1. An individual with access to the AP subsidiary ledger (and supporting documents) could add his or her account (or someone else’s) to the file. Once recognized by the system as a legitimate liability, the account will be paid even though no purchase transaction transpired.
2. Access to employee attendance cards may enable an unauthorized individual to trig-ger an unauthorized paycheck.
3. An individual with access to both cash and accounts payable records could remove cash from the firm and record the act as a legitimate disbursement.
4. An individual with access to physical inventory and inventory records can steal pro-ducts and adjust the records to cover the theft.