Question

In: Accounting

Johnson Computers repairs computers, along with selling and installing software on computers. Brian handles the repairs...

Johnson Computers repairs computers, along with selling and installing software on computers. Brian handles the repairs for the computers and is constantly asked by family and friends for assistance when they experience computer issues. In an effort to provide more personal income, Brian started doing repairs from his home on weekends and evenings, as a part-time venture. As most of the business is for family and friends, he does not want to charge as much as Johnson Computers does. During the budget process, Brian increased the budget for computer parts, and once approved, started to buy as many as the budget would allow. For the additional parts not needed by Johnson Computers, Brian took the parts home to use in his business. Brian makes sure the amount spent never exceeds the budgeted amount.

Explain how Brian’s use of the budget is considered fraudulent, and how the budget process should have found this issue.

What policies and procedures should Johnson Computers have in place to protect the business assets and prevent the business risk?

Solutions

Expert Solution

All businesses and non-profit organizations face the risk unexpected events, such as a natural disaster, loss of funds through theft, or injury to staff, customers, or visitors on your premises, could impact operations. Any of these events can cost your organization money or cause your organization to permanently close.

With a risk management plan, you can prepare for the unexpected, minimizing risks and extra costs before they happen. By considering potential risks or events before they happen and having a risk management plan in place, you can save money and protect your organization’s future.

What is risk management? Risk management is the process of identifying possible risks, problems or disasters before they happen. This allows business owners to set up procedures to avoid the risk, minimize its impact, or at the very least help cope with its impact. A business or organization should make a realistic evaluation of the true level of risk and plan accordingly.

What should a risk management plan include? A successful risk management plan should recognize and address potential risks and threats. These plans don’t have to be expensive or very time consuming. The risk management process can be as easy as answering the following few questions:

1. Risk identification – What can go wrong? (Risks can apply to your workplace or from the particular work you do)
2. Risk analysis – How will it affect us? (Consider probability and impact to your operations – is it high or low?)
3. Risk control – What should we do? (Both to prevent the loss from occurring or to recover if the loss does occur)
4. Risk treatment – If something does happen, how will you pay for it?

An effective risk management plan should include:

  • A commitment from all levels of the organization
  • Policies and procedures established and clearly defined for all staff
  • All staff should have clearly defined roles, responsibilities, and accountability
  • Adequate resources and tools allocated for the plan
  • Ongoing training, testing and monitoring of the risk management plan

What are the benefits of a risk management plan?

  • Saving valuable resources: time, income, assets, people and property can be saved if fewer claims occur
  • Creating a safe and secure environment for staff, visitors, and customers
  • Reducing legal liability and increasing the stability of your operations
  • Protecting people and assets from harm
  • Protecting the environment
  • Reducing your threat of possible litigation
  • Defining your insurance needs to save on unnecessary premiums

Insurance and risk management systems

Purchasing the appropriate insurance coverage for your business is an important part of your risk management plan, but it’s not enough by itself. You still must have policies and procedures in place to reduce risks to ensure your assets, reputation, financial security and operations can continue without interruption.


