Blackboard Chapter 6
Blackboard Chapter 6
Blackboard Chapter 6
A Systematic Approach
Twelfth Edition
Chapter 6
Internal Control in a
Financial Statement
Audit
Internal Control
Management Responsibility
• Design and maintain controls that provide
reasonable assurance that:
– The entity’s assets and records are properly safeguarded
– The information system generates reliable information
for decision making
• The auditor needs assurance about the reliability
of the data generated by the information system
Auditor Responsibility
• Obtain an understanding of internal control
• Assess control risk
Controls Relevant to the Audit
Objectives
1) Reliability of Financial Reporting
2) Effectiveness and Efficiency of Operations
3) Compliance with Laws and Regulations
Risks
• Reliance on systems or programs that, unknown to management, inaccurately process data,
process inaccurate data, or both.
• Unauthorized access to data that may result in destruction of data or improper changes to data,
including the recording of unauthorized or nonexistent transactions or inaccurate recording of
transactions.
• Unauthorized changes to data in master files.
• Unauthorized changes to systems or programs.
• Failure to make necessary changes to systems or programs.
• Inappropriate manual intervention.
• Potential loss of data.
• Though Question:
• Thinking back on the Xerox case, what tone did their management team set
for their respective company?
• Why is the tone of an organization so critical?
• Should consider external and internal events and circumstances that may
arise and adversely affect the entity’s ability to initiate, record, process,
and report financial data.
• What are examples of business risks that could affect or impact a company’s
ability to achieve business objectives?
Components of Internal Control
Control Activities
• Performance Reviews
• Independent checks
• Physical Controls
• Critical for data reliability
• Segregation of Duties
• CAR (Custody, Authorization, Recording)
• Information Processing Controls
Monitoring of Controls
• Process that assesses the quality of internal control performance over time.
Planning an Audit Strategy
Audit Risk Model
AR = IR × CR × DR
Question 6-32
What internal control problems were present?
Would you expect those problems to occur in
bigger companies?
On September 2, 2010, the Securities & Exchange Commission brought an action against
Sujata Sachdeva, vice president of finance, and Koss senior accountant and subordinate, Julie
Mulvaney, who allegedly helped her cover up the fraudulent scheme. The SEC alleged that
Sachdeva and Mulvaney caused Koss to submit false and misleading financial statements.
Sachdeva regularly relied on Mulvaney to reconcile the cash shortfalls and to balance the
books.
Sachdeva and Mulvaney primarily hid the embezzlement by making false entries on the
Company's general journal. For example, the false journal entries disguised the theft by
overstating assets, expenses, and cost of sales, and understating liabilities and sales.
Mulvaney maintained binders that detailed numerous false journal entries that were made to
the Company's accounting books and records. With those entries, Mulvaney reclassified
Company funds—with no supporting documentation and no legitimate explanation. Mulvaney
also maintained a series of folders that included documentation of over 100 fraudulent
transactions that were included in the Company's accounting books and records.
Sachdeva and Mulvaney were able to hide the substantial embezzlements in part because the
Company did not adequately maintain internal controls to reasonably assure the accuracy and
reliability of financial reporting. Koss's internal controls policy required Michael Koss to approve
invoices of $5,000 or more for payment. However, Koss allegedly delegated duties typically
done by the CFO to Sachdeva on a regular basis. Koss also had little or no educational
background or experience in accounting or finance. Many of the cashier's checks exceeded
$5,000, and some exceeded $100,000. However, its controls did not prevent Sachdeva and
Mulvaney from processing large wire transfers and cashier's checks outside of the accounts
payable system to pay for Sachdeva's personal purchases without seeking or obtaining
Michael Koss's approval. In addition, many account reconciliations were not prepared,
maintained, or reviewed as part of Koss's accounting records. Koss's computerized accounting
system was almost 30 years old.
The Limitations of an Entity’s
Internal Control
1. Management Override of Internal
Control
2. Human Errors or Mistakes
3. Collusion
Thought Question
What is meant by the concept of reasonable
assurance? In other words, why don’t we design an
internal control system to eliminate these risks?
Primary Internal Control Weakness
Observed by CFE
Assessing Control Risk
Which of the following audit techniques would most likely provide an auditor
with the least assurance about the effectiveness of the operation of a
control?
Thought Question:
Why do we perform any amount of audit work at
interim dates?
Auditing Accounting Applications
Processed by Service Organizations
Entities may have some or all of its accounting
transactions processed by an outside service
organization.
• For example, Tickets R Us (Burlingham Bees Case), ADP
(Payroll)
Significant Deficiency
• A deficiency, or a combination of deficiencies, in internal control that
is less severe than a material weakness yet important enough to merit
attention by those charged with governance.
Material Weakness
• A deficiency, or combination of deficiencies, in internal control, such
that there is a reasonable possibility that a material misstatement of
the entity’s financial statements will not be prevented, or detected
and corrected, on a timely basis.
Types of Controls in an IT
Environment
General Controls – overall information processing
environment
• Data center and network operations
• System software acquisition, change, and maintenance
• Access security
• Application system acquisition, development, and
maintenance
• Unauthorized access
• Firewalls
• Encryption
• Passwords
Types of Controls in an IT Environment
Common Data Validation Controls
Data Validation Control Description
Limit test A test to ensure that a numerical value does not exceed some predetermined value.
Range test A check to ensure that the value in a field falls within an allowable range of values.
Sequence check A check to determine if input data are in proper numerical or alphabetical sequence.
Which data validation control reduces the risk of missing purchase orders?