The Basics of Internal Controls



Similar documents
Fraud Control Theory

LOSS CONTROL SUPPLEMENTAL APPLICATION FOR INSURANCE COMPANIES

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL

MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center

An Overview. August 2007 Internal Control - An Overview 1

University of San Diego University Audit Office Self-Audit Tool. A - General

SUBSIDIARY LEDGER MANAGEMENT AND INTERNAL CONTROLS

Fraud Risk Assessment for Service Providers FRAUD RISK ASSESSMENT

Accounts Payable Best Practices

FRAUD RISK ASSESSMENT

Internal Control Guide & Resources

Leonard W. Vona, CPA, CFE

MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE

MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS

CHAPTER 4 EFFECTIVE INTERNAL CONTROLS OVER PAYROLL

FINANCIAL CONTROLS POLICIES AND PROCEDURES FOR SMALL NONPROFIT ORGANIZATIONS

Checks and Balances Internal Controls. West Virginia State Auditor s Office Chief Inspector Division

Fraud and internal controls, Part 3: Internal fraud schemes

How To Handle A Fraud At Psc

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

Fraud Awareness and Prevention Program Report

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Controls should be appropriate to the scale of the assets at risk and the potential loss to the University.

Guide to Internal Control Over Financial Reporting

by: Scott Baranowski, CIA

Internal Controls. A short presentation from Your Internal Audit Department

Eugene Smith Executive Director of Athletics Department of Intercollegiate Athletics Arizona State University Box Tempe, AZ

Using Technology to Automate Fraud Detection Within Key Business Process Areas

SOLUTION: AUDIT AND INTERNAL REVIEW, MAY 2014

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)

FRAUD RISK & INTERNAL AUDIT

Tips to Prevent and Detect Workplace Fraud

Internal Control Systems

INFORMATION TECHNOLOGY CONTROLS

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Sharon Kurek, CPA, CFE Director of Internal Audit

Fraud Awareness Training

INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*

ATTACHMENT L. 2012/13 Internal Control Questionnaire for Workforce Organizations/Programs

Department of Information Technology Software Change Control Audit - Mainframe Systems Final Report

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

City of Berkeley. Prepared by:

Payment Procedures. Corruption Prevention Department

Policy-Standard heading. Fraud and Corruption Policy

Chapter 9 The Study of Internal Control and Assessment of Control Risk

UNDERSTANDING INTERNAL CONTROLS. A Reference Guide for Managing University Business Practices

IT Application Controls Questionnaire

Internal Controls: Best Practices for Political Campaigns in New York City

Fraud Policy FEBRUARY 2014

Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)

How To Prevent Fraud On A Credit Card

Fraud Prevention Policy

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.

Discovering the Secrets of Detecting Fraud in Accounts Receivable

Internal Control Questionnaire and Assessment

City of Berkeley. Prepared by:

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

University Credit Card Policies and Procedures Index

Internal Control Guidelines

2/27/2014. Introduction to Financial Management Best Practices. Learning Objectives. Donors don t give to groups they don t trust 1

CREDIT CARDS CALIFORNIA STATE UNIVERSITY, EAST BAY. Audit Report June 28, 2013

Department of Consumer Affairs Cash Disbursements by Agency Checks

Cash, Petty Cash, Change Funds, and Credit Cards

Maryland Insurance Administration

Reportable Conditions:

PURCHASE CARD POLICIES AND PROCEDURES MANUAL

Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine

Community Ambulance Service District

Table of Contents: Chapter 2 Internal Control

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

UCLA Policy 360: Internal Control Guidelines for Campus Departments

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant

How To Use A County Credit Card

Internal Audit. Audit of the Inventory Control Framework

KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER

The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements

Or download and view an electronic copy by visiting:

