ASAP M Tute10 Answers Guide
ASAP M Tute10 Answers Guide
ASAP M Tute10 Answers Guide
BEFORE TUTORIAL 10
1 Read the material indicated below and attempt answers to the questions that
follow.
Material to read:
MyUni>
Data Analytics – Microsoft Power BI Material>
Topic 9 – Creating smart narrative summaries.pdf
Students are expected to learn basic hands-on skills to carry out these tasks.
Students are expected to attempt tasks in this document before the tute and raise
questions about issues encountered during the tute.
Question 1
Employees with access to cash should not have the responsibility for recording or
authorizing transactions involving its receipt. Explain the pair of duties that should be
segregated in this regard.
Question 2
What internal control procedure(s) would provide protection against the following
threats?
If the transactions are being entered online, closed loop verification could
be used. The system could respond to the operator entering the account
number by retrieving and displaying the customer's name for the operator
to review.
If the transactions are being entered in batches, redundant data such as the
first five characters of the customer's name could be included in each input
record; after finding a match on customer account number, the system
would also verify that the name characters match before posting the
transaction.
Note that a validity check would only tell you if a valid customer number
was entered, not if the correct valid customer number was entered.
Likewise, check digit verification could tell you if the customer number
existed, but not if it was the right customer number.
The problem usually occurs because the same individual writes off
accounts and processes cash payments. Therefore, the best control
procedure to prevent this problem is to separate the function of authorizing
write-offs of uncollectible accounts from the function of handling
collections on account.
d. Theft of cash by a waiter who destroyed the customer sales ticket for
customers who paid cash.
In many restaurant systems, waiters cannot get food out of the kitchen
without entering a customer order into the system. The system creates a
prenumbered sales document that must be cleared by the waiter that day.
This prevents the waiter from destroying sales tickets and giving people
free food.
These systems also are capable of some reasonableness tests such as:
Use of barcodes and RFID tags to identify the product and sales price
Kickbacks, which are gifts from suppliers to purchasing agents for the
purpose of influencing their choice of suppliers, are another threat. For the
kickback to make economic sense, the supplier must find some way to recover
the money spent on the bribe. This usually is accomplished by inflating the
price of subsequent purchases or by substituting goods of inferior quality.
Even if neither of these problems occurs, kickbacks impair the buyer’s
objectivity.
To prevent kickbacks, companies should prohibit purchasing agents from
accepting any gifts from potential or existing suppliers. (Trinkets that are
clearly of inconsequential value may be allowed.) These policies should apply
not only to gifts of tangible goods, but also to services. For example, meeting
planners should be informed that it is against company policy to accept
frequent-traveler points from hotels for booking the company’s meetings
there. Training employees how to respond to unsolicited “gifts” from suppliers
is also important, because many kickback schemes are initiated when unethical
suppliers send such “tokens of appreciation,” usually in the form of cash, to
unwary employees. Once the employee accepts the gift, the supplier threatens
to disclose the payment to a supervisor unless the employee makes additional
purchases from that supplier.
Job rotation is another important control to reduce the risk of kickbacks:
Purchasing agents should not deal with the same suppliers indefinitely,
because doing so increases the risk that they may succumb to the constant
temptations offered by an unethical supplier. If the organization is too small to
rotate job duties across different purchasing agents, it should periodically
conduct a detailed audit of the purchasing agent’s activities. Purchasing agents
should also be required to take their allotted vacation time each year, because
many frauds are discovered when the perpetrator is absent and unable to
continue covering up the illicit activity.
Finally, purchasing agents should be required to sign annual conflict of
interest statements, (control 11.3) disclosing any financial interests they may
have in current or potential suppliers. Kickbacks are difficult to prevent, so
detective controls are also necessary. One particularly effective detection
control is the supplier audit. Supplier audits may be one of the best tools for
assessing the effectiveness of expenditure cycle controls. It entails having an
internal auditor visit a supplier’s office to check its records. The objective is to
identify suppliers likely to be associated with problems such as kickbacks. Red
flags that indicate potential problems include:
1. A large percentage of the supplier’s gross sales was to the company
conducting the supplier audit.
2. The supplier’s pricing methods differ from standard industry practice.
3. The supplier does not own the equipment it rents, but is itself renting that
equipment from a third party.
4. Entertainment expenses are high in terms of a percentage of the supplier’s
gross sales.
5. The supplier submits altered or fictitious third-party invoices.
6. The supplier’s address on its invoices is fictitious. Supplier audits can yield
substantial returns. One company recovered more than $250,000 for such
problems as duplicate billings. Supplier audits also often uncover violations of
the company’s conflict of interest policy. Interestingly, many suppliers support
DURING TUTORIAL 10