Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
208 views
AIS Chap 3 Notes
ch 3 notes
Uploaded by
Krissha
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save AIS chap 3 notes For Later
Download
Save
Save AIS chap 3 notes For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
208 views
AIS Chap 3 Notes
ch 3 notes
Uploaded by
Krissha
AI-enhanced title
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save AIS chap 3 notes For Later
Carousel Previous
Carousel Next
Save
Save AIS chap 3 notes For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 17
Search
Fullscreen
Chapter 3 Ethics, Fraud, and Internal Control ‘TRUE/FALSE 1. The ethical principle of justice asserts that the benefits of the decision should be distributed fairly to those who share the risks, ANS: T ‘The ethical principle of informed consent suggests that the decision should be implemented so as to minimize all of the risks and to avoid any unnecessary risks. ANS: F 3. Employees should be made aware of the firm's commitment to ethics. ANS: T 4. Business ethics is the analysis of the nature and social impact of computer technology, and the ‘corresponding formulation and justification of policies for the ethical use of such technology. ANS: F 5S. Para computer ethics is the exposure to stories and reports found in the popular media regarding the ‘good or bad ramifications of computer technology. ANS: F 6. Source code is an example of intellectual property. ANS: T 7. Copyright laws and computer industry standards have been developed jointly and rarely conflict ANS: F 8. Business bankruptcy cases always involve fraudulent behavior, ANS: F 9. Defalcation is another word for financial fraud ANS: T 10. The trend toward di ited data processing increases the exposure to fraud from remote locations. ANS: T LI. The external auditor is responsible for establishing and maintaining the internal control system ANS: F13, 14. 1s 20. au 2, 23, ‘Segregation of duties is an example of an internal control procedure. ANS: T ‘Controls in a computer-based information system are identical to controls in a manual system. ANS: F Preventive controls are passive techniques designed to reduce fraud, ANS: T Ethical issues and legal issues are essentially the same. ANS: F ‘Internal control systems are recommended but not required of firms subject to the Foreign Corrupt Practices Act. ANS: F ‘Operations fraud is the misuse or theft of the firm's computer resourees ANS: T “The Foreign Corrupt Practices Act requires only that a firm keep good records. ANS: F A key modifying assumption in internal control is that the internal control system is the responsibility ‘of management. ANS: T ‘Database management fraud includes altering, updating, and deleting an organization's data. ANS: F While the Sarbanes-Oxley Act prohibits auditors from providing non-accounting services to their audit, clients, they are not prohibited from performing such services for non-audit clients or privately held ‘companies. ANS: T ‘The Sarbanes-Oxley Act requires the audit committee to hire and oversee the external auditors. ANS: T ‘Section 404 requires that corporate management (including the CEO) certify their organization’s intemal controls on a quarterly and annual basis, ANS: F24, Section 302 requires the management of public companies to assess and formally report on the effectiveness of their organization’s internal controls. ANS: F 25. The objective of SAS 99 is to seamlessly blend the auditor’s consideration of fraud into all phases of the audit process. ANS: T MULTIPLE CHOICE, 1. Which ethical principle states that the benefit from a decision must outweigh the risks, and that there is no alternative decision that pravides the same or greater benefit with less risk? a, minimize risk b. justice ¢. informed consent d._ proportionality ANS: D 2. Individuals who acquire some level of skill and knowledge in the field of computer ethics are involved jin which level of computer ethics? a. para computer ethics b. pop computer ethics ¢. theoretical computer ethics d._ practical computer ethics ANS: A 3. All of the following are issues of computer security except a. releasing incorrect data to authorized individuals, b. permitting computer operators unlimited access to the computer room permitting access to data by unauthorized individuals d._ providing correct data to unauthorized individuals ANS: B 4. Which characteristic is not associated with software as intellectual property? a. uniqueness of the product b. possibility of exact replication €. automated monitoring to detect intruders ease of dissemination ANS: C 5. For an action to be called fraudulent, all of the following conditions are required except poor judgment bb. false representation ©. intent to deceive injury or loss ANS: A 6. One characteristic of employee fraud is that the fraud10. WL is perpetrated at a level to which internal controls do not apply involves misstating financial statements involves the direct conversion of cash or other assets to the employee's personal benefit involves misappropriating assets in a series of complex transactions involving third parties ANS: ¢ ange Forces which may permit fraud to occur do not include a. agambling addiction ._ lack of segregation of duties centralized decision making environment d. questionable integrity of employees ANS: C ‘Which of the following best describes lapping? a. applying cash receipts to a different customer's account in an attempt to conceal previous ‘thefts of funds b. inflating bank balances by transferring money among different bank accounts . expensing an asset that has been stolen creating, false transaction ANS: A ‘Operations fraud includes altering program logic to cause the application to process data incorrectly 'b. misusing the firm’s computer resources ¢. destroying or corrupting a program’s logic using a computer virus 4. creating illegal programs that can access data files to alter, delete, or insert values ANS: B ‘Who is responsible for establishing and maintaining the internal control system? a. the internal auditor b. the accountant ©. management the external auditor ANS: C ‘The concept of reasonable assurance suggests that a. the cost of an internal control should be less than the benefit it provides b. well-designed system of internal controls will detect all fraudulent activity the objectives achieved by an internal control system vary depending on the data processing method the effectiveness of internal controls is a function of the industry environment ANS: A ‘Which of the following is not limitation of the intemal control system? a, errors are made due to employee fatigue 'b. fraud occurs because of collusion between two employees the industry is inherently risky d__-management instructs the bookkeeper to make fraudulent journal entries ANS: C13, 4. 17, 18 19. ‘The most cost-effective type of internal control is, a. preventive control b. accounting control €. detective control d._comrective control ANS: A Which of the following is a preventive control? a. credit check before approving a sale on account b. bank reconciliation ¢. physical inventory count comparing the accounts receivable subsidiary ledger to the control account ANS: A A well-designed purchase order is an example of a a. preventive control b. detective control ©. corrective control none of the above ANS: A ‘A physical inventory count is an example of a a. preventive control b. detective control corrective control feedforward control ANS: B “The bank reconciliation uncovered a transposition error in the books. This is an example of a a. preventive control b. detective control ©. corrective control d._ none of the above ANS: B ‘In balancing the risks and benefits that are part of every ethical decision, managers receive guidance ‘from each of the following except a. justice b. ‘self interest ¢. risk minimization proportionality ANS: B Which of the following is not an element of the internal control environment? ‘a_management philosophy and operating style b. organizational structure of the firm ¢. well-designed documents and reeords d._ the functioning of the board of directors and the audit committee20. 21 22, 23. 25, 26. ANS: ‘Which of the following suggests a weakness in the internal control environment? ‘a, the firm has an up-to-date organizational chart b. monthly reports comparing actual performance to budget are distributed to managers ¢. performance evaluations are prepared every three years the audit committee meets quarterly with the external auditors ANS: C Which of the following indicates a strong intemal control environment? a. the intemal audit group reports to the audit committee of the board of directors 'b. there is no segregation of duties between organization functions ©. there are questions about the integrity of management adverse business conditions exist in the industry ANS: A According to SAS 78, an effective accounting system performs all of the following except a. identifies and records all valid financial transactions bb. records financial transactions in the appropriate accounting period . separates the duties of data entry and report generation d._ records all financial transactions promptly ANS: C ‘Which of the following is the best reason to separate duties in a manual system? a. toavoid collusion between the programmer and the computer operator b. to ensure that supervision is not required €. toprevent the record keeper from authorizing transactions d._toenable the firm to function more efficiently ANS: C ‘Segregation of duties in the computer-based information system includes a. separating the programmer from the computer operator b. preventing management override Separating the inventory process from the billing process d._ performing independent verifications by the computer operator ANS: A ‘Which of the follos a. authorization b. management's operating style ¢. independent verification accounting records g is not an internal control procedure? ANS: B “The decision to extend credit beyond the normal credit limit is an example of a. independent verification b, authorization ©. segregation of functions supervision27, 28, 29. 30. aL 32, 33, cannot be segregated, the most important intemal control procedure is b. independent verification c.access controls accounting records ANS: A ‘An accounting system that maintains an adequate audit tral is implementing which internal control procedure? ‘a._access controls b. segregation of functions ¢. independent verification accounting records ANS: D ‘Employee fraud involves three steps. Of the following, which is not involved? ‘a. concealing the crime to avoid detection b, stealing something of value ©. misstating financial statements converting the asset to a usable form ANS: ¢ ‘Which of the following is not an example of independent verification? ‘a. comparing fixed assets on hand to the accounting records b. performing a bank reconciliati ©. comparing the accounts payable subsidiary ledger to the control account d._ permitting authorized users only to access the accounting system ANS: D ‘The importance to the accounting profession of the Foreign Corrupt Practices Act of 1977 is that a, bribery will be eliminated b. management will not override the company’s internal controls ¢. firms are required to have an effective internal control system firms will not be exposed to lawsuits ANS: C “The board of directors consists entirely of personal friends of the chief executive officer. This indicates a weakness in the accounting system the control environment control procedures di this is mot a weakness ANS: B ‘Computer fraud can take on many forms, including each of the following except a. theft or illegal use of computer-readable information 'b. theft, misuse, or misappropriation of computer equipment . theft, misuse, or misappropriation of assets by altering computer-readable records and files,35) 36. 37, 38. 39. 40. d._ theft, misuse, or misappropriation of printer supplies ANS: D ‘When certain customers made cash payments to reduce their accounts receivable, the bookkeeper embezzled the cash and wrote off the accounts as uncollectible. Which control procedure would most likely prevent this irregularity? a. segregation of duties b. accounting records ©. accounting system access controls ANS: A “The office manager forgot to record in the accounting records the daily bank deposit. Which control procedure would most likely prevent or detect this error? a. segregation of duties b. independent verification ©. accounting records supervision ANS: B Business ethics involves a. how managers decide on what is right in conducting business b. how managers achieve what they decide is right for the business c. bothaandb none of the above ANS: C All of the following are conditions for fraud except a. false representation injury oF loss ©. intent 4. material reliance ANS: D “The four principal types of fraud include all of the following except a. bribery b. gratuities €. conflict of interest economic extortion ANS: B ‘The characteristics of useful information include ‘a, summarization, relevance, timeliness, accuracy, and completeness b. relevance, summarization, accuracy, timelessness, and completeness . timeliness, relevance, summarization, accuracy, and conciseness d._ disaggregation, relevance, timeliness, accuracy, and completeness ANS: A Internal control system have limitations. These include4 42, 43, possibility of honest error ‘circumvention ‘management override stability of systems aoge ANS: D “Management can expect various benefits to follow from implementing a system of strong internal control. Which of the following benefits is least likely to occur? reduced cost of an external audit prevents employee collusion to commit fraud availability of reliable data for decision-making purposes. ‘some assurance of compliance with the Foreign Corrupt Practices Act of 1977. ‘some assurance that important documents and records are protected ANS: B pangs ‘Which of the following situations is not a segregation of duties violation? a. The treasurer has the authority to sign checks but gives the signature block to the assistant, ‘treasurer to run the check-signing machine b. The warehouse clerk, who has the custodial responsibility over inventory in the warehouse, selects the vendor and authorizes purchases when inventories are low. ©. The sales manager has the responsibility to approve credit and the authority to write off accounts. 4. The department time clerk is given the undistributed payroll checks to mail to absent ‘employees. . The aceounting clerk who shares the record keeping responsibility for the accounts receivable subsidiary ledger performs the monthly reconciliation of the subsidiary ledger and the control account. ANS: B ‘Which of the following is not an issue to be addressed in a business code of ethics required by the SEC? a. Conflicts of interest b. Full and Fair Disclosures Legal Compliance d._Intemal Reporting of Code Violations ©, All of the above are issues to be addressed ANS: E SHORT ANSWER 1 ‘What are the main issues to be addressed in a business code of ethies required by the SEC? ANS: ‘Conflicts of interest, Full and Fair Disclosures, Legal Compliance, Internal Reporting of Code ‘Violations, Accountability List the four broad objectives of the internal control system. ANS’ safeguard assets,censure the accuracy and reliability of accounting records, promote organizational efficiency, ‘comply with management's policies and procedures Explain the purpose of the PCAOB empowered to set auditing, quality control, and ethics standards; to inspect registered accounting firms; to conduct investigations; and to take disciplinary actions. ‘What are the five intemal control components described in the SAS 78 / COSO framework ANS: the control environment, risk assessment, information and communication, monitoring, and control activities ‘What are management responsibilities under section 302 and 404? ANS: ‘Section 302 requires that corporate management (including the CEO) certify their organization’s internal controls on a quarterly and annual basis. Section 404 requires the management of public ‘companies to assess and formally report on the effectiveness of their organization's internal controls, ‘Identify to indicate whether each procedure is a preventive or detective control a. authorizing a credit sale Preventive Detective b. preparing bank reconciliation Preventive Detective ©. locking the warehouse Preventive Detective d, preparing a trial balance Preventive Detective ©. counting inventory Preventive Detective ANS: A. preventive; B. detective; C. preventive; D. detective; E. detective ‘Use the internal control procedures listed below to complete the statements. segregation of duties specific authorization general authorization accounting records access controls independent verification supervision A clerk reorders 250 items when the inventory falls below 25 items. This is an example of ANS: ‘general authorization ‘The internal audit department recalculates payroll for several employees each pay period. This is an example of, ANS’ independent verification10. nL 3B 15 16. 