You are on page 1of 13

lOMoARcPSD|18238377

ETHICS, FRAUD, AND INTERNAL CONTROL  Ethical behavior is a necessary but not
sufficient condition for business success in the
(CHAPTER 3)
long run. (Inherently, this statement is saying
ETHICAL ISSUES IN BUSINESS that businesses that behave unethically should
 Ethical standards are derived from societal be punished).
mores and deep-rooted personal beliefs about Some firms address ethical issues through:
issues of right and wrong that are not
universally agreed upon.  Ethics training and awareness in the workplace

ETHICS  Greater commitment of top management to


improving ethical standards.
 a set of moral principles that distinguish
between what is right and what is wrong  Written codes of ethics/conduct to
communicate management’s expectations
 a set of values that guide the conduct and the (Johnson and Johnson’s “credo” of corporate
behavior of the individuals, enabling them to values).
differentiate between what should be done
and what should not be done  Programs to encourage moral development
and implement ethical guidelines.
 pertains to the principles of conduct that
individuals use in making choices and guiding  Techniques to monitor compliance.
their behavior in situations that involve the
concepts of right and wrong. Management is responsible to maintain an ethical
environment, to limit opportunity and temptation for
What Is Business Ethics? unethical behavior within the company. A company’s
 Ethics pertains to the principles of conduct that commitment to ethics should be above their
individuals and business managers use in commitment to short-term profits and efficiency.
guiding their behavior and choices. It involves MORAL REASONING STAGES OF DEVELOPMENT:
not only knowing what is right but also KOHLBERG’S STAGES OF MORAL DEVELOPMENT
knowing how to achieve what is right.
- (Kohlberg’s model was created specifically
Business ethics involves finding the answers to two for the framework of child development and
questions: has been widely criticized for
(1) How do managers decide what is right in promoting the inherent value system of its
conducting their business? and author. The original Kohlberg model organized
a child’s values development from
(2) Once managers have recognized what is right, how parental punishment/rewards to
do they achieve it? organizational belonging/success (local
maximization) to greater social
Ethics in business can be divided into four areas: contracts/justice (forgoing one’s individual
gains for the sake of societal gain). The
 Equity (fairness and lawful practices in the representation in the Hall textbook is an
marketplace), interpretation of the Kohlberg model.
 Rights (individual employee rights),
 Honesty (behavior), and  Stage 1 (lowest): Punishment
 Exercise of corporate power (working orientation: obey rules to avoid
condition choices). punishment

 Stage 2: Reward orientation: obey rules


to obtain the reward

 Stage 3: Good boy/girl orientation: obey


rules to receive approval

 Stage 4: Authority orientation: obey


rules to be perceived as performing
one’s duty

 Stage 5: Social contract orientation:


obey rules to obtain the respect of
peers and maintain self-respect

 Stage 6 (highest): Ethical Principle


Orientation: rules are guided by self-
selected ethical principles that promote
self-esteem.

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

Every business decision has ethical risks and in nature than traditional issues (property rights,
benefits. Your ethical responsibility is the balancing copyright, trade secrets, patent laws). The
between these consequences. The following following issues of concern involve computer
principles have been provided for guidance on ethics and may generate class discussions:
these decisions:
Privacy: How much information about you is
 Proportionality: The ethical benefit from a available to others? How much information
decision must outweigh the risks. There about yourself do you really own?
must be no alternative decision that  being in full control of what and how
provides the same or greater benefit with much information about themselves is
less risk. available to others, and to whom it is
available.
 Justice: The benefits should be distributed  The creation and maintenance of huge,
fairly to those affected. Those who do not shared databases make it necessary to
benefit should not carry the burden of risk. protect people from the potential
misuse of data. This raises the issue of
 Minimize Risk: The decision should
ownership in the personal information
minimize all risks and avoid unnecessary industry.
risks. Even if judged acceptable by the
principles, the decision should be Security (Accuracy and Confidentiality): How
implemented so as to minimize all of the can you avoid authorized/unauthorized
risks and avoid any unnecessary risks. individuals accessing or changing your
computerized information? Where is the
What is Computer Ethics? balance between safe data and open shared
resources?
 Computer Ethics is the analysis of the impact  Computer security is an attempt to
of computer technology and the policies for avoid such undesirable events as a loss
the ethical use of such technology. It involves of confidentiality or data integrity.
software, hardware, and network behaviors. Security systems attempt to prevent
Three levels of computer ethics: fraud and other misuse of computer
 Pop ethics systems; they act to protect and
- staying current with the media. further the legitimate interests of the
- is simply the exposure to stories and reports system’s constituencies.
found in the popular media regarding the
good or bad ramifications of computer  The ethical issues involving security
technology arise from the emergence of shared,
 Para ethics computerized databases that have the
- having real interest and acquiring some skill potential to cause irreparable harm to
and knowledge in the field. individuals by disseminating inaccurate
- involves taking a real interest in computer information to authorized users, such
ethics cases and acquiring some level of skill as through incorrect credit reporting.
and knowledge in the field. There is a similar danger in
 Theoretical ethics disseminating accurate information to
- multidisciplinary application of ethical persons unauthorized to receive it.
theories to computer science.
- is of interest to multidisciplinary researchers Ownership of Property: Can an individual own
who apply the theories of philosophy, idea? Media? Source or object code? Do
sociology, and psychology to computer science copyright laws and patents restrict the progress
with the goal of bringing some new of technology?
understanding to the field.
Equity in Access: Does the economic status of
ERROR VS. FRAUD an individual restrict him/her from access to a
 The term “error” refers to career in information technology?
unintentional misstatements in the
financial statements, including the  Several factors, some of which are not
omission of an amount or a disclosure. unique to information systems, can
 Fraud refers to intentional act by one limit access to computing technology.
or more individuals among The economic status of the individual
management, those charged with or the affluence of an organization will
governance, employees, or third determine the ability to obtain
parties, involving the use of deception information technology
to obtain an unjust or illegal  Culture also limits access, for example,
advantage. when documentation is prepared in
only one language or is poorly
Many argue that computer ethics are no different

