End User Computer Controls Marc Engel, CPA, CISA, CFE Risk Management Advisory Services LLC

Slides:



Advertisements
Similar presentations
Business Planning using Spreasheets-2 1 BP-2: Good Spreadsheet Practice  There is always the temptation to rush in and start entering data.  However.
Advertisements

Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
1 CA202 Spreadsheet Application Collaborating with Colleagues Lecture # 16 Dammam Community College.
General Ledger and Journals. Financial Services - GL and Journals presentation What are journals? A journal [document] is used to record accounting.
Tutorial 8: Developing an Excel Application
XP New Perspectives on Microsoft Excel 2003, Second Edition- Tutorial 8 1 Microsoft Office Excel 2003 Tutorial 8 – Developing an Excel Application.
Auditing Concepts.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Auditing Computer Systems
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
The Islamic University of Gaza
 Transaction  It is a business event for example a sale of inventory “Hall 2009”
The TRUTH About SOX, Auditors & Oracle Applimation is the leading provider of Application Lifecycle Management solutions.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
CHAPTER 10 UNDERSTANDING INTERNAL CONTROLS Fall 2007
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
1. Definition of a Reconciliation 2. Importance of a Reconciliation 3. When to Prepare a Reconciliation 4. Items Needed to Prepare a Reconciliation 5.
Recordkeeping & Accounting
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
The University of California Strengthening Business Practices: The Language of Our Control Environment Dan Sampson Assistant Vice President Financial Services.
SAS 112: The New Auditing Standard Jim Corkill Controller Accounting Services & Controls.
© 2011 Financial Operations Networks LLC AP Policies and Internal Controls for Running a Tight Ship Panel: Susan Tinkler-Muller Mike Iverson Rob Rogers.
Spreadsheet Management. Sarbanes-Oxley Act (SOX, 2002) Requires “an effective system of internal control” for financial reporting in publicly- held companies.
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT Module 3.2 -Internal Control & Audit.
Certification of Market Values STEB PROGRAM Briefing Points 2011 Pennsylvania Department of the Auditor General Thomas E. Marks, CPA Deputy Auditor General.
Transaction Processing and the Internal Control Process Small Business Information Systems Professor Barry Floyd.
Financial Statement Modeling & Spreadsheet Engineering “Training in spreadsheet modeling improves both the efficiency and effectiveness with which analysts.
McGraw-Hill/Irwin The O’Leary Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Microsoft Excel 2002 Lab 4 Using Solver, Linking Workbooks,
1 Designing Substantive Procedures The auditor “must plan and perform the audit to reduce the audit risk to an acceptably low level that is consistent.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
Chapter 5 Internal Control over Financial Reporting
What to do for a Financial year end And When to do it.
A Worksheet For a service business
Internal Control in a Financial Statement Audit
IIA_Tampa_ Beth Breier, City of Tallahassee1 IT Auditing in the Small Audit Shop Beth Breier, CPA, CISA City of Tallahassee
Best Practices for Implementing Third Party Software to Monitor SOD and User Access Controls Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars.
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
QuickBooks QB i 2009/10 New Features Presented by Helen Goodyear.
Auditing Information Systems (AIS)
Internal Controls and Fraud Convery Describe an Internal Controls System and its elements Identify specific Internal Control issues in a NPO Consider.
A WORKSHEET FOR A SERVICE BUSINESS Accounting – Chapter 6.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
FSG Tips and Tricks By Melanie Cameron. About Melanie Cameron  14 years experience with EBS  Worked on every release since 10.6, oldest release was.
University of Minnesota Internal\External Sales “The Internal Sales Review Process” An Overview of What Happens During the Review.
Learning Objectives LO5 Document an accounting system to identify key controls and weaknesses in order to assess control risk. LO6 Write key control tests.
Adapted from Auditing User-Developed Applications (UDA) End User Computing (EUC) Global Technology Audit Guide GTAG® 14.
FINANCE POLICIES UPDATE Q Accounts Reconciliation Financial Statements Close Process Manual Journal Entries Accounts Reconciliation Financial Statements.
INTRODUCTION TO PUBLIC FINANCE MANAGEMENT Module 4.3: Internal Control & Audit.
R12 General Ledger Management Fundamentals
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Best Practices in Finance for Volunteers Brandy Vannoy, CPA Tim Rodgers, CPA July 26, 2008.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
1. F1 Section D: Specific functions of accounting & internal financial control D1. Accounting & finance functions within business D3. Internal financial.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Welcome. Contents: 1.Organization’s Policies & Procedure 2.Internal Controls 3.Manager’s Financial Role 4.Procurement Process 5.Monthly Financial Report.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Auditing Concepts.
MANAGEMENT ACCOUNTING
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process
Problem DC 10-2, Page 547 What is K? The confidence factor
for the year ended 31 December 2016
Microsoft Office Excel 2003
Presentation transcript:

