The Expenditure Cycle
The Expenditure Cycle
2. Prepare Purchase Order: Once inventory records signals a need for replenishment,
purchase requisitions are prepared and sorted by the vendor. Next, a purchase order (PO)
is prepared for each vendor. The purchase order (PO) includes details like item
descriptions,
A purchase order (PO) is a document based on a purchase requisition that
specifies items ordered from a vendor or supplier. The open/closed purchase order file
is the last copy that is filed while preparing a purchase order.
3. Receive Goods: Blind copy is a purchase order copy that contains no price or quantity
information. The receiving report is a report that lists quantity and condition of the
inventories received. The AP pending file is the file containing supporting documents
needed to set up an account payable. The receiving report file is the file in which a copy
of the receiving report (stating the quantity and condition of the inventories) is placed.
4. Update Inventory Records: Standard cost system is used in organizations that carry
their inventories at a predetermined standard value regardless of the price actually paid to
the vendor. An actual cost inventory ledger is a ledger that records inventory values
based on actual costs rather than standard costs.
5. Set up Accounts Payable: The suppliers invoice is the bill sent from the seller to the
buyer showing unit costs, taxes, freight, and other charges. An AP packet consists of
reconciled AP supporting documents (PO, receiving report, and invoice). The AP
subsidiary ledger is a set of records controlling the exposure in the cash disbursements
subsystems.
Vouchers Payable System: A vouchers payable system is a system under which
the AP department uses cash disbursement vouchers and maintains a voucher register. It
is an alternate to AP procedures.
Cash disbursement vouchers provide improved control over cash disbursements
and allow firms to consolidate several payments to the same supplier on a single voucher,
thus reducing the number of checks written. The voucher register is a register that
reflects a firms accounts payable liability. The vouchers payable file is equivalent to the
open AP file.
6. Post to General Ledger: The general ledger function receives a journal voucher from
the AP department and an account summary from inventory control. The general ledger
function posts from the journal voucher to the inventory and AP control accounts and
reconciles the inventory control account and the inventory subsidiary summary. The
approved journal vouchers are then posted to the journal voucher file. With this step, the
purchases phase of the expenditure cycle is completed.
1. Identify Liabilities Due: The cash disbursements process begins in the AP department
by identifying items that have come due. Each day, the AP function reviews the open AP
file (or vouchers payable file) for such items and sends payment approval in the form of a
voucher packet (the voucher and/or supporting documents) to the cash disbursements
department.
2. Prepare Cash Disbursement: The cash disbursements clerk receives the voucher
packet and reviews the documents for completeness and clerical accuracy. For each
disbursement, the clerk prepares a check and records the check number, dollar amount,
voucher number, and other pertinent data in the check register, which is also called the
cash disbursements journal.
The check register is a record of all cash disbursements. The cash
disbursements journal contains the voucher number authorizing each check and provides
an audit trail for verifying the authenticity of each check written
3. Update Accounts Payable Record: Upon receipt of the voucher packet, the AP clerk
removes the liability by debiting the AP subsidiary account or by recording the check
number and payment date in the voucher register. The voucher packet is filed in the closed
voucher file, and an account summary is prepared and sent to the general ledger function.
The closed voucher file is a record of all accounts payable that have been
discharged by making payment to the creditors.
4. Post to General Ledger: The general ledger function receives the journal voucher from
cash disbursements and the account summary from AP. T`he voucher shows the total
reductions in the firm’s obligations and cash account as a result of payments to suppliers.
These numbers are reconciled with the AP summary, and the AP control and cash
accounts in the general ledger are updated accordingly. The approved journal voucher is
then filed. This concludes the cash disbursements procedures.
COMPUTER-BASED PURCHASES AND CASH DISBURSEMENTS APPLICATION
Automating Purchases Procedures Using Batch Processing Technology
The automated batch system has many manual procedures similar to those
presented in manual system. The principal difference is that accounting (bookkeeping)
tasks are now automated. The following section describes the sequence of events as they
occur in this system.
Purchasing Department
Upon receipt of the purchase requisition, the purchasing department prepares a
multipart PO. Copies are sent to the vendor, AP, receiving, data processing, and the
purchasing department’s file.
The system in Figure 5-14 employs manual procedures as a control over the
ordering process. A computer program identifies inventory requirements and prepares
traditional purchase requisitions, but the purchasing agent reviews the requisitions before
placing the order. Some firms do this to reduce the risk of placing unnecessary orders with
vendors because of a computer error. Such manual intervention, however, does create a
bottleneck.
Data Processing Department: Step 2
As explained in Figure 5-14, a copy of the PO is sent to data processing and used to create
a record in the open PO file. The associated requisitions are then transferred from the open
purchase requisition file to the closed purchase requisition file.
Receiving Department
When the goods arrive from vendors, the receiving clerk prepares a receiving report and
sends copies to purchasing, AP, and data processing.
Data Processing
The following tasks are performed automatically.
1. The inventory file is searched for items that have fallen to their reorder points.
2. A record is entered in the purchase requisition file for each item to be replenished.
3. Requisitions are consolidated according to vendor number.
4. Vendor mailing information is retrieved from the valid vendor file.
5. Purchase orders are prepared and added to the open PO file.
6. A transaction listing of purchase orders is sent to the purchasing department for review.
Receiving Department
When the goods arrive, the receiving clerk accesses the open PO file in real time by
entering the PO number taken from the packing slip. The receiving screen, illustrated in
Figure 5-18, then prompts the clerk to enter the quantities received for each item on the
PO.
Each day, the DUE DATE fields of the AP records are scanned for items due to be
paid. The following procedures are performed for the selected items.
1. Checks are automatically printed, signed, and distributed to the mail room for mailing to
vendors.
2. The payments are recorded in the check register file.
3. Items paid are transferred from the open AP file to the closed AP file.
4. The general ledger AP and cash accounts are updated.
5. Reports detailing these transactions are transmitted via terminal to the AP and cash
disbursements departments for management review and filing.
Because the financial information about purchases is known in advance from the trading
partner agreement, the vendor’s invoice provides no critical information that cannot be
derived from the receiving report. By eliminating this source of potential discrepancy, Ford
was able to eliminate the task of reconciling vendor invoices with the supporting documents
for the majority of purchase transactions. As a result of its reengineering effort, Ford was
able to reduce its AP staff from 500 to 125.
II. Key Risks and Threats in Expenditure System
1. Employee Fraud
Employees may exploit loopholes in the system to carry out fraudulent activities—such as
submitting fake invoices, creating ghost suppliers, or misusing company credit cards.
The organization may suffer financial losses, reputational harm, or even legal liabilities.
Example: An accounts payable staff approves payments to a non-existent vendor they
created.
Employees can exploit weaknesses or oversight in the system to engage in fraudulent
activities. These might include submitting fake invoices, fabricating ghost suppliers, or
misusing company resources like credit cards. The consequences are far-reaching: the
organization could face significant financial losses, a tarnished reputation, and even legal
ramifications. For example, an accounts payable employee could create a fake vendor
account and approve payments for services that were never rendered. This type of
behavior could remain undetected for a long time, causing substantial damage to the
company.
5. Supplier Risks
Working with unreliable suppliers.
Low-quality products, late deliveries, or supplier bankruptcy may disrupt operations and
cause losses.
Example: A supplier fails to deliver essential goods on time, halting production.
Engaging with unreliable suppliers can lead to significant operational disruptions. Suppliers
that do not consistently meet delivery schedules, provide subpar products, or face financial
instability can negatively impact your business. For instance, a supplier who fails to deliver
vital materials on time could halt production, forcing the company to find alternative
solutions, leading to financial losses and damage to the company’s reputation.
6. Non-Compliance with Policies
Employees or departments bypass procurement policies or fail to follow standard
procedures.
May result in violations of legal regulations, wasted resources, or audit findings.
Example: A department makes a direct purchase without going through the bidding
process.
If employees or departments bypass established procurement policies, it can lead to legal
violations, wasted resources, and issues during audits. For example, a department might
bypass the competitive bidding process and make a direct purchase, which could lead to
favoritism, price inflation, or non-compliance with regulatory standards. Over time, these
actions could expose the company to legal risks or reputational damage if detected during
audits.
