General Ledger and Reporting Final
General Ledger and Reporting Final
GENERAL LEDGER The general ledger and reporting system includes the processes in place to
update general ledger accounts and prepare reports that summarize results of
the organizations activities
One of the primary functions of GLARS is to collect and organize data from:
Each of the accounting cycle subsystems, which provide summary entries related to the
routine activities in those cycles. WHAT IS ACCOUNTING CYCLE ACTIVITIES
The treasurer, who provides entries with respect to non-routine activities such as
transactions with creditors and investors. Financing and investing activities
The budget department, which provides budget numbers. Budget activities
The controller, who provides adjusting entries.Adjustments
GLAR THREATS AND CONTROLS
All general ledger and reporting cycle activities depend on an integrated (general
ledger) database.
THREAT 1: Inaccurate or invalid general ledger data-DEFINE
It can result in misleading reports that cause managers to make erroneous
decisions. Similarly, errors in financial statements provided to creditors, investors and
government agencies can cause those stakeholders to make wrong decisions. In
addition, errors in financial statements and reports provided to external stakeholders
can also results in fines and negative reactions from capital markets.
One way to mitigate the threat of inaccurate or invalid general ledger data is to use
various processing and integrity controls (control 1.1).
To minimize the risk of data input errors when a treasurer and controller make direct
journal entries, it is also important to restrict access to the general ledger (control
1.2) and configure a system so that only authorized employees can make changes to
master data (control 1.3). Thus multifactor authentication should be used to restrict
access to the general ledger. In addition, authorization controls (an access control
matrix and compatibility test) should also be used to limit the functions that each
legitimate user may perform. For example, most managers should be given readonly access to the general ledger otherwise; an unscrupulous manager can conceal
theft of an assets or poor performance by altering information in a general ledger. In
addition, the access control matrix should also be designed to limit functions that can
be performed at various terminals. Adjusting entries, for example, should be allowed
only by terminals in a controllers office. However because such preventive controls
can never be 100% effective, an important detective control is to regularly produce a
report of all changes to the general ledger and review them to verify that the
database remains accurate.
THREAT 2: Unauthorized disclosure of financial statement-DEFINE
The best control procedure for reducing the risk of UDOFS is to use multifactor
authentication and physical security controls to restrict access to a general ledger
to only those employees who need such access to perform their jobs (control
2.1).
Encrypting a database provides additional protection by making information
unintelligible to anyone who succeeds in obtaining unauthorized access to a
database (control 2.2). Encryption also prevents IT employees who do not have
access to an ERP system from using operating system utilities to view sensitive
information. In addition, general ledger data should be encrypted when it is being
transmitted over the internet to other corporate offices, analyst, or government
agencies.
THREAT 3: Loss or destruction of data DEFINE
GENERAL LEDGER REPORTING ACTIVITIES
ACTIVITY 1: Update General Ledger
Updating consists of posting journal entries that originated from two sources:
Example:
stock
EXPLANATION:
After updating the general ledger, journal entries are stored in a journal voucher file
Accruals involves an event that has occurred for which the related cash
flow has not yet taken place.( Accrued revenue and Accrued expense)
Deferrals involves a situation where the cash flow takes place before
the related revenue is earned or the expense is incurred. ( Deferred
revenue and Deferred expense)
EXPLANATION:
Journal vouchers for adjusting entries should be stored in the journal voucher file.
Once adjusting entries have been recorded, an adjusted trial balance is prepared from
the new balances in the general ledger.
The adjusted trial balance serves as the input for the next step preparation of the
financial statements.
Adjusting entries originate from the controllers office, after the initial trial balance has
been prepared.
POST ADJUSTING ENTRIES THREATS:
THREAT 1: Inaccurate adjusting entries
IAE is a threat that needs to be countered with appropriate controls. This
threat can lead to poor decision-making based on financial performance
reports that contains errors or frauds.
To reduce risk of incorrect input, data entry processing integrity controls
(control 1.1) should be applied. Often, however, adjusting journal entries
are usually calculated in spreadsheets. Therefore it is important to the
various spreadsheet error protection controls (control 1.2) to minimize the
risk of mistakes.
o
o
A schema
Contains the definitions of every element that could appear in an
instance document
Link bases
Describes relationships between elements
Budgets
What are examples of budgets?
operating budget
BALANCED SCORECARD
https://books.google.com.ph/books?
id=FhTiBAAAQBAJ&pg=PA553&lpg=PA553&dq=inaccurate+updating+of+general+ledger&sour
ce=bl&ots=6d7T6dgPl_&sig=nvrTqyEvnml4Kg4TZscy9_F7MF8&hl=en&sa=X&ved=0ahUKEwj_
qdK3ibnMAhWDNKYKHf0ACdAQ6AEIQTAH#v=onepage&q=inaccurate%20updating%20of
%20general%20ledger&f=false