Internal Control Notes
Internal Control Notes
MODIFYING PRINCIPLES:
Types of risk
Destruction of assets
Theft of assets
Corruption of information or the I.S.
Disruption of the I.S.
HISTORY OF INTERNAL CONTROL
I. SEC ACT OF 1933 AND 1934
SEC Act of 1933
Objectives:
1. Require that investors receive financial & other significant information
concerning securities being offered for sale
2. Prohibit deceit, misrepresentations and other fraud in the sale of securities
SEC Act of 1934
Created and empowered the Securities & Exchange Commission (SEC) with
broad authority
Required publicly traded companies to be audited by an independent auditor
COSO INTERNAL
CONTROL FRAMEWORK
I. CONTROL ENVIRONMENT
Sets the tone for the organization & influences the control
awareness of the management and employees
IV. MONITORING
- The process by which the quality of internal control
design and operation can be assessed
Separate procedures
Ongoing activities (Embedded Audit Modules –
EAMs and Continuous Online Auditing - COA)
COSO INTERNAL CONTROL
FRAMEWORK CONTINUATION
V. CONTROL ACTIVITIES
- policies and procedures used to ensure that
appropriate actions are taken to deal with the
organization’s identified risks
- grouped into two: Physical Controls & Information
Technology (IT) Controls
PHYSICAL CONTROLS
1. Transaction Authorization
Ensure that all material transactions processed by
the information system are valid and in accordance
w/ management’s objectives
May be general or specific
2. Segregation of Duties
Minimize incompatible functions
Objectives:
Authorization <- separate -> Processing
Asset custody responsibility <- separate -> record
keeping responsibility
Segregation of incompatible tasks
3. Supervision
serves as compensating control when lack of
segregation of duties exists by necessity
COSO INTERNAL CONTROL
FRAMEWORK CONTINUATION
V. CONTROL ACTIVITIES
PHYSICAL CONTROLS
4. Accounting Records
Source documents, journals and ledgers
Capture the economic essence of transactions and
provide an audit trail of economic events
5. Access Control
Ensure that only authorized personnel have
access to the firm’s assets
Direct access -> physical security devices
(locks, safes, fences, alarm system)
Indirect Access -> controlling the use of
documents and records and segregating duties
of who can access the records
6. Independent Verification
Independent checks of the accounting system to
identify errors and misrepresentations
Management can assess:
The performance of individuals
The integrity of the AIS
The integrity of the data in the records
COSO INTERNAL CONTROL
FRAMEWORK CONTINUATION
V. CONTROL ACTIVITIES
IT (INFORMATION
TECHNOLOGY) CONTROLS
Drives the financial reporting processes of
modern organizations
Two groupings: Application Controls and
General Controls
Applications General
controls Controls
Not application-
Ensure validity, specific, i.e. apply to
completeness, all systems
and accuracy
Include controls over:
of financial IT governance
transactions IT infrastructure
Security and access
to operating systems
and databases
Application acquisition
and development
Program change
procedures