thank you to our sponsors
DESCRIPTION
Thank You to our Sponsors. Checks & Balances. Internal Controls to Achieve a Successful Audit. Once Upon a Time…. Approximately $96,000 18 months Mid 30s female YMCA finance director and accountant. What are Internal Controls?. Internal Control. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/1.jpg)
Thank You to our Sponsors
![Page 2: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/2.jpg)
Checks & BalancesInternal Controls to Achieve a Successful Audit
![Page 3: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/3.jpg)
Once Upon a Time…
Approximately $96,000
18 months
Mid 30s female
YMCA finance director and accountant
![Page 4: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/4.jpg)
What are Internal Controls?
…a process effected by an organization's structure, work and authority flow, and people and management information systems, designed to help the organization accomplish specific goals or objectives. It is a means by which an organization's resources are directed, monitored, and measured. It plays an important role in preventing and detecting fraud and protecting the organization's resources
Internal Control
![Page 5: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/5.jpg)
What are Internal Controls?
Separation of Duties:
Checks & Balances
Permissions
![Page 6: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/6.jpg)
What are Internal Controls?
Role Based Access Control Using Technology:
DAXKO Operations
DAXKO Accounting
![Page 7: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/7.jpg)
Internal Controls Process
Establish Environmen
tAssess Risks
Control Activities
Monitor Performanc
e
![Page 8: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/8.jpg)
Establish Environmen
tAssess Risks
Control Activities
Monitor Performance
Establish Environment
![Page 9: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/9.jpg)
Establish Environment
A Receptive Environment Requires a Top Down Approach
![Page 10: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/10.jpg)
Establish Environment
Define Roles
Assign Responsibilities
Communicate Clearly
![Page 11: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/11.jpg)
Establish Environment
![Page 12: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/12.jpg)
Establish Environmen
t
Assess Risks
Control Activities
Monitor Performanc
e
Assess Risks
![Page 13: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/13.jpg)
Assess Risks
Vulnerability to Theft
Vulnerability to Mistakes
Vulnerability to Data Compromise
Vulnerability to Misrepresentation
![Page 14: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/14.jpg)
Assess Risks
Vulnerability to Theft
Vulnerability to Mistakes
Vulnerability to Data Compromise
Vulnerability to Misrepresentation
![Page 15: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/15.jpg)
Assess Risks
Vulnerability to Theft
Vulnerability to Mistakes
Vulnerability to Data Compromise
Vulnerability to Misrepresentation
![Page 16: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/16.jpg)
Assess Risks
Vulnerability to Theft
Vulnerability to Mistakes
Vulnerability to Data Compromise
Vulnerability to Misrepresentation
![Page 17: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/17.jpg)
Assess Risks
Vulnerability to Theft
Vulnerability to Mistakes
Vulnerability to Data Compromise
Vulnerability to Misrepresentation
![Page 18: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/18.jpg)
Establish Environmen
tAssess Risks
Control Activities
Monitor Performanc
e
Control Activities
![Page 19: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/19.jpg)
Control Activities
Prevention of Theft
Prevention of Mistakes
Prevention of Data Compromise
Prevention of Misrepresentation
![Page 20: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/20.jpg)
Control Activities
Prevention of Theft
Prevention of Mistakes
Prevention of Data Compromise
Prevention of Misrepresentation
![Page 21: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/21.jpg)
Control Activities
Prevention of Theft
Allocate new apply one time adjustment permission
Separate duties for shift close-outs and deposits
Separate duties for invoice entry and posting
Separate duties for check printing and signing
Activities to Implement
![Page 22: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/22.jpg)
Control Activities
Prevention of Theft
Prevention of Mistakes
Prevention of Data Compromise
Prevention of Misrepresentation
![Page 23: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/23.jpg)
Control Activities
Prevention of Mistakes
Assign account permissions to increase simplicity
Separate duties for entry and posting of journal entries
Use importing feature to import entries
Activities to Implement
![Page 24: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/24.jpg)
Control Activities
Prevention of Theft
Prevention of Mistakes
Prevention of Data Compromise
Prevention of Misrepresentation
![Page 25: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/25.jpg)
Control Activities
Prevention of Data Compromise
Restrict users to applicable branches or departments
Restrict users to necessary major codes
Activities to Implement
![Page 26: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/26.jpg)
Control Activities
Prevention of Theft
Prevention of Mistakes
Prevention of Data Compromise
Prevention of Misrepresentation
![Page 27: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/27.jpg)
Control Activities
Prevention of Misrepresentation
Budget for Revenue before Expense
Establish levels of review
Encourage use of comments
Lock down budget after board approval
Activities to Implement
![Page 28: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/28.jpg)
![Page 29: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/29.jpg)
Establish Environmen
tAssess Risks
Control Activities
Monitor Performanc
e
Monitor Performance
![Page 30: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/30.jpg)
Monitor Performance
Use the Event Log in DAXKO Operations and DAXKO Accounting to monitor performance
![Page 31: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/31.jpg)
Accounts Payable
General Ledger
Budget
Monitor Performance
DAXKO Accounting
![Page 32: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/32.jpg)
![Page 33: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/33.jpg)
![Page 34: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/34.jpg)
![Page 35: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/35.jpg)
![Page 36: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/36.jpg)
Review
Establish Environmen
tAssess Risks
Control Activities
Monitor Performanc
e
![Page 37: Thank You to our Sponsors](https://reader030.vdocument.in/reader030/viewer/2022033104/568133ec550346895d9adfc3/html5/thumbnails/37.jpg)
Action Items
Determine your Vulnerabilities
Set Goals to Improve Internal Controls
Utilize Roles and Permissions
Establish Policies for Monitoring the Event Log
Evaluate Processes on a Regular Basis