Lesson 3 Handout PDF
Lesson 3 Handout PDF
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Business Ethics
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
2
Four Main Areas of Business Ethics
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Ethics
concerns the social impact of computer technology (hardware,
software, and telecommunications).
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
4
Figure 3-1 Fraud Triangle
Pressure Opportunity
No Fraud
Pressure Opportunity
Ethics
Fraud
Ethics
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
6
Underlying Problems
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Employee Fraud
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
8
Management Fraud
Perpetrated at levels of management above the
one to which internal control structure relates
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Fraud Schemes
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
10
A. Fraudulent Statements
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
11
B. Corruption
Examples:
bribery
illegal gratuities
conflicts of interest
economic extortion
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
12
C. Asset Misappropriation
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
13
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
14
Modifying Assumptions to the
Internal Control Objectives
Management Responsibility
Reasonable Assurance
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
15
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
16
Exposures of Weak Internal
Controls (Risk)
Destruction of an asset
Theft of an asset
Corruption of information
Disruption of the information system
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
17
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
18
Preventive, Detective, and Corrective
Controls
Figure 3-3
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
19
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
20
1: The Control Environment
Integrity and ethics of management
Organizational structure
Role of the board of directors and the audit
committee
Management’s policies and philosophy
Delegation of responsibility and authority
Performance evaluation measures
External influences—regulatory agencies
Policies and practices managing human
resources
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
21
2: Risk Assessment
Identify, analyze and manage risks relevant to
financial reporting:
changes in external environment
risky foreign markets
significant and rapid growth that strain internal
controls
new product lines
restructuring, downsizing
changes in accounting policies
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
22
3: Information and Communication
The AIS should produce high quality information
which:
identifies and records all valid transactions
provides timely information in appropriate detail to
permit proper classification and financial reporting
accurately measures the financial value of
transactions
accurately records transactions in the time period in
which they occurred
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
23
4: Monitoring
The process for assessing the quality of internal
control design and operation
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
24
5: Control Activities
Policies and procedures to ensure that the
appropriate actions are taken in response to
identified risks
Fall into two distinct categories:
IT controls—relate specifically to the computer
environment
Physical controls—primarily pertain to human
activities
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
25
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
26
Six Types of Physical Controls
Transaction Authorization
Segregation of Duties
Supervision
Accounting Records
Access Control
Independent Verification
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
27
Physical Controls
Transaction Authorization
used to ensure that employees are carrying
out only authorized transactions
general (everyday procedures) or specific
(non-routine transactions) authorizations
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
28
Physical Controls
Segregation of Duties
In manual systems, separation between:
authorizing and processing a transaction
custody and recordkeeping of the asset
subtasks
In computerized systems, separation between:
program coding
program processing
program maintenance
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
29
Physical Controls
Supervision
a compensation for lack of segregation; some
may be built into computer systems
Accounting Records
provide an audit trail
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
30
Physical Controls
Access Controls
help to safeguard assets by restricting
physical access to them
Independent Verification
reviewing batch totals or reconciling
subsidiary accounts with control accounts
©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
31