Free Essay

Sdfsdfsdf

In:

Submitted By mlwinn77
Words 1018
Pages 5
Internal Controls
XACC/280

Internal Controls
What if one of your fellow co-workers you found had been stealing from their cash register over a period of time so they did not get caught until now? What about a book keeper who had been keeping you accounting records and has been placing inaccurate information regarding transactions so they could pocket money for themselves? This is why companies have internal controls in place so it prevents certain situations from happening. Internal controls as defined in the reading are “all of the related methods and measures adopted within an organization to safeguard its assets and enhance accuracy and reliability of its accounting records” (Weygandt & Kimmel, 2008). In my thoughts internal controls is a method or process for a company to protect their assets and their employees and the company itself from liability. What internal controls are processes and methods that companies have to make sure there recording of their transactions are done properly so that the company does not get audited and in possible trouble. These are the two primary goals is to “safeguard assets and to make sure that there are accuracy and reliability of accounting records.” (Weygandt & Kimmel, 2008).
The Sarbanes-Oxley Act of 2002 “is regulations passed by congress in 2002 to try to reduce unethical corporate behavior. It imposes more responsibilities on corporate executives and boards of directors to ensure those companies’ internal controls are in order.” (Weygandt & Kimmel, 2008). Under the new law companies are forced to make “sound principles of control over financial reporting and to be able to verify it” (Weygandt & Kimmel, 2008). The Public Company Accounting Oversight Board helps maintain and regulates auditor’s activities. There are also six principles of internal controls that help and apply to most companies which are establishment of responsibility, segregation of duties, documentation procedures, physical, mechanical, and electronic controls, independent internal verification, and other internal controls. By having these different controls in place it helps a company to be able to make sure they are keeping accounting records accurate and to help their business be protected by fraud or at least try to minimize it as much as possible.
If a company were to announce deficiencies in its internal controls it would most definitely experience a fall in price of stock. Most investors want to know that their investment is sound and that they are investing wisely. One is always scared to take the risk in investing in a company because they are afraid of what could happen to their investment. In the past we have had major scandals of investments gone wrong. Such as the Enron scandal and the Tyco Co. these are huge companies and to know that accurate records were being inflated and embezzlement was going on is scary. This is why internal controls are very important to investors and stockholders. If a problem or situation has been found within a company investors and stockholders would start to pull their investments which would cause price of stock to fall.
There could be limitations to internal controls. Like the example in the reading points out that having a security guard in place and sensors to detect stolen items could be a way to slow down the theft on shoplifting. Some businesses feel that this is an ineffective way to make consumers feel uncomfortable and quite costly. So maybe a cheaper way is to install video cameras. There is also the mention of having employees scan and monitor the equipment. In some cases because of examples such as employee fatigue this can cause problems. I feel an example of this would be for shoplifting to install cameras, but to also have a floor walker trying to help customers along with being trained to know when shoplifting is happening. Also, by training multiple employees all employees can be efficient and can be rotated.
I feel that having internal controls throughout different parts of a business are crucial. A business wants to be compliant and by doing so they have to have a wide variety of difference methods and systems in place. One would be the accounting that is done by the company. By making sure all transactions are reported accurately and always reported when there are discrepancies. Another would be having security enforced by management to ensure employees are maintaining proper cash outs at the end of their shift and that all inventory is accounted for at the end of each month. I also would make sure that proper systems are put into place for customer’s information such as checks, information they choose to share with the company, and how consumers are protected. I also would want all employees’ cross-trained in a majority of areas so that all employees can detect possible situations within the company.
There are different comparisons within the internal control principles. The first on establishing responsibility is to make sure that one person is trained or authorized to have one specific duty. This is making sure the one person for examples is assigned the one task then that one person should be responsible for it and one person would take the blame instead of others who were not responsible fully. The second is using physical, mechanical, and electronic controls. These work hand in hand of each other. “With being physical that would be safeguard assets. Mechanical and electronic would be to also do the same but to enhance accuracy and reliability of the accounting records.” (Weygandt & Kimmel, 2008). The third is segregation of duties which is where an employee should be responsible for their own job and to make sure what they are doing is not being done by someone who could be duplicating and causes harm to another’s work. The last would be independent internal verification which is making sure that all work that is done by employees is verified and made sure is done accurately. These four principles work hand in hand.

References:
Weygandt, J. J., Kimmel, P. D., & Kieso, D. E. (2008). Financial accounting (6th ed.). Hoboken, NJ: Wiley.

Similar Documents

Free Essay

Sdfsdfsdf

...World Cup Indoor Soccer Club Rules 1. ALL Restarts are direct kicks and my go in any direction (this includes, restarts when the ball goes out of bounds, beginning of each half, after each goal, fouls and penalty kicks). 2. Blue Card offenses result in a Two-Minute penalty and the player must leave the field. In the case that a GK receives a Two-Minute player, a field player may serve the penalty. If the opposing team scores during the Penalty period, the player serving the penalty may return to the field of play 3. Yellow card offenses result in a “hard” Two-Minute penalty. That means even if the opposing team scores during the Penalty period the player serving the penalty may not re-enter the field and must serve the entire Two-Minute Penalty. 4. Red card offenses result in a “hard” Five-Minute Penalty. The player committing the foul may not re-enter the game. 5. Kicking the ball into the ceiling is a One-Minute Penalty and the opposing team gets a free kick form the offensive line. 6. Three Line Rule: If a player kicks/throws the ball in the air over the Defensive, Center & Offensive lines the opposing team will receive a Free Kick from the Offensive line. 7. Substitutions can be made “on the fly” or “hockey-style” 8. There is NO slide tackling 9. There is NO Offsides 10. Where not noted, FIFA/House rules will apply 11. Competitive Balance Rule: In the Second Half ONLY, any team losing by 7 or more...

