Internal control over Financial reporting : An IS control perspective

Slides:



Advertisements
Similar presentations
Basic Principles of GMP
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Internal Control in a Financial Statement Audit
INTERNAL CONTROLS.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
for Cabin Safety Inspectors
Federal Information System Controls Audit Manual (FISCAM)
The Managing Authority –Keystone of the Control System
Modern Systems Analyst and as a Project Manager
Making the System Operational
Audit Risk Week 10.
World Health Organization
Site Safety Plans PFN ME 35B.
Effectively applying ISO9001:2000 clauses 6 and 7.
Chapter 6 Data Design.
Legacy Systems Older software systems that remain vital to an organisation.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Demand for Audit and Assurance Services Chapter.
The Revenue Cycle: Sales to Cash Collections
The Special Significance of Audit of Inventories
Checking & Corrective Action
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
Section 404 Audits of Internal Control and Control Risk
Chapter 10: The Traditional Approach to Design
Systems Analysis and Design in a Changing World, Fifth Edition
Internal Control and Control Risk
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Audit of the Sales and Collection Cycle
PSSA Preparation.
Overall Audit Plan and Audit Program
Chapter 14 The Human Resources (HR) Management and Payroll Processes
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
Presented to the Tallahassee ISACA Chapter
Auditing Concepts.
Auditing Computer-Based Information Systems
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
Auditing Computer-Based Information Systems
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Auditing Internal Control over Financial Reporting
Chapter 5 Internal Control over Financial Reporting
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Internal Control in a Financial Statement Audit
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Evaluation of Internal Control System
Evaluation of Internal Control System. Learning Objective 1 Contrast management’s need for internal control with the auditor’s need to consider internal.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Chapter 8 Auditing in an E-commerce Environment
Statement of Auditing Standard No. 94 The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement.
Chapter 3-Auditing Computer-based Information Systems.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
8 INTERNAL CONTROL. Definition Duty  mgt (CEO)  Board  Internal auditor  Employee  External person.
Auditing Concepts.
The Impact of Information Technology on the Audit Process
Defining Internal Control
The Impact of Information Technology on the Audit Process
Effects of IT on Consideration of Internal Control in a Financial Statement Audit Dr. Donald McConnell Jr. 12/1/2018.
Statement of Auditing Standard No. 94
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Internal control over Financial reporting : An IS control perspective CA ANAND PRAKASH JANGID

Agenda Check in Financial Reporting & Regulation Understanding Internal Control IS Controls & Internal controls Summary

What is common among them????

Financial Reporting & Regulation

Effects Goodwill? Public Trust? Belief? Jobs Penalties Money

Inefficient Internal Controls Causes Greed Inefficient Internal Controls Loopholes Lack of Guidance

Key Audit standards and IS controls SA 300 - Planning an Audit of Financial Statements SA 315- Identifying and assessing the risk of material misstatement through understanding the entity and its environment SA 402 - Audit considerations relating to an entity using a service organization SA

SA 300 The effect of information technology on the audit procedures, including the availability of data and the expected use of computer assisted audit techniques. Evidence of management’s commitment to the design, implementation and maintenance of sound internal control, including evidence of appropriate documentation of such internal control.

SA 315 : Para A50 Controls in IT systems consist of a combination of automated controls (for example, controls embedded in computer programs) and manual controls. Further, manual controls may be independent of IT, may use information produced by IT, or may be limited to monitoring the effective functioning of IT and of automated controls, and to handling exceptions. When IT is used to initiate, record, process or report transactions, or other financial data for inclusion in financial statements, the systems and programs may include controls related to the corresponding assertions for material accounts or may be critical to the effective functioning of manual controls that depend on IT.

SA 315 : Para 52 Information Technology also poses specific risks to an entity’s internal control, including, for example : Reliance on systems or programs that are inaccurately processing data, processing inaccurate data, or both. Unauthorized access to data that may result in destruction of data or improper changes to data, including the recording of unauthorized or nonexistent Transactions, or inaccurate recording of transactions. Particular risks may arise where multiple users access a common database. The possibility of IT personnel gaining access privileges beyond those necessary to perform their assigned duties thereby breaking down segregation of duties. Unauthorized changes to data in master files. Unauthorized changes to systems or programs. Failure to make necessary changes to systems or programs. Inappropriate manual intervention. Potential loss of data or inability to access data as required.

SA 402 Para 3: “ Services provided by a service organization are relevant to the audit of a user entity’s financial statements when those services, and the controls over them, are part of the user entity’s information system, including related business processes, relevant to financial reporting” Para 5 : Information available on general controls and computer systems controls relevant to the client's applications

SA 265 - COMMUNICATING DEFICIENCIES IN INTERNAL CONTROL TO THOSE CHARGED WITH GOVERNANCE AND MANAGEMENT Duties of Auditor To find significant deficiencies in the IC system. Impact on F/S after performing Risk Assessment Procedures (SA 315). Obtaining Written Representations from Management (SA 580) and communication.

SA 315 - IDENTIFYING AND ASSESSING THE RISK OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT Auditor’s Role Obtain Understanding of the Internal Control System. Perform Risk Assessment Procedures. Categorization of Risks.

SA 330 - THE AUDITOR’S RESPONSES TO ASSESSED RISKS Auditor’s Role Classifying assessed risks as inherent or controllable Design Responses to assessed risks Communicate to Management (SA 265)

IS Controls and CARO Para 34 of SA 400

Clause 49 – CEO-CFO Certification The CEO and the CFO certify that they: accept the responsibility for establishing and maintaining internal controls; have evaluated the effectiveness of internal control systems have disclosed to the Auditors and the Audit Committee: deficiencies in internal controls (in design & operation) and remediation steps (taken or proposed to be taken) They have indicated to the Auditors and Audit Committee significant changes in internal control during the year

Understanding Internal Controls

Internal Controls Internal control is defined as a process affected by an organization's structure, work and authority flows, people and management information systems, designed to help the organization accomplish specific goals or objectives. It means policies framed by the management in order to have stronger and adequate control within the organization which can be checked by the internal auditor in order to ensure that the goals and objectives are duly met.

Components of Internal Controls Control Environment Risk Assessment Control Activities Information and Communication Monitoring Control Environment The control environment sets the tone of an organization, influencing the control consciousness of its people. It is the foundation for all other components of internal control, providing discipline and structure. Control environment factors include the integrity, ethical values and competence of the entity's people; management's philosophy and operating style; the way management assigns authority and responsibility, and organizes and develops its people; and the attention and direction provided by the board of directors. Risk Assessment Every entity faces a variety of risks from external and internal sources that must be assessed. A precondition to risk assessment is establishment of objectives, linked at different levels and internally consistent. Risk assessment is the identification and analysis of relevant risks to achievement of the objectives, forming a basis for determining how the risks should be managed. Because economic, industry, regulatory and operating conditions will continue to change, mechanisms are needed to identify and deal with the special risks associated with change. Control Activities Control activities are the policies and procedures that help ensure management directives are carried out. They help ensure that necessary actions are taken to address risks to achievement of the entity's objectives. Control activities occur throughout the organization, at all levels and in all functions. They include a range of activities as diverse as approvals, authorizations, verifications, reconciliations, reviews of operating performance, security of assets and segregation of duties. Information and Communication Pertinent information must be identified, captured and communicated in a form and timeframe that enable people to carry out their responsibilities. Information systems produce reports, containing operational, financial and compliance-related information, that make it possible to run and control the business. They deal not only with internally generated data, but also information about external events, activities and conditions necessary to informed business decision-making and external reporting. Effective communication also must occur in a broader sense, flowing down, across and up the organization. All personnel must receive a clear message from top management that control responsibilities must be taken seriously. They must understand their own role in the internal control system, as well as how individual activities relate to the work of others. They must have a means of communicating significant information upstream. There also needs to be effective communication with external parties, such as customers, suppliers, regulators and shareholders. Monitoring Internal control systems need to be monitored--a process that assesses the quality of the system's performance over time. This is accomplished through ongoing monitoring activities, separate evaluations or a combination of the two. Ongoing monitoring occurs in the course of operations. It includes regular management and supervisory activities, and other actions personnel take in performing their duties. The scope and frequency of separate evaluations will depend primarily on an assessment of risks and the effectiveness of ongoing monitoring procedures. Internal control deficiencies should be reported upstream, with serious matters reported to top management and the board.

