CIA Part 1 Revision Kit 1676353169
CIA Part 1 Revision Kit 1676353169
The Core Principles for the Professional Practice of Internal Auditing are:
(1) Demonstrates integrity,
(2) Demonstrates competence and due professional care,
(3) Objective and free from undue influence (independent),
(4) Aligns with the strategies, objectives, and risks of the organization,
(5) Appropriately positioned and adequately resourced,
(6) Demonstrates quality and continuous improvement,
(7) Communicates effectively,
(8) Provides risk-based assurance,
(9) Insightful, proactive, and future-focused,
(10) Promotes organizational improvement.
Short Form to Memorize:
1- Integrity
2- Competency & Due Professional Care.
3- Independent and Objective.
4- Strategies, Objectives and Risks.
5- Positioned and Resourced.
6- Quality & Continuous Improvement.
7- Communicated.
8- Risk-Based Assurance.
9- Insightful, proactive, and Future-Focused.
10- Promote Improvement.
The IIA Glossary defines consulting services as “advisory and related client service activities that
are intended to add value and improve an organization’s governance, risk management, and control
processes without the internal auditor assuming management responsibility.”
Generally, two parties are participants in consulting services:
(1) the internal auditor (the advisor) and (2) the engagement client (the advisee)
Three parties are involved in an assurance engagement. They are the Process Owner (the party
directly involved with the process or system), the Internal Auditor (the assessor), and The User of The
Assessment. For an assurance service, the internal audit activity determines the nature and scope of the
engagement and objectively assesses the evidence gathered.
The nature and scope of an assurance engagement are determined by the Internal Auditor.
However, the nature and scope of the consulting engagement are subject to agreement with the
engagement client.
The mandatory guidance portion of the IPPF consists of the Core Principles:
1. Definition of Internal Auditing
2. The Code of Ethics
3. Attribute Standards
4. Performance Standards
5. Implementation Standards. (Provides requirements applicable to assurance engagements)
Implementation Standards expand upon the Attribute and Performance Standards. They provide
requirements applicable to assurance or consulting engagements.
• Attribute Standards describe the characteristics of organizations and parties providing internal
auditing services.
• Performance Standards describe the nature of internal auditing and provide quality criteria for
evaluation of internal audit performance.
• Implementation Standards apply to specific types of engagements.
Assurance services involve the internal auditor’s objective assessment of evidence to provide
opinions or conclusions regarding an entity, operation, function, process, system, or other subject
matter.
Example of Assurance Services: The board is in the due diligence phase of a new company
acquisition. The CFO has asked for the internal auditor’s opinion of the new company’s debt
structure.
- Training would be considered a consulting service.
- Engagement to review and recommend improvements is a consulting service.
- Facilitation services are consulting engagements in which the “auditor guides management in
identifying organizational strengths and opportunities for improvement.
Objectivity It is the responsibility of management to eliminate risk management processes that are
inadequate and ineffective. It is the responsibility of the internal auditor to evaluate whether risk
management processes are effective. The internal audit function is effective if all core principles are
present and operating effectively.
Subunit 2: Codes of Ethical Conduct for Professionals
• Performance of professional duties in accordance with relevant laws (Observe law) (Integrity)
• Establishment of trust (Integrity)
• Respect and contribute to the legitimate and ethical objectives of the organization. (Integrity)
• Perform their work with honesty, diligence, and responsibility (Integrity)
• Disclose all revenues and sales taxes collected to the state’s taxation department. (Integrity)
• Shall not knowingly be a party to any illegal activity, or engage in acts that are discreditable to the
profession of internal auditing or to the organization (Integrity)
The code of ethical conduct for financial managers or management accountants in an organization
should require Objectivity in presenting information, preparing reports, and making analyses (Not
subjectivity)
The primary purpose of a code of ethical behavior for a professional organization is to promote an
ethical culture among professionals who serve others.
• Establishes general value system the organization wishes to apply to its members’ activities.
• Communicates organizational acceptable values and beliefs.
• Establishes uniform ethical guidelines for members.
• Establishes high standards against which individuals can measure their own performance.
• Communicates to those outside the organization the value system from which its members must
not be asked to deviate.
• Provides a method of policing and disciplining members for violations.
Provisions for disciplinary action in the event of violations (Penalties) would enhance the
effectiveness of the code of conducts in case some employees still not welling to adhere to it.
“The code of ethics of a professional organization sets forth Broad Standards of Conduct For The
Members Of The Organization”
The IIA’s Code of Ethics extends beyond the definition of internal auditing to include two
essential components:
(1) Principles for the profession and practice of internal auditing.
(2) Conduct that describe behavior norms expected of internal auditors (Introduction).
Rule of Conduct 1.1 under the integrity principle states “Internal auditors shall perform their work with
honesty, diligence, and responsibility.”
