Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

communicates its principles and values, it will

CHAPTER 5
influence the organizational culture and permeate
CONTROL FRAMEWORK the entire organization.

In the 1980s, a commission was established to Organizational culture is the collection of learned
address fraudulent acts in financial statements. beliefs, traditions, and guides for behavior shared
among members of the organization.
The National Commission on Fraudulent Financial
Reporting, chaired by James C. Treadway, identified It defines and expresses shared assumptions, values,
the lack of a comprehensive internal controls and beliefs and is manifested in various ways,
framework. including formal rules and policies, norms of daily
behavior, physical settings, modes of dress, special
The Commission on Auditor-Supplier Organization language, myths, rituals, heroes, and stories.
(COSO) of the Treadway Commission was formed in
1985 to sponsor the commission. A healthy culture and ethical environment advance
employee morale, improve productivity and
The commission was sponsored by five professional efficiency, and tend to outperform other
associations, including the Institute of Internal organizations in terms of customer satisfaction,
Auditors, American Institute of Certified Public employee satisfaction, and retention.
Accountants, American Accounting Association,
Institute of Management Accountants, and Financial Failure to retain an effective governance, ethics, and
Executives Institute. compliance program can jeopardize an
organization's reputation, its bottom line, and even
COSO goal was to improve financial reporting its existence.
quality through corporate governance, ethical
practices, and internal control, with a focus on ERM Ethics is also closely linked to quality, as evidenced in
and fraud deterrence. the Volkswagen emissions violations scandal. An
auditor who fails to meet accounting standards can
The 2013 COSO IC-IF contains 17 principles, stating cause great damage to the firm and the client, as
that an entity can achieve effective internal control observed in the Xerox and KPMG cases.
by applying all principles to operations, reporting,
and compliance objectives. Similarly, a healthcare worker who fails to meet
recognized ethical norms and standards is not
The COSO framework is typically represented in a delivering high-quality health care, and while
cube, showing the five components of internal negligence can be claimed for a variety of reasons,
control, the three categories of objectives, and the malpractice lawsuits can be significant.
entity's structure.
The control environment includes activities related
CONTROL ENVIRONMENT to the competence and development of personnel,
the assignment of authority and responsibility, and
The workplace environment refers to the structure,
the organizational structure. Employee reporting
leadership style, and ethical practices of an
lines and accountability requirements are also
organization. It includes the tone at the top, which is
shaped by reporting lines, and these play an
set and promoted by the board of directors and
important role in the effectiveness of internal
senior management.
controls.
This tone drives ethical conduct within the
Management establishes a risk management
organization and helps prevent unethical practices
philosophy and the entity's risk appetite, forms a risk
and fraud. When management formally
culture, and integrates ERM with related initiatives. partnering with Human Resources, Legal, IT, and
Many managers have come to realize that the Loss Prevention to teach employees about internal
control environment is critical to the overall audits in other settings.
corporate image.
Form over Substance
A healthy corporate culture has a positive effect on
sales, vendor relationships, investor preferences, The control environment is crucial for an
recruitment effectiveness, and stakeholder scrutiny. organization's success, ensuring integrity, ethical
Talking about and acting ethically carries financial values, independence from management, and a
benefits. commitment to attracting, developing, and retaining
competent individuals.
Organizational culture plays a key role defining the
control environment, including norms, values, rules, The board of directors plays a vital role in
climate, and symbols. maintaining internal control quality, setting
expectations, and ensuring smooth information flow.
It includes three key elements: the general
relationship between employees and their The organization should also demonstrate a
organizations, the vertical or hierarchical system of commitment to attracting, developing, and retaining
authority defining superiors and subordinates, and competent individuals, ensuring their selection,
the general views of employees about the safeguarding, and proper deployment. By addressing
organization's destiny, purpose, and goals. these issues, organizations can ensure their
objectives are met, mitigate risks, and increase the
Understanding and addressing unethical behavior is likelihood of achieving them.
essential for auditors to ensure the integrity and
fairness of the organization. Examples of unethical Entity Level Controls
behavior include an unreasonable emphasis on
Entity level controls are essential in assessing an
bottom-line performance, high-pressure sales
organization's values, systems, policies, and
tactics, kickbacks or bribes, and the failure to comply
processes to prevent fraud and encourage proper
