Security in the Purchasing Function

Slides:



Advertisements
Similar presentations
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Advertisements

Chapter 12 The Revenue Cycle: Sales to Cash Collections Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 12-1.
The Expenditure Cycle: Purchasing to Cash Disbursements
© 2006 Prentice Hall Business Publishing Accounting Information Systems, 10/e Romney/Steinbart1 of 43 The data processing cycle consists of four steps:
The Expenditure Cycle: Purchasing to Cash Disbursements
Chapter 6 Audit of Cash Accounting 4081Chapter 6.
Consumer Issues Chapter 28.
Theft, Disturbances, and Suspicious People.  A guest who take towels or bathrobes  An employee who takes home anything, from paper to food supplies.
© 2014 Cengage Learning. All Rights Reserved. Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO4 Describe accounting procedures used.
The Islamic University of Gaza
Journal Question ► Why do companies have rules and processes to follow when dealing with cash?
The Expenditure Cycle: Purchasing to Cash Disbursements
Chapter 12 The Revenue Cycle: Sales to Cash Collections Copyright © 2012 Pearson Education 12-1.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Objectives of Internal Controls Protect the firm’s assets Ensure reliability of accounting records Promote operating efficiency Ensure adherence with management’s.
Copyright © 2007 Prentice-Hall. All rights reserved 1 Internal Control & Cash Chapter 8.
© 2011 John Wiley and Sons, Inc. All Rights Reserved Selection and Procurement for the Hospitality Industry Purchasing ANDREW HALE FEINSTEIN AND JOHN M.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Objectives 4 Understand the ISO standards. Why are standards required? 4 Need standards to ensure that a term means the same for all 4 Need company standards.
Security Issues with Vendors, Employees, and Customers Chapter 10.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Fraud, Internal Control, and Cash
Acct 316 Acct 316 Acct 316 The Expenditure Cycle: Purchasing and Cash Disbursements 12 UAA – ACCT 316 – Fall 2002 Accounting Information Systems Dr. Fred.
Chapter 7 Internal Control and Cash
Food and Beverage Management
Chapter 8 Purchasing and Recieving Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives Describe the role.
1 Chapter 6 Merchandising Operations and Internal Control Adapted from Financial Accounting 4e by Porter and Norton.
+ Accounting for Cash & Internal Controls Chapter 6.
Chapter 14 Beverage Receiving, Storing, and Issuing Control
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
CA$H and Internal Controls. Internal Control consists of... all the related methods and measures adopted within a business to: –safeguard its assets Employee.
Chapter 10 THE ACQUISITION CYCLE— PURCHASE INVOICES AND PAYMENTS.
Chapter 6 Enhancing Security Through Procedural Controls.
Chapter 6 Audit of Cash Accounting 4081Chapter 6.
Business Security Marketing II Unit II. I. Why Businesses Need Security Protect Buildings EquipmentFixturesRecordsGoods Protect against theft of money.
ACCOUNTING INFORMATION SYSTEMS BASIC CONCEPTS & CURRENT ISSUES Chapter 9 Acquisition / payment process McGraw-Hill/Irwin Accounting Information Systems.
Copyright © 2016 by McGraw-Hill Education Chapter 5 Fraud, Internal Control, and Cash PowerPoint Author: Brandy Mackintosh, CA.
Unit 6 – Chapter 5.  Describe the Sarbanes-Oxley Act of 2002 and its impact on internal controls and financial reporting.
CHAPTER 11 COMPUTERISED ACCOUNTING SYSTEMS. OBJECTIVE TEST 1.What assets make up the cash and cash equivalents line item on the SFP? 2.What statement.
Resource Business Processes
Chapter 6 Audit of Cash Accounting 408 Chapter 6.
Accounts Receivable, Accounts Payable & Cash
Acquisition / payment process
Multi Channel Sales Order Management: Store
Larry Brownfield, CPO, OHE – KOA, Inc.
SCM Customer Service Operations LB 3
Field Inventory Services-Sanofi Inventory and Audit Training
Chapter 8 Acquisition and Expenditure Cycle
McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 7 Cash Accounting, 21st Edition Warren Reeve Fess
The Revenue Cycle: Sales to Cash Collections
Chapter 7 Part 1 Internal Control
Part I: Purchases and Cash Disbursements Procedures
The Accounting Division
Typical Receiving Procedures
Purchases and disbursements
© 2014 Cengage Learning. All Rights Reserved.
Ch. 15: Accounting for Purchases and Cash Payments
Credit Cards and Online Shopping
© 2014 Cengage Learning. All Rights Reserved.
Chapter 10: Auditing the Expenditure Cycle
© 2014 Cengage Learning. All Rights Reserved.
Protecting Your Identity
Chapter 14 Beverage Receiving, Storing, and Issuing Control
© 2014 Cengage Learning. All Rights Reserved.
Protecting Your Credit Identity
LESSON 9-2 Accounting for Merchandise Purchases
© 2014 Cengage Learning. All Rights Reserved.
Part 1 Security Action Plan Template.
Presentation transcript:

Security in the Purchasing Function 16 Security in the Purchasing Function

You Should Be Able To: Discuss current employee theft statistics. Describe the security problems associated with the purchasing function. Identify methods used to prevent security problems related to purchasing. Create a process to reduce theft and pilferage in a hospitality operation.

Security Problems Kickbacks Invoice scams Supplier and receiver error Inventory theft Inventory padding Inventory substitutions Telephone sales scams

Security Problems (cont.) E-Mail sales scams Operating activities Suspicious behavior

Watch Employees Who: Seem unduly friendly with salespeople Hang around storage areas Needlessly handle keys or locks Make too many trips to garbage areas, bathrooms, locker room, or parking lot

Watch Employees Who (cont.): Requisition abnormally large amounts of supplies Make frequent trips to the storage areas for no real reason Have relatives working for the suppliers Frequently stray from assigned workstations

Watch Employees Who (cont.): Are seen stuffing boxes or packages under a couch Are seen passing packages to guests Permit drivers to loiter in unauthorized areas Have visitors on the work site

Preventing Security Breaches Select honest suppliers Ask other operators about suppliers’ honesty Employee honest employees Prosecute dishonest employees Background/reference checks, integrity tests Design physical facilities to help ensure security

Preventing Security Problems Document cash paid-outs No post office box payments Those who buy should never pay bills Cancel paperwork on all completed transactions Independent audit

Preventing Security Problems (cont.) Secret shoppers Integrity and drug tests Bonding company Trash compactor Enter/Leave through one door Parking Locker rooms Delivery agent concerns

Preventing Security Problems (cont.) Do not rush receivers Physical barriers Time and heavy-duty locks Good lighting in storage areas Closed-circuit television or digital recorders Uniformed guards See-through screens on storage facilities Perimeter and interior alarm systems

Preventing Security Problems (cont.) Separate purchasing activities Compare prices Approved supplier lists Small single-service packages Restrict access to certain items