III. Internal Control: According To AICPA Statement On Auditing Standards (SAS)
III. Internal Control: According To AICPA Statement On Auditing Standards (SAS)
III. Internal Control: According To AICPA Statement On Auditing Standards (SAS)
Internal Control
Reasonable Assurance
It is assumed that the management must ensure that the internal control
systems are providing reasonable assurance that the said four control
objectives are met efficiently. The cost of achieving an improved system
control should not outweigh its benefits.
The internal control shield is composed of three levels of control; these are the
preventive controls, detective controls, and corrective controls. These are also known
as PDC control model.
Preventive Controls
This is the first line of defense in the control structure. Preventive controls are
passive techniques designed to reduce the frequency of occurrence of
undesirable events. It screen out aberrant events through forcing compliance
with prescribed or desired actions.
Detective Controls
These are the second line of defense in the control structure. These detective
controls are composed of devices,
Figure 3.2 Preventive, techniques,
Detective, and Control
and Corrective procedures designed to
identify and expose undesirable events that elude preventive controls. Their roles
is to identify and find specific types of errors, this can be done by comparing
actual occurrences to pre-established standards. Once these errors had been
identified, the detector produces an alarm to attract attention so the problem can
be solved immediately.
Corrective Controls
This are the actions that take place after the detection of specific error from the
second line of defense. This is to reverse the effects and the possible risks
brought about by the errors. Since detective controls identify the problem,
corrective controls actually solve the problem.
Regarding the control framework to be used, both the PCAOB and the SEC have
endorsed the framework put forward by the Committee of Sponsoring Organizations of
the Treadway Commission (COSO). Further, they require that any other framework
used should encompass all of COSO’s general themes.20 The COSO framework was
the basis for SAS 78, but was designed as a management tool rather than an audit tool.
SAS 78, on the other hand, was developed for auditors and describes the complex
relationship between the firm’s internal controls, the auditor’s assessment of risk, and
the planning of audit procedures. Apart from their audience orientation, the two
frameworks are essentially the same and interchangeable for SOX compliance
purposes. The key elements of the SAS 78/COSO framework are presented in the
following section.
vii. SAS 78/COSO Internal Control Framework
This framework consists of five components which are the control environment, risk
assessment, information and communication, monitoring and the control activity. These
components will be further elaborated below.
The Control Environment
Among the five components, the control environment is the foundation of all the
components. It sets the tone for the organization and influences the control
awareness of its management and employees. The important elements of
control environment are:
The integrity and ethical values of the management
The structure of the organization
The participation of the organization’s board of directors and the audit
committee
Management’s philosophy and operating cycle
The procedures for delegating responsibility and authority
Management’s methods for assessing performance
External influences
The organization’s policies and practices for managing its human
resources
Moreover, SAS 78/COSO requires that auditors obtain sufficient knowledge to assess
the attitude and awareness of the organization’s management, board of directors, and
owners regarding internal control. In order to obtain understanding of the control
environment, the auditors should assess the integrity of the organization’s management
and may use investigative agencies to report on the background of key managers.
Additionally, auditors should also be aware of conditions that would predispose the
management of an organization to commit fraud.
Risk Assessment
Risk Assessment is essential in identifying, analyzing, and managing risks
relevant to financial reporting. It also help to immediately provide actions to
solve a certain problem. Risks can arise or change from a significant and rapid
growth that strains existing internal controls, implementation of new technology
into the production process or information system that impacts transaction
processing, ad adaptation of a new accounting principle that impacts the
preparation of financial statements.
SAS 78/COSO requires also that the auditors obtain enough information of the firm’s
risk assessment procedures to understand how it identifies, prioritizes, and manages
the risks related to financial reporting.
Monitoring
In the event when the management will determine if the internal controls are
functioning as intended, monitoring takes its place. It is the process by which the
quality of internal control design and operation can be assessed.
To achieve an ongoing monitoring, the management can integrate special
computer modules into the information system that capture key data or permit
tests of controls to be conducted as part of routine operations. Another
technique to achieve an ongoing monitoring is the judicious use of management
reports.
Control Activities
To define, control activities are the policies and procedures used to ensure that
appropriate actions are taken to deal with the organization’s identified risks. It
has two distinct categories which are the information technology controls and
physical controls.
Segregation of Duties
Segregation of employee duties is very important in minimizing incompatible
functions. Segregation of duties can take any forms, depending on the specific
duties to be controlled.
There are three objectives that provide general guidelines in segregating duties
which are applicable to most organizations.
Figure 3.4 Segregation of Duties Objectives
Supervision
In performing Achieving adequate segregation of duties often presents
difficulties for small organizations. Obviously, it is impossible to separate five
incompatible tasks among three employees. Therefore, in small organizations or
in functional areas that lack sufficient personnel, management must compensate
for the absence of segregation controls with close supervision. For this reason,
supervision is often called a compensating control.
Access Controls
The purpose of access controls is to ensure that only authorized personnel have
access to the firm’s assets. Unauthorized access exposes assets to
misappropriation, damage, and theft. Therefore, access controls play an
important role in safeguarding assets. Access to assets can be direct or indirect.
Physical security devices, such as locks, safes, fences, and electronic and
infrared alarm systems, control against direct access. Indirect access to assets
is achieved by gaining access to the records and documents that control the
use, ownership, and disposition of the asset.
Example:
An individual with access to all the relevant accounting records can destroy the
audit trail that describes a particular sales transaction. Thus, by removing the
records of the transaction, including the accounts receivable balance, the sale
may never be billed and the firm will never receive payment for the items sold.
The access controls needed to protect accounting records will depend on the
technological characteristics of the accounting system. Indirect access control is
accomplished by controlling the use of documents and records and by
segregating the duties of those who must access and process these records.
Independent Verification