Security Issues with Vendors, Employees, and Customers Chapter 10.

Slides:



Advertisements
Similar presentations
Secure Your Store Understand the measures used in securing a retail store.
Advertisements

The Expenditure Cycle: Purchasing to Cash Disbursements
Product Receiving, Storing, and Issuing
1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
The Office Procedures and Technology
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Part I: Purchases and Cash Disbursements Procedures
RECEIVE AND STORE KITCHEN SUPPLIES AND FOOD STOCK
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
Accounting Information Systems: Definitions and Characteristics.
The Expenditure Cycle: Purchasing to Cash Disbursements
Cash Receipt Schemes and Other Asset Misappropriations
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
Chapter 12 Cash Disbursement Schemes
Understand Merchandise Planning in Retailing. The Merchandise Plan A budgeting tool that helps retailer or buyer to meet department goals ▫Planned sales.
© 2014 Cengage Learning. All Rights Reserved. Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO4 Describe accounting procedures used.
Receiving, Storing, and Issuing
Chapter 9 Non-Cash Assets.
The Islamic University of Gaza
Sarbanes-Oxley, Internal Control & Cash
ACCT 100 Chapter 7 Internal Control and Cash Internal Control and Managing Cash 2 Objectives of the Chapter 1. Introduce the internal control to safeguard.
1 Financial Accounting: Tools for Business Decision Making, 4th Ed. Kimmel, Weygandt, Kieso CHAPTER 5 Prepared by Dr. Joseph Otto.
MINISTRY OF SOCIAL AFFAIRS AND HEALTH 1 Introduction to corporate security Teemupekka Virtanen Helsinki University of Technology Telecommunication Software.
Copyright © 2007 Prentice-Hall. All rights reserved 1 Internal Control & Cash Chapter 8.
Chapter 4 Billing Schemes.
© 2011 John Wiley and Sons, Inc. All Rights Reserved Selection and Procurement for the Hospitality Industry Purchasing ANDREW HALE FEINSTEIN AND JOHN M.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
7-1 The Sarbanes-Oxley Act of 2002 (referred to simply as Sarbanes- Oxley) applies only to companies whose stock is traded on public exchanges. Its purpose.
Accounting Information Systems System Descriptions.
Chapter 15, Section 1 Purchasing Items Needed by a Business
OH 5-1 Controlling Food Costs in Purchasing and Receiving 5 OH 5-1.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Acct 316 Acct 316 Acct 316 The Expenditure Cycle: Purchasing and Cash Disbursements 12 UAA – ACCT 316 – Fall 2002 Accounting Information Systems Dr. Fred.
Food and Beverage Management
Chapter 8 Purchasing and Recieving Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives Describe the role.
Chapter 24 Stock Handling and Inventory Control 1 Marketing Essentials Chapter 24 Stock Handling and Inventory Control Section 24.1 The Stock Handling.
Purchasing & Stock Handling
OH 9-1 Protecting Revenue 10 OH 9-1. OH 9-2 Learning Objectives After completing this chapter, you should be able to: Identify and explain the three parts.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
Lesson 9: Security. Objectives  Calculate shrinkage based on merchandise book value and physical inventory counts  Give examples of internal and external.
Purchasing Items Needed by a Business
1 CHAPTER 9 MANAGING AND REPORTING WORKING CAPITAL.
Chapter 4 Billing Schemes.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Fraud, Ethics, and Controls.
INTERNAL CONTROL AND CASH
0 Glencoe Accounting Unit 4 Chapter 15 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Unit 4 The Accounting Cycle for a Merchandising.
Risks in Business Chapter 19. What is risk Risk is the possibility of loss or failure –Three main types in business EconomicNaturalHuman.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 8 Cash and Cash Controls.
© 2014 Cengage Learning. All Rights Reserved. Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO4 Describe accounting procedures used.
LO4 Describe accounting procedures used in ordering merchandise. LO5 Discuss the purpose of a special journal. LO6 Journalize purchases of merchandise.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Training FINANCE LOCAL SCHOOL ACCOUNTING Learning the Value of Internal Controls “Make it Important to You” Montgomery Public Schools.
© 2011 John Wiley and Sons, Inc. All Rights Reserved Selection and Procurement for the Hospitality Industry Purchasing ANDREW HALE FEINSTEIN AND JOHN M.
Accounts Receivable, Accounts Payable & Cash
Chapter 9 Non-Cash Assets.
Make it Operational: Food Sales
Chapter 4 The Revenue Cycle 1.
Chapter 5 The Expenditure Cycle Part I: Purchases and Cash Disbursements Procedures 1.
Chapter 7 Part 1 Internal Control
Part I: Purchases and Cash Disbursements Procedures
Chapter 9 Non-Cash Assets.
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
LESSON 9-2 Accounting for Merchandise Purchases
© 2014 Cengage Learning. All Rights Reserved.
Security in the Purchasing Function
RECEIVE AND STORE KITCHEN SUPPLIES AND FOOD STOCK
Presentation transcript:

Security Issues with Vendors, Employees, and Customers Chapter 10

Objectives Describe the different forms of supplier error and dishonesty Illustrate the different forms of employee dishonesty Identify security problems in purchasing, receiving, storing, and issuing

Objectives (cont’d.) Explain behaviors that could indicate employee dishonesty List methods for protecting your customers from being harmed by other guests

Supplier Error and Dishonesty Vendor error –Unwittingly sending products or invoices that have problems Vendor dishonesty –Purposely misleading the buyer by delivering inferior products, shorting deliveries, or billing for undelivered products

Sales Scams Sales representatives will contact people outside the buyer’s office –Attempt to sell knock-offs or poor quality, high priced items Backdoor selling –Bypassing the buyer to go directly to an individual who will use the product

Product Substitutions and Shortages Mistakes can be made at the warehouse when loading trucks for delivery –No intent of deception Seller could knowingly substitute items of lower quality or short deliveries –To make an unearned profit

Inventory Theft by Delivery Personnel Inventory shrinkage –Can occur from internal or external staff –Can occur with sales or delivery staff stealing from their customers Items can be removed from the delivery after it has been inspected Clean linen can be removed along with the soiled linen and resold to other customers

Employee Error and Dishonesty Handling food and alcohol requires a high standard of ethics Dishonest employees have more opportunities than suppliers to abuse an employer’s trust –Because they have more access to the product

Security Problems in Purchasing Methods to protect from purchasing fraud –Separate the functions of buyer and bookkeeper, and buyer and receiving clerk –All emergency purchases must be approved by owner or chef –Require receipts and document all cash paid out

Security Problems in Purchasing (cont’d.) Methods to protect from purchasing fraud (cont’d.) –Invoices must be marked “paid” –Owner should periodically verify existence of all companies who receive payments –No payments to P.O. boxes –Employ an accounting firm to audit books

Security Problems in Purchasing (cont’d.) Methods to protect from purchasing fraud (cont’d.) –Use locks and security cameras –Give receiving clerk time and authority to do their job –Employee parking distanced from entrance –Manager should be present when trash is removed from the building

Security Problems in Purchasing (cont’d.) Types of fraudulent invoices –Padding invoices with charges for products that were never shipped –Conspiracy with bookkeeper to pay fraudulent invoices and split the payments –Paying invoices from fictitious companies Reciprocity agreements can be difficult to manage

Security Problems in Receiving Receiving clerks must perform duties faithfully, even with trusted purveyors Inventory substitutions –Seller may bribe receiving clerk to accept lower quality items than were ordered Kickbacks –Seller offers payments in some form to influence purchasing decisions

Security Problems in Storing Access to inventory must be limited –Proper locking system on access doors Items that are formally counted and methodically recorded tend to be measured more accurately Stock may be stolen by employees –Best deterrent: vigilant management

Security Problems in Storing (cont’d.) Other deterrents to employee theft –Conduct unannounced inventories –Inform employees during training that procedures are in place to detect theft –Use electronic locking systems and security cameras

Security Problems in Storing (cont’d.) Inventory value padding –Overstating value of items held in inventory –May be done to “earn” a bonus or to keep a job –Another method is to substitute lower priced products and remove the higher priced products and sell for a profit

Security Problems in Issuing Chef might order supplies using normal requisitioning system only to have some expensive items diverted by issuing clerk Station-chefs should check-in their received storeroom supplies, comparing their requests with deliveries

Preventing Tampering Tampering or altering a product to make it dangerous for consumption is a potential threat to the industry –Accidental food contamination (E. coli) Methods to maintain safe food supply –Know suppliers and make sure employees purchase only from approved suppliers

Preventing Tampering (cont’d.) Methods to maintain safe food supply (cont’d.) –Inspect cases for signs of tampering –Control access to kitchen and food storage areas –Keep exterior of building and storerooms well-lit –Clean and check the ventilation system

Preventing Tampering (cont’d.) Methods to maintain safe food supply (cont’d.) –Keep fresh foods covered –Keep chemicals in their own locked storage areas –Monitor any self-serve areas; remove and dispose of any suspect items

Summary There are many ways a company can lose money through mistakes and outright dishonest y –Dishonest sellers –Dishonest employees Backdoor selling involves going around the buyer

Summary (cont’d.) Theft can occur in purchasing, receiving, storage, or issuing –There are many methods to deter theft Tampering with food is an industry threat –Many practices should be followed to prevent tampering