risk management and internal control guidelines tennessee department of finance and administration...
Post on 19-Dec-2015
220 Views
Preview:
TRANSCRIPT
Risk Management And Internal Control Guidelines
Tennessee Department of Finance and AdministrationTennessee Comptroller of the Treasury
August 2007
INTRODUCTION MANAGEMENT’S GUIDE TO RISK
MANAGEMENT AND INTERNAL CONTROL
INTRODUCTION (CONT’D)
Enterprise Risk Management
Changing Political And Regulatory Environment Sarbanes-Oxley Act General Accounting Office AICPA Auditing Standards
INTRODUCTION (CONT’D)
Internal Control and Governance Problems Results of Texas State Comptroller’s ERM
Implementation Texas State Auditor Considers Increased
Accountability a Priority
INTRODUCTION (CONT’D)
Committee Of Sponsoring Organizations Of The Treadway Commission
Second report Enterprise Risk Management—Integrated Framework
First report Internal Control—Integrated Framework
INTRODUCTION (CONT’D)
Guidance--Education and Tools Agency Heads Responsibility
OVERVIEW
Overview
Relationship of COSO I and II COSO Cube (three-dimensional matrix)
Objectives Components Entity Unit
Effectiveness Roles and responsibilities
Relationship of COSO I to COSO II Internal Control—Integrated Framework
(COSO I) Still important for entities looking at internal
control by itself Enterprise Risk Management—Integrated
Framework (COSO II) Broader than internal control Expands and elaborates on internal control Focuses more fully on risk Introduces the concepts of risk appetite, risk
tolerance, and portfolio view
COSO Cube
Direct relationship between objectives and enterprise risk components
Focus on the entirety of an entity’s ERM, or by objectives categories, component, entity unit, or any subset thereof
Objectives Categories
Strategic Effectiveness and efficiency of operations Integrity and reliability of reporting Compliance with applicable laws, regulations,
contracts, and grant agreements Stewardship of assets
Components Internal environment Objective setting Event identification Risk assessment Risk response Control activities Information and communication Monitoring
Effectiveness Are the 8 components present and functioning
effectively? The components are criteria for effective ERM Present and functioning properly = no significant
deficiencies and material weaknesses Test operating effectiveness of controls different
from obtaining evidence of implementation How controls were applied during the period Consistency with which controls were applied By whom and by what means they were applied
Roles and Responsibilities
Audit committee, board of directors, or other oversight body
Commissioner/director/department head Senior management Internal audit Other entity personnel
SECTION IINTERNAL
ENVIRONMENT
SECTION IINTERNAL ENVIRONMENTWhat is it? Risk Management Philosophy
Set of shared beliefs and attitudes Reflects the entity’s values, influencing its culture
and operating style Affects how risks are identified, kinds of risks
accepted, and how they are managed
Internal Environment(cont’d) Risk Appetite
Amount of risk management is willing to accept Influences the entity’s culture and operating style
Oversight by Audit Committee Oversight by another group May significantly influence elements of Internal
Environment
Internal Environment(cont’d) Integrity and Ethical Values
Management’s values Code of conduct
Commitment to Competence Knowledge and skills of staff How well tasks need to be accomplish
Internal Environment(cont’d) Organizational Structure
Framework to plan, execute, control, and monitor activities
Assignment of Authority and Responsibility Extent of authority and responsibility
Human Resource Standards Staff development, training, and evaluation
SECTION II OBJECTIVE SETTING
Objective Setting
