41
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

  • View
    275

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Page 2: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Execution Risks: Revenue Cycle

Generic execution risks for each of the two revenue cycle transactions:

1.Delivering goods/services: Unauthorized

sale/service permitted Authorized sale/service

did not occur, occurred late, or was duplicated unintentally

Wrong type of product/service

Wrong quantity/quality Wrong

customer/address

Page 3: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Execution Risks: Revenue Cycle

Generic execution risks for each of the two revenue cycle transactions:

2. Collecting cash: Cash not collected or

collected late Wrong amount of

cash collected

Page 4: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Execution Risks: Acquisition Cycle

Generic execution risks for each of the two acquisition cycle transactions:

1. Receiving goods/services: Unauthorized

goods/services received Expected receipt of

goods/services did not occur, occurred late, or was duplicated unintentionally

Wrong type of product or service received

Wrong quantity/quality Wrong supplier

Page 5: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Execution Risks: Acquisition Cycle

Generic execution risks for each of the two acquisition cycle transactions:

2. Making payment: Unauthorized

payment Cash not paid, paid

late, or duplicate payment

Wrong amount paid Wrong supplier paid

Page 6: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Execution Risks: Revenue & Acquisition Cycles

Understanding and assessing execution risks – 5 steps:

Step 1. Achieve understanding of the processes

Step 2. Identify the at-risk goods/services provided and cash received

Step 3. Restate generic risk to describe the execution risk more precisely for process under study - exclude irrelevant/immaterial risks

Page 7: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Execution Risks: Revenue & Acquisition Cycles

Understanding and assessing execution risks – 5 steps:

Step 4. Assess the significance of remaining risks

Step 5. Identify factors that contribute to each significant risk – use events in the process to systematically identify factors

What control activities could be implemented to mitigate the risks?

Page 8: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

2 categories of information systems risks: Recording risks Updating risks

Page 9: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

The process of recording and updating information – both a risk and a control Risk - information will be

recorded incorrectly, perhaps resulting in transaction errors and incorrect financial statements

Control – when information is correct because recorded information is used to control transactions

Page 10: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

Recording risks: Risks that event

information is not captured accurately in an organization’s information system

Errors in recording can cause substantial losses

Recording events late can cause opportunity losses

In the acquisition cycle, recording errors can result in overpaying bills or loss of credit from failure to pay

Page 11: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

Recording risks: Revenue/acquisition cycles

- generic recording risks Event recorded never

occurred Event not recorded,

recorded late, or duplication of recording

Wrong product/service recorded

Wrong quantity/price recorded

Wrong external/internal agent recorded

Wrong recording of other data

Page 12: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

Recording risks: Identifying recording

risks – 3 stepsStep 1. Achieve an

understanding of the process under study - identify the events

Step 2. Review events - identify where data are recorded in a source document or a transaction file

Page 13: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

Recording risks: Identifying recording risks

– 3 steps Step 3. For each event

where data are recorded in a source document or transaction record: Consider the preceding generic recording risks

Restate each generic risk to describe the risk more precisely for the particular event under consideration

Exclude any risks that are irrelevant or immaterial

Page 14: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

Updating risks: Risks that summary

fields in master records are not properly updated

Update failures can be costly

Errors in updates can reduce the effectiveness of controls over the general ledger balances for assets and liabilities

Page 15: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

Updating risks: Generic risks

Update of master record omitted or unintended duplication of update

Update of master record occurred at the wrong time

If updates are scheduled, users need to know and schedule needs to be followed

Summary field updated by wrong amount

Wrong master record updated

Page 16: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

Identifying pdating risks:

3 stepsStep 1. Identify

recording risks Step 2. Identify the

events that include update activity and the summary fields in updated master files

Page 17: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Assessment of Information Systems Risks

Identifying update risks: 3 steps

Step 3. For each event in updated master file

Consider the preceding generic update risks

Restate each generic risk to describe the update risk more precisely for the particular event under consideration

Exclude any update risks that are irrelevant or immaterial

Page 18: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Recording and Updating in the General Ledger System

The General_Ledger File stores reference and summary data about the general ledger accounts.

The process of updating a general ledger account is sometimes referred to as “posting.”

Page 19: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Recording and Updating in the General Ledger System

Risks in recording and updating information in a general ledger system:

Risks Wrong general ledger

account recorded Wrong amounts

debited/credited General ledger master

record not updated at all, updated late, or updated twice

Wrong general ledger master record updated

Page 20: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Recording and Updating in the General Ledger System

Risks in recording and updating information in a general ledger system:

Important to internal control: Policy for updating general

ledger accounts should be well understood.

Often, general ledger balances are updated after a batch of transactions, not with each transaction

Page 21: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Recording and Updating in the General Ledger System

Risks in recording and updating information in a general ledger system:

Important to internal control: Employees need to

know: Under the batch process, general ledger account balances are temporarily out of date

When updates are made

Page 22: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Recording and Updating in the General Ledger System

Controlling risks: Identify significant risks

of losses or errors Consider ways to control

the risks Accountants, external

auditors, or internal auditors evaluate existing controls and suggest additional controls where warranted

Page 23: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities The policies and

procedures to address risks to achievement of the organization’s objectives

Manual or automated May be implemented at

various levels of the organization.

4 types of controls: Workflow controls Input controls General controls Performance reviews

Page 24: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

Workflow controls: Used to control a

process as it moves from one event to the next

Exploit linkages between events

Focus on: Responsibilities for

events Sequence of events Flow of information

between events in a business process

Page 25: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

Workflow controls: Segregation of duties Use of information from

prior events to control activities

Required sequence of events

Follow-up on events Sequence of prenumbered Recording of internal

agent(s) accountable for an event in a process

Limitation of access to assets and information

Reconciliation of records with physical evidence of assets

Page 26: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

1. Segregation of duties: Organizations make an

effort to segregate: Authorization of events Execution of events Recording of event

data Custody of resources

associated with the event

The overview activity diagram is best suited to understanding and documenting segregation of duties

Page 27: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

2. Use of information about prior events:

Information about prior events can come from documents or computer records.

2 examples of information from computer files: Checking summary data

in master files to authorize events

Transaction records may help control events - similar to using documents before approving an invoice

Page 28: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

3. Required sequence of events:

Often, organizations - Have policies requiring

a process to follow a particular sequence

Require a sequence of events without having prior recorded information to rely on

Page 29: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

4. Follow-up on events:Organizations: Need automated or manual

way to review transactions not yet concluded

Should have “open” item or aging reports to identify events needing follow up

Can design/use routine reports to flag unfinished business

Can querying a database for status reports

Page 30: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

5. Prenumbered documents:

Provide an opportunity to control events

Prenumbered documents created during one event are accounted for in a later event

Checking the sequence of prenumbered documents helps ensure that all events are executed and recorded appropriately

Page 31: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

6. Recording of internal agent(s) accountable for an event in a process:

Important Clear job descriptions

and specific instructions from supervisors

Recording employee ID number at the time the event

Safeguarding of assets through use of with serial numbers, recordkeeping, and identification of custodian of the assets

Page 32: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

7. Limitation of access to assets and information:

Safeguards Access to assets only

for employees needing them for assigned duties

Physical assets stored in secure locations

Employees badges for access

Alarms Password required for

access to data

Page 33: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

8. Reconciliation of records with physical evidence of assets:

Ensures that recorded event and master file data correspond to actual assets

Differs from the use of documents to control events – reconciliation: Is broader Usually involves data

about multiple events Occurs after the events

have been executed and recorded

Page 34: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

Input controls: Used to control input of

data into computer systems Drop-down or look-up

menus Record-checking of data

entered Confirmation of data

entered Referential integrity

controls Format checks to limit data Validation rules to limit the

data Defaults from data entered

in prior sessions

Page 35: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

Input controls: Restriction against

leaving a field blank Field established as a

primary key Computer-generated

values entered in records Batch control totals taken

before data entry compared to printouts after data entry

Review for errors before posting

Exception reports

Page 36: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

General controls: Broader controls that apply

to multiple processes Help workflow and input

controls be effective Organized into four

categories: Information systems (IS)

planning Organizing the

information technology (IT) function

Identifying and developing IS solutions

Implementing and operating accounting systems

Page 37: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

Performance reviews: Measure performance by

comparing actual data with budgets, forecasts, or prior-period data

Include analyzing data, identifying problems, and taking corrective action

Ensure events support broader long-term goals

Typically involve comparing actual results to plans, standards, and prior performance

Page 38: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

Performance reviews: Often result in taking

corrective action Require an information

system (AIS in particular) that records and stores information about standards and actual outcomes

Requires reports that allow for meaningful analysis of actual results

Page 39: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

Control Activities

Performance reviews: And master records

Related in two ways: Planned standards and budget figures (reference data) are typically recorded during file maintenance activities in master records

Summary data stored in master records are often used to implement corrective action

Summary fields in master records can also help in reviewing performance

Page 40: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

KEYTERMS

Application controls Control activities Control environment Execution risk General controls Information system

risks Input controls

Page 41: Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES

KEYTERMS

Internal controls Performance reviews Recording risks Risk assessment Segregation of duties Update risks Workflow controls