SlideShare una empresa de Scribd logo
1 de 71
7-1
7-2
FRAUD,FRAUD,
INTERNALINTERNAL
CONTROL, ANDCONTROL, AND
CASHCASH
Accounting, Fifth Edition
7
7-3
After studying this chapter, you should be able to:
1. Define fraud and internal control.
2. Identify the principles of internal control activities.
3. Explain the applications of internal control principles to cash receipts.
4. Explain the applications of internal control principles to cash
disbursements.
5. Prepare a bank reconciliation.
6. Explain the reporting of cash.
7. Discuss the basic principles of cash management.
8. Identify the primary elements of a cash budget.
Learning ObjectivesLearning ObjectivesLearning ObjectivesLearning Objectives
7-4
Preview of Chapter 7
Accounting
Fifth Edition
Kimmel Weygandt Kieso
7-5
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Dishonest act by an employee that results in personal benefit to
the employee at a cost to the employer.
LO 1 Define fraud and internal control.
Three factors that
contribute to
fraudulent activity.
Illustration 7-1
Fraud
7-6
 Applies to publicly traded U.S. corporations.
 Required to maintain a system of internal control.
 Corporate executives and boards of directors must ensure
that these controls are reliable and effective.
 Independent outside auditors must attest to the adequacy
of the internal control system.
 SOX created the Public Company Accounting Oversight
Board (PCAOB).
LO 1 Define fraud and internal control.
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
The Sarbanes-Oxley Act
7-7
Methods and measures adopted to:
1. Safeguard assets.
2. Enhance accuracy and reliability of accounting records.
3. Increase efficiency of operations.
4. Ensure compliance with laws and regulations.
LO 1 Define fraud and internal control.
Internal Control
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
7-8
Five Primary Components:
1. Control environment.
2. Risk assessment.
3. Control activities.
4. Information and communication.
5. Monitoring.
LO 1 Define fraud and internal control.
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Internal Control
7-9
7-10
Establishment of Responsibility
 Control is most effective when
only one person is responsible
for a given task.
 Establishing responsibility often
requires limiting access only to
authorized personnel, and then
identifying those personnel.
LO 2 Identify the principles of internal control activities.
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Principles of Internal Control Activities
7-11
Segregation of Duties
 Different individuals should be
responsible for related
activities.
 The responsibility for record-
keeping for an asset should
be separate from the physical
custody of that asset.
LO 2 Identify the principles of internal control activities.
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Principles of Internal Control Activities
7-12
Documentation Procedures
 Companies should use
prenumbered documents, and
all documents should be
accounted for.
 Employees should promptly
forward source documents for
accounting entries to the
accounting department.
LO 2 Identify the principles of internal control activities.
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Principles of Internal Control Activities
7-13 LO 2 Identify the principles of internal control activities.
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Principles of Internal Control Activities
Illustration 7-2
Physical
Controls
7-14
 Records periodically
verified by an
employee who is
independent.
 Discrepancies
reported to
management.
LO 2 Identify the principles of internal control activities.
Illustration 7-3
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Independent Internal Verification
Principles of Internal Control Activities
7-15 LO 2 Identify the principles of internal control activities.
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Principles of Internal Control Activities
Human Resource Controls
 Bond employees who handle
cash.
 Rotate employees’ duties and
require vacations.
 Conduct background checks.
7-16
The Missing Control
Establishment of responsibility. The healthcare company did not adequately
restrict the responsibility for authoring and approving claims transactions. The
training supervisor should not have been authorized to create claims in the
company’s “live” system.
Total take: $11 million
ANATOMY OF A FRAUD
Maureen Frugali was a training supervisor for claims processing at Colossal
Healthcare. As a standard part of the claims processing training program,
Maureen created fictitious claims for use by trainees. These fictitious claims
were then sent to the accounts payable department. After the training claims
had been processed, she was to notify Accounts Payable of all fictitious claims,
so that they would not be paid. However, she did not inform Accounts Payable
about every fictitious claim. She created some fictitious claims for entities that
she controlled (that is, she would receive the payment), and she let Accounts
Payable pay her.
7-17
The Missing Control
Segregation of duties. The university had not properly segregated related
purchasing activities. Lawrence was ordering items, receiving the items, and
receiving the invoice. By receiving the invoice, he had control over the
documents that were used to account for the purchase and thus was able to
substitute a fake invoice.
Total take: $475,000
ANATOMY OF A FRAUD
Lawrence Fairbanks, the assistant vice-chancellor of communications at Aesop
University, was allowed to make purchases of under $2,500 for his department
without external approval. Unfortunately, he also sometimes bought items for
himself, such as expensive antiques and other collectibles. How did he do it?
He replaced the vendor invoices he received with fake vendor invoices that he
created. The fake invoices had descriptions that were more consistent with the
communications department’s purchases. He submitted these fake invoices to
the accounting department as the basis for their journal entries and to the
accounts payable department as the basis for payment.
7-18
The Missing Control
Segregation of duties. Aggasiz Construction Company did not properly
segregate record-keeping from physical custody. Angela had physical custody
of the checks, which essentially was control of the cash. She also had record-
keeping responsibility because she prepared the bank reconciliation.
Total take: $570,000
ANATOMY OF A FRAUD
Angela Bauer was an accounts payable clerk for Aggasiz Construction
Company. She prepared and issued checks to vendors and reconciled bank
statements. She perpetrated a fraud in this way: She wrote checks for costs
that the company had not actually incurred (e.g., fake taxes). A supervisor then
approved and signed the checks. Before issuing the check, though, she would
“white-out” the payee line on the check and change it to personal accounts that
she controlled. She was able to conceal the theft because she also reconciled
the bank account. That is, nobody else ever saw that the checks had been
altered.
7-19
The Missing Control
Documentation procedures. Mod Fashions should require the original,
detailed receipt. It should not accept photocopies, and it should not accept
credit card statements. In addition, documentation procedures could be further
improved by requiring the use of a corporate credit card (rather than a personal
credit card) for all business expenses.
Total take: $75,000
ANATOMY OF A FRAUD
To support their reimbursement requests for travel costs incurred, employees at
Mod Fashions Corporation’s design center were required to submit receipts. The
receipts could include the detailed bill provided for a meal, or the credit card
receipt provided when the credit card payment is made, or a copy of the
employee’s monthly credit card bill that listed the item. A number of the designers
who frequently traveled together came up with a fraud scheme: They submitted
claims for the same expenses. For example, if they had a meal together that cost
$200, one person submitted the detailed meal bill, another submitted the credit
card receipt, and a third submitted a monthly credit card bill showing the meal as
a line item. Thus, all three received a $200 reimbursement.
7-20
The Missing Control
Total take: $240,000
ANATOMY OF A FRAUD
At Centerstone Health, a large insurance company, the mailroom each day
received insurance applications from prospective customers. Mailroom
employees scanned the applications into electronic documents before the
applications were processed. Once the applications are scanned they can be
accessed online by authorized employees. Insurance agents at Centerstone
Health earn commissions based upon successful applications. The sales agent’s
name is listed on the application. However, roughly 15% of the applications are
from customers who did not work with a sales agent. Two friends—Alex, an
employee in record keeping, and Parviz, a sales agent—thought up a way to
perpetrate a fraud. Alex identified scanned applications that did not list a sales
agent. After business hours, he entered the mailroom and found the hardcopy
applications that did not show a sales agent. He wrote in Parviz’s name as the
sales agent and then rescanned the application for processing. Parviz received
the commission, which the friends then split.
7-21
The Missing Control
Physical controls. Centerstone Health lacked two basic physical controls that
could have prevented this fraud. First, the mailroom should have been locked
during nonbusiness hours, and access during business hours should have been
tightly controlled. Second, the scanned applications supposedly could be
accessed only by authorized employees using their passwords. However, the
password for each employee was the same as the employee’s user ID. Since
employee user-ID numbers were available to all other employees, all
employees knew all other employees’ passwords. Unauthorized employees
could access the scanned applications. Thus, Alex could enter the system
using another employee’s password and access the scanned applications.
Total take: $240,000
7-22
The Missing Control
Independent internal verification. Bobbi Jean’s boss should have verified her
expense reports. When asked what he thought her expenses were, the boss
said about $10,000. At $115,000 per year, her actual expenses were more than
ten times what would have been expected. However, because he was “too
busy” to verify her expense reports or to review the budget, he never noticed.
Total take: $275,000
ANATOMY OF A FRAUD
Bobbi Jean Donnelly, the office manager for Mod Fashions Corporations design
center, was responsible for preparing the design center budget and reviewing
expense reports submitted by design center employees. Her desire to upgrade
her wardrobe got the better of her, and she enacted a fraud that involved filing
expense-reimbursement requests for her own personal clothing purchases. She
was able to conceal the fraud because she was responsible for reviewing all
expense reports, including her own. In addition, she sometimes was given
ultimate responsibility for signing off on the expense reports when her boss was
“too busy.” Also, because she controlled the budget, when she submitted her
expenses, she coded them to budget items that she knew were running under
budget, so that they would not catch anyone’s attention.
7-23
The Missing Control
Human resource controls. Ellen, the desk manager, had been fired by a
previous employer. If the Excelsior Inn had conducted a background check, it
would not have hired her. The fraud was detected when Ellen missed work due
to illness. A system of mandatory vacations and rotating days off would have
increased the chances of detecting the fraud before it became so large.
Total take: $95,000
ANATOMY OF A FRAUD
Ellen Lowry was the desk manager and Josephine Rodriquez was the head of
housekeeping at the Excelsior Inn, a luxury hotel. The two best friends were so
dedicated to their jobs that they never took vacations, and they frequently filled in
for other employees. In fact, Ms. Rodriquez, whose job as head of housekeeping
did not include cleaning rooms, often cleaned rooms herself, “just to help the
staff keep up.” Ellen, the desk manager, provided significant discounts to guests
who paid with cash. She kept the cash and did not register the guest in the
hotel’s computerized system. Instead, she took the room out of circulation “due
to routine maintenance.” Because the room did not show up as being used, it did
not receive a normal housekeeping assignment. Instead, Josephine, the head of
housekeeping, cleaned the rooms during the guests’ stay.
7-24
7-25
 Costs should not exceed benefit.
 Human element.
 Size of the business.
LO 2 Identify the principles of internal control activities.
Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
Limitations of Internal Control
Helpful Hint Controls may
vary with the risk level of the
activity. For example,
management may consider
cash to be high risk and
maintaining inventories in the
stockroom as lower risk. Thus,
management would have
stricter controls for cash.
7-26
LO 3
Cash ControlsCash ControlsCash ControlsCash Controls
Cash Receipt Controls
Illustration 7-4
7-27
Illustration 7-4
LO 3
Cash ControlsCash ControlsCash ControlsCash Controls
Cash Receipt Controls
7-28
Cash ControlsCash ControlsCash ControlsCash Controls
Cash Receipt
Controls
Important internal
control principle—
segregation of record-
keeping from physical
custody.
Over-the-Counter
Receipts
LO 3 Explain the applications of internal control principles to cash receipts.
Illustration 7-5
7-29
Mail Receipts
 Mail receipts should be opened by two people, a list prepared,
and each check endorsed “For Deposit Only.”
 Each mail clerk signs the list to establish responsibility for the
data.
 Original copy of the list, along with the checks, is sent to the
cashier’s department.
 Copy of the list is sent to the accounting department for
recording. Clerks also keep a copy.
LO 3 Explain the applications of internal control principles to cash receipts.
Cash ControlsCash ControlsCash ControlsCash Controls
Cash Receipt Controls
7-30
Permitting only designated personnel to handle cash
receipts is an application of the principle of:
a. segregation of duties.
b. establishment of responsibility.
c. independent check.
d. other controls.
Review Question
LO 3 Explain the applications of internal control principles to cash receipts.
Cash ControlsCash ControlsCash ControlsCash Controls
7-31
Generally, internal control over cash disbursements is more
effective when companies pay by check or electronic funds
transfer (EFT) rather than by cash.
Applications:
 Voucher System Controls
 Petty Cash Fund (Appendix 7A)
LO 4 Explain the applications of internal control
principles to cash disbursements.
Cash ControlsCash ControlsCash ControlsCash Controls
Cash Disbursement Controls
7-32
Illustration 7-6
LO 4
Cash ControlsCash ControlsCash ControlsCash Controls
Cash Disbursement
Controls
7-33
Illustration 7-6
LO 4
Cash ControlsCash ControlsCash ControlsCash Controls
Cash Disbursement
Controls
7-34
The use of prenumbered checks in disbursing cash is an
application of the principle of:
a. establishment of responsibility.
b. segregation of duties.
c. physical, mechanical, and electronic controls.
d. documentation procedures.
Review Question
LO 4 Explain the applications of internal control
principles to cash disbursements.
Cash ControlsCash ControlsCash ControlsCash Controls
7-35
Voucher System
 A network of approvals by authorized individuals, acting
independently, to ensure all disbursements by check are
proper.
 A voucher is an authorization form prepared for each
expenditure in a voucher system.
LO 4 Explain the applications of internal control
principles to cash disbursements.
Cash ControlsCash ControlsCash ControlsCash Controls
Cash Disbursement Controls
7-36
7-37
The use of a bank contributes significantly to good internal
control over cash.
 Minimizes the amount of currency on hand.
 Creates a double record of bank transactions.
 Bank reconciliation.
LO 5 Prepare a bank reconciliation.
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
Helpful Hint Essentially,
the bank statement is a
copy of the bank’s records
sent to the customer or
made available online for
review.
7-38
Debit Memorandum
 Bank service charge.
 NSF (not sufficient
funds).
Illustration 7-7
Credit Memorandum
 Collect notes
receivable.
 Interest earned.
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
Bank Statements
LO 5 Prepare a bank reconciliation.
7-39
The control features of a bank account do not include:
a. having bank auditors verify the correctness of the bank
balance per books.
b. minimizing the amount of cash that must be kept on
hand.
c. providing a double record of all bank transactions.
d. safeguarding cash by using a bank as a depository.
Review Question
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
LO 5 Prepare a bank reconciliation.
7-40
Reconcile balance per books and balance per bank to their
“correct or true” balance.
Reconciling Items:
1. Deposits in transit.
2. Outstanding checks.
3. Bank memoranda.
4. Errors.
Time Lags
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
Reconciling the Bank Account
LO 5 Prepare a bank reconciliation.
7-41
Reconciliation Procedures
+ Deposit in Transit
- Outstanding Checks
+/- Bank Errors
+ Notes collected by bank
- NSF (bounced) checks
- Check printing or other
service charges
+/- Company Errors
CORRECT BALANCE CORRECT BALANCE
Illustration 7-8
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
LO 5 Prepare a bank reconciliation.
7-42 LO 5 Prepare a bank reconciliation.
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
7-43
Illustration: Prepare a bank reconciliation at April 30.
LO 5 Prepare a bank reconciliation.
Cash balance per bank statement $15,907.45
Deposit in transit 2,201.40
Outstanding checks (5,904.00)
Adjusted cash balance per bank $12,204.85
Cash balance per books $11,589.45
Collection of notes receivable 1,035.00
Error in check No. 443 36.00
NSF check (425.60)
Bank service charge (30.00)
Adjusted cash balance per books $12,204.85
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
7-44
Collection of Note Receivable: Assuming interest of $50 has not
been accrued and collection fee is charged to Miscellaneous
Expense, the entry is:
Cash 1,035.00Apr. 30
Miscellaneous expense 15.00
Notes receivable 1,000.00
Interest revenue 50.00
LO 5 Prepare a bank reconciliation.
Entries From Bank Reconciliation
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
7-45
Book Error: The cash disbursements journal shows that check
no. 443 was a payment on account to Andrea Company, a supplier.
The correcting entry is:
Cash 36.00Apr. 30
Accounts payable 36.00
LO 5 Prepare a bank reconciliation.
NSF Check: As indicated earlier, an NSF check becomes an
account receivable to the depositor. The entry is:
Accounts receivable 425.60Apr. 30
Cash 425.60
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
7-46
Bank Service Charges: Depositors debit check printing charges
(DM) and other bank service charges (SC) to Miscellaneous
Expense. The entry is:
Miscellaneous expense 30.00Apr. 30
Cash 30.00
LO 5 Prepare a bank reconciliation.
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
Illustration 7-10
7-47
The reconciling item in a bank reconciliation that will result in
an adjusting entry by the depositor is:
a. outstanding checks.
b. deposit in transit.
c. a bank error.
d. bank service charges.
Review Question
LO 5 Prepare a bank reconciliation.
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
7-48
 Disbursement systems that uses wire, telephone, or
computers to transfer cash balances between locations.
 EFT transfers normally result in better internal control
since no cash or checks are handled by company
employees.
LO 5 Prepare a bank reconciliation.
Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
Electronic Funds Transfer (EFT) System
7-49
7-50
Sally Kist owns Linen Kist Fabrics. Sally asks you
to explain how she should treat the following reconciling items when
reconciling the company’s bank account: (1) a debit memorandum for
an NSF check, (2) a credit memorandum for a note collected by the
bank, (3) outstanding checks, and (4) a deposit in transit.
Sally should treat the reconciling items as follows.
(1) NSF check: Deduct from balance per books.
(2) Collection of note: Add to balance per books.
(3) Outstanding checks: Deduct from balance per bank.
(4) Deposit in transit: Add to balance per bank.
LO 5
Solution
7-51
Cash equivalents are short-term, highly liquid investments
that are both:
1. Readily convertible to known amounts of cash, and
2. So near their maturity that their market value is relatively
insensitive to changes in interest rates.
LO 6 Explain the reporting of cash.
Reporting CashReporting CashReporting CashReporting Cash
Cash Equivalents
Cash that is not available for general use but rather is
restricted for a special purpose.
Restricted Cash
7-52
Illustration 7-11
LO 6 Explain the reporting of cash.
Reporting CashReporting CashReporting CashReporting Cash
7-53
Which of the following statements correctly describes the
reporting of cash?
a. Cash cannot be combined with cash equivalents.
b. Restricted cash funds may be combined with Cash.
c. Cash is listed first in the current assets section.
d. Restricted cash funds cannot be reported as a current
asset.
LO 6 Explain the reporting of cash.
Review Question
Reporting CashReporting CashReporting CashReporting Cash
7-54
Illustration 7-12
Operating Cycle of a
Merchandising Company
LO 7 Discuss the basic principles of cash management.
Managing and Monitoring CashManaging and Monitoring CashManaging and Monitoring CashManaging and Monitoring Cash
7-55
Illustration 7-13
Basic Principles of Cash Management
LO 7
Managing and Monitoring CashManaging and Monitoring CashManaging and Monitoring CashManaging and Monitoring Cash
7-56
Cash Budget
► Shows anticipated
cash flows, usually
over a one- to two-
year period.
► Contributes to
more effective cash
management.
LO 8 Identify the primary elements of a cash budget.
Managing and Monitoring CashManaging and Monitoring CashManaging and Monitoring CashManaging and Monitoring Cash
7-57
Involves:
1. establishing the fund,
2. making payments from the
fund, and
3. replenishing the fund.
Petty Cash Fund - Used to pay small amounts.
LO 9 Explain the operation of a petty cash fund.
Operation of the Petty Cash Fund
Appendix 7AAppendix 7AAppendix 7AAppendix 7A
Ethics Note Internal control
over a petty cash fund is
strengthened by: (1) having
a supervisor make surprise
counts of the fund to confirm
whether the paid petty cash
receipts and fund cash equal
the fund amount, and
(2) canceling or mutilating the
paid petty cash receipts so
they cannot be resubmitted
for reimbursement.
7-58
Illustration: If Laird Company decides to establish a $100 fund
on March 1, the entry is:
Petty cash 100March 1
Cash 100
LO 9 Explain the operation of a petty cash fund.
Operation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash Fund
7-59
Illustration: On March 15 the petty cash custodian requests a
check for $87. The fund contains $13 cash and petty cash
receipts for postage $44, supplies $38, and miscellaneous
expenses $5. The entry is:
Postage expense 44March 15
Cash 87
Supplies 38
Miscellaneous expense 5
Operation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash Fund
LO 9 Explain the operation of a petty cash fund.
7-60
Illustration: Assume in the preceding example that the
custodian had only $12 in cash in the fund plus the receipts as
listed. The request for reimbursement would therefore be for
$88. The entry is:
Cash over and short 1
Cash 88
Operation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash Fund
LO 9 Explain the operation of a petty cash fund.
Postage expense 44March 15
Supplies 38
Miscellaneous expense 5
7-61
Key Points
 The fraud triangle discussed in this chapter is applicable to all
international companies. Some of the major frauds on an
international basis are Parmalat (Italy), Royal Ahold (the
Netherlands), and Satyam Computer Services (India).
 Rising economic crime poses a growing threat to companies, with
nearly half of all organizations worldwide being victims of fraud in a
recent two-year period (PricewaterhouseCoopers’ Global
Economic Crime Survey, 2005). Specifically, 44% of Romanian
companies surveyed experienced fraud in the past two years.
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
7-62
Key Points
 Globally, the number of companies reporting fraud increased from
37% to 45% since 2003, a 22% increase. The cost to companies
was an average $1.7 million in losses from “tangible frauds,” that
is, those that result in an immediate and direct financial loss.
These include asset misappropriation, false pretenses, and
counterfeiting (PricewaterhouseCoopers’ Global Economic Crime
Survey, 2005).
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
7-63
Key Points
 Accounting scandals both in the United States and internationally
have re-ignited the debate over the relative merits of GAAP, which
takes a “rules-based” approach to accounting, versus IFRS, which
takes a “principles-based” approach. The FASB announced that it
intends to introduce more principles-based standards.
 Internal controls are a system of checks and balances designed to
prevent and detect fraud and errors. While most companies have
these systems in place, many have never completely documented
them, nor had an independent auditor attest to their effectiveness.
Both of these actions are required under SOX.
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
7-64
Key Points
 Companies find that internal control review is a costly process but
badly needed. One study estimates the cost of SOX compliance
for U.S. companies at over $35 billion, with audit fees doubling in
the first year of compliance. At the same time, examination of
internal controls indicates lingering problems in the way companies
operate. One study of first compliance with the internal control
testing provisions documented material weaknesses for about
13% of companies reporting in a two-year period
(PricewaterhouseCoopers’ Global Economic Crime Survey, 2005).
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
7-65
Key Points
 The SOX internal control standards apply only to companies listed
on U.S. exchanges. There is continuing debate over whether
foreign issuers should have to comply with this extra layer of
regulation.
 The accounting and internal control procedures related to cash are
essentially the same under both IFRS and this textbook. In
addition, the definition used for cash equivalents is the same.
 Most companies report cash and cash equivalents together under
IFRS, as shown in this textbook. In addition, IFRS follows the
same accounting policies related to the reporting of restricted
cash.
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
7-66
Key Points
 IFRS defines cash and cash equivalents as follows.
► Cash is comprised of cash on hand and demand deposits.
► Cash equivalents are short-term, highly liquid investments
that are readily convertible to known amounts of cash and
which are subject to an insignificant risk of changes in value.
 Under IFRS, cash and cash equivalents are often shown last in the
statement of financial position.
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
7-67
Looking to the Future
Different cultures have different perspectives on bribery and other
questionable activities, and consequently penalties for engaging in such
activities vary considerably across countries. High-quality international
accounting requires both high-quality accounting standards and high-
quality auditing. Similar to the convergence of GAAP and IFRS, there is
movement to improve international auditing standards. The International
Auditing and Assurance Standards Board (IAASB) works to establish high
quality auditing and assurance and quality-control standards throughout
the world. Whether the IAASB adopts internal control provisions similar to
those in SOX remains to be seen. You can follow developments in the
international audit arena at http://www.ifac.org/iaasb/.
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
7-68
IFRS Practice
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
Non-U.S companies that follow IFRS:
a) do not normally use the principles of internal control activities
used in this textbook.
b) often offset cash with accounts payable on the balance sheet.
c) are not required to follow SOX.
d) None of the above.
7-69
IFRS Practice
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
Which of the following is the correct accounting under IFRS for
cash?
a) Cash cannot be combined with cash equivalents.
b) Restricted cash funds may be reported as a current or non-
current asset depending on the circumstances.
c) Restricted cash funds cannot be reported as a current asset.
d) Cash on hand is not reported on the balance sheet as Cash.
7-70
IFRS Practice
LO 10 Compare the accounting procedures for fraud,
internal control, and cash under GAAP and IFRS.
The Sarbanes Oxley Act of 2002 applies to:
a) all U.S. companies listed on U.S. exchanges.
b) all companies that list stock on any stock exchange in any
country.
c) all European companies listed on European exchanges.
d) Both (a) and (c).
7-71
“Copyright © 2013 John Wiley & Sons, Inc. All rights reserved.
Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Copyright Act without the
express written permission of the copyright owner is unlawful.
Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc. The purchaser
may make back-up copies for his/her own use only and not for
distribution or resale. The Publisher assumes no responsibility for
errors, omissions, or damages, caused by the use of these
programs or from the use of the information contained herein.”
CopyrightCopyrightCopyrightCopyright

Más contenido relacionado

La actualidad más candente

Chap-1: Accounting in Action
Chap-1: Accounting in ActionChap-1: Accounting in Action
Chap-1: Accounting in ActionGmZulkarNine
 
Chapter 12-fraud-and-error-report
Chapter 12-fraud-and-error-reportChapter 12-fraud-and-error-report
Chapter 12-fraud-and-error-reportJamesChaves3
 
21542253 accounting-21st-edition
21542253 accounting-21st-edition21542253 accounting-21st-edition
21542253 accounting-21st-editionishan01us
 
Solutions manual for fundamental accounting principles volume 1 canadian 15th...
Solutions manual for fundamental accounting principles volume 1 canadian 15th...Solutions manual for fundamental accounting principles volume 1 canadian 15th...
Solutions manual for fundamental accounting principles volume 1 canadian 15th...Miller612
 
Accounting Principles, 12th Edition Ch11
Accounting Principles, 12th Edition  Ch11 Accounting Principles, 12th Edition  Ch11
Accounting Principles, 12th Edition Ch11 AbdelmonsifFadl
 
Cash and Cash equivalent
Cash and Cash equivalentCash and Cash equivalent
Cash and Cash equivalentZoey Zungit
 
ACC 291 GENIUS NEW Introduction Education--acc291genius.com
 ACC 291 GENIUS NEW Introduction Education--acc291genius.com ACC 291 GENIUS NEW Introduction Education--acc291genius.com
ACC 291 GENIUS NEW Introduction Education--acc291genius.comclaric275
 
Keiso 15 chapter 7 review
Keiso 15 chapter 7 reviewKeiso 15 chapter 7 review
Keiso 15 chapter 7 reviewSungah Kimelika
 
Pengantar Akuntansi 2 - Ch13 Statement of Cash Flow
Pengantar Akuntansi 2 - Ch13 Statement of Cash FlowPengantar Akuntansi 2 - Ch13 Statement of Cash Flow
Pengantar Akuntansi 2 - Ch13 Statement of Cash Flowyuliapratiwi2810
 
Chapter 1(accounting) kimmel kieso
Chapter 1(accounting) kimmel kiesoChapter 1(accounting) kimmel kieso
Chapter 1(accounting) kimmel kiesoRubel Islam
 
ACC 291 GENIUS NEW Remember Education--acc291genius.com
ACC 291 GENIUS NEW Remember Education--acc291genius.comACC 291 GENIUS NEW Remember Education--acc291genius.com
ACC 291 GENIUS NEW Remember Education--acc291genius.comchrysanthemu4
 
cash flow and contemporary issued
cash flow and contemporary issued cash flow and contemporary issued
cash flow and contemporary issued Nisal Desaman
 
Receivables - Chapter 9 Principles Accounting
Receivables - Chapter 9 Principles AccountingReceivables - Chapter 9 Principles Accounting
Receivables - Chapter 9 Principles Accountingramot1978
 
Accounting Principles, 12th ch3
Accounting Principles, 12th ch3Accounting Principles, 12th ch3
Accounting Principles, 12th ch3AbdelmonsifFadl
 

La actualidad más candente (20)

Ch01
Ch01Ch01
Ch01
 
Chap-1: Accounting in Action
Chap-1: Accounting in ActionChap-1: Accounting in Action
Chap-1: Accounting in Action
 
Chapter 12-fraud-and-error-report
Chapter 12-fraud-and-error-reportChapter 12-fraud-and-error-report
Chapter 12-fraud-and-error-report
 
21542253 accounting-21st-edition
21542253 accounting-21st-edition21542253 accounting-21st-edition
21542253 accounting-21st-edition
 
Solutions manual for fundamental accounting principles volume 1 canadian 15th...
Solutions manual for fundamental accounting principles volume 1 canadian 15th...Solutions manual for fundamental accounting principles volume 1 canadian 15th...
Solutions manual for fundamental accounting principles volume 1 canadian 15th...
 
Accounting Principles, 12th Edition Ch11
Accounting Principles, 12th Edition  Ch11 Accounting Principles, 12th Edition  Ch11
Accounting Principles, 12th Edition Ch11
 
Control Accounts, errors and omissions class no 3, 4
Control Accounts, errors and omissions  class no 3, 4Control Accounts, errors and omissions  class no 3, 4
Control Accounts, errors and omissions class no 3, 4
 
Accounting principle
Accounting principleAccounting principle
Accounting principle
 
Cash and Cash equivalent
Cash and Cash equivalentCash and Cash equivalent
Cash and Cash equivalent
 
ACC 291 GENIUS NEW Introduction Education--acc291genius.com
 ACC 291 GENIUS NEW Introduction Education--acc291genius.com ACC 291 GENIUS NEW Introduction Education--acc291genius.com
ACC 291 GENIUS NEW Introduction Education--acc291genius.com
 
Keiso 15 chapter 7 review
Keiso 15 chapter 7 reviewKeiso 15 chapter 7 review
Keiso 15 chapter 7 review
 
Pengantar Akuntansi 2 - Ch13 Statement of Cash Flow
Pengantar Akuntansi 2 - Ch13 Statement of Cash FlowPengantar Akuntansi 2 - Ch13 Statement of Cash Flow
Pengantar Akuntansi 2 - Ch13 Statement of Cash Flow
 
Chapter 1(accounting) kimmel kieso
Chapter 1(accounting) kimmel kiesoChapter 1(accounting) kimmel kieso
Chapter 1(accounting) kimmel kieso
 
ACC 291 GENIUS NEW Remember Education--acc291genius.com
ACC 291 GENIUS NEW Remember Education--acc291genius.comACC 291 GENIUS NEW Remember Education--acc291genius.com
ACC 291 GENIUS NEW Remember Education--acc291genius.com
 
Auditing for fraud detection
Auditing for fraud detectionAuditing for fraud detection
Auditing for fraud detection
 
cash flow and contemporary issued
cash flow and contemporary issued cash flow and contemporary issued
cash flow and contemporary issued
 
Audit .. 2nd
Audit .. 2nd Audit .. 2nd
Audit .. 2nd
 
Receivables - Chapter 9 Principles Accounting
Receivables - Chapter 9 Principles AccountingReceivables - Chapter 9 Principles Accounting
Receivables - Chapter 9 Principles Accounting
 
Accounting Principles, 12th ch3
Accounting Principles, 12th ch3Accounting Principles, 12th ch3
Accounting Principles, 12th ch3
 
Ch04
Ch04Ch04
Ch04
 

Destacado

The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle Qamar Farooq
 
Ch3romneyed12
Ch3romneyed12Ch3romneyed12
Ch3romneyed12woyaoni
 
Acct chapter 15 class presentation
Acct chapter 15 class presentationAcct chapter 15 class presentation
Acct chapter 15 class presentationcmurphysvhs
 
BlueBookAcademy.com - Working Capital Explained
BlueBookAcademy.com - Working Capital ExplainedBlueBookAcademy.com - Working Capital Explained
BlueBookAcademy.com - Working Capital Explainedbluebookacademy
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue Cyclesharing notes123
 
Audit of Revenue and Receipt Cycle
Audit of Revenue and Receipt CycleAudit of Revenue and Receipt Cycle
Audit of Revenue and Receipt CycleAngela Torres
 
Overcoming the Top 7 Intercompany Accounting Challenges in SAP ERP Financials
Overcoming the Top 7 Intercompany Accounting Challenges in SAP ERP FinancialsOvercoming the Top 7 Intercompany Accounting Challenges in SAP ERP Financials
Overcoming the Top 7 Intercompany Accounting Challenges in SAP ERP FinancialsSAPinsider Events
 
Sap purchase-requisition-how-to
Sap purchase-requisition-how-toSap purchase-requisition-how-to
Sap purchase-requisition-how-toVERUS BRASIL
 
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING pter 007 instru...
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING  pter 007 instru...PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING  pter 007 instru...
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING pter 007 instru...Zamri Yahya
 
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWAREAUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWAREskeltabpm
 
Procure to Pay Process
Procure to Pay Process Procure to Pay Process
Procure to Pay Process Sameer Mittal
 

Destacado (15)

The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
 
Ch3romneyed12
Ch3romneyed12Ch3romneyed12
Ch3romneyed12
 
Fraud, Internal Control & Cash
Fraud, Internal Control & CashFraud, Internal Control & Cash
Fraud, Internal Control & Cash
 
Acct chapter 15 class presentation
Acct chapter 15 class presentationAcct chapter 15 class presentation
Acct chapter 15 class presentation
 
Pp 04-new revised by hall
Pp 04-new revised by hallPp 04-new revised by hall
Pp 04-new revised by hall
 
BlueBookAcademy.com - Working Capital Explained
BlueBookAcademy.com - Working Capital ExplainedBlueBookAcademy.com - Working Capital Explained
BlueBookAcademy.com - Working Capital Explained
 
Ais Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue CycleAis Romney 2006 Slides 10 The Revenue Cycle
Ais Romney 2006 Slides 10 The Revenue Cycle
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Audit of Revenue and Receipt Cycle
Audit of Revenue and Receipt CycleAudit of Revenue and Receipt Cycle
Audit of Revenue and Receipt Cycle
 
Overcoming the Top 7 Intercompany Accounting Challenges in SAP ERP Financials
Overcoming the Top 7 Intercompany Accounting Challenges in SAP ERP FinancialsOvercoming the Top 7 Intercompany Accounting Challenges in SAP ERP Financials
Overcoming the Top 7 Intercompany Accounting Challenges in SAP ERP Financials
 
Sap purchase-requisition-how-to
Sap purchase-requisition-how-toSap purchase-requisition-how-to
Sap purchase-requisition-how-to
 
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING pter 007 instru...
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING  pter 007 instru...PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING  pter 007 instru...
PURCHASING PROCEDURES, E-PROCUREMENT, AND SYSTEM CONTRACTING pter 007 instru...
 
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWAREAUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
AUTOMATING A PURCHASE REQUISITION PROCESS WITH BPM SOFTWARE
 
Procure to pay ppt
Procure to pay pptProcure to pay ppt
Procure to pay ppt
 
Procure to Pay Process
Procure to Pay Process Procure to Pay Process
Procure to Pay Process
 

Similar a Acc102 chap07 publisher_power_point

CH07 final accounting ifrs edition fraud
CH07 final accounting ifrs edition fraudCH07 final accounting ifrs edition fraud
CH07 final accounting ifrs edition fraudcindi73
 
fraud, internal control.ppt
fraud, internal control.pptfraud, internal control.ppt
fraud, internal control.pptmorium2
 
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptxRandyKuswanto
 
Chapter 4, Fundamentals of Accounting I (2).pptx
Chapter 4, Fundamentals of Accounting I (2).pptxChapter 4, Fundamentals of Accounting I (2).pptx
Chapter 4, Fundamentals of Accounting I (2).pptxKalkaye
 
B3 Fraud Intrnl Cntrl Presentation
B3 Fraud Intrnl Cntrl PresentationB3 Fraud Intrnl Cntrl Presentation
B3 Fraud Intrnl Cntrl PresentationMABSIV
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in bankssathyananda prabhu
 
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control, 1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control, SantosConleyha
 
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control, 1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control, BenitoSumpter862
 
The following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxThe following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxssuser454af01
 
Business risk, control systems and risk of fraud whitin bison hospitality ltd
Business risk, control systems and risk of fraud whitin bison hospitality ltdBusiness risk, control systems and risk of fraud whitin bison hospitality ltd
Business risk, control systems and risk of fraud whitin bison hospitality ltdSheik Shami Ullah Chowdhury
 
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz newUop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz newmybrands2
 
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz newUop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz newprathu09145
 
Week 5ACC 290 Week 5 DQ1(What is the Control Environment).docx.docx
Week 5ACC 290 Week 5 DQ1(What is the Control Environment).docx.docxWeek 5ACC 290 Week 5 DQ1(What is the Control Environment).docx.docx
Week 5ACC 290 Week 5 DQ1(What is the Control Environment).docx.docxmelbruce90096
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudFraudBusters
 
ECI Conference Presentation Ray Schick.ppt
ECI Conference Presentation Ray Schick.pptECI Conference Presentation Ray Schick.ppt
ECI Conference Presentation Ray Schick.pptnuredinabdella2
 
Auditor Independence And Financial Statements
Auditor Independence And Financial StatementsAuditor Independence And Financial Statements
Auditor Independence And Financial StatementsNatasha Barnett
 

Similar a Acc102 chap07 publisher_power_point (20)

1. chapter 7.pdf
1. chapter 7.pdf1. chapter 7.pdf
1. chapter 7.pdf
 
CH07 final accounting ifrs edition fraud
CH07 final accounting ifrs edition fraudCH07 final accounting ifrs edition fraud
CH07 final accounting ifrs edition fraud
 
fraud, internal control.ppt
fraud, internal control.pptfraud, internal control.ppt
fraud, internal control.ppt
 
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
6AtmfR33WBe0nQCWhvvFTq7MXQWdHS.pptx
 
ch08-200529002038.pptx
ch08-200529002038.pptxch08-200529002038.pptx
ch08-200529002038.pptx
 
Chapter 4, Fundamentals of Accounting I (2).pptx
Chapter 4, Fundamentals of Accounting I (2).pptxChapter 4, Fundamentals of Accounting I (2).pptx
Chapter 4, Fundamentals of Accounting I (2).pptx
 
B3 Fraud Intrnl Cntrl Presentation
B3 Fraud Intrnl Cntrl PresentationB3 Fraud Intrnl Cntrl Presentation
B3 Fraud Intrnl Cntrl Presentation
 
Fraud risk management in banks
Fraud risk management  in banksFraud risk management  in banks
Fraud risk management in banks
 
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control, 1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
 
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control, 1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
1114237 - Wiley US ©CHAPTER 7Fraud, Internal Control,
 
The following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docxThe following article is related to deterring employee fraud within .docx
The following article is related to deterring employee fraud within .docx
 
Business risk, control systems and risk of fraud whitin bison hospitality ltd
Business risk, control systems and risk of fraud whitin bison hospitality ltdBusiness risk, control systems and risk of fraud whitin bison hospitality ltd
Business risk, control systems and risk of fraud whitin bison hospitality ltd
 
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz newUop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
 
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz newUop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
Uop acc 491 week 2 ethics, legal liability, audit responsibilities quiz new
 
How to Get Embezzled
How to Get EmbezzledHow to Get Embezzled
How to Get Embezzled
 
Week 5ACC 290 Week 5 DQ1(What is the Control Environment).docx.docx
Week 5ACC 290 Week 5 DQ1(What is the Control Environment).docx.docxWeek 5ACC 290 Week 5 DQ1(What is the Control Environment).docx.docx
Week 5ACC 290 Week 5 DQ1(What is the Control Environment).docx.docx
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Auditing notes
Auditing notesAuditing notes
Auditing notes
 
ECI Conference Presentation Ray Schick.ppt
ECI Conference Presentation Ray Schick.pptECI Conference Presentation Ray Schick.ppt
ECI Conference Presentation Ray Schick.ppt
 
Auditor Independence And Financial Statements
Auditor Independence And Financial StatementsAuditor Independence And Financial Statements
Auditor Independence And Financial Statements
 

Más de Beulah Heights University (20)

Kotler mm 14e_22_ippt
Kotler mm 14e_22_ipptKotler mm 14e_22_ippt
Kotler mm 14e_22_ippt
 
Kotler mm 14e_21_ippt
Kotler mm 14e_21_ipptKotler mm 14e_21_ippt
Kotler mm 14e_21_ippt
 
Kotler mm 14e_20_ippt
Kotler mm 14e_20_ipptKotler mm 14e_20_ippt
Kotler mm 14e_20_ippt
 
Kotler mm 14e_19_ippt
Kotler mm 14e_19_ipptKotler mm 14e_19_ippt
Kotler mm 14e_19_ippt
 
Kotler mm 14e_18_ippt
Kotler mm 14e_18_ipptKotler mm 14e_18_ippt
Kotler mm 14e_18_ippt
 
Kotler mm 14e_17_ippt
Kotler mm 14e_17_ipptKotler mm 14e_17_ippt
Kotler mm 14e_17_ippt
 
Kotler mm 14e_16_ippt
Kotler mm 14e_16_ipptKotler mm 14e_16_ippt
Kotler mm 14e_16_ippt
 
Kotler mm 14e_15_ippt
Kotler mm 14e_15_ipptKotler mm 14e_15_ippt
Kotler mm 14e_15_ippt
 
Kotler mm 14e_14_ippt
Kotler mm 14e_14_ipptKotler mm 14e_14_ippt
Kotler mm 14e_14_ippt
 
Kotler mm 14e_13_ippt
Kotler mm 14e_13_ipptKotler mm 14e_13_ippt
Kotler mm 14e_13_ippt
 
Kotler mm 14e_12_ippt
Kotler mm 14e_12_ipptKotler mm 14e_12_ippt
Kotler mm 14e_12_ippt
 
Kotler mm 14e_11_ippt
Kotler mm 14e_11_ipptKotler mm 14e_11_ippt
Kotler mm 14e_11_ippt
 
Kotler mm 14e_10_ippt
Kotler mm 14e_10_ipptKotler mm 14e_10_ippt
Kotler mm 14e_10_ippt
 
Kotler mm 14e_09_ippt
Kotler mm 14e_09_ipptKotler mm 14e_09_ippt
Kotler mm 14e_09_ippt
 
Kotler mm 14e_08_ippt
Kotler mm 14e_08_ipptKotler mm 14e_08_ippt
Kotler mm 14e_08_ippt
 
