Control and Accounting Information Systems Suggested Answers To Discussion Questions
Control and Accounting Information Systems Suggested Answers To Discussion Questions
Control and Accounting Information Systems Suggested Answers To Discussion Questions
Systems
CHAPTER 7
7.1 Answer the following questions about the audit of Springers Lumber & Supply
The "internal environment" refers to the tone or culture of a company and helps
determine how risk consciousness employees are. It is the foundation for all other
ERM components, providing discipline and structure. It is essentially the same thing
as the control environment in the internal control framework.
The internal environment also refers to management's attitude toward internal control,
and to how that attitude is reflected in the organization's control policies and
procedures. At Springer's, several deficiencies in the control environment are
apparent:
b. Do you agree with the decision to settle with the Springers rather than to
prosecute them for fraud and embezzlement? Why or why not?
Whether or not to settle with the Springers is a matter of opinion, with reasonable
arguments on both sides of the issue.
The reasons for reaching a settlement are clearly stated: the difficulty of
obtaining convictions in court, and the possible adverse effects on the
company's market position.
7-1
Ch. 7: Control and Accounting Information Systems
On the other hand, the evidence of fraud here seems strong. If this kind of
behavior is not penalized, then the perpetrators may be encouraged to do it
again, with future adverse consequences to society.
c. Should the company have told Jason and Maria the results of the high-level audit?
Why or why not?
Whether or not Jason and Maria should have been told the results of the high-level
audit is also a matter of opinion. The investigative team is apparently trying to keep
its agreement to maintain silence by telling as few people as possible what really
happened. On the other hand, Jason and Maria were the ones who first recognized
the problems; it seems only right that they be told about the outcome.
Small companies can do the following things to compensate for their inability to implement
an adequate segregation of duties:
7-3
Ch. 7: Control and Accounting Information Systems
7.3 One function of the AIS is to provide adequate controls to ensure the safety of
organizational assets, including data. However, many people view control procedures
as red tape. They also believe that, instead of producing tangible benefits, business
controls create resentment and loss of company morale. Discuss this position.
Well-designed controls should not be viewed as red tape because they can actually
improve both efficiency and effectiveness. The benefits of business controls are evident if
one considers the losses that frequently occur due to the absence of controls.
Another factor is the obtrusiveness of the controls. When the user sees no clear need or
purpose to a control it can appear to be there only to control them and little more than that.
When the user does not understand their purpose, controls can often provoke resentment.
Accounting Information
Systems
7.4 In recent years, Supersmurfs external auditors have given clean opinions on its
financial statements and favorable evaluations of its internal control systems. Discuss
whether it is necessary for this corporation to take any further action to comply with
the SarbanesOxley Act.
The Sarbanes-Oxley Act of 2002 (SOX) applies to publicly held companies and their
auditors and was intended to prevent financial statement fraud, make financial reports more
transparent, provide protection to investors, strengthen the internal controls at public
companies, and punish executives who perpetrate fraud.
SOX has had a material impact on the way boards of directors, management, and
accountants of publicly held companies operate. It has also had a dramatic impact on
CPAs of publicly held companies and the audits of those companies.
As a result of SOX, Supersmurfs management and their audit committee must take a more
active role in the financial disclosure process. Some of the more prominent roles include:
Audit Committee
Audit committees hire, compensate, and oversee any registered public accounting
firm that is employed
Auditors report to the audit committee and not management
Audit committees must pre-approve all audit and non-audit services provided by its
auditor
Management
The CEO and CFO at companies with more than $1.2 billion in revenue must prepare
a statement certifying that their quarterly and annual financial statements and
disclosures are fairly presented, were reviewed by management, and are not
misleading.
Management must prepare an annual internal control report that states
o Management is responsible for establishing and maintaining an adequate internal
control structure
o Management assessed the companys internal controls and attests to their
accuracy, including notations of significant defects or material noncompliance
found during their internal control tests.
o Auditors were told about all material internal control weaknesses and fraud
7-5
Ch. 7: Control and Accounting Information Systems
7.5 When you go to a movie theater, you buy a prenumbered ticket from the cashier.
This ticket is handed to another person at the entrance to the movie. What kinds of
irregularities is the theater trying to prevent? What controls is it using to prevent
these irregularities? What remaining risks or exposures can you identify?
1. The theater is trying to prevent cashiers from stealing cash by providing greater
control over cash receipts. You cannot get into the theater without a ticket so you
never give cash to a cashier without insisting on a ticket. That makes it much harder
for a cashier to pocket cash.
2. Prenumbered tickets are also used so cashiers cannot give tickets to their friends. The
number of tickets sold at the cashier counter can be reconciled with the number of
tickets taken by the usher letting patrons into the theater.
Reconciling the cash in the register to the tickets sold and then reconciling the number of
tickets sold to the number collected by the ticket-taker helps prevent the theft of cash and
giving tickets away to friends.
The ticket-taker can let friends into the theater without tickets.
The ticket-taker may take money from theater patrons, pocketing the cash and letting
them enter without a ticket.
The cashier and the ticket-taker may collude in selling admittances without issuing
tickets and then split the proceeds.
Accounting Information
Systems
7.6 Some restaurants use customer checks with prenumbered sequence codes. Each food
server uses these checks to write up customer orders. Food servers are told not to
destroy any customer checks; if a mistake is made, they are to void that check and
write a new one. All voided checks are to be turned in to the manager daily. How
does this policy help the restaurant control cash receipts?
The fact that all documents are prenumbered provides a means for accounting for their use
and for detecting unrecorded transactions. Thus, a missing check indicates a meal for
which a customer did not pay. Since each server has his or her own set of checks, it is easy
to identify which server was responsible for that customer.
This policy may help to deter theft (e.g., serving friends and not requiring them to pay for
the meal, or pocketing the customers payment and destroying the check) because a
reconciliation of all checks will reveal that one or more are missing.
7.7 Compare and contrast the following three frameworks: COBIT, COSO Integrated
Control, and ERM.
The COBIT Framework consolidates systems security and control standards into a single
framework. This allows management to benchmark security and control practices of IT
environments, users to be assured that adequate IT security and control exist, and auditors
to substantiate their internal control opinions and to advise on IT security and control
matters. The framework addresses control from three vantage points:
1. Control environment, which are the individual attributes, (integrity, ethical values,
7-7
Ch. 7: Control and Accounting Information Systems
competence, etc.) of the people in the organization and and the environment in which
they operate.
2. Control activities, which are control policies and procedures that help ensure that the
organization addresses risks and effectively achieves its objectives.
4. Information and communication, which is the system that captures and exchanges the
information needed to conduct, manage, and control organizational operations.
COSOs Enterprise Risk Management Frameworkis a new and improved version of the
Integrated Control Framework. It is the process the board of directors and management use
to set strategy, identify events that may affect the entity, assess and manage risk, and
provide reasonable assurance that the company achieves its objectives and goals. The basic
principles behind ERM are:
Management must decide how much uncertainty it will accept as it creates value.
Uncertainty results in risk and opportunity, which are the possibilities that something
negatively or positively affects the companys ability to create or preserve value.
