Using The COSO Framework - PQ COSO
Using The COSO Framework - PQ COSO
Framework to Develop a
Strong and Preventive
Control Environment
Weaver Public Sector CPE Event
Speakers
Alyssa G. Martin, CPA Dan Graves, CPA
Dallas Executive Partner, Senior Manager, Advisory Services
Advisory Services
3
COSO Internal Control Integrated Framework
COSO Framework
COSO (Committee of Sponsoring Organizations) is an integrated
framework for internal control which, when implemented, can
provide a baseline to establish a control structure.
5
What is Internal Control?
7
COSO Components &
Principles
COMPONENTS PRINCIPLES
1. Demonstrates commitment to integrity and ethical values
2. Board is independent and oversees internal controls
Control Environment 3. Establishes structure, authority and responsibility
4. Attracts, develops and retains competent individuals
5. Holds individuals accountable for responsibilities
• Misappropriation of assets
• Fraudulent or inaccurate financial reporting
• Operational effectiveness and efficiency
• Compliance risk
• Reputational risk
• Regulatory and legal compliance risk
• Strategy and operational alignment
10
Risk Considerations
A number of studies
support the conclusion that
material weaknesses in
internal control are more
likely in smaller, younger
and financially weaker
organizations.
11
Targeted Process
12
Internal Control Costs
Direct Costs
Personnel
Third-party audits
IT systems
Indirect Costs
Potential inefficiency
Reduced productivity
13
External Drivers
• COSO 2013
• State or Federal Audits and Reviews
• State or Federal Laws & Regulatory
Guidance
• Federal Awards
14
Focus on Fraud and IT
IT & Fraud:
Enhanced Focus
18
The Fraud Diamond
Opportunity Incentive
Opens the door for Leads the perpetrator
the perpetrator to the door
Capability
Enables the
Rationalization perpetrator to
walk through the
Coaxes the perpetrator to door
the door
19
Fraud Prevention: Detecting
Occupational Fraud
Source: 2014 Association of Certified Fraud Examiners “Report to the Nation.” 20
Top Fraud Scenarios
Process Fraud Scheme Response
1. Revenue • Improper/early revenue recognition • Implement month-end review of financial statements
• Fictitious revenue • Require review and approval of journal entries
2. Expenses • Hiding losses in future reporting periods • Implement month-end review of financial statements
3. Cash and Cash Equivalents • Larceny • Establish ACH deposit into main operating account
• Defalcation • Implement lockbox through independent bank
4. Occupational Injury • Non-compliance with FMLA, abuse of FMLA • Require review and approval of submitted forms
5. Financial Reporting • Manipulation of management estimates for • Review and approval of journal entries
receivables, goodwill, or depreciation • Require supporting documentation for all estimates
6. Improper Note Disclosure • Omission of material contingencies • Implement month-end checklist reviewed by various members of
management
7. Hiring Process • Payment to fictitious employees • Segregation of duties in the payroll process; outsource payroll
8. Compliance with contracts • Awarding contracts to parties related to individuals • Involve various members of management in contract approval;
involved in the decision making process require two signatures for approval of material contracts
9. Assets • Improper valuation of securities, inventory, fixed assets • Management review and approval of valuation methods
10. Expense reimbursement process • Reimbursement for undocumented expenses • Require employee expense reimbursement forms with attached
original receipts
11. Competitive Bid Rigging • Establishing criteria that gives select vendors an unfair • Require independence confirmation for all members involved in
advantage negotiations
12. Performance and Compensation Review • Overpayment to existing employees • Segregation of duties in the payroll process; outsource payroll
13. Credit Card Process • Reimbursement for personal, non-deductible expenses • Require employee acceptance of Terms of Use and re-payment
for personal expenses
14. Non-Financial • Falsifying external documents to suppliers • Require approved contracts and purchase orders
15. Document Storage • Destruction or disappearance of records • Establish Code of Conduct that restricts tampering with records;
third-party document storage
21
The Framework in Action:
Assessing & Designing Internal Controls
Assessing Internal Controls
25
COSO 2016:
Control Activities
The policies and procedures that help ensure that management directives
are carried out. They take many forms including policies and procedures,
approvals, verifications, reconciliations, performance reviews, security
measures, and segregation of duties.
26
Nature of Controls:
Preventive vs. Detective
Preventive Controls: Either people-based of systems-based, designed to
prevent errors or omissions (including fraud) from occurring and are
generally positioned at the source of the risk within a business process
• Standards, policies and procedures are the most basic type of
preventive controls
• Segregation of duties also acts as a preventive control against fraud
• Authorization/approval levels also prevent the risk of an illegal act and
are thus preventive in nature
Detective Controls: Either people-based or systems-based, designed to
detect and correct errors or omissions (including fraud) within a timely
manner prior to completion of a stated objective
• Exception reports – review of various exception reports helps in
detecting errors
• Reconciliations – after the fact reconciliations act as a double check
against errors and exceptions
• Periodic audits also act as a very good detective control
27
Nature of Controls:
Primary vs. Secondary
28
Designing Effective Internal
Control Activities
29
Effective Internal Control Activities
30
Purchase-to-Pay:
Identify the Relevant Risks
Purchasing
1 Purchases are recorded into the general ledger completely and accurately when receiv ed.
2 Open purchase orders receiv ed are recorded in the general ledger.
3 Bids and purchases are approv ed by authorized personnel.
4 Coding of bids and purchases is correct.
5 Fictitious or duplicate v endors are not set up and purchases are not recorded. Consider the related sub-
6 Purchases are correctly capitalized. processes that make up the
7 Purchase contracts are authorized and do not contain kickback arrangements. overall cycle or process
8 Open purchase orders are tracked to ensure that they are filled by v endors.
area being evaluated. In
Accounts Payable
Purchase-to-Pay, that
9 Purchases/payables are recorded and coded correctly.
10 Inv oices represent goods/ serv ices actually receiv ed.
includes:
11 Fictitious or duplicate inv oices are not recorded.
12 Inv oices reflect correct prices, quantities and other v aluation information.
• Procurement
13 PO v ariances with the v endor inv oice is approv ed by authorized personnel.
• AP
14 Vendor inv oices are properly authorized.
15 Only authorized employees are allowed to use District credit cards.
• Disbursements
Cash Disbursements
16 Cash disbursements are correctly coded. These all have their own
17 Cash disbursements are recorded in the proper period.
unique risks.
18 Cash disbursements are recorded when paid.
19 Cash disbursements relate to actual purchases/expenses.
20 Duplicate or fictitious cash disbursements are not processed.
21 Cash disbursements are properly authorized.
22 Cash disbursement amounts recorded agree with amounts paid.
31
Purchase-to-Pay:
Identify the Controls
AUTHORIZATION AND
SEGREGATION OF DUTIES
32
Purchase-to-Pay:
Identify the Controls
33
Purchase-to-Pay:
Evaluate Control Design
Points of Focus
• Reflects External Laws and
Regulations: Laws and
Control Activity
regulations establish minimum
standards of conduct which • Purchase Order’s over $50,000 must
include three formal bids and be
the entity integrates into
approved by Council.
compliance objectives.
35
Balancing
Internal Controls
Balanced Controls
40
Questions
Thank You
Alyssa G. Martin
Partner, Risk Advisory Services
[email protected]
Dan Graves
Senior Manager, Risk Advisory Services
[email protected]