Chapter 13: Overview of Internal Control Nature and Purpose of Internal Conrol
Chapter 13: Overview of Internal Control Nature and Purpose of Internal Conrol
2. Commitment to competence
Competence is the knowledge and skills necessary to accomplish tasks that define an
employee’s job. Commitment to competence means that management considers the
competence levels for particular jobs in determining the skills and knowledge required of
each employee and that it hires employees competent to perform the tasks.
5. Organizational structure
The responsibilities and authorities oof the various personnel within the organization
should be established in such a manner as to (1) assist the entity in meeting its goals and
objectives and (2) ensure that transactions are processed, recorded, summarized and
reported in an accurate and timely manner. Organizational structure provides the overall
framework for planning, directing and controlling operations.
The information system relevant to financial reporting objectives, which includes the
accounting system, consists of the procedures and records designed and established to:
• Initiate, record, process, and report entity transactions ( as well as events and
conditions) and to maintain accountability for the related assets, liabilities, and
equity
• Resolve incorrect processing of transactions, for example, automated suspense files
and procedures followed to clear suspense items out on a timely basis;
• Process and account for system overrides or bypassess to controls;
• Transfer information from transaction processing systems to the general ledger;
• Capture information relevant to financial reporting for events and conditions other
than transactions, such as the depreciation and amortization of assets and changes
in the recoverability of accounts receivables; and
• Ensure information required to be disclosed by the applicable financial reporting
framework is accumulated, recorded, processed, summarized and appropriately
reported in the financial statements
Journal entries
An entity’s information system typically includes the use of standard journal entries that are
required in a recurring basis to record transactions. Examples might be journal entries to record
sales, purchases, and cash disbursements in the general ledger, or to record accounting estimates
that are periodically made by management, such as changes in the estimate of uncollectible
accounts receivable.
An entity’s financial reporting process also includes the use of non-standard journal entries to
record non-recurring, unusual transactions or adjustments. Examples of such entries include
consolidating adjustments and entries for a business combination or disposal or nonrecurring
estimates such as the impairment of an asset. In manual general ledger systems, non-standard
journal entries may be identified through inspections of ledgers, journals, and supporting
documentation. When automated procedures are used to maintain the general ledger and prepare
financial statements, such entries may exist only in electronic form and may therefore be more
easily identified through the use of computer-assisted audit techniques.
Related business processes
An entity’s business processes are the activities designed to:
• Develop, purchased, produce, sell and distribute an entity’s products and services;
• Ensure compliance with laws and regulations; and
• Record information, including accounting and financial reporting information.
Business processes result in the transactions that are recorded, processed and reported by the
information system. Obtaining an understanding of the entity’s business processes, which include
how transactions are originated, assists the auditor obtain an understanding of the entity’s
information system relevant to financial reporting in a manner that is appropriate to the entity’s
circumstances.
Accordingly, an information system encompasses methods and records that:
• Identify and record all valid transactions
• Describe on a timely basis the transactions in sufficient detail to permit proper
classification of transactions for financial reporting
• Measuring the value of transactions in a manner that permits recording their proper
monetary value in the financial statements
• Determine the period in which transactions occurred to permit recording of transactions in
the proper accounting period.
• Present properly the transactions and related disclosures in the financial statements.
• Comparing actual performance (or operating results) with budgets, forecasts, prior
period performance, or competitors’ data or tracking major initiatives such as cost-
containment or cost-reduction programs to measure the extent to which targets are
being met.
• Investing performance indicators based in operating or financial data, such as
quantity or purchase price variances or the percentage of returns to total orders.
• Reviewing functional or activity performance, such as relating the performance of
a manager responsible for a bank’s consumer loans with some standard, such as
economic statistics or targets.
Personnel at various levels in an organization may make performance reviews. Performance
reviews may be used by managers fir the sole purpose of making operating decisions. For example,
managers may analyze performance data and base operating decisions on them because the data
are consistent with their expectation. This type of review improves the reliability of the data.
However, when managers follow up on unexpected results determined by a financial reporting
system, performance reviews become a useful over financial reporting.
B. Information Processing Controls
Information processing controls are policies and procedures designed to require
authorization of transaction and to ensure the accuracy and completeness of transaction
processing. Control activities may be classified according to the scope of the system they
affect. General controls are control activities that prevent or detect errors or irregularities
for all accounting systems. General controls affect all transaction cycles and apply to
information processing as a center, hardware and systems software acquisition and
maintenance, and backup and recovery procedures. Application controls are controls that
pertain to the processing of a specific type of transaction, such a payroll, or sales and
collections. These controls help ensure that transactions occurred, are authorized, and are
completely and accurately recorded and processed. Examples of application controls
include checking the arithmetical accuracy of records, maintaining and reviewing accounts
and trial balances, automated controls such as input data and numerical sequence checks,
and manual follow-up of exception reports. General IT-controls are policies and procedures
that relate to many applications and support the effective functioning of application
controls by helping to ensure the continued proper operation of information systems.
General IT-controls commonly include controls over data center and network operations;
system software acquisition, change and maintenance; access security; and application
system acquisition, development, and maintenance. These controls apply to mainframe,
miniframe, and end-user environments. Examples of such general IT-controls are program
change controls, controls that restrict access to programs or data, controls over the
implementation of new releases of packaged software applications, and controls over
system software that restrict access to or monitor the use of system utilities that could
change financial data or records without leaving an audit trail.
Internal controls relating to the accounting system are concerned with achieving objectives
such as:
• Transactions are executed in accordance with management’s general or specific
authorization.
• All transactions and other events are promptly recorded in the correct amount, in
the appropriate accounts and in the proper accounting period so as to permit
preparation of financial statements in accordance with an identified financial
reporting framework.
• Access to assets and records is permitted only in accordance with management’s
authorization,
• Recorded assets are compared with the existing assets at reasonable intervals and
appropriate action is taken regarding any differences.
Control activities related to the processing of transactions may be grouped as follows: (1) proper
authorization, (2) design and use of adequate documents and records, and (3) independent checks
on performance.
1. Proper authorization of transactions and activities
As suggested earlier, authorization for the execution of transaction flows from the
stockholders to management and its subordinates. Before a transaction is entered into with
another party, certain conditions must usually be met. As part of the evaluation of the
potential transaction, documentation will be created. The auditor uses this documentation
to determine whether business transactions are properly authorized. For example, the
purchase of inventory may create a purchase order, a receiving report, and a vendor invoice.
By inspecting these documents and comparing them with a company policy, the auditor
may be reasonably satisfied that a business transaction was authorized and executed in a
manner consistent with company policy.
2. Segregation of duties
An important element in designing an internal accounting control system that safeguards
assets and reasonably ensures the reliability if the accounting records is the concept of
segregation of responsibilities. No one person should be assigned duties that would allow
that person to commit an error or perpetuate fraud and to conceal the error or fraud. For
example, the same person should not be responsible for recording the cash received on
account and for posting the receipts to the accounting records.
C. Physical Controls
Controls that encompass:
• The physical security of assets, including adequate safeguards such as secured
facilities over access to assets and records.
• The authorization for access to computer programs and data files.
• The periodic counting and comparison with amounts shown on controls records
(for example, comparing the results of cash, security and inventory counts with
accounting thereof.)
The extent to which physical controls intended to prevent theft of assets are relevant to the
reliability of financial statements preparation, and therefore the audit, depends on circumstances
such as when assets are highly susceptible to misappropriation.
The concept underlying control activities in small entities are likely to be similar to those in larger
entities, but the formality with which they operate varies. Further, small entities may find that
certain types of control activities are not relevant because of controls applied by management. For
example, management’s retention of authority for approving credit sales, significant purchases,
and drawdown’s on lines of credit can provide strong control over those activities, lessening or
removing the need for more detailed control activities. An appropriate segregation of duties often
appears to present difficulties in small entities. Even companies that have only a few employees,
however, may be able to assign their responsibilities to achieve appropriate segregation or, if that
is not possible, to use management oversight of the incompatible activities to achieve control
objectives.
E. Monitoring of Controls
Monitoring, the final component of internal control, is the process that an entity uses to assess the
quality of internal control over time. Monitoring involves assessing the design and operation of
controls on a timely basis and taking corrective action as necessary. Management monitors
controls to consider whether they are operating as intended and to modify them as appropriate for
changes in conditions. In many entities, internal auditors evaluate the design and operation of
internal control and communicate information about strengths and weaknesses and
recommendations for improving internal control.
Some monitoring activities may include communications from external parties. For example,
customers implicitly corroborate sales data by paying their bills or raising questions. Also, bank
regulators, and outside auditors may communicate about the design or effectiveness of internal
control.
Monitoring activities may include using information from communications from external parties
that may indicate problems are highlight areas in need of improvement. Customers implicitly
corroborate billing data by paying their invoices or complaining about their charges. In addition,
regulators may communicate with the entity concerning matters that affect the functioning of
internal control, for example, communications concerning examinations by bank regulatory
agencies. Also, management may consider communications relating to internal control from
external auditors in performing monitoring activities
INTRODUCTION
In the previous chapters, corporate governance has been described as the process by which the
owners and various of stakeholders of an organization exert control through
requiring accountability for the resources entrusted to the organization.
This chapter introduces fraud risk and errors and how they can be reduced if not totally avoided
by having effective internal control – a tool of good corporate governance.
Fraud is an intentional act involving the use of deception that results in a material misstatement
of the financial statements. Two types of misstatements are relevant to auditors’ consideration of
fraud: (a) misstatements arising from misappropriation of assets, and (b) misstatements arising
from fraudulent financial reporting.
Intent to deceive is what distinguishes fraud from errors. Auditors routinely find financial errors
in their client’s books, but those errors are not intentional.
TYPES OF MISSTATEMENTS
a. Misstatements arising from misappropriation of assets
b. Misstatements arising from fraudulent financial reporting
The intentional manipulation of reported financial results to misstate the economic condition of
the organization is called fraudulent financial reporting. The perpetrator of such a fraud generally
seeks gain through the rise in stock price and the commensurate increase in personal wealth.
Sometimes the perpetrator does not seek direct personal gain, but instead uses the fraudulent
financial reporting to “help” the organization avoid bankruptcy or to avoid some other negative
financial outcome. Three common ways in which fraudulent financial reporting can take place
include:
The Fraud Triangle characterizes incentives, opportunities and rationalizations that enable fraud
to exist.
One of the most fundamental and consistent findings in fraud research is that there must be an for
fraud to be committed. Although this may sound obvious – that is, “everyone has an opportunity
exists, but either there is a lack of controls or the complexities associated with a transaction are
such that the perpetrator assesses the risk of being caught as low. Some of the opportunities to
commit fraud that the top management should consider include the following:
• Significant related-party transactions
• A company’s industry position, such as the ability to dictate terms or conditions to suppliers
or customers that might allow individuals to structure fraudulent transactions
• Management’s inconsistency involving subjective judgments regarding assets or
accounting estimates
• Simple transactions that are made complex through an unusual recording process
• Complex or difficult to understand transactions, such as financial derivatives or special-
purpose entities
• Ineffective monitoring of management by the board, either because the board of directors
is not independent or effective, or because there is a domineering manager
• Complex or unstable organizational structure
• Weak or nonexistent internal controls
For asset misappropriation, personal rationalizations often revolve around mistreatment by the
company or a sense of entitlement (such as, “the company owes me!”) by the individual
perpetrating the fraud. Following are some common rationalizations for asset misappropriation:
• Fraud is justified to save a family member or loved one from financial crisis.
• We will lose everything (family, home, car and so on) if we don’t take the money.
• No help is available from outside.
• This is “borrowing”, and we intend to pay the stolen money back at some point.
• Something is owed by the company because others are treated better.
• We simply do not care about the consequences of our actions or of accepted notions of
decency and trust; we are for ourselves.
For fraudulent financial reporting,, the rationalization can range from “saving the company” to
personal greed, and may include the following:
• This is one-time thing to get us through the current crisis and survive until things get better.
• Everybody cheats on the financial statements a little; we are just playing the same game.
• We will be in violation of all of our debt covenants unless we find a way to get this debt
off the financial statements.
• We need a higher stock price to acquire company XYZ, or to keep our employees through
stock options, and so forth.
A. Incentives/ Pressures
1. Personal financial obligations may create pressure on management or employees with
access to cash or other assets susceptible to theft to misappropriate those assets.
2. Adverse relationships between the entity and employees with access to cash or other
assets susceptible to theft may motivate those employees to misappropriate those
assets. For example, adverse relationships may be created by the following:
(a) Known or anticipated future employee layoffs.
(b) Recent or anticipated changes to employee compensation or benefit plans.
(c) Promotions, compensation, or other rewards inconsistent with expectations.
B. Opportunities
1. Certain characteristics or circumstances may increase the susceptibility of assets to
misappropriation. For example, opportunities to misappropriate assets increase when
following situations exist:
(a) Large amounts of cash on hand or processed.
(b) Inventory items that are small in size, of high value, or in high demand.
(c) Fixed assets which are small in size, marketable, or lacking observable
identification of ownership.
2. Inadequate internal control over assets may increase the susceptibility of
misappropriation of those assets. For example, misappropriation of assets may occur
because of the following:
(a) Inadequate segregation of duties or independent checks.
(b) Inadequate oversight of senior management expenditures, such as travel and
other reimbursements.
(c) Inadequate management oversight of employees responsible for assets, for
example, inadequate supervision or monitoring of remote locations.
(d) Inadequate job applicant screening of employees with access to assets.
(e) Inadequate record keeping with respect to assets.
(f) Inadequate system of authorization and approval of transactions (for example,
in purchasing).
(g) Inadequate physical safeguards over cash, investments, inventory, or fixed
assets.
(h) Lack of complete and timely reconciliations of assets.
(i) Lack of time and appropriate documentation of transactions, for example,
credits for merchandise returns.
(j) Lack of mandatory vacations for employees performing control functions.
(k) Inadequate management understanding of information technology, which
enable information technology employees to perpetrate a misappropriation.
(l) Inadequate access controls over automated records, including controls over and
review of computer systems event logs.
C. Attitudes/ Rationalizations
1. Disregard for the need for monitoring or reducing risks related to misappropriation of
assets.
2. Disregard for internal control over misappropriation of assets by overriding existing
controls or by failing to correct known internal control deficiencies.
3. Behavior indicating displeasure or dissatisfaction with the entity or its treatment of the
employee.
4. Changes in behavior or lifestyle that may indicate asserts have been misappropriated.
5. Tolerance of petty theft.
A. Incentive/ Pressure
Incentive or pressure to commit fraudulent financial reporting may exist when management
is under pressure, from sources outside or inside the entity, to achieve an expected (and
perhaps unrealistic) earnings target or financial outcome – particularly since the
consequences to management for failing to meet financial goals can be significant.
B. Opportunities
A perceived opportunity to commit fraud may exist when an individual believes internal
control can be overridden, for example, because the individual is in a position of trust or
has knowledge of specific weaknesses in internal control.
C. Rationalizations
Individuals may be able to rationalize committing a fraudulent act. Some individuals
possess an attitude, character or set of ethical values that allow them knowingly and
intentionally to commit a dishonest act. However, even otherwise honest individuals can
commit fraud in an environment that imposes sufficient pressure on them.
While businesses in different individuals can have striking different characteristics most have
some fundamental conceptual characteristics are practices in common. The three basic business
transaction cycles include
Management should establish controls to ensure that these transactions are appropriately handled
and recorded. However, if internal controls are not properly implemented, or are overridden, fraud
and errors may occur. This chapter presents the errors and fraudulent activities that could result if
there is poor internal control.
Errors in recording sales include mechanical errors, such as using wrong piece or
wrong quantity, recording sales in the wrong period (cutoff errors), a bookkeeper’s
failure to understand proper accounting for a transaction, and so on. Internal controls
are designed to prevent or detect many of these kinds of errors.
1. Skimming
This refers to the act if withholding cash receipts without recording them.
An example us when a cashier in a retail store does not ring up transaction
and takes the cash. Another example is when an employee who has access
to cash receipts and maintains accounts receivable records can record a sale
at an amount lower than the invoice amount. When a customer pays, the
employee takes the difference between the invoice and the amount recorded
as receivable. Detection of unrecorded cash receipts is very difficult;
however, unexplained changes in the gross profit percentage or sales
volume may indicate that cash receipts have been withheld.
2. Lapping
This technique is used to conceal the fact that cash has been abstracted; the
shortage in one customer’s account is covered with a subsequent payment
made by another customer. An employee who has access to cash receipts
and maintains accounts receivable can engage in lapping. Routine testing of
details of collections compared with validated bank deposit slips should
uncover this fraud.
3. Kiting
This is another technique used to cover cash shortage or inflate cash balance.
Kiting involves counting the cash twice by using the float in the banking
system. (Float is the gap between the time the check is deposited or added
to an account and the time the check clears or is deducted from the account
it was written on). Analyzing and verifying cash transfers during the days
surrounding year-end should reveal this type of fraud.
Entities normally design controls to prevent these errors from occurring or to detect errors
if they do occur. When such controls exists, auditors test the controls to assess their
effectiveness. If the controls are not effective, auditors should perform substantive tests to
determine that the financial statements do not contain material misstatements that arose
because of possible errors.
b. Receiving Kickbacks
In this scheme, a purchasing agent may agree with a vendor to receive kickback
(refund payable to the purchasing person on goods or services acquired from the
vendor).
This is usually done in return for the agent’s ensuring that the particular vendor
receives an order from the firm. Often a check is made payable to the purchasing
agent and mailed to the agent at a location other than his or her place of
employment. Sometimes the purchasing agent splits the kickback with the vendor’s
employee for approving and paying it. Detecting kickbacks is difficult because the
buyer’s records do not reflect their existence. However, when vendors are required
to submit bids for goods or services, the likelihood of kickbacks is reduced.
Historically, errors and irregularities involving payroll have been reported to occur
frequently and are largely undetected.
1. Errors
The most errors that can occur in the payroll and personnel cycle are
a. Fictitious Employees
Increasing the rate above that approved or paying employees for more hours
than they worked are the most common ways of paying employees more than
they are entitled to receive. These practices can be substantially reduced by
requiring personnel department officials to authorize changes in pay rates and
by monitoring total hours worked and paid for. Analytical procedures that
focus on cost per unit of actual production can also be helpful in detecting
excess payments to employees.
Most of the processes relating to cash handling are the responsibility of the finance department,
under the direction of the treasurer. These processes include handling and depositing cash receipts;
signing checks; investing idle cash; and maintaining custody of cash, marketable securities, and
other negotiable assets. In addition, the finance, department must forecast cash requirements and
make both short-term and, long-term financing arrangements.
Ideally, the functions of the finance department and the accounting department should be
integrated in a manner that provides assurance that:
1. All cash that should have been received was in fact received, recorded accurately and
deposited promptly.
2. Cash disbursements have been made for authorized purposes only and have been properly
recorded.
3. Cash balances are maintained at adequate, but not excessive, levels by forecasting expected
cash receipts and payments related to normal operations. The need for obtaining loans for
investing excess cash is thus made known on a timely basis.
A detailed study of the business processes of the company is necessary in developing the most
efficient control procedures, but there are some general guidelines to good cash handling practices
in all types of business. These guidelines for achieving internal control over cash may be
summarized as follows:
1. Do not permit any one employee to handle a transaction from beginning to end.
2. Separate cash handling from record keeping.
3. Centralize receiving of cash to the extent practical.
4. Record cash receipts on a timely basis.
5. Encourage customers to obtain receipts and observe cash register totals.
6. Deposit cash receipts daily.
7. Make all disbursements by check or electronic funds transfer, with the exception of small
expenditures from petty cash.
8. Have monthly bank reconciliation prepared by employees not responsible for the issuance
of checks or custody of cash. The completed reconciliation should be reviewed promptly
by an appropriate official.
9. Monitor cash receipts and disbursements by comparing recorded amounts to forecasted
amounts and investigating variances from forecasted amounts.
The most important group of financial investments, consists of marketable stocks and bonds
because they are found more frequently and usually are of greater peso value than the other kinds
of investment holdings. Other types of investments often encountered include commercial paper
issued by corporations, mortgages and trust deeds, and the cash surrender value of life insurance
policies. The internal auditors also must be concerned with derivatives that are used to hedge
various financial and operational risks or for speculation. Derivatives are financial instruments that
“derive” their value from other financial instruments, underlying assets, or indexes. For example,
a simple derivative would involve a commitment by a company to purchase a commodity at a
certain price at some point in the future. Other derivatives are much more complex, involving, for
example, relationships between fluctuations in European interest rates and the price of copper.
The major elements of adequate internal control over financial investments include the following:
1. Formal investment policies that limit the nature if investments in securities and other
financial instruments.
2. An investment committee of the board of directors that authorizes and reviews financial
investment activities for compliance with investment policies.
3. Separation of duties between the executive authorizing purchases and sales of securities
and derivative instruments, the custodian of the securities, and the person maintaining the
records of investments.
4. Complete detailed records of all securities and derivative instruments owned and the
related provisions and terms.
5. Registration of securities in the name of the company.
6. Periodic physical inspection of securities on hand by an internal auditor or an official
having no responsibility for the authorization, custody, or record keeping of investments.
7. Determination of appropriate accounting for complex financial instruments by competent
personnel.
In many concerns, segregation of the functions of custody and record keeping is achieved by the
use of an independent safekeeping agent, such as a stockholder bank or trust company. Since the
independent agent has no direct contact with the employee responsible from maintaining
accounting records of the investments in securities, the possibilities of concealing fraud through
falsification of the accounts are greatly reduced. If securities are not placed in the custody of an
independent agent, they should be kept in a bank safe-deposit box under the joint control of two
or more of the company’s officials. Joint control means that neither of the two custodians may
have access to the securities except in the presence of the other. A list of securities in the box
should be maintained in the box, and the deposit or withdrawal of securities should be recorded on
this list along with the date and signatures of all persons present. The safe-deposit box rental should
be in the name of the company, not in the name of an officer having custody of securities.
Complete detailed records of all securities and derivative instruments owned are essential to
satisfactory control. These records frequently consist of a subsidiary record for each security and
derivative instrument, with such identifying data as the exact name, face amount or par value,
certificate number, number of shares, date of acquisition, name of broker, cost, terms and any
interest or dividend payments received. Actual interest and dividends should be compared to
budgeted amounts and significant variances should be investigated. The purchase and sale of
investments often is to entrusted to a responsible financial executive, subject to frequent review
by an investment committee of the board of directors.
Accounts receivable include not only claims against customers arising from sales of goods or
services, but also a variety of miscellaneous claims such as loans to officers or employees, loans
to subsidiaries, claims against various other films, claims for tax refunds and advantages to
suppliers.
Sources and Nature of Notes Receivable
Notes receivable are written promises to pay certain amounts at future dates. Typically, notes
receivable is used for handling transactions of substantial amount; these negotiable documents are
widely used. In banks and other financial institutions, notes receivable usually constitutes the
single most important asset.
to understand internal control over accounts receivable and revenue, one must consider the various
components, including the control environment, risk assessment, monitoring the (accounting)
information and communication system, and control activities.
Control Environment
Because of the risk of intentional misstatements or revenues, the control environment is very
important to effective internal control over revenue and receivables. Of particular importance is
an independent audit committee of the board of directors that monitors management’s judgements
about revenue recognition principles and estimates, as well as an effective internal audit function.
Management should establish a tone at the top of the organization that encourages integrity and
ethical financial reporting. These ethical standards should be communicated and observed
throughout the organization. Also, incentives for dishonest reporting such as undue emphasis on
meeting unrealistic sales or earnings targets, should be eliminated.
As previously stated, a basic characteristic of effective control consists of the subdivision of duties.
As applied to notes receivable, this principles requires that:
1. The custodian of noted receivable not have access to cash or to general accounting records.
2. The acceptance and renewal of notes be authorized in writing by a responsible official who
does not have custody of the notes.
3. The write-off of defaulted notes be approved in writing by responsible officials and
effective procedures adopted for subsequent follow-up of such defaulted notes.
The interrelationship of inventories and cost of goods sold makes it logical for the two topics be
considered together. The controls that assure the fair valuation of inventories are found in the
purchases (or acquisition) cycle. These controls include procedures for selecting vendors, ordering
merchandise or materials, inspecting goods received, recording the liability to the vendor, and
authorizing and making cash disbursements. In a manufacturing business, the valuation of
inventories also is affected by the production (or conversion) cycle, in which various
manufacturing costs are assigned to inventories, and the cost of inventories is then transferred to
the cost of goods sold.
1. Goods on hand ready for sale, whether the merchandise of a trading concern or the finished
goods of a manufacturer.
2. Goods in the process of production; and
3. Goods to consumed directly or indirectly in production, such as raw materials, purchased
parts, and supplies.
The importance of adequate internal control over inventories and cost of goods sold from the
viewpoint of both management and the auditors can scarcely be overemphasized. In some
companies, management stresses controls over cash and securities but pays little attention to
control over inventories. Since many types of inventories are composed of items not particularly
susceptible to theft, management may consider controls to be unnecessary in this area. Such
thinking ignores the fact that controls for inventories affect nearly all the functions involved in
producing and disposing of the company’s products.
The term property, plant and equipment includes all tangible assets with a service life of more than
one year that are used in the operation of the business and are not acquired for the purpose of
resale. Three major subgroups of such assets are generally recognized:
1. Land, such as property used in the operation of the business, has the significant
characteristics of not being subject to depreciation.
2. Buildings, machinery, equipment and land improvements, such as fences and parking lots,
have limited service lives and are subject to depreciation.
3. Natural resources (wasting assets), such as oil wells, coal mines, and tract of timber, are
subject to depletion as the natural resources are extracted or removed.
Acquisitions and disposals of property, plant and equipment are usually large in dollar amount,
but concentrated in only a few transactions. Individually items of plant and equipment may remain
unchanged in the accounts for many years.
The amounts invested in plant and equipment represents a large portion of the total assets of many
industrial concerns. Maintenance, rearrangement and depreciation of these asset are major
expenses in the income statement. The total expenditures for the assets and related expenses make
strong internal control essential to the preparation of reliable financial statements. Errors in
measurement of income may be material if assets are scrapped without their cost being removed
from the accounts, or if the distinction between capital and revenue expenditures is not maintained
consistently. The losses that inevitably arise from uncontrolled methods of acquiring, maintaining,
and retiring plant and equipment are often greater than the losses from fraud in cash handling.
In large enterprises, the auditors may expect to find an annual plant budget used to forecast and
control acquisitions and retirements of plant and equipment. Many small companies also forecast
expenditures for plant assets. Successful utilization of a plant budget presupposes the existence for
reliable and detailed accounting records for plant and equipment. A detailed knowledge of the
kinds quantities and condition of existing equipment is an essential basis for intelligent forecasting
of the need for replacement and additions to the plant.
1. A subsidiary ledger consisting of a separate record for each unit of property. An adequate
plant and equipment ledger facilitate the auditor’s work in analyzing additions and
retirements, in verifying the depreciation provision and maintenance expenses, and in
comparing authorizations with actual expenditures.
2. A system of authorization requiring advance executive approval of all plant and equipment
acquisitions, whether by purchase, lease or construction. Serially numbered capital work
orders are a convenient means of recording authorizations.
3. A reporting procedure assuring prompt disclosure and analysis of variances between
authorized and actual costs.
4. An authoritative written statement of company policy distinguishing between capital
expenditures and revenue expenditures. A dollar minimum ordinarily will be established
for capitalization; any expenditure of a lesser amount automatically classified as charges
against current revenue.
5. A policy requiring all purchases of plant and equipment to be handled through the
purchasing department and subjected to a standard routine for receiving, inspection and
payment.
6. Periodic physical inventories designed to verify the existence, location and condition of all
property listed in the accounts and to disclose the existence of any unrecorded units
7. A system of retirement procedures, including serially numbered retirement work orders
(bottom), stating reasons for retirement and bearing appropriate approvals.
Error:
• Purchases of equipment • Inadequate accounting;
erroneously reported in manual; incompetent
maintenance and repairs accounting personnel.
expense account.
Failure to record retirements Error:
of property, plant and • An asset that has been • Inadequate accounting
equipment. replaced is discarded due policies, e.g., failure to use
to its lack of value, retirement work orders.
without an accounting
entry.
Improper reporting of unusual Error:
transactions. • A “gain” recorded on an • Inadequate accounting;
exchange of nonmonetary manual; incompetent
assets that lacks accounting personnel.
commercial substance.
CHAPTER 17: INTERNAL CONTROL AFFECTING LIABILITIES AND EQUITY
Other sources of accounts payable include the receipt of services, such as legal and accounting
services, advertising, repairs and utilities. Interest-bearing obligations should it be included in
accounts payable but shown separately as bonds, notes, mortgages, or installment contracts.
Invoices and statements from supplies usually evidence accounts payable arising from the
purchase of goods or services and most other liabilities. However, accrued liabilities (sometime
called accrued expenses) generally accumulate over time, and management must make accounting
estimates of the year-end liability. Such estimates are often necessary for salaries, pensions,
interest, rent, taxes and similar items.
In thinking about internal control over account payable, it is important to recognize that the
accounts payable of one company are the accounts receivable of other companies. It follows that
there is little danger of errors being overlooked permanently since the client’s creditor’s will
generally maintain complete records of their receivables and will inform the client if payment is
not received. This feature also aids auditors in the discovery of fraud, since the perpetrator must
be able to obtain and respond to the demands for payment. Some companies, therefore, may choose
to minimize their record keeping of liabilities and to rely on creditors to call attention to any delay
in making payment. This viewpoint is not an endorsement of inaccurate or incomplete records of
accounts payable, but merely recognition that the self-interest of creditors constitutes an effective
control in accounting for payables that is not present in the case of accounts receivable.
Discussion of internal control applicable to accounts payable may logically be extended to the
entire purchase or acquisition cycle.
The trustee is charged with the protection of the creditors’ interests and with monitoring the issuing
company’s compliance with the provisions of the indenture. The trustee also maintains detailed
records of the names and addresses of the registered owners of the bonds, cancels old bond
certificates and issues new ones when bonds change ownership, follows procedures to prevent over
issuance of bond certificates, distribute interest payments, and distributes principal payments when
then bonds mature. Use of an independent trustee largely solves the problem of internal control
over bonds payable. Internal control is strengthened by the fact that the trustee does not have access
to the issuing company’s assets or accounting records and the fact that the trustee is a large
financial institution with legal responsibility for its actions.
Authority for all dividend actions rests with the directors. The declaration of a dividend must
specify not only the amount per share but also the date of record and the date of payment.
In a small corporation that does not use the services of a dividend-paying agent, the responsibility
for payment of dividends is usually lodged with the treasurer and the secretary. After declaration
of a dividend by the board of directors, the secretary prepares a list of shareholders as of the date
of record, the number of shares held by each, and the amount of the dividend each is to receive.
The total of these individual amounts is proved by multiplying the dividend per share by the total
number of outstanding shares.
Dividend checks controlled by serial numbers are dawn payable to individual stockholders in the
amount shown on the list described above. If the shareholders ledger is maintained on a computer
master file, the dividend checks may be prepared by the computer directly from this record. The
stockholder list and dividend check are submitted to the treasurer with the total of shares
outstanding and mailed without again coming under control of the officer who prepared them.
Cash in the amount of the total dividend is then transferred from the general bank account to a
separate dividend bank account. As the individual dividend checks are paid from this account and
returned by the bank, they should be matched with the check stubs or marked paid in the dividend
register. A list of outstanding checks be prepared monthly from the open stubs or open items in
the checks register. This list should agree in total with the balance remaining in the dividend bank
account. Companies with numerous shareholders prepare dividend checks in machine-readable
form, so that the computer may perform the reconciliation of outstanding checks.