Monday, September 30, 2019

Sand Maker of Hxjq Installs and Runs Smoothly and Easily

Hongxing impact crushers are the heavy type equipment, and also called sand making machines. The installation and operation both have fixed ruels and instructions. Generally speaking, if you install and use the sand making euqipment according to the following instructions, the equipment using life, product quality and personal safety can be guaranteed. OK, let's list the attentions when installing and operating a sand making machine. A. When installation, adjust the horizontal position. The machine must have the basic conditions: 1) feeding materials sequent . ) large pieces of materials can return back to the machine. 3) there is the lifting equipment upon the machine and it can lift the machine conveniently. 4) there is enough space to check up on one side of crusher. B. Common ruels when operating the sand maker. 1. Preparation works before start-up Sand making machine has a trial run for 4 hours in factory and all parts are in order. However, you must check up the machine again b efore start-up. 1) Check up turntable is balanceable or not, that is, wearing parts is installed in a whole set or not . ) The position of triangle belt is suitable or not, that is, strain is suitable or not. 3) All parts are connected steadily or not, and screws are fastened or not 1-4 Check up if there is a tool or sundries in the machine. Close the inspection door and plug into safety bolt. Don't open inspection door when operation. 1-5 Check up the running direction of engine and turntable is correct or not: anticlockwise rotation from the feeding port 1-6 Check up lubrication is enough or not. 2. Start-up without load ) Ammeter is working or not . 2) The control system: Y/' reducing the pressure start-up; Y/' time transfer relay should be adjusted as 50S or so. 3) Start-up of double electrical machine: Stand-alone start-up and Two engine start-up. You can choose the start-up according to the power of electric network. 3. Start-up with load. 1) Feed the materials after the machi ne have a successful trial run without load and the running of engine becomes ‘ type. 2) Max Feed Grain Size must be executed strictly according to instruction. ) You'd better put in the materials less than 5 mm at the beginning of start-up ( at least in half a minute) so that it can form protection layer in the machine. 4) When you feed the materials at the beginning, there will be a 30-60 seconds imbalance the machine. However, you mustn't stop the machine at once and that feed more materials until the vibration disappears. If there is violent shock and abnormal noise, you should stop the machine to check up carefully. 5) You'd better add magnetic separator beside feeding advice for fear that iron damages the machine chamber in the machine. ) Max electric current value is not exceed rated current one of running motor when feeding the materials. If the humidity of raw materials is too high, it maybe block the feed opening of central flow and overflow port of scattered flow an d influence electric current value. The electric current value is too high and can't be lower because the overflow port of scattered flow is blocked. Contrarily, the feed opening of central flow is blocked. You must stop the machine to clean up all feed openings and then work sequentially. ) Dual drive motor must regulate and bring the strain of two groups of triangle belts into harmony. Look into two groups of electric current value of motor is accord or not. 4. Stop the machine 1) You must stop feeding the materials before stopping the machine. 2) The ammeter should be without load before stopping the machine. impact crusher: http://www. hxjqchina. com/product-list_12. html sand making machine: http://www. hxjqchina. com/product-list_57. html sand maker: http://www. hxjqchina. com/product-list_57. html magnetic separator: http://www. hxjq-crusher. com/60. html

Sunday, September 29, 2019

Cult of Masculinity in “In the Country of Men”

In the book â€Å"In the Country of Men†, Hisham Matar, the author discusses his childhood experience in the 1970's during the revolution in Libya. The time when men overpowered and completely dominated women. The title itself describes Libya as a country that belongs to men where women are used like tools. We see that Suleiman wants to become a man as soon as possible through the story but on the other hand, the story also talks about a female being Suleiman’s mother – Najwa who thinks she lost her freedom when she was just 14 and had to get married. However, after all the development from the 1970’s till today, the current generation considers both men and women equally powered. Right from the starting, it can be predicted that Suleiman wants to be a man. When baba goes on the so called â€Å"business trip†, Suleiman is the only male in the house making him the man of the house. It is just the way how baba says it every time he leaves – â€Å"Take care of your mother, you are the man of the house now† (61). Suleiman handles these responsibilities very well. He takes care of his mother as he knows very well that she is ill every time baba is not home and wants to take over a men's responsibility of taking care of his mother. He even talks about him willing to take responsibilities like his father and be just like him, a man. Later in the story, we also see the cult of masculinity urge through Suleiman when he and the other neighborhood kids were at Adnan’s house to look at him inserting an injection in himself due to his illness. â€Å"I also prayed for a disease that would give me what Adnan had† (126). Suleiman thinks that Adnan’s disease makes him seem older and more independent like a man. Thus Suleiman wants to have Adnan’s illness so that he too could be like a man. â€Å"I couldn’t wait to be a man† (148). Suleiman’s words prove how he wants to become a man and does not want to fall into kid’s category. However, on the other side, there are still clues given throughout the story that prove how Suleiman has failed to be a man. For example, during the visit of the RCC (Revolutionary Committee Men) to Baba’s house to find Baba and any evidence against him. â€Å"I was wet beneath my clothes and realized what I had done. The pee felt warm and cold and sticky to my skin† (64). When the RCC man had asked him about his father, Suleiman gets scared and pees himself not being able to control him. Even though he was the â€Å"man of the house† this incident proves him as a kid who cannot control himself. Another example was when Najwa tells Suleiman about how Faraj, who she belonged to, and all the other men out there had to puncture his wife’s veil and bleed her to prove his wife as a virgin. â€Å"I didn’t know what Mama meant, but feared that when the time came I might not have what it takes to ‘puncture’ a women† (13). Suleiman fears he might not be able to do the duty that every man is to do to prove his wife a virgin. Even though there are some responsibilities of a man that Suleiman has fulfilled, he still doubts if he will be able to be a real man just like his father was. Najwa, Suleiman's mom, as she like to say, lost her freedom when she was just 14 years old. She had been forced to marry a completely strange man who was 9 years older than her even though she wanted to complete her education first. She being the girl was not even allowed to reject the marriage or even argue to defend herself. The High Council decided my fate† (144). When she says â€Å"High Council† it meant all the males in the house – her father and all her brothers. Here we see that women had no choices but to obey what the males or so called â€Å"High Council† said. Also the only reason why the family to marry Najwa as quickly as possible is because one of her brother had seen her with another guy same age as her at the Italian Coffee shop and so they wanted to get rid of her before someone can spread rumors about them and ruin their reputation. In a family like Najwa's, members cared more about the family's reputation then ever caring about a woman. She remembered her grandmother say to her â€Å"If a slave came to propose, a slave as black as this night, I would give you to him†(144). This definitely proven that girls/women did not have any right to speak up for themselves. They were just there to keep their men happy and follow their orders. After the â€Å"Black day† – day she got forced to marry baba, her life has not changed very much. She is only there to keep baba happy since he is the man of the house. When baba is away she is ill. She starts drinking alcohol as a symptom of depression due to the freedom she has lost. And when baba returns, she dresses up good to please her man. â€Å"During those nights, when Baba was home, Mama dragged her blanket behind her to the sofa† (85). She does not like to sleep in the bed with Bu Suleiman even though he is her husband. However if the man demands something then she could not reject him. She is basically like a slave of the man in the house. For example, the marital bed scene describes what she has to do for her man. â€Å"I saw him on top of her†¦. she lay beneath him, unmoving, looking away†(86). Also, the only role of women seen in the book is â€Å"A women had to be young and strong enough to bear children and serve the man well into his old age† (151). This definitely proves how women did not have the rights to express them self, were treated like slaves and their only role was to obey their man. Therefore, it could be concluded that the Cult of Masculinity has a huge impact on Suleiman and Mama. Males are always considered the higher authority in a family. It changes the way how Suleiman thinks and how Um Suleiman – Najwa losses her rights to live her life the way she wants to. However, it still concerns me why women were treated so unequally compared to today. Today the women do not just have to take care of their family but can also work in any type of career they want to, while being treated equally as men.

Saturday, September 28, 2019

Research Methods Essay Example | Topics and Well Written Essays - 1000 words

Research Methods - Essay Example An effective research process is characterized by detailed basic steps undertaken with caution to prevent errors that can affect the results. The first step is identifying the research problem. The problem is normally the issue being identified by the researcher or a concept that requires more information or clarification (Blankenship 2). Research problems are normally the common issues that affect the community and form the focus of the whole process. The second step involves the review of literature which enables the researcher to learn more about the problem under investigation. Reviewing documented literature about the problem provides the foundational knowledge that shapes the whole process. Literature review informs the researchers on how the earlier studies related to the research topic were conducted and the conclusions earlier formulated. The knowledge attained through literature review guides the researcher when narrowing down the research topic and clarifying the problem. The third step is clarification of the problem whereby the scope is narrowed down from the broad initial topic. The concepts gained through literature review offer guidance on the relevant topic under focus by addressing the stated problem. After clarification of the problem, the researcher should define the terms and concepts applied when describing the study. This helps in minimizing the confusion that may emanate from the readers of the study. This is because the interpretation differs depending on the person reading the project. Definition of terms and concepts should be followed by the definition of the population or group to be involved in the study. The research question and study purpose determine the population. Defining the population enables the researcher to know the population they are supposed to deal with and the target group. Once the population is identified, the plan for the study is developed. This serves as the framework for the entire study. Data is then collect ed among the identified population. Data collection involves surveys, questionnaires and observation of literature (Blankenship 2). The stated steps provide data that undergo analysis to answer the research question. Data is analyzed according to the stated instrumentation plan. Analysis involves breaking down the notes into categories of topic themes and making a decision on how these categories relates to the theme. The researcher identifies the loopholes in the research process and repeats the process to look for any missing information. The information is then synthesized through refining the thesis in relation to the earlier information compiled and read in the literature review. The results are reviewed and summarized according to the research questions. This is occasionally followed by communication or presentation of the results. The research should be communicated in the format required by the professor with proper use of citations to avoid plagiarism. Research process enab les researchers to inform action. The defined steps also negate any loopholes that may result to errors and eventual distortion of the conclusion drawn. Explain the Advantages and Disadvantages of Adopting the Case-Study Research Design. ADVANTAGES Case study is used to build upon the existing theory, formulate a new theory or challenge an existing theory. This provides the foundation for applying solutions to problems or during the description of a phenomenon. Case study is a

