Internal Control GuideA
Internal Control GuideA
Introduction ................................................................................................................................................................. 5
Outline of Components, Principles and Points of Focus ............................................................................................. 6
Chapter 1 – Components, Principles, and Points of Focus .......................................................................................... 8
Section 1: Internal Environment Component .......................................................................................................... 8
Section 2: Objective Setting Component............................................................................................................... 12
Section 3: Event Identification Component........................................................................................................... 13
Section 4: Risk Assessment Component ................................................................................................................ 15
Section 5: Risk Response Component ................................................................................................................... 18
Section 6: Control Activities Component............................................................................................................... 19
Section 7: Information and Communication Component ..................................................................................... 24
Section 8: Monitoring Component ........................................................................................................................ 27
Chapter 2: Internal Control Plan Checklist ................................................................................................................ 31
Your Outline ........................................................................................................................................................... 32
Chapter 3: Commonwealth Reliance on Department Internal Controls ................................................................... 35
Internal Control Questionnaire ............................................................................................................................. 35
Representations..................................................................................................................................................... 36
Conclusion ............................................................................................................................................................. 36
APPENDIX I ................................................................................................................................................................. 37
Guide Structure in Preparing the Internal Control Plan ........................................................................................ 37
Background: COSO Issuances ................................................................................................................................ 38
Appendix II ................................................................................................................................................................. 42
Works Cited ........................................................................................................................................................... 42
The purpose of The Internal Control Guide is twofold: It is designed to assist departments in designing,
documenting, and implementing internal controls. In addition, it provides the format that departments must use
when writing and updating their Internal Control Plans (ICPs).
This guide is based on the Committee of Sponsoring Organizations’ (COSO) Enterprise Risk Management
Framework (ERM) with its eight components and seventeen principles. Additionally, the guide incorporates the
Standards for Internal Control in the Federal Government’s (known as the Green Book) adaption of COSO’s
Internal Control — Integrated Framework (2013).
The guide emphasizes “Points of Focus” that are applicable to a government environment.
To be considered compliant, a department’s Internal Control Plan must contain the eight components of COSO’s
ERM Framework:
1. Internal Environment
2. Objective Setting
3. Event Identification
4. Risk Assessment
5. Risk Response
6. Control Activities
7. Information and Communication
8. Monitoring
The subsequent pages provide an outline mapping each ERM Component and Principle(s) with corresponding
Points of Focus.
Section 2: 6. Define strategic goals, objectives, 6.01. Definitions of strategic goals, and
Objective Setting risk appetite and risk tolerances objectives
6.02. Definition of risk appetite and risk
tolerance
Section 8: 16. Perform monitoring activities 16.01. Monitor each ERM component
Monitoring 16.02. Evaluation of results
Management’s attitude, actions, and values set the tone of an organization, influencing the control consciousness
of its people. Internal controls are likely to function well if management believes that those controls are
important and communicates that view to employees at all levels. Employees are aware of the practices followed
by upper management including those that circumvent internal controls. Despite policies to the contrary,
employees who note that their managers frequently override controls, will also view internal controls as “red
tape” to be “cut through” to get the job done. Management can show a positive attitude toward internal control
by such actions as complying with their own policies and procedures, discussing internal controls at management
and staff meetings, and rewarding employees for following good internal control practices.
A mission statement clearly identifies an organization’s purpose and how it is accomplished. It should be a brief
paragraph that is easily understood by the reader, including those outside the organization or field.
An organization’s mission statement may remain current for a number of years. However, it is a good idea to
review it periodically – such as part of the annual internal control plan review – to ensure it up to date.
Management should establish standards of conduct to communicate expectations concerning integrity and
ethical values. The standards of conduct guide the directives, attitudes, and behaviors of the department in
achieving its objectives. Management, with oversight from the Department head, defines the department’s
expectations of ethical values in the standards of conduct. Management may consider using policies, operating
principles, or guidelines to communicate the standards of conduct to the department.
To ensure adherence to the standards of Conduct, management should evaluate the directives, attitudes, and
behaviors of individuals and teams. These may consist of ongoing monitoring or separate evaluations. Individual
personnel can also report issues through reporting lines, such as regular staff meetings, upward feedback
processes, a whistle-blowing program, or an ethics hotline.
Massachusetts officials’ or employees’ conduct is also governed by M.G.L. c. 268A. The Conflict of Interest Law
regulates the conduct of all state, county and municipal employees and volunteers, whether paid or unpaid, full
or part-time, intermittent or temporary. General Law Chapter 268A governs what public officials and employees
may do on the job, what they may do after hours, or on the side, and what they may do after they leave public
service. Another source to consider is the NAGE Code of Conduct (https://www.mass.gov/doc/code-of-conduct-
nage-unit-6/download ).
An oversight body oversees the department’s operations; provides constructive criticism to management; and
where appropriate, makes oversight decisions so that the department achieves its objectives in alignment with
the department’s integrity and ethical values.
The term “oversight body”, as used in this guide, can refer to a board of directors/ governors/regents/trustees, or
an advisory/supervisory board. A board is a group of elected or appointed members who jointly oversee the
activities of a company or organization.
For most state agencies, “oversight body” refers to the department head and/or senior staff. Executive branch
departments also get guidance from secretariats. For other agencies, like the Office of the Comptroller, there is a
legislated board (in this case an “advisory board”) designated to "provide advice and counsel…”. Likewise, each
state university and community college and has its own boards of trustees.
The oversight body oversees management’s design, implementation, and operation of the entity’s internal
control system with relation to the components.
An organizational structure is necessary to enable a department to plan, execute, control, and assess the
achievement of its objectives. Management develops and assigns these responsibilities to groups (divisions,
As noted above, management develops and assigns responsibility. Management also evaluates the delegation for
proper segregation of duties within the unit and in the organizational structure. Segregation of duties helps
prevent fraud, waste, and abuse in the entity by considering the need to separate authority, custody, and
accounting in the department.
Effective documentation helps with the design an effective internal control as it communicates the who, what,
when, where, and why of internal control execution to personnel. Documentation also provides a means to retain
organizational knowledge and mitigate the risk of having that knowledge limited to a few personnel, as well as a
means to communicate that knowledge as needed to external parties, such as auditors.
Competence requires relevant knowledge, skills and abilities, and is gained mainly from professional experience,
training, and certifications. In establishing expectations for competence, standards of conduct, assigned
responsibility, delegated authority, and policies should be considered. These competencies should be evaluated
where the oversight body performs such review of both management and staff.
Once management has recruited qualified personnel, the necessary training should be provided to new hires (and
current personnel alike) depending on their roles, professional requirements (i.e. CPEs), and standards of
conduct. Management should consider incentives to motivate and reinforce expected levels of performance and
conduct.
5. Enforcement of Accountability
5.01. Enforce Accountability
Strategic Goals
A goal is an end result the organization wants to attain. It should be a broad, long-range concept and linked to the
department’s mission and/or strategic plan. Government managers set department goals and priorities based
upon legislative mandates established in statutes (enabling legislation), priorities of constitutional officials and
department heads, and within funding authorization set in annual appropriations. Achievement of these goals
should be defined by objectives.
Objectives
An objective is an action required to achieve the long-term goal. In contrast to a goal, an objective is narrowly
focused and easily measurable. It should, therefore, be an action that can be accomplished in an identified period
of time, such as a fiscal year. A good objective is SMART:
Measurable: How can it be measured? (Some objectives are more difficult to measure; however, they should
have observable results.)
Risk Appetite
The COSO ERM – Understanding and Communicating Risk Appetite document states “Risk appetite is the amount
of risk, on a broad level, an organization is willing to accept in pursuit of value. Each organization pursues various
objectives to add value and should broadly understand the risk it is willing to undertake in doing so.” Therefore,
risk appetite is related to the achievement of the organizational goals and objectives; in other words risk appetite
and strategy are intertwined. As such, risk appetite should be considered in setting strategies and objectives, and
managing risks.
Risk Tolerance
Risk tolerance represents the application of risk appetite to specific objectives. Risk tolerance is defined as the
acceptable level of variation in performance relative to the achievement of objectives. At this point, management
would consider the relative importance of goals and objectives and align risk tolerances with risk appetite.
Events with negative impact represent risks, which require management’s assessment and response. Events with
positive impact represent opportunities, which management channels back into the strategy and objective-
setting processes.
The types of risks that impact the department should be considered. These include both inherent and residual
risk. Inherent risk is the possibility that an event will occur and adversely affect the departments’ achievement of
its goals and objectives. Assuming management takes steps to address an event, residual risk is what remains
after management’s response to inherent risk. Management’s lack of response to either risk could cause
deficiencies in the internal control system.
Moreover, there are also internal and external factors to consider. Internal risk factors include: the internal
environment, size of the organization, complexity, personnel, significant related party transactions, accounting
estimates and principles that are subject to different interpretations, technological (new IT system), etc. External
risk factors include new laws and/or regulations, economic instability, natural disasters, technology (new vendor
commerce methods), etc.
First and foremost, it is important to note that it is not failures in the systems, policies, procedures, or controls
that cause fraud, it is the people (although people can take advantage of such failures). Thus, in assessing,
analyzing, and responding to fraud risk, consider first understanding the motivations and rationalizations of
people.
One guide to consider in assessing and identifying fraud is the Association of Government Accountant (AGA)
Toolkit. As noted on their website ( https://www.agacgfm.org/ )
“AGA's Fraud Prevention Toolkit provides current, state-of-the-art tools for federal, state, local and tribal
government financial managers to use in preventing and detecting fraud. It furthers AGA’s mission of "Advancing
Government Accountability.”
