Entity Level Controls Drafts and Formats
Entity Level Controls Drafts and Formats
MAKING IT EASY –
READY-TO-USE DRAFTS
AND FORMATS
| 64 |
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 65 |
ABC Private Limited
ICFR for the year ending 31st March, 2016
| 66 |
Entity Level Controls (ELC)
2. Review Appointment
letter of an employee.
| 67 |
Sr Attribute Principle Process Risk Control Control Description Audit Step
No Activity Ref No.
| 68 |
5 C o n t r o l Holds individual B o a r d Board of Directors does not C02 Directions are given by the Board to Verify minutes of Board
Environment accountable for Oversight set the right tone at the top encourage process-driven conduct, meeting and policies/
the internal to encourage institution of automation and effective monitoring directions issued by the
c o n t r o l controls and systems and across the organization. Board of Directors from time
responsibilities ensure accountability for lapse to time.
of controls
6 C o n t r o l M a n a g e m e n t Delegation of Ambiguity in delegation C01 1. Financial powers in terms Confirm that authorization/
Environment e s t a b l i s h e s Authority of financial powers reduces of signing /effecting banking approvals of Directors
structure, the control over financial transactions is with the Director. is in place, review Board
authority and transactions and increase the resolution to define powers
responsibility risk of financial losses 2. Also, all the major contracts, of Director
in pursuit of agreements, Purchase Orders are
objectives signed/approved by the Directors.
3. All the major decisions are
closely reviewed by the respective
HODs at Group level before approval
by the Director.
7 C o n t r o l Demonstrates Ethics & Flawed performance incentive/ C03, 1. Admin Manual gives a reference 1. Verify Admin Manual
Environment commitment to Integrity compensation policy not in C19 to ethical standards expected from to ensure all updations are
integrity and line with ethical tone and employees. included.
ethical values standards may increase the
risk of compromise / non- 2. Appointment Letter includes 2. Verify Appointment Letter
compliance to ethical standards relevant clauses of employee
of conduct
| ICFR – A Handbook for Private Companies and their Auditors |
Sr Attribute Principle Process Risk Control Control Description Audit Step
No Activity Ref No.
8 C o n t r o l Demonstrates Ethics & If management does not C03 Management takes disciplinary 1. Verify the mechanism for
Environment commitment to Integrity take timely and appropriate action for violations/ non-adherence, recording non-adherences/
integrity and disciplinary action, it would in a timely and appropriate manner. violations.
ethical values encourage non-adherence
to established policies and 2. Verify the evidence of
procedures action being taken.
9 C o n t r o l Demonstrates Ethics & Applicant screening procedures C05, 1. Adequate background verification
Environment commitment to Integrity do not adequately consider C09 is done for employees (Police
integrity and integrity and ethical values Clearance, Experience letter, etc.)
ethical values
2. Majority of office staff is hired
through a placement agency which
is selected by the management to
ensure right person for the right job
3. Declarations are obtained from
employees for non-disclosure and
code of conduct adherence as a part
of joining formalities
10 C o n t r o l Demonstrates Recruitment Lack of adequate talent or C05, 1. A rigorous recruitment and 1. Confirm the no. of exits
Environment commitment to & Selection mismatches in requirements C06, selection process is adopted to and the principal underlying
attract, retain and skill sets may severely C09 ensure selection of right employees reason/s.
and develop impact achievement of for the right job.
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 69 |
Sr Attribute Principle Process Risk Control Control Description Audit Step
No Activity Ref No.
| 70 |
11 C o n t r o l Demonstrates Incentive In absence of a proper work C10, 1. Promotions are based on well- 1. Review the appraisal
Environment commitment to environment the company may C12 defined Performance Evaluation process for appropriateness
attract, retain have to deal with high attrition system. and confirm that there is
and develop levels due process for redressal of
competent 2. Management ensures a very low appraisal related grievances.
individuals attrition rate.