The ERM framework can manage uncertainty as well as create and preserve value.
1. Setting objectives
The ERM framework takes a risk-based rather than a controls-based approach. As a result,
controls are flexible and relevant because they are linked to current organizational
objectives. The ERM model also recognizes that risk, in addition to being controlled, can
be accepted, avoided, diversified, shared, or transferred.
Because the ERM model is more comprehensive than the Internal Control framework, it
will likely become the most widely adopted of the two models.
Accounting Information
Systems
7.8 Explain what an event is. Using the Internet as a resource, create a list of some of the
many internal and external factors that COSO indicated could influence events and
affect a companys ability to implement its strategy and achieve its objectives.
By their nature, events represent uncertainty. An event may or may not occur. If it does
occur, it is hard to know when it will occur. Until it occurs, it may be difficult to determine
its impact on the company. When it occurs, it may trigger another event.
Events may occur individually or concurrently. Therefore, management must anticipate all
possible events, whether positive or negative, that might affect the company. It must also
determine which events are most and least likely to occur, and it must understand the
interrelationship of events.
The following table lists some of the many internal and external factors that COSO indicated
could influence events and affect a companys ability to implement its strategy and achieve its
objectives. Lists like these help management identify factors, evaluate their importance, and
examine those that can affect objectives. Identifying events at the activity and entity levels
allows companies to focus their risk assessment on major business units or functions and
helps align the companys risk tolerance and risk appetite.
7-9
Ch. 7: Control and Accounting Information Systems
legal liability
NATURAL ENVIRONMENT PERSONNEL
Natural disasters such as fires, floods, or Workplace accidents, health or safety
earthquakes concerns
Emissions and waste Employees acting dishonestly or unethically
Energy restrictions or shortages Employee skills and capability
Restrictions limiting development Strikes or expiration of labor agreements
POLITICAL PROCESS
Election of government officials with new Process modification without proper change
political agendas management procedures
New laws and regulations Process execution errors
Public policy, including higher or lower taxes Poorly designed processes
Regulation affecting the companys ability to Suppliers cannot deliver quality goods on
compete time
SOCIAL TECHNOLOGY
Privacy Insufficient capacity to handle peak IT usages
Terrorism Data or system unavailability
Corporate citizenship Poor systems selection/development
Human resource issues causing production Inadequately maintained systems
shortages or stoppages
Changing demographics, social mores, family Security breaches
structures, and work/life priorities
Consumer behavior that changes products Inadequate data integrity
and services demand or creates buying
opportunity
TECHNOLOGICAL
New e-business technologies that lower
infrastructure costs or increase demand for
IT-based services
Emerging technology
Increased or decreased availability of data
Interruptions or downtime caused by external
parties
Accounting Information
Systems
7.9 Explain what is meant by objective setting and describe the four types of objectives
used in ERM.
Objective setting, the second ERM component, is determining what the company hopes to
achieve. It is often referred to as the corporate vision or mission. The four types of
objectives used in ERM are:
1. Strategic objectives are high-level goals that align with the companys mission,
support it, and create shareholder value. Management should identify alternative
ways of accomplishing the strategic objectives, identify and assess the risks and
implications of each alternative, and formulate a corporate strategy.
4. Compliance objectives help the company comply with all applicable laws and
regulations.
Most compliance and many reporting objectives are imposed by external entities due
to laws or regulations. ERM provides reasonable assurance that reporting and
compliance objectives are achieved because companies have control over them.
However, the only reasonable assurance ERM can provide about strategic and
operations objectives is that management and directors are informed on a timely basis
of the progress the company is making in achieving them.
7-11
Ch. 7: Control and Accounting Information Systems
7.10 Discuss several ways that ERM processes can be continuously monitored and
modified so that deficiencies are reported to management.
4. Use risk analysis and management software packages to review computer and
network security measures, detect illegal access, test for weaknesses and
vulnerabilities, report weaknesses found, and suggest improvements.
5. Track purchased software to comply with copyrights and protect against software
piracy lawsuits. Companies should periodically conduct software audits. Employees
should be informed of the consequences of using unlicensed software. Track and
monitor mobile devices, as their loss could represent a substantial exposure. Also,
track who has them, what tasks they perform, the security features installed, and what
software is needed to maintain adequate system and network security.
6. Have periodic external, internal, and network security audits to assess and monitor
risk as well as detect fraud and errors.
7. Have a chief security officer (CSO), who is independent of the information system
function, be in charge of system security and report to the chief operating officer
(COO) or the CEO. Have a chief compliance officer (CCO), who reports to the same
people, be responsible for all compliance issues
9. Use forensic investigators, who specialize in fraud detection and investigation, help
with the financial reporting and corporate governance process. Most forensic
investigators received specialized training with the FBI, IRS, or other law
enforcement agencies. Investigators with the computer skills to ferret out fraud
perpetrators are in great demand.
10. Install fraud detection software to help ferret out fraud, such as illegal credit card use,
and notify forensic investigators when it is found.
11. Use a fraud hotline so people witnessing fraudulent behavior can report it
anonymously.
Accounting Information
Systems
The information you have obtained suggests potential problems relating to Go-Gos
internal environment. Identify the problems, and explain them in relation to the
internal environment concepts discussed in this chapter
The underlined items correspond to one of the 7 elements of the internal environment
covered in the text.
a. You met with Go-Gos audit committee, which consists of the corporate
controller, treasurer, financial vice president, and budget director.
SOLUTION: All members of the audit committee should be members of the Board
of Directors. They must also be independent of the company meaning none of the
audit committee can be employees. The audit committee is responsible for
overseeing the corporations internal control structure, its financial reporting
process, and its compliance with related laws, regulations, and standards. The
committee works closely with the corporations external and internal auditors. SOX
requires audit committees to be responsible for hiring, compensating, and overseeing
the auditors and for auditors to report all critical accounting policies and practices to
the audit committee.
b. You recognized the treasurer as a former aide to Ernie Eggers, who was
convicted of fraud several years ago.
PROBLEM: Because the position of corporate treasurer involves managing cash and
other financial assets, it is critical that the position be filled with someone of
unquestioned commitment to integrity and ethical values. This question presents
somewhat of a dilemma. Here are the two sides of that dilemma.
Accounting Information
Systems
On the one hand, just because the treasurer worked for someone that turned out to be
dishonest does NOT mean the treasurer is dishonest as well. Everyone should be
judged on his or her own merits, not those of someone else. Therefore, you need to
be careful not to assume automatically that the treasurer is dishonest.
On the other hand, the fact that the treasurer has been an aide to someone convicted
of fraud should raise questions in your mind. You should approach all audits with the
requisite skeptical attitude. That skeptical attitude should be heightened due to his
past associations.
SOLUTION: Though you may not have specific information linking the corporate
treasurer to the prior fraud, this information should indicate a need to examine
carefully the corporation's human resource standards and personnel policies and
practices with respect to hiring.
