Table of contents | |
Enterprise Risk Management (ERM) | |
Controls | |
Risks and Controls For Specific Business Processes | |
Diagrammatic Representation of Business Processes |
No entity operates in a risk-free environment and ERM does not create such an environment. Rather, it enables management to operate more effectively in environments filled with risks. ERM provides enhanced capability to do the following:
ERM provides a framework for risk management which typically involves identifying events or circumstances relevant to the organization’s objectives (risks and opportunities), assessing them in terms of likelihood and magnitude of impact, determining a response strategy, and monitoring progress. Various potential threats to computer system affect the confidentiality, integrity, and availability of data and computer system. For successful continuity of business, it is very essential to evaluate these potential threats and control them so as to minimize the impact of these threats to an acceptable level. By identifying and pro-actively addressing risks and opportunities, business enterprises protect and create value for their stakeholders, including owners, employees, customers, regulators, and society overall.
ERM is a risk-based approach, which includes the methods and processes used by organizations to manage risks. ERM provides a framework for risk management which involves:
ERM framework consists of eight interrelated components that are derived from the way management runs a business and are integrated with the management process. These components are as follows:
(i) Internal Environment: The internal environment encompasses the tone of an organization, and sets the basis for how risk is viewed and addressed by an entity’s people, including risk management philosophy and risk appetite, integrity and ethical values, and the environment in which they operate. Management sets a philosophy regarding risk and establishes a risk appetite. The internal environment sets the foundation for how risk and control are viewed and addressed by an entity’s people. The core of any business is its people their individual attributes, including integrity, ethical values and competence – and the environment in which they operate. They are the engine that drives the entity and the foundation on which everything rests.
(ii) Objective Setting: Objectives should be set before management can identify events potentially affecting their achievement. ERM ensures that management has a process in place to set objectives and that the chosen objectives support and align with the entity’s mission/vision and are consistent with the entity’s risk appetite.
(iii) Event Identification: Potential events that might have an impact on the entity should be identified. Event identification includes identifying factors – internal and external – that influence how potential events may affect strategy implementation and achievement of objectives. It includes distinguishing between potential events that represent risks, those representing opportunities and those that may be both. Opportunities are channeled back to management’s strategy or objective-setting processes. Management identifies interrelationships between potential events and may categorize events to create and reinforce a common risk language across the entity and form a basis for considering events from a portfolio perspective.
(iv) Risk Assessment: Identified risks are analyzed to form a basis for determining how they should be managed. Risks are assessed on both an inherent and a residual basis, and the assessment considers both risk likelihood and impact. A range of possible results may be associated with a potential event, and management needs to consider them together.
(v) Risk Response: Management selects an approach or set of actions to align assessed risks with the entity’s risk tolerance and risk appetite, in the context of the strategy and objectives. Personnel identify and evaluate possible responses to risks, including avoiding, accepting, reducing and sharing risk.
(vi) Control Activities: Policies and procedures are established and executed to help ensure that the risk responses that management selected are effectively carried out.
(vii) Information and Communication: Relevant information is identified, captured and communicated in a form and time frame that enables people to carry out their responsibilities. Information is needed at all levels of an entity for identifying, assessing and responding to risk. Effective communication also should occur in a broader sense, flowing down, across and up the entity. Personnel need to receive clear communications regarding their role and responsibilities.
(viii) Monitoring: The entire ERM process should be monitored, and modifications made as necessary. In this way, the system can react dynamically, changing as conditions warrant. Monitoring is accomplished through ongoing management activities, separate evaluations of the ERM processes or a combination of both.
Control is defined as policies, procedures, practices and organization structure that are designed to provide reasonable assurance that business objectives are achieved and undesired events are prevented or detected and corrected. The main objectives of information controls are safeguarding of assets, maintenance of data integrity, effectiveness in achieving organizational objectives, and efficient consumption of resources. Controls include things like practices, policies, procedures, programs, techniques, technologies, guidelines, and organizational structures.
Example 6: Purchase to Pay-Given below is a simple example of controls for the Purchase to Pay cycle, which is broken down to four main components as shown in the Fig. 1.6.1.
Based on the mode of implementation, these controls can be Manual, Automated or Semi-Automated (partially manual and partially automated). The objective of a control is to mitigate the risk.
IT Control objectives is defined as: “A statement of the desired result or purpose to be achieved by implementing control procedures within a particular IT activity”. Implementing right type of controls is responsibility of management. Controls provide a clear policy and good practice for directing and monitoring performance of IT to achieve enterprise objectives. IT Controls perform dual role which is as follows:
(i) They enable enterprise to achieve objectives; and
(ii) They help in mitigating risks.
Many issues drive the need for implementing IT controls. These range from the need to control costs and remain competitive to the need for compliance with internal and external governance. IT controls promote reliability and efficiency and allow the organization to adapt to changing risk environments. Any control that mitigates or detects fraud or cyber-attacks enhances the organization’s resiliency because it helps the organization uncover the risk and manage its impact. Resiliency is a result of a strong system of internal controls which enable a well-controlled organization-to manage challenges or disruptions seamlessly.
It is important for an organization to identify controls as per policy, procedures and its structure and configure it within IT software as used in the organization.
There are different options for implementing controls as per risk management strategy. For example, the way banking is done in a nationalized bank is traditional way with rigid organization structure of managers at different levels, officers and clerks and clear demarcation between departments and functions whereas in a private sector, the organization structure is organized around customers and focused on relationship banking.
A common classification of IT controls is General Controls and Application Controls. General Controls are macro in nature and are applicable to all applications and data resources. Application Controls are controls which are specific to the application software such as payroll, accounts payable, and billing, etc.
(a) Information Technology General Controls (ITGC)
ITGC also known as Infrastructure Controls pervade across different layers of IT environment and information systems and apply to all systems, components, processes, and data for a given enterprise or systems environment. ITG controls are the basic policies and procedures that ensure that an organization’s information systems are properly safeguarded, that application programs and data are secure, and that computerized operations can be recovered in case of unexpected interruptions.
General controls include, but are not limited to:
(b) Application Controls
Application represents the interface between the user and the business functions.
Application Controls are controls which are implemented in an application to prevent or detect and correct errors. These controls are in-built in the application software to ensure accurate and reliable processing. These are designed to ensure completeness, accuracy, authorization and validity of data capture and transaction processing. For example: In banking, application software ensures that only transactions of the day are accepted by the system. Withdrawals are not allowed beyond limits, etc.
Some examples of Application controls are as follows-
The IT controls implemented in an organization are considered to be effective on the basis of following criteria:
A company's management team is responsible for the development of internal control policies and procedures. SA315 defines the system of Internal Control as “the process designed, implemented and maintained by those charged with governance, management and other personnel to provide reasonable assurance about the achievement of an entity’s objectives regarding reliability of financial reporting, effectiveness and efficiency of operations, safeguarding of assets, and compliance with applicable laws and regulations”.
An Internal Control System -
As per SA315, the five components of any internal control as they relate to a financial statement audit are explained below. All these components must be present to conclude that internal control is effective.
I. Control Environment
The Control Environment is the set of standards, processes, and structures that provide the basis for carrying out internal control across the organization. The Board of Directors and Senior Management establish the tone at the top regarding the importance of internal control, including expected standards of conduct. Management reinforces expectations at the various levels of the organization. The control environment comprises the integrity and ethical values of the organization; the parameters enabling the board of directors to carry out its governance responsibilities; the organizational structure and assignment of authority and responsibility; the process for attracting, developing, and retaining competent individuals; and the rigor around performance measures, incentives, and rewards to drive accountability for performance. The resulting control environment has a pervasive impact on the overall system of internal control.
II. Risk Assessment
Every entity faces a variety of risks from external and internal resources. Risk may be defined as the possibility that an event will occur and adversely affect the achievement of objectives. Risk Assessment involves a dynamic and iterative process for identifying and assessing risks to the achievement of objectives. Risks to the achievement of these objectives from across the entity are considered relative to established risk tolerances. Thus, Risk Assessment forms the basis for determining how risks will be managed. A precondition to risk assessment is the establishment of objectives, linked at different levels of the entity. Management specifies objectives within categories of operations, reporting, and compliance with sufficient clarity to be able to identify and assess risks to those objectives. Because economic, industry, regulatory and operating conditions will continue to change; risk assessment also requires management to consider the impact of possible changes in the external environment and within its own business model that may render internal control ineffective.
III. Control Activities
Control Activities are the actions established through policies and procedures that help ensure that management’s directives to mitigate risks to the achievement of objectives are carried out. Control activities are performed at all levels of the entity, at various stages within business processes, and over the technology environment. They may be preventive or detective in nature and may encompass a range of manual and automated activities such as authorizations and approvals, verifications, reconciliations and business performance reviews.
Broadly, the control activities include the elements that operate to ensure transactions are authorized, duties are segregated, adequate documents and records are maintained, assets and records are safeguarded, and independent checks on performance and valuation of records. Internal auditors are also concerned with administrative controls to achieve effectiveness and efficiency objectives. Control activities must be developed to manage, mitigate, and reduce the risks associated with each business process. It is unrealistic to expect to eliminate risks completely.
IV. Information and Communication
Information is necessary for the entity to carry out internal control responsibilities in support of the achievement of its objectives. Management obtains or generates and uses relevant and quality information from both internal and external sources to support the functioning of other components of internal control. Pertinent information must be identified, captured and communicated in a form and time frame that enable people to carry out their responsibilities. Communication is the continual, iterative process of providing, sharing, and obtaining necessary information. Internal communication is how information is disseminated throughout the enterprise, flowing up, down, and across the entity. It enables personnel to receive a clear message from senior management that control responsibilities should be taken seriously. External communication is two-fold: it enables inbound communication of relevant external information and provides information to external parties in response to requirements and expectations.
V. Monitoring of Controls
Monitoring controls is an ongoing, cyclical process. Ongoing evaluations, separate evaluations, or some combination of the two are used to ascertain whether each of the five components of internal control, including controls to affect the principles within each component is present and functioning. Ongoing evaluations built into business processes at different levels of the entity, provide timely information. Separate evaluations conducted periodically will vary in scope and frequency depending on assessment of risks, effectiveness of ongoing evaluations, and other management considerations. Findings are evaluated against management’s criteria and deficiencies are communicated to management and the Board of Directors as appropriate.
Internal control, no matter how effective, can provide an entity with only reasonable assurance and not absolute assurance about achieving the entity’s operational, financial reporting and compliance objectives. Internal control systems are subject to certain inherent limitations, such as:
Suitable controls should be implemented to meet the requirements of the control objectives. These controls can be manual, automated or semi-automated provided the risk is mitigated. Based on the scenario, the controls can be Preventive, Detective or Corrective. Preventive controls prevent risks from actualizing. Detective controls detect the risks as they arise. Corrective controls facilitate correction. In computer systems, controls should be checked at three levels, namely Configuration, Masters and Transaction level.
Procure to Pay (Purchase to Pay or P2P) is the process of obtaining and managing the raw materials needed for manufacturing a product or providing a service. It involves the transactional flow of data that is sent to a supplier as well as the data that surrounds the fulfillment of the actual order and payment for the product or service. Using automation, it should be possible to have a seamless procure to pay process covering the complete life-cycle from point of order to payment.
Masters
Table 1.7.1: Risks and Control Objectives (Masters-P2P)
Transactions
Table 1.7.2: Risks and Control Objectives (Transactions-P2P)
Order to Cash (OTC or O2C) is a set of business processes that involve receiving and fulfilling customer requests for goods or services. It is a set of business processes that involve receiving and fulfilling customer requests for goods or services. Refer Fig 1.7.1.
Fig. 1.7.1 depicts an O2C cycle that consists of multiple sub-processes including:
Risks and Control Objectives (Masters-O2C) and Risks and Control Objectives (Transactions-O2C) are provided below in Tables 1.7.3 and 1.7.4 respectively.
Masters
Table 1.7.3: Risks and Control Objectives (Masters-O2C)
Transactions
Table 1.7.4: Risks and Control Objectives (Transactions-O2C)
The Inventory Cycle is a process of accurately tracking the on-hand inventory levels for an enterprise. An inventory system should maintain accurate record of all stock movements to calculate the correct balance of inventory. The term “inventory cycle” means different things to companies in different verticals. For those who source, assemble and create inventory, it refers to a time-based process which is basic to understanding how to maximize resources and cash flow. To businesses that buy, store and sell inventory, it focuses on the process of understanding, planning and managing inventory levels, from purchasing through more-efficient auditing. The typical phases of the Inventory Cycle for Manufacturers are as follows:
Risks and Control Objectives (Masters-Inventory) and Risks and Control Objectives (Transactions- Inventory) are provided below in Tables 1.7.5 and 1.7.6 respectively.
Masters
Table 1.7.5: Risks and Control Objectives (Masters-Inventory)
Transactions
Table 1.7.6: Risks and Control Objectives (Transactions-Inventory)
Human Resources – Risks and Controls
The Human Resources (HR) life cycle refers to human resources management and covers all the stages of an employee’s time within a specific enterprise and the role the human resources department plays at each stage. Typical stage of HR cycle includes the following:
Risks and Control Objectives (Configuration-Human Resources) and Risks and Control Objectives (Masters-Human Resources) are provided below in Tables 1.7.7 and 1.7.8 respectively.
Configuration
Table 1.7.7: Risks and Control Objectives (Configuration-Human Resources)
Masters
Table 1.7.8: Risks and Control Objectives (Masters-Human Resources)
Fixed Assets – Risks and Controls Fixed Assets process ensures that all the fixed assets of the enterprise are tracked for the purposes of financial accounting, preventive maintenance, and theft deterrence. Fixed assets process ensures that all fixed assets are tracked and fixed asset record maintains details of location, quantity, condition, and maintenance and depreciation status.
Typical steps of fixed assets process are as follows:
Tables 1.7.9 and 1.7.10 given below provide Risks and Control Objectives (MastersFixed Assets) and Risks and Control Objectives (Transactions-Fixed Assets) respectively.
Masters
Table 1.7.9: Risks and Control Objectives (Masters-Fixed Assets)
Transactions
Table 1.7.10: Risks and Control Objectives (Transactions-Fixed Assets)
General Ledger (GL) process refers to the process of recording the transactions in the system to finally generating the reports from financial transactions entered in the system. The input for GL Process Flow is the financial transactions and the outputs are various types of financial reports such as balance sheet, profit and loss a/c, funds flow statement, ratio analysis, etc.
The typical steps in general ledger process flow are as follows:
Risks and Control Objectives (Configuration-General Ledger); Risks and Control Objectives (Masters-General Ledge) and Risks and Control Objectives (TransactionsGeneral Ledger) are provided below in Tables 1.7.11, 1.7.12 and 1.7.13 respectively.
Configuration
Table 1.7.11: Risks and Control Objectives (Configuration-General Ledger)
Masters
Table 1.7.12: Risks and Control Objectives (Masters-General Ledger)
Transactions
Table 1.7.13: Risks and Control Objectives (Transactions-General Ledger)
For controlling the organization effectively, it is very important to have an understanding about its processes which can be done through business process mapping. Business process mapping refers to gathering extensive information about the current processes in an organization. This information should include description of the different activities involved in the process, the process flows, what the processes actually do, who is in charge of the process, the competence needed and how the process should be performed.
A Flowchart is a diagram that describes a process or operation. It includes multiple steps, through which the process "flows" from start to finish. Flowcharts are used in designing and documenting simple processes or programs. Like other types of diagrams, they help visualize what is going on and thereby help understand a process, and perhaps also find flaws, bottlenecks, and other less-obvious features within it.
I. Flowcharting Symbols
There are many different types of flowcharts, and each type has its own collection of boxes and notational conventions. The two most common types of boxes in a flowchart are as follows:
A Flowchart is described as “cross-functional” when the page is divided into different swimlanes describing the control of different organizational units. A symbol appearing in a particular “lane” is within the control of that organizational unit. This technique allows the author to locate the responsibility for performing an action or deciding correctly, showing the responsibility of each organizational unit for different parts of a single process.
II. Steps for creating flowcharts for business processes
III. Advantages of Flowcharts
(a) Quicker grasp of relationships- The relationship between various elements of the application program/business process must be identified. Flowchart can help depict a lengthy procedure more easily than by describing it by means of written notes.
(b) Effective Analysis- The flowchart becomes a blue print of a system that can be broken down into detailed parts for study. Problems may be identified and new approaches may be suggested by flowcharts.
(c) Communication- Flowcharts aid in communicating the facts of a business problem to those whose skills are needed for arriving at the solution.
(d) Documentation- Flowcharts serve as a good documentation which aid greatly in future program conversions. In the event of staff changes, they serve as training function by helping new employees in understanding the existing programs.
(e) Efficient coding- Flowcharts act as a guide during the system analysis and program preparation phase. Instructions coded in a programming language may be checked against the flowchart to ensure that no steps are omitted.
(f) Program Debugging- Flowcharts serve as an important tool during program debugging. They help in detecting, locating and removing mistakes.
(g) Efficient program maintenance- The maintenance of operating programs is facilitated by flowcharts. The charts help the programmer to concentrate attention on that part of the information flow which is to be modified.
(h) Identifying Responsibilities- Specific business processes can be clearly identified to functional departments thereby establishing responsibility of the process owner.
(i) Establishing Controls- Business process conflicts and risks can be easily identified for recommending suitable controls.
IV. Limitations of Flowchart
(a) Complex logic– Flowchart becomes complex and clumsy where the problem logic is complex. The essentials of what is done can be easily lost in the technical details of how it is done.
(b) Modification– If modifications to a flowchart are required, it may require complete re-drawing.
(c) Reproduction– Reproduction of flowcharts is often a problem because the symbols used in flowcharts cannot be typed.
(d) Link between conditions and actions– Sometimes it becomes difficult to establish the linkage between various conditions and the actions to be taken there upon for a condition.
(e) Standardization– Program flowcharts, although easy to follow, are not such a natural way of expressing procedures as writing in English, nor are they easily translated into Programming language.
Example 9: Draw a Flowchart for finding the sum of first 100 odd numbers.
The flowchart is drawn as Fig. 1.8.3 and is explained step by step below. The step numbers are shown in the flowchart in circles and as such are not a part of the flowchart but only a referencing device.
Our purpose is to find the sum of the series 1, 3, 5, 7, 9.....(100 terms). The student can verify that the 100th term would be 199. We propose to set A = 1 and then go on incrementing it by 2 so that it holds the various terms of the series in turn. B is an accumulator in the sense that A is added to B whenever A is incremented. Thus, B will hold:
1
1 + 3 = 4
4 + 5 = 9,
9 + 7 = 16, etc. in turn.Step 1 - All working locations are set at zero. This is necessary because if they are holding some data of the previous program, that data is liable to corrupt the result of the flowchart.
Step 2 - A is set at 1 so that subsequently by incrementing it successively by 2, we get the wanted odd terms: 1,3,5,7 etc.
Step 3 - A is poured into B i.e., added to B. B being 0 at the moment and A being 1, B becomes 0 + 1 = 1.
Step 4 - Step 4 poses a question. “Has A become 199?” if not, go to step 5, we shall increment A by 2. So, that although at the moment A is 1, it will be made 3 in step 5, and so on. Then go back to Step 3 by forming loop.
Since we must stop at the 100th term which is equal to 199. Thus, A is repeatedly incremented in step 5 and added to B in step 3. In other words, B holds the cumulative sum up to the latest terms held in A.
When A has become 199 that means the necessary computations have been carried out so that in Step 6 the result is printed.
Example 10: An E-commerce site has the following cash back offers.
(i) If purchase mode is via website, an initial discount of 10% is given on bill amount.
(ii) If purchase mode is via phone app, an initial discount of 20% is given on bill amount.
(iii) If done via any other purchase mode, the customer is not eligible for any discount.
Every purchase eligible to discount is given 10 reward points.
(a) If the reward points are between 100 and 200 points, the customer is eligible for a further 30% discount on the bill amount after initial discount.
(b) If the reward points exceed 200 points, the customer is eligible for a further 40% discount on the bill amount after initial discount.
Taking purchase mode, bill amount and number of purchases as input; draw a flowchart to calculate and display the total reward points and total bill amount payable by the customer after all the discount calculation.
Let us define the variables first:
PM: Purchase Mode
BA: Bill Amount
TBA: Total Bill Amount
NOP: Number of Purchases
TRP: Total Reward Points
IN_DISC: Initial Discount
ET_DISC: Extra Discount on purchases eligible to Initial Discount
N: Counter (to track the no. of purchases)
Fig. 1.8.4: Flowchart
Example 11: A bank has 500 employees. The salary paid to each employee is sum of his Basic Pay (BP), Dearness Allowance (DA) and House Rent Allowance (HRA). For computing HRA, bank has classified his employees into three classes A, B and C. The HRA for each class is computed at the rate of 30%, 20% and 10% of the BP Pay respectively. The DA is computed at a flat rate of 60% of the Basic Pay. Draw a flow chart to determine percentage of employee falling in the each of following salary slabs:
(i) Above ₹ 30,000
(ii) ₹ 15,001 to ₹ 30,000
(iii) ₹ 8,001 to ₹ 15,000
(iv) Less than or equal to ₹ 8,000
Abbreviations used in the flowchart are as follows:
P1, P2, P3 and P4: Percentage of employees falling in salary slab (salary < = 8,000); salary slab (8,001 < = salary< = 15,000); salary slab (15,001 < = salary < = 30,000) and salary slab (salary > = 30,000) respectively;
C1, C2, C3 and C4 are the number of employees falling in salary slab (salary < = 8,000); salary slab (8,001 < = salary < = 15,000); salary slab (15,001 < = salary < = 30,000) and salary slab (salary > = 30,000) respectively;I: Count of number of employees
Fig. 1.8.5: Flowchart
Example 12: Consider the following flowchart in the Fig. 1.8.6.
Fig. 1.8.6:(a) What is the output of the flowchart?
(b) In Step B, put I = 3 in place of I = 1; what will be the output then?
(c) In Step B, put I = 6 in place of I = 1; what will be the output then?
(d) In the given flowchart; replace I = 0 by I = 1 at Step A, what will be the output?
Refer to the Table 1.8.1.
(a) X = 30, Y = 10, Z = 20
(b) For I = 3; X = 10, Y = 20, Z = 30
(c) For I = 6; X = 10, Y = 20, Z = 30
(d) For I = 1 at Step A; the flowchart will enter an Infinite Loop as the condition I = 1 will never be true.
Table 1.8.1: Working of Example 12
Example 13: A company is selling three types of products namely A, B and C to two different types of customers viz. dealers and retailers. To promote the sales, the company is offering the following discounts. Draw a flowchart to calculate the discount for the below mentioned policy.
(i) 10% discount is allowed on product A, irrespective of the category of customers and the value of order.
(ii) On product B, 8% discount is allowed to retailers and 12% discount to dealers, irrespective of the value of order.
(iii) On product C, 15% discount is allowed to retailers irrespective of the value of order and 20% discount to dealers if the value of order is minimum of ₹ 10,000.
The required flowchart is given in Fig. 1.8.7:
Fig. 1.8.7: Flowchart
Data Flow Diagrams – A Data Flow Diagram uses few simple symbols to illustrate the flow of data among external entities (such as people or organizations, etc.). Data Flow Diagrams (DFD) show the flow of data or information from one place to another. DFDs describe the processes showing how these processes link together through data stores and how the processes relate to the users and the outside world. The limitation of this diagram is that processes are not identified to functional departments.
Example 14: The Fig. 1.8.8 depicts a simple business process (traditional method) flow.
DFD basically provides an overview of:
Example 15: In the simple DFD shown in Fig. 1.8.9, please note that the processes are specifically identified to the function using “swimlanes”. Each lane represents a specific department where the business process owner can be identified. The business process owner is responsible for ensuring that adequate controls are implemented to mitigate any perceived business process risks.
DFD is mainly used by technical staff for graphically communicating between systems analysts and programmers. Main symbols used in DFD are provided in Table 1.8.2.
Table 1.8.2: Main symbols used in DFD
Example 16: Given below in Fig. 1.8.10 is a simple scenario depicting a book borrowed from a library being returned and the fine calculated, due to delay.
Example 17: Customer Order Fulfilment (Refer Fig. 1.8.11)
Example 18: Order to Cash (Refer Fig. 1.8.12)
Fig. 1.8.12 indicates the different sub processes within the main processes in the Order to Cash cycle. It should be noted that this is only a simple example to illustrate the concept. However, in large enterprises the main processes, sub processes and activities could be much more.
(i) Sales and Marketing (SM)
(ii) Order Fulfillment
(iii) Manufacturing
(iv) Receivables
Example 19: Procure to Pay (Refer Fig. 1.8.13)
The Purchase to Pay/Procure to Pay process in Fig. 1.8.13 indicates the different processes identified specifically to department/entity through “swimlanes” so that the responsibilities are clearly defined. Let us understand flow from the perspective of each department/entity.
(i) User Department
(ii) Procurement Department (PD)
(iii) Vendor
(iv) Stores
(v) Accounts Payable (AP)
AP will do a “3-way match” of PO/GRN/VI. This is to ensure that the price, quantity and terms indicated in the VI matches with the PO and the quantity received in the PO matches with the GRN quantity. This check establishes that what has been ordered has been delivered.
30 videos|58 docs
|
|
Explore Courses for CA Intermediate exam
|