2. Review attrition rate and
related analysis
12 C o n t r o l Board of I n t e r n a l A robust system of monitoring C07, 1. Internal audits are done quarterly 1.Verify Internal audit scope
Environment D i r e c t o r s Audit through periodic internal C15 as per pre-defined scope which is and reports
exercises audits or control Self approved by the management.
oversight of the Assessments has not been 2. Review Board Minutes
development established 2. Board meetings discuss internal
and performance audit reports - key findings.
of internal
controls
13 C o n t r o l Demonstrates Training Inadequate attention to C11 1. Training for regulatory and Verify training process
Environment commitment to training may result into skill process changes is imparted
attract, retain dilution, lack of awareness on a timely basis as per either
and develop about policies and regulatory client’s requirement or regulatory
competent requirements and inability requirement
individuals to discharge assigned
responsibilities. 2. Training is identified and
imparted as needed
14 R i s k Specifies R i s k Absence of enterprise-wide C04 Formal risk management policy is Review the risk management
| ICFR – A Handbook for Private Companies and their Auditors |
Assessment o b j e c t i v e s Management risk assessment and absence of presented to the Board and approved policy adopted by the
with clarity to Framework documented risk management by the Board of Directors. Company
identify and policy
assess the risks
Sr Attribute Principle Process Risk Control Control Description Audit Step
No Activity Ref No.
15 R i s k Identifies Business Absence of BCP/DRP may C22, 1. Business Continuity Plan (BCP) 1. Review the BCP and DRP.
Assessment and analyzes Continuity lead to business interruptions C23 and Disaster Recovery Plan(DRP)
significant Plan, Disaster and may jeopardize business are in place. 2. Review the data recovery
changes that Recovery continuity plan.
could impact Plan 2. Data recovery plan is established
internal controls and operational.
16 R i s k I d e n t i f i e s Financial Regulatory changes impacting C17 1. Regulatory changes are Verify formal assessment of
Assessment and analyzes reporting business, financial conduct understood and assessed for their key regulatory changes.
significant or reporting requirements are impact on business.
changes that not understood, analyzed or
could impact internalized. 2. Compliance tracker is filled in
internal controls at defined frequency and updated
periodically for amendments.
17 R i s k I d e n t i f i e s Financial Improper channels to C24 Periodic departmental reviews are Review modification in
Assessment and analyzes reporting communicate the changes done wherein Finance team is also processes, if any, by the
significant in business practices to the present; review covers discussions accounts team
changes that accounting department may on changes in business practices
could impact affect the method or the affecting financial statements.
internal controls process of recording the
transactions in financial
statements
18 R i s k I d e n t i f i e s Financial Risk of regulatory non- C13, 1.Management specifies financial 1. Verify financial statements
| Section 4 : Making it easy – Ready-to-use drafts and formats |
Assessment and analyzes reporting compliance and financial C15, reporting rules and standards which with adequate disclosures
significant misstatements if suitable C25 are consistent with accounting
changes that accounting principles, policies principles suitable and appropriate 2. Verify statutory auditor’s
could impact or rules not followed for the entity. report
| 71 |
internal controls
Sr Attribute Principle Process Risk Control Control Description Audit Step
No Activity Ref No.
| 72 |
2. Reviews by/consultations with 3. Verify internal audit
the Statutory Auditors as required reports
by the regulation (annual review)
or as considered necessary by the
management, are done.
3. Internal audit coverage extends
to compliance review and financial
reporting review.
19 R i s k I d e n t i f i e s Financial Non identification of changes C13, 1. Defined and documented Review financial statements
Assessment and analyzes reporting in accounting principles C25 Financial Statement Closure Process and all other relevant
significant or financial reporting is in place. information.
changes that requirements may lead to non-
could impact compliance and the financial 2. Periodic updates are received
internal controls statements will not show true from professional consultants.
and fair figures or may not
include disclosures as required.
