AIS - Chapter 3
AIS - Chapter 3
➢ Corruption Skimming
● Involves an executive, manager, or ● Stealing cash from an organization
employee of the organization in before it is recorded on the
collusion with an outsider. organization’s books and records.
● Example: mail room fraud in which
Four principal types of corruption: an employee opening the mail steals
1. Bribery - involves giving, offering, a customer’s check and destroys the
soliciting, or receiving things of value associated remittance advice. By
to influence an official in the destroying the remittance advice, no
performance of his or her lawful evidence of the cash receipt exists.
duties. Officials may be employed by
government (or regulatory) agencies Cash Larceny
or by private organizations. Bribery ● Involves schemes in which cash
defrauds the entity (business receipts are stolen from an
organization or government agency) organization after they have been
of the right to honest and loyal recorded in the organization’s books
services from those employed by it. and records.
● Example: Lapping
2. Illegal gratuity - involves giving,
receiving, offering, or soliciting Billing Schemes
something of value because of an ● Also known as vendor fraud, are
official act that has been taken. This perpetrated by employees who
causes their employer to issue a Payroll Fraud
payment to a false supplier or ● The distribution of fraudulent
vendor by submitting invoices for paychecks to existent and/or
fictitious goods or services, inflated nonexistent employees.
invoices, or invoices for personal ● The fraud works best in organizations
purchases. in which the supervisor is responsible
for distributing paychecks to
Three examples of billing scheme: employees. The supervisor may
1. Shell company fraud - first intercept the paycheck, forge the
requires that the perpetrator former employee’s signature, and
establish a false supplier on the cash it.
books of the victim company. The
fraudster then manufactures false Expense Reimbursement Frauds
purchase orders, receiving reports, ● Schemes in which an employee
and invoices in the name of the makes a claim for reimbursement of
vendor and submits them to the fictitious or inflated business
accounting system, which creates expenses.
the allusion of a legitimate
transaction. Based on these Thefts of Cash
documents, the system will set up an ● Schemes that involve the direct theft
account payable and ultimately issue of cash on hand in the organization.
a check to the false supplier (the
fraudster). Non-Cash Misappropriations
● Non-cash fraud schemes involve the
2. Pass through fraud - similar to the theft or misuse of the victim
shell company fraud with the organization’s non-cash assets.
exception that a transaction actually
takes place. The false vendor Computer Fraud
charges the victim company a much ● Because computers lie at the heart
higher than market price for the of modern accounting information
items, but pays only the market price systems, the topic of computer fraud
to the legitimate vendor. The is of importance to auditors.
difference is the profit that the Although the fundamental structure
perpetrator pockets. of fraud is unchanged by computers-
fraudulent statements, corruption,
3. Pay-and-return scheme - This and asset misappropriation-
typically involves a clerk with check computers do add complexity to the
writing authority who pays a vendor fraud picture.
twice for the same products
(inventory or supplies) received. The Internal Control Concepts and
vendor, recognizing that its customer Techniques
made a double payment, issues a The internal control system comprises
reimbursement to the victim policies, practices, and procedures
company, which the clerk intercepts employed by the organization to achieve
and cashes. four broad objectives:
1. To safeguard assets of the firm.
Check Tampering 2. To ensure the accuracy and
● Involves forging or changing in some reliability of accounting records and
material way a check that the information.
organization has written to a 3. To promote efficiency in the firm’s
legitimate payee. operations.
4. To measure compliance with Exposures and Risk
management’s prescribed policies ● The absence or weakness of a
and procedures. control is called an exposure.
● Exposures increase the firm’s risk to
Modifying Assumptions financial loss or injury from
● MANAGEMENT RESPONSIBILITY. undesirable events.
This concept holds that the
establishment and maintenance of a A weakness in internal control may expose
system of internal control is a the firm to one or more of the following
management responsibility. This types of risks:
point is made eminent in SOX 1. Destruction of assets (both physical
legislation. assets and information).
2. Theft of assets.
● REASONABLE ASSURANCE. The 3. Corruption of information or the
internal control system should information system.
provide reasonable assurance that 4. Disruption of the information system.
the four broad objectives of internal
control are met in a cost-effective The Preventive–Detective–Corrective
manner. This means that no system Internal Control Model
of internal control is perfect and the
cost of achieving improved control Preventive Controls
should not outweigh its benefits. ● Passive techniques designed to
reduce the frequency of occurrence
● METHODS OF DATA PROCESSING. of undesirable events.
Internal controls should achieve the ● Force compliance with prescribed or
four broad objectives regardless of desired actions and thus screen out
the data processing method used. aberrant events.
The control techniques used to
achieve these objectives will, Detective Controls
however, vary with different types of ● Form the second line of defense
technology. ● Are devices, techniques, and
procedures designed to identify and
● LIMITATIONS. Every system of expose undesirable events that
internal control has limitations on its elude preventive controls
effectiveness. These include ● Reveal specific types of errors by
(1) The possibility of error - no comparing actual occurrences to pre-
system is perfect established standards.
(2) Circumvention - personnel
may circumvent the system Corrective Controls
through collusion or other ● Actions taken to reverse the effects
means of errors detected in the previous
(3) Management override - step.
management is in a position to
override control procedures by Sarbanes-Oxley and Internal Control
personally distorting ● Sarbanes-Oxley legislation requires
transactions or by directing a management of public companies to
subordinate to do so implement an adequate system of
(4) Changing conditions - internal controls over their financial
conditions may change over reporting process. This includes
time so that existing controls controls over transaction processing
may become ineffectual. systems that feed data to the
financial reporting systems.
● Section 302 requires that corporate decisions in connection with the
management (including the CEO) organization’s operations and to
certify their organization’s internal prepare reliable financial statements
controls on a quarterly and annual
basis. 4. Monitoring - is the process by
● Section 404 requires the which the quality of internal control
management of public companies to design and operation can be
assess the effectiveness of their assessed. This may be accomplished
organization’s internal controls. by separate procedures or by
ongoing activities.
SAS 78/COSO INTERNAL CONTROL
FRAMEWORK 5. Control activities - are the policies
The SAS 78/COSO framework consists of and procedures used to ensure that
five components: appropriate actions are taken to deal
with the organization’s identified
1. Control environment - the risks. Control activities can be
foundation for the other four control grouped into two distinct categories:
components. The control information technology (IT) controls
environment sets the tone for the and physical controls.
organization and influences the
control awareness of its ● IT controls relate specifically
management and employees. SAS to the computer environment.
78/COSO requires that auditors They fall into two broad
obtain sufficient knowledge to assess groups: general controls and
the attitude and awareness of the application controls. General
organization’s management, board controls pertain to entity-
of directors, and owners regarding wide concerns such as
internal control. controls over the data center,
organization databases,
2. Risk Assessment - organizations systems development, and
must perform a risk assessment to program maintenance.
identify, analyze, and manage risks Application controls ensure
relevant to financial reporting. SAS the integrity of specific
78/COSO requires that auditors systems such as sales order
obtain sufficient knowledge of the processing, accounts payable,
organization’s risk assessment and payroll applications.
procedures to understand how
management identifies, prioritizes, ● Physical controls do not
and manages the risks related to relate to the computer logic
financial reporting. that actually performs
accounting tasks. Rather, they
3. Information and Communication relate to the human activities
- The accounting information system that trigger and utilize the
consists of the records and methods results of those tasks. In other
used to initiate, identify, analyze, words, physical controls focus
classify, and record the on people, but are not
organization’s transactions and to restricted to an environment
account for the related assets and in which clerks update paper
liabilities. The quality of information accounts with pen and ink.
the accounting information system Virtually all systems,
generates impacts management’s regardless of their
ability to take actions and make sophistication, employ human
activities that need to be ● These records capture the economic
controlled. essence of transactions and provide
an audit trail of economic events.
Issues pertaining to six categories of ● The audit trail enables the auditor to
physical control activities: trace any transaction through all
phases of its processing from the
1. TRANSACTION AUTHORIZATION initiation of the event to the financial
● The purpose of transaction statements.
authorization is to ensure that all ● Organizations must maintain audit
material transactions processed by trails for two reasons:
the information system are valid and 1. This information is needed for
in accordance with management’s conducting day-to-day
objectives. operations.
● Authorizations may be general or 2. The audit trail plays an
specific. essential role in the financial
● General authority is granted to audit of the firm.
operations personnel to perform day-
to-day operations. 5. ACCESS CONTROL
● Specific authorizations deal with ● The purpose of access controls is to
case-by-case decisions associated ensure that only authorized
with nonroutine transactions. personnel have access to the firm’s
assets.
