Financial Controllership
Financial Controllership
Financial Controllership
CONTROLLERSHIP
MICHAEL ANGELO S. DE LEON
Certified Public Accountant
Financial Controllership
Financial Controllership is a
management function that supervises
the accounting and financial reporting
of an organization. It is responsible in
the implementation and monitoring of
internal controls.
Page 2
The following process is used for assessing risks: identifying risks, sourcing
risks and measuring risks. Overall, you should focus on the high risks
affecting your operations.
Identifying
Risks
Page 3
Sourcing
Sourcing
Business
Risks Risks
Prioritizing
Risks
Risk Considerations
Considerations
Evaluate the nature and types of errors and omissions that could occur, i.e.,
what can go wrong
Consider significant risks (errors and omissions) that are common in the
industry or have been experienced in prior years
In summary, internal controls can help our company get where it wants to go,
and avoid pitfalls and surprises along the way.
Page 6
MYTHS:
FACTS:
Control Focus
Redefining the control focus
The new approach to controlling business risks may be characterized by the new
rules of prevent and monitor and build in quality as opposed to the old rules
of detect and correct and inspect in quality. This means a paradigm shift in the
traditional viewpoint of control as illustrated in the following table:
Old Paradigm
Page 8
New Paradigm
Monitoring:
Monthly reviews of performance
reports
Internal audit function
MONITORING
INFORMATION AND
COMMUNICATION
Control Activities:
Purchasing limits
Approvals
Security
Reconciliations
Specific policies
CONTROL ACTIVITIES
RISK ASSESSMENT
CONTROL ENVIRONMENT
Control
Environment:
Tone from the top
Corporate Policies
Organizational
authority
Page 9
Information &
Communication:
Vision and values survey
Issue resolution calls
Reporting
Corporate communications
(e-mail, meetings)
Risk Assessment:
Monthly Risk Control
meetings
Internal audit risk
assessment
Control Environment
The control environment sets the tone of an organization, influencing the control
consciousness of its people. It is the foundation for all other components of internal
control, providing discipline and structure. Control environment factors include the
integrity, ethical values and competence of the entity's people; management's philosophy
and operating style; the way management assigns authority and responsibility
andorganizes and develops its people; and the attention and direction provided by the
board of directors.
Risk Assessment
Every entity faces a variety of risks from external and internal sources that must be
assessed. A precondition to risk assessment is establishment of objectives, linked at
different levels and internally consistent. Risk assessment is the identification and analysis
of relevant risks to achievement of the objectives, forming a basis for determining how the
risks should be managed. Because economic, industry, regulatory and operating conditions
will continue to change, mechanisms are needed to identify and deal with the special risks
associated with change.
Control Activities
Control activities are the policies and procedures that help ensure management directives
Pageare
10carried out. They help ensure that necessary actions are taken to address risks to
achievement of the entity's objectives. Control activities occur throughout the
Monitoring
Internal control systems need to be monitored -- a process that assesses the quality of
the system's performance over time. This is accomplished through ongoing
monitoring activities, separate evaluations or a combination of the two. Ongoing
monitoring occurs in the course of operations. It includes regular management and
supervisory activities, and other actions personnel take in performing their duties.
The scope and frequency of separate evaluations will depend primarily on an
assessment of risks and the effectiveness of ongoing monitoring procedures. Internal
control deficiencies should be reported upstream, with serious matters reported to top
management and the board.
Page 11
Control Techniques
Prevention techniques are designed to provide reasonable assurance that only
valid transactions are recognized, approved and submitted for processing.
Therefore, many of the preventive techniques are applied before the processing
activity occurs. In most situations, preventive techniques are likely to be more
effective in a strong control environment, when management authorization
criteria are well-defined and properly communicated.
Control type definitions:
Preventive - Manual
Preventive - System
Examples of preventive controls include:
Segregation of duties
Business systems integrity and continuity controls, e.g., application design
standards, change controls, security controls, systems backup and recovery
Physical safeguard and access restriction controls (human, financial, physical
and information assets)
Effective planning/budgeting process
Effective "whistle blowing" processes
Page 12
Control Techniques
Detection techniques are designed to provide reasonable assurance that errors and
irregularities are discovered and corrected on a timely basis. Detection techniques
normally are performed after processing has been completed. They are particularly
important in an environment that has relatively weak preventive techniques. That is,
when front-end approval and processing techniques do not provide reasonable
assurance that unacceptable transactions are prevented from being processed or do
not assure that all approved transactions are processed accurately. In this case, afterthe-fact techniques become more important in detecting and correcting processing
errors.
Page 14
Cash activities
Cash receipts
The receipt of cash should be centralized and customers
should obtain a receipt at the conclusion of each sale.
Cash receipts should be deposited to the bank intact
on a daily basis.
Cash disbursements
All cash disbursements should be made by check and
petty cash fund system should be maintained for
minimal operating expenses.
Page 15
Page 16
Inventories
Reconciling inventory to general ledger
Implement an inventory system that tracks all
information so that returns, damaged items, sales,
and purchases would each be accounted for and
currently recorded.
Inventory count
Document the procedures for performing its physical
inventory counts. These instructions should include
specific tasks to be performed by personnel.
(e.g. completion of tags and control sheets)
Page 18
Inventories
Valuation of inventory
Establish a capitalization policy on all inventoriable
items and determine their unit cost, monitor sales
activity and profitability and then analyze slowmoving or obsolete items.
Disposal of obsolete items
Establish a policy on the disposal of obsolete items since
storage cost are still being incurred if these are
maintained
Page 19
Page 20
Page 21
Page 23
Pams parable
After graduating from high school, Pam got a job
at a car
wash station in the parking lot at a small mall.
After two
weeks of sitting alone in her small booth it
occurred to
Pam that no one was watching her. Since she was
a little
short of money she took $10. The next day she
took $20.
Several weeks went by and Pam continued to filch
small
amounts of money.
Then one day the firm's part-time accountant
showed up
at the booth unannounced. By counting her cash,
the
Page 24
accountant quickly found Pam had stolen more
Payment twice
How often do you overpay a supplier or pay an invoice twice?
Office Supplies Pty. Ltd is a fast growing new business. The
owner Bob signs all cheques and keeps a tight reign on all
parts of the business. He believes nothing could get past him!
Anita is the accounts payable person, receptionist and office
manager all rolled into one. There are also several sales staff,
but they are usually on the road doing the deals.
One week a number of suppliers started ringing up wanting
their money as their accounts were overdue and Bob told Anita
to stall them, as there wasn't enough cash in the bank.
After another week went by and three important suppliers
were getting insistent so Anita tried to get their invoices
processed and give them to Bob to sign. But she could not find
them anywhere. So she asked them to fax in another copy.
They faxed in statements of outstanding.
Page 25
Payment twice
Bob finally agreed to sign them as some cash had arrived in the
bank account. Then at the end of the following week Bob turned
up with a file of invoices that he had been sitting on. Anita madly
processed then to get them out by the end of the month.
Anita ended up double paying the suppliers. The amounts didn't
match because the statements were larger than the invoice
accounts so a simple check on similar amounts didn't match up.
Did the suppliers return the difference?
And if they did, did reliable Anita bank the cheques into the
business's bank amount or did she get them endorsed over to her
account?
And what would stop Anita adding in another invoice?
Page 26
Payment twice
She could take a copy of an invoice for a small amount of money
and send it through the system twice and pocket the refund when
sent back from the supplier. Anita has an inordinate amount of
responsibility in the business. She is under great pressure to
handle all her duties and consequently is not as thorough as she
might think she is or would like to be.
Page 27