Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

MODULE 9 When apparently, incompatible functions are combined in the computer system,

compensating controls are necessary to prevent improper human intervention with computer
EFFECT OF COMPUTERS ON INTERNAL CONTROL
processing. A person with the opportunity to make unauthorized changes in computer
The goals of asset safeguarding, data integrity, system effectiveness and system efficiency, programs or data files is in a position to exploit the concentration of data processing functions
can be achieved only if an organization's management sets up a system of internal control. in a computer system. For example, a computer system used to process accounts payable
Controls help to ensure that financial statement assertions are valid, and they do so in part by may be designed to approve a vendor's invoice for payment only when that invoice is
making computer fraud harder to accomplish and easier to detect. Use of computers does not supported by a purchase order and receiving report. An employee able to make unauthorized
affect the basic objectives of internal control, however, it affects how these objectives must changes to data or programs in that system could cause unsubstantiated payments to be
be achieved. made to specific vendors.

Traditionally, major components of an internal control system include: Computer programs and data files cannot be changed without the use of computer equipment.
When changes are made, however, there may be no visible evidence of the alteration. Thus,
a. separation of duties, the organization of the information systems department should prevent its personnel from
b. clear delegation of authority and responsibility, having inappropriate access to equipment, programs, or data files. This is accomplished by
c. recruitment and training of high-quality personnel, providing definite lines of authority and responsibility, segregation of functions, and clear
d. a system of authorization, definition of duties for each employee in the department. The organization of the information
e. adequate document and record, system department varies from one company to another in terms of reporting responsibility,
f. physical control over assets, and relationships with other departments, and responsibilities within the department.
g. records management supervision,
h. independent checks on performance and Delegation of Authority and Responsibility
i. periodic comparison of recorded accountability with assets.
In a manual system, accounting personnel should not prepare the initial record of business
These components must still exist in a computer system. However, the use of computers transactions, have custody of non-accounting-related assets, or authorize transactions.
affects the implementation of these internal control components in several ways. In essence, Similarly, data processing personnel should not prepare the initial record of a business
they have adopted and adapted to fit in with the computer environment. transaction, have initiated custody of assets unrelated to data processing, or have the
authority to authorize transactions. If data processing personnel were permitted to initiate the
Segregation of Duties recording of transactions, they could enter transactions that did not occur or enter transactions
Because of the ability of computers to process data efficiently, there is a tendency to combine that reversed or altered transactions initiated by others.
the performance of many data processing functions. In a manual or mechanical system, these When personnel have access to assets and can initiate the recording of transactions, they
combinations of functions may be considered incompatible from a standpoint of achieving can assets without approval and remove them from the books by initiating an entry or
strong internal control. For example, in a manual system the function of recording cash authorizing a transaction. Preventing data processing personnel from having custody of
receipts is generally segregated from responsibility for posting entries to the subsidiary assets unrelated to data processing helps to establish the existence and completeness
accounts receivable. Because one of these procedures serves as a check upon the other, assertions. Finally, if data processing personnel were permitted to authorize transactions, they
assigning both functions to one employee would enable the employee to conceal his or her could authorize fictitious transactions.
own errors. A properly programmed computer, however, has no tendency or motivation to
conceal its errors and may record these transactions simultaneously. Therefore, what appears A clear line of authority and responsibility is an essential control in both manual and computer
to be an incompatible combination of functions may be combined in a computer system systems. In a computer system, however, delegating authority and responsibility in an
without weakening internal control. ambiguous way might be difficult because some resources are shared among multiple users.
For example, one objective of using a database management system is to provide multiple Adequate Documents and Records
users with access to the same data, thereby reducing the control problems that arise with
The traditional accounting records of an organization consist of source documents, journals,
maintaining redundant data, when multiple users have access to the same data and the
and ledgers. These records capture the economic essence of transactions and provide an
integrity of the data is somehow violated, it is not always easy to trace who is responsible for
audit trail of economic events. The audit trail enables the auditor to trace any transaction
corrupting the data and who is responsible for identifying and correcting the error. Some
through all phases of its processing from the initiation of the event to the financial statements.
organizations have attempted to overcome these problems by designating a single user as
the owner of the data. This user assumes ultimate responsibility for the integrity of the data. In computer systems, documents might not be used to support the initiation, execution, and
recording of some transactions. For example, in an online order entry system, customers
Authority and responsibility lines have also been blurred by the rapid growth in end-user
orders received by telephone might be entered directly into the system. Similarly, some
computing. Because high-level languages are more readily available, more users are
