Question

In: Accounting

Hugh Darby, the general manager has discovered a fraud involving the theft of more than $50,000...

Hugh Darby, the general manager has discovered a fraud involving the theft of more than $50,000 of cash. The person(s) who stole the cash were waiters/waitresses who simply pocketed any cash they received from restaurant customers and destroyed the relevant bills for the meals charged to these customers. No correcting entries have been posted as yet, because the fraud is still being investigated and Hugh is not sure of exactly how much money has been stolen.

Required: identify three internal controls you would expect to be in place to prevent and/or detect theft of this nature. Your answer should include identifying at least one relevant control related to each of the following:

i) source document design;
ii) independentchecksorreconciliations;and
iii) personnel or segregation of duties.

Solutions

Expert Solution

1) Reconcile Payroll and Staff Records

Have specific management procedures that dictate who can hire, who has scheduling responsibilities, and who can change pay rates.

A second manager should review payroll data before processing. This means double-checking time sheets for hourly employees, overtime and salary wages, as well as reconciling them against the budget. It’s wise to wise to outsource payroll to avoid tax penalties and interest.

2) Personnel or Segregation of Duties

Set a system of checks and balances that requires two or more people to count money or sign off on registers after a shift. This prevents theft and mistakes.

A manager can supervise if a senior crewmember is not available. Pairs of managers can alternate making deposits and reconciling bank statements.

The person signing checks should not be the same one inputting accounts payable data

3) Source Document Design

Documents provide evidence that transactions and events have occurred.

a. Documents should be pre-numbered and all documents should be accounted for Examples would be numbers on checks and invoices (like restaurant receipts).

b. Source documents for accounting entries should be promptly forwarded to the accounting department to help ensure timely recording of the transaction and event.


Related Solutions

ppt on identity theft more than 8 slides
ppt on identity theft more than 8 slides
Twentyfirst Century Electronics has discovered a theft problem at its warehouse and has decided to hire...
Twentyfirst Century Electronics has discovered a theft problem at its warehouse and has decided to hire security guards. The firm wants to hire the optimal number of security guards. The following table shows how the number of security guards affects the number of radios stolen per week. # of security guards # of stolen per week 0 50 1 30 2 20 3 11 4 7 5 4 a. If each security guard is paid $400 a week and the...
On November 20, 2012, Hewlett-Packard (HP) disclosed that it discovered an accounting fraud and has written...
On November 20, 2012, Hewlett-Packard (HP) disclosed that it discovered an accounting fraud and has written down $8.8 billion of the value of Autonomy, the British software company that it bought in 2011 for $11.1 billion, after discovering that Autonomy misrepresented its finances. In May 2012, HP had fired former Autonomy CEO, Dr. Michael Lynch, citing poor performance by his unit. Provide a brief discussion of the auditor liabilities and the potential defenses. What duties of care, laws, or responsibilities...
Sam’s Electronics Universe has discovered and investigated a kickback fraud perpetrated by its purchasing agent. The...
Sam’s Electronics Universe has discovered and investigated a kickback fraud perpetrated by its purchasing agent. The fraud lasted eight months and cost the company $2 million in excess inventory purchases. The perpetrator personally benefited by receiving kickbacks of $780,000. Your boss wants to seek restitution of what the company has lost, but is worried about the ramifications of a trial and its effect on your company’s image in the market. She is trying to decide if she should pursue remedies...
Find an accounting-related fraud court case that is no more than 2 years old and then...
Find an accounting-related fraud court case that is no more than 2 years old and then find an accounting-related fraud court case that is over 10 years old. Give a brief summary of both court cases. Compare and contrast the 2 court cases. Discuss if you think the level of sophistication in committing fraud has changed over the years. Who is committing the crime and how? What impact, if any, will the changes you found have on the auditor and/or...
Most people quickly relate to the notion that some purchasing decisions are more involving than others...
Most people quickly relate to the notion that some purchasing decisions are more involving than others are. What kinds of products or services do you consider highly involving?
Insurance fraud and abuse may be involved in more than 10% of submitted medical claims. Discuss...
Insurance fraud and abuse may be involved in more than 10% of submitted medical claims. Discuss with your classmates the difference between fraud and abuse. Provide examples of both.
Fraud perpetrated by an outside source is more common than the mainstream news reports because companies...
Fraud perpetrated by an outside source is more common than the mainstream news reports because companies do not report and prosecute. Why do you suppose a company would choose to sweep it under the rug?
4) In 2011, researchers discovered bacterial cells possessing human genes, they found that more than 10%...
4) In 2011, researchers discovered bacterial cells possessing human genes, they found that more than 10% of a Neisseria gonorrhoeae population, the species responsible for gonorrhea, contained a human DNA fragment. This fragment was not found in other species of Neisseria. How might a bacterial cell have acquired human DNA? Explain 9) Describe pGLO plasmid genes and how we can prove that the transformation was successful          10) On which of the plates would you expect to find bacteria most like...
In international trade, problems involving bad debts are more easily avoided than rectified after they occur....
In international trade, problems involving bad debts are more easily avoided than rectified after they occur. Credit checks and the other methods that have been discussed in this chapter can limit the risks. Nonetheless, just as in a company’s domestic business, exporters occasionally encounter problems with buyers who default on their payment. When these problems occur in international trade, obtaining payment can be both difficult and expensive. Even when the exporter has insurance to cover commercial credit risks, a default...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT