Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations.
The following are the some of the internal control procedures:
- Competent personnel, rotating duties, and mandatory vacations
- Separating responsibilities for related operations
- Separating operations, custody of assets, and accounting
- Proofs and security measures
To state: The general weakness in SG’s internal controls contributed to the occurrence and size of losses.
Trending nowThis is a popular solution!
Chapter 8 Solutions
Bundle: Accounting, 27th Edition, Loose-leaf Version + Cengagenowv2, 1 Term Printed Access
- 18.During an audit of a retail company, Lily, newly hired internal auditor, found a scheme in which the warehouse manager and a purchasing staff diverted approximately Php2 million worth of goods to an outside warehouse, the sold the goods to third parties. The fraud was not found earlier by the internal audit team since the warehouse manager updated the perpetual inventory records and then forwarded receiving reports to the accounts payable department for processing. Which of the following procedures did Lily perform which would have most likely led to the discovery of the missing materials and the fraud? Group of answer choices Random sampling of receiving reports and tracing to the recording in the perpetual inventory records. Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department. Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory records. Random…arrow_forwardWhen in an examination of a retail firm, Lily, a recently recruited internal auditor, discovered a plan in which the warehouse manager and a buying staff moved around Php2 million worth of products to an outside warehouse, where they were sold to third parties. Because the warehouse manager changed the perpetual inventory records and subsequently transmitted receiving reports to the accounts payable department for processing, the fraud was not discovered earlier by the internal audit team. Which one of the following steps did Lily follow that resulted in the discovery of the missing materials and the fraud? Group of answer choicesRandom sampling of receiving reports and tracing to the recording in the perpetual inventory records.Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department.Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory…arrow_forwardWorldCom committed the largest fraud in U.S. history. What was the primary method WorldCom’s management used to carry out the fraud?arrow_forward
- Assume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forwardSeveral years ago, Prudential Securities was charged with fraud for late trading. This was the first major brokerage house to be charged with the illegal practice of buying mutual funds after hours. The regulators who accused Prudential Securities charged them with carrying out a large-scale, late-trading scheme that involved more than 1,212 trades that were valued at a remarkable $162.4 million. These trades were placed after hours in order to benefit favored hedge funds. The complaint did not contain information regarding any profits that were protected by the scandal. The regulators who accused Prudential stated that Prudential should have noticed the considerable number of trades that were being placed after 4 p.m. and should have begun an internal inquiry. However, the complaint stated that Prudential possessed “no internal supervisory procedures” to detect trades placed after hours. Market timing, often done in conjunction with late trading, involves rapid in and out…arrow_forwardSummarize the alleged fraud List which management assertions were violated In your opinion, what component(s) of the COSO framework were weak/missing? If you were to audit FTX’s cash, name 1-2 procedure(s) that you could have done to detect this fraudFOR Defendant concealed his diversion of FTX customers’ funds to crypto trading firm Alameda Research while raising more than $1.8 billion from investors The Securities and Exchange Commission today charged Samuel Bankman-Fried with orchestrating a scheme to defraud equity investors in FTX Trading Ltd. (FTX), the crypto trading platform of which he was the CEO and co-founder. Investigations as to other securities law violations and into other entities and persons relating to the alleged misconduct are ongoing. According to the SEC’s complaint, since at least May 2019, FTX, based in The Bahamas, raised more than $1.8 billion from equity investors, including approximately $1.1 billion from approximately 90 U.S.-based investors. In his…arrow_forward
- A client operates two plants. In Plant A, throughout the entire cutoff test window, all sales have been recorded as FOB shipping point. In Plant B, all sales have been recorded as FOB shipping point in the cutoff window prior to year-end and either FOB shipping point or FOB destination in the cutoff window subsequent to year end. Which plant would an auditor judge to have higher fraud risk? Question 27 options: Plant A would have higher fraudulent financial reporting risk than Plant B. Plant B would have higher risk of the misappropriation of assets than Plant A. Plant A would have higher risk of the misappropriation of assets than Plant B. Plant B would have higher fraudulent financial reporting risk than Plant A.arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forwardIn a recent financial fraud case, city employees in Brooklyn, New York, accessed electronic databases to defraud the city of $20 million. Several employees in collusion with the former deputy tax collector completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills. Required Discuss the control techniques that could prevent or detect this fraud.arrow_forward
- Subsequently Discovered Facts. On June 1, Sidney Faultless of A. J. Faultless & Co., CPAs, noticed some disturbing information about the firm’s client, Hopkirk Company. A story in the local paper mentioned the indictment of Tony Baker, whom Faultless knew as the assistant controller at Hopkirk. The charge was mail fraud. Faultless made discreet inquiries with the controller at Hopkirk’s headquarters and learned that Baker had been speculating in foreign currency futures. In fact, part of Baker’s work at Hopkirk involved managing the company’s foreign currency. Unfortunately, Baker had violated company policy, lost a small amount of money, and then decided to speculate some more, lost some more, and eventually lost $7 million of company funds. The mail fraud was involved in Baker’s attempt to cover his activity until he recovered the original losses. Most of the events were in process on March 1, when Faultless had signed and dated the unmodified opinion on Hopkirk’s financial…arrow_forwardRead the following information and then answer questions a & b below: Assume you are an internal auditor for a large, multinational, manufacturing organization with a division in Mexico. One of your responsibilities is to investigate allegations made on the company’s fraud hotline. When you arrive at work one morning you learn an anonymous tip was left on the hotline that alleges fraud involving the division manager. “Pat’s significant other is a fraudulent vendor,” was the anonymous tip left on your company’s fraud hotline. Pat is a division manager at your company. “Wow. I can’t believe this guy is so blatant,” you are thinking as you review some accounts payable invoices while following up on this anonymous tip. A quick search of the AP file reveals a total of three invoices like the one, all for identical amounts but on different dates. The division manager, Pat, has the authority to approve payment of invoices for less than $10,000. It is obvious to you that the manager has…arrow_forwardThe Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…arrow_forward
- College Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAuditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub