Chapter 3 Internal Controls
Chapter 3 Internal Controls
• Safeguarding of assets
Reliability of Financial
a. Accuracy:
Reporting
Information in financial statements should be free from material misstatements and errors.
b. Completeness:
All relevant financial information should be disclosed to present a comprehensive view of the
organization’s financial situation.
c. Neutrality:
Financial reporting should be free from bias or any attempts to manipulate information to favor
certain interests (investors vs. creditors).
d. Transparency:
Disclosure should be clear, comprehensive, and understandable, providing sufficient
information for users to make informed decisions.
e. Consistency:
Accounting policies and practices should be applied consistently from one reporting period to
another, facilitating comparability.
Efficiency and Effectiveness of
Efficiency:
Operation
Internal controls can help an organization achieve its goals using the least amount of
resources possible.
Efficient processes reduce waste, prevent errors, and save time.
For instance, automation of certain processes such as data entry, invoicing, and
reconciliation can reduce manual errors and save employee time, thus improving
operational efficiency.
Effectiveness:
Effectiveness refers to the ability of the organization to meet its objectives.
Internal controls can help ensure that the business operations effectively achieve the
intended results.
The efficiency and effectiveness of operations are typically measured through:
Financial performance metrics like revenue, cost control, and profitability.
Non-financial metrics such as customer satisfaction, market share, and operational quality.
Compliance with Laws and
• EnsuresRegulations
that a business operates within the legal framework, thereby minimizing
the risk of:
• Lawsuits
• Penalties
• Damage to its reputation
• Internal control mechanisms focused on compliance can take many forms, and
their precise nature will depend on:
• The company’s industry
• The countries in which it operates
• The specific laws and regulations it must adhere to
• Training, monitoring systems, reporting mechanisms, and a compliance
officer/department play a crucial role in ensuring compliance.
Safeguarding of
Involves procedures and measures designed to prevent theft, fraud, misuse, or damage
to a company's assets. Assets
• Assets include not only tangible assets like cash, inventory, equipment, and property
but also intangible assets such as intellectual property, trade secrets, and
company reputation.
1. Physical Controls:
1. This involves physical security measures to protect tangible assets.
2. For example:
1. Cash may be stored in a safe.
2. Warehouses may have security cameras or guards.
3. Access to valuable equipment may be restricted to authorized personnel only.
2. Authorization Controls:
1. Important transactions that could affect the company’s assets should require approval from a
higher-level manager or multiple individuals.
2. For example, large purchases might need to be approved by a senior manager.
Which of the following is the auditor's primary concern regarding the management’s
B- Efficiency of operations
D- Effectiveness of operations
Management and Auditor Responsibilities for
Internal Control
• Management, not the auditor, must establish and maintain the
entity’s internal
controls.
• Risk assessment
• Involves a process for identifying and analyzing risks that may
prevent the organization from achieving its objectives.
• Control activities
• Policies and procedures that help ensure that necessary actions
are taken to address risks to the achievement of the entity’s
objectives.
COSO Components of Internal
Control
• Information and communication
• To initiate, record, process, and report the entity’s
transactions and to maintain accountability for the related
assets.
• Monitoring
• Deal with ongoing or periodic assessment of the quality of
internal control by management to determine that controls are
operating as intended and that they are modified as
appropriate for changes in conditions.
Five Components of Internal
Control
• What are the five components of internal control in
the COSO internal
control framework?
Physical and online security Access to hardware is restricted, passwords and user IDs
limit access to software and data files, and
encryption and firewalls protect data and programs
from external parties.
Backup and contingency Written backup plans are prepared and tested regularly
planning throughout the year.
Hardware controls Memory failure or hard-drive failure causes error
messages on the monitor.
Categories of General and
Application Controls
Control Type Category of Control Example of Control
Application Input controls Preformatted screens prompt data input personnel for
controls information to be entered.
Processing controls Reasonableness tests review unit-selling prices used to
process a sale.
Output controls The sales department does postprocessing review of
sales transactions.
Segregation of IT Duties
Impact of IT Infrastructure on
Internal Control
• The accounting function’s use of complex IT networks, databases,
the Internet, cloud computing, and centralized IT functions is
now commonplace.
• The types of internal controls will vary based on the type and
complexity of
the IT system
Impact of IT Infrastructure on
Internal Control
Types of information technology systems include:
• Local area networks (LANs)
• Wide area networks (WANs)
• Database management systems
• Enterprise resource planning (ERP)
systems
Impact of IT Infrastructure on Internal
Control
• Companies use firewalls, encryption techniques, and digital
signatures to limit risks and to increase IT security.
5. Network Management:
Role: Maintains network infrastructure, such as routers, switches, and firewalls, ensuring secure and
efficient connectivity.
Segregation: Network managers should focus only on network-related tasks and should not have access
to applications, databases, or sensitive data that they are not responsible for.
6. Database Administration:
Role: Manages databases, ensuring data storage, backup, and retrieval functions are running smoothly.
Segregation: Database administrators should not be responsible for developing the application or
managing network infrastructure. Their role is confined to managing data storage and retrieval.
Who is responsible for controlling the use of computer programs, transaction
files, and other records and releasing them to operators only when authorized?
The options provided are:
A) The data control operator
B) The chief computer operator
C) The librarian
D) The software engineer
Why librarian? In the context of information technology controls and auditing, a
"librarian" typically refers to someone responsible for managing and
safeguarding important IT resources such as computer programs, files, and
documentation. They ensure that these resources are released to authorized
personnel, which aligns with the responsibilities described in the question.
Let’s Discuss
• Explain how the effectiveness of general controls impacts the
effectiveness
of automated application controls.
• Compare the risks associated with network systems and database
systems to those associated with centralized IT functions.
Explain how the effectiveness of general controls
impacts the effectiveness of automated
application
General controls controls.
provide the secure and well-maintained environment that
automated application controls rely upon to function properly. When
general controls are strong, they ensure that the automated application
controls can operate in a secure, accurate, and available environment,
enhancing their effectiveness in safeguarding organizational processes.
Conversely, weak general controls undermine the reliability and security of
automated controls, leaving the organization vulnerable to risks such as
unauthorized access, data corruption, and system failures.
Explain how the effectiveness of general controls
impacts the effectiveness of automated application
controls.
1. Security and Access Control
General Controls: These are overarching policies and procedures that govern access to the IT
environment. Examples include password policies, user access rights, encryption, and firewalls.
Impact on Automated Application Controls: If general controls are weak, unauthorized users may gain
access to systems, potentially overriding or tampering with automated application controls. Effective
general controls ensure that only authorized individuals can access critical applications, safeguarding
automated processes from manipulation or unauthorized changes.
2. System Integrity
General Controls: These include system development controls, change management, and backup
procedures to ensure that the IT infrastructure functions as intended and is safeguarded against crashes,
malfunctions, or unauthorized alterations.
Impact on Automated Application Controls: Automated controls rely on the underlying IT infrastructure.
If general controls are weak (e.g., poor change management, no proper backups), the system’s integrity
can be compromised, leading to failures in automated controls. A system crash or incorrect data input
could render application controls ineffective or cause them to function incorrectly.
Explain how the effectiveness of general controls impacts the effectiveness of
automated application controls.
3. Data Integrity
General Controls: These include controls over data entry, processing, and storage, ensuring that only valid,
accurate, and authorized data is processed within the system.
Impact on Automated Application Controls: Automated controls are only as reliable as the data they
process. If general controls fail to ensure data accuracy (e.g., incorrect or unauthorized updates to master
files), the automated application controls could produce incorrect outputs or fail to detect fraudulent
activities. Strong general controls ensure the integrity of data, making sure the automated controls operate
on accurate and authorized data.
4. Change Management
General Controls: Controls that govern how changes to the IT environment are authorized, tested, and
implemented.
Impact on Automated Application Controls: Automated controls depend on stable application
environments. Without robust change management, untested or unauthorized changes to systems can
disrupt or disable automated controls. Proper change management ensures that updates or system
modifications are done carefully, maintaining the effectiveness of automated controls.
Explain how the effectiveness of general controls
impacts the effectiveness of automated application
controls.
5. System Availability and Continuity
General Controls: This includes business continuity planning, disaster recovery, and system maintenance to
ensure the IT infrastructure is always available.
Impact on Automated Application Controls: Automated controls require continuous system availability to
function. If general controls such as disaster recovery plans or system maintenance procedures are
ineffective, system outages or disruptions can cause automated controls to fail, leading to missed
transactions, errors, or an inability to enforce critical control mechanisms.
6. Audit Trails and Monitoring
General Controls: These include mechanisms to track system usage, changes, and incidents, as well as
auditing protocols.
Impact on Automated Application Controls: Effective monitoring and audit trails enable organizations to
detect when automated controls fail or when there are anomalies in the control processes. Without robust
monitoring (a general control), failures in automated application controls may go undetected, leading to an
increased risk of errors or fraud.
Compare the risks associated with network systems and database systems to those associated with
centralized IT functions.
Network Systems are exposed to external threats and rely on continuous protection against hacking, unauthorized
access, and malware, whereas centralized IT systems face a greater risk of being a single point of failure. Network
systems require consistent attention to perimeter security (firewalls, IDS, encryption), while centralized systems
require effective failover and backup strategies to prevent widespread impact from failure.
Database Systems hold sensitive and structured data, and risks include data breaches, unauthorized access, and data
corruption, while centralized IT functions, due to their broad reach, may face broader system-wide outages that can
impact all applications, including databases. Databases benefit from strong access control and encryption, while
centralized systems must focus on redundancy and disaster recovery.
In conclusion, network systems and database systems have more specialized, focused risks related to data flow and
security, while centralized IT functions deal with broader risks like operational continuity, scalability, and single-point
failures. Both require different layers of controls to mitigate their respective risks effectively.
Network systems, database systems, and centralized IT functions all
face distinct but interconnected risks. Network systems are vulnerable
to external threats like hacking and data interception, while database
systems are at risk of data breaches, corruption, and unauthorized
access. Centralized IT functions, on the other hand, pose risks of
system-wide outages, single points of failure, and scalability challenges.
Internal Audit’s Role in Mitigating These Risks:
Internal audit plays a crucial role in ensuring the effectiveness of risk management and control
mechanisms in all these areas:
For Network Systems:
1. Audit Network Security Measures: Internal auditors assess the robustness of firewalls,
intrusion detection systems (IDS), and encryption protocols to ensure that the
network is protected from external threats.
2. Review Access Controls: Auditors verify that access to network resources is properly
controlled and that user roles and permissions are regularly reviewed and updated.
3. Assess Incident Response Plans: Internal audit ensures that the organization has effective
incident response plans in place to handle breaches, attacks, and network
disruptions.
4. Penetration Testing Audits: Internal auditors may oversee or recommend penetration
testing to simulate attacks and identify vulnerabilities in the network infrastructure.
Internal Audit’s Role in Mitigating These Risks:
For Database Systems:
1. Evaluate Data Security and Privacy Controls: Internal auditors review the
encryption, authentication, and data access controls to ensure that
sensitive information is protected against unauthorized access or
breaches.
2. Audit Data Integrity Controls: Auditors assess mechanisms to prevent data
corruption, ensuring that backups are regular and reliable, and that
recovery procedures are effective.
3. Review Change Management Procedures: Auditors check that database
changes (updates, patches, configurations) follow strict approval
processes to prevent unauthorized modifications.
4. Monitor Compliance with Regulations: Internal audit ensures that database
systems comply with relevant regulations (e.g., Oman Personal Data
Protection Law (PDPL)by verifying that data protection protocols are in
place.
Internal Audit’s Role in Mitigating These Risks:
For Centralized IT Functions:
1. Assess IT Governance Frameworks: Internal auditors review the overall IT
governance to ensure that roles and responsibilities are clearly defined
and that the IT function operates efficiently in supporting business objectives.
2. Review Business Continuity and Disaster Recovery Plans: Internal audit
evaluates the effectiveness of business continuity plans (BCP) and
disaster recovery (DR) strategies to ensure minimal disruption in case
of failures or disasters.
3. Audit System Scalability and Resource Management: Auditors examine
whether the centralized IT systems can scale appropriately with the
organization’s growth and whether resource allocation is optimized.
4. Evaluate Single Point of Failure Risks: Internal audit identifies critical areas
within centralized IT functions that are vulnerable to failure and recommends
redundancies and failover solutions to mitigate these risks.
Internal Audit’s Role in Mitigating These Risks:
Internal Audit’s Strategic Contributions:
By providing independent and objective assessments, internal auditors
help organizations strengthen their control environments. They identify
weaknesses, recommend improvements, and monitor the
implementation of corrective actions. Additionally, they ensure that
management has proper oversight over IT functions and that risk
mitigation strategies are effective across network, database, and
centralized IT systems.
Reference:
Arens, A. A., Elder, R. J., Beasley, M. S., & Hogan, C. E. (2017).
Auditing and Assurance Services: An Integrated Approach (16th ed.).
Pearson Education.