Equation of Internal Control General Financial Controls IS Controls Internal Controls

IS Controls IS Controls Application Controls IT General Controls

Objective of IS Controls Maintaining Confidentiality Preserving Integrity Ensuring Availability

Applications Controls Application software is the software that processes business transactions. The application software could be a payroll system, a retail banking system, an inventory system, a billing system or, possibly, an integrated ERP. It is the application software that understands data with reference to their business context. The rules pertaining to the business processes are implemented in the application software.

Examples of Applications General Ledger Fixed Assets Inventory Control Enterprise Resource Planning Human Resources And, everyone’s favorite – Payroll…

Types of Application Controls Input Controls Processing Controls Output Controls Integrity Controls Management Trail

Examples for Application controls Input Controls Data checks and validations Automated authorization, approval, and override Automated SOD Processing Controls Automated file identification and validation Automated functionality and calculations Audit trails and overrides Data extraction, filtering, and reporting Interface balancing Automated functionality and aging Duplicate checks Output Controls General ledger and sub-ledger posting Update authorization

Examples for Application Controls Integrity Controls Data encryption, which locks data by cipher Data backup, which stores a copy of data in an alternate location Access controls, including assignment of read/write privileges Input validation, to prevent incorrect data entry Data validation, to certify uncorrupted transmission Management Trail Systems Control Audit Review File and Embedded Audit Modules (SCARF/EAM) Snapshots Audit hooks Integrated Test Facility Continuous and Intermittent Simulation

General Controls IT general controls (ITGC) are controls that apply to all systems components, processes, and data for a given organization or information technology (IT) environment. The objectives of ITGCs are to ensure the proper development and implementation of applications, as well as the integrity of programs, data files, and computer operations. ITGCs may also be referred to as General Computer Controls which are defined as: Controls, other than application controls, which relate to the environment within which computer-based application systems are developed, maintained and operated, and which are therefore applicable to all applications. These are policies and procedures that relate to many applications and support the effective functioning of application controls by helping to ensure the continued proper operation of information systems.

Types of IT General Controls Logical access controls over infrastructure, applications, and data. System development life cycle controls. Program change management controls. Data center physical security controls. System and data backup and recovery controls. End User controls. IS Security

Key areas which needs attention Logical Access Grant of access Revocation of Access SDLC Documentation of Requirements Integration testing and UAT Training to end users Change Management Source Code versioning Rollback Plan Release Management Archival of older versions

Key areas which needs attention Data Center and Physical Access Physical Locks and Bio metric locks Data Center Environment Security Personnel Backup and Recovery Backup Procedures Recovery Procedures Application data and environment Backup Tapes End User Acceptable Usage Password Policy Ticket Management Logs and Review

Key areas which needs attention – IS Security Antivirus Firewall Wireless Network Computers Server Network Servers Encryption MAC Filter Patch Updates Virus Definition Updates Automatic Log out and screen lock

Summary With the advent of IT in every sphere of business it have been evident that we Chartered Accountants need to rise and seize this opportunity.

When are these opportunities?? Check out When are these opportunities?? Half our life is spent trying to find something to do with the time we have rushed through life trying to save. Will Rogers

Questions???

Thank You CA ANAND PRAKASH JANGID +91 9620233516 anand@quadrisk.com