Related Solutions

Johnson Computers repairs computers, along with selling and installing software on computers. Brian handles the repairs...
Johnson Computers repairs computers, along with selling and installing software on computers. Brian handles the repairs for the computers and is constantly asked by family and friends for assistance when they experience computer issues. In an effort to provide more personal income, Brian started doing repairs from his home on weekends and evenings, as a part-time venture. As most of the business is for family and friends, he does not want to charge as much as Johnson Computers does. During...
The warehouse manager at Johnson Cor. is considering installing additional insulation in the warehouse. He estimates...
The warehouse manager at Johnson Cor. is considering installing additional insulation in the warehouse. He estimates that the annual savings would be a reduction in heating cost from the current $16,000 per year to approximately $12,000 per year. Johnson Corp. Desires to earn 8% ROI, and the cost of installing the insulation is expected to be $20,000. How many years does the warehouse have to run in order to justify the insulation project?
Brian Johnson is a 21-year-old college senior who comes to the university counseling center for an...
Brian Johnson is a 21-year-old college senior who comes to the university counseling center for an evaluation. Brian was referred by his resident advisor, who saw him intoxicated seven times in the past month. Brian has missed multiple classes because he was hungover from drinking the night before and he recently got a ticket for public drunkenness. In your initial post, answer two of the following questions from your perspective as Brian’s psychiatric nurse practitioner: Identify one screening tool you...
QUESTION 28 As a system administrator you are installing new software on the PC used by...
QUESTION 28 As a system administrator you are installing new software on the PC used by an employee. You are not authorized to read other people's email, Web logs, or personal files. In the course of installing, you accidentally come across directories containing files with suspicious-looking names. You open a few and find they contain child pornography. What should you do?
The trial balance of Johnson Travel at December 31,2005 follows;along with the data for the month...
The trial balance of Johnson Travel at December 31,2005 follows;along with the data for the month end adjustments. DEBİT CREDIT Cash 1300 A/R 6600 Supplies 2300 Prepaid rent 1600 Furniture 36000 Accumulated depreciation(furniture) 4800 A/P 4500 Unearned service revenue 600 Capital 26000 Withdrawals 29000 Service Revenue 106000 Deprecation expense 2300 Salary Expense 39900 Rent expense 20000 Supplies expense 2900 TOTAL 141900 141900 Questions: What adjusting entry will Johson make on this transaction ? a) Depreciation on furniture for the month.The...
The trial balance of Johnson Travel at December 31,2005 follows;along with the data for the month...
The trial balance of Johnson Travel at December 31,2005 follows;along with the data for the month end adjustments. DEBİT CREDIT Cash 1300 A/R 6600 Supplies 2300 Prepaid rent 1600 Furniture 36000 Accumulated depreciation(furniture) 4800 A/P 4500 Unearned service revenue 600 Capital 26000 Withdrawals 29000 Service Revenue 106000 Deprecation expense 2300 Salary Expense 39900 Rent expense 20000 Supplies expense 2900 TOTAL 141900 141900 Questions: What adjusting entry will Johson make on this transaction ? a) Depreciation on furniture for the month.The...
Develop a communication plan for an airport security project. The project entails installing the hardware and software system that
From: Project management,Larson, E. W., & Gray, C. F. (2018). Project Management: The Managerial Process, 7thEdition. McGraw Hill.Develop a communication plan for an airport security project. The project entails installing the hardware and software system that (1) scans a passenger’s eyes, (2) fingerprints the passenger, and (3) transmits the information to a central location for evaluation.
Computech is a company that sells computers and software. The company has a website that allows...
Computech is a company that sells computers and software. The company has a website that allows customers to post comments about the computers and software it sells. Why is it important for this company to encourage customer feedback? Consumers are more likely to say positive things about companies that value their opinions. Negative consumer feedback can actually attract more customer interest in the product. Most online shoppers will only buy products if they can voice their opinions about them after...
Two computer stores recorded the number of computers sold in a week along with the sizes...
Two computer stores recorded the number of computers sold in a week along with the sizes of their hard drives. At a = .05, test the claim that the distribution of hard drives and the store where the computers were bought are not related. store one sold 13 20gb, 11 40gb, 11 80gb, 8 160gb. store two sold 104 20gb, 33 40gb, 15 80 gb, 10 160gb Hypothesis with claim Draw Curve Critical Value Test Value Decision Summary
Two computer stores recorded the number of computers sold in a week along with the sizes...
Two computer stores recorded the number of computers sold in a week along with the sizes of their hard drives. At a = .05, test the claim that the distribution of hard drives and the store where the computers were bought are not related. store one sold 13 20gb, 11 40gb, 11 80gb, 8 160gb. store two sold 104 20gb, 33 40gb, 15 80 gb, 10 160gb Hypothesis with claim Draw Curve Critical Value Test Value Decision Summary
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT