SlideShare a Scribd company logo
Chapter 6
Control & AISs
                                               Fig. 6-1
                                               COSO’s ERMM




         FOSTER School of Business Acctg 320                 1
Overview
• Questions to be addressed in this chapter:
   – What are the basic internal control concepts, and why are computer
     control and security important?
   – What is the difference between the COBIT, COSO, and ERM control
     frameworks?
   – What are the major elements in the internal environment of a
     company?
   – What are the four types of control objectives that companies need to
     set?
   – What events affect uncertainty, and how can they be identified?
   – How is the Enterprise Risk Management model used to assess and
     respond to risk?
   – What control activities are commonly used in companies?
   – How do organizations communicate information and monitor control
     processes?


                         FOSTER School of Business Acctg 320                2
Introduction
AIS threats are increasing, why?
  – Control risks have increased in the last few years because:
     • There are computers and servers everywhere.
     • Distributed computer networks make data available to many users.
     • Wide area networks (WANs) are giving customers and suppliers
       access to each other’s systems and data.
  – Inadequate Protection:
     •   Threats are underestimated, controls are not well understood.
     •   Productivity pressures, cost reduction pressures.
     •   Companies have not always understood the threats.
     •   Cost pressures mean that mgr.s skip time-consuming control proc.


                        FOSTER School of Business Acctg 320                 3
Introduction
• Control and security are important
   – Companies are now recognizing the problems and taking
     positive steps to achieve better control, including:
      •   Devoting full-time staff to security and control concerns.
      •   Educating employees about control measures.
      •   Establishing and enforcing formal information security policies.
      •   Making controls a part of the applications development process.
      •   Moving sensitive data to more secure environments.




                          FOSTER School of Business Acctg 320                4
Introduction
Control objectives are the same regardless of the data
  processing method, but a computer-based AIS
  requires different internal control policies and
  procedures because:
   – Computer processing may reduce clerical errors but
     increase risks of unauthorized access or modification of
     data files.
   – Segregation of duties must be achieved differently in an
     AIS.
   – Computers provide opportunities for enhancement of
     some internal controls.


                      FOSTER School of Business Acctg 320       5
Control Concepts
• Internal control is the process implemented by the board of
  directors, management, and those under their direction to
  provide reasonable assurance that the following control
  objectives are achieved:
   – Assets (including data) are safeguarded.
   – Records are maintained in sufficient detail to accurately and fairly
     reflect company assets.
   – Accurate and reliable information is provided.
   – There is reasonable assurance that financial reports are prepared in
     accordance with GAAP.
   – Operational efficiency is promoted and improved.
   – Adherence to prescribed managerial policies is encouraged.
   – The organization complies with applicable laws and regulations.


                         FOSTER School of Business Acctg 320                6
Control Concepts
• Internal control is a process because:
   – It permeates an organization’s operating activities.
   – It is an integral part of basic management activities.
• Internal control provides reasonable, rather than absolute,
  assurance, because complete assurance is difficult or
  impossible to achieve and prohibitively expensive.
• Internal control systems have inherent limitations, including:
   – They are susceptible to errors and poor decisions.
   – They can be overridden by management or by collusion of two or
     more employees.
• Internal control objectives are often at odds with each other.
   – EXAMPLE: Controls to safeguard assets may also reduce operational
     efficiency.


                          FOSTER School of Business Acctg 320            7
Control Concepts
• Internal controls perform three important
  functions:
  – Preventive controls (deter problems before)
  – Detective controls (discover problems after they arise.)
  – Corrective controls (correct and modify system.)




                    FOSTER School of Business Acctg 320        8
Control Concepts
• Internal controls are often classified as:
  – General controls
     • Those designed to make sure an organization’s control
       environment is stable and well managed.
     • They apply to all sizes and types of systems.
     • Examples: Security management controls.
  – Application controls
     • Prevent, detect, and correct transaction errors and fraud.
     • Concerned with accuracy, completeness, validity, and
       authorization of the data captured, entered into the system,
       processed, stored, transmitted to other systems, and reported.


                       FOSTER School of Business Acctg 320              9
Sarbanes-Oxley (SOX)
• In 1977, Congress passed the Foreign Corrupt Practices Act.
  This act incorporated language from an AICPA
  pronouncement.
• The primary purpose of the act was to prevent the bribery of
  foreign officials to obtain business.
• A significant effect was to require that corporations maintain
  good systems of internal accounting control.
   – Generated significant interest among management, accountants, and
     auditors in designing and evaluating internal control systems.
   – However, the resulting internal control improvements weren’t
     sufficient.


                        FOSTER School of Business Acctg 320              10
SOX
• In the late 1990s and early 2000s, a series of
  multi-million-dollar accounting frauds made
  headlines (e.g., ENRON, WorldCom…)
  – The impact on financial markets was substantial,
    and Congress responded with passage of the
    Sarbanes-Oxley Act of 2002 (aka, SOX).
     • Applies to publicly held companies and their auditors.




                    FOSTER School of Business Acctg 320         11
SOX
• The intent of SOX is to:
  – Prevent financial statement fraud
  – Make financial reports more transparent
  – Protect investors
  – Strengthen internal controls in publicly-held
    companies
  – Punish executives who perpetrate fraud
• SOX has had a material impact on the way
  boards of directors, management, and
  accountants operate.

                  FOSTER School of Business Acctg 320   12
SOX
• Important aspects of SOX include:
    – Creation of the Public Company Accounting Oversight Board (PCAOB) to
      oversee the auditing profession.
        • The SEC appoints five members to oversee the auditing profession. Three cannot
          be CPA’s. They enforce auditing, quality control, ethics, and independence.
    – New rules for auditors
        • Rotation rules. Prohibit certain activities (bookkeeping, systems, internal audit) for
          auditors.
    – New rules for audit committees
        • All must be independent, and one must be a financial expert.
    – New rules for management
        • The CEO/CFO certify findings, responsible for internal controls and certify auditors
          were told about all material control weaknesses and examples of fraud.
    – New internal control requirements
        • Publicly held companies must issue a report accompanying the financial statements
          that states management is responsible for the internal control structure. They also
          have to report on the adequacy of the internal control structure.



                               FOSTER School of Business Acctg 320                               13
SOX
• After the passage of SOX, the SEC further mandated
  that:
   – Management must base its evaluation on a recognized
     control framework, developed using a due-process
     procedure that allows for public comment. The most likely
     framework is the COSO model discussed later.
   – The report must contain a statement identifying the
     framework used.
   – Management must disclose any and all material internal
     control weaknesses.
   – Management cannot conclude that the company has
     effective internal control if there are any material
     weaknesses.

                     FOSTER School of Business Acctg 320     14
Control Frameworks
• A number of frameworks have been
  developed to help companies develop
  good internal control systems. Three of
  the most important are:
  – The COBIT framework
  – The COSO internal control framework
  – COSO’s Enterprise Risk Management
    framework (ERM)

               FOSTER School of Business Acctg 320   15
COBIT
– Also know as the Control Objectives for
  Information and related Technology framework.
– Developed by the Information Systems Audit and
  Control Foundation (ISACF).
– A framework of generally applicable information
  systems security and control practices for IT
  control.




               FOSTER School of Business Acctg 320   16
COBIT
• The COBIT framework allows:
  – Management to benchmark security and control
    practices of IT environments.
  – Users of IT services to be assured that adequate
    security and control exists.
  – Auditors to substantiate their opinions on internal
    control and advise on IT security and control
    matters.


                  FOSTER School of Business Acctg 320   17
COBIT
• COBIT consolidates standards from 36 different
  sources into a single framework.
• It is having a big impact on the IS profession.
   – Helps managers to learn how to balance risk and control
     investment in an IS environment.
   – Provides users with greater assurance that security and IT
     controls provided by internal and third parties are
     adequate.
   – Guides auditors as they substantiate their opinions and
     provide advice to management on internal controls.

                      FOSTER School of Business Acctg 320         18
COSO framework
• COSO’s internal control framework
  – The Committee of Sponsoring Organizations
    (COSO) is a private sector group consisting of:
     •   The American Accounting Association
     •   The AICPA
     •   The Institute of Internal Auditors
     •   The Institute of Management Accountants
     •   The Financial Executives Institute



                     FOSTER School of Business Acctg 320   19
COSO
• In 1992, COSO issued the Internal Control
  Integrated Framework:
  – Defines internal controls.
  – Provides guidance for evaluating and enhancing
    internal control systems.
  – Widely accepted as the authority on internal controls.
  – Incorporated into policies, rules, and regulations used
    to control business activities.
  (10 years later it issued its expanded Enterprise Risk
    Management [ERM] model.)

                     FOSTER School of Business Acctg 320   20
COSO Frameworks
Elements:                               I. C. Framework          ERM
Internal environment                                X             X
Objective setting                                                 X
Event identification                                              X
Risk assessment                                     X             X
Risk response                                                     X
Control activities                                  X             X
Information and communication                       X             X
Monitoring                                          X             X




                           FOSTER School of Business Acctg 320         21
ERM
• Basic principles behind ERM:
   – Companies are formed to create value for owners.
   – Management must decide how much uncertainty they will
     accept.
   – Uncertainty can result in:
      • Risk
      • Opportunity
   The framework should help management manage
     uncertainty and its associated risk to build and preserve
     value.
   To maximize value, a company must balance its growth and
     return objectives and risks with efficient and effective use
     of company resources.

                      FOSTER School of Business Acctg 320           22
COSO’s ERM model
                                    COSO developed a
                                    model to illustrate the
                                    elements of ERM.
                                    Columns at the top represent
                                    the four types of objectives
                                    that management must meet
                                    to achieve company goals.
                                    Columns on the right
                                    represent the company’s
                                    units: Entire company,
                                    Division, Business unit,
                                    Subsidiary. The horizontal
                                    rows are eight related risk
                                    and control components.



   FOSTER School of Business Acctg 320                             23
The eight components of ERM
1) The Internal Environment
a) Management’s philosophy: management’s philosophy has
   a huge impact. Risk appetite: different companies have
   different perspectives on risks. But some companies have
   excessive focus on achieving results.
b) The Board of Directors:
   --Needs to oversee management
   --Sarbanes-Oxley audit committee must exist, consisting
   entirely of outsides directors
   --This audit committee needs to work closely with internal
   and external auditors


                      FOSTER School of Business Acctg 320       24
The eight components of ERM
1) The Internal Environment (continued)

c) Commitment to integrity, ethical values, and
   competence
   -- Internal policies
   -- Is there a Standards of Business Conduct?
   -- Is there an Open Door? Is there protection for
   people who raise issues concerning company ethics?
   -- What is important is what is actually done, not what
   is actually said.


                    FOSTER School of Business Acctg 320      25
The eight components of ERM
(1) The Internal Environment (continued)

d) Organizational structure: Is it overly complex? Statistically,
   fraud occurs more frequently in organizations with complex
   structures. Who does finance report to? Who the does
   internal audit report to? Where does IT report?




                       FOSTER School of Business Acctg 320          26
The eight components of ERM
• Important aspects of organizational structure:
   – Degree of centralization or decentralization.
   – Assignment of responsibility for specific tasks.
   – Direct-reporting relationships or matrix structure.
   – Organization by industry, product, geographic location,
     marketing network.
   – How the responsibility allocation affects management’s
     information needs.
   – Organization of accounting and IS functions.
   – Size and nature of company activities.

                     FOSTER School of Business Acctg 320       27
The eight components of ERM
(1) The Internal Environment (continued)
(e) Methods of assigning authority and responsibility
   Authority and responsibility are assigned through:
   – Formal job descriptions
   – Employee training
   – Operating plans, schedules, and budgets
   – Codes of conduct that define ethical behavior, acceptable practices,
     regulatory requirements, and conflicts of interest
   – Written policies and procedures manuals (a good job reference and job
     training tool) which covers:
       • Proper business practices
       • Knowledge and experience needed by key personnel
       • Resources provided to carry out duties
       • Policies and procedures for handling particular transactions
       • The organization’s chart of accounts
       • Sample copies of forms and documents

                          FOSTER School of Business Acctg 320                28
The eight components of ERM
(1) The Internal Environment (continued)
(f) Human    Resource Standards
 The following policies and procedures are important:
   –   Hiring (background checks)
   –   Compensating (fair)
   –   Training (fraud & ethics awareness, punishment outlined)
   –   Evaluating and promoting
   –   Discharging
   –   Managing disgruntled employees (indentify, help)
   –   Vacations and rotation of duties (mandatory)
   –   Confidentiality insurance and fidelity bonds (signed doc.s)
   –   Prosecute hackers & fraud (most go unprosecuted, why?)

                         FOSTER School of Business Acctg 320         29
The eight components of ERM
(1) The Internal Environment (continued)
(g) External influences
   – External influences that affect the control environment
     include requirements imposed by:
       • FASB
       • PCAOB
       • SEC
       • Insurance commissions
       • Regulatory agencies for banks, utilities, etc. (FDIC)

                      FOSTER School of Business Acctg 320        30
The eight components of ERM
(2) Objective Setting
  Objective-setting process proceeds as follows:
   – First, set strategic objectives, the high-level goals that
     support the company’s mission and create value for
     shareholders.
   – To meet these objectives, identify alternative ways of
     accomplishing them.
   – For each alternative, identify and assess risks and
     implications.
   – Formulate a corporate strategy.
   – Then set operations, compliance, and reporting objectives.

                     FOSTER School of Business Acctg 320      31
The eight components of ERM
(3) Event Identification
• Events are:
   – Incidents or occurrences that emanate from internal or external
     sources.
   – That affect implementation of strategy or achievement of objectives.
   – Impact can be positive, negative, or both.
   – Events can range from obvious to obscure.
   – Effects can range from inconsequential to highly significant.
Table 6-2 (pg. 215) Outlines 9 ERM event categories, both
  external and internal.



                         FOSTER School of Business Acctg 320                32
The eight components of ERM
(3) Event Identification (continued)
Companies usually use two or more of the following
  techniques together to identify events:
  – Use comprehensive lists of potential events
  – Perform an internal analysis
  – Monitor leading events and trigger points
  – Conduct workshops and interviews
  – Perform data mining and analysis
  – Analyze business processes

                  FOSTER School of Business Acctg 320   33
The eight components of ERM
(4 & 5) RISK ASSESSMENT AND RISK RESPONSE
• Inherent risk -- before management takes steps to
   control risk.
• Residual risk -- risk that remains after management
   takes action to control the risk
Four ways to respond to risk:
   Reduce (have internal controls)
   Accept (no action)
   Share (insurance, hedge, outsource)
   Avoid (sell division, exit product line)

                    FOSTER School of Business Acctg 320   34
The eight components of ERM
• Risk Assessment Approach to Designing
  Internal Controls—see Fig. 6-2 pg. 217 of text.
  – Estimate likelihood and Impact
  – Identify Controls
  – Estimate Costs & Benefits
     • Cost usually easier to measure
     • Expected loss = Impact * Likelihood
     • Determine Cost/Benefit Effectiveness
  – Implement Control or Avoid, Share, or Accept Risk
                    FOSTER School of Business Acctg 320   35
The eight components of ERM
• Example of cost/benefit analysis:
   – Hobby Hole is trying to decide whether to install a motion
     detector system in its warehouse to reduce the probability
     of a catastrophic theft.
   – A catastrophic theft could result in losses of $800,000.
   – Local crime statistics suggest that the probability of a
     catastrophic theft at Hobby Hole is 12%.
   – Companies with motion detectors only have about a .5%
     probability of catastrophic theft.
   – The present value of purchasing and installing a motion
     detector system and paying future security costs is
     estimated to be about $43,000.
   – Should Hobby Hole install the motion detectors?

                     FOSTER School of Business Acctg 320      36
The eight components of ERM
• Expected Loss without control procedure = $800,000 x .12 =
  $96,000.
• Expected loss with control procedure = $800,000 x .005 =
  $4,000.
• Estimated value of control procedure = $96,000 - $4,000 =
  $92,000.
• Estimated cost of control procedure = $43,000 (given).
• Benefits exceed costs by $92,000 - $43,000 = $49,000.
• In this case, Hobby Hole should probably install the motion
  detectors.


                      FOSTER School of Business Acctg 320       37
The eight components of ERM
(6) Control activities: policies, procedures, and rules that
   provide reasonable assurance that management’s
   control objectives are met and their risk responses are
   carried out.
• It is critical that controls be in place during the year-
   end holiday season. A disproportionate amount of
   computer fraud and security break-ins occur during
   this time because:
   – More people are on vacation and fewer around to mind
     the store.
   – Students are not tied up with school.
   – Counterculture hackers may be lonely.

                     FOSTER School of Business Acctg 320    38
The eight components of ERM
• Generally, control procedures fall into one of the
  following categories:
   – Proper authorization of transactions and activities (general
     & specific).
   – Segregation of duties (our focus)
   – Project development and acquisition controls
   – Change management controls
   – Design and use of documents and records
   – Safeguard assets, records, and data
   – Independent checks on performance (top level reviews,
     analytical reviews, reconciliation of records, independent
     reviews).

                      FOSTER School of Business Acctg 320       39
The eight components of ERM
• Segregation of duties
   – Good internal control requires that no single
     employee be given too much responsibility over
     business transactions or processes.
   – An employee should not be in a position to
     commit and conceal fraud or unintentional errors.
   – Segregation of duties:
      • Segregation of accounting duties
      • Segregation of duties within the systems function



                     FOSTER School of Business Acctg 320    40
The eight components of ERM
• Segregation of accounting duties
   – Effective segregation of accounting duties is achieved when the
     following functions are separated:
       • Authorization—Approving transactions and decisions.
       • Recording—Preparing source documents; maintaining journals,
         ledgers, or other files; preparing reconciliations; and preparing
         performance reports.
       • Custody—Handling cash, maintaining an inventory storeroom,
         receiving incoming customer checks, writing checks on the
         organization’s bank account.
   – If any two of the preceding functions are the responsibility of
     one person, then problems can arise. If people collude, then
     segregation of duties becomes impotent and controls are
     overridden.

                          FOSTER School of Business Acctg 320                41
The eight components of ERM
• Segregation of Systems Duties--Authority and responsibility
  must be divided clearly among the following functions:
   –   Systems administration
   –   Network management
   –   Security management
   –   Change management
   –   Users
   –   Systems analysts
   –   Programming
   –   Computer operations
   –   Information systems library
   –   Data control

                          FOSTER School of Business Acctg 320   42
The eight components of ERM
(7) Information and Communication
The primary purpose of the AIS is to gather, record, process,
  store, summarize, and communicate information about an
  organization.
• According to the AICPA, an AIS has five primary objectives:
   a) Identify and record all valid transactions.
   b) Properly classify transactions.
   c) Record transactions at their proper monetary value.
   d) Record transactions in the proper accounting period.
   e) Properly present transactions and related disclosures in
       the financial statements.

                      FOSTER School of Business Acctg 320        43
The eight components of ERM
(8) Monitoring can be accomplished with a series of
  ongoing events or by separate evaluations.
• Key methods of monitoring performance include:
   – Perform ERM evaluation
   – Implement effective supervision
   – Use responsibility accounting
   – Monitor system activities
   – Track purchased software
   – Conduct periodic audits
   – Employ a computer security officer, a Chief Compliance Officer,
     and computer consultants
   – Engage forensic specialists
   – Install fraud detection software
   – Implement a fraud hotline

                       FOSTER School of Business Acctg 320             44
QUIZ
Multiple Choice 1 (pg. 200)
What type of internal controls finds the problem before it occurs?
A.   Detective controls
B.   Preventive controls
C.   General controls
D.   Corrective controls
Multiple Choice 2 (pg. 201)

The Public Company Accounting Oversight Board consists of:
A. 7 members
B. 3 members
C. 5 members
D. 6 members


                              FOSTER School of Business Acctg 320    45
QUIZ
Multiple Choice 3 (pg. 205)
Which of the following objectives involves parties external to the
   organization?
A. Strategic objectives
B. Compliance objectives
C. Operation objectives
D. Reporting objectives
Multiple Choice 4 (pg. 206)
Which of the following is not a component of COSO?
A. Event identification
B. External environment
C. Risk identification
D. B and C
E. All of the above are components of COSOW
                              FOSTER School of Business Acctg 320    46
QUIZ
Multiple Choice 5 (pg. 207)
What is the most important component of the ERM?
A. Internal environment
B. Risk assessment
C. Control activities
D. Information and communication

Multiple Choice 6 (pg. 209)
Which of the following statements is false?
A. An internal environment consists of an organizational structure.
B. Control activities is a component of COSO ERM.
C. The Sarbanes-Oxley Act requires all public companies to have an audit
   committee.
D. Companies endorse integrity as a basic operating principle by actively
   teaching and reporting it.
                              FOSTER School of Business Acctg 320           47
QUIZ
Multiple Choice 7 (pg. 205)
What corporate objective is based on a company’s mission statement?
A. Strategic objectives
B. Operations objectives
C. Compliance objectives
D. Reporting objectives
Multiple Choice 8 (pg. (pg 205)

The third ERM component is:
A.   Objective setting
B.   Risk assessment
C.   Information and Communication
D.   Event identification


                              FOSTER School of Business Acctg 320     48
QUIZ
Multiple Choice 9 (pg. 219)
The cost of conducting and compiling the end of the month inventory
  is $10,000 and the risk of an inventory error is 12% without a
  validation procedure and 3% with the validation procedures. The
  expected loss to retake and compile the inventory without a
  validation procedure is $1,200 and with the validation procedure is
  only $300. The cost of the validation procedure is $650. What is the
  net expected benefit of validation procedure?

A.   $250
B.   $350
C.   $450
D.   $600

                              FOSTER School of Business Acctg 320   49
QUIZ
Multiple Choice 10 (pg. 221)

Which of the following does not violate separation of duties?

A. Approving purchase orders and receiving items ordered.
B. Approving payment to vendors and completing the monthly bank
   reconciliation.
C. Receiving checks in the mail and maintaining the cash receipts journal.
D. Writing checks and receiving checks in the mail.




                               FOSTER School of Business Acctg 320           50

More Related Content

What's hot

Internal control & compliance of bank
Internal control & compliance of bankInternal control & compliance of bank
Internal control & compliance of bank
Mohammad Robiul
 
Internal auditing for “one & all” (second edition)
Internal auditing for “one & all” (second edition)Internal auditing for “one & all” (second edition)
Internal auditing for “one & all” (second edition)
Mohammad Wahid Abdullah Khan
 
Internal Auditor Roles
Internal Auditor RolesInternal Auditor Roles
Basic Internal Auditing Presentation
Basic Internal Auditing PresentationBasic Internal Auditing Presentation
Basic Internal Auditing Presentation
Vernon Benjamin
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
Maher Manan
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditingHardik Shah
 
c. AWARENESS ISO INTEGRATED ISO 27001 & 20000-1 PROSIA.pptx
c. AWARENESS ISO INTEGRATED ISO 27001 & 20000-1 PROSIA.pptxc. AWARENESS ISO INTEGRATED ISO 27001 & 20000-1 PROSIA.pptx
c. AWARENESS ISO INTEGRATED ISO 27001 & 20000-1 PROSIA.pptx
AliFRizaldi1
 
Ch 5. assurance 5 Introduction to Internal Control
Ch 5. assurance 5 Introduction to Internal ControlCh 5. assurance 5 Introduction to Internal Control
Ch 5. assurance 5 Introduction to Internal Control
Sazzad Hossain, ITP, MBA, CSCA™
 
financial statements and audit
financial statements and auditfinancial statements and audit
financial statements and audit
سماج سيوك
 
Evolving role of internal auditing function
Evolving role of internal auditing functionEvolving role of internal auditing function
Evolving role of internal auditing function
Debashis Gupta
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glbaguestfd062
 
Introduction to internal auditing
Introduction to internal auditingIntroduction to internal auditing
Introduction to internal auditing
David Griffiths
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
Ahmad Tariq Bhatti
 
Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)
Hisyam
 
Compliance audit
Compliance auditCompliance audit
Compliance audit
Emma Yaks
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
Sukanya Ben
 
The “internal audit” versus “external audit” in details
The “internal audit” versus “external audit” in detailsThe “internal audit” versus “external audit” in details
The “internal audit” versus “external audit” in detailsMohammad Wahid Abdullah Khan
 

What's hot (20)

Internal control & compliance of bank
Internal control & compliance of bankInternal control & compliance of bank
Internal control & compliance of bank
 
Internal auditing for “one & all” (second edition)
Internal auditing for “one & all” (second edition)Internal auditing for “one & all” (second edition)
Internal auditing for “one & all” (second edition)
 
Internal Auditor Roles
Internal Auditor RolesInternal Auditor Roles
Internal Auditor Roles
 
Basic Internal Auditing Presentation
Basic Internal Auditing PresentationBasic Internal Auditing Presentation
Basic Internal Auditing Presentation
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Sample audit plan
Sample audit planSample audit plan
Sample audit plan
 
Internal controls in auditing
Internal controls in auditingInternal controls in auditing
Internal controls in auditing
 
c. AWARENESS ISO INTEGRATED ISO 27001 & 20000-1 PROSIA.pptx
c. AWARENESS ISO INTEGRATED ISO 27001 & 20000-1 PROSIA.pptxc. AWARENESS ISO INTEGRATED ISO 27001 & 20000-1 PROSIA.pptx
c. AWARENESS ISO INTEGRATED ISO 27001 & 20000-1 PROSIA.pptx
 
Ch 5. assurance 5 Introduction to Internal Control
Ch 5. assurance 5 Introduction to Internal ControlCh 5. assurance 5 Introduction to Internal Control
Ch 5. assurance 5 Introduction to Internal Control
 
financial statements and audit
financial statements and auditfinancial statements and audit
financial statements and audit
 
Evolving role of internal auditing function
Evolving role of internal auditing functionEvolving role of internal auditing function
Evolving role of internal auditing function
 
Introduction to Business Continuity Management
Introduction to Business Continuity ManagementIntroduction to Business Continuity Management
Introduction to Business Continuity Management
 
Is Security Team 2 Glba
Is Security Team 2 GlbaIs Security Team 2 Glba
Is Security Team 2 Glba
 
Introduction to internal auditing
Introduction to internal auditingIntroduction to internal auditing
Introduction to internal auditing
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)Brief overview on Internal control (Audit)
Brief overview on Internal control (Audit)
 
Internal auditing
Internal auditingInternal auditing
Internal auditing
 
Compliance audit
Compliance auditCompliance audit
Compliance audit
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
The “internal audit” versus “external audit” in details
The “internal audit” versus “external audit” in detailsThe “internal audit” versus “external audit” in details
The “internal audit” versus “external audit” in details
 

Viewers also liked

Internal Control
Internal ControlInternal Control
Internal Control
Salih Islam
 
Coso And Internal Audit
Coso And Internal AuditCoso And Internal Audit
Coso And Internal Auditijazurrehman
 
Top 10 lessons learned from COSO 2013 Implementation
Top 10 lessons learned from COSO 2013 Implementation Top 10 lessons learned from COSO 2013 Implementation
Top 10 lessons learned from COSO 2013 Implementation
Amit Bhargava
 
Internal control system
Internal control systemInternal control system
Internal control system
Sowie Althea
 
42 39 checklist_for_internal_control_system
42 39 checklist_for_internal_control_system42 39 checklist_for_internal_control_system
42 39 checklist_for_internal_control_systemKalyan Ghosh
 
ERM and Internal Auditing 2016 Tea Talk v2a
ERM and Internal Auditing 2016 Tea Talk v2aERM and Internal Auditing 2016 Tea Talk v2a
ERM and Internal Auditing 2016 Tea Talk v2aNusaibah Hamizan
 
Internal Controls
Internal ControlsInternal Controls
Internal Controlsmscuttle
 
Upgrading Risk Management and Internal Control in Your Organization
Upgrading Risk Management and Internal Control in Your OrganizationUpgrading Risk Management and Internal Control in Your Organization
Upgrading Risk Management and Internal Control in Your Organization
International Federation of Accountants
 
Control Self Assessment
Control Self AssessmentControl Self Assessment
Control Self Assessment
Manoj Agarwal
 
Recent COSO Internal Control and Risk Management Developments
Recent COSO Internal Control and Risk Management DevelopmentsRecent COSO Internal Control and Risk Management Developments
Recent COSO Internal Control and Risk Management Developments
International Federation of Accountants
 
Illustrative Tools for Assessing Effectiveness of a System of Internal Control
Illustrative Tools for Assessing Effectiveness of a System of Internal Control Illustrative Tools for Assessing Effectiveness of a System of Internal Control
Illustrative Tools for Assessing Effectiveness of a System of Internal Control
Tahir Abbas
 
Internal Control & Risk Management Framework
Internal Control & Risk Management FrameworkInternal Control & Risk Management Framework
Internal Control & Risk Management FrameworkTreasury Consulting LLP
 
internal control and control self assessment
internal control and control self assessmentinternal control and control self assessment
internal control and control self assessmentManoj Agarwal
 
What is Cobit
What is CobitWhat is Cobit
What is Cobit
Ben Kalland
 
8. internal control new
8. internal control new8. internal control new
8. internal control new
Syed Osama Rizvi
 
Internal Control Questionnaires (ICQs)
Internal Control Questionnaires (ICQs)Internal Control Questionnaires (ICQs)
Internal Control Questionnaires (ICQs)
Ahmad Tariq Bhatti
 
COSO Internal Control - Integrated Framework
COSO Internal Control - Integrated FrameworkCOSO Internal Control - Integrated Framework
COSO Internal Control - Integrated Framework
Aziz Fataliyev, Internal Audit Practitioner
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
Vivek K. Singh
 

Viewers also liked (20)

Internal Control
Internal ControlInternal Control
Internal Control
 
Coso And Internal Audit
Coso And Internal AuditCoso And Internal Audit
Coso And Internal Audit
 
Top 10 lessons learned from COSO 2013 Implementation
Top 10 lessons learned from COSO 2013 Implementation Top 10 lessons learned from COSO 2013 Implementation
Top 10 lessons learned from COSO 2013 Implementation
 
SOX 2016 - PART I - COSO 2013
SOX 2016 - PART I - COSO 2013SOX 2016 - PART I - COSO 2013
SOX 2016 - PART I - COSO 2013
 
Coso Based Internal Audit Controls
Coso Based Internal Audit ControlsCoso Based Internal Audit Controls
Coso Based Internal Audit Controls
 
Internal control system
Internal control systemInternal control system
Internal control system
 
42 39 checklist_for_internal_control_system
42 39 checklist_for_internal_control_system42 39 checklist_for_internal_control_system
42 39 checklist_for_internal_control_system
 
ERM and Internal Auditing 2016 Tea Talk v2a
ERM and Internal Auditing 2016 Tea Talk v2aERM and Internal Auditing 2016 Tea Talk v2a
ERM and Internal Auditing 2016 Tea Talk v2a
 
Internal Controls
Internal ControlsInternal Controls
Internal Controls
 
Upgrading Risk Management and Internal Control in Your Organization
Upgrading Risk Management and Internal Control in Your OrganizationUpgrading Risk Management and Internal Control in Your Organization
Upgrading Risk Management and Internal Control in Your Organization
 
Control Self Assessment
Control Self AssessmentControl Self Assessment
Control Self Assessment
 
Recent COSO Internal Control and Risk Management Developments
Recent COSO Internal Control and Risk Management DevelopmentsRecent COSO Internal Control and Risk Management Developments
Recent COSO Internal Control and Risk Management Developments
 
Illustrative Tools for Assessing Effectiveness of a System of Internal Control
Illustrative Tools for Assessing Effectiveness of a System of Internal Control Illustrative Tools for Assessing Effectiveness of a System of Internal Control
Illustrative Tools for Assessing Effectiveness of a System of Internal Control
 
Internal Control & Risk Management Framework
Internal Control & Risk Management FrameworkInternal Control & Risk Management Framework
Internal Control & Risk Management Framework
 
internal control and control self assessment
internal control and control self assessmentinternal control and control self assessment
internal control and control self assessment
 
What is Cobit
What is CobitWhat is Cobit
What is Cobit
 
8. internal control new
8. internal control new8. internal control new
8. internal control new
 
Internal Control Questionnaires (ICQs)
Internal Control Questionnaires (ICQs)Internal Control Questionnaires (ICQs)
Internal Control Questionnaires (ICQs)
 
COSO Internal Control - Integrated Framework
COSO Internal Control - Integrated FrameworkCOSO Internal Control - Integrated Framework
COSO Internal Control - Integrated Framework
 
Accounting information system
Accounting information systemAccounting information system
Accounting information system
 

Similar to Internal controls & ai ss

Internal control system
Internal control systemInternal control system
Internal control system
Madiha Hassan
 
Internal control system
Internal control systemInternal control system
Internal control systemMadiha Hassan
 
Richardson_AIS3e_CH13_PowerPoint.pptx
Richardson_AIS3e_CH13_PowerPoint.pptxRichardson_AIS3e_CH13_PowerPoint.pptx
Richardson_AIS3e_CH13_PowerPoint.pptx
MohamedElmahgoub2
 
COSO 2013 and The Auditor
COSO 2013 and The AuditorCOSO 2013 and The Auditor
COSO 2013 and The Auditor
Corporate Compliance Seminars
 
Control&accounting information system
Control&accounting information systemControl&accounting information system
Control&accounting information system
sellyhood
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
newbie2019
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
arif prasetyo
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
Hendri Eka Saputra
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
seanpizzy
 
Tugas control & audit sistem informasi
Tugas control & audit sistem informasiTugas control & audit sistem informasi
Tugas control & audit sistem informasi
Nur Fatrianti
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007Danial Khan
 
zSecurity_L9_Standards and Policies.ppt
zSecurity_L9_Standards and Policies.pptzSecurity_L9_Standards and Policies.ppt
zSecurity_L9_Standards and Policies.ppt
ssuser45a8a6
 
ch03.ppt hjvfjkhvjhfukghufuoiugtoiijhguilgy
ch03.ppt hjvfjkhvjhfukghufuoiugtoiijhguilgych03.ppt hjvfjkhvjhfukghufuoiugtoiijhguilgy
ch03.ppt hjvfjkhvjhfukghufuoiugtoiijhguilgy
saiinpeer
 
COBIT
COBITCOBIT
COBIT
Ai Lun Wu
 
SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007Slava Gorbunov
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
dwiki apsyarin
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
Sharing Slides Training
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
sharing notes123
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
sharing notes123
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
Sharing Slides Training
 

Similar to Internal controls & ai ss (20)

Internal control system
Internal control systemInternal control system
Internal control system
 
Internal control system
Internal control systemInternal control system
Internal control system
 
Richardson_AIS3e_CH13_PowerPoint.pptx
Richardson_AIS3e_CH13_PowerPoint.pptxRichardson_AIS3e_CH13_PowerPoint.pptx
Richardson_AIS3e_CH13_PowerPoint.pptx
 
COSO 2013 and The Auditor
COSO 2013 and The AuditorCOSO 2013 and The Auditor
COSO 2013 and The Auditor
 
Control&accounting information system
Control&accounting information systemControl&accounting information system
Control&accounting information system
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Control and Audit Information System
Control and Audit Information SystemControl and Audit Information System
Control and Audit Information System
 
Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)Control and audit of information System (hendri eka saputra)
Control and audit of information System (hendri eka saputra)
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Tugas control & audit sistem informasi
Tugas control & audit sistem informasiTugas control & audit sistem informasi
Tugas control & audit sistem informasi
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007
 
zSecurity_L9_Standards and Policies.ppt
zSecurity_L9_Standards and Policies.pptzSecurity_L9_Standards and Policies.ppt
zSecurity_L9_Standards and Policies.ppt
 
ch03.ppt hjvfjkhvjhfukghufuoiugtoiijhguilgy
ch03.ppt hjvfjkhvjhfukghufuoiugtoiijhguilgych03.ppt hjvfjkhvjhfukghufuoiugtoiijhguilgy
ch03.ppt hjvfjkhvjhfukghufuoiugtoiijhguilgy
 
COBIT
COBITCOBIT
COBIT
 
SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007SOX ICMS Implmenetation - 2007
SOX ICMS Implmenetation - 2007
 
Kontrol & Audit Sistem Informasi
Kontrol & Audit Sistem InformasiKontrol & Audit Sistem Informasi
Kontrol & Audit Sistem Informasi
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais Part 1
 
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And AisAis Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
 

Recently uploaded

Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
daothibichhang1
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
Any kyc Account
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 

Recently uploaded (20)

Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.An introduction to the cryptocurrency investment platform Binance Savings.
An introduction to the cryptocurrency investment platform Binance Savings.
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 

Internal controls & ai ss

  • 1. Chapter 6 Control & AISs Fig. 6-1 COSO’s ERMM FOSTER School of Business Acctg 320 1
  • 2. Overview • Questions to be addressed in this chapter: – What are the basic internal control concepts, and why are computer control and security important? – What is the difference between the COBIT, COSO, and ERM control frameworks? – What are the major elements in the internal environment of a company? – What are the four types of control objectives that companies need to set? – What events affect uncertainty, and how can they be identified? – How is the Enterprise Risk Management model used to assess and respond to risk? – What control activities are commonly used in companies? – How do organizations communicate information and monitor control processes? FOSTER School of Business Acctg 320 2
  • 3. Introduction AIS threats are increasing, why? – Control risks have increased in the last few years because: • There are computers and servers everywhere. • Distributed computer networks make data available to many users. • Wide area networks (WANs) are giving customers and suppliers access to each other’s systems and data. – Inadequate Protection: • Threats are underestimated, controls are not well understood. • Productivity pressures, cost reduction pressures. • Companies have not always understood the threats. • Cost pressures mean that mgr.s skip time-consuming control proc. FOSTER School of Business Acctg 320 3
  • 4. Introduction • Control and security are important – Companies are now recognizing the problems and taking positive steps to achieve better control, including: • Devoting full-time staff to security and control concerns. • Educating employees about control measures. • Establishing and enforcing formal information security policies. • Making controls a part of the applications development process. • Moving sensitive data to more secure environments. FOSTER School of Business Acctg 320 4
  • 5. Introduction Control objectives are the same regardless of the data processing method, but a computer-based AIS requires different internal control policies and procedures because: – Computer processing may reduce clerical errors but increase risks of unauthorized access or modification of data files. – Segregation of duties must be achieved differently in an AIS. – Computers provide opportunities for enhancement of some internal controls. FOSTER School of Business Acctg 320 5
  • 6. Control Concepts • Internal control is the process implemented by the board of directors, management, and those under their direction to provide reasonable assurance that the following control objectives are achieved: – Assets (including data) are safeguarded. – Records are maintained in sufficient detail to accurately and fairly reflect company assets. – Accurate and reliable information is provided. – There is reasonable assurance that financial reports are prepared in accordance with GAAP. – Operational efficiency is promoted and improved. – Adherence to prescribed managerial policies is encouraged. – The organization complies with applicable laws and regulations. FOSTER School of Business Acctg 320 6
  • 7. Control Concepts • Internal control is a process because: – It permeates an organization’s operating activities. – It is an integral part of basic management activities. • Internal control provides reasonable, rather than absolute, assurance, because complete assurance is difficult or impossible to achieve and prohibitively expensive. • Internal control systems have inherent limitations, including: – They are susceptible to errors and poor decisions. – They can be overridden by management or by collusion of two or more employees. • Internal control objectives are often at odds with each other. – EXAMPLE: Controls to safeguard assets may also reduce operational efficiency. FOSTER School of Business Acctg 320 7
  • 8. Control Concepts • Internal controls perform three important functions: – Preventive controls (deter problems before) – Detective controls (discover problems after they arise.) – Corrective controls (correct and modify system.) FOSTER School of Business Acctg 320 8
  • 9. Control Concepts • Internal controls are often classified as: – General controls • Those designed to make sure an organization’s control environment is stable and well managed. • They apply to all sizes and types of systems. • Examples: Security management controls. – Application controls • Prevent, detect, and correct transaction errors and fraud. • Concerned with accuracy, completeness, validity, and authorization of the data captured, entered into the system, processed, stored, transmitted to other systems, and reported. FOSTER School of Business Acctg 320 9
  • 10. Sarbanes-Oxley (SOX) • In 1977, Congress passed the Foreign Corrupt Practices Act. This act incorporated language from an AICPA pronouncement. • The primary purpose of the act was to prevent the bribery of foreign officials to obtain business. • A significant effect was to require that corporations maintain good systems of internal accounting control. – Generated significant interest among management, accountants, and auditors in designing and evaluating internal control systems. – However, the resulting internal control improvements weren’t sufficient. FOSTER School of Business Acctg 320 10
  • 11. SOX • In the late 1990s and early 2000s, a series of multi-million-dollar accounting frauds made headlines (e.g., ENRON, WorldCom…) – The impact on financial markets was substantial, and Congress responded with passage of the Sarbanes-Oxley Act of 2002 (aka, SOX). • Applies to publicly held companies and their auditors. FOSTER School of Business Acctg 320 11
  • 12. SOX • The intent of SOX is to: – Prevent financial statement fraud – Make financial reports more transparent – Protect investors – Strengthen internal controls in publicly-held companies – Punish executives who perpetrate fraud • SOX has had a material impact on the way boards of directors, management, and accountants operate. FOSTER School of Business Acctg 320 12
  • 13. SOX • Important aspects of SOX include: – Creation of the Public Company Accounting Oversight Board (PCAOB) to oversee the auditing profession. • The SEC appoints five members to oversee the auditing profession. Three cannot be CPA’s. They enforce auditing, quality control, ethics, and independence. – New rules for auditors • Rotation rules. Prohibit certain activities (bookkeeping, systems, internal audit) for auditors. – New rules for audit committees • All must be independent, and one must be a financial expert. – New rules for management • The CEO/CFO certify findings, responsible for internal controls and certify auditors were told about all material control weaknesses and examples of fraud. – New internal control requirements • Publicly held companies must issue a report accompanying the financial statements that states management is responsible for the internal control structure. They also have to report on the adequacy of the internal control structure. FOSTER School of Business Acctg 320 13
  • 14. SOX • After the passage of SOX, the SEC further mandated that: – Management must base its evaluation on a recognized control framework, developed using a due-process procedure that allows for public comment. The most likely framework is the COSO model discussed later. – The report must contain a statement identifying the framework used. – Management must disclose any and all material internal control weaknesses. – Management cannot conclude that the company has effective internal control if there are any material weaknesses. FOSTER School of Business Acctg 320 14
  • 15. Control Frameworks • A number of frameworks have been developed to help companies develop good internal control systems. Three of the most important are: – The COBIT framework – The COSO internal control framework – COSO’s Enterprise Risk Management framework (ERM) FOSTER School of Business Acctg 320 15
  • 16. COBIT – Also know as the Control Objectives for Information and related Technology framework. – Developed by the Information Systems Audit and Control Foundation (ISACF). – A framework of generally applicable information systems security and control practices for IT control. FOSTER School of Business Acctg 320 16
  • 17. COBIT • The COBIT framework allows: – Management to benchmark security and control practices of IT environments. – Users of IT services to be assured that adequate security and control exists. – Auditors to substantiate their opinions on internal control and advise on IT security and control matters. FOSTER School of Business Acctg 320 17
  • 18. COBIT • COBIT consolidates standards from 36 different sources into a single framework. • It is having a big impact on the IS profession. – Helps managers to learn how to balance risk and control investment in an IS environment. – Provides users with greater assurance that security and IT controls provided by internal and third parties are adequate. – Guides auditors as they substantiate their opinions and provide advice to management on internal controls. FOSTER School of Business Acctg 320 18
  • 19. COSO framework • COSO’s internal control framework – The Committee of Sponsoring Organizations (COSO) is a private sector group consisting of: • The American Accounting Association • The AICPA • The Institute of Internal Auditors • The Institute of Management Accountants • The Financial Executives Institute FOSTER School of Business Acctg 320 19
  • 20. COSO • In 1992, COSO issued the Internal Control Integrated Framework: – Defines internal controls. – Provides guidance for evaluating and enhancing internal control systems. – Widely accepted as the authority on internal controls. – Incorporated into policies, rules, and regulations used to control business activities. (10 years later it issued its expanded Enterprise Risk Management [ERM] model.) FOSTER School of Business Acctg 320 20
  • 21. COSO Frameworks Elements: I. C. Framework ERM Internal environment X X Objective setting X Event identification X Risk assessment X X Risk response X Control activities X X Information and communication X X Monitoring X X FOSTER School of Business Acctg 320 21
  • 22. ERM • Basic principles behind ERM: – Companies are formed to create value for owners. – Management must decide how much uncertainty they will accept. – Uncertainty can result in: • Risk • Opportunity The framework should help management manage uncertainty and its associated risk to build and preserve value. To maximize value, a company must balance its growth and return objectives and risks with efficient and effective use of company resources. FOSTER School of Business Acctg 320 22
  • 23. COSO’s ERM model COSO developed a model to illustrate the elements of ERM. Columns at the top represent the four types of objectives that management must meet to achieve company goals. Columns on the right represent the company’s units: Entire company, Division, Business unit, Subsidiary. The horizontal rows are eight related risk and control components. FOSTER School of Business Acctg 320 23
  • 24. The eight components of ERM 1) The Internal Environment a) Management’s philosophy: management’s philosophy has a huge impact. Risk appetite: different companies have different perspectives on risks. But some companies have excessive focus on achieving results. b) The Board of Directors: --Needs to oversee management --Sarbanes-Oxley audit committee must exist, consisting entirely of outsides directors --This audit committee needs to work closely with internal and external auditors FOSTER School of Business Acctg 320 24
  • 25. The eight components of ERM 1) The Internal Environment (continued) c) Commitment to integrity, ethical values, and competence -- Internal policies -- Is there a Standards of Business Conduct? -- Is there an Open Door? Is there protection for people who raise issues concerning company ethics? -- What is important is what is actually done, not what is actually said. FOSTER School of Business Acctg 320 25
  • 26. The eight components of ERM (1) The Internal Environment (continued) d) Organizational structure: Is it overly complex? Statistically, fraud occurs more frequently in organizations with complex structures. Who does finance report to? Who the does internal audit report to? Where does IT report? FOSTER School of Business Acctg 320 26
  • 27. The eight components of ERM • Important aspects of organizational structure: – Degree of centralization or decentralization. – Assignment of responsibility for specific tasks. – Direct-reporting relationships or matrix structure. – Organization by industry, product, geographic location, marketing network. – How the responsibility allocation affects management’s information needs. – Organization of accounting and IS functions. – Size and nature of company activities. FOSTER School of Business Acctg 320 27
  • 28. The eight components of ERM (1) The Internal Environment (continued) (e) Methods of assigning authority and responsibility Authority and responsibility are assigned through: – Formal job descriptions – Employee training – Operating plans, schedules, and budgets – Codes of conduct that define ethical behavior, acceptable practices, regulatory requirements, and conflicts of interest – Written policies and procedures manuals (a good job reference and job training tool) which covers: • Proper business practices • Knowledge and experience needed by key personnel • Resources provided to carry out duties • Policies and procedures for handling particular transactions • The organization’s chart of accounts • Sample copies of forms and documents FOSTER School of Business Acctg 320 28
  • 29. The eight components of ERM (1) The Internal Environment (continued) (f) Human Resource Standards The following policies and procedures are important: – Hiring (background checks) – Compensating (fair) – Training (fraud & ethics awareness, punishment outlined) – Evaluating and promoting – Discharging – Managing disgruntled employees (indentify, help) – Vacations and rotation of duties (mandatory) – Confidentiality insurance and fidelity bonds (signed doc.s) – Prosecute hackers & fraud (most go unprosecuted, why?) FOSTER School of Business Acctg 320 29
  • 30. The eight components of ERM (1) The Internal Environment (continued) (g) External influences – External influences that affect the control environment include requirements imposed by: • FASB • PCAOB • SEC • Insurance commissions • Regulatory agencies for banks, utilities, etc. (FDIC) FOSTER School of Business Acctg 320 30
  • 31. The eight components of ERM (2) Objective Setting Objective-setting process proceeds as follows: – First, set strategic objectives, the high-level goals that support the company’s mission and create value for shareholders. – To meet these objectives, identify alternative ways of accomplishing them. – For each alternative, identify and assess risks and implications. – Formulate a corporate strategy. – Then set operations, compliance, and reporting objectives. FOSTER School of Business Acctg 320 31
  • 32. The eight components of ERM (3) Event Identification • Events are: – Incidents or occurrences that emanate from internal or external sources. – That affect implementation of strategy or achievement of objectives. – Impact can be positive, negative, or both. – Events can range from obvious to obscure. – Effects can range from inconsequential to highly significant. Table 6-2 (pg. 215) Outlines 9 ERM event categories, both external and internal. FOSTER School of Business Acctg 320 32
  • 33. The eight components of ERM (3) Event Identification (continued) Companies usually use two or more of the following techniques together to identify events: – Use comprehensive lists of potential events – Perform an internal analysis – Monitor leading events and trigger points – Conduct workshops and interviews – Perform data mining and analysis – Analyze business processes FOSTER School of Business Acctg 320 33
  • 34. The eight components of ERM (4 & 5) RISK ASSESSMENT AND RISK RESPONSE • Inherent risk -- before management takes steps to control risk. • Residual risk -- risk that remains after management takes action to control the risk Four ways to respond to risk: Reduce (have internal controls) Accept (no action) Share (insurance, hedge, outsource) Avoid (sell division, exit product line) FOSTER School of Business Acctg 320 34
  • 35. The eight components of ERM • Risk Assessment Approach to Designing Internal Controls—see Fig. 6-2 pg. 217 of text. – Estimate likelihood and Impact – Identify Controls – Estimate Costs & Benefits • Cost usually easier to measure • Expected loss = Impact * Likelihood • Determine Cost/Benefit Effectiveness – Implement Control or Avoid, Share, or Accept Risk FOSTER School of Business Acctg 320 35
  • 36. The eight components of ERM • Example of cost/benefit analysis: – Hobby Hole is trying to decide whether to install a motion detector system in its warehouse to reduce the probability of a catastrophic theft. – A catastrophic theft could result in losses of $800,000. – Local crime statistics suggest that the probability of a catastrophic theft at Hobby Hole is 12%. – Companies with motion detectors only have about a .5% probability of catastrophic theft. – The present value of purchasing and installing a motion detector system and paying future security costs is estimated to be about $43,000. – Should Hobby Hole install the motion detectors? FOSTER School of Business Acctg 320 36
  • 37. The eight components of ERM • Expected Loss without control procedure = $800,000 x .12 = $96,000. • Expected loss with control procedure = $800,000 x .005 = $4,000. • Estimated value of control procedure = $96,000 - $4,000 = $92,000. • Estimated cost of control procedure = $43,000 (given). • Benefits exceed costs by $92,000 - $43,000 = $49,000. • In this case, Hobby Hole should probably install the motion detectors. FOSTER School of Business Acctg 320 37
  • 38. The eight components of ERM (6) Control activities: policies, procedures, and rules that provide reasonable assurance that management’s control objectives are met and their risk responses are carried out. • It is critical that controls be in place during the year- end holiday season. A disproportionate amount of computer fraud and security break-ins occur during this time because: – More people are on vacation and fewer around to mind the store. – Students are not tied up with school. – Counterculture hackers may be lonely. FOSTER School of Business Acctg 320 38
  • 39. The eight components of ERM • Generally, control procedures fall into one of the following categories: – Proper authorization of transactions and activities (general & specific). – Segregation of duties (our focus) – Project development and acquisition controls – Change management controls – Design and use of documents and records – Safeguard assets, records, and data – Independent checks on performance (top level reviews, analytical reviews, reconciliation of records, independent reviews). FOSTER School of Business Acctg 320 39
  • 40. The eight components of ERM • Segregation of duties – Good internal control requires that no single employee be given too much responsibility over business transactions or processes. – An employee should not be in a position to commit and conceal fraud or unintentional errors. – Segregation of duties: • Segregation of accounting duties • Segregation of duties within the systems function FOSTER School of Business Acctg 320 40
  • 41. The eight components of ERM • Segregation of accounting duties – Effective segregation of accounting duties is achieved when the following functions are separated: • Authorization—Approving transactions and decisions. • Recording—Preparing source documents; maintaining journals, ledgers, or other files; preparing reconciliations; and preparing performance reports. • Custody—Handling cash, maintaining an inventory storeroom, receiving incoming customer checks, writing checks on the organization’s bank account. – If any two of the preceding functions are the responsibility of one person, then problems can arise. If people collude, then segregation of duties becomes impotent and controls are overridden. FOSTER School of Business Acctg 320 41
  • 42. The eight components of ERM • Segregation of Systems Duties--Authority and responsibility must be divided clearly among the following functions: – Systems administration – Network management – Security management – Change management – Users – Systems analysts – Programming – Computer operations – Information systems library – Data control FOSTER School of Business Acctg 320 42
  • 43. The eight components of ERM (7) Information and Communication The primary purpose of the AIS is to gather, record, process, store, summarize, and communicate information about an organization. • According to the AICPA, an AIS has five primary objectives: a) Identify and record all valid transactions. b) Properly classify transactions. c) Record transactions at their proper monetary value. d) Record transactions in the proper accounting period. e) Properly present transactions and related disclosures in the financial statements. FOSTER School of Business Acctg 320 43
  • 44. The eight components of ERM (8) Monitoring can be accomplished with a series of ongoing events or by separate evaluations. • Key methods of monitoring performance include: – Perform ERM evaluation – Implement effective supervision – Use responsibility accounting – Monitor system activities – Track purchased software – Conduct periodic audits – Employ a computer security officer, a Chief Compliance Officer, and computer consultants – Engage forensic specialists – Install fraud detection software – Implement a fraud hotline FOSTER School of Business Acctg 320 44
  • 45. QUIZ Multiple Choice 1 (pg. 200) What type of internal controls finds the problem before it occurs? A. Detective controls B. Preventive controls C. General controls D. Corrective controls Multiple Choice 2 (pg. 201) The Public Company Accounting Oversight Board consists of: A. 7 members B. 3 members C. 5 members D. 6 members FOSTER School of Business Acctg 320 45
  • 46. QUIZ Multiple Choice 3 (pg. 205) Which of the following objectives involves parties external to the organization? A. Strategic objectives B. Compliance objectives C. Operation objectives D. Reporting objectives Multiple Choice 4 (pg. 206) Which of the following is not a component of COSO? A. Event identification B. External environment C. Risk identification D. B and C E. All of the above are components of COSOW FOSTER School of Business Acctg 320 46
  • 47. QUIZ Multiple Choice 5 (pg. 207) What is the most important component of the ERM? A. Internal environment B. Risk assessment C. Control activities D. Information and communication Multiple Choice 6 (pg. 209) Which of the following statements is false? A. An internal environment consists of an organizational structure. B. Control activities is a component of COSO ERM. C. The Sarbanes-Oxley Act requires all public companies to have an audit committee. D. Companies endorse integrity as a basic operating principle by actively teaching and reporting it. FOSTER School of Business Acctg 320 47
  • 48. QUIZ Multiple Choice 7 (pg. 205) What corporate objective is based on a company’s mission statement? A. Strategic objectives B. Operations objectives C. Compliance objectives D. Reporting objectives Multiple Choice 8 (pg. (pg 205) The third ERM component is: A. Objective setting B. Risk assessment C. Information and Communication D. Event identification FOSTER School of Business Acctg 320 48
  • 49. QUIZ Multiple Choice 9 (pg. 219) The cost of conducting and compiling the end of the month inventory is $10,000 and the risk of an inventory error is 12% without a validation procedure and 3% with the validation procedures. The expected loss to retake and compile the inventory without a validation procedure is $1,200 and with the validation procedure is only $300. The cost of the validation procedure is $650. What is the net expected benefit of validation procedure? A. $250 B. $350 C. $450 D. $600 FOSTER School of Business Acctg 320 49
  • 50. QUIZ Multiple Choice 10 (pg. 221) Which of the following does not violate separation of duties? A. Approving purchase orders and receiving items ordered. B. Approving payment to vendors and completing the monthly bank reconciliation. C. Receiving checks in the mail and maintaining the cash receipts journal. D. Writing checks and receiving checks in the mail. FOSTER School of Business Acctg 320 50