0% found this document useful (0 votes)
522 views5 pages

Chapter 4: Revenue Cycle Overview

The document summarizes key activities and processes in a company's revenue cycle, including sales order processing, cash receipts, billing, and accounting entries. It discusses internal controls like segregation of duties to separate authorization, custody of assets, and record keeping. Authorization is needed for sales, returns, and payments. Accounting records with pre-numbered documents and special journals allow transactions to be tracked.

Uploaded by

NAM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
522 views5 pages

Chapter 4: Revenue Cycle Overview

The document summarizes key activities and processes in a company's revenue cycle, including sales order processing, cash receipts, billing, and accounting entries. It discusses internal controls like segregation of duties to separate authorization, custody of assets, and record keeping. Authorization is needed for sales, returns, and payments. Accounting records with pre-numbered documents and special journals allow transactions to be tracked.

Uploaded by

NAM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
  • Chapter 4 - The Revenue Cycle

o salesperson file (may be a master file)

Chapter 4 

Sales history file
cash receipts history file
The Revenue Cycle  accounts receivable reports file

Sales Order Processing


THE CONCEPTUAL SYSTEM  Begins with a customer placing an order
o The sales department captures the
Overview of Revenue Cycle Activities
essential details on a sales order form.
Sales Order
 The transaction is authorized by obtaining credit
1 approval by the credit department.
Credit / Customer  Sales information is released to:
Service
2
REVENUE CYCLE
(SUBSYSTEM)
o Billing
Cash Receipts/ o Warehouse (stock release or picking
Collections
6 ticket)
Shipping
o Shipping (packing slip and shipping
3
notice)
 The merchandise is picked from the Warehouse
Billing/ Accounts and sent to Shipping.
Receivable
4/5 o Stock records are adjusted.
 The merchandise, packing slip, and bill of lading
Journal Vouchers/Entries: How do we get them? are prepared by Shipping and sent to the
 Billing Department prepares a journal voucher: customer.
Accounts Receivable DR o Shipping reconciles the merchandise
Sales CR received from the Warehouse with the
sales information on the packing slip.
 Inventory Control Dept. prepares a journal  Shipping information is sent to Billing. Billing
voucher: compiles and reconciles the relevant facts and
issues an invoice to the customer and updates
Cost of Goods Sold DR
the sales journal. Information is transferred to:
Inventory CR
o Accounts Receivable (A/R)
 Cash Receipts prepares a journal voucher: o Inventory Control
 A/R records the information in the customer’s
Cash DR
account in the accounts receivable subsidiary
Accounts Receivable CR
ledger.
Revenue Cycle Databases  Inventory Control adjusts the inventory
 Master files subsidiary ledger.
o customer master file  Billing, A/R, and Inventory Control submits
o accounts receivable master file summary information to the General Ledger
o merchandise inventory master file dept., which then reconciles this data and posts
 Transaction and Open Document Files to the control accounts in the G/L.
o sales order transaction file
Sales Return Journal Entry
 open sales order transaction file
G/L posts the following to control accounts:
o sales invoice transaction file
o cash receipts transaction file Inventory—Control DR
 Other Files Sales Returns and Allowances DR
o shipping and price data reference file Cost of Goods Sold CR
o credit reference file (may not be Accounts Receivable—Control CR
needed)
Cash Receipts Processes o a cash refund is requested
 Customer checks and remittance advices are (authorization)
received in the Mail Room. o posting a cash payment received to a
o A mail room clerk prepares a cash customer’s account (cash pre-list)
prelist and sends the prelist and the
Segregation of Functions
checks to Cash Receipts.
Three Rules:
o The cash prelist is also sent to A/R and
the Controller. 1. Transaction authorization should be separate
 Cash Receipts: from transaction processing.
o verifies the accuracy and completeness 2. Asset custody should be separate from asset
of the checks record-keeping.
o updates the cash receipts journal 3. The organization should be so structured that
o prepares a deposit slip the perpetration of a fraud requires collusion
o prepares a journal voucher to send to between two or more individuals.
G/L
 A/R posts from the remittance advices to the  Sales Order Processing
accounts receivable subsidiary ledger. o credit authorization separate from SO
o Periodically, a summary of the postings processing
is sent to G/L. o inventory control separate from
 G/L department: warehouse
o reconciles the journal voucher from o accounts receivable sub-ledger separate
Cash Receipts with the summaries from from general ledger control account
A/R  Cash Receipts Processing
o updates the general ledger control o cash receipts separate from accounting
accounts records
 The Controller reconciles the bank accounts. o accounts receivable sub-ledger separate
from general ledger
Summary of Internal Controls
Supervision
 Often used when unable to enact appropriate
segregation of duties.
 Supervision of employees serves as a deterrent
to dishonest acts and is particularly important in
the mailroom.

Accounting Records
 With a properly maintained audit trail, it is
possible to track transactions through the
systems and to find where and when errors
were made:
o pre-numbered source documents
o special journals
Authorization Controls o subsidiary ledgers
 Proper authorization of transactions o general ledger
(documentation) should occur so that only valid o files
transactions get processed.
 Within the revenue cycle, authorization should Access Controls
take place when:  Access to assets and information (accounting
o a sale is made on credit (authorization) records) should be limited.
 Within the revenue cycle, the assets to protect Computer-Based Accounting Systems
are cash and inventories and access to records
 CBAS technology can be viewed as a continuum
such as the accounts receivable subsidiary
with two extremes:
ledger and cash journal should be restricted.
o automation - use technology to
Independent Verification improve efficiency and effectiveness
 Physical procedures as well as record-keeping o reengineering – use technology to
should be independently reviewed at various restructure business processes and firm
points in the system to check for accuracy and organization
completeness:
Reengineering Sales Order Processing Using
o shipping verifies the goods sent from
the warehouse are correct in type and Real-Time Technology
quantity  Manual procedures and physical documents are
o warehouse reconciles the stock release replaced by interactive computer terminals.
document (picking slip) and packing slip  Real time input and output occurs, with some
o billing reconciles the shipping notice master files still being updated using batches.
with the sales invoice o Real-time - entry of customer order,
o general ledger reconciles journal printout of stock release, packing slip
vouchers from billing, inventory control, and bill of lading; update of credit file,
cash receipts, and accounts receivable inventory file, and open sales orders file
o Batch - printout of invoice, update of
closed sales order (journal), accounts
Automating the Revenue Cycle
receivable and general ledger control
 Authorizations and data access can be
account
performed through computer screens.
 There is a decrease in the amount of paper. Advantages of Real-Time Processing
 The manual journals and ledgers are changed to  Shortens the cash cycle of the firm by reducing
disk or tape transaction and master files. the time between the order date and billing
 Input is still typically from a hard copy date
document and goes through one or more  Better inventory management which can lead to
computerized processes. a competitive advantage
 Processes store data in electronic files (the tape  Fewer clerical errors, reducing incorrect items
or disk) or prepare data in the form of a being shipped and bill discrepancies
hardcopy report.  Reduces the amount of expensive paper
 Revenue cycle programs can include: documents and their storage costs
o formatted screens for collecting data
o edit checks on the data entered Reengineered Cash Receipts
o instructions for processing and storing  The mail room is a frequent target for
the data reengineering.
o security procedures (passwords or user  Companies send their customers preprinted
IDs) envelopes and remittance advices.
o steps for generating and displaying  Upon receipt, these envelopes are scanned to
output provides a control procedure against theft.
 To understand files, you must consider the  Machines are open the envelopes, scan
record design and layout. remittance advices and checks, and separate
 The documents and the files used as input the checks.
sources must contain the data necessary to  Artificial intelligence may be used to read
generate the output reports. handwriting, such as remittance amounts and
signatures.
Point-of-Sale Systems o Programmed decision rules must be
 Point of sale systems are used extensively in closely monitored.
retail establishments.  Segregation of Functions - consolidation of tasks
o Customers pick the inventory from the by the computer is common
shelves and take them to a cashier. o Protect the computer programs
 The clerk scans the universal product code o Coding, processing, and maintenance
(UPC). The POS system is connected to an should be separated.
inventory file, where the price and description  Supervision - in POS systems, the cash register’s
are retrieved. internal tape or database is an added form of
o The inventory levels are updated and supervision
reorder needs can immediately be  Access Control - magnetic records are
detected. vulnerable to
 The system computes the amount due.  both authorized and unauthorized exposure
Payment is either cash, check, ATM or credit and should be protected
card in most cases. o Must have limited file accessibility
o No accounts receivables o Must safeguard and monitor computer
 If checks, ATM or credit cards are used, an on- programs
line link to receive approval is necessary.  Accounting Records - rest on reliability and
 At the end of the day or a cashier’s shift, the security of stored digitalized data
money and receipts in the drawer are o Accountants should be skeptical about
reconciled to the internal cash register tape or a the accuracy of hard-copy printouts.
printout from the computer’s database. o Backups - the system needs to ensure
o Cash over and under must be recorded that backups of all files are continuously
kept
Reengineering Using EDI  Independent Verification – consolidating
 EDI helps to expedite transactions. accounting tasks under one computer program
 The customer’s computer: can remove traditional independent verification
o determines that inventory is needed controls. To counter this problem:
o selects a supplier with whom the o perform batch control balancing after
business has a formal business each run
agreement o produce management reports and
o dials the supplier’s computer and places summaries for end users to review
the order
 The exchange is completely automated. PC-Based Accounting Systems
o No human intervention or management  Used by small firms and some large
Reengineering Using the Internet decentralized firms
 Typically, no formal business agreements exist  Allow one or few individuals to perform entire
as they do in EDI. accounting function
 Most orders are made with credit cards.  Most systems are divided into modules
 Mainly done with e-mail systems, and thus a controlled by a menu-driven program:
turnaround time is necessary o general ledger
o Intelligent agents are needed to o inventory control
eliminate this time lag. o payroll
 Security and control over data is a concern with o cash disbursements
Internet transactions. o purchases and accounts payable
o cash receipts
CBAS Control Considerations o sales order
 Authorization - in real-time systems,
authorizations are automated
PC Control Issues
 Segregation of Duties - tend to be inadequate
and should be compensated for with increased
supervision, detailed management reports, and
frequent independent verification
 Access Control - access controls to the data
stored on the computer tends to be weak;
methods such as encryption and disk locking
devices should be used
 Accounting Records - computer disk failures
cause data losses; external backup methods
need to be implemented to allow data recovery

Chapter 4 
The Revenue Cycle 
THE CONCEPTUAL SYSTEM  
Overview of Revenue Cycle Activities  
REVENUE CYCLE
(SUBSYSTEM)
Sales
Cash Receipts Processes 
 
Customer checks and remittance advices are 
received in the Mail Room.  
o A mail room clerk prep
 
Within the revenue cycle, the assets to protect 
are cash and inventories and access to records 
such as the accounts rece
Point-of-Sale Systems 
 
Point of sale systems are used extensively in 
retail establishments.   
o Customers pick the inven
PC Control Issues 
 
Segregation of Duties - tend to be inadequate 
and should be compensated for with increased 
supervisio

You might also like