Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations. The following are the some of the internal control procedures:
- Competent personnel, rotating duties, and mandatory vacations
- Separating responsibilities for related operations
- Separating operations, custody of assets, and accounting
- Proofs and security measures
To state: The general internal control weakness contributed to the fraud.
Want to see the full answer?
Check out a sample textbook solutionChapter 7 Solutions
Bundle: Financial & Managerial Accounting, 13th + Working Papers, Volume 1, Chapters 1-15 For Warren/reeve/duchac’s Corporate Financial Accounting, ... 13th + Cengagenow™v2, 2 Terms Access Code
- There are several elements to internal controls. Which of the following would not address the issue of having cash transactions reported in the accounting records? A. One employee would have access to the cash register. B. The cash drawer should be closed out, and cash and the sales register should be reconciled on a prenumbered form. C. Ask customers to report to a manager if they do not receive a sales receipt or invoice. D. The person behind the cash register should also be responsible for making price adjustments.arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forwardParagon Tech Company, a communications equipment manufacturer, recently fell victim to a fraud scheme developed by one of its employees. To understand the scheme, it is necessary to review Paragon Tech’s procedures for the purchase of services. The purchasing agent is responsible for ordering services (such as repairs to a photocopy machine or office cleaning) after receiving a service requisition from an authorizedmanager. However, because no tangible goods are delivered, a receiving report is not prepared. When the Accounting Department receives an invoice billing Paragon Tech for a service call, the accounts payable clerk calls the manager who requested the service in order to verify that it was performed.The fraud scheme involves Mae Jansma, the manager of plant and facilities. Mae arranged for her uncle’s company, Radiate Systems, to be placed on Paragon Tech’s approved vendor list. Mae did not disclose the family relationship. On several occasions, Mae would submit a requisition…arrow_forward
- For each of the following three independent cases of employee fraud, recommend how to prevent similar problems in the future: Case A: Due to abnormal inventory shrinkage in the audiovisual department at a retail chain store, internal auditors conducted an in- depth audit of the department. They learned that a customer frequently bought large numbers of small electronic components from a certain cashier. The auditors discovered that they had colluded to steal electronic components by not recording the sale of items the customer took from the store. Case B: During an unannounced audit, auditors discovered a payroll fraud when they distributed paychecks instead of department supervisors. When the auditors investigated an unclaimed paycheck, they discovered that the employee quit four months previously after arguing with the supervisor. The supervisor continued to turn in a time card for the employee and pocketed his check. Case C: Auditors discovered an accounts payable clerk who made…arrow_forwardAllison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.arrow_forwardYou are a fraud examiner and have been hired by Blackman Company to carry out an investigation. Blackman is a beverage company that has experienced increased shipments of beverages but no increase in revenue. Management suspects that inventory is being shipped to unknown places or is being stolen.How would you use invigilation to help you determine whether inventory is being stolen or shipped to unknown locations? Briefly explain how you would carry out this investigative procedure.arrow_forward
- Which of the following is NOT an example of an opportunity to commit fraud in the accounting information system? a. The need to sell confidential information from the database for cash to pay for his medical bills b. User names and passwords of most employees are stored in a shared Google document file c. The employee's discovery that passwords are not required to enter any modules in the accounting information system d. Supervisors are not required to approve transactions entered into by their staff in the accounting systemarrow_forwardWhat internal control procedure(s) would provide protection against the following threats? a. Theft of goods by the shipping dock workers, who claim that the inventory shortages reflect errors in the inventory records.b. Posting the sales amount to the wrong customer account because a customer account number was incorrectly keyed into the system .c. Making a credit sale to a customer who is already four months behind in making payments on his account. d. Authorizing a credit memo for a sales return when the goods were never actually returned. e. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. f. Billing customers for the quantity ordered when the quantity shipped was actually less due to back ordering of some items .g. Lost sales because of stockouts of several products for which the computer records indicated there was adequate quantity on hand. h. A sales clerk sold a $7,000 wide-screen TV…arrow_forwardA purchasing agent for a home improvement center is also part owner in a wholesale lumber company. The agent has sole discretion in selecting vendors for the lumber sold through the center. The agent directs a disproportionate number of purchase orders to his company, which charges above-market prices for its products. The agent’s financial interest in the supplier is unknown to his employer.What type of fraud is this and what controls can be implemented to prevent or detect the fraud?arrow_forward
- Computer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardWhen in an examination of a retail firm, Lily, a recently recruited internal auditor, discovered a plan in which the warehouse manager and a buying staff moved around Php2 million worth of products to an outside warehouse, where they were sold to third parties. Because the warehouse manager changed the perpetual inventory records and subsequently transmitted receiving reports to the accounts payable department for processing, the fraud was not discovered earlier by the internal audit team. Which one of the following steps did Lily follow that resulted in the discovery of the missing materials and the fraud? Group of answer choicesRandom sampling of receiving reports and tracing to the recording in the perpetual inventory records.Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department.Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory…arrow_forwardDetermine whether each procedure described below is an internal control strength or weakness; then identify the internal control principle violated or followed for each procedure. 1. The same employee requests, records, and makes payment for purchases of inventory. 2. The company saves money by having employees involved in operations perform the only review of internal controls. 3. Time is saved by not updating records for use of supplies. 4. The recordkeeper is not allowed to write checks or initiate EFTs. 5. Each salesclerk is in charge of her own cash drawer.arrow_forward
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeCollege Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Financial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning