Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations. The following are the some of the internal control procedures:
- Competent personnel, rotating duties, and mandatory vacations
- Separating responsibilities for related operations
- Separating operations, custody of assets, and accounting
- Proofs and security measures
To state: The general internal control weakness contributed to the fraud.
Want to see the full answer?
Check out a sample textbook solutionChapter 7 Solutions
Bundle: Financial & Managerial Accounting, Loose-leaf Version, 13th + CengageNOWv2, 1 term (6 months) Printed Access Card Corporate Financial ... Access Card for Managerial Accounting, 13th
- There are several elements to internal controls. Which of the following would not address the issue of having cash transactions reported in the accounting records? A. One employee would have access to the cash register. B. The cash drawer should be closed out, and cash and the sales register should be reconciled on a prenumbered form. C. Ask customers to report to a manager if they do not receive a sales receipt or invoice. D. The person behind the cash register should also be responsible for making price adjustments.arrow_forwardAnswer Please@@@arrow_forward1. What does it mean to say that internal control has limitations and what are these limitations? 2. Provide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented? 3. What is petty cash and what purpose(s) does it serve? 4. What types of controls should be in place to make sure people in the office don't just take from petty cash (for their own personal use) whenever they feel like it? In your opinion, what is an appropriate amount to have in petty cash? 5. Prepare the necessary journal entries for each of the following: (a) On March 1, issued a check to establish a petty cash fund of $1,410 (b)…arrow_forward
- Paragon Tech Company, a communications equipment manufacturer, recently fell victim to a fraud scheme developed by one of its employees. To understand the scheme, it is necessary to review Paragon Tech’s procedures for the purchase of services. The purchasing agent is responsible for ordering services (such as repairs to a photocopy machine or office cleaning) after receiving a service requisition from an authorizedmanager. However, because no tangible goods are delivered, a receiving report is not prepared. When the Accounting Department receives an invoice billing Paragon Tech for a service call, the accounts payable clerk calls the manager who requested the service in order to verify that it was performed.The fraud scheme involves Mae Jansma, the manager of plant and facilities. Mae arranged for her uncle’s company, Radiate Systems, to be placed on Paragon Tech’s approved vendor list. Mae did not disclose the family relationship. On several occasions, Mae would submit a requisition…arrow_forwardDidrikson Rubin, the auditor of Red Barn Farm Equipment, was verifying cash payments to vendors for the past several months. She noticed that several checks had been paid to a specific vendor, but she couldn’t find a record of the transactions in the computerized system. Didrikson suspects that an employee is issuing checks to a fictitious “vendor” and then deleting the transactions from the computerized system. How might Didrikson investigate the suspected fraud?arrow_forwardFor each of the following three independent cases of employee fraud, recommend how to prevent similar problems in the future: Case A: Due to abnormal inventory shrinkage in the audiovisual department at a retail chain store, internal auditors conducted an in- depth audit of the department. They learned that a customer frequently bought large numbers of small electronic components from a certain cashier. The auditors discovered that they had colluded to steal electronic components by not recording the sale of items the customer took from the store. Case B: During an unannounced audit, auditors discovered a payroll fraud when they distributed paychecks instead of department supervisors. When the auditors investigated an unclaimed paycheck, they discovered that the employee quit four months previously after arguing with the supervisor. The supervisor continued to turn in a time card for the employee and pocketed his check. Case C: Auditors discovered an accounts payable clerk who made…arrow_forward
- Allison Everhart, an employee in accounts payable, believes she can run a fictitious invoice through the accounts payable system and collect the money. She knows payments are subject to an audit. Which account would be the best place to hide the fraud?a. Inventory.b. Wage expense.c. Consulting service expense.d. Property tax expense.arrow_forwardAssume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardYou are the auditor for Office Supply, which is opening a new location next week. The store manager has established all the controls you recommended for ensuring that sales are recorded properly, and cash is accounted for. The manager has heard from other locations that employees often used returned goods as a means of skimming money from the register. Choose one of the following questions to discuss: How might an employee use returned goods to skim money from the register? What controls would you recommend to prevent or detect fraudulent returns? What audit procedures might you perform to detect fraudulent returns?arrow_forward
- You are a fraud examiner and have been hired by Blackman Company to carry out an investigation. Blackman is a beverage company that has experienced increased shipments of beverages but no increase in revenue. Management suspects that inventory is being shipped to unknown places or is being stolen.How would you use invigilation to help you determine whether inventory is being stolen or shipped to unknown locations? Briefly explain how you would carry out this investigative procedure.arrow_forwardWhat internal control procedure(s) would provide protection against the following threats? a. Theft of goods by the shipping dock workers, who claim that the inventory shortages reflect errors in the inventory records.b. Posting the sales amount to the wrong customer account because a customer account number was incorrectly keyed into the system .c. Making a credit sale to a customer who is already four months behind in making payments on his account. d. Authorizing a credit memo for a sales return when the goods were never actually returned. e. Writing off a customer’s accounts receivable balance as uncollectible to conceal the theft of subsequent cash payments from that customer. f. Billing customers for the quantity ordered when the quantity shipped was actually less due to back ordering of some items .g. Lost sales because of stockouts of several products for which the computer records indicated there was adequate quantity on hand. h. A sales clerk sold a $7,000 wide-screen TV…arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forward
- Principles of Accounting Volume 1AccountingISBN:9781947172685Author:OpenStaxPublisher:OpenStax CollegeCollege Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Financial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage Learning