Revenue Cycle
Revenue Cycle
. 12-2
The Revenue Cycle
• Provides goods and services to customers, and
• Collects cash in payment for those sales
• Primary Objective:
• Provide the right product
• In the right place
• At the right time
• For the right price
12-3 .
The Revenue Cycle (Context Diagram)
. 12-4
DEFINITIONS
. .
A-Sales Order Entry
(Logical DFD Level 1)
. .
A- Sales Order Threat/Control
Threats Controls
Incomplete/ Data entry edit controls (eg. Field check, sign check, limit check, range
inaccurate orders check, etc)
Restriction of access to master data (eg. Password, pin code etc)
Invalid orders Digital signatures or written signatures
9 .
12 examples of RFID across industries
• Manufacturing – A major tire manufacturer is going to insert RFID tags into its tires. The
tags will store a unique number for each tire, which will be associated with the car’s vehicle
identification number.
• Pharmaceuticals – Pharmaceutical companies have embedded RFID chips in drug
containers to track and avert the theft of highly controlled drugs, such as OxyContin.
• Airlines – Continental Airlines uses RFID tags to track passenger bags, while Delta Airlines
is tagging customer bags with RFID technology to reduce the number of lost bags and make
it easier to route bags if customers change their flight plans.
• Restaurants – A premier coffee chain is considering using RFID chips and readers to enable
its suppliers to make after-hour deliveries to stores, which avoids the disruption of staff
members during work hours.
• Toll Roads – Many tolls roads in the United States use RFID technology to collect fees
without the need for toll booth personnel.
• Retail – ExxonMobil uses RFID technology for its “SpeedPass,” which instantly collects
payment on gas stations from a tag on a driver’s keychain, while Wal-Mart is requesting that
all their suppliers apply RFID tags to all cartons of goods delivered.
. .
12 examples of RFID across industries
• Seaports – Three seaport operators in the United States, which account for 70 % of the
world’s port operations, agreed to deploy RFID tags to track daily arriving containers.
• Government – The U.S. Department of Defence is planning to use RFID technology to trace
military supply shipments.
• Corporate & Municipal – Australia placed RFID tags in employee uniforms to aid in
deterring theft. The same idea would work well in a corporate environment to help control
desktop computers, networking equipment, and personal digital assistants or handheld
computers.
• Credit Card – Visa is combining smart cards and RFID chips so people can conduct
transactions without having to use cash or coins.
• Banks – The European Central Bank is considering embedding RFID chips in Euro notes to
combat counterfeiters and money-launderers. This also would enable banks to count large
amounts of cash in seconds.
• People Tracking – The United Nations uses RFID technology to track the movements of its
personnel.
. .
B-Shipping
(Logical DFD Level 1)
. .
B- Shipping threat / control
Threats Controls
. .
C- Billing threat / control
Threats Controls
Failure to bill Separation of billing and shipping functions (segregation of duties)
Periodic reconciliation of invoices with sales orders, picking tickets, and shipping
documents
. .
D- Cash Collection
• Objective:
• To safeguard customers remittances (money/payment)
• Method of handling cash collection:
• 2 copies of invoices sent to customers
• Image processing technology (eg. QR code)
https://www.youtube.com/watch?v=QMLbTEQJCaI
• Lockbox
• Electronic lockbox
• Electronic Fund Transfer (EFT)
• Electronic Data Interchange (EDI)
• Financial Electronic Data Interchange (FEDI)
• Credit card
• Procurement card
. .
EFT, Lock boxes
. .
.
FEDI - The electronic transmission of payments and payment related information in standard formats
between companies and/or their banks. FEDI includes electronic formats for invoices, payment initiation,
and remittance information processed through a financial institution or communications intermediary.
(EDI + EFT).
D-Cash Collections Threat/Control
Threats Controls
Theft of cash Separation of cash handling function from accounts receivable and
credit functions (segregation of duties)
Regular reconciliation of bank account with recorded amounts by
someone independent of cash collections procedures
Use of EFT, FEDI, and lockboxes to minimize handling of customer
payments by employees
Prompt, restrictive endorsement of all customer cheques
Having two people open all mail likely to contain customer payments
Use of cash registers machine
Daily deposit of all cash receipts
Cash flow Lockbox arrangements, EFT, or credit cards (keep it variety)
problems Discounts for prompt payment by customers
Cash flow budgets
. .
General Revenue Cycle Threats / Controls
General Threats General Controls
Inaccurate or invalid Data processing integrity controls (e.g, data matching, file
master data labels, recalculation of batch totals, cross-footing & zero
balance tests, write protection mechanisms, concurrent
update controls – refer chapter system reliability for details).
Restriction of access to master data
Review of all changes to master data
Unauthorized Access controls
disclosure of sensitive Encryption (conversion of electronic data into another form,
information called cipher text, which cannot be easily understood by
anyone except authorized parties).
Loss or destruction of Backup and disaster recovery procedures
master data
Poor performance Managerial reports
. .
. .