Internal Control Flashcards

1
Q

Components of internal control

A
  1. Control Enviro
  2. Risk assessment
  3. Control activities
  4. Info + communication
  5. Monitoring activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is internal control?

A

the organisational plan and all related measures that an entity adopts in order to:

  • safeguard the assets the business uses in its operations, - encourage adherence to business policies,
  • promote operational efficiency and
  • ensure accurate and reliable accounting records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

effective internal controls- characteristics

A
  1. competent, reliable & ethical personnel
  2. assignment of responsibilities,
  3. proper authorisation
  4. separation of duties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how can duties be separated? 1.

A
  1. separation of operations from accounting (accounts not sales personnel should keep inventory records)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

how can duties be separated? 2.

A
  1. Separation of the custody of the assets from accounting (reduces temptation & fraud if accountants don’t actually handle the cash & if cashiers don’t have access to accounting records, warehouse employees with no accounting duties should handle inventory)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what would happen if a warehouse employee was able to handle inventory as well as account for inventory?

A

they could steal it & write if off as obselete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how can duties be separated? 3.

A
  1. Separation of the authorisation of transactions from the custody of related assets (where possible the persons who authorise transactions shouldn’t handle the related asset)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

why do we need Separation of the authorisation of transactions from the custody of related assets?

A

Because the person could authorise payments to themselves & then sign the cheques, by separating these duties only legitimate bills are paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how can duties be separated? 4.

A
  1. Separation of duties within the accounting function (different people should perform the various phases of accounting to minimise errors & opportunities for fraud_
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can duties within the accounting function be separated?

A

have different accountants responsible for recording cash receipts and cash payments.
The employee who processes accounts payable and cheque requests should have nothing to do with the approval process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can internal control be implemented (a-c)

A

a) have clear job descriptions
b) have procedural manual
c) appropriate authorisation process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can internal control be implemented (d-f)

A

d) use comparative financial statements
e) have clear guidelines about personal use of assets
f) train staff appropriately, get their feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can internal control be implemented (g-i)

A

g) require 2 signatures on payments for above a specified amount
h) keep detailed records of assets - limit access to records
i) use firewalls & change pw frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internal control & E-Commerce - how are new risks created?

A

it creates new risks. Buying & selling over internet can give hackers access to confidential info unavailable in face to face transactions.
CONFIDENTIALITY IS A SIGNIFICANT CHALLENGE FOR E-COMMERCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the problems created for internal control by e-commerce ?

A

1) stolen credit card nos
2) computer viruses, trojan horses
3) impersonation of companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the key features of e-commerce that challenge internal control?

A

a) no paper trail for E-transactions
b) internal control must be inter-organisational
c) new risks (loss of transaction integrity, pervasive security risks)
d) internet a public, not a private network
e) lack of technical expertise (will have to use service agencies, creating new risks, w implications for business & auditor potentially)
f) legal and technological issues (different legal frameworks around the world, dif. privacy rules, enforceability of contracts & different legalities of activiteis)

17
Q

What special considerations/measures can be implemented to combat the threats to internal control for e-commerce? (1-5)

A
  1. ensure proper knowlegde & skills of staff regarding the effects of e-commerce
  2. use fraud prevention tools to reduce risk
  3. Extend and expand policies to cover e-commerce
  4. align e-commerce with overall strategy
  5. Be aware of implications of outsourcing
18
Q

What special considerations/measures can be implemented to combat the threats to internal control for e-commerce? (6-10)

A
  1. Ensure access to records for audit purposes
  2. comply w payment card industry data security standards
  3. ensure legal & regulatory issues are understood
  4. Ensure use of firewalls & virus protection
  5. Use encryption to protect messages
19
Q

Firewalls

A

limit access to local network, only enable members to use, usually several

20
Q

Encryption

A

message unintelligible for those not intended to receive

21
Q

Limitations of internal control

A

a) cost of establishing procedure shouldn’t exceed benefit
b) collusion- human element working together to commit fraud can sometimes not be prevented by the above measures
c) size of business (too small or too large)
d) dishonesty, judgement errors
e) unexpected transactions
f) management override
g) weak internal controls

22
Q

Collusion- Limitations of internal control

A

systems designed to thwart an individual employee’s fraud can be overcome by 2+ employees colluding to defraud the firm
- having greater supervision of employees would help this but detract from other activities

23
Q

What happens as internal control become stricter?

A

more expensive & time consuming–> efficiency is hurt.
This highlights that managers are required to make sensible judgements and that the strictness of the IC is subjective to the business itself, & size.

24
Q

Investments into internal control must be

A

judged in light of the costs & benefits

25
Q

The bank account as a control device? What does this meannnnn

A

Cash is the most liquid asset (as the medium of exchange)- it can often exist in a bank’s accounting system with no accompanying paper cheques or deposit slips.
- it’s easy to conceal, move & steal.

26
Q

What must businesses do to safeguard their cash (as a result of it being easy to conceal, move & steal)?

A

Use an elaborate system of of internal controls to safeguard & manage their cash

27
Q

Advantages of keeping cash in a bank?

A

banks already have their own practices for safeguarding cash + they have depositors with detailed records of cash transactions.
Can be used as a depository & clearing house for cheques received & written
Minimises cash kept on hand

28
Q

How can a business take advantage of the full advantages of a bank’s control features?

A

deposit all cash receipts in the bank account & make (all) cash payments through it

29
Q

What documents control a bank account?

A

signature card
deposit slip
cheque- multiple signatures
bank statement

30
Q

Types of separation of duties

A
  1. separation of operations from accounting
  2. Separation of the custody of the assets from accounting
  3. Separation of the authorisation of transactions from the custody of related assets
  4. Separation of duties within the accounting function
31
Q

How are procedures in internal control similar to systems within MYOB?

A

Manual: Requiring the signature of a manager for payments
MYOB: setting up passwords to give authority over different parts of the system

32
Q

What are examples of 1. Controlling the environment?

A

Integrity and Ethical Values
Commitment to Competence
Board of Directors and Audit Committee
Management’s Philosophy and Operating Style
Organisational Structure
Assignment of Authority and Responsibility
Human Resource Policies and Procedures

33
Q

What are examples of 2. conducting a riskt assessment?

A

Company-wide Objectives
Process-level Objectives
Risk Identification and Analysis
Managing Change

34
Q

what are examples of 3. controlling activities?

A
Policies and Procedures
Security (Application and Network)
Application Change Management
Business Continuity/Backups
Outsourcing
35
Q

what are examples of 4. ensuring information + communication

A

Quality of Information

Effectiveness of Communication

36
Q

what are examples of 5. Monitoring activities?

A

Ongoing Monitoring
Separate Evaluations
Reporting Deficiencies

37
Q

What are the main components of internal control?

A

i. run enterprise competently (have clear guidelines of responsibilities and job descriptions)
ii. Establish clear lines of responsibility (having clear job descriptions)
iii. Maintain effective records (have clear procedural manuals, limit access to records)
iv. Separate record keeping from handling assets
v. adequately pay & motivate employees (employee reliable, ethical & competent personnel)
vi. Carry insurance on assets
vii. Physically protect sensitive assets.

38
Q

Two categories of internal control

A

preventative (policies & procedures designed to prevent fraud) or detective (ie examining info, performance reviews, internal/external auditing)

39
Q

What must the key elements of internal control ALWAYS INCLUDE

A
  1. a good staff profile with an emphasis on honesty and capability
  2. existence of a clear system of responsibility, authority, delegation and separation of duties
  3. proper procedures for ensuring transactions are properly processed
  4. production of suitable documents and accounting records so as to leave an audit trail
  5. appropriate control over assets
  6. independent verification of performance
  7. processes for checking the IT systems, to ensure that disaster recovery is possible, security is sound, and that laws are not breached (e.g. those that relate to privacy