Jonathan Simpson Owns A Construction Company And One Day A S
Jonathan Simpson Owns A Construction Company One Day A Subcontractor
Jonathan Simpson owns a construction company. One day, a subcontractor calls him claiming that he needs a replacement check for a job completed at 1437 Elm Street. The subcontractor states that the original check was for $10,750, but Jonathan’s records show a payment of $12,750. Jonathan cannot find the company checkbook or ledger and only one other person has access to the accounting program. He asks for advice on how to investigate and gather evidence to protect his company.
Paper For Above instruction
To effectively investigate the discrepancy in the payment records and gather sufficient evidence to protect Jonathan’s company, a systematic and thorough approach is necessary. The process begins with securing and reviewing all available documentation and digital records related to the transaction, then extending to audits of internal controls, retrieving backup data, and considering external verification if needed.
First, Jonathan should request access to the accounting software records, which the only other person with access maintains. As the records are digital, an audit trail within the accounting software can reveal the details of the transaction. Specifically, he should generate a report of all transactions related to the project at 1437 Elm Street, focusing on the particular payment in question by filtering for the date range around the payment date and the project's identification details. This report should include the date, amount, payee, and authorization details of the transaction.
Additionally, Jonathan needs to verify the authenticity of the recorded payment by reviewing supporting documentation such as the invoice or work completion reports provided by the subcontractor. Cross-referencing the payment details with the job records can identify inconsistencies. If the original invoice was submitted for $10,750, but the records show a $12,750 payment, it may suggest an entry error or potential misappropriation.
Second, Jonathan should examine the backup data and audit logs within the accounting system. Many robust accounting systems maintain backup copies or logs that record user activity. Accessing these logs would show who authorized or entered the payment, providing an accountability trail. If these logs exist, they should be carefully reviewed to determine whether the payment was authorized correctly or if there was any unauthorized modification or entry.
Third, after verifying the digital records and backup data, Jonathan should review the physical records if available, such as copies of the original check or bank statements. If physical copies of the check are absent, bank statements from the relevant period can be scrutinized to identify the issuance of the payment and reconcile it with the accounting records. This will help determine whether the payment was indeed issued for $12,750 or if there was a discrepancy.
Fourth, it is critical to conduct interviews with the staff member who has access to the accounting program. A discussion should be held to understand if there were any justifiable reasons for the discrepancy or if there is suspicion of misappropriation or misconduct. The interview should aim to establish whether proper internal controls were followed and whether any unauthorized access or alterations occurred.
Finally, if suspicion of fraudulent activity or internal misconduct arises, further investigation, possibly involving forensic accountants or legal counsel, should be initiated. All digital and physical evidence must be documented meticulously to create a comprehensive audit trail. This documentation will be useful in case of legal action or insurance claims.
In conclusion, Jonathan needs to utilize the digital audit trail within the accounting software, verify supporting documentation, review backup logs, scrutinize bank statements, and interview personnel involved. This comprehensive approach will help establish an accurate record of the transaction and protect his company's interests by providing clear, defendable evidence of the payment process.
References
- Audit Trail Definition - Investopedia
- How to Keep Good Financial Records - SBA
- Understanding Audit Logs in Accounting - AccountingTools
- How Accountants Detect Fraud - Forensic Magazine
- Fraud Detection and Prevention in Business - Fraud Magazine
- Preventing Internal Fraud - Extunes Blog
- Safeguarding Small Business Finances - Google Small Business
- Forensic Accounting and Fraud Examination - Accounting Today
- Investigating Employee Fraud - CPA.com
- NAAG Resources for Financial Crimes Investigation