Internal Control Cases
UTICA LIGHTING COMPANY (CENTRALIZED SYSTEM WITH DISTRIBUTED TERMINALS)
Utica Lighting Company (ULC) is a manufacturer of outdoor lighting systems for patios, walkways, and public areas. It markets its product to landscaping companies and local municipalities. ULC employs a centralized computer system with distributed terminals in the various departments. Recently the company has been having manufacturing delays and cost overruns. ULC has hired your auditing firm to assess its operations and internal control procedures.
ULC’s conversion cycle is triggered by a report from the finished goods warehouse. The warehouse clerk periodically reviews the inventory records in a search for low-stock items. When the quantity on hand of an inventory item in the finished goods warehouse falls below its pre-established minimum, the warehouse clerk sends a digital inventory status report from the warehouse terminal to production planning and control advising them to schedule a production batch run for the item in question.
Upon receipt of the report the production planning and control department clerk accesses the digital bill of materials and the routing sheet files for the items to be produced and adds the production details to the digital production schedule. The system automatically adds a record to the open work order file and sends a digital work order to the work center supervisor’s terminal and to the cost accounting clerk’s terminal.
The work center supervisor accesses the work order from his terminal and prints hard-copy move tickets and material requisitions for each stage in the production process. Production employees take the materials requisitions to the storekeeper and secure the components, subassemblies, and raw materials needed to perform their production tasks. If excess materials beyond the standard amount are needed, the supervisor prepares additional materials requisitions. The employees also complete job time tickets after each stage in the process to reflect the time spent on the job. When the employees complete their tasks, they send the move tickets and time tickets to the cost accounting department.
The storekeeper receives the materials requisitions and releases the materials into production. He then updates the raw material inventory records and sends the requisition to cost accounting. When inventories of component parts and raw materials fall to their reorder points, the storekeeper prepares purchase orders and sends them to the respective vendors. Vendors deliver raw material inventories directly to the storeroom, at which time the storeroom clerk inspects them and updates the digital raw materials subsidiary ledger. Each day the storekeeper prepares a journal voucher and posts to the general ledger raw material control account.
The cost
At the day’s end, the cost accounting clerk prepares a digital journal voucher reflecting the WIP status and any transfers from WIP to finished goods inventory. The clerk then posts the journal voucher to the WEP and FG general ledger control accounts.
Required
- a. Prepare a data flow diagram of the current system.
- b. Prepare a system flowchart of the existing system.
- c. Describe the internal control weaknesses.
Trending nowThis is a popular solution!
Chapter 7 Solutions
Accounting Information Systems
- Identify Control Weaknesses and Recommendations. Georgia Beemster, CPA, is examining the financial statements of the Louisville Sales Corporation, which recently installed acomputerized processing system. The following comments have been extracted from Beemster’s notes on computer operations and the processing and control of shipping notices andcustomer invoices:∙ To minimize inconvenience, Louisville made the conversion to the new accounting information system without changing its existing system. The vendor supervised the conversion andtrained all computer department employees in systems design, operations, and programming.∙ Each computer run is assigned to a specific employee who is responsible for makingprogram changes, running the program, and answering questions. This procedure hasthe advantage of eliminating the need for records of computer operations because eachemployee is responsible for her or his own computer runs.∙ At least one computer department employee remains in the…arrow_forwardWarehouse operations have shut down at SHXCX Manufacturing suddenly due to a power outage. Warehouse managers are still able to communicate with their home office and their data servers, but unfortunately have no prepared solution to restoring operations. Which of the following controls would be best suited to combat this problem? Select one: O a. Validity test O b. Business Continuity Plan (BCP) c. Disaster Recovery Plan (DRP) d. Both B and Carrow_forwardPlease answer 1, 2 and 3.arrow_forward
- You are currently working in a mid-tier accounting firm. In an engagement meeting with a client, the management of your client is concerned that the audit tests that you perform will disrupt operations. Your client has recently implemented a data warehouse and the management suggests that you draw the data for analytical reviews and substantive testing from the data warehouse instead of the operational database. The management points out that operational data are copied weekly into the data warehouse and all data you need are contained there. Q. Outline your response to the management’s proposal and mention any concerns you might have.arrow_forwardYou are currently working in a mid-tier accounting firm. In an engagement meeting with a client, the management of your client is concerned that the audit tests that you perform will disrupt operations.Your client has recently implemented a data warehouse and the management suggests that you draw the data for analytical reviews and substantive testing from the data warehouse instead of theoperational database. The management points out that operational data are copied weekly into thedata warehouse and all data you need are contained there. Outline your response to the management’s proposal and mention any concerns you might have.arrow_forwardwhat is the potential consequences and give each of the question a prevention technique. 1)A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. 2)Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. 3)Matt discovered a new sensitivity analysis public-domain program on the Internet. He downloaded the software to his laptop at…arrow_forward
