SlideShare a Scribd company logo
Internal control is designed to provide accountability of those entrusted to run the
enterprise by the stakeholders, who have provided the resources to the entity.

Controls exists as a way to mitigate and manage risk and are necessary for good
long-term decision-making.

Internal controls are needed because every organization faces significant risks
ranging from:
       a. corporate failure
       b. misuse of corporate assets
       c. incorrect or incomplete preparation of financial statements

internal control assist the organization in the following category
       a. reliability of financial reporting
       b. compliance with applicable laws and regulation
       c. effectiveness and efficiency of operations

Important aspects of internal control
      a. it is a continuous process
      b. starts at the top of the organization
      c. it includes all the people
      d. broader than internal control over financial reporting
      e. applied across all activities of the organization

Components of internal control
     1. risk assessment
            a. the manner in which a misstatement might occur varies with both
                the organization’s control environment and the nature of
                processing.
     2. control environment: refers to the overall governance of the organization
            a. starts with the audit committee, BOD and management
            b. 7 effective control environment
                     i. Integrity and ethical values particularly top management
                    ii. Importance of BOD in financial reporting and related
                        controls
                   iii. Management philosophy an operating style achieving
                        effective internal control (sets the tone-> articulate ->
                        select accounting principles and oversees estimates)
                   iv. Organizational structure supporting effective internal
                        control
                    v. Commitment to financial reporting competencies
                   vi. Authority and responsibility(jobs of BOD define
                        responsibility and limit authority)
                  vii. Human resources: policies and practices including
                        compensation program.
     3. control activities: errors that can occur
a. policies and procedures that are established to assist
                 organizations in accomplishing objectives and mitigating risks.
              b. Organization implement control activities to mitigate the risks that
                 are specific to their organization.
              c. Involves two components
                       i. The design and implementation of the controls including a
                          description of how the control activities operate.
                      ii. The operation of the controls
              d. 3 process that affect the quality of data entering into the general
                 ledger
                       i. transactions processing
                      ii. accounting estumates
                    iii. adjusting and closing journal entries
              e. control activities
                       i. segregation of duties ( custodial and process transaction)
                      ii. authorization procedures
                    iii. adequately document transaction trail(provide evidence to
                          authorization)
                     iv. physical controls to safeguard assets
                      v. reconciliation of control accounts with subsidiary ledgers,
                          transactions recorded with submitted for processing and
                          physical counts of assets
       4. information and communication: communication of the management
              a. indentifying, capturing and exchanging information in a timely
                 fashion to enable accomplishment of the organization’s objectives.
       5. monitoring: monitor to assure that everything operates effectively
              a. monitoring is a process that provides feedback n the effectiveness
                 of the other four components of internal control.
              b. Can be done through ongoing activities or separate evaluations.

entity level control: exists on a higher level than transaction-level controls and affct
multiple processes, transactions, accounts and assertions.

Most BOD as three subcommittes:
           1. the audit committee
           2. the compensation committee
           3. a nominating and governance committee

preventive VS detective control
Preventive control: designed to prevent the occurrence of a misstatement, usually
more cost efficient but my not provide documentary evidence that controls are
working.

Edit control:prevent some inappropriate transactions from being recorded.
Detective control:provides evidence on whether processing has been effective in
preventing errors.

General computer controls: computer controls that are pervasive and affect every
computerized system

Application controls: controls that are built into specific processes.

authentication: verifying to the system that the person is who she or he claims to be.
(something they know, they possess or from them)


General computer controls
   a. planning and controlling data processing function
   b. controlling applications development and changes to programs and or data
      files and records (failure of programs)
   c. controlling access to equipment,data and programs
          a. The auditor should determine the extent to which the client has
              instituted a data access program based on the following principles
                   i. access to any data item is limited to those with a need to know
                  ii. the ability to change, modify or delete a data item is restricted
                      to thse with the authorization to make such changes
                 iii. the access control system has the ability to identify and verify
                      any potential users as authorized or unauthorized for the data
                      item and function requests
                 iv. a security department should actively monitor attempts to
                      compromise the system
   d. assuring business continuity such that control failures do not affect data or
      programs (back ups)
   e. controlling data transmission (encryption)

Application control
          a. input control- assure that it fully captures and records all the
              transactions.
                   i. Unique transaction identifier established by the computer
                  ii. Procedures to limit access
                 iii. Formation of an audit trail- allow auditor to trace a transaction
                      from its origination through to its final disposition.
          b. Processing control
                   i. Designed to assure tha the correct program is used for
                      processing, all are processed and the correct transaction
                      update multiple files
          c. Output control
                   i. Designed to assure that all date are completely processed and
                      that output is distributed only to authorized recipients.
Management evaluation of internal controls
“better internal controls lead to better data for decisions and increase the likelihood
of organizational success and sustainability.”

Material weakness- deficiency in internal control over financial reporting and may
not be detected in a timely basis.

Significant deficiency in internal control- deficiency in internal converol that is less
sever than a material weakness

Auditor’s evaluation of internal controls
Auditor’s purpose a. determine control risk that could affect financial statements
                  b. in an integrated audit internal controls,provide opoion of the
                     effectiveness of control.

Auditors are required to assess control risk for each relevant assertion.
   a. controls are adequate to achieve a particular objective
   b. determining how to test the controls and the accuracy of the processing

walkthrough: tracing the processing of transaction from its beginning to its reording
to general ledger and identifying the important controls over the process.
Note: walkthrough iis not same as testing controls

There is no need to test every control related to a relevant assertion, only thos that
are more important in reducing the risk.

Guidance on sample size for testing controls
   a. manual transaction ortiented (30-100)
   b. transaction controls built into computer applications
   c. monthly control procedures
   d. year-end controls
   e. adjusting entry controls
          a. other controls are not being overridden by management
          b. there is support for the adjusting entries
   f. entries receive proper approval by the appropriate management level.

More Related Content

What's hot

Internal control system
Internal control systemInternal control system
Internal control system
Hina Varshney
 
Internal Control
Internal ControlInternal Control
Internal Control
Salih Islam
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
kinjalmkothari92
 
Ch2 2009 cisa
Ch2 2009 cisaCh2 2009 cisa
Ch2 2009 cisa
asrulsani09
 
Internal Audit Plan 2015
Internal Audit Plan 2015Internal Audit Plan 2015
Internal Audit Plan 2015
Mohammad Kashif
 
Test of control
Test of controlTest of control
Test of control
VadivelM9
 
42 39 checklist_for_internal_control_system
42 39 checklist_for_internal_control_system42 39 checklist_for_internal_control_system
42 39 checklist_for_internal_control_system
Kalyan Ghosh
 
Presentation 5, System based audit approach - what is it about?, Workshop on ...
Presentation 5, System based audit approach - what is it about?, Workshop on ...Presentation 5, System based audit approach - what is it about?, Workshop on ...
Presentation 5, System based audit approach - what is it about?, Workshop on ...
Support for Improvement in Governance and Management SIGMA
 
Presentation 11, Test of controls of the system, Workshop on System-based aud...
Presentation 11, Test of controls of the system, Workshop on System-based aud...Presentation 11, Test of controls of the system, Workshop on System-based aud...
Presentation 11, Test of controls of the system, Workshop on System-based aud...
Support for Improvement in Governance and Management SIGMA
 
A Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information SystemA Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information System
ijsrd.com
 
Physical and logical access controls - A pre-requsite for Internal Controls
Physical and logical access controls - A pre-requsite for Internal ControlsPhysical and logical access controls - A pre-requsite for Internal Controls
Physical and logical access controls - A pre-requsite for Internal Controls
Bharath Rao
 
IT & the Auditor
IT & the AuditorIT & the Auditor
IT & the Auditor
Linda Forbes
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
jayussuryawan
 
Iso27001 Audit Services
Iso27001   Audit ServicesIso27001   Audit Services
Iso27001 Audit Services
tschraider
 
IDBI Intech - Audit Management Solution
IDBI Intech - Audit Management SolutionIDBI Intech - Audit Management Solution
IDBI Intech - Audit Management Solution
IDBI Intech
 
Prepare a Preliminary Audit Plan based on a Case Study
Prepare a Preliminary Audit Plan based on a Case StudyPrepare a Preliminary Audit Plan based on a Case Study
Prepare a Preliminary Audit Plan based on a Case Study
David Thompson
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
Ed Tobias
 
Utf8''internal audit plan presentation to the audit committee
Utf8''internal audit plan   presentation to the audit committeeUtf8''internal audit plan   presentation to the audit committee
Utf8''internal audit plan presentation to the audit committee
Abuallia
 
Coso Monitoring - Templates
Coso Monitoring - TemplatesCoso Monitoring - Templates
Coso Monitoring - Templates
Aviva Spectrum™
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
Sharah Ayumi
 

What's hot (20)

Internal control system
Internal control systemInternal control system
Internal control system
 
Internal Control
Internal ControlInternal Control
Internal Control
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Ch2 2009 cisa
Ch2 2009 cisaCh2 2009 cisa
Ch2 2009 cisa
 
Internal Audit Plan 2015
Internal Audit Plan 2015Internal Audit Plan 2015
Internal Audit Plan 2015
 
Test of control
Test of controlTest of control
Test of control
 
42 39 checklist_for_internal_control_system
42 39 checklist_for_internal_control_system42 39 checklist_for_internal_control_system
42 39 checklist_for_internal_control_system
 
Presentation 5, System based audit approach - what is it about?, Workshop on ...
Presentation 5, System based audit approach - what is it about?, Workshop on ...Presentation 5, System based audit approach - what is it about?, Workshop on ...
Presentation 5, System based audit approach - what is it about?, Workshop on ...
 
Presentation 11, Test of controls of the system, Workshop on System-based aud...
Presentation 11, Test of controls of the system, Workshop on System-based aud...Presentation 11, Test of controls of the system, Workshop on System-based aud...
Presentation 11, Test of controls of the system, Workshop on System-based aud...
 
A Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information SystemA Monitor System in Data Redundancy in Information System
A Monitor System in Data Redundancy in Information System
 
Physical and logical access controls - A pre-requsite for Internal Controls
Physical and logical access controls - A pre-requsite for Internal ControlsPhysical and logical access controls - A pre-requsite for Internal Controls
Physical and logical access controls - A pre-requsite for Internal Controls
 
IT & the Auditor
IT & the AuditorIT & the Auditor
IT & the Auditor
 
Chapter 2 auditing it governance controls
Chapter 2 auditing it governance controlsChapter 2 auditing it governance controls
Chapter 2 auditing it governance controls
 
Iso27001 Audit Services
Iso27001   Audit ServicesIso27001   Audit Services
Iso27001 Audit Services
 
IDBI Intech - Audit Management Solution
IDBI Intech - Audit Management SolutionIDBI Intech - Audit Management Solution
IDBI Intech - Audit Management Solution
 
Prepare a Preliminary Audit Plan based on a Case Study
Prepare a Preliminary Audit Plan based on a Case StudyPrepare a Preliminary Audit Plan based on a Case Study
Prepare a Preliminary Audit Plan based on a Case Study
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Utf8''internal audit plan presentation to the audit committee
Utf8''internal audit plan   presentation to the audit committeeUtf8''internal audit plan   presentation to the audit committee
Utf8''internal audit plan presentation to the audit committee
 
Coso Monitoring - Templates
Coso Monitoring - TemplatesCoso Monitoring - Templates
Coso Monitoring - Templates
 
Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6Auditing by CIS . Chapter 6
Auditing by CIS . Chapter 6
 

Similar to Chapter 5

Auditing procedure & internal control system
Auditing procedure & internal control systemAuditing procedure & internal control system
Auditing procedure & internal control system
RadhikaGupta215
 
477 10 (5)
477 10 (5)477 10 (5)
477 10 (5)
saramkhan5
 
Advanced auditing Chapter Five.Internal control pptx
Advanced auditing Chapter Five.Internal control pptxAdvanced auditing Chapter Five.Internal control pptx
Advanced auditing Chapter Five.Internal control pptx
seidIbrahim2
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
dwiki apsyarin
 
Audit report- Consideration of Internal Control
Audit report- Consideration of Internal ControlAudit report- Consideration of Internal Control
Audit report- Consideration of Internal Control
nellynljcoles
 
8. internal control new
8. internal control new8. internal control new
8. internal control new
Syed Osama Rizvi
 
Chapter 4-Internal Control, Internal Check and Internal Audit.pptx
Chapter 4-Internal Control, Internal Check and Internal Audit.pptxChapter 4-Internal Control, Internal Check and Internal Audit.pptx
Chapter 4-Internal Control, Internal Check and Internal Audit.pptx
AbrarAhmed932553
 
Unit 3 internal control
Unit 3 internal controlUnit 3 internal control
Unit 3 internal control
Radhika Gohel
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
Sharing Slides Training
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
Sharing Slides Training
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
sharing notes123
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
sharing notes123
 
Ch 7 controlling
Ch 7 controllingCh 7 controlling
Ch 7 controlling
waqole
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control env
Phillys Sebastiane
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
EasyStudy3
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
EasyStudy3
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
VadivelM9
 
Controlling ppt
Controlling pptControlling ppt
PART II INTERNAL AUDITING in local government.ppt
PART II  INTERNAL AUDITING in local government.pptPART II  INTERNAL AUDITING in local government.ppt
PART II INTERNAL AUDITING in local government.ppt
CamellaCandon
 
Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9
Sazzad Hossain, ITP, MBA, CSCA™
 

Similar to Chapter 5 (20)

Auditing procedure & internal control system
Auditing procedure & internal control systemAuditing procedure & internal control system
Auditing procedure & internal control system
 
477 10 (5)
477 10 (5)477 10 (5)
477 10 (5)
 
Advanced auditing Chapter Five.Internal control pptx
Advanced auditing Chapter Five.Internal control pptxAdvanced auditing Chapter Five.Internal control pptx
Advanced auditing Chapter Five.Internal control pptx
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
 
Audit report- Consideration of Internal Control
Audit report- Consideration of Internal ControlAudit report- Consideration of Internal Control
Audit report- Consideration of Internal Control
 
8. internal control new
8. internal control new8. internal control new
8. internal control new
 
Chapter 4-Internal Control, Internal Check and Internal Audit.pptx
Chapter 4-Internal Control, Internal Check and Internal Audit.pptxChapter 4-Internal Control, Internal Check and Internal Audit.pptx
Chapter 4-Internal Control, Internal Check and Internal Audit.pptx
 
Unit 3 internal control
Unit 3 internal controlUnit 3 internal control
Unit 3 internal control
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 
Ch 7 controlling
Ch 7 controllingCh 7 controlling
Ch 7 controlling
 
Internal control.. control env
Internal control.. control envInternal control.. control env
Internal control.. control env
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
Computerized Environment
Computerized EnvironmentComputerized Environment
Computerized Environment
 
Controlling ppt
Controlling pptControlling ppt
Controlling ppt
 
PART II INTERNAL AUDITING in local government.ppt
PART II  INTERNAL AUDITING in local government.pptPART II  INTERNAL AUDITING in local government.ppt
PART II INTERNAL AUDITING in local government.ppt
 
Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9
 

Chapter 5

  • 1. Internal control is designed to provide accountability of those entrusted to run the enterprise by the stakeholders, who have provided the resources to the entity. Controls exists as a way to mitigate and manage risk and are necessary for good long-term decision-making. Internal controls are needed because every organization faces significant risks ranging from: a. corporate failure b. misuse of corporate assets c. incorrect or incomplete preparation of financial statements internal control assist the organization in the following category a. reliability of financial reporting b. compliance with applicable laws and regulation c. effectiveness and efficiency of operations Important aspects of internal control a. it is a continuous process b. starts at the top of the organization c. it includes all the people d. broader than internal control over financial reporting e. applied across all activities of the organization Components of internal control 1. risk assessment a. the manner in which a misstatement might occur varies with both the organization’s control environment and the nature of processing. 2. control environment: refers to the overall governance of the organization a. starts with the audit committee, BOD and management b. 7 effective control environment i. Integrity and ethical values particularly top management ii. Importance of BOD in financial reporting and related controls iii. Management philosophy an operating style achieving effective internal control (sets the tone-> articulate -> select accounting principles and oversees estimates) iv. Organizational structure supporting effective internal control v. Commitment to financial reporting competencies vi. Authority and responsibility(jobs of BOD define responsibility and limit authority) vii. Human resources: policies and practices including compensation program. 3. control activities: errors that can occur
  • 2. a. policies and procedures that are established to assist organizations in accomplishing objectives and mitigating risks. b. Organization implement control activities to mitigate the risks that are specific to their organization. c. Involves two components i. The design and implementation of the controls including a description of how the control activities operate. ii. The operation of the controls d. 3 process that affect the quality of data entering into the general ledger i. transactions processing ii. accounting estumates iii. adjusting and closing journal entries e. control activities i. segregation of duties ( custodial and process transaction) ii. authorization procedures iii. adequately document transaction trail(provide evidence to authorization) iv. physical controls to safeguard assets v. reconciliation of control accounts with subsidiary ledgers, transactions recorded with submitted for processing and physical counts of assets 4. information and communication: communication of the management a. indentifying, capturing and exchanging information in a timely fashion to enable accomplishment of the organization’s objectives. 5. monitoring: monitor to assure that everything operates effectively a. monitoring is a process that provides feedback n the effectiveness of the other four components of internal control. b. Can be done through ongoing activities or separate evaluations. entity level control: exists on a higher level than transaction-level controls and affct multiple processes, transactions, accounts and assertions. Most BOD as three subcommittes: 1. the audit committee 2. the compensation committee 3. a nominating and governance committee preventive VS detective control Preventive control: designed to prevent the occurrence of a misstatement, usually more cost efficient but my not provide documentary evidence that controls are working. Edit control:prevent some inappropriate transactions from being recorded.
  • 3. Detective control:provides evidence on whether processing has been effective in preventing errors. General computer controls: computer controls that are pervasive and affect every computerized system Application controls: controls that are built into specific processes. authentication: verifying to the system that the person is who she or he claims to be. (something they know, they possess or from them) General computer controls a. planning and controlling data processing function b. controlling applications development and changes to programs and or data files and records (failure of programs) c. controlling access to equipment,data and programs a. The auditor should determine the extent to which the client has instituted a data access program based on the following principles i. access to any data item is limited to those with a need to know ii. the ability to change, modify or delete a data item is restricted to thse with the authorization to make such changes iii. the access control system has the ability to identify and verify any potential users as authorized or unauthorized for the data item and function requests iv. a security department should actively monitor attempts to compromise the system d. assuring business continuity such that control failures do not affect data or programs (back ups) e. controlling data transmission (encryption) Application control a. input control- assure that it fully captures and records all the transactions. i. Unique transaction identifier established by the computer ii. Procedures to limit access iii. Formation of an audit trail- allow auditor to trace a transaction from its origination through to its final disposition. b. Processing control i. Designed to assure tha the correct program is used for processing, all are processed and the correct transaction update multiple files c. Output control i. Designed to assure that all date are completely processed and that output is distributed only to authorized recipients.
  • 4. Management evaluation of internal controls “better internal controls lead to better data for decisions and increase the likelihood of organizational success and sustainability.” Material weakness- deficiency in internal control over financial reporting and may not be detected in a timely basis. Significant deficiency in internal control- deficiency in internal converol that is less sever than a material weakness Auditor’s evaluation of internal controls Auditor’s purpose a. determine control risk that could affect financial statements b. in an integrated audit internal controls,provide opoion of the effectiveness of control. Auditors are required to assess control risk for each relevant assertion. a. controls are adequate to achieve a particular objective b. determining how to test the controls and the accuracy of the processing walkthrough: tracing the processing of transaction from its beginning to its reording to general ledger and identifying the important controls over the process. Note: walkthrough iis not same as testing controls There is no need to test every control related to a relevant assertion, only thos that are more important in reducing the risk. Guidance on sample size for testing controls a. manual transaction ortiented (30-100) b. transaction controls built into computer applications c. monthly control procedures d. year-end controls e. adjusting entry controls a. other controls are not being overridden by management b. there is support for the adjusting entries f. entries receive proper approval by the appropriate management level.