COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.

Slides:



Advertisements
Similar presentations
Control and Accounting Information Systems
Advertisements

Auditing Concepts.
Auditing Computer-Based Information Systems
Internal Control.
INTERNAL CONTROL COMPONENT Pertemuan_6 Mata Kuliah: CSP402, IT Governance Tahun Akademik : 2012/2013 SAS 78 / COSO Describes the relationship between the.
Auditing Computer Systems
The Islamic University of Gaza
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
CHAPTER 10 UNDERSTANDING INTERNAL CONTROLS Fall 2007
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
Chapter 4 Internal Control Bus 319 Accounting Information Systems.
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Expanded Version of COSO a presentation by Steve Wadleigh Expanded Version of COSO a presentation by Steve Wadleigh Standards for Internal Control in the.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
Information Systems Controls for System Reliability -Information Security-
INTERNAL CONTROL OVER FINANCIAL REPORTING
Elements of Internal Controls Preventing Fraud, Waste, and Abuse in Urban and Rural Transit Systems.
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT Module 3.2 -Internal Control & Audit.
Information Technology Audit
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Control and Accounting Information Systems
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
The Islamic University of Gaza
Chapter 3 Internal Controls.
Transaction Processing and the Internal Control Process Small Business Information Systems Professor Barry Floyd.
The Sarbanes-Oxley Act of PricewaterhouseCoopers Introduction of Panel Members The Sarbanes-Oxley Act of 2002 What Companies Should Be Doing Now.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
Chapter 5 Internal Control over Financial Reporting
Page 1 Internal Audit Outsourcing The Moss Adams Approach to Internal Audit Outsourcing Proposed SOX 404 Changes.
Considering Internal Control
Introduction In 1992, the Committee Of Sponsoring Organizations of the Treadway Commission (COSO) published Internal Control-Integrated Framework (1992.
Internal Control in a Financial Statement Audit
Everyone’s Been Hacked Now What?. OakRidge What happened?
Internal Control Over Financial Reporting
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
PwC 21 CFR Part 11 – A Risk Management Perspective Patrick D. Roche 07 March 2003, Washington D.C.
S4: Understanding the IT environment of the entity.
Everyone’s Been Hacked Now What?. OakRidge What happened?
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
CHAPTER 5 INTERNAL CONTROL OVER FINANCIAL REPORTING.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Chapter 9: Introduction to Internal Control Systems
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chapter 8 Auditing in an E-commerce Environment
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
WESTERN PA CHAPTER OF THE AMERICAN PAYROLL ASSOCIATION – NOVEMBER 4, 2015 Risk Management for Payroll.
Chapter 5 Evaluating the Integrity and Effectiveness of the Client’s Control Systems.
Chapter 3-Auditing Computer-based Information Systems.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Auditing Concepts.
Internal Control.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication –Monitoring NOTE: COBIT developed to help achieve this goal

Control Environment IT should be included in company-wide ethics policies Capital expenditure policies should include specifics regarding IT purchases, included approval requirements Support the achievement of organizations financial reporting control objectives Appropriate segregation of duties in IT department itself

Computer systems - Segregation of Duties Recommended IT department segregation of duties: Systems Analyst, Programmer, Computer operator, Testing group, AIS Librarian (data, programs), Manager. What type of control is this? Preventive One way for a company to address this risk is to? Share it – can use external consultant for pieces of application support, or utilize a web based application

Risk Assessment IT factors should be included in determining the risk that management objectives related to reliable financial reporting will not occur (SOX section404). Examples of IT risks: –Key system/application not available when needed –Significant information integrity failure (e.g., completeness, validity, etc.) –Implementation of an unauthorized change to a key system/application –Failure to properly maintain or update a key system/application

Risk Assessment IT Factors Factors that could increase the likelihood of a risk occurring: –Complex system and related application(s) –High volume of transactions being processed –History of significant error –High customization of applications –Old/dated system/application –High extent and complexity of revisions made to system

Control Activity: Computerized Controls Friend or Foe? Benefits: Decrease human error, restrict access, decrease duplication of input, audit trail Detriments: Confidentiality, system integrity, completeness, input errors, audit trail

