Download presentation
Presentation is loading. Please wait.
1
Risk based audit methodology
2
Feedback from IIA training
Compliance auditing …. and some more compliance auditing Consistent findings … Same as last year Or the same as last time With the same result
3
Client indicators Policemen image – newspaper exposure = forensic auditing Cost versus benefit questions Lack of funding and resources for IA limiting effectiveness, ensuring compliance at a minimum cost
4
Government indicators
+/- 48% of local authorities are being mismanaged Section 100 take-overs Disciplining and terminating performance contracts of senior management for not delivering services Government statements relating to values and ethics Funds will be shifted from poorly managed to effective institutions
5
Chairperson independent Majority outside department
Audit Committees Report annually on: Effectiveness of internal control Quality of management and financial reports Evaluation of financial statements Chairperson independent Majority outside department
6
Internal audit (IIA) Independent Objective Assurance Consulting Activity Add Value Improve Operations Evaluate and improve the effectiveness of risk management, control and governance processes. 22/11/2018
7
PFMA/MFMA Internal Audit must be conducted in accordance with the standards set by the IIA IA must assist in achieving the objectives by evaluating and improving the process through which: Objectives and values are established and communicated Accomplishment of objectives are monitored Accountability is ensured Corporate values are preserved.
8
Objective setting Control environment Strategic Operational Reporting
High-level goals, aligned with and supporting the entity’s mission/vision Effectiveness/efficiency of operations, performance and service delivery goals. Effectiveness of internal/external reporting -financial or non-financial. Control environment Strategic Compliance with applicable laws and regulations. Operational Within the context of the established mission or vision, management establishes strategic objectives, selects strategy and establishes related objectives, cascading through the enterprise and aligned with and linked to the strategy. Objectives must exist before management can identify events potentially affecting their achievement. Enterprise risk management ensures that management has a process in place to both set objectives and align the objectives with the entity’s mission/vision and are consistent with the entity’s risk appetite. Entity objectives can be viewed in the context of four categories: Strategic – relating to high-level goals, aligned with and supporting the entity’s mission/vision. Operations – relating to effectiveness and efficiency of the entity's operations, including performance and profitability goals. They vary based on management's choices about structure and performance. Reporting – relating to the effectiveness of the entity’s reporting. They include internal and external reporting and may involve financial or non-financial information. Compliance – relating to the entity's compliance with applicable laws and regulations. This categorization of entity objectives allows management and the board to focus on separate aspects of enterprise risk management. These distinct but overlapping categories – a particular objective can fall under more than one category – address different entity needs and may be the direct responsibility of different executives. This categorization also allows distinguishing between what can be expected from each category of objectives. Some entities use another category of objectives, “safeguarding of resources,” sometimes referred to as “safeguarding of assets.” Viewed broadly, these deal with prevention of loss of an entity’s assets or resources, whether through theft, waste, inefficiency or what turns out to be simply bad business decisions - such as selling product at too low a price, failing to retain key employees or prevent patent infringement, or incurring unforeseen liabilities. This broad-based safeguarding of assets category may be narrowed for certain reporting purposes, where the safeguarding concept applies only to the prevention or timely detection of unauthorized acquisition, use, or disposition of the entity’s assets. Reporting Prevention/ Timely detection Compliance Safeguarding of assets
9
COSO – all five components must be present and functioning before a control system can be effective
Control environment Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Risk assessment Info and commu-nication Control activity - prevention Monitoring activities - detection
10
IIA versus COSO Governance Risk Control Control environment
Information/Communication Risk management Control activities Monitoring
11
Governance process Risk Objective Process Legal mandate:
Laws and regulations Part of control environment COSO Strategic/operational Plans (SMART/CQQT)
12
Control environment Control environment = foundation for all other components of internal control Integrity, ethical values, competence of management & employees; Management's philosophy & operating style Departmental structure, CQQT, Staff and employee development programs, its process for delegating authority & responsibility.
