Download presentation
Presentation is loading. Please wait.
1
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES
2
Internal Control and Accountants’ Roles
Accountants as Managers – Sarbanes-Oxley Act of 2002 and Standard No. 2 of the Public Company Accounting Oversight Board (PCAOB) requires: Management to prepare a statement describing and assessing the company’s internal control system
3
Internal Control and Accountants’ Roles
Sarbanes-Oxley Act of 2002 and Standard No. 2 of the Public Company Accounting Oversight Board (PCAOB) requires: Annual reports of public companies to include: (1) a statement that management is responsible for internal controls over financial reporting,
4
Internal Control and Accountants’ Roles
Sarbanes-Oxley Act of 2002 and Standard No. 2 of the Public Company Accounting Oversight Board (PCAOB) requires: Annual reports of public companies to include: (2) a statement identifying the framework used by management to evaluate internal controls,
5
Internal Control and Accountants’ Roles
Sarbanes-Oxley Act of 2002 and Standard No. 2 of the Public Company Accounting Oversight Board (PCAOB) requires: Annual reports of public companies to include (3) an assessment of internal controls and disclosure of any material weaknesses, and
6
Internal Control and Accountants’ Roles
Sarbanes-Oxley Act of 2002 and Standard No. 2 of the Public Company Accounting Oversight Board (PCAOB) requires: Annual reports of public companies to include: (4) a statement that a public accounting firm has issued an attestation report on management’s assessment of internal control.
7
Internal Control and Accountants’ Roles
Accountants as Users – Must understand a company’s internal controls to apply them correctly.
8
Internal Control and Accountants’ Roles
Accountants as Designers of internal control procedures – Must understand a company’s internal controls in working to achieve to compliance with regulations and company objectives and to minimize risks
9
Internal Control and Accountants’ Roles
Accountants as Evaluators – must understand internal control systems to: Help develop management’s report that assesses internal controls (as internal auditors) Prepare an attestation to management’s statement about internal control (as external auditors) Conduct the audit of a company’s financial statements (as external auditors)
10
Framework for Studying Internal Control
Components of internal control (the COCO Report) Internal control objectives Risk assessment
11
Framework for Studying Internal Control
The COSO Report: 5 interrelated components of internal control: Control environment Risk assessment Control activities Information and communication Monitoring
12
Internal Control Components and Objectives
Execution objectives – 2 execution objectives for the revenue cycle: Ensure proper delivery of goods and services Ensure proper collection and handling of cash 2 execution objectives for the acquisition cycle: Ensure proper receiving of goods and services Ensure proper payment and handling of cash
13
Internal Control Components and Objectives
Information system objectives - Focus on recording, updating, and reporting accounting information Important for ensuring effective execution of transactions
14
Internal Control Components and Objectives
Asset protection objectives - Focus on safeguarding assets to minimize risk of theft or loss of assets
15
Internal Control Components and Objectives
Performance objectives – Focus on achieving favorable performance of an organization, person, department, product, or service Established to ensure effective operations
16
Assessment of Execution Risks: Revenue Cycle
Generic execution risks for each of the two revenue cycle transactions: 1.Delivering goods/services: Unauthorized sale/service permitted Authorized sale/service did not occur, occurred late, or was duplicated unintentally Wrong type of product/service Wrong quantity/quality Wrong customer/address
17
Assessment of Execution Risks: Revenue Cycle
Generic execution risks for each of the two revenue cycle transactions: 2. Collecting cash: Cash not collected or collected late Wrong amount of cash collected
18
Assessment of Execution Risks: Acquisition Cycle
Generic execution risks for each of the two acquisition cycle transactions: 1. Receiving goods/services: Unauthorized goods/services received Expected receipt of goods/services did not occur, occurred late, or was duplicated unintentionally Wrong type of product or service received Wrong quantity/quality Wrong supplier
19
Assessment of Execution Risks: Acquisition Cycle
Generic execution risks for each of the two acquisition cycle transactions: 2. Making payment: Unauthorized payment Cash not paid, paid late, or duplicate payment Wrong amount paid Wrong supplier paid
20
Assessment of Execution Risks: Revenue & Acquisition Cycles
Understanding and assessing execution risks – 5 steps: Step 1. Achieve understanding of the processes Step 2. Identify the at-risk goods/services provided and cash received Step 3. Restate generic risk to describe the execution risk more precisely for process under study - exclude irrelevant/immaterial risks
21
Assessment of Execution Risks: Revenue & Acquisition Cycles
Understanding and assessing execution risks – 5 steps: Step 4. Assess the significance of remaining risks Step 5. Identify factors that contribute to each significant risk – use events in the process to systematically identify factors What control activities could be implemented to mitigate the risks?
