Chapter 5 Internal Control
Chapter 5 Internal Control
Ch # 5: Internal Control
Internal control may be defined as the process designed, put in place and maintained to provide assurance
of a reasonable level regarding the achievement of the objectives of an entity. These objectives relate to the
reliability of the financial reports, the efficiency and effectiveness of operations and adherence to relevant
and applicable laws and regulations.
The degree of effectiveness of an internal control system will depend on following two factors:
▪ The design of the internal control system and the individual internal controls.
(Existence of Controls)
▪ The proper implementation of the controls.
(Operating effectiveness of controls)
▪ If auditor concludes that the system of controls is weak, and that the controls cannot be relied on, he
will have to carry out extensive substantive procedures.
▪ If the auditor judges that internal controls are strong
- He would perform tests of controls (in order to verify his opinion about them); and
- Perform some substantive procedures on the transactions and balances in the F/S.
Management letter
▪ It is common practice for the external auditor to prepare a ‘management letter’ for client.
▪ This is sometimes also known as letter of weakness.
▪ A management letter is a report typically presented in columnar fashion detailing:
- Weaknesses observed in the client’s system of internal controls.
- Possible effect of that weakness
- Recommendations / Suggestions for client to improve control
- Management’s response on that issue
There are 5 elements which together make up the internal control system.
1) The control environment
2) The information system
3) The entity’s risk assessment process
4) Control activities (internal controls)
5) Monitoring of controls
Auditor should then confirm that his understanding is correct by performing ‘walk-through’ tests on
each major transaction type (e..g. revenue, purchases and payroll).
Walk-through testing involves the auditor selecting a small sample of transactions and following them
through the various stages in their processing in order to establish whether his understanding of the
process is correct.
The control environment includes the views, awareness and actions of management regarding an entity’s
internal control (general ‘attitude’ to internal control).
A strong control environment is typically one where management shows a high level of commitment to
establishing and operating appropriate controls. Without a strong control environment, the control
system as a whole is likely to be weak.
Management should identify, assess and manage business risks, on a continual basis.
▪ Identifying means recognising the existence of risks or potential risks.
▪ Assessing means deciding whether the risks are significant, and possibly ranking risks
▪ Managing means developing and implementing controls to deal with those risks.
Business risks are events or omissions that may prevent entity from achieving its objectives. Risks can
arise or change due to circumstances such as:
▪ Changes in the entity’s operating environment
▪ New personnel
▪ New or revamped information systems
▪ Rapid growth
▪ New technology
▪ New business models, products or activities
▪ Corporate restructurings
▪ Expanded foreign operations
▪ New accounting pronouncements.
4) Control activities
These are the specific policies and procedures, other than the control environment, designed to prevent
errors, or to detect and correct errors that may arise in processing information.
Description Examples
Preventive Controls ▪ Segregation of Duties
Designed to stop errors or ▪ Security guards
Tutor’s irregularities from occurring. ▪ Proper authorization of transactions
Note ▪ Using passwords.
Detective Controls ▪ Bank reconciliation
Designed to find errors or ▪ Exception Reports
irregularities after they have (to identify unexpected results that require follow-up)
occurred. ▪ Camera
▪ System logs
▪ Periodic audit (internal as well as external)
Corrective ▪ Contingency planning
Restore the system or process back ▪ System backup
to the state prior to harmful event ▪ Service level agreements with reliable software
Or companies, for technical support
To prevent errors & irregularities ▪ Policies of reporting irregularities to correct those
from reoccurring once discovered ▪ Positive discipline to prevent employees from
making future errors.
Performance ▪ Reviews and analyses of actual performance versus budgets, forecasts, and prior
reviews period performance
▪ It include supervision by management of the work of subordinates, management
review of performance and control reporting
Physical ▪ Physical security of assets and records to prevent unauthorised use, theft or damage
controls
5. Internal Control Page 43
5) Monitoring of controls
Management should review and monitor the operation of the controls, on a systematic basis, to confirm
that the controls remain adequate and that they are being applied properly.
General IT controls
▪ General IT controls are policies and procedures that relate to many different applications
▪ They support the effective functioning of application controls
▪ If general IT controls are weak, it is unlikely that the processing undertaken by the system will be
complete and accurate.
▪ Auditor will firstly review and test the general IT controls to check their effectiveness.
(to assess the control risk attached to the entity’s IT systems as a whole).
Application controls
▪ Application controls apply to processing of individual applications (e.g. revenue, purchases or payroll).
▪ These controls could be manual or computerized
System logs
A log file is a file that records events taking place in the execution of a system. This generates an audit trail
that can be used to understand the activity of system and to diagnose problems.
