Assessing Risks and Internal Controls - Training
Assessing Risks and Internal Controls - Training
Assessing Risks and Internal Controls - Training
Controls
A training presentation for process owners
Identifying
Risks
Sourcing
Sourcing
Business
RisksRisks
Prioritizing
Risks
Risk Considerations
Considerations
Evaluate the nature and types of errors and omissions that could occur, i.e., what can
go wrong
Consider significant risks (errors and omissions) that are common in the industry or
have been experienced in prior years
Other risks extending beyond potential material errors or omissions in the financial
statements
4
Assertions
For all significant processes identify points within the flow of transactions or process
stream where there can be failures to achieve the following assertions:
Assertion
Description
Authorization
Management has defined and communicated criteria for recognizing economic events and
authorizing transactions.
Completeness and
Accuracy
All transactions and other events and circumstances that occurred during a specific period and
should have been recognized in that period, have, in fact, been recorded or considered.
Therefore, there are no unrecorded assets, liabilities or transactions and no omitted
disclosures.
All, and only economic events meeting managements criteria are converted to transactions
accurately and accepted for processing on a timely basis. All accepted transactions are
processed accurately in accordance with managements policies and on a timely basis. Events
affecting more than one system result in transactions that are reflected by each system in the
same accounting period.
Recorded transactions represented economic events that actually occurred during a stated
period of time.
Evaluation of Balances
Assets, liabilities, revenues and expenses are recorded at appropriate amounts in accordance
with relevant accounting principles.
Report and database contents are periodically evaluated. Evaluation involves judgmental
determinations of value. Provide reasonable assurance that reported information can be
reconciled with reality.
Assertions
Assertions (Continued)
Assertion
Description
Presentation,
Classification and
Disclosure
The captions, disclosures and other items in the financial statements are properly described
and classified as well as fairly presented in conformity with generally accepted accounting
principles.
Access to Assets
Physical safeguards should permit access to assets only in accordance with managements
authorization.
Substantiation of
Balances
Assets and liabilities reported on the balance sheet are bona fide rights and obligations of the
entity as of that point in time.
Management should clearly identify the personnel who have primary custodial responsibility for
each category of assets, critical forms and records, processing areas and processing
procedures. To the extent possible, responsibility for the physical custody of an asset should
be vested in employees who have no responsibility for, and are denied access to, accounting
for the asset and vice versa.
In summary, internal controls can help our company get where it wants to go, and avoid
pitfalls and surprises along the way.
DEFINITION OF INTERNAL CONTROL
Internal control is a process, effected by an entitys board of directors,
management and other personnel, designed to provide reasonable assurance
regarding the achievement of objectives in the following categories:
Effectiveness and efficiency of operations
Reliability of financial reporting
Compliance with applicable laws and regulations
FACTS:
Monitoring:
Monthly reviews of performance reports
Internal audit function
MONITORING
INFORMATION AND
COMMUNICATION
Control Activities:
Purchasing limits
Approvals
Security
Reconciliations
Specific policies
CONTROL ACTIVITIES
RISK ASSESSMENT
CONTROL ENVIRONMENT
Control Environment:
Tone from the top
Corporate Policies
Organizational authority
10
Control Focus
Redefining the control focus
The new approach to controlling business risks may be characterized by the new rules of
prevent and monitor and build in quality as opposed to the old rules of detect and correct
and inspect in quality. This means a paradigm shift in the traditional viewpoint of control as
illustrated in the following table:
Old Paradigm
New Paradigm
11
Control Techniques
CONTROL TECHNIQUES
Prevention techniques are designed to provide reasonable assurance that only valid
transactions are recognized, approved and submitted for processing. Therefore, many of the
preventive techniques are applied before the processing activity occurs. In most situations,
preventive techniques are likely to be more effective in a strong control environment, when
management authorization criteria are well-defined and properly communicated.
Control type definitions:
Preventive - Manual
Preventive - System
Examples of preventive controls include:
Segregation of duties (Preventive-Manual)
Business systems integrity and continuity controls, e.g., application design standards,
change controls, security controls, systems backup and recovery (Preventive
System)
Physical safeguard and access restriction controls (human, financial, physical and
information assets) (Preventive-Manual)
Effective planning/budgeting process (Preventive-Manual)
Effective "whistle blowing" processes (Preventive-Manual)
12
Control Techniques
CONTROL TYPES
Detection techniques are designed to provide reasonable assurance that errors and irregularities
are discovered and corrected on a timely basis. Detection techniques normally are performed
after processing has been completed. They are particularly important in an environment that has
relatively weak preventive techniques. That is, when front-end approval and processing
techniques do not provide reasonable assurance that unacceptable transactions are prevented
from being processed or do not assure that all approved transactions are processed accurately. In
this case, after-the-fact techniques become more important in detecting and correcting processing
errors.
Control type definitions:
Detective - Manual
Detective - System
Examples of detection techniques include:
Reconciliation of batch balance reports to control logs maintained by originating departments.
(Detective Manual)
Reconciliation of cycle inventory counts with perpetual records. (Detective Manual)
Review and approval of reference file maintenance (was-is) reports. (Detective Manual)
Comparison of reported results with plans and budgets. (Detective Manual)
Reconciliation of subsidiary ledger balances with the general ledger. (Detective Manual)
Reconciliation of interface amounts exiting one system and entering another. (Detective
System)
13
Review of on-line access and transaction logs. (Detective System)
Conclusion
Why all this trouble?
Compliance with a very visible law
Puts teeth into the value statement, Do it right the first time
Additional comfort and tightness that the company is doing the right things and
communicating the right information internally, to the auditors and to the public
Over time, the metrics that evolve to monitor the control areas can provide insight for
key business decisions
Documentation will provide communication tool with management and improve ability to
train and share information
14
Control Environment
The control environment sets the tone of an organization, influencing the control consciousness of its
people. It is the foundation for all other components of internal control, providing discipline and structure.
Control environment factors include the integrity, ethical values and competence of the entity's people;
management's philosophy and operating style; the way management assigns authority and responsibility
and organizes and develops its people; and the attention and direction provided by the board of directors.
Risk Assessment
Every entity faces a variety of risks from external and internal sources that must be assessed. A
precondition to risk assessment is establishment of objectives, linked at different levels and internally
consistent. Risk assessment is the identification and analysis of relevant risks to achievement of the
objectives, forming a basis for determining how the risks should be managed. Because economic,
industry, regulatory and operating conditions will continue to change, mechanisms are needed to identify
and deal with the special risks associated with change.
Control Activities
Control activities are the policies and procedures that help ensure management directives are carried
out. They help ensure that necessary actions are taken to address risks to achievement of the entity's
objectives. Control activities occur throughout the organization, at all levels and in all functions. They
include a range of activities as diverse as approvals, authorizations, verifications, reconciliations, reviews
of operating performance, security of assets and segregation of duties.
15
Monitoring
Internal control systems need to be monitored -- a process that assesses the quality of the
system's performance over time. This is accomplished through ongoing monitoring activities,
separate evaluations or a combination of the two. Ongoing monitoring occurs in the course of
operations. It includes regular management and supervisory activities, and other actions personnel
take in performing their duties. The scope and frequency of separate evaluations will depend
primarily on an assessment of risks and the effectiveness of ongoing monitoring procedures.
Internal control deficiencies should be reported upstream, with serious matters reported to top
management and the board.
16