Sie sind auf Seite 1von 11

Accounting

Information
● M. Andi Irvan 1806213756

System ●

Benedictha C. 1806213081
Leonard Day M.S. 1806134386
● Ezra Marhaendra 1808213144
PBL1 ● Fhina Chansa C. 1806134215
● Yossi Marlina 1806213131
● Akhdan Yuandri I. 1706058823
● Nadya Agustina 1706972915
● Nancy Hera V. 1706972934
● Rana Neysa 1706019154
12.7
O’ Brien
Corporation
Weakness in O’ Brein Coorporation Revenue Cycle Procedures
No Weaknesses and Potential Problems Solutions

1 Orders from new customers do not require any form of Require digital signatures on all online
validation, resulting in several large shipments being sent orders from new customers.
and never paid for.
Require a written customer purchase order
as confirmation of telephone and fax orders.

2 Customer credit histories are not checked before approving Customers’ credit should be checked and no
orders, resulting in excessive uncollectible accounts. sales should be made to those that do not
meet credit standards.

3 Outgoing shipments are placed near the loading dock door Separate the shipping and receiving docks.
without any physical security. The loading dock is also used
to receive incoming deliveries. This increases the risk of Physically restrict access to the loading dock
theft, which may account for the unexplained shortages in area where customer orders are placed.
inventory.
BPMN diagram to
depict O’ Brain
Corporation’s
Revenue cycle
revised to
incorporate solution
to step a.
12.8
Parktown
Medical
Center, Inc.
12.8.a. Weaknesses in Parktown’s revenue cycle procedures

Weaknesses Problem Solution

The employee who makes bank The office manager could steal Cash deposits should be made by
deposits also issues credit memos. cash and cover up the shortage by an employee who does not have
issuing a credit memo for the authority to issue credit memos
amount stolen.
and who also does not maintain
accounts receivable.

The employee who makes bank The cash balance per books may Bank reconciliation should be
deposits also reconciles bank be overstated because all cash is done by an employee with no
statements not deposited (i.e. theft). other cash handling
responsibilities.

The employee who initially Theft by lapping could occur. Fees Segregate the functions of cash
handles cash receipts also earned and cash receipts or receipts handling and
prepares billings and maintains accounts receivable could be billing/accounts receivable.
understated because of omitted or
accounts receivable.
inaccurate billing.
BPMN diagram to depict Parktown’s revenue cycle revised to incorporate solutions to step a.
12.9
The Family
Support
Center
12.9 A - Control Weaknesses in Cash Receipts Procedures
Weakness:
Sarah opens all mail and prepares a list of donations (cash and checks). Sarah could
misappropriate anonymous cash donations.
Control:
Mail should be opened by both Sarah and the other staff member. The use of lockboxes would
also eliminate this problem, but would cost the charity money to implement.

Weakness:
The donations and donation list are sent to the accountant for recording and to prepare the bank
deposit. Therefore, the accountant has custody of the donation and records the donation.
Bank reconciliation is performed by the accountant, who also makes the bank deposit.
Control:
The donations should be sent to the office manager for deposit and the donation list sent to the
accountant for recording. This corrects both weaknesses.

Weakness:
Each employee has full access (create, read, update, delete) to the accounting system.
Control:
Only the accountant and the office manager should have full access to the accounting system.
12.9 bagian b
IT Procedures that should exist:

1. The backup copy should be stored someplace other than


the manager’s office
Managers might compromise with the data on the files.

2. The backup copy should be placed somewhere secure,


preferably locked.
So that none of the staff or even the managers have
access to the files other than the accountant.

3. All files should be protected with passwords or other


forms of authorizations
As a prevention against loss, alteration, or unauthorized
disclosure of data
Thanks!
CREDITS: This presentation template was
created by Slidesgo, including icons by Flaticon,
and infographics & images by Freepik.