Professional Documents
Culture Documents
Internal Control2019
Internal Control2019
High Cost of
Computer
error
• Cost of computer abuse
• Value of hardware,
Maintenance
Privacy
software, personnel
• High cost of computer
error
Cost of
incorrect
decision
Controlled
Evolution of
• Maintenance of privacy
• Controlled evolution of
Computer use
computer use
Cost of
computer
abuse
• The core business is Its people-their individual attributes, including integrity, ethical vales and
competence and the environment in which they are operate.
• They are the engine that drive organization and the foundation on which everything rest
RISK ASSESSMENT
• The organization must aware of and deal with the risk it faces
• It must set objectives, integrated with the sales, production, marketing, financial and other
activities.
• So that the organization is operating in concrete,. It must also establish mechanism to identify,
analyze and manage the related risks
CONTROL ACTIVITIES
• Control policies and procedure must be establish and execute to help ensure that the action
identifies by the management as necessary to address risk to achievement of the organization’s
objective are effectively carried out
INFORMATION AND COMMUNICATION
• Surrounding the control activities are information and communication. These enable the
organization’s people to capture and exchange the information needed to conduct. Manage and
control its operation
MONITORING
• The entire process a must be monitored and modifications made as necessary. In this way the
system can react dynamically. Changing as condition warrant
• Mana yang paling penting diantara 5 komponen internal control.
THE CONTROL ENVIRONMENT
• The control environment consists of many factors, including the following:
1 Commitment to integrity and ethical values
2 Management’s philosophy and operating style
3 Organizational structure
THE CONTROL ENVIRONMENT
4 The audit committee of the board of directors
5 Methods of assigning authority and responsibility
6 Human resources policies and practices
7 External influences
COMMITMENT TO INTEGRITY AND
ETHICAL VALUES
• The management of an organization must show their commitments toward implementation of
ethical values
• The most critical aspect of an organization’s control environment is management’s attitude
toward internal control and the emphasis it places on internal control in the organizations
MANAGEMENT’S PHILOSOPHY AND
OPERATING STYLE
• The management of any organization strives for profitable operation, growth and other
indicator business success.
• But there are often difference in how management attempt to achieve goals for business
ORGANIZATIONAL STRUCTURE
• Another key element of a company’s control environment is its organization structure Which
define the line of authority and responsibility within the company and provides the overall
framework for planning, directing and controlling its operation
METHODS OF ASSIGNING AUTHORITY
AND RESPONSIBILITY
• Management’s methods of assigning authority and responsibility have an important influence on
the control environment.
• Authority and responsibility my be assigned through formal job descriptions
Audit Committee
• Numerous external values may effect the operation and practices of a business organization
and its control environment.
CONTROL ACTIVITIES
• The second component of COSO’s internal control model is control activities.
• Generally, control procedures fall into one of five categories:
1 Proper authorization of transactions and activities
2 Segregation of duties
CONTROL ACTIVITIES
3 Design and use of adequate documents and records
4 Adequate safeguards of assets and records
5 Independent checks on performance
PROPER AUTHORIZATION OF
TRANSACTIONS AND ACTIVITIES
• Authorization is the empowerment management gives employees to perform activities and
make decisions.
• Digital signature or fingerprint is a means of signing a document with a piece of data that cannot
be forged.
• Specific authorization is the granting of authorization by management for certain activities or
transactions.
SEGREGATION OF DUTIES
• Good internal control demands that no single employee be given too much responsibility.
• An employee should not be in a position to perpetrate and conceal fraud or unintentional
errors.
SEGREGATION OF DUTIES
Custodial Functions
Handling cash
Handling assets
Writing checks
Receiving checks in mail Authorization Functions
Authorization of
Recording Functions transactions
Preparing source documents
Maintaining journals
Preparing reconciliations
Preparing performance reports
SEGREGATION OF DUTIES
• If two of these three functions are the responsibility of a single person, problems can arise.
• Segregation of duties prevents employees from falsifying records in order to conceal theft of
assets entrusted to them.
• Prevent authorization of a fictitious or inaccurate transaction as a means of concealing asset
thefts.
SEGREGATION OF DUTIES
• Segregation of duties prevents an employee from falsifying records to cover up an inaccurate
or false transaction that was inappropriately authorized.
DESIGN AND USE OF ADEQUATE
DOCUMENTS AND RECORDS
• The proper design and use of documents and records helps ensure the accurate and complete
recording of all relevant transaction data.
• Documents that initiate a transaction should contain a space for authorization.
DESIGN AND USE OF ADEQUATE
DOCUMENTS AND RECORDS
• The following procedures safeguard assets from theft, unauthorized use, and vandalism:
– effectively supervising and segregating duties
– maintaining accurate records of assets, including information
– restricting physical access to cash and paper assets
– having restricted storage areas
ADEQUATE SAFEGUARDS OF
ASSETS AND RECORDS
• What can be used to safeguard assets?
– cash registers
– safes, lockboxes
– safety deposit boxes
– restricted and fireproof storage areas
– controlling the environment
– restricted access to computer rooms, computer files, and information
INDEPENDENT CHECKS
ON PERFORMANCE
• Independent checks to ensure that transactions are processed accurately are another
important control element.
• What are various types of independent checks?
– reconciliation of two independently maintained set of records
– comparison of actual quantities with recorded amounts
INDEPENDENT CHECKS
ON PERFORMANCE
– double-entry accounting
– batch totals
• Five batch totals are used in computer systems:
1 A financial total is the sum of a dollar field.
2 A hash total is the sum of a field that would usually not be added.
INDEPENDENT CHECKS
ON PERFORMANCE
3 A record count is the number of documents processed.
4 A line count is the number of lines of data entered.
5 A cross-footing balance test compares the grand total of all the rows with the grand total of all
the columns to check that they are equal.
PERTANYAAN
• Apa yang harus diketahui oleh akuntan dalam kaitannya dengankomponen COSO; Information
and communication?
• Jelaskan dengan contoh
MONITORING PERFORMANCE
• What are the key methods of monitoring performance?
– effective supervision
– responsibility accounting
– internal auditing
MONITORING PERFORMANCE
• The fifth component of COSO’s internal control model is monitoring.
• What are the key methods of monitoring performance?
– effective supervision
– responsibility accounting
– internal auditing
• Terima Kasih