Friday, September 27, 2019

Using Cell Phones While Driving Term Paper Example | Topics and Well Written Essays - 2250 words

Using Cell Phones While Driving - Term Paper Example According to the same survey (Britt, 2005), those driving and talking on cell phones responded slower to brake lights by an average of 18% and 17% took a longer time to regain speed after braking for a light. It has also been noted that the hands free cell phones cause the same, slower responses among those that are driving and don’t lead to safe roads that can be driven on (Britt, 2005). The problem with using a cell phone while driving is now not only applicable to talking to others while on the road. Text messages, adding in music and the distractions from the cell phone are all adding into problems that are associated with those who are driving on the road and that are multi-tasking while driving. To change this, there are new laws that are trying to be passed, specifically because of the adverse effects which this has. However, the laws and the regulations by officials have not changed the number of individuals that use a cell phone on the road for any purpose, leading to more danger to those that are on the road and continuing to lead to accidents because of the lack of bans that are reinforced by officials (GHSA, 2011). Relationship of Cause and Effect The cause of using cell phones while driving is considered because of the association with needing to talk to others, communicate or update individuals while on the road. ... The use of cell phones on the road is one which may be more applicable while waiting at a stop light, going through slower traffic or driving through roads which are already known to those that are driving (Strayer, 2001). The cause of using cell phones while driving among the age group of 20-30, which is known as more likely to use phones while driving, is most likely specific to the need to communicate with friends, family or the work that one is involved in. The hectic lives that most lead at this age make the driving time the easiest to catch up with the communication that is needed. The knowledge of the road and the ability to multi-task while driving is one of the ways that most in this age group are trained, specifically with the understanding that doing more than one thing at a time is acceptable. The rise in technology has led to the behavior of multi-tasking and makes the cell phone use while driving natural. Even though there may be a natural tendency to use cell phones wh ile driving because of the multitasking which takes place, there are also other variables which are considered with this. The effects which occur lead to being over stimulated in specific conditions. If one is driving on a road that doesn’t have as much traffic or which doesn’t require as much attention, then the cell phone speaking may seem applicable. However, extra stimulations and interference from other coming traffic, changes in the road and the consequences of paying more attention to the phone than the road lead to the crashes and injuries that have been reported. The effect is from the stimulation that occurs which doesn’t allow one to respond quickly enough when speaking on a cell phone, showing that the

Thursday, September 26, 2019

Western And Byzantine Civilizations Essay Example | Topics and Well Written Essays - 750 words

Western And Byzantine Civilizations - Essay Example The eastern part of the Roman Empire achieved greatness as the Byzantine civilization, which saw its days of glory during the rule of Justinian and Theodora. Eastern Orthodoxy was the dominant religious belief and a new imperial law was devised, which resulted in a unified imperial Government, unlike the fractured tribes of the Western civilization. The government was also centralized and under the rule of Justinian, art reached new heights since several new buildings and churches were built.  The first document dealing with this period is a piece written by the Christian priest Salvian, which compares the Romans and the Barbarians and finds that the barbarians have superior moral values. This document is titled â€Å"Of God’s Government† and is found in the book titled â€Å"Readings in European History† Vol 1 by James Harvey Robinson, published in 1904. The priest compares Roman customs to those of the barbarians and points out that the barbarians, despite th eir record of cruelty and sin, appear to demonstrate the values of love, kindness, and charity which the Romans ought to have. The Romans, on the contrary, persecute each other and the enormity of their sin is doubled because they are supposed to be civilized individuals. On this basis, the priest concludes that the moral framework of the barbarians may, in fact, be superior to the Romans.  The second document is written by the court historian and biographer Procopius. The article is titled â€Å"The character and innovations of Justinian and Theodora† and appears in the book titled â€Å"The secret history of Procopius† published in 1927 by Crown Publishers. In this article, Procopius presents a critical view of Justinian and Theodora. He points out the differences in the Roman manner of greeting where the dignity of high officials was preserved, while Justinian and Theodora demanded a more slavish form homage.

Wednesday, September 25, 2019

Therapeutic Nursing Interventions Research Paper

Therapeutic Nursing Interventions - Research Paper Example Nursing is a field that involves dealing with a large number of people and thus, communication is a key factor at work. However, it is through communication that the nurses get into conflicts with one another and with the patients (Morrell-Stinson, Abraham,  & Bolliger, 2012). Statement of the Problem The clinical problem here is conflict among the nurses and with the patients. While working, nurses tend to disagree about many things concerning work. In my environment nurses engage in issues such as stubbornness, failure to adhere to the right clinical ethics, and failure to follow the set rules and regulations. Therefore, this raises conflicts since the head officers will not agree to some of the behaviors displayed (Morrell-Stinson et al., 2012). The work environment also contributes to conflicts among nurses. For instance, in an environment where the laboratory equipment is few, nurses may get into a conflict over the use of such instruments. However, this will also depend to th e way in which the environment is organized. In an environment where duties are not well allocated to the nurses, the conflicts are bound to increase (Bjork,  1995). Since nurses are always working together, differences in personalities also contribute to conflicts. Each nurse has his or her own personality, which may be different from that of another nurse. This way, disagreements may be on the increase if two different personalities cross paths. In my environment, the issue of poor qualifications also contributes to conflicts both among the nurses and with the patients (Bjork,  1995). Conflicts with the patients occur when patients feel that the nurse does possess efficient skills in the field. On the other hand, conflicts with other nurses arise when a nurse performs a particular duty in the wrong manner. Therefore, the problem of conflicts in the nursing field can be faced in different ways. This is a clinical problem in my environment because many nurses have performed poor ly at work due to the issue of conflicts with their colleagues and patients. In addition, conflicts with patients have also caused loss of lives of many patients. This can be mainly explained by the fact that conflict resolution methods in my environment are very poor (Stanton,  2012). The reason why I chose to investigate this problem is because the issue has become a key subject of discussion since it is causing many losses among nurses and patients. For instance, conflicts have caused many nurses to lose their jobs and even their licenses. On the other hand, patients have also died due to chaos among the nurses in clinics. Therefore, this is an issue that needs immediate attention before it causes more losses. Increasing conflicts can also be attributed to the increasing diversity among people. For example, in the United States, clinical facilities are composed of nurses from different races and cultures. Therefore, the workplace consists of people with different cultural value s and thus, they have to learn how to tolerate one another’s values in order to stay in harmony. Current Clinical Practice In the current clinical setting, diversity is the key cause of conflicts and thus, nurses have to find a way of accepting and appreciating one another. The key mechanisms used in the current clinical setting include application of policies and regulations that should be followed at the workplace. However, in most cases these regulations do not

Tuesday, September 24, 2019

Global blog project Essay Example | Topics and Well Written Essays - 1000 words

Global blog project - Essay Example Previous Knowledge With the increase in communication between the Generation Y through social networking and the internet, word-of-mouth has greatly changed the marketing and advertising landscape. Television is fast becoming an obsolete advertising medium for Generation Y. Thus, Marketers have to evolve their practices of market segmentation and targeting in order to develop a brand or a campaign that is accepted by Generation Y. Methodology I plan to discuss the changes in advertising medium and the changes that marketing teams have to make in order to cater to Generation Y. Genre 1: Blog The following blog provides a good insight to marketers regarding the psyche of Generation Y and advertising tactics that marketers could consider: Summer Lovin' For Gen Y with Live Concerts and Mobile Marketing We (referring to the audience in general or specifically potential marketers) all know that no demographic is changing as quickly as the coveted Gen Y demographic.  We also know that for a growing number of brands, they're the segment that is not only the most important, but also the most difficult to engage. But what marketers may not know is that experiential marketing is the best and surest way to reach this elusive set, especially this summer.   Between concert festivals, outdoor sporting events, travel and the general excitement that comes from being "out for summer," the coming months are the perfect time for marketers to get out and about themselves, engaging with these consumers face-to-face. Gen Y now numbers more than 60 million. They're around town, leveraging social media and taking control of every second of their lives and most importantly they are on mobile. This summer they'll tune into whatever they want as easily as they'll tune it out. As a result, brand marketers around the world are retuning how they go to market. There are some interesting stats from a recently conducted a survey with the Event Marketing Institute, surveying several thousand Gen Y consumers. The results are surprising and would help to shape marketing plans as marketers try to reach this elusive demographic.   94% of Gen Y consumers say they would be more likely to buy a product as a result of a good experience at an event. Think about it. If someone went to a concert for an up-and-coming pop star and left wanting more, they would be more likely to buy her CD or download her single, right? But creating that "good experience" is no easy task  Ã‚   MillerCoors understands this and is ramping up mobile at every turn. Gen Y'ers is the first generation that has grown up with the internet as a normal part of everyday life and now the web is in their hands 24/7. In fact, almost half of those surveyed have posted something (a photo, a status update, a Tweet) from or during an event. Because of this proliferation of technology, Gen Y presents a different set of challenges for marketers. Marketers in all brand categories need to plan campaigns that connect w ith consumers, whether they're live or on mobile or both at the same time, and the experiences have to reach consumers' minds. Clearly, marketing to Gen Y is still a tough audience to completely crack. To succeed, marketers need a new rulebook. Here are four rules for ensuring experiences make the critical connection to the Gen Y consumer: Let them in. And we mean all the way in. It is common knowledge that savvy brands use experiential marketing to create ongoing dialogues with consumers. What one might not know is that those conversations now give

Monday, September 23, 2019

The theory of Max Weber Essay Example | Topics and Well Written Essays - 1250 words

The theory of Max Weber - Essay Example The theory of Max Weber Such an organization will always be considered effective and will have a stable and legitimate authority with proper relationship between the leaders and the followers (Weber, 25). According to Max Weber, there are basically three types of authority in existence: traditional, rational-legal and charismatic. Traditional authority is derived from an established set of beliefs, customs and traditions whereby those upon which the authority is vested have the command to exercise it. This type of authority exists majorly in patrimonial systems and feudalistic societies where it is mostly handed down from one generation to another. One important factor in this type of authority is the acceptance of the followers to obey the authority without which the authority cannot exist. On the other hand, rational-legal authority is basically derived from a belief in the legality and hierarchy in existence. It is mostly realized in bureaucratic systems and in formal structures where people are expected to follow a given set of rules and regulations set forth (Miles, 112). Charismatic authority on the other hand arises out of the exceptional nature of individuals, their heroism or exemplary aspects in their character which grants them many followers especially in time of crises. . In modern administrative structures, it is traditional authority and rational-legal authorities which can provide proper administrative structures. In formal organizations, people must follow the set of rules and obey their seniors at work. Formal structures formed on the basis of charismatic authority must evolve properly in order to be successful. This involves the adoption rational-legal authority for proper administrative structures. With his theory of scientific management, Fredrick Taylor actually pioneered the scientific approach to management. Towards the end of the nineteenth century, Taylor was totally dissatisfied with the manner in which human organizations were managed and totally dedicated his time and energy on how this could be improved. He therefore pushed for a shift from the conventional style of personal management to a new style of scientific management. In personal management, the leader of the group was expected to be exceptionally bright in order to manage effectively (Taylor, 25). However, under scientific management, a group of ordinary people could perform better than the bright captain if they applied a scientific approach. He advocated for the training of employees in an organization to follow a given set of behavior rather letting them work at their discretion. In this regard, the spirit of cooperation was very important as it ensured proper working relationship between the management and the workers. Indeed such a situation was hitherto unknown in the organizations of that time. According to Taylor, the workload had to be effectively shared in the organization with the managers conducting the scientific work of instruction while the workers focusing o n the provision of labour. In this case, there is less wrangles in the organization as long as each party diligently performs their duty. In modern organizations it is realized that the scientific mode of management as described by Taylor greatly helps in creating authority and legitimacy. Organizations are headed by leaders who are expected to apply science in managing the employees. On the other hand, employees should follow the instructions of the managers in order to create order

Sunday, September 22, 2019

Forensic science Essay Example | Topics and Well Written Essays - 750 words

Forensic science - Essay Example 165) This is essential because it ensures the integrity of forensic science before proceeding to the court. Even though, the clinical laboratories have been working based on the national regulatory scheme since 1968, forensic science does not a similar scheme (Neufeld 2005 p. 107). Consequently, this has reduced the level of protection for the evidence and measures to investigate, and address the discovered abuses (Moore 2007, p. 127). Quality assurance is an important concept that should be considered during crime investigation because most criminal trials depend on expert testimony. Consequently, mistakes in the expert testimony pose several challenges. The use forensic science when investigating different criminal incidences is not reliable because it offers invalid results. Additionally, the process is biased because it lacks enough internal control for the evidence (Birkhead & Hosken 2009, p. 575) Semen quality assurance refers to the test conducted in the crime laboratories usi ng the victims’ semen to determine whether the victims were involved in crime or not. Currently, there are different methods used in the measurement of semen quality assurance. The most applicable methods include serology and DNA typing (Higgins 2009, p. 45). These methods can be applied in a criminal case to determine whether the suspect is responsible. ... Furthermore, the girl’s bed sheets with scattered hair were also collected. After the victim described the perpetrator, the police came up with a sketch that resembled the suspect. The victim identified the suspect as the rapist once they got to his hideout (Neufeld 2005, p. 107). Serology can determine the victim’s semen through the quality assurance approach. This can support the prosecutor when securing a conviction. The lab serologist will take the girl’s body fluid found in the semen and test whether they match with the accused blood type. Scientific standards discourage serologists from drawing inferences about the semen’s source when they are not sure though this method is commonly used when investigating crimes (Ishmael 2005, p. 13). Based on the case, crime laboratories can use DNA typing method to match whether the semen recovered from the girl’s underpants match the DNA profile of the suspect. This criminal investigation process is not re liable because DNA experts states that only 20% of the total violent crimes benefit from the evidence resulting from DNA testing. This is because most of the forensic discipline applying the DNA method lacks the needed scientific dimensions that support the performance standards (Jeyendran 2003, p. 127). It is essential to consider the application of good forensic science in DNA typing method. This is because forensic scientists discovered lab misconduct in arresting, indicting and convicting an innocent person. Criminal cases that include forensic science investigations should take meaningful precautions to guard against meaningless science and unreliable results (Bjorndahl, Mortimer & David 2009, p. 17). The forensic scientist should ensure that before they walk into the

Saturday, September 21, 2019

Nightmares. The moment of terror Essay Example for Free

Nightmares. The moment of terror Essay The moment of terror you feel when being chased by a masked killer, running for your life through a dark alley. You cry out and scream for help but no one can hear you. You fall, and before you know it, the masked killer is standing right in front of you. He pulls out an axe and you wake up drenched in sweat, realizing it was all just a nightmare. We all have experienced this moment, maybe more than once. Nightmares can be very disturbing because it is hard to understand what produces it and why it acts a certain way. Nightmare is defined as a dream during the rapid eye movement, which provokes intense negative feeling, such as panic, fear, terror, or anxiety. Everyone has experienced a nightmare one time or another in his or her lifetime. But what happens when nightmares start occurring constantly? The fact is more children experience nightmares more frequently than adults. It is estimated that 50 % of the population does not experience nightmares, according to research done by Tucker Shaw. Approximately 5 to 10% of the population only remembers nightmares once a month, but only small percentage of the population remember nightmares that are disturbing enough effect their lives. According to Freud, the first psychologist who paid much attention to dreams, stated that nightmares occur based on painful experiences of the past, to startling events that occurred in childhood and even birth itself. These alarming memories of the past left behind psychic problems that an helpless infant could not solve in that given time period. In fact, any grieving experience may leave a nightmare sufferer in angst and guilt. In this perspective, built is associated with the energy used for repetition of undesirable thoughts occurring in both real life and dreams. A person constantly dreams about â€Å"unfinished† situation until that person is able to work through their guilt or angst. Freud called this situation a repetition compulsion. This pattern was also portrayed in Shakespeare’s Macbeth. When Lady Macbeth wants Macbeth to kill the kind, first she does not feel any guilt for committing such a sin. But her guilt occurs itself in a nightmare, which makes her go insane. A physical illness can also cause nightmares, but it is not yet proven whether it is the illness or the stress that causes it. Neurological disorder can also be the cause associated with the occurrence of nightmares such as epilepsy and postencephalitic Parkinsonism. Stressful events in a person’s life such as time of midterms/finals, jobs, moves, or the loss of a significant, can all produce nightmares. One proven generalization of nightmares is that it always leaves a person feeling helpless. In frequent nightmares that involve getting chased by masked killer, or falling off a cliff, generally leaves the dreamer in distress and feeling powerless. A decrease in nightmares usually occurs as a dreamer becomes more confident, and more mature. There are some myths about nightmares that are associated with demons or evil spirits that can be the cause of these unpleasant dreams. Some people believe that a person feels an anxiety attack when a demon is pressing up against a dreamer’s chest during their sleep. These anxiety attacks occurring during sleep were considered a form of black magic, or even affiliated with possession. Some people also believe that eating something distasteful before going to sleep maybe also be the cause of it, but there isn’t any solid evidence for these myths. In psychology, there are different perspectives to nightmares. Some scholars believe that nightmares have no actual function. However, others believe that nightmares reflect the actual fears and attitudes of the dreamer. In this study, a nightmare appears as a process of events that occurred during the day. Latest study proves that dreams do have an important function. â€Å"Evidence suggests that dreaming, like most other physiologic events, is important for learning and memory processing, gives cognitive feedback about a person’s mental functioning and helps a person adapt to emotional and physical stress† (Moffitt, 1993, p. 118). The themes of nightmares seem to be quite universal. These nightmares have symbolic interpretation and show the part of personality where a problem most likely exits in real life. It seems as if nightmares have complex function. References Nightmares. 123HelpMe.com. 30 Sep 2013 . Time life books. Dreams and Dreaming. 1990 Time life Books Inc. Tucker, Shaw. Dreams. New York: 17th Street, 2000.