End User Computer Controls Marc Engel, CPA, CISA, CFE Risk Management Advisory Services LLC Presented December 6, 2012 to the Association of International Bank Auditors Risk Management Advisory Services

Key Discussion Points Topics: (1)_Overview of Excel risks as part of the risk assessment (2)_Risks of fraud and errors; best practices to prevent and detect them (3)_Applying Change controls to Excel Objective: Consider the risks involved in controlling spreadsheets and other user directed applications. Discuss controls that can be easily implemented to meet SOX requirements for risk analysis, and establishing effective controls. RM Advisory Services

Excel Risks as Part of the Risk Analysis Background Companies that are subject to FDICIA or SOX should now be compliant for their primary computer systems and applications. It’s possible that some companies subject to FDICIA or SOX are insufficiently covering the risks inherent in user-directed apps. Many may need to tighten controls over applications such as Excel or Access. These are often used in accounting and finance departments to generate calculations or support for journal entries or business decisions. RM Advisory Services

The Problem: Inherently Weak Controls Can anyone give some personal observations of incorrect information caused by Excel use? Some of my observations: – a formula for a financial statement number using a random number generator; no documentation – budget equaled actual exactly because the preparer copied the budget numbers – New accountant changed an allocation; Regulator gave MoU. RM Advisory Services

Risks involving the use of Excel Consider these examples: An Excel spreadsheet to control fixed assets. Some Risks: – Formulas are not locked, eg. because each new purchase adds a line to the list of fixed assets. – Approvals consist of a signature on the hard copy. Excel may be used to prepare financial statements and for variance analyses; Some Risks of inaccurate information: – Lack of control over input cells, output cells, formula results, and – different versions of the spreadsheet – Consolidation worksheets – information downloaded to standardized workbook then consolidated at corporate offices RM Advisory Services

Need for Controls Could such errors appear in the financial statements and the MD&A? Even if totally innocent, whose responsibility? Consequently, lack of proper controls over such applications could result in a finding of a significant deficiency or even a material weakness. If not corrected prior to year end, this might have to be reported as an exception in the annual report. RM Advisory Services

Solution Overview COSO compliant, effective controls are easily implemented. Five basic areas to consider are: – Risk Assessment, – Limited Access, – Design and Documentation, – Change Controls, and – Monitoring. RM Advisory Services

Risk Assessment Formalized risk assessment is a required element of internal control under COSO. A company could generate a risk threshold for spreadsheets, based on a percentage of its total assets or gross revenue. Any spreadsheet generating aggregate entries over that percentage would be deemed critical. So if the gross revenue is $500m and the threshold is.1% of that, any spreadsheet generating entries of $500k in aggregate over the year would be deemed “critical” and subject to additional controls. RM Advisory Services

Risk Assessment Key steps: – Inventory all spreadsheets used to generate journal entries and supporting work papers for published financial information, and – measure them in aggregate by type of entry. In the above fixed asset example, all fixed asset entries would be aggregated to include the spreadsheet in the critical spreadsheet group, rather than excluding it based on many small individual entries it would generate. RM Advisory Services

Spreadsheet Inventory Spreadsheet inventory should have: List of all spreadsheets used for production of financial statements and numbers that support JEs. Include location, owner, main user, frequency of use. (Keep current by requiring all new spreadsheets to be registered.) Security inventory with all passwords for all sheets; Kept by IT Security. RM Advisory Services

Control Attributes Each spreadsheet’s purpose, frequency of being run, and formulas should be documented and explained on a separate tab in the workbook. Passwords should be backed up separately so if the password keeper leaves or forgets, the company still can unlock the spreadsheet. All superseded versions should be removed from the production folders. RM Advisory Services

Design and Documentation Good spreadsheet design makes a spreadsheet reliable, without constant testing or risk of error. Keypoints are: Range control, Formula control, and Password protection. Range control entails – setting up input areas, so that formulas do not need to be revised whenever data is added. This is done by – putting formulas on a separate sheet in the workbook; – putting them at the top of the page and adding data underneath. – Controling input via Excel’s excellent Forms functionality RM Advisory Services

Design and Documentation Formula controls: Formulas are locked and password protected so the user cannot change them. Only specific input areas are unlocked for the user. Formulas should be color coded to be easily recognizable. Color coding conventions (standards) should be included in the company’s procedures for designing spreadsheets. – Excel 2007 provides formats for different cell types, such as calculated cell, input, output, and others, on the Home ribbon. Best practice designs – Use one spreadsheet for a particular purpose so a new version each month (or quarter) is not needed. RM Advisory Services

Limited Access The company should set up a secure directory or folder. The network administrator limits access to – specific profiles of staff needing access to perform their duties. – Other staff members are excluded. RM Advisory Services

Limited Access Quick connections to external data In Office Excel 2007, you no longer need to know the server or database names of corporate data sources. Instead, you can use Quicklaunch to select from a list of data sources that your administrator or workgroup expert has made available for you. A connection manager in Excel allows you to view all connections in a workbook and makes it easier to reuse a connection or to substitute a connection with another one. (Excel online documentation). Using these features makes enforcing a secure download process straightforward; (documenting it as well). RM Advisory Services

Monitoring Enforcing segregation of duties – i.e. a single individual should not have rights to both prepare and enter an entire transaction. There must be an audit trail to document the review of entries. A checklist should be used and approved, to prove that all needed spreadsheets were updated timely. Off premises vacation rules to prevent override of controls > Spreadsheets are updated by other staff. RM Advisory Services

Monitoring Management can monitor spreadsheet activity since: – All spreadsheets to prepare FS or supporting info are inventoried, aggregated as to FS impact, risk rated, and all critical spreadsheets are secured. – Mid management knows which are the key spreadsheets and can enforce controls over spreadsheets. – Spreadsheets are password protected and the passwords are kept by IT security. RM Advisory Services

Change Controls Possibly contentious but consider: How would you feel about the IT staff revising your software just on the programmer’s approval? Same concept applies to your finance dept staff changing critical spreadsheets with no approval. RM Advisory Services

Change Controls Change controls block unauthorized changes, verify accuracy of changes to the spreadsheet, and enforce version control. Naming conventions lower the risk of using a superseded version. Granted that most spreadsheets will most likely be initially designed by the owner / user. Nevertheless, after a spreadsheet is designed properly, it should be password protected so the designer/ user cannot make changes. Changes should be performed in a test folder set up for this purpose and kept out of the production folders. A second person tests the spreadsheet with a pre-approved test set. The final version is forwarded to the approver who password protects it and posts it to the secure folder. RM Advisory Services

Questions? Any questions can be addressed to: Marc Engel, CPA, CISA, CFE RM Advisory Services