StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computershare Limited Company - Case Study Example

Cite this document
Summary
The paper "Computershare Limited Company" is a perfect example of a finance and accounting case study. Computershare Limited is a renowned company in the provision of consultancy services in the technology and capital market industry. The company was founded in 1978 in Melbourne and it has extended its operations in Australian and global markets…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful

Extract of sample "Computershare Limited Company"

Student Name: Tutor: Title: Computershare Limited Company Course: Executive summary Computershare Limited is a global company based in Australia that provides consultancy services in technology and capital market industry. This report provides an overview of the company financial strength, industry and evaluates the audit practices. Computershare operates in a very competitive environment that requires time to time updates to keep up with emerging trends in the market. The analysis has discussed the high risk and low risk areas within the company and how fraud can be minimized. Regulatory and operational risks exist since the company is involved in many transactions in different places in various countries. Consolidation of accounts presents a challenge that can be undermined by employees with an intention of committing a crime. The fraud triangle and fraud scales have been discussed in detail in this report. The report concludes by providing a broad audit strategy that has to be followed in the company practices. The cash flows have been identified as high risk areas represented in the final statements while the balance sheet is the low risk area in the final statements. The audit strategy encourages training and thorough preparation to drive the culture of integrity and honesty in the company. Whistleblowing has been encouraged as reiterated in the company whistleblower policy. Table of Contents Executive summary 2 Table of Contents 3 Company description 4 Conclusions and Audit Strategy 10 References 13 Company description Computershare Limited is a renowned company in the provision of consultancy services in technology and capital market industry. The company was founded in 1978 in Melbourne and it has extended its operations in Australian and global markets. The company was listed on Australian Security Exchange in the year 1994 when it had 6M shareholders and about only 50 staff members. The company now has over 125M customers with about 16,000 staff in major financial markets. The market cap runs in billions of dollars from a market cap of AUD $36M in 1994. The company has witnessed a breakthrough in regulatory transformation with regards to improving investor servicing standards and best practices. The company has spread to over twenty countries globally and it is committed to open market structures as well as service excellence. The company has a rich history in consultancy services. Computershare can be described as a stock transfer company situated in Australia and provides stock transfers, corporate trust together with employee share plan services in many countries such as the United Kingdom, the USA, Asia, New Zealand, South Africa, Denmark, Germany, and Hong Kong. The company deals in stock registration and provides technology services concerning investor services to stock exchanges, shareholders, and employee share plan management. The company is also engaged in deposit service. The investor services provided by the company entails, register maintenance, company meeting’s logistics, payments and online services. The company is further involved in plan services like management as well as administration of share and option plans for the employees. Communication services provided by Computershare Limited include laser imaging, intelligent mailing; scanning and communication delivery services. Business services include bankruptcy administration, corporate trust, voucher administration, deposit protection and utility office services. The company provides relationship management services of stakeholders like investor communication, management of information services and investor analysis. The financial strength of the company is impressive. The company revenue has been growing over time and receipts from customers have increased. The current assets of the company increased from $1.2Billion to 1.3Billion in 2016. The non-current assets increased from 2.5Billion to 2.6Billion in 2016. The current liabilities also increased from 723Million to 796Million in 2016. The non-current liabilities also increased from 1.9Billion in 2016 to 2.07Billion in 2016. Total equity increased by 68 Million. The company is at growth stage in the life cycle and competes well with its peers in the industry. Legal and regulatory concerns are important in the technology management industry due to ownership rights and handling information on behalf of clients. Confidentiality is paramount. The technology industry is very competitive and emerging trends are the norm. Computershare Limited is committed to ensuring high standards of corporate governance are maintained in the conduct and management of the business. The corporate governance statement spells out the detail plan of the main corporate governance practices at Computershare Limited. Analysis The Board is primary responsible for making sure that risk management practices at Computershare Ltd are adequate to mitigate risks present in the business effectively and efficiently. The responsibility of the board is delegated to the Risk and Audit Committee. The company has a clear approach to oversight as well as management of risk using three lines of defense model. The first line of defense involves the management that has the responsibility of risk management as well as control activities. The risk function makes up the second line of defense. The risk function is in charge of setting and implementing the risk framework together with support tools as well as methodologies and giving advisory support to the leadership or management. The internal audit functions makes up the third line of defense. It offers an objective and independent assurance function with the responsibility of making sure the policies, framework, and controls set up to mitigate key risks are effectively executed by the management (Lou & Wang, 2011). Internal audit performs regular systematic monitoring of the control activities and then reports the outcome to the senior managers of the business unit and the Risk and Audit Committee. The fraud process can be presented using a triangle known as the fraud triangle. 