Transaction Authorization
Purchases Subsystem. The inventory control function continually monitors inventory
levels. As inventory levels drop to their predetermined reorder points, inventory control
formally authorizes replenishment with a purchase requisition. Formalizing the authorization
process promotes efficient inventory management and ensures the legitimacy of purchases
transactions. Without this step, purchasing agents could purchase inventories at their own
discretion, being in a position both to authorize and to process the purchase transactions.
Unauthorized purchasing can result in excessive inventory levels for some items, while
others go out of stock. Either situation is potentially damaging to the firm. Excessive
inventories tie up the organization’s cash reserves, and stock-outs cause lost sales and
manufacturing delays.
Cash Disbursements Subsystem. The AP function authorizes cash disbursements via the
cash disbursement voucher. To provide effective control over the flow of cash from the firm,
the cash disbursements function should not write checks without this explicit authorization.
A cash disbursements journal (check register) containing the voucher number authorizing
each check (see Figure 5-11) provides an audit trail for verifying the authenticity of each
check written.
TABLE 5-1
Segregation of Duties
Segregation of Inventory Control from the Warehouse. Within the purchases
subsystem, the primary physical asset is inventory. Inventory control keeps the detailed
records of the asset, while the warehouse has custody. At any point, an auditor should be
able to reconcile inventory records to the physical inventory.
Segregation of the General Ledger and Accounts Payable from Cash Disbursements.
The asset subject to exposure in the cash disbursements subsystem is cash. The records
controlling this asset are the AP subsidiary ledger and the cash account in the general
ledger. An individual with the combined responsibilities of writing checks, posting to the
cash account, and maintaining AP could perpetrate fraud against the firm. For instance, an
individual with such access could withdraw cash and then adjust the cash account
accordingly to hide the transaction. Also, he or she could establish fraudulent AP (to an
associate in a nonexistent vendor company) and then write checks to discharge the phony
obligations. By segregating these functions, we greatly reduce this type of exposure.
Supervision
In the expenditure cycle, the area that most benefits from supervision is the receiving
department. Large quantities of valuable assets flow through this area on their way to the
warehouse. Close supervision here reduces the chances of two types of exposure: (1)
failure to properly inspect the assets and (2) the theft of assets.
Inspection of Assets. When goods arrive from the supplier, receiving clerks must inspect
items for proper quantities and condition (damage, spoilage, and so on). For this reason,
the receiving clerk receives a blind copy of the original PO from purchasing. A blind PO has
all the relevant information about the goods being received except for the quantities and
prices. To obtain quantities information, which is needed for the receiving report, the
receiving personnel are forced to physically count and inspect the goods. If receiving clerks
were provided with quantity information via an open PO, they may be tempted to transfer
this information to the receiving report without performing a physical count. Inspecting and
counting the items received protects the firm from incomplete orders and damaged goods.
Supervision is critical at this point to ensure that the clerks properly carry out these
important duties. A packing slip containing quantity information that could be used to
circumvent the inspection process often accompanies incoming goods. A supervisor should
take custody of the packing slip while receiving clerks count and inspect the goods.
Theft of Assets. Receiving departments are sometimes hectic and cluttered during busy
periods. In this environment, incoming inventories are exposed to theft until they are
securely placed in the warehouse. Improper inspection procedures coupled with inadequate
supervision can create a situation that is conducive to the theft of inventories in transit.
Accounting Records
The control objective of accounting records is to maintain an audit trail adequate for tracing
a transaction from its source document to the financial statements. The expenditure cycle
employs the following accounting records: AP subsidiary ledger, voucher register, check
register, and general ledger. The auditor’s concern in the expenditure cycle is that
obligations may be materially understated on financial statements because of unrecorded
transactions. This is a normal occurrence at year-end closing simply because some
supplier invoices do not arrive in time to record the liabilities. This also happens, however,
as an attempt to intentionally misstate financial information. Hence, in addition to the routine
accounting records, expenditure cycle systems must be designed to provide supporting
information, such as the purchase requisition file, the PO file, and the receiving report file.
By reviewing these peripheral files, auditors may obtain evidence of inventory purchases
that have not been recorded as liabilities.
Access Controls
Direct Access. In the expenditure cycle, a firm must control access to physical assets such
as cash and inventory. These control concerns are essentially the same as in the revenue
cycle. Direct access controls include locks, alarms, and restricted access to areas that
contain inventories and cash.