Words: 337 - Pages: 2

Premium Essay

Sdfsdfsdf

...Introduction to Bank Reconciliation A company's general ledger account Cash contains a record of the transactions (checks written, receipts from customers, etc.) that involve its checking account. The bank also creates a record of the company's checking account when it processes the company's checks, deposits, service charges, and other items. Soon after each month ends the bank usually mails a bank statement to the company. The bank statement lists the activity in the bank account during the recent month as well as the balance in the bank account. When the company receives its bank statement, the company should verify that the amounts on the bank statement are consistent or compatible with the amounts in the company's Cash account in its general ledger and vice versa. This process of confirming the amounts is referred to as reconciling the bank statement, bank statement reconciliation, bank reconciliation, or doing a "bank rec." The benefit of reconciling the bank statement is knowing that the amount of Cash reported by the company (company's books) is consistent with the amount of cash shown in the bank's records. Because most companies write hundreds of checks each month and make many deposits, reconciling the amounts on the company's books with the amounts on the bank statement can be time consuming. The process is complicated because some items appear in the company's Cash account in one month, but appear on the bank statement in a different month. For example, checks...

Words: 2995 - Pages: 12

Free Essay

Df Sdfsdf Sdfsdf Sdfsdfsdf

...THREAT MODELING AND ITS USAGE IN MITIGATING SECURITY THREATS IN AN APPLICATION Thesis Submitted in partial fulfillment of the requirements for the degree of MASTER OF TECHNOLOGY in COMPUTER SCIENCE & ENGINEERING - INFORMATION SECURITY by EBENEZER JANGAM (07IS02F) DEPARTMENT OF COMPUTER ENGINEERING NATIONAL INSTITUTE OF TECHNOLOGY KARNATAKA SURATHKAL, MANGALORE-575025 JULY, 2009 Dedicated To My Family, Brothers & Suraksha Group Members DECLARATION I hereby declare that the Report of the P.G Project Work entitled "THREAT MODELING AND ITS USAGE IN MITIGATING SECURITY THREATS IN AN APPLICATION" which is being submitted to the National Institute of Technology Karnataka, Surathkal, in partial fulfillment of the requirements for the award of the Degree of Master of Technology in Computer Science & Engineering - Information Security in the Department of Computer Engineering, is a bonafide report of the work carried out by me. The material contained in this report has not been submitted to any University or Institution for the award of any degree. ……………………………………………………………………………….. (Register Number, Name & Signature of the Student) Department of Computer Engineering Place: NITK, SURATHKAL Date: ............................ CERTIFICATE This is to certify that the P.G Project Work Report entitled " THREAT MODELING AND ITS USAGE IN MITIGATING SECURITY THREATS IN AN APPLICATION" submitted by Ebenezer Jangam (Register Number:07IS02F)...

Words: 18945 - Pages: 76

Free Essay

Nope

...sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf. sdfsdfsdf...

Words: 27001 - Pages: 109

Free Essay

Safsfhk

...sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf sdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdfsdf ...

Words: 435 - Pages: 2

Free Essay

Trying

...Test Fsdkf’ldsfj lksdjflksjd f;lsadkjf;lksadj flksadjf lksajdflksadjf;lkjdsalkfjs;ldjflksadhflkjhf Ksdhflksahdfjhsajflksadjf;lkjdsaf;lkjsadf Skjfsa;lkdjf lksad jflkjdsaf lksadl lkjsd flksad f Sdjfl sd salkdfj lkdsajf ;lksad f;lksa dfj saldf Lksadlkf sadf kdsfl lkdsa lkfjs dflk asdf lkdsa flkjasd f Sd falks jfd;lkas df lkjsadf dsalkjf asdf fd dsf fdslkds Slkdf dsflkdslk Dslkf ;ldsakf Dsaflkj ;lsad f;lksadjf Sdfjk sadlfj sadlkfj lkdsa fsdjf I jslkd jflkdsaf sld fl f Alkdsjf lksad f lkj ;lk ;lj laksjfd ;lkdsajf ;lkdsa l sdflkj lkj l lksdjf lksd Slkdjf lskd flj llkfdjlkdsa fldskjflks dflkjsad lkf jsadlkfjs dlkfjsd Dss sdjf dsf sdfsdf sdf dsfsdf sdfsdfsdf kj sl;kdjf ;l Fjsdlf;js d;f lsdjf saldkfj ;salkfj lsakd jf;lakjsoiweurlsd foiwe Lskdjf oiwe oiweur pow uresoiwuer poiw er oiwe ur oiwer oiwe wi w wis s is s s s s s Sjflksa df s s se w e e w k d oeiis dlk s skld s lkds sdlsoiwe s doiwe oiw eoi sdlsk s dkweoi s iowe sl sls Lsd s sldsl s dks ld lkwe oiw sl dk sdlk oiwe iwew w w e d sd g ds c e r r x e c d d e cc d c d c d c d c ;’ D sd sd s j vh u h kj oi k o k ik o ol o lkj I k I k juj j l k k lk j l l ll l; ; klk k jh I n kk I k I j j m m n k kj mnk m k k k j h j...

Words: 262 - Pages: 2