09 Understanding The Entity's Internal Control
09 Understanding The Entity's Internal Control
In the control environment, the entity’s risk assessment process and the entity’s
process to monitor the system of internal control components, the controls are primarily
indirect controls (although there may be some direct controls, these are likely less in
these components). Indirect controls are controls that support direct controls.
C. Specific Consideration
The auditor shall obtain an understanding of the COMPONENTS relevant to the preparation
of the financial statements AND evaluate these components through performing risk
assessment procedures.
UNDERSTAND EVALUATE
(a) Understanding the set of controls, processes and structures and
that address:
(b) Evaluating whether:
(i) How management’s oversight responsibilities are carried out,
such as the entity’s culture and (i) Management, with the oversight of
management’s commitment to integrity and ethical values; those charged with governance, has
created and maintained a culture
(ii) When those charged with governance are separate from of honesty and ethical behavior;
management, the independence of, and
oversight over the entity’s system of internal control by, (ii) The control environment provides an
those charged with governance; appropriate foundation for the other
components of the entity’s system of
(iii) The entity’s assignment of authority and responsibility; internal control, considering the
nature and complexity of the entity;
(iv) How the entity attracts, develops, and retains competent and
individuals; and
(iii) Control deficiencies identified in the
(v) How the entity holds individuals accountable for their control environment undermine the
responsibilities in the pursuit of the objectives of the system other components of the entity’s
of internal control, system of internal control.
UNDERSTAND EVALUATE
(i) Identifying business risks relevant to financial reporting (b) Evaluating whether the entity’s risk
objectives; assessment process is appropriate to
the entity’s circumstances considering
(ii) Assessing the significance of those risks, including the the nature and complexity of the
likelihood of their occurrence; and entity.
MONITORING PROCESS
UNDERSTAND EVALUATE
(a) Understanding those aspects of the entity’s process that and
address:
(b) Evaluating whether the entity’s
(i) Ongoing and separate evaluations for monitoring the process for monitoring the system of
effectiveness of controls, and the identification and remediation internal control is appropriate to the
of control deficiencies identified; entity’s circumstances considering
the nature and complexity of the
(ii) The entity’s internal audit function, if any, including its entity.
nature, responsibilities and activities;
UNDERSTAND EVALUATE
(iii) The financial reporting process used to prepare the entity’s FS,
including disclosures; and
General information technology (IT) controls – Controls over the entity’s IT processes that
support the continued proper operation of the IT environment, including the continued effective
functioning of information processing controls and the integrity of information (i.e., the completeness,
accuracy and validity of information) in the entity’s information system. Also see the definition of IT
environment.
Information processing controls – Controls relating to the processing of information in IT
applications or manual information processes in the entity’s information system that directly address
risks to the integrity of information (i.e., the completeness, accuracy and validity of transactions and
other information).
IT environment – The IT applications and supporting IT infrastructure, as well as the IT processes and personnel
involved in those processes, that an entity uses to support business operations and achieve business strategies.
For the purposes of this ISA:
(i) An IT application is a program or a set of programs that is used in the initiation, processing, recording
and reporting of transactions or information. IT applications include data warehouses and report writers.
(ii) The IT infrastructure comprises the network, operating systems, and databases and their related
hardware and software.
(iii) The IT processes are the entity’s processes to manage access to the IT environment, manage program
changes or changes to the IT environment and manage IT operations.
UNDERSTAND EVALUATE
(i) The related risks arising from the use of IT; and
D. Control Deficiencies
Based on the auditor’s evaluation of each of the components of the entity’s system of internal
control, the auditor shall determine whether one or more control deficiencies have been
identified.
E. Assessing Control Risk
A. If the auditor plans to test the operating effectiveness of controls, the auditor shall assess
control risk.
B. If the auditor does not plan to test the operating effectiveness of controls, the auditor’s
assessment of control risk shall be such that the assessment of the RMM is the same as the
assessment of inherent risk.
F. Documentation
The auditor shall include in the audit documentation the evaluation of the design of identified
controls, and determination whether such controls have been implemented.
G. Limitations of Internal Control
No matter how well designed and operated, IC can provide an entity with only reasonable
assurance about achieving the entity’s financial reporting objectives.
• human judgment in decision making
• breakdowns in internal control
• errors or mistakes
• collusion
Design, implementation, and monitoring of internal control varies depending on the entity’s
size and complexity of the processes.
3. Internal control can only provide reasonable, not absolute, assurance of achieving entity control
objectives. Which of the following is a limiting factor of achieving those objectives?
I. In the performance of most control procedures, there are possibilities of errors arising from
mistakes in judgment.
II. The board of directors is active and independent.
III. The cost of internal control should not exceed its benefits.
IV. Collusion may occur even if incompatible functions or duties have been segregated.
A. I and III only B. I, II and III only C. I, III and IV only D. I, II, III and IV
5. Which of the following is not useful for obtaining an understanding of internal controls?
A. Observe client activities and operations C. Make inquiries of the client’s personnel
B. Examine documents and records D. Read industry trade magazines
7. The 5 components of the system of internal control have been split into two types that align with the
nature of the controls within each component, and may affect the auditor’s identification and assessment
of risks of material misstatement, as well as responding to the assessed risks. Which among these
components have controls that are primarily indirect controls?
I. Control environment
II. The entity’s risk assessment process
III. The entity’s process to monitor the system of internal control
IV. The information system and communication
V. Control activities.
A. I, II,III
B. I, IIII
C. IV,IV
D. II, IV, V
8. S1 The control environment does not directly prevent, or detect and correct, misstatements.
S2 Control environment may provide an appropriate foundation for the system of internal control
and may help reduce the risk of fraud, an appropriate control environment is not necessarily
an effective deterrent to fraud.
A. False, True
B. True, False
C. True, True
D. False, False
13. Risks can arise or change due to circumstances such as the following, except:
A. There is a change in the regulatory or operating environment.
B. No new employees have been hired by the company.
C. The company switched from manual information systems to a computerized system.
D. The accounting and financial reporting framework has experienced significant revisions.
14. Which of the following pertains to risk assessment?
I. An audit client’s process for identifying business risks relevant to the financial reporting
objective
II. Business procedures, within both IT and manual systems, by which those transactions are
initiated, recorded, processed, corrected, transferred to the general ledger and reported
in the financial statements
III. Client policies on limiting physical access to assets and records
A. I and III only B. I only C.II and III only D.I, II and III
16. Control activities are the policies and procedures that help ensure that management directives are
carried out. These include activities relating to authorization, performance reviews, information
processing, physical controls and segregation of duties. There is proper segregation of duties when
an individual who
A. Authorizes a transaction records it.
B. Authorizes a transaction maintains custody of the asset that resulted from the transaction.
C. Records a transaction do not compare the accounting record of the asset with the asset itself.
D. Maintains custody of an asset has access to the accounting records for the asset.
22. A control that reduces the risk that an existing or potential control weakness will result in a failure
to meet a control objective is referred toas:
A. Compensating control C. Conditional control
B. Non-routine control D. Offset control
23. Which of the following is (are) a correct statement(s) for internal control systems of small
companies?
I. Elements of internal control for small entities may not be available in documentary form
II. Segregation of incompatible duties are often inadequate due to staff limitations
III. The involvement of the owner-manager may be a compensatory control for the inadequate
segregation of incompatible duties
24. According to PSA315, the auditor uses the understanding of internal control to:
I. Identify types of potential misstatements
II. Consider factors that affect the risk of material misstatements
III. Design the nature, timing and extent of further audit procedures (i.e., tests of controls and
substantive tests)
- END -