SOLUTION: The company should have a logical and defensible reason for changing
accounting methods, other than just to increase net income and the stock price. The
company may be willing to go to great lengths to "get their own way" with respect to
an important financial reporting matter. The commitment to ethics issue involves
questionable practices, desire to make the numbers, etc. If management does not
have a good reason for the desired change, company managements commitment to
integrity and ethical values should be carefully evaluated.
It is also possible that there is a problem with management's philosophy and operating
style. Managements philosophy and operating style relates to risk-taking propensity
and problems with philosophy and operating style are similar to carelessnessn or
recklessness.
It is important to note that management can be careless, yet ethical; they can also be
careful, yet unethical.
d. You learned that the financial vice president manages a staff of five internal
auditors.
7-15
Ch. 7: Control and Accounting Information Systems
e. You noted that all management authority seems to reside with three brothers,
who serve as chief executive officer, president, and financial vice president.
f. You were told that the performance of division and department managers is
evaluated on a subjective basis, because Go-Gos management believes that
formal performance evaluation procedures are counterproductive.
g. You learned that the company has reported increases in earnings per share for
each of the past 25 quarters; however, earnings during the current quarter have
leveled off and may decline.
SOLUTION: Because many frauds have been perpetrated to prop up earnings, this
significant fraud red flag must be investigated.
h. You reviewed the companys policy and procedures manual, which listed policies
for dealing with customers, vendors, and employees.
SOLUTION: A policies and procedures manual should contain much more than
what is indicated. The manual should explain proper business practices, describe the
knowledge and experience needed by key personnel, and list the resources provided
to carry out specific duties. It should spell out management policy with respect to
handling specific transactions and documents and the systems and procedures
employed to process those transactions. It includes the organizations chart of
accounts and sample copies of forms and documents. The manual should be a helpful
on-the-job reference for employees and a useful tool in training new employees.
i. Your preliminary assessment is that the accounting systems are well designed
and that they employ effective internal control procedures.
PROBLEM: Even though you believe that the accounting systems are well designed,
and that they employ effective internal control procedures, you cannot rely on that
belief. The most effective internal control systems and procedures can be negated by
a weak internal control environment, such as top management overriding the internal
controls. In other words, there is no evidence that the controls are effective or that
employees use and follow them.
SOLUTION: You cannot rely on the internal controls procedures being effective
until you test the controls.
PROBLEM: It does not appear that there is a clear line of authority and
responsibility for data security policies and procedures.
7-17
Ch. 7: Control and Accounting Information Systems
its lines of authority, responsibility, and reporting and provides the overall framework
for controlling and monitoring its operations.
Management should assign authority and responsibility for business objectives, such
as data security, to specific departments and individuals and then hold them
accountable for achieving those objectives. Authority and responsibility are assigned
through formal job descriptions; employee training; and operating plans, schedules,
and budgets. A written policy and procedures manual can be an important tool for
assigning authority and responsibility.
k. After a careful review of the budget for data security enhancement projects, you
feel the budget appears to be adequate.
PROBLEM: This item does not appear to be a problem. Your careful review
indicates that the company appears to be allocating sufficient budget dollars to fund
the data security enhancement projects.
m. Several new employees have had trouble completing some of their duties, and
they do not appear to know who to ask for help.
If the employees do not know who to turn to for help, the companys organizational
structure and methods of assigning authority and responsibility appear to be lacking
or unexplained.
challenges, stay ahead of the competition, adapt to changing technologies, and deal
effectively with the evolving environment.
n. Go-Gos strategy is to achieve consistent growth for its shareholders. It also has
a policy not to invest in any project unless its payback period is no more than 48
months and yields an internal rate of return that exceeds its cost of capital by
3%.
o. You observe that company purchasing agents wear clothing and exhibit other
paraphernalia from major vendors. The purchasing department manager
proudly displays a picture of himself holding a big fish on the deck of a luxury
fishing boat that has the logo of a major Go-Go vendor painted on its
wheelhouse.
PROBLEM: Gifts from vendors can unduly influence purchasing agents to buy more
goods from the gifting vendors. Purchasing decision should be free of this sort of
bias.
These policies should especially cover issues that are uncertain or unclear, such as
conflicts of interest and the acceptance of gifts. For example, most purchasing agents
would agree that accepting a $5,000 bribe from a supplier is dishonest, but a weekend
fishing trip or clothing is not as clear-cut. The observations in the purchasing
department indicated that there could be a problem with favoring certain vendors.
7-19
Ch. 7: Control and Accounting Information Systems
7.2 Explain how the principle of separation of duties is violated in each of the following
situations. Also, suggest one or more procedures to reduce the risk and exposure
highlighted in each example.
a. A payroll clerk recorded a 40-hour workweek for an employee who had quit the
previous week. He then prepared a paycheck for this employee, forged her
signature, and cashed the check.
PROBLEM: Segregation of duties is violated here because the payroll clerk had the
ability to record time worked and to prepare the payroll check (custody). This
allowed the payroll clerk to both commit and conceal the fraud. The payroll clerk
ignored the authorization process or had the authority to authorize the payment.
b. While opening the mail, a cashier set aside, and subsequently cashed, two checks
payable to the company on account.
PROBLEM: The cashier who opened the mail had custody of the cash. The cashier
opening the mail can pocket the checks and forge a signature, never giving the
authorized endorser a chance to be involved. For this reason, many companies have
the mail opened by two people or have those opening the mail videotaped.
SOLUTION: While the cashier can get away with this fraud for a few weeks or
months, the missing checks will eventually be noticed usually when the customer
complains because the cashier has no way to conceal the fraud (recording function).
An investigation would include an examination of the stolen checks and that could
lead to the cashier as the person cashing the checks. To be successful in the long
term, the cashier needs access to the recording function to indicate that customer
accounts are paid so that their complaints do not start an investigation.
PROBLEM: Segregation of duties is violated here because the cashier had the
ability to both write the check (custody) and approve the invoice for payment
(authorization).
d. An employee of the finishing department walked off with several parts from the
storeroom and recorded the items in the inventory ledger as having been issued
to the assembly department.
PROBLEM: Employees can commit and conceal fraud when they have access to
physical inventory (custody) and to inventory records (recording).
PROBLEM: The cashier had custody of the checks and was responsible for posting
(recording) to the accounts receivable ledger.
SOLUTION: Custody of the checks and posting to the Accounts Receivable Ledger
should be organizationally independent. In addition, there should be an independent
reconciliation of the three items:
1. dollar amounts of the checks received
2. dollar amounts of the checks deposited in the bank
3. dollar amounts credited to customer accounts.
PROBLEM: The clerk was authorized to accept the return, grant credit, and had
custody of the inventory. It is also possible that the clerk may have had responsibility
to record the returns, but did not do so to cover the theft.
The purchase returns area should be kept clean and orderly so that returns cannot be
"hid" among excess returns. Employees should not be allowed to have gym bags or
other personal items that could conceal stolen items in work areas.
7-21
Ch. 7: Control and Accounting Information Systems
g. A receiving clerk noticed that four cases of MP3 players were included in a
shipment when only three were ordered. The clerk put the extra case aside and
took it home after his shift ended.