Fraud risk factors do not necessarily indicate that fraud exists but are often present when fraud occurs. Fraud risk
factors include the following:
• Incentive/pressure - Management or other personnel have an incentive or are under pressure to meet
deadline or performance target, which provides a motive to commit fraud.
While fraud risk may be greatest when all three risk factors are present, one or more of these factors may
indicate a fraud risk. Other information provided by internal and external parties can also be used to identify
fraud risks. This may include allegations of fraud or suspected fraud reported by internal auditors, personnel, or
external parties (i.e. State Auditor or Inspector General) that interact with the entity.
Two general types of fraud are: those intended to benefit the individual (whether inside or outside) the
department, at the department’s expense, and those performed on behalf of the department.
Some of the fraud schemes that would harm the department for the benefit of the individual include: asset
misappropriation, skimming, payroll fraud, expense reimbursement fraud, and disbursement fraud. On the other
hand, fraud schemes on behalf of the department include information misrepresentation, tax evasion, bribery,
and illegal political contributions and payoffs to government officials.
Its purpose is to assess how big the risks are, both individually and collectively, in order to focus management’s
attention on the most important threats and opportunities, and to lay the groundwork for risk response. Risk
assessment is all about measuring and prioritizing risks so that risk levels are managed within defined tolerance
thresholds without being over controlled or forgoing desirable opportunities.
The positive and negative impacts of potential events should be examined, individually or by category, across the
entity. Once the applicable risks are identified, the assessment regarding the probability and significance of each
risk is critical.
Principles are required in supporting an effective design, implementation, and operation of the associated
component. Points of focus act as additional information and may contain examples to further explain what a
requirement means and what it is intended to cover.
The first activity within the risk assessment process is to develop a common set of assessment criteria to be
deployed across the entity – subunits, teams, etc.
Assessment Criteria
Some form of measurement of risk is necessary. Scales are defined for rating risks in terms of likelihood and
impact. These scales comprise rating levels and definitions that foster consistent interpretation and application
by different units/teams in the entity. Scales should allow meaningful differentiation for ranking and prioritization
purposes.
Likelihood represents the possibility that a given event will occur. Likelihood can be expressed using qualitative
terms (frequent, likely, possible, unlikely, rare), as a percent probability, or as a frequency. A relevant time period
should be used when expressing qualitative values (50% chance in any one month; or weekly).
Impact (or consequence) refers to the extent to which a risk event might affect the entity. Impact assessment
criteria may include financial, reputational, regulatory, health, safety, security, environmental, employee,
vendor/customer, and operational impacts. Entities typically define impact using a combination of these types of
considerations given that certain risks may impact the entity financially while other risks may have a greater
impact to reputation or health and safety. When assigning an impact rating to a risk, assign the rating for the
highest consequence anticipated.
Examples
Once the risks have been assessed, the risks should be viewed as a comprehensive portfolio to enable the next
step; prioritizing for risk response. The term risk profile represents the entire portfolio of risks facing the entity.
Some entities represent this portfolio as a hierarchy, some as a collection of risks plotted on a heat map.
Similar to assessing risks, ranking and prioritizing is often done in a two-step process. First, the risks are ranked
according to one, two, or more criteria such as impact rating multiplied by likelihood rating. Second, the ranked
risk order is reviewed in light of additional considerations such as impact alone or the size of the gap between
current and desired risk level (risk tolerance threshold, see Chapter 2: Objective Setting Component).
The most common way to prioritize risks is by designating a risk level for each area of the risk map such as very
high, high, medium, or low, where the higher the combined impact and likelihood ratings, the higher the overall
risk level. The boundaries between levels vary from entity to entity depending on risk appetite (refer to Chapter
2: Objective Setting Component). For example, an entity with a greater risk appetite will have boundaries for its
risk levels shifted toward the upper right. Also, some entities adopt asymmetric boundaries placing a somewhat
greater emphasis on impact than on likelihood. For example, a risk having an impact rating of moderate and
likelihood rating of frequent has an assigned risk level of high, whereas a risk having an impact rating of extreme
and a likelihood rating of possible has an assigned risk level of very high.
After plotting on the risk map, risks are then ranked from highest to lowest in terms of risk level. These rankings
may then be adjusted based on other considerations such as detailed knowledge of the nature of the impact. For
example, within a group of risks having a designation of very high, those risks having extreme health and safety,
or reputational impacts may be prioritized over risks having extreme financial impacts but lesser health and
safety or reputational impacts.
Risk Map
To be effective and sustainable, the risk assessment process needs to be simple, practical, and easy to
understand. Success depends upon executive commitment and resources. Furthermore, COSO’s Enterprise Risk
Management.
Integrated Framework emphasizes the need to assess and oversee risks from a holistic perspective. The process
must sit within a larger framework that uses the information gleaned to make decisions about risk responses and
monitoring, and feeds information back into the strategic planning process.
Risk response falls into four basic categories: Accept; Avoid; Reduce; Share.
Since government is in the business of providing critical services, whether in the areas of public health, public
safety, education, transportation infrastructure, protecting the environment, social services, etc., it is not usually
in a position to eliminate risk, but instead must accept risk and do its best to mitigate it. However, as shown
below, there are alternatives to accepting all risks.
1. Accept the risk and monitor it: No action is taken based on the insignificance of the risk. For example, one
accepts that the weather cannot be controlled, but is prepared to respond to some of its effects (power
outages, floods, etc.).
2. Avoid the risk by eliminating it: For example, a budgetary reduction could mean deciding to close a
program, eliminating the risks of operating that program. Yet, one must consider that ending a program
could lead to another set of risks.
3. Reduce the risk by instituting controls – This is the category where most risk falls, where the response
depends on the severity of the risk.
4. Share the risk by partnering with another entity: For example, an agreement with another agency to utilize
its resources in an area outside of the host agency’s expertise (e.g., an agency must produce coastal zone
flood maps and engages the expertise of Information Technology’s geographic information services.
Management should design an overall risk response and specific actions for responding to fraud risks, which can
originate both inside and outside of the organization. It may be possible to reduce or eliminate certain fraud risks
by making changes to the entity’s activities and processes. These changes may include stopping or reorganizing
certain operations and reallocating roles among personnel to enhance segregation of duties. In addition to
responding to fraud risks, management may need to develop further responses to address the risk of
management override of controls.
Control activities occur throughout the organization, at all levels and in all functions. They include a range of
activities including, but not limited to, approvals, authorizations, verifications, reconciliations, reviews of
operating performance, security of assets, and segregation of duties.
The National Association of State Comptrollers (NASC) Internal Control Self-Assessments tools can assist in
determining whether the proper controls are in place for various business processes but should be evaluated for
application under the user's unique circumstances. See these documents under
https://www.macomptroller.org/internal-controls .
Control activities are designed in response to the department’s objectives and risks identified to achieve an
effective internal control system. Control activities are the policies, procedures, techniques, and mechanisms that
enforce management’s directives to achieve the entity’s objectives and address related risks.
Policies and Procedures are the strategic link between the mission statement and day-to-day operations. Well-
written policies and procedures allow employees to clearly understand their roles and responsibilities within
predefined limits.
Policies identify the key activities and provide a general strategy to decision-makers on how to handle issues as
they arise by providing the reader with limits and a choice of alternatives that can be used to ‘guide’ their
decision making process as they attempt to overcome problems.
Procedures provide the reader with a clear and easily understood plan of action required to carry out or
implement a policy. A well-written procedure will also help eliminate common misunderstandings by clearly
identifying job responsibilities and establishing boundaries.
Below are some of the control activity categories to consider, but these are not all inclusive of categories specific
to a department. For further details on these categories, please refer to the Green Book.
• A preventive control activity prevents an entity from failing to achieve an objective or address a risk.
Examples of preventive controls include authorization lists, segregation of duties, and prior supervisory
approval.
• A detective control activity discovers when an entity is not achieving an objective or addressing a risk
before the entity’s operation has concluded and corrects the actions so that the entity achieves the
objective or addresses the risk. Examples of detective controls include reconciliation, exception reports,
and supervisory review.
Control Activities can be designed at the entity-level, transaction-level, or both depending on the level of
precision needed so that the department meets its objectives and addresses related risks.
Transaction control activities (combination of preventive and detective type controls) may include verifications,
reconciliations, authorizations and approvals, physical control activities, and supervisory control activities.
Management should divide or segregate key duties and responsibilities among different people to reduce the risk
of error, misuse, or fraud. This includes separating the responsibilities for:
• authorizing transactions,
• processing and recording them,
• reviewing the transactions, and
• handling any related assets or process so that no one individual controls all key aspects of a transaction or
event.
In other words, control activities related to authority, custody, and accounting of operations ought to be
separated to achieve adequate segregation of duties.
If segregation of duties is not practical within an operational process because of limited personnel for example,
adding closer supervision, cross-training or frequent reviews may be an alternative for this control activity.
A department head is responsible for all activities conducted by the department. Because in most departments
the department head cannot personally review and certify all business transactions, the department head sets up
the department’s business operations with a series of checks and balances (internal controls) to balance risks and
efficiencies. Department heads must directly authorize individuals within their chain of command to be their
designee for incurring obligations and approving transactions on their behalf. There can be no sub-delegation by
designees. See Key State Finance Law Compliance Roles and Responsibilities document.
(https://public.powerdms.com/MAComptroller/documents/1861753 )
An information system is the people, processes, data, and technology that management organizes to obtain,
communicate, or dispose of information. An information system represents the life cycle of information used for
the entity’s operational processes that enables the entity to obtain, store, and process quality information.
An information system includes both manual and technology-enabled information processes. Technology-
enabled information processes are commonly referred to as information technology.
• Information Technology: enables information related to operational processes to become available to the
department on a timelier basis. Additionally, information technology may enhance internal control over
security and confidentiality of information by appropriately restricting access.
• Completeness: Transactions that occur are recorded and not understated.
• Accuracy: Transactions are recorded at the correct amount in the right account (and on a timely basis) at
each stage of processing.
• Validity: Recorded transactions represent events that actually occurred and were executed according to
prescribed procedures.
For information systems, there are two main types of control activities: general and application control activities.
General controls include security management, logical and physical access, configuration management,
segregation of duties, and contingency planning.
Application controls include controls over input, processing, output, master file, interface, and data management
system controls.
Control activities over the information technology infrastructure are designed to support the completeness,
accuracy, and validity of information processing by information technology.
Objectives for security management include confidentiality, integrity, and availability. Confidentiality means that
data, reports, and other outputs are safeguarded against unauthorized access. Integrity means that information is
safeguarded against improper modification or destruction, which includes ensuring information’s nonrepudiation
and authenticity. Availability means that data, reports, and other relevant information are readily available to
users when needed.
Management is required to protect the organization’s equipment, information, documents, and other resources
that could be wrongfully used, damaged, or stolen. The department head is responsible for maintaining
accountability for the custody and use of resources and shall assign qualified employees for that purpose.
Management can protect resources by limiting access to authorized individuals. Access may be limited by various
Department management must determine each individual’s enterprise system (HR/CMS, MMARS and
Warehouse) security access by both business area and security level. Management can limit access to one or
more specific business areas, such as Accounts Receivable, Payroll, or Fixed Assets. Within each business area,
management must also select the appropriate security levels. In MMARS, the Administrator role is the most
powerful since it allows the individual to validate and submit documents to final status. The User role is more
restricted; it allows the processing of documents but excludes the ability to finalize documents.
Data security is the means of protecting data, whether in hard media (paper, microfilm) or in computer and
communications systems, against unauthorized disclosure, transfer, modifications, or destruction whether
accidental or intentional. Therefore, data security helps to ensure privacy. It also helps in protecting confidential
data concerning clients, consumers, and employees.
Data security consists of procedures that prevent unauthorized access to computer resources. Security
procedures protect data from unintentional acts, as well as intentional ones. Examples of data security include:
Access to enterprise systems should be reviewed quarterly, as well as when significant turnover occurs in
sensitive positions or in realignment of duties.
Physical Security
Physical security is the protection of facilities that house data, personnel, clients, records, and other assets. This
includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism. Security engineering
involves three elements of physical security: (1) obstacles to frustrate trivial attackers and delay serious ones,
such as locks and swipe card access; (2) detection devices such as alarms, security lighting, and security guards to
Managers and other staff in key roles should document internal control, all transactions and other significant
events in a manner that allows the documentation to be readily available for examination. The documentation
may appear in management directives, administrative policies, or operating manuals, in either paper or electronic
form.
Documentation may include responsibilities by divisions and/or staff by position title for responsibility for an
operational process’s objectives and related risks, and control activity design, implementation, and operating
effectiveness.
Managers should communicate to appropriate personnel the policies and procedures so they can implement the
control activities for their assigned responsibilities. Each division/group may document policies in the appropriate
level of detail to allow management to effectively monitor the control activity. Procedures may include the timing
of when a control activity occurs and any follow-up corrective actions to be performed by competent personnel if
deficiencies are identified.
Management should periodically review policies, procedures, and related control activities for continued
relevance and effectiveness in achieving the department’s objectives or addressing related risks. If there is a
significant change in a process, management should review the process in a timely manner after the change to
confirm that the control activities are designed and implemented appropriately. Changes may occur in personnel,
operational processes, or information technology. Regulators and legislators may also change either an entity’s
objectives or how an entity is to achieve an objective.
Information requirements consider the expectations of both internal and external users. Management should
define the identified information requirements at the relevant level and requisite specificity for appropriate
personnel.
Reliable internal/external sources provide data that are reasonably free from error and bias and faithfully
represent what they purport to represent. Management should evaluate both internal and external sources of
data for reliability. Sources of data can be operational, financial, performance or compliance related.
Examples of external sources can be profit and non-profit organizations, industry publications, professional
association memberships and websites. Examples of internal sources can be financial reports, performance
metrics, transaction analyses and incident management systems.
Quality information meets the identified information requirements when relevant data from reliable sources are
used. Quality information is information that is appropriate, current, complete, accurate, accessible, and
provided on a timely basis.
Communication is multi-dimensional – from the top down, bottom up and across the organization. Effective
communication informs all levels of the organization and must be ongoing. Communication systems can be
formal or informal. Formal communication systems, from sophisticated computer technologies to staff meetings,
provide input and feedback relative to an organization’s activities, including the achievement of goals and
objectives. Informal conversations with employees, contractors, vendors and regulators often provide some of
the most critical information needed to identify risks and opportunities.