Friday, September 20, 2019

UK grocery market

UK grocery market ‘‘Co-Operative Foods Market Segmentation and Brand Positioning Grocery Market Overview Market Structure The Co-Operative Group The Co-operative Foods Segmentation Market Segmentation Consumer Market Segmentation Target Marketing Co-Ops Target Market Brand Positioning Marketing Mix (4Ps) Co-Ops Brand Positioning Co-Ops Brand Strategy 4 4 4 4 5 5 5 6 6 6 6 7 7 8 9 10 Executive Summary The Co-Operative group is in UK market for over 150 years and operates across the food, travel, funeral, pharmacy and banking and insurance sectors. It has 4.5 million members and around 5,300 retail outlets. This report provides an analysis and evaluation of the strategy adopted by Co-Op in order to target the consumers and market. It also explores the brand positioning of Co-Op in the grocery retail market in accordance with the consumer demands. In order to do this analysis market segmentation framework is used to separate the target market into groups and by keeping the Co-Ops ethical and fairtrade principles in mind. Brand positioning strategies adopted by the Co-Op food were identified by using the marketing mix framework (4Ps). It is found that Co-Op is having intense pressure from its rival Tesco and Sainsburys who are growing rapidly into the convenience retailing. Although Co-Ops profits are gone up as compared to recent years but there is still room for improvement. 1.0 Grocery Market Overview 1.1 Market Structure The UK grocery market is mainly dominated by the big fours who have acquired almost 64% of the market share and of which Tesco is holding the 30% of the market share (Mintel 2009) and it also shows the oligopolistic nature of the market. The grocery market players have divided their customers into two groups: primary shoppers and top-up shoppers , and according to Mintel (2009) the primary shopping is dominated by big fours (Tesco, Sainsburys, Asda and Morrisons) plus Waitrose who are sharing 80% of the market share. The UK is through its worst ever recession which has also affected the grocery retailers and lead to change their strategies. According to Keynote (2009) the ‘hard discount strategy was adopted by most retailers in last two years which was quite successful. Another strategy adopted by the supermarket retailers is to diversify their chains in rural areas in form of convenience stores in order to targets people who have a little access to supermarkets (Mintel 2009). 1.2 The Co-Operative Group This is UK base co-operative established in 1863 and it is quite diversified organization which mainly operates through its two divisions: trading and financial services. The Co-Operative group is well known for its ethical nature and fair trade principles which reflects within its organisation and differentiates it from its competitors. The Co-operative Group operates across the food, travel, funeral, pharmacy and banking and insurance sectors. It has 4.5 million members and around 5,300 retail outlets 1.3 The Co-Operative Foods The Co-OP food operated in UK through its 2223 food stores which can be found in two formats: convenience stores and small/ medium sized supermarkets (Data monitor 2008) The Co-Op food lies on the 5th place in grocery retail market with 8% shares, thanks to its merger with Somerfield in July 2008 (Mintel 2008). The Co-Op used to be the UKs largest grocery retailer in 1960s and through Somerfield acquisition it will be able gain this position again in neighbourhood market. According to the Telegraph (2009) Peter Marks, chief executive of the Co-op said that: ‘‘the move from the big four UK retailers Tesco, Asda, Sainsburysand Morrisons- to a big five including the Co-op will further boost competition for UK consumers. The Co-Op targets its consumers through its ethical and fare trade approach which is the main emphasis of the Co-Op group as stated above. The key strategy adopted by Co-Op is ‘be local act local but in recent years they are having intense competition from Tesco and Sainsburys who are extended their business in convenience sector and grow rapidly. 2.0 Segmentation According to Jobber (2004) the ways in which individuals and organisations with similar characteristics were put together that have significant implications for the determination of market strategy is called market segmentation. 2.1 Market Segmentation Each buyer can act as a potential separate market due to its unique demands and needs (Kotler 2005). It depends on companies to either follow this approach or not, companies can practise no segmentation (mass marketing), complete segmentation (micromarketing) or something in between (niche marketing) according to Kotler (2005) The Co-Op food is following the micromarketing approach rather mass marketing which has its own drawbacks. Kotler (2005) says that the micromarketing is a way of tailoring products to suit individuals according to their taste and needs. Through these criteria (Co-Op) it is targeting the local market by keeping them in convenient locations and addressing the key ethical issues. Although with the merger with Somerfield in July 2008 (Mintel 2008) they got some medium sized super market in their camp but the main focus is still the ‘c-store format. 2.2 Consumer Market Segmentation As Kotler (2005) stated that there is no single way to segment a consumer market. A marketer has to try different segmentation variable either alone or in combinations. These segments can be divided into four groups: * Behavioural Segmentation * Psychographic Segmentation * Geographic Segmentation * Demographic Segmentation The Co-Op is mainly targeting the behavioural and psychographic consumer segments. Through psychographic approach it is targeting the consumer on the basis of their social class, lifestyle as well as their personality through its ethical and organic food products. On the other hand through behavioural segmentation it is targeting peoples loyalty, their usage rate and attitude towards its product range. 3.0 Target Marketing Choosing a specific segment to serve in a market is called target marketing (Jobber 2004), also firms need to segment the market and target that segment in order to work effectively. 3.1 Co-Ops Target Market The segmentation strategy is been adopted by the Co-Op Food in order to remain competitive in the market. The Co-Ops target market is given below: * Neighbourhood market * Ethical market * Fair trade market * Top-up shoppers These above mentioned areas are the key segments targeted by the Co-Op, as it mainly operates in c-store format and it emphasis on providing fresh food products by targeting the local market and by keeping its ethical dilemma and fairtrade principles in mind. There is another important segment it targets is top-up shopping market, through this area Co-Op gets the opportunity to gain customer and introduce them to their ethical principles. 4.0 Brand Positioning 4.1 Marketing Mix (4Ps) The marketing mix model which is also known as 4Ps is used as a tool by marketer in order to implement the market strategy. The 4Ps are: * Product * Price * Place * Promotion Product: Co-Ops product offering is pretty simple, it has fairtrade products, organic products and also simply range which targets almost all segments of the market on the basis of quality and ethics. According to Mintel (2009) the most of the supermarkets have the good-better-best product range but Co-Op is so far concentrating on the better and best product range. Few of the key brand product offered by Co-Op are mentioned in table2. Price: At Co-Op the price is a big issue at Co-Op which can be expected at a convenience store but its their ethical stance which keeps the prices high too. But in order to remain competitive Co-Op offers range of discounted products and through its loyalty cards it gives an opportunity to get points against spending which can be used for further shopping at store. Place: This is the most important part of the strategy adopted by Co-Op through locating its stores at convenient and accessible places. As reported by Mintel (2009) the first criteria by C-store shopper is the location rather than price. Due to its convenient placement of stores Co-Op provides child friendly and time friendly environment right in the heart of community for its customers who find out of town shopping time consuming and stressful. Promotion: The current slogan by Co-Op is ‘Good with food. Other initiatives include the ‘Green dot scheme, highlighting healthy products. Mainly Co-Op promote its brands through local radio and TV and also by donating in local community projects 4.2 Co-Ops brand positioning According to Mintel (2009) the key rule followed by the Co-Op is getting into the market with bigger brand prospective which weve seen by the acquisition of Somerfield. Through this merger, Co-Ops gone bigger but still theyve opted to remain in the heart of local community by acting as local convenience store. And this message is conveyed by the Somerfields brand message ‘Britains favourite local grocer. 4.3 Co-Ops Brand Strategy The Co-operative Group has adopted strong brand strategy in order to sustain the market shares. As stated by Mintel (2009) its brands lie on the basis of * ethical credentials * environmental issues * local sourcing * Fairtrade. This is underlined by Mintels consumer research, with the Co-ops customers the most likely to buy locally sourced and Fairtrade items. In order to become a responsible retailer Co-Op launched it Ethical Food Policy which resulted because of good response from its 250,000 members. As result Co-op switched all of its premium meat products with RSPCA Freedom-food label (Mintel 2008). Simply value brand is also a replacement for every range and actually it is a Somerfield brand 5.0 Conclusion Although Co-Op operates through its large number of small stores by targeting different location and consumer groups but the average foot fall in some of stores is relatively less (Mintel 2008). As it is facing intense pressure from supermarkets in order keep the prices at a competitive level which is quite difficult as it is operating on such a large scale and operating cost are high. The main problem is that Co-Op is not seen as a shopping destination for majority of consumers and they treat it is as top-up store which nearby and available most of the time. A recent study by Mintel shows that only a significant percentage of people take ethical issues seriously while they shop. For them fairtrade and organic food are just another premium line on the shelf and the price factor restrict them from buying. Mintel (2009) shows an improvement in fairtrade sale but it seems organic products are struggling to keep up sales target during recession. It is clear that Co-Op is facing intense pressure from its rivals but it has improved a lot through merger and rebranding strategy. Its profits are record high as compared to last 10 years. More and more people are getting awareness of ethical approach adopted by Co-Op and it shows the significance of Co-operative food in the intense market environment. 6.0 References * Data Monitor (2008), Company Profile: Co-operative Group Limited, June 2008, London: Data Monitor. * Jobber, D. (2004), Principles and practice of marketing, 4th Edition, Berkshire: McGraw-Hill Education. * Hall, J. (2008), Co-op swoops on Somerfield in  £1.56bn deal, Telegraph.co.uk, 16th July. * Kotler, C. (2005), Principles of marketing, 5th Edition, Essex: Pearson Education Ltd. * Keynote (2009), Market review Food Catering, Jan 2009, 19th Edition, Keynote Publishing Ltd * Mintel (2008), Mintel market report- Food retailing, November 2008, London: Mintel. * Mintel (2009), Mintel market report- Convenience retailing, September 2009, London: Mintel. * Mintel (2009), Mintel market report- Food retailing, November 2009, London: Mintel. [http://academic.mintel.com/sinatra/oxygen_academic/search_results/show/display/id=395621/display/id=496165/display/id=496171#atom2] accessed 10/12/09 * Mintel (2009), Mintel market report- Food retailing, November 2009, London: Mintel. [http://academic.mintel.com/sinatra/oxygen_academic//display/id=395621/display/id=496166] accessed 05/12/2009

Thursday, September 19, 2019

Cyberlaundering: Anonymous Digital Cash and Money Laundering :: essays research papers

Cyberlaundering: Anonymous Digital Cash and Money Laundering Copyright 1996 R. Mark Bortner The author hereby grants the right to copy this article in its entirety or any portion thereof by any means possible and to distribute such copies freely and without charge. The author simply requests that when a portion of this article or its entirety is included within another work, that such copied material be clearly and correctly cited to. Presented as final paper requirement for Law & the Internet (LAW 745). A seminar at the University of Miami School of Law. Introduction This article will explore the latest technique in money laundering: Cyberlaundering by means of anonymous digital cash. Part I is a brief race through laundering history. Part II discusses how anonymous Ecash may facilitate money laundering on the Intenet. Part III examines the relationship between current money laundering law and cyberlaundering. Part IV addresses the underlying policy debate surrounding anonymous digital currency. Essentially, the balance between individual financial privacy rights and legitimate law enforcement interests. In conclusion, Part V raises a few unanswered societal questions and attempts to predict the future. Disclaimer: Although the author discusses this subject in a casual, rather than rigidly formal tone, money laundering is a serious issue which should not be taken lightly. As this article will show, fear of money laundering only serves to increase banking regulations which, in turn, affect everyone's ability to conduct convenient, efficient and relatively private financial transactions. Part I Humble Beginnings In the beginning, laundering money was a physical effort. The art of concealing the existence, the illegal source, or illegal application of income, and then disguising that income to make it appear legitimate 1 required that the launderer have the means to physically transport the hard cash.2 The trick was, and still is, to avoid attracting unwanted attention, thus alerting the Internal Revenue Service (IRS) and other government agencies 3 involved in searching out ill-gotten gains.4 In what could be described as the "lo-tech" world of money laundering, the process of cleaning "dirty money" was limited by the creative ability to manipulate the physical world. Other than flying cash out of one country and depositing it in a foreign bank with less stringent banking laws,5 bribing a bank teller, or discretely purchasing real or personal property, the classic approach was for a "smurf"6 to deposit cash at a bank. Essentially, platoons of couriers assaulted the lobbies of banks throughout the United States with deposits under the $10,000 reporting limit as required under the Bank Secrecy Act.

Wednesday, September 18, 2019

Anglian and Anglo-Scandinavian Settlement at Cottam :: Medieval Archaeology Essays

Anglian and Anglo-Scandinavian Settlement at Cottam Excavation of the Anglian and Anglo-Scandinavian settlement at Cottam B (NGR 49754667) continued in July 1995, directed by Dr J.D. Richards for the Department of Archaeology, University of York. Work focused on a possible 10th-century settlement focus, c.200m NE of the 8th/9th-century site investigated in 1993. Two Norse bells, a 10th-century spearhead and a Jellinge-style brooch had been recovered from this area by metal-detector users, and field-walking had yielded Torksey-type ware sherds. Aerial photographs showed very few crop-marks in this area, although a magnetometer survey was conducted in Spring 1995 and revealed several ditched enclosures either side of droveways. The purpose of the 1995 excavation was to: - evaluate the survival of evidence in this area and investigate the reasons for the lack of crop-marks; - test the theory that this site represented a localised settlement shift from the SW; - characterise the nature of settlement in this area. A trench 20 x 100m was cut across the entrance, a central trackway, and parts of at least two enclosures. This revealed a massive ditched entranceway with an internal rampart and substantial wooden gate structure. At this point the ditch was at least 1.5m deep by 2.5m wide with a rampart behind it, although elsewhere the trackways and enclosures were defined by shallow ditches, less than 0.5m in depth. It appears that the main purpose of the entrance was for display rather than defensive purposes. Traces of several post-built structures were discovered within the enclosures, although truncation by ploughing had removed all occupation deposits and continues to make it difficult to define coherent building plans. The lack of crop-marks was demonstrated to be the result of the shallow nature of most of the features, many less than 0.1m deep, making them visible to magnetometry but not affecting crop growth. Several structural features were identified however, including a possible quarry pit and several industrial features which yielded large quantities of fuel ash slag. The finds recovered included two late strap-ends, one conveniently from a post-hole, as well as a number of dress pins, and a finger ring decorated with ring and dot ornament. The pottery, including York-, Torksey- and Maxey-type wares, attests to a range of trading contacts, both N and S of the Humber. This is in stark contrast to the 8th and early 9th century focus, which was apparently aceramic.

Tuesday, September 17, 2019

Analysis of Cracker Barrel Old Country Store Inc. :: Restaurants Business Management Essays

Analysis of Cracker Barrel Old Country Store Inc. For the last thirty years, Cracker Barrel Old Country Store, Inc. has been offering people on the highways of America an alternative to the fast food pit stop. Their restaurants serves home-style food, has quality gift shops and, most of all, a friendly and accommodating environment all go in to create a welcoming atmosphere. Making the guest comfortable is what makes them different. The waiters and waitresses let you take your time. You are seated and promptly drink orders are taken. They give the customer sufficient time to gaze over the menu. There are peg games on the table to occupy you or your young ones. If it is a game of checkers you wish, there is always a table in the corner ready to play. The main consumer characteristic that Cracker Barrel Old Country Store sets their standards on is â€Å"Pleasing people†. (Etzel, Walker, Stanton. 2001 pg. 204) A review of the Cracker Barrel Old Country store states, â€Å"This restaurant has a combo of good food, good service, and atmosphere. The gift shop is trendy, and affords one a place to browse. Do your browsing after the meal, for service is fast and efficient. One dines among country antiques that serve as decor. The country plates are a delight, and one must try the daily specials. Don't order dessert if you're not hungry. The blackberry cobbler and lemon icebox pie are superb. This is home cooking with affordable prices and great atmosphere.† (http://stlouis.citysearch.com/profile/3855636) Cracker Barrel stores appeal to both the traveler and the local customer and have consistently been a consumer favorite. Cracker Barrel was ranked as the top family dining chain for the eleventh consecutive year in the 200 0 Restaurants & Institutions magazine "Choice in Chains" annual customer survey. It was also named â€Å"Best Family Dining† restaurant by Restaurant & Institutions magazine for the tenth consecutive year. The R&I award is based on a national consumer survey that evaluates chains on seven separate attributes: food quality, menu variety, value, service, atmosphere, cleanliness, and convenience. For 2000, Cracker Barrel scored highest among family dining establishments on every one of the attributes. Cracker Barrel Old Country Store has accomplished the pleasing of people by capturing a bit of the past...back when time seemed to move a bit more slowly, and folks had more time. They have captured a time gone by through their atmosphere, country store, and most of all, through their country cookin'.

