12/06/20161 ObjectiveProcess Risk Inherent Risk – risk of not achieving objectives Inherent risk Inherent risk – before the assessment of any controls.

Slides:



Advertisements
Similar presentations
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Advertisements

Chapter 10 Accounting Information Systems and Internal Controls
Sodexo.com Group Internal Audit. page 2 helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and.
Internal Control.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Eliot M. Stenzel, CPA,CIA IIA Instructor for many years Risk Based Auditing.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
Internal Control Pertemuan 05 s.d 06 Matakuliah: F0712 / Lab Sistem Informasi Akuntansi Tahun: 2007.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Office of Inspector General (OIG) Internal Audit
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
INTERNAL CONTROLS. Session Objectives Understand why an organization should have internal controls Understand the key components of internal controls.
Auditing the Purchasing Process
IA Clinic. การเตรียมการตรวจสอบ แผนการ ตรวจสอบ แผนการ ปฏิบัติงาน ตรวจสอบ หารือ หน่วยรับตรวจ รายงานผล การตรวจสอบ ติดตามผล การตรวจสอบ ผลการประเมินความเสี่ยง.
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT Module 3.2 -Internal Control & Audit.
Control and Accounting Information Systems
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
Planning an Audit The Audit Process consists of the following phases:
Erica Cummings Grant Coordinator 1.  The New Mexico Department of Homeland Security and Emergency Management (DHSEM) is responsible for:  Monitoring.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Internal controls. Session objectives Define Internal Controls To understand components of Internal Controls, control environment and types of controls.
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
Internal Control in a Financial Statement Audit
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Internal Control in a Financial Statement Audit
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
IT Service Delivery And Support Week Eleven – Auditing Application Control IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Evaluation of Internal Control System. Learning Objective 1 Contrast management’s need for internal control with the auditor’s need to consider internal.
Webinar for FY 2011 i3 Grantees February 9, 2012 Fiscal Oversight of i3 Grants Erin McHughJames Evans, CPA, CGFM, CGMA Office of Innovation and Improvement.
Chapter 10 THE ACQUISITION CYCLE— PURCHASE INVOICES AND PAYMENTS.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
FACILITATOR Prof. Dr. Mohammad Majid Mahmood Art of Leadership & Motivation HRM – 760 Lecture - 25.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Audit Risk and Audit Evidence
Chapter 9: Introduction to Internal Control Systems
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
S5: Internal controls. What is Internal Control Internal control is a process Internal control is a process Internal control is effected by people Internal.
Internal Auditing ISO 9001:2015
Purchasing Forum – May The integration of the activities, plans, attitudes, policies, and efforts of the people of an organization working together.
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT Module 4.3: Internal Control & Audit.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
SUNY Maritime College Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Jean-Pierre Garitte Budapest 29 March 2017
Internal Audit & Accounting Systems Review
Accounts Receivable, Accounts Payable & Cash
Internal Control.
Internal and Governmental Financial Auditing and Operational Auditing
SYSTEMS ANALYSIS Chapter-2.
PLANNING THE INTERNAL AUDIT (8 - 10%)
Risk based audit methodology
MARKETING, PURCHASING AND PRODUCTION (7 - 9%)
Internal controls 01-Nov-2017.
Unit 11 October 22, 2017.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

12/06/20161 ObjectiveProcess Risk Inherent Risk – risk of not achieving objectives Inherent risk Inherent risk – before the assessment of any controls

12/06/20162 Risk & recommendations IMPACTx Likelihood Root cause – reasons for high likelihood focus: Audit objectives Field work Recommendations Effect – reasons for a high impact focus: Audit objectives Fieldwork Recommendations

12/06/20163 Different impacts Financial Financial Service delivery Service delivery Political Political Legal Legal Environmental Environmental Human resources Human resources

12/06/20164 Risk index

12/06/20165 Risk management strategy unacceptable risks acceptable risks 5 10

12/06/20166 ObjectiveControlProcess Risk Control to minimize risks Residual risk Inherent risk Residual risk – after the assessment of any controls

12/06/20167 COSO – all five components must be present and functioning before a control system can be effective Control environment Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Risk assessment Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Info and commu- nication Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Control activity - prevention Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Monitoring activities - detection Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency

Practical exercise Process overview flowchart Process overview flowchart SCRE SCRE Audit objective Audit objective Risk areas Risk areas Preventative and detection controls Preventative and detection controls Audit opinion Audit opinion

Enter data Application program Suppliers master file the change details to supplier Exception reports number of changes Phone call with password to cell phone INPUT OUTPUT PROCESSING Bank EDI Exception reports Frequency

Cheque payment/ EFT requisition Enter data Application program Purchase transaction file Cash disbursement transaction file Suppliers master file Accounts payable master file General ledger master file General ledger transaction file Disbursements journal Purchase journal General ledger summary Exception reports and KPI’s Remittance advice Cheque Purchase order Goods received note, supplier delivery note, invoice INPUT OUTPUT DOCUMENTATION PROCESSING

