Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Smart Trading Incorporated (STI), is a subsidiary of Compton Falls Enterprises. STI is a securities trading firm specializing in debt and equity securities transactions mostly

Smart Trading Incorporated (STI), is a subsidiary of Compton Falls Enterprises. STI is a securities trading firm specializing in debt and equity securities transactions mostly traded on the NASDAQ. Based on your conversation with management, you discovered the following:

1. The petty cash custodian confesses to having borrowed $9,010 over the last two years. The custodian promises to repay every penny, with interest, as soon as possible.

2. An employee in accounts payable maintains the accounts payable subsidiary ledger.

3. In May of 2016, STI was notified that their proprietary information would be broadcast on the Internet if they did not pay a $17 million fee. The hacker was caught by the FBI before any damage was done.

4. In November of 2015, STI customers were notified by e-mail that their accounts had been compromised and were being restricted unless they re-registered using an accompanying hyperlink to a Web page that had STIs logo, home page design, and internal links. The form had a place for them to enter their credit card data, ATM PINs, Social Security number, date of birth, and their mothers maiden name.

5. When entering a large credit sale, the clerk typed in the customer's account number as 45982 instead of 45892. That account number did not exist. The mistake was not caught until later in the week when the weekly billing process was run. Consequently, the customer was not billed for another week, delaying receipt of payment.

6. A batch of 73 time sheets was sent to the payroll department for weekly processing. Somehow, one of the time sheets did not get processed. The mistake was not caught until payday, when one employee complained about not receiving a paycheck.

7. To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the companys system by dialing into that modem. Again, due to the diligent efforts of Tommy Lew, sensitive customer information was not compromised, according to internal sources.

Requirements: Review the seven items listed and decide whether they represent an internal control strength or weakness. Document any assumptions to support your conclusions. 1. For each internal control weakness identified, explain why it is a weakness and recommend a way or ways to correct the weakness.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Financial Accounting A Practical Introduction

Authors: Ilias Basioudis

1st Edition

0273714295, 978-0273714293

More Books

Students also viewed these Accounting questions