with laws and regulations.
conduct.
Communication, Consistency, and Belief in the
They involve examining tangible and intangible
Message
aspects of the organization, such as policies,
Management must communicate clearly and procedures, manuals, rules, human resources
consistently to ensure expectations are followed, as policies, reporting structures, information flows, and
inconsistencies can lead to employees viewing commitment to competence. Key areas of focus
management as hypocritical. A code of ethics, code include controls over management override, risk
of conduct, and conflict of interest statement are assessment methodology, centralized processing,
essential for establishing ethical conduct. These monitoring results of operations, and financial and
documents guide employees in ethical decision- operational reporting. Internal auditors and business
making, motivating them to conduct themselves leaders can identify strengths and weaknesses in
ethically. Training should be provided upon hire and their entity level controls by examining factors such
annually to reinforce the importance of these topics. as the organization's code of conduct, disciplinary
action, organizational structure, documentation,
Leadership organizations should also distribute compliance requirements, data and information
periodic articles, vignettes, scenarios, and surveys to availability, and coordination within the
staff, and engage in informal lunch and learn organization's second and third lines of defense.
sessions. Internal audits can be beneficial by
Internal auditors must understand that behavior is compensate for a breakdown between senior
influenced by their environment and competing management and board oversight. Once identified,
forces, and must work with management to risks should be linked throughout the organization,
establish clear performance standards, communicate providing a chaining mechanism to trace risks up and
rewards and sanctions, and ensure effective down the organization.
employee management. Organizations should create
a positive environment through socialization, Risk assessment is a crucial process for organizations
education, formal/informal systems, and to identify, analyze, and respond to potential risks
reinforcement, but should not tolerate unethical related to their objectives.
behavior.
It involves identifying, analyzing, and deciding how
Tone in the Middle best to respond to these risks in relation to the
achievement of objectives.
Choosing the right managers is crucial as employees
judge an organization's ethical conduct based on Management specifies objectives within three
their boss's actions. Managers influence workplace categories: reporting, compliance, and operations.
dynamics, values, and customer satisfaction.
Reporting considerations are arranged in four broad
The "tone in the middle" dictates workplace categories: internal/external and
conditions, leading to satisfaction, turnover, profits, financial/nonfinancial.
and goal achievement. Employee engagement
Compliance requirements relate to adherence to
significantly impacts the workplace environment,
laws and regulations, including contractual terms
and internal auditors should collaborate with
and conditions, service level agreements, and
management to assess workforce engagement.
voluntary agreements.
RISK ASSESSMENT
Operations pertain to the effectiveness and
The COSO framework focuses on identifying, efficiency of the organization's operations, including
quantifying, analyzing, and managing organizational operational and financial performance goals,
risks. safeguarding assets against loss, damage or
obsolescence, and making sure resources are
Risks are events that can threaten an organization's obtained economically.
ability to achieve its objectives.They can be positive
or negative, with positive events being opportunities Management must consider, specify, and analyze the
and negative events being risks. Risks are assessed degree to which objectives are aligned with their
based on likelihood and impact. Before risk strategic priorities to ensure congruence and
assessment, it is crucial to identify relevant coordination between these objectives. Inaccurate
objectives, as they provide context for identifying alignment can result in competing interests, internal
risks. conflicts, priority dissonance, and poor performance.
Examples include an employee's objectives focused
Larry Rittenberg, COSO's Chair Emeritus, emphasizes on cost reduction, a sales department's performance
the importance of understanding the link between measured on sales volume, and a manufacturing
objectives, risks, and controls. manager's goals weighted heavily on lowering unit
costs.
If objectives are not articulated, a deficiency in the
control environment should be brought to the Lack of alignment with established laws, rules,
attention of senior management and the board. regulations, and standards can lead to trouble and
Focusing more on control activities cannot long-term consequences. Large-scale problems often
invite regulator involvement and media attention, organization's ability to meet or exceed customer
which can become distracting and expensive over expectations consistently over the long term.
time. Any discussion about risk must consider that
every entity faces a variety of risks from internal to Cycle time risk is the unnecessary activities that
external sources. threaten the organization's capacity to develop,
produce, market, and deliver goods and services in a
timely manner.