EVERY AGENCY FACES A VARIETY OF RISKS FROM EXTERNAL AND INTERNAL SOURCES, AND A PRECONDITION TO EFFECTIVE EVENT IDENTIFICATION, RISK ASSESSMENT, AND RISK RESPONSE IS ESTABLISHMENT OF OBJECTIVES
Objective Setting
OBJECTIVES MUST EXIST BEFORE MANAGEMENT CAN IDENTIFY POTENTIAL EVENTS AFFECTING THEIR ACHEIVEMENT
ENTERPRISE RISK MANAGEMENT (ERM) ENSURES THAT MANAGEMENT HAS IN PLACE A PROCESS TO SET OBJECTIVES AND THAT THE CHOSEN OBJECTIVES SUPPORT AND ALIGN WITH THE AGENCY’S MISSION AND ARE CONSISTENT WITH ITS RISK APPETITE
Objective Setting
WHILE AN AGENCY’S MISSION AND STRATEGIC OBJECTIVES ARE GENERALLY STABLE, ITS STRATEGY AND MANY RELATED OBJECTIVES ARE MORE DYNAMIC AND ADJUSTED FOR CHANGING INTERNAL AND EXTERNAL CONDITIONS
AS CONDITIONS CHANGE, STRATEGY AND RELATED OBJECTIVES ARE REALIGNED WITH STRATEGIC OBJECTIVES
Objective Setting
IN CONSIDERING WAYS TO ACHIEVE ITS STRATEGIC OBJECTIVES, MANAGEMENT IDENTIFIES RISKS ASSOCIATED WITH A RANGE OF STRATEGY CHOICES AND CONSIDERS THEIR IMPLICATIONS
VARIOUS EVENT IDENTIFICATION AND RISK ASSESSMENT TECHNIQUES ARE USED IN THE STRATEGY-SETTING PROCESS
Objective Setting
BY FOCUSING FIRST ON STRATEGIC OBJECTIVES AND STRATEGY, AN AGENCY IS IN A POSITION TO DEVELOP RELATED OBJECTIVES
AGENCY WIDE OBJECTIVES ARE THEN LINKED TO AND INTEGRATED WITH MORE SPECIFIC OBJECTIVES THAT CASCADE THROUGH THE ORGANIZATION TO SUB-OBJECTIVES ESTABLISHED FOR VARIOUS ACTIVITIES
Objective Setting
OBJECTIVES NEED TO BE READILY UNDERSTOOD AND MEASURABLE
ERM REQUIRES THAT PERSONNEL AT ALL LEVELS HAVE AN UNDERSTANDING OF THE AGENCY’S OBJECTIVES AS THEY RELATE TO THAT INDIVIDUAL’S SPHERE OF INFLUENCE
ALL EMPLOYEES MUST HAVE A MUTUAL UNDERSTANDING OF WHAT IS TO BE ACCOMPLISHED AND A MEANS OF MEASURING WHAT IS BEING ACCOMPLISHED
Objective Setting
THREE BROAD CATEGORIES OF OBJECTIVES
OPERATIONS REPORTING COMPLIANCE
SMART OBJECTIVES
Specific Use specific terms rather than vague abstract ones
Measurable Include some method for objectively measuring their achievement
Achievable Are challenging but realistic
Relevant Follow the business strategy of the organization
Timely Specify a time period
Objective Setting
EFFECTIVE ERM PROVIDES REASONABLE ASSURANCE THAT AN AGENCY’S REPORTING AND COMPLIANCE OBJECTIVES ARE BEING ACHIEVED
BECAUSE, HOWEVER, ACHEIVEMENT OF OPERATIONS OBJECTIVES IS NOT SOLEY WITHIN AN AGENCY’S CONTROL (i.e. IT IS SUBJECT TO EXTERNAL EVENTS) ERM PROVIDES REASONABLE ASSURANCE THAT MANAGEMENT IS MADE AWARE OF THE EXTENT TO WHICH AN AGENCY IS MOVING TOWARD THE ACHIEVEMENT OF THESE OBJECTIVES ON A TIMELY BASIS
Objective Setting
• STRATEGIES OF THE BUSINESS
• KEY BUSINESS OBJECTIVES
• RELATED OBJECTIVES THAT CASCADE DOWN THE ORGANIZATION FROM KEY BUSINESS OBJECTIVES
• ASSIGNMENT OF RESPONSIBILITIES TO ORGANIZATIONAL ELEMENTS AND LEADERS (LINKAGE)
Objective Setting
EFFECTIVE ERM DOES NOT DICTATE WHICH OBJECTIVES MANAGEMENT SHOULD CHOOSE, BUT THAT MANAGEMENT HAS A PROCESS THAT ALIGNS STRATEGIC OBJECTIVES WITH AN AGENCY’S MISSION AND ENSURES THAT THE ENTITY’S CHOSEN STRATEGIC AND RELATED OBJECTIVES ARE CONSISTENT WITH THE AGENCY’S RISK APPETITE
Objective Setting – Risk appetite
RISK APPETITE IS A GUIDEPOST IN STRATEGY SETTING
THERE IS A RELATIONSHIP BETWEEN AN AGENCY’S RISK APPETITE AND ITS STRATEGY
DIFFERENT STRATEGIES CAN BE USED TO ACHIEVE DESIRED RETURN, EACH HAVING DIFFERENT RISK
RISK APPETITE IS THE AMOUNT OF RISK, ON A BROAD LEVEL, AN AGENCY IS WILLING TO ACCEPT IN PURSUIT OF ITS MISSION, VISION, BUSINESS OBJECTIVES AND VALUE GOALS
DIRECTLY RELATED TO AN AGENCY’S CULTURE, CAPABILITY, RISK CAPACITY AND STRATEGY
SHOULD CONSIDER RISK APPETITE BOTH QUALITATIVELY AND QUANTITATIVELY - IT IS MANY TIMES EXPRESSED IN ACCEPTABLE/UNACCEPTABLE OUTCOMES OR LEVEL OF RISK
Objective Setting – Risk appetite
Objective Setting – Risk appetite
SOME POSSIBLE QUESTIONS WHAT RISKS WILL THE AGENCY NOT ACCEPT?