Indirect Access. A firm must limit access to documents that control its physical assets. For
example, an individual with access to purchase requisitions, purchase orders, and receiving
reports has the ingredients to construct a fraudulent purchase transaction. With the proper
supporting documents, a fraudulent transaction can be made to look legitimate to the
system and could be paid.
Independent Verification
Independent Verification by Accounts Payable. The AP function plays a vital role in the
verification of the work others in this system have done. Copies of key source documents
flow into this department for review and comparison. Each document contains unique facts
about the purchase transaction, which the AP clerk must reconcile before the firm
recognizes an obligation. These include:
1. The PO, which shows that the purchasing agent ordered only the needed inventories
from a valid vendor.3 This document should reconcile with the purchase requisition.
2. The receiving report, which is evidence of the physical receipt of the goods, their
condition, and the quantities received. The reconciliation of this document with the PO
signifies that the organization has a legitimate obligation.
3. The supplier’s invoice, which provides the financial information needed to record the
obligation as an account payable. The AP clerk verifies that the prices on the invoice are
reasonable compared with the expected prices on the PO.
2.0 Introduction
Chairo Inc. is a company located in Binalbagan, Negros Occidental, specializing in food
production. While the company has grown over 22 years, it now encounters significant
difficulties in managing its expenditures effectively.
4.0 Analysis
These problems have significant repercussions for Chairo:
Financial Instability: Poor cash flow management threatens the company's ability to
meet financial obligations.
Reduced Profitability: Budget variances and overspending erode profitability.
Operational Inefficiency: Coordination failures and control weaknesses disrupt
operations.
Inaccurate Financial Reporting: Inefficient systems compromise the accuracy of
financial reports.
5.0 Recommendations
To rectify these issues, Chairo should implement the following:
Establish a Budget Committee: Create a committee with representatives from all
departments to manage the budgeting process.
Implement a Cash Budget: Develop a detailed cash budget for effective cash flow
management and expenditure planning.
Enhance Budgeting Software: Adopt or create budgeting software to minimize errors
and improve efficiency.
Improve Variance Analysis: Implement detailed variance analysis to identify and
address the causes of budget discrepancies.
Strengthen Internal Controls: Enhance controls to prevent overspending and ensure
financial accountability.
Promote Coordination: Improve communication and coordination among departments.
Provide Training: Educate staff on the importance of budgeting and proper expenditure
management.
6.0 Conclusion
Chairo Inc. faces significant challenges in its expenditure system. By implementing the
recommended improvements, the company can enhance its financial stability, operational
efficiency, and overall performance.
V. Emerging Trend and Innovations in Expenditure Systems and
Controls
The landscape of financial management is rapidly changing, particularly in how
organizations manage and control expenditures.
Technological advancements and new tools are reshaping traditional financial
practices, focusing on increasing efficiency, transparency, and accuracy.
This presentation aims to highlight the emerging trends and innovations that are
revolutionizing how organizations track, control, and optimize their expenditures.
Conclusion
Emerging technologies such as AI, blockchain, automation, and mobile integration are
transforming how expenditures are managed and controlled.
These innovations enhance efficiency, security, and transparency, while reducing the risk of
errors and fraud.
The continuous advancement of these technologies will shape the future of financial
management, making it more data-driven, secure, and efficient.
Sources:
https://www.cohnreznick.com/insights/procurement-purchasing-fraud-red-flags-prevention
https://en.wikipedia.org/wiki/Separation_of_duties
https://finance.syr.edu/audit/general-internal-controls/internal-controls-for-procurements-
and-expenditures/
https://procurementmag.com/articles/top-10-procurement-threats-that-call-for-caution-and-
action
https://trustpair.com/blog/the-5-key-risks-in-the-procure-to-pay-process-and-how-to-tackle-
them/
https://pathlock.com/learn/4-types-of-internal-controls-weaknesses-and-5-ways-to-fix-them/
https://planergy.com/blog/purchasing-internal-control/
• Deloitte’s Insights on Future of Financial Management (2025)
• PwC’s Annual Technology in Finance Report (2024)
• “Blockchain and its Impacts on Financial Expenditures” by Harvard Business Review
• Gartner’s Technology Innovations in Financial Management (2023)