Accounting
27th Edition
ISBN: 9781285149165
Author: WARREN
Publisher: CENGAGE C
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8.5EX
To determine
Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations.
The following are the some of the internal control procedures:
- Competent personnel, rotating duties, and mandatory vacations
- Separating responsibilities for related operations
- Separating operations, custody of assets, and accounting
- Proofs and security measures
To state: The general weakness in SG’s internal controls contributed to the occurrence and size of losses.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Internal Controls
One of the largest losses in history from unauthorized securities trading involved a securities trader for the French bank, Societe Generale. The trader was able to circumvent internal controls and create more than $7 billion in trading losses in six months. The trader apparently escaped detection by using knowledge of the bank's internal control systems learned from a previous back-office monitoring job. Much of this monitoring involved the use of software to monitor trades. In addition, traders were usually kept to tight trading limits. Apparently, these controls failed in this case.
Answer the following True or False questions about Societe Generale's internal controls. These will assist you in determining the weaknesses.
1. The loss could have been avoided with a number of internal controls.
2. Required vacation time may have alerted managers to the hidden losses.
3. If traders have access to the monitoring software, then the separation of duties control is…
One of the largest losses in history from unauthorized securities trading involved a securities trader for the French bank Societe Generale. The trader was able to circumvent internal controls and create more than $7 billion in trading losses in six months. The trader apparently escaped detection by using knowledge of the bank’s internal control systemslearned from a previous back-office monitoring job. Much of this monitoring involved the use of software to monitor trades. In addition, traders were usually kept to tight trading limits. Apparently, these controls failed in this case.What general weaknesses in Societe Generale’s internal controls contributed to the occurrence and size of the losses?
Computer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…
Chapter 8 Solutions
Accounting
Ch. 8 - Prob. 1DQCh. 8 - Why should the employee who handles cash receipts...Ch. 8 - Prob. 3DQCh. 8 - Why should the responsibility for maintaining the...Ch. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - The balance of Cash is likely to differ from the...Ch. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - (a) How are cash equivalents reported in the...
Ch. 8 - Internal control elements Identify each of the...Ch. 8 - Prob. 8.1BPECh. 8 - Prob. 8.2APECh. 8 - Prob. 8.2BPECh. 8 - Prob. 8.3APECh. 8 - Prob. 8.3BPECh. 8 - Prob. 8.4APECh. 8 - Prob. 8.4BPECh. 8 - Prob. 8.5APECh. 8 - Prob. 8.5BPECh. 8 - Sarbanes-Oxley internal control report Using...Ch. 8 - Prob. 8.2EXCh. 8 - Prob. 8.3EXCh. 8 - Prob. 8.4EXCh. 8 - Prob. 8.5EXCh. 8 - Prob. 8.6EXCh. 8 - Prob. 8.7EXCh. 8 - Prob. 8.8EXCh. 8 - Prob. 8.9EXCh. 8 - Prob. 8.10EXCh. 8 - Prob. 8.11EXCh. 8 - Entry for cash sales; cash short The actual cash...Ch. 8 - Entry for cash sales; cash over The actual cash...Ch. 8 - Internal control of cash payments Abbe Co. is a...Ch. 8 - Prob. 8.15EXCh. 8 - Prob. 8.16EXCh. 8 - Prob. 8.17EXCh. 8 - Prob. 8.18EXCh. 8 - Prob. 8.19EXCh. 8 - Prob. 8.20EXCh. 8 - Prob. 8.21EXCh. 8 - Prob. 8.22EXCh. 8 - Prob. 8.23EXCh. 8 - Prob. 8.24EXCh. 8 - Prob. 8.25EXCh. 8 - Cash to monthly cash expenses ratio El Dorado Inc....Ch. 8 - Prob. 8.27EXCh. 8 - Prob. 8.28EXCh. 8 - Prob. 8.1APRCh. 8 - Prob. 8.2APRCh. 8 - Prob. 8.3APRCh. 8 - Prob. 8.4APRCh. 8 - Prob. 8.5APRCh. 8 - Prob. 8.1BPRCh. 8 - Prob. 8.2BPRCh. 8 - Prob. 8.3BPRCh. 8 - Prob. 4BPRCh. 8 - Prob. 5BPRCh. 8 - Ethics in Action Tehra Dactyl is an accountant for...Ch. 8 - Ethics in Action During the preparation of the...Ch. 8 - Prob. 8.5CPCh. 8 - Prob. 8.6CPCh. 8 - Prob. 8.7CPCh. 8 - Prob. 8.8CPCh. 8 - Prob. 8.9CP
Knowledge Booster
Similar questions
