Internal Audit and Control
Internal Audit and Control
Internal Assignments
Name - SHARAD BHARDWAJ
Roll No - 2314108031
Course Code & Name - DFIN304 – INTERNAL AUDIT AND CONTROL
Semester- 3rd MBA
2. **Analytical Skills**: They need strong analytical abilities to assess complex data, identify
patterns, and understand the implications of their findings.
3. **Integrity**: Upholding ethical standards and maintaining objectivity is crucial. Auditors must
be honest and transparent in their evaluations and reports.
4. **Critical Thinking**: The ability to think critically and evaluate the effectiveness of internal
controls and risk management strategies is essential.
7. **Technical Proficiency**: Familiarity with auditing software, data analysis tools, and
understanding of accounting principles and standards is important.
10. **Adaptability**: Being flexible and able to adjust to changing environments, regulations, and
technologies is important in the evolving field of internal auditing.
These qualities collectively contribute to the effectiveness and credibility of an internal auditor in
safeguarding an organization’s assets and ensuring compliance with relevant laws and policies.
1. **Scope**: This clause defines the purpose of the standard and its applicability to any
organization regardless of size, type, or sector. It sets the stage for the overall objectives of
implementing a risk management framework.
2. **Normative References**: This clause lists any referenced documents essential for
understanding and implementing ISO 31000:2009. These references are not included in the
standard itself but are crucial for its proper application.
3. **Terms and Definitions**: This section provides definitions for key terms used throughout the
standard. It ensures a common understanding of terms related to risk management.
4. **Risk Management Framework**: This clause details the structure and components required
for an effective risk management framework. It includes:
- **Leadership and Commitment**: Emphasizes the role of top management in establishing and
maintaining a risk management framework.
- **Integration**: Highlights the need for integrating risk management into the organization’s
governance, strategic planning, and operational processes.
- **Framework Components**: Includes the roles, responsibilities, and the structure necessary
for effective risk management.
5. **Risk Management Process**: This clause outlines the process for managing risk, including:
- **Risk Identification**: Identifying risks that may affect the organization.
- **Risk Assessment**: Evaluating the identified risks in terms of their likelihood and impact.
- **Risk Treatment**: Developing and implementing strategies to mitigate or manage risks.
- **Monitoring and Review**: Continuously monitoring and reviewing the risk management
process to ensure its effectiveness.
- **Communication and Consultation**: Ensures ongoing communication and consultation with
stakeholders about the risk management process and its outcomes.
Q3 - State the features of Internal Audit. Also narrate the various types of Internal controls.
1. **Independence**: Internal auditors operate independently from the management and other
departments to provide unbiased assessments of internal controls and processes.
2. **Objectivity**: They must remain objective in their evaluations, avoiding conflicts of interest
to ensure their findings and recommendations are based on facts.
4. **Risk-Based Focus**: The audit approach is often risk-based, focusing on areas with the
highest risk to the organization’s objectives and processes.
5. **Reporting**: Internal auditors document their findings and provide detailed reports to
management and the board, highlighting areas of concern and suggesting improvements.
7. **Compliance**: Internal audits help ensure that the organization complies with laws,
regulations, and internal policies and procedures.
2. **Detective Controls**: Aimed at identifying and detecting errors or irregularities that have
already occurred. Examples include:
- **Reconciliation Procedures**: Regularly comparing records to identify discrepancies.
- **Physical Audits**: Conducting inventory counts or asset inspections to detect
discrepancies.
4. **Directive Controls**: Establish policies and procedures to guide employees' actions and
ensure adherence to organizational goals. Examples include:
- **Standard Operating Procedures (SOPs)**: Documented processes that guide employees on
how to perform their tasks consistently.
- **Training Programs**: Providing education and training to employees on compliance and
operational procedures.
Each type of control plays a crucial role in maintaining the integrity and efficiency of an
organization’s operations, helping to mitigate risks and ensure compliance with regulations and
policies.
2. **Authorization and Approval**: Implement controls that require approval for inventory
purchases, adjustments, and disposals. This ensures that all inventory transactions are
authorized by appropriate management levels.
3. **Physical Inventory Counts**: Conduct regular physical counts of inventory and reconcile
them with recorded amounts. This helps detect discrepancies and ensures that records reflect
the actual inventory on hand.
6. **Receiving Procedures**: Establish procedures for verifying and recording inventory upon
receipt. Check that deliveries match purchase orders and inspect goods for damage or
discrepancies before acceptance.
7. **Issue and Usage Controls**: Track inventory issues and usage to ensure that items are used
for their intended purposes. Implement controls to monitor and authorize inventory withdrawals.
9. **Regular Audits**: Perform periodic internal and external audits of inventory management
processes and controls. Audits help identify weaknesses and ensure compliance with internal
policies and external regulations.
10. **Reconciliation and Reporting**: Reconcile inventory records with financial statements
regularly to ensure accuracy. Prepare reports that provide insights into inventory levels, turnover
rates, and potential issues.
By implementing these procedures, organizations can enhance the accuracy of their inventory
records, prevent loss or misappropriation, and ensure effective inventory management.
2. **Risk Assessment**: Involves identifying and evaluating risks that could impact the
organization’s objectives and implementing controls to mitigate those risks. Key aspects include:
- **Risk Identification**: Recognizing potential risks in operations, financial reporting, and
compliance.
- **Risk Analysis**: Assessing the likelihood and impact of identified risks.
3. **Control Activities**: These are specific policies and procedures designed to address risks
and achieve objectives. Examples include:
- **Segregation of Duties**: Dividing responsibilities among different employees to reduce the
risk of error or fraud.
- **Authorization and Approval**: Requiring management approval for significant transactions
and decisions.
- **Physical Controls**: Implementing safeguards such as locked storage and access controls
to protect assets.
7. **Financial Controls**: Specific controls designed to ensure the accuracy and reliability of
financial reporting. These include:
- **Reconciliation Procedures**: Regularly reconciling accounts to ensure accuracy.
- **Expense Controls**: Monitoring and approving expenses to prevent unauthorized
expenditures.
Each internal control scheme plays a vital role in ensuring that an organization operates
efficiently, accurately reports financial information, and complies with applicable regulations and
policies.
1. **System and Application Controls**: Auditors examine controls embedded within computer
systems and applications. This involves evaluating the effectiveness of security features, data
integrity checks, and transaction processing controls to ensure they protect against
unauthorized access and errors.
2. **IT Governance and Management**: The audit assesses the organization’s IT governance
framework and management practices. This includes reviewing policies and procedures related
to IT strategy, risk management, and compliance with regulatory requirements.
3. **Data Integrity and Accuracy**: Auditors verify that data processed and stored by computer
systems is accurate and complete. They assess controls over data input, processing, and output
to ensure the reliability of financial reporting and operational data.
6. **System Development and Maintenance**: The scope includes assessing controls over the
development, implementation, and maintenance of computer systems. Auditors evaluate whether
proper procedures are followed for system changes, testing, and documentation.
The scope of auditing in a computerized environment is broad and involves evaluating both
traditional and technology-specific controls to ensure that systems support accurate, secure,
and efficient operations.