1. The Internal Audit and Risk and Audit Committee are the two functions that can be compromised for risk to take place within Computershare Limited. The Risk and Audit Committee oversees the work of Internal Audit control as well as the External audit. If the Committee is not keen, any errors committed by other functions will go unnoticed. The Risk and Audit Committee offers help to the Board of Directors in accomplishing its oversight and corporate responsibilities with regard to the company’s internal control structure, financial reporting; framework of risk management together with external and internal audit functions even approval of operating charters of the functions. The Committee has to maintain open and free communication between the external auditors, the committee, internal auditors as well as the leadership or management of the company. The Committee has the power of investigating matters brought to its attention through accessing all records, books, facilities and personnel of the company and has power to seek the service of independent counsel and other advisers appropriately. The first part of the fraud triangle is pressure. This is the primary motivator of crime. An individual can have a financial problem or need that cannot handle using legitimate needs hence he considers using illegal acts as a means of solving the problem. The financial problem can be professional or personal. Examples of pressures faced by an individual include peer pressure, living beyond means, personal financial loses; substance abuse or addictions, unexpected financial needs, personal debts or high bills, pressure to sustain investor confidence or productivity targets at work (Kassem & Higson, 2012). The second part of the fraud triangle is perceived opportunity. This represents the method through which the crime can be carried out. An individual has to see a way of committing the crime using his or her position of trust to solve a financial need with minimal perceived risk of being found out. The non-sharable financial problem precipitates the motive for crime being committed but the employee has to believe that he has a chance of committing the crime without being found out. Perceived opportunity can include things like poor internal controls, poor supervision, poor training, ineffective anti-fraud policies, programs and procedures, absence of prosecution of other perpetrators, and weak ethical culture. An individual has to see a means of abusing his position of trust accompanied by low perceived risk of being found out (Norman, Rose & Rose, 2010). The third part of the fraud triangle is rationalization. The criminals have to justify their acts of crime to themselves that make it appear acceptable. This is referred to as rationalization. Rationalization happens before the act of crime itself. People who are involved in fraud rationalize their behaviour in various ways. Fraud scales’ elements comprise of motives, capabilities, conditions and fulfillment. All the elements are closely related to internal control system. Motive is an element of fraud scales that determines whether an employee has the tendency to behave unfairly and the reason behind it. The motive is usually related to greed and circumstance within one’s life like financial needs, additions, gambling, and bad credit taken (Dorminey, Fleming, Kranacher & Riley, 2012). Motive is an incentive reason and the force behind fraud. Another element of fraud scales is conditions that enhance their risk. Conditions refer to circumstances through which fraud happens. Companies do operate in an ever-changing environment where there are always new conditions to commit frauds. The conditions are propelled when the internal and external environment of a particular company is unstable for some give period of time. The third element of fraud scales is possibilities which refer to an option given to an employee who hopes to commit crime. The positions of the person in the company and the existing internal controls determine the possibilities of engaging in fraud (Johnson et al, 2012). Effective internal controls lead to minimal chances of committing a fraud. The other element of fraud scales is realization. This refers to the personal characteristics of the employees like integrity and honesty that allow objective assessment of whether he is willing to commit fraud or not. Certain personal characteristics will push employees to be willing to engage in fraud or commit errors. The fraud process depends on the fraud scales, fraudsters, conditions, and other things. Amortization of intangible assets presents an audit risk since the costs of the assets have to be determined from the book value from the time of acquisition. Accounting estimates that comprise of fair value present an audit risk that has to be watched carefully. Risks of overstatement in the accounting books like the purchases journal has to be verified though checking the accompanying supplier invoice. Close supervision will ensure that correct entries are made in the accounting books (Arens, Elder & Beasley, 2012). Transfer of records from the accounting books to final accounts presents a risk that can be detected through imbalances but accountants can doctor the information to balance. Verification the original books of accounts is important. Operating activities poses the high risk since there are many transactions involving flow of money in and out of the company. Payments to employees and suppliers as well as receipt from customers increased from the previous year. Any error of commission in overstatement of payment or understatement of receipts can happen in the original books of accounts or transfer to the final accounts. The cash flow statement is an area that represents detection high risk since there is no balancing of accounts and misrepresentation can easily happen. Cash at hand increased $526M in 2015 to $604M in 2016. The clash flow statement is made up of cash from operating activities, cash from investing activities and cash from financing activities. Greater scrutiny is needed in this area to make sure that entries have been made correctly and promptly transferred to final accounts. Operational risk is high since the company is charge of managing valuable client data. Many external and internal factors affect the operations of the company. Moreover, there are many entities or units within the company that results in consolidated accounts during financial reporting (Hayes, Wallage & Gortemaker, 2014). Continuous testing is needed to ensure that correct data entry is made and true representation of transaction is recorded. The company is engaged in many transactions that have to be processed correctly to ensure risk is minimized. Regular substantive procedures have to be carried to ensure the operation risk is detected. Conclusions and Audit Strategy Fraud happens when there is a weakness