Accounting
27th Edition
ISBN: 9781337272094
Author: WARREN, Carl S., Reeve, James M., Duchac, Jonathan E.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 8.5EX
To determine
Internal Control: Internal control refers to the policies, and plans of the business organization along with other measures with a view to safeguard its assets, encourage the employees to adhere to the plans, to improve on the operational efficiency, and to ensure correct and reliable accounting information. Internal control is a process which ensures continuous reliability of accomplishment of a company’s objectives, related to operations, financial reporting, and in conformity with laws and regulations.
The following are the some of the internal control procedures:
- Competent personnel, rotating duties, and mandatory vacations
- Separating responsibilities for related operations
- Separating operations, custody of assets, and accounting
- Proofs and security measures
To state: The general weakness in SG’s internal controls contributed to the occurrence and size of losses.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
One of the largest losses in history from unauthorized securities trading involved a securities trader for the French bank Societe Generale. The trader was able to circumvent internal controls and create more than $7 billion in trading losses in six months. The trader apparently escaped detection by using knowledge of the bank’s internal control systemslearned from a previous back-office monitoring job. Much of this monitoring involved the use of software to monitor trades. In addition, traders were usually kept to tight trading limits. Apparently, these controls failed in this case.What general weaknesses in Societe Generale’s internal controls contributed to the occurrence and size of the losses?
Internal Controls
One of the largest losses in history from unauthorized securities trading involved a securities trader for the French bank, Societe Generale. The trader was able to circumvent internal controls and create more than $7 billion in trading losses in six months. The trader apparently escaped detection by using knowledge of the bank's internal control systems learned from a previous back-office monitoring job. Much of this monitoring involved the use of software to monitor trades. In addition, traders were usually kept to tight trading limits. Apparently, these controls failed in this case.
Answer the following True or False questions about Societe Generale's internal controls. These will assist you in determining the weaknesses.
1. The loss could have been avoided with a number of internal controls.
2. Required vacation time may have alerted managers to the hidden losses.
3. If traders have access to the monitoring software, then the separation of duties control is…
Hannaford is a national grocery chain whose electronic payment processing system was breached by hackers as early as December 7, 2007. The hackers stole up to 4.2 million credit and debit card numbers, expiration dates, and security codes, but did not steal customer names. On February 27, 2008, Visa Inc. notified Hannaford that Hannaford’s system had been breached. Hannaford discovered the means of access on March 8, 2008, and contained the breach on March 10, 2008. Hannaford gave notice to certain financial institutions on March 10, 2008. On March 17, 2008, “Hannaford publicly announced for the first time that between December 7, 2007 and March 10, 2008, the security of its information technology systems had been breached, leading to the theft of as many as 4.2 million debit card and credit card numbers belonging to individuals who had made purchases at more than 270 of its stores.” It also announced “that it had already received reports of approximately 1,800 cases of fraud resulting…
Chapter 8 Solutions
Accounting
Ch. 8 - Prob. 1DQCh. 8 - Why should the employee who handles cash receipts...Ch. 8 - Prob. 3DQCh. 8 - Why should the responsibility for maintaining the...Ch. 8 - Prob. 5DQCh. 8 - Prob. 6DQCh. 8 - The balance of Cash is likely to differ from the...Ch. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - (a) How are cash equivalents reported in the...
Ch. 8 - Internal control elements Identify each of the...Ch. 8 - Prob. 8.1BPECh. 8 - Prob. 8.2APECh. 8 - Prob. 8.2BPECh. 8 - Prob. 8.3APECh. 8 - Prob. 8.3BPECh. 8 - Prob. 8.4APECh. 8 - Prob. 8.4BPECh. 8 - Prob. 8.5APECh. 8 - Prob. 8.5BPECh. 8 - Sarbanes-Oxley internal control report Using...Ch. 8 - Prob. 8.2EXCh. 8 - Prob. 8.3EXCh. 8 - Prob. 8.4EXCh. 8 - Prob. 8.5EXCh. 8 - Prob. 8.6EXCh. 8 - Prob. 8.7EXCh. 8 - Prob. 8.8EXCh. 8 - Prob. 8.9EXCh. 8 - Prob. 8.10EXCh. 8 - Prob. 8.11EXCh. 8 - Entry for cash sales; cash short The actual cash...Ch. 8 - Entry for cash sales; cash over The actual cash...Ch. 8 - Internal control of cash payments Abbe Co. is a...Ch. 8 - Prob. 8.15EXCh. 8 - Prob. 8.16EXCh. 8 - Prob. 8.17EXCh. 8 - Prob. 8.18EXCh. 8 - Prob. 8.19EXCh. 8 - Prob. 8.20EXCh. 8 - Prob. 8.21EXCh. 8 - Prob. 8.22EXCh. 8 - Prob. 8.23EXCh. 8 - Prob. 8.24EXCh. 8 - Prob. 8.25EXCh. 8 - Cash to monthly cash expenses ratio El Dorado Inc....Ch. 8 - Prob. 8.27EXCh. 8 - Prob. 8.28EXCh. 8 - Prob. 8.1APRCh. 8 - Prob. 8.2APRCh. 8 - Prob. 8.3APRCh. 8 - Prob. 8.4APRCh. 8 - Prob. 8.5APRCh. 8 - Prob. 8.1BPRCh. 8 - Prob. 8.2BPRCh. 8 - Prob. 8.3BPRCh. 8 - Prob. 4BPRCh. 8 - Prob. 5BPRCh. 8 - Ethics in Action Tehra Dactyl is an accountant for...Ch. 8 - Ethics in Action During the preparation of the...Ch. 8 - Prob. 8.5CPCh. 8 - Prob. 8.6CPCh. 8 - Prob. 8.7CPCh. 8 - Prob. 8.8CPCh. 8 - Prob. 8.9CP
