Internal Controls - WASBO.com [PDF]

Mar 2, 2018 - control deficiency for lack of proper segregation of duties? – Should you be concerned ... ▷Examples o

0 downloads 6 Views 386KB Size

Recommend Stories


Internal Controls
The happiest people don't have the best of everything, they just make the best of everything. Anony

Internal Controls
Before you speak, let your words pass through three gates: Is it true? Is it necessary? Is it kind?

Improving internal controls
Every block of stone has a statue inside it and it is the task of the sculptor to discover it. Mich

Internal Controls Framework Charter
Don’t grieve. Anything you lose comes round in another form. Rumi

internal controls the heart of internal audit
We can't help everyone, but everyone can help someone. Ronald Reagan

statement on risk management and internal controls
Sorrow prepares you for joy. It violently sweeps everything out of your house, so that new joy can find

Internal Controls To Prevent & Detect Fraud
You miss 100% of the shots you don’t take. Wayne Gretzky

Accounting for Cash and Internal Controls
Raise your words, not voice. It is rain that grows flowers, not thunder. Rumi

Internal Marketing [PDF]
Whether a bank succeeds or fails depends largely on strategy of which internal marketing is a major .... A rude teller means a rude bank: to the consumer. Not unlike goods advertising, ...... Pendidikan dan pelatihan merupakan pnontas utama bagi semu

PDF Review Controls and Choices
We may have all come on different ships, but we're in the same boat now. M.L.King

Idea Transcript


3/2/2018

Segregation of Duties/ Internal Controls 2018 WASBO Accounting Conference

David Maccoux, Shareholder

Objectives ▶What does it mean when your district receives an internal control deficiency for lack of proper segregation of duties? – Should you be concerned? – Does it mean your district is more susceptible to fraud?

▶Understand how Segregation of Duties (SoD) affects your internal controls ▶Examine the cost-benefit analysis that takes place at a district with respect to designing an internal control structure considering SoD ▶Demonstrate how to implement effective SoD – Identify their SoD risks – Design compensating controls to manage ineffective SoD – Monitor SoD through processes and tools

Agenda ▶Understand what a SoD finding means to your district ▶Examples of Segregation of Duties (SoD) violations ▶Demonstrate a method for evaluating SoD ▶Discuss fraud and risks of fraud ▶Considerations for maintaining proper SoD

1

3/2/2018

Internal Controls Internal control is broadly defined as an integral process, affected by a district's governing body, management and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: ▶Reliability of financial reporting. ▶Compliance with applicable laws and regulations. – Includes Uniform Guidance and State Single Audit Guidelines

▶Effectiveness and efficiency of operations. Internal controls are dependent upon people and will succeed or fail depending on people.

District and Auditor Roles ▶School District – What are your roles and responsibilities? – What can you do related to SoD findings and deficiencies

▶Auditors – How do we evaluate your internal controls. – What are our professional responsibilities.

Auditors’ Responsibilities ▶“In making those risk assessments, the auditors consider internal control relevant to the District’s preparation and fair presentation of the financial statements in order to design audit procedures that are appropriate in the circumstances, but not for the purpose of expressing an opinion on the effectiveness of the District’s internal control. Accordingly, we express no such opinion.” ▶Internal Control Assessments – Deficiency (management letter comment) – Significant deficiency (finding) – Material weakness (finding) – “reasonable possibility that a material misstatement of the entity’s financial statements will not be prevented, or detected and corrected timely.

2

3/2/2018

Internal Controls – What is it? ▶Control Environment- board, committees, policies ▶Risk Assessments - identification of risks the government is facing ▶Control activities - segregation of duties, reconciliations ▶Information and communication - financial reporting ▶Monitoring - are policies/controls still current/relevant

Internal Controls ▶How do you define where there should be internal controls? – Understand the your processes • Segregation of duties • Multiple layers of authorization – Define key control points in those processes by asking yourself where there could be a breakdown in the process – Ensure or recommend controls for where controls could breakdown during those processes

Internal Controls ▶Controlling the opportunity – There are two sets of controls that districts can implement depending on their environment: • Preventative controls - such as segregation of duties and access controls can be implemented in the beginning of a process to not allow fraud to happen. • Detective controls such as monitoring or reconciliations can be implemented on the back-end which will help to identify the occurrence of fraud after the fact.

3

3/2/2018

What is Segregation of Duties? ▶How do you define it? – COSO: “Dividing or allocating tasks among various individuals making it possible to reduce the risks of error and fraud.” – Contains four functions • Authorizes transaction • Custody of asset, whether directly or indirectly, e.g. receiving checks in mail or implementing source code or database changes • Records, e.g. preparing source documents, code or reports • Reconciles in general ledger – Ideally, a single individual would have responsibility for only a single function

What is Segregation of Duties? ▶What is the goal of segregation of duties? – Benefits of implementing and maintaining SoD include: • Safeguarding of assets • Accurate financial reporting • Reduced risk of non-compliance – SoD conflicts are not equally important and can be overcome by proper design of compensating controls

Evaluating Your Segregation of Duties ▶Management is responsible for enforcing and maintaining proper SoD ▶Create listing of incompatible duties – Consider “sensitive” duties such as posting of journal entries, performing reconciliations, maintaining employee databases and Vendor Master – Identify level of risk accepted (cost-benefit)

▶Develop SoD matrix – Correlates procedure with internal control function, and identifies the level of risk – Can be used to evaluate your ability to segregate duties and documents to your board/auditors your risk assessment considerations

4

3/2/2018

Example SoD Matrix

Receive Goods

Creat e Voucher

Approve Voucher

Cut Check

Add/ Edit Vendor

Approve Vendor

R

A

C

R

A

C

A

A

RX

Approve JE

Approve PO

A

Functions R Record Ent er JE

Creat e PO

R

Bank Reconciliat ion

Approve Requisit ion

Procedure/ Funct ion

Internal Control Function R Creat e Requisit ion

Creat e Requisit ion

Process

IC Funct ion

▶Correlates procedure/ function with risk

R

A

A Authorize C Custody RX Reconcile Risk Level

A Approve Requisit ion R Creat e PO

Elevated Risk

A Approve PO Purchasing and Accounts Payable

Low risk

C Receive goods R Creat e Voucher A Approve Voucher C Cut Check A Add/ Edit Vendor A Approve Vendor

Reconciliation Journal Entry

RX Bank Reconcil iat ion R Ent er JE A Approve JE

▶Design compensating/ detective controls to offset risk

Evaluating Your Segregation of Duties ▶Translate SoD requirements into applications – Define how you grant user access – Roles should not contain “built-in” conflicts – Identify the “sensitive” objects associated with conflicting duties • Example: Restricted finance director’s ability to enter journal entry

▶Additional issues and complexity – Users assigned to multiple roles – Users assigned access rights by User ID – Users accessing multiple systems

Why are Governments Susceptible? ▶Management and governing boards are more trusting. – Lack of “owner” role

▶Cost restrictions and size limitations – Segregation of duties (budget constraints) – Limited anti-fraud programs or controls – Limited ratio analysis

5

3/2/2018

Maintaining Segregation of Duties ▶Prevention – Tools for granting user access rights • IT becomes a gatekeeper – Maintain strong userid and password requirements

▶• Detection – Internal audit – Periodic evaluation and monitoring – Exception reporting

▶Automated Methods – Automated monitoring – ERP system tools and workflow

Segregation of Duties and Fraud “The Fraud Triangle” – Dr. Donald Cressey

Opportunity •

No Separation of Duties



Close relationships with third parties



Understanding of accounting functions

Unshareable Need •

Personal financial problems



Addictions



Unrealistic goals

Rationalization •

I will pay it back



I deserve this



They won’t miss it

Fraud Characteristics ▶Fraud always starts small ▶There are always fraud warning signals ▶You can’t be too trusting. Fraud always involves confidence. ▶Tone at the top is most important ▶Establishing controls always good! Ensuring controls established are working always better! – Internal controls will fail if not monitored.

6

3/2/2018

Fraud Examples EMPLOYEE

▶ Fictitious Employees ▶ Expense Reimbursement Schemes – Personal expenses ▶ False Hours/Wage Rates ▶ P-Cards/Credit Card Abuse

VENDOR/THIRD PARTY ▶ Fictitious Vendors/Suppliers – Vendor name matches a name of an employee – Vendors are unapproved ▶ Fraudulent Invoices – Duplicate invoices to vendors – Payments without invoices ▶ Kickbacks, Bribes and Bid Rigging