17, ‘Locking petty cash in a safe is an example of. ANS: ‘access controls Approving a price reduction because goods are damaged is an example of ANS: specific authorization ‘Using cameras to monitor the activities of cashiers is an example of ANS: supe ion ‘Not permitting the computer programmer to enter the computer room is an example of ANS: segregation of duties ‘Sequentially numbering all sales invoices is an example of ANS. accounting records ‘What are the five conditions necessary for an act to be considered fraudulent? ANS: false representation, material fact, intent, justifiable reliance, and injury or loss ‘What is the objective of SAS 997 ANS: “The objective of SAS 99 is to seamlessly blend the auditor's consideration of fraud into all phases of the audit process. Distinguish between exposure and risk. ANS: ‘Exposure is the absence or weakness ofa control which increases the firm’s risk of financial loss or injury, Risk is the probability of incurring such a loss or injury. ‘Explain the characteristics of management fraud. ANS: “Management fraud typically occurs at levels above where the internal control system is effective. Financial statements are frequently modified to make the firm appear more healthy than it actually is ‘f any misappropriation of assets occurs, itis usually well hidden.18. The text discusses many questions about personal traits of employees which might help uncover ‘fraudulent activity. What are three? ANS: ‘executives: with high personal debt, living beyond their means, engaged in habitual gambling, appear to abuse aloohol or drugs, appear to lack personal codes of ethics, appear to be unstable 19. Give two examples of employee fraud and explain how the theft might occur. ANS: ‘Charges to expense accounts: Cash could be stolen and charged to a miscellaneous expense account. ‘Once the account is closed, detection would be more difficult. ‘Lapping: This involves converting cash receipts to personal use. Ifa customer’s check is taken, his/her balance will not reflect a payment and will be detected when a statement is sent. In order to conceal this fraud, a later payment is used to cover the stolen check. This is in effect a small scale Ponzi scheme, 20. What are the six broad classes of physical control activities defined by SAS 78? ANS: ‘Transaction authorization, segregation of duties, supervision, access controls, accounting records, ‘independent verification ESSAY 1, The text describes six internal control activities. List four of them and provide a specific example of each one. ANS: Control Activity Example ‘Authorization general (purchase of inventory when level drops) or specific (credit approval beyond normal limit) Segregation of functions _separate authorization from processing separate custody of assets from record keeping Supervision required when separation of duties is not possible, such as opening the mail (cash receipts) Accounting records ‘maintain an adequate audit trail Access controls, maintain physical security Independent verification _bank reconciliation, physical inventory count 2. Contrast management fraud with employee fraud ANS: ‘Employee fraud is usually designed to directly convert cash or other assets to the employee’s personal benefit. “Management fraud involves less of a direct benefit to the perpetrator. Management fraud may involve an attempt to misstate financial performance in order to gain additional compensation or to eam a Promotion. Management fraud may also involve an attempt to misstate financial performance in order to increase the price of the company’s stock or to reduce the cost of debt.3. Discuss the importance of the Foreign Corrupt Practices Act of 1977 to the accounting profession, ANS: ‘The Foreign Corrupt Practices Act of 1977 (FCPA) is a law that requires all companies registered with, the Securities and Exchange Commission to: keep records that fairly and reasonably reflect the transactions of the firm and its financial position ‘maintain a system of internal control that provides reasonable assurance that the organization’s objectives are met ‘As a result of the Foreign Corrupt Practices Act of 1977, management devotes substantial time to developing and maintaining the internal control structure because failure to do-so violates the FCPA and could lead to heavy fines and imprisonment. Accountants are key participants in establishing and maintaining the internal control structure. “Therefore, it is accountants who are instrumental in ensuring that the firm is in compliance with the Foreign Corrupt Practices Act of 1977. 4. Why are the computer ethics issues of privacy, security, and property ownership of interest to accountants? ANS: Privacy is a concern because the nature of computer data files makes it possible for unauthorized individuals to obtain information without it being recognized as “missing” from its original location. Security is a concern because its absence makes control from a privacy viewpoint questionable. In addition lack of security may permit unauthorized changes to data, therefore distorting information that is reported. ‘Property ownership raises issues of legitimacy of organizational software, valuation of assets, and ‘questions of lost revenues, 5. According to common law, there are five conditions that must be present for an act to be deemed ‘fraudulent. Name and explain each. ANS: Inorder foran act to be deemed fraudulent under common law, it must possess the following characteristics: false representation, meaning some misrepresentation or omission must have occurred, terial facts, meaning that the facts must influence someone’s actions, tent, meaning there must have been the intention to deceive others, justifiable reliance, meaning it did affect someone’s decision, and injury or loss must have occurred, 6. Management fraud is regarded as more serious than employee fraud. Three special characteristics have been discussed for management fraud. What are they? Explain. ANS: ‘Ttusually occurs at levels above the normal intemal control system. ‘There is typically an intent to present a better picture of the business than is valid, often to deceive sreditors and/or shareholders. ‘Af assets are misappropriated, the route is q devious involving a maze of business transactions.7. Fourprincipal types of corruption are discussed. Name all four and explain at least two, ANS’ ‘Corruption involves an executive, manager, or employee ofa business working in collusion with an ‘outsider. The four principal types of corruption are: bribery, illegal gratuities, conflicts of interest, and ‘economic extortion. Bribery involves giving, offering, soliciting, or receiving things of value to influence an official in the performance of his or her lawl duties. ‘An illegal gratuity involves giving. receiving, offering, or soli official act that has been talsen. iting something of value because of an A conflict of interest occurs when an employee acts on behalf of a third party during the discharge of hhis or her duties or has self-interest in the activity being performed ‘Economic extortion is the use (or threat) of force (including economic sanctions) by an individual or ‘organization to obtain something of value. 8, Misappropriation of assets can involve various schemes: charges to expense accounts, lapping, and transaction fraud. Explain each and give an example. ANS: ‘Charges to expense accounts involve fictitious charges to such accounts as miscellaneous expense to offset theft of an asset. Because the expense account is closed to revenue at the end of the period, the period in which it could be detected is short ‘Lapping is a technique whereby an early theft is covered up by a later one, ic., with the moves “lapping” over each other. The simplest example involves taking a customer’s payment. A later payment is then credited to the first customer's account, not the second. And on it goes. This requires some control over billing to avoid tipping off the last customer. ‘Transaction fraud involves deleting, altering, or adding false transactions to divert assets to the perpetrator. For example, if an employee leaves the business and the supervisor fails to notify payroll and continues to clock the employee in and out, a fraudulent paycheck would be produced. If, in addition, the supervisor distributes the paycheck, it can be kept, and cashed. 9, Computer fraud is easiest at the data collection stage. Why? ANS: ‘Computer fraud is easiest at the data collection stage because much of what occurs after the data collection or input stage is not visible to human eyes. Once entered, the system will presume that the ‘input is legitimate and will process it as all others. 10. Explain why collusion between employees and management in the commission of a fraud is difficult to both prevent and detect. ANS:WL 13. 15, Collusion among employees in the commission ofa fraud is difficult to both prevent and detect. This is particularly true when the collusion is between managers and their subordinate employees. ‘Management plays a key role in the internal control structure of an organization. They are rel to prevent and detect fraud among their subordinates. When they participate in fraud with the employees over whom they are supposed to provide oversight, the organization’s control structure is, weakened, or completely circumvented, and the company becomes more vulnerable to losses. ‘upon Since all fraud involves some form of financial misstatement, how is Fraudulent Statement fraud different? ANS: Fraudulent statements are associated with management fraud, While all fraud involves some form of financial misstatement, to meet the definition under this class of fraud scheme, the statement itself ‘ust bring direct or indirect financial benefit to the perpetrator. In other words, the statement is not simply a vehicle for obscuring or covering a fraudulent act. For example, misstating the cash account balance to cover the theft of cash does not fall under this class of fraud scheme. On the other hand, understating liabilities to present a more favorable financial picture of the organization to drive up stock prices does qualify. Explain the problems associated with lack of auditor independence. ANS: “Auditing firms who are also engaged by their clients to perform non-accounting activities such as actuarial services, internal audit outsourcing services, and consulting lack independence. They are essentially auditing their own work. This risk is that as auditors they will not bring to management's attention detected problems that may adversely affect their consulting fees. For example, Enron’s, auditors ~ Arthur Andersen — were also their internal auditor’s and their management consultants. Explain the problems associated with lack of director independence ANS: ‘Many boards of directors are comprised of individuals who are not independent, Examples of lack of independence are directors who: have a personal relationship by serving on the boards of other directors companies, have a business trading relationship as key customers or suppliers of the company; have a financial relationship as primary stockholders or have received personal loans from the company; have an operational relationship as employees of the company. Explain the problems associated with Questionable Executive Compensation Schemes ANS: Asurvey by Thompson Financial revealed the strong belief that executives have abused stock-based compensation. The consensus is that fewer stock options should be offered than currently is