...SELF-ASSESSMENT CHECK INSTUCTIONS: This Self-Check Instruments will give the trainer necessary data of information which is essential in journalizing transactions. Please check the appropriate box of your answer to the questions below. CORE COMPETENCIES | | | Can I…? | Yes | No | 1. Journalize Transactions | 1.1 Prepare chart of accounts | √ | | 1.2 Analyze documents | √ | | 1.3 Prepare journal entries | √ | | 2. Post Transactions | 2.1 Prepare ledger | | √ | 2.2 Transfer journal entries | | √ | 2.3 Summarize ledger | | √ | 3. Prepare trial balance | 3.1 List account titles and transfer from the balance | √ | | 3.2 Summarize trial balance | √ | | 4. Prepare Financial Reports | 4.1 Prepare financial statements | √ | | 4.2 Analyze financial statements | √ | | 5. Review internal control system | 5.1 Check policy compliance | √ | | 5.2 Prepare policy compliance report | √ | | Evidences/Proof of Current Competencies Evidences of Current Competencies acquired related Job/Occupation Current Competencies | Proof/Evidence | Means of Validating | 1. Journalize Transactions | * Demonstration * Certificate of Employment | * Assessment * Authenticity | 1.1 Prepare chart of accounts | | | 1.2 Analyze documents | | | 1.3 Prepare journal entries | | | 3. Prepare trial balance...
Words: 1050 - Pages: 5
...Running Head: INTERNAL CONTROLS May 8, 2011 Manhattan Company Re: Audit of Internal Controls Dear Mr. Jerry Mays, This letter is to inform you of our findings of the conducted audit on your company’s internal control process. There are many great things your company does with its internal control processes, however there are several vulnerabilities that could pose a huge risk to your company’s assets. These vulnerabilities are associated with the way your company processes the receipt of mail, handling of checks, and check deposits. Although, these could potentially cause serious threats, a provided list of recommendations for improving your internal control process is outlined below. In your current system there are no internal logs of incoming checks, a person from accounts receivable is opening mail, and deposits are only made weekly. Though these may not seem like serious vulnerabilities they can cause a great risk to your organization’s assets. My recommendation to strengthen your internal controls system is to establish responsibility by specific employees, separate employee functions, document procedures, and create an internal verification system (Weygandt, Kimmel, Kieso, 2008). I would have one person to open checks and log them with business name, amount, check number and date received. This control is by far the most effective as only one person is held responsible...
Words: 410 - Pages: 2
...Planning…………………………………………….…………….…...2 AUDIT-2 Internal Control…………………………………………………………………….………...3 AUDIT-3 Audit Evidence…………………………………………………………….………………....4 AUDIT-4 Audit Sampling.......................................................................................................…...5 Audit Reports........................................................................................................…....6 AUDIT-5 Compilations and Reviews (SSARS)……………………………………….…………….7 Other Services and Reports………………………………………………….…………….8 Information Technology (IT)……………………………………………………..…………9 Appendix AICPA Released Questions……………….…………….…………….……..….Appendix AUD-2 Internal Control The following is an excerpt from the Roger CPA Review Text books, which are included with purchase of the Roger CPA Review course. Written and updated by your instructor, Roger Philipp, CPA, the textbooks are the perfect companion to our dynamic lectures. www.RogerCPAreview.com AUD-2 Internal Control The second standard of fieldwork states: “The auditor must obtain a sufficient understanding of the entity and the environment, including its internal control, to assess the risk of material misstatement (RMM) of the financial statements whether due to error or fraud, and to design the nature, timing, and extent of further audit procedures.” For Financial Statement audits, the auditor expresses an opinion on the client's financial statements, not on their internal control structure. The reason the auditor...
Words: 11022 - Pages: 45
...Unit 3 IP Shante Patterson ACCT205 AIU Online December 1, 2013 The internal control system should be intended to distinguish and prevent deception, mistakes and oversights, and material misstatements; then again it can only provide sensible assurance that the financial statements are at liberty from material misstatements. The best designed internal control system will not avert management override or collusion. The internal controls system is only as good as the management backing behind the system; this comprises training employees and dynamically observing the controls. The cost of applying a specific control should not surpass the probable benefit of the control. On occasion there are no out-of-pocket costs to institute an acceptable control. Internal control procedures are the duty of the management. Every single control must be assessed based on risk and a cost/benefit inquiry. Several operational low cost procedures can be applied. These control procedures, when in service effectively, will arrange for a sensible assurance that mistakes will be either prohibited or identified. Instances of controls that would have make sure that the prepaid tunings were made would be to gather a check-list of cyclical monthly journal records, than as a part of the financial report evaluation procedure, this check-list ought to be looked over by the management. At each financial statement date, each balance sheet account is resolved; this will guarantee that every single balance...
Words: 532 - Pages: 3
...Revenue Cycle (Ch11 Hurt) 92% of Public Companies’ Revenue Processes at Risk for Compliance Failures and Restatements New study by RevenueRecognition.com and IDC reveals widespread reliance on spreadsheets, which greatly increases the likelihood of control weakness and accounting errors. A recent survey of 685 senior financial executives from a broad range of companies, revealed that revenue recognition and reporting activities are not automated within Financial/ERP systems. As a result, 92% of public companies are forced to rely on spreadsheets to fill vital gaps in their revenue reporting processes—despite the fact that spreadsheets are prone to errors, lack audit capabilities, and resist internal controls. This, and other findings, is from a new report by www.RevenueRecognition.com and IDC, “Enterprise Systems and Revenue Recognition: The Missing Link”. Revenue Spreadsheets: The Compliance Killers These results should be alarming for corporate finance departments, executives, and investors alike, because: 1. The risks introduced by spreadsheets violate basic compliance principles. 2. Revenue accounting problems are the leading cause of financial restatements. 3. The number of restatements is on the rise. As a result, compliance managers should be addressing the issue of having spreadsheets in the revenue reporting process. Executives should be extremely cautious about the integrity of the numbers they are attesting to under Sarbanes-Oxley requirements...
Words: 2076 - Pages: 9
...LJB Company: Internal Control Evaluation Acct: 504 Case Study 2 Prepared by: Lennard Razor Prepared for: LJB Company 11/29/2014 LJB, 1 Table Of Contents Introduction: LJB Company Assessment 2 LJB Company: The Transition 3 Summary 5 Works Cited 6 LJB, 2 Introduction: LJB Company Assessment The overall purpose of this document is to assess the current state of the LJB Company. This assessment will thoroughly diagnose all of the components, both good and bad, used by LJB Company to help determine the company’s readiness to go public. Upon assessing all of the components and regulations currently utilized by LJB Company, I will also make recommendations for the improvement and future success of this company moving into the public market. In order to properly perform an assessment of the LBJ Company, there first had to be some set of standards or regulations that outline the internal controls and proper procedures for companies and businesses to adhere to for financial reporting. As it turns out internal control is a key component of Foreign Corrupt Practices Act(FCPA) of 1977 and the Sarbanes-Oxley Act(SOX) of 2002 which required companies to follow this set of internal controls. This list of internal controls is as follows: 1). Conduct its business in an orderly and efficient manner, 2). Safeguard its assets and resources, 3)...
Words: 939 - Pages: 4
...Student Company Internal Control Analysis |Process |Control Owner |Frequency |Documentation and execution |Control Review Process | 1. CASH DISBURSEMENTS |Approval of Vendor Invoices|A/P Clerk |Weekly |A/P Clerk collects vendor invoices, records |A scanned copy of the approved vendor | | |Purchasing Manager | |vendor invoices in the system, and gets vendor |invoices are kept in the system. Large | | | | |invoices approved by the Purchasing Manager |invoices are periodically reviewed, other | | | | | |invoices can be retrieved on an as needed | | | | | |basis. | |Printing Checks, Preparing |A/P Clerk |Weekly |A/P clerk prepares cash disbursement vouchers, |Treasurer reviews the cash disbursement | |Cash Disbursement Vouchers | | |which includes a copy of each approved invoice.|vouchers, and weekly check run prepared by| | | | |A/P Clerk prints the...
Words: 895 - Pages: 4
...Controls for Inflows Controls for Inflows Internal controls are a vital component in the business process and can serve to deter and minimize risks associated with day-to-day business. Internal controls are designed to safeguard a company’s assets by preventing theft, fraud, and waste of company resources. They are also implemented to ensure compliance with internal and other regulations. Sarbanes-Oxley Act of 2002 (2003) requires information from management and the auditors regarding the effectiveness and efficiency of a company’s internal controls. Effective internal controls will ensure reliability of financial reports. This proposal includes internal controls each company should implement for cash, sales, accounts receivable, inventory, and production. Cash A company must have strong effective internal control to protect against its cash resource. “Cash is highly liquid (easily converted into cash!), not easily identifiable as company property, and highly portable. For these reasons, cash is the favorite target of employee thieves, although theft of inventory is a close second” (Louwers, Ramsay, Sinason, & Strawser, 2007, p, 211). A company should have written processing procedures for cash known by those involved with cash. Additionally cash (includes money orders and checks) should always be stored in a locked and secured area. One main internal control for protection of cash is segregation of duties. Collection, accounting, and reconciliation of cash...
Words: 1773 - Pages: 8
...Reform and Investor Protection Act of 2002 (SOX) was passed. This document will focus on Sarbanes–Oxley Section 404: Assessment of internal control Section 404 of the SOX Act, requires management to produce an internal control report as part of each annual Exchange Act. The report must affirm the responsibility of management for establishing and maintaining an adequate internal control structure and procedures for financial reporting. The report must also contain an assessment, as of the end of the most recent fiscal year, of the effectiveness of the internal control structure and procedures of the issuer for financial reporting. Both management and the external auditor are responsible for performing their assessment in the context of a top-down risk assessment, which requires management to base both the scope of its assessment and evidence gathered on risk. This gives management wider discretion in its assessment approach. These two standards together require management to: * Assess both the design and operating effectiveness of selected internal controls related to significant accounts and relevant assertions, in the context of material misstatement risks; * Understand the flow of transactions, including IT aspects, in sufficient detail to identify points at which a misstatement could arise; * Evaluate company-level (entity-level) controls, which correspond to the components of the COSO framework; * Perform a fraud risk...
Words: 1548 - Pages: 7
...and Kale have found the following weaknesses in your internal controls over cash receipts. We are listing the weaknesses discovered along with suggested improvements. Weaknesses 1. Cash deposits are made on a weekly basis. This makes the receipts vulnerable to robbery and misappropriations. Checks aren’t deposited in a timely manner with this system. 2. A cashier or accounts receivable records keeper is opening mail. Under this system there is no segregation of duties, no assignment of responsibility, and no one is held accountable. Also, collections can be misappropriated. The cashier shouldn’t be in control of the funds from the time received until the time of deposit. 3. No reconciliation is made for check receipts and checks deposited. With no reconciliation report, you can’t verify that all in coming checks where forwarded to the cashier’s department and you can’t make sure all checks where entered correctly. This system can cause incorrect balances and totals to be listed in accounts. 4. List of checks are not made. With no list of checks, you can’t verify if a check was entered incorrectly. Also, you can’t verify what checks where deposited. You have nothing to compare to a receipt if the bank say’s there are errors or missing checks. The following suggested improvements should be implemented to improve your check receipts and deposits systems. Suggested Improvements ...
Words: 397 - Pages: 2
...Internal control is the process designed to ensure reliable financial reporting, effective and efficient operations, and compliance with applicable laws and regulations. Safeguarding assets against theft and unauthorized use, acquisition, or disposal is also part of internal control. Control environment. The management style and the expectations of upper-level managers, particularly their control policies, determine the control environment. An effective control environment helps ensure that established policies and procedures are followed. The control environment includes independent oversight provided by a board of directors and, in publicly held companies, by an audit committee; management's integrity, ethical values, and philosophy; a defined organizational structure with competent and trustworthy employees; and the assignment of authority and responsibility. Control activities. Control activities are the specific policies and procedures management uses to achieve its objectives. The most important control activities involve segregation of duties, proper authorization of transactions and activities, adequate documents and records, physical control over assets and records, and independent checks on performance. A short description of each of these control activities appears below. Segregation of duties requires that different individuals be assigned responsibility for different elements of related activities, particularly those involving authorization, custody...