If internal Auditor hide information about illegal act or polluting environment, it is considered violation of
the Code of Ethics under integrity principle by knowingly becoming a party to an illegal act, NOT
by failing to protect the well-being of the general public as he does not impose a duty to the general
public.
CASE of violation of Code of Ethics principle of integrity:
The internal audit manager is required to file work performance reports every morning. The manager
continually comes in late and leaves work early. One of the manager’s direct reports stays late every night
to complete the performance reports on behalf of the manager.
The internal audit manager is not taking responsibility for the position or respecting the employee who is
having to carry the workload. The manager has violated the principle of integrity.
The following concurrent occupations could appear to subvert تدمرthe ethical behavior of an
internal auditor:
Rule of Conduct 2.1 under the objectivity principle states, “Internal auditors shall not participate in any
activity or relationship that may impair or be presumed to impair their unbiased assessment. This
participation includes those activities or relationships that may be in conflict with the interests of the
organization.”
Under Rule of Conduct 2.2, “Internal auditors shall not accept anything that may impair or be presumed
to impair their professional judgment.”
As a business insurance broker, the internal auditor may lose his or her objectivity because (s)he might
benefit from a change in the employer’s insurance coverage.
Rule of Conduct 2.3 under the objectivity principle states, “Internal auditors shall disclose all material
facts known to them that, if not disclosed, may distort the reporting of activities under review.”
The internal auditors are expected to not be unduly influenced by their own interests in forming
judgments.
Internal auditors must make conclusions based on facts without being influenced by feeling, emotions,
relationships, bribes, or any other outside influence.
The following activities will most likely adversely affect internal auditors’ ethical behavior:
Accepting compensation from professional organizations for consulting work does NOT adversely
affect internal auditor’s ethical behavior because Professional organizations are unlikely to be
employees, clients, customers, suppliers, or business associates of the organization. Thus, the consulting
fees are not likely to impair or be presumed to impair the internal auditors’ professional judgment (Rule of
Conduct 2.2). Moreover, relationships with professional organizations are not likely to create a conflict of
interest or impair or be presumed to impair internal auditors’ unbiased judgment (Rule of Conduct 2.1).
Also, the consulting engagement should not result in the improper use of information (Rule of Conduct
3.2).
The (CAE) became aware of a material misstatement of the year-end accounts receivable balance. The
external auditors have completed their engagement without detecting the misstatement. The CAE
should Inform the external auditors of the misstatement.
“the CAE should share information and coordinate activities with the external auditors (Perf. Std. 2050).”
The internal auditor should inform the appropriate authorities in the organization if the indicators of
the commission of a fraud are sufficient to recommend an investigation. Thus, the internal auditor
has a duty to act even though the available facts do not prove that an irregularity has occurred.
Turning a case over to the security department is acceptable if the internal auditor is careful not to
state any final conclusions that are not supported by factual information.
Having a material ownership interest in a competitor is more likely to cause a conflict for a director
or officer than an internal auditor (Not violating Code of Ethics). An internal auditor would seldom be
able during the course of his or her employment to take action that would enhance the value of the
ownership interest.
Inform the employee that you will attempt to keep the source of the information confidential and
will look into the matter further is allowed and ethical behavior by the internal auditor. Promising
merely to attempt to keep the source of the information confidential is allowable. This promise is not a
guarantee of confidentiality.
(Assure the employee that you can maintain her anonymity and listen to the information is NOT
ethical).
An example of conflict of interest is if the internal auditor used confidential information to seize a
business opportunity that rightfully belonged to the organization.
Rule of Conduct 3.1 under the confidentiality principle states, “Internal auditors shall be prudent in the
use and protection of information acquired in the course of their duties.” Rule of Conduct 3.2 states,
“Internal auditors shall not use information for any personal gain or in any manner that would be
contrary يخالفto the law or detrimental to the legitimate مشروعةand ethical objectives of the
organization.”
Discussion of sensitive matters with an unauthorized party is the situation most likely to be
considered a Code violation. (The CAE discusses the detail of the observations and the proposed
recommendations of a sensitive area with a fellow CAE from another organization is considered a
violation of code of ethics and standards).
Rule of Conduct 3.2 under the confidentiality principle states, “Internal auditors shall not use information
for any personal gain or in any manner that would be contrary to the law or detrimental to the legitimate
and ethical objectives of the organization.”
Deleting sensitive information from a final engagement communication at the request of senior
management is not considered a violation of ethics, if senior management permits the omission, the
internal auditor is not guilty of failing to disclose material facts.
The principle of confidentiality permits the disclosure of the company’s information when given
the appropriate authority and does not violate the principle of confidentiality such as a loan officer
requesting the financial statement for the last 2 years.
Rule of Conduct 4.2 under the competency principle states, “Internal auditors shall perform internal
audit services in accordance with the International Standards for the Professional Practice of
Internal Auditing.”
The Code of ethics does not specifically mention compliance with organizational policy.