Kotler mm 14e_07_ippt
Kotler mm 14e_07_ipptKotler mm 14e_07_ippt
Kotler mm 14e_07_ippt
 
Kotler mm 14e_04_ippt
Kotler mm 14e_04_ipptKotler mm 14e_04_ippt
Kotler mm 14e_04_ippt
 
Kotler mm 14e_03_ippt
Kotler mm 14e_03_ipptKotler mm 14e_03_ippt
Kotler mm 14e_03_ippt
 
Kotler mm 14e_01_ippt
Kotler mm 14e_01_ipptKotler mm 14e_01_ippt
Kotler mm 14e_01_ippt
 
Kotler mm 14e_02_ippt
Kotler mm 14e_02_ipptKotler mm 14e_02_ippt
Kotler mm 14e_02_ippt
 

Último

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Último (20)

YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Acc102 chap07 publisher_power_point

  • 1. 7-1
  • 3. 7-3 After studying this chapter, you should be able to: 1. Define fraud and internal control. 2. Identify the principles of internal control activities. 3. Explain the applications of internal control principles to cash receipts. 4. Explain the applications of internal control principles to cash disbursements. 5. Prepare a bank reconciliation. 6. Explain the reporting of cash. 7. Discuss the basic principles of cash management. 8. Identify the primary elements of a cash budget. Learning ObjectivesLearning ObjectivesLearning ObjectivesLearning Objectives
  • 4. 7-4 Preview of Chapter 7 Accounting Fifth Edition Kimmel Weygandt Kieso
  • 5. 7-5 Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Dishonest act by an employee that results in personal benefit to the employee at a cost to the employer. LO 1 Define fraud and internal control. Three factors that contribute to fraudulent activity. Illustration 7-1 Fraud
  • 6. 7-6  Applies to publicly traded U.S. corporations.  Required to maintain a system of internal control.  Corporate executives and boards of directors must ensure that these controls are reliable and effective.  Independent outside auditors must attest to the adequacy of the internal control system.  SOX created the Public Company Accounting Oversight Board (PCAOB). LO 1 Define fraud and internal control. Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control The Sarbanes-Oxley Act
  • 7. 7-7 Methods and measures adopted to: 1. Safeguard assets. 2. Enhance accuracy and reliability of accounting records. 3. Increase efficiency of operations. 4. Ensure compliance with laws and regulations. LO 1 Define fraud and internal control. Internal Control Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control
  • 8. 7-8 Five Primary Components: 1. Control environment. 2. Risk assessment. 3. Control activities. 4. Information and communication. 5. Monitoring. LO 1 Define fraud and internal control. Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Internal Control
  • 9. 7-9
  • 10. 7-10 Establishment of Responsibility  Control is most effective when only one person is responsible for a given task.  Establishing responsibility often requires limiting access only to authorized personnel, and then identifying those personnel. LO 2 Identify the principles of internal control activities. Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Principles of Internal Control Activities
  • 11. 7-11 Segregation of Duties  Different individuals should be responsible for related activities.  The responsibility for record- keeping for an asset should be separate from the physical custody of that asset. LO 2 Identify the principles of internal control activities. Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Principles of Internal Control Activities
  • 12. 7-12 Documentation Procedures  Companies should use prenumbered documents, and all documents should be accounted for.  Employees should promptly forward source documents for accounting entries to the accounting department. LO 2 Identify the principles of internal control activities. Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Principles of Internal Control Activities
  • 13. 7-13 LO 2 Identify the principles of internal control activities. Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Principles of Internal Control Activities Illustration 7-2 Physical Controls
  • 14. 7-14  Records periodically verified by an employee who is independent.  Discrepancies reported to management. LO 2 Identify the principles of internal control activities. Illustration 7-3 Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Independent Internal Verification Principles of Internal Control Activities
  • 15. 7-15 LO 2 Identify the principles of internal control activities. Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Principles of Internal Control Activities Human Resource Controls  Bond employees who handle cash.  Rotate employees’ duties and require vacations.  Conduct background checks.
  • 16. 7-16 The Missing Control Establishment of responsibility. The healthcare company did not adequately restrict the responsibility for authoring and approving claims transactions. The training supervisor should not have been authorized to create claims in the company’s “live” system. Total take: $11 million ANATOMY OF A FRAUD Maureen Frugali was a training supervisor for claims processing at Colossal Healthcare. As a standard part of the claims processing training program, Maureen created fictitious claims for use by trainees. These fictitious claims were then sent to the accounts payable department. After the training claims had been processed, she was to notify Accounts Payable of all fictitious claims, so that they would not be paid. However, she did not inform Accounts Payable about every fictitious claim. She created some fictitious claims for entities that she controlled (that is, she would receive the payment), and she let Accounts Payable pay her.
  • 17. 7-17 The Missing Control Segregation of duties. The university had not properly segregated related purchasing activities. Lawrence was ordering items, receiving the items, and receiving the invoice. By receiving the invoice, he had control over the documents that were used to account for the purchase and thus was able to substitute a fake invoice. Total take: $475,000 ANATOMY OF A FRAUD Lawrence Fairbanks, the assistant vice-chancellor of communications at Aesop University, was allowed to make purchases of under $2,500 for his department without external approval. Unfortunately, he also sometimes bought items for himself, such as expensive antiques and other collectibles. How did he do it? He replaced the vendor invoices he received with fake vendor invoices that he created. The fake invoices had descriptions that were more consistent with the communications department’s purchases. He submitted these fake invoices to the accounting department as the basis for their journal entries and to the accounts payable department as the basis for payment.
  • 18. 7-18 The Missing Control Segregation of duties. Aggasiz Construction Company did not properly segregate record-keeping from physical custody. Angela had physical custody of the checks, which essentially was control of the cash. She also had record- keeping responsibility because she prepared the bank reconciliation. Total take: $570,000 ANATOMY OF A FRAUD Angela Bauer was an accounts payable clerk for Aggasiz Construction Company. She prepared and issued checks to vendors and reconciled bank statements. She perpetrated a fraud in this way: She wrote checks for costs that the company had not actually incurred (e.g., fake taxes). A supervisor then approved and signed the checks. Before issuing the check, though, she would “white-out” the payee line on the check and change it to personal accounts that she controlled. She was able to conceal the theft because she also reconciled the bank account. That is, nobody else ever saw that the checks had been altered.
  • 19. 7-19 The Missing Control Documentation procedures. Mod Fashions should require the original, detailed receipt. It should not accept photocopies, and it should not accept credit card statements. In addition, documentation procedures could be further improved by requiring the use of a corporate credit card (rather than a personal credit card) for all business expenses. Total take: $75,000 ANATOMY OF A FRAUD To support their reimbursement requests for travel costs incurred, employees at Mod Fashions Corporation’s design center were required to submit receipts. The receipts could include the detailed bill provided for a meal, or the credit card receipt provided when the credit card payment is made, or a copy of the employee’s monthly credit card bill that listed the item. A number of the designers who frequently traveled together came up with a fraud scheme: They submitted claims for the same expenses. For example, if they had a meal together that cost $200, one person submitted the detailed meal bill, another submitted the credit card receipt, and a third submitted a monthly credit card bill showing the meal as a line item. Thus, all three received a $200 reimbursement.
  • 20. 7-20 The Missing Control Total take: $240,000 ANATOMY OF A FRAUD At Centerstone Health, a large insurance company, the mailroom each day received insurance applications from prospective customers. Mailroom employees scanned the applications into electronic documents before the applications were processed. Once the applications are scanned they can be accessed online by authorized employees. Insurance agents at Centerstone Health earn commissions based upon successful applications. The sales agent’s name is listed on the application. However, roughly 15% of the applications are from customers who did not work with a sales agent. Two friends—Alex, an employee in record keeping, and Parviz, a sales agent—thought up a way to perpetrate a fraud. Alex identified scanned applications that did not list a sales agent. After business hours, he entered the mailroom and found the hardcopy applications that did not show a sales agent. He wrote in Parviz’s name as the sales agent and then rescanned the application for processing. Parviz received the commission, which the friends then split.
  • 21. 7-21 The Missing Control Physical controls. Centerstone Health lacked two basic physical controls that could have prevented this fraud. First, the mailroom should have been locked during nonbusiness hours, and access during business hours should have been tightly controlled. Second, the scanned applications supposedly could be accessed only by authorized employees using their passwords. However, the password for each employee was the same as the employee’s user ID. Since employee user-ID numbers were available to all other employees, all employees knew all other employees’ passwords. Unauthorized employees could access the scanned applications. Thus, Alex could enter the system using another employee’s password and access the scanned applications. Total take: $240,000
  • 22. 7-22 The Missing Control Independent internal verification. Bobbi Jean’s boss should have verified her expense reports. When asked what he thought her expenses were, the boss said about $10,000. At $115,000 per year, her actual expenses were more than ten times what would have been expected. However, because he was “too busy” to verify her expense reports or to review the budget, he never noticed. Total take: $275,000 ANATOMY OF A FRAUD Bobbi Jean Donnelly, the office manager for Mod Fashions Corporations design center, was responsible for preparing the design center budget and reviewing expense reports submitted by design center employees. Her desire to upgrade her wardrobe got the better of her, and she enacted a fraud that involved filing expense-reimbursement requests for her own personal clothing purchases. She was able to conceal the fraud because she was responsible for reviewing all expense reports, including her own. In addition, she sometimes was given ultimate responsibility for signing off on the expense reports when her boss was “too busy.” Also, because she controlled the budget, when she submitted her expenses, she coded them to budget items that she knew were running under budget, so that they would not catch anyone’s attention.
  • 23. 7-23 The Missing Control Human resource controls. Ellen, the desk manager, had been fired by a previous employer. If the Excelsior Inn had conducted a background check, it would not have hired her. The fraud was detected when Ellen missed work due to illness. A system of mandatory vacations and rotating days off would have increased the chances of detecting the fraud before it became so large. Total take: $95,000 ANATOMY OF A FRAUD Ellen Lowry was the desk manager and Josephine Rodriquez was the head of housekeeping at the Excelsior Inn, a luxury hotel. The two best friends were so dedicated to their jobs that they never took vacations, and they frequently filled in for other employees. In fact, Ms. Rodriquez, whose job as head of housekeeping did not include cleaning rooms, often cleaned rooms herself, “just to help the staff keep up.” Ellen, the desk manager, provided significant discounts to guests who paid with cash. She kept the cash and did not register the guest in the hotel’s computerized system. Instead, she took the room out of circulation “due to routine maintenance.” Because the room did not show up as being used, it did not receive a normal housekeeping assignment. Instead, Josephine, the head of housekeeping, cleaned the rooms during the guests’ stay.
  • 24. 7-24
  • 25. 7-25  Costs should not exceed benefit.  Human element.  Size of the business. LO 2 Identify the principles of internal control activities. Fraud and Internal ControlFraud and Internal ControlFraud and Internal ControlFraud and Internal Control Limitations of Internal Control Helpful Hint Controls may vary with the risk level of the activity. For example, management may consider cash to be high risk and maintaining inventories in the stockroom as lower risk. Thus, management would have stricter controls for cash.
  • 26. 7-26 LO 3 Cash ControlsCash ControlsCash ControlsCash Controls Cash Receipt Controls Illustration 7-4
  • 27. 7-27 Illustration 7-4 LO 3 Cash ControlsCash ControlsCash ControlsCash Controls Cash Receipt Controls
  • 28. 7-28 Cash ControlsCash ControlsCash ControlsCash Controls Cash Receipt Controls Important internal control principle— segregation of record- keeping from physical custody. Over-the-Counter Receipts LO 3 Explain the applications of internal control principles to cash receipts. Illustration 7-5
  • 29. 7-29 Mail Receipts  Mail receipts should be opened by two people, a list prepared, and each check endorsed “For Deposit Only.”  Each mail clerk signs the list to establish responsibility for the data.  Original copy of the list, along with the checks, is sent to the cashier’s department.  Copy of the list is sent to the accounting department for recording. Clerks also keep a copy. LO 3 Explain the applications of internal control principles to cash receipts. Cash ControlsCash ControlsCash ControlsCash Controls Cash Receipt Controls
  • 30. 7-30 Permitting only designated personnel to handle cash receipts is an application of the principle of: a. segregation of duties. b. establishment of responsibility. c. independent check. d. other controls. Review Question LO 3 Explain the applications of internal control principles to cash receipts. Cash ControlsCash ControlsCash ControlsCash Controls
  • 31. 7-31 Generally, internal control over cash disbursements is more effective when companies pay by check or electronic funds transfer (EFT) rather than by cash. Applications:  Voucher System Controls  Petty Cash Fund (Appendix 7A) LO 4 Explain the applications of internal control principles to cash disbursements. Cash ControlsCash ControlsCash ControlsCash Controls Cash Disbursement Controls
  • 32. 7-32 Illustration 7-6 LO 4 Cash ControlsCash ControlsCash ControlsCash Controls Cash Disbursement Controls
  • 33. 7-33 Illustration 7-6 LO 4 Cash ControlsCash ControlsCash ControlsCash Controls Cash Disbursement Controls
  • 34. 7-34 The use of prenumbered checks in disbursing cash is an application of the principle of: a. establishment of responsibility. b. segregation of duties. c. physical, mechanical, and electronic controls. d. documentation procedures. Review Question LO 4 Explain the applications of internal control principles to cash disbursements. Cash ControlsCash ControlsCash ControlsCash Controls
  • 35. 7-35 Voucher System  A network of approvals by authorized individuals, acting independently, to ensure all disbursements by check are proper.  A voucher is an authorization form prepared for each expenditure in a voucher system. LO 4 Explain the applications of internal control principles to cash disbursements. Cash ControlsCash ControlsCash ControlsCash Controls Cash Disbursement Controls
  • 36. 7-36
  • 37. 7-37 The use of a bank contributes significantly to good internal control over cash.  Minimizes the amount of currency on hand.  Creates a double record of bank transactions.  Bank reconciliation. LO 5 Prepare a bank reconciliation. Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank Helpful Hint Essentially, the bank statement is a copy of the bank’s records sent to the customer or made available online for review.
  • 38. 7-38 Debit Memorandum  Bank service charge.  NSF (not sufficient funds). Illustration 7-7 Credit Memorandum  Collect notes receivable.  Interest earned. Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank Bank Statements LO 5 Prepare a bank reconciliation.
  • 39. 7-39 The control features of a bank account do not include: a. having bank auditors verify the correctness of the bank balance per books. b. minimizing the amount of cash that must be kept on hand. c. providing a double record of all bank transactions. d. safeguarding cash by using a bank as a depository. Review Question Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank LO 5 Prepare a bank reconciliation.
  • 40. 7-40 Reconcile balance per books and balance per bank to their “correct or true” balance. Reconciling Items: 1. Deposits in transit. 2. Outstanding checks. 3. Bank memoranda. 4. Errors. Time Lags Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank Reconciling the Bank Account LO 5 Prepare a bank reconciliation.
  • 41. 7-41 Reconciliation Procedures + Deposit in Transit - Outstanding Checks +/- Bank Errors + Notes collected by bank - NSF (bounced) checks - Check printing or other service charges +/- Company Errors CORRECT BALANCE CORRECT BALANCE Illustration 7-8 Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank LO 5 Prepare a bank reconciliation.
  • 42. 7-42 LO 5 Prepare a bank reconciliation. Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
  • 43. 7-43 Illustration: Prepare a bank reconciliation at April 30. LO 5 Prepare a bank reconciliation. Cash balance per bank statement $15,907.45 Deposit in transit 2,201.40 Outstanding checks (5,904.00) Adjusted cash balance per bank $12,204.85 Cash balance per books $11,589.45 Collection of notes receivable 1,035.00 Error in check No. 443 36.00 NSF check (425.60) Bank service charge (30.00) Adjusted cash balance per books $12,204.85 Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
  • 44. 7-44 Collection of Note Receivable: Assuming interest of $50 has not been accrued and collection fee is charged to Miscellaneous Expense, the entry is: Cash 1,035.00Apr. 30 Miscellaneous expense 15.00 Notes receivable 1,000.00 Interest revenue 50.00 LO 5 Prepare a bank reconciliation. Entries From Bank Reconciliation Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
  • 45. 7-45 Book Error: The cash disbursements journal shows that check no. 443 was a payment on account to Andrea Company, a supplier. The correcting entry is: Cash 36.00Apr. 30 Accounts payable 36.00 LO 5 Prepare a bank reconciliation. NSF Check: As indicated earlier, an NSF check becomes an account receivable to the depositor. The entry is: Accounts receivable 425.60Apr. 30 Cash 425.60 Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
  • 46. 7-46 Bank Service Charges: Depositors debit check printing charges (DM) and other bank service charges (SC) to Miscellaneous Expense. The entry is: Miscellaneous expense 30.00Apr. 30 Cash 30.00 LO 5 Prepare a bank reconciliation. Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank Illustration 7-10
  • 47. 7-47 The reconciling item in a bank reconciliation that will result in an adjusting entry by the depositor is: a. outstanding checks. b. deposit in transit. c. a bank error. d. bank service charges. Review Question LO 5 Prepare a bank reconciliation. Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank
  • 48. 7-48  Disbursement systems that uses wire, telephone, or computers to transfer cash balances between locations.  EFT transfers normally result in better internal control since no cash or checks are handled by company employees. LO 5 Prepare a bank reconciliation. Control Features: Use of a BankControl Features: Use of a BankControl Features: Use of a BankControl Features: Use of a Bank Electronic Funds Transfer (EFT) System
  • 49. 7-49
  • 50. 7-50 Sally Kist owns Linen Kist Fabrics. Sally asks you to explain how she should treat the following reconciling items when reconciling the company’s bank account: (1) a debit memorandum for an NSF check, (2) a credit memorandum for a note collected by the bank, (3) outstanding checks, and (4) a deposit in transit. Sally should treat the reconciling items as follows. (1) NSF check: Deduct from balance per books. (2) Collection of note: Add to balance per books. (3) Outstanding checks: Deduct from balance per bank. (4) Deposit in transit: Add to balance per bank. LO 5 Solution
  • 51. 7-51 Cash equivalents are short-term, highly liquid investments that are both: 1. Readily convertible to known amounts of cash, and 2. So near their maturity that their market value is relatively insensitive to changes in interest rates. LO 6 Explain the reporting of cash. Reporting CashReporting CashReporting CashReporting Cash Cash Equivalents Cash that is not available for general use but rather is restricted for a special purpose. Restricted Cash
  • 52. 7-52 Illustration 7-11 LO 6 Explain the reporting of cash. Reporting CashReporting CashReporting CashReporting Cash
  • 53. 7-53 Which of the following statements correctly describes the reporting of cash? a. Cash cannot be combined with cash equivalents. b. Restricted cash funds may be combined with Cash. c. Cash is listed first in the current assets section. d. Restricted cash funds cannot be reported as a current asset. LO 6 Explain the reporting of cash. Review Question Reporting CashReporting CashReporting CashReporting Cash
  • 54. 7-54 Illustration 7-12 Operating Cycle of a Merchandising Company LO 7 Discuss the basic principles of cash management. Managing and Monitoring CashManaging and Monitoring CashManaging and Monitoring CashManaging and Monitoring Cash
  • 55. 7-55 Illustration 7-13 Basic Principles of Cash Management LO 7 Managing and Monitoring CashManaging and Monitoring CashManaging and Monitoring CashManaging and Monitoring Cash
  • 56. 7-56 Cash Budget ► Shows anticipated cash flows, usually over a one- to two- year period. ► Contributes to more effective cash management. LO 8 Identify the primary elements of a cash budget. Managing and Monitoring CashManaging and Monitoring CashManaging and Monitoring CashManaging and Monitoring Cash
  • 57. 7-57 Involves: 1. establishing the fund, 2. making payments from the fund, and 3. replenishing the fund. Petty Cash Fund - Used to pay small amounts. LO 9 Explain the operation of a petty cash fund. Operation of the Petty Cash Fund Appendix 7AAppendix 7AAppendix 7AAppendix 7A Ethics Note Internal control over a petty cash fund is strengthened by: (1) having a supervisor make surprise counts of the fund to confirm whether the paid petty cash receipts and fund cash equal the fund amount, and (2) canceling or mutilating the paid petty cash receipts so they cannot be resubmitted for reimbursement.
  • 58. 7-58 Illustration: If Laird Company decides to establish a $100 fund on March 1, the entry is: Petty cash 100March 1 Cash 100 LO 9 Explain the operation of a petty cash fund. Operation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash Fund
  • 59. 7-59 Illustration: On March 15 the petty cash custodian requests a check for $87. The fund contains $13 cash and petty cash receipts for postage $44, supplies $38, and miscellaneous expenses $5. The entry is: Postage expense 44March 15 Cash 87 Supplies 38 Miscellaneous expense 5 Operation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash Fund LO 9 Explain the operation of a petty cash fund.
  • 60. 7-60 Illustration: Assume in the preceding example that the custodian had only $12 in cash in the fund plus the receipts as listed. The request for reimbursement would therefore be for $88. The entry is: Cash over and short 1 Cash 88 Operation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash FundOperation of the Petty Cash Fund LO 9 Explain the operation of a petty cash fund. Postage expense 44March 15 Supplies 38 Miscellaneous expense 5
  • 61. 7-61 Key Points  The fraud triangle discussed in this chapter is applicable to all international companies. Some of the major frauds on an international basis are Parmalat (Italy), Royal Ahold (the Netherlands), and Satyam Computer Services (India).  Rising economic crime poses a growing threat to companies, with nearly half of all organizations worldwide being victims of fraud in a recent two-year period (PricewaterhouseCoopers’ Global Economic Crime Survey, 2005). Specifically, 44% of Romanian companies surveyed experienced fraud in the past two years. LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS.
  • 62. 7-62 Key Points  Globally, the number of companies reporting fraud increased from 37% to 45% since 2003, a 22% increase. The cost to companies was an average $1.7 million in losses from “tangible frauds,” that is, those that result in an immediate and direct financial loss. These include asset misappropriation, false pretenses, and counterfeiting (PricewaterhouseCoopers’ Global Economic Crime Survey, 2005). LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS.
  • 63. 7-63 Key Points  Accounting scandals both in the United States and internationally have re-ignited the debate over the relative merits of GAAP, which takes a “rules-based” approach to accounting, versus IFRS, which takes a “principles-based” approach. The FASB announced that it intends to introduce more principles-based standards.  Internal controls are a system of checks and balances designed to prevent and detect fraud and errors. While most companies have these systems in place, many have never completely documented them, nor had an independent auditor attest to their effectiveness. Both of these actions are required under SOX. LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS.
  • 64. 7-64 Key Points  Companies find that internal control review is a costly process but badly needed. One study estimates the cost of SOX compliance for U.S. companies at over $35 billion, with audit fees doubling in the first year of compliance. At the same time, examination of internal controls indicates lingering problems in the way companies operate. One study of first compliance with the internal control testing provisions documented material weaknesses for about 13% of companies reporting in a two-year period (PricewaterhouseCoopers’ Global Economic Crime Survey, 2005). LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS.
  • 65. 7-65 Key Points  The SOX internal control standards apply only to companies listed on U.S. exchanges. There is continuing debate over whether foreign issuers should have to comply with this extra layer of regulation.  The accounting and internal control procedures related to cash are essentially the same under both IFRS and this textbook. In addition, the definition used for cash equivalents is the same.  Most companies report cash and cash equivalents together under IFRS, as shown in this textbook. In addition, IFRS follows the same accounting policies related to the reporting of restricted cash. LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS.
  • 66. 7-66 Key Points  IFRS defines cash and cash equivalents as follows. ► Cash is comprised of cash on hand and demand deposits. ► Cash equivalents are short-term, highly liquid investments that are readily convertible to known amounts of cash and which are subject to an insignificant risk of changes in value.  Under IFRS, cash and cash equivalents are often shown last in the statement of financial position. LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS.
  • 67. 7-67 Looking to the Future Different cultures have different perspectives on bribery and other questionable activities, and consequently penalties for engaging in such activities vary considerably across countries. High-quality international accounting requires both high-quality accounting standards and high- quality auditing. Similar to the convergence of GAAP and IFRS, there is movement to improve international auditing standards. The International Auditing and Assurance Standards Board (IAASB) works to establish high quality auditing and assurance and quality-control standards throughout the world. Whether the IAASB adopts internal control provisions similar to those in SOX remains to be seen. You can follow developments in the international audit arena at http://www.ifac.org/iaasb/. LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS.
  • 68. 7-68 IFRS Practice LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS. Non-U.S companies that follow IFRS: a) do not normally use the principles of internal control activities used in this textbook. b) often offset cash with accounts payable on the balance sheet. c) are not required to follow SOX. d) None of the above.
  • 69. 7-69 IFRS Practice LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS. Which of the following is the correct accounting under IFRS for cash? a) Cash cannot be combined with cash equivalents. b) Restricted cash funds may be reported as a current or non- current asset depending on the circumstances. c) Restricted cash funds cannot be reported as a current asset. d) Cash on hand is not reported on the balance sheet as Cash.
  • 70. 7-70 IFRS Practice LO 10 Compare the accounting procedures for fraud, internal control, and cash under GAAP and IFRS. The Sarbanes Oxley Act of 2002 applies to: a) all U.S. companies listed on U.S. exchanges. b) all companies that list stock on any stock exchange in any country. c) all European companies listed on European exchanges. d) Both (a) and (c).
  • 71. 7-71 “Copyright © 2013 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.” CopyrightCopyrightCopyrightCopyright