Internal Controls -Computerized AIS Environment Some concepts of controls do not change –Objective: mitigate risks –Control Environment: its importance & impact

Internal Controls -Computerized AIS Environment Concepts of controls that change: –Characteristics: Imbedded/automated –Frequency: Continuous vs. periodic –Errors: Systemic vs. random

Categories of IT Internal Controls: 1.General Controls – pervasive, relate to the entire system Examples: physical access restrictions, backup process, policies, disaster recovery, segregation of duties 2.Application Controls – specific, relate to individual portions of the system—or types of transactions Examples: passwords, security matrix, edit reports, smart fields, batch totals

Control Activities Management should ensure that both IT general and application controls exist and support the objectives of the compliance effort. Some of the key areas related to IT include: –Designing and implementing controls designed to mitigate significant identified IT risks –Monitoring key IT controls for continued effectiveness –Documenting and testing IT controls related to §404

Information and Communication IT items to consider: –Define, implement, and maintain system security levels. Periodically review and modify. –Develop, document and communicate IT policies and procedures –Process in place to assess compliance with IT policies, procedures and standards –Investigate IT compliance deviations, remediate as needed

Monitoring Companies need to evaluate the actual ability of designed controls to reduce risk to an appropriate and planned level. For example: –Perform evaluation of operating effectiveness of control activities periodically and document them –Leverage technology to its fullest extent to document processes, control activities, identify gaps and evaluate effectiveness of controls –Controls are continuously evaluated and updated to reflect necessary major process or organizational changes

Access and safeguarding Data protection –passwords, smart fields, firewalls, backup files, security matrix, etc. Physical protection – restrict access to computer rooms, monitor access to IT computers/programs, restrict access to internet, etc. Uninterruptible power sources-separate grid, backup generator, etc. Disaster recovery-hot sites, cold sites, etc.

Security Matrix (Access Control) A table listing all authorized users and their corresponding abilities within a system. This should include type of access as well –Read –Change –Delete Powerful SOD tool Change management is key to remaining effective Type of control? –Preventive

Problem 7.3 Take 10 minutes and complete Problem 7.3 a. NOTE: Processing is equal to a 3 (read, modify, create and delete).

7.3 a.: Access Control Matrix User GroupPayroll Program Inventory Program Payroll File Inven. File Trans. File Sales00010 Inventory Control Payroll Clerk00200 HR Manager00300 P/R Prog Inventory Prog CIO33333

Problem 7.3 Complete part b of problem minutes

7.3 b. 1.Inventory control: Should not have create and delete rights to the inventory file. This analyst should only have read, display, and update rights to the inventory program. 2.Human resources manager: Should only have read access right to the payroll file. Also add read to Transaction File as a management review tool. NOTE:CIO is part of a small company without proper IT segregation of duties. How could this added risk be addressed?

Things to keep in mind regarding IT General computer controls should be: –based on financial reporting requirements –signed off by key business process owners –not left to the sole responsibility of the IT function. IT application controls should also be defined by business- user requirements, and not the IT function.

IT Controls and SOX IT controls are embedded into controls critical to reliable financial reporting. For example: –Establishment of data classification (e.g. chart of accounts, account groupings, or aging) –User management (e.g., authentication, authorization, or initiation) –Monitoring of transaction thresholds and tolerance levels (e.g. smart fields, exception reports, etc.) –Data processing integrity and validation

SOX and IT Management must identify where technology is critical in the support of the financial statement process, including the key systems and subsystems that need to be included in the scope of the SOX compliance project. Systems may be within the scope, if they are involved in the initiation, recording, processing, and/or reporting of financial information. Only IT systems that are associated with a significant account or related business process need to be considered for compliance purposes. The higher the risk, the greater the need for relevant IT control assurance.

Factors to consider for SOX inclusion Factors that should be considered when determining whether systems need to be reviewed and tested as part of a Sarbanes-Oxley compliance project include: –Volume of transactions –Dollar-value of transactions –Complexity of transactions –Sensitivity of financial data and reports