Question

In: Accounting

What are the techniques used to control cash?

What are the techniques used to control cash?

Solutions

Expert Solution

Cash is a liquid, portable, and desirable asset. Therefore, a company must have adequate controls to prevent theft or other misuses of cash. These control activities include segregation of duties, proper authorization, adequate documents and records, physical controls, and independent checks on performance.

  • Segregation of duties. Cash is generally received at cash registers or through the mail. The employee who receives cash should be different from the employee who records cash receipts, and a third employee should be responsible for making cash deposits at the bank. Having different employees perform these tasks helps minimize the potential for theft.

  • Proper authorization. Only certain people should be authorized to handle cash or make cash transactions on behalf of the company. In addition, all cash expenses should be authorized by responsible managers.

  • Adequate documents and records. Company managers and others who are responsible for safeguarding a company's cash assets must have confidence in the accuracy and legitimacy of source documents that involve cash. Important documents such as checks, are prenumbered in sequential order to help managers ascertain the disposition of each document. This helps prevent transactions from being recorded twice or from not being recorded at all. In addition, documents should be forwarded to the accounting department soon after their creation so that recordkeeping can be handled professionally and efficiently. Allowing documents that describe cash transactions to go unrecorded for an unnecessarily long period of time increases the likelihood that fraudulent or inaccurate records will pass undetected through the accounting department.

  • Physical controls. Cash on hand must be physically secure. This is accomplished in a variety of ways. Cash registers should contain only enough cash to handle customer transactions. When a cashier finishes a shift—or perhaps more frequently—excess cash should be moved from cash registers to a safe or another location that provides additional security. In addition, daily bank deposits are made so that excess cash does not remain on the premises. Blank checks, which can be used for forgery, are stored in locked, fireproof files.

  • Independent checks on performance. Employees who handle cash or who record cash transactions must be prepared for independent checks on their performance. These checks should be done periodically and may be done without fore-warning. Having a supervisor verify the accuracy of a cashier's drawer on a daily basis is an example of this type of control.

  • Other cash controls. Most companies bond individuals that handle cash. A company bonds an employee by paying a bonding company for insurance against theft by the employee. If the employee then steals, the bonding company reimburses the company. Companies may also rotate employees from one task to another. Embezzlement or serious mistakes may be uncovered when a new employee takes over a task. Although specific cash controls vary from one company to the next, all companies must implement effective cash controls.


Related Solutions

Explain what a cash-flow calendar accomplishes. Name three techniques to control spending.
Explain what a cash-flow calendar accomplishes. Name three techniques to control spending.
iii. Outline some techniques that are used to control depression in children
iii. Outline some techniques that are used to control depression in children
Describe ( in details) 5 cost control techniques used by contractors in construction projects.
Describe ( in details) 5 cost control techniques used by contractors in construction projects.
Locking methods are one of the most common techniques used in concurrency control. There are different...
Locking methods are one of the most common techniques used in concurrency control. There are different levels of lock use. Make sure you clearly write down (a), (b) followed by your answers. [6 marks] (a) Use the following scenario to illustrate and explain how a table-level lock and a page-level lock work. Scenario: Transaction 1 (T1) wants to update row 5 in Table A Transaction 2 (T2) wants to update row 2 in Table A Note: Page 1 contains rows...
What are the techniques used for business process analysis? Conduct a SWOT analysis of these techniques?...
What are the techniques used for business process analysis? Conduct a SWOT analysis of these techniques? Which techniques is appropriate for your organisation and why? with reference
what techniques are used during synthesis of dimethylmaleate
what techniques are used during synthesis of dimethylmaleate
Prepare an internal control questionnaire to be used in evaluating the internal control over cash receipts...
Prepare an internal control questionnaire to be used in evaluating the internal control over cash receipts and cash disbursements. The internal control questionnaire should elicit a yes or not response to each question.
what are the missouri policies and techniques used on asian carp.
what are the missouri policies and techniques used on asian carp.
what are projective techniques and how can they be used profitably
what are projective techniques and how can they be used profitably
a) What is a control chart and what is it used for? b) What are the...
a) What is a control chart and what is it used for? b) What are the steps for constructing a Control Chart? c) Explain the out of control signals?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT