ATG 383 - Expenditure Cycle - Matching Threats and Control Procedures
For each threat, select one or more controls that address the issue. Every control is matched to one threat. Each threat has one or more controls. Controls may be both preventative and detective.
Threats Controls
1. _____ Acquire goods for inflated prices. a) Bank reconciliation prepared by
individual who does not handle cash 2. _____ Acquire goods of inferior quality. receipts or disbursements. b) Black out quantities on the purchase 3. _____ Obtain goods from unauthorized order. Receiving clerk signs PO once vendors. quantities are filled in. c) Cancel invoices and supporting 4. _____ Vendors receive kickbacks from documents when paid. purchasing agents. d) Check mathematical accuracy of vendor invoices. 5. _____ Goods that were not ordered are e) Collect and review vendor performance accepted. data. f) Compare quantities on vendor invoices 6. _____ Receiving does not accurately with quantities indicated on the copy of count goods received. the receiving reports. g) Conduct periodic vendor audits. 7. _____ Inventory is stolen. h) Conduct physical inventory counts and adjust records. 8. _____ Vendor miscalculates the total i) Document all transfers of inventory. amount due. j) Establish policy of only paying original invoices. 9. _____ Pay for goods not received. k) File invoices by due date. l) Maintain price lists for frequently 10. _____ Pay full amount for purchases purchased items. rather than take discount. m) Periodically reconcile subsidiary ledger to A/P control account. 11. _____ Same invoice paid for two times. n) Purchases are charged to an account that is the responsibility of the person 12. _____ A payment to a vendor is not creating the requisition. posted to the vendor's subsidiary ledger. o) Receiving only accepts deliveries for 13. _____ Checks are issued to fictitious which it has a valid receiving report. vendors. p) Require invoices to be accompanied by completed voucher package. 14. _____ Checks are stolen and used for q) Segregate authorization of payment unauthorized purposes. from check signing. r) Sequentially prenumber checks and account for their usage. s) Software prevents creation of purchase order unless vendor's name is on approved vendor list. t) Store inventory in secure locations.