Presentation on theme: "15-1 Anup Kumar Saha General Ledger and Reporting System."— Presentation transcript:
15-1 Anup Kumar Saha General Ledger and Reporting System
15-2Anup Kumar Saha Learning Objectives 1. Describe the information processing operations required to update the general ledger and to produce other reports for internal and external users. 2. Identify the major threats in general ledger and reporting activities, and evaluate the adequacy of various internal control procedures for dealing with them. 3. Read and explain an integrated enterprise- wide REA data model.
15-3Anup Kumar Saha Learning Objectives 4. Discuss and design a balanced scorecard for an organization. 5. Explain the relationship between online transaction processing systems and data warehouses used to support business intelligence. 6. Understand the implications of new IT developments, such as XBRL, for internal and external reporting.
15-4Anup Kumar Saha Introduction Linda Spurgeon, AOE’s president & CEO, is not satisfied with the financial reporting capabilities of AOE’s new ERP system. She has three primary goals: 1. To develop a Balanced Scorecard in a timely manner. 2. To speed up trend analysis data on the company’s financial performance. 3. To lower costs associated with providing financial information to interested external parties on a timely basis.
15-5Anup Kumar Saha Introduction This chapter discusses the information processing operations involved in updating the general ledger and preparing reports that summarize the results of an organization’s activities.
15-6Anup Kumar Saha Learning Objective 1 Describe the information processing operations required to update the general ledger and to produce other reports for internal and external users.
15-7Anup Kumar Saha General Ledger and Reporting Activities What are the four basic activities performed in the general ledger and reporting system? 1. Update the general ledger 2. Post adjusting entries 3. Prepare financial statements 4. Produce managerial reports
15-8Anup Kumar Saha Update The General Ledger (Activity 1) The first activity in the general ledger system is to update the general ledger. Updating consists of posting journal entries that originated from two sources: 1. Accounting subsystems 2. The treasurer
15-9Anup Kumar Saha Update The General Ledger (Activity 1) Accounting subsystems Treasurer Journal voucher General ledger Update the general ledger Journal entry
15-10Anup Kumar Saha Post Adjusting Entries (Activity 2) The second activity in the general ledger system involves posting various adjusting entries. Adjusting entries originate from the controller’s office, after the initial trial balance has been prepared.
15-11Anup Kumar Saha Post Adjusting Entries (Activity 2) What are the five basic categories of adjusting entries? 1. Accruals (wages payable) 2. Deferrals (rent, interest, insurance) 3. Estimates (depreciation) 4. Revaluation (change in inventory method) 5. Corrections
15-12Anup Kumar Saha Post Adjusting Entries (Activity 2) Controller Journal voucher Post adjusting entries Prepare financial statements Adjusting entries Financial statements Adjusted trial balance
15-13Anup Kumar Saha Prepare Financial Statements (Activity 3) The third activity in the general ledger and reporting system involves the preparation of financial statements. The income statement is prepared first. The balance sheet is prepared next. The cash flows statement is prepared last.
15-14Anup Kumar Saha Produce Managerial Reports (Activity 4) The final activity in the general ledger and reporting system involves the production of various managerial reports. What are the two main categories of managerial reports? 1. General ledger control reports 2. Budgets
15-15Anup Kumar Saha Produce Managerial Reports (Activity 4) What are examples of control reports? – lists of journal vouchers by numerical sequence, account number, or date – listing of general ledger account balances What are examples of budgets? – operating budget – capital expenditures budget
15-16Anup Kumar Saha Produce Managerial Reports (Activity 4) Budgets and performance reports should be developed on the basis of responsibility accounting. What is responsibility accounting? It involves reporting financial results on the basis of managerial responsibilities within an organization.
15-17Anup Kumar Saha Learning Objective 2 Identify the major threats in general ledger and reporting activities, and evaluate the adequacy of various internal control procedures for dealing with them.
15-18Anup Kumar Saha Control: Objectives, Threats, and Procedures What are the control objectives in the general ledger and reporting system? 1. Updates to the general ledger are properly authorized. 2. Recorded general ledger transactions are valid. 3. Valid, authorized general ledger transactions are recorded.
15-19Anup Kumar Saha Control: Objectives, Threats, and Procedures 4. General ledger transactions are accurately recorded. 5. General ledger data are safeguarded from loss or theft. 6. General ledger system activities are performed efficiently and effectively.