Enter data Application program Purchase transaction file Suppliers master file Purchase order Goods received note, supplier delivery note, invoice S C R E

To evaluate the adequacy and effectiveness of the controls relating to reliability and integrity of: Asset count forms Asset count forms Asset removal forms Asset removal forms Capturing Capturing Processing Processing Updating the fixed asset register Updating the fixed asset register

Enter data Application program Purchase transaction file Suppliers master file Purchase order Goods received note, supplier delivery note, invoice E S S R R R R

Audit objective To evaluate the adequacy and effectiveness of controls relating to: Safeguarding of assets in the goods received area Safeguarding of assets in the goods received area Reliability and integrity of information in the: Reliability and integrity of information in the: Capturing phase Capturing phase Processing phase Processing phase Updating the PTF Updating the PTF Updating the SMF Updating the SMF Economic, effective and efficient use of resources in the ordering phase Economic, effective and efficient use of resources in the ordering phase

Audit opinion The controls relating to: Safeguarding of assets in the goods received area Safeguarding of assets in the goods received area Reliability and integrity of information in the: Reliability and integrity of information in the: Capturing phase Capturing phase Processing phase Processing phase Updating the PTF Updating the PTF Updating the SMF Updating the SMF Economic, effective and efficient use of resources in the ordering phase Economic, effective and efficient use of resources in the ordering phase Are adequate and effective

Audit objective To evaluate the adequacy and effectiveness of controls relating to: Safeguarding of assets (access control) Safeguarding of assets (access control) Allocation of unique supplier profile passwords Allocation of unique supplier profile passwords in the capturing phase in the capturing phase Reliability and integrity of information in the: Reliability and integrity of information in the: Capturing phase Capturing phase Processing phase Processing phase Updating the SMF Updating the SMF Exception reports (quantity and frequency) Exception reports (quantity and frequency) confirmations confirmations

Audit opinion The controls relating to: Safeguarding of assets (access control) Safeguarding of assets (access control) Allocation of unique supplier profile passwords Allocation of unique supplier profile passwords in the capturing phase in the capturing phase To the availability of the suppliers file To the availability of the suppliers file Reliability and integrity of information in the: Capturing phase Capturing phase Processing phase Processing phase Updating the SMF Updating the SMF Exception reports (quantity and frequency) Exception reports (quantity and frequency) confirmations confirmations Are adequate and effectiveness

12/06/ Audit objectives To evaluate the adequacy and effectiveness of the internal control systems that ensures S C R E

12/06/ Audit objectives To evaluate the adequacy and effectiveness of the internal control systems (choose prevention, detection or correction) that ensures S C R E

12/06/ Audit objectives To evaluate the adequacy and effectiveness of the prevention controls that ensures R – reliability and integrity of information R – reliability and integrity of information

12/06/ Audit objectives To evaluate the adequacy and effectiveness of the prevention controls that ensures R – reliability and integrity of information R – reliability and integrity of information of the purchase order

12/06/ Risk response

12/06/ Objective ControlProcess Risk R > C Inadequate Control assessment C > R Inefficient C = R Adequate/effec tive CoC > CoR Uneconomic

12/06/ Control analysis Control activity Maintain physical security over goods received Segregate custodial and record keeping functions PreventionDetectionITManual Added value opportunity Computerise to increase efficiency, economy, effectiveness IT management information allows for effective detection controls Detection control allows development of prevention controls

12/06/ Added value IMPACTx LikelihoodIMPACTxLikelihood Inadequate controls Recommendation = Added value

12/06/ Finding Clear Clear Concise Concise Factual Factual Inadequate Inadequate Inefficient Inefficient Ineffective Ineffective Uneconomic Uneconomic Audit report - finding

12/06/ Determine the causes Determine what circumstances, if any, caused identified weaknesses. Determine what circumstances, if any, caused identified weaknesses. Consider materiality of effect, before spending much time determining causes. Consider materiality of effect, before spending much time determining causes. Determine if participants understand both purpose of and their role Determine if participants understand both purpose of and their role Determine if relationship between accounts payable process and other department processes is clear. Determine if relationship between accounts payable process and other department processes is clear. If process occurs at multiple locations, determine nature and scope of communication and coordination among components. If process occurs at multiple locations, determine nature and scope of communication and coordination among components.

