The Human Resources / Payroll Cycle. CONTROL: OBJECTIVES, THREATS, AND PROCEDURES In the HRM/payroll cycle (or any cycle), a well-designed AIS should.

Slides:



Advertisements
Similar presentations
The Human Resources Management and Payroll Cycle
Advertisements

© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 87 C HAPTER 13 The Human Resources Management and Payroll.
Accounting Information Systems 9th Edition
Appendix D 1. Appendix D 2 Payroll Accounting Financial Accounting, Seventh Edition Appendix D.
Financial Accounting, Sixth Edition
Appendix on Payroll Accounting
The Human Resources Management and Payroll Cycle
The Human Resources Management and Payroll Cycle
The Islamic University of Gaza
Accounting Information Systems, 5th edition James A. Hall
Accounting Information Systems 9th Edition
Chapter 12 Auditing the Human Resource Management Process McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
HR / Payroll Cycle ATG Spring Overview Operation of Payroll System Risks and Controls for Payroll System Accounting for Human Resources.
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 32 C HAPTER 13 The Human Resources Management / Payroll.
The Human Resources Management and Payroll Cycle
AUDITING CHAPTER 14 Control & Substantive Tests in Personnel & Payroll
BA 427 – Assurance and Attestation Services Lecture 5 Internal Controls: Purchases, Inventory and Payroll.
Copyright  2003 Pearson Education Canada Inc. CHAPTER 15 Audit of the Payroll and Personnel Cycle.
Chapter 6 The Expenditure Cycle Part II: Payroll Processing and
Chapter 6 The Expenditure Cycle Part II: Payroll Processing
Auditing the Purchasing Process
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 12-1 Chapter Twelve Auditing the Human Resource Management Process.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
F- 1. F- 2 F PAYROLL ACCOUNTING Accounting, Fifth Edition.
Auditing the Payroll Cycle. Transactions Personnel services or payroll cycle involves the activities that pertain to executive and employee compensation.
CHAPTER 16 Audit of the Payroll and Personnel Cycle
Auditing Purchases, Trade Payables and Payroll
Payroll Computations, Records, and Payment
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 122 C HAPTER 12 The Production Cycle.
Production, HR and GL Cycles
©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Audit of the Payroll and Personnel Cycle Chapter 21.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
APA – Fundamentals of Payroll Chapter 2 – Payroll Systems March 10, 2012.
HFT 2401 Chapter 12 Current Liabilities and Payroll.
Chapter 6 Payroll Schemes.
Chapter 15 The Human Resources Management and Payroll Cycle 15-1.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing the Human Resource Management Process Chapter Twelve.
Payroll Processing and Fixed Asset Procedures
7-1 FRAUD, INTERNAL CONTROL, AND CASH 7 Remember… people will lie, cheat and steal! Not everybody…. and not all the time.… but they do….
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 87 C HAPTER 13 The Human Resources Management and Payroll.
Human Resources Cycle ACC 444 – Enterprise Process Analysis 1 INTRODUCTION  The most important tasks performed in the HRM/payroll cycle are: Recruiting.
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 87 C HAPTER 13 The Human Resources Management / Payroll.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 12 Auditing the Human Resource Management Process Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Chapter 12 Auditing the Human Resource Management Process McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 87 C HAPTER 13 The Human Resources Management/Payroll.
Stock, Payroll & Non –current assets
Lecture 7 THE PAYROLL/HRM CYCLE, PROCESS MAPPING & CHANGE MANAGEMENT.
Accounts Receivable, Accounts Payable & Cash
The Human Resources Management / Payroll Cycle
Audit Payroll and Personnel Cycle
The Human Resources Management and Payroll Cycle
The Human Resources / Payroll Cycle
Audit of the Payroll and Personnel Cycle
Chapter 6 The Expenditure Cycle Part II: Payroll Processing and
Internal Control and Cash
Audit of the Payroll and Personnel Cycle
Dr. BALAMURUGAN MUTHURAMAN
The Revenue Cycle: Sales to Cash Collections
Financial Accounting, Sixth Edition
The Human Resources Management and Payroll Cycle
Financial Accounting, Fifth Edition
The payroll cycle Learning objectives
Payroll and Production
The Human Resources Management / Payroll Cycle
©2003 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, Romney/Steinbart 14-1 Accounting Information Systems 9 th Edition Marshall.
Audit of the Payroll and Personnel Cycle
Chapter 14: The Human Resources (HR) Management and Payroll Processes
TESTING THE PAYROLL SYSTEM
Audit of the Payroll and Personnel Cycle
Presentation transcript:

The Human Resources / Payroll Cycle

CONTROL: OBJECTIVES, THREATS, AND PROCEDURES In the HRM/payroll cycle (or any cycle), a well-designed AIS should provide adequate controls to ensure that the following objectives are met: C--The company is in compliance with all applicable laws and regulations A--All transactions are properly authorized D--All disclosures are full and fair A--All transactions are recorded accurately V--All recorded transactions are valid E--Business activities are performed efficiently and effectively R--All valid and authorized transactions are recorded S--Assets are safeguarded from loss or theft

THREATS IN EMPLOYMENT PRACTICES Objective: Effectively hire, retain, and dismiss employees. The major threats in the employment practices area are: THREAT 1: Hiring Unqualified or Larcenous Employees THREAT 1: Hiring Unqualified or Larcenous Employees THREAT 2: Violation of Employment Law

THREATS IN EMPLOYMENT PRACTICES THREAT 1: HIRING UNQUALIFIED OR LARCENOUS EMPLOYEES Why is this a problem? Can increase production expenses Can result in theft of assets Can result in civil and criminal penalties for the company (e.g., if an employee attempts to make a bribe) Controls: State skill qualifications for each position explicitly in the position description Ask candidates to sign a statement confirming the accuracy of the information on their application

THREATS IN EMPLOYMENT PRACTICES Recent honesty surveys indicate that 30% of Americans are dishonest, 30% are situationally honest, and 40% are honest. Therefore, ask candidates to consent to a thorough background check of their credentials, employment history, and credit:  You cannot conduct these checks without a written consent  Discard candidates who refuse to consent

THREATS IN EMPLOYMENT PRACTICES  Conduct the background checks and verify skills and references, including college degrees earned:  Data indicate that 50% of resumes contain false or embellished information.  Check at least three references, and regard it as a negative signal if at least one is not gratuitously positive. Return to Threat Menu Return to Threat Menu Go To Next Threat Go To Next Threat

THREATS IN EMPLOYMENT PRACTICES THREAT 2: VIOLATION OF EMPLOYMENT LAW Why is this a problem? Can result in stiff government penalties as well as civil suits Seven dirty words you can’t use in recruitment:  Gender  Marital  Kids  Physique  Record  Discharge  Age Return to Threat Menu Return to Threat Menu Go To Next Threat Go To Next Threat

THREATS IN EMPLOYMENT PRACTICES THREAT 2: VIOLATION OF EMPLOYMENT LAW Why is this a problem? Can result in stiff government penalties as well as civil suits Seven dirty words you can’t use in recruitment: Comprehensive List: questions / questions / Return to Threat Menu Return to Threat Menu Go To Next Threat Go To Next Threat

THREATS IN EMPLOYMENT PRACTICES THREAT 2: VIOLATION OF EMPLOYMENT LAW Controls: Carefully document all actions relating to advertising, recruiting, hiring new employees, and dismissal of employees, to demonstrate compliance Provide employees with continual training to keep them current with employment law Return to Threat Menu Return to Threat Menu Go To Next Threat Go To Next Threat

THREATS IN PAYROLL PROCESSING Objective: Efficiently and effectively compensate employees for services provided. The major threats in the employment practices area are: THREAT 3: Unauthorized Changes to the Payroll Master File THREAT 3: Unauthorized Changes to the Payroll Master File THREAT 4: Inaccurate Time Data THREAT 5: Inaccurate Processing of Payroll THREAT 6: Theft or Fraudulent Distribution of Paychecks THREAT 6: Theft or Fraudulent Distribution of Paychecks

THREATS IN PAYROLL PROCESSING THREAT 3: UNAUTHORIZED CHANGES TO THE PAYROLL MASTER FILE Why is this a problem? Can increase expenses if wages, salaries, commissions, or base rates are falsified Can result in inaccurate reporting and erroneous decisions

THREATS IN PAYROLL PROCESSING Controls: Proper segregation of duties:  Only HRM department should be able to update payroll master file.  HRM employees should not directly participate in payroll processing or distribution.  Prevents the creation of ghost employees and fraudulent checks.  Changes to the payroll master file should be reviewed and approved by someone other than the person recommending the change.  Department supervisors should receive copies of these documents for review.

THREATS IN PAYROLL PROCESSING Restrict logical and physical access to the payroll system:  Utilize user IDs, passwords, and an access control matrix.  Control terminals from which payroll data and programs can be accessed. Return to Threat Menu Return to Threat Menu Go To Next Threat Go To Next Threat

THREATS IN PAYROLL PROCESSING THREAT 4: INACCURATE TIME DATA Why is this a problem? Can result in payments for services not rendered Inaccurate or missing checks can damage employee morale Can result in inaccurate labor reporting

THREATS IN PAYROLL PROCESSING Controls: Automation can reduce unintentional inaccuracies with:  Badge readers  Bar code scanners  Online terminals Data entry programs should include edit checks:  Field checks for employee number and hours worked  Limit checks on hours worked  Validity checks on employee numbers

THREATS IN PAYROLL PROCESSING Segregation of duties can reduce intentional inaccuracies:  People who process payroll should not have access to payroll master file.  Supervisors should approve all changes. Time clock data should be reconciled to job time tickets by an independent party. Supervisors should approve all time cards and job time tickets. Return to Threat Menu Return to Threat Menu Go To Next Threat Go To Next Threat

THREATS IN PAYROLL PROCESSING THREAT 5: INACCURATE PROCESSING OF PAYROLL Why is this a problem? Errors damage employee morale, especially if they cause late paychecks. Penalties can accrue if:  Proper payroll taxes are not remitted to the government  Court-ordered paycheck garnishments are not made appropriately

THREATS IN PAYROLL PROCESSING Controls: Batch totals:  Run and reconcile batch totals before and after processing and at the end of each stage, including hash totals of employee numbers Cross-footing of payroll register  Make sure that sum of rows equals sum of columns, i.e., total of net pay column should equal total of gross pay minus deduction totals.

THREATS IN PAYROLL PROCESSING Payroll clearing account A general ledger account used in a two-step process  First step:  Payroll control account is debited for amount of gross pay  Cash is credited for net pay  Various liabilities are credited for withholdings  Second step  Cost accounting process distributes labor costs to various expense categories and credits payroll control account for sum of the allocations. Result should be a zero balance in the control account.

THREATS IN PAYROLL PROCESSING Review decisions to hire temporary or outside help to make sure workers are properly classified as employees or independent contractors. Improper classification can result in significant back taxes, interest, and penalties. Return to Threat Menu Return to Threat Menu Go To Next Threat Go To Next Threat

THREATS IN PAYROLL PROCESSING THREAT 6: THEFT OR FRAUDULENT DISTRIBUTION OF PAYCHECKS Why is this a problem? Payments may be made to fictitious (ghost) or terminated employees, resulting in:  Increased expenses  Loss of cash Controls: Restrict access to blank payroll checks and check signing machine. All checks should be sequentially prenumbered and accounted for periodically.

THREATS IN PAYROLL PROCESSING  Cashier should sign all checks, but only when supported by proper documentation.  An imprest payroll bank account should be used.  Someone independent of the payroll process should reconcile the payroll bank account.  Segregate duties between those who authorize and record payroll and those who distribute checks and transfer funds.  Have internal audit observe payroll distribution on a surprise basis.  Unclaimed checks should be returned to the treasurer’s office for prompt re-deposit and should be investigated. Return to Threat Menu Return to Threat Menu Go To Next Threat Go To Next Threat

KEY DECISIONS AND INFORMATION NEEDS The payroll system should be integrated with cost data and HR information so management can make decisions with respect to the following types of issues: Future work force staffing needs Employee performance Employee morale Payroll processing efficiency and effectiveness

KEY DECISIONS AND INFORMATION NEEDS Benefits of an integrated HRM/payroll model: Access to current, accurate information about employee skills and knowledge. HRM activities can be performed more efficiently and costs reduced. EXAMPLE: Employment application terminals in Wal-Mart. Recruiting costs can be reduced, when applicant data is electronically accessible.