13
Integrity and ethical values
Executive authority Legal mandate = entity wide objectives = strategic plans = business plans = job descriptions and performance agreements Effective communication to all employees Integrity and ethical values Control environment No dealings with others not demonstrating appropriate level of commitment to integrity Ethical tone at the top Properly communicated downwards Formal code of conduct Ethical standards Acceptable operational practices Conflict of interest
14
SMART Specific Measurable Achievable Relevant Timely
15
Commitment to competence
Job descriptions & performance agreements define tasks Adequate analysis of knowledge and skills needed Adequate training program
16
Accomplishment of goals monitored
Key performance objectives Key performance indicators Management information Exception reports Responsibility assigned
17
Accountability Appropriate structure Responsibility assigned
Delegation of authority consistent with assignment of responsibility Who is driving accountability? Disciplinary processes consistent
18
Human resource policies
Hire qualified staff Ethical appointments with background checks
19
Oversight groups Mechanism to monitor and review operations and programs Independent oversight
20
Values preserved Appropriate disciplinary action
Management action to address intervention/overriding control Management action to remove unethical behavior
21
CQQT Cost Quantity Quality Timelines Standard costing
Net present value Breakeven analysis Quantity Economic order quantities Quality Right quality at the right price Timelines
22
Other benefits Responsibility Quantify losses
Recovery of revenue from private sector patients Recovery of revenue from road accident fund
23
Economic order quantities
24
Economic order quantities
Useful to establish the optimal frequency and quantity which should be ordered for each stock item Formulas are built into LOGIS Based on: Cost per unit Delivery times Cost of ordering
25
EOQ – practical use Reorder levels Safety levels
26
Quantities and price Maximum stock levels Minimum stock levels
Reorder levels
27
Governance process Risk Objective Process Key measurable objectives
Laws/regs Key measurable objectives and indicators Strategic/operational Plans (SMART/CQQT) Capability – finance & human Responsibility/ accountability
28
Executive authority Hire qualified staff Ethical appointments with background checks Integrity and ethical values Commitment to competence Job descriptions & performance agreements define tasks Adequate analysis of knowledge and skills needed Adequate training program Control environment Commitment to Competence Competence reflects the knowledge and skills needed to perform assigned tasks. Management decides how well these tasks need to be accomplished weighing the entity's strategy and objectives against plans for strategy implementation and achievement of the objectives. A trade-off often exists between competence and cost – it is not necessary, for instance, to hire an electrical engineer to change a light bulb. Management specifies the competency levels for particular jobs and translates those levels into requisite knowledge and skills. The necessary knowledge and skills in turn may depend on individuals' intelligence, training and experience. Factors considered in developing knowledge and skill levels include the nature and degree of judgment to be applied to a specific job. Often a trade-off can be made between the extent of supervision and the requisite competence level of the individual. Authority and responsibility Appropriate structure Responsibility assigned Delegation of authority consistent with assignment of responsibility Disciplinary processes consistent
29
Budget and HR Budget Human resources Operational budget Capital budget
R640bn unspent Human resources Warm bodies vacant posts in government Skills 1 million people left the country since 1994
30
Become a KMI specialist
Management do not know where things go wrong Medicine theft Student bursaries School books not delivered Inefficient use of ambulances, police vehicles Invalid qualifications
31
KMO and KMI KMO KMI To ensure efficient asset management
Up to date asset registers
32
Governance process Risk Objective Process Performance measurement
Laws/regs Performance measurement Strategic/operational Plans (SMART/CQQT) Key measurable objectives and indicators Performance agreements/ Job descriptions Capability – finance & human Responsibility/ accountability
33
Control environment Executive authority Integrity and ethical values
Commitment to competence Authority and responsibility Control environment Monitoring of objectives Key performance objectives Key performance indicators Management information Exception reports Responsibility assigned Management's Philosophy and Operating Style Management's philosophy and operating style affect the way the enterprise is managed, including the kinds of risks accepted. A company that has been successful accepting significant risks may have a different outlook on enterprise risk management than one that has faced harsh economic or regulatory consequences as a result of venturing into dangerous territory. An informally managed company may control operations largely by face-to-face contact with key managers. A more formally managed one may rely more on written policies, standards of behavior, performance indicators and exception reports. Other elements of management's philosophy and operating style include preference for conservative or aggressive accounting principles, conscientiousness and conservatism with which accounting estimates are developed and attitudes toward financial reporting, information technology, business processes and personnel. The attitude and daily operating style of top management affect the extent to which actions are aligned with risk philosophy and appetite. For example, an undisciplined operating style often is associated with – and might encourage – an appetite for high risk. An effective environment does not require that risks be avoided; rather it reinforces the need to be knowledgeable about the risks associated with strategic choices and the entity’s operating environment, both internal and external. An effective environment encourages people to pursue business opportunities that align with the entity’s risk appetite. Organizational Structure An entity’s organizational structure provides the framework to plan, execute, control and monitor its activities. A relevant organizational structure includes defining key areas of authority and responsibility and establishing appropriate lines of reporting. For example, an internal audit function should be structured in a manner that achieves organizational objectivity and permits full and unrestricted access to top management and the audit committee of the board, and the chief audit executive should report to a level within the organization that allows the internal audit activity to fulfill its responsibilities. An entity develops an organizational structure suited to its needs. Some are centralized, others decentralized. Some have direct reporting relationships, others are more of a matrix organization. Some entities are organized by industry or product line, by geographical location or by a particular distribution or marketing network. Other entities, including many state and local governmental units and not-for-profit institutions, are organized by function. The appropriateness of an entity's organizational structure depends, in part, on its size and the nature of its activities. A highly structured organization with formal reporting lines and responsibilities, may be appropriate for a large entity that has numerous operating divisions, including foreign operations. However, such a structure could impede the necessary flow of information in a small entity. Whatever the structure, an entity should be organized to enable effective enterprise risk management, and to carry out its activities so as to achieve its objectives.
34
Governance process Risk Objective Process Exception reports
Laws/regs Management info Strategic/operational Plans (SMART/CQQT) Key measurable objectives and indicators Performance measurement Capability – finance & human Responsibility/ accountability Performance agreements/ Job descriptions
35
COSO versus IIA GP RA CP CE RA IC CA(preventative) M(detective)
36
Performance Measures
37
Power of measuring results (FMPPI – p1)
If you do not measure results – you cannot tell success from failure If you cannot see success, you cannot reward it If you cannot reward success, you are probably rewarding failure If you cannot see success, you cannot learn from it If you cannot recognise failure, you cannot correct it If you can demonstrate results, you can win public support
38
Planning budgeting and reporting (FMPPI - p4)
Oversight Policy development Identify desired impacts Strategic planning Specify performance indicators Operational planning and in-year reporting Set targets and allocate resources Monitor and take corrective action End-year reporting Assess and adjust I N S T U O
39
Key Performance Concepts (FMPPI – p6)
Inputs – what we use to do the work Activities – what we do Outputs – what we produce or deliver Outcomes – what we wish to achieve Impacts – results of achieving specific outcomes
40
Key Performance Information Concepts (FMPPI – p6)
41
Performance indicators (FMPPI – p7)
Key Performance Information Indicators: Reliable Well defined Verifiable Cost effective Appropriate Relevant
42
Indicators of Economy, Efficiency, Effectiveness and Equity (FMPPI – p7)
43
Types of indicators (FMPPI – p8)
Cost or price indicators Distribution indicators Quantity indicators Quality indicators Dates and time frame indicators Adequacy indicators Accessibility indicators
44
Specific focus (FMPPI – p8 & 9)
Economy indicators – cost/benefit Efficiency indicators – minimum input, maximum output Effectiveness indicators – achieving the goals and objectives Equity indicators – services provided impartially, fairly and equitably
45
Performance targets (FMPPI – pp9 & 10)
Baselines Performance targets Performance standards Criteria Specific Measurable Achievable Relevant Time-bound
46
Developing Performance Indicators (FMPPI – p11 & 12)
Step 1: Agree on what you are aiming to achieve Step 2: Specify the outputs, activities and inputs Step 3: Select the most important indicators Step 4: Select realistic performance targets Step 5: Determine the process and format of reporting performance Step 6: Establish processes and mechanisms to facilitate corrective action
47
Managing Performance Information (FMPPI – p13)
Responsibilities: - Executive authorities - Accounting officers - Line managers and other officials
48
Integrated Performance Information Structures (FMPPI – p13)
Well designed documentation Appropriate capacity to manage performance information Appropriate systems to collect, verify and store information Consultation process to include all needs Process to ensure information is used for planning, budgeting and management Processes to ensure responsibility is assigned Identified set of performance indicators for oversight
49
Reporting (FMPPI – p15 & 16) Accountability reports
Information to facilitate oversight Public access to information
50
Values are preserved Appropriate disciplinary action
Management action to address intervention/overriding control Management action to remove unethical behavior
51
PFMA AO must facilitate risk assessment to identify material risks and to evaluate the strategy for managing these risks IA must assist in maintaining effective controls, evaluating effectiveness and efficiency and develop recommendations for improvement.
52
Understand risk management
Underlying premise - every entity exists to provide value for its stakeholders. All entities face uncertainty, Challenge for management -determine how much uncertainty is acceptable as it strives to grow stakeholder value. Uncertainty presents both risk and opportunity, with the potential to erode or enhance value. I M P A C T Likelihood
53
I agree with finding, will implement recommendation Yes/No
2 week audit I M P A C T Likelihood Reasons: 1. 2. 3. Audit report Risk assessment Audit report Criteria Condition Cause Effect Recommendation Management comment I agree with finding, will implement recommendation Yes/No I accept the risk Yes Reasons: 1. 2. 3.
54
Sample sizes Express opinion on adequacy and effectiveness
Sample size 30 transactions Select 1, first one is wrong, do I have to do the other 29??