the practice, Excessive use of short-term stock options to compensate directors and executives may result in short term thinking and strategies aimed at driving up stock prices at the expense of the firm's long- term health. In extreme cases, financial statement misrepresentation has been the vehicle to achieve the stock price needed to exercise the option. Explain the problems associated with inappropriate accounting practices. ANS:20. ‘The use of inappropriate accounting techniques is a characteristic common to many financial statement fraud schemes. Enron made elaborate use of Special Purpose Entities (SPE) to hide liabilities through ‘off balance sheet accounting. WorldCom management transferred transmission line costs from current ‘expense accounts to capital accounts. This allowed them to defer some operating expenses and report higher eamings. Also, they reduced the book value of hard assets of MCI by $3.4 billion and inereased ‘goodwill by the same amount. Had the assets been left at book value, they would have been charged against earnings over four years. Goodwill, on the other hand, was amortized over much longer period ‘Explain the purpose of the PCAOB. ANS: ‘The Sarbanes-Oxley Act creates a Public Company Accounting Oversight Board (PCAOB). The PCAOB is empowered to set auditing, quality control, and ethics standards, to inspect registered accounting firms, to conduct investigations, and to take disciplinary actions. ‘Why is an Independent Audit Committee important to a company? ANS: ‘The Sarbanes-Oxley Act requires all audit committee members to be independent and requires the audit committee to hire and oversee the external auditors. This provision is consistent with many ‘investors who consider the board composition to be a critical investment factor. For example, ‘Thompson Financial survey revealed that most institutional investors want corporate boards to be ‘comprised of at least 75% of independent directors ‘What are the key points of the “Issuer and Management Disclosure” of the Sarbanes-Oxley Act? ANS: 1. Public companies must report all off balance-sheet transactions 2. Annual reports filed with the SEC must include a statement by management asserting that itis responsible for creating and maintaining adequate intemal controls and asserting to the effectiveness of those controls. 3. Officers must certify that the company’s accounts ‘fairly present’ the firms financial condition and results of operations. Knowingly filing a false certification is a criminal offence In this age of high technology and computer based information systems, why are accountants concerned about physical (human) controls? ANS: “This class of controls relates primarily to the human activities employed in accounting systems. These activities may be purely manual, such as the physical custody of assets, or they may involve the use of ‘computers to record transactions or update accounts. Physical controls do not relate to the computer logic that actually performs these accounting tasks. This is the subject matter of chapter 16. Rather, they relate to the human activities that initiate such computer logic. In other words, physical controls ddo not suggest an environment in which clerks update paper accounts with pen and ink. Virtually all systems, regardless of their sophistication, employ human activities that need to be controlled, ‘How has the Sarbanes-Oxley Act had a significant impact on corporate governance? ANS: ‘The Sarbanes-Oxley Act requires all audit committee members to be independent and requires the audit committee to hire and oversee the external auditors. This provision is consistent with many investors who- consider the board composition to be a critical investment factor. For example, a “Thomson Financial survey revealed that most institutional investors want corporate boards to be ‘comprised of at least 75 percent independent directors.2 22, Discuss the non accounting services that external auditors are no longer permitted to render to audit clients under SOX legislation. ANS: “The Act addresses auditor independence by creating more separation between a firm’s attestation and nnon-auditing activities. This is intended to specify categories of services that a public accounting firm ‘cannot perform for its client. These include the following nine functions: ‘+ Bookkeeping or other services related to the accounting records or financial statements; ‘* Financial information systems design and implementation; ‘* Appraisal or valuation services, fairness opinions, or contributior '* Actuarial services; ‘+ Iniernal audit outsourcing services; ‘+ Management functions or human resources; '* Broker ordealer, investment adviser, or investment banking services; ‘+ Legal services and expert services unrelated to the audit; and '* Any other service that the PCAOB determines is impermissible. ‘While the Sarbanes-Oxley Act prohibits auditors from providing the above services to their audit clients, they are not prohibited from performing such services for non-audit clients or privately held ‘companies. kind reports; ‘What are the key points of the “Issuer and Management Disclosure” of the Sarbanes-Oxley Act? ANS: ‘The Sarbanes-Oxley Act imposes new corporate disclosure requirements including: Public companies must report all off-balance-sheet transactions. Annual reports filed with the SEC must include a statement by management asserting that itis, responsible for creating and maintaining adequate internal controls and asserting to the effectiveness of those controls. ‘Officers must certify that the company’s accounts “fairly present” the firm's financial condition and results of operations. Knowingly filing a false certification is a criminal offence.