in the financial system of the company. It is important to seal all look holes that can lead to opportunities or possibilities of fraud. Conditions existing within the company act as a motivation of engaging in fraud. When the detection risk is low then the auditor is compelled to use more costly and more effective procedures. Where the evaluated detection risk is high, the auditor can use procedures that are less costly and less effective. The timing of any substantive procedures relies on the degree of detection risk. In case the detection risk is low, the substantive procedures with regard to account balances have to be carried at or near the balance. Where the detection risk is high, then certain procedures can be carried out a few months before the end of the financial year. The internal structure of control is important in detection of any risk (Trompeter et al, 2012). Where the degree of detection risk is low then more evidence is required. The operational transaction represents the high risk areas in the final accounts while statement of assets and assets and liabilities are low risk areas. The high risk areas are reflected in the cash flow statements while the low risk areas are reflected in the balance sheet. Computershare Limited is a huge company with many accounts that are consolidated at the end of the financial year. The audit strategy is ensuring the individual units within the company represent figures correctly and keen supervision to ensure there is no misrepresentation. Transaction processes are many since the company deals in data management and the investor’s trust in vested in how well they get the correct information and value for money from the company. The Internal Audit Committee has to interrogate information that raises concerns and ask for explanation where there are discrepancies. The financial system has to be tested for any weaknesses and fixed to avoid conditions and motivate fraud to happen. The audit strategy will involve proper training of employees on the importance of integrity and honesty as custodians of important information and assets of the company. The company has to reward whistleblowers and promote honest and hardworking members. Fraud involves several people and takes advantage of existing conditions in the company. If the employees understand their role in ensuring transparency and honesty is propagated, then the chance of engaging in fraud is minimized. Use of credible external auditors is important for the company since they can whistle blow where there is a mistake is a scandal offing (Brazel, Carpenter & Jenkins, 2010). Whistleblowing is an approved policy by the company and it has to be enforced to ensure that whistleblowers are not victimized. Regulatory risk is imminent since the company operates from different countries under different regimes. The company is subjected to regulatory requirements in various countries across the globe. Complying with regulatory requirements is crucial in meeting the legal obligations of the company. The transactions have to factor in all regulatory requirements to avoid penalties or misconceptions. Substantive procedures will be designed at the operational level to ensure that proper records are made and transferred to the final accounts. Auditing planning is important in making the system foolproof (Vona, 2012). Planning has to commence with thorough training and preparation. The Employees at Computershare Limited have to learn by heart the corporate culture of the company that promotes honesty and integrity. Employees have to understand their role in keeping with the corporate culture of the company that ensures investor’s trust is upheld. The Risk and Audit Committee has to be at the forefront to come up development plans of improving foolproof reporting. The Internal Audit is important in detecting any mistakes and misrepresentation at an early stage and report to the Committee. The transition from one financial year to another needs correct transfer of balances to the final accounts. Understanding accounting principles used in different regimes is important to avoid any misrepresentation of facts that can be misleading. The internal audit function has to be autonomous and audit all areas to ensure are compliant with set regulatory and accounting standards. References Arens, A.A., Elder, R.J. and Beasley, M.S., 2012. Auditing and assurance services: an integrated approach, Prentice Hall. Brazel, J.F., Carpenter, T.D. and Jenkins, J.G., 2010. Auditors' use of brainstorming in the consideration of fraud: Reports from the field, The Accounting Review, 85(4), pp.1273-1301. Dorminey, J., Fleming, A.S., Kranacher, M.J. and Riley Jr, R.A., 2012. The evolution of fraud theory, Issues in Accounting Education, 27(2), pp.555-579. Hayes, R., Wallage, P. and Gortemaker, H., 2014. Principles of auditing: an introduction to international standards on auditing, Pearson Higher Ed. Johnson, E.N., Kuhn Jr, J.R., Apostolou, B.A. and Hassell, J.M., 2012. Auditor perceptions of client narcissism as a fraud attitude risk factor, Auditing: A Journal of Practice & Theory, 32(1), pp.203-219. Kassem, R. and Higson, A., 2012. The new fraud triangle model, Journal of Emerging Trends in Economics and Management Sciences, 3(3), p.191. Lou, Y.I. and Wang, M.L., 2011. Fraud risk factor of the fraud triangle assessing the likelihood of fraudulent financial reporting. Journal of Business & Economics Research (JBER), 7(2). Norman, C.S., Rose, A.M. and Rose, J.M., 2010. Internal audit reporting lines, fraud risk decomposition, and assessments of fraud risk, Accounting, Organizations and Society, 35(5), pp.546-557. Trompeter, G.M., Carpenter, T.D., Desai, N., Jones, K.L. and Riley Jr, R.A., 2012. A synthesis of fraud-related research, Auditing: A Journal of Practice & Theory, 32(sp1), pp. 287-321. Vona, L.W., 2012. Fraud risk assessment: Building a fraud audit program, John Wiley & Sons. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computershare Limited Company Case Study Example | Topics and Well Written Essays - 2500 words, n.d.)
Computershare Limited Company Case Study Example | Topics and Well Written Essays - 2500 words. https://studentshare.org/finance-accounting/2086726-computershare-limited-company
(Computershare Limited Company Case Study Example | Topics and Well Written Essays - 2500 Words)
Computershare Limited Company Case Study Example | Topics and Well Written Essays - 2500 Words. https://studentshare.org/finance-accounting/2086726-computershare-limited-company.
“Computershare Limited Company Case Study Example | Topics and Well Written Essays - 2500 Words”. https://studentshare.org/finance-accounting/2086726-computershare-limited-company.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computershare Limited Company