(For example, environmental or quality compromises) ARE THERE SPECIFIC RISKS THAT THE AGENCY
IS NOT PREPARED TO ACCEPT? (For example, risks that could result in non-compliance with federal regulations)
IS THE AGENCY PREPARED TO ENTER INTO PROGRAMS WITH LOWER LIKELIHOOD OF SUCCESS BUT LARGER POTENTIAL RETURNS?
Objective Setting – Risk appetite
USE OF A LIKELIHOOD-IMPACT ASSESSMENT (MATRIX) IS A GOOD TOOL IN DOCUMENTING RISK APPETITE
FOR EACH RISK FREQUENCY OF OCCURRENCE (PROBABILITY) AND WORST OUTCOME (IMPACT) ARE ASSESSED AND CAPTURED IN A MATRIX
THE MATRIX IS THEN COMPARED WITH A CHARTED RISK APPETITE MAP THAT OUTLINES THE MAXIMUM ADVERSE RISK AN AGENCY IS WILLING TO ACCEPT
Impact vs. Probability
Exceeds Risk Appetite
Low
High
High
IMPACT
PROBABILITY
Within Risk Appetite
Objective Setting – Risk tolerance
RISK TOLERANCE, THE ACCEPTABLE LEVEL OF VARIATION AROUND OBJECTIVES, MUST BE ALIGNED WITH RISK APPETITE
REQUIRES THE ARTICULATION OF ACCEPTABLE VARIABILITY FROM THE SPECIFIED RISK APPETITE FOR ALL POSSIBLE OUTCOMES
OPERATIONALIZES THE RISK APPETITE GENERALLY EXPRESSED IN TERMS OF RISK
MEASURES OR OUTCOMES
Objective Setting – Risk tolerance
SHOULD BE SET SUCH THAT THE AGGREGATION OF RISK TOLERANCES ENSURES THE ORGANIZATION OPERATES WITHIN THE RISK APPETITE
SECTION IIIEVENT
IDENTIFICATION
EVENT IDENTIFICATION
INTERNAL AND EXTERNAL EVENTS AFFECTING ACHEIVEMENT OF AN AGENCY’S OBJECTIVES MUST BE IDENTIFIED, DISTINGUISHING BETWEEN RISKS AND OPPORTUNITIES
MANAGEMENT IDENTIFIES POTENTIAL EVENTS THAT, IF THEY OCCUR, WILL AFFECT THE AGENCY, AND IN WHAT MANNER
Event identification
EVENTS WITH A POSITIVE IMPACT REPRESENT OPPORTUNITIES THAT SHOULD BE CHANNELED BACK INTO MANAGEMENT’S STRATEGY OR OBJECTIVE-SETTING PROCESSES
EVENTS WITH A NEGATIVE IMPACT REPRESENT RISKS, WHICH REQUIRE MANAGEMENT’S ASSESSMENT AND RESPONSE
Event identification
AN EVENT IS AN INCIDENT OR OCCURRENCE ARISING FROM INTERNAL OR EXTERNAL SOURCES THAT AFFECTS IMPLEMENTATION OF STRATEGY OR ACHIEVEMENT OF OBJECTIVES
A NUMBER OF EXTERNAL AND INTERNAL FACTORS DRIVE EVENTS
Event identification
CONTRIBUTING EXTERNAL FACTORS ECONOMIC NATURAL
ENVIRONMENT POLITICAL SOCIAL
CONTRIBUTING INTERNAL FACTORS INFRASTRUCTURE PERSONNEL PROCESS TECHNOLOGY
SOME TYPICAL GOVERNMENT RISKSEconomic changes such as lower
economic growth reduce tax revenue and opportunities to provide a wider
range of services or limit the availability or quality of existing
services
Failure to innovate leading to sub-
standard services
Loss or misappropriation of funds through fraud or
impropriety
Environmental damage caused by
failure of regulations or government
inspection regime
Inconsistent policy objectives resulting
in unwanted outcomes