PROBLEM: The receiving clerk had custody of arriving goods, counted the goods,
and compared the count to a purchase order. The problem is that, while the receiving
clerk did not record the purchase order, she did have access to a document that
showed the amount ordered. This allows her to steal any excess items shipped
without having to record anything to conceal it.
SOLUTION: Purchase orders sent to the receiving area should not indicate how
many items or cases were ordered, thus helping ensure that all shipments are counted
and recorded. The purchasing department should reconcile items received against
items ordered.
PROBLEM: The adjuster had authorization to add vendors to vendor master file,
authorization to write checks up to $6,000, and had custody of the signed the checks.
Apparently, the adjuster also had some recording duties (maintaining the vendor
master file).
SOLUTION: The functions of signing checks for invoices, approving vendors, and
maintaining the vendor master file should be organizationally independent. Payments
should not be made to anyone that is not on the approved vendor list. Controls should
be put into place to endure that employees cannot add an unauthorized or unapproved
vendor to the vendor master file.
PROBLEM: The accounts payable clerk had recording duties and he authorized
payments.
In addition, vendors should only be allowed to purchase goods and services from
approved vendors. Controls should be put into place to endure that employees cannot
add an unauthorized or unapproved vendor to the vendor master file. The company
needs to establish policies and a code of conduct that prohibits conflicts of interest
Accounting Information
Systems
and related party transactions, such as buying goods from a company in which you
have ownership interest.
j. A cashier created false purchase return vouchers to hide his theft of several
thousand dollars from his cash register.
PROBLEM: The cashier had recording (creating return vouchers), custody (cash in
the cash register), and authorization (authorize the return of goods) duties.
k. A purchasing agent received a 10% kickback of the invoice amount for all
purchases made from a specific vendor.
PROBLEM: The purchasing agent has both recording (prepare the purchase order)
and authorization (select a vendor from a list of authorized vendors) duties. The
purchasing agent gets custody to cash when the vendor gives her the kickback.
Vendor performance with respect to reliability, quality of goods, and prices charged
should be tracked and periodically reviewed. Prices should periodically be compared
to those charged by other vendors to make sure they are fair, competitive, and
reasonable. Analytical procedures can be performed to track the percentage of
business a purchasing agent gives to vendors.
The company needs to establish policies and a code of conduct that prohibits conflicts
of interest, related party transactions, and kickbacks.
7-23
Ch. 7: Control and Accounting Information Systems
7.3 The following description represents the policies and procedures for agent expense
reimbursements at Excel Insurance Company.
Agents submit a completed expense reimbursement form to their branch manager at
the end of each week. The branch manager reviews the expense report to determine
whether the claimed expenses are reimbursable based on the companys expense
reimbursement policy and reasonableness of amount. The companys policymanual
states that agents are to document any questionable expense item and that the branch
manager must approve in advance expenditures exceeding $500.
After the expenses are approved, the branch manager sends the expense report to the
home office. There, accounting records the transaction, and cash disbursements
prepares the expense reimbursement check. Cash disbursements sends the expense
reimbursement checks to the branch manager, who distributes them to the agents.
To receive cash advances for anticipated expenses, agents must complete a Cash
Advance Approval form. The branch manager reviews and approves the Cash
Advance Approval form and sends a copy to accounting and another to the agent. The
agent submits the copy of the Cash Advance Approval form to the branch office
cashier to obtain the cash advance.
At the end of each month, internal audit at the home office reconciles the expense
reimbursements. It adds the total dollar amounts on the expense reports from each
branch, subtracts the sum of the dollar totals on each branchs Cash Advance
Approval form, and compares the net amount to the sum of the expense
reimbursement checks issued to agents. Internal audit investigates any differences.
Identify the internal control strengths and weaknesses in Excels expense
reimbursement process. Look for authorization, recording, safeguarding, and
reconciliation strengths and weaknesses. (CMA Examination adapted)
Accounting Information
Systems
Strengths Weaknesses
Authorization
Excel has a formal statement of policies There is no limit on the agents total weekly
and procedures for agent reimbursements. expenditures or cash advances.
Expense reports must be approved by the Expense reimbursement checks are sent to the
Branch Manager prior to payment. Branch Manager for distribution rather than to the
agent. This allows the Branch Manager to submit a
fictitious expense reimbursement for a former agent
or one on vacation and then cash the check.
Recording
Accounting receives approved expense The Branch Manager does not retain a copy of
reports and cash advance forms. This expense reports or cash advances for audit
facilitates the correct recording of all purposes.
authorized transactions.
The expense report is not checked for mathematical
accuracy.
Safeguarding
Expense reimbursement checks are issued A copy of the Cash Advance Approval form should
by the cash disbursements department. be sent to the Branch Office Cashier so it can
compare it with the one submitted by the agent.
Cash disbursements are made only after Supporting documentation is not required for all
receipt of an approved expense report or expenditures.
Cash Advance Approval form.
Reconciliation
Internal Audit compares reimbursement There is no reconciliation of Branch Office
checks with expense report totals less cash Cashier disbursements with Cash Advance
advances in the home office. Approval forms.
7-25
Ch. 7: Control and Accounting Information Systems
7.4 The Gardner Company, a client of your firm, has come to you with the following
problem. It has three clerical employees who must perform the following functions:
a. Maintain the general ledger
b. Maintain the accounts payable ledger
c. Maintain the accounts receivable ledger
d. Prepare checks for signature
e. Maintain the cash disbursements journal
f. Issue credits on returns and allowances
g. Reconcile the bank account
h. Handle and deposit cash receipts
Assuming equal abilities among the three employees, the company asks you to assign
the eight functions to them to maximize internal control. Assume that these employees
will perform no accounting functions other than the ones listed.
a. List four possible unsatisfactory pairings of the functions
All five of the unsatisfactory pairings below involve custody of cash and a recording
function that would allow a fraud perpetrator to conceal a theft.
1. General ledger - cash receipts. With custody to cash, this person could steal
cash receipts and conceal the theft by recording a fictitious entry in the General
Ledger to credit (reduce) the balance of the cash account by the amount stolen.
2. Accounts receivable ledger - cash receipts. With custody to cash, this person
could steal cash receipts and conceal the theft by recording a fictitious entry in
the Accounts Receivable Subsidiary Ledger to reduce a customers accounts
receivable balance by the amount stolen.
3. Bank reconciliation - cash receipts. With custody to cash, this person could
steal cash receipts and conceal the theft by falsifying (recording) the bank
reconciliation.
4. Credits on returns and allowances - cash receipts. This person could
authorize (authorization) or record false credit memos (recording) to customers
who are making a payment and steal the customer payments (custody).
5. Accounts payable ledger - prepare checks for signature. A person with both
of these responsibilities could create fictitious payables (recording) and then
write and cash checks to pay them (custody).
6. Maintain accounts receivable - issue credit memos this combines
authorization and recording. A person with both of these responsibilities could
write off accounts for friends.
b. State how you would distribute the functions among the three employees.
Assume that with the exception of the nominal jobs of the bank reconciliation
Accounting Information
Systems
and the issuance of credits on returns and allowances, all functions require an
equal amount of time.
