1. An individual with access to the AP subsidiary ledger (and supporting documents) could add his or her account (or someone else’s) to the file. Once recognized by the system as a legitimate liability, the account will be paid even though no purchase transaction transpired.
2. Access to employee attendance cards may enable an unauthorized individual to trigger an unauthorized paycheck.
3. An individual with access to both cash and accounts payable records could remove cash from the firm and record the act as a legitimate disbursement.
4. An individual with access to physical inventory and inventory records can steal products and adjust the records to cover the theft.