12/06/ Determine if accounts payable process has adequate human, rand, time, and asset resources. If inadequate, determine if resources have been allocated according to materiality of accounts payable process relative to other processes. Negative trends in reports used to monitor outcome(s) - determine if reports are communicated to and used by appropriate parties to modify process. Determine what internal or external constraints or barriers, if any, must be removed in order to overcome these identified weaknesses. Review applicable laws or regulations to determine if any of them prevent necessary changes from being made in the accounts payable process. Determine the causes

12/06/ Determine the effect Compare actual process to a recommended alternative process(es) and determine if each weakness in department process is material. Materiality can be measured by comparing the rand cost, impact on economy, risks, etc. of actual process to recommended alternative process(es). Compare actual process to a recommended alternative process(es) and determine if each weakness in department process is material. Materiality can be measured by comparing the rand cost, impact on economy, risks, etc. of actual process to recommended alternative process(es). Measurements can be quantitative, qualitative, or both. Measurements can be quantitative, qualitative, or both. Identify benchmarks (industry standards, historical internal data, other comparable departments, etc.) for process in question and compare to actual performance. Identify benchmarks (industry standards, historical internal data, other comparable departments, etc.) for process in question and compare to actual performance. Measure difference, if possible. Measure difference, if possible. Include cost of additional controls or changes in process. Include cost of additional controls or changes in process.

12/06/ Estimate cost of the actual process and alternative process(es) and compare. Estimate quantity and/or quality of services provided by actual process and by alternative process(es) and compare. Identify risks associated with actual process and with alternative process(es). Measure and compare the risks. Determine the effect

12/06/ Develop recommendations Develop specific recommendations to correct weaknesses identified as material. Develop specific recommendations to correct weaknesses identified as material. In developing recommendations, consider tailored criteria, kind of process and control weaknesses identified, causes and barriers, effects, and additional resources In developing recommendations, consider tailored criteria, kind of process and control weaknesses identified, causes and barriers, effects, and additional resources Solicit solutions and recommendations from client. Solicit solutions and recommendations from client. Identify alternative solutions used by other business units. Identify alternative solutions used by other business units. Identify solutions for removing barriers. Identify solutions for removing barriers. Provide general guidelines as to objectives each solution should meet; then the department can tailor the solution to its specific situation. Provide general guidelines as to objectives each solution should meet; then the department can tailor the solution to its specific situation. Provide specific information, if available, on how each recommendation can be implemented. Provide specific information, if available, on how each recommendation can be implemented.

12/06/ Cause – directs recommendation Root cause of the finding What was inherent risk? What was inherent risk? Did management agree? Did management agree? Root cause? Root cause? Lack of budget/staff/skills? Inadequate detection Inadequate management information systems Lack of responsibility and accountability Infrastructure IMPACT Likelihood

12/06/ Effect Effect What is the effect? What is the effect? How will it be changed? How will it be changed? How will it be monitored? How will it be monitored? Does it reduce accountability? Does it reduce accountability? IMPACT Likelihood

12/06/ Recommendation Recommendation - teamwork real time-online real time-online detection focused detection focused reduce risk reduce risk change likelihood/root cause change likelihood/root cause reduce effect/impact reduce effect/impact enhance effectiveness, efficiency and economic use of resources enhance effectiveness, efficiency and economic use of resources assign responsibility assign responsibility Recommendation = responsibility

12/06/ Accept recommendation Accept the risk Management comment

12/06/ Inadequate Recommend new control that change effect residual risk Recommend new control that change effect residual risk Measure change Measure change Ineffective Non compliance Non compliance Cause Cause Disciplinary action Disciplinary action Audit report - recommendation Inefficient Difference between basic control and best practice Measure change Cost and benefit

12/06/ Audit report CriteriaCondition Cause and effect Recommendation Management Comment Accept? What? When? Who? How to fix it What? When? Who?

12/06/ Audit report - process Audit report Finding worksheet -effectiveness – IA - adequacy - AD Review by AD Benchmark and review by DD Quality control Final draft audit report AuditeeComments Final audit report

12/06/ Audit opinion The prevention controls that ensures R – reliability and integrity of information R – reliability and integrity of information are adequate and effective

12/06/ COSO – all five components must be present and functioning before a control system can be effective Control environment Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Risk assessment Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Info and commu- nication Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Control activity - prevention Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Monitoring activities - detection Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency

12/06/ Audit opinion - adequacy & efficiency Controls are EfficientInefficient Adequate12 Partially adequate 34 InadequateN/A5/6

12/06/ Audit report CriteriaConditionCause Finding Recommendation Management Comment Effect AccountabilityResponsibility Accept the recommendation or accept the risk! Include in job descriptions! Root cause analysis Title of the finding

12/06/ Follow up Audit scope and objectives Document system (POF) Identify weaknesses Inadequate opinion No compliance work Recommendations Follow up audit Adequate controls Effectiveness audit Likelihood assessment ADD VALUE

12/06/ Follow up Identify the Scope for the Follow-up Audit Select the Sample Size and Items to be Tested Execute the Audit Work Develop Informal Queries and Discuss with the Client Report to Management