- Blackmon Company provides locator services to the city transportation departments. Blackmons service involves installing a dedicated hardware transmitter in each city bus. This transmitter provides real-time information to a central logistics center that provides a manager with detailed information as to bus location, speed, current weather, and traffic patterns. The manager can then reroute buses to improve efficiency of operations and increase customer satisfaction. Customers generally sign two separate contracts: one contract governs the sale of the hardware devices, while the second governs the provision of the locator services. On January 1, 2019, a customer purchased Blackmons service by signing a contract for 100 devices for 480,000, the normal selling price. In addition, the customer signed a separate 12-month service contract for 2,000 per month (20 per month per unit, which is the standard selling price for the service). This amount is billed on a monthly basis, and the customer pays for January service on January 31, 2019. The hardware device can only be used with Blackmons services and there are currently no other competitors making devices that work with the Blackmon service. The customer may cancel at any time; however, the amount paid for the device is nonrefundable. The customer is given the right to renew the service contract at the existing rate each December, and the average life of a customer contract is 5 years. The customer takes delivery of the device on January 1, 2019, and begins the locator service on that date. Required: 1. Identify the contract(s) for accounting purposes. 2. How many performance obligations exist? When will the performance obligation(s) be satisfied? 3. Prepare Blackmons journal entries for January 2019. 4. Assume that other competitors sell a similar locator service comparable to Blackmons. Would this fact change your previous answers?arrow_forwardThe internal audit department of a manufacturing company conducted a routine examination of the company’s distributed computer facilities. The auditor’s report was critical of the lack of coordination in the purchase of PC systems and software that individual departments use.Several different hardware platforms, operating systems, spreadsheet packages, database systems, and networking applications were in use.In response to the internal audit report, and without consulting with department users regarding their current and future systems needs, Marten, the Vice President of Information Services, issued a memorandum to all employees stating the following new policies:1. The Micromanager Spreadsheet package was selected to be the standard for the company, and all employees must immediately switch to it within the month.2. All future PC purchases must be Megasoft compatible.3. All departments must convert to the Megasoft Entree database package.4. The office of the Vice President of…arrow_forwardYou have been appointed as head of newly created internal audit section within the computer department of a large food wholesaler. The department has a number of operational systems, some on line and some batch processing and a central corporate database. A significant effort is currently being devoted to new systems developments. Your first task is to review the various types of controls which exist in the department and its computer systems. Required: (a) Elaborate on what you are looking for in your review in order to effectively perform an audit of a computer department as described above. Apply the relevant use of computer assisted auditing techniques in analysis. [15] (b) State any computer assisted techniques are available, and where you might use them?arrow_forward
- One of your Firm’s Managers, Colin Cronen is responsible for the auditing the financial statements of the Roman Corporation, which has a batch-processing IT-based system for shipping and invoicing that it purchased from a software vendor. The following comments have been extracted from Cronen’s notes on IT operations and the processing and control of shipping notices and customer invoices. Each type of computer run is assigned to a specific employee who is responsible for making program changes, running the program, and answering questions. This procedure has the advantage of eliminating the need for records of IT operations because each employee is responsible for his or her own computer runs. At least one IT department employee remains in the computer room during office hours, and only IT department employees have keys to the computer room. The corporation considered the desirability of program controls but decided to retain the manual controls in place prior to the conversion to the…arrow_forwardLee Wong, CPA, is auditing the financial statements of the Alexandria Corporation, which has a batch-processing IT-based system for shipping and invoicing that it purchased from a software vendor. The following comments have been extracted from Wong’s notes on IT operations and the processing and control of shipping notices and customer invoices. Each type of computer run is assigned to a specific employee who is responsible for making program changes, running the program, and answering questions. This procedure has the advantage of eliminating the need for records of IT operations because each employee is responsible for his or her own computer runs. At least one IT department employee remains in the computer room during office hours, and only IT department employees have keys to the computer room. The corporation considered the desirability of program controls but decided to retain the manual controls in place prior to the conversion to the software vendor’s system. Company products…arrow_forwardListed here are four scenarios. For each scenario, discuss the potential consequences and give a prevention technique. a) A company has recently installed a new computer network. The operating philosophy adopted by the new network administrator was to establish an open system that would foster work group date to the network users. To accomplish this objective, the data administrator assigned employee access privileges to data based on department and functional affiliation rather than specific tasks. b) Sara is a system programmer who was told she would be terminated in three weeks due to poor performance and was asked to conclude all of her projects during the three-week period. Two weeks later Sara created a logic bomb designed to get activated three months after her departure. Subsequently, the bomb destroyed hundreds of records in her previous employer’s accounts receivable invoice file. c) Matt discovered a new sensitivity analysis public-domain program on the Internet. He…arrow_forward
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Cornerstones of Cost Management (Cornerstones Ser...AccountingISBN:9781305970663Author:Don R. Hansen, Maryanne M. MowenPublisher:Cengage LearningIntermediate Accounting: Reporting And AnalysisAccountingISBN:9781337788281Author:James M. Wahlen, Jefferson P. Jones, Donald PagachPublisher:Cengage Learning
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningPkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L