20 R i s k I d e n t i f i e s Financial Absence of an appropriate C20, 1. Various compliances under Verify Board noting and
Assessment risks to the reporting mechanism of related party C26 different statutes in relation to approval of related party
achievement of transactions identification transactions with related party transactions.
objectives and can lead to regulatory non- (transfer pricing related compliance
analyzes risks to compliance and/ or financial and return filing) are verified.
manage them misstatements
2. Board approval is taken for
related party transaction
| ICFR – A Handbook for Private Companies and their Auditors |
Sr Attribute Principle Process Risk Control Control Description Audit Step
No Activity Ref No.
21 R i s k Assesses fraud IT Security Company infrastructure and C14 1. Access is restricted to users who 1. Review list of user-ids
Assessment risk to the IT systems being used for are either employees or authorized with access rights
achievement of fraudulent activities thereby personnel.
objectives affecting the reputation and 2. Verify protocol for access
increasing the legal risks 2. Password and user id protected to systems and policy
attached systems exist. highlighting security of user
id and passwords
3. Deactivation of external storage
devices on company PC’s has been
done.
4. Access to all public sites and
domains is restricted.
22 R i s k I d e n t i f i e s Training Changes in the procedure C27 Periodic review of process manual is 1. Verify that the manuals
Assessment risks to the manual of a particular done and updates are communicated are periodically reviewed.
achievement of department without the to all employees concerned.
objectives and knowledge of its employees 2. Verify evidence of
analyzes risks to leads to dilution of the impact communication of changes
manage them of the changes implemented to employees.
23 C o n t r o l Selects and Evaluation Risk of recurrence of issues C15 Periodic internal audit is done by an Verify internal audit reports
Activities develops control if not evaluated and policies/ external agency and changes made available, and record of
activities to procedures not modified basis agreed actions. resolution of agreed actions.
mitigate risks accordingly
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 73 |
Sr Attribute Principle Process Risk Control Control Description Audit Step
No Activity Ref No.
| 74 |
24 C o n t r o l Selects and F i n a n c i a l Risk of financial loss and/ C16, 1. Physical verification of fixed 1. Verify fixed asset
Activities develops control reporting or financial misstatement in C20 assets, cash is done. verification report and check
activities to the absence of an established for periodicity (CARO, 2015)
mitigate risks physical verification of assets 2. Third party and bank balance
mechanism confirmations statements are taken. 2. Verify third party
confirmations.
3. Board discusses findings of
physical verification of assets/ 3. Verify records showing
discrepancy resolution full particulars - quantitative
details and situation of fixed
assets (CARO, 2015)
4. Verify Board meeting
minutes
25 C o n t r o l Deploys control Payments Absence of policies will lead C03 All financial policies relating to Verify remuneration
Activities activities and to reimbursement/ allowance employees are in place along with structure for financial
through policies reimburse- of non agreed expenses to the defined level of approvals. policies relating to
and procedures ments employees or reimbursement employees.
of expenses over and above the
set limit to the employees.
26 Information Communicates E x t e r n a l May result in reputational/ C03 1. Clear identification of persons Verify the Admin Manual
& Communi- e x t e r n a l l y C o m m u n i - financial/reporting risk due authorized to communicate with for communicating with
cation r e g a r d i n g cation to erroneous communications external parties on relevant company external parties
matters affecting to external parties/ external matters.
internal controls reporting
| ICFR – A Handbook for Private Companies and their Auditors |
control
3. Board meeting, management
review meeting discuss unusual
events.
| 75 |
Sr Attribute Principle Process Risk Control Control Description Audit Step
No Activity Ref No.
| 76 |
30 Monitoring Evaluates and F i n a n c i a l Inadequate process for C16 1. Third party confirmations Verify confirmations
communicates reporting obtaining third party obtained from banks, debtors, obtained from counter
deficiencies, to confirmations to validate related parties parties and Government
enable corrective financial figures and to detect website (such as Income
actions being financial frauds. 2. Web based review done to assess Tax) for reconciling statutory
taken tax status, TDS status, regulatory figures and other balances.
compliance related numbers.