15-20Anup Kumar Saha Threats and Controls in the General Ledger and Reporting System Process/ActivityThreatApplicable Control Procedures Updating the general ledger ErrorsInput and processing controls; reconciliations and control reports; audit trail Access to general ledger Loss of confidential data and/or concealment of theft Access controls; audit trail Loss or destruction of the general ledger Loss of data and assets Backup and disaster recovery procedures
15-21Anup Kumar Saha Threat 1: Errors in Updating the General Ledger Errors made in updating the general ledger can lead to poor decision making based on erroneous information in financial performance reports. Control procedures fall into three categories: 1. Input edit and processing controls 2. Reconciliations and control reports 3. Maintenance of an adequate audit trail
15-22Anup Kumar Saha Input Edit and Processing Controls There are two sources of journal entries for updating the general ledger: 1. Summary journal entries from other AIS cycles 2. Direct entries made by the treasurer or controller
15-23Anup Kumar Saha Input Edit and Processing Controls Journal entries made by the treasurer and controller are original data entry. Several types of input edit and processing controls are needed to ensure that they are accurate and complete. These are: Validity Check Field Checks Zero-balance checks Completeness test Closed-loop verification Calculation run-to-run totals to verify accuracy of journal voucher batch processing Standard adjusting entry file for recurring adjusting entries made each period Sign check
15-24Anup Kumar Saha Reconciliation and Control Report Reconciliations and control reports can detect if any errors were made during the process of updating the general ledger. Examples include: Preparation of the trial balance Comparing the general ledger control account balances to the total balance in the corresponding ledger
15-25Anup Kumar Saha Reconciliation and Control Report The audit trail is the path of a transaction through the accounting system. The audit trail facilitates these three tasks: 1. Trace any transaction from its original source document to the general ledger and to any report or other document using that data.
15-26Anup Kumar Saha Reconciliation and Control Report The audit trail, continued 2. Trace any item appearing in a report back through the general ledger to its original source document 3. Trace all changes in general ledger accounts from their beginning balance to their ending balance
15-27Anup Kumar Saha Threat 2: Unauthorized Access to the General Ledger Unauthorized access to the general ledger can result in confidential data leaks to competitors or corruption of the general ledger. It can also provide a means for concealing the theft of assets.
15-28Anup Kumar Saha Threat 2: Unauthorized Access to the General Ledger Some controls against this threat are: User IDs and passwords Read-only access to the general ledger System checks of authorization codes for each journal voucher record before posting
15-29Anup Kumar Saha Threat 3: Loss or Destruction of the General Ledger Adequate backup and disaster recover y procedures must be in place to protect the general ledger. Backup controls include: 1. Use of internal and external file labels 2. Performance of regular backup of the general ledger
15-30Anup Kumar Saha Learning Objective 3 Read and explain an integrated enterprise-wide REA data model.
15-31Anup Kumar Saha Integrated Data Model An integrated enterprise-wide data model represents a merging of separate data models. This merging primarily involves linking each resource with the events that increase and decrease that resource.
15-32Anup Kumar Saha Integrated Data Model (1, N) (1, 1) Cash (1, N) Cash disbursements Cash receipts (1, 1)
15-34Anup Kumar Saha Benefits of an Integrated Data Model What are some benefits of an Integrated data model? – Improved support for decision making – Integration of financial and nonfinancial information –Improved internal reporting
15-35Anup Kumar Saha Benefits of an Integrated Data Model Development of a virtual value chain occurs in three stages. What are these stages? 1. Visibility 2. Mirroring 3. Building new customer relationships
15-36Anup Kumar Saha Learning Objective 4 Discuss and Design a Balanced Scorecard for an organization.
15-37Anup Kumar Saha Balanced Scorecard What is a balanced scorecard? A report that provides a multidimensional perspective of organizational performance It contains measures reflecting four perspectives of the organization: Financial Customer Internal operations Innovation and learning
15-38Anup Kumar Saha Learning Objective 5 Explain the relationship between online transaction processing systems and data warehouses used to support business intelligence.
15-39Anup Kumar Saha Data Warehouses Data warehouses, which contain both current and historical data, can provide additional support for strategic decision making. Whereas transaction-processing databases are designed to minimize redundancy, data warehouses purposely build in redundancies in order to maximize query efficiency.
15-40Anup Kumar Saha Data Warehouses The process of accessing data contained in the data warehouse and using it for strategic decision making is referred to as Business Intelligence. The two main techniques of business intelligence are: Online Analytical Processing (OLAP) Data mining
15-41Anup Kumar Saha Learning Objective 6 Understand the implications of new IT developments, such as XBRL, for internal and external reporting.
15-42Anup Kumar Saha Opportunities for Using Information Technology The Extensible Business Reporting Language (XBRL) has addressed two problems: Different requirements for the manner in which information is delivered. The need for manual reentry of information into standalone decision analysis tools.
15-43Anup Kumar Saha Opportunities for Using Information Technology XBRL provides two benefits: It enables organizations to publish information only once using standard XBRL tags. XBRL tags are interpretable.
15-44Anup Kumar Saha Case Conclusion What did Stephanie Cromwell and Elizabeth Venko decide? They decided that AOE needs to switch to an online general ledger system. They agreed that AOE will first acquire a general ledger package that is built on a relational database.