You might also like
Chapter 4: The Revenue Cycle
PDF
100% (1)
Chapter 4: The Revenue Cycle
4 pages
IT Audit CH 12
PDF
No ratings yet
IT Audit CH 12
13 pages
50 CISA Questions by Anonymous
PDF
100% (1)
50 CISA Questions by Anonymous
11 pages
Nature of Internal Control: Multiple Choice Questions
PDF
67% (3)
Nature of Internal Control: Multiple Choice Questions
11 pages
Asean CG Conference Code of Corporate Governance For Plcs
PDF
No ratings yet
Asean CG Conference Code of Corporate Governance For Plcs
29 pages
Implications of Ethical Traditions For Business: Lesson 7
PDF
100% (2)
Implications of Ethical Traditions For Business: Lesson 7
9 pages
Chapter-3-6 Testbank Ais
PDF
No ratings yet
Chapter-3-6 Testbank Ais
33 pages
Hall 5e TB Ch03
PDF
94% (18)
Hall 5e TB Ch03
17 pages
Als Chapter 3 & 4 Reviewer 4
PDF
No ratings yet
Als Chapter 3 & 4 Reviewer 4
23 pages
CH 03
PDF
100% (2)
CH 03
24 pages
Ais Exam PDF Free
PDF
No ratings yet
Ais Exam PDF Free
15 pages
AIS Exam
PDF
100% (1)
AIS Exam
15 pages
CHAPTER 3 and 4 AIS reviewer
PDF
No ratings yet
CHAPTER 3 and 4 AIS reviewer
8 pages
AIS Chapter 3
PDF
No ratings yet
AIS Chapter 3
15 pages
Quiz - AIS
PDF
No ratings yet
Quiz - AIS
2 pages
Chapter 3-Ethics, Fraud, and Internal Control: True/False
PDF
100% (1)
Chapter 3-Ethics, Fraud, and Internal Control: True/False
22 pages
IT Audit CH 12
PDF
100% (1)
IT Audit CH 12
16 pages
Chap 12
PDF
No ratings yet
Chap 12
8 pages
Chapter 12-Business Ethics, Fraud, and Chapter 12-Business Ethics, Fraud, and Fraud Detection Fraud Detection
PDF
No ratings yet
Chapter 12-Business Ethics, Fraud, and Chapter 12-Business Ethics, Fraud, and Fraud Detection Fraud Detection
7 pages
Unof Cis Chapter1 Test Prelim
PDF
No ratings yet
Unof Cis Chapter1 Test Prelim
6 pages
Ais ch3 MC
PDF
No ratings yet
Ais ch3 MC
18 pages
Auditing-CIS-C1-C12
PDF
No ratings yet
Auditing-CIS-C1-C12
116 pages
ch.3 Revision AIS
PDF
No ratings yet
ch.3 Revision AIS
8 pages
Finals Source
PDF
No ratings yet
Finals Source
51 pages
IT Audit CH 1
PDF
100% (4)
IT Audit CH 1
8 pages
AIS Module 3 Kahoot PDF
PDF
No ratings yet
AIS Module 3 Kahoot PDF
7 pages
Chapter 1 Test Bank Aud Internal Control
PDF
No ratings yet
Chapter 1 Test Bank Aud Internal Control
8 pages
Chap3 Ethics, Fraud, InternalControl
PDF
No ratings yet
Chap3 Ethics, Fraud, InternalControl
15 pages
Bsac 117 Computer Audit: Term 1 SY 2020-2021 Midterm Examination
PDF
No ratings yet
Bsac 117 Computer Audit: Term 1 SY 2020-2021 Midterm Examination
11 pages
Cis Recitpart2
PDF
No ratings yet
Cis Recitpart2
19 pages
Cis Finals
PDF
No ratings yet
Cis Finals
19 pages
Acise - Chapter 1 2 11 12 Test Bank
PDF
No ratings yet
Acise - Chapter 1 2 11 12 Test Bank
16 pages
Test Bank With Answers of Accounting Information System by Turner Chapter 03
PDF
100% (7)
Test Bank With Answers of Accounting Information System by Turner Chapter 03
25 pages
Quiz 2 - Ethics, Fraud and Internal Control - For Printing
PDF
No ratings yet
Quiz 2 - Ethics, Fraud and Internal Control - For Printing
2 pages
Sub: Project Management Class: Accounting 3rd Year B Mogadishu University Title: Questions and Answers and MCQ