transactions might be activated automatically by a computer system. For example, an
developing, modifying, operating, and maintaining their own application systems instead of
inventory replenishment program could initiate purchase orders when stock levels fall below
having this work performed by information systems professionals. Although these
a set amount. Thus, no visible audit or management trail would be available to trace the
developments have substantial benefits for the users of computing services in an
transactions.
organization, unfortunately, they exacerbate the problems of exercising overall control over
computing use. The absence of a visible audit trail is not a problem for auditors, provided that systems have
been designed to maintain a record of all events and the record can be easily accessed. In
Competent and Trustworthy Personnel
well-designed computer systems, audit trails are often more extensive than those maintained
Substantial power is often vested in persons responsible for the computer-based information in manual systems. Unfortunately, not all computer systems are well-designed. Some
systems developed, implemented, operated, and maintained within organizations. For software, for example, does not provide adequate access controls and logging facilities to
example, a systems analyst might be responsible for advising management on the suitability ensure preservation of an accurate and complete audit trail. When this situation is coupled
of high-cost, high-technology equipment. Similarly, a computer operator sometimes takes with a decreased ability to separate incompatible functions, serious control problems can
responsibility for safeguarding critical software and critical data during execution of or backup arise.
of a system. The power vested in the personnel responsible for manual systems.
The obligation to maintain an audit trail exists in an IT environment just as it does in manual
Unfortunately, ensuring that an organization has competent and trustworthy information setting. Some computer systems maintain no physical source documents. Journals and
systems personnel is a difficult task. In many countries and across many years, well trained ledgers often do not exist in the traditional sense. Instead, records of transactions and other
and experienced information systems personnel have been in short supply. Therefore, economic events are fragmented across several normalized database tables. Audit trails may
organizations sometimes have been forced to compromise in their choice of staff. Moreover, take the form of pointers, hashing techniques, indexes, or embedded keys that link record
it is not always easy for organizations to assess the competence and integrity of their fragments between and among database tables. To meet their responsibilities, auditors must
information systems staff. High turnover among these staff has been the norm. Therefore, understand the operational principles of the database management systems in use and the
managers have had insufficient time to evaluate them properly. In addition, the rapid evolution effects on accounting records and audit trails of alternative file structures.
of technology inhibits management's ability to evaluate an information system employee's
Physical Control over Assets and Records
skills. Some information systems personnel also seem to lack a well-developed sense of
ethics, and some seem to delight in subverting controls. The purpose of physical control over assets and records is to ensure that only authorized
personnel have access to the firm's assets. Computer systems differ from manual systems,
however, in the way they concentrate the information systems assets and records of an
organization. For example, in a manual system, a person wishing to perpetrate a fraud might
need access to records that are maintained at different physical locations. In a computer 3. Management's inability to adequately observe employees in an IT environment
system, however, all the necessary records can be maintained at a single site - namely, the because data processing personnel may be distributed throughout areas and perform
site where the computer is located. Thus. the perpetrator does not have to go to physically their functions remotely via telecommunications links. Supervisory controls must
disparate locations to execute the fraud. therefore be designed into the computer system to compensate for the lack of direct
supervision.
Data consolidation exposes the organization to losses that can arise from computer abuse or
a disaster. For instance, a fire that destroys a computer room could result in the loss of all Independent Checks on Performance
major master master files in an organization. If the organization does not have suitable
In manual, independent checks are carried out because employees are likely to forget
backup, it might be unable to continue operations.
procedures, make genuine mistakes, become careless, or intentionally fail to follow prescribed
Adequate Maintenance Supervision procedures. Checks by an independent person help to detect any errors or irregularities. If the
program code in a computer system is authorized, accurate, and complete, the system will
Achieving adequate segregation of duties often presents difficulty for small organizations.
always follow the designated procedures in the absence of some other types of failure like a
Management must compensate for the absence of segregation controls with close
hardware or systems software failure. Thus, independent checks on the performance of
supervision.
programs often have little value. Instead, the control emphasis shifts to ensuring the veracity
In a manual system, management supervision of employees activities is relatively of program code. Insofar as many independent checks on performance are no longer
straightforward because the managers and the employees are often at the same physical appropriate, auditors must now evaluate the controls established for program development,
location. In computer systems, however, data communications facilities can be used to enable modification, operation, and maintenance.
employees to be closer to the customers they serve. Thus, supervision of employees might
Through independent verification procedures, management can assess:
have to be carried out remotely. Supervisory controls must be built into the computer system
to compensate for the controls that usually can be exercised through observation and inquiry. 1. The performance of individuals