- 18.During an audit of a retail company, Lily, newly hired internal auditor, found a scheme in which the warehouse manager and a purchasing staff diverted approximately Php2 million worth of goods to an outside warehouse, the sold the goods to third parties. The fraud was not found earlier by the internal audit team since the warehouse manager updated the perpetual inventory records and then forwarded receiving reports to the accounts payable department for processing. Which of the following procedures did Lily perform which would have most likely led to the discovery of the missing materials and the fraud? Group of answer choices Random sampling of receiving reports and tracing to the recording in the perpetual inventory records. Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department. Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory records. Random…arrow_forwardHannaford is a national grocery chain whose electronic payment processing system was breached by hackers as early as December 7, 2007. The hackers stole up to 4.2 million credit and debit card numbers, expiration dates, and security codes, but did not steal customer names. On February 27, 2008, Visa Inc. notified Hannaford that Hannaford’s system had been breached. Hannaford discovered the means of access on March 8, 2008, and contained the breach on March 10, 2008. Hannaford gave notice to certain financial institutions on March 10, 2008. On March 17, 2008, “Hannaford publicly announced for the first time that between December 7, 2007 and March 10, 2008, the security of its information technology systems had been breached, leading to the theft of as many as 4.2 million debit card and credit card numbers belonging to individuals who had made purchases at more than 270 of its stores.” It also announced “that it had already received reports of approximately 1,800 cases of fraud resulting…arrow_forwardSubsequently Discovered Facts. On June 1, Sidney Faultless of A. J. Faultless & Co., CPAs, noticed some disturbing information about the firm’s client, Hopkirk Company. A story in the local paper mentioned the indictment of Tony Baker, whom Faultless knew as the assistant controller at Hopkirk. The charge was mail fraud. Faultless made discreet inquiries with the controller at Hopkirk’s headquarters and learned that Baker had been speculating in foreign currency futures. In fact, part of Baker’s work at Hopkirk involved managing the company’s foreign currency. Unfortunately, Baker had violated company policy, lost a small amount of money, and then decided to speculate some more, lost some more, and eventually lost $7 million of company funds. The mail fraud was involved in Baker’s attempt to cover his activity until he recovered the original losses. Most of the events were in process on March 1, when Faultless had signed and dated the unmodified opinion on Hopkirk’s financial…arrow_forward
- Internal Controls An employee of JHT Co., a private trucking company, was responsible for resolving roadway accident claims under $25,000. The employee created fake accident claims and wrote settlement checks between $5,000 and $25,000 to friends or acquaintances acting as phony “victims.” One friend recruited subordinates at his place of business to cash some of the checks. In addition, the JHT employee also recruited lawyers, who he paid to represent both the trucking company and the fake victims in the bogus accident settlements. When the lawyers cashed the checks, they allegedly split the money with the corrupt JHT employee. This fraud went undetected for two years. Please answer the following questions: What weaknesses in internal control contributed to this fraud? Why would it take so long to discover such a fraud? What control procedures should be changed to prevent such fraud?arrow_forwardInternal Controls An employee of JHT Co., a private trucking company, was responsible for resolving roadway accident claims under $25,000. The employee created fake accident claims and wrote settlement checks between $5,000 and $25,000 to friends or acquaintances acting as phony “victims.” One friend recruited subordinates at his place of business to cash some of the checks. In addition, the JHT employee also recruited lawyers, who he paid to represent both the trucking company and the fake victims in the bogus accident settlements. When the lawyers cashed the checks, they allegedly split the money with the corrupt JHT employee. This fraud went undetected for two years. Please answer the following question: What control procedures should be changed to prevent such fraud?arrow_forwardA client operates two plants. In Plant A, throughout the entire cutoff test window, all sales have been recorded as FOB shipping point. In Plant B, all sales have been recorded as FOB shipping point in the cutoff window prior to year-end and either FOB shipping point or FOB destination in the cutoff window subsequent to year end. Which plant would an auditor judge to have higher fraud risk? Question 27 options: Plant A would have higher fraudulent financial reporting risk than Plant B. Plant B would have higher risk of the misappropriation of assets than Plant A. Plant A would have higher risk of the misappropriation of assets than Plant B. Plant B would have higher fraudulent financial reporting risk than Plant A.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub