Day 7
Day 7
Controls
ACC 100
Learning Objectives
1. Understanding internal control structure.
2. Understanding internal control objectives.
3. Understanding control activities.
1
To measure compliance
To promote efficiency in with management’s
the firm’s operations. prescribed policies and
procedures.
Summary of Comments on ACC 100 - Day 7 - Internal
Control.pdf
Page: 3
Number: 1 Author: Presenter Notes Subject: Presentation Notes Date: 1/13/2025 12:09:48 PM
The management is responsible for establishing and maintaining the internal control system.
1
Deterrent Controls
1. These are administrative mechanisms
that are used to guide security within an
organization and discourage potential
intruders.
2. They are intended to complement other
controls, such as preventative and
detective controls.
Page: 13
Number: 1 Author: Presenter Notes Subject: Presentation Notes Date: 1/13/2025 12:09:49 PM
Examples of deterrent controls include: Signage, Fencing, Visible security cameras, "Under surveillance" signs, and Warning signs.
1
Recovery Controls
1. These are a way to restore a system to
normal operations after an incident
2. They can be used to respond to a
security breach, rather than prevent it.
Page: 14
Number: 1 Author: Presenter Notes Subject: Presentation Notes Date: 1/13/2025 12:09:49 PM
Here are some examples of recovery controls:
Backups
System restoration
Rebooting
Key escrow
Insurance
Redundant equipment
Fault-tolerant systems
Failovers
Contingency plans (BCP)
1
Compensating
Controls
1. These are a security measures that are
implemented when it is too difficult or
impractical to implement the primary
control.
2. These are also known as alternative
controls.
3. These are usually less desirable than
primary controls because they are often
implemented after a transaction is
complete.
Page: 15
Number: 1 Author: Presenter Notes Subject: Presentation Notes Date: 1/13/2025 12:09:49 PM
Some examples of compensating controls include:
Management review
Independent reconciliations
Dual authorizations
Automation of financial processes
Forced vacations
Cross training
Positive payment system
Components of Internal Control
Application system
acquisition,
Access security
development and
maintenance
Application
Controls
• Application controls operate at a business process
level (higher level controls or process level controls).
• Designed to ensure the integrity of information.
• Application controls may be automated controls or
manual controls with an automated component.
• Application controls help ensure that transactions
occurred, are authorized, and/or are completely and
accurately recorded and processed.
• Application controls do not only reside in IT
applications.
• Automated components of application controls may
also be programmed into databases and other
operating system components to consistently apply
predefined business rules and perform complex
calculations directly related to the input, processing,
preservation of integrity, and output of information
Application
Controls
1
Physical Controls
• Transaction Authorization
• Segregation of Duties
• Supervision
• Accounting Records
• Access Control
• Independent Verification
Page: 29
Number: 1 Author: Presenter Notes Subject: Presentation Notes Date: 1/13/2025 12:09:51 PM
Transaction authorization – the purpose of transaction authorization is to ensure that all material transactions processed by the
information system are valid and in accordance with management’s objectives.
General authorization (everyday procedures)
Specific authorization (non-routine transactions)
Segregation of duties – the most important control activities is the segregation of duties to minimize incompatible functions.
In manual system, separation between (1) authorizing and processing a transaction; (2) custody and recordkeeping of the asset; (3)
subtasks.
In computerized system, separation between (1) program coding; (2) program processing; (3) program maintenance.
Supervision – often called a compensating control. A compensation for lack of SOD; some may be built into computer systems.
Accounting records – provides an audit trail.
Access control – the purpose of access controls is to ensure that only authorized personnel have access to the firm’s assets.
Independent verification – verification procedures are independent checks of the accounting system to identify errors and
misrepresentations. Verification differs from supervision because it takes place after the fact, by an individual who is not directly
involved with the transaction or task being verified.
What
questions do
you have?