55
Sample sizes - automated
One is enough System must perform consistently!!
56
Sample size – Old lady People make mistakes! One is not enough
Determine after how many mistakes will your audit opinion be changed from adequate and effective ti adequate, but ineffective. That number is enough!! If the same root cause is causing repetitive instances of non-compliance, one is enough!!
57
International standard
Select 30 transactions USA and Eskom Some departments select 25 – banks, muni’s
58
Risk assessment Management should identify and analyze the risks of achieving its objectives and determine how to manage risks that may result from internal and external sources, such as changes in economic, industry, regulatory, and operating conditions.
59
Risks Inherent risks Control risks
60
Inherent Risk – risk of not achieving objectives
Strategic risk Risk Objective Process Inherent risk – before the assessment of any controls
61
Dept of Education 68% pass rate versus national average of 80%
Transport Teachers – qualifications and absenteeism LSM Infrastructure
62
Management agenda Items on inherent risk assessment should be on management agendas Also on Internal audit plans
63
Risk & recommendations
Effect – reasons for a high impact focus: Audit objectives Fieldwork Recommendations I M P A C T x Likelihood Root cause – reasons for high likelihood focus: Audit objectives Field work Recommendations
64
Risk management in stock control – ABC inventory management
65
ABC inventory management
Line items graded based on quantities kept A-Items - high monetary value, not high quantities are tightly controlled and monitored - never stock outs on A items B-items require less control and monitoring, lower monetary value and quantities, stock is kept on hand C-items are only ordered when requested by clients
66
ABC inventory management
Determine the average investment in each item Express as a percentage of the total value of inventory Classify in groups
67
ABC - example Item code Average investment % average units ABC system
1 1 700 21.3% A 2 270 3.4% C 3 1 440 18.1% 4 720 9.0% B 5 3 300 41.4% 6 540 6.8% Totals 7 970 100%
68
risk index = severity X likelihood
4 3 2 1 5 10 15 20 25 8 12 16 6 9 1 2
69
Risk management strategy
4 8 3 6 9 2 1 5 15 20 25 12 16 10 unacceptable risks acceptable risks
70
Control to minimize risks
Inherent risk Residual risk Objective Process Control Residual risk – after the assessment of any controls
71
Control activities Management develops policies & procedures to ensure that directives are followed & that necessary actions are taken to address risks that would impede achieving its objectives. Control activities include authorization, verification, reconciliation, review of operating performance, security of assets, & segregation of duties.
72
Control activities Safeguarding of assets
Compliance with laws, regulations, contracts Accomplishment of objectives Economy, efficiency and effectiveness Reliability and integrity of information
73
Internal control as per traditional IIA definition
22/11/2018
74
Definition of internal control
Document your definition of internal control. What does it include?
75
Internal control - SCARE
Safeguarding of assets Compliance with laws, regulations and contracts Accomplishment of objectives Reliability and integrity of information Economy, efficiency and effectiveness
76
Safeguarding of assets
Physical safeguards Access control Segregation of duties
77
Compliance Laws and regulations Policies and procedures
Contractual obligations
78
Accomplishment of objectives
Strategic plans Operational plans Key measurable objectives Key measurable indicators Management information Exception reporting
79
Reliability and integrity of information
Validity Accuracy Completeness Timely
80
3 x E’s Economy Effectiveness Efficiency
81
Monitoring Management monitor internal control structure through ongoing monitoring activities and through separate evaluations. Scope/ sequence of separate evaluations depend on assessment of risks & effectiveness of ongoing monitoring procedures. Internal control deficiencies reported upstream & serious matters reported to management / Cabinet
82
Detection controls We are drowning in information,
but starved of knowledge. We receive unfiltered information. Detection not a priority
83
Control risk assessment
Remember SCARE??? Safeguarding of assets Compliance with laws ….. Accomplishment of objectives Reliability and integrity of information Economy effectiveness and efficiency
84
Control risk - S Inadequate/ineffective physical safeguarding
Inadequate/ineffective access control Inadequate/ineffective segregation of duties
85
Control risk - C Non-compliance with laws and regulations
Non-compliance with policies and procedures Non-compliance with contractual obligations
86
Control risk - A Inadequate strategic plan
Inadequate operational plans Inadequate/ineffective key measurable objectives Inadequate/ineffective key measurable indicators Inadequate/ineffective management information Inadequate/ineffective exception reporting
87
Control risk - R Inadequate/ineffective processes to prevent:
Invalid processing Inaccurate processing Incomplete processing Untimely processing
88
Control risk - E Ineffective processes Inefficient process
Uneconomic processes
89
Objective Risk I L A Control Type Preventative/ Detective Nature Manual/ IT CAA CEA S Inadequate physical safeguards Inadequate access control Inadequate segregation of duties C Inadequate process to ensure compliance with laws/regs Inadequate process to ensure compliance with contracts R Inaccurate … Incomplete…. Invalid/unauthorised…. Untimely ….. E Ineffective ….. Inefficient …. Uneconomic ….