31 Monitoring C o n d u c t s F i n a n c i a l Absence of review of the C07, Monthly MIS consisting of financial Verify financial statements/
o n g o i n g / reporting financials by management C08 statements and other operations, reports, periodic MIS and
separate reconciliations prepared by Finance reconciliations
evaluations to Manager are reviewed and analyzed
confirm that by Group CFO
internal controls
are functioning
32 Monitoring Evaluates and Grievance Inappropriate grievance C03 Employee grievance policy (to Verify policy to resolve
communicates and dispute processes may lead to delay resolve complaints and grievances) complaints and grievances,
deficiencies, to resolution in detection of frauds, forms part of Admin Manual as stated in Admin Manual
enable corrective mechanism misreporting of financial
actions being figures, need for provisioning
taken due to disputes
33 Monitoring C o n d u c t s Management Process gaps, errors and C03, 1. Internal audit function reports 1. Verify Internal Audit
o n g o i n g / Oversight misstatements may not be C07, to Board of Director and highlights reports
separate identified by the management C15 deficiencies observed.
evaluations to which may also lead to fraud 2. Verify meeting minutes
| ICFR – A Handbook for Private Companies and their Auditors |
Note:
The above work-sheet can be enhanced with columns such as department, details with respect to
controls (whether key or non-key, whether control exists – yes or no, type of control – manual or
automated, nature of control – preventive, detective or both preventive and detective, control frequency
– daily, weekly, fortnightly, monthly, half-yearly, annually, event-based, as and when),document/
evidence, deficiencies, remedial plan, reference to document and remarks
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 77 |
| ICFR – A Handbook for Private Companies and their Auditors |
| 78 |
ABC Private Limited
ICFR for the year ending 31st March, 2016
IT General Controls (ITGC)
Sr. Attribute Activity Description Identification of Risk of Material Misstatement Control Ref Control That Addresses Risk of Material
No. (“What Could Go Wrong”) Number Misstatement — Control Name
Risk Description
1 Risk IT Policy Intended IT related processes not followed due ITGC 01 A defined comprehensive IT policy document
Assessment to absence of defined comprehensive IT policy to provide various guidelines to work in the IT
document environment, is in place
2 Control Access Rights Editable access of Financial System (Accounting ITGC 02 View-only access of Accounting Software provided
Environment Software) provided to persons other than to persons other than Company employees (Internal
Company employees (Internal and Statutory and Statutory Auditors, Consultants, etc.) who are
Auditors, Consultants, etc.) not required to modify the financial transactions
3 Control Closing of Accounting Erroneous/intentional posting of Accounting ITGC 02 Closing of previous period/year to restrict back-
Environment period/year in the entry in the earlier closed period/year dating of transactions
Accounting Software
4 Control Selects and develops Unauthorized access to IT systems, applications ITGC 03 1. For CMS System - all new users are given pre-
Environment general controls over and data results in errors in financial reporting expired password and the system prompts the user
technology to set new password at the time of first login
2. For Tally - all new users are given pre-expired
password and the system prompts the user to set
new password at the time of first login
| Section 4 : Making it easy – Ready-to-use drafts and formats |
5 Control Selects and develops Unauthorized access to IT systems, applications ITGC 02 1. For CMS - Users access rights are granted by
Environment general controls over and data results in errors in financial reporting IT only upon specific approval by the concerned
technology functional head
| 79 |
Sr. Attribute Activity Description Identification of Risk of Material Misstatement Control Ref Control That Addresses Risk of Material
No. (“What Could Go Wrong”) Number Misstatement — Control Name
| 80 |
Risk Description
2. For Tally - Users access rights are granted by
IT only upon specific approval by the concerned
functional head
6 Control Selects and develops Unauthorized access to IT systems, applications ITGC 03 System prompts the user to change the password
Environment general controls over and data results in errors in financial reporting after the expiration of 30 days.
technology
7 Control Selects and develops Unauthorized access to IT systems, applications ITGC 03 Password must contain at least 7 characters,
Environment general controls over and data results in errors in financial reporting alpha numeric (alphabets, numbers and special
technology characters).