2. The integrity of the transaction processing system
Computer systems also make the activities of employees less visible to management.
3. The correctness of data contained in accounting records
Because many activities are performed electronically, managers must periodically access the
audit trail of employee activities and examine it for unauthorized actions. Again, the Comparing Recorded Accountability with Assets
effectiveness of observation and inquiry as control is decreased.
Periodically, data and the assets that the data purports to represent should be compared to
In an IT environment, supervision must be more elaborate than in manual systems for the determine, whether incompleteness or inaccuracies in the data exist or whether shortages or
following reasons excesses in the assets have occurred. In a manual system, independent staff prepare the
basic data used for comparison purposes. In a computer system, however, software is used
1. It is difficult for management to assess the competence of prospective employees
to prepare this data. For example, a program can be implemented to sort an inventory file by
because of an exceedingly complex and rapidly changing technological environment
warehouse location and to prepare counts by inventory item at the different warehouses. If
requiring highly specialized skills.
unauthorized modifications occur to the program or the data files that the program uses, an
2. Management's concern over the trustworthiness of data processing personnel in high-
irregularity might not be discovered - for example, pilfering of inventory from a particular
risk areas. Some systems professionals are given positions of authority that permit
warehouse bin. Again, internal controls must be implemented to ensure the veracity of
direct and unrestricted access to the organization's programs and data. The
program code, because traditional separation of duties no longer applies to the data being
combination of technical skill and opportunity in the hands of the individual who may
prepared for comparison purposes
lack integrity and honesty could mean a significant exposure to the organization.
Management Authorization for Operating Personal Computers computer or in a stand alone unit attached to the personal computer. When a personal
computer is used by many individuals, users may develop a casual attitude toward the storage
Management can contribute to the effective operation of stand-alone personal computers by
of application diskettes, computer disks, backup tapes for they are responsible. As a result,
prescribing and enforcing policies for their control and use. Management's policy statement
critical diskettes, compact disks, or backup may be misplaced, altered without authorization
include:
or destroyed.
• management responsibilities;
Control over removable storage media can be established by placing responsibility for such
• instructions on personal computer use; media under personnel whose responsibilities include duties of software custodians or
• training requirements; librarians. Control can be further strengthened when a program and data file check-in and
• authorization for access to programs and data; check-out system is used and designated storage locations are locked. Such internal controls
• policies to prevent unauthorized copying of programs and data; help ensure that removable storage media are not lost, misplaced or given to unauthorized
• security, back-up and storage requirements; personnel. Physical control over non removable storage media is probably best established
• application development and documentation standards; with locking devices.
• standards of report format and report distribution controls;
Depending on the nature of the program and data files, it is appropriate to keep current copies
• personal usage policies
of diskettes, compact disks or back-up tapes and hard disks in a fireproof container, either on-
• data integrity standards;
site, off-site or both. This applies equally to operating system and utility software and back-up
• responsibility for programs, data and error correction, and
copies of hard disks.
• appropriate segregation of duties
Programs and Data Security
Physical Security - Equipment
When personal computers are accessible to many users, there is a risk that programs and
Because of their physical characteristics, personal computers are susceptible to theft, physical
data may be altered without authorization.
damage, unauthorized access or misuse. This may result in the loss of information stored in
the personal computer, for example, financial data vital to the accounting system. Because personal computer operating system software may not contain many control and
security features, there are several internal control techniques which can be built into the
One method of physical security is to restrict access to personal computers when not in use
application programs to help ensure that data are processed and read as authorized and that
by using door locks or other security protection during non-business hours. Additional physical
accidental destruction of data is prevented. These techniques, which limit access to programs
security over personal computers can be established, for example, by fastening the personal
and data to authorized users include:
computer to a table using security cables. In cases where personal computers are used to
process critical stand alone applications, additional physical security can be established by: • Segregating data into files organized under separate file directories;
• Using hidden and secret file names
• Locking the microcomputer in a protective cabinet or shell; or
• Employing passwords
• Using an alarm system that is activated any time the personal computer is
• Using cryptography
disconnected or moved from its location.
• Using antivirus software programs
Physical Security - Removable and Non-removable Media
The use of file directory allows the user to segregate information on removable and non-
Programs and data used on a personal computer can be stored or removable storage media removable storage media. For critical and sensitive information, this technique can be
or non-removable storage media. Diskettes, compact disks and backup tapes can be removed supplemented by assigning secret file names and “hiding” the files.
physically from the personal computer, while hard disks are normally sealed in the personal
When a system has multiple users or shares information across networks, basic operating Considerations should be given to disabling the ability of workstations to boot from diskettes
system security controls and logical access controls are necessary. The addition of simple or compact disks to avoid boot-sector viruses.
security features, such as passwords and access control, enables secure use of a single
Because many macro viruses are shared through email, a virus solution should be installed
resource by multiple users. Controlled use requires a detailed definition of who has access
to scan incoming email attachments including the ability to scan compressed and archived
rights to specific systems, specific resources (such as files or programs), and specific
files. All programs installed should be scanned before initial execution.
capabilities (such as read only, read and write and delete).
Software and Data Integrity
Cryptography can provide an effective control for protecting confidential or sensitive programs
and information from unauthorized access and modification by users. It is generally used when Personal computers are oriented to end-users for development of application programs, entry
sensitive data is transmitted over communication lines, but it can also be used on information and processing of data and generation of reports. The degree of accuracy and dependability
processed by a personal computer. Cryptography is the process of transforming programs of financial information produced will depend on the internal controls prescribed by
and information into an unintelligible form. Encryption and decryption of data require the use management and adopted by users, as well as on controls included in the application
of special programs and a code key known only to those users to whom the programs or programs. Software and data integrity controls may ensure that processed information is free
information is restricted. of errors, and that software is not susceptible to unauthorized manipulation (i.e., that
authorized data are processed in the prescribed manner).
Directories and hidden files, user authentication software and cryptography can be used for
personal computers that have both removable and non-removable storage media. For Data integrity can be strengthened by incorporating internal control procedures such as format
personal computers that have removable storage media, an effective means of program and and range checks and cross checks of results. A review of purchased software may determine
data security is to remove diskettes and compact disks from the personal computer and place whether it contains appropriate error checking and error trapping facilities. For user developed
them in custody of the users responsible for the data or the file librarians. software, including electronic spreadsheet templates and database applications,
management may specify in writing the procedures for developing and testing application
An additional access control for confidential or sensitive information stored on non-removable
programs. For certain critical applications, the person who processes the data may be
storage media is to copy the information to a diskette or compact disk and delete the files on
expected to determine that appropriate data were used and that calculations and other data
the non removable storage media. Control over the diskette or compact disk can then be
handling operations were performed properly. The end-user could use this information to
established in the same manner as over other sensitive or confidential information stored on
validate the results of the application.
diskettes or compact disks. The user should be aware that many software programs include
an erase or delete function, but that such a function may not actually clear erased or deleted Adequate written documentation of applications that are processed on the personal computer
files from the hard disk. Such functions may merely clear the file name from the hard disk s can strengthen software and data integrity controls further. Such documentation may include
directory. Programs and data are in fact removed from the hard disk only when new data is step-by-step instructions, a description of reports prepared, source of data processed, a
written to the old files or when special utility programs are to clear the files. description of individual reports, files and other specifications, such as calculations.
Viruses now represent the most common threat to any computer security. Users may allow If the same accounting application is used at various locations, application software integrity
their email programs or their operating systems to load and execute attachments. As such, and consistency may be improved when application programs are developed and maintained
antivirus software programs should be installed in personal computers and updated at one place rather than by each user dispersed throughout an entity.
continuously to include new virus definitions that are detected. Virus scans should be run on
every workstation daily and set to scan all files. Screen saver based virus scanners can help Hardware, Software and Data Back-Up
with this task. Back-up refers to plans made by the entity to obtain access to comparable hardware, software
and data in the event of their failure, loss or destruction. In a personal computer environment,
users are normally responsible for processing, including identifying important programs and Limitations
data files to be copied periodically and stored at a location away from the personal computers.
Every system of internal control has limitations on its effectiveness. These include
It is particularly important to establish back-up procedures for users to perform on a regular
basis. Purchased software packages from third-party vendors generally come with a back-up 1) the possibility of error—no system is perfect,
copy or with a provision to make a back-up copy. 2) circumvention—personnel may circumvent the system through collusion or other
means,
The Effect of Personal computers on the Accounting System and Related Internal
3) management override— management is in a position to override control procedures
Controls
by personally distorting transactions or by directing a subordinate to do so, and
The effect of personal computers on the accounting system and the associated risks will 4) changing conditions—conditions may change over time so that existing effective
generally depend on: controls may become ineffectual.

• The extent to which the personal computer is being used to process accounting Reasonable Assurance
applications;
The internal control system should provide reasonable assurance that the four broad
• The type and significance of financial transactions being processed; and
objectives of internal control are met. This reasonableness means that the cost of achieving
• The nature of files and programs utilized in the applications
improved control should not outweigh its benefits. The limitations and reasonable-assurance
principles include:

MODULE 10 1) attempts at unauthorized access to the firm’s assets (including information);


2) fraud perpetrated by persons both in and outside the firm;
INTERNAL CONTROL PRINCIPLES AND MODEL 3) errors due to employee incompetence,
Inherent in these control objectives are four modifying principles that guide designers and 4) faulty computer programs,
5) corrupted input data;
auditors of internal control systems. 6) mischievous acts, such as unauthorized access by computer hackers and threats from
Management Responsibility computer viruses that destroy programs and databases.

This concept holds that the establishment and maintenance of a system of internal control is Some weaknesses are immaterial and tolerable. Under the principle of reasonable assurance,
a management responsibility. Although the FCPA supports this principle, SOX legislation these control weaknesses may not be worth fixing. Material weaknesses in controls, however,
makes it law! increase the firm’s risk to financial loss or injury from the undesirable events. The cost of
correcting these weaknesses is offset by the benefits derived.
Methods of Data Processing
The PDC Model
The internal control system should achieve the four broad objectives regardless of the data
processing method used (whether manual or computer based). However, the specific Three levels of control: preventive controls, detective controls, and corrective controls. This is
techniques used to achieve these objectives will vary with different types of technology. called the PDC control model.

Preventive Controls

Prevention is the first line of defense in the control structure. Preventive controls are passive
techniques designed to reduce the frequency of occurrence of undesirable events.
Preventive controls force compliance with prescribed or desired actions and thus screen out record are correct; they may not be. At this point, we cannot determine the real cause of the
aberrant events. When designing internal control systems, an ounce of prevention is most problem; we know only that one exists.
certainly worth a pound of cure. Preventing errors and fraud is far more cost-effective than
Linking a corrective action to a detected error, as an automatic response, may result in an
detecting and correcting problems after they occur. The vast majority of undesirable events
incorrect action that causes a worse problem than the original error. For this reason, error
can be blocked at this first level. For example, a well designed data entry screen is an example
correction should be viewed as a separate control step that should be taken cautiously.
of a preventive control. The logical layout of the screen into zones that permit only specific
types of data, such as customer name, address, items sold, and quantity, forces the data entry The PDC control model is conceptually pleasing but offers little practical guidance for
clerk to enter the required data and prevents necessary data from being omitted. designing or auditing specific controls.
Aberrant = departing from an accepted standard

Detective Controls MODULE 11


Detection of problems is the second line of defense. Detective controls are devices, Risk management
techniques, and procedures designed to identify and expose undesirable events that elude
preventive controls. Detective controls reveal specific types of errors by comparing actual Risk management is the process of identifying, assessing and controlling threats to an
occurrences to pre-established standards. When the detective control identifies a departure organization's capital and earnings. These risks stem from a variety of sources including
from standard, it sounds an alarm to attract attention to the problem. For example, assume financial uncertainties, legal liabilities, technology issues, strategic management errors,
that because of a data entry error, a customer sales order record contains the following data: accidents and natural disasters.

Risk management encompasses the identification, analysis, and response to risk factors that
form part of the life of a business. Effective risk management means attempting to control, as
much as possible, future outcomes by acting proactively rather than reactively. Therefore,
effective risk management offers the potential to reduce both the possibility of a risk occurring
and its potential impact.
Before processing this transaction and posting to the accounts, a detective control should
Risk Management Structures
recalculate the total value using the price and quantity. Thus, this error above would be
detected. Risk management structures are tailored to do more than just point out existing risks. A good
risk management structure should also calculate the uncertainties and predict their influence
on a business. Consequently, the result is a choice between accepting risks or rejecting them.
Corrective Controls Acceptance or rejection of risks is dependent on the tolerance levels that a business has
already defined for itself.
Corrective actions must be taken to reverse the effects of detected errors. There is an
important distinction between detective controls and corrective controls. Detective controls If a business sets up risk management as a disciplined and continuous process for the
identify undesirable events and draw attention to the problem; corrective controls actually fix purpose of identifying and resolving risks, then the risk management structures can be used
the problem. For any detected error, there may be more than one feasible corrective action, to support other risk mitigation systems. They include planning, organization, cost control, and
but the best course of action may not always be obvious. For example, in viewing the budgeting. In such a case, the business will not usually experience many surprises, because
preceding error, your first inclination may have been to change the total value from PHP1,000 the focus is on proactive risk management.
to PHP 100 to correct the problem. This presumes that the quantity and price values in the
Response to Risks identified risks in order of priority. Because it is not possible to mitigate all existing risks,
prioritization ensures that those risks that can affect a business significantly are dealt with
Response to risks usually takes one of the following forms:
more urgently.
• Avoidance: A business strives to eliminate a particular risk by getting rid of its cause.
2. Assess the risks
• Mitigation: Decreasing the projected financial value associated with a risk by lowering
the possibility of the occurrence of the risk. In many cases, problem resolution involves identifying the problem and then finding an
• Acceptance: In some cases, a business may be forced to accept a risk. This option is appropriate solution. However, prior to figuring out how best to handle risks, a business should
possible if a business entity develops contingencies to mitigate the impact of the risk, locate the cause of the risks by asking the question, “What caused such a risk and how could
should it occur. it influence the business?”

When creating contingencies, a business needs to engage in a problem-solving approach. 3. Develop an appropriate response - Control Risk
The result is a well-detailed plan that can be executed as soon as the need arises. Such a
Once a business entity is set on assessing likely remedies to mitigate identified risks and
plan will enable a business organization to handle barriers or blockage to its success because
prevent their recurrence, it needs to ask the following questions: What measures can be taken
it can deal with risks as soon as they arise.
to prevent the identified risk from recurring? In addition, what is the best thing to do if it does
Importance of Risk Management recur?

Risk management is an important process because it empowers a business with the 4. Develop preventive mechanisms for identified risks
necessary tools so that it can adequately identify and deal with potential risks. Once a risk
Here, the ideas that were found to be useful in mitigating risks are developed into a number
has been identified, it is then easy to mitigate it. In addition, risk management provides a
of tasks and then into contingency plans that can be deployed in the future. If risks occur, the
business with a basis upon which it can undertake sound decision-making.
plans can be put to action.
For a business, assessment and management of risks is the best way to prepare for
Summary
eventualities that may come in the way of progress and growth. When a business evaluates
its plan for handling potential threats and then develops structures to address them, it Our business ventures encounter many risks that can affect their survival and growth. As a
improves its odds of becoming a successful entity. result, it is important to understand the basic principles of risk management and how they can
be used to help mitigate the effects of risks on business entities.
In addition, progressive risk management ensures risks of a high priority are dealt with as
aggressively as possible. Moreover, the management will have the necessary information that 5 Basic Methods for Risk Management
they can use to make informed decisions and ensure that the business remains profitable.
As people begin to age, they usually encounter more health risks. Managing pure risk entails
Risk Analysis Process the process of identifying, evaluating, and subjugating these risks—a defensive strategy to
prepare for the unexpected. The basic methods for risk management—avoidance, retention,
Risk analysis is a qualitative problem-solving approach that uses various tools of assessment
sharing, transferring, and loss prevention and reduction—can apply to all facets of an
to work out and rank risks for the purpose of assessing and resolving them. Here is the risk
individual's life and can pay off in the long run. Here's a look at these five methods and how
analysis process:
they can apply to the management of health risks.
1. Identify existing risks

Risk identification mainly involves brainstorming. A business gathers its employees together
so that they can review all the various sources of risk. The next step is to arrange all the
Avoidance that with more participants sharing the risks, the costs of premiums should shrink
proportionately. Individuals may find it in their best interest to participate in sharing the risk by
Avoidance means not participating in activities that could harm you; in the case of health,
choosing employer health care and life insurance plans when possible.
smoking is a good example.
Transferring
Avoidance is a method for mitigating risk by not participating in activities that may incur injury,
sickness, or death. Smoking cigarettes is an example of one such activity because avoiding Transferring risk relates to healthcare in that the cost of the care is transferred to the insurer
it may lessen both health and financial risks. from the individual, beyond the cost of premiums and a deductible.

According to the American Lung Association, smoking is the leading cause of preventable The use of health insurance is an example of transferring risk because the financial risks
death in the U.S. and claims more than 480,000 lives per year.1 Additionally, the U.S. Centers associated with health care are transferred from the individual to the insurer. Insurance
for Disease Control and Prevention notes that smoking is the No. 1 risk factor for getting lung companies assume the financial risk in exchange for a fee known as a premium and a
cancer, and the risk only increases the longer that people smoke.2 documented contract between the insurer and individual. The contract states all the
stipulations and conditions that must be met and maintained for the insurer to take on the
Life insurance companies mitigate this risk on their end by raising premiums for smokers
financial responsibility of covering the risk.
versus nonsmokers. Under the Affordable Health Care Act, also known as Obamacare, health
insurers are able to increase premiums based on age, geography, family size, and smoking By accepting the terms and conditions and paying the premiums, an individual has managed
status. The law allows for up to a 50% surcharge on premiums for smokers.3 to transfer most, if not all, the risk to the insurer. The insurer carefully applies many statistics
and algorithms to accurately determine the proper premium payments commensurate to the
Retention
requested coverage. When claims are made, the insurer confirms whether the conditions are
Retention acknowledges the inevitability of certain risks, and in terms of health care, it could met to provide the contractual payout for the risk outcome.
mean picking a less expensive health insurance plan that has a higher deductible rate.
Loss Prevention and Reduction
Retention is the acknowledgment and acceptance of a risk as a given. Usually, this accepted
Loss prevention and reduction are used to minimize risk, not eliminate it—the same concept
risk is a cost to help offset larger risks down the road, such as opting to select a lower premium
is used in healthcare with preventative care.
health insurance plan that carries a higher deductible rate. The initial risk is the cost of having
to pay more out-of-pocket medical expenses if health issues arise. If the issue becomes more This method of risk management attempts to minimize the loss, rather than completely
serious or life-threatening, then the health insurance benefits are available to cover most of eliminate it. While accepting the risk, it stays focused on keeping the loss contained and
the costs beyond the deductible. If the individual has no serious health issues warranting any preventing it from spreading. An example of this in health insurance is preventative care.
additional medical expenses for the year, then they avoid the out-of-pocket payments,
Health insurers encourage preventative care visits, often free of co-pays, where members can
mitigating the larger risk altogether.
receive annual checkups and physical examinations. Insurers understand that spotting
Sharing potential health issues early on and administering preventative care can help minimize
medical costs in the long run. Many health plans also provide discounts to gyms and health
Sharing risk can be applied to how employer-based benefits are often more affordable than if
clubs as another means of prevention and reduction in order to keep members active and
an individual gets their own health insurance.
healthy.
Sharing risk is often implemented through employer-based benefits that allow the company to
pay a portion of insurance premiums with the employee. In essence, this shares the risk with
the company and all employees participating in the insurance benefits. The understanding is
MODULE 12 ● Quantitative Risk Assessments

What is the risk assessment? This type of risk assessment uses quantitative tools and techniques to measure the level of
risks. A risk matrix may be used so that a value can be assigned to the likelihood and severity
Risk assessment is the process of evaluating risks to workers' safety and health from
of risks. For example, you might use a 3×3 matrix with the following values:
workplace hazards. whether the hazards could be eliminated and, if not; ... what preventive
or protective measures are, or should be, in place to control the risks. 3×3 Risk Matrix — Probability

Definitions Highly Unlikely = 1

Hazards - A hazard can be anything - whether work materials, equipment, work methods or Likely = 2
practices – that has the potential to cause harm.
Highly Likely = 3
Risks - A risk is the chance, high or low, that somebody may be harmed by the hazard.
3×3 Risk Matrix — Severity
Risk assessment
Slight = 1
Risk assessment is the process of evaluating risks to workers' safety and health from
Serious = 2
workplace hazards. It is a systematic examination of all aspects of work that considers:
Major = 3
➔ what could cause injury or harm;
To calculate the level of risk, the following equation can then be used:
➔ whether the hazards could be eliminated and, if not;
Risk = Severity x Likelihood
➔ what preventive or protective measures are, or should be, in place to control the
risks. You can see this type of risk matrix used in our risk-assessment template.

What Are the Types of Risk Assessments and When to Use Them? There are also other options for risk matrices, such as the 5×5 matrix. The values you use will
depend on personal preference and the variability you need in risk levels.
There are several different types of risk assessments used by health and safety (H&S)
professionals and those with H&S responsibilities. You may decide to use only one of these, ● Generic Risk Assessments
or you may use several different types for different purposes. Different approaches to risk Generic risk assessments assess the hazards and risks involved in work tasks and activities.
assessments can even be used within a single assessment. They can be used in different locations and by different companies for activities that are the
● Qualitative Risk Assessments same/similar, so they’re often used as risk-assessment templates. This allows you to reduce
duplication in your risk-management processes.
Most risk assessments will fall under this category. When carrying out a qualitative
assessment, the assessor will use their personal judgement to identify hazards around the However, when using a generic risk assessment, it’s important to note that every workplace
workplace, assess risks and plan control measures. and activity will be slightly different, and any differences can affect the accuracy and relevancy
of these risk assessments. To ensure generic assessments are relevant and that they’re going
Risks may be classed as high, medium or low-level after the assessor has considered both to be effective at mitigating risks, you need to review them and adjust or update them
the probability and severity of the risk in question. accordingly.
● Site-Specific Risk Assessments Step 1: Identify hazards, i.e. anything that may cause harm.

These are the most important types of risk assessments, as they’re carried out for a specific Employers have a duty to assess the health and safety risks faced by their workers. Your
activity in a specific location. This means they’re completely relevant and should be effective employer must systematically check for possible physical, mental, chemical and biological
at eliminating or controlling risks and keeping people safe. Think of these risk assessments hazards.
like taking a deep dive into the health and safety of different activities and work sites.
This is one common classification of hazards:
These assessments may be completed after carrying out generic risk assessments to gain a
● Physical: e.g. lifting, awkward postures, slips and trips, noise, dust, machinery,
better understanding of hazards and risk-control methods in the workplace.
computer equipment, etc.
You’re legally required to take reasonable steps to mitigate risks and protect people from
● Mental: e.g. excess workload, long hours, working with high-need clients, bullying,
harm. Site-specific risk assessments can help you plan and implement control measures
etc. These are also called 'psychosocial' hazards, affecting mental health and
proportionate to the level of risk.
occurring within working relationships.
As the most thorough method of risk assessment, they can help you keep your workforce and
● Chemical: e.g. asbestos, cleaning fluids, aerosols, etc
members of the public safe and protect your business from the legal liability and reputational
damage that comes with health and safety breaches. ● Biological: including tuberculosis, hepatitis and other infectious diseases faced by
healthcare workers, home care staff and other healthcare professionals.
● Dynamic Risk Assessments
Step 2: Decide who may be harmed, and how.
Dynamic risk assessments are carried out on the spot, during unforeseen circumstances. If
there are sudden, significant changes to the health and safety of the workplace or work Identifying who is at risk starts with your organisation's own full- and part-time employees.
activities, written risk assessments may not be applicable. Risks may need to be considered Employers must also assess risks faced by agency and contract staff, visitors, clients and
on the spot to assess whether it’s safe for work to continue. other members of the public on their premises.
One thing all of the risk assessments above have in common is that they should be completed Employers must review work routines in all the different locations and situations where their
following the five steps to risk assessments process. staff are employed. For example:
Remember Home care supervisors must take due account of their client's personal safety in the home,
Whatever risk-assessment process you adopt, it is always advisable to engage with your and ensure safe working and lifting arrangements for their own home care staff.
workforce when completing risk assessments, as they may know of the workable solutions
needed to complete tasks safely In a supermarket, hazards are found in the repetitive tasks at the checkout, in lifting loads,
and in slips and trips from spillages and obstacles in the shop and storerooms. Staff face the
What are the five steps to risk assessment? risk of violence from customers and intruders, especially in the evenings.
The Health and Safety Executive (HSE) advises employers to follow five steps when carrying In call centers, workstation equipment (i.e. desk, screen, keyboard and chair) must be
out a workplace risk assessment: adjusted to suit each employee.

Employers have special duties towards the health and safety of young workers, disabled
employees, night workers, shift workers, and pregnant or breastfeeding women.
Step 3: Assess the risks and take action. The basic approach is also known as a 'hierarchy of control' because it sets out the order in
which employers must approach risk management:
This means employers must consider how likely it is that each hazard could cause harm. This
will determine whether or not your employer should reduce the level of risk. Even after all 1. Substitution (i.e. try a risk-free or less risky option).
precautions have been taken, some risk usually remains. Employers must decide for each
2. Prevention (e.g. erect a machine guard, or add a non-slip surface to a pathway).
remaining hazard whether the risk remains high, medium or low.
3. Reorganise work to reduce exposure to a risk. A basic rule is to adapt the work to
Step 4: Make a record of the findings.
the worker.
Employers with five or more staff are required to record in writing the main findings of the risk
In an office, ensure chairs and display screen equipment (DSE) are adjustable to the
assessment. This record should include details of any hazards noted in the risk assessment,
individual, and plan all work involving a computer to include regular breaks. For
and action taken to reduce or eliminate risk.
monotonous or routine work, introduce work variety and greater control over work. In
This record provides proof that the assessment was carried out, and is used as the basis for call centres, introduce work variety by providing work off the phones and varying the
a later review of working practices. The risk assessment is a working document. You should type of calls handled.
be able to read it. It should not be locked away in a cupboard.
4. As a last resort, issue personal protective equipment (PPE) to all staff at risk, and
Step 5: Review the risk assessment. make sure they are trained in when and how to use this equipment, such as
appropriate eye protection, gloves, special clothing, footwear.
A risk assessment must be kept under review in order to:
5. Provide training in safe working systems.
● ensure that agreed safe working practices continue to be applied (e.g. that
6. Provide information on likely hazards and how to avoid them.
management's safety instructions are respected by supervisors and line managers);
7. Provide social and welfare facilities, such as washing facilities for the removal of
and
contamination, or a restroom.
● take account of any new working practices, new machinery or more demanding work
How often should a risk assessment take place?
targets.
The Health and Safety Executive (HSE) says risk should be assessed "every time there are
How should my employer deal with hazards? new machines, substances and procedures, which could lead to new hazards."

The basic rule is that employers must adapt the work to the worker. The key aims of risk An employer should carry out a risk assessment:
assessment are to:
● whenever a new job brings in significant new hazards. If there is high staff turnover,
➔ prioritise the risks – i.e. rank them in order of seriousness; and then the way new staff do their work should be checked against the risk assessment,
and training provided in safe working practices if necessary;
➔ make all risks small – the two main options here are to:
● whenever something happens to alert the employer to the presence of a hazard –
◆ eliminate the hazard altogether; or for example, an unusual volume of sickness absence, complaints of stress and
bullying, or unusually high staff turnover;
◆ if this is not possible, control the risks so that harm is unlikely.
● in response to particular changes to the level of risk to individual employees – for
example, where an employee returns to work after a period of long-term sickness
absence; or

● Where an employee is pregnant or breastfeeding and her work might involve a risk
to her or her unborn child’s health and safety.

You might also like