Business Process Management: Dell Inc

is a public limited company, as it went public in the year 1988 itself, with the selling of around 3.... Although it operates as the Public limited company in a majority of the operations, in key markets like India, it operates as a private limited company.... From that initial initiative, the company grew strongly even changing the name from PC's Limited to "Dell Computer Corporation" in 1988.... million company shares at rates of $8....
10 Pages (2500 words) Case Study

Business Environment

Ownership of Coca-Cola Company Coca-Cola is a public limited company.... Shareholders and Shareholders objectives Being a limited company, Coca-Cola does not restrict members of the public from being its shareholder.... oca-Cola company ... oca-Cola company is an American based firm that is headquartered in Atlanta.... The company operates in more than 200 countries.... n the same way, the company aims at involving its partners including the bottling companies in its global operations....
8 Pages (2000 words) Assignment

Private Limited Company Shares

The paper "Private limited company Shares" describes that John is an additional member of the Board of Kent Ltd, and he is managing the day-to-day business of the company.... The general procedure for the transfer of shares in a private limited company is that any member who wants to dispose of his shares should give notice first to the company.... His actions made James believe to consider as if he is the managing director of the company.... A stranger, who is dealing with a company, can assume that its officers have been duly appointed, that the meetings had been validly called for and conducted and that the resolutions had been approved by the requisite majority....
10 Pages (2500 words) Essay

Infratil Limited Company Analysis

The paper "Infratil limited company Analysis" discusses that the investment analysis indicates that Johnnie Carter being a risk-averse investor should consider investing in funds which generate high dividend and at the same time also has a capital appreciation.... Any investment analysis involves a detailed examination of the stocks, the company to which the stocks belong, the country to which the company belongs and the present economic condition of the stock (Funder 2003, 345)....
8 Pages (2000 words) Essay

Advantages of Limited Company

The paper "Advantages of limited company" tells that By forming a limited company, shareholders are at a low level of risk of losing their money compared to a sole proprietorship.... Although it is easier to set up a sole proprietorship or partnership than a limited company, limited companies have better access to external markets for funding and business opportunities.... In addition, only those profits taken out from the limited company's accounts are taxed as compared....
10 Pages (2500 words) Essay

Imperial Oil Company Limited

The company under analysis in the Imperial Oil company Limited; its ranked 8th in the top 500 Financial Post Ranking.... The company is involved in all upstream and downstream activities of petroleum industry.... In the year 2006 the company posted a profit of 3044 million dollars, by generating a revenue of 24505 million, the asset base of the company is 16141 million. ... he company is important in the Canadian economy as oil products are the choice for the transportation fuel and Imperial Oil captures a significant portion of the market; since it was once a national asset which now is in the hands of the private sector but, still it contributes significantly in terms of taxes and supporting the economy....
12 Pages (3000 words) Case Study

Limited Liability in a Company

The reporter casts light upon the fact that an ordinary reference to a company is understood to a limited liability company.... The attribute of limited liability earns its support from the fact that when a company is not managed by its shareholders, then 'shareholders' limited liability for torts is a privilege shielding them from liability.... Limited liability companies are so called because of the liability of each shareholder for the company's debts....
5 Pages (1250 words) Essay

Wesfarmers Limited Company Analysis

The paper "Wesfarmers limited company Analysis" is an amazing example of a Finance & Accounting case study.... The paper "Wesfarmers limited company Analysis" is an amazing example of a Finance & Accounting case study.... The paper "Wesfarmers limited company Analysis" is an amazing example of a Finance & Accounting case study.... The company started as a farmer's cooperative in Western Australia and grew to become the country's most diverse companies and with large retailers....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us