SlideShare a Scribd company logo
1 of 28
Habib Ullah Qamar
Govt. college of Commerce Gujranwala
4/19/2016
 We started with the need of Internal Control
 What is internal Control
 Objectives of Internal control System
 Assumptions of ICS
 Exposures and risks
 PDC Model
 SOX provision and annual Report
 The PDC control model is conceptually
pleasing but offers little practical guidance
for designing specific controls.
 For this, we need a more precise framework.
 The current authoritative document for
specifying internal control objectives and
techniques is Statement on Auditing
Standards (SAS) No. 78,
 It is based on the COSO framework.
 COSO framework was the basis for SAS 78, but
was designed as a management tool rather than
an audit tool.
 SAS 78, on the other hand, was developed for
auditors and describes the complex relationship
between the firm’s internal controls, the
auditor’s assessment of risk, and the planning of
audit procedures.
 Apart from their audience orientation, the two
frameworks are essentially the same and
interchangeable for SOX compliance purposes.
 The key elements of the SAS 78/COSO
framework consists of five components
1. The control environment
2. Risk assessment
3. Information and communication
4. Monitoring
5. control activities.
 The control environment is the foundation for the
other four control components. The control
environment sets the tone for the organization
and influences the control awareness of its
management and employees.
 Important elements of the control environment
are:
1. The integrity and ethical values of
management.
2. The structure of the organization.
3. The participation of the organization’s board
of directors and the audit committee, if one
exists.
4. Management’s philosophy and operating
style.
5. The procedures for delegating responsibility
and authority.
6. Management’s methods for assessing
performance.
7. External influences, such as examinations
by regulatory agencies.
8. The organization’s policies and practices for
managing its human resources
 Auditors should assess the integrity of the
organization’s management and may use
investigative agencies to report on the
backgrounds of key managers. Some of the “Big
Four” public accounting firms utilize ex-FBI agents
whose primary responsibility is to perform
background checks on existing and prospective
clients. In case of serious reservations the auditor
should withdraw from the audit. The reputation
and integrity of the company’s managers are
critical factors in determining the audit ability of
the organization. Auditors cannot function properly
in an environment in which client management is
deemed unethical and corrupt.
 Auditors should be aware of conditions that
would prejudice the management of an
organization to commit fraud. For example
 lack of sufficient working capital, adverse
industry conditions, bad credit ratings, and the
existence of extremely restrictive conditions in
bank or indenture agreements.
 If auditors encounter any such conditions, their
examination should give due consideration to the
possibility of fraudulent financial reporting.
 Appropriate measures should be taken, and every
attempt should be made to uncover any fraud.
 Auditors should understand a client’s
business and industry and should be aware of
conditions peculiar to the industry that may
affect the audit. Auditors should read
industry-related literature and familiarize
themselves with the risks that are inherent in
the business.
 The board of directors should adopt, as a
minimum, the provisions of SOX..
 Separate CEO and chairman. The roles of CEO
and board chairman should be separate.
Executive sessions give directors the
opportunity to discuss issues without
management present, and an independent
chairman is important in facilitating such
discussions.
 Set ethical standards.
 Establish an independent audit committee
 Compensation committees
 Nominating committees. The board nominations
committee should have a plan to maintain a fully
staffed board of directors with capable people as
it moves forward for the next several years. The
committee must recognize the need for
independent directors and have criteria for
determining independence.
 Access to outside professionals. All committees
of the board should have access to attorneys and
consultants other than the corporation’s normal
counsel and consultants. Under the provisions of
SOX, the audit committee of an SEC report-ing
company is entitled to such representation
independently.
 Organizations must perform a risk assessment to
identify, analyze, and manage risks relevant to
financial reporting.
 Risk Circumstances
1. Changes in the operating environment that
impose new or changed competitive pressures
on the firm.
2. New personnel who have a different or
inadequate understanding of internal control.
3. New or reengineered information systems that
affect transaction processing.
4. Significant and rapid growth that damage
existing internal controls.
5. The introduction of new product lines or activities with
which the organization has little experience.
6. Organizational restructuring resulting in the reduction
and/or reallocation of person-nel such that business
operations and transaction processing are affected.
7. Entering into foreign markets that may impact
operations (that is, the risks associated with foreign
currency transactions).
8. Adoption of a new accounting principle that impacts the
preparation of financial statements
 SAS 78 requires that auditors obtain sufficient
knowledge of the organization’s risk assessment
procedures to understand how management identifies,
prioritizes, and man-ages the risks related to financial
reporting.
 The accounting information system (AIS) consists of the
records and methods used to initiate, identify, analyze,
classify, and record the organization’s transactions and to
account for the related assets and liabilities.
 SAS 78 requires that auditors obtain sufficient knowledge
of the organization’s information system to understand
1. The classes of transactions that are material to the
financial statements and how those transactions are
initiated.
2. The accounting records and accounts that are used in
the processing of material transactions.
3. The transaction processing steps involved from the
initiation of a transaction to its inclusion in the financial
statements.
4. The financial reporting process used to prepare financial
statements, disclosures, and accounting estimates.
 To evaluate the internal control system
 Monitoring is the process by which the quality of
internal control design and operation can be
assessed.
 An organization’s internal auditors may monitor the
entity’s activities in separate procedures.
 Ongoing monitoring may be achieved by integrating
special computer modules into the information
system that capture key data and/or permit tests of
controls to be conducted as part of routine
operations.
 Another technique for achieving ongoing monitoring
is the sensible use of management reports. (time and
accuracy)
 Control activities are the policies and
procedures used to ensure that appropriate
actions are taken to deal with the
organization’s identified risks.
 Control activities can be grouped into two
distinct categories
 IT controls
 Physical controls
 IT controls relate specifically to the computer
environment.
 They fall into two broad groups
 General controls
 Application controls
 General controls pertain to entity-wide concerns
such as controls over the data center,
organization databases, systems development,
and program maintenance.
 Application controls ensure the integrity of
specific systems such as sales order processing,
accounts payable, and payroll applications.
 This class of controls relates primarily to the
human activities
 It may include
 Physical custody of assets
 Physical use of computers to record transactions
or update accounts.
 They relate to the human activities that trigger
and utilize the results computer generated
Results.
 In other words, physical controls focus on
people, but are not restricted to an environment
in which clerks update paper accounts with pen
and ink.
 Transaction Authorization. The purpose of transaction
authorization is to ensure that all material transactions
processed by the information system are valid and in
accordance with management’s objectives.
 Authorizations may be general or specific.
 General authority is granted to operations personnel to
perform day-to-day operations.
 An example of general authorization is the procedure to
authorize the purchase of inventories from a designated
vendor only when inventory levels fall to their
predetermined reorder points. This is called a
programmed procedure (not necessarily in the computer
sense of the word) where the decision rules are specified
in advance, and no additional approvals are required.
 Specific authorizations deal with case-by-
case decisions associated with non-routine
transactions.
 An example of this is the decision to extend a
particular customer’s credit limit beyond the
normal amount.
 Specific authority is usually a management
responsibility .
 Separation of employee duties to minimize
incompatible functions.
 Segregation of duties can take many forms,
depending on the specific duties to be
controlled. However, the following three
objectives provide general guidelines applicable
to most organizations.
 Authorization for a transaction and Processing
of the transaction should be separate.
 For example, the purchasing department should
not initiate purchases until the inventory control
department gives authorization.
 Responsibility for the custody of assets should be
separate from the record-keeping responsibility.
 For example, the department that has physical
custody of finished goods inventory (the
warehouse) should not keep the official inventory
records.
 The organization should be structured so that a
successful fraud requires involvement between
two or more individuals with incompatible
responsibilities.
 For example, no individual should have sufficient
access to accounting records to perpetrate a
fraud
 Implementing adequate segregation of duties
requires that a firm employ a sufficiently large
number of employees.
 Achieving adequate segregation of duties often
presents difficulties for small organizations.
 Obviously, it is impossible to separate five
incompatible tasks among three employees.
 Therefore, in small organizations or in functional
areas that lack sufficient personnel, management
must compensate for the absence of segregation
controls with close supervision.
 For this reason, supervision is often called a
compensating control.
 The accounting records of an organization
consist of source documents, journals, and
ledgers.
 The purpose of access controls is to ensure
that only authorized personnel have access to
the firm’s assets.
 Verification procedures are independent
checks of the accounting system to identify
errors and misrepresentations.
 This chapter began by examining ethical issues.
 good ethics is a necessary condition for the long-
term profitability of a business
 The next section examined fraud and its relationship
to auditing. Fraud falls into two general categories:
employee fraud and management fraud.
 The third section examined the subject of internal
control. The adequacy of the internal control
structure is an issue of great importance to both
management and accountants. Internal control was
examined
 first using the PDC control model that classifies
controls as preventive, detective, and corrective.
Next, the SAS 78/COSO framework recommended for
compliance with SOX was examined.
Revenue Cycle
See you again in sha ALLAH
4/19/2016

More Related Content

What's hot

It audit ch 1
It audit ch 1It audit ch 1
It audit ch 1Ahmed Tnt
 
General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)Osareme Erhomosele
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment PresentationEMAC Consulting Group
 
AUDITING IN SPECIALIZED INDUSTRIES .pdf
AUDITING IN SPECIALIZED INDUSTRIES .pdfAUDITING IN SPECIALIZED INDUSTRIES .pdf
AUDITING IN SPECIALIZED INDUSTRIES .pdfCristelTannagan
 
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Lecture 21  expenditure cycle part i - accounting information systesm  james ...Lecture 21  expenditure cycle part i - accounting information systesm  james ...
Lecture 21 expenditure cycle part i - accounting information systesm james ...Habib Ullah Qamar
 
Systems development and program change activities
Systems development and program change activitiesSystems development and program change activities
Systems development and program change activitieskristine manzano
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle Qamar Farooq
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsjayussuryawan
 
Audit report- Consideration of Internal Control
Audit report- Consideration of Internal ControlAudit report- Consideration of Internal Control
Audit report- Consideration of Internal Controlnellynljcoles
 
At (07) code of ethics
At   (07) code of ethicsAt   (07) code of ethics
At (07) code of ethicsRoward Patnaan
 
Accounting for Partnerships
Accounting for PartnershipsAccounting for Partnerships
Accounting for PartnershipsArthik Davianti
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Issharing notes123
 
AUDIT SPECIALIZED INDUSTRIES 2.pdf
AUDIT SPECIALIZED INDUSTRIES 2.pdfAUDIT SPECIALIZED INDUSTRIES 2.pdf
AUDIT SPECIALIZED INDUSTRIES 2.pdfCristelTannagan
 

What's hot (20)

It audit ch 1
It audit ch 1It audit ch 1
It audit ch 1
 
General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)General Ledger and Financial Reporting System (GLFRS)
General Ledger and Financial Reporting System (GLFRS)
 
Audit process
Audit processAudit process
Audit process
 
Auditing In Computer Environment Presentation
Auditing In Computer Environment PresentationAuditing In Computer Environment Presentation
Auditing In Computer Environment Presentation
 
AUDITING IN SPECIALIZED INDUSTRIES .pdf
AUDITING IN SPECIALIZED INDUSTRIES .pdfAUDITING IN SPECIALIZED INDUSTRIES .pdf
AUDITING IN SPECIALIZED INDUSTRIES .pdf
 
Lecture 21 expenditure cycle part i - accounting information systesm james ...
Lecture 21  expenditure cycle part i - accounting information systesm  james ...Lecture 21  expenditure cycle part i - accounting information systesm  james ...
Lecture 21 expenditure cycle part i - accounting information systesm james ...
 
Systems development and program change activities
Systems development and program change activitiesSystems development and program change activities
Systems development and program change activities
 
The Revenue Cycle
The Revenue Cycle The Revenue Cycle
The Revenue Cycle
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
Revenue cycle (AIS)
Revenue cycle (AIS)Revenue cycle (AIS)
Revenue cycle (AIS)
 
James hall ch 13
James hall ch 13James hall ch 13
James hall ch 13
 
Audit report- Consideration of Internal Control
Audit report- Consideration of Internal ControlAudit report- Consideration of Internal Control
Audit report- Consideration of Internal Control
 
01 Auditing CH 1.ppt
01 Auditing CH 1.ppt01 Auditing CH 1.ppt
01 Auditing CH 1.ppt
 
James hall ch 8
James hall ch 8James hall ch 8
James hall ch 8
 
James hall ch 3
James hall ch 3James hall ch 3
James hall ch 3
 
At (07) code of ethics
At   (07) code of ethicsAt   (07) code of ethics
At (07) code of ethics
 
Accounting for Partnerships
Accounting for PartnershipsAccounting for Partnerships
Accounting for Partnerships
 
Blt 134 chapter 2
Blt 134 chapter 2Blt 134 chapter 2
Blt 134 chapter 2
 
Ais Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based IsAis Romney 2006 Slides 09 Auditing Computer Based Is
Ais Romney 2006 Slides 09 Auditing Computer Based Is
 
AUDIT SPECIALIZED INDUSTRIES 2.pdf
AUDIT SPECIALIZED INDUSTRIES 2.pdfAUDIT SPECIALIZED INDUSTRIES 2.pdf
AUDIT SPECIALIZED INDUSTRIES 2.pdf
 

Similar to Lecture 17 sas framework internal control - james a. hall book chapter 3

Internal Financial Controls
Internal Financial ControlsInternal Financial Controls
Internal Financial Controlstarunmallappa
 
Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliancesomeshwar mankar
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk ConsultingPrashant Jain
 
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORKPOSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORKHaresh Lalwani
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 
SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007Slava Gorbunov
 
Tugas control & audit sistem informasi
Tugas control & audit sistem informasiTugas control & audit sistem informasi
Tugas control & audit sistem informasiNur Fatrianti
 
Outsourcing GIA Accounting whitepaper 2016
Outsourcing GIA Accounting whitepaper 2016Outsourcing GIA Accounting whitepaper 2016
Outsourcing GIA Accounting whitepaper 2016Rich Lawrence
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasidwiki apsyarin
 
Chapt 3 - Internal Controls and Conflicts
Chapt 3 - Internal Controls and ConflictsChapt 3 - Internal Controls and Conflicts
Chapt 3 - Internal Controls and ConflictsMOHD GHADAFI SHARI
 
Designing Effective Financial Controls
Designing Effective Financial ControlsDesigning Effective Financial Controls
Designing Effective Financial ControlsStephen G. Lynch
 
ISO 19001ISO 19001Student’s NameUniversity Name.docx
ISO 19001ISO 19001Student’s NameUniversity Name.docxISO 19001ISO 19001Student’s NameUniversity Name.docx
ISO 19001ISO 19001Student’s NameUniversity Name.docxpriestmanmable
 
Mf0013 – internal audit and control
Mf0013 – internal audit and controlMf0013 – internal audit and control
Mf0013 – internal audit and controlak007420
 
Running head ACCOUNTINGACCOUNTING 2Internal control a.docx
Running head ACCOUNTINGACCOUNTING 2Internal control a.docxRunning head ACCOUNTINGACCOUNTING 2Internal control a.docx
Running head ACCOUNTINGACCOUNTING 2Internal control a.docxjoellemurphey
 
Advanced auditing Chapter Five.Internal control pptx
Advanced auditing Chapter Five.Internal control pptxAdvanced auditing Chapter Five.Internal control pptx
Advanced auditing Chapter Five.Internal control pptxseidIbrahim2
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfowaissayyed0041
 
Audits introduction presentation
Audits introduction presentationAudits introduction presentation
Audits introduction presentationJitendra Sonawane
 

Similar to Lecture 17 sas framework internal control - james a. hall book chapter 3 (20)

Internal Financial Controls
Internal Financial ControlsInternal Financial Controls
Internal Financial Controls
 
Audits and Regulatory Compliance
Audits and Regulatory ComplianceAudits and Regulatory Compliance
Audits and Regulatory Compliance
 
Spire Brief - Risk Consulting
Spire Brief - Risk ConsultingSpire Brief - Risk Consulting
Spire Brief - Risk Consulting
 
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORKPOSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Internal control system
Internal control systemInternal control system
Internal control system
 
SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007
 
Tugas control & audit sistem informasi
Tugas control & audit sistem informasiTugas control & audit sistem informasi
Tugas control & audit sistem informasi
 
Outsourcing GIA Accounting whitepaper 2016
Outsourcing GIA Accounting whitepaper 2016Outsourcing GIA Accounting whitepaper 2016
Outsourcing GIA Accounting whitepaper 2016
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
 
Internal audit
Internal auditInternal audit
Internal audit
 
Chapt 3 - Internal Controls and Conflicts
Chapt 3 - Internal Controls and ConflictsChapt 3 - Internal Controls and Conflicts
Chapt 3 - Internal Controls and Conflicts
 
Designing Effective Financial Controls
Designing Effective Financial ControlsDesigning Effective Financial Controls
Designing Effective Financial Controls
 
ISO 19001ISO 19001Student’s NameUniversity Name.docx
ISO 19001ISO 19001Student’s NameUniversity Name.docxISO 19001ISO 19001Student’s NameUniversity Name.docx
ISO 19001ISO 19001Student’s NameUniversity Name.docx
 
Mf0013 – internal audit and control
Mf0013 – internal audit and controlMf0013 – internal audit and control
Mf0013 – internal audit and control
 
Running head ACCOUNTINGACCOUNTING 2Internal control a.docx
Running head ACCOUNTINGACCOUNTING 2Internal control a.docxRunning head ACCOUNTINGACCOUNTING 2Internal control a.docx
Running head ACCOUNTINGACCOUNTING 2Internal control a.docx
 
Advanced auditing Chapter Five.Internal control pptx
Advanced auditing Chapter Five.Internal control pptxAdvanced auditing Chapter Five.Internal control pptx
Advanced auditing Chapter Five.Internal control pptx
 
auditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdfauditpresentation-121006061658-phpapp02.pdf
auditpresentation-121006061658-phpapp02.pdf
 
How Audit Committees Can Help with Third-Party Risks
How Audit Committees Can Help with Third-Party RisksHow Audit Committees Can Help with Third-Party Risks
How Audit Committees Can Help with Third-Party Risks
 
Audits introduction presentation
Audits introduction presentationAudits introduction presentation
Audits introduction presentation
 

More from Habib Ullah Qamar

Educational technology and tv radio simulation
Educational technology and tv radio simulation Educational technology and tv radio simulation
Educational technology and tv radio simulation Habib Ullah Qamar
 
Lecture 1 ECommerce an Introduction for Master classes UOS
Lecture 1 ECommerce an Introduction for Master classes UOSLecture 1 ECommerce an Introduction for Master classes UOS
Lecture 1 ECommerce an Introduction for Master classes UOSHabib Ullah Qamar
 
Computer manged learning and problems code 8620 bed
Computer manged learning and problems code 8620 bedComputer manged learning and problems code 8620 bed
Computer manged learning and problems code 8620 bedHabib Ullah Qamar
 
Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620Habib Ullah Qamar
 
Computer Assisted Instructions AIOU MA Education MED code 855
Computer Assisted Instructions AIOU MA Education MED code 855Computer Assisted Instructions AIOU MA Education MED code 855
Computer Assisted Instructions AIOU MA Education MED code 855Habib Ullah Qamar
 
Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Habib Ullah Qamar
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6Habib Ullah Qamar
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2Habib Ullah Qamar
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2Habib Ullah Qamar
 
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...Habib Ullah Qamar
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...Habib Ullah Qamar
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...Habib Ullah Qamar
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2Habib Ullah Qamar
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2Habib Ullah Qamar
 
Lecture 2 e-cmmerce , types of e-commerces-an introduction
Lecture 2  e-cmmerce , types of e-commerces-an introductionLecture 2  e-cmmerce , types of e-commerces-an introduction
Lecture 2 e-cmmerce , types of e-commerces-an introductionHabib Ullah Qamar
 
Lecture 1 e-cmmerce , an introduction
Lecture 1  e-cmmerce , an introductionLecture 1  e-cmmerce , an introduction
Lecture 1 e-cmmerce , an introductionHabib Ullah Qamar
 
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...
Lecture 25  conversion cycle -wolrd class companies & lean manufacturing-...Lecture 25  conversion cycle -wolrd class companies & lean manufacturing-...
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...Habib Ullah Qamar
 

More from Habib Ullah Qamar (20)

Guidance and counselling
Guidance and counsellingGuidance and counselling
Guidance and counselling
 
Educational technology and tv radio simulation
Educational technology and tv radio simulation Educational technology and tv radio simulation
Educational technology and tv radio simulation
 
Lecture 1 ECommerce an Introduction for Master classes UOS
Lecture 1 ECommerce an Introduction for Master classes UOSLecture 1 ECommerce an Introduction for Master classes UOS
Lecture 1 ECommerce an Introduction for Master classes UOS
 
Computer manged learning and problems code 8620 bed
Computer manged learning and problems code 8620 bedComputer manged learning and problems code 8620 bed
Computer manged learning and problems code 8620 bed
 
Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620Computer assisted instructions B.Ed course cose 8620
Computer assisted instructions B.Ed course cose 8620
 
Computer Assisted Instructions AIOU MA Education MED code 855
Computer Assisted Instructions AIOU MA Education MED code 855Computer Assisted Instructions AIOU MA Education MED code 855
Computer Assisted Instructions AIOU MA Education MED code 855
 
Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...Ict lecture 1 An introduction to information and Communication technology and...
Ict lecture 1 An introduction to information and Communication technology and...
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
 
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...Lecture 7  e-cmmerce ,  building an e commerce presence, website and mobile  ...
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...Lecture 5  e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
 
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2Lecture 4  e-cmmerce , b2b business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
 
Lecture 2 e-cmmerce , types of e-commerces-an introduction
Lecture 2  e-cmmerce , types of e-commerces-an introductionLecture 2  e-cmmerce , types of e-commerces-an introduction
Lecture 2 e-cmmerce , types of e-commerces-an introduction
 
Lecture 1 e-cmmerce , an introduction
Lecture 1  e-cmmerce , an introductionLecture 1  e-cmmerce , an introduction
Lecture 1 e-cmmerce , an introduction
 
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...
Lecture 25  conversion cycle -wolrd class companies & lean manufacturing-...Lecture 25  conversion cycle -wolrd class companies & lean manufacturing-...
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...
 

Recently uploaded

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 

Recently uploaded (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 

Lecture 17 sas framework internal control - james a. hall book chapter 3

  • 1. Habib Ullah Qamar Govt. college of Commerce Gujranwala 4/19/2016
  • 2.  We started with the need of Internal Control  What is internal Control  Objectives of Internal control System  Assumptions of ICS  Exposures and risks  PDC Model  SOX provision and annual Report
  • 3.  The PDC control model is conceptually pleasing but offers little practical guidance for designing specific controls.  For this, we need a more precise framework.  The current authoritative document for specifying internal control objectives and techniques is Statement on Auditing Standards (SAS) No. 78,  It is based on the COSO framework.
  • 4.  COSO framework was the basis for SAS 78, but was designed as a management tool rather than an audit tool.  SAS 78, on the other hand, was developed for auditors and describes the complex relationship between the firm’s internal controls, the auditor’s assessment of risk, and the planning of audit procedures.  Apart from their audience orientation, the two frameworks are essentially the same and interchangeable for SOX compliance purposes.
  • 5.  The key elements of the SAS 78/COSO framework consists of five components 1. The control environment 2. Risk assessment 3. Information and communication 4. Monitoring 5. control activities.
  • 6.  The control environment is the foundation for the other four control components. The control environment sets the tone for the organization and influences the control awareness of its management and employees.  Important elements of the control environment are: 1. The integrity and ethical values of management. 2. The structure of the organization. 3. The participation of the organization’s board of directors and the audit committee, if one exists.
  • 7. 4. Management’s philosophy and operating style. 5. The procedures for delegating responsibility and authority. 6. Management’s methods for assessing performance. 7. External influences, such as examinations by regulatory agencies. 8. The organization’s policies and practices for managing its human resources
  • 8.  Auditors should assess the integrity of the organization’s management and may use investigative agencies to report on the backgrounds of key managers. Some of the “Big Four” public accounting firms utilize ex-FBI agents whose primary responsibility is to perform background checks on existing and prospective clients. In case of serious reservations the auditor should withdraw from the audit. The reputation and integrity of the company’s managers are critical factors in determining the audit ability of the organization. Auditors cannot function properly in an environment in which client management is deemed unethical and corrupt.
  • 9.  Auditors should be aware of conditions that would prejudice the management of an organization to commit fraud. For example  lack of sufficient working capital, adverse industry conditions, bad credit ratings, and the existence of extremely restrictive conditions in bank or indenture agreements.  If auditors encounter any such conditions, their examination should give due consideration to the possibility of fraudulent financial reporting.  Appropriate measures should be taken, and every attempt should be made to uncover any fraud.
  • 10.  Auditors should understand a client’s business and industry and should be aware of conditions peculiar to the industry that may affect the audit. Auditors should read industry-related literature and familiarize themselves with the risks that are inherent in the business.  The board of directors should adopt, as a minimum, the provisions of SOX..
  • 11.  Separate CEO and chairman. The roles of CEO and board chairman should be separate. Executive sessions give directors the opportunity to discuss issues without management present, and an independent chairman is important in facilitating such discussions.  Set ethical standards.  Establish an independent audit committee  Compensation committees
  • 12.  Nominating committees. The board nominations committee should have a plan to maintain a fully staffed board of directors with capable people as it moves forward for the next several years. The committee must recognize the need for independent directors and have criteria for determining independence.  Access to outside professionals. All committees of the board should have access to attorneys and consultants other than the corporation’s normal counsel and consultants. Under the provisions of SOX, the audit committee of an SEC report-ing company is entitled to such representation independently.
  • 13.  Organizations must perform a risk assessment to identify, analyze, and manage risks relevant to financial reporting.  Risk Circumstances 1. Changes in the operating environment that impose new or changed competitive pressures on the firm. 2. New personnel who have a different or inadequate understanding of internal control. 3. New or reengineered information systems that affect transaction processing. 4. Significant and rapid growth that damage existing internal controls.
  • 14. 5. The introduction of new product lines or activities with which the organization has little experience. 6. Organizational restructuring resulting in the reduction and/or reallocation of person-nel such that business operations and transaction processing are affected. 7. Entering into foreign markets that may impact operations (that is, the risks associated with foreign currency transactions). 8. Adoption of a new accounting principle that impacts the preparation of financial statements  SAS 78 requires that auditors obtain sufficient knowledge of the organization’s risk assessment procedures to understand how management identifies, prioritizes, and man-ages the risks related to financial reporting.
  • 15.  The accounting information system (AIS) consists of the records and methods used to initiate, identify, analyze, classify, and record the organization’s transactions and to account for the related assets and liabilities.  SAS 78 requires that auditors obtain sufficient knowledge of the organization’s information system to understand 1. The classes of transactions that are material to the financial statements and how those transactions are initiated. 2. The accounting records and accounts that are used in the processing of material transactions. 3. The transaction processing steps involved from the initiation of a transaction to its inclusion in the financial statements. 4. The financial reporting process used to prepare financial statements, disclosures, and accounting estimates.
  • 16.  To evaluate the internal control system  Monitoring is the process by which the quality of internal control design and operation can be assessed.  An organization’s internal auditors may monitor the entity’s activities in separate procedures.  Ongoing monitoring may be achieved by integrating special computer modules into the information system that capture key data and/or permit tests of controls to be conducted as part of routine operations.  Another technique for achieving ongoing monitoring is the sensible use of management reports. (time and accuracy)
  • 17.  Control activities are the policies and procedures used to ensure that appropriate actions are taken to deal with the organization’s identified risks.  Control activities can be grouped into two distinct categories  IT controls  Physical controls
  • 18.  IT controls relate specifically to the computer environment.  They fall into two broad groups  General controls  Application controls  General controls pertain to entity-wide concerns such as controls over the data center, organization databases, systems development, and program maintenance.  Application controls ensure the integrity of specific systems such as sales order processing, accounts payable, and payroll applications.
  • 19.  This class of controls relates primarily to the human activities  It may include  Physical custody of assets  Physical use of computers to record transactions or update accounts.  They relate to the human activities that trigger and utilize the results computer generated Results.  In other words, physical controls focus on people, but are not restricted to an environment in which clerks update paper accounts with pen and ink.
  • 20.  Transaction Authorization. The purpose of transaction authorization is to ensure that all material transactions processed by the information system are valid and in accordance with management’s objectives.  Authorizations may be general or specific.  General authority is granted to operations personnel to perform day-to-day operations.  An example of general authorization is the procedure to authorize the purchase of inventories from a designated vendor only when inventory levels fall to their predetermined reorder points. This is called a programmed procedure (not necessarily in the computer sense of the word) where the decision rules are specified in advance, and no additional approvals are required.
  • 21.  Specific authorizations deal with case-by- case decisions associated with non-routine transactions.  An example of this is the decision to extend a particular customer’s credit limit beyond the normal amount.  Specific authority is usually a management responsibility .
  • 22.  Separation of employee duties to minimize incompatible functions.  Segregation of duties can take many forms, depending on the specific duties to be controlled. However, the following three objectives provide general guidelines applicable to most organizations.  Authorization for a transaction and Processing of the transaction should be separate.  For example, the purchasing department should not initiate purchases until the inventory control department gives authorization.
  • 23.  Responsibility for the custody of assets should be separate from the record-keeping responsibility.  For example, the department that has physical custody of finished goods inventory (the warehouse) should not keep the official inventory records.  The organization should be structured so that a successful fraud requires involvement between two or more individuals with incompatible responsibilities.  For example, no individual should have sufficient access to accounting records to perpetrate a fraud
  • 24.  Implementing adequate segregation of duties requires that a firm employ a sufficiently large number of employees.  Achieving adequate segregation of duties often presents difficulties for small organizations.  Obviously, it is impossible to separate five incompatible tasks among three employees.  Therefore, in small organizations or in functional areas that lack sufficient personnel, management must compensate for the absence of segregation controls with close supervision.  For this reason, supervision is often called a compensating control.
  • 25.  The accounting records of an organization consist of source documents, journals, and ledgers.  The purpose of access controls is to ensure that only authorized personnel have access to the firm’s assets.  Verification procedures are independent checks of the accounting system to identify errors and misrepresentations.
  • 26.  This chapter began by examining ethical issues.  good ethics is a necessary condition for the long- term profitability of a business  The next section examined fraud and its relationship to auditing. Fraud falls into two general categories: employee fraud and management fraud.  The third section examined the subject of internal control. The adequacy of the internal control structure is an issue of great importance to both management and accountants. Internal control was examined  first using the PDC control model that classifies controls as preventive, detective, and corrective. Next, the SAS 78/COSO framework recommended for compliance with SOX was examined.
  • 28. See you again in sha ALLAH 4/19/2016