2. SEGREGATION OF DUTIES ● Unauthorized access exposes assets
● One of the most important control to misappropriation, damage, and
activities is the segregation of theft. Therefore, access controls play
employee duties to minimize an important role in safeguarding
incompatible functions. assets.
● Segregation of duties can take many ● Access to assets can be direct or
forms, depending on the specific indirect. Physical security devices,
duties to be controlled. such as locks, safes, fences, and
electronic and infrared alarm
3. SUPERVISION systems, control against direct
● Implementing adequate segregation access. Indirect access to assets is
of duties requires that a firm employ achieved by gaining access to the
a sufficiently large number of records and documents that control
employees. the use, ownership, and disposition
● Achieving adequate segregation of of the asset.
duties often presents difficulties for
small organizations. 6. INDEPENDENT VERIFICATION
● Obviously, it is impossible to ● Verification procedures are
separate five incompatible tasks
among three employees. independent checks of the
● Therefore, in small organizations or accounting system to identify errors
in functional areas that lack and misrepresentations.
sufficient personnel, management ● Verification differs from supervision
must compensate for the absence of because it takes place after the fact,
segregation controls with close by an individual who is not directly
supervision.
involved with the transaction or task
● For this reason, supervision is often
called a compensating control. being verified. Supervision takes
place while the activity is being
4. ACCOUNTING RECORDS performed, by a supervisor with
● Consist of source documents, direct responsibility for the task.
journals, and ledgers.
● Through independent verification the accounts receivable subsidiary
procedures, management can ledger performs the monthly
assess: reconciliation of the subsidiary ledger
1. The performance of individuals and the control account.
2. The integrity of the
transaction processing system 3. The underlying assumption of
3. The correctness of data reasonable assurance regarding
contained in accounting implementation of internal control means
records. that
a. auditor is reasonably assured that fraud
● Verifications may occur several times has not occurred in the period.
an hour or several times a day. In b. auditors are reasonably assured that
some cases, a verification may occur employee carelessness can weaken an
daily, weekly, monthly, or annually. internal control structure.
c. implementation of the control
Multiple-Choice Questions procedure should not have a
1. Management can expect various significant adverse effect on efficiency
benefits to follow from implementing a or profitability.
system of strong internal control. Which of d. management assertions about control
the following benefits is least likely to effectiveness should provide auditors with
occur? reasonable assurance.
e. a control applies reasonably well to all
a. reduction of cost of an external audit forms of computer technology.
b. prevention of employee collusion to
commit fraud 4. To conceal the theft of cash receipts
c. availability of reliable data for decision- from customers in payment of their
making purposes accounts, which of the following journal
d. some assurance of compliance with the entries should the bookkeeper make? DR,
Foreign Corrupt Practices Act of 1977 CR
e. some assurance that important
documents and records are protected a. Miscellaneous Expense, Cash
b. Petty Cash, Cash
2. Which of the following situations is NOT c. Cash Accounts, Receivable
a segregation of duties violation? d. Sales Returns, Accounts Receivable
e. None of the above
a. The treasurer has the authority to sign
checks but gives the signature block to the 5. Which of the following controls would
assistant treasurer to run the check-signing best prevent the lapping of accounts
machine. receivable?
b. The warehouse clerk, who has custodial
responsibility over inventory in the a. Segregate duties so that the clerk
warehouse, selects the vendor and responsible for recording in the accounts
authorizes purchases when inventories are receivable subsidiary ledger has no access
low. to the general ledger.
c. The sales manager has the responsibility b. Request that customers review their
to approve credit and the authority to write monthly statements and report any
off accounts. unrecorded cash payments.
d. The department time clerk is given the c. Require customers to send
undistributed payroll checks to mail to payments directly to the company’s
absent employees. bank.
e. The accounting clerk who shares d. Request that customers make checks
the record-keeping responsibility for payable to the company.
6. Providing timely information about
transactions in sufficient detail to permit
proper classification and financial reporting
is an example of
a. transaction authorization.
b. supervision.
c. accounting records.
d. independent verification.
a. transaction authorization
b. supervision
c. accounting records
d. independent verification
a. ethics
b. justifiable reliance
c. situational pressure
d. opportunity