In some circumstances separate lines of communication are needed to serve as a fail-safe mechanism in case
normal channels are inoperative. In the event regular communications channels are not effective or appropriate,
many organizations have set up supplemental employee communications channels. These channels, which may
be called “whistle-blower” programs or “ethics hotlines,” may be voluntary or legally mandated. Their purpose is
to provide a ready means whereby employees at any organizational level can confidentially discuss or report
perceived or actual illegal, unethical, or otherwise inappropriate behavior.
A desirable goal is, over time, to embed communications on enterprise risk management into an entity’s broad-
based, ongoing communications programs, consistent with the concept of building enterprise risk management
into the fabric of the organization.
Communication is multi-faceted – verbal, non-verbal and written. It is important to remember that effective
verbal communication is two way, requiring that management welcome, and listen to, suggestions and feedback.
Staff must be comfortable enough to share their awareness of problems with managers who can act on this
information. Verbal communication should be in support of, not in place of, written documentation of policies
and procedures. All written documentation, whether it is official policy/procedure, memo, or e-mail, must be
distributed to anyone who requires the information in order to perform his or her responsibilities.
External communication can take a variety of forms, including statutorily mandated annual reports and financial
reports, web sites, press releases, newsletters, and informational brochures. Other methods of communication
include focus groups, presentations at conferences, budget hearings and oral updates. Regardless of the methods
used, maintaining open lines of communication with outside parties will enhance a department’s internal control.
For example:
• Vendors, service providers, and consultants can provide significant input on the quality and design of
agency products and services.
• Auditors, advocacy groups, and other outside reviewers can alert management to minor problems before
they become major difficulties.
• Suppliers and contractors who are made aware of the agency’s ethical standards can help deter or detect
inappropriate purchasing or bidding practices.
• Complaints or inquires can point out control problems, or the department’s ability to supply accurate
information to the media or concerned citizens.
As noted above, communication is multi-faceted – verbal, non-verbal and written. Effective verbal
communication is two way, requiring that management welcome, and listen to, suggestions and feedback.
Management should consider the following factors in selecting the appropriate method of communication:
Section 8: 16. Perform monitoring activities 16.01. Monitor each ERM component
Monitoring 16.02. Evaluation of results
Monitoring the ERM framework is essential for determining whether your Internal Control Plan needs updating.
Evaluation of the framework should be done in a way that provides an objective perspective on any or all
elements of enterprise risk management, from the internal environment through the monitoring component
itself. In some cases, external events can mean that your department must consider new goals and objectives. In
other cases, particular attention is given to analysis, response and mitigating controls when new risks are
identified.
New goals or objectives require an assessment of the risks you will encounter in trying to achieving them. When
new risks are identified a review of internal control activities is necessary.
Any changes that impact your ICP require you to gather the necessary information for proper analysis, and to
communicate the changes to all responsible parties.
Ongoing monitoring occurs during normal operations and includes regular management and supervisory
activities, comparisons, reconciliations, and other actions people take in performance of their duties.
Monitoring may include automated tools, which can increase objectivity and efficiency by electronically compiling
evaluations of each ERM component.
Separate evaluations are a way to take a fresh look at each component by focusing directly on the component’s
relevance and/or effectiveness at a given time. These provide greater objectivity when performed by reviewers
who do not have responsibility for the activities being evaluated, internal auditors for example. If there are no
internal auditors available, consider the option of periodically hiring an outside vendor.
Everyone within an organization has some responsibility for monitoring. The position a person holds in the
organization helps to determine the focus and extent of these responsibilities. Therefore, the monitoring
performed by managers, supervisors and staff will not have the same focus. For example:
• Executive management should focus their monitoring activities on the major divisions within the
organization. With this broad focus, they emphasize the organization’s internal environment, mission, and
goals.
• Managers must be watchful for new risks that might impact business processes and assess how well
internal controls function in multiple units within the organization.
• Supervisors monitor all activities within their respective units to ensure staffs are performing their assigned
responsibilities, internal control activities are functioning properly, and the unit is accomplishing its goals
and objectives.
• Staffs monitor their own work to ensure it is being done properly. They should be trained by supervisors
and management regarding internal controls and be encouraged to report any irregularities.
• Access to systems and sensitive data should be reviewed periodically to ensure employees have adequate
access, but not more than what is needed to complete their responsibilities.
Results of the ongoing monitoring and component evaluations should be documented and reviewed to identify
issues that could compromise the effectiveness of the internal control plan.
Personnel should report issues through established reporting lines to the appropriate internal parties on a timely
basis to enable the department to promptly evaluate those issues.
We primarily think of a deficiency when discussing internal controls. A deficiency can be in the design,
implementation, or operating effectiveness of an internal control and its related process. But it is important to
note that all of the ERM components are interrelated and, a shortcoming in any one of them can lead to control
deficiencies. All control deficiencies and ERM component issues require further evaluation and remediation by
management.
