Internal Controls Over Payroll Processes and IT General Controls
|
|
|
- Gwendolyn Craig
- 10 years ago
- Views:
Transcription
1 The North Carolina Office of the State Controller Internal Controls Over Payroll Processes and IT General Controls April 6, 2011 David McCoy State Controller
2 Introduction Statewide Internal Control Program Enhancing Accountability in Government through Leadership and Education 2
3 Introduction Administrative Items Phones have been muted. For questions during the webinar or for technical assistance Jennifer Trivette at Course materials have been provided in advance. Qualifies for up to 2 hours of CPE. 3
4 Introduction Agenda Estimated Time Topic 9:30 9:35 Welcome and Introduction Ben McLawhorn 9:35 10:00 Overview of Related Audit Findings Carol Smith and Michael Burch 10:00 10:10 Overview of Internal Controls and Risk Jennifer Trivette 10:10 10:20 Implementing Internal Controls over Payroll Processes Amanda Williams 10:20 10:30 Identifying the Risk in Each Payroll Process - What Could Go Wrong? Amanda Williams 10:30 10:45 How Payroll Control Weaknesses Could Lead to an Opportunity for Fraud? Amanda Williams 10:45 10:55 Nature of Controls at the Transaction Level Wynona Cash 10:55 11:05 Considering IT General Controls Wynona Cash 11:05 11:15 Understanding IT General Controls Wynona Cash 11:15 11:20 How IT General Controls Weaknesses Could Lead to Fraud Wynona Cash 11:20 11:30 Key Take-Aways & Questions Ben McLawhorn 4
5 Office of the State Auditor (OSA) 5 Carol Smith, CPA Financial Audit Manager
6 Office of the State Auditor Payroll Findings Internal Controls for Payroll Findings Related to: State Agency Audits/CAFR Audits for 2009 and 2010 University Financial Audits for 2009 and 2010 College Financial Audits for 2009 and 2010 Fiscal Control Audits for July thru December 2008 / February
7 Office of the State Auditor Payroll Findings State Agencies Financial Statement Findings Payroll time Entries Not Verified control procedures to ensure accuracy of payroll time entries were not followed finding reported for 2009 and 2010 Monthly bank balance in the State s payroll account not fully reconciled since January 2008 monthly differences accumulated to make payroll record reconcile to bank each month 7
8 Office of the State Auditor Payroll Findings State Agencies Single Audit Findings Improper Allocation of Salaries to Fund Sources time keeping system allocated payroll to grants based on an initial estimate of time each employee will spend on the grant actual time is tracked through another system and journal entries are made to reallocate the payroll charges to the proper grant timekeeping system and time and activity reporting system were not reconciled (2010) Salaries not Allocated to Grants Based on Time and Attendance Records (2009) 8
9 Office of the State Auditor Payroll Findings State Agencies Single Audit Findings (cont.) Personnel Costs Charged to Grant in Error Controls not in place to ensure that only allowable personnel costs were charged to grant. Part of two employees salaries and benefits were charged to incorrect grant. (2009) Deficiencies in Cash Management Procedures resulted in drawdown of excess funds for Payroll System access was not terminated immediately upon employees leaving employment. Risk of overpayment. 9
10 Office of the State Auditor Payroll Findings Colleges/ Universities Inappropriate Information Systems Access to payroll and human resource areas ( Colleges/ Colleges) ( universities) Access to information systems not properly terminated for separated employees university 10
11 Office of the State Auditor Payroll Findings Fiscal Control Audits July 2008 thru December 2008/ February 2009 Deficiencies in internal control over administration of personnel and payroll. Noncompliance with State policies and increased risk of errors in compensation paid to employees. Manual timesheets not consistently signed by employees or approved by supervisor. Varying time periods for accumulating an employee s time worked compounded difficulty in determining the accuracy of compensation paid. Payroll reconciliations not complete. 11
12 Office of the State Auditor Payroll Findings Fiscal Control Audits July 2008 thru December 2008/ February 2009 (cont.) Inadequate segregation of duties over payroll and human resources Payroll disbursing account not reconciled Lack of authorization over employee pay rates University paid salaries without having an authorized funding source in place and also paid salaries from source authorized. Seven employees continued to be paid after the federal funding for their position was no longer available. One employee paid from source not approved by OSP. 12
13 Office of the State Auditor Payroll Findings Fiscal Control Audits July 2008 thru December 2008/ February 2009 (cont.) Failure to monitor and reconcile reported variances in payroll reports. Inadequate controls over salary advances. Several employees erroneously paid for overtime and one received inappropriate longevity payment. Inadequate controls over employee separations risk of errors in final payments Inconsistencies with compensated absences reports 13
14 Office of the State Auditor (OSA) 14 Michael E Burch, CPA, CISA IS Audit Manager
15 Office of the State Auditor IT Findings Objective To highlight the most common findings found in IS Audits for the last two years. 15
16 Office of the State Auditor IT Findings Passwords & User Accounts Expiration period for privileged users passwords are not in compliance with the Statewide Security Manual s requirement of 60 days. Default user accounts for applications not removed or default passwords for these accounts not changed. 16
17 Office of the State Auditor IT Findings Access Rights Individuals have been granted more access rights than necessary to perform their job duties. Access rights for terminated employees not removed timely. Access rights for employees changing positions not changed timely or not changed to reflect new job responsibilities. 17
18 Office of the State Auditor IT Findings Review of Access Rights Access rights not reviewed in compliance with the Statewide Security Manual. Twice a year for regular users Quarterly for privileged users Review of access rights not performed by individuals other than security officers. Review of access rights not documented by individual performing review. 18
19 Office of the State Auditor IT Findings Back-Ups Back-up tapes stored on-site in media safes rather than at off-site locations. Replication Servers used for back-ups are located on-site with no back-ups stored at an off-site location. 19
20 Office of the State Auditor IT Findings Disaster Recovery Plans Disaster Recovery Plans are not updated to include new applications or to reflect changes in Information Technology environment, such as moving from mainframes to servers. Disaster Recovery Plans not tested or no documentation of testing when recovery from backup tapes is used as a test. 20
21 Office of the State Auditor IT Findings Statewide Security Manual Agencies and Universities not in compliance with the Statewide Security Manual standards. Universities have not developed their own security standards in place of the Statewide Security Manual standards. 21
22 Office of the State Auditor IT Findings SAS 70 or SOC Reports SAS 70 or Service Organization Controls (SOC) reports have not been obtained for service providers to document controls for financial reporting or controls related to compliance and operations. 22
23 Office of the State Auditor IT Findings Reconciliation of Data Transfers Data transferred between applications is not reconciled by users to ensure completeness and accuracy of data transferred. 23
24 Office of the State Auditor IT Findings Security Governance Management have not provided policies, procedures, standards, and guidance for system administrators in the configuration of security for servers, databases, and network devices. Systems not secured or harden before being placed on network. 24
25 Office of the State Auditor IT Findings Security Baselines No baselines for security settings for servers, databases, and network devices on the network. Current security settings for servers, databases, and network devices not compared to baselines to identify unauthorized or unapproved changes. 25
26 Office of the State Auditor IT Findings Patches and Change Control Patches for servers operating systems and databases not installed timely. No change control methodology for servers, databases, and network devices. 26
27 Office of the State Auditor IT Findings Passwords for Network Devices Network devices default user accounts not removed or default passwords for these accounts not changed. Passwords for network devices not changed on a regular schedule. 27
28 Office of the State Auditor IT Findings Network Printers, Copiers, & Scanners Systems Administrators are unknowingly introducing vulnerabilities into the state networks by placing unsecured network printers, copiers, and scanners onto the State s Network. 28
29 Office of the State Auditor IT Findings Network Vulnerability Assessments Network vulnerability assessments including penetration testing not performed. 29
30 Overview of Internal Controls and Risk 30
31 Overview of Internal Controls and Risk Overview What is Internal Control? Internal Control Activities What is Risk? What Could Go Wrong? Types and Nature of Controls Balancing Risk and Control 31
32 Overview of Internal Controls and Risk A control is any action taken to mitigate or manage risk and increase the probability that the organization s processes will achieve its goal or objectives. 32
33 Overview of Internal Controls and Risk What is Internal Control? Internal control is a process, effected by an entity s governing body, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: Reliability of financial reporting Compliance with applicable laws and regulations Effectiveness and efficiency of operations 33
34 Overview of Internal Controls and Risk Why do we need internal controls? Internal controls provide a foundation for accountability. Internal controls are the checks and balances that help managers detect and prevent problems. 34
35 Overview of Internal Controls and Risk Internal Control Activities: Adequate segregation of duties Proper authorization of transactions and activities Adequate documentation and records Physical control over assets and records Independent checks on performance 35
36 Overview of Internal Controls and Risk Adequate Segregation of Duties Requires different individuals be assigned responsibility for different elements of related activities. For example, responsibilities for payroll approval, data entry, and disbursement functions should be segregated and assigned to different persons. 36
37 Overview of Internal Controls and Risk 37 Proper authorization of transactions and activities Requires the review of transactions by an appropriate person to ensure that all activities adhere to established guidelines, it may be general or specific. For example: Giving a department permission to expend funds from an approved budget general authorization. Review and approval of an individual transaction specific authorization.
38 Overview of Internal Controls and Risk Adequate documents and records Provide evidence that financial statements are accurate. The source documents ensure adequate recordkeeping. For example, approved timesheets, payroll reports, etc. 38
39 Overview of Internal Controls and Risk Physical control over assets and records The most important measure for safeguarding assets and records is the use of physical precautions limit access to assets/records Physical Controls fireproof file cabinets, safe, security cameras Access Controls passwords, ID cards Backup and recovery procedures Disaster Recovery Plan 39
40 Overview of Internal Controls and Risk Independent checks on performance The need for independent checks arises because internal controls tend to change over time unless there is a mechanism for frequent review. For example, edit checks are performed whereby the employee enters their time and the system automatically runs a validation to determine whether enough or too much time has been entered. 40
41 Overview of Internal Controls and Risk Risk is the probability that an event or action will adversely affect the organization. 41
42 Overview of Internal Controls and Risk Identify Risks A risk is what could go wrong that could lead to a financial misstatement or non-compliance with rules and regulations. Risk statements should read as if something went wrong and include the resulting impact (or lost opportunity). Example: Unauthorized changes are made to the payroll master data resulting in payments to fictitious employees and an overstatement of expenses. 42
43 Overview of Internal Controls and Risk Procedure vs. Control: A procedure is a series of steps taken to accomplish an end. A control is a series of checks and balances that help managers detect and prevent errors. 43
44 Overview of Internal Controls and Risk Management uses a mix of Preventive Controls and Detective Controls And a combination of Manual Controls and Automated Controls 44
45 Overview of Internal Controls and Risk Types and Nature of Controls: Prevent - Stop something from going wrong Ex. Approval of timesheets before processing Detect - Find and correct errors Ex. Review of payroll summary change reports Manual - Performed manually Ex. Comparison of timesheets to preliminary payroll reports Automated - Performed by a computer Ex. Access controls to the payroll system 45
46 Overview of Internal Controls and Risk Balancing Risk and Control To achieve a balance between risk and controls, internal controls should be: Proactive Value-added Cost-effective Address exposure to risk 46
47 Internal Controls over Payroll Processes 47
48 Internal Controls over Payroll Processes Policies and Procedures Describe the organization s leave policies in a personnel manual. Establish guidelines for who can view employment records. Give access for viewing or updating payroll system data to authorized employees only. Provide training for all employees. Conduct periodic risk assessments to identify issues. 48
49 Internal Controls over Payroll Processes Payroll Processes New Hires and Salary Adjustments Terminations (Separations) Time Entry Payroll Reconciliations 49
50 Internal Controls over Payroll Processes New Hires and Salary Adjustments Document approval of budgeted salary and salary adjustments. Maintain a personnel file with all relevant employee (name, address, SS#, birth date, picture ID) and employment (salary, withholdings, employment dates) information. Check for completeness and accuracy. Segregate human resources and payroll job functions. 50
51 Internal Controls over Payroll Processes Terminations Notify human resources and payroll unit when an employee separates. Promptly update payroll system and personnel file with date of separation. Ensure all time and leave have been entered. Segregate human resources and payroll job functions. 51
52 Internal Controls over Payroll Processes Time Entry Approve hours worked and leave taken in a timely manner. performed by the employee s supervisor or manager Authorize overtime in advance. Maintain detail records of leave balances. Verify manual timesheets are entered correctly. Review exception reports. 52
53 Internal Controls over Payroll Processes Payroll Reconciliations Perform reconciliations at least monthly. Review and approve all reconciliations. performed by someone other than the preparer 53
54 Internal Controls over Payroll Processes Other Controls Monitor payroll records for duplicate names/addresses or postal codes. Periodically require employees to pick up paychecks in person with required photo identification. Payroll checks should follow controls for cash disbursements. Review time entered for holidays. Ensure payroll expenses post correctly. 54
55 Identifying the Risk What could go wrong? 55
56 Identifying the Risk New Hires and Salary Adjustments Objectives: Add new employees to payroll system; Make adjustments to existing employees salaries. Procedures Select job applicant to fill vacant position. Enter employee information/ changes into payroll system. Risks What could go wrong? Salary is entered incorrectly. Employee exemption status is entered incorrectly. Fictitious employees are added to payroll. Employees are paid from the wrong funding source. Potential Impact Misstatement of payroll expenses and liability accounts Loss of assets Payments to fraudulent employees Compliance issues AUDIT FINDINGS 56
57 Identifying the Risk 57
58 Identifying the Risk 58
59 Identifying the Risk Terminations Objective: Remove employees from payroll system. Procedures Submit resignation letter/ separation notice. Calculate leave payout. Risks What could go wrong? Separated employees are not removed from payroll system. Payout is calculated incorrectly. Potential Impact Salary overpayments to separated employees Overstatement of account balances Loss of assets AUDIT FINDINGS 59
60 Identifying the Risk 60
61 Identifying the Risk Time Entry Objective: Record time worked and leave taken. Procedures Enter time worked and leave taken. Print error reports. Risks What could go wrong? Time and leave are not entered or are entered incorrectly. Time is entered for fictitious or terminated employees. Potential Impact Payment for time not worked Overstatement of leave balances Misstatement of payroll expenses and liability accounts Loss of assets AUDIT FINDINGS 61
62 Identifying the Risk 62
63 Identifying the Risk Payroll Reconciliations Objective: Identify errors and necessary adjustments. Procedures Agree payroll register total to cash requisition. Compare payroll to general ledger. Identify outstanding items and research unreconciled amounts. Prepare correcting entries. Risks What could go wrong? Reconciliations are not prepared or are not timely. Outstanding or unreconciled items are not researched. Potential Impact Misstatement of accounts Loss of Assets Undetected instances of errors or fraud AUDIT FINDINGS 63
64 Identifying the Risk 64
65 Opportunity for Fraud 65
66 Opportunity for Fraud What is Fraud? A collection of irregularities and illegal acts characterized by intentional deception, committed by individuals inside or outside of the organization for their personal benefit or to benefit the organization. 66
67 Opportunity for Fraud Fraud Triangle 67
68 Opportunity for Fraud Types of Payroll Fraud Ghost employees Pay rate alteration Unauthorized hours 68
69 Opportunity for Fraud City workers jailed in ghost employee scheme Two payroll employees in the city's Department of Solid Waste Management were in jail Tuesday, accused of using a ghost employee scheme to steal more than $144,000 from the city during a twoyear period. Patricia Anita Midell and Bonnie Louise Vital are each charged with theft by a public servant of more than $100,000, a first-degree felony punishable by life in prison, according to court records. Assistant Harris County District Attorney Jennifer Devine said Midell, 45, and Vital, 48, created false employee records by using information from the records of former department employees. They deposited checks made out to the ghost employees into their own accounts, Devine said. City officials became suspicious after a former employee reported receiving a W-2 for 2008, despite not working for the city. The former employee initially complained to Vital, Devine said, who told him that she would look into it. After several weeks, he complained to the city controller's office, which alerted the office of inspector general. City officials said Tuesday the two women no longer work for the city, but requests for start dates and termination dates from the city were not returned Tuesday. Source: Houston Chronicle 69
70 Opportunity for Fraud Detroit School Woes Deepen Five employees of the Detroit public school system were charged Wednesday with multiple felonies as part of an investigation into alleged corruption and the loss of tens of millions of dollars in school funds. The charges come as the Detroit Public Schools is struggling with an estimated budget deficit of $259 million and weighing a potential bankruptcy filing. Kym Worthy, the prosecutor for Wayne County, announced the charges Wednesday. If convicted, the accused could face decades of jail time because Michigan law allows harsh penalties for public officials found guilty of wrongdoing. The losses alleged in the charges represent only a fraction of the improper expenses uncovered since the state sent an emergency financial manager, Robert Bobb, to straighten out the city's ailing school system. A probe launched by Mr. Bobb uncovered paychecks going to 257 "ghost" employees who have yet to be accounted for. He said that approximately 500 illegal health-care dependents he uncovered have cost the district millions. A separate Federal Bureau of Investigation probe in May led to the indictment of a former payroll manager and another former employee on charges of bilking the district out of about $400,000 over four years. Source: Wall Street Journal 70
71 Opportunity for Fraud Videos 71
72 Opportunity for Fraud Video links: New Orleans Police Department video: NOPD-payroll-fraud/damzTLeNw0SFUixBNSiSIA.cspx?rss=2085 Norfolk Community Services Board video: 72
73 Nature of Controls at the Transaction Level 73
74 Nature of Controls at the Transaction Level Significant Accounts / Disclosures in Financial Statements Classes of Transactions 74 Business Processes Process A Process B Process C Financial Applications (application controls) Financial Application A Manage Change Application B IT General Controls (Activities) Logical Access Other IT General Controls
75 Nature of Controls at the Transaction Level Nature of Controls at Transaction Level Manual controls are those controls that are manually performed by an individual. IT dependent manual controls are those controls that manually performed, but require input based upon the results of computer-produced information. IT application controls are those controls that are performed entirely by a computer or computer-based system. 75
76 Nature of Controls at the Transaction Level IT Application Controls are: Built into computer programs and supported by manual procedures. Designed to provide completeness and accuracy of information processing critical to integrity of the financial reporting process. 76
77 Nature of Controls at the Transaction Level IT Application Controls (input-processing-output) Input data is accurate, complete and authorized Data is processed as intended in an acceptable time period Output and stored data is accurate and complete A record is maintained to track data processing from input to storage to output 77
78 Nature of Controls at the Transaction Level IT Application Controls (automated process controls) Components Configuration settings and custom automated controls Master data controls and access Control overrides Segregation of duties and function access Interface control 78
79 Nature of Controls at the Transaction Level Common IT Application Controls Input and access controls Data checks and validations Automated authorizations, approval, and override Automated Segregation of Duties Pended Items File and data transmissions controls 79
80 Nature of Controls at the Transaction Level Common IT Application Controls (cont.) Processing controls Automated file identification and validation Automated functionality and calculations Audit trails and overrides Data extraction, filtering, and reporting Interface balancing Automated functionality and aging Duplicate checks Output controls General ledger and sub-ledger posting Update authorization 80
81 Nature of Controls at the Transaction Level End-User Computing 81 Generally involves the use of end-user developed spreadsheets and databases. It is pertinent that adequate controls are in place for high risk spreadsheets, databases and other user-developed programs as they are equivalent to any other system. Example of End-User controls: Access control Version/change control Reviewed for completeness, accuracy and processing integrity Backup
82 Nature of Controls at the Transaction Level IT Application Controls apply to the processing of data within the application software. IT General Controls are controls over: Computer Operations System software acquisitions and maintenance Access security Application system acquisition, development and maintenance 82
83 Considering IT General Controls 83
84 Considering IT General Controls Why Should We Consider IT General Controls? The effectiveness of the application controls is dependent on the general controls. 84
85 Considering IT General Controls Significant Accounts / Disclosures in Financial Statements Classes of Transactions 85 Business Processes Process A Process B Process C Financial Applications (application controls) Financial Application A Manage Change Application B IT General Controls (Activities) Logical Access Other IT General Controls
86 Understanding IT General Controls 86
87 Understanding IT General Controls IT General Controls Manage Change Logical Access Other IT General Controls 87
88 Understanding IT General Controls Manage Change Only appropriately authorized, tested and approved changes are made to applications, interfaces, databases, and operating systems. 88
89 Understanding IT General Controls Manage Change Changes are authorized, tested and approved to confirm application controls operate effectively through the period of intended reliance. Changes are monitored on a regular basis for unauthorized changes. 89
90 Understanding IT General Controls Types of Manage Change Program Development/Acquisition Program Change Maintenance to System Software Emergency Changes Configuration/Parameter Changes 90
91 Understanding IT General Controls 91 Manage Change Controls Change Management Policies and procedures define the changes that required documentation and changes that do not. Significant changes are initiated, approved and tracked. Change Requests (including emergency changes) Supporting documentation is retained in a central repository. Appropriate testing is performed depending on the type of change. Changes are approved prior to release into production.
92 Understanding IT General Controls Manage Change Controls (cont.) Segregation of Duties Between the requesting individual and the approver Between developers and those responsible for moving a program change into production Monitor program development and changes 92
93 Understanding IT General Controls Manage Change Objective: Modified, developed or acquired new systems/applications changes. Procedures Change made in the interface between the general ledger and the subsystem. Risks What could go wrong? Processing of transactions or data may be incomplete and inaccurate. Potential Impact Misstatement of account balance Loss of assets AUDIT FINDINGS 93
94 Understanding IT General Controls Logical Access Only authorized persons have access to data and they can perform only specifically authorized functions (e.g., inquire, execute, update). 94
95 Understanding IT General Controls Logical Access (cont.) Access to key systems and files is approved, appropriate and monitored to confirm data generated by the application is reliable. Application Security higher level logins and parameter change restrictions confirm applications are secure. 95
96 Understanding IT General Controls Logical Access Controls are applied per the Statewide Security Manual/Agency s Information Security Policy. These may include: Restricted number of sign on attempts Automatic password changes Minimum length of passwords Logging and investigation of unauthorized password events. Limited physical access to the data center(s) Privileged access to system and applications is limited. 96
97 Understanding IT General Controls Logical Access Controls (cont.) Users and administrative accounts are not shared between users. Periodically review who has access to the critical financial data and configuration settings for the application and systems. Anti-virus software is used to protect the integrity and security of financial reporting systems and subsystems. Intrusion detection is installed and maintained on critical systems and alerts are actively monitored and addressed. Network connectivity is configured to restrict unauthorized access to all network systems. 97
98 Understanding IT General Controls Logical Access and Physical Security Access to computer rooms, telephony, networks, power supplies and sensitive IT documentation is granted and revoked by an authorization process. Access to computer rooms, telephony, network, power supply cabinets and sensitive IT documentation are controlled with an automated card access system or manual lock. Access to computer rooms are documented and logged. Access logs are reviewed by IT management and access violations are escalated and resolved in a timely manner. 98
99 Understanding IT General Controls Logical Access Controls Segregation of Duties related to granting, modifying and removing user access. Requesting access, approving access, setting up access and monitoring access Access groups/roles are also periodically reviewed for appropriateness and segregation of duties Violations/violation attempts Performing rights of a privileged user and monitoring use of a privileged user (password expires every 60 days) 99
100 Understanding IT General Controls Logical Access Objective: Granting/removing access rights to systems, applications, and data. Procedures Change access rights on previous Personnel Technician. Risks What could go wrong? Unauthorized access to the payroll subsystem since her responsibilities have changed. - Entered ghost employee on the payroll file. - Processing of payroll transactions that are inaccurate. Potential Impact Overstatement of payroll expenses and opportunity for fraud. AUDIT FINDINGS 100
101 Understanding IT General Controls Other IT General Controls (computer operations) Scheduling Backup and Recovery Problem Management and Monitoring 101
102 Understanding IT General Controls Scheduling Job scheduling and processing procedures Backup and Recovery Backup schedule, offsite storage Periodic testing of backup media Problem Management and Monitoring IT operations problems or incidents are identified, resolved, reviewed and analyzed in a timely manner. 102
103 Understanding IT General Controls Other IT General Controls (computer operations) Segregation of Duties of the individuals who Perform backups and monitoring Program and implement/monitor scheduling 103
104 How IT General Control Weaknesses Could Lead to Fraud? Videos 104
105 How IT General Control Weaknesses Could Lead to Fraud? Video links: Student Hacks Computer to Change Grades: University of Louisville Database Breach: 105
106 Key Take-Aways 106
107 Key Take-Aways What is an Internal Control? An action taken to mitigate or manage risk that increases probability that an organization s processes will achieve its goals/objectives. Provides the foundation for accountability Helps organizations detect/prevent problems. 107
108 Key Take-Aways Examples of Internal Control Activities: Adequate segregation of duties Physical control over assets and records Proper authorization of transactions 108
109 Key Take-Aways What is Risk? The probability that an event or action will adversely affect an organization. Risk Identification Determine what could go wrong? Assess potential impact resulting from something going wrong. 109
110 Key Take-Aways Balancing Risk and Control To achieve a balance between risk and controls, internal controls should be: Proactive Value-added Cost-effective Address exposure to risk. 110
111 Key Take-Aways Internal Controls over Payroll Processes: New Hires and Salary Adjustments Terminations (Separations) Time Entry Payroll Reconciliations 111
112 Key Take-Aways Types of Commonly Seen Payroll Fraud: Ghost Employees Pay Rate Alterations Unauthorized Hours 112
113 Key Take-Aways Controls at the Transaction-Level: Manual Controls IT Dependent Controls IT Application Controls 113
114 Key Take-Aways Categories of IT Application Controls: Input and Access Controls Processing Controls Output Controls Provides assurance of transaction: Completeness Accuracy Validity 114
115 Key Take-Aways IT General Controls Manage Change Logical Access Other IT General Controls (Computer Operations): Scheduling Back-up and Recovery Problem Management and Monitoring 115
116 116 Thank You!
Internal Audit Committee of Brevard County, Florida Internal Audit of Timekeeping and Payroll Process
Internal Audit Committee of Brevard County, Florida Internal Audit of Timekeeping and Payroll Process May 31, 2011 Prepared By: Table of Contents Transmittal Letter... 1 Executive Summary... 2-4 Background...
Module #9 Payroll Schemes
Module #9 Payroll Schemes Payroll Schemes include: Ghost employee schemes, which occur when a person not employed by the company is on the payroll Overpayment schemes, which occur when a company pays an
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
The Basics of Internal Controls
The Basics of Internal Controls Presented to: The Institute of Internal Auditors (IIA) Topeka Chapter April 7, 2009 Today s Objectives Provide Insight into Internal Controls! Risk and Fraud the basis for
Connecting the dots: IT to Business
Connecting the dots: IT to Business Jason Wood, CPA, CISA, CIA, CITP, CFF April 2015 1 Speaker Bio Jason Wood Over 18 years of international business experience in planning, conducting, and quality reviewing
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
September 2011 Report No. 12-002
John Keel, CPA State Auditor An Audit Report on The Criminal Justice Information System at the Department of Public Safety and the Texas Department of Criminal Justice Report No. 12-002 An Audit Report
MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE
MANAGEMENT AUDIT REPORT OF ACCOUNTS PAYABLE REPORT NO. 04-108 CITY OF ALBUQUERQUE OFFICE OF INTERNAL AUDIT AND INVESTIGATIONS of Accounts Payable Report No. 04-108 Executive Summary Background The Department
4 Testing General and Automated Controls
4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL I. Financial Planning/Budget Systems 1. Organization has a comprehensive annual budget which includes all sources and uses of funds for all aspects of
ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL
ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL STATE BOARD OF ACCOUNTS 302 West Washington Street Room E418 Indianapolis, Indiana 46204-2769 Issued January 2011 Revised April 2012 TABLE OF CONTENTS
CHAPTER 4 EFFECTIVE INTERNAL CONTROLS OVER PAYROLL
CHAPTER 4 EFFECTIVE INTERNAL CONTROLS OVER PAYROLL INTRODUCTION AND LEARNING OBJECTIVES Every organization, including governments, require employees to assist in meeting their goals and objectives. The
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Department of Human Resources Payroll Accounting and Processing Audit Final Report. August 2009. promoting efficient & effective local government
Department of Human Resources Payroll Accounting and Processing Audit Final Report August 2009 promoting efficient & effective local government Introduction The Internal Audit Office performed an audit
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM
PAYROLL GENERAL: The Payroll Department is responsible for processing all District payrolls and compliance with all rules and regulations pertaining to and/or resulting from payroll operations which includes
August 2014 Report No. 14-043
John Keel, CPA State Auditor A Report on On-site Audits of Residential Child Care Providers Report No. 14-043 A Report on On-site Audits of Residential Child Care Providers Overall Conclusion Three of
OFFICE OF THE STATE COMPTROLLER DIVISION OF LOCAL GOVERNMENT SERVICES
OFFICE OF THE STATE COMPTROLLER DIVISION OF LOCAL GOVERNMENT SERVICES AND ECONOMIC DEVELOPMENT TECHNICAL ASSISTANCE Comptroller OFFICE OF THE STATE COMPTROLLER DIVISION OF LOCAL GOVERNMENT SERVICES & ECONOMIC
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
How To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
ACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
Network and Security Controls
Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)
PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care
P L A N A D V I S O R Y. The Importance of Internal Controls in Financial Reporting and Safeguarding Plan Assets
P L A N A D V I S O R Y The Importance of Internal Controls in Financial Reporting and Safeguarding Plan Assets P L A N A D V I S O R Y Table of Contents Introduction 3 Why Internal Control Is Important
MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center
MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014
The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local
Information Systems and Technology
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
PeopleSoft IT General Controls
PeopleSoft IT General Controls Performance Audit December 2009 Office of the Auditor Audit Services Division City and County of Denver Dennis J. Gallagher Auditor The Auditor of the City and County of
August 2008 Report No. 08-046
John Keel, CPA State Auditor A Report on On-site Audits of Residential Child Care Providers Report No. 08-046 A Report on On-site Audits of Residential Child Care Providers Overall Conclusion Three of
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
Internal Control Guidelines
Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth
Information Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
Auditor of Public Accounts Adam H. Edelen
Auditor of Public Accounts Adam H. Edelen FOR IMMEDIATE RELEASE Contact: Stephenie Steitzer [email protected] 502.564.5841 513.289.7667 Edelen Releases Audit of Former Owsley Clerk s Fee
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
April 2010. promoting efficient & effective local government
Department of Public Works and Environmental Services Department of Information Technology Fairfax Inspections Database Online (FIDO) Application Audit Final Report April 2010 promoting efficient & effective
Better secure IT equipment and systems
Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
CENTRALIZED PAYROLL PROCESSING
Audit Report County Controller John T. Schimmel, P.A. CENTRALIZED PAYROLL PROCESSING As of August 2002 Audit Manager Frank S. Kedl, CIA Solicitor David J. Ceraul, Esq. County Executive Glenn F. Reibman
ATTESTATION REPORT OF DODGE COUNTY COURT JULY 1, 2013 THROUGH JUNE 30, 2015
ATTESTATION REPORT OF DODGE COUNTY COURT JULY 1, 2013 THROUGH JUNE 30, 2015 This document is an official public record of the State of Nebraska, issued by the Auditor of Public Accounts. Modification of
Accounting Systems: Complying with FAR Requirements. John S. Sroka, CPA Acquisition Cost/Price Analyst
Accounting Systems: Complying with FAR Requirements John S. Sroka, CPA Acquisition Cost/Price Analyst Background Information FAR Requirements FAR Part 9: Contractor Qualifications FAR Part 16: Cost-reimbursement
Fiscal Procedure Sequence page number
Table of Contents Fiscal Procedure Sequence page number Treasurer Responsibilities Maintenance of General Ledger Financial Statements Financial Signature/Review Policy Insurance Protection Payroll Procedures
Enterprise PrivaProtector 9.0
IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS
VA Office of Inspector General
VA Office of Inspector General OFFICE OF AUDITS & EVALUATIONS Department of Veterans Affairs Federal Information Security Management Act Audit for Fiscal Year 2014 May 19, 2015 14-01820-355 ACRONYMS CRISP
716 West Ave Austin, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
GENERAL PAYROLL CONTROLS Dates in scope:
GENERAL PAYROLL CONTROLS Risk # Risk Expected Control Step # Testing Documents/Info Needed 1 Unauthorized initial pay rate 2 Unauthorized/unsupported deductions (statutory deductions and benefits). Initial
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
SRA International Managed Information Systems Internal Audit Report
SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions
PLAN ADVISORY Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions PLAN ADVISORY Table of Contents Introduction 3 Selecting and Monitoring Third-Party Service Providers 4 Quality
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
MEDICAID COMPLIANCE POLICY
6232 MEDICAID COMPLIANCE POLICY It is the policy of the Board of Education that all school district s practices regarding Medicaid claims for services be in compliance with all applicable federal and state
Master Document Audit Program
Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on
Community Ambulance Service District
Community Ambulance Service District For the period July 1, 2011 through June 30, 2013 Oklahoma State Auditor & Inspector Gary A. Jones, CPA, CFE This publication, issued by the Oklahoma State Auditor
Detecting, Preventing, and Mitigating Identity Theft
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
Chapter 9 The Study of Internal Control and Assessment of Control Risk
Review Questions Chapter 9 The Study of Internal Control and Assessment of Control Risk 9-1 There are seven parts of the planning phase of audits: preplan, obtain background information, obtain information
INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER Material Weaknesses (0) No material weaknesses were reported for FY 2013. Significant Deficiencies (1) Grant Receivable Accounting
FOLLOW-UP OF HUMAN RESOURCES DEPARTMENT PAYROLL REPORT NO. 07-02-117F. City of Albuquerque Office of Internal Audit and Investigations
FOLLOW-UP OF HUMAN RESOURCES DEPARTMENT PAYROLL REPORT NO. City of Albuquerque Office of Internal Audit and Investigations City of Albuquerque Office of Internal Audit and Investigations P.O. BOX 1293
Internal Control Systems
D. INTERNAL CONTROL 1. Internal Control Systems 2. The Use of Internal Control Systems by Auditors 3. Transaction Cycles 4. Tests of Control 5. The Evaluation of Internal Control Component 6. Communication
Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister
Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.
Judiciary Judicial Information Systems
Audit Report Judiciary Judicial Information Systems November 2008 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up correspondence
The Practice of Internal Controls
Office of the New York State Comptroller Division of Local Government and School Accountability LOCAL GOVERNMENT MANAGEMENT GUIDE The Practice of Internal Controls Thomas P. DiNapoli State Comptroller
Agency Escrow Accounting Standards.
Agency Escrow Accounting Standards. Title Insurers State regulatory divisions, financial institutions, national groups, and others rely on Title Insurance underwriters to develop programs and practices
CALIFORNIA STATE PRISON, LOS ANGELES COUNTY
CALIFORNIA STATE PRISON, LOS ANGELES COUNTY Review Report PAYROLL PROCESS REVIEW July 1, 2010, through June 30, 2013 JOHN CHIANG California State Controller December 2014 JOHN CHIANG California State Controller
Control Matters. Computer Auditing. (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising)
Computer Auditing Control Matters (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising) The introduction of a computerized or electronic data processing (EDP) accounting system has
Internal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC
Internal Controls Best Practices By Jennifer Downs, CPA Benefit Audit Group, LLC Internal control consists of: Entity level controls these controls relate to the overall control environment and can potentially