Any distribution that avoids all of the above unsatisfactory combinations and spreads
the workload evenly is acceptable. The key is not to have anyone with both custody
and a recording function that could be used to conceal a theft. One such combination
is:
First employee accounts payable ledger, accounts receivable ledger, bank
reconciliations
Second employee general ledger, disbursements journal, credits on returns and
allowances
Third employee prepare checks for signature, cash receipts
7-27
Ch. 7: Control and Accounting Information Systems
7.5 During a recent review, ABC Corporation discovered that it has a serious internal
control problem. It is estimated that the impact associated with this problem is $1
million and that the likelihood is currently 5%. Two internal control procedures have
been proposed to deal with this problem. Procedure A would cost $25,000 and reduce
likelihood to 2%; procedure B would cost $30,000 and reduce likelihood to 1%. If
both procedures were implemented, likelihood would be reduced to 0.1%.
a. What is the estimated expected loss associated with ABC Corporations internal
control problem before any new internal control procedures are implemented?
c. Compare the estimated costs and benefits of procedure A, procedure B, and both
procedures combined. If you consider only the estimates of cost and benefit, which
procedure(s) should be implemented?
Considering only the estimated costs and benefits, procedure B should be implemented
because its net benefit is greater than A; it is also greater than both A and B together.
Care must be taken with these discussions, however, because the numbers used are
estimates. The net benefit figures are only as good as the estimates used to produce
them.
Another important factor to consider is how critical the $1,000,000 loss would be to
ABC Corporation.
If ABC is a multi-billion dollar corporation, then they can afford to evaluate this
matter strictly on the basis of estimated costs and benefits.
(as a form of insurance premium) to reduce the risk of loss to the smallest
possible level.
e. Use the Goal Seek function in Microsoft Excel to determine the likelihood of
occurrence without the control and the reduction in expected loss if the net
benefit/cost is 0. Do this for procedure A, procedure B, and both procedures together
7-29
Ch. 7: Control and Accounting Information Systems
7-31
Ch. 7: Control and Accounting Information Systems
7.6 The management at Covington, Inc., recognizes that a well-designed internal control
system provides many benefits. Among the benefits are reliable financial records that
facilitate decision making and a greater probability of preventing or detecting errors
and fraud. Covingtons internal auditing department periodically reviews the
companys accounting records to determine the effectiveness of internal controls. In
its latest review, the internal audit staff found the following eight conditions:
1. Daily bank deposits do not always correspond with cash receipts.
2. Bad debt write-offs are prepared and approved by the same employee.
3. There are occasional discrepancies between physical inventory counts and
perpetual inventory records.
4. Alterations have been made to physical inventory counts and to perpetual
inventory records.
5. There are many customer refunds and credits.
6. Many original documents are missing or lost. However, there are substitute
copies of all missing originals.
7. An unexplained decrease in the gross profit percentage has occurred.
8. Many documents are not approved.
For each of the eight conditions detected by the Covington internal audit staff:
a. Describe a possible cause of the condition.
b. Recommend actions to be taken and/or controls to be implemented that would
correct the condition. Adapted from the CMA Examination
Accounting Information
Systems
Timing difference between when cash is Make two deposits for each days receipts.
received and when deposited in the bank
- Cash is received after the days bank An employee who does not handle cash
deposit is prepared and sent to the receipts daily reconciles each days cash
bank. receipts per book with deposits per bank
- Bank credits bank deposits received
after a certain hour on the next day.
List cash received each day; compare it to daily
Cash receipts are being stolen cash deposits.
Collusion between customers and the Require all bad debt write-offs to be approved
employee writing off the bad debts. by a second employee.
7-33
Ch. 7: Control and Accounting Information Systems
Customers given lower, preferential sales Require the approval of a responsible party
prices before granting preferential sales prices
Lack of, misunderstanding of, or failure Prepare or update written procedures and train
to comply with written procedures. employees using the procedures
7-35
Ch. 7: Control and Accounting Information Systems
For the situations presented, describe the recommendations the internal auditors
should make to prevent the following problems. Adapted from the CMA Examination
Situation 1: Many employees of a firm that manufactures small tools pocket some of
the tools for their personal use. Since the quantities taken by any one employee are
immaterial, the individual employees do not consider the act as fraudulent or
detrimental to the company. The company is now large enough to hire an internal
auditor. One of the first things she did was to compare the gross profit rates for
industrial tools to the gross profit for personal tools. Noting a significant difference,
she investigated and uncovered the employee theft.
Implement and communicate through proper training a policy regarding the theft of
company goods and services and the repercussions associated with theft.
Continue to compare the gross profit rates for industrial tools to the gross profit for
personal tools until the problem is resolved.
Institute better physical access controls over the tools to prevent theft
Implement a better segregation of duties. The company controller should not be able to
order goods, specify shipment locations, and authorize payment for inventory.
7.8 Tralor Corporation manufactures and sells several different lines of small electric
components. Its internal audit department completed an audit of its expenditure
processes. Part of the audit involved a review of the internal accounting controls for
payables, including the controls over the authorization of transactions, accounting for
transactions, and the protection of assets. The auditors noted the following items:
1. Routine purchases are initiated by inventory control notifying the purchasing
department of the need to buy goods. The purchasing department fills out a
prenumbered purchase order and gets it approved by the purchasing manager.
The original of the five-part purchase order goes to the vendor. The other four
copies are for purchasing, the user department, receiving for use as a receiving
report, and accounts payable.
2. For efficiency and effectiveness, purchases of specialized goods and services are
negotiated directly between the user department and the vendor. Company
procedures require that the user department and the purchasing department
approve invoices for any specialized goods and services before making payment.
3. Accounts payable maintains a list of employees who have purchase order approval
authority. The list was updated two years ago and is seldom used by accounts
payable clerks.
4. Prenumbered vendor invoices are recorded in an invoice register that indicates the
receipt date, whether it is a special order, when a special order is sent to the
requesting department for approval, and when it is returned. A review of the
register indicated that there were seven open invoices for special purchases, which
had been forwarded to operating departments for approval over 30 days
previously and had not yet been returned.
5. Prior to making entries in accounting records, the accounts payable clerk checks
the mathematical accuracy of the transaction, makes sure that all transactions are
properly documented (the purchase order matches the signed receiving report and
the vendors invoice), and obtains departmental approval for special purchase
invoices.
6. All approved invoices are filed alphabetically. Invoices are paid on the 5th and
20th of each month, and all cash discounts are taken regardless of the terms.
7. The treasurer signs the checks and cancels the supporting documents. An original
document is required for a payment to be processed.
8. Prenumbered blank checks are kept in a locked safe accessible only to the cash
disbursements department. Other documents and records maintained by the
accounts payable section are readily accessible to all persons assigned to the
section and to others in the accounting function.