When deficiencies in compliance or internal control lead to formal audit findings, corrective actions must be
taken to remediate the finding in a timely manner. The audit resolution process begins when audit or other
review results are reported to management and is completed only after action has been taken that (1) corrects
identified deficiencies, (2) produces improvements, or (3) demonstrates that the findings and recommendations
do not warrant management action.
Non-audit related recommendations must be evaluated for their potential to cause changes in the ERM
components and Internal Control Plan.
B. Evidence of ERM Components – does it include all principles related to each Component?*
a. Tone at the Top, Mission Statement, Ethical Expectations, Standards and Adherence to Conduct
c. Is the ICP readily available, distributed and communicated throughout the organization?
a. Goals and Objectives are defined, and aligned to the Mission Statement
a. Have risks that may impede the achievement of each objective been identified?
4. Risk Assessment – Impact and likelihood of occurrence for each potential risk identified.
A risk assessment can be a significant undertaking and result in a large volume of information. For
purposes of the ICP, the Risk Assessment component need only be a short summary of how and when
the assessment was conducted. The summary should include who was involved, the programs and
activities considered, how risks were rated (what was the scale/methodology used and was it used
applied consistently throughout the process), how they were prioritized and by whom? The existence and
location of the risk assessment documentation should be referenced here.
c. Segregation of duties
Goals, objectives, risk events and control activities should be linked as follows:
1. Goal #1
a. Information –quality information is generated for and/or from both external and internal sources
8. Monitoring –each component is evaluated to keep the Internal Control Plan up to date
a. Ongoing and separate evaluations are used to ascertain whether each of the components of ERM is
present and functioning.
*Refer to Chapters 1 through 8 of the Internal Control Guide for further discussion on each component and
subsequent principles.
Following are a set of questions (following the ERM Framework and discussion in Section 1) to assist in
developing a plan:
Your Outline
• What is your mission statement?
• Would an Organizational Chart help to convey your department’s various activities?
• What is your “Tone at the Top”?
• Have the other Principles under the ERM Component Internal Environment been considered?
• What are the long term goals that support your mission?
1. Goal #1
2. Goal #2
3. Goal #3
• What are the short term objectives that support each of your long term goals?
1. Goal #1
a. Objective #1 for Goal #1
b. Objective #2 for Goal #1
2. Goal #1
• Have all the Principles under the ERM Component Information and Communication been considered?
• Have all the Principles under the ERM Component Monitoring been considered?
Additional evaluation points to consider in developing the initial control plan, during their Internal Control Plan
review or to further refine major programs, bureaus, institutions, or other department subdivisions are:
1. Does the department have an internal control plan written in the correct format? If so, when was it last
updated?
• The Governor submits a warrant to the Governor’s Council for approval relying upon the “certification”
by the Comptroller;
• The Comptroller relies on certification by a Department Head evidenced by electronic signature within
the accounting system,
• A Department Head relies on their Chief Fiscal Officer (CFO) that manages the day to day activity within
the Department evidenced by electronic signature within the accounting system;
• The CFO relies on Department employees to make purchases and confirm receipt, delivery and
acceptance of commodities and services (including payroll) in accordance with prescribed laws,
regulations, policies, and procedures.
Department Head delegation of signature authority is captured based upon “Security roles” established as part of
the state accounting system (Massachusetts Management Accounting and Reporting System – MMARS). In
addition, Department Heads may choose to implement further restrictions with use of Department Head
signature authority which will be implemented through Department policy, not by system security. These
restrictions must also be documented and referenced in the Department’s internal control plan
The Single Audit Act, as amended in 1996, and the Office of Management and Budget (OMB) require single audits
to provide the federal government with reasonable assurance on the accuracy of financial statements and on
major programs' compliance with federal laws and regulations. Other audits must, by law, build on the work of
the single audit rather than duplicate it. OMB released new uniform administrative requirements, cost principles,
and audit requirements for federal awards (Title 2 CFR Subtitle A, Chapter II, Part 200 - also referred to as the
“Super Circular”) effective 12/27/2014. This guidance is meant to strengthen internal control over federal
programs and reduce administrative burden for non-Federal entities receiving Federal awards while reducing the
risk of waste, fraud and abuse.
At the beginning of each Single Audit, auditors perform a preliminary evaluation of the Commonwealth’s internal
controls. They then review the internal controls of some departments in more depth. The auditors use
departments’ internal control plans and Internal Control Questionnaire responses, along with other criteria, to
render an opinion on the internal controls of the Commonwealth as a whole.
Conclusion
Each of us plays a vital role in creating an environment that is accountable to the public while being responsive to
the needs and direction of senior management. Internal controls are a critical element of this environment.
A direct relationship exists between objectives, which are what the entity strives to achieve, the components,
which represent what is needed to achieve the objectives, and subunits/teams of the entity.