8 Control Selects and develops Unauthorized access to IT systems, applications ITGC 03 If the password is wrongly entered continuously
Environment general controls over and data results in errors in financial reporting for 5 times within 30 minutes, the respective login
technology id gets locked.
9 Control Selects and develops Unauthorized access to IT systems, applications ITGC 03 If a user is not accessing the system for more
Environment general controls over and data results in errors in financial reporting than specified time, the system gets automatically
technology locked.
10 Control Identifies and analyses Unauthorized access to IT systems, applications ITGC 10 There exists a periodic review of the user profiles
Environment significant changes that and data results in errors in financial reporting for systems access, to confirm appropriateness.
could impact internal
controls
11 Information & Selects and develops Unauthorized access to IT systems, applications ITGC 03 Requests for creation of new user ids are received
Communication general controls over and data results in errors in financial reporting by the IT Executive on standardized form, duly
| ICFR – A Handbook for Private Companies and their Auditors |
2. Servers:
All servers are installed with anti virus scanner.
| 81 |
Sr. Attribute Activity Description Identification of Risk of Material Misstatement Control Ref Control That Addresses Risk of Material
No. (“What Could Go Wrong”) Number Misstatement — Control Name
| 82 |
Risk Description
3. Gateway:
Mail server is managed and all the Emails are
scanned by threat management gateway.
4. The anti virus gets automatically updated with
the latest version through process of auto updates
16 Control Assesses fraud risk to the Unauthorized access to the IT systems, ITGC 05 1. Firewalls have been installed.
Environment achievement of objectives applications and data by external parties
2. The logs are regularly reviewed by IT Executive
17 Control Selects and develops Unauthorized access to IT systems, applications ITGC 06 Changes in programs can be made only with prior
Environment control activities to and data results in errors in financial reporting approval of the Board of Directors or the HOD
mitigate risks concerned, with the simultaneous involvement and
approval of the IT personnel.
18 Control Selects and develops Significant developments and changes to ITGC 06 Decisions around significant developments and
Environment control activities to information systems relevant to financial changes to information systems relevant to
mitigate risks reporting are made, resulting in errors in financial reporting are made in conjunction with
financial reporting. Finance Manager and after approval of BOD
19 Control Identifies and analyses Errors in changes made to key applications ITGC 06 Specific changes are made to key applications
Environment significant changes that relevant to financial reporting. relevant to financial reporting only after sign off
could impact internal from the relevant stakeholders
controls
20 Control Selects and develops Problems and incidents are not effectively ITGC 09 An in-house IT personnel resolves issues faced by
| ICFR – A Handbook for Private Companies and their Auditors |
Note:
The above work-sheet can be enhanced with columns such as department, details with respect to
controls (whether key or non-key, whether control exists – yes or no, type of control – manual or
automated, nature of control – preventive, detective or both preventive and detective, control frequency –
daily, weekly, fortnightly, monthly, half-yearly, annually, event-based, as and when),document/ evidence,
deficiencies, remedial plan, reference to document and remarks
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 83 |
| ICFR – A Handbook for Private Companies and their Auditors |
1. OBJECTIVES:
This policy is prepared to achieve the following broad
objectives:
• Provide guidance for the financial closure process
leading to preparation of financial statements.
• Ensure adherence to applicable laws, regulations
and disclosure requirements relevant to the financial
reporting.
• Ensure completion of the financial closure efficiently
and in a timely manner.
• Ensure adherence to the approval matrix laid out for
the closure process.
• Retain and protect related documents, evidences and
approval trails.
