, approve the payment, and split the excess with the supplier. To avoid these problems, companies split the following duties among different employees: ■ Purchasing goods ■ Receiving goods ■ Approving and paying for goods
  23. This figures shows a company’s payment packet of documents. Before signing the check or approving the EFT, the treasurer’s department should examine the packet to prove that all the documents agree. Only then does the company know that: 1. it received the goods ordered. 2. it is paying only for the goods received. After payment, the person in the treasurer’s department who has authorized the disbursement stamps the payment packet “paid” or punches a hole through it to prevent it from being submitted a second time. Dishonest people have tried to run a bill through twice for payment. The stamp or hole shows that the bill has been paid. If checks are used, they should then be mailed directly to the payee without being allowed to return to the department that prepared them. To do so would violate separation of the duties of cash handling and record keeping, as well as unauthorized access to cash.
  24. It would be wasteful to write separate checks for an executive’s taxi fare, name tags needed right away, or delivery of a package across town. Therefore, companies keep a petty cash fund on hand to pay such minor amounts. The word “petty” means small. That’s what petty cash is—a small cash fund kept by a single employee for the purpose of making such on-the-spot minor purchases. The petty cash fund is opened with a particular amount of cash. A check for that amount is then issued to the custodian of the petty cash fund, who is solely responsible for accounting for it. For each petty cash payment, the custodian prepares a petty cash voucher to list the item purchased. The sum of the cash in the petty cash fund plus the total of the paid vouchers in the cash box should equal the opening balance at all times. The Petty Cash account keeps its set balance at all times. Maintaining the Petty Cash account at this balance, supported by the fund (cash plus vouchers), is how an imprest system works. The control feature is that it clearly identifies the amount for which the custodian is responsible.