1. Strategic – specific goals that are aligned with and supporting the organization's mission
2. Operational - Effective and efficient use of its resources
3. Reporting- Reliability of reporting
4. Compliance - Adherence to applicable laws and regulations
Within each of these four objective-setting categories, there are eight interrelated components. Each of these
has been discussed above, taking into consideration the Green Book’s adaptation of the principles and points of
focus.
COSO updated its internal control guidance in 2013 with the issuance of a revised Internal Control – Integrated
Framework. The new COSO Framework explicitly articulates on the 17 principles that the 1992 COSO Framework
conceptually introduced in narrative only. Note the 2013 COSO Framework is based on the internal Control
Framework (5 components), not the ERM Framework (8 components).
The Government Accountability Office’s Standards for Internal Control in the Federal Government (also known as
The Green Book) adapts the 2013 COSO Framework for a government environment in its most recent issuance as
of September 2014.
In accordance with M.G.L. c. 7A, s. 9A and Chapter 647 of the Acts of 1989, An Act Relative to Improving the
Internal Controls within State Agencies, the Office of the Comptroller (CTR) is directed to work with the Office of
the State Auditor (OSA) to publish minimum standards for internal control systems at state departments for
administrative and financial operations. The Internal Control Laws require that departmental internal control
structure be developed in accordance with the internal control guideline established by the CTR.
The law also requires that all unaccounted for variances, losses, shortages or thefts of funds or property, are
immediately reported to the OSA. The OSA has the responsibility to determine the internal control weaknesses
that contributed to the condition, identify the internal control policies and procedures that need modifications,
identify the amount of funds involved, make recommendations that address the correction of the condition
found, and report the matter to appropriate management and law enforcement officials.
The Internal Control Laws are an integral part of State Government to provide reasonable assurance that
departments’ financial and programmatic operations are effective, efficient, and reliable and are in compliance
with applicable laws, rules and regulations.
Yellow Book
The Comptroller General of the United States issues Government Auditing Standards (known as the Yellow Book,
December 2011 Revision), through the U.S. Government Accountability Office (GAO). These standards, also
referred to as generally accepted government auditing standards (GAGAS), explain the rules that auditors must
follow during audits of governmental entities, programs, activities, and functions. Audit organizations must also
use Government Auditing Standards during reviews of governmental assistance that is administered by
contractors and nonprofit organizations, when required by statute or other mandates, or when auditors hold
themselves out as following government auditing standards. The Yellow Book establishes requirements for
auditors' professional qualifications, the quality of audit effort, and the characteristics of professional and
meaningful audit reports. It includes requirements and guidance for the following types of reviews: financial
audits, attestation engagements, and performance audits.
Audit Committee
Within the public sector, an audit committee is an extension of the
governing body. Committees are formed to fulfill the governing body’s An audit committee has three
responsibilities, not expand them. Officials are able to increase their fundamental goals. First, it must
oversight of specific issues by assigning various matters to satisfy itself that management is
committees. maintaining a comprehensive
framework of internal control.
In this light, the audit committee is an integral element of public
accountability and governance. It plays a key role for the governing Second, the audit committee must
body in carrying out its legal and fiduciary responsibilities, especially ensure that management’s financial
with respect to the integrity of the government’s financial reporting practices are assessed
information, system of internal control, and legal and ethical conduct objectively. Third, the committee
of management and employees. needs to determine to its own
satisfaction that the financial
The roles of the audit committee may vary from entity to entity statements are properly audited and
depending on the complexity and size, as well as the requirement of that any problems disclosed in the
the governing body. However, the one common responsibility for all course of the audit are satisfactorily
audit committees, among all their potential roles, is risk management resolved
oversight.
Internal Audit
As defined by the Institute of Internal Auditors, “Internal auditing is an independent, objective assurance and
consulting activity designed to add value and improve an organization’s operations. It helps an
organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the
effectiveness of risk management, control and governance processes.”
Management is responsible for establishing and maintaining an adequate system of internal controls. An internal
audit office is charged by management with “… assessing the effectiveness of the design and execution of the
system of internal controls and risk management processes.”
Internal auditors are responsible for making recommendations for improvement in internal controls to top
management and, if applicable, a governing board of directors. To maintain independence, and to perform in an
objective capacity, internal auditors should not engage in any operational or programmatic responsibilities.
Works Cited
Auditing – An Integrated Approach by Alvin A. Arens, Randal J. Elder and Mark S. Beasley.
Audit Committees by Stephen J. Gauthier, Government Finance Officers Association, Chicago, IL 2006.
Standards for Internal Control in the Federal Government (The Green Book) - GAO (U.S. Government
Accountability Office)
https://www.gao.gov/greenbook
Single Audit Information Service. Thompson Publishing Group State of Connecticut Accountability Directive
Number 1.
https://www.osc.ct.gov/manuals/InternalCntl/index.html