PowerPoint Presentation
PowerPoint Presentation
PowerPoint Presentation
com
DPA40123
CHAPTER 3
INTERNAL CONTROL SYSTEM
Learning 01 Explain the fundamental
Outcomes concept
Control Environment
01
Risk Assessment 02
05 Information &
Communication
03 04 Monitoring
Control Activities.
• Infographic
ComponentStyle 1 - Control Environment
➢ Set of standards, process,
procedures and structures. 4. Management philosophy and
➢ Overall attitude and actions operating style
of the management.
6. Company structure
2. Commitment to competence
The basis for determining how the risks will be managed - achievement of
objectives
Segregation
of duties
Information
processing
controls
Component 4 - Information & Communication
Identify and record all
valid transactions
✓ To provide clear understanding
of the individual roles and
responsibilities. Financial reporting Record on timely basis
purposes –
✓ Internally : communicates accounting system
objectives and responsibilities Proper recording of
monetary value
✓ Externally : communicates
matters affecting the Record transactions in the
functioning of other proper accounting period
components of internal control.
Assess the quality of internal Ongoing evaluations to Assess the design and
control performance over ascertain whether the operation of controls
time components of internal control
are present and functioning
Copies of
Internal control
companies
questionnaire
manuals
Requirement by Regulators
Malaysian Code of MCCG 2017:
Bursa Malaysia, Corporate • The role of internal
Chapter 15 – Listing Governance (MCCG) audit function in
Requirements : 2012 – Principle 6 assisting the
• Additional Recognize and company to meet its
statements by BOD Manage Risks : objective
to be included in • BOD should • Improve the
annual report – the establish a sound effectiveness of risk
state of risk framework to management,
management and manage risks and internal control and
internal control internal control governance
system
Massive damage
Data losses
Cyber Threat
to Internal Internet Disruption of operations
Leaked information
Control
Eg :
Computer malware –
spread over 150 countries
- Taking over user files
- NHS (UK), FedEx (US),
gas co (Spain)
Strengths & Weaknesses
Strengths Weaknesses
1. Segregation of functions 1. Human judgement
2. Authorization 2. Failure to understand or take action
3. Input controls 3. Inappropriate management override
of controls
4. Processing controls 4. Collusion by two or more people
5. Management judgement
6. Cost benefit consideration
Communicating with the governance
Deficiency in design Deficiency in operation
✓ Exists when a control necessary to ✓ Exists when a control does not
meet the control objective is operate as designed
missing
✓ Existing control is not properly ✓ The person performing the control
designed does not posses the necessary
authority or competence
❖ Deficiency has to be communicated to those charged with the governance – management,
BOD
❖ Takes place after completion of audit
❖ Management letter – acknowledge the management of their responsibilities for design and
implementation of internal control
❖ Disclosure of any fraud or suspected fraud
❖ Significant effect of fraud on the financial statements