Question

In: Operations Management

1. Describe three threats in the general ledger and reporting system and identify corresponding controls for...

1. Describe three threats in the general ledger and reporting system and identify corresponding controls for each threat.

2. How is an audit trail used in the general ledger and reporting system?

3. Explain the benefits of XBRL.

Solutions

Expert Solution

1. THREAT 1: Errors in updating the general ledger because of inaccurate/incomplete journal entries or posting of journal entries — Controls: (1) Input, edit, and processing controls over summary entries from subsystems. (a) Validity check over existence of general ledger accounts. (b) Field check over numeric data in amount field. (c) Zero-balance check ensures equality of debits and credits (d) Completeness test — all pertinent data are entered (e) Redundant data check — closed loop verification to see if on account numbers and descriptions, to ensure that the correct general ledger account is being accessed (f) Standard adjusting entry file for recurring entries — improves accuracy of the process (g) Sign check on debit and credit entries (h) Calculation of run-to-run totals can verify the accuracy of journal voucher batch processing (2) Reconciliation and control reports — can detect errors made during updating and processing; trial balances, clearing, and suspense accounts are examples (a) Balancing of control and subsidiary accounts (b) Control reports can help identify the source of errors in the general ledger update process — listings of journal vouchers and general journal entries will show entries posted to the general ledger and ensures equality of debits and credits (3) The audit trail — the path of transactions through the system-should be able to perform the following tasks: (a) Trace any transaction from its original source document to the general ledger; any other document or report using that data (b) Trace any item from a report or an output document to the general ledger and thence to the source document (c) Trace all changes in the general ledger balances from their beginning balance to their ending balance.
THREAT 2: Loss or unauthorized disclosure or alteration of financial data — Controls: (1) User IDs, passwords, and access controls should be used (2) Enforce segregation of duties (3) Adjusting entries only from the controller's area (4) Valid authorization for journal voucher submission.
THREAT 3: Loss or destruction of the general ledger — Controls: (1) Use of internal and external file labels to protect from accidental data loss (2) Make regular backup copies of the general ledger, one copy stored off-site (3) A good disaster recovery plan and (4) access and processing integrity controls to ensure confidentiality and accuracy of data transmitted to branch offices or externally.
THREAT 4: Poor performance — Controls: (1) XBRL, (2) redesign business processes, and (3) redesign metrics used to report results of business activities.
2. An audit trail shows the path of a transaction through the accounting system. It can provide information needed to trace any changes made to the general ledger by tracing either to or from an original source document to the general ledger. It helps in tracing all changes in general ledger accounts from beginning balances to ending balances as well as any adjustments made to the accounts.

3. XBRL (Extensible Business Reporting Language) is a variation of XML, which is designed to communicate the content of data. XML improves upon HTML by being able to describe the content of the data presented. However, XML is limited when communicating financial information. For financial purposes, XBRL identifies each piece of data, along with how the data should be processed and how the data relate to other data items. XBRL may soon become the universal standard computer language for communicating financial data. XBRL enables organizations to publish financial information only once, using standard XBRL tags. XBRL tagged information is interpretable and doesn't need to be re-entered by users.


Related Solutions

A well-designed accounting information system should provide adequate controls in the general ledger and reporting system...
A well-designed accounting information system should provide adequate controls in the general ledger and reporting system (or any cycle) to ensure that control objectives are met. Discuss those control objectives.
Discuss the difference between the financial reporting system and general ledger system.
Discuss the difference between the financial reporting system and general ledger system. 
Identify the 1 general objective of financial reporting. Describe the 3 specific objectives of financial reporting....
Identify the 1 general objective of financial reporting. Describe the 3 specific objectives of financial reporting. Explain the relationship between the objectives of financial reporting. Explain the Financial Accounting Standards Board (FASB) conceptual framework.
Explain how the transaction cycles and the general ledger/financial reporting system interact with the conversion cycle.
Explain how the transaction cycles and the general ledger/financial reporting system interact with the conversion cycle.
Figure 16-1 Context Diagram of the General Ledger and Reporting System Figure 16-2 Level 0 Data...
Figure 16-1 Context Diagram of the General Ledger and Reporting System Figure 16-2 Level 0 Data Flow Diagram of the General Ledger and Reporting Cycle (annotated to include threats) Figure 16-3 Typical Design of Online General Ledger and Reporting System
Identify the three categories of debt securities and describe the accounting and reporting treatment for each...
Identify the three categories of debt securities and describe the accounting and reporting treatment for each category.
course : Accounting information system GITC/Application Controls 1. GITC, general information technology controls is control activities...
course : Accounting information system GITC/Application Controls 1. GITC, general information technology controls is control activities performed by management to ensure the ongoing effectiveness of the organization's automated application controls and related systems. Where as application controls help ensure that transactions occured are recorded completely and accurately. Application controls also are automated in nature and often apply to the processing of individual transactions. Also, GITC includes execution of policies and procedures that relate to financially relevant applications and support the...
Please, Complete the following information, with short answers: - General Ledger and Reporting Cycle: - What...
Please, Complete the following information, with short answers: - General Ledger and Reporting Cycle: - What is its Purpose? What are its Resources? What are its Documents? What are its Reports? What is its Information? What are its Activities? What are its Sub-Processes? Diagram the Process with the Input & Outputs?
Identify which IT Application Controls would best mitigate the threats outlined. Expand upon your answer to...
Identify which IT Application Controls would best mitigate the threats outlined. Expand upon your answer to analyze the relationship among risk/opportunity/control. Also consider how these scenarios could be detected by an audit internal or external. Which types of input controls would mitigate the following threats? Posting the amount of a sale to a customer account that does not exist. A Customer entering too many characters into the five-digit zip code while making an online purchase, causing the server to crash....
Identify the six categories of general controls and give one example of each
Identify the six categories of general controls and give one example of each
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT