Free Essay

Revenue Cycle

In:

Submitted By haslinda
Words 4961
Pages 20
REVENUE CYCLE: SALES TO CASH COLLECTIONS

-------------------------------------------------
DEFINITION OF REVENUE CYCLE

The recurring set of business activities and data processing operations associated with: * Provides goods and services to customers * Collects cash in payment for those sales

Primary Objective: * Provide the right product * In the right place * At the right time for the right price

-------------------------------------------------
BASIC REVENUE CYCLE ACTIVITIES & GENERAL THREATS

BASIC REVENUE CYCLE ACTIVITIES

1. Sales order entry 2. Shipping 3. Billing 4. Cash collections

GENERAL REVENUE CYCLE THREATS

1. Inaccurate or invalid master data 2. Unauthorized disclosure of sensitive information 3. Loss or destruction of master data 4. Poor performance

GENERAL REVENUE CYCLE CONTROLS

1. Data processing integrity controls 2. Restriction of access to master data 3. Review of all changes to master data 4. Access controls 5. Encryption 6. Backup and disaster recovery procedures 7. Managerial reports

1. -------------------------------------------------
SALES ORDER ENTRY ACTIVITIES AND THREATS | CONTROL | 1. Take order 1. Incomplete/inaccurate orders 2. Invalid orders | 3. Data entry edit controls 4. Restriction of access to master data 5. Digital signatures or written signatures | 2. Check and approve credit * Uncollectible accounts | * Credit limits * Specific authorization to approve sales to new customers or sales that exceed a customer’s credit limit * Aging of accounts receivable | 3. Check inventory availability * Stock outs or excess inventory * Loss of customers | * Perpetual inventory control system * Use of bar-codes or RFID * Training * Periodic physical counts of inventory * Sales forecasts and activity reports * CRM systems, self-help Web sites, and proper evaluation of customer service ratings |

2. -------------------------------------------------
SHIPPING

ACTIVITIES AND THREATS | CONTROL | 1. Picking and packing the order * Picking the wrong items or the wrong quantity * Theft of inventory | * Bar-code and RFID technology * Reconciliation of picking lists to sales order details * Restriction of physical access to inventory * Documentation of all inventory transfers | 2. Shipping the order 6. Shipping errors (delay or failure to ship, wrong quantities, wrong items, wrong addresses, duplication | * Reconciliation of shipping documents with sales orders, picking lists, and packing slips * Use RFID systems to identify delays * Data entry edit controls (if shipping data entered on terminals) |

3. -------------------------------------------------
BILLING
ACTIVITIES AND THREATS | CONTROL | 1. Invoicing * Failure to bill customer * Billing errors ( pricing mistake, bill items not shipped, or unbilled item shipped) | * Separation of billing and shipping functions (segregation of duties) * Periodic reconciliation of invoices with sales orders, picking tickets, and shipping documents * Configuration of system to automatically enter pricing data * Restriction of access to pricing master data * Data entry edit controls | 2. Updating accounts receivable * Posting errors in accounts receivable * Inaccurate or invalid credit memos | * Data entry controls (validity check, field check, batch total, closed-loop verification) * Mailing of monthly statements to customers * Segregation of duties of credit memo authorization from both sales order entry and customer account maintenance |

4. -------------------------------------------------
CASH COLLECTIONS

ACTIVITIES AND THREATS | CONTROL | 1. Theft of cash 2. Cash flow problems | * Separation of cash handling function from accounts receivable and credit functions * Regular reconciliation of bank account with recorded amounts by someone independent of cash collections procedures * Use of EFT, FEDI, and lockboxes to minimize handling of customer payments by employees * Prompt, restrictive endorsement of all customer checks * Having two people open all mail likely to contain customer payments * Use of cash registers * Daily deposit of all cash receipts * Lockbox arrangements, EFT, or credit cards * Discounts for prompt payment by customers * Cash flow budgets |
SEGREGATION OF DUTIES IN CASH COLLECTION

Following duties/functions should be done by two different persons: 1. Handling cash/checks and posting remittances to customer account 2. Handling cash/checks and authorizing credit memos 3. Handling cash/checks and reconciling the bank statement

-------------------------------------------------
DOCUMENT INVOLVED

1. SALES ORDER * The document created during sales order entry process. * Sales order use to record the customer order data. * Sales order listing the information of the items numbers, quantities, prices and term of sales.

2. CREDIT LIMIT * The maximum allowable credit account balance for each customer, based on past credit history and ability to pay.

3. ACCOUNT RECEIVABLE AGING REPORT * A report listing customer account balance by length of time outstanding. * The report provides useful information for evaluating current credit policies, for estimating bad debts and for deciding whether to increase the credit limit for specific customer or not.

4. BACK ORDER * A document that created to authorize the purchasing department to purchase the items or production department to initiate production of items, when there is insufficient inventory in the warehouse to meet with customer orders.

5. PICKING TICKET * Document that authorize the inventory control function to release the merchandise to the shipping department. * The picking ticket is often printed so that the item numbers and quantities are listed in the sequence. This is can be the most efficient way to retrieve the items from warehouse.

6. PACKING SLIP * A document that listing the quantity and description of each item included in the shipment. * Packing slip and copy of bill of lading will accompany the shipment.

7. BILL OF LADING * Legal contract that defines responsibility for goods while they are in transit. * It identifies the carrier, source, destination, shipping instructions and the party (customer or vendor) that must pay the carrier.

8. SALES INVOICE * Document created to billing the customer. * A document that will notify the customer about the amount of a sale (amount to be paid) and where to send the payment.

9. OPEN INVOICE METHOD * Method for maintaining account receivable in which the customer typically pay according to each invoice. * Usually two copies of invoice are mailed to the customer, and customer will return one copy of the invoice together with the payment. The invoice that been return as remittance advice.

10. REMITTANCE ADVICE * Remittance advice can be copy of invoice, a tear-off portion monthly statement or others that will included/accompany with a customer’s payment. * Also called as turnaround document.

11. BALANCE FORWARD METHOD * Method of maintaining accounts receivable in which customers typically pay according to the amount shown on a monthly statement, rather than by individual invoices. * Remittances are applied against the total account balance, rather than specific invoices.

12. MONTHLY STATEMENT * A document that will summarizing all transactions that occurred during past month and informing customers of their current account balance. * Usually monthly statement that sent to customer will include the “tear-off portion”, that will be return together with the payment. * The “tear-off portion” will serve as remittance advice.

13. CYCLE BILLING * A process to divide customer account master file into subsets, and preparing the monthly statements according to the subset at a time. * The monthly statement will be mailed to customers. * For example, each week monthly statements would be prepared for one-fourth of the customer.

14. CREDIT MEMO * A document used to authorize the billing department to credit/reduce a customer’s account. * Usually issued for sales returns, allowance granted for damaged goods kept by customer, or to write off the customer account due to uncollectible account. * Credit memo will approved by credit manager. * A copy of credit memo will sent to account receivables for adjustment and another copy sent to customer for notify them (except due to uncollectible account).

15. REMITTANCE LIST * A document listing all checks received in the mail.

16. LOCKBOX * A postal address to which customers send their remittances (pengiriman wang). * This Post Office box is maintained by the participating bank, which picks up the checks each day and deposits them to the company’s account. * The bank sends the remittance advices, an electronic list of all remittances, and digital copies of all checks to the company.

17. ELECTRONIC LOCKBOX * A lockbox arrangement, in which the bank electronically sends the company information about the customer account number and the amount remitted as soon as it receives payment. * This enables the company to begin applying remittances to customer accounts before the photocopies of the check arrive.

18. CASH FLOW BUDGET * A budget that shows projected cash inflows and outflows for a specified period so that the organization can anticipate the need for short term borrowing.

-------------------------------------------------
INFORMATION TECHNOLOGY USE IN RECENUE CYCLE TECHNOLOGY

1. ELECTRONIC DATA INTERCHANGE (EDI) * The use of computerized communications and a standard coding scheme to submit business documents electronically in a format that can be automatically processed by the recipient’s information system.

2. CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM (CRM) * Software that helps to organize information about customers in a manner. * Facilitates efficient customer service, generate additional sales and retain the customers.

3. ELECTRONIC FUNDS TRANSFER (EFT) * The transfer of funds between two or more organizations or individuals using computers and other automated technology. * This eliminates the delay associated with the time the remittance is in the mail.

4. FINANCIAL ELECTRONIC DATA INTERCHANGE (FEDI) * The combination of EFT and EDI that enables both remittance data and funds transfer instructions to be included in one electronic package.

EXPENDITURE CYCLE: PURCHASING TO CASH DISBURSEMENTS **(PENGELUARAN BAYARAN)

-------------------------------------------------
DEFINITION OF EXPENDITURE CYCLE

Activities and information processing related to purchasing and payment of Goods and services.

Primary Objective: * Minimize the total cost of acquiring and maintaining inventories, supplies, and the various services the organization needs to function

-------------------------------------------------
BASIC EXPENDITURE CYCLE ACTIVITIES & GENERAL THREATS

BASIC EXPENDITURE CYCLE ACTIVITIES

1. Ordering materials, supplies, and services 2. Receiving materials, supplies, and services 3. Approving supplier invoices 4. Cash disbursements

GENERAL EXPENDITURE CYCLE THREATS

1. Inaccurate or invalid master data 2. Unauthorized disclosure of sensitive information 3. Loss or destruction of data 4. Poor performance

GENERAL EXPENDITURE CYCLE CONTROLS

1. Data processing integrity controls 2. Restriction of access to master data 3. Review of all changes to master data

1. -------------------------------------------------
ORDERING (MATERIALS, SUPPLIES AND SERVICES) THREATS AND CONTROLS | 1. Inaccurate inventory records * Perpetual inventory system * Bar coding or RFID tags * Periodic physical counts of inventory * Perpetual inventory system 2. Purchasing items not needed * Review and approval of purchase requisitions * Centralized purchasing function 3. Purchasing at inflated prices * Price lists * Competitive bidding * Review purchase order 4. Purchasing goods of inferior quality * Tracking and monitoring product quality by supplier * Requiring suppliers to possess quality certification 5. Unreliable suppliers * Review and approval of purchases from new suppliers * Collecting and monitoring supplier delivery performances data 6. Purchasing from unauthorized suppliers * Purchasing only from approved suppliers 7. Kickbacks * training employees in how to respond to offers of gifts from suppliers * job rotation and mandatory vacations * suppliers audit |

2. -------------------------------------------------
RECEIVING (MATERIALS, SUPPLIES AND SERVICES)

THREATS AND CONTROLS | 1. Accepting unordered items * Requiring existence of approved purchase order prior to accepting any delivery 2. Mistakes in counting * Do not inform receiving employees about quantity ordered * Require receiving employees to sign receiving report * Incentives (bonus in catching discrepancies) * Use of bar-codes and RFID tags * Configuration of the ERP system to flag discrepancies between received and ordered quantities that exceed tolerance threshold for investigation * Segregation of duties: custody of inventory versus receiving 3. Verifying receipt of services (painting or maintenance) * Hold the appropriate supervisor responsible for all costs incurred * Periodic audits about the services 4. Theft of inventory * Restriction of physical access to inventory * Documentation of all transfers of inventory between receiving and inventory employees * Periodic physical counts of inventory and reconciliation to recorded quantities |

3. -------------------------------------------------
APPROVING SUPPLIERS INVOICE

INVOICING SUPPLIERS

VOUCHER SYSTEM | NON-VOUCHER SYSTEM | * Disbursement voucher is also created when a supplier invoice is approved for payment. * Identifies the supplier, lists the outstanding invoices, and indicates the net amount to be paid after deducting any applicable discounts and allowances * ADVANTAGES * Reduce number of checks * Can utilize pre-sequential-numbered voucher control * Allows for separation of invoice approval from invoice payment | * Each approved invoice is posted to individual supplier records in the accounts payable file and is then stored in an open-invoice file. * When a check is written to pay for an invoice, the voucher package is removed from the open-invoice file, the invoice is marked paid, and then the voucher package is stored in the paid-invoice file. | THREATS AND CONTROLS | 1. Errors in supplier invoices * Verification of invoice accuracy * Requiring detailed receipts for procurement card purchases * Evaluated receipt settlement * Match PO with receiving report * Restriction of access to supplier master data * Verification of freight bill and use of approved delivery channels 2. Mistakes in posting to accounts payable * Data entry edit controls * Reconciliation of detailed accounts payable records with the general ledger control account. |

4. -------------------------------------------------
CASH DISBURSEMENT

THREATS AND CONTROLS | 1. Failure to take advantage of discounts for prompt payment * Filing of invoices by due date for discounts 2. Paying for items not received * Requiring that all supplier invoices be matched to supporting documents that are acknowledged by both receiving and inventory control * Requiring a complete voucher package for all payments * Policy to pay only from original copies of supplier invoices 3. Duplicate payments * Cancelling all supporting documents when payment is made 4. Theft of cash * Physical security of blank checks and check-signing machine * Periodic accounting of all sequentially numbered checks by cashier * Access controls to EFT terminals * Separation of check-writing function from accounts payable * Requiring dual signatures on checks greater than a specific amount * Regular reconciliation of bank account with recorded amounts by someone independent of cash disbursements procedures 5. Check alteration * Check protection machines * Use of special inks and papers 6. Cash flow problems * Cash flow budget |

-------------------------------------------------
INVENTORY CONTROL METHODS

1) ECONOMIC ORDER QUANTITY (EOQ) * The optimal order size to minimize the sum of ordering, carrying, and stock out costs. * Calculate how much to order and when to order. * Ordering costs are expenses associated with processing purchase transaction. * Carrying costs are the costs associated with holding inventory. * Stock out costs, such as lost sales or production delays, result from inventory shortages.

2) MATERIAL REQUIREMENTS PLANNING (MRP) * An approach to inventory management that seeks to reduce required inventory levels by improving the accuracy of forecasting techniques to better scheduled purchases to satisfy production needs. * MRP system reduces uncertainties about when raw materials are needed and therefore enable companies to carry less inventory. * Schedule production to meet forecasted sales, thereby creating an “optimal” quantity of finished goods inventory. * Use for products that have predictable pattern of demand such consumer staples (makanan atau barangan asas)

3) JUST-IN-TIME (JIT) INVENTORY SYSTEM * System that minimizes or virtually eliminates manufacturing inventories by scheduling inventory deliveries at the precise times and location needed. * Instead of making infrequent bulk deliveries to central receiving and storage facility, suppliers deliver materials in small lots at frequent intervals to the specific locations that require them. * Schedule production in response to customer demand, thereby eliminating finished goods inventory, but they are required to carry sufficient quantities of raw materials in order to quickly adjust production in response to customer demand. * Use for products that relatively short life cycles and which the demand cannot be accurately predicted, such as toys associated with specific movies.

-------------------------------------------------
DOCUMENT INVOLVED

1. REORDER POINT * The level to which the inventory balance of an item must fall before an order to replenish (menambah) stock is initiated.

2. PURCHASE REQUISITION * A document or electronic form that identifies the requisitioner specifies; the delivery location and date needed. * The purchase requisition will identifies the items numbers, descriptions, quantity, and price of each item requested, and may suggest a vendor.

3. PURCHASE ORDER * A document that formally requests a vendor to sell and deliver specified products at designated prices. * It is also a promise to pay and becomes a contract once the vendor accepts it.

4. BLANKET PURCHASE ORDER * A commitment to purchase specified items at designated prices from a particular supplier for a set time period, often a year.

5. VENDOR-MANAGED INVENTORY * Practice in which manufacturers and distributers manage a retail customer’s inventory using EDI. * The suppliers access its customer’s point of sale system in order to monitor inventory and automatically replenish products when they fall to agreed-upon levels.

6. KICKBACKS * Gifts given by vendors to purchasing agents for the purpose of influencing their choice of suppliers.

7. RECEIVING REPORT * A document that record details about each delivery, including the date received, shipper, vendor and quantity received.

8. DEBIT MEMO * A document used to record a reduction to the balance due to a vendor (account payable) * Usually due to return outwards.

9. VOUCHER * A document that summarizes the data relating to disbursement and represents final authorization of payment.

10. VOUCHER PACKAGE * The set of documents used to authorize payment to a vendor. It consists of a purchase order, receiving report, and vendor invoice.

11. DISBURSEMENT VOUCHER * A document that identifies the vendor, lists the outstanding invoices, and indicates the net amount to be paid after deducting any applicable discounts and allowances.

12. PROCUMENT CARD * A corporate credit card that employees can use to purchase specific kinds of items.

13. IMPREST FUND * A cash account with two characteristics: 1) It is set at a fixed amounts, such as $100, 2) Vouchers are required for every disbursement. * At all times, the sum of cash plus vouchers should be equal the preset fund balance.

THE PRODUCTION CYCLE

-------------------------------------------------
DEFINITION OF PRODUCTION CYCLE THREATS AND CONTROLS | Poor product design resulting in excess costs * Accounting analysis of costs arising from product design choices * Analysis of warranty and repair costs |

Business activities and information processing activities related to manufacturing of products.

OBJECTIVES

-------------------------------------------------
BASIC EXPENDITURE CYCLE ACTIVITIES & GENERAL THREATS

BASIC EXPENDITURE CYCLE ACTIVITIES

1. Product design 2. Planning and scheduling 3. Production operations 4. Cost accounting

GENERAL REVENUE CYCLE THREATS

1. Inaccurate or invalid master data 2. Unauthorized disclosure of sensitive information 3. Loss or destruction of data

GENERAL REVENUE CYCLE CONTROLS

1. Data processing integrity controls 2. Restriction of access to master data 3. Review of all changes to master data 4. Access controls 5. Encryption 6. Backup and disaster recovery procedures

1. PRODUCT DESIGN

2. PLANNING AND SCHEDULING

THREATS AND CONTROLS | Over- or underproduction * Production planning systems * Review and approval of production schedules and orders * Restriction of access to production orders and production schedules |

3. PRODUCTION OPERATIONS THREATS AND CONTROLS | 1. Theft of inventory * Physical access control * Documentation of all inventory movement * Segregation of duties—custody of assets from recording and authorization of removal * Restriction of access to inventory master data * Periodic physical counts of inventory and reconciliation of those counts to recorded quantities 2. Theft of fixed asset * Physical inventory of all fixed assets * Restriction of physical access to fixed assets * Maintaining detailed records of fixed assets, including disposal 3. Poor performance * Training * Performance reports 4. Loss of inventory or fixed assets due to fire or other disasters * Physical safeguards (e.g., fire sprinklers) * Insurance 5. Disruption of operations * Backup and disaster recovery plans |

4. COST ACCOUNTING THREATS AND CONTROLS | 1. Inaccurate cost data * Source data automation * Data processing integrity controls 2. Inappropriate allocation of overhead costs * Time-driven activity-based costing 3. Misleading reports * Innovative performance metrics |

-------------------------------------------------
ASSIGNNING PRODUCTION COST

1. Job-Order Costing * A cost system that assigns costs to specific production batches, or jobs. It Used when the product or service is being produced can be distinctly identified.

2. Process Costing * A cost system that assigns costs to each process, or work center, in the production cycle, and then calculates the average cost for all units produced. * Used when the product or service is similar and produced in mass quantities.

3. Activity-Based Costing * A cost system that traces costs to the activities that create them. * Once costs are traced to their specific activities, they are allocated to their corresponding products or departments. * Uses a greater number of overhead pools i. Batch ii. Product iii. Organization * Identifies cost drivers iv. Cause-and-effect relationship
-------------------------------------------------
DOCUMENT INVOLVED

1. BILL OF MATERIALS * A document that specifies the part number, description, and quantity of each component used in a product.

2. OPERATIONS LIST * A document that specifies the labor and machine requirements needed to manufacture a product. * It indicates how a product moves through the factory, specifying what is done at each step and how much time each operation should take.

3. MANUFACTURING RESOURCE PLANNING (MPR-II) * An extension of materials resource planning that seeks to balance existing production capacity and raw materials needs to meet forecasted sales demand. * Also referred to as push manufacturing because goods are produced in expectation of customer demand.

4. LEAN MANUFACTURING * Referred to as pull manufacturing because goods are produced in response to customer demand. * The goal of lean manufacturing is to minimize or eliminate inventories of raw materials, WIP, and finished goods.

5. MASTER PRODUCTION SCHEDULE (MPS) * A document specifies how much of each product is to be produced during the planning period and when that production should occur.

6. PRODUCTION ORDER * A document authorizing the manufacture of a specified quantity of a particular product. * It lists the operations to be performed, the quantity to be produced, and the location to which the finished product is to be delivered.

7. MATERIALS REQUISITION * A document that authorizes the removal of the necessary quantity of raw materials from the storeroom to the factory location where the production operations are to begin.

8. MOVE TICKET * A Document that identify the internal transfer of parts, the location to which they are transferred, and the time of transfer.

9. COMPUTER-INTEGRATED MANUFACTURING (CIM) * A manufacturing approach in which much of the manufacturing process is performed and monitored by the computerized equipment, in part through the use of robotics and real time data collection of manufacturing activities.

10. MANUFACTURING OVERHEAD * All manufacturing costs that are not economically feasible to trace directly to specific jobs or processes.

11. COST DRIVER * Anything that has a cause-and-effect relationship to costs. * For example, the number of purchase orders processed is a purchasing department cost driver

12. THROUGHPUT * The total amount of useful work performed by a computer system during a given period of time. * A measure of production efficiency representing the number of “good” units produced in a given period of time.

THE HUMAN RESOURCES MANAGEMENT AND PAYROLL CYCLE

-------------------------------------------------
DEFINITION OF HRM/ PAYROLL CYCLE

The recurring set of business activities and related data processing operations associated with effectively managing the employee workforce.

Task in managing employees: 1. Recruiting and hiring new employees 2. Training 3. Job assignment 4. Compensation (payroll) 5. Performance evaluation 6. Discharge of employees due to voluntary or involuntary termination

OBJECTIVES

-------------------------------------------------
BASIC HRM/PAYROLL CYCLE ACTIVITIES & GENERAL THREATS

BASIC HRM/PAYROLL CYCLE ACTIVITIES

1. Update master data 2. Validate time and attendance 3. Prepare payroll 4. Distribute payroll 5. Disburse taxes and miscellaneous deductions

GENERAL HRM/PAYROLL CYCLE THREATS

1. Inaccurate or invalid master data 2. Unauthorized disclosure of sensitive information 3. Loss or destruction of data 4. Hiring unqualified or larcenous employees 5. Violations of employment laws

GENERAL REVENUE CYCLE CONTROLS

1. Data processing integrity controls 2. Restriction of access to master data 3. Review of all changes to master data 4. Access controls 5. Encryption 6. Backup and disaster recovery procedures 7. Sound hiring procedures, including verification of job applicants’ credentials, skills, references, and employment history 8. Criminal background investigation checks of all applicants for finance-related positions 9. Thorough documentation of hiring, performance evaluation, and dismissal procedures 10. Managerial reports

1. UPDATE MASTER DATA/FILE THREATS AND CONTROLS | 1. Unauthorized changes to payroll master data * Segregation of duties: HRM department updates master data, but only payroll department issues paychecks * Access controls 2. Inaccurate updating of payroll master data * Data processing integrity controls * Regular review of all changes to master payroll data |

2. VALIDATE TIME AND ATTENDANCE THREATS AND CONTROLS | 1. Inaccurate time and attendance data * Source data automation for data capture * Biometric authentication * Segregation of duties (reconciliation of job-time tickets to time cards) * Supervisory review |

3. PREPARED PAYROLL THREATS AND CONTROLS | 1. Errors in processing payroll * Data processing integrity controls: batch totals, cross-footing of the payroll register, use of a payroll clearing account, and a zero-balance check * Supervisory review of payroll register and other reports * Issuing earnings statements to employees * Review of IRS guidelines to ensure proper classification of workers as either employees or independent contractors |

4. DISTRIBUTE/DISBURSE PAYROLL THREATS AND CONTROLS | 1. Theft or fraudulent distribution of paychecks * Restriction of physical access to blank payroll checks and the check signature machine * Restriction of access to the EFT system * Pre-numbering and periodically accounting for all payroll checks and review of all EFT direct deposit transactions * Require proper supporting documentation for all paychecks * Use of a separate checking account for payroll, maintained as an imprest fund * Segregation of duties (cashier versus accounts payable; check distribution from hiring/firing; independent reconciliation of the payroll checking account) * Restriction of access to payroll master database * Verification of identity of all employees receiving paychecks * Re-depositing unclaimed paychecks and investigating cause |

5. DISBURSE TAXES AND MISSCELANEOUS DEDUCTIONS THREATS AND CONTROLS | 1. Failure to make required payments * Configuration of system to make required payments using current instructions from IRS (Publication Circular E) 2. Untimely/ Inaccurate payments * Processing integrity controls * Supervisory review of reports * Employee review of earnings statement |

-------------------------------------------------
DOCUMENT INVOLVED

1. TIME CARD * A document that records the employee’s arrival and departure times for each work shift. * The time card records the total hours worked by an employee during a pay period.

2. TIME SHEET * A data entry screen (or paper document) used by salaried professionals to record how much time was spent performing various tasks for specific clients.

3. PAYROLL REGISTER * A report listing of payroll data for each employee for a payroll period.

4. DEDUCTION REGISTER * A report listing the miscellaneous voluntary deductions for each employee.

5. EARNING STATEMENT * A report listing the amount of gross pay, deductions, and net pay for the current period and the year-to-date totals for each category.

6. PAYROLL CLEARING ACCOUNT * A general ledger account used to check the accuracy and completeness of recording payroll costs and their subsequent allocation to appropriate costs centers.

7. FLEXIBLE BENEFIT PLAN * A plan under which each employee receives some minimum coverage in medical insurance and pension contributions, plus additional benefit “credits”, that can be used to acquire extra vacation time or additional health insurance. * These plans are sometimes called cafeteria-style benefit plan because they offer a menu of options.

8. PAYROLL SERVICE BUREAU * An organization that maintains the payroll master file for each of its clients and performs their payroll processing activities for a fee.

9. PROFESSIONAL EMPLOYER ORGANIZATION (PEO) * An organization that processes payroll and also provide human resource management services such as employee benefit design and administration.

GENERAL LEDGER AND REPORTING SYSTEM

THREATS AND CONTROLS | 1. Inaccurate updating of general ledger * Data entry processing integrity controls * Reconciliations and control reports * Audit trail creation and review 2. Unauthorized journal entries * Access controls * Reconciliations and control reports * Audit trail creation and review |
-------------------------------------------------
DEFINITION

The information-processing operations involved in updating the general ledger and preparing reports that summarize organizational activities.

PRIMARY FUNCTION
Is to collect and organize 1. The accounting cycle activities 2. Financing activities 3. Investing activities 4. Budget activities 5. Adjustments

GENERAL LEDGER AND REPORTING ACTIVITIES

THREATS AND CONTROLS | 1. Inaccurate adjusting entries * Data entry processing integrity controls * Spreadsheet error protection controls * Standard adjusting entries * Reconciliations and control reports * Audit trail creation and review 2. Unauthorized adjusting entries * Access controls * Reconciliations and control reports * Audit trail creation and review | 1. Update general ledger 2. Post adjusting entries 3. Prepare financial statements 4. Produce management reports

GENERAL LEDGER AND REPORTING THREATS

1. Inaccurate or invalid general ledger data 2. Unauthorized disclosure of financial statement 3. Loss or destruction of data

GENERAL LEDGER AND REPORTING CONTROLS 1. Data processing integrity controls 2. Restriction of access to general ledger 3. Review of all changes to general ledger data 4. Access controls 5. Encryption 6. Backup and disaster recovery procedures

1. UPDATE GENERAL LEDGER

2. POST ADJUSTING ENTRIES

3. PREPARE FINANCIAL STATEMENT THREATS AND CONTROLS | 1. Inaccurate financial statements * Processing integrity controls * Use of packaged software * Training and experience in applying IFRS and XBRL 2. Fraudulent financial reporting * Audits |

4. PRODUCE MANAGEMENT REPORT THREATS AND CONTROLS | 1. Poorly designed reports and graphs * Responsibility accounting * Balanced scorecard * Training on proper graph design |

------------------------------------------------- eXtensible Business Reporting Language (XBRL)
XBRL is a variant of XML (eXtensible Markup Language) specifically designed for use in communicating the content of financial data.
It does this by creating tags for each data item that look much like tags used by HTML.

1. Instance Document * An XBRL report that contains tagged data from financial statements : Marked up or tagged with data describing the data * Each piece of data in XBRL is an element

2. Taxonomy * Set of XBRL files defining the various elements and the relationships between them * A schema * Contains the definitions of every element that could appear in an instance document

3. Linkbases * One or more XBRL files that describes relationships between elements found in a specific instant document * Reference : Identifies relevant authoritative pronouncements * Calculation : Specifies how to combine elements * Presentation : How to group elements * Label : Associates human-readable labels with elements

-------------------------------------------------
BALANCED SCORECARD * A management report that provides four dimension of organizational performance: * Financial * Customer * Internal operations * Innovation and learning * Showing goals and measures * Targets * Actual

-------------------------------------------------
DOCUMENT INVOLVED

1. JOURNAL VOUCHER * A form used to document one or more journal entries such as those made to update the general ledger.

2. JOURNAL VOUCHER FILE * A file that stores all journal entries used to update the general ledger.

3. TRIAL BALANCE * A report listing the balance of all general ledger accounts. * It is so named because one of its purposes is to allow the accountant to verify that the total debit balances in various accounts equal to total credit balances in other accounts.

4. STYLE SHEET * An XBRL file that provides instructions on how to display (render) an instance document on either a computer screen or printed report.

5. FLEXIBLE BUDGET * A budget in which the amounts are stated in term of formulas based upon actual level of activities.

BEST OF LUCK
Haslinda Lieynda

Similar Documents

Premium Essay

Auditing the Revenue Cycle

...BA 3322 – Report (Lecture 4 – Auditing the Revenue Cycle) Drea Tech Company has been growing rapidly and has recently engaged your firm as its auditor. It is actively traded over the counter (OTC) and management believes it has outgrown the service capabilities of its previous auditor. However, on contacting the previous auditor, you can learn that a dispute led to the firm’s dismissal. The client wanted to recognize income on contracts for items produced but not shipped. The client believed the contracts were firm and that all the principal revenue-producing activities were performed. The change in accounting principle would have increased net income by 33% during the last year. Drea is 32% owned by Anthony Dreason, who has a reputation as a turnaround artist. He bought out the previous owner of Drea Tech (formerly named Johnstone Industries) there years ago. The company’s primary products are in the materials handling business, such as automated conveyors for warehouse and production lines. Dreason has increase profits by slashing operating expenses, most notably personnel and research and development. In additional, he has outsourced a significant portion of component part production. Approximately 10% of the company’s product is now obtained from Materials Movement, Inc., a privately held company 50% owned by Dreason and his brother. A brief analysis of previous financial statement shows that sales have been increasing by approximately 20% per year since Dreason...

Words: 2017 - Pages: 9

Premium Essay

Revenue Cycle

...INFS7004 Accounting Information Systems Lecture 4 Transaction Cycles: The Revenue Cycle 1 The Conceptual System The Revenue Cycle The revenue cycle is the set of activities in a business which brings about the exchange of goods or services with customers for cash. Most business transactions are conducted on a credit basis. Cash is received after goods are shipped to the customer. 2 Sales Order 1 Credit / Customer Service 2 REVENUE CYCLE (SUBSYSTEM) Cash Receipts/ Collections 6 Shipping 3 Billing/ Accounts Receivable 4/5 Journal Vouchers/Entries: How do we get them?  Billing Dept. prepares a journal voucher: Accounts Receivable Sales DR CR  Inventory Control Dept. prepares a journal voucher: Cost of Goods Sold Inventory DR CR  Cash Receipts Dept. prepares a journal voucher: Cash Accounts Receivable DR CR 4 Sales Order Procedures  Sales order procedures include the task involved in receiving and processing a customer order, filling the order and shipping products to the customer at the proper time, and correctly accounting for transaction. 5 Receive Order  At this point, sale process begins indicating the type and quantity of merchandise desired by customer.  It may or may not be a physical document  Orders may arrive by mail, by telephone, or from a field representative who visited the customer  After creating the sales order, a copy of it is placed in the customer open order file. 6 Check Credit  For...

Words: 2302 - Pages: 10

Premium Essay

Revenue Cycle Management

...Prof: Name: Date: April 2016 Assign: Revenue cycle management The articles were about how health care industry using information technology (IT) has affected the hospital and the health care system in general. Healthcare Executives Develop Revenue cycle management (RCM) to effectively control health care system financials. The first article was on intermountain integrates revenue cycle management. Intermountain will be integrating cycle revenue for a large health system. The article explains how difficult it uses to be to administer the cost of health. Todd Craighead intermountain vice president of revenue cycle organization was asked to develop a more effective approach to consolidate the costs. Tom has stated many challenges that providers have accounted before integrating cycle management system. One of the issues were decentralization, each individual hospital had a director. Second was the denial rate was high. The next big challenge was price transparency and patient engagement. After implementing the cycle management there is a more centralized appeals team that has successfully kept denial rates low. Second All Executives report directly through one cycle management. Other directors focus on pre-registration and scheduling. Even there biggest challenge price transparency and patient engagement were consolidated using cycle management. The other article emphasizes the reasons cycle management was implementing and the benefits of the system in health care...

Words: 518 - Pages: 3

Premium Essay

Revenue Cycle In Healthcare

...Revenue Cycle is defined as “All administrative and clinical functions that contribute to the capture, management, and collection of patient revenue”, it is the term that includes the entire visit of a patient from account creation to payment. Lexington Medical Center sends out a monthly Healthcare Business Insights card made by HBI’s consulting and analytics team. The card has several graphs to assist with revenue cycle reporting, training and team member development, operational assessments, and process improvement initiatives, see example (15.2). Revenue cycle begins in Registration and is all done electronically in Lexington Medical Center’s electronic health record (EHR) EPIC. When a patient is registered for an outpatient service...

Words: 482 - Pages: 2

Premium Essay

Walter's Revenue Cycle

...Kent Walters’s presentation on revenue cycle Ken Walter is a health care Administrator at The University of Texas M. D. Anderson Cancer Center detailed about the revenue cycle in health care industry by using charts to show the payment ways, financial management etc. He explained that funding to health care industry comes from different ways like government budget to provide health care(about 45%), employers who pay premium to provide health care, uninsured individuals who pay out of pocket. Ken Walter explains the usage of UB-04 in proving services in health care setup from entry of patient to exit. He explains common methods used for medical billing and errors in the billing process. He explains the common ways in which claims are denied...

Words: 309 - Pages: 2

Premium Essay

The Role of Him in the Revenue Cycle

...It is not an understatement to say that the typical Health Information Management (HIM) area plays a critical role in the revenue cycle, largely due to the fact that the revenue cycle begins and ends with medical records (Anderson & Underwood, 2005). The term revenue cycle covers all events that take place in the patient care process that permits the organization to receive payment for the services rendered, and it is important to be aware that this is heavily reliant upon data (Dunn, 2009). In order to fully appreciate the participation of HIM in the revenue cycle process, it is imperative to first gain an understanding of who the key players are, and to summarize the flow of activities that comprises the revenue cycle of a healthcare facility. The key players in hospital revenue cycle management are Administration, Finance, Patient access, Health information management (HIM), Patient accounting, and Clinical services, which includes physicians, diagnostic services, and therapeutic services. Administration sees to strategic goals and operational efficiency and effectiveness. Finance deals with cash flow and contract management. Patient access is responsible for data integrity, demographic and financial data, insurance verification, and pre-certification. Clinical services is responsible for documentation of services, as well as documentation and recording of charges. Health information management takes charge of coding, abstracting, and data validation. Finally, Patient accounting...

Words: 962 - Pages: 4

Free Essay

Revenue Cycle Audit Objectives

...REVENUE CYCLES AUDIT OBJECTIVES, CONTROLS, AND TEST OF CONTROLS INPUT CONTROLS 1. Credit Authorization Procedures * Only customer transactions that meet the organization’s credit standards are valid and should be processed further. 2. Testing Credit Procedures * It pertains to the valuation/allocation audit objectives and the accuracy objective 3. Data Validation Controls * Input validation controls are intended to detect transcription errors in transaction data before they are processed. Validation procedures are most effective when they are performed as close to the source of transaction as possible. a. Missing Data Check – are used to examine the contents of a field for the presence of blank data or spaces (missing product numbers, missing customer accounts numbers, or incomplete mailing address) b. Numeric-alphabetic data checks – determine whether the correct form of data is in a field. An invoice total should not contain alphabetic data. c. Limit Check-determine if the value In the fields exceeds an authorized limit. (prices limit or discounts limit) 4. Batch Controls – are used to manage high volumes of transaction data through a system. The following are relevant controls: a. A unique batch number b. A batch date c. A transaction code (indicating the type of transactions, such as sales order or cash receipt). d. The numbers of records in the batch (record count) e. The total dollar value of a financial field...

Words: 507 - Pages: 3

Premium Essay

Revenue Cycle Management In Healthcare

...Revenue Cycle Management There are many moving parts required to keep any type of healthcare facility running smoothly. Of these, the revenue management process is one of the most important. This is the patient to cash flow within the facility. The process begins when a patient schedules an appointment and ends when all outstanding payments have been collected. While it may seem simple, there is a lot that goes into the process as a whole, and it is a critical aspect of a facility being successful. Let’s start at the beginning and go through the process step-by-step. • Step 1 – Scheduling an appointment: When a patient schedules an appointment, this begins the revenue cycle management process. • Step 2 – Insurance certification: It’s...

Words: 1713 - Pages: 7

Premium Essay

Revenue Cycle Test of Controls Revenue Cycle Test of Controls Revenue Cycle Test of Controls

...Internal Control Questionnaire—Sales Transaction Processing | |Yes, No, N/A | | |Assertions and Questions | |Comments | | | |Occurrence assertion: | | 1. Is the credit department independent of the sales |Yes |The sales dept is located within the marketing dept. | |department? | |The credit dept is located within treasurer’s dept. | | 2. Are sales of the following types controlled by the |N/A |There is only an indication that ‘cash sales’ are treated the | |same procedures described below? Sales to employees, COD | |same as credit sales. | |sales, disposals of property, cash sales, and scrap | | | |sales. | | | ...

Words: 514 - Pages: 3

Free Essay

Rea Diagram for Revenue Cycle

...REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA REA Dalam penyusunan REA, terlebih dahulu perlu dilakukan identifikasi event operasional. Mengacu pada konsep dokumentasi dari siklus pendapatan yang yang digambarkan oleh Brett et. al. (2010, page 400), yang terlihat pada Gambar 01 berikut, dapat diturunkan bahwa event operasional dari siklus pendapatan adalah: menerima pesanan (receive sales order), memilih, mengemas dan mengirim barang (pick, pack, and ship the goods), menagih (bill the customer), 0034M - Informasi dan Proses Bisnis dan menerima pembayaran (receive payment). Pada bahasan ini, record payment termasuk katagori event proses informasi, sehingga tidak digambarkan dalam REA berikut. Gambar...

Words: 289 - Pages: 2

Free Essay

What Accounts Are Included in the Revenue Cycle

...Keisha Porter ACCT330-1402A-01 Phase 1 Individual Project Professor Sandra Frempong April 14, 2014 The revenue cycle is the set of activities in a business which brings about the exchange of goods or services with customers for cash and most business transactions are conducted on a credit basis because the cash is not received until after the goods have been shipped to the customers (accounting notes, 2014). For someone to be able to figure out the accounts that a company may use in their business for their revenue cycle you will have to do a corporate general ledger. This will be what the company uses to be able to record all of their financial items and the actual accounting data summaries. There are a number of different accounts that are involved when it come to the revenue cycle. The accounts are sales of goods, provision of services, discounts and rebate from vendors and service providers, gains from marketable securities as varies, stocks, bonds, and derivatives (accounts-generally-included-revenue-cycle-company, 2014). Revenue generally is realized and earned when certain guidelines are recognition and certain criterion has been met. The first thing is there has to be some persuasive evidenced of an arrangements has been set in place and that it does exists. The next thing is that the customer’s has received their products or services already and they have been rendered. Then the next step is that the seller has a fixed price to their buyers that has already...

Words: 487 - Pages: 2

Premium Essay

Apollo Shoes Revenue Cycle Test of Controls Memo

...While reviewing Apollo Shoes’ revenue cycle, we tested 120 sales transactions and discovered 51 deviations. This significant number of deviations could potentially indicate more serious shortcomings in the system of internal controls surrounding the revenue cycle and highlights areas that will require more careful scrutiny throughout the audit. The most common type of deviation noted was the lack of the expected credit approval notation on the transaction documents. In fact, 31 of the 51 total deviations resulted from the lack of credit approval. Of the 31 “No credit approval” sales, 10 are still recorded as “unpaid” (ICC-2). This seemingly regular ignorance of a credit approval in the revenue cycle suggests that Apollo might experience above average difficulty with accounts receivable collections. As a result, it is important that the audit procedures for the allowance for doubtful accounts be strengthened to ensure the reasonableness of the company’s A/R assumptions. Errors in billing accounted for 17 of the 51 total deviations. Generally, errors in billing are expected to be a mixture of overcharges and undercharges. However, all 17 of the billing error deviations discovered in this sample of transactions were attributable to overcharges (ICC-2). This seems to indicate a specific breakdown in the internal controls system as it relates to transaction quantity and price data entry. Due to the volume of overcharges, revenues and accounts receivable could be overstated...

Words: 586 - Pages: 3

Premium Essay

Business Sycles

...Recent Work on Business Cycles in Historical Perspective: Review of Theories and Evidence ABSTRACT This survey outlines the evolution of thought leading to the recent developments in the study of business cycles. The subject is almost coextensive with short-term inacrodynamics and has a large interface with economics of growth, money, inflation, and expectations. The coverage is +-)y.Pry' kg4h v4r 4 ii4 c,1 ,i4 4 tT The paper first summarizes the "stylized facts" that ought to be explained by the theory. This part discusses the varying dimensions of business cycles; their timing, amplitude, and diffusion features; some international aspects; and recent changes. The next part is a review of the literature on "self-sustaining" cycles. It notes some of the older theories and proceeds to more recent models driven by changes in investment, credit, and price-cost-profit relations. These models are mainly endogenous and deterministic. Exogenous factors and stochastic elements gain importance in the part on the modern theories of cyclical response to monetary and real disturbances. The early monetarist interpretations of the cycle are followed by the newer equilibrium models with price misperceptions and intertemporal substitution of labor. Monetary shocks continue to be used but the emphasis shifts from nominal demand changes and lagged price adjustments to informational lags and supply reactions. Various problems arise, revealed by intensive testing and criticisms...

Words: 299 - Pages: 2

Free Essay

Blank

...... I dream of a city ... a city full of people ... a crowded city ... a city with lots of bad people, and a little number of good people ... a city full of mosque ... people call it "The City of Mosque" ... in the dawn of winter if you wake up, You will hear the sound of Azan, from all the mosques from the city. ... Sorry, what did you say? you know a city like this one, the one exactly like I just said ... he he :) no my dear, you may not know this city, because in this city there are "cycles" ... lots and lots of cycles ...   I want to call it "The City of Cycles", because in here everyone uses cycle for transport. You want to go in long distance or short distance, the city people use cycle. You wondering why cycle, because this city people prefer it, ... why, I don’t know :( ... when I ask one of them, "why do you ride cycle?" he first look at me, examine me if I am a stupid reporter from TV want tomake a news on him, then he said, "are you new in this city? Cycle is the Trademark of this city. Didn't you notice it?" I say, "Yeah! I noticed ... That's why I was asking ... is there any reason?" The man sighed and paddled on his way.   Then I found a girl, she stopped and asked if I wanted a ride? I nodded. She was on the way to her office, she told me an amazing story, a story of sorrow, cough, dust and worst of'em all, a GHOST. YES, believe it or not, there was a ghost in the city. People called it "The Deadly One". Because it is a crowded city, when people came out from...

Words: 371 - Pages: 2

Free Essay

Long Day's Journey Into Night

...Long Day’s Journey into Night: The Perpetual Cycles within O’Neill’s Play O’Neill’s Long Day’s Journey into Night (1956, 2002) is a depiction of the Tyrone family and the ongoing cycle of events that occur within the span of one single day in their life. At first glance, patriarch James, his wife Mary, and adult sons Jamie and Edmund, appear to be the average family in the year 1912, until one looks further and finds that each appears to be in their own version of purgatory, stuck in a repetition of events and behaviors that are both non-productive, as well as destructive. Ultimately, these result in their being condemned to continually relive the worst events in their life with their most unflattering characteristics, time and time again. Yet, in doing so, they not only self-sabotage, but sabotage each other and prevent any member of the family from realizing any genuine relief or finding any true resolution amidst this perpetual cycle, which is essentially foreshadowed by the title, itself. Therefore, from the ongoing cycle of denial and blame, to anger and guilt, to drug use and abuse, Long Day’s Journey into Night is a cynical story that illustrates the seemingly infinite cycles that depict the perpetual struggles that occur within one family over the course of an average day as the light gives way to darkness. As such, the paragraphs that follow elaborate on some of the most prominent cycles within the story, beginning with a discussion of the Tyrone family’s...

Words: 1933 - Pages: 8