Project delays cost overruns and
inadequate quality standards
Inadequate skills or resources to deliver services as required
Failure of contractors, partners or other
government agencies to provide services as
required
Failure to properly evaluate pilot projects before a new service is
introduced may result in problems when the
service becomes fully operational
Failure to measure performance adequately
Technical risk – failure to keep pace with technical
developments, or investment in inappropriate or mismatched technology
Inadequate service plans to maintain
continuity of service delivery
Failure to monitor implementation
Achieving Service Delivery
Event identification
AN AGENCY’S EVENT IDENTIFICATION METHODOLOGY MAY BE COMPRISED OF A COMBINATION OF TECHNIQUES, TOGETHER WITH SUPPORTING TOOLS
TECHNIQUES VARY WIDELY IN LEVEL OF SOPHISTICATION
EXAMPLES OF TECHNIQUES FOR IDENTIFYING EVENTS:• EVENT INVENTORIES (LISTING COMMON
POTENTIAL EVENTS)• INTERNAL ANALYSIS (COMPLETED AS PART OF A
ROUTINE PLANNING CYCLE PROCESS, TYPICALLY THROUGH STAFF MEETINGS)
• ESCALATION OR THRESHOLD TRIGGERS (COMPARE CURRENT TRANSACTIONS OR EVENTS WITH PREDEFINED CRITERIA)
• FACILITATED WORKSHOPS AND INTERVIEWS (DRAW ON ACCUMULATED KNOWLEDGE AND EXPERIENCE OF MANAGEMENT, STAFF AND STAKEHOLDERS THROUGH STRUCTURED DISCUSSIONS)
Event identification
POTENTIAL EVENTS ARE ALSO IDENTIFIED ON AN ONGOING BASIS IN CONNECTION WITH ROUTINE BUSINESS ACTIVITIES, SUCH AS INDUSTRY/TECHNICAL CONFERENCES PEER WEBSITES BENCHMARKING REPORTS TRADE & PROFESSIONAL JOURNALS MEDIA REPORTS MONTHLY MANAGEMENT REPORTS
Event identification
ANOTHER USEFUL TOOL IS TO INTRODUCE AN INTERMEDIATE STEP - IDENTIFYING WHAT YOU DEPEND UPON TO ACHIEVE YOUR OBJECTIVES
THIS IS SOMETIMES MUCH EASIER THAN TRYING TO THINK ABOUT ALL THE EVENTS THAT COULD PREVENT SUCCESS
Event identification
EVENTS DO NOT OCCUR IN ISOLATION – ONE EVENT CAN TRIGGER ANOTHER AND EVENTS CAN OCCUR CONCURRENTLY
MANAGEMENT SHOULD UNDERSTAND HOW EVENTS RELATE TO ONE ANOTHER
Event identification
IT MAY BE USEFUL TO GROUP EVENTS INTO CATEGORIES (i.e. GROUPS OF SIMILAR POTENTIAL EVENTS)
SIMILAR EVENTS SHOULD BE COMBINED TO DEVELOP AN INITIAL RISK UNIVERSE AND DETERMINE HOW TO TRACK AND UPDATE THE LISTING OF POTENTIAL EVENTS AND RISKS
Event identification
FINANCIAL FOLKS NEED TO REMEMBER THAT:
EVENT IDENTIFICATION NEEDS TO INVOLVE A COMPLETE CROSS-SECTION OF MANAGEMENT, AS POSSIBLE EVENTS INCLUDE BUSINESS SCENARIOS OF WHICH FINANCIAL MANAGEMENT MAY NOT BE AWARE
INDICATORS THAT THE ERM OBJECTIVE SETTING PRINCIPLES ARE IMPLEMENTED1. THE ORGANIZATION DEFINES GOALS AND
OBJECTIVES FOR THE ENTERPRISE AS A WHOLE
2. AN EFFECTIVE STRATEGIC PLANNING PROCESS IS IN PLACE TO FORMULATE STRATEGIES THAT WILL ENABLE THE ORGANIZATION TO ACHIEVE ITS BUSINESS OBJECTIVE
INDICATORS THAT THE ERM OBJECTIVE SETTING PRINCIPLES ARE IMPLEMENTED (CONT’D)3. BUSINESS STRATEGIES ARE CLEARLY
ARTICULATED WITH OBJECTIVES LINKED TO EACH
4. THE RISK IDENTIFICATION PROCESS IS DESIGNED TO MAKE A CLEAR LINK BETWEEN THE ORGANIZATION’S OBJECTIVES AND THE ASSOCIATED RISKS
INDICATORS THAT THE ERM OBJECTIVE SETTING PRINCIPLES ARE IMPLEMENTED (CONT’D)5. RISK TO THE ACHIEVEMENT OF OBJECTIVES
IS EVALUATED TO ENSURE IT DOES NOT EXCEED THE LEVELS OF RISK DETERMINED BY MANAGEMENT AS ACCEPTABLE
6. ACCEPTABLE TOLERANCE LIMITS ON THE RISK TO THE ACHIEVEMENT OF KEY OBJECTIVES HAVE BEEN DETERMINED.
7. MANAGEMENT USES MEANINGFUL PERFORMANCE MEASURES IN MONITORING RESULTS AGAINST OTHER SET TOLERANCES
INDICATORS THAT THE ERM EVENT IDENTIFICATION PRINCIPLES ARE IMPLEMENTED1. DATA ON THE BUSINESS OPERATING ENVIRONMENT –
POLITICAL, ECONOMIC, ETC., EVENTS IS CAPTURED AND REGULARLY EVALUATED IN TERMS OF THEIR POTENTIAL IMPACT UPON THE ORGANIZATION’S BUSINESS OBJECTIVES
2. A PORTFOLIO OF EVENTS THAT COULD AFFECT THE ACHIEVEMENT OF OBJECTIVES – INTERNAL AND EXTERNAL – HAS BEEN PREPARED
3. EVENTS ARE LINKED TO AND RISK EVALUATED BY INDIVIDUAL OBJECTIVE
INDICATORS THAT THE ERM EVENT IDENTIFICATION PRINCIPLES ARE IMPLEMENTED (CONT’D)
4. GOALS AND OBJECTIVES FOR IDENTIFYING EVENTS AND THE RELATED RISKS EXIST AND ARE COMMUNICATED TO ALL SEGMENTS OF THE ORGANIZATION
5. RESPONSIBILITIES AND ACCOUNTABLES FOR RISK IDENTIFICATION ARE CLEARLY DEFINED AND UNDERSTOOD
6. RISK IS CONSIDERED IN TERMS OF NOT JUST ISOLATED EVENTS BUT ALSO INTER-RELATED EVENTS
7. EVENTS ARE CATEGORIZED INTO USEFUL GROUPS TO FACILITATE THE AGGREGATION OF INFORMATION FOR PURPOSES OF ASSESSING RISKS
8. THE ORGANIZATION EVALUATES EVENTS IN THE CONTEXT OF THE POTENTIAL UPSIDES (OPPORTUNITIES) AS WELL AS THE DOWNSIDE (RISKS)
Event identification
THE NEXT TOPIC, OR THE RISK ASSESSMENT COMPONENT, ALLOWS AN AGENCY TO CONSIDER THE EXTENT TO WHICH POTENTIAL EVENTS MIGHT HAVE AN IMPACT ON ACHIEVEMENT OF OBJECTIVES
SECTION IVRISK ASSESSMENT
Risk Assessment
Risk is “the possibility that an event will occur and adversely affect the achievement of objectives.”
Thereby decreasing value for the entity’s stakeholders.
Risk Assessment
- Risks are analyzed and assessed as to their likelihood and impact
- Management considers the mix of future events, both expected & unexpected
- Useful first step – often a “brainstorming” session
- What is the “worst that could happen,” or the “worst that happened?”
Consider the “Risk Appetite”
Broadly defined as amount of risk an entity is willing to accept in pursuing its objectives.
For most government entities: risk appetite is fairly low!