Specific IT controls
Control Example
Control totals If an accountant is entering data for 100 admission forms of CA
Checking total against total value for all students in a college. Control total for 100 forms can be
the transactions input. calculated (e.g. with calculator). When 100 forms have been
entered, accounting software may output its own total. This
can be checked against control total taken manually, to make
sure that they agree.
Range Check If student of auditing class are assigned roll numbers from
The value of an item of data might have 2100–2240. System would generate error report if ay roll
to be within a particular range number other than above range is entered
Existence Check If a roll number (e.g. 2911) is entered by the accountant which
Program checks actual existence of a does not exists in the database of students, system would
particular code generate an error report.
Completeness Check A filed should always contain a data rather than blank
Check Digit Suppose all roll numbers in a college are up to 4 digits. The
These are checks within computer system would initially add a 5th digit as a check digit to all roll
program on the validity of key numbers (i.e. code).
numerical codes. Suppose that a student’s roll number is 3467. The check digit is
Every code is given an extra digit. This calculated as follows (in the Modulus 11 system).
is a unique digit obtained from the
Code digit Weighting
other digits in the code.
3 ×5 15 The 5 digit
4 ×4 16 student code
6 ×3 18 is therefore
7 ×2 14 3467-3
63
Check digit × 1 3
(would be 66 Divisible by
3) 11
When the accountant would enter the roll number, system
would automatically multiply 1st digit by 5, 2nd by 4, 3rd by 3, 4th
by 2 and 5th by 1. After adding all totals system would divide
this by 11; If the total is fully divisible by 11, there would be no
error otherwise there must be an error in the input of code.
5. Internal Control Page 45
The principal methods available to the auditor for recording internal control systems are:
▪ Narrative notes
▪ Systems flowcharts
▪ Questionnaires
Narrative notes
▪ Written description of the control system and the controls that are in place.
▪ Used mainly to make a record of the control activities involved in processing transactions.
▪ Simple to prepare, but can become lengthy
▪ May be time-consuming to prepare initially and afterwards updating may also take time
▪ Ideally, narrative notes should be written clearly, but should not be longer than necessary.
Questionnaires
▪ ICQ is designed to establish whether appropriate controls exist, that meet specific control
objectives.
▪ Each question deals with a particular control and requires a ‘Yes’ or a ‘No’ answer
▪ ICQs are usually drawn up in such a way that a:
- ‘Yes’ answer to a question indicates a control strength, and
- ‘No’ answer to a question indicates a control weakness.
▪ Auditor can also review the Yes/No answers to gain an overall picture of the reliability of the
system under review.
▪ A questionnaire is relatively simple for the auditor to complete.
▪ However sometimes questionnaire can become lengthy and hence time consuming
Checking ICQs
Instead preparing new ICQ each year, auditor can take ICQs from previous year’s audit, check their
accuracy and where appropriate bring them up to date. Auditor should:
▪ Look at any control weaknesses that were indicated in those ICQs
▪ Find out whether the client has taken any action during the year to deal with them.
▪ Check the accuracy of each ICQ through a series of checks and enquiries
(e.g. review system documentation, interview staff responsible for controls and carry out walk-
through tests)
▪ Make any amendments and updates as necessary.
5. Internal Control Page 46
Idea behind ICEQ is to draw up a small number of key control questions designed to establish
whether major weaknesses may exist in a control system:
▪ Using ICQ, Auditor is looking for ‘good news’ and expects to find particular controls.
▪ Using ICEQ, auditor is looking for ‘bad news’ and possibility that controls may be weak
Like an ICQ, an ICEQ contains a shorter list of questions, for which the answer is Yes or No.
ICEQ approach typically produces a shorter document than an ICQ but it may suffer from the
disadvantage that the questions are less precise and may need more knowledge and experience on the
part of the auditor to answer them.
Choosing which type of questionnaire to use is a matter of preference for the auditor.
Systems flowcharts
▪ Many control activities may be inappropriate for because they are too costly or impractical.
(e.g. it is difficult to segregate duties in a small company with only a few employees)
▪ There is unlikely to be a written code of conduct so a culture of integrity and ethical behaviour of
management will be important.
Following problems may arise when control systems rely excessively on the involvement of senior
management.
▪ There may be a lack of evidence as to how systems are supposed to operate.
▪ There may be lack of evidence of controls.
▪ Management may override other controls that are in place.
▪ Management may lack the expertise necessary to control the entity effectively.
▪ There is unlikely to be any independent person within the management team as there would be within
“those charged with governance” in a large entity.
It is likely that a lower level of reliance will be placed on controls in a smaller entity, and that a large
amount of substantive testing will therefore be required.