Review the eight items listed and decide whether they represent an internal control
strength or weakness
7-37
Ch. 7: Control and Accounting Information Systems
a. For each internal control strength you identified, explain how the procedure
helps achieve good authorization, accounting, or asset protection control.
b. For each internal control weakness you identified, explain why it is a weakness
and recommend a way to correct the weakness
Adapted from the CMA Examination
1 User authorization means A purchase order copy should not be The receiving report is
the right materials and used as a receiving report unless the prepared after an
quantities will be ordered. quantities have been blanked out. independent count and
identification.
The use of pre-numbered
purchase orders allows all
POs to be accounted for.
2 The user/purchaser may not be trained Both the user and the
in purchasing techniques and could be purchasing agent should be
overcharged in the transaction. involved in negotiating with
the company.
2
It increases the potential for collusive The purchasing department
agreements. should approve orders before
the purchase, not before
payment is made.
4 Numbering and recording Failure to follow-up on open invoices A periodic review and
process establishes good indicates an ineffective control due to follow-up of all open items.
control over invoices and a lack of follow-up.
helps ensure their recording
in accounting records.
Requiring original
documents and cancelling
them after payment reduces
duplicate payments.
8 Proper protection of blank Unlimited access to cash disbursement A policy limiting access to
checks (locked safe only documents (other than blank checks) and physical protection of
accessible to cash permits unauthorized alteration of accounts payable documents
disbursements department payables documents. This could result and records should be
in a loss of control, a loss of established and monitored.
accountability, or a loss of assets - as
well as improper or inaccurate
accounting or destruction of records.
7-39
Ch. 7: Control and Accounting Information Systems
7.8 Lancaster Company makes electrical parts for contractors and home improvement
retail stores. After their annual audit, Lancasters auditors commented on the
following items regarding internal controls over equipment:
1. The operations department that needs the equipment normally initiates a
purchase requisition for equipment. The operations department supervisor
discusses the proposed purchase with the plant manager. If there are sufficient
funds in the requesting departments equipment budget, a purchase requisition is
submitted to the purchasing department once the plant manager is satisfied that
the request is reasonable.
2. When the purchasing department receives either an inventory or an equipment
purchase requisition, the purchasing agent selects an appropriate supplier and
sends them a purchase order.
3. When equipment arrives, the user department installs it. The property, plant, and
equipment control accounts are supported by schedules organized by year of
acquisition. The schedules are used to record depreciation using standard rates,
depreciation methods, and salvage values for each type of fixed asset. These rates,
methods, and salvage values were set 10 years ago during the companys initial
year of operation.
4. When equipment is retired, the plant manager notifies the accounting department
so the appropriate accounting entries can be made.
5. There has been no reconciliation since the company began operations between the
accounting records and the equipment on hand.
Identify the internal control weaknesses in Lancasters system, and recommend ways
to correct them. Adapted from the CMA Examination
Weakness Recommendation
1. No authorization form describing The purchase requisition should include an item
the item to be acquired, why it is description, why the item is needed, estimated costs
needed, expected costs, and and benefits, account code, useful life, depreciation
benefits. method, and management approval.
2. Equipment purchases over a certain Large sums of money can be spent on equipment.
amount are not reviewed and Large purchases should be approved by top
approved by top management. management
assets are intermingled with processed using special procedures and purchase
requisitions for inventory, even orders.
though they are very different
purchases. This results in a lack of Copies of equipment purchase orders should be
control over the much more distributed to all appropriate departments so they can
expensive equipment acquisitions. be monitored.
5. Plant engineering is not inspecting Machinery and equipment should be subject to normal
machinery and equipment upon receiving routines. In addition, plant engineering
receipt. should inspect the machines to make certain the
correct item was delivered and that it was not
damaged in transit.
6. Equipment is not tagged and All new machinery and equipment should be assigned
controlled to prevent theft. a control number and tagged at the time of receipt.
7. Plant engineering is not helping Plant engineering should help with the equipment
with the equipment installations. installations to ensure expensive equipment is not
damaged.
7-41
Ch. 7: Control and Accounting Information Systems
7.10 The Langston Recreational Company (LRC) manufactures ice skates for racing,
figure skating, and hockey. The company is located in Kearns, Utah, so it can be
close to the Olympic Ice Shield, where many Olympic speed skaters train.
Given the precision required to make skates, tracking manufacturing costs is very
important to management so it can price the skates appropriately. To capture and
collect manufacturing costs, the company acquired an automated cost accounting
system from a national vendor. The vendor provides support, maintenance, and
data and program backup service for LRCs system.
LRC operates one shift, five days a week. All manufacturing data are collected and
recorded by Saturday evening so that the prior weeks production data can be
processed. One of managements primary concerns is how the actual manufacturing
process costs compare with planned or standard manufacturing process costs. As a
result, the cost accounting system produces a report that compares actual costs with
standards costs and provides the difference, or variance. Management focuses on
significant variances as one means of controlling the manufacturing processes and
calculating bonuses.
Occasionally, errors occur in processing a weeks production cost data, which
requires the entire weeks cost data to be reprocessed at a cost of $34,500. The
current risk of error without any control procedures is 8%. LRCs management is
currently considering a set of cost accounting control procedures that is estimated to
reduce the risk of the data errors from 8% to 3%. This data validation control
procedure is projected to cost $1,000 per week.
a. Perform a cost/benefit analysis of the data-validation control procedures.
Risk of Data
Errors 8% 3%
Expected Reprocessing
Costs $2,760 $1,035 $1,725
(Cost of Process * Risk)
Net estimated
benefit/(loss) $725
Accounting Information
Systems
Since the process yields an estimated net weekly benefit of $725, LRC should
implement the control process.
c. The current risk of data errors without any control procedures is estimated to be
8%. The data control validation procedure costs $1,000 and reduces the risk to
3%. At some point between 8% and 3% is a point of indifferencethat is, Cost of
reprocessing the data without controls = Cost of processing the data with the
controls + Cost of controls. Use a spreadsheet application such as Excel Goal Seek
to find the solution
Solution: 6%
7-43
Ch. 7: Control and Accounting Information Systems
Net estimated
benefit $0
7-45
Ch. 7: Control and Accounting Information Systems
7.11 Spring Water Spa Company is a 15-store chain in the Midwest that sells hot tubs,
supplies, and accessories. Each store has a full-time, salaried manager and an
assistant manager. The sales personnel are paid an hourly wage and a commission
based on sales volume.
The company uses electronic cash registers to record each transaction. The
salesperson enters his or her employee number at the beginning of his/her shift. For
each sale, the salesperson rings up the order by scanning the items bar code, which
then displays the items description, unit price, and quantity (each item must be
scanned). The cash register automatically assigns a consecutive number to each
transaction. The cash register prints a sales receipt that shows the total, any
discounts, the sales tax, and the grand total.
The salesperson collects payment from the customer, gives the receipt to the
customer, and either directs the customer to the warehouse to obtain the items
purchased or makes arrangements with the shipping department for delivery. The
salesperson is responsible for using the system to determine whether credit card sales
are approved and for approving both credit sales and sales paid by check. Sales
returns are handled in exactly the reverse manner, with the salesperson issuing a
return slip when necessary.