Monday, September 16, 2019

“Accounting Procedures in Educational Institution in Banlgladesh

Term Paper On â€Å"Accounting Procedures in educational Institution in Banlgladesh â€Å" North South University (NSU)† Supervised by: Shapon Kumar Paul Associate Professor Department Of Accounting Govt. Bangla College, Dhaka Prepared by: Md. Bellal Hossain Bapari BBA (Honours), 2nd Year. Roll. 9593910 Department. of Accounting Govt. Bangla College, Dhaka. Date of submission: Govt. Bangla College, Dhaka Letter of Transmittal Date. To Supervisor Shapon Kumar Paul Associate Professor Department Of Accounting Govt. Bangla College, Dhaka Subject: Submission of Term Paper Dear Sir,With due respect it is my pleasure to you my term paper on â€Å"Accounting Procedures in educational Institution in Banlgladesh. † I have tried my level best to work sincerely to cover all aspects regarding the matter. Though I have faced some limitations to prepare the term paper due to scarcity of bank. Data, time, limitations. I have really enjoyed the hand work behind preparing the term pape r. I hope you will asses my term paper considering the limitations of study. Your kind advice encourages me to do further work. I shall be highly appreciating you if you kindly accept my term paper.Your kind approval is solicited. Sincerely Your’s Md. Bellal Hossain Bapari BBA (Honours), 2nd Year. Roll. 9593910 Department. of Accounting Govt. Bangla College, Dhaka. Student Declaration I do hereby declare that the term paper entitled: â€Å"Accounting Procedures in educational Institution in Banlgladesh. † submitted in partial fulfillment of the requirement for the degree of BBA (Honours) dept; Accounting, National University under Bangla College Dhaka. I also declare that this whole term paper has prepared by me. Md. Bellal Hossain BapariBBA (Honours), 2nd Year. Roll. 9593910 Department. of Accounting Govt. Bangla College, Dhaka. Letter of Acceptance The term paper title â€Å"Accounting Procedures in educational Institution in Banlgladesh. † Submitted as partia l requirement of BBA program. This term paper has been prepared by Md. Bellal Hossain Bapari, Dept: Accounting BBA program at National University under Govt. Bangla College. This term paper is approved and accepted in quality from. Supervisor †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Shapon Kumar Paul Associate Professor Department Of Accounting Govt.Bangla College, Dhaka Acknowledgement At first I would like to give thanks to almighty Allah who has given me to the opportunity to successfully complete the term paper entitled â€Å"Accounting Procedures in educational Institution in Banlgladesh. † was challenging and interesting program. I would like to give thanks to my honorable supervisor Shapon Kumar Paul for his kind and hearty guidance and close supervisor. It was not possible for me to prepare the term paper properly without his help. I am very much grateful to Mr. Md. Abdus Satter Mazumder. Head of Department), Mr. Md. Jamal Hossain Bhyian Sir. Mr. Md. Jahangir Sir. I am also gra teful to my friends and every one who help to me make the term paper. NSU's Vision The vision of North South University (NSU) is to become a leading university and remain as a top center of excellence in higher education and research. It aims at attracting brilliant students, teachers, scholars, and from all over the world. Mission The mission of NSU is to produce highly skilled manpower, visionary professional leaders and responsible and enlightened citizens.This mission is achieved by imparting high quality higher education, and training, and by conducting useful research so that individuals can achieve their intellectual, social, and personal potentials. NSU is committed to developing human capital by sharpening creative thinking. In addition to creation and dissemination of knowledge, its mission includes promotion of humanism and peace through higher education. As a social institution, NSU endeavors to induce changes for betterment of the society as a whole through public servi ces, and through promotion of ethical behavior and social justice. StrategiesTo fulfill its mission, NSU applies five basic strategies: (1) it offers socially relevant academic programs which meet the changing needs of the students coming from different backgrounds and seeking different career goals; (2) it hires highly qualified and internationally experienced academics to teach the courses / programs it offers; (3) NSU, through a rigorous selection process, admits only those students who demonstrate the potential to pursue and complete the programs of study they select; (4) it provides appropriate physical and electronic infrastructural facilities, logistic supports and an environment conducive to teaching and learning; and (5) it practices the principles of good governance that ensure best management practices and encourage academic freedom and faculty-governance. AccreditationNSU is fully accredited by the University Grants Commission, the only national accreditation authority i n Bangladesh. Its Business School has applied for accreditation of South Asian Quality Improvement System (SAQS), an accrediting agency created by the Hyderabad-based AMDISA (Association of Management Development Institutions in South Asia) with the technical help from EQUIS (European Quality Improvement System, Brussels and AACSBI, USA. The establishment of SAQS was largely funded by European Union. NSU has already got two of the senior Business School Professors trained in how to respond to the SAQS accreditation requirements. The B- School of NSU has almost completed the required Self-Assessment process.It is expected that the necessary Peer Review will be done by SAQS before the end of June 2010. International Recognition The credits obtained at NSU are accepted in most of the reputable universities of USA, Canada, Australia and other countries. NSU graduates are accepted in the Graduate programs of Harvard, Cornell, University of Pennsylvania, and other well-known universities. Eight Economics graduates of NSU are studying for higher degrees at York University, Canada, with scholarship provided by York University. NSU attracts foreign students from India, Pakistan, Sri Lanka, Nepal, China, Japan, Thailand, Myanmar, Malaysia, Sudan, Saudi Arabia, Iran, Kenya and Nigeria.In addition, under the Study Abroad and Group Exchange program, students from world-class universities of the USA and Canada such as Brown University, University of Illinois, Urbana-Champaign, Penn State University, Smith College, Mt. Holyoke College, Windsor University, York University, and other similar institutions attend summer semester at NSU and transfer credits back to their parent institutions. The goal of the University is to provide excellent modern education for students with a view to equipping them with the skill and knowledge necessary to lead the country in its quest for development. Along with this, the University also aims at producing students of high moral standard in its students.Northsouth University (NSU) has the authority, under its charter, to provide instruction to confer Undergraduate and Post Graduate degrees. It has plans to offer MPhil. and PhD programs in all branches of higher studies including engineering, agriculture, language, law and medical sciences. It has also the authority to grant diplomas, certificates and other academic distinctions. It has also the authority to open new Schools of studies and new institutions on its own campus. The University is run by a number of statutory bodies as required under the provisions of the Private University Act, 1992. Table of Contents SUBJECT MATTER EXPERTISE John McPeek, CPA iii Bud Carlson, CPA iii James Skelton ivChristopher Anderson, MBA iv Introduction WHO NEEDS ACCOUNTING POLICIES AND PROCEDURES The Recent Past 1 The Present 2 The future 2 ACCOUNTING BASICS 2 Bookkeeping 3 Accounting 3 Reporting 4 Non-financial data 4 Financial data 4 COMPONENTS OF AN ACCOUNTING SYSTEM 5 Revenue Cycle 6 Order Entry †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 Cash Receipts / Deposits†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 Accounts Receivable†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 Purchase Cycle 6Purchase Orders / Purchasing †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 Cash Dis bursements / Checks†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 Accounts Payable†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 7 Payroll Cycle 7 General Journal Cycle 7 How does posting work? 7 ACCOUNTING TERMS AND CONCEPTS 8 Double-Entry Accounting 8 BASIC ACCOUNTING STRUCTURE 9 Balance sheet 9 Income Statement 10 Basic Accounting Formula: 10 SUMMARY OF ACCOUNTING CYCLES & ACCOUNTING CONCEPTS 12 ACCOUNTING STRUCTURE – ACCOUNTING SOFTWARE PROGRAMS 19 ACCOUNTING METHODS 20Accrual Method†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 20 Cash Method†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 20 Percentage of Completion Method†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 REPORTING STANDARDS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 21 GAAP – Generally Accepted Accounting Principles †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 21 The Matching Principle †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 22 Conformity †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 Valuation †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 Inventory Valuation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 Materiality †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 23 TYPES OF REPORTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 3 External Reports†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 24 Compilation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 Review†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 Audit†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 25 SEC – Audit †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 25 Internal Reports †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 SUMMARY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 Manual Preparation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Tab 2 SECTION 1 INTRODUCTION †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 SECTION 2 INSTALLATION INSTRUCTIONS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 Editing Files †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8 Word Processing (Text) Files†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ File Properties And Style Formats †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8 Printing Files †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9 Technical Support†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 10 SECTION 3 YOUR ACCOUNTING MANUAL †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 11 Style and Format †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 Considerations in writing your manual †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 2 Sources of additional Information†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 13 SECTION 4 EFFECTIVE COMMUNICATION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 15 Communication and Addressing Your Audience†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 Sexism in Writing†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 Number Usage†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 16 Organizing Your Thoughts†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Outlining Technique†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 16 Defining the Format and Organization of Your Manual†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 17 Design Features †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 18 Style and Mechanics†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 18 Sources of additional Information†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 SECTION 5 ACCOUNTING PROCEDURES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 F ormat †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 21 Heading Information †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 21 Title And Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 23 The Body Of The Procedure Statement †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. . 24 Attachments†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 Authorization†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 Production And Distribution †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 26 Revising And Updating Statements †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 26 Accounting Manual †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Tab 3 1. 0 Purpose†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 2. 0 Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 7 2. 1 Responsibility †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7 2. Exclusions†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 2. 2. 1 Internal Auditing †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 7 2. 2. 2 Payroll †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 2. 2. 3 Finance And Treasury †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7 2. 2. 4 Information Systems†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7 2. 2. 5 Security Planning †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 2. 2. Disaster Recovery†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 3. 0 Management Responsibility†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9 3. 1 Accounting Organization†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 9 3. 1. 