6. Evaluating systems of internal control Flashcards
What are internal controls?
(and what are the five components?)
A ‘system of internal control’ is the system designed, implemented and maintained by those charged with governance to provide reasonable assurance about the achievement of an entity’s objectives with regard to reliability of financial reporting, effectiveness and efficiency of operations, and compliance with applicable laws and regulations.
Made up of five components:
1. Control environment (the attitude of those charged with governance towards controls)
- Client’s risk assessment process (how risks are identified and analysed by those charged with governance)
- Client’s process to monitor the system of internal control (how a client evaluates the effectiveness of internal control, whether remedial actions are taken, whether an internal audit department exists etc)
- Information system and communication (an information system consists of infrastructure (physical and hardware components), software, people, procedures and data used by the client to initiate, record and process transactions and events)
- Control activities (policies and procedures which may prevent, or detect and correct, fraud and errors)
Why are internal controls important?
- Reduce and minimise the risk of fraud and error
- Guarantee the accuracy of information
- To make sure the information reported both internally and externally is reliable and can be used for decision-making
What are the limitations of internal controls?
Acronym: RC CHUM
- Relevancy/ Obsolescence;
- Cost;
- Collusion;
- Human error;
- Unusual/ infrequent transactions
- Management override.
What are the 5 categories of control activities?
- authorisation and approvals
- reconciliations
- verification
- segregation of duties
- physical or logical controls
How are accounting information systems designed by management?
(State the steps for the design of the system)
Step 1: Identify the company’s objectives
E.g. correct reporting of financial position and performance to the shareholders, effective and efficient operations, compliance with laws and regulations etc.
Step 2: Identify risks to these objectives
Management must consider the risks that may stop these objectives being achieved (ie what could go wrong) aka business risks.
Step 3: Implement control activities to mitigate these risks where possible
For example, passwords for access to the payroll system so that new employees cannot be added without appropriate authority and approval.
What are business processes within an accounting information system and give some examples
Business processes are a series of activities that enable a company to meet one or more of its objectives.
Examples include a company’s order fulfilment process, marketing process, budgeting process and human resources process.
What are general IT controls and the key areas that these controls cover?
(State some examples)
ITGCs are policies and procedures relating to the overall IT environment, including all applications. (Essentially a bubble around the IT system and controls to allow them to function effectively)
Key areas: Access to programs and data , Program changes and development, Computer operations and Continuity of operations.
Examples:
* Restricting computer access via the use of unique usernames and passwords
- Ensuring that any sensitive data held in electronic format can only be accessed by properly authorised personnel
- Ensuring any hardware or software purchased is of the necessary quality and standard
- Maintaining IT systems
- Proper backup and recovery procedures
- Ensuring the data centre or information processing facility has adequate air conditioning (temperature, humidity), power supply (uninterruptible power supplies, generators) and smoke detectors etc
What are information processing controls?
(state examples)
Information processing controls typically operate at the transaction level and apply to the processing of specific types of transactions to make sure that transactions recorded within an application are genuine, accurate and complete.
Examples:
1. Automatic calculations can be embedded within applications based on information that has been inputted. e.g. VAT = 20% on all invoices.
- Programmed Editing: the computer is programmed to anticipate types of entries in particular fields. e.g. quantity 1-100.
- Exception reports: A report generated that identifies any transactions that are outside the normal expected range. e.g. staff paid >10% more compared to prior month.
How do the components of internal control affect the auditor’s work?
If any of these components of the internal control system are ineffective, this will increase control risk.
Five components:
- Control environment: The auditor will assess the control environment by inspecting documentation, observing operations, and making inquiries to determine how it influences the overall internal control system.
- Risk assessment process: The auditor examines the entity’s risk assessment process to ensure it properly identifies and manages risks. An effective risk assessment process lowers control risk and helps the auditor identify any business risks that could impact the financial statements, as well as any weaknesses in the internal control system.
- Monitoring of controls: The auditor evaluates how well the entity monitors its controls. Effective monitoring suggests that control activities will continue to function properly, which reduces the risk of material misstatement (RoMM). The auditor can then focus on key areas of risk.
- Information Systems and Communication: Auditors use inquiries, inspections, and observations to ensure these systems produce reliable financial data.
- Control activities: The auditor assesses whether these control activities, such as approvals or reconciliations, are effectively designed and operating as intended. If control activities are reliable, the auditor may reduce substantive testing in certain areas.
What are walkthrough procedures?
Walkthrough procedures is where the auditor selects one or more transactions relating to a specific system and follows them through the system from initiation to settlement and reporting.
They help to corroborate their understanding of the information system with the entity.
How are audit data analytics (ADA) used for process mining?
- ADA helps auditors analyse 100% of transactions to understand key processes and visualises actual process flows recorded by the system, rather than relying on management’s description.
- ADA then detects any deviations from expected processes.
- Identifies missing controls and transactions without controls.
- Helps assess compliance with control rules.
What are tests of controls and what are the 3 steps in how they are performed?
Tests of controls: Audit procedures performed by the auditor to determine whether the control activities operated as documented throughout the period under review.
The auditor must perform three steps in relation to the entity’s control activities to determine whether they can be relied upon:
- Identify key controls: A key control is a control that mitigates the RoMM and that the auditor intends to rely on.
- Assess the design of key controls: the auditor considers whether the procedure would be effective in achieving its stated objectives.
- Test whether key controls operated effectively throughout the year: how well it works in practice.
What techniques can auditors use to test controls?
- Enquiring of staff to confirm the operation of a control activity
- Inspection of documents or evidence of management reviews
- Observing procedures and control activities being performed
- Re-performance of procedures and control activities by the auditor
What is a controls reliance approach in auditing?
When the auditor concludes that the controls are designed well and operating effectively, the extent of testing at the next stage can be reduced, and vice versa.
e.g.
- Controls designed well and operated effectively throughout the year = controls reliance approach and low control risk
- Controls are designed ineffectively or not operating correctly = No controls reliance and high control risk.
What is the management letter?
ISA 265
Management letter is where any significant deficiencies in a client’s accounting and internal control systems specifically are reported to those charged with governance and an appropriate level of management (unless circumstances deem it inappropriate) promptly and in writing.
As well as any other significant matters, such as misstatements or disagreements between the auditor and management.
Under ISA (UK) 265 Communicating Deficiencies in Internal Control to Those Charged With Governance and Management.