Chapter-3 Group3 Handouts
Chapter-3 Group3 Handouts
CODE OF ETHICS AND INTERNAL CONTROL ❖ Management fraud, conducted by one or more top‐level
managers within the company, is usually in the form of fraudulent
STEWARDSHIP - is the careful and responsible oversight and use financial reporting. Oftentimes, the chief executive officer (CEO) or
of the assets entrusted to management. This requires that management chief financial officer (CFO) conducts fraud by misstating the
maintain systems which allow it to demonstrate that it has financial statements through elaborate schemes or complex
appropriately used these funds and assets. transactions.
Software Piracy - the unlawful copying of software programs. MAINTENANCE OF A CODE OFETHICS
INTERNAL SOURCES OF INTERNAL FRAUD Establishing and maintaining a culture where ethical conduct is
❖ When an employee of an organization attempts to recognized, valued, and exemplified by all employees. This includes:
conduct fraud through the misuse of a computer‐ based • Obeying applicable laws and regulations that govern
system, it is called internal computer fraud. business.
• Conducting business in a manner that is honest, fair, and
Internal computer fraud concerns each of the following activities: trustworthy.
1. Input manipulation - usually involves altering data that is input • Avoiding all conflicts of interest
into the computer. • Creating and maintaining a safe work environment
2. Program manipulation - occurs when a program is • Protecting the environment
altered in some fashion to commit a fraud.
3. Output manipulation - if a person alters the system’s checks
MAINTENANCE OF ACCOUNTING INTERNAL
or reports.
CONTROLS
EXAMPLES OF PROGRAM MANIPULATION
Attempting to prevent or detect fraud is only one of the
reasons that an organization maintains a system of internal
1. Salami Technique - to alter a program to slice a small controls.
amount from several accounts and then credit those small
amounts to the perpetrator’s benefit. The objectives of an internal control system are as follows:
2. Trojan Horse Program - is a small, unauthorized • Safeguard assets (from fraud or errors).
program within a larger, legitimate program, used to • Maintain the accuracy and integrity of the
manipulate the computer system to conduct a fraud. accounting data.
3. Trap Door Alteration - is a valid programming tool that is • Promote operational efficiency.
misused to commit fraud. As programmers write software • Ensure compliance with management directives.
applications, they may allow for unusual or unique ways to
enter the program to test small portions, or modules, of the
CONTROL ENVIRONMENT sets the tone of an organization
system.
and influences the control consciousness of its employees.
EXTERNAL SOURCES OF COMPUTER FRAUD
RISK ASSESSMENT considers existing threats and the potential
❖ External computer frauds are conducted by
for additional risks and
someone outside the company who has gained
stands ready to respond should these events occur.
unauthorized access to the computer.
Page | 2
CONTROL ACTIVITIES policies and procedures that help extensive framework of information technology controls, entitled
ensure that management directives are carried out and that COBIT, for Control Objectives for Information Technology
management objectives are achieved.
Trust Service Principles.10 This guidance addresses risks and
The control activities include a range of actions that should opportunities of information technology, and the most recent
be deployed through the company’s policies and procedures. version became effective in 2006. The Trust Services Principles
These activities can be divided into the following categories: set forth guidance for CPAs who provide assurance services for
1. Authorization of transactions organizations.
2. Segregation of duties
3. Adequate records and documents Risk and controls in IT are divided into five categories in
4. Security of assets and documents the Trust Services
5. Independent checks and reconciliations Principles, as follows:
1. security
AUTHORIZATION refers to an approval, or endorsement, from a 2. availability
responsible person or department in the organization that has been 3. processing integrity
sanctioned by top management. 4. online privacy
5. confidentiality
When management delegates authority and develops guide- lines as to
the use of that authority, it must assure that the authorization is
separated from other duties. This separation of related duties is called THE SARBANES–OXLEY ACT OF 2002
SEGREGATION OF DUTIES. The Sarbanes–Oxley Act was signed into law on July 30, 2002, for
the purpose of
improving financial reporting and reinforcing the importance of corporate
ethics.
SEGREGATION OF DUTIES.
• AUTHORIZATION SECTION 404—MANAGEMENT ASSESSMENT OF
• RECORDING INTERNAL CONTROLS
• CUSTODY An internal control report is required to accompany each
financial statement filing. The internal control report must establish
management’s responsibility for the company’s internal controls
and related financial reporting systems.