PDF
No ratings yet
Sub: Project Management Class: Accounting 3rd Year B Mogadishu University Title: Questions and Answers and MCQ
9 pages
Chapter 3-Ethics, Fraud, and Internal Control
PDF
No ratings yet
Chapter 3-Ethics, Fraud, and Internal Control
3 pages
SM Chapter 03
PDF
No ratings yet
SM Chapter 03
26 pages
docx
PDF
No ratings yet
docx
2 pages
Group 3 Questionnaire
PDF
No ratings yet
Group 3 Questionnaire
4 pages
AIS Exam Prefinal
PDF
No ratings yet
AIS Exam Prefinal
22 pages
CIS_Quiz-2
PDF
No ratings yet
CIS_Quiz-2
3 pages
50 CISA Questions by Anonymous
PDF
0% (1)
50 CISA Questions by Anonymous
11 pages
AE 20 Midterm Exam
PDF
No ratings yet
AE 20 Midterm Exam
4 pages
Audcis Prelims
PDF
No ratings yet
Audcis Prelims
8 pages
Chương 1,2: True/False Answer
PDF
No ratings yet
Chương 1,2: True/False Answer
49 pages
Exercise 4
PDF
No ratings yet
Exercise 4
5 pages
Acis Reviewer
PDF
No ratings yet
Acis Reviewer
12 pages
AIS-QUIZ-No.-2
PDF
No ratings yet
AIS-QUIZ-No.-2
1 page
PRE FINAL QUIZ 1 - Accounting Information System
PDF
No ratings yet
PRE FINAL QUIZ 1 - Accounting Information System
6 pages
Distinguish Between Ethical Issues and Legal Issues
PDF
No ratings yet
Distinguish Between Ethical Issues and Legal Issues
4 pages
Accounting Information Systems (AIS) Overview
PDF
No ratings yet
Accounting Information Systems (AIS) Overview
31 pages
Dwight Kavanagh: Info Profile
PDF
No ratings yet
Dwight Kavanagh: Info Profile
2 pages
Lesson 11: Stakeholder Theory: A Comprehensive Approach To Corporate Social Responsibility
PDF
No ratings yet
Lesson 11: Stakeholder Theory: A Comprehensive Approach To Corporate Social Responsibility
8 pages
V.N Wango Thesis Final
PDF
No ratings yet
V.N Wango Thesis Final
109 pages
2021 National Budget: Top 10 Departments
PDF
No ratings yet
2021 National Budget: Top 10 Departments
2 pages
Enterprise Resource Planning System: IT Auditing, Hall, 4e
PDF
No ratings yet
Enterprise Resource Planning System: IT Auditing, Hall, 4e
28 pages
Effect of Biological Asset Intensity Company Size
PDF
No ratings yet
Effect of Biological Asset Intensity Company Size
27 pages
Lesson 6: Major Ethical Philosophers
PDF
No ratings yet
Lesson 6: Major Ethical Philosophers
25 pages
The Corporate Social Responsibility: Lesson 9
PDF
No ratings yet
The Corporate Social Responsibility: Lesson 9
9 pages
HBM 122 Lesson 4 Code of Ethics and Business Conduct
PDF
100% (2)
HBM 122 Lesson 4 Code of Ethics and Business Conduct
18 pages
AIS Chap 5 Notes
PDF
No ratings yet
AIS Chap 5 Notes
3 pages
HBM 122 Lesson 4 Code of Ethics and Business Conduct
PDF
100% (2)
HBM 122 Lesson 4 Code of Ethics and Business Conduct
18 pages
AIS Chap 7 Notes
PDF
No ratings yet
AIS Chap 7 Notes
5 pages
AIS Chap 2 Notes
PDF
No ratings yet
AIS Chap 2 Notes
6 pages
Notes On Q Analysis
PDF
No ratings yet
Notes On Q Analysis
1 page
AIS Chap 6 Notes
PDF
No ratings yet
AIS Chap 6 Notes
6 pages
Internal Flows of Information
PDF
No ratings yet
Internal Flows of Information
3 pages
AIS Chap 8 Notes
PDF
No ratings yet
AIS Chap 8 Notes
7 pages
AIS Chap 9 Notes
PDF
No ratings yet
AIS Chap 9 Notes
7 pages