Knowledge Booster
Similar questions
- 18.During an audit of a retail company, Lily, newly hired internal auditor, found a scheme in which the warehouse manager and a purchasing staff diverted approximately Php2 million worth of goods to an outside warehouse, the sold the goods to third parties. The fraud was not found earlier by the internal audit team since the warehouse manager updated the perpetual inventory records and then forwarded receiving reports to the accounts payable department for processing. Which of the following procedures did Lily perform which would have most likely led to the discovery of the missing materials and the fraud? Group of answer choices Random sampling of receiving reports and tracing to the recording in the perpetual inventory records. Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department. Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory records. Random…arrow_forwardWhen in an examination of a retail firm, Lily, a recently recruited internal auditor, discovered a plan in which the warehouse manager and a buying staff moved around Php2 million worth of products to an outside warehouse, where they were sold to third parties. Because the warehouse manager changed the perpetual inventory records and subsequently transmitted receiving reports to the accounts payable department for processing, the fraud was not discovered earlier by the internal audit team. Which one of the following steps did Lily follow that resulted in the discovery of the missing materials and the fraud? Group of answer choicesRandom sampling of receiving reports and tracing to the recording in the perpetual inventory records.Selecting a random sample of purchase orders and trace to receiving reports and to the records in the accounts payable department.Performance of physical inventory count, then reconciliation of the amounts with the perpetual inventory…arrow_forwardAssume that brooke miles accounts payable clerk for west coast design inc.stole $48,350 by paying fictitious companies and cashed the checks at a local banks. Describe a control procedure that would have prevented or detected the fraud?arrow_forward
- Several years ago, Prudential Securities was charged with fraud for late trading. This was the first major brokerage house to be charged with the illegal practice of buying mutual funds after hours. The regulators who accused Prudential Securities charged them with carrying out a large-scale, late-trading scheme that involved more than 1,212 trades that were valued at a remarkable $162.4 million. These trades were placed after hours in order to benefit favored hedge funds. The complaint did not contain information regarding any profits that were protected by the scandal. The regulators who accused Prudential stated that Prudential should have noticed the considerable number of trades that were being placed after 4 p.m. and should have begun an internal inquiry. However, the complaint stated that Prudential possessed “no internal supervisory procedures” to detect trades placed after hours. Market timing, often done in conjunction with late trading, involves rapid in and out…arrow_forwardSummarize the alleged fraud List which management assertions were violated In your opinion, what component(s) of the COSO framework were weak/missing? If you were to audit FTX’s cash, name 1-2 procedure(s) that you could have done to detect this fraudFOR Defendant concealed his diversion of FTX customers’ funds to crypto trading firm Alameda Research while raising more than $1.8 billion from investors The Securities and Exchange Commission today charged Samuel Bankman-Fried with orchestrating a scheme to defraud equity investors in FTX Trading Ltd. (FTX), the crypto trading platform of which he was the CEO and co-founder. Investigations as to other securities law violations and into other entities and persons relating to the alleged misconduct are ongoing. According to the SEC’s complaint, since at least May 2019, FTX, based in The Bahamas, raised more than $1.8 billion from equity investors, including approximately $1.1 billion from approximately 90 U.S.-based investors. In his…arrow_forwardComputer Frauds and Missing Control Procedures. The following are brief stories ofactual employee thefts and embezzlements perpetrated in an IT environment.Required:What type of control procedure that might have prevented or detected the fraud was missingor inoperative?a. An accounts payable terminal operator at a subsidiary entity fabricated false invoicesfrom a fictitious vendor and entered them in the parent entity’s central accounts payable/cash disbursement system. Five checks totaling $155,000 were issued to the “vendor.”b. A bank provided custodial and record-keeping services for several mutual funds. Aproof-and-control department employee substituted his own name and account numberfor those of the actual purchasers of some shares. He used the accounting informationsystem to conceal and shift balances from his name and account to names and accountsof the actual investors when he needed to avoid detection because of missing amounts inthe investors’ accounts.c. The university’s…arrow_forward