COMPUTER

▶ Hacking/Unauthorized Access to Assets ▶ Improper Access Granted to Employees

MISAPPROPRIATION OF ASSETS ▶ Cash/Checks – Cash Skimming: Removing cash before the District records the receipts – Check Tampering: Phony checks or phony recipients are created – Unauthorized withdrawals ▶ Accounts Receivables – Unauthorized write-off of accounts receivable balances and subsequent collection kept ▶ Physical Assets – Stealing cash, other inventory and 19 supplies for personal use

Fraud Schemes ▶Methods of Committing Fraud have Changed 30 Years Ago: - Stealing cash receipts - Stealing supplies and equipment - Checks for cash

Fraud Schemes (continued) ▶Methods of Committing Fraud have Changed Now: -

Electronic transfers to personal accounts Unauthorized payments – fake vendors Payroll schemes – fake employees, unauthorized payments Credit card purchases for personal use

7

3/2/2018

Communication/Awareness ▶Control environment – Board Governance – Asking the right questions (oversight role) • Are controls in place? • Are we following best practices? • How have we assessed internal controls? – Authorization (budget, purchases, debt financing, disbursements) – Address noncompliance with policies, procedures and internal controls.

▶Control environment - management oversight – Establishment of strong policies and procedures – Awareness of fraud red flags

Prevention and Detection Strategies ▶How can you reduce the risk of fraud: – Communication/Awareness • Understanding role in monitoring financial activities – Risk Assessment - internal control enhancements to control employee’s opportunity to commit fraud – Strong internal control system • Even at small districts with limited employees, controls should be implemented to minimize opportunities

▶Strategies to reduce your risk: – Professional skepticism – Understand red flags

Why Do Internal Controls Fail? ▶Heavily reliant on people – “Going through the motions” • Process driven versus understanding role – “See no evil, hear no evil” • Conflict avoidance; not my job, not my business – “Management override” – “Employee turnover” • Lack of documentation (who, why, how) – “Where’s all the time gone?”

8

3/2/2018

Cybersecurity ▶Why is cybersecurity important, from a control perspective. – Over time, a district’s risk that it will be targeted has increased and the schemes more complex. – Can have a significant negative impact on your operations. – Are you educating your employees on the dangers which exist?

Just How Good Are Hackers? Hackers share best practices via the dark web ▶With the technological advances in hacking technology available on the dark web, it takes less than two hours for a hacker to compromise your 8-character password, regardless of the character types. ▶Phishing attempts attack multiple targets, and all it takes is one click to let the hacker inside your network. There are now companies that offer “phishing-as-a-service” and even offer support to the hacker! ▶A jump drive can be reprogrammed to pose as another device. It can dupe your computer into thinking it’s a keyboard, allowing it to type in certain commands and take control of your files. Or it can pose as a network card, rerouting your Internet traffic so everything you do can be spied on. 26

Sample Risk Assessments Handouts ▶Accounts payable and disbursement process ▶Receipting, invoice and revenue recognition process ▶Payroll, human resources process ▶Risk assessment, what does it mean and how to complete effectively to evaluate SoD concerns

9

3/2/2018

Strengthening Controls with Limited Resources Controls that help you get the biggest bang for your buck! ▶Integration of board member (smaller organizations) in processes ▶Positive Pay - a feature offered by banks that can identify potential fraud ▶Pay attention to check sequencing - an out of sequence check can tip you off to fraud ▶Surprise procedural reviews ▶Encryption ▶Password protection

Lessons Learned Do you have Internal Controls in Place to Prevent/Minimize Fraud? ▶Is financial information presented timely and accurately and generated from the general ledger system, not spreadsheets? ▶Is there a fraud risk management process - identification by board/management of areas of potential risk on an ongoing basis? ▶Make sure employees understand their role in your internal control structure. ▶Keep documents (bank recs, blank checks, invoices, personnel files, etc.) in appropriate areas with appropriate controls ▶If employee goes on vacation, does someone else perform their job? Mandatory vacations? ▶Conflict-of-interest policy is critical!

Lessons Learned (continued) ▶SoD helps prevent fraud and errors ▶Districts should identify their SoD risks and controls ▶Detective controls can be effective ▶A process is needed to correct ineffective SoD ▶Maintaining effective SoD requires processes and tools ▶Management is always surprised about current access ▶Without performing an analysis, SoD issues are apparent after something bad occurs

10

3/2/2018

THANK YOU!

11

Smile Life

When life gives you a hundred reasons to cry, show life that you have a thousand reasons to smile

Get in touch

© Copyright 2015 - 2024 PDFFOX.COM - All rights reserved.