BEC - Internal Controls Flashcards
Control environment?
One of five components of internal control. The foundation of any system of internal controls. Ecompasses:
- Integrity and ethical values
- Commitment to competence
- Human resource polices & practices
- assignment of authority and responsibility
- managements philosophy & operating style
- board of directors or audit committee participation
- organizational structure
two most important models of accounting controls
- Committee of Sponsoring Organizations (COSO)
2. COSO Enterprise Risk Managment (ERM)
Internal Control definition and categories
Process effected by the entity’s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories
- Effectiveness and efficiency of operations
- Reliability of financial and nonfinancial reporting
- Compliance with applicable laws and regulations
General control objectives
- Safeguard assets of the firm
- Promote efficiency of the firms operations
- Measure compliance with managements prescribed policies and procedures
- Ensure accuracy and reliability
a. ID and record all valid transactions
b. Provide timely information in appropriate detail to permit proper classification and financial reporting
c. Accurately measure the financial value of transactions
d. Accurately record transactions in the time period in which they occured.
Primary areas of focus of an internal control system
- Operations
– Objectives related to the fundamental mission and
vision of the entity.
– Include improving financial performance, productivity,
quality, environmental practices, innovation, and
customer and employee satisfaction, as well as
safeguarding assets (protecting and preserving assets) - Reporting
—Objectives related to the preparation of (financial or
nonfinancial) reports for use by shareholders and the
organization. Reporting objectives may be for internal
or external objectives
> External financial reporting objectives
> External nonfinancial reporting objectives
> Internal Financial reporting objectives - Compliance
–Compliance objectives concern complying with
external laws and regulations
COSO “Cube Model”
Has 3 dimensions:
- What is internal control (fundamental components) (depicted in a pyramid)
- – Control environment (internal)
- – Risk assessment
- – Information and communication
- – Monitoring
- – Control activities - Why we have internal control (goals or objectives)
- – Operations
- – Reporting
- – Compliance - Where we have internal control (units of analysis to design, implement, and test)
- – Specifies the units and activities that must be controlled within the organization
17 principles of internal control
Control principles (5)
- Integrity and ethical values
- Board of directors independence of mgmt & oversight of internal controls
- Management establishes structures, reporting lines, and appropriate authorities and responsiblitities
- Competence
- Accountability
Risk Assessment (4)
- Objectives
- Assessment
- Fraud
- Change Management
Control Activities (3)
- Risk reduction
- Technology Controls
- Policies
Information and Communication (3)
- Quality
- Internal
- External
Monitoring Activities (2)
- Ongoing and periodic
- Address deficiencies
Control Environment (5)
- Demonstrates a commitment to integrity and ethical values.
— Sets and demonstrates “tone at the top”
— Establishes and adheres to standards of conduct
— Attends to ethical failures quickly and effectively - board of directors demonstrates independence of mgmt, & oversees the internal controls
— Clear board of directors oversight and independence
— Evidence and application of relevant expertise - Management establishes structures, reporting lines, and appropriate authorities and responsibilities to achieve objectives, including integrating organizational structures and services including outsourced service providers.
— Mgmt cannot outsource responsibility for internal controls - Competence —The organization demonstrates a commitment to attract, develop, and retain competent individuals consistent with achieving organizational objectives, including:
—Establishing policies and procedures to attract, develop, and retain competent individuals
— Assessing competencies, creating development plans to achieve needed skills and competencies, and addressing deficiencies in skills and competencies through training, hiring, or outsourcing
— Planning and preparing for turnover and succession - Accountability
— Enforcing accountability through structures,
authorities, and responsibilities
— Establishing and evaluating performance measures, incentives, rewards, and disciplinary actions for individuals
— Monitoring and considering the potential for excessive performance pressures, including unrealistic performance (e.g., earnings) targets, and an excessive concern with short-term (e.g., quarterly earnings) targets
Risk Assessment (4)
- Objectives
—The organization specifies objectives with sufficient clarity to enable the identification and assessment of risks that threaten the achievement of objectives. In so doing, the organization should consider:
— The precision of risk tolerance levels: for example, can we quantify the risk? To within what range?
— Materiality in relation to risk assessment. How big of a risk poses a threat to objectives (a loss of $10,000? $100,000? $1,000,000?)?
— Risks related to the organization’s ability to comply with standards, frameworks, laws and regulations
— Risks related to operational and financial performance goals
— Risks in committing resources - Assessment
—The organization identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risk should be managed. In so doing, the organization should:
— Involve appropriate levels of management in risk assessment
— Consider and include entity, subsidiary, division, operating unit, and functional levels
— Analyze internal and external factors
— Estimate risk importance
— Develop appropriate risk responses - Fraud
—The organization considers the potential for fraud in assessing risks to the achievement of objectives. In so doing, it:
— Considers fraud risk factors and threats
— Assesses the potential fraud influences of incentives and pressures
— Assesses opportunities that may exist in the organization for fraudsters to commit fraud
— Assesses attitudes and potential rationalizations that might be used to justify fraudulent actions - Change management
—The organization identifies and assesses changes in the external environment (regulatory, economic, and physical environment of operation), assessing changes in the business model (new or existing business lines, rapid growth, new technologies, or acquisitions/divestitures) and changes in leadership.
Control Activities (3)
- Risk reduction
—Organizational control activities mitigate (i.e., reduce) the risks to the achievement of objectives to acceptable levels. In so doing, the organization:
— Integrates controls with risk assessments
— Uses risk reduction analyses to determine which business processes require a control focus
— Considers how the environment, complexity, nature and scope of operations influence risk reduction and control activities
— Evaluates a mix of potentially control activity types, including manual and automated, and preventive and detective controls
— Segregates incompatible activities and implements alternative controls where segregation is impossible - Technology controls
—The organization selects and implements general controls over technology, which support the achievement of its objectives. These activities include:
— Management understanding and determining the dependencies between business processes, automated controls, and technology general controls
— Management establishing controls to ensure the completeness, accuracy, and availability of technology and processing
— Restricting technology access rights to authorized users
— Establishing relevant security management process controls
— Establishing relevant technology acquisition, development, and maintenance process controls - Policies
—The organization deploys control activities through policies and procedures that establish stakeholder expectations. Established procedures ensure the implementation of these policies. These activities include:
— Establishing policies and procedures that support the achievement of management’s directives
— Establishing responsibility and accountability for executing policies and procedures
— Employing competent personnel to perform control activities in a timely manner and to take corrective action to investigate and act on control problems and issues
— Management periodically reassessing and revising policies and procedures to address changing conditions.
Information and Communication (3)
- Quality
—Relevant, high-quality information supports the internal control processes.
— Organizational processes to ensure that high-quality information supports internal control processes should:
Identify the information required to support internal control processes.
— Capture internal and external courses of data.
— Transform relevant data into information.
— Produce information that is relevant, timely, current, accurate, verifiable, protected, and retained.
— Consider the costs and benefits of information in relation to organizational objectives. - Internal
—Internal communication supports internal control processes. This includes:
— Organizational processes communicate required information to enable all personnel to understand and execute their internal control responsibilities.
— Communication between management and the board of directors supports the achievement of organizational objectives.
— Separate communication lines, such as a whistle-blower hotline, exist as a fail-safe mechanism to enable anonymous, confidential communication.
— Internal communication methods are sensitive to the timing, audience, and nature of the communication. - External
—Communication with outsiders supports internal control processes. Organizational processes:
— Communicate relevant and timely information to external parties, including shareholders, partners, owners, regulators, customers, financial analysts, and others.
— Enable inbound communications. Communication channels support the receipt of information from customers, suppliers, external auditors, regulators, financial analysts and others.
— Separate communication lines, such as a whistle-blower hotline, exist as fail-safe mechanisms to enable anonymous, confidential communication
— Communicate relevant information resulting from assessments conducted by external parties (e.g., reviews of internal control) to the board of directors
— Ensure that external communication methods are sensitive to the timing, audience, and nature of the communication and to legal, regulatory and fiduciary requirements
Monitoring Activities (2)
- Ongoing and periodic
—Ongoing and separate evaluations evaluate internal control functioning. These activities include:
— Considering the mix of ongoing and separate evaluations
— Benchmarking—considering the design and state of the existing system of internal control to establish a baseline understanding for ongoing and separate evaluations
— Developing and selecting ongoing and separate evaluations through management consideration of the rate of change of business activities and processes
— Ensuring that personnel have sufficient knowledge to conduct evaluations
— Integrating ongoing evaluations with business processes and adjusting, as needed, to changing conditions
— Providing periodic, separate evaluations for objective feedback
— Adjusting the scope and frequency of evaluations based on risk assessments - Address deficiencies
—Parties responsible for taking corrective action, including senior management and the board of directors, receive timely communication of internal control deficiencies. These activities include:
— Assessment of the results of ongoing and separate evaluations, as appropriate, by management and the board of directors
— Communication of deficiencies to those responsible for acting upon them, and to management at least one level above the identified problem
— Communication of deficiencies to senior management and the board of directors, as appropriate
— Tracking by management whether deficiencies are corrected on a timely basis
Limitations of Internal Control
- The suitability of objectives established as a precondition to internal control. Internal control is the responsibility of management (not the auditors). Management may set objectives that lead to poor controls (e.g., make earnings targets even if it means committing fraud).
- Internal control depends heavily on people. People are wonderful, fallible, imperfect creatures. Human judgment can be faulty, flawed, and biased. Breakdowns in control can occur because of humans (God love ’em).
- Management may be able to, and may choose to, override internal control.Many of the major financial reporting scandals are examples of management override, including Enron, WorldCom, and Computer Associates.
- Collusion is an ever-present risk in internal control systems. Management, employees, and/or third parties may collude to circumvent controls. The examples listed in the previous point are also relevant here.
- External events beyond the organization’s control may lead to control failures. For example, the Fukushima nuclear disaster occurred due to a combination of events that created circumstances that exceeded TEPCO’s risk assessment planning scenarios. Stated simply, unexpected doo doo can (and sometimes does) happen.
- Inherent limitations, such as those listed above, preclude an internal control system from providing absolute assurance. Hence, a cost-effective system of internal control provides reasonable but not absolute assurance of the achievement of organizational objectives.
Deficiencies in Internal Control
- An internal control deficiency is a shortcoming in a component or components and relevant principle(s) that reduces the likelihood of an entity achieving its objectives. Hence, a control deficiency occurs when the design or operation of a control does not allow management or employees, in the normal course of performing their assigned functions, to prevent or detect misstatements on a timely basis.
- – When an organization determines that an internal control deficiency exists, management must assess the severity of that deficiency (i.e., classify it) - Types of Internal Control Deficiencies—According to the SEC:
- – Control deficiency—Defined above. The least serious of the three types of control deficiencies.
- – Significant deficiency—A deficiency (or combination of deficiencies) in internal control that is more serious than a control deficiency but less severe than a material weakness, yet it is important enough to merit attention by those charged with governance.
- – Material weakness—A deficiency (or combination of deficiencies) in internal control such that there is a reasonable possibility that a material misstatement of the entity’s financial statements will not be prevented or detected and corrected on a timely basis. This is a serious, really bad problem.
Categories of controls
- Preventive, Detective, and Corrective Controls—This classification focuses on the timing of the control relative to the potential error: that is, when the controls are applied. A well-controlled system balances preventive and detective controls and includes corrective controls as needed.
— Preventive controls—(“before the fact”) controls—Preventive controls attempt to stop an error or irregularity before it occurs. They tend to be “passive” controls, that is, once established, they simply need to be activated to be effective. Examples of preventive controls include locks on buildings and doors, use of user names and password to gain access to computer resources, and building segregation of duties into the organizational structure.
— Detective controls—(“after the fact” controls)—Detective controls attempt to detect an error after it has occurred. They tend to be “active” controls: that is, they must be continually performed to be effective. Examples of detective controls include data entry edits (e.g., checks for missing data, values that are too large or too small), reconciliation of accounting records to physical assets (bank reconciliations, inventory counts), and tests of transactions to determine whether they comply with management’s policies and procedures (audits).
> Effective detective controls, when known to the relevant constituency, often take on preventive characteristics. For example, surveillance cameras are fundamentally detective controls: They are designed to detect the commission of an unauthorized act. However, when it is known that surveillance cameras are in use, they also can serve to prevent unauthorized acts. The decrease in the number of drivers running red lights when drivers know that surveillance cameras are installed on traffic signals is an example of this phenomenon.
— Corrective controls are always paired with detective controls—They attempt to reverse the effects of the observed error or irregularity. Examples of corrective controls include maintenance of backup files, disaster recovery plans, and insurance.
Feedback and Feed-Forward Controls—This classification of controls closely relates to the previous one. Feedback and feed-forward controls focus on changing inputs or processes to promote desirable outcomes by comparing actual results (feedback) or projected results (feed-forward) to a predetermined standard.
Feedback controls—Evaluate the results of a process and, if the results are undesirable, adjust the process to correct the results; most detective controls are also feedback controls.
Feed-forward controls—Project future results based on current and past information and, if the future results are undesirable, change the inputs to the system to prevent the outcome. Many inventory ordering systems are essentially feed-forward controls: The system projects product sales over the relevant time period, identifies the current inventory level, and orders inventory sufficient to fulfill the sales demand.
General Controls and Application Controls—This classification appears in many control models, including auditing standards, the COSO model, and the COBIT model (see the lessons related to these topics). Its focus is on the functional area of the control: that is, where the control is applied rather than when it is applied. The model divides information processing controls into two categories:
General controls—General controls are controls over the environment as a whole. They apply to all functions, not just specific accounting applications. General controls help ensure that data integrity is maintained.
Examples of general controls include restricting physical access to computer resources, production and storage of backup files, and performing background checks of computer services personnel.
Application controls—Application controls are controls over specific data input, data processing, and data output activities. Application controls are designed to ensure the accuracy, completeness, and validity of transaction processing. As such, they have a relatively narrow focus on those accounting applications that are involved with data entry, updates, and reporting.
Examples of application controls include checks to ensure that input data is complete and properly formatted (e.g., dates, dollar amounts), that account numbers are valid, and that values are reasonable (e.g., that we don’t sell quantities that are greater than the quantity currently in inventory).
Application controls are sometimes called “transaction controls” since they relate specifically to transaction processing.