Exam 2 (ch 15) Flashcards
Basic Expenditure Cycle Activities
- Order materials, supplies, and services
- Receive materials, supplies, and services
- Approve supplier (vendor) invoice
- Cash disbursement
Key decisions
- What is the optimal level of inventory?
- Which suppliers provide the best quality at the best price?
- How can IT be used to improve the efficiency and accuracy of logistics?
-How can we take advantage of vendor discounts? - How can we maximize cash flow?
General Threats
1) Inaccurate or invalid master data
2) Unauthorized disclosure of sensitive information
3) Loss or destruction of data
4) Poor performance
General Controls
1) - Data processing integrity controls
- Restriction of access to master data
- Review of all changes to master data
2) - Access Controls
- Encryption
3) - Backup and disaster recovery procedures
4) - Managerial reports
Order Goods (Material/Supplies)
or Services
Processing Steps
Identify what, when, and how much to purchase
- Source Document: Purchase requisition
(Someone needs to request a purchase
and someone to approve it)
Choose a supplier
- Source Document: Purchase Order
Ordering Goods/Services
Threats
- Stockouts and excess inventory
- Purchasing items not needed
- Purchasing items at inflated prices
- Purchasing goods of poor quality
- Unreliable suppliers
- Purchasing from unauthorized suppliers
- Kickbacks
Controls to this threat:
(stockouts and excess inventory)
- Perpetual inventory system
- Bar-coding, RFID
- Periodic physical counts
Controls to this threat:
(Purchasing Items not needed)
- Perpetual Inventory Systems
- Review and approval of purchase requisitions
- Centralized purchasing
Controls to this threat:
(Purchasing items at inflating prices)
- Price lists
- Competitive bids
- Review purchase orders
Controls to this threat:
(Purchasing goods of poor quality)
- Use approved suppliers
- Review and approve purchases from new suppliers
- Monitor product quality by supplier
- Hold purchasing managers responsible for rework and scrap cost
Controls to this threat:
(Unreliable suppliers)
- Monitor supplier performance
- Require quality certification
Controls to this threat:
(Purchasing from unauthorized suppliers)
- Purchase from approved suppliers
- Review approval from purchases of new suppliers
- EDI specific controls
Controls to this threat:
(Kickbacks)
- Supplier audits
- prohibit gifts
- Job rotation & mandatory vacations
- Required disclosure of financial and personal interests in suppliers
Receiving Process
- Goods arrive
- Verify goods ordered against the
purchase order (what, how much, quality) - Source Document: Receiving Report
- Verify goods ordered against the
Receiving Goods or Services
Threats
- Accepting unordered items
- Mistakes in counting
- Verifying receipt of services
- Inventory theft