资源简介 (共18张PPT)Chapter 12The Revenue Cycle: Sales to Cash Collections12-Learning ObjectivesDescribe the basic business activities and related information processing operations performed in the revenue cycle.Discuss the key decisions that need to be made in the revenue cycle, and identify the information needed to make those decisions.Identify major threats in the revenue cycle, and evaluate the adequacy of various control procedures for dealing with those threats.12-The Revenue Cycle12-The Revenue CycleProvides goods and services to customersCollects cash in payment for those salesPrimary Objective:Provide the right productIn the right placeAt the right time for the right price12-Revenue Cycle ActivitiesSales order entryShippingBillingCash collectionsCopyright 2012 Pearson Education12-General Revenue Cycle ThreatsInaccurate or invalid master dataUnauthorized disclosure of sensitive informationLoss or destruction of master dataPoor performance12-General Revenue Cycle ControlsData processing integrity controlsRestriction of access to master dataReview of all changes to master dataAccess controlsEncryptionBackup and disaster recovery proceduresManagerial reports12-Sales Order EntryTake orderCheck and approve creditCheck inventory availability12-Sales Order ThreatsIncomplete/inaccurate ordersInvalid ordersUncollectible accountsStockouts or excess inventoryLoss of customersCopyright 2012 Pearson Education12-Sales Order Entry ControlsData entry edit controls (see Chapter 10)Restriction of access to master dataDigital signatures or written signaturesCredit limitsSpecific authorization to approve sales to new customers or sales that exceed a customer’s credit limitAging of accounts receivablePerpetual inventory control systemUse of bar-codes or RFIDTrainingPeriodic physical counts of inventorySales forecasts and activity reportsCRM systems, self-help Web sites, and proper evaluation of customer service ratings12-ShippingPicking and packing the orderShipping the order12-Shipping ThreatsPicking the wrong items or the wrong quantityTheft of inventoryShipping errors (delay or failure to ship, wrong quantities, wrong items, wrong addresses, duplication)12-Shipping ControlsBar-code and RFID technologyReconciliation of picking lists to sales order detailsRestriction of physical access to inventoryDocumentation of all inventory transfersRFID and bar-code technologyPeriodic physical counts of inventory and reconciliation to recorded quantitiesReconciliation of shipping documents with sales orders, picking lists, and packing slipsUse RFID systems to identify delaysData entry via bar-code scanners and RFIDData entry edit controls (if shipping data entered on terminals)Configuration of ERP system to prevent duplicate shipments12-BillingInvoicingUpdating accounts receivable12-Billing ThreatsFailure to billBilling errorsPosting errors in accounts receivableInaccurate or invalid credit memos12-Billing ControlsSeparation of billing and shipping functionsPeriodic reconciliation of invoices with sales orders, picking tickets, and shipping documentsConfiguration of system to automatically enter pricing dataRestriction of access to pricing master dataData entry edit controlsReconciliation of shipping documents (picking tickets, bills of lading, and packing list) to sales ordersData entry controlsReconciliation of batch totalsMailing of monthly statements to customersReconciliation of subsidiary accounts to general ledgerSegregation of duties of credit memo authorization from both sales order entry and customer account maintenanceConfiguration of system to block credit memos unless there is either corresponding documentation of return of damaged goods or specific authorization by management12-Cash Collections ThreatsTheft of cashCash flow problems12-Cash Collection ControlsSeparation of cash handling function from accounts receivable and credit functionsRegular reconciliation of bank account with recorded amounts by someone independent of cash collections proceduresUse of EFT, FEDI, and lockboxes to minimize handling of customer payments by employeesPrompt, restrictive endorsement of all customer checksHaving two people open all mail likely to contain customer paymentsUse of cash registersDaily deposit of all cash receiptsLockbox arrangements, EFT, or credit cardsDiscountsfor prompt paymentby customersCashflow budgets12- 展开更多...... 收起↑ 资源预览