Operational Risk Publication Date: May Operational Risk... 3

A Performance Audit of the State s Purchasing Card Program

Workers Compensation Commission

Internal Control Requirements December 11, 2002

GLOBAL PORTS INVESTMENTS PLC

INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

Introduction to Accounting 2 Modul 1 Internal Control and Cash

October 21, Ms. Joan A. Cusack Chairwoman NYS Crime Victims Board 845 Central Avenue, Room 107 Albany, New York

Standards for Internal Control

Sample audit Data Center - A Topical Overview

Department of Health and Mental Hygiene Regulatory Services

Internal Controls over Cash for Small Nonprofits

Policies and Procedures: IDENTITY THEFT PREVENTION

Information Systems and Technology

City of Berkeley. Prepared by:

Maryland Automobile Insurance Fund

1. Storeroom supplies -- For items stocked in the Palmer storeroom, use the Requisition for Supplies Form.

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior

Transcription:

The Basics of Internal Controls Presented to: The Institute of Internal Auditors (IIA) Topeka Chapter April 7, 2009

Today s Objectives Provide Insight into Internal Controls! Risk and Fraud the basis for controls Internal controls defined 5+1 internal control components Steps for ensuring control 2

What Is Risk? Anything that could negatively impact the organization s ability to meet it s operational objectives. The purpose behind controls 3

5 Types of Risk Strategic risk that would prevent an organization from accomplishing it s objectives (meeting it s goals). Financial risk that could result in a negative financial impact to the organization (waste or loss of assets). Regulatory (Compliance) risk that could expose the organization to fines and penalties from a regulatory agency due to non-compliance with laws and regulations. Reputational risk that could expose the organization to negative publicity. Operational risk that could prevent the organization from operating in the most effective and efficient manner or be disruptive to other operations. 4

How To Identify Risk For each department/division objective, ask: What could go wrong? How could we fail? What must go right to succeed? What decisions require the most judgment? What activities are most complex? What activities are regulated? On what do we spend the most money? How do you bill/collect related revenue? On what information do we most rely? What assets do we need to protect? How could someone or something disrupt our operations? 5

Conditions That Increase Risk Lack of segregation of duties Too much trust Approval of documents without review Lack of verification of transactions after they have been entered in the system Lack of reconciliations No follow-up when things appear questionable or not reasonable Lack of control over cash/petty cash Lack of control over purchasing of materials/supplies Lack of knowledge of policies and procedures 6

What Is Fraud? Legal Definition of Fraud All multifarious means which human ingenuity can devise, and which are resorted to by one individual to get an advantage over another by false suggestions or suppression of the truth. It includes all surprises, tricks, cunning or dissembling, and any unfair way which another is cheated. Source: Black s Law Dictionary, 5th ed., by Henry Campbell Black, West Publishing Co., St. Paul, Minnesota, 1979. 7

What Is Fraud? Fraud is a common risk that should not be ignored. The incidence of fraud is now so common that its occurrence is no longer remarkable, only its scale. Any entity that fails to protect itself appropriately from fraud should expect to become a victim of fraud, or rather, should expect to discover that it is a victim of fraud. There is no such thing as an accidental fraud. What separates error from fraud is intent; the accidental from the intentional. 8

Causes of Fraud Capability Alienation Concealment Repetitive Acts Poor internal control creates opportunity for fraud. 9

Fraudulent Behavior Examples Payment to fictitious vendor Diversion of cash receipts Extra compensation to perpetrator Personal benefit from travel expenses Restricted funds manipulation Use of IT systems for personal/illegal activity Mis-statement of corporate results 10

How Does Fraud Occur? Poor internal controls Lack of proper authorization No separation of authorization, custody, record keeping No independent checks on performance Lack of clear lines of authority Inadequate documentation Management override of internal controls Collusion between employees and 3 rd parties Collusion between employees and management Poor or non-existent ethics policy Limited, unclear or no policies and procedures to direct business function processes 11

How To Mitigate Risk & Fraud Implement Internal Control Framework 12

What Are Internal Controls? Keeping an eye on organization assets and resources. Finding ways to make sure people don t do bad things. Protecting the organization from being accused of doing bad things. Good, sound business practice. Common sense! 13

Definition of Internal Control Internal control is a process designed to provide reasonable assurance regarding the achievement of objectives in the following areas: Effectiveness and efficiency of operations Reliability of financial reporting Compliance with applicable laws and regulations Safeguarding assets 14

Examples of Internal Control Think about what you do.. Lock your home and vehicle. Keep your ATM/debit card pin number separate from your card. Review bills and credit card statements before paying them. Reconcile your bank statement. Don t leave blank checks or cash just lying around. Expect your children to ask permission before they can do certain things. Other examples..?? 15

Department Internal Controls Computer passwords are periodically changed and shouldn t be written down or kept by the PC. Check purchase card charges against source documents. Check management reports against source documents. Lock cash drawers and secure storage for checks. Authorizations required for certain activities. Other examples.?? 16

Internal Control Components Control Environment The foundation on which everything rests. Key factors: Management s attitude: Tone at the Top Individual attributes: integrity, ethical values, competence Examples: Strategy Policy Training 17

Internal Control Components Risk Assessment Management must be aware of, anticipate and deal with risks. Management must establish methods and mechanisms to identify, analyze and manage risks that are likely to have an impact on service delivery and the achievement of desired outcomes. 18

Internal Control Components Risk Assessment Change is an indicator of risk -new personnel - new information system and/or technology - rapid growth -new programs/services Inherent risk - complexity - cash receipts 19

Internal Control Components Control Activities Control activities are the actions supported by policies and procedures that help assure management directives to address risks are carried out properly and timely. 20

Internal Control Components Control Activities To be effective, control activities must be: Appropriate; Functioning consistently according to plan throughout the period; Cost effective, comprehensive, reasonable; Directly related to the control objective; and Derive from a defined risk to the organization. 21

5 Internal Controls (+1) Types of Control Activities - Directive - Preventive - Detective - Corrective - Recovery -(Automated) 22

Internal Control Components Control Activities Examples of Directive Controls: Setting corporate policies, department policy/procedures; Setting spending limits Setting IT configuration standards; Other examples?? 23

Internal Control Components Control Activities Examples of Preventive Controls: Training on applicable policies, department policy/procedures; Review and approval process for purchase requisitions to make sure they are appropriate before the purchase; IT access authorizations to ensure access is appropriate; The use of passwords to stop unauthorized access to systems/applications; Other examples?? 24

Internal Control Components Control Activities Examples of Detective Controls: Cash counts; bank reconciliation; Review your payroll reports; Compare transactions on reports to source documents; Monitor actual expenditures against budget; Review logs for evidence of mischief; Other examples?? 25

Internal Control Components Preventive vs. Detective Preventive Authorization and approval procedures; Supervision (assigning, reviewing/approving, guidance, training); Segregation of duties (authorizing, processing, recording, reviewing); Controls over access to resources and records; Detective Reviews of operating performances; Reconciliations; Verifications; Reviews of processes and activities. 26

Internal Control Components Control Activities Examples of Corrective Controls: Submit corrective journal entries after discovering an error; Complete changes to IT access lists if individual s role changes; Other examples?? 27

Internal Control Components Control Activities Examples of Recovery Controls: Prepare data backups from current systems Storing documents and IT backups in a protected environment to ensure availability Restore data from backup following a failure; Other examples?? 28

Internal Control Components Control Activities Examples of Automated (IT) Controls: IT access permissions; System password requirements; Preset spending limits; Other examples?? 29

Internal Control Examples Invoice Processing Formal policy/procedure on processing (Directive) Must be matched to Materials Received (Preventive) An additional signature is required (Preventive/Manual) Online entry and authorization are separated (Preventive/Automated) Preset authorization levels (Preventive/Automated) Report of processed invoices reviewed and matched against paper invoices/materials received (Detective) Invoice matching reports reviewed by Internal Audit for proper review (Detective) Incorrect invoices adjusted and resubmitted (Corrective) 30

Control Examples (IT) IT Application Access Formal policy/procedure on access (Directive) Access control Roles established in application/system (Preventive/Automated) Access requested by individual or supervisor (Preventive/ Manual) Access request approval by management (Preventive/Manual) Access validation process in application/system (Preventive/ Automated) Report of access reviewed by management periodically (Detective) Inappropriate access removed (Corrective) Access permissions reloaded to system when inadvertently altered/lost (Recovery) 31

Control Activities Case Study Missing Camera Joe, the hard working staff assistant, is asked to process a requisition to purchase a new $5,000 camera to be used by a project manager who is working on a federal grant project. Later, when Joe conducts the annual physical inventory for the department, as requested by the Accounting Department, he is not able to locate the camera in the department. Joe learns the project manager was given permission by the department manager to take the camera home so that he could take photos at his sister s wedding (that was 2 months ago). When Joe talks to the department director about it, he is told not to worry since the camera wasn t purchased with company funds (i.e., the grant paid for it), it would be okay to check it off on the inventory report even though it had been removed from the premises. 32

Control Activities Case Study The New TV Jill, a senior staff assistant, is the department s procurement card holder. Her department manager, Anna, travels extensively so Jill occasionally uses a signature stamp to approve her procurement card statements. Jill went shopping for a new TV one weekend. While checking out, Jill mistakenly used her company procurement card. On Monday she received an email from Payme.net confirming the purchase; at that time she realized her mistake. Jill decided to wait until Anna returned from out of town to ask her advice. Jill was certain Anna would understand and help her straighten things out. The statement arrived a week later and Jill had Jack, the office assistant, approve the statement since Anna wasn t due back for another two weeks. Upon Anna s return, Jill had not saved enough money to repay the company for the TV. Since Anna had not seen the statement and it had already been processed by Accounting, Jill decided not to bring it up. She had been an exceptional employee for years and had seen many of her coworkers receive bonuses. She decided it was her turn. This would be her bonus. She had earned it! 33

Internal Control Pyramid Controls Risks 34

Why Controls Don t Always Work Inadequate knowledge of policies or governing regulations. I didn t know that! Inadequate segregation of duties. We trust A who does all of those things. Inappropriate access to assets. Passwords shared, access not removed, cash not secured Form over substance. You mean I m supposed to do something besides initial/sign it? 35

Why Controls Don t Always Work Control override. I know that s the policy, but we do it this way. Just get it done; I don t care how! Inherent limitations. People are people and mistakes happen. You cannot foresee or eliminate all risk. 36

Ensuring Control When thinking about internal controls, consider the following: Propriety of transactions is this legal and right? Does it feel or look wrong? Would someone else think so? Reliability and integrity of information is the information/form/data/report accurate and complete? Compliance with policies and government regulations are you following established procedures/instructions? Safeguarding assets could anyone take or gain access to items under your control without being observed? Economy and efficiency of operations is there a better way to do the job? Does it address a risk of significance to the organization? 37

Ensuring Control Make sure you have up-to-date policies and procedures; Ensure authorization limits are communicated within your department; Ensure all assets (especially cash) are safeguarded at all times; Establish document control (especially for spreadsheets); Ensure approval signatures are visible (legible) on all required documentation; Make sure data is only accessible by authorized personnel; Understand your department/function s risks; Ensure adherence to policy and legal/regulatory requirements; Establish objectives and measures for your department/function and for major programs; and Track performance to evaluate your success! 38

Questions? 39

Today s Presenter Richard Mosher, CISSP, CBCP, CISA, CGEIT, QSA 23 years in information security 10 years in Business Continuity Management/Disaster Recovery 6 years in IT auditing Specialist in policy, procedures, standards, governance and compliance Phone: 816-627-4216 E-mail: Richard.Mosher@jeffersonwells.com Jefferson Wells is a global provider of professional services in the areas of risk, controls, compliance and financial process improvement. The firm specializes in internal audit, technology risk management, tax, and accounting and finance. 40