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

translated.
Environmental Issues: Do high-speed printers
cause less responsibility for reducing paper SARBANES-OXLEY ACT AND ETHICAL ISSUES
waste?
 For example, computers with high-  is the most significant federal securities law
speed printers allow for the production since the Securities and Exchange Commission
of printed documents faster than ever (SEC) Acts of 1933 and 1934
before. It is probably easier just to
print a document than to consider  SOX has many provisions designed to deal with
whether it should be printed and how specific problems relating to capital markets,
many copies really need to be made. It corporate governance, and the auditing
may be more efficient or more profession
comforting to have a hard copy in
addition to the electronic version. SECTION 406 – CODE OF ETHICS FOR SENIOR FINANCIAL
However, paper comes from trees, a OFFICERS
precious natural resource, and ends up
in landfills if not properly recycled.  Section 406 of SOX requires public companies to
disclose to the SEC whether they have adopted
Artificial Intelligence: Who is responsible for a code of ethics that applies to the
the decisions that an expert system or a bot organization’s chief executive officer (CEO),
might make on behalf of a business? CFO, controller, or persons performing similar
 Because of the way these systems have functions.
been marketed—that is, as decision
makers or replacements for experts—  If the company has not adopted such a code, it
some people rely on them significantly. must explain why.
Therefore, both knowledge engineers
(those who write the programs) and  A public company may disclose its code of ethics
domain experts (those who provide in several ways:
the knowledge about the task being
automated) must be concerned about 1) included as an exhibit to its annual report,
their responsibility for faulty decisions, 2) as a posting to its Web site, or
incomplete or inaccurate knowledge 3) by agreeing to provide copies of the code upon
bases, and the role given to computers request.
in the decision-making process.
 Whereas Section 406 applies specifically to
Unemployment and Displacement: When a executive and financial officers of a company, a
business downsizes employees because a code of ethics should apply equally to all
computer now performs their jobs, is that employees. Top management’s attitude toward
business responsible to retrain the displaced ethics sets the tone for business practice, but it
employees? is also the responsibility of lower-level
 Many jobs have been and are being managers and nonmanagers to uphold a firm’s
changed as a result of the availability of ethical standards.
computer technology. People unable or
unprepared to change are displaced. Conflict of Interest

Misuse of Computers: How do you feel about - The company’s code of ethics should outline
copying software, MP3 music files, snooping procedures for dealing with actual or apparent
through other people’s files, or using a conflicts of interest between personal and
business’ computer for personal purposes? professional relationships.
 Computers can be misused in many
ways. Copying proprietary software, - Whereas avoidance is the best policy,
using a company’s computer for sometimes conflicts are unavoidable. Thus,
personal benefit, and snooping through one’s handling and full disclosure of the matter
other people’s files are just a few become the ethical concern
obvious examples.
 Although copying proprietary software Full and Fair Disclosure
(except to make a personal backup
copy) is clearly illegal, it is commonly - This provision states that the organization
done. should provide full, fair, accurate, timely, and
understandable disclosures in the documents,
- Managers must establish and maintain a reports, and financial statements that it
system of internal controls to ensure the submits to the SEC and to the public.
integrity and reliability of their data.

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

such as making it a federal offense for


destroying documents or audit work
papers, to be used in an official proceeding
Legal Compliance or actions against whistleblowers.
FRAUD AND ACCOUNTANTS
- Codes of ethics should require employees to  Fraud is a false representation of a material fact
follow applicable governmental laws, rules, made by one party to another party with the
and regulations. intent to deceive and to induce the other party
to rely on the fact to his or her detriment.
- Doing the right thing requires sensitivity to Many times, alleged fraud is just poor
laws, rules, regulations, and societal management decisions or adverse business
expectations. To accomplish this, organizations conditions.
must provide employees with training and  is defined as the intentional use of deceit, trick,
guidance. or some dishonest means to deprive another
party of money, property, or of a legal right.
Internal Reporting of Code Violations
Common law asserts that for an act to be considered
- The code of ethics must provide a mechanism fraudulent, it must meet five requirements:
to permit prompt internal reporting of ethics
violations. This provision is similar in nature to 1. There must be a false
Sections 301 and 806, which were designed to representation, statement or a nondisclosure.
encourage and protect whistle-blowers. 2. There must be a material fact, a substantial
factor in inducing someone to act.
Accountability 3. There must be intent to deceive.
4. The misrepresentation must have resulted
- An effective ethics program must take in justifiable reliance causing someone to act.
appropriate action when code violations occur. 5. The deception must have caused injury or
This will include various disciplinary measures, loss to the victim of the fraud.
including dismissal. Employees must see an
employee hotline as credible, or they will not Responsibility of Management and Those Charged with
use it. Governance in fraud

- Section 301 directs the organization’s audit Under Philippine Standard of Auditing (PSA) 240.
committee to establish procedures for The responsibility for the prevention and
receiving, retaining, and treating such detection of fraud and error rest with both
complaints about accounting procedures and management and those charge with the governance of
internal control violations. the entity.

Sarbanes-Oxley Act – July 2002, passed by US Auditor’s Responsibility in Fraud


Congress and signed by President Bush. This act
reforms oversight and regulation of public company Under Philippine Standard of Auditing (PSA) 240.
directing and auditing. Its principal reforms involve: Although annual audits of financial statements
may act as deterrent to fraud and error, the auditor is
 The creation of an accounting oversight not and cannot be held responsible for the prevention
board (PCAOB) empowered to set of fraud and error.
auditing, quality control, and ethics
standards, to inspect registered The auditor’s responsibility is to design the
accounting firms, to conduct audit to provide reasonable assurance that the
investigations, and to take disciplinary financial statements are free from material
actions. misstatements, whether caused by error or fraud.
 Auditor independence: more separation Business fraud is an intentional deception,
between a firm’s attestation and non- misappropriation of assets, or manipulation of financial
auditing activities data to the advantage of the perpetrator. Two types of
fraud discussed in this chapter are employee fraud and
 Corporate governance and responsibility:
management fraud.
audit committee members must be
independent and the audit committee Employee fraud is committed by non-management
must oversee the external auditors personnel and usually consists of an employee taking
cash or other assets for personal gain and concealing
 Disclosure requirements: increase issuer their actions. Employee fraud usually involves three
and management disclosure steps:

 Penalties for fraud and other violations, (1) stealing something of value (an asset),

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

(2) converting the asset to a usable from (cash), and

(3) concealing the crime to avoid detection

> performance fraud by non-management employee THE FRAUD TRIANGLE


generally designed to directly convert cash or other
assets to the employee’s personal benefit The fraud triangle consists of three factors that
contribute to or are associated with management and
Management fraud is committed at higher levels and employee fraud:
usually does not involve the direct theft of an asset. It
is more insidious than employee fraud because it (1) situational pressure, which includes personal or
often escapes detection until the organization has job-related stresses that could coerce an
suffered irreparable damage or loss. individual to act dishonestly;
> uses deceptive practices to inflate earnings or to (2) opportunity, which involves direct access to
forestall the recognition of either insolvency or a assets and/or access to information that controls
decline in earnings assets, and;
(3) ethics, which pertains to one’s character and
degree of moral opposition to acts of dishonesty.
It is generally more difficult to detect for the following
reasons:
To provide insight into these factors, auditors often use a
red-flag checklist consisting of the following types of
 The fraud occurs at levels that are above
internal control mechanisms. questions:
 The fraud occurs by managers who can
manipulate financial statements through  Do key executives have unusually high personal
either expense allocations or revenue debt?
recognition.  Do key executives appear to be living beyond
 The misappropriation of assets can be covered their means?
up with complex transactions, often involving  Do key executives engage in habitual gambling?
third parties.  Do key executives appear to abuse alcohol or
drugs?
Management fraud typically contains three special  Do any of the key executives appear to lack
characteristics: personal codes of ethics?
1. The fraud is perpetrated at levels of management  Are economic conditions unfavorable within the
above the one to which internal control structures company’s industry?
generally relate.  Does the company use several different banks,
2. The fraud frequently involves using the financial none of which sees the company’s entire
statements to create an illusion that an entity is financial picture?
healthier and more prosperous than, in fact, it is.
 Do any key executives have close associations
3. If the fraud involves misappropriation of assets, it
with suppliers?
frequently is shrouded in a maze of complex
 Is the company experiencing a rapid turnover of
business transactions, often involving related third
key employees, either through resignation or
parties.
termination?
 Do one or two individuals dominate the
Factors That Contribute to Fraud
company?
Forces that interact to motivate an individual to
commit fraud can be categorized as situational Financial Losses from Fraud
pressures (high), opportunity (high), and personal
characteristics/ethics (low). The opportunity seems to be the overall most
important factor associated with the fraud.
Auditors should look to many places to determine Opportunity can be defined as control over assets or
management’s motivations to commit fraud and access to assets. Opportunity is characterized in this
should look at the top management of the companies dataset with a higher management position, which is
they audit to find the answers to questions such as: mostly filled by older, more educated males at this
time in history.
Personal: Do any of the managers have a lot of
debt? Are they living beyond their means? Are Fraud Schemes
they gambling? Do they abuse substances? The three broad categories of fraud schemes
Environment: Are economic conditions according to the Association of Certified Fraud
unfavorable?
Examiners are fraudulent financial statements,
Business: Does the company use several different
corruption, and asset misappropriation.
banks, none of which see the company’s entire
financial picture? Are there close associations
with any supplier? Fraudulent Financial Statements

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

For financial statements to be fraudulent, the equipment, and information are the most vulnerable
statement itself must bring financial benefit to the assets. Examples of asset misappropriation schemes
perpetrator, either direct or indirect. The include:
manipulation of the financial statement cannot just
be a vehicle to hide the fraudulent act.
Skimming
 misstating the financial statements to make the - involves stealing cash from an organization
copy appear better than it is before it is recorded on the organization’s books
 usually occurs as management fraud and records.
- One example of skimming is an employee who
 may be tied to focus on short-term financial accepts payment from a customer but does not
measures for success record the sale.
- Another example is mail room fraud in which an
 may also be related to management bonus employee opening the mail steals a customer’s
packages being tied to financial statements check and destroys the associated remittance
Underlying problems include: advice. By destroying the remittance advice, no
evidence of the cash receipt exists. This type of
 Lack of auditor independence fraud may continue for several weeks or months
until detected.
- auditing firms also engaged by their clients to perform
non-accounting activities. Charges to expense accounts.
 Lack of director independence
Cash Larceny
- directors who also serve on the boards of other - involves schemes in which cash receipts are
companies, have a business trading relationship, have a stolen from an organization after they have
financial relationship as stockholders or have received been
personal loans, or have an operational relationship as recorded in the organization’s books and records.
employees
- An example of this is lapping, an employee
 Questionable executive compensation who has access to customer checks and to
schemes accounts receivable records steals some money,
and then uses the next check that comes in to
- short-term stock options as compensation result in cover the last amount stolen (so that the
short-term strategies aimed at driving up stock prices at customers never notice). This can continue until
the expense of the firm’s long-term health the employee leaves the company or takes a
vacation, or is switched to another position.
 Inappropriate accounting practices

- a characteristic common to many financial statement Billing Schemes


fraud schemes - also known as vendor fraud, are perpetrated
by employees who causes their employer to
Corruption issue a payment to a false supplier or vendor
by submitting invoices for fictitious goods or
Corruption involves collusion with an outside entity. services, inflated invoices, or invoices for
The four principal types of corruption include: personal purchases. Three examples of billing
scheme are presented here.
Bribery: Offering, giving, or receiving things of
value to influence an official in the performance of 1)Shell company fraud
his/her lawful duties (before the fact). - requires that the perpetrator establish a false
Illegal Gratuities: Offering, giving, requesting, supplier on the books of the victim company. The
or receiving something of value because of an fraudster then manufactures false purchase
official act that has been taken (after the fact). orders, receiving reports, and invoices in the name
Conflicts of Interest: When an employee acts of the vendor and submits them to the accounting
on the behalf of a third party during the discharge system, which creates the allusion of a legitimate
of duties or has self-interest in the activity being transaction. Based on these documents, the
performed. system will set up an account payable and
Economic Extortion: Threat or use of force ultimately issue a check to the false supplier (the
(including economic sanctions) by an individual fraudster).
or organization to obtain something of value.
2)Pass through fraud
Asset Misappropriation (employee fraud) - is similar to the shell company fraud with the
exception that a transaction actually takes place.
Asset Misappropriation is the most common form - the perpetrator creates a false vendor and issues
of fraud, the CFE found 85 percent of fraud cases purchase orders to it for inventory or supplies. The
to be asset misappropriations. Transactions involving false vendor then purchases the needed inventory
the case, checking accounts, inventory, supplies, from a legitimate vendor. The false vendor

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

charges the victim company a much higher than adding false transactions to divert assets to the
market price for the items, but pays only the perpetrator (false invoices, false paychecks, etc.).
market price to the legitimate vendor. The
difference is the profit that the perpetrator
pockets.
Computer Fraud Schemes: Computer
environments are subject to their own kinds of
fraud. Computer fraud can include theft of assets
3)Pay-and-turn by:
- This typically involves a clerk with check writing o altering computer-readable records, and
authority who pays a vendor twice for the same files
products (inventory or supplies) received. The o altering the logic of computer software,
vendor, recognizing that its customer made a o theft or illegal use of computer-readable
double payment, issues a reimbursement to the information,
victim company, which the clerk intercepts and o theft, corruption, illegal copying, or
cashes. intentional destruction of software, and
o theft, misuse, or misappropriation of
Check Tampering computer hardware.
- involves forging or changing in some material
way a check that the organization has written Computer assets are vulnerable to theft or
to a legitimate payee. destruction at each phase of the accounting
- One example of this is an employee who information system.
steals an outgoing check to a vendor, forges
the Data Collection Fraud: This phase of the
payee’s signature, and cashes the check. system is most vulnerable because it is very easy
to change data as it is being entered into the
Payroll fraud system. Fraudulent transactions or dollar
- is the distribution of fraudulent paychecks to amounts can be keyed into the system and
existent and/or nonexistent employees? thefts can thus be covered up. Data must be
valid, complete, free from material errors,
- For example, a supervisor keeps an employee relevant, and efficiently collected.
on the payroll who has left the organization. Masquerading is an unauthorized user entering
Each week, the supervisor continues to the system as an authorized user.
submit timecards to the payroll department Piggybacking is tapping into the
as if the employee were still working for the telecommunication lines and latching onto
victim organization. an authorized user who is logging into the
system. Once inside, the perpetrator can go their
Expense Reimbursements own way.
- are schemes in which an employee makes a Data Processing: Frauds can be a program or
claim for reimbursement of fictitious or operation fraud.
inflated business expenses. For example, a Program fraud includes altering programs to
company salesperson files false expense allow illegal access, introduce a virus, or alter
reports, claiming meals, lodging, and travel a program’s logic to cause incorrect data
that never occurred. processing.
Operation fraud is the misuse of company
Thefts of cash computer resources, for example, for personal
- are schemes that involve the direct theft of use or personal business.
cash on hand in the organization. Database Management: Fraud at this phase of the
- An example of this is an employee who makes system involves altering, destroying, or stealing the
false entries on a cash register, such as company's data either in storing, retrieving, or
voiding a sale, to conceal the fraudulent deleting tasks. (Disgruntled or Ex-employee)
removal of cash. Information Generation: Frauds here involves
- Another example is a bank employee who misrepresentation, theft, or misuse of the
steals cash from the vault. computer output, either on-screen or in hard copy.
It can also involve scavenging (searching through
Non-Cash Misappropriations the trash cans of a company for discarded
- involve the theft or misuse of the victim outputs) or eavesdropping (listening to electronic
organization’s non-cash assets. transmissions). The information must have the
- One example of this is a warehouse clerk who following characteristics:
steals inventory from a warehouse or Relevance: It affects the employee’s decisions
storeroom. regarding the task at hand.
- Another example is a customer services clerk Timeliness: It can be no older than the time period
who sells confidential customer information of the action that it supports.
to a third party. Accuracy: It must be free of material errors.
Completeness: No essential piece of information is
Transaction Fraud: involves deleting, altering, or missing.

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

Summarization: Information is aggregate in


accordance with the user’s needs.
• Limitations: Every system has limitations including
the possibility of error—no system is perfect,
circumvention via collusion—personnel may
circumvent the system through collusion or other
means, management override—management is in
a position to override control procedures by
personally distorting transactions or by directing a
subordinate to do so, and changing conditions—
Internal Control Concepts and Procedures conditions may change over time so that existing
controls may become ineffectual.
Internal Control- a state that management strives to
achieve to provide reasonable assurance that the
firm’s objectives will be achieved Exposures and Risks

Under Philippine Standard of Auditing (PSA) 315 Assets are subject to the risk of losses, termed
Internal Control is defined as the process exposures if internal controls are weak in a particular
designed and effected by those charged with area. Exposures can lead to the following kinds of
governance, management, and other personnel to problems:
provide reasonable assurance about the achievement
of the entity’s objectives with regard to reliability of • Destruction of the asset
financial reporting, effectiveness, and efficiency of • Theft of the asset
operations and compliance with applicable laws and • Corruption of information or of the
regulations. information system
• Disruption of the information system
Foreign Corrupt Practices Act of 1977 Relationship between the firm’s internal control
structure, auditor’s assessment of risk, and the
Requires companies registered with the SEC to:
planning of audit procedures
 Keep records that fairly and reasonably  The weaker the internal control structure, the
reflect the transactions of the firm and its higher the assessed level of risk; the higher
financial position, and the risk, the more auditor procedures applied
 Maintain a system of internal control that in the audit
provides reasonable assurance that the
organization’s objectives are met. The Preventive-Detective-Corrective Internal Control
Model is a very useful model to approach risk
Internal Control in Concept management.
Preventive controls
Internal control systems include all of the policies, are designed to reduce the opportunities for
practices, and procedures employed by the the commission of errors or fraud. They are
organization to achieve four broad objectives passive controls, meaning that they are
(according to AICPA’s SAS#1, sec. 320): integrated into the system in the hopes of
preventing errors and fraud before they happen.
• to safeguard assets of the firm, They provide safeguards that are built into the
• to ensure the accuracy and reliability of system's routine procedures.
accounting records and information,
• to promote the efficiency of the are passive techniques designed to reduce
firm's operations, and the frequency of occurrence of undesirable
• to measure compliance with management's events. Preventive controls force compliance
prescribed policies and procedures. with prescribed or desired actions and thus
screen out aberrant events. When designing
Modifying Assumptions for systems designers and internal control systems, an ounce of prevention
auditors include: is most certainly worth a pound of cure.
• Management Responsibility: Management is Preventing errors and fraud is far more cost-
ultimately responsible. effective than detecting and correcting problems
• Reasonable assurance: The internal control after they occur.
system should provide reasonable rather than
absolute assurance. Detective controls
• Data Processing Methods: The methods are designed to detect errors or fraud after
utilized for data processing will change the types they have occurred. These controls compare
of internal what has actually happened with what was
controls needed and utilized to achieve the four supposed to happen. If deviations occur, they are
objectives. identified.

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

are devices, techniques, and procedures


designed to identify and expose undesirable • The integrity and ethical values of
events that elude preventive controls. Detective management
controls reveal specific types of errors by • The organizational structure of the company
comparing actual occurrences to preestablished • The role and participation level of the board
standards. When the detective control identifies of directors and of the audit committee
a departure from standard, it sounds an alarm to
attract attention to the problem.  demonstrate commitment to integrity and
ethical values
Corrective controls  exercise oversight responsibility
are measures taken to correct errors,  establish structure, authority and
especially material ones, once they have been responsibility
detected. Such measures should be taken with  demonstrate commitment to competence
caution after the reasons for the errors have  enforce accountability
been found. If an error is a minor one, it may not
be worth analyzing and correcting. Is there an internal auditing department that reports to
the audit committee?
are actions taken to reverse the effects of errors
detected in the previous step. • Management's philosophy or approach
to running the company
 There is an important distinction between • Delegation of responsibility and authority
detective controls and corrective controls.
Detective controls identify anomalies and draw Is there proper segregation of duties between
attention to them; corrective controls actually authorization, custody, and accounting?
fix the problem
• Methods for evaluating performance
Auditing and Auditing Standards • External influences, such as examinations by
outside parties
Auditors are guided in their professional responsibilities • The organization's policies and practices for
by GAAS (Generally Accepted Auditing Standards), in managing its human resources
addition to many other Statements on Auditing
Standards. SAS 78 requires the auditors to obtain sufficient
knowledge to assess the attitude and awareness of an
• General qualification standards refer to the organization's management, the board of directors,
background that is necessary to be an auditor. and owners to determine the importance of internal
• Fieldwork standards refer to the level of control in their organization. Techniques they could
investigative professionalism that is required utilize include background checks, reputation,
while conducting an audit. Note that the second integrity, external conditions, knowledge of the
fieldwork standard refers to an understanding of client’s industry, and specific business.
the internal control structure.
Management should adopt the provisions of the
• Reporting standards refer to the Sarbanes-Oxley Act by:
requirements an auditor must follow when
rendering a professional opinion.
• Separating the roles of CEO and chairman,
• Setting ethical standards,
The Statement on Auditing Standards No. 78 discusses • Establishing an Independent Audit Committee
the complex relationship between the firm’s internal • Compensation Committees
controls, the auditor’s assessment of risk, and the • Nominating Committees
planning of audit procedures. This statement
• Access to Outside Professionals
conforms to the recommendations of the US
Congress’ Committee of Sponsoring Organizations of Risk Assessment
the Treadway Commission (COSO).
Management must assess the risks of their business and
Internal Control Components their environment. Such risk would be increased by,
According to SAS No. 78, internal control consists of the for
control environment, risk assessment, information example, rapid growth, new competitors, new product
and communication activities, monitoring activities, lines, organizational restructuring, entering foreign
and control activities. markets, implementation of new technology, or
adopting a new accounting principle that impacts the
Control Environment financial statements. Auditors are required by SAS
No. 78 to obtain an understanding of their clients'
The Control Environment is the foundation of internal
methods for assessing risk.
control and sets the tone for the organization.
Important elements of the control environment  specify suitable objectives
include:  identify and analyze risk

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

 assess fraud risk accounting estimates. (output)


 identify and analyze significant change
Monitoring
Organizations must perform a risk assessment to
identify, analyze, and manage risks relevant to Monitoring must be performed to determine that the
financial reporting. Risks can arise or change internal controls are functioning as intended. The
from circumstances such as: process by which the quality of internal control
 changes in external environment design and operation can be assessed. This may be
 risky foreign markets accomplished by separate procedures or by ongoing
 significant and rapid growth that strain activities.
internal controls Monitoring may be performed by internal auditors who
 new product lines periodically test controls and report to management
 restricting, downsizing any weaknesses that could be a cause for concern.
 changes in accounting policies Monitoring can also be performed continuously
through the implementation of computer modules
Information and Communication designed specifically to monitor the functioning of
internal controls. A good reporting system, reviewed
Managers are responsible for developing, implementing, by management, is also an excellent monitoring
and maintaining a good system of Information and information system.
Communication for all in the organization. The
accounting information system consists of the  conduct ongoing and/or separate evaluations
records and methods used to initiate, identify,
 evaluate and communicate deficiencies
analyze, classify, and record the organization’s
transactions and account for the related assets and Control Activities
liabilities.
Control Activities are the policies and procedures used to
The quality of information generated by an organization's ensure that appropriate actions are taken to deal with
accounting information system will impact the the identified risks.
reliability of the organization's financial statements.
Auditors are required to obtain an understanding of  select and develop control activities, and
the classification of material transactions, the general controls over technology
processing of those transactions in the accounting
 deploy through policies and procedures
records, and the utilization of processed data in the
preparation of financial statements. There are two categories, computer controls, and physical
controls.
 use relevant information
Computer or IT Controls can be categorized into two
 communicate internally and externally
groups: general controls and application controls.
Effective accounting information systems will: • General Controls pertain to pervasive, entity-
wide concerns such as access and approval, such
• Identify and record all valid financial as human resources and project management.
transactions. • Application Controls pertain to the details of
• Provide timely information about specific systems, such as payroll.
transactions in sufficient detail to permit proper
classification and financial reporting. IT APPLICATION CONTROLS
• Accurately measure the financial value of Management and Auditors are required by SOX
transactions so their effects can be recorded in to consider IT Application controls relevant to
financial statements. financial reporting. Application controls are
• Accurately record transactions in the time associated with specific applications, such as
period in which they occurred. payroll, purchases, and cash disbursement
systems, and fall into three broad categories:
SAS 78/ COSO requires that Auditors to obtain sufficient
Input Controls: are programmed procedures, often
knowledge of the information system to understand:
called edits, which perform tests on transaction
• The classes of transactions that are material
data to ensure that they are free from errors
to the financial statements and how those
 Check digits
transactions are initiated. (input)
 Missing Data Checks
• The accounting records and accounts that are
 Numeric-Alphabetic Check
used in the processing of material transactions.
(input)  Limit Check
• The transaction processing steps involved  Range Check
from the initiation of a transaction to its inclusion  Reasonables Check
in the financial statements. (process)  Validity Check
• The financial reporting process used to
prepare financial statements, disclosures, and Processing Controls: are programmed procedures to

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

ensure that an application’s logic is functioning from a small supply of technically competent
properly individuals, these individuals have access to much
of the organization’s sensitive data, and because
 Batch Controls management is unable to observe employees
 Audit Trail Controls who work with the system. The ability to assess
 ensure that every transaction can be competent employees becomes more challenging
traced through each stage of due to the greater technical knowledge required.
processing from its economic source Underlying assumption of supervision control is
to its presentation in financial that the firm employs competent and trustworthy
statements personnel. Obviously, no company could function
 Master Trail Controls for long on the alternative assumption that its
employees are incompetent and dishonest.
Output Controls: are combination of programmed
routines and other procedures to ensure that Accounting Records are the source
system output is not lost, misdirected, or documents, journals, and ledgers of a business.
corrupted and that privacy is not violated These documents provide the audit trail for all the
company's economic transactions. Audit trails are
Physical Controls typically relate to manual procedures. also created in computer-based systems, but the
This class of controls relates primarily to the human form and appearance of the accounting records
activities employed in accounting systems. are different from those in a manual system
Traditionally, there are six categories of physical (hashing techniques, pointers, indexes, embedded
control activities: keys). Auditors must understand system controls
Transaction Authorization: Employees should to know their impact on the audit trails of the
only be carrying out authorized transactions. records. Sometimes source documents are kept
Authorizations may be general or specific. General magnetically. No audit trail is readily apparent.
authorization may be granted to employees to These records capture the economic essence of
carry out routine, everyday procedures while transactions and provide an audit trail of
specific authorization may be needed for non- economic events. The audit trail enables the
routine transactions. Often embedded within auditor to trace any transaction through all phases
computer programs. The purpose of transaction of its processing from the initiation of the event to
authorization is to ensure that all material the financial statements.
transactions processed by the information system
are valid and in accordance with management’s Organizations must maintain audit trails for two
objectives. reasons:
Segregation of Duties: The key segregations
should be between the authorizing and the (1) This information is needed for conducting day-
processing of a transaction and between the to-day operations. The audit trail helps employees
custody of an asset and its record-keeping. The respond to customer inquiries by showing the
system must be designed so that it would take current status of transactions in process.
more than one employee to successfully carry out
a fraudulent act. In a computerized system, (2) The audit trail plays an essential role in the
however, many duties that must be segregated in financial audit of the firm. It enables external (and
a manual system may be combined because internal) auditors to verify selected transactions
computers do not make errors or commit fraud. by tracing them from the financial statements to
Nevertheless, in a computer-based system, the ledger accounts, to the journals, to the source
segregation should exist between the functions of documents, and back to their original source.
program development, program operations, and
program maintenance. Access Controls safeguard assets by
restricting physical access. In computer-based
systems, access controls should reduce the
possibilities of computer fraud and losses from
disasters. Access controls should limit personnel
access to central computers, restrict access to
computer programs, provide security for the data
processing center, provide adequate backup for
data files, and provide for disaster recovery. Data
consolidation exposes the organization to
computer fraud and excessive losses from
disaster. The purpose of access controls is to
Supervision is referred to as a compensating ensure that only authorized personnel have
control because it comes into play when there is access to the firm’s assets. Unauthorized access
not an adequate separation of duties and exposes assets to misappropriation, damage, and
employees must double up on tasks. This theft. Therefore, access controls play an
control is especially important for computer- important role in safeguarding assets.
based systems as often management must hire

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

Independent Verification procedures identify


errors and misrepresentations and can be
performed by both managers and computers. For
example, managers can review financial and
management reports, and computers can
reconcile batch totals or subsidiary accounts with
control accounts. Management can assess an
individual application’s performance, processing
system integrity, and data accuracy. Examples of
independent verification include reconciling
batch totals at various points of processing,
comparing physical assets with accounting
records, reconciling subsidiary ledgers with
general ledger control accounts, and reviewing
management reports. When tasks are performed
by the computer rather than manually, the need
for an independent check is not necessary.
However, the programs themselves are checked.

The Importance of Internal Controls


• The five components of internal control are:
environment, risk assessment, information and
communication, monitoring, and control
activities. Understanding internal control will
guide the auditor in the planning of specific tests
to determine the likelihood and the extent of
financial statement misrepresentation.

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)


lOMoARcPSD|18238377

Downloaded by Paredes Imee Therese (imee11therese@gmail.com)

You might also like