2. SCOPE:
This policy covers the following:
• Financial reporting framework applicable to the
entity.
• IT application (system), if any, used for financial
closure
• Checklist to be used to ensure completeness of
financial statements
• Approval matrix related to financial closure activities.
• Document Management Policy, including retention
policy for documents related to financial closure.
| 84 |
3. STAGES OF FINANCIAL CLOSURE:
No. Particulars Review Approval/ Suggested Timeline
Responsibility Authorization
1. Financial Reporting Framework Senior Person of CFO or By end December/
A & F Dept e q u i v a l e n t January
3 The financial closure process shall be carried out in adherence to the following position
• The Companies Act, 2013 and allied Rules
• Applicable accounting standards
• Pronouncements of the ICAI applicable to preparation of financial
statements and financial reporting
3 Adequate care shall be taken to incorporate the effects of modifications to
existing regulations and pronouncements.
3 Any new pronouncements impacting the financial accounting, closure
process or reporting requirements will be reviewed internally, approved as
per Authority matrix and incorporated in the appropriate checklist, SOP or
templates.
3 Knowledge update provided by the statutory auditors or other accounting/
law firms from time to time may be reviewed and where appropriate, to be
considered for updating respective checklist.
3 The CFO is required to hold a formal meeting with the statutory auditors to
| Section 4 : Making it easy – Ready-to-use drafts and formats |
confirm that all additional reporting requirements for the financial year have
been duly identified by the company – if there has been a miss out, the same
may be incorporated after review.
| 85 |
No. Particulars Review Approval/ Suggested Timeline
Responsibility Authorization
| 86 |
2. System Environment Senior Person of CFO or By end December/
A & F Dept. e q u i v a l e n t January
3 List all the systems from which data will flow into financial statements either position
directly or indirectly.
3 Proposed changes/ enhancements to the IT applications which have a bearing
on the financial closure process or the financial statements need to be pre-
approved by the Finance Department as per authority matrix.
3 For any changes in the financial reporting requirements, Finance Department
to review if the required information is available from the IT system and if
not, initiate a request for configuring the IT system to ensure the availability
of the requisite information.
3. Pre-planning for Closure & Closure Activity for Operational Areas As per As per For Pre-planning
Checklist Checklist by end December/
Activity wise pre-planning checklist to be prepared as per Company’s defined January and For
SOPs, Policies and Business Requirements. A specimen general format indicating Closure at year end
illustrative checkpoints and processes is presented in Annexure – I. date and subsequent
month
4. Process for Preparation of Financial Statements As per As per As per defined
Checklist Checklist timeline by the
A specimen general format indicating illustrative checkpoints and processes is management for
presented in Annexure – II. finalizing audited
Financials
5. Process for Disclosure requirements As per As per As per defined
| ICFR – A Handbook for Private Companies and their Auditors |
| 87 |
statement.
| ICFR – A Handbook for Private Companies and their Auditors |
Annexure – I
ABC Pvt. Ltd.
Sample and Specimen Checklist for Activity wise
Pre-planning & Closure
| 88 |
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 89 |
| ICFR – A Handbook for Private Companies and their Auditors |
| 90 |
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 91 |
| ICFR – A Handbook for Private Companies and their Auditors |
| 92 |
| Section 4 : Making it easy – Ready-to-use drafts and formats |
Annexure – II
ABC Pvt. Ltd.
Sample and Specimen Checklist for
Preparation of Financial Statements
| 93 |
| ICFR – A Handbook for Private Companies and their Auditors |
| 94 |
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 95 |
| ICFR – A Handbook for Private Companies and their Auditors |
| 96 |
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 97 |
| ICFR – A Handbook for Private Companies and their Auditors |
Annexure – III
ABC Pvt. Ltd.
Sample and Specimen Checklist for
Disclosure & Notes to Accounts
| 98 |
| Section 4 : Making it easy – Ready-to-use drafts and formats |
| 99 |