Business and Process Risk Health and safety risk involves the failure to provide
a safe working environment for workers
The risk management process of an organization
involves various risks, including capacity, execution, Outsourcing risk involves outsourcing activities that
supply chain, business interruption, human do not align with the organization's strategies,
resources, product or service failure, product objectives, values, and behavioral standards and
development risk, cycle time risk, health and safety expectations.
risk, leadership risk, outsourcing risk, competitor
risk, catastrophic loss risk, industry risk, planning Technological and Information Technology Risks
risk, organization structure risk, integrity and fraud
IT risks involve issues with the operation of IT
risk, reputation risk, data integrity, infrastructure
systems, data integrity, and the potential loss or
risk, commerce risk, access risk, and availability risk.
misuse of assets.
Capacity risk refers to the inability to meet demand
These risks include data and system availability risk,
in the short and long term
data integrity risk, system capacity risk, data
Execution risk involves the inability to produce integrity, infrastructure risk, commerce risk, access
consistently without compromising quality. risk, and availability risk.

Supply chain risk refers to the inability to maintain a Data and system availability risk involves the uptime
steady stream of supplies when needed. of systems and tools to support the needs of
workers, customers, suppliers, and stakeholders.
Business interruption risk stems from the
unavailability of raw materials, IT, skilled labor, Data integrity risk involves the accuracy and
facilities, or other resources that threaten the consistency of data stored, processed, retrieved, and
organization's ability to continue operations. destroyed.

Human resources risk refers to the lack of System capacity risk involves optimizing storage and
knowledge, skills, and experiences among key computing capabilities.
personnel that threatens the ability to achieve
Infrastructure risk refers to the outdated or lack of IT
business objectives.
infrastructure needed to support information
Product or service failure risk involves the failure of requirements.
products or services to meet customer expectations,
Commerce risk involves events that compromise
leading to customer complaints, warranty claims,
financial and data flows.
returns, field repairs, product liability claims,
litigation, lost revenues, lower market share, and Access risk involves unauthorized use of confidential
damage to the business's reputation. information or limited personnel performance.

Product development risk involves ineffective Availability risk threatens the continuity of
product development that threatens the operations and processes.
Effectiveness relates to the achievement of
objectives and the degree to which these are
Personnel risks are conditions that limit an achieved.
organization's ability to obtain, deploy, and retain
suitable numbers of qualified and motivated Identifying business goals is essential for internal
workers. auditors, as it involves obtaining these from process
owners during the planning phase.
These risks include availability risk, competence risk,
judgment risk, malfeasance risk, motivation risk, The IIA Standards state that internal auditors must
financial risks, environmental risks, political risks, consider the objectives of the activity being
social risks, and political risks. reviewed, the means by which the activity controls
its performance, and the significant risks to the
These risks can result in poor cash flows, currency activity, its objectives, resources, and operations. If
and interest rate fluctuations, and an inability to goals have been defined but are inadequate, internal
move funds quickly and without loss of value. auditors should engage management to develop
Examples of financial risks include resources risk, improvements.
commodity prices risk, foreign currency risk, liquidity
risk, market risk, and political risks. The SMARTER model is a useful tool for internal
auditors in developing organizational and personal
Environmental risks involve the actual or potential goals.
threat of negative effects on the environment by
emissions, wastes, and resource depletion. Examples It helps to remember the elements of well-
include energy and other resources risk, natural developed goals, which are specific, measurable,
disaster risk, pollution risk, transportation risk, and achievable, relevant, time-bound, and evaluated.
pandemic risk. Specific goals make it easier for managers and
employees to focus their energy, resources, and
Political risks involve the effects that political priorities on accomplishing them. Measurable goals
decisions, events, or conditions can cause when they are easier to link their completion to performance
affect the profitability of a business or the ability to monitoring and rewards mechanisms, as they help to
operate freely. Examples include regulations and measure the degree of success accomplishing the
legislation risk, public policy risk, and instability risk. related goal.

