[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.1
Internal Control and Control Risk
Principles of Auditing: An Introduction to
International Standards on Auditing - Ch. 7
Rick Stephan Hayes,
Philip Wallage, and Hans
Gortemaker
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.2
COSO says Internal Control is
A process, effected by an entity’s
board of directors, management and
other personnel, designed to provide
reasonable assurance regarding the achievement
of objectives in the following categories:
effectiveness and efficiency of operations,
reliability of financial reporting,
compliance with applicable laws and regulations
and safeguarding of assets against unauthorized
acquisition, use or disposition.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.3
International Federation of Accountants
Internal Control Definition
Internal control— The process designed,
implemented and maintained by those charged
with governance, management and other
personnel to provide reasonable assurance
about the achievement of an entity’s objectives
with regard to reliability of financial reporting,
effectiveness and efficiency of operations, and
compliance with applicable laws and
regulations.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.4
Internal control is geared to the achievement of objectives in one or
more separate overlapping categories:
1 effective operations — relating to effective and efficient
use of the entity's resources
2 financial reporting — relating to preparation of reliable
published financial statements
3 compliance — relating to the entity's compliance with
applicable laws and regulations
4 safeguarding of assets
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.5
Which of the three categories of management
control objectives is the most important to:
• The External Auditors?
• Management?
• Government Auditors?
• Internal Auditors?
• The shareholders?
• Employees?
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.6
US Securities Exchange Commission rules require
that management must base its evaluation of the
effectiveness of the company's internal control over
financial reporting on a suitable, recognized control
framework established by a body or group that
followed due-process procedures, including the
broad distribution of the framework for public
comment. Two frameworks:
The report of the Committee of Sponsoring
Organizations of the Treadway Commission (known as
the COSO report)
The Financial Reporting Council, Internal Control
Revised Guidance for Directors on the Combined
Code, October 2005 (known as the Turnbull Report).
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.7
Management Control Objectives
• Effective Operations goal safeguarding
of assets (cash, accounts receivable,
accounting records)
• Financial Reporting Need for accurate
information because management has a
responsibility to see that statements are
prepared fairly in accordance with
accounting standards. Auditor is
interested primarily in financial reporting
controls (especially controls over
transactions).
• Compliance Companies must comply
with many laws and regulations
including company law, tax law and
environmental protection regulations.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.8
Auditor’s Primary Control
Consideration and Emphasis
• To understand an entity’s internal control, the
auditor will evaluate the design and
implementation of a control.
• The auditor's primary consideration is
whether, and how, a specific control prevents,
or detects and corrects, material
misstatements in classes of transactions,
account balances or disclosures.
• The heaviest emphasis by auditors is on
controls over classes of transactions rather
than account balances or disclosures.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.9
Design and Implementation of Controls
• To understand the entity’s internal control the
auditor will evaluate the design of a control
and judge whether it has been implemented.
• He determines if the control is designed to
prevent, detect, or correct transactions that
misstate the account balances.
• Implementation of a control means that the
control exists and that the entity is using it.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.10
Why do you think internal controls are
important to a business?
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.11
Information Technology Controls - General
General IT controls are policies and
procedures that relate to many
applications and support the
effective functioning of application
controls by helping to ensure the
continued proper operation of
information systems For example:
– controls over data center and network
operations; system software
acquisition, change and maintenance;
access security; back-up and recovery;
and application system acquisition,
development, and maintenance.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.12
IT Controls – Application controls
Application controls are controls that apply to
applications that initiate, record, process, and
report transactions (such as MS Office, SAP,
QuickBooks), rather than the computer system
in general.
Examples are chart of accounts, edit checks of
input data, numerical sequence checks, and
manual follow-up of exception reports.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.13
IT Risks
 Reliance on systems or programs that are inaccurately
processing data, processing inaccurate data, or both.
 Unauthorized access to data that may result in destruction of
data or improper changes to data
 The possibility of IT personnel gaining access privileges
beyond those necessary to perform their assigned duties thereby
breaking down segregation of duties.
 Unauthorized changes to data in master files.
 Unauthorized changes to systems or programs.
 Failure to make necessary changes to systems or programs.
 Input by people or systems without authorized access.
 Potential loss of data or inability to access data as required
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.14
Components of COSO Internal Control are
• Control Environment,
• Risk Assessment,
• Control Activities / Control
Procedures,
• Information and
Communication and
• Monitoring.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.15
Components
of Internal
Control
Illustration 7.1
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.16
Control Environment
Control environment—Includes the
governance and management functions and
the attitudes, awareness and actions of those
charged with governance and management
concerning the entity’s internal control and
its importance in the entity.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.17
Cumulative Effect of Controls
When analyzing the control environment, the
auditor must think about the collective effect of
various control environment elements. Strengths
in one of the elements might mitigate
weaknesses in another element.
For example, an active and independent board
of directors may influence the philosophy and
operating style of senior management.
Alternatively, human resource policies directed
toward hiring competent accounting personnel
might not mitigate a strong bias by top
management to overstate earnings.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.18
Elements Contributing to a Successful Control
Environment
 Communication and enforcement of
integrity and ethical values;
 Commitment to competence;
 Participation by those charged with
governance - independence and integrity
of the board of directors;
 Management's philosophy and operating
style - leadership via control by example;
 Organizational structure;
 Assignment of authority and responsibility;
and
 Human resource policies and practices.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.19
Integrity and Ethical Values and Commitment
to Competence
The integrity and ethical values of the people
who create, administer, and monitor controls
determines their effectiveness.
Management might remove incentives and
temptations that prompt personnel to engage
in fraudulent or unethical behavior.
A company’s control environment will be more
effective if its culture is one in which quality
and competence are openly valued.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.20
Participation of Those Charged with Governance
The guidance and oversight responsibilities of
an active and involved board of directors who
possess an appropriate degree of
management, technical, and other expertise is
critical to effective internal control.
Because the board must be prepared to
question and scrutinize management’s
activities, present alternative views and have
the courage to act in the face of obvious
wrongdoing, it is necessary that the board
contain at least a critical mass of independent
(non-executive) directors
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.21
Management’s Philosophy and Operating
Style and Organizational Structure
Management’s philosophy and operating style is
their attitude about, and approach to, financial
reporting, accounting issues, and to taking and
managing business risk. Management philosophy
may create significant risk.
Important organizational considerations are
clarity of lines of authority and responsibility; the
level at which policies are established; adherence
to these policies; adequacy of supervision; and
appropriateness of organizational structure for
the entity.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.22
Assignment of authority and responsibility;
Human Resource Policies and Practices
Responsibility and delegation of authority
should be clearly assigned. How responsibility
is distributed is usually spelled out in formal
company policy manuals.
With trustworthy and competent employees,
weaknesses in other controls can be
compensated and reliable financial statements
might still result. Honest, efficient people are
able to perform at a high level even when
there are few other controls to support them.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.23
Risk Assessment
Management assesses risks as part of designing and operating
the internal control system to minimize errors and
irregularities.
Auditors assess risks to decide the evidence needed in the
audit.
If management effectively assesses and responds to risks, the
auditor will typically need to accumulate less audit evidence
than when management fails to, because control risk is
lower.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.24
Identify Risks
A technique to identify risks involves identifying
and prioritizing high risk activities:
1. identify the essential resources of the business
and determine which are most at risk;
2. identify possible liabilities which may arise;
3. review the risks that have arisen in the past;
4. consider any additional risks imposed by new
objectives or new external factors; and
5. seek to anticipate change by considering
problems and opportunities on a continuing
basis.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.25
Information Systems, Communication, and
Related Business Processes
Every enterprise must capture pertinent
information related to both internal and external
events and activities in both financial and non-
financial forms. The information must be
identified by management as relevant and then
communicated to people who need it in a form
and time frame that allows them to do their jobs.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.26
Communication
Not just a matter of reporting, communication
occurs in a broader sense, flowing down,
across, and up the organization. All personnel
must receive a clear message from top
management that control responsibilities must
be taken seriously.
Employees must understand their own role in
the internal control system, as well as how
individual activities relate to the work of
others, and how to report significant
information to senior management.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.27
Accounting system
Production system
Personnel system
Systems software
Applications for word-processing,
presentations, data bases, etc. and all records
and files generated by these applications
information about external events, activities
and conditions
Contents of an Information System
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.28
Two Elements of Control Procedures
Control procedures may be divided into two
elements: a policy establishing what should be
done and procedures to effect that policy.
Examples are:
– A policy is that a securities dealer retail branch
manager must monitor (conduct performance
reviews of) customer trades.
– A procedure to effect that policy world be a
review of daily reports of customer trade
activities with attention given to the nature and
volume of securities traded
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.29
Control Activities (Control Procedures)
Control procedures implement the control
policies by specific routine tasks, performed
at particular times by designated people, held
accountable by adequate supervision and
evidence of performance.
 Authorization of transactions and activities,
General Controls;
 Performance reviews;
 Information processing: accuracy, adequate
documents and records, Application controls;
 Physical control over assets and records;
 adequate Segregation of duties.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.30
Authorization
• Proper authorization
– Appropriate delegation of authority
sets limits on what levels of risk are
acceptable
• General Controls
– access to the computer system is
limited to people who have a right to
the information
– back-up and recovery procedures
– User ID and general system access
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.31
Performance
Reviews
Performance reviews are
independent checks on performance
by a third party not directly involved
in the activity. These control
activities include reviews and
analyses of actual performance
versus budgets and actual
performance; relating different sets
of data – operating or financial – to
one another; comparing internal data
with external sources of information;
and review of functional or activity
performance.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.32
Information Processing Adequate
Documents
• Well-designed documents in a manual
system and preformatted input screens in a
CIS
• Assets are properly controlled and all
transactions correctly recorded
• Document prepared at the time a
transaction takes place
• Document simple enough to be clearly
understood,
• Document designed for multiple use to
minimize the number of different forms
• Document constructed in a manner that
encourages correct preparation.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.33
Information Processing: Application
Controls
• The chart of accounts
• Use of serial numbers on documents
and input transactions
• Checks, tickets, sales invoices,
purchase orders, stock certificates and
many other business papers
• Systems manuals for computer
accounting software should provide
sufficient information to make the
accounting functions clear
• Passwords that allow only authorized
people admittance to the computer
software on line
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.34
Physical Controls
• Physical controls are procedures
to ensure the physical security of
assets.
• Only individuals who are properly
authorized should be allowed
access to the company’s assets.
• Direct physical access to assets
may be controlled through
physical precautions
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.35
Segregation of Duties
Segregation of duties entail three
fundamental functions which must be
separated and adequately supervised:
 authorization
 recording
 custody
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.36
Monitoring of Controls
Monitoring is assessing the design of
controls and their operation on a timely
basis and taking necessary corrective
actions.
Ongoing monitoring information
comes from several sources:
exception reporting on control
activities, reports by government
regulators, feedback from
employees, complaints from
customers, and most importantly
from internal auditor reports.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.37
Evaluation of Monitoring
When evaluating the ongoing monitoring the
following issues might be considered:
 Periodic comparisons of amounts recorded
with the accounting system and with physical
assets.
 Responsiveness to internal and external
auditor recommendations to strengthen
internal controls.
 Extent to which training seminars, planning
sessions and other meetings provide
information on effective operation of controls.
 Effectiveness of internal audit activities
 Extent to which personnel obtain evidence on
internal control function
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.38
Hard and Soft Control
Management designs and sets in place a set
of rules, physical constraints and activities
called “internal controls”. Due to the explicit,
formal and tangible character of these
controls, these controls are generally referred
to as hard controls.
Soft controls are the intangible factors in an
organization that influence the behavior of
managers and employees.
Whereas soft controls are founded in the
culture or climate of an organization, the hard-
controls are more explicit, formal and visible.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.39
Seven factors influence the way people examine their control activities
1. Clarity for directors, managers and employees as to
what constitutes desirable and undesirable behavior
2. Role-modeling among administrators, management or
immediate supervisors
3. Achievability of goals, tasks and responsibilities set
4. Commitment in the organization
5. Transparency of behavior
6. Openness to discussion of viewpoints, emotions,
dilemmas and transgressions
7. Enforcement of behavior, such as appreciation
desirable behavior, sanctioning of undesirable
behavior
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.40
Design and Implementation of Internal
Control
 Evaluating the design of a control
involves considering whether the control,
individually or in combination with other
controls, is capable of effectively
preventing, or detecting and correcting,
material misstatements.
 Implementation of a control means that
the control exists and that the entity is
using it.
 There is little point in assessing the
implementation of a control that is not
effective, and so the design of a control is
considered first. An improperly designed
control may represent a significant
deficiency in internal control.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.41
Methods for Obtaining Controls Audit Evidence
Risk assessment procedures to obtain audit
evidence about the design and
implementation of relevant controls may
include:
(1) Inquiring of entity personnel.
(2) Observing and re-performing the
application of a specific control.
(3) Inspecting documents and reports,
(4) Tracing transactions through the
information system
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007
Slide 7.42
Thank You for Your Attention
Any Questions?

More Related Content

PPT
Chapter 1 role of managerial finance
PPT
Ch 8 strategic management
PPT
Ch04 income statement kieso ifrs
PPT
Akuntansi Manajemen Edisi 8 oleh Hansen & Mowen Bab 9
PDF
IAS 28 investasi pada entitas asosiasi dan joint venture
PPTX
8. internal control new
PPT
Understanding financial statements
PDF
TINJAUAN ANALISIS LAPORAN KEUANGAN
Chapter 1 role of managerial finance
Ch 8 strategic management
Ch04 income statement kieso ifrs
Akuntansi Manajemen Edisi 8 oleh Hansen & Mowen Bab 9
IAS 28 investasi pada entitas asosiasi dan joint venture
8. internal control new
Understanding financial statements
TINJAUAN ANALISIS LAPORAN KEUANGAN

What's hot (20)

PPT
Chapter 1 corporate goverance
PPTX
Akuntansi Internasional, BAB II PERKEMBANGAN DAN KLASIFIKASI
PDF
Chapter 15 Quality Costs and Productivity : Measurement, Reporting, and Control
PPTX
2 pelaporan dan analisis keuangan
PDF
International Auditing Standards (ISA)
PDF
Bab 4 - Analisa Laporan Keuangan
PPTX
Materiality
PPTX
Audit Chapter 7
PPTX
Accounting Principles, 12th Edition Ch20
PPTX
Ethics in Accounting
PPT
4. bab iv_kerangka_konseptual_oke
PDF
Auditing Resume Arens
PPT
DOCX
(Pert 3) bab 13 strategi audit dan program audit
PDF
Chapter 9 PPT 4th edition.pdf internal audit
PPT
Akuntansi Manajemen Edisi 8 oleh Hansen & Mowen Bab 12
PDF
Scope, importance of gaap, concepts & conventions
PPT
Client Acceptance
PDF
Solution Manual Advanced Accounting 9th Edition by Baker Chapter 11
PPTX
Kel.10
Chapter 1 corporate goverance
Akuntansi Internasional, BAB II PERKEMBANGAN DAN KLASIFIKASI
Chapter 15 Quality Costs and Productivity : Measurement, Reporting, and Control
2 pelaporan dan analisis keuangan
International Auditing Standards (ISA)
Bab 4 - Analisa Laporan Keuangan
Materiality
Audit Chapter 7
Accounting Principles, 12th Edition Ch20
Ethics in Accounting
4. bab iv_kerangka_konseptual_oke
Auditing Resume Arens
(Pert 3) bab 13 strategi audit dan program audit
Chapter 9 PPT 4th edition.pdf internal audit
Akuntansi Manajemen Edisi 8 oleh Hansen & Mowen Bab 12
Scope, importance of gaap, concepts & conventions
Client Acceptance
Solution Manual Advanced Accounting 9th Edition by Baker Chapter 11
Kel.10
Ad

Similar to Chapter 7 Int Control and Control Risk.ppt (20)

PPT
Risk Assessment For Internal Auditors
PPTX
The Internal Audit Framework
PPTX
Controlling for management and development .pptx
PDF
Internal auditing for “one & all” (second edition)
PDF
Segregation of Duties Solutions
PPTX
Internal audit
PDF
Internal controls maturity and SME corporate governanance
PDF
A Framework For Business Sustainability
PPT
Ais Romney 2006 Slides 06 Control And Ais Part 1
PPT
Ais Romney 2006 Slides 06 Control And Ais
PPT
Ais Romney 2006 Slides 06 Control And Ais
PPT
Ais Romney 2006 Slides 06 Control And Ais Part 1
PPTX
Advanced auditing Chapter Five.Internal control pptx
PPT
Assessing risks and internal controls training
PDF
Professional Judgment Governance 1- Overview
PPTX
COSO Internal Control - Integrated Framework
PPT
Controlling
PPT
Management control-system
DOCX
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
Risk Assessment For Internal Auditors
The Internal Audit Framework
Controlling for management and development .pptx
Internal auditing for “one & all” (second edition)
Segregation of Duties Solutions
Internal audit
Internal controls maturity and SME corporate governanance
A Framework For Business Sustainability
Ais Romney 2006 Slides 06 Control And Ais Part 1
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais
Ais Romney 2006 Slides 06 Control And Ais Part 1
Advanced auditing Chapter Five.Internal control pptx
Assessing risks and internal controls training
Professional Judgment Governance 1- Overview
COSO Internal Control - Integrated Framework
Controlling
Management control-system
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORK
Ad

Recently uploaded (20)

PPTX
Policy Incentives for Small scale industries
PPT
Metho of Data Collection.ppt method of data collection
PDF
Entrep Part I entrepreneurship and business
PDF
Financial Sectors and their negative and positive sides
PPTX
Traumatic Spinasjdjjdshjsjsjsjsjsjsjsjsj
PPTX
MRI.kskdjdjdjdjdndjdjdjdjjdhdjdjdjdjdjdj
PPTX
Finance 2_Rural Finance _1234567891011121314151617 .pptx
PDF
Presentasii Perusahaan TW1 - 2021pdf.pdf
PPTX
Kuliah 5 (Design-Economics-and-Cost-Planning).pptx
PDF
Lundin Gold - September 2025.pdf presentation
PPTX
Time Of Supply and POS_under GST_03-09-25.pptx
PPTX
Blogs and Other information - August 2025.pptx
PPTX
project proposal and project writing example
PDF
4.+Naspub_Cicilia+Denasdfasdfsdfsdf+A+(240-253).pdf
PPTX
macro- 01 macroeconomics by sujata ma'am
PPTX
NON - FARM - AREAS - OF - EMPLOYMENT.pptx
PDF
A480111.pdf American Journal of Multidisciplinary Research and Review
DOCX
How does cost management and budgeting affect company’s financial status, A c...
PPTX
ANAN The Accountancy Profession and National Anti-Corruption Strategy -Prof O...
PPTX
Landscape of Agri startups in India with Special Reference to Assam
Policy Incentives for Small scale industries
Metho of Data Collection.ppt method of data collection
Entrep Part I entrepreneurship and business
Financial Sectors and their negative and positive sides
Traumatic Spinasjdjjdshjsjsjsjsjsjsjsjsj
MRI.kskdjdjdjdjdndjdjdjdjjdhdjdjdjdjdjdj
Finance 2_Rural Finance _1234567891011121314151617 .pptx
Presentasii Perusahaan TW1 - 2021pdf.pdf
Kuliah 5 (Design-Economics-and-Cost-Planning).pptx
Lundin Gold - September 2025.pdf presentation
Time Of Supply and POS_under GST_03-09-25.pptx
Blogs and Other information - August 2025.pptx
project proposal and project writing example
4.+Naspub_Cicilia+Denasdfasdfsdfsdf+A+(240-253).pdf
macro- 01 macroeconomics by sujata ma'am
NON - FARM - AREAS - OF - EMPLOYMENT.pptx
A480111.pdf American Journal of Multidisciplinary Research and Review
How does cost management and budgeting affect company’s financial status, A c...
ANAN The Accountancy Profession and National Anti-Corruption Strategy -Prof O...
Landscape of Agri startups in India with Special Reference to Assam

Chapter 7 Int Control and Control Risk.ppt

  • 1. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal Control and Control Risk Principles of Auditing: An Introduction to International Standards on Auditing - Ch. 7 Rick Stephan Hayes, Philip Wallage, and Hans Gortemaker
  • 2. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.2 COSO says Internal Control is A process, effected by an entity’s board of directors, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: effectiveness and efficiency of operations, reliability of financial reporting, compliance with applicable laws and regulations and safeguarding of assets against unauthorized acquisition, use or disposition.
  • 3. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.3 International Federation of Accountants Internal Control Definition Internal control— The process designed, implemented and maintained by those charged with governance, management and other personnel to provide reasonable assurance about the achievement of an entity’s objectives with regard to reliability of financial reporting, effectiveness and efficiency of operations, and compliance with applicable laws and regulations.
  • 4. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.4 Internal control is geared to the achievement of objectives in one or more separate overlapping categories: 1 effective operations — relating to effective and efficient use of the entity's resources 2 financial reporting — relating to preparation of reliable published financial statements 3 compliance — relating to the entity's compliance with applicable laws and regulations 4 safeguarding of assets
  • 5. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.5 Which of the three categories of management control objectives is the most important to: • The External Auditors? • Management? • Government Auditors? • Internal Auditors? • The shareholders? • Employees?
  • 6. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.6 US Securities Exchange Commission rules require that management must base its evaluation of the effectiveness of the company's internal control over financial reporting on a suitable, recognized control framework established by a body or group that followed due-process procedures, including the broad distribution of the framework for public comment. Two frameworks: The report of the Committee of Sponsoring Organizations of the Treadway Commission (known as the COSO report) The Financial Reporting Council, Internal Control Revised Guidance for Directors on the Combined Code, October 2005 (known as the Turnbull Report).
  • 7. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.7 Management Control Objectives • Effective Operations goal safeguarding of assets (cash, accounts receivable, accounting records) • Financial Reporting Need for accurate information because management has a responsibility to see that statements are prepared fairly in accordance with accounting standards. Auditor is interested primarily in financial reporting controls (especially controls over transactions). • Compliance Companies must comply with many laws and regulations including company law, tax law and environmental protection regulations.
  • 8. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.8 Auditor’s Primary Control Consideration and Emphasis • To understand an entity’s internal control, the auditor will evaluate the design and implementation of a control. • The auditor's primary consideration is whether, and how, a specific control prevents, or detects and corrects, material misstatements in classes of transactions, account balances or disclosures. • The heaviest emphasis by auditors is on controls over classes of transactions rather than account balances or disclosures.
  • 9. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.9 Design and Implementation of Controls • To understand the entity’s internal control the auditor will evaluate the design of a control and judge whether it has been implemented. • He determines if the control is designed to prevent, detect, or correct transactions that misstate the account balances. • Implementation of a control means that the control exists and that the entity is using it.
  • 10. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.10 Why do you think internal controls are important to a business?
  • 11. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.11 Information Technology Controls - General General IT controls are policies and procedures that relate to many applications and support the effective functioning of application controls by helping to ensure the continued proper operation of information systems For example: – controls over data center and network operations; system software acquisition, change and maintenance; access security; back-up and recovery; and application system acquisition, development, and maintenance.
  • 12. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.12 IT Controls – Application controls Application controls are controls that apply to applications that initiate, record, process, and report transactions (such as MS Office, SAP, QuickBooks), rather than the computer system in general. Examples are chart of accounts, edit checks of input data, numerical sequence checks, and manual follow-up of exception reports.
  • 13. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.13 IT Risks  Reliance on systems or programs that are inaccurately processing data, processing inaccurate data, or both.  Unauthorized access to data that may result in destruction of data or improper changes to data  The possibility of IT personnel gaining access privileges beyond those necessary to perform their assigned duties thereby breaking down segregation of duties.  Unauthorized changes to data in master files.  Unauthorized changes to systems or programs.  Failure to make necessary changes to systems or programs.  Input by people or systems without authorized access.  Potential loss of data or inability to access data as required
  • 14. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.14 Components of COSO Internal Control are • Control Environment, • Risk Assessment, • Control Activities / Control Procedures, • Information and Communication and • Monitoring.
  • 15. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.15 Components of Internal Control Illustration 7.1
  • 16. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.16 Control Environment Control environment—Includes the governance and management functions and the attitudes, awareness and actions of those charged with governance and management concerning the entity’s internal control and its importance in the entity.
  • 17. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.17 Cumulative Effect of Controls When analyzing the control environment, the auditor must think about the collective effect of various control environment elements. Strengths in one of the elements might mitigate weaknesses in another element. For example, an active and independent board of directors may influence the philosophy and operating style of senior management. Alternatively, human resource policies directed toward hiring competent accounting personnel might not mitigate a strong bias by top management to overstate earnings.
  • 18. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.18 Elements Contributing to a Successful Control Environment  Communication and enforcement of integrity and ethical values;  Commitment to competence;  Participation by those charged with governance - independence and integrity of the board of directors;  Management's philosophy and operating style - leadership via control by example;  Organizational structure;  Assignment of authority and responsibility; and  Human resource policies and practices.
  • 19. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.19 Integrity and Ethical Values and Commitment to Competence The integrity and ethical values of the people who create, administer, and monitor controls determines their effectiveness. Management might remove incentives and temptations that prompt personnel to engage in fraudulent or unethical behavior. A company’s control environment will be more effective if its culture is one in which quality and competence are openly valued.
  • 20. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.20 Participation of Those Charged with Governance The guidance and oversight responsibilities of an active and involved board of directors who possess an appropriate degree of management, technical, and other expertise is critical to effective internal control. Because the board must be prepared to question and scrutinize management’s activities, present alternative views and have the courage to act in the face of obvious wrongdoing, it is necessary that the board contain at least a critical mass of independent (non-executive) directors
  • 21. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.21 Management’s Philosophy and Operating Style and Organizational Structure Management’s philosophy and operating style is their attitude about, and approach to, financial reporting, accounting issues, and to taking and managing business risk. Management philosophy may create significant risk. Important organizational considerations are clarity of lines of authority and responsibility; the level at which policies are established; adherence to these policies; adequacy of supervision; and appropriateness of organizational structure for the entity.
  • 22. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.22 Assignment of authority and responsibility; Human Resource Policies and Practices Responsibility and delegation of authority should be clearly assigned. How responsibility is distributed is usually spelled out in formal company policy manuals. With trustworthy and competent employees, weaknesses in other controls can be compensated and reliable financial statements might still result. Honest, efficient people are able to perform at a high level even when there are few other controls to support them.
  • 23. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.23 Risk Assessment Management assesses risks as part of designing and operating the internal control system to minimize errors and irregularities. Auditors assess risks to decide the evidence needed in the audit. If management effectively assesses and responds to risks, the auditor will typically need to accumulate less audit evidence than when management fails to, because control risk is lower.
  • 24. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.24 Identify Risks A technique to identify risks involves identifying and prioritizing high risk activities: 1. identify the essential resources of the business and determine which are most at risk; 2. identify possible liabilities which may arise; 3. review the risks that have arisen in the past; 4. consider any additional risks imposed by new objectives or new external factors; and 5. seek to anticipate change by considering problems and opportunities on a continuing basis.
  • 25. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.25 Information Systems, Communication, and Related Business Processes Every enterprise must capture pertinent information related to both internal and external events and activities in both financial and non- financial forms. The information must be identified by management as relevant and then communicated to people who need it in a form and time frame that allows them to do their jobs.
  • 26. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.26 Communication Not just a matter of reporting, communication occurs in a broader sense, flowing down, across, and up the organization. All personnel must receive a clear message from top management that control responsibilities must be taken seriously. Employees must understand their own role in the internal control system, as well as how individual activities relate to the work of others, and how to report significant information to senior management.
  • 27. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.27 Accounting system Production system Personnel system Systems software Applications for word-processing, presentations, data bases, etc. and all records and files generated by these applications information about external events, activities and conditions Contents of an Information System
  • 28. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.28 Two Elements of Control Procedures Control procedures may be divided into two elements: a policy establishing what should be done and procedures to effect that policy. Examples are: – A policy is that a securities dealer retail branch manager must monitor (conduct performance reviews of) customer trades. – A procedure to effect that policy world be a review of daily reports of customer trade activities with attention given to the nature and volume of securities traded
  • 29. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.29 Control Activities (Control Procedures) Control procedures implement the control policies by specific routine tasks, performed at particular times by designated people, held accountable by adequate supervision and evidence of performance.  Authorization of transactions and activities, General Controls;  Performance reviews;  Information processing: accuracy, adequate documents and records, Application controls;  Physical control over assets and records;  adequate Segregation of duties.
  • 30. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.30 Authorization • Proper authorization – Appropriate delegation of authority sets limits on what levels of risk are acceptable • General Controls – access to the computer system is limited to people who have a right to the information – back-up and recovery procedures – User ID and general system access
  • 31. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.31 Performance Reviews Performance reviews are independent checks on performance by a third party not directly involved in the activity. These control activities include reviews and analyses of actual performance versus budgets and actual performance; relating different sets of data – operating or financial – to one another; comparing internal data with external sources of information; and review of functional or activity performance.
  • 32. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.32 Information Processing Adequate Documents • Well-designed documents in a manual system and preformatted input screens in a CIS • Assets are properly controlled and all transactions correctly recorded • Document prepared at the time a transaction takes place • Document simple enough to be clearly understood, • Document designed for multiple use to minimize the number of different forms • Document constructed in a manner that encourages correct preparation.
  • 33. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.33 Information Processing: Application Controls • The chart of accounts • Use of serial numbers on documents and input transactions • Checks, tickets, sales invoices, purchase orders, stock certificates and many other business papers • Systems manuals for computer accounting software should provide sufficient information to make the accounting functions clear • Passwords that allow only authorized people admittance to the computer software on line
  • 34. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.34 Physical Controls • Physical controls are procedures to ensure the physical security of assets. • Only individuals who are properly authorized should be allowed access to the company’s assets. • Direct physical access to assets may be controlled through physical precautions
  • 35. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.35 Segregation of Duties Segregation of duties entail three fundamental functions which must be separated and adequately supervised:  authorization  recording  custody
  • 36. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.36 Monitoring of Controls Monitoring is assessing the design of controls and their operation on a timely basis and taking necessary corrective actions. Ongoing monitoring information comes from several sources: exception reporting on control activities, reports by government regulators, feedback from employees, complaints from customers, and most importantly from internal auditor reports.
  • 37. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.37 Evaluation of Monitoring When evaluating the ongoing monitoring the following issues might be considered:  Periodic comparisons of amounts recorded with the accounting system and with physical assets.  Responsiveness to internal and external auditor recommendations to strengthen internal controls.  Extent to which training seminars, planning sessions and other meetings provide information on effective operation of controls.  Effectiveness of internal audit activities  Extent to which personnel obtain evidence on internal control function
  • 38. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.38 Hard and Soft Control Management designs and sets in place a set of rules, physical constraints and activities called “internal controls”. Due to the explicit, formal and tangible character of these controls, these controls are generally referred to as hard controls. Soft controls are the intangible factors in an organization that influence the behavior of managers and employees. Whereas soft controls are founded in the culture or climate of an organization, the hard- controls are more explicit, formal and visible.
  • 39. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.39 Seven factors influence the way people examine their control activities 1. Clarity for directors, managers and employees as to what constitutes desirable and undesirable behavior 2. Role-modeling among administrators, management or immediate supervisors 3. Achievability of goals, tasks and responsibilities set 4. Commitment in the organization 5. Transparency of behavior 6. Openness to discussion of viewpoints, emotions, dilemmas and transgressions 7. Enforcement of behavior, such as appreciation desirable behavior, sanctioning of undesirable behavior
  • 40. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.40 Design and Implementation of Internal Control  Evaluating the design of a control involves considering whether the control, individually or in combination with other controls, is capable of effectively preventing, or detecting and correcting, material misstatements.  Implementation of a control means that the control exists and that the entity is using it.  There is little point in assessing the implementation of a control that is not effective, and so the design of a control is considered first. An improperly designed control may represent a significant deficiency in internal control.
  • 41. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.41 Methods for Obtaining Controls Audit Evidence Risk assessment procedures to obtain audit evidence about the design and implementation of relevant controls may include: (1) Inquiring of entity personnel. (2) Observing and re-performing the application of a specific control. (3) Inspecting documents and reports, (4) Tracing transactions through the information system
  • 42. [Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.42 Thank You for Your Attention Any Questions?

Editor's Notes

  • #2: Last Updated 13 October 2012 International Auditing and Assurance Standards Board (IAASB). 2012. Handbook of International Quality Control, Auditing Review, Other Assurance, and Related Services Pronouncements, 2012 Edition, Volume 1 AND Volume 2. International Federation of Accountants. New York ISA 400 Risk Assessments and Internal Control, ISA 401 Auditing in a Computer Information Systems Environment, ISA 402 Audit Considerations Relating to Entities Using Service Organizations, 1008 Risk Assessments and Internal Control CIS Characteristics and Considerations; AU: AU 319 (SAS 55, 78) Consideration of Internal Control in a Financial Statement Audit, AU 325 (SAS 60) The Communication of Internal Control Related Matters Noted in an Audit COSO report on Small Business. Modifications to Chapter 7: COSO report on small business controls. 10% revision
  • #3: Page 230 - 231 This definition reflects certain fundamental concepts: • Internal control is a 'process'. Internal control is not one event or circumstance, but a series of actions that permeate an entity's activities. These actions are persuasive and are inherent in the way management runs the business. • Internal control is effected by people. A board of directors, management and other personnel in an entity effects internal control. The people of an organization accomplish it, by what they do and say. People establish the entity's objectives and put control mechanisms in place. • Internal control can be expected to provide only reasonable assurance, not absolute assurance, to an entity's management and board that the company's objectives are achieved. The likelihood of achievement is affected by limitations inherent in all internal control systems. These limitations include the realities that human judgment can be faulty, breakdowns may occur because of human failures such as simple error and controls may be circumvented by collusion [i] of two or more people. Finally, management has the ability to override the internal control system. • [i] Collusion is the act of two or more employees to steal assets or misstate records.  
  • #4: *Internal control— The process designed, implemented and maintained by those charged with governance, management and other personnel to provide reasonable assurance about the achievement of an entity’s objectives with regard to reliability of financial reporting, effectiveness and efficiency of operations, and compliance with applicable laws and regulations. The term “controls” refers to any aspects of one or more of the components of internal control.
  • #5: Page 231
  • #7: 5.  The auditor should use the same suitable, recognized control framework to perform his or her audit of internal control over financial reporting as management uses for its annual evaluation of the effectiveness of the company's internal control over financial reporting. (Footnote 7) Securities Exchange Act Rules 13a-15(c) and 15d-15(c), 17 C.F.R. §§ 240.13a-15(c) and 240.15d-15(c). SEC rules require management to base its evaluation of the effectiveness of the company's internal control over financial reporting on a suitable, recognized control framework (also known as control criteria) established by a body or group that followed due-process procedures, including the broad distribution of the framework for public comment. For example, the report of the Committee of Sponsoring Organizations of the Treadway Commission (known as the COSO report) provides such a framework, as does the report published by the Financial Reporting Council, Internal Control Revised Guidance for Directors on the Combined Code, October 2005 (known as the Turnbull Report).
  • #8: Page 233 CLASS QUESTION: Why are financial reporting controls important to the auditor? Financial Reporting: Why internal control matters to the auditor is quite obvious. If the auditor is able to assess the quality of accounting and internal control systems and to verify their proper operation throughout the year under audit, the auditor might be able to rely heavily on these systems for sufficient audit evidence. Emphasis by auditors is placed on understanding controls over classes of transactions rather than account balances or disclosures. The reason is that the accuracy of the output of the accounting system (account balances) is dependent upon the accuracy of the inputs and processing (transactions). If, for example, controls are adequate to ensure all billings, cash receipts, charge-offs and returns and allowances are correct, then the ending balance in accounts receivable is likely to be correct. Disclosures are generally dependent on the account balances. Examples of the laws requiring 'proper record-keeping systems' or proper accounting records' are the Foreign Corrupt Practices Act of 1977 in the US and the UK Companies Act 1985.
  • #9: Pages 233-234 The auditor's primary consideration is whether, and how, a specific control prevents, or detects and corrects, material misstatements in classes of transactions, account balances or disclosures. The heaviest emphasis by auditors is on controls over classes of transactions rather than account balances or disclosures. The reason is that the accuracy of the output of the accounting system (account balances) is heavily dependent upon the accuracy of the inputs and processing (transactions). If, for example, controls are adequate to ensure all billings, cash receipts, charge-offs and returns and allowances are correct, the ending balance in accounts receivable is likely to be correct. Disclosures are generally dependent on the account balances *Material—Information is material if its omission or misstatement could influence the economic decisions of users taken on the basis of the financial statements.  *Misstatement—A difference between the amount, classification, presentation, or disclosure of a reported financial statement item and the amount, classification, presentation, or disclosure that is required for the item to be in accordance with the applicable financial reporting framework. Misstatements can arise from error or fraud. Where the auditor expresses an opinion on whether the financial statements are presented fairly, in all material respects, or give a true and fair view, misstatements also include those adjustments of amounts, classifications, presentation, or disclosures that, in the auditor’s judgment, are necessary for the financial statements to be presented fairly, in all material respects, or to give a true and fair view.  * Classes of transactions are groups of accounting entries in an accounting cycle of transactions such as the revenue cycle, expenditure cycle, production cycle, or personnel cycle or any sub-categories of those cycles.
  • #10: Page 234
  • #12: General IT controls are policies and procedures that relate to many applications and support the effective functioning of application controls by helping to ensure the continued proper operation of information systems. General IT controls commonly include controls over data center and network operations; system software acquisition, change and maintenance; access security; back-up and recovery; and application system acquisition, development, and maintenance. A good example of a general control in accounting software is an error message if there is a problem in using the operating system (e.g. “Please insert a CD-ROM in Drive E”).
  • #13: Application controls are controls that apply to applications that initiate, record, process, and report transactions (such as MS Office, SAP, QuickBooks), rather than the computer system in general. In manual systems, general controls are controls over proper authorization of transactions and activities. Examples of application controls are edit checks of input data, numerical sequence checks, and manual follow-up of exception reports. In manual systems applications controls may be referred to as adequate document and record controls.
  • #14: Reliance on systems or programs that are inaccurately processing data, processing inaccurate data, or both. For instance, individuals may inappropriately override such automated processes, by changing the amounts being automatically passed to the general ledger or to the financial reporting system. Furthermore, where IT is used to transfer information automatically, there may be little or no visible evidence of such intervention in the information systems. Unauthorized access to data that may result in destruction of data or improper changes to data, including the recording of unauthorized or non-existent transactions or inaccurate recording of transactions. Particular risks may arise where multiple users access a common database. The possibility of IT personnel gaining access privileges beyond those necessary to perform their assigned duties thereby breaking down segregation of duties. A frequent problem in audits of small to medium sized businesses is that there is only one IT employee and he has unlimited access to all computer systems hardware and software, all security systems and all back-ups. A response to this risk is to have someone periodically review the security and access logs to monitor the IT employee’s activity. Unauthorized changes to data in master files. Unauthorized changes to systems or programs. Failure to make necessary changes to systems or programs. Inappropriate manual intervention. Potential loss of data or inability to access data as required Management’s failure to commit sufficient resources to address IT security risks may adversely affect internal control by allowing improper changes to be made to computer programs or to data, or unauthorized transactions to be processed. Inconsistencies between the entity’s IT strategy and its business strategies. Changes in the IT environment.
  • #15: Pages 235 – 236, Illustration 7.2 Components of Internal Control Structure, page 236 Components based on COSO framework, PCAOB Audit Standard #5 requires that internal control be based on some framework – they suggest the COSO or Turnbull PCAOB AS 5
  • #16: Illustration 7.1 Components of Internal Control – COSO Report, page 232
  • #17: Pges 236 – 245 Handbook Glossary Control environment—Includes the governance and management functions and the attitudes, awareness and actions of those charged with governance and management concerning the entity’s internal control and its importance in the entity. The control environment is a component of internal control.
  • #19: Page 237 Illustration 7.4 Factors on Which to Assess Internal Control Environment, page 244; Illustration 7.3 Organizational Chart Segregation Of Duties And Assignment Of Authority And Responsibility, page 241 ISA 315 “Identifying And Assessing The Risks Of Material Misstatement Through Understanding The Entity And Its Environment”. A70. Elements of the control environment that may be relevant when obtaining an understanding of the control environment include the following: (a) Communication and enforcement of integrity and ethical values – These are essential elements that influence the effectiveness of the design, administration and monitoring of controls. (b) Commitment to competence – Matters such as management’s consideration of the competence levels for particular jobs and how those levels translate into requisite skills and knowledge. (c) Participation by those charged with governance – Attributes of those charged with governance such as: • Their independence from management. • Their experience and stature. • The extent of their involvement and the information they receive, and the scrutiny of activities. • The appropriateness of their actions, including the degree to which difficult questions are raised and pursued with management, and their interaction with internal and external auditors. (d) Management’s philosophy and operating style – Characteristics such as management’s: • Approach to taking and managing business risks. • Attitudes and actions toward financial reporting. • Attitudes toward information processing and accounting functions and personnel. (e) Organizational structure – The framework within which an entity’s activities for achieving its objectives are planned, executed, controlled, and reviewed. (f) Assignment of authority and responsibility – Matters such as how authority and responsibility for operating activities are assigned and how reporting relationships and authorization hierarchies are established. (g) Human resource policies and practices – Policies and practices that relate to, for example, recruitment, orientation, training, evaluation, counselling, promotion, compensation, and remedial actions.
  • #24: Pages 245 – 247, Illustration 7.5 Risk Assessment Blank Evaluation Tool, page 246 Handbook Glossary *Risk assessment procedures—The audit procedures performed to obtain an understanding of the entity and its environment, including the entity’s internal control, to identify and assess the risks of material misstatement, whether due to fraud or error, at the financial statement and assertion levels. ISA 315 A79. The entity’s risk assessment process forms the basis for how management determines the risks to be managed. If that process is appropriate to the circumstances, including the nature, size and complexity of the entity, it assists the auditor in identifying risks of material misstatement. Whether the entity’s risk assessment process is appropriate to the circumstances is a matter of judgment.
  • #25: CLASS QUESTION: Can someone give me an example of how they would evaluate the risk of a business using these steps? Pick a business and follow these steps. Page 245 ISA 315 A67. Risk assessment procedures to obtain audit evidence about the design and implementation of relevant controls may include: • Inquiring of entity personnel. • Observing the application of specific controls. • Inspecting documents and reports. • Tracing transactions through the information system relevant to financial reporting. Inquiry alone, however, is not sufficient for such purposes.
  • #28: CLASS QUESTION: What would be risks to inputting this data and what control would you put in place to mitigate that risk?
  • #30: Pages 251 – 255 ISA 315 A88. Control activities are the policies and procedures that help ensure that management directives are carried out. Control activities, whether within IT or manual systems, have various objectives and are applied at various organizational and functional levels. Proper Authorization of Transactions and Activities. Appropriate delegation of authority sets limits on what levels of risk are acceptable. Authorization may be general or specific. General controls such as computer User ID, password, building entry codes and keys, alarm codes, cashier controls, computer back-up and recovery Performance Reviews. These reviews include reviews individual performance, of actual performance versus budgets; surprise checks of procedures; periodic comparisons of accounting records and physical assets; and a review of functional or activity performance. Information Processing, Adequate Documentation. Documents and records must be accurate and adequate to provide reasonable assurance that all assets are properly controlled and all transactions correctly recorded. Documents are prepared at the time the transaction takes place Application controls include use of serial numbers on documents and input transactions, systems manuals, personnel manuals, and passwords for special applications software (like personnel or accounting systems). Physical Controls. Only individuals who are properly authorized should be allowed access to the company’s assets. Doors, locks, security systems, safes, etc. Segregation of duties responsibilities for Authorizing transactions, Recording them and handling the related assets (called ‘Custody of assets’) are kept seperate.
  • #31: General IT controls assure that access to the computer system is limited to people who have a right to the information. Appropriate delegation of authority sets limits on what levels of risk are acceptable and these limits determine the discretion of the employees delegated to authorize the main types of business transactions. Authorization may be general or specific. Computer facilities may have several types of controls. Access controls are general or application controls such as passwords that allow only authorized people admittance to the computer software on line. A very important general control is back-up and recovery procedures, as anyone who has had a system go down without current records being adequately backed up will tell you. Physical controls such as locks on the doors to the computer room and locked cabinets for software and back-up tapes protect the tangible components of a computer system.
  • #32: ISA 315 Addendix I 9. Generally, control activities that may be relevant to an audit may be categorized as policies and procedures that pertain to the following: • Performance reviews. These control activities include reviews and analyses of actual performance versus budgets, forecasts, and prior period performance; relating different sets of data – operating or financial – to one another, together with analyses of the relationships and investigative and corrective actions; comparing internal data with external sources of information; and review of functional or activity performance.
  • #33: These records must be adequate to provide good assurance that all assets are properly controlled and all transactions correctly recorded. Well-designed documents in a manual system and preformatted input screens in a computer system should be: pre-numbered consecutively, prepared at the time a transaction takes place, simple enough to be clearly understood, designed for multiple use to minimize the number of different forms, and constructed in a manner that encourages correct preparation.
  • #36: Pages 253 –255. Illustration 7.7 Overview of Segregation of Duties, 254 The authorization of a transaction and the handling of the related asset by the same person increase the possibility of defalcation within the organization.
  • #37: Page 256 –259 Management’s monitoring activities may include using information from communications from external parties such as customer complaints and regulator comments that may indicate problems or highlight areas in need of improvement. Two more examples of monitoring activities are management’s review of bank reconciliations, and an internal auditors’ evaluation of sales personnel’s compliance with the company’s human resource policies. ISA 315 Components of Internal Control—Monitoring of Controls (Ref: Para. 22) A98. Monitoring of controls is a process to assess the effectiveness of internal control performance over time. It involves assessing the effectiveness of controls on a timely basis and taking necessary remedial actions. Management accomplishes monitoring of controls through ongoing activities, separate evaluations, or a combination of the two. Ongoing monitoring activities are often built into the normal recurring activities of an entity and include regular management and supervisory activities. A99. Management’s monitoring activities may include using information from communications from external parties such as customer complaints and regulator comments that may indicate problems or highlight areas in need of improvement.
  • #38: Overall Internal Control Evaluation Tool Illustration 7.8
  • #40: 1. Clarity for directors, managers and employees as to what constitutes desirable and undesirable behavior: the clearer the expectations, the better people know; what they must do, how to perform the control and the more likely they are to act on it. 2. Role-modeling among administrators, management or immediate supervisors: the better the examples given in an organization, the better people behave, while the worse the example, the worse the behavior. 3. Achievability of goals, tasks and responsibilities set: the better equipped people in an organization are, the better they are able to execute the control activities that are expected from them. 4. Commitment on the part of directors, managers and employees in the organization: the more the organization treats its people with respect and involves them in the organization, the more these people will try to serve the interests of the organization and reach the internal control objectives. 5. Transparency of behavior: the better people observe their own and others’ behavior, and its effects, the more they take this into account and the better they are able to control and adjust their behavior to the expectations of others. 6. Openness to discussion of viewpoints, emotions, dilemmas and transgressions: the lower the bar for people within the organization to talk about moral or ethical issues regarding internal control, the more they will be likely to do this, and the more they will learn from one another. 7. Enforcement of behavior, such as appreciation or even reward for desirable behavior, sanctioning of undesirable behavior and the extent to which people learn from mistakes, near misses, incidents, and accidents: the better the enforcement, the more people tend towards what will be rewarded and avoid what will be punished.
  • #41: Pages 259 –261 ISA 315 Nature and Extent of the Understanding of Relevant Controls 13. When obtaining an understanding of controls that are relevant to the audit, the auditor shall evaluate the design of those controls and determine whether they have been implemented, by performing procedures in addition to inquiry of the entity’s personnel. (Ref: Para. A66–A68) A66. Evaluating the design of a control involves considering whether the control, individually or in combination with other controls, is capable of effectively preventing, or detecting and correcting, material misstatements. Implementation of a control means that the control exists and that the entity is using it. There is little point in assessing the implementation of a control that is not effective, and so the design of a control is considered first. An improperly designed control may represent a significant deficiency in internal control. A68. Obtaining an understanding of an entity’s controls is not sufficient to test their operating effectiveness, unless there is some automation that provides for theconsistent operation of the controls. For example, obtaining audit evidence about the implementation of a manual control at a point in time does not provide audit evidence about the operating effectiveness of the control at other times during the period under audit. However, because of the inherent consistency of IT processing (see paragraph A55), performing audit procedures to determine whether an automated control has been implemented may serve as a test of that control’s operating effectiveness, depending on the auditor’s assessment and testing of controls such as those over program changes. Tests of the operating effectiveness of controls are further described in ISA 330.  
  • #42: Page 260 ISA 315 A67. Risk assessment procedures to obtain audit evidence about the design and implementation of relevant controls may include: • Inquiring of entity personnel. • Observing the application of specific controls. • Inspecting documents and reports. • Tracing transactions through the information system relevant to financial reporting. Inquiry alone, however, is not sufficient for such purposes. (1) Inquiring of entity personnel. Inquiries directed toward internal audit personnel may relate to their activities concerning the design and effectiveness of the entity’s internal control. Ordinarily, only inquiring of entity personnel will not be sufficient to evaluate the design of a control or to determine whether a control has been implemented. (2) Observing and reperforming the application of a specific control. The auditors may observe the application of the control or reperform the application themselves. (3) Inspecting documents and reports, and (4) Tracing transactions through the information system relevant to financial reporting. [i] IAASB. 2003. International Standard on Auditing 315 (ISA 315). “Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement”. Para. 55. International Federation of Accountants. New York. October.