Related is risk tolerance: “tolerable level of variation associated w/ a particular objective.”
Consider Both Inherent & Residual Risk
Inherent – Risk without any management activity or before controls are in place.
Example: inherent risk mitigated by payment card’s policies and procedures.
Residual – level of risk that remains after management has a plan in place to deal with the risk.
Example: residual risk remains after payment card policies are in place.
Consider both Likelihood and Impact
Likelihood: possibility an event will occur, measured in “low, medium, high,’ percentage or some frequency of occurrence.
Impact: Effect on an agency on others.
Risk Assessment Uses Qualitative and Quantitative Methods
Quantitative methods more precise Qualitative methods are necessary in
situations where business activity does not lend to quant. evaluation, or is not cost/effective.
Choice should reflect needs of the business unit and its employees.
Consider Risk in Objective Setting
The framework of objectives: strategic, operational, reporting, compliance, (see COSO cube).
Typically considerable overlap. Several examples follow.
Example: Operational
Risk that subrecipients in HIV/AIDS program are being reimbursed for unsupported expenditures.
Assessment – Extent of reimbursement and frequency is analyzed. Note that paying subrecipient invoices for which no documentation exists subjects agency to possible fraud.
Example: Reporting
Risk that management does not notify the Comptroller’s Office of overpayments; and failure to recover funds.
Assess why a breakdown in both state policy and actual recoupment.
Lack of notification negates possibility of a thorough investigation.
SECTION V RISK RESPONSE
V – Risk Response
“Having assessed relevant risks, management determines how it will respond, reviewing likelihood and impact, evaluating costs and benefits, and selecting options that bring residual (remaining risk) within the entity’s risk tolerances.”
The Four Categories of Risk Response:
Avoidance – not participating in events that give rise to risk.
Reduction: Specific actions taken to reduce likelihood or impact or both.
Sharing: Reducing likelihood or impact by sharing portion of the risk (insurance)
Acceptance: No action taken. “learns to live with the risk,” and monitor it...
Additional Factors in Risk Response
- For many risks, responses are obvious & well accepted.
- Response to risk may affect other factors, or affect likelihood/impact differently.
- Cost/Benefit – often cost side easier to analyze; benefit side may be more subjective.
- Risk response may lead to improvements in service areas or additional value.
- Considers both inherent and residual risk.
A Portfolio Perspective
ERM approach requires that risk be considered from a “portfolio” or entity-wide perspective.
Management first determines risk in each division or business unit.
Develops a composite assessment of risk reflecting unit’s residual risk profile relative to its objectives & risk tolerances.
A Portfolio View of Risk:
Can be depicted in several ways – focusing on major risk or event categories across divisions, program units, etc.
While risk in a program unit may be within risk tolerance; taken together they may exceed the risk appetite of entity.
Or have common elements that raise concerns.
Back to our previous examples:
1. Subrecipients in HIV/AIDS programs are routinely reimbursed for unsupported expenditures.
1. After further analysis corrective action plan identified and remedies failures in the reimbursement process, a cost/effective methodology to monitor expenditures.
And our other example…
2. Management did not notify the Comptroller of the Treasury of overpayments and failed to recoup overpaid funds.
2. Corrective action plan requires compliance with Policy 11; reviews recoupment procedures.
SECTION VICONTROL ACTIVITIES
Integration with Risk Responses
Control activities generally are established to ensure risk responses are carried out. However, control activities themselves are risk responses.
Integration with Risk Responses
Risk responses Share risk
Agency participates in state’s collateral pool or risk management fund.
Reduce risk Reduces likelihood and impact, e.g. Disaster recovery plan in place
to reduce the impact of a natural disaster. Risk Avoidance
Policies that forbid certain “risky business” e.g., agency not authorized to invest in certain risky investment instruments.
Risk Acceptance Monitoring of certain activities that are deemed high risk e.g., high
risk investments.
CONTROL ACTIVITIES
A single control activity can address multiple risk responses or
Multiple control activities may be needed for one risk response.
Types of Control Activitieso Preventiveo Detectiveo Manual (People Based)o Automated (System Based)
Types of Control Activities
Types of Control Activities
Preventive Controls are more reliable1. Prevents errors
2. Proactive approach – frees up people resources
Types of Control Activities
LESS RELIABLE
Detective Preventive Detective PreventivePeople Based Automated
MORE RELIABLE
Reconciliations (Detective) Personnel approving or executing transactions
should not perform reconciliations. Reviews (Detective)
Budget to Actual Current to prior period comparisons Performance measurements
Types of Control Activities
Approval/Authorizations (Preventive) Policies and procedures Limits to authority Supporting documentation Question unusual items
Types of Control Activities
Assets Security (Preventive and Detective) Physical safeguards Record retention Periodic counts/Inventories
Types of Controls of Control Activities
Segregation of Duties (Preventive and Detective) The following functions should be segregated
Approval Accounting/Reconciling Asset Custody
Types of Controls of Control Activities
Entity Level Controls Controls management implement to establish the
appropriate tone at the top. (Strategic Objectives) E.g., Employees sign a code of conduct
Process Level Controls Mitigate risks involved in initiating, recording,
processing or reporting transactions. IT and Application Controls
Further mitigates process level risks
Levels of Control Activities
Pervasive Level Adequate training of personnel Access restrictions Authorization Segregation of duties
Specific Level Validation Reconciliation
Levels of Control Activities
The Writing on The Wall Applying too narrow a focus to the identification
of risks can lead to overlooking potential risks and issues.
Think about risks without considering the existing processes and controls in place.
CONTROL ACTIVITIES
Effectiveness and Efficiency
Control activities must be tested to ensure there are no material weaknesses or significant deficiencies.
Management should also ensure that control activities are carried out in a timely manner. Internal auditors may support management by
providing assurance on the effectiveness and efficiency of control activates.
Control Activities Worksheet
Worksheet provided in Section VI can be used as a template for documenting risks and related controls
Divided into 3 parts Part I Strategic, Operations, and Reporting
Objectives Part II Compliance Objectives Part III Fraud
Worksheet is NOT all inclusive. N/A responses need to be addressed. Remember the writing on the wall. Any policy or procedure used as a risk
response in Part I or III should be addressed in Part II, Compliance.
Template may be modified.
Control Activities Worksheet
Categorized by business processes.1. Budget Process2. Cash Disbursement/Expenditures3. Cash Receipts/Revenues4. Cash Management5. Liabilities6. Capital Assets/Inventory/Equipment7. Information Systems/Data Processing8. Personnel/Employee Compensation9. Financial Reporting10. Accounts Receivable11. Investments
Control Activities Worksheet Part I Strategic, Operations, and
Reporting Objectives
Categorized by the Association of Certified Fraud Examiner’s Categories of Fraud. Misappropriation of assets Corruption Fraudulent Reporting
Control Activities Worksheet Part III Fraud
Control Activities Worksheet Part III Fraud
Categories should be applied to each business process.
Fraud control risk management should be integrated into the agency's philosophy, practices and business plans rather than be seen or practiced as a separate program. When it is integrated, risk management becomes the business of everyone in the organization.
Core areas to focus on Information systems; Contracts; Grants and other payments or benefits programs; Purchasing; Services provided to the community; Revenue collection; Use of government credit cards; Travel allowance and other common allowances; Salaries; And Property and other physical assets including physical security.
Control Activities Worksheet Part III Fraud
Other Considerations
Risks with large or moderate impact and probable (high) or reasonably possible (medium) likelihood of occurrence are your significant risks. These are the risks you need to address with control activities. No risk response is needed for insignificant risks but BE
CAUTIOUS AND OBJECTIVE. Insignificant risks still need to be documented on the
worksheet. Explanation of insignificant nature should be documented.
Other Considerations
Inherent Risks - Control Activities= Residual Risks Ensure you evaluate all insignificant risks not
addressed with control activities on an aggregate basis to ensure your residual risk is within your risk tolerance.
All risks (regardless of significance) should still be included.
Other Considerations
If any of the risks already included in the worksheet are deemed as having a low impact or remote likelihood of occurrence, treat as as a risk that is not applicable to your agency and document explanation on worksheet.
Don’t forget about abuse.
SECTION VIIINFORMATION ANDCOMMUNICATION
Information
Needed at all levels of an organization to identify, assess, and respond to risks to run the entity to achieve its objectives
Internal and external sources Financial and nonfinancial
Strategic and Integrated Systems
Data processing and data management become a shared responsibility
IS architecture needs to be flexible and agile to effectively integrate with affiliated external parties
Has management’s risk management techniques contemplated organizational goals in making technology selection and implementation decisions?
Integration with Operations
Applications facilitate access to information previously trapped in functional or departmental silos Information becomes available for widespread use
Transactions are recorded and tracked in real time Managers have immediate access to financial and
operating information more effectively to control agency activities
Depth and Timeliness of Information
Information infrastructure sources and captures data in a timeframe and at a depth consistent with an entity’s need to identify, assess, and respond to risks, and remain within risk tolerances
Timeliness needs to be consistent with the rate of change in the entity’s internal and external environments
Information Quality Data reliability is a critical attribute of
information systems and data-driven automated decision systems
Inaccurate data results in unidentified risks or poor assessments and bad management decisions
Quality of information includes ascertaining whether informational content is Appropriate Accurate Timely Accessible Current
Communication Inherent in information systems Must provide information to appropriate
personnel to carry out strategic, operating, reporting, compliance, and stewardship responsibilities
Must deal with expectations, responsibilities of individuals and groups Other important matters
Internal Communication Behavioral expectations and responsibilities of
personnel Clear statement of entity’s risk management philosophy
and approach Clear delegation of authority
Should effectively convey The importance and relevance of effective ERM The entity’s objectives, risk appetite, risk tolerances A common risk language Roles and responsibilities of personnel in effecting and
supporting the components of ERM
External Communication Open external communication channels
Constituents provide highly significant input on design and quality of products and services
Enables an entity to address evolving customer demands or preferences
Recognize such implications Investigate Take necessary corrective actions Focus on impact on financial reporting and
compliance as well as operating objectives
Means of Communicating Actions speak louder than words Actions influenced by the entity’s history and
culture Operating with integrity Culture is well understood throughout the
organization Embed communications on ERM into an
entity’s broad-based, ongoing communications programs and into the fabric of the organization
SECTION VIIIMONITORING
Monitoring Assessing the presence and functioning of
components over time Accomplished through
Ongoing monitoring activities Separate evaluations Combination of the two
ERM changes over time Once effective risk responses become irrelevant Control activities become less effective or no longer are
performed Entity objectives might change
Ongoing Monitoring Activities
Occur through regular management activities Variance analysis Comparisons of information with disparate
sources Dealing with unexpected occurrences
Scope and Frequency
Evaluations of ERM depend on significance of risks importance of risk responses and related controls in managing the risks
Address application in strategy setting with respect to significant activities
Scope depends on which objectives categories are addressed
Who Evaluates Self assessments
Person responsible for particular unit or function determines effectiveness of ERM for their activities
Division/function head Line managers Controller Senior management Internal auditors (management cannot delegate its
responsibility) External auditors (caution!)
The Evaluation Process Evaluating ERM is a process in itself Approaches and techniques vary Consistent and disciplined approach should be
brought to the process Understand entity activities and components of ERM
being addressed Determine ERM system actually works Discuss with personnel who actually perform or are
affected by ERM Analyze ERM process design and results of tests
performed Determine if process provides reasonable assurance with
respect to the stated objectives
Methodology
A variety of evaluation methodologies and techniques are available Checklists Questionnaires Flowcharting techniques Comparing or benchmarking to best in class
entity Planning steps Performance steps
Documentation
Varies based on the entity’s size, complexity, and similar factors
Evaluations more effective and efficient with appropriate level of documentation
Document and retain Evaluation process itself Descriptions of tests and analyses Support for statement to external parties
regarding ERM effectiveness Retention policy
Reporting Deficiencies Deficiencies noted from
Ongoing monitoring procedures Separate evaluations External parties
Reported directly to persons directly responsible for achieving business objectives affected by the deficiency
Report specific types of deficiencies to senior management and/or oversight body
Corrective actions taken or to be taken should be reported back to relevant personnel
What Is Reported All identified ERM deficiencies that affect an
entity’s ability to develop and implement its strategy and to set and achieve its objectives
Must report significant deficiencies and material weaknesses Use qualitative and quantitative materiality
Report identified opportunities to increase the likelihood entity objectives will be achieved
To Whom to Report Determining right party is critical Immediate superiors through normal channels They in turn communicate upstream or
laterally so the information ends up with someone who has the authority to act e.g., senior management, department head, audit
committee, other oversight body Consider alternative channels for reporting
sensitive information Fraud and illegal or improper acts
top related