What are the objectives of the verification of assets? (i) to ensure the existence of an asset (ii) to ensure the ownership (iii) to ensure the possession (iv) to ensure the lien

What are the objectives of the verification of assets? (i) to ensure the existence of an asset (ii) to ensure the ownership (iii) to ensure the possession (iv) to ensure the lien Correct Answer (i), (ii), (iii) and (iv)

The correct answer is (i), (ii), (iii) and (iv)
Key Points

Verification of assets: It is an activity performed by the auditor in the process of auditing where he verifies the value, ownership, existence, possession of the assets under the name of the company. He also checks whether the assets are placed as collateral security for acquiring finance

Important Points Objectives of Verification of Assets

  • Ensure that the assets were in existence on the date of the balance sheet.
  • Ensure that the right of ownership of the assets vested in or belonged to the undertaking.
  • Ensure that they are free from any lien or charge, not disclosed in the balance sheet.
  • Ensure that the assets are in possession of the rightful owner.
  • Ensure that asset values are correctly disclosed in the balance sheet.
  • Ensure that they are correctly valued having regard to their physical condition.

Additional Information Lien on assets: A lien is a legal right of a lender on the assets of the borrower when the assets are placed as collateral security in acquiring the loan. The borrower/owner cannot sell the property that is the subject of a lien without the permission of the lien holder.

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: Reliance Jio Infocomm, the most recent entrant in India’s telecom service sector, may be more adversely affected by the Supreme Court order curbing the use of Aadhaar than older rivals Vodafone Idea and Bharti Airtel. The apex court order disallowing telcos from using the faster Aadhaar-based verification system could slow the pace of subscriber additions significantly, potentially delaying the company’s plan to acquire a 50% revenue market share. The Mukesh Ambani-owned telco has been adding many more subscribers every month than its rivals.  Courses of action: I. Jio’s gross customer additions could decline in the coming months as the verification process will henceforth be a more cumbersome affair, which could also be a turn-off for potential new users who’ve been lately used to instant connectivity under the Aadhaar-based enrolment mechanism.  II. Customer verification expenses will increase in step with the volume of customer acquisition of telcos and so, stronger the monthly user additions, higher the associated verification costs.  III. The more tedious verification process henceforth is also likely to slow down the processing of porting requests from customers.
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.