At the end of each day, the cash registers print a sequentially ordered list of sales
receipts and provide totals for cash, credit card, and check sales, as well as cash and
credit card returns. The assistant manager reconciles these totals to the cash register
tapes, cash in the cash register, the total of the consecutively numbered sales invoices,
and the return slips. The assistant manager prepares a daily reconciled report for the
store managers review.
Cash sales, check sales, and credit card sales are reviewed by the manager, who
prepares the daily bank deposit. The manager physically makes the deposit at the
bank and files the validated deposit slip. At the end of the month, the manager
performs the bank reconciliation. The cash register tapes, sales invoices, return slips,
and reconciled report are mailed daily to corporate headquarters to be processed with
files from all the other stores. Corporate headquarters returns a weekly Sales and
Commission Activity Report to each store manager for review.
Please respond to the following questions about Spring Water Spa Companys
operations: (CMA exam adapted)
a. The fourth component of the COSO ERM framework is risk assessment. What
risk(s) does Spring Water face?
Spring Water faces the risk of fraud and employee theft of merchandise and cash.
Spring Water also faces the risk of unintentional employee errors.
7-47
Ch. 7: Control and Accounting Information Systems
The bank reconciliation should be performed by someone other than the manager
who makes the deposits.
Sales people should never be allowed to authorize credit sales. At Spring Water,
the sales person authorizes credit purchases and approves payments made by check.
They also approve sales returns. This lack of separation of duties facilitates fraud.
In addition, since the sales person is paid a commission based on sales without
taking into account returns and collections, they have incentive to approve all credit
sales and accept all payments made by check without checking whether a customer
is credit worthy and/or whether the have sufficient funds available to cover their
check. They can also talk customers into buying more than they need and then
returning the items not needed.
Warehouse personnel should have electronic read-only access to daily sales orders
to control and facilitate customer order pick-up and/or delivery.
Warehouse personnel should scan-in the bar codes of all sales-return merchandise.
The manager or assistant manager should reconcile a sales return report from the
warehouse to the sales return report from the cash registers on the sales floor.
Accounting Information
Systems
customers are placed in one of six 30-day billing cycles. Monthly statements,
prepared by Billing, are sent to customers during the cycle billing period.
Outstanding carry forward balances reported by Accounts Receivable and credit
memos prepared by the credit manager are included on the monthly statement.
Billing also prepares electronic sales and credit memos for each cycle. Electronic
copies of invoices and credit memos are forwarded to Accounts Receivable for entry
into the accounts receivable master file by customer account. An aging report is
prepared at the end of each month and forwarded to the credit manager. The
general accounting office staff access the accounts receivable master file that reflects
total charges and credits processed through the accounts receivable system for each
cycle. General accounting runs a query to compare this information to the electronic
sales and credit memo and posts the changes to the general ledger master file.
(CMA exam adapted)
The automated customer credit limit system suggests a new customer's credit limit on
a real-time basis. The Credit Manager establishes credit limits for new customers on
a daily basis so that new credit-worthy customers can have their orders filled in a
timely manner.
Monthly aging reports allow the credit manager to detect overdue and near overdue
accounts so that corrective action can be taken.
The credit manager creates credit memos that authorize returned merchandise but has
no recording responsibility.
Shipping and Receiving accept and inspect returned materials to assure the receipt
and identification of damaged materials and to limit credit returns.
Warehouse personnel confirm the availability of materials to fill orders and prepare
back-orders for sales orders that cannot be filled with current stock.
General Accounting posts changes to the general ledger master file after accessing the
accounts receivable master file, electronic sales, and credit memo files.
b Identify the internal control weaknesses in PEIs system, and suggest ways to correct
them.
Weakness 1: The Credit Department only checks the accounts receivable aging report at
Accounting Information
Systems
month-end, which delays the identification of slow or non-paying customers for potential
credit status changes.
Correction: Revise the aging report process to produce an exception report whenever a
customer account is overdue. The exception report should automatically be sent to the
credit manager by email so that corrective action can be taken in a timely manner.
Weakness 2: Customer credit requests for sales returns are not compared to materials
received, which might result in credits to customer accounts for goods not returned or for
returned goods that are damaged.
Weakness 3: Warehouse personnel have responsibility for updating inventory records for
purchases and sales that can lead to inventory shrinkage.
Correction: Create a purchasing function to update the inventory master file for
purchases. The update should not take place until Shipping and Receiving notify them that
the goods have been received.
Correction: Receiving should record all purchase returns and prepare a Returned Goods
report. This record should be used to create a daily report that should be sent to General
Accounting to compare with the purchase returns put back into the warehouse.
Weakness 5: Warehouse personnel have responsibility for updating inventory records for
purchase returns, which can lead to inventory shrinkage.
Correction: Have the warehouse create a daily purchases returned report for all returned
goods they receive from Receiving. This report should be sent to General Accounting for
comparison with a purchase return report prepared by Receiving.
Weakness 6: Inventory is not counted when received and then counted again when
received by the warehouse to prevent theft after items are received. In similar fashion,
inventory is not counted before leaving the warehouse, when received by shipping, and
when shipped. Those counts should be the same to ensure that inventory is not stolen
before it is shipped to the customer.
7-51
Ch. 7: Control and Accounting Information Systems
Correction: Count and compare inventory counts as inventory enters the company and as
it arrives in warehousing; likewise count and compare inventory counts as it leaves
warehousing and arrives at shipping.
Correction: Billing should be more prompt in billing for goods shipped. This gives
customers more time to put the bill through their bill paying process and pay for the goods
on time.
Accounting Information
Systems
7.1 Nino Moscardi, president of Greater Providence Deposit & Trust (GPD&T), received
an anonymous note in his mail stating that a bank employee was making bogus loans.
Moscardi asked the banks internal auditors to investigate the transactions detailed in
the note. The investigation led to James Guisti, manager of a North Providence
branch office and a trusted 14-year employee who had once worked as one of the
banks internal auditors. Guisti was charged with embezzling $1.83 million from the
bank using 67 phony loans taken out over a three-year period.
Court documents revealed that the bogus loans were 90-day notes requiring no
collateral and ranging in amount from $10,000 to $63,500. Guisti originated the loans;
when each one matured, he would take out a new loan, or rewrite the old one, to pay
the principal and interest due. Some loans had been rewritten five or six times.
The 67 loans were taken out by Guisti in five names, including his wifes maiden
name, his fathers name, and the names of two friends. These people denied receiving
stolen funds or knowing anything about the embezzlement. The fifth name was James
Vanesse, who police said did not exist. The Social Security number on Vanesses loan
application was issued to a female, and the phone number belonged to a North
Providence auto dealer.
Lucy Fraioli, a customer service representative who cosigned the checks, said Guisti
was her supervisor and she thought nothing was wrong with the checks, though she
did not know any of the people. Marcia Perfetto, head teller, told police she cashed
checks for Guisti made out to four of the five persons. Asked whether she gave the
money to Guisti when he gave her checks to cash, she answered, Not all of the time,
though she could not recall ever having given the money directly to any of the four,
whom she did not know.
