SlideShare a Scribd company logo
Habib Ullah Qamar
Govt. college of Commerce Gujranwala
4/19/2016
 We started with the need of Internal Control
 What is internal Control
 Objectives of Internal control System
 Assumptions of ICS
 Exposures and risks
 PDC Model
 SOX provision and annual Report
 The PDC control model is conceptually
pleasing but offers little practical guidance
for designing specific controls.
 For this, we need a more precise framework.
 The current authoritative document for
specifying internal control objectives and
techniques is Statement on Auditing
Standards (SAS) No. 78,
 It is based on the COSO framework.
 COSO framework was the basis for SAS 78, but
was designed as a management tool rather than
an audit tool.
 SAS 78, on the other hand, was developed for
auditors and describes the complex relationship
between the firm’s internal controls, the
auditor’s assessment of risk, and the planning of
audit procedures.
 Apart from their audience orientation, the two
frameworks are essentially the same and
interchangeable for SOX compliance purposes.
 The key elements of the SAS 78/COSO
framework consists of five components
1. The control environment
2. Risk assessment
3. Information and communication
4. Monitoring
5. control activities.
 The control environment is the foundation for the
other four control components. The control
environment sets the tone for the organization
and influences the control awareness of its
management and employees.
 Important elements of the control environment
are:
1. The integrity and ethical values of
management.
2. The structure of the organization.
3. The participation of the organization’s board
of directors and the audit committee, if one
exists.
4. Management’s philosophy and operating
style.
5. The procedures for delegating responsibility
and authority.
6. Management’s methods for assessing
performance.
7. External influences, such as examinations
by regulatory agencies.
8. The organization’s policies and practices for
managing its human resources
 Auditors should assess the integrity of the
organization’s management and may use
investigative agencies to report on the
backgrounds of key managers. Some of the “Big
Four” public accounting firms utilize ex-FBI agents
whose primary responsibility is to perform
background checks on existing and prospective
clients. In case of serious reservations the auditor
should withdraw from the audit. The reputation
and integrity of the company’s managers are
critical factors in determining the audit ability of
the organization. Auditors cannot function properly
in an environment in which client management is
deemed unethical and corrupt.
 Auditors should be aware of conditions that
would prejudice the management of an
organization to commit fraud. For example
 lack of sufficient working capital, adverse
industry conditions, bad credit ratings, and the
existence of extremely restrictive conditions in
bank or indenture agreements.
 If auditors encounter any such conditions, their
examination should give due consideration to the
possibility of fraudulent financial reporting.
 Appropriate measures should be taken, and every
attempt should be made to uncover any fraud.
 Auditors should understand a client’s
business and industry and should be aware of
conditions peculiar to the industry that may
affect the audit. Auditors should read
industry-related literature and familiarize
themselves with the risks that are inherent in
the business.
 The board of directors should adopt, as a
minimum, the provisions of SOX..
 Separate CEO and chairman. The roles of CEO
and board chairman should be separate.
Executive sessions give directors the
opportunity to discuss issues without
management present, and an independent
chairman is important in facilitating such
discussions.
 Set ethical standards.
 Establish an independent audit committee
 Compensation committees
 Nominating committees. The board nominations
committee should have a plan to maintain a fully
staffed board of directors with capable people as
it moves forward for the next several years. The
committee must recognize the need for
independent directors and have criteria for
determining independence.
 Access to outside professionals. All committees
of the board should have access to attorneys and
consultants other than the corporation’s normal
counsel and consultants. Under the provisions of
SOX, the audit committee of an SEC report-ing
company is entitled to such representation
independently.
 Organizations must perform a risk assessment to
identify, analyze, and manage risks relevant to
financial reporting.
 Risk Circumstances
1. Changes in the operating environment that
impose new or changed competitive pressures
on the firm.
2. New personnel who have a different or
inadequate understanding of internal control.
3. New or reengineered information systems that
affect transaction processing.
4. Significant and rapid growth that damage
existing internal controls.
5. The introduction of new product lines or activities with
which the organization has little experience.
6. Organizational restructuring resulting in the reduction
and/or reallocation of person-nel such that business
operations and transaction processing are affected.
7. Entering into foreign markets that may impact
operations (that is, the risks associated with foreign
currency transactions).
8. Adoption of a new accounting principle that impacts the
preparation of financial statements
 SAS 78 requires that auditors obtain sufficient
knowledge of the organization’s risk assessment
procedures to understand how management identifies,
prioritizes, and man-ages the risks related to financial
reporting.
 The accounting information system (AIS) consists of the
records and methods used to initiate, identify, analyze,
classify, and record the organization’s transactions and to
account for the related assets and liabilities.
 SAS 78 requires that auditors obtain sufficient knowledge
of the organization’s information system to understand
1. The classes of transactions that are material to the
financial statements and how those transactions are
initiated.
2. The accounting records and accounts that are used in
the processing of material transactions.
3. The transaction processing steps involved from the
initiation of a transaction to its inclusion in the financial
statements.
4. The financial reporting process used to prepare financial
statements, disclosures, and accounting estimates.
 To evaluate the internal control system
 Monitoring is the process by which the quality of
internal control design and operation can be
assessed.
 An organization’s internal auditors may monitor the
entity’s activities in separate procedures.
 Ongoing monitoring may be achieved by integrating
special computer modules into the information
system that capture key data and/or permit tests of
controls to be conducted as part of routine
operations.
 Another technique for achieving ongoing monitoring
is the sensible use of management reports. (time and
accuracy)
 Control activities are the policies and
procedures used to ensure that appropriate
actions are taken to deal with the
organization’s identified risks.
 Control activities can be grouped into two
distinct categories
 IT controls
 Physical controls
 IT controls relate specifically to the computer
environment.
 They fall into two broad groups
 General controls
 Application controls
 General controls pertain to entity-wide concerns
such as controls over the data center,
organization databases, systems development,
and program maintenance.
 Application controls ensure the integrity of
specific systems such as sales order processing,
accounts payable, and payroll applications.
 This class of controls relates primarily to the
human activities
 It may include
 Physical custody of assets
 Physical use of computers to record transactions
or update accounts.
 They relate to the human activities that trigger
and utilize the results computer generated
Results.
 In other words, physical controls focus on
people, but are not restricted to an environment
in which clerks update paper accounts with pen
and ink.
 Transaction Authorization. The purpose of transaction
authorization is to ensure that all material transactions
processed by the information system are valid and in
accordance with management’s objectives.
 Authorizations may be general or specific.
 General authority is granted to operations personnel to
perform day-to-day operations.
 An example of general authorization is the procedure to
authorize the purchase of inventories from a designated
vendor only when inventory levels fall to their
predetermined reorder points. This is called a
programmed procedure (not necessarily in the computer
sense of the word) where the decision rules are specified
in advance, and no additional approvals are required.
 Specific authorizations deal with case-by-
case decisions associated with non-routine
transactions.
 An example of this is the decision to extend a
particular customer’s credit limit beyond the
normal amount.
 Specific authority is usually a management
responsibility .
 Separation of employee duties to minimize
incompatible functions.
 Segregation of duties can take many forms,
depending on the specific duties to be
controlled. However, the following three
objectives provide general guidelines applicable
to most organizations.
 Authorization for a transaction and Processing
of the transaction should be separate.
 For example, the purchasing department should
not initiate purchases until the inventory control
department gives authorization.
 Responsibility for the custody of assets should be
separate from the record-keeping responsibility.
 For example, the department that has physical
custody of finished goods inventory (the
warehouse) should not keep the official inventory
records.
 The organization should be structured so that a
successful fraud requires involvement between
two or more individuals with incompatible
responsibilities.
 For example, no individual should have sufficient
access to accounting records to perpetrate a
fraud
 Implementing adequate segregation of duties
requires that a firm employ a sufficiently large
number of employees.
 Achieving adequate segregation of duties often
presents difficulties for small organizations.
 Obviously, it is impossible to separate five
incompatible tasks among three employees.
 Therefore, in small organizations or in functional
areas that lack sufficient personnel, management
must compensate for the absence of segregation
controls with close supervision.
 For this reason, supervision is often called a
compensating control.
 The accounting records of an organization
consist of source documents, journals, and
ledgers.
 The purpose of access controls is to ensure
that only authorized personnel have access to
the firm’s assets.
 Verification procedures are independent
checks of the accounting system to identify
errors and misrepresentations.
 This chapter began by examining ethical issues.
 good ethics is a necessary condition for the long-
term profitability of a business
 The next section examined fraud and its relationship
to auditing. Fraud falls into two general categories:
employee fraud and management fraud.
 The third section examined the subject of internal
control. The adequacy of the internal control
structure is an issue of great importance to both
management and accountants. Internal control was
examined
 first using the PDC control model that classifies
controls as preventive, detective, and corrective.
Next, the SAS 78/COSO framework recommended for
compliance with SOX was examined.
Revenue Cycle
See you again in sha ALLAH
4/19/2016

More Related Content

PPTX
521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx
PPT
James hall ch 1
PDF
AUDIT SPECIALIZED INDUSTRIES 2.pdf
PPTX
Chapter 02 - Transaction Processing System
PPT
James hall ch 4
PPTX
Board of Directors/Trustees/Officers
PPTX
Chapter 1 - The Information System: An Accountant's Perspective
PPT
The Revenue Cycle
521974482-AUDITING-and-ASSURANCE-Specialized-Industries-1.pptx
James hall ch 1
AUDIT SPECIALIZED INDUSTRIES 2.pdf
Chapter 02 - Transaction Processing System
James hall ch 4
Board of Directors/Trustees/Officers
Chapter 1 - The Information System: An Accountant's Perspective
The Revenue Cycle

What's hot (20)

PPTX
Chapter 2 auditing it governance controls
PPT
04 chapter 5 estate tax
PPTX
AC102 PPT8 - Partnership Liquidation Lump Sum (PPT from Sir Leandro Fua)
PPTX
Governance, Risk Management, and Internal Control
PPT
James hall ch 5
PPT
Accounting for corporations
PPT
James hall ch 2
PPT
James hall ch 7
PPTX
Auditing the expenditure cycle
PDF
24201843 studdy-note-8
PDF
Ap cash-cash-equivalents-q
PPTX
Tax law in the Philippines
PPTX
Cash and Cash equivalent
PPT
PARTNERSHIP dissolution LUPISAN
PPT
James hall ch 10
PPT
Revenue cycle (AIS)
PPTX
Accounting for Partnerships
PPT
03 chapter 4 deductions from gross estate part 02
PPTX
Corporation Code(Philippines)
DOC
corporation
Chapter 2 auditing it governance controls
04 chapter 5 estate tax
AC102 PPT8 - Partnership Liquidation Lump Sum (PPT from Sir Leandro Fua)
Governance, Risk Management, and Internal Control
James hall ch 5
Accounting for corporations
James hall ch 2
James hall ch 7
Auditing the expenditure cycle
24201843 studdy-note-8
Ap cash-cash-equivalents-q
Tax law in the Philippines
Cash and Cash equivalent
PARTNERSHIP dissolution LUPISAN
James hall ch 10
Revenue cycle (AIS)
Accounting for Partnerships
03 chapter 4 deductions from gross estate part 02
Corporation Code(Philippines)
corporation
Ad

Similar to Lecture 17 sas framework internal control - james a. hall book chapter 3 (20)

PPT
Internal control 1_ricc_revised
PDF
Chapter 7
PDF
Chapter 7
PPTX
Control and Audit Information System
PPTX
Tugas control & audit sistem informasi
PPTX
Chapter 1 auditing and internal control
PPTX
Chapter 1 auditing and internal control
PDF
Internal control
PPTX
Kontrol & Audit Sistem Informasi
PPT
Accounting Information Systems by James A. Hall 6th ed ch03
PPT
Technology Auditing, Assurance, Internal Control
PPTX
01.1. Internal Control System_Oct'21.pptx
PPT
Powerpoint.ppt on intrnal cntrol overview
PPT
477 10 (5)
PPT
batas opisyal.ppt
PDF
Internal controls in an IT environment
PPTX
Internal Financial Controls
PPT
accounting information system Ethics_Frauds.ppt
PPT
James hall ch 3
DOCX
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Internal control 1_ricc_revised
Chapter 7
Chapter 7
Control and Audit Information System
Tugas control & audit sistem informasi
Chapter 1 auditing and internal control
Chapter 1 auditing and internal control
Internal control
Kontrol & Audit Sistem Informasi
Accounting Information Systems by James A. Hall 6th ed ch03
Technology Auditing, Assurance, Internal Control
01.1. Internal Control System_Oct'21.pptx
Powerpoint.ppt on intrnal cntrol overview
477 10 (5)
batas opisyal.ppt
Internal controls in an IT environment
Internal Financial Controls
accounting information system Ethics_Frauds.ppt
James hall ch 3
Chapter 9Audit Risk AssessmentPrepared by Dr Phil Saj1.docx
Ad

More from Habib Ullah Qamar (20)

PPTX
Guidance and counselling
PPTX
Educational technology and tv radio simulation
PPTX
Lecture 1 ECommerce an Introduction for Master classes UOS
PPTX
Computer manged learning and problems code 8620 bed
PPTX
Computer assisted instructions B.Ed course cose 8620
PPTX
Computer Assisted Instructions AIOU MA Education MED code 855
PPTX
Ict lecture 1 An introduction to information and Communication technology and...
PPTX
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
PPTX
Lecture 3 e-cmmerce , business models and concpets-chapter 2
PPTX
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
PPTX
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
PPTX
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
PPTX
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
PPTX
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
PPTX
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
PPTX
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
PPTX
Lecture 3 e-cmmerce , business models and concpets-chapter 2
PPTX
Lecture 2 e-cmmerce , types of e-commerces-an introduction
PPTX
Lecture 1 e-cmmerce , an introduction
PPTX
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...
Guidance and counselling
Educational technology and tv radio simulation
Lecture 1 ECommerce an Introduction for Master classes UOS
Computer manged learning and problems code 8620 bed
Computer assisted instructions B.Ed course cose 8620
Computer Assisted Instructions AIOU MA Education MED code 855
Ict lecture 1 An introduction to information and Communication technology and...
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 7 e-cmmerce , building an e commerce presence, website and mobile ...
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 5 e-cmmerce , how ecommerce changes business, strategy structure -ch...
Lecture 4 e-cmmerce , b2b business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 2 e-cmmerce , types of e-commerces-an introduction
Lecture 1 e-cmmerce , an introduction
Lecture 25 conversion cycle -wolrd class companies & lean manufacturing-...

Recently uploaded (20)

PPTX
master seminar digital applications in india
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Cell Types and Its function , kingdom of life
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
master seminar digital applications in india
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Pharma ospi slides which help in ospi learning
Cell Types and Its function , kingdom of life
TR - Agricultural Crops Production NC III.pdf
Complications of Minimal Access Surgery at WLH
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Computing-Curriculum for Schools in Ghana
O7-L3 Supply Chain Operations - ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
Insiders guide to clinical Medicine.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Supply Chain Operations Speaking Notes -ICLT Program
VCE English Exam - Section C Student Revision Booklet
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial diseases, their pathogenesis and prophylaxis
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
FourierSeries-QuestionsWithAnswers(Part-A).pdf

Lecture 17 sas framework internal control - james a. hall book chapter 3

  • 1. Habib Ullah Qamar Govt. college of Commerce Gujranwala 4/19/2016
  • 2.  We started with the need of Internal Control  What is internal Control  Objectives of Internal control System  Assumptions of ICS  Exposures and risks  PDC Model  SOX provision and annual Report
  • 3.  The PDC control model is conceptually pleasing but offers little practical guidance for designing specific controls.  For this, we need a more precise framework.  The current authoritative document for specifying internal control objectives and techniques is Statement on Auditing Standards (SAS) No. 78,  It is based on the COSO framework.
  • 4.  COSO framework was the basis for SAS 78, but was designed as a management tool rather than an audit tool.  SAS 78, on the other hand, was developed for auditors and describes the complex relationship between the firm’s internal controls, the auditor’s assessment of risk, and the planning of audit procedures.  Apart from their audience orientation, the two frameworks are essentially the same and interchangeable for SOX compliance purposes.
  • 5.  The key elements of the SAS 78/COSO framework consists of five components 1. The control environment 2. Risk assessment 3. Information and communication 4. Monitoring 5. control activities.
  • 6.  The control environment is the foundation for the other four control components. The control environment sets the tone for the organization and influences the control awareness of its management and employees.  Important elements of the control environment are: 1. The integrity and ethical values of management. 2. The structure of the organization. 3. The participation of the organization’s board of directors and the audit committee, if one exists.
  • 7. 4. Management’s philosophy and operating style. 5. The procedures for delegating responsibility and authority. 6. Management’s methods for assessing performance. 7. External influences, such as examinations by regulatory agencies. 8. The organization’s policies and practices for managing its human resources
  • 8.  Auditors should assess the integrity of the organization’s management and may use investigative agencies to report on the backgrounds of key managers. Some of the “Big Four” public accounting firms utilize ex-FBI agents whose primary responsibility is to perform background checks on existing and prospective clients. In case of serious reservations the auditor should withdraw from the audit. The reputation and integrity of the company’s managers are critical factors in determining the audit ability of the organization. Auditors cannot function properly in an environment in which client management is deemed unethical and corrupt.
  • 9.  Auditors should be aware of conditions that would prejudice the management of an organization to commit fraud. For example  lack of sufficient working capital, adverse industry conditions, bad credit ratings, and the existence of extremely restrictive conditions in bank or indenture agreements.  If auditors encounter any such conditions, their examination should give due consideration to the possibility of fraudulent financial reporting.  Appropriate measures should be taken, and every attempt should be made to uncover any fraud.
  • 10.  Auditors should understand a client’s business and industry and should be aware of conditions peculiar to the industry that may affect the audit. Auditors should read industry-related literature and familiarize themselves with the risks that are inherent in the business.  The board of directors should adopt, as a minimum, the provisions of SOX..
  • 11.  Separate CEO and chairman. The roles of CEO and board chairman should be separate. Executive sessions give directors the opportunity to discuss issues without management present, and an independent chairman is important in facilitating such discussions.  Set ethical standards.  Establish an independent audit committee  Compensation committees
  • 12.  Nominating committees. The board nominations committee should have a plan to maintain a fully staffed board of directors with capable people as it moves forward for the next several years. The committee must recognize the need for independent directors and have criteria for determining independence.  Access to outside professionals. All committees of the board should have access to attorneys and consultants other than the corporation’s normal counsel and consultants. Under the provisions of SOX, the audit committee of an SEC report-ing company is entitled to such representation independently.
  • 13.  Organizations must perform a risk assessment to identify, analyze, and manage risks relevant to financial reporting.  Risk Circumstances 1. Changes in the operating environment that impose new or changed competitive pressures on the firm. 2. New personnel who have a different or inadequate understanding of internal control. 3. New or reengineered information systems that affect transaction processing. 4. Significant and rapid growth that damage existing internal controls.
  • 14. 5. The introduction of new product lines or activities with which the organization has little experience. 6. Organizational restructuring resulting in the reduction and/or reallocation of person-nel such that business operations and transaction processing are affected. 7. Entering into foreign markets that may impact operations (that is, the risks associated with foreign currency transactions). 8. Adoption of a new accounting principle that impacts the preparation of financial statements  SAS 78 requires that auditors obtain sufficient knowledge of the organization’s risk assessment procedures to understand how management identifies, prioritizes, and man-ages the risks related to financial reporting.
  • 15.  The accounting information system (AIS) consists of the records and methods used to initiate, identify, analyze, classify, and record the organization’s transactions and to account for the related assets and liabilities.  SAS 78 requires that auditors obtain sufficient knowledge of the organization’s information system to understand 1. The classes of transactions that are material to the financial statements and how those transactions are initiated. 2. The accounting records and accounts that are used in the processing of material transactions. 3. The transaction processing steps involved from the initiation of a transaction to its inclusion in the financial statements. 4. The financial reporting process used to prepare financial statements, disclosures, and accounting estimates.
  • 16.  To evaluate the internal control system  Monitoring is the process by which the quality of internal control design and operation can be assessed.  An organization’s internal auditors may monitor the entity’s activities in separate procedures.  Ongoing monitoring may be achieved by integrating special computer modules into the information system that capture key data and/or permit tests of controls to be conducted as part of routine operations.  Another technique for achieving ongoing monitoring is the sensible use of management reports. (time and accuracy)
  • 17.  Control activities are the policies and procedures used to ensure that appropriate actions are taken to deal with the organization’s identified risks.  Control activities can be grouped into two distinct categories  IT controls  Physical controls
  • 18.  IT controls relate specifically to the computer environment.  They fall into two broad groups  General controls  Application controls  General controls pertain to entity-wide concerns such as controls over the data center, organization databases, systems development, and program maintenance.  Application controls ensure the integrity of specific systems such as sales order processing, accounts payable, and payroll applications.
  • 19.  This class of controls relates primarily to the human activities  It may include  Physical custody of assets  Physical use of computers to record transactions or update accounts.  They relate to the human activities that trigger and utilize the results computer generated Results.  In other words, physical controls focus on people, but are not restricted to an environment in which clerks update paper accounts with pen and ink.
  • 20.  Transaction Authorization. The purpose of transaction authorization is to ensure that all material transactions processed by the information system are valid and in accordance with management’s objectives.  Authorizations may be general or specific.  General authority is granted to operations personnel to perform day-to-day operations.  An example of general authorization is the procedure to authorize the purchase of inventories from a designated vendor only when inventory levels fall to their predetermined reorder points. This is called a programmed procedure (not necessarily in the computer sense of the word) where the decision rules are specified in advance, and no additional approvals are required.
  • 21.  Specific authorizations deal with case-by- case decisions associated with non-routine transactions.  An example of this is the decision to extend a particular customer’s credit limit beyond the normal amount.  Specific authority is usually a management responsibility .
  • 22.  Separation of employee duties to minimize incompatible functions.  Segregation of duties can take many forms, depending on the specific duties to be controlled. However, the following three objectives provide general guidelines applicable to most organizations.  Authorization for a transaction and Processing of the transaction should be separate.  For example, the purchasing department should not initiate purchases until the inventory control department gives authorization.
  • 23.  Responsibility for the custody of assets should be separate from the record-keeping responsibility.  For example, the department that has physical custody of finished goods inventory (the warehouse) should not keep the official inventory records.  The organization should be structured so that a successful fraud requires involvement between two or more individuals with incompatible responsibilities.  For example, no individual should have sufficient access to accounting records to perpetrate a fraud
  • 24.  Implementing adequate segregation of duties requires that a firm employ a sufficiently large number of employees.  Achieving adequate segregation of duties often presents difficulties for small organizations.  Obviously, it is impossible to separate five incompatible tasks among three employees.  Therefore, in small organizations or in functional areas that lack sufficient personnel, management must compensate for the absence of segregation controls with close supervision.  For this reason, supervision is often called a compensating control.
  • 25.  The accounting records of an organization consist of source documents, journals, and ledgers.  The purpose of access controls is to ensure that only authorized personnel have access to the firm’s assets.  Verification procedures are independent checks of the accounting system to identify errors and misrepresentations.
  • 26.  This chapter began by examining ethical issues.  good ethics is a necessary condition for the long- term profitability of a business  The next section examined fraud and its relationship to auditing. Fraud falls into two general categories: employee fraud and management fraud.  The third section examined the subject of internal control. The adequacy of the internal control structure is an issue of great importance to both management and accountants. Internal control was examined  first using the PDC control model that classifies controls as preventive, detective, and corrective. Next, the SAS 78/COSO framework recommended for compliance with SOX was examined.
  • 28. See you again in sha ALLAH 4/19/2016