- In a recent financial fraud case, city employees in Brooklyn, New York, accessed electronic databases to defraud the city of $20 million. Several employees in collusion with the former deputy tax collector completely erased or reduced $13 million in property taxes and $7 million in accrued interest that taxpayers owed. In exchange for this service, the taxpayers paid the employees involved bribes of 10 to 30 percent of their bills. Required Discuss the control techniques that could prevent or detect this fraud.arrow_forwardSubsequently Discovered Facts. On June 1, Sidney Faultless of A. J. Faultless & Co., CPAs, noticed some disturbing information about the firm’s client, Hopkirk Company. A story in the local paper mentioned the indictment of Tony Baker, whom Faultless knew as the assistant controller at Hopkirk. The charge was mail fraud. Faultless made discreet inquiries with the controller at Hopkirk’s headquarters and learned that Baker had been speculating in foreign currency futures. In fact, part of Baker’s work at Hopkirk involved managing the company’s foreign currency. Unfortunately, Baker had violated company policy, lost a small amount of money, and then decided to speculate some more, lost some more, and eventually lost $7 million of company funds. The mail fraud was involved in Baker’s attempt to cover his activity until he recovered the original losses. Most of the events were in process on March 1, when Faultless had signed and dated the unmodified opinion on Hopkirk’s financial…arrow_forwardRead the following information and then answer questions a & b below: Assume you are an internal auditor for a large, multinational, manufacturing organization with a division in Mexico. One of your responsibilities is to investigate allegations made on the company’s fraud hotline. When you arrive at work one morning you learn an anonymous tip was left on the hotline that alleges fraud involving the division manager. “Pat’s significant other is a fraudulent vendor,” was the anonymous tip left on your company’s fraud hotline. Pat is a division manager at your company. “Wow. I can’t believe this guy is so blatant,” you are thinking as you review some accounts payable invoices while following up on this anonymous tip. A quick search of the AP file reveals a total of three invoices like the one, all for identical amounts but on different dates. The division manager, Pat, has the authority to approve payment of invoices for less than $10,000. It is obvious to you that the manager has…arrow_forward
- The Perfect Crime? Consider the following story of an actual embezzlement.This was the ingenious embezzler’s scheme: (a) He hired a print shop to print a private stock of Ajax Company checks in the company’s numerical sequence. (b) In his job as an accounts payable clerk at Ajax, he intercepted legitimate checks written by the accounts payable department and signed by the Ajax treasurer and destroyed them. (c) He substituted thesame numbered check from the private stock, payable to himself in the same amount as the legitimate check, and he “signed” it with a rubber stamp that looked enough like the Ajax Company treasurer’s signature to fool the paying bank. (d) He deposited the money in his own bank account. The bank statement reconciler (a different person) was able to agree the check numbers and amounts listed in the cleared items in the bank statement to the recorded cash disbursement (check number and amount) and thus did not notice the embezzler’s scheme.The embezzler was able to…arrow_forward6-73. MiniScribe FRAUD As reported in the Wall Street Journal (September 11, 1989), MiniScribe, Inc., inflated its reported profits and inventory through a number of schemes designed to fool the auditors. At that time, MiniScribe was one of the major producers of disk drives for personal computers. The newspaper article reported that MiniScribe used the following techniques to meet its profit objectives: An extra shipment of $9 million of disks was sent to a customer near year-end and booked as a sale. The customer had not ordered the goods and ultimately returned them, but the sale was not reversed in the year recorded. Shipments were made from a factory in Singapore, usually by air freight. Toward the end of the year, some of the goods were shipped by cargo ships. The purchase orders were changed to show that the customer took title when the goods were loaded on the ship. However, title did not pass to the customer until the goods were received in the U.S. Returned goods were…arrow_forwardJane Ellerby and Sam Callison are discussing the recent fraud that occurred at LowRental Leasing, Inc. The fraud involved the improper reporting of revenue to ensure that the company would have income in excess of $1 million. What is fraudulent financial reporting, and how does it differ from an embezzlement of company funds?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Accounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningCollege Accounting, Chapters 1-27AccountingISBN:9781337794756Author:HEINTZ, James A.Publisher:Cengage Learning,
- Auditing: A Risk Based-Approach to Conducting a Q...AccountingISBN:9781305080577Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:South-Western College Pub
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
College Accounting, Chapters 1-27
Accounting
ISBN:9781337794756
Author:HEINTZ, James A.
Publisher:Cengage Learning,
Auditing: A Risk Based-Approach to Conducting a Q...
Accounting
ISBN:9781305080577
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:South-Western College Pub