Download Accounting Information Systems and Internal Controls

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Operations management wikipedia , lookup

Investment management wikipedia , lookup

Corporate governance wikipedia , lookup

Control chart wikipedia , lookup

The Modern Corporation and Private Property wikipedia , lookup

Internal communications wikipedia , lookup

Compliance and ethics program wikipedia , lookup

Transcript
Chapter 10
Accounting
Information
Systems and
Internal Controls
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Learning Objectives
• LO#1 Explain essential control concepts and why a
code of ethics and internal controls are important.
• LO#2 Explain the objectives and components of the
COSO internal control framework and the COSO
enterprise risk management framework.
• LO#3 Describe the overall COBIT framework and its
implications for IT governance.
• LO#4 Describe other governance frameworks related
to information systems management and security.
10-2
Ethics, Sarbanes Oxley Act 2002 and
Corporate Governance
LO# 1
The Need for a Code of Ethics
• Ethical behavior prompted by a code of ethics can be
considered a form of internal control.
• Employees with different culture backgrounds are
likely to have different values
• Many professional associations have developed
codes of ethics to assist professionals in selecting
among decisions that are not clearly right or wrong.
10-3
LO# 1
Sarbanes Oxley Act 2002
• SOX requires public companies registered with the
SEC and their auditors to annually assess and report
on the design and effectiveness of internal control
over financial reporting.
• Established the Public Company Accounting
Oversight Board (PCAOB) to provide independent
oversight of public accounting firms.
• PCAOB Auditing Standard No. 5 (AS 5) encourages
auditors to use a risk-based, top-down approach to
identify the key controls.
10-4
LO# 1
Corporate Governance
• A set of processes and policies in managing an
organization with sound ethics to safeguard the
interests of its stakeholders.
• Promotes accountability, fairness, and transparency
in the organization’s relationship with its
stakeholders.
10-5
LO# 1
Overview of Control Concepts
Three main functions of internal control:
• Preventive controls deter problems before they arise.
(Authorization)
• Detective controls find problems when they arise. (Bank
reconciliations and monthly trial balances)
• Corrective controls fix problems that have been identified. (Backup
files to recover corrupted data)
Computerized environment:
• General controls pertain to enterprise-wide issues such as controls
over accessing the network, developing and maintaining
applications, documenting changes of programs, etc.
• Application controls are specific to a subsystem or an application to
ensure the validity, completeness and accuracy of the transactions.
10-6
Commonly used Internal Control
Frameworks
LO# 2
• The SEC requires management to evaluate internal
controls based on a recognized control framework
• COSO Internal Control framework
-COSO-Committee of Sponsoring Organizations of
the Treadway Commission.
-AAA, AICPA, FEI, IIA, and IMA
-The COSO Internal Control framework is one of the
most widely accepted authority on internal control,
providing a baseline for evaluating, reporting, and
improving internal control.
10-7
Commonly used Internal Control
Frameworks
LO# 2
• COSO 2.0
• COSO ERM framework: focuses on the strategic
alignment of the firm’s mission with its risk appetite.
• Control Objectives for Information and related
Technology (COBIT): a control framework for the
governance and management of enterprise IT.
• Information Technology Infrastructure Library (ITIL): a set
of concepts and practices for IT service management.
• International Organization for Standardization (ISO)
27000 Series: address information security issues.
10-8
LO# 2
COSO Internal Control Framework (COSO 2.0)
1. Internal control is a process consisting of ongoing
tasks and activities. It is a means to an end, not an
end in itself.
2. Internal control is affected by people. It is not merely
about policy manuals, systems and forms. Rather, it is
about people at every level of a firm that impact
internal control.
3. Internal control can provide reasonable assurance,
not absolute assurance, to an entity’s management
and board.
4. Internal control is geared toward the achievement of
objectives in one or more separate but overlapping
categories.
5. Internal control is adaptable to the entity structure.
10-9
LO# 2
COSO Internal Control Framework (COSO 2.0)
Three categories of objectives:
• Operations Objectives – effectiveness and efficiency
of a firm’s operations on financial performance goals
and safeguarding assets
• Reporting Objectives – reliability of reporting,
including internal and external financial and nonfinancial reporting
• Compliance Objectives – adherence to applicable
laws and regulations
10-10
LO# 2
COSO 2.0
Five components of internal control:
1. Control Environment
2. Risk Assessment
3. Control Activities
4. Information and Communication
5. Monitoring Activities
10-11
COSO Enterprise Risk Management—
Integrated Framework
LO# 2
10-12
LO# 2
COSO Enterprise Risk Management—
Integrated Framework
Four categories of objectives:
• Strategic — high-level goals, aligned with and
supporting the firm’s mission and vision
• Operations — effectiveness and efficiency of
operations
• Reporting — reliability of internal and external
reporting
• Compliance — compliance with applicable laws and
regulations
10-13
COSO Enterprise Risk Management—
Integrated Framework
LO# 2
Eight components of internal control:
•
•
•
•
•
•
•
•
Internal Environment
Objective Setting
Event Identification
Risk Assessment
Risk Response
Control Activities
Information and Communication
Monitoring
10-14
LO# 2
Risk Assessment and Risk Response
• Inherent risk : It exists already before management takes any
actions to address it.
• Control risk : the threat that errors or irregularities in the
underlying transactions will not be prevented, detected and
corrected by the internal control system.
• Residual risk: the product of inherent risk and control risk
(1) Reduce risks by designing effective business processes and
implementing internal controls.
(2) Share risks by outsourcing business processes, buying insurance, or
entering into hedging transactions.
(3) Avoid risks by not engaging in the activities that would produce the
risk.
(4) Accept risk by relying on natural offsets of the risk within a
portfolio, or allowing the likelihood and impact of the risk.
10-15
LO# 2
Risk Assessment and Risk Response
• Cost and benefit analysis is important in determining
whether to implement an internal control.
• The benefits of an internal control should exceed its
costs.
• One way to measure the benefits of a control is using
the estimated impact of a risk times the decreased
likelihood if the control is implemented.
• Expected benefit of an internal control = Impact X
Decreased Likelihood
10-16
LO# 2
Control Activities
• Physical Controls: mainly manual but could involve
the physical use of computing technology.
• IT controls: processes that provide assurance for
information and help to mitigate risks associated
with the use of technology.
• -- IT general controls (ITGC)
• -- IT application controls
10-17
LO# 3
COBIT Framework
• COBIT (Control Objectives for Information and
related Technology) is a generally accepted
framework for IT governance and management.
• Governance:
firm objectives: evaluating stakeholder needs
setting direction through decision making
monitoring performance, compliance and progress
• Management:
activities: planning, building, running and
monitoring
10-18
LO# 3
COBIT Framework
• Provides a business focus to align business and IT
objectives;
• Defines the scope and ownership of IT process and control;
• Is consistent with accepted IT good practices and
standards;
• Provides a common language with a set of terms and
definitions that are generally understandable by all
stakeholders; and
• Meets regulatory requirements by being consistent with
generally accepted corporate governance standards (e.g.,
COSO) and IT controls expected by regulators and auditors.
10-19
Information Technology Infrastructure
Library (ITIL)
LO# 4
• A de facto standard in Europe for the best practices
in IT infrastructure management and service delivery.
• ITIL’s value proposition centers on providing IT
service with an understanding the business
objectives and priorities, and the role that IT services
has in achieving the objectives.
• ITIL adopts a lifecycle approach to IT services, and
organizes IT service management into five high-level
categories.
10-20
International Organization for
Standardization (ISO) 27000 Series
LO# 4
• The ISO 27000 series of standards are designed to
address information security issues.
• ISO 27000 series, particularly ISO 27001 and ISO
27002, have become the most recognized and
generally accepted sets of information security
framework and guidelines.
• The main objective of the ISO 27000 series is to
provide a model for establishing, implementing,
operating, monitoring, maintaining, and improving
an Information Security Management System (ISMS).
10-21