90
COSO – all five components must be present and functioning before a control system can be effective
Control environment Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Risk assessment Info and commu-nication Control activity - prevention Monitoring activities - detection
91
Audit objectives To evaluate the adequacy and effectiveness
of the internal control systems that ensures S C R E
92
Audit objectives To evaluate the adequacy and effectiveness
of the internal control systems (choose prevention, detection or correction) that ensures S C R E
93
Audit objectives To evaluate the adequacy and effectiveness
of the prevention controls that ensures R – reliability and integrity of information
94
Audit objectives To evaluate the adequacy and effectiveness
of the controls that ensures R – reliability and integrity of the purchase order
95
Risks Inaccurate purchase order Incomplete purchase order
Unauthorized purchase order Untimely purchase order
96
Inaccurate purchase orders
Preventative control Detection control
97
Unauthorized purchase orders
Preventative control Detection control
98
Untimely purchase orders
Preventative control Detection control
99
Inaccurate purchase orders
Preventative control Detection control
100
COSO – all five components must be present and functioning before a control system can be effective
Control environment Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Risk assessment Info and commu-nication Control activity - prevention Monitoring activities - detection
101
Risk response before risk reduction after likelihood 5 4 3 2 1 1 2
1 2 severity risk reduction before after
102
Control assessment R > C Inadequate Risk C > R Inefficient
Objective Process Control C = R Adequate/effective CoC > CoR Uneconomic
103
Example
104
Practical exercise Process overview flowchart SCRE Audit objective
Risk areas Preventative and detection controls Audit opinion
105
INPUT PROCESSING OUTPUT Phone call with password to cell phone
Enter data Bank EDI INPUT Application program PROCESSING Suppliers master file OUTPUT Exception reports number of changes the change details to supplier Exception reports Frequency
106
DOCUMENTATION INPUT PROCESSING OUTPUT Purchase order
Goods received note, supplier delivery note, invoice Cheque payment/ EFT requisition Enter data Enter data INPUT Application program PROCESSING Purchase transaction file Cash disbursement transaction file General ledger transaction file Cheque General ledger summary Exception reports and KPI’s Purchase journal OUTPUT Remittance advice Disbursements journal Suppliers master file Accounts payable master file General ledger master file
107
S C R E S C R E S C R E S C R E S C R E S C R E
Purchase order S C R E Goods received note, supplier delivery note, invoice S C R E Enter data S C R E Application program S C R E Purchase transaction file S C R E Suppliers master file S C R E
108
To evaluate the adequacy and effectiveness of the controls relating to reliability and integrity of:
Asset count forms Asset removal forms Capturing Processing Updating the fixed asset register
109
E S S R R R R Purchase order
Goods received note, supplier delivery note, invoice S Enter data S R Application program R Purchase transaction file R Suppliers master file R
110
Lesotho objective To verify the correctness of the requested amount of M15m To check the adequacy of internal controls in place To make recommendations based on the findings
111
Audit objective To evaluate the adequacy and effectiveness of controls relating to: Safeguarding of assets in the goods received area Reliability and integrity of information in the: Capturing phase Processing phase Updating the PTF Updating the SMF Economic, effective and efficient use of resources in the ordering phase
112
Audit opinion The controls relating to:
Safeguarding of assets in the goods received area Reliability and integrity of information in the: Capturing phase Processing phase Updating the PTF Updating the SMF Economic, effective and efficient use of resources in the ordering phase Are adequate and effective
113
Audit objective To evaluate the adequacy and effectiveness of controls relating to: Safeguarding of assets (access control) Allocation of unique supplier profile passwords in the capturing phase Reliability and integrity of information in the: Capturing phase Processing phase Updating the SMF Exception reports (quantity and frequency) confirmations
114
Audit opinion The controls relating to:
Safeguarding of assets (access control) Allocation of unique supplier profile passwords in the capturing phase To the availability of the suppliers file Reliability and integrity of information in the: Capturing phase Processing phase Updating the SMF Exception reports (quantity and frequency) confirmations Are adequate and effectiveness
115
Risks – 22 in total Inadequate physical safeguarding of assets/ access control/ segregation of duties [3] Inaccurate capturing/processing updating of PTF and SMF [4] Incomplete capturing/processing updating of PTF and SMF [4] Invalid capturing/processing updating of PTF and SMF [4] Untimely capturing/processing updating of PTF and SMF [4] Uneconomic, ineffective, inefficient use of resources in the purchase order phase [3]
116
Two ways of auditing IT Around the computer – IT auditing for non-IT auditors Through the computer – IT specialist
117
Data capture controls Data capture = manual procedure – covers initiation, approval, authorisation, review and preparation of documents for source transactions User department function Both batch and on-line entry systems Designed to ensure reliability and integrity of data before data enter the computer application system
118
Data capture controls - risks
Accounting system Valid and completed source transactions may be omitted from data capture Inaccurate source data Inaccurate capturing/cut-off of source transactions Inaccurate valuation/ classification of source data Invalid source transaction Control procedures Valid and completed source transaction may be captured more than once Errors may not be properly detected corrected and resubmitted Source transactions may be unauthorized Source transaction may be lost
119
Types of controls Prevention Detection Correction
120
Prevention objectives
To ensure reliability and integrity of information (R) To ensure proper safeguarding of assets (S) To ensure reliable, accurate and complete, authorized, approved and secure source data Application controls user procedure manuals, source document design, pre-numbering, sound personnel practices, identification of preparer evidence of approval forms security – unused and document management, segregation of duties
121
User procedure manual Written procedures – encourage consistent performance of data capture responsibilities Include: Guidelines for documentation preparation Flow of documents within dept and to data processing Schedules for data capturing and cut-off dates Requirements for control over data prior to transmittal to data processing Scope of management review and approval of work performed Names of individuals authorized to review and approve documents Identification of proper evidence of approval
122
Source document design
Use of special formats and preprinted data to ensure conformity of work performed to written procedures Special formats = use of specific boxes for authorisation signatures, control totals, footing and cross-footing balances and retention dates Preprinted data = include repetitive items such as form number and title, department responsibility, transaction code and product number Conformity = completeness, accuracy and proper authorisation
123
Pre-numbering Unique identification of transactions
Reduce likelihood that a transaction will be lost or omitted
124
Sound personnel practices
Ensure hiring of competent personnel Continuing evaluation of individual performance Periodic rotation of assignments Required vacations Bonding of key personnel
125
Identification of preparer
Identification provided by Signature Initials Employee number Terminal entry Sign-on codes Logs of physical access to terminals Increases the likelihood that segregation of duties is followed
126
Evidence of approval Authorized signatory
If no source document = review and approval may be subsequent review of transaction source listing or approval during data entry Authorized signature on source listing = evidence of subsequent approval Terminal entry = approval code in transaction record
127
Forms security Physical controls over forms
Signatures for the release of forms for source document preparation Reduce likelihood of unauthorized or invalid transactions
128
Segregation of duties Four types of separation
Custody of assets from data capture function Authorisation of transactions from custody of related assets Functions of transaction authorisation and source document preparation Error correction from initiation and source document preparation Reduced the likelihood of un-intentional errors
129
Detection objectives To ensure that unreliable, improper, unauthorized, invalid or lost source data are detected Application controls Batch controls User review
130
Batch controls Batch number – keep track of receipt or transmittal of batches Limiting number of transactions in batch – facilitates reconciliation when batch is out of balance Control totals for number of transactions, amounts, quantities in batch – permits subsequent discovery of loss of items/changes in data – accommodated by reconciliation of source data control totals with output upon completion of processing Control totals usually recorded manually by user in control log Log records time and place of batch transmittal and receipt – attached transmittal ticket – controls flow of data from one user to another
131
User review Manual review performed by the user prior to transmittal of data Purpose = to check source documents, transmittal tickets, control logs for completeness, accuracy, conformity with department policy
132
Correction objectives
To ensure that unreliable, improper, unauthorized or invalid source data are, if appropriate, corrected and resubmitted for data capture Error correction procedures Audit trail
133
Error correction procedures
Written error correction procedures should include: Description of common errors Correction procedures Directions for resubmitting transactions Resubmitted source documents – reviewed for errors in same way than documents after initial preparation Entry in error log for each erroneous source document. Should include: Batch number Transaction number Cause of error Date of occurrence Date of correction and resubmission Initials of user personnel Review of log will show that errors have been corrected and resubmitted on a timely basis
134
Audit trail for data capture
Consists of copy of source documents or a listing of source transactions Source document can be manually prepared during data capture or printed by the terminal as a byproduct of transaction processing Auditor will trace original source documents filed by batch (normally sequentially filed) Where no source documents are used - source list produced as audit trail Auditor will use computer to reference source lists on disk or tape
135
Information/communication
Objective setting Event identification Risk assessment Risk response Control environment Control activities Information/communication There is also effective communication and exchange of relevant information with external parties, such as customers, suppliers, regulators and shareholders. Information is needed at all levels of an organization to identify, assess and respond to risks, and to otherwise run the entity and achieve its objectives. An array of information is used, relevant to one or more objectives categories. Information comes from many sources – internal and external, and in quantitative and qualitative forms – and allows enterprise risk management responses to changing conditions in real time. The challenge for management is to process and refine large volumes of data into actionable information. This challenge is met by establishing an information systems infrastructure to source, capture, process, analyze and report relevant information. These information systems – usually computerized but also involving manual inputs or interfaces – often are viewed in the context of processing internally generated data relating to transactions. Information systems have long been designed and used to support business strategy. This role becomes critical as business needs change and technology creates new opportunities for strategic advantage. To support effective enterprise risk management, an entity captures and uses historical and current data. Historical data allow the entity to track actual performance against targets, plans and expectations. It provides insights into how the entity performed under varying conditions, allowing management to identify correlations and trends and to forecast future performance. Historical data also can provide early warning of potential events that warrant management attention. Present or current state data allow an entity to assess its risks at a specific point in time and remain within established risk tolerances. Current state data allow management to take a real-time view of existing risks inherent in a process, function or unit and to identify variations from expectations. This provides a view of the entity’s risk profile, enabling management to alter activities as necessary to calibrate to its risk appetite. Information is a basis for communication, which must meet the expectations of groups and individuals, enabling them to effectively carry out their responsibilities. Among the most critical communications channels is that between top management and the board of directors. Management must keep the board up-to-date on performance, developments, risks and the functioning of enterprise risk management, and other relevant events and issues. The better the communication, the more effective the board will be in carrying out its oversight responsibilities, in acting as a sounding board on critical issues and in providing advice, counsel and direction. By the same token, the board should communicate to management what information it needs and provide feedback and direction. Management provides specific and directed communication addressing behavioral expectations and the responsibilities of personnel. This includes a clear statement of the entity’s enterprise risk management philosophy and approach and delegation of authority. Communication about processes and procedures should align with, and underpin, the desired risk culture. In addition, communication should be appropriately “framed” – the presentation of information can significantly affect how it is interpreted and how the associated risks or opportunities are viewed. Communication should raise awareness about the importance and relevance of effective enterprise risk management, communicate the entity’s risk appetite and risk tolerances, implement and support a common risk language, and advise personnel of their roles and responsibilities in effecting and supporting the components of enterprise risk management. Communications channels also should ensure personnel can communicate risk-based information across business units, processes or functional silos. In most cases, normal reporting lines in an organization are the appropriate channels of communication. In some circumstances, however, separate lines of communication are needed to serve as a fail-safe mechanism in case normal channels are inoperative. In all cases, it is important that personnel understand that there will be no reprisals for reporting relevant information. External communications channels can provide highly significant input on the design or quality of products or services. Management considers how its risk appetite and risk tolerances align with those of its customers, suppliers and partners, ensuring that it does not inadvertently take on too much risk through its business interactions. Communication from external parties often provides important information on the functioning of enterprise risk management. Pertinent information – from internal and external sources – must be identified, captured and communicated in a form and timeframe that enable personnel to carry out their responsibilities. Effective communication also occurs in a broader sense, flowing down, across and up the entity.
136
Risk and control matrix
Best practice Control activity SCO Risk CAA Safeguard goods received Inadequate physical security over goods received Maintain physical security over goods received Segregate custodial and record keeping functions
137
Added value opportunity
Control analysis Added value opportunity Control activity Prevention Detection IT Manual Maintain physical security over goods received Segregate custodial and record keeping functions Computerise to increase efficiency, economy, effectiveness IT management information allows for effective detection controls Detection control allows development of prevention controls
138
Added value x x = Added value Inadequate controls Recommendation I M P
Likelihood I M P A C T x Likelihood = Added value
139
Audit report - finding Finding Clear Concise Factual Inadequate
Inefficient Ineffective Uneconomic
140
Determine the causes Determine what circumstances, if any, caused identified weaknesses. Consider materiality of effect, before spending much time determining causes. Determine if participants understand both purpose of and their role Determine if relationship between accounts payable process and other department processes is clear. If process occurs at multiple locations, determine nature and scope of communication and coordination among components.
141
Determine the causes Determine if accounts payable process has adequate human, rand, time, and asset resources. If inadequate, determine if resources have been allocated according to materiality of accounts payable process relative to other processes. Negative trends in reports used to monitor outcome(s) - determine if reports are communicated to and used by appropriate parties to modify process. Determine what internal or external constraints or barriers, if any, must be removed in order to overcome these identified weaknesses. Review applicable laws or regulations to determine if any of them prevent necessary changes from being made in the accounts payable process.
142
Determine the effect Compare actual process to a recommended alternative process(es) and determine if each weakness in department process is material. Materiality can be measured by comparing the rand cost, impact on economy, risks, etc. of actual process to recommended alternative process(es). Measurements can be quantitative, qualitative, or both. Identify benchmarks (industry standards, historical internal data, other comparable departments, etc.) for process in question and compare to actual performance. Measure difference, if possible. Include cost of additional controls or changes in process.
143
Determine the effect Estimate cost of the actual process and alternative process(es) and compare. Estimate quantity and/or quality of services provided by actual process and by alternative process(es) and compare. Identify risks associated with actual process and with alternative process(es). Measure and compare the risks.
144
Develop recommendations
Develop specific recommendations to correct weaknesses identified as material. In developing recommendations, consider tailored criteria, kind of process and control weaknesses identified, causes and barriers, effects, and additional resources Solicit solutions and recommendations from client. Identify alternative solutions used by other business units. Identify solutions for removing barriers. Provide general guidelines as to objectives each solution should meet; then the department can tailor the solution to its specific situation. Provide specific information, if available, on how each recommendation can be implemented.
145
Cause – directs recommendation
P A C T Likelihood Root cause of the finding What was inherent risk? Did management agree? Root cause? Lack of budget/staff/skills? Inadequate detection Inadequate management information systems Lack of responsibility and accountability Infrastructure
146
Effect Effect What is the effect? How will it be changed?
M P A C T Likelihood Effect What is the effect? How will it be changed? How will it be monitored? Does it reduce accountability?
147
Recommendation Recommendation = responsibility
Recommendation - teamwork real time-online detection focused reduce risk change likelihood/root cause reduce effect/impact enhance effectiveness, efficiency and economic use of resources assign responsibility
148
Accept recommendation
Management comment Accept recommendation Accept the risk AN AUSTRALIAN STUDY INDICATED THAT ON AVERAGE, 10% OF PEOPLE WILL NEVER STEAL – WHILST 10% OF PEOPLE WILL ALWAYS STEAL. THE MAJORITY OF US IS INFLUENCED BY THE STRONGER OF THE TWO 10%’S. THE ISSUE FORMS THE BACK-BONE OF THE PRINCIPLES OF VALUES AND CONFORMANCE – WHICH I WILL RETURN TO LATER. ONE CHALLENGE TO INTERNAL AUDITORS TODAY IS THE FACT THAT CRIME PAYS! AND THE PENALTY OF THOSE CRIMES SEEM TO BE MANAGEABLE, AS ANY OTHER RISK IN NORMAL BUSINESS ACTIVITIES
149
Audit report - recommendation
Inadequate Recommend new control that change effect residual risk Measure change Inefficient Difference between basic control and best practice Measure change Ineffective Non compliance Cause Disciplinary action Cost and benefit
150
Audit report How to fix it What? When? Who? Accept? What? When? Who?
Cause and effect Management Comment Criteria Condition Recommendation How to fix it What? When? Who? Accept? What? When? Who?
151
Benchmark and review by DD Final draft audit report
Audit report - process Finding worksheet effectiveness – IA adequacy - AD Review by AD Benchmark and review by DD Final audit report Auditee Comments Final draft audit report Quality control Audit report
152
Audit opinion The prevention controls that ensures
R – reliability and integrity of information are adequate and effective
153
COSO – all five components must be present and functioning before a control system can be effective
Control environment Safeguard assets Compliance with laws, regulations, contracts Reliability and integrity of information Economy, effectiveness and efficiency Risk assessment Info and commu-nication Control activity - prevention Monitoring activities - detection
154
Audit opinion - adequacy & efficiency
Controls are Efficient Inefficient Adequate 1 2 Partially adequate 3 4 Inadequate N/A 5/6
155
Accept the recommendation or accept the risk!
Audit report Title of the finding Root cause analysis Criteria Condition Cause Effect Include in job descriptions! Responsibility Accountability Management Comment Recommendation Finding Accept the recommendation or accept the risk!
156
Follow up Follow up audit Audit scope and objectives
Document system (POF) Follow up audit Identify weaknesses No compliance work Recommendations Adequate controls Inadequate opinion Likelihood assessment Likelihood assessment Effectiveness audit ADD VALUE
157
Follow up Identify the Scope for the Follow-up Audit
Select the Sample Size and Items to be Tested Execute the Audit Work Develop Informal Queries and Discuss with the Client Report to Management
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.