1 Accounting Department Organization Chart†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9 3. 1. 2 Finance & Treasury Responsibilities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 3. 1. 3 Controller Responsibilities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 10 3. 1. Accounting Staff Responsibilities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 11 3. 1. 5 Operations Staff Responsibilities †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 12 3. 2 Management Commitment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 3. 3 Management Accounting Policy†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 3. 4 Planning †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦. 13 3. 4. 1 Accounting Objectives †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 13 3. 4. Accounting System Planning †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 13 3. 5 Responsibility, Authority, And Communication †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 13 3. 5. 1 Responsibility And Authority †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 13 3. 5. 2 Management Representative †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 13 3. 5. 3 Internal Communication†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 3. 5. 4 Referenced Procedures:†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14G Management Reports Activities 1. 0 Preparation Guidelines 2. 0 Daily Flash Report 3. 0 Weekly Financial Report 4. 0 Six-Week Cash Flow Report 5. 0 Budget Vs. Actual Report 6. 0 Financial Statements 7. 0 Department Reports References A. Federal Accounting Standards Board (FASB) B. Generally Accepted Accounting Principles (GAAP) Forms G Ex1 Department Reporting Summary G Ex2 Daily Flash Report G Ex3 Weekly Financial Report G Ex4 Six Week Cash Flow Report G Ex5 Budget vs. Actual Report G Ex6 Financial Statements G Pe riod-End Review & Closing Activities 1. 0 Closings Preparations 2. 0 Balance Sheet: Assets 3. Balance Sheet: Liabilities And Stockholders' Equity 4. 0 Income Statement: Revenues 5. 0 Income Statement: Expenses 6. 0 Financial Ratio Analysis G&A106 Controlling Legal Costs Activities 1. 0 Arbitration 2. 0 Legal Services 3. 0 Legal Billings G&A107 Taxes And Insurance Activities 1. 0 Organization Fees And Taxes 2. 0 Business Activity Fees And Taxes 3. 0 Payroll Fees And Taxes 4. 0 Excise Taxes 5. 0 Other Taxes And Credits 6. 0 Tax Payments 7. 0 Insurance References A. Trust Fund Recovery Penalty Forms G&A107 Ex1 Federal Tax Calendar G&A108 Property Tax Assessments Activities 1. 0 Review Of Assessments 2. 0 Appealing Of Assessments G&A109 Confidential Information Release Activities . 0 Financial Information Requests 2. 0 Personnel Information Requests 3. 0 Credit Reference Inquires Forms G&A109 Ex1 Non-Disclosure Agreement G&A110 Document Control Activities 1. 0 Document Distribution 2. 0 Document Revision 3. 0 Procedure and Work Instruction Format 4. 0 Temporary Changes Forms G&A110 Ex1 Request For Document Change (RDC) G&A110 Ex2 Document Change Control CSH101 Cash Drawers And Credit Cards Activities 1. 0 Opening 2. 0 Transactions 3. 0 Special Tender Items 4. 0 Closing 5. 0 Chargebacks And Disputed Transactions 6. 0 Security Precautions Forms CSH101 Ex1 Daily Cash Report CSH102 Cash Receipts And Deposits Activities 1. Receiving Cash Drawers 2. 0 Application Of Accounts Receivable 3. 0 Deposit Forms CSH102 Ex1 Deposit Log CSH103 Problem Checks Activities 1. 0 Unsigned Checks 2. 0 Partial Payment Checks Marked â€Å"Payment In Full† 3. 0 Returned Checks 4. 0 Redeposited Checks References A. Uniform Commercial Code (UCC) B. Bad Check Law Forms CSH103 Ex1 Bad Check Notice CSH104 Wire Transfers Activities 1. 0 Incoming Wires 2. 0 Outgoing Wires References A. FRB Reg D: Reserve Requirements Of Depository Institutions B. FRB Reg E: Electronic Fund Transfer Act For ms CSH104 Ex1 Bank Wire Instructions CSH104 Ex2 Wire Transfer Form CSH105 Check Signing Authority Activities 1. Authorized Check Signers 2. 0 Changing Check Signers 3. 0 Authority Levels Forms CSH105 Ex1 Check Signing Authority Log CSH106 Check Requests Activities 1. 0 Check Origination 2. 0 Check Stop Payment Forms CSH106 Ex1 Check Request CSH107 Bank Account Reconciliations Activities Bank Statement Preparation Computerized Format Manual Preparation And Reconciling Items Computerized Preparation And Reconciling Items Adjustments And Other Troubleshooting Forms CSH107 Ex1 Sample Bank And Book Balances Reconciliation Inventory & Assets †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Tab 6 INV101 Inventory Control Activities 1. Inventory Stocking And Storage 2. 0 Inventory Usage 3. 0 Inventory Protection 4. 0 Invent ory Obsolescence 5. 0 Inventory Disposal References A. Food And Drug Administration (FDA) Food Code Forms INV101 Ex1 Inventory Requisition INV102 Inventory Counts Activities 1. 0 Inventory Types 2. 0 Preparation For Inventory Counting 3. 0 Period End Cut-Off 4. 0 Complete Physical Count – Cost (Or â€Å"Sku†) Method Sales Order Routing And Review Invoice Preparation And Posting Distribution Accounts Receivable REV106 Invoicing And Accounts Receivable Activities 1. 0 2. 0 3. 0 4. 0 Forms REV106 Ex1 Invoice REV 106 Ex 2 Accounts Receivable Write-Off Authorization REV107 Sales Tax CollectionActivities 1. 0 Basis Of Tax 2. 0 Applicable Sales Tax Rates 3. 0 Nontaxable Sales 4. 0 Sales Outside Of Our Jurisdiction 5. 0 Sales Tax Billing REV108 Progress Billing Activities 1. 0 Contract Types 2. 0 Breakdown Of Contract Amount 3. 0 Progress Claims 4. 0 Release Of Holdback REV109 Account Collections Activities 1. 0 Collection Process 2. 0 Seriously Delinquent Or Unresponsive Acco unts 3. 0 Working With Collection Agencies 4. 0 Writing Off Uncollected Debt References A. Fair Debt Collection Practices Act (FDCP) Forms REV109 Ex1 Account Collection Control Form REV110 Customer Returns Activities 1. 0 Origination 2. 0 Receiving Goods And Processing 3. Returned Goods Disposition Forms REV110 Ex1 30-Day Satisfaction Guarantee REV 110 Ex2 Returned Goods Authorization Purchasing PUR101 Vendor Selection Activities 1. 0 Vendor Selection 2. 0 Vendor Inspections 3. 0 Vendor Files Forms PUR101 Ex1 New Vendor Notification PUR101 Ex2 Vendor Survey Form PUR102 General Purchasing Activities 1. 0 Order Determination And Requisition 2. 0 Order Placement 3. 0 Recordkeeping And Matching 4. 0 Sundry Purchases Forms PUR102 Ex1 Purchase Requisition PUR102 Ex2 Purchase Order PUR102 Ex3 Purchase Order Log PUR102 Ex4 Purchase Order Follow-Up PUR102 Ex5 Daily Sundry Payable Log PUR103 Project Purchasing Activities 1. 0 Purchasing Overview 2. 0 Requisition For Material Order 3. 0 Orders And Arrivals 4. Follow-Up 5. 0 Receiving Procedures 6. 0 Material Transfers 7. 0 Sundry Purchases Forms PUR103 Ex1 Order And Arrival Log PUR104 Receiving And Inspection Activities 1. 0 Receiving 2. 0 Inspection 3. 0 Rejection, Discrepancies And Disposition 4. 0 Stocking 5. 0 Product Returns Forms PUR104 Ex1 Receiving Log PUR104 Ex2 Receiving and Inspection Report PUR104 Ex3 Inventory Inspection Levels PUR105 Shipping And Freight Claims Activities 1. 0 Shipping 2. 0 Receiving 3. 0 Claims Procedures 4. 0 Additional Information Resources References A. Interstate Commerce Act PUR106 Accounts Payable And Cash Disbursements Activities 1. 0 Documenting Accounts Payable 2. Recording Merchandise Payables 3. 0 Recording Non-Merchandise Payables 4. 0 Payment Of Accounts Payable 4. 0 Manual Checks Embezzlement Prevention †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦ Tab 9 SUBJECT MATTER EXPERTISE †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v Dana L. Turner †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v 1. 0 ORGANIZATIONAL STRUCTURE AND FUNCTIONS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 1. 1 Where Embezzlers Look For Opportunities†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1 1. Corporate Culture†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 1. 3 Code Of Conduct†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2 1. 4 Summary †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2 2. 0 EMPLOYEES' RIGHTS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3 2. 1 Establishing The Company's And Employees' Rights †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦. 3 2. 2 Employee Rights To Privacy And Related Issues†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 3 2. The Employee Polygraph Protection Act†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 2. 4 Admonishment To Suspect Employees†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 2. 5 Summary †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 6 3. 0 EXAMPLES OF EMBEZZLEMENT SCHEMES †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦.. 15 3. 1 Misuse Or Misappropriate Funds†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 3. 2 The Most Popular Embezzlement Schemes †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 3. Summary †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 4. 0 CRITICAL AREAS OF RISK TO EMBEZZLEMENT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 4. 1 Areas Of Risk †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 4. 2 Summary †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 22 5. 0 UNIVERSAL SYMPTOMS OF EMBEZZLEMENT ACTIVITY †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 23 5. 1 Embezzlements Are Predictable†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 23 5. 2 Motives For Committing Embezzlement †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 23 5. Summary †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 6. 0 PROFILE OF AN EMBEZZLER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 27 6. 1 Common Characteristics Shared By Most Embezzlers†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 27 6. 2 Summary †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 28 INV103 Fixed Asset Control Activities 1. 0 Acquisitions 2. 0 Dispositions 3. 0 Asset Records Forms INV103 Ex1 Capital Asset Requisition INV103 Ex2 Asset Disposition Form INV103 Ex3 Bill Of Sale INV104 Customer Property Activities 1. Receipt, Inspection And Stocking 2. 0 Unsuitable Or Missing Items 3. 0 Customer Supplied Tooling And Fixtures 4. 0 Intellectual Property Forms INV104 Ex1 Material Return Notice INV105 Fixed Asset Capitalization & Depreciation Activities 1. 0 Capitalization 2. 0 Depreciation References A. IRS Publication 946 â€Å"How To Depreciate Property† Revenue †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Tab 7 REV101 Sales Order Entry Activities 1. 0 Sales Representatives 2. 0 Internet Orders 3. 0 Credit Department 4. 0 Sales Administration 5. 0 Manufacturing/Shipping 6. 0 Customer Service 7. Accounting/Billing 8. 0 Changes To Orders 9. 0 Additional Information Resources REV102 Point-Of-Sale Orders Activities 1. 0 Point Of Sale 2. 0 Sales Orders And Invoices 3. 0 Sales Invo ices And Accounts Receivable REV103 Customer Credit Approval And Terms Activities 1. 0 Credit Application 2. 0 Credit Investigations 3. 0 Credit Approval/Rejection 4. 0 Additional Information Resources References A. Equal Credit Opportunity Act (ECOA) B. Truth In Lending Act (TILA) C. Fair Credit Billing Act (FCBA) D. Fair Credit Reporting Act (FCRA) E. FRB Reg B: Equal Credit Opportunity Act F. FRB Reg Z: Truth In Lending Act Forms REV103 Ex1 Credit ApplicationREV103 Ex2 Request For Credit Approval REV 103 Ex3 Credit Inquiry REV104 Sales Order Acceptance Activities 1. 0 Document Verification 2. 0 Telephone Confirmation 3. 0 Order Acceptance Forms REV104 Ex1 Phone Confirmation Checklist REV105 Shipment Of Goods Activities 1. 0 Shipping Inspection And Packaging 2. 0 Export Shipping 3. 0 Manifest Systems 4. 0 Shipment Pick-Up 5. 0 Additional Information Resources Forms REV105 Ex1 Shipping Log REV105 Ex2 Commercial Invoice Who Needs Accounting Policies and Procedures? This introduction is an accounting primer to explain the basic concepts of accounting, its structure, standards and definitions. The need to review these concepts is greater now then ever.On one hand, popular accounting programs for small and mid-sized businesses have become more widely used than ever before, and on the other hand, industry consolidation has significantly reduced the accounting program choices to just a handful. These choices are typically inexpensive, easy to implement, and come with little support to develop appropriate policies and procedures to ensure that the data generated by these programs is accurate and complete. Entry-level software like Quickbooks ® and midlevel software like MAS-90 or Great Plains share this common deficiency. The â€Å"support† documentation is long on the explanation of user features and short on policy and procedural advice for appropriate use. The Recent Past Only twenty years ago, small to medium sized businesses faced daunting choices for selecting an accounting system.There were only three choices: Continue to use a full manual system (a comprehensive pegboard â€Å"one-write† system, employing many journals anchored to an imposing cloth bound general ledger book that rivaled the size of the largest Webster's Dictionary), purchase or lease a computerized accounting system, or build your own. The manual systems were not trivial. They were produced by major firms, which provided on-site implementation and training. These systems were well documented with many policies and procedures built into the regimented use of the â€Å"one-write† journals and corresponding ledgers. An alternative decision was to purchase or lease an automated information system.But this required another decision of whether to buy a â€Å"ready made† product or build your own. To make this decision, the company would typically hire a consultant or CPA firm to perform a comprehensive â€Å"needs† analysis. The consultan t would eventually select, either a commercially built multi-module accounting program (like Solomon, our Real World), or a programmer to develop the structure from custom code (RPG was a popular language used to create custom accounting programs). Either one of these alternatives would have to run on a leased or purchased dedicated mini-computer system, (the IBM 36 was the popular mid-size business choice for many years).Both solutions required tremendous resources in time and money. Even the â€Å"ready made† solutions required plenty of additional programming to fit it into the specific company's needs. For a half a year or more, various consultants, programmers and specialists would write code, test and rewrite code. In either case, documentation was paramount. Hence policies and procedures, as they applied to the mechanics of the accounting system were well documented as a by-product of the installation and implementation procejss. The total costs in the purchase or leas e of the hardware and software (ready made or custom built), and in the company's own human resources, was staggering. The PresentImagine the months of decision making preparation, the months of development, the reams of documentation and the total costs that easily went from tens of thousands, to hundreds of thousands of dollars. Compare this to the present practice occurring throughout the country on a daily basis. The owner, or the owner's controller or other designee walks into a local retailer, picks up a copy of the most successfully marketed accounting software package, (ie: the one occupying the most prime and visible shelf space), drives back to the office, and loads the program on any available PC computer. There you have it: the decision making process, â€Å"needs† analysis, implementation and installation; all for the price of $299! The future The future begins today, with your purchase of this 4expertiseâ„ ¢ Accounting Policies and Procedures Manual.This manu al is needed more now than ever. Accounting systems are more accessible than ever before. Unfortunately, they come with no instructions. The user guide that comes with the accounting software only explains what the menu options do, it doesn't explain which options result in sound accounting practices. Accounting software is looking more and more like your own internet browser home page, (no surprise since each manufacturer is competing to be your primary web portal). In the process, the actual functions of accounting are less obvious, and as a result, less understood. This introduction is a look behind the scenes of the â€Å"splash screen†.Hopefully, by understanding the concepts and consistent accounting rules utilized by all accounting software programs, you will develop more confidence to rely on the information generated by the program and you will be able to use it more effectively to run your company. Accounting Basics Three important terms that are easily confused: â € ¢ Bookkeeping †¢ Accounting †¢ Reporting What are they and how do they interrelate? Bookkeeping Bookkeeping and accounting share two basic goals: †¢ To keep track of income and expenses, thereby improving The Company's ability to achieve profitability †¢ To collect the necessary financial information about The Company's business to file required reports and tax returns Bookkeeping refers to the actual transactional entering and recording of data. Examples are writing checks, processing payroll, making deposits, recording disbursements and recording receipts. AccountingAccounting encompasses the broader responsibilities over developing and maintaining the accounting system under which bookkeeping functions are performed. Accounting is concerned with the timely and accurate recording of transactions, providing useful management information, and properly reporting such information for various user needs. Developing and maintaining an accounting system involves s etting up and maintaining an appropriate chart of accounts for the particular business. Policies and procedures are then established to provide guidance for all possible financial transactions, from source documents (checks, sales orders, etc. ), to journals (payroll journal, cash disbursement journal, invoice register, etc. , to the general ledger, (based on the chart of accounts), and ultimately to a variety of reports for all internal and external needs. Bookkeeping and reporting can be thought of as the input and output of a complete accounting system. Accounting policies and procedures ensure Reporting Reporting, (the output of the data generated through various bookkeeping functions), is used for both internal and external purposes. Internal Reports are reports used within the company, by both management and other designated personnel. Internal reporting can be further divided into financial and non financial data. Non-financial data Non-financial data includes a variety of me asurement and productivity data, applicable to the specific business.These can be daily customer count, web page â€Å"hits†, production activity per employee hour, units and total weight of product shipped, or even daily weather conditions. Financial data Examples of financial data reports include: †¢ Financial statements – Profit and loss reports (income statement), balance sheets and cash flow statements †¢ Daily reports with critical balances, such as, sales, cash level, inventory, accounts receivable and accounts payable †¢ Segmented profit and loss reports (or P/L) on specific jobs, profit centers or departments †¢ Register reports, listing all transactions for specific areas such as, payroll, checks, receipts, invoices, etc. †¢ Listings of source data files such as customer, employee, vendor and inventory lists. Aging reports for both Customers (accounts receivable or A/R) and Vendors (accounts payables or A/P) †¢ Inventory reports for costing and valuation †¢ Exception reports – open purchase orders, back orders, inventory stock outs. External reports generated for the use of people or organizations outside of the business. Report data and format will vary depending on user: †¢ Banks, lending institutions. To observe the financial viability of a business and to determine its ability to support additional amounts and types of debt financing †¢ Employees. To determine the stability of the business of their employer – this may be useful in wage negotiations †¢ Suppliers. To assess the suitability of granting credit terms to a business †¢ Existing and Potential Investors.To assess the potential risk of investing in a business and to monitor the status of existing investment in a business †¢ Public. To gain more insight into any business, which is legally required to make certain financial information available †¢ Government. To fulfill the requirements of all appli cable local, state and federal reporting statutes, including income, sales, insurance, property, and payroll tax returns †¢ Media / Press. To use available business reports in specific trade and business publications Components of an Accounting System The financial transactions of any accounting system can be grouped into four major transaction cycle groups: Revenue Cycle, Purchase Cycle, Payroll Cycle, and General Journal Cycle.Transactions in the form of sales invoices, receipts, purchase invoices, checks and payroll entries are posted to the appropriate journals. Simultaneously, these postings are also recorded in the General Ledger. The General Ledger accumulates all transaction activity, organized by account classification. Various reports, including financial statements can then be prepared from the data collected in the General Ledger. Corrections or necessary adjustments can be made to the General Ledger by creating adjusting journal entries, posted to the general journ al. The following outline on the next two pages provides more explanatory detail on these four cycles: . Revenue Cycle Order Entry Invoices entered through direct entry, through sales orders or through a point-of-sales system, (such as a cash register) are posted to the sales journal. These entries also accumulate on the accounts receivable ledger, organized by customer. If the business maintains an inventory, the posting of sales also affects the inventory ledger. Finally, all sales journal activity is also posted to the general ledger Cash Receipts / Deposits Receipts on sales and other bank deposits are posted to the cash receipts journal. Sales receipts information also accumulates on the accounts receivable ledger, organized by customer.These postings are also entered on the bank account ledger. Finally, all cash receipts journal activity is also posted to the general ledger. Accounts Receivable Accounts Receivable is a separate journal that records both sales and cash receipt data by customer. The data comes from the postings to the cash receipts journal and the sales invoice journal. 2. Purchase Cycle Purchase Orders / Purchasing Invoices entered through direct entry or through purchase orders are posted to the purchase journal These entries also accumulate on the accounts payable ledger, organized by vendor. If the business maintains an inventory, the posting of purchases also affects the inventory ledger.Finally, all purchase journal activity is also posted to the general ledger Cash isbursements / Checks Payments on account or for expenses are posted to the cash disbursement journal. Payment on account information also accumulates on the accounts payable ledger, organized by vendor. These postings are also entered on the bank account ledger. Finally, all cash disbursement journal activity is also posted to the general ledger. Accounts Payable Accounts Payable is a separate journal that records both sales and cash receipt data by vendor. The data come s from the postings to the cash disbursement journal and the purchase journal. 3. Payroll Cycle Payroll data, by employee, for each payroll data is entered into the payroll journal.These postings are also entered in the cash disbursements journal and the payroll ledger. Finally, all payroll journal activity is also posted to the general ledger. 4. General Journal Cycle Corrections or adjustments to the above major transaction cycles can be made through adjusting journal entries, posted directly to the General Ledger. These are compiled in a separate journal, known as the General Journal. How does posting work? The specific postings, as outlined in the cycles above, do not necessarily take place as separate steps, especially in computerized environments. There are only two basic methods of posting in computerized accounting systems: real-time posting and batch posting.In real-time posting, the source transaction, (check, bill, payment, receipt, etc. ), is posted to the specific journ al and any related subsidiary ledgers (accounts receivable, accounts payable, inventory, bank account, etc. ), and is simultaneously posted to the general ledger. In batch posting, the journals and subsidiary ledgers are posted, but entries are not yet posted to the general ledger. Posting these journals to the general ledger is done separately. Typically, a group of transactions is entered, a full day's worth, for example. Later, after the journals are reviewed for accuracy, this entire day's group, or â€Å"batch† is posted to the general ledger.To understand this posting process better, it would be helpful to follow specific transactions through a sample company. First, however, we need to define various accounting terms and concepts. Accounting Terms and Concepts Double-Entry Accounting We can justifiably thank the 14th century Italian merchants for developing the doubleentry system of accounting that we still use today. It is widely believed that Benedetto Cotrugli was t he first to document this concept of double-entry accounting. In 1458, he wrote Delia Mercatura et del Mercante Perfetto (Of Trading and the Perfect Trader), which included a brief chapter describing many of the features of double entry accounting.Years later in 1494, Luca Pacioli, from San Sepulcro in medieval Tuscany, published The Summa's 36 short chapters on bookkeeping, entitled â€Å"De Computis et Scripturis† (â€Å"Of Reckonings and Writings†), so that the subjects of the Duke of Urbino could learn how to conduct business and to provide the trader with a fast method to determine his assets and liabilities. For centuries before, commercial transactions had been recorded and journalized, whether on paper, papyrus or clay tablets. However, these journals provided only totals of transaction groupings. It was the Italians that first recognized that it is impossible for a business transaction to occur without affecting at least TWO accounts. There can never be only o ne effect from a transaction.An Italian farmer sells wood to a shipbuilder for 400 ducats. To account for this transaction he would record: wood sale – 400 ducats. His â€Å"sales† account has been increased by 400 ducats. But, what else has happened? What other account was affected? His â€Å"cash† account also increased by 400 ducats. What if he sells his wood to the shipbuilder on credit, and he receives no cash? In this case it's his â€Å"accounts receivable† account, which increased by 400 ducats. There are always, at least two sides to each transaction. Later, when the shipbuilder pays his debt to the farmer, the farmer records an increase in his cash and a decrease in his accounts receivable by 400