Factors to be considered for the Internal Auditors

Slides:



Advertisements
Similar presentations
Appendix F: Common risk categories for the public sector Insert client-specific photo here.
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Sodexo.com Group Internal Audit. page 2 helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and.
WORKING ON WORK PLANS. Supervisory Committee Work Plans “The better the planning, the better the result!” Work plans provide an organized, systematic.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
The Islamic University of Gaza
Internal Control Concepts Knowledge. Best Practices for IT Governance IT Governance Structure of Relationship Audit Role in IT Governance.
INTERNAL CONTROL. INTERNAL CONTROL DEFINED  INTERNAL CONTROL IS A PROCESS - EFFECTED BY AN ENTITY'S BOARD OF DIRECTORS, MANAGEMENT, AND OTHER PERSONNEL.
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
Copyright © 2007 Prentice-Hall. All rights reserved 1 Internal Control & Cash Chapter 8.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
1 Operational Risk Management Member Education Series Seminar Indian Institute of Banking & Finance Nagpur November 2005.
Internal Control and Internal Audit
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
©2008 Pearson Prentice Hall. All rights reserved. 4-1 Internal Control & Cash Chapter 4.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT Module 3.2 -Internal Control & Audit.
Control and Accounting Information Systems
 This presentation looks at: › What is risk management › How to identify risks › How to implement an effective risk management policy to increase your.
Central Piedmont Community College Internal Audit.
An Educational Computer Based Training Program CBTCBT.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Transaction Processing and the Internal Control Process Small Business Information Systems Professor Barry Floyd.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Introduction to Internal Control Systems
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Internal Control in a Financial Statement Audit
The University of California UC Financial Management Jim Corkill Controller, Accounting Services & Controls University of California, Santa Barbara November,
CIA Annual Meeting LOOKING BACK…focused on the future.
Management Advisory and Compliance Services Towson University Management Advisory and Compliance Services Internal Controls.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Chapter 8 Auditing in an E-commerce Environment
Basel Committee Norms. Basel Framework Basel Committee set up in 1974 Objectives –Supervision must be adequate –No foreign bank should escape supervision.
1 Banking Risks Management Chapter 8 Issues in Bank Management.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Corliss Whitaker: Portfolio – Instructional Presentation Understanding BASEL II Concepts Author: Korki Whitaker Revised: 02/17/2007.
Level 2 Business Studies AS90843 Demonstrate understanding of the internal operations of a large business.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Welcome to the ICT Department Unit 3_5 Security Policies.
7-1 7 Sarbanes-Oxley, Internal Control, and Cash Student Version.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
SUNY Maritime College Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Internal Control Principles
Risk Management and the Treasury Function
13 Effective Control.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Operational Risk.
TREASURY ORGANIZATION AND STRUCTURE
Audit Planning and Analytical Procedures
Sarbanes-Oxley, Internal Control, and Cash
Operational Risk Chapter 20
Building the Foundation of Compliance
Defining Internal Control
TREASURY ORGANIZATION AND STRUCTURE
Internal Controls Towson University
Building the Foundation of Compliance
INFORMATION SYSTEMS SECURITY and CONTROL
Internal controls 01-Nov-2017.
Unit 11 October 22, 2017.
Risks in Banking Operations
INTERNAL CONTROLS AND THE ASSESSMENT OF CONTROL RISK
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
OCPS Internal Controls and Stakeholder Value
Presentation transcript:

Factors to be considered for the Internal Auditors Compiled By: JBSC, Dhaka

Operation of Internal Audit & Operational Risk Management. Basel Committee for Banking Supervision (BCBS) Evolution of Internal Control & Compliance (ICC) concepts has 13 Recommendations. Internal Audit is part of the management process in the bank. It is the actions taken by management to plan, organize and direct the performance of sufficient actions to provide reasonable assurance that the following objectives will be achieved: Ascertainment of Risks exposures in the bank branches & in business operations. Accomplishment of established objectives and goals for operations and programs. The economic and efficient use of resources. The reliability and integrity of information. Compliance with policies, plans, procedures, laws and regulations.

Operational Risk Operational risk is the broad discipline focusing on the risks arising from the people, systems and processes through which a company operates. It can also include other classes of risk, such as Fraud & Legal risks, physical or environmental risks. Operational Risk is the potential loss arising from a breakdown in company’s systems and procedures that result in human error, fraud, failure, damage of reputation, delay to perform or compromise of the company’s interests by employees. 3 P-S Policy (lacking or outdated) , Processes ( imperfectly / misguided model ) People ( Ignorance-negligence – offense- lack of integrity – poor judgment ) Systems (unsecured systems –Software- non complying security measures )

Risk in Banking Internal Process People External Factors Corporate Bank Sovereign Retail Project Finance Equity Internal Process People External Factors Interest Rate – in banking and trading books Foreign Exchange Equity Commodity Credit Risk Operational Risk Types of Risks Market Risk Information Risk Systems Risk Security and Integrity Risk

Operational risk is inherent to banking business Retail Banking Commercial Banking Payment and Settlement Treasury (Trading & Sales) ACTIVITY Retail Deposits & Lending Project Finance Payments and Collections Sales Private Banking Trade Finance Funds Transfer Market Making Card Services Proprietary Positions Working Capital Finance Clearing and Settlement Treasury Advisory Services Operation Risk categories Internal Fraud External fraud Employment Practices & Workplace Safety Clients, Products & Business Practices Physical Damage to Assets Business Disruption and System Failures Execution, Delivery & Process Management

Components of Operational Risk Management Framework Control environment: The Control Environment sets the tone of an organization, influencing the control consciousness of its people at the all tiers. Risk Addressing: The risk in an organization is the auditor’s starting point. The audit function is an expensive overhead, so it is important for auditors to concentrate their resources in the areas of greatest risk. Control activities: Control activities are the policies and procedures that help ensure management directives are carried out. Information and communication: Information systems play a key role in internal control systems as they produce reports, including operational, financial and compliance-related information, that make it possible to run and control the business. Monitoring: Internal control systems need to be monitored—a process that assesses the quality of the system's performance over time.

Operational Risks Includes: The loss of money or reputation are the high level risks, but the actual loss can come about in a number of different ways. These different ways give rise to a set of secondary risks, which auditors particularly need to focus on, these risks will include: Individual Ignorance, Negligence, Offence & Lacking of Integrity Frauds & Forgery, Misappropriation, embezzlement Breach of the law- Malpractice Error - Loss of data Theft - Loss of premises Poor judgment Poor strategic planning Insufficient management information Ineffective support for computer systems

Some Basic practical points for Auditors There are a number of basic practical points that auditors need to bear in mind during their day-to-day work: Auditors should not act as part of a control system itself.. Auditors should observe Audit protocol ( Audit Manual) wherever they are auditing. Auditors should declare any personal interest which may make it inappropriate for them to audit in an area. Auditors need to be discreet. They will probably see sensitive documents during the course of their audits. Auditors need to follow a strict ethical code. Some information that auditors see could be used for personal gain.

Factors to be considered for the Auditors There are many different types of control that an internal auditor will look for. To control the risks in banks, the types of control will include the following: Controls over STAFF: Adequate experience - Adequate staff level Adequate training - Clear lines of communication Controls over PROCESSING: Delegated authorities ( Business/ Finance, Administration, Expenditure) limits Two signatures needed to transfer money (Checker & Maker). Time deadlines (Execution of Transactions & Feedback) Check totals to prove accuracy of figures

Factors to be considered for the Auditors Controls over TRADING or Investment : Dealing Limits for traders Exception reports showing limit breaches Separation of the dealing function from that of settlement Authentication of foreign trading settlement instructions through SWIFT Separate verification of input of settlement instructions & reconciliation

Factors to be considered for the Auditors Controls over VALUABLES: Dual control over access to valuables, usually by two keys held by different people Separation of custody of valuables from record keeping Regular counting and reconciliation Video screening vaults or strong rooms

Factors to be considered for the Internal Auditors Controls over Information and Communication Technology: Backed-up data in case of loss of prime computer records is ensured Uninterrupted power supply for critical systems Remote contingency site in case there is a disaster in the prime site (DRC) Password access to the computer system Properly documented systems so that technicians can easily trace faults Strict controls over how programs can be accessed when they need to be changed Encrypted networks to reduce the risk of hackers gaining access · Physical controls over access to computer rooms ( Server) ‘Day End’ ‘Audit Tail’ verification & authentications.

END