The COSO Financial Controls Framework
The COSO Financial Controls Framework
This page describes the original, 1992 COSO Financial Controls Framework. See also the
2004 Enterprise Risk Management (ERM) COSO Framework
The original COSO framework is outlined in a document: 1992 COSO Report: Internal
Control – An Integrated Framework.
This document identifies what the commission believed to be the fundamental and
essential objectives of any business or government entity:
Purpose
Describes a unified approach for evaluation of the internal control systems that
management has designed to:
and
• serves as a common basis for managements, directors, regulators, academics and
others to better understand enterprise risk management, its benefits and
limitations, and to effectively communicate about enterprise risk management
Control Components
The COSO Cube
The original COSO framework contains five control components needed to help assure
sound business objectives. The control components are:
• Control Environment.
• Risk Assessment.
• Control Activities.
• Information and Communication.
• Monitoring.
More specifically, the thought process behind these five components was that they would
work together to support efforts to achieve an organization's mission, strategies and
related business objectives. All five components would need to be in place to achieve an
"effective" internal control system.
Control Environment
- Integrity and Ethical Values
- Commitment to Competence
- Board of Directors and Audit Committee
- Management’s Philosophy and Operating Style
- Organizational Structure
- Assignment of Authority and Responsibility
- Human Resource Policies and Procedures
Risk Assessment
- Company-wide Objectives
- Process-level Objectives
- Risk Identification and Analysis
- Managing Change
Control Activities
- Policies and Procedures
- Security (Application and Network)
- Application Change Management
- Business Continuity / Backups
- Outsourcing
Monitoring
- On-going Monitoring
- Separate Evaluations
- Reporting Deficiencies
This page describes the 2004 Enterprise Risk Management (ERM) COSO Framework.
See also the original, 1992 COSO Financial Controls Framework
The original COSO framework is outlined in a document: 1992 COSO Report: Internal
Control – An Integrated Framework.
Why was the COSO framework updated? Here's the word from COSO:
Click here to view the Executive Summary of the 2004 COSO Document: Enterprise
Risk Management (ERM) COSO Framework.
Overview
The new Enterprise Risk Management (ERM) COSO framework emphasizes the
importance of identifying and managing risks across the enterprise. The new COSO
framework consists of eight components:
1. Internal control environment
2. Objective setting
3. Event identification
4. Risk assessment
5. Risk response
6. Control activities
7. Information and communication
8. Monitoring.
The three new components of the COSO framework are Objective setting, Event
identification, and Risk response.
FAQs
Have questions? Click here to get answers to the following Frequently Asked Questions:
FAQs for COSO's Enterprise Risk Management — Integrated Framework A. What is the
framework and how do I get it?
1. What is in the framework?
2. Where can I find the framework?
E. How might organizations view the framework in the context of their Sarbanes-Oxley
404 compliance process?
1. With the significant amount of implementation efforts companies are currently
undertaking for Sarbanes-Oxley compliance and adoption of new accounting standards,
why should companies be motivated to implement enterprise risk management?
2. What makes this different from the internal control framework? How does it relate to
Sarbanes-Oxley reporting?
Value is maximized when management sets strategy and objectives to strike an optimal
balance between growth and return goals and related risks, and efficiently and effectively
deploys resources in pursuit of the entity’s objectives. Enterprise risk management
encompasses:
• Aligning risk appetite and strategy – Management considers the entity’s risk
appetite in evaluating strategic alternatives, setting related objectives, and
developing mechanisms to manage related risks.
• Enhancing risk response decisions – Enterprise risk management provides the
rigor to identify and select among alternative risk responses – risk avoidance,
reduction, sharing, and acceptance.
• Reducing operational surprises and losses – Entities gain enhanced capability to
identify potential events and establish responses, reducing surprises and
associated costs or losses.
• Identifying and managing multiple and cross-enterprise risks – Every enterprise
faces a myriad of risks affecting different parts of the organization, and
enterprise risk management facilitates effective response to the interrelated
impacts, and integrated responses to multiple risks.
• Seizing opportunities – By considering a full range of potential events,
management is positioned to identify and proactively realize opportunities.
• Improving deployment of capital – Obtaining robust risk information allows
management to effectively assess overall capital needs and enhance capital
allocation.
These capabilities inherent in enterprise risk management help management achieve the
entity’s performance and profitability targets and prevent loss of resources. Enterprise
risk management helps ensure effective reporting and compliance with laws and
regulations, and helps avoid damage to the entity’s reputation and associated
consequences. In sum, enterprise risk management helps an entity get to where it wants
to go and avoid pitfalls and surprises along the way.
IS-54 and IS-136 are second-generation (2G) mobile phone systems, known as Digital
AMPS (D-AMPS). It was once prevalent throughout the Americas, particularly in the
United States and Canada. D-AMPS is considered end-of-life, and existing networks
have mostly been replaced by GSM/GPRS or CDMA2000 technologies.
This system is most often referred to as TDMA. That name is based on the acronym for
time division multiple access, a common multiple access technique which is used by
multiple protocols, including GSM, as well as in IS-54 and IS-136. However, D-AMPS
has been competing against GSM and systems based on code division multiple access
(CDMA) for adoption by the network carriers, although it is now being phased out in
favor of GSM/GPRS and CDMA2000 technology.
D-AMPS uses existing AMPS channels and allows for smooth transition between digital
and analog systems in the same area. Capacity was increased over the preceding analog
design by dividing each 30 kHz channel pair into three time slots (hence time division)
and digitally compressing the voice data, yielding three times the call capacity in a single
cell. A digital system also made calls more secure because analog scanners could not
access digital signals. Calls were encrypted, although the algorithm used (CMEA) was
later found to be weak.[1]
IS-136 added a number of features to the original IS-54 specification, including text
messaging, circuit switched data (CSD), and an improved compression protocol. SMS
and CSD were both available as part of the GSM protocol, and IS-136 implemented them
in a nearly identical fashion.
Former large IS-136 networks included AT&T in the United States, and Rogers Wireless
in Canada. AT&T and Rogers Wireless have upgraded their existing IS-136 networks to
GSM/GPRS. Rogers Wireless removed all 1900 MHz IS-136 in 2003, and has done the
same with their 800 MHz spectrum as the equipment failed. Rogers deactivated their IS-
136 network (along with AMPS) on May 31, 2007. AT&T soon followed in February
2008, shutting down both TDMA and AMPS.
Alltel, who primarily uses CDMA2000 technology but acquired a TDMA network from
Western Wireless, shut down their TDMA and AMPS networks in September 2008. US
Cellular, who now also primarily uses CDMA2000 technology, shut down their TDMA
network in February 2009.
IS-54 is the first mobile communication system which had provision for security, and the
first to employ TDMA technology.
3G and 4G Services
Analysis of Telecom Services
Let us examine what these 3G & 4G have rather than that of 1G and 2G.
Both the 1G and 2G deals with voice calls and has to utilize the maximum bandwidth as
well as a limited till sending messages i.e. SMS. The latest technologies such as GPRS, is
not available in these generations. But the greatest disadvantage as concerned to 1G is
that with this we could contact with in the premises of that particular nation, where as in
case of 2G the roaming facility a semi-global facility is available.
2.5 Generation
In between 2G and 3G there is another generation called 2.5G. Firstly, this mid
generation was introduced mainly for involving latest bandwidth technology with
addition to the existing 2G generation. To be frank but this had not brought out any new
evolution and so had not clicked to as much to that extend.
3G and 4G Featuress
Main 3G Services
With the help of 3G, we can access many new services too. One such service is the
GLOBAL ROAMING. Another thing to be noted in case of 3G is that Wide Band Voice
Channel that is by this the world has been contracted to a little village because a person
can contact with other person located in any part of the world and can even send
messages too. Then the point to be noted is that 3G gives clarity of voice as well can talk
with out any disturbance. Not only these but also have entertainments such as Fast
Communication, Internet, Mobile T.V, Video Conferencing, Video Calls, Multi Media
Messaging Service (MMS), 3D gaming, Multi-Gaming etc are also available with 3G
phones.
Main 4G Features
Then with the case of Fourth Generation that is 4G in addition to that of the services of
3G some additional features such as Multi-Media Newspapers, also to watch T.V
programs with the clarity as to that of an ordinary T.V. In addition, we can send Data
much faster that that of the previous generations.