22
Assessment of Information Systems Risks
2 categories of information systems risks: Recording risks Updating risks
23
Assessment of Information Systems Risks
The process of recording and updating information – both a risk and a control Risk - information will be recorded incorrectly, perhaps resulting in transaction errors and incorrect financial statements Control – when information is correct because recorded information is used to control transactions
24
Assessment of Information Systems Risks
Recording risks: Risks that event information is not captured accurately in an organization’s information system Errors in recording can cause substantial losses Recording events late can cause opportunity losses In the acquisition cycle, recording errors can result in overpaying bills or loss of credit from failure to pay
25
Assessment of Information Systems Risks
Recording risks: Revenue/acquisition cycles - generic recording risks Event recorded never occurred Event not recorded, recorded late, or duplication of recording Wrong product/service recorded Wrong quantity/price recorded Wrong external/internal agent recorded Wrong recording of other data
26
Assessment of Information Systems Risks
Recording risks: Identifying recording risks – 3 steps Step 1. Achieve an understanding of the process under study - identify the events Step 2. Review events - identify where data are recorded in a source document or a transaction file
27
Assessment of Information Systems Risks
Recording risks: Identifying recording risks – 3 steps Step 3. For each event where data are recorded in a source document or transaction record: Consider the preceding generic recording risks Restate each generic risk to describe the risk more precisely for the particular event under consideration Exclude any risks that are irrelevant or immaterial
28
Assessment of Information Systems Risks
Updating risks: Risks that summary fields in master records are not properly updated Update failures can be costly Errors in updates can reduce the effectiveness of controls over the general ledger balances for assets and liabilities
29
Assessment of Information Systems Risks
Updating risks: Generic risks Update of master record omitted or unintended duplication of update Update of master record occurred at the wrong time If updates are scheduled, users need to know and schedule needs to be followed Summary field updated by wrong amount Wrong master record updated
30
Assessment of Information Systems Risks
Identifying pdating risks: 3 steps Step 1. Identify recording risks Step 2. Identify the events that include update activity and the summary fields in updated master files
31
Assessment of Information Systems Risks
Identifying update risks: 3 steps Step 3. For each event in updated master file Consider the preceding generic update risks Restate each generic risk to describe the update risk more precisely for the particular event under consideration Exclude any update risks that are irrelevant or immaterial
32
Recording and Updating in the General Ledger System
The General_Ledger File stores reference and summary data about the general ledger accounts. The process of updating a general ledger account is sometimes referred to as “posting.”
33
Recording and Updating in the General Ledger System
Risks in recording and updating information in a general ledger system: Risks Wrong general ledger account recorded Wrong amounts debited/credited General ledger master record not updated at all, updated late, or updated twice Wrong general ledger master record updated
34
Recording and Updating in the General Ledger System
Risks in recording and updating information in a general ledger system: Important to internal control: Policy for updating general ledger accounts should be well understood. Often, general ledger balances are updated after a batch of transactions, not with each transaction
35
Recording and Updating in the General Ledger System
Risks in recording and updating information in a general ledger system: Important to internal control: Employees need to know: Under the batch process, general ledger account balances are temporarily out of date When updates are made
36
Recording and Updating in the General Ledger System
Controlling risks: Identify significant risks of losses or errors Consider ways to control the risks Accountants, external auditors, or internal auditors evaluate existing controls and suggest additional controls where warranted
37
Control Activities The policies and procedures to address risks to achievement of the organization’s objectives Manual or automated May be implemented at various levels of the organization. 4 types of controls: Workflow controls Input controls General controls Performance reviews
38
Control Activities Workflow controls:
Used to control a process as it moves from one event to the next Exploit linkages between events Focus on: Responsibilities for events Sequence of events Flow of information between events in a business process
39
Control Activities Workflow controls: Segregation of duties
Use of information from prior events to control activities Required sequence of events Follow-up on events Sequence of prenumbered Recording of internal agent(s) accountable for an event in a process Limitation of access to assets and information Reconciliation of records with physical evidence of assets
40
Control Activities Organizations make an effort to segregate:
1. Segregation of duties: Organizations make an effort to segregate: Authorization of events Execution of events Recording of event data Custody of resources associated with the event The overview activity diagram is best suited to understanding and documenting segregation of duties
41
Control Activities 2. Use of information about prior events:
Information about prior events can come from documents or computer records. 2 examples of information from computer files: Checking summary data in master files to authorize events Transaction records may help control events - similar to using documents before approving an invoice
42
Control Activities 3. Required sequence of events:
Often, organizations - Have policies requiring a process to follow a particular sequence Require a sequence of events without having prior recorded information to rely on
43
Control Activities 4. Follow-up on events: Organizations:
Need automated or manual way to review transactions not yet concluded Should have “open” item or aging reports to identify events needing follow up Can design/use routine reports to flag unfinished business Can querying a database for status reports
44
Control Activities 5. Prenumbered documents:
Provide an opportunity to control events Prenumbered documents created during one event are accounted for in a later event Checking the sequence of prenumbered documents helps ensure that all events are executed and recorded appropriately
45
Control Activities 6. Recording of internal agent(s) accountable for an event in a process: Important Clear job descriptions and specific instructions from supervisors Recording employee ID number at the time the event Safeguarding of assets through use of with serial numbers, recordkeeping, and identification of custodian of the assets
46
Control Activities Safeguards
7. Limitation of access to assets and information: Safeguards Access to assets only for employees needing them for assigned duties Physical assets stored in secure locations Employees badges for access Alarms Password required for access to data
47
Control Activities 8. Reconciliation of records with physical evidence of assets: Ensures that recorded event and master file data correspond to actual assets Differs from the use of documents to control events – reconciliation: Is broader Usually involves data about multiple events Occurs after the events have been executed and recorded
48
Control Activities Input controls:
Used to control input of data into computer systems Drop-down or look-up menus Record-checking of data entered Confirmation of data entered Referential integrity controls Format checks to limit data Validation rules to limit the data Defaults from data entered in prior sessions
49
Control Activities Input controls:
Restriction against leaving a field blank Field established as a primary key Computer-generated values entered in records Batch control totals taken before data entry compared to printouts after data entry Review for errors before posting Exception reports
50
Control Activities General controls:
Broader controls that apply to multiple processes Help workflow and input controls be effective Organized into four categories: Information systems (IS) planning Organizing the information technology (IT) function Identifying and developing IS solutions Implementing and operating accounting systems
51
Control Activities Performance reviews:
Measure performance by comparing actual data with budgets, forecasts, or prior-period data Include analyzing data, identifying problems, and taking corrective action Ensure events support broader long-term goals Typically involve comparing actual results to plans, standards, and prior performance
52
Control Activities Performance reviews:
Often result in taking corrective action Require an information system (AIS in particular) that records and stores information about standards and actual outcomes Requires reports that allow for meaningful analysis of actual results
53
Control Activities Performance reviews: And master records
Related in two ways: Planned standards and budget figures (reference data) are typically recorded during file maintenance activities in master records Summary data stored in master records are often used to implement corrective action Summary fields in master records can also help in reviewing performance
54
KEYTERMS Application controls Control activities Control environment
Execution risk General controls Information system risks Input controls
55
KEYTERMS Internal controls Performance reviews Recording risks
Risk assessment Segregation of duties Update risks Workflow controls
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.