Im the ignt col- umn. More than one control may be applicable. Threat Control Procedure 1. Failing to take available purchase discounts for a. Accept only deliveries for which an ap- proved purchase order exists. prompt payment 2. Recording and posting erors in accounts payable b. Document all transfers of inventory. 3. Paying for items not received c. Restrict physical access to inventory. 4. Kickbacks 5. Theft of inventory d. File invoices by due date. e. Maintain a cash budget.

FINANCIAL ACCOUNTING
10th Edition
ISBN:9781259964947
Author:Libby
Publisher:Libby
Chapter1: Financial Statements And Business Decisions
Section: Chapter Questions
Problem 1Q
icon
Related questions
Question
6. Paying the same invoice
twice
f. Conduct an automated comparison of
total change in cash to total changes in
accounts payable.
7. Stockouts
g. Adopt a perpetual inventory system.
8. Purchasing items at
inflated prices
h. Require purchasing agents to dis-
close financial or personal interests in
suppliers.
9. Misappropriation of cash
i. Require purchases to be made only from
approved suppliers.
j. Restrict access to the supplier master
10. Purchasing goods of
inferior quality
11. Wasted time and cost
k. Restrict access to blank checks.
of returning unordered
merchandise to suppliers
1. Issue checks only for complete voucher
packages (receiving report, supplier
invoice, and purchase order).
12. Accidental loss of
purchasing data
13. Disclosure of sensitive
supplier information (e.g.
banking data)
m. Cancel or mark "Paid" supporting docu-
ments in voucher package when check is
issued.
n. Carry out a regular backup of expenditure
cycle database.
o. Train employees in how to properly
respond to gifts or incentives offered by
suppliers.
p. Hold purchasing managers responsible
for costs of scrap and rework.
q. Ensure that someone other than the ca-
shier reconciles bank accounts.
Transcribed Image Text:6. Paying the same invoice twice f. Conduct an automated comparison of total change in cash to total changes in accounts payable. 7. Stockouts g. Adopt a perpetual inventory system. 8. Purchasing items at inflated prices h. Require purchasing agents to dis- close financial or personal interests in suppliers. 9. Misappropriation of cash i. Require purchases to be made only from approved suppliers. j. Restrict access to the supplier master 10. Purchasing goods of inferior quality 11. Wasted time and cost k. Restrict access to blank checks. of returning unordered merchandise to suppliers 1. Issue checks only for complete voucher packages (receiving report, supplier invoice, and purchase order). 12. Accidental loss of purchasing data 13. Disclosure of sensitive supplier information (e.g. banking data) m. Cancel or mark "Paid" supporting docu- ments in voucher package when check is issued. n. Carry out a regular backup of expenditure cycle database. o. Train employees in how to properly respond to gifts or incentives offered by suppliers. p. Hold purchasing managers responsible for costs of scrap and rework. q. Ensure that someone other than the ca- shier reconciles bank accounts.
13.4 Match the threats in the left column to appropriate control procedures in the right col-
umn. More than one control may be applicable.
Threat
Control Procedure
1. Failing to take available
purchase discounts for
prompt payment
a. Accept only deliveries for which an ap-
proved purchase order exists.
b. Document all transfers of inventory.
2 Recording and posting
eIrors in accounts payable
3. Paying for items not
c. Restrict physical access to inventory.
received
4. Kickbacks
d. File invoices by due date.
5. Theft of inventory
e. Maintain a cash budget.
Transcribed Image Text:13.4 Match the threats in the left column to appropriate control procedures in the right col- umn. More than one control may be applicable. Threat Control Procedure 1. Failing to take available purchase discounts for prompt payment a. Accept only deliveries for which an ap- proved purchase order exists. b. Document all transfers of inventory. 2 Recording and posting eIrors in accounts payable 3. Paying for items not c. Restrict physical access to inventory. received 4. Kickbacks d. File invoices by due date. 5. Theft of inventory e. Maintain a cash budget.
Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Control Procedures
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, accounting and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
FINANCIAL ACCOUNTING
FINANCIAL ACCOUNTING
Accounting
ISBN:
9781259964947
Author:
Libby
Publisher:
MCG
Accounting
Accounting
Accounting
ISBN:
9781337272094
Author:
WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.
Publisher:
Cengage Learning,
Accounting Information Systems
Accounting Information Systems
Accounting
ISBN:
9781337619202
Author:
Hall, James A.
Publisher:
Cengage Learning,
Horngren's Cost Accounting: A Managerial Emphasis…
Horngren's Cost Accounting: A Managerial Emphasis…
Accounting
ISBN:
9780134475585
Author:
Srikant M. Datar, Madhav V. Rajan
Publisher:
PEARSON
Intermediate Accounting
Intermediate Accounting
Accounting
ISBN:
9781259722660
Author:
J. David Spiceland, Mark W. Nelson, Wayne M Thomas
Publisher:
McGraw-Hill Education
Financial and Managerial Accounting
Financial and Managerial Accounting
Accounting
ISBN:
9781259726705
Author:
John J Wild, Ken W. Shaw, Barbara Chiappetta Fundamental Accounting Principles
Publisher:
McGraw-Hill Education