Social risks involve dynamics where an issue affects Achievable goals are more motivating and aligned
stakeholders who can form negative perceptions with the mission and strategy of the organization,
that can cause damage to the organization. the process, and the individual. They build
Examples of social risks include demographics risk, confidence and serve to motivate those involved to
privacy risk, CSR requirements, and mobility. pursue something great. Goals should have
milestones and checkpoints that allow the person
Risk assessment requires management to consider
responsible for their completion to witness progress.
the impact of possible changes in the external
Relevant goals should be aligned with the
environment and within their own business model
organization's mission and strategy, and should be
that could make internal control ineffective. This
relevant to the employee's career or job description.
includes clearly articulating objectives relating to
operations, reporting, and compliance so any risks to Time-bound goals require commitment from both
those objectives can be identified and assessed. the individual and the person overseeing the goal.
Goals should precipitate a plan to accomplish the
goal, creating a sense of urgency and time pressure.
The combination of goals, plans, and deadlines
brings out the talents in people and can be leveraged knowledge to evaluate the risk of fraud and how it
among all involved. can be committed. Areas of focus related to fraud
include material omission or misstatement of
Goals must be evaluated to determine if they meet reporting, inadequate safeguarding of assets, and
the SMARTER elements and if they meet ethical and corruption.
ecological considerations. Unethical actions justified
by the manager or others are commonplace in some Assessing risk on a formal and informal basis is
locales, and ignoring the environmental impact of essential for organizational success, and internal
business actions is also unfortunate and is auditors can help raise awareness by highlighting
increasingly shown disapproval by stakeholders. By some exposures.
using the SMARTER model, internal auditors can help
managers perceive the value of their work and Risk assessments should consider change, as it can
improve overall performance. either undermine or enable objectives. External
factors like demographic shifts, technological
Goals should be challenging, difficult, achievable, advances, and low interest rates can help achieve
and meaningful to ensure the success of an business objectives. The Millennial generation, who
organization. They should be measurable, visible, are comfortable with technology and adapt to
and impactful. Rewards should be commensurate change, can be a valuable asset. Technological
with the effort put into the task and the outcome advances like cloud computing and broadband
achieved. Managers should also reward the enable remote work, reducing costs, and generating
successful completion of tasks and the effort put into revenues.
them, showing how the work satisfies the needs of
organizational stakeholders. Control Activities

Millennials are idealistic and want to understand the Controls are actions established through policies and
big picture, so managers should reward the procedures to mitigate the likelihood and/or impact
successful completion of tasks and the effort put into of risks. They are performed at all levels of an
them. Internal auditors should link audit tests to organization, at various stages within processes and
business objectives, linking everything they do to a over the technological infrastructure. Controls can
risk, which in turn is linked to a business objective. be manual, performed by individuals using tangible
This helps mitigate the potential likelihood and items, or automated, performed by computer and
impact of these risks. electronic systems without direct human interaction.
Some controls are a combination of manual and
Internal auditors should examine the functioning of automated, requiring both a system component and
programs and processes to ensure that the design human follow-through.
and performance of these activities are as expected
and make recommendations for improvement. The rate of dependence on IT has increased
Anomalies detected during audit testing should be substantially over the past few decades, and most
presented in that context, as they allow risks to activities involve the use of computers to some
materialize, which jeopardize the successful degree or another. Organizations often struggle with
accomplishment of a particular objective. the lack of consistency in the performance of control
activities due to the implementation process not
The topic of fraud and corruption has gained aligning with performance evaluation measures,
attention over the past few years, with alarming supervision, training, disciplinary actions, and
statistics about fraud. The IIA's Standards include rewards.
specific reference to fraud, emphasizing the
importance of internal auditors having sufficient Control activities can be categorized as preventive,
detective, directive, and compensating.
Preventive controls act before errors or omissions communications can follow various patterns, and
can occur and reduce the likelihood and/or impact of organizations should support management efforts to
the event. increase the production, analysis, dissemination, and
use of information for better decision-making and
Detective controls identify errors or anomalies after organizational effectiveness. The free flow of
they have occurred and alert the need for corrective information is essential for understanding new or
action. changed events in the operating environment and
preventing management from operating in a
Directive controls are temporary controls
vacuum.
implemented to redirect employee actions,
sometimes referred to as corrective controls, when Organizations face increasing risks and modifications
an undesirable action has occurred. to their internal control systems due to changing
business dynamics. Outsourced service providers,
Compensating controls are put in place when a
financial institutions, and intermediaries provide
control is not where it is expected as proper design
diverse and complex information sources, which can
would stipulate.
disrupt operations and reduce revenues. Social
Internal auditors are generally tasked with verifying media has become an essential part of organizations'
that processes, programs, and their related controls communications infrastructure, connecting
have been designed appropriately and that those employees, customers, vendors, supporters, and
controls are operating as intended. Nonperforming detractors. As data flows expand beyond pairs and
controls can be due to inadequate knowledge, involve intermediaries, organizations must ensure
sabotage, emotional and physical reasons, or poor the compatibility, quality, speed, and reliability of all
management practices. Ensuring that controls are information.
designed effectively and implemented effectively is
Outsourcing can create operational risks, strategic
crucial for maintaining organizational effectiveness.
risks, and composite risks. Outsourcing organizations
Information and Communication must manage these risks and ensure clients are
protected and financial statements are correct. To
The fourth component of the COSO IC/IF model ensure acceptable risk levels, organizations can have
focuses on the flow of information within an their own internal or external auditor review the
organization. It involves clear, consistent, timely, and service provider or provide reports to clients.
purposeful directions from the top, feedback from Organizations also have numerous third-party
employees, and lateral flows of information between intermediaries that play a crucial role in their
individuals and units. Communication is crucial for business operations and interactions with
effective functioning, decision-making, problem- governments. Companies must conduct due
solving, and change-management processes. It diligence and investigate their third parties before
provides workers with important information about contracting them, understanding their roles,
their jobs, the organization, and each other, responsibilities, and potential risks.
improving motivation, building trust, and
engendering engagement. Internal communication The hiring organization must manage third-party
occurs on multiple levels, including interpersonal, monitoring and use technology to assist in this
group-level, and organizational-level. Information is process. Service providers can provide standardized
necessary for internal control activities, such as audit reports for customers to use in risk
reconciliations, inventory counts, and inventory assessment. The Statement on Standards for
counts. Communication should be continuous, Attestation Engagements (SSAE) No. 16, Reporting
iterative, and share necessary information to on Controls at a Service Organization, replaced SAS
maximize its utility. Internal and external 70 in 2010. There are three types of SOC reports:
SOC 1 (Report on Controls at a Service Organization customer requirements and continuous
Relevant to User Entities' Internal Control over improvement.
Financial Reporting), SOC 2 (Report on Controls at a
Service Organization Relevant to Security, ISO also facilitates communication and the setting of
Availability, Processing Integrity, Confidentiality, or expectations between organizations, complementing
Privacy), and SOC 3 (Trust Services Report for Service COSO's components and helping internal auditors
Organizations). supplement their audit programs. By understanding
and implementing these standards, organizations
Monitoring Activities can ensure their IT operations align with their
business needs and achieve long-term success.
Monitoring activities are ongoing evaluations used to
assess the functioning of internal control ITIL is a comprehensive framework for IT service
components. These evaluations can be cyclical or management that focuses on organizational
ongoing, depending on the risk assessment and structure, skill requirements, and standard
previous evaluations. The criteria used during these management procedures. It provides templates,
reviews are based on internal requirements and checklists, and downloads for quick implementation
external criteria. Monitoring should be viewed and helps organizations achieve predictable service
holistically, considering other components such as levels. ITIL v3 was published in 2007 and updated in
the control environment, risk assessment, and 2011. It addresses service strategy, design,
information and communication. Employee surveys transition, operation, event and incident
can help assess the state of ethics, risk assessment, management, request fulfillment, and continual
and information and communication. Monitoring service improvement. Successful companies that
helps management understand how all components have implemented ITIL include Procter & Gamble,
of internal control are being applied and enhances Caterpillar, Nationwide Insurance, and Capital One.
organizational effectiveness. Key goals include streamlining service delivery,
developing repeatable procedures, reducing service
IT plays a crucial role in organizational success, and incidents, implementing standards, ensuring future
organizations should consider IT as a business capacity, defining clear service targets, and
service partner rather than just a back-end support accurately allocating costs.
unit. The Information Systems Audit and Control
Association (ISACA) has addressed the gap in IT The CMMI is a process improvement appraisal
considerations through the COBIT framework, which program developed by Carnegie Mellon University,
includes strategic direction, project management, used in various areas such as project management,
purchases, and training end users. The COBIT software development, and performance
framework addresses more than technical subjects improvement. It has five maturity levels: Initial,
and includes critical managerial and Repeatable, Defined, Managed, and Optimized.
accounting/financial activities. Internal control frameworks, such as COSO and
COBIT, are used for planning, analysis, decision-
ISO, an independent nongovernmental organization, making, and monitoring. Planning is a crucial aspect
provides world-class specifications for products, of classical management, involving formulating
services, and systems to ensure quality, safety, and detailed plans to achieve the optimum balance
efficiency. It has published over 19,000 international between needs and resources. COSO and COBIT
standards and related documents, covering various frameworks provide guidance and a roadmap for
industries. ISO 9000 and ISO 31000 are popular organizations to structure and run effectively.
standards for quality management and risk Managers should be taught about these frameworks
management, providing guidance and tools for and have their performance measured based on the
organizations to ensure consistent meeting of quality of internal controls in their areas of
responsibility. This would reinforce the importance FISH BONE
of internal controls and reduce compensation for
non-performance. The fishbone diagram, also known as the cause and
effect diagram or Ishikawa diagram, is a useful tool
for internal auditors to identify the root causes of
problems. This method, which is binary in nature,
CHAPTER 6 helps auditors treat issues from a binary perspective,
focusing on what should have been done, verifying
Histograms
consistency, reporting no findings, and
are charts that display the frequency distribution of recommending future practices. However, when
numerical data using rectangles representing dealing with operational issues, the answer may not
intervals. They represent the probability distribution be straightforward. Many operational issues are
of a continuous variable and are used to assess the caused by a combination of people, process, and
distribution of data. Histograms provide a fluid view technology issues, so auditors should attempt to
of transactions, helping auditors understand the identify the root causes of these conditions. The six
dynamics affecting the process under review. They categories used are people, methods, machines,
can be used to plot sales revenues, vehicle serviced, materials, measurements, and environment. The
and more, providing a more comprehensive diagram can be categorized based on the type of
understanding of the data. organization or environment being analyzed. When
preparing the fishbone diagram, it becomes clearer
Control Chart why the problem exists and how a number of root
causes impact multiple categories. The top two or
Process owners are responsible for setting the
three items that have the biggest influence on the
structure of their processes and programs,
effect are identified, similar to the 80/20 rule. The
establishing goals, identifying risks, and designing
fishbone diagram is a useful tool for identifying root
controls to mitigate them. Monitoring these controls
causes and exploring solutions to problems. It aids in
provides valuable information about their strengths
problem-solving and can be used in conjunction with
and weaknesses, and helps management identify
the CCCER model for documenting internal audit
anomalies that require intervention. Control charts
findings.
are a tool used to document this monitoring, plotting
and studying how a process changes over time. They
are one of the seven basic tools of quality and are
often less used by internal auditors. Control charts
help auditors determine if a process is stable and
under control, predict future performance, and
identify the source of problems. By setting upper and
lower control limits and observing patterns, internal
auditors can increase the sophistication of their data
analytics and support their findings with measurable
data.

The Pareto principle, also known as the 80/20 rule,


suggests that 80% of events' effects are caused by
20% of their causes. Pareto diagrams organize data
and prioritize improvement efforts by focusing on
major root causes. They organize data by
constructing bars and ranking items in importance.

You might also like