CH 03
CH 03
Instructors Manual
Introduction To The Need For A Code Of Ethics And Internal Controls. If the top
management of a company emphasizes ethical behavior, models ethical behavior,
and hires ethical employees, the chance of fraud or ethical lapses can be reduced.
In addition to acting ethically, the management of any organization has an obligation
to maintain a set of processes and procedures that assure accurate and complete
records and protection of assets. Management has a stewardship responsibility,
which is the careful and responsible oversight and use of the assets entrusted to
management. The stewardship and reporting obligations point to need to maintain
accurate and complete accounting systems and to protect assets. To fulfill these
obligations, management must maintain internal controls and enforce a code of
ethics.
Accounting Related Fraud. Fraud is the theft, concealment and conversion to
personal gain of another's money, physical assets, or information. There is a
distinction between misappropriation of assets and misstatement of financial
records. Misappropriation of assets involves theft of any item of value.
Misstatement of financial records involves the falsification of accounting reports. For
fraud to occur, three conditions must exist: incentive to commit the fraud, opportunity
to commit the fraud, and rationalization of the fraudulent action. This is called the
fraud triangle. Understanding the nature of fraud helps accounts create effective
systems to prevent or detect fraud.
o Categories Of Accounting Fraud. The four categories of fraud are
management fraud, employee fraud, customer fraud, and vendor fraud.
o The Nature Of Management Fraud. It is conducted by one or more top-level
managers within the company, and it usually is misstating financial
statements through elaborate schemes or complex transactions. The
incentive for managers can include to increase incentive pay, or stock price,
opportunities for promotion, or the delay of cash flow or bankruptcy problems.
Some fraud involves circumventing internal controls, or management
override.
o The Nature Of Employee Fraud. It is usually the theft of assets, or the theft
of cash through false or fraudulent documentation. An example would be a
false or inflated time card. Cash receipts theft is the most common type of
employee fraud. It is often pulled off through a technique known as
skimming, where the organizations cash is stolen before it is entered into
the accounting records. Larceny is stealing the companys cash after it has
been recorded in the accounting records. Collusion means that two or more
people work together to commit a fraud. Collusion is the most difficult to
prevent or detect because it compromises the effectiveness of internal
controls
o The Nature Of Customer Fraud. Customer fraud occurs when a customer
improperly obtains cash or property from a company, or avoids a liability
1
Monitoring is the ongoing review and evaluation of the system. This includes
both continuous and periodic monitoring of the accounting system and
controls. Continuous review of reports and information by managers and
periodic audits are part of monitoring.
o Reasonable Assurance Of Internal Controls. The whole set of internal
control must be established and monitored with the idea of reasonable
assurance in mind. Reasonable assurance means that the controls achieve a
sensible balance of reducing risk when compared to the cost of the control.
Maintain A System Of Information Technology Of Controls. Information
technology increases the efficiency and effectiveness of organizations that use them,
but at the same time, it increases vulnerability. The risks include unauthorized
access, hackers, business interruption, and data inaccuracies. These extra risks of
computer systems call attention to the need for internal controls over and above
those described in the COSO report. One way to organize these risks and controls
is the Trust Services Principles. These principles divide IT risks and controls into
five categories: security; availability, processing integrity; online privacy; and
confidentiality.
Security risk is the unauthorized physical or logical access to the IT system.
Availability risk is the risk of hardware or software failure. Processing integrity risk is
the risk of inaccurate, incomplete, or improperly authorized information entering the
IT system. Online privacy risk is that personal information about customers will be
accessed in an unauthorized manner. Confidentiality risk is the risk that sensitive
information about the company or its business partners may be subject to
unauthorized access. IT controls can be designed and implemented to limit risks in
each of these five categories.
Appendix A: Recent History Of Internal Control Standards. The 1977 Foreign
Corrupt Practices Act (FCPA) included a requirement that corporations that sell stock
in an SEC regulated stock exchange maintain a system of internal controls. In 1988
the AICPA issued SAS 55 which further emphasized managements obligation to
maintain internal controls. In 1992, the COSO report was issued by the Committee
of Sponsoring Organizations (COSO). This report details the findings of a
comprehensive study of internal control and is recognized within the accounting
industry as the definition and description of internal control. Since that time, the
AICPA has rewritten SAS guidelines to incorporate COSO concepts. SAS 55 was
replaced by SAS 78 in 1994, and in 2002 SAS 78 was amended by SAS 94. This
current internal control guide in SAS 94 maintains the COSO internal control
concepts. In addition, SAS 99 expands the auditors duties with regard to internal
control and fraud. The Sarbanes-Oxley Act of 2002 attempted to curb the fraud and
stock market abuses of the previous two years. Section 302 of this bill designates
management (specifically, the chief executive officer, chief financial officer and
others performing similar functions) of the company as having responsibility for the
establishment and maintenance of an effective system of internal controls. Section
404 of the Sarbanes-Oxley Act requires companies to include an internal control
report within its annual report to stockholders. Thus, not only is the establishment