Guisti was authorized to make consumer loans up to a certain dollar limit without
loan committee approvals, which is a standard industry practice. Guistis original
lending limit was $10,000, the amount of his first fraudulent loan. The dollar limit was
later increased to $15,000 and then increased again to $25,000. Some of the loans,
including the one for $63,500, far exceeded his lending limit. In addition, all loan
applications should have been accompanied by the applicants credit history report,
purchased from an independent credit rating firm. The loan taken out in the fictitious
name would not have had a credit report and should have been flagged by a loan
review clerk at the banks headquarters.
News reports raised questions about why the fraud was not detected earlier. State
regulators and the banks internal auditors failed to detect the fraud. Several reasons
were given for the failure to find the fraud earlier. First, in checking for bad loans,
bank auditors do not examine all loans and generally focus on loans much larger than
the ones in question. Second, Greater Providence had recently dropped its computer
services arrangement with a local bank in favor of an out-of-state bank. This
7-53
Ch. 7: Control and Accounting Information Systems
changeover may have reduced the effectiveness of the banks control procedures.
Third, the banks loan review clerks were rotated frequently, making follow-up on
questionable loans more difficult.
Guisti was a frequent gambler and used the embezzled money to pay gambling debts.
The banks losses totaled $624,000, which was less than the $1.83 million in bogus
loans, because Guisti used a portion of the borrowed money to repay loans as they
came due. The banks bonding company covered the loss.
The bank experienced other adverse publicity prior to the frauds discovery. First, the
bank was fined $50,000 after pleading guilty to failure to report cash transactions
exceeding $10,000, which is a felony. Second, bank owners took the bank private after
a lengthy public battle with the State Attorney General, who alleged that the bank
inflated its assets and overestimated its capital surplus to make its balance sheet look
stronger. The bank denied this charge.
1. How did Guisti commit the fraud, conceal it, and convert the fraudulent actions
to personal gain?
Conceal: He made the loans out to five people: his wife using her maiden name, his
father, two friends, and a non-existent person. To avoid detection, he made sure the
loans were performing and that they were never examined for non-payment. That is,
when the loans matured, he would take out a new loan, or rewrite the old one, to pay
the principal and interest due. He also kept the loans small to avoid the attention of
auditors, who examined loans much larger than those he was fraudulently originating.
2. Good internal controls require that the custody, recording, and authorization
functions be separated. Explain which of those functions Guisti had and how the
failure to segregate them facilitated the fraud.
As the scheme progressed, he was able to bypass loan committee approval for loans
that exceeded his loan limit. This is not standard industry practice and represents a
failure of bank internal controls.
Custody: Guisti was able to commit the fraud because he was able to obtain custody
of the checks used to extend the loans. He used his position as branch manager to get
his subordinates to cosign the checks and cash them.
Recording: Nothing in the case write-up indicates that Guisti had any recording
responsibilities. It appears that he used the banks normal recording processes: the
bank recorded the loans when created and the payments were appropriately recorded
when Guisti repaid them
3. Identify the preventive, detective, and corrective controls at GPD&T and discuss
whether they were effective.
Preventive: All bank loans exceeding Guists limit ($10,000, then $15,000 and then
$25,000) were supposed to be approved by a loan committee. This control was not
enforced or was not effective as Guisti was able to bypass it.
Greater Providence dropped its computer services arrangement with a local bank in
favor of an out-of-state bank. This may have reduced the effectiveness of the banks
control procedures.
7-55
Ch. 7: Control and Accounting Information Systems
Detective: State regulators and the banks internal auditors failed to detect the fraud.
Bank auditors do not examine all loans and focus on much larger loans than Guistis.
The banks loan review clerks were rotated frequently, making follow-up on
questionable loans more difficult.
Corrective: The bank bonded (an insurance policy on an employees honesty) its
employees. When the bank was defrauded, the banks bonding company covered the
loss. This control was effective in restoring the financial losses the bank experienced.
Pressures: Guisti was a frequent gambler and needed the money to pay gambling
debts.
Opportunities: As the Branch Manager, Guisti could override some internal controls
and unduly influence his subordinates not to comply with others.
5. Discuss how Greater Providence Deposit & Trust might improve its control
procedures over the disbursement of loan funds to minimize the risk of this type
of fraud. In what way does this case indicate a lack of proper segregation of
duties?
Loan funds should generally not be disbursed in cash. Better control would be
established by depositing the funds in a checking account in the borrower's name or
by issuing a bank check to the borrower.
When cashing such a check, bank personnel should require identification containing
the borrower's photograph, and the borrower's signature on the check, and should
scan both the photograph and the signature to verify the borrower's identity.
In no case should one bank employee disburse cash to another for a loan to a third
party borrower without first verifying the existence and identity of the borrower.
6. Discuss how Greater Providence might improve its loan review procedures at
bank headquarters to minimize its fraud risk. Was it a good idea to rotate the
assignments of loan review clerks? Why or why not?
Accounting Information
Systems
Approved loans for which there is no credit report should be flagged and scrutinized.
Bank headquarters could send a letter to each new borrower thanking them for their
business. Individuals whose names had been used on loan documents without their
permission would be likely to question why they had received such a letter, while
letters mailed to fictitious borrowers would be returned as undeliverable. Either event
should trigger an investigation.
Rotating the assignments of loan review clerks may have made it more difficult for
the bank to detect this fraud. After it discovered the embezzlement, Greater
Providence changed its policy to require its loan review clerks to track a problem loan
until it is resolved.
7. Discuss whether Greater Providences auditors should have been able to detect
this fraud.
Audits are not guaranteed to detect fraud. It is too costly for auditors to examine
every loan, so they generally examine a systematically selected sample. It makes
sense for auditors to focus on larger loans, since that is where the greatest exposure is.
The case notes that Guisti was a former auditor. Therefore, he would have been very
familiar with the bank's control system and its audit procedures. He undoubtedly
made use of this knowledge in planning and carrying out his embezzlement scheme.
On the other hand, since the bank's central records were computerized, it should have
been a simple matter for auditors to find and examine every outstanding loan record
with questionable characteristics, such as:
If auditors had any indication that Guisti was heavily involved in gambling activities,
they should have examined his accounts very carefully. However, the case gives no
indication that the auditors were ever aware of Guisti's penchant for gambling.
7-57
Ch. 7: Control and Accounting Information Systems
8. Are there any indications that the internal environment at Greater Providence
may have been deficient? If so, how could it have contributed to this
embezzlement?
There are three indications of potential deficiencies in the bank's control environment.
Controls may have been deficient during the computer services changeover.
However, the fraud took place over a three-year period, and any problems relating
to the computer changeover should have taken much less than three years to
resolve.
The bank pled guilty to a felony three years prior to discovery of the fraud, which
was about the time the fraud began.
The state's charges of an inflated balance sheet suggest the possibility that the
integrity of the bank's management may be flawed, though there is certainly no
proof of this.
While one indicator of a deficient internal environment may be tolerable, three begins
to look like a pattern. Deficiencies in the bank's internal environment certainly could
have contributed to the embezzlement by enhancing the opportunity for fraud and by
fostering an attitude that dishonest behavior is somehow acceptable.