Words: 503 - Pages: 3
... Extensive knowledge of computer hardware, software, and accounting applications * A detailed understanding of appropriate control policies and procedures in computer systems * An ability to read and understand system documentation * Experience in planning computer audits and in using modern computer auditing techniques. All internal auditors may not possess expertise in all of these areas. However, there is certainly some minimum level of computer expertise that is appropriate for all auditors. This would include: * An understanding of computer hardware, software, accounting applications, and controls. * The ability to examine all elements of the computerized AIS * The ability to use the computer as a tool to accomplish these auditing objectives. 9.2 Many authorities have suggested in recent years that internal auditors should be involved in systems development projects in order to ensure that newly developed systems are auditable and have effective controls. However, if the auditor's involvement is too great, then his or her independence may be impaired with respect to subsequent review and evaluation of the system....
Words: 5026 - Pages: 21
...you to gather information about MA ‘s general and application controls as well as some of CAATs that we can use in this new audit. You spoke to some of MA’s employees and did some additional research regarding the MA’s operations. The observations based on the research have been outlined in the exhibits. Your next step is to analyze those observations and come up with the general and application controls that need to be tested as well as the CAATs that can be used to audit MA’s financial statements. MA’s year-end is December. Exhibit 1 1. To protect the safety of the airport and the airlines, Mississauga Airport uses security-screening processes, during which, the airport collects a passenger’s personal information during the following occasions: * When the prohibited items are found to be a threat to aviation security; * When the amount of the money carried by a passenger exceeds $10,000; * When passengers are not cooperative or use violence. 2. Earlier this year, a traveller was suspected to take a prohibited tool in his baggage. According to MA’s policy, his personal information is to be held in the database for 30 days. On another occasion, two passengers argued and fought on the airplane, which resulted in the airplane having to be returned to the airport for further investigation. These passengers’ information was to be retained for a minimum of two years. There is no regular check...
Words: 4452 - Pages: 18
...LJB Company | Case Study #2 LJB Company | Internal Control | | This document contains information about the internal controls for LJB Company | TABLE OF CONTENTS 1. Introduction …………………………………… Pg 2 2. Six Internal Control Activities ……………….. Pg 2 3. LJB Company Positive Side ………………… Pg 2 4. Segregation of Duties ……………………..…. Pg 3 5. Petty Cash …………………………………….. Pg 3 6. Human Resources ……………………………. Pg 4 7. Conclusion ……………………………………... Pg 4 LJB Company is planning to go public in the future and before doing the president of the company would like to be made aware of any regulations required of his company if they go public, so they asked our accounting firm to evaluate their system of internal controls. In the process of the evaluation, our firm noticed several problems within the organization. Fraud is a big thing to have to watch out for when it comes to business owners. There are six principles of controls activities that help with such risks like fraud. 1. Establishment of responsibility 2. Segregation of duties 3. Documentation procedures 4. Physical controls 5. Independent internal verification 6. Human resource controls Mr. President, above is a list of internal controls that will help minimize the risk of fraud. After our evaluation we have noticed some problems that may turn into bigger problems if not addressed and addressed properly. Before we get started on talking about what we noticed that...
Words: 1081 - Pages: 5
...CHAPTER 7 CONTROL AND ACCOUNTING INFORMATION SYSTEMS SUGGESTED ANSWERS TO DISCUSSION QUESTIONS 7.1 Answer the following questions about the audit of Springer’s Lumber & Supply a. What deficiencies existed in the internal environment at Springer’s? The "internal environment" refers to the tone or culture of a company and helps determine how risk consciousness employees are. It is the foundation for all other ERM components, providing discipline and structure. It is essentially the same thing as the control environment in the internal control framework. The internal environment also refers to management's attitude toward internal control, and to how that attitude is reflected in the organization's control policies and procedures. At Springer's, several deficiencies in the control environment are apparent: 1. Management authority is concentrated in three family members, so there are few, if any, checks and balances on their behavior. In addition, several other relatives and friends of the family are on the payroll. 2. Since the company has a "near monopoly" on the business in the Bozeman area, few competitive constraints restrain prices, wages, and other business practices. 3. Lines of authority and responsibility are loosely defined, which make it difficult to identify who is responsible for problems or decisions. 4. Management may have engaged in "creative accounting" to make its financial performance...
Words: 16377 - Pages: 66