The Standards. Attr. Std. 1200 requires engagements to be performed with proficiency and due
professional care. They also should be properly supervised to ensure that objectives are achieved,
quality is assured, and staff is developed (Perf. Std. 2340). Which means it is OK that not all audit
staff to be proficient in all audit areas, however they will need a proper supervision.
Rule of Conduct 4.3 under the competency principle states, “Internal auditors shall continually improve
their proficiency and the effectiveness and quality of their services. (not engaged in continuing
professional education or other activities to improve effectiveness during the last 3 years is considered a
violation of proficiency principle.)
Internal auditors must identify sufficient, reliable, relevant, and useful information to achieve
engagement’s objectives (Perf. Std. 2310).
Rule of Conduct 4.1 under the competency principle states, “Internal auditors shall engage only in
those services for which they have the necessary knowledge, skills, and experience.” Internal
auditors may not have, and are not expected to have, knowledge equivalent to that of a person whose
primary responsibility is to detect and investigate fraud (Impl. Std. 1210.A2).
The Internal Auditing Activity shall continually improve their proficiency and the effectiveness and quality
of their services. The deferral of completing continued education, even though approved by the
board, violates The IIA’s Code of Ethics Rule of Conduct for competency.
The purpose, authority, and responsibility of the internal audit activity must be formally defined in an
internal audit charter.
One reason for staff meetings is to explain routine administrative matters, to teach new techniques,
and even to let off steam. For example, staff members should be able to raise questions about
ineffective procedures, promotions, salaries, or other problems.
The charter establishes the internal audit activity’s position within the organization, including the
nature of the chief audit executive’s functional reporting relationship with the board; authorizes
access to records, personnel, and physical properties relevant to the performance of engagements;
and defines the scope of internal audit activities (Inter. Std. 1000). Thus, the charter prescribes the
internal audit activity’s relationships with other units within the organization and with those outside.
The length of tenure فترهof the chief audit executive should NOT be included in the internal audit
charter.
The nature of consulting services MUST be defined in the internal audit charter (Impl. Std. 1000.C1).
Authorization of the board to approve the charter is NOT required to be mentioned in the Internal
Audit Charter. The board has this power inherently.
Engagement clients do NOT authorize the internal auditor’s activity but must be informed of the
internal auditor’s authority. The internal audit charter authorizes access to records, personnel, and
physical properties relevant to the performance of engagements. Final approval of the internal audit
charter resides with the board.
The core values, mission, and vision statements of the organization are NOT included in the internal
audit charter.
Unit 2: Independence, Objectivity, Proficiency, Care, and Quality
Subunit 1: Independence of the Internal Audit Activity
Independence is “the freedom from conditions that threaten the ability of the internal audit activity to
carry out internal audit responsibilities in an unbiased manner” (The IIA Glossary).
Organizational independence is effectively achieved when the CAE reports functionally to the board.
Examples of functional reporting to the board involve the board
• Receiving communications from the CAE on the internal audit activity’s performance
• Making appropriate inquiries of management and the CAE to determine whether there are
inappropriate scope or resource limitations.
The organizational status most conducive to this degree of independence is a dual-reporting relationship.
Objectivity is an individual attribute of each internal auditor. Objectivity requires that internal auditors do
not subordinate their judgment on audit matters to others.
The organizational level to which the internal audit activity reports must be sufficient to permit the
accomplishment of the activity’s responsibilities.
A formal document (charter) approved by the board that defines the internal audit activity’s purpose,
authority, and responsibility enhances its independence.
The CEO’s statement suggests that the internal audit activity lacks the support of senior management
and the board. Furthermore, the lack of outside audit committee members may contribute to a loss
of independence. The board’s failure to approve the charter may have the same effect.
The charter enhances the independence of the internal audit activity. By specifying the purpose, authority,
and responsibility of the internal audit activity, it establishes the position of internal audit in the
organization, including the nature of the chief audit executive’s functional reporting relationship with the
board
At times, an internal auditor may be asked by the engagement client or other parties to explain why
a document that has been requested is relevant to an engagement. Disclosure or nondisclosure during
the engagement of the reasons of documents are needed should be determined based on the
circumstances. Significant irregularities may dictate a less open environment than would normally
contribute to a cooperative engagement. However, that is a judgment that should be made by the chief
audit executive in light of the specific circumstances. Moreover, the internal audit activity must be
free from interference in determining the scope of internal auditing, performing work, and communicating
results
If the engagement client asked for the reasons to request specific documentation, The internal auditor’s
proper response is to Consider the specific circumstances before deciding whether to disclose the reasons
for the information request.
The CAE must establish policies and procedures to assess the objectivity of individual internal auditors.
Management has requested the internal audit activity to perform an engagement to recommend
procedures and policies for improving management control, the CAE should accept the
engagement. Recommending standards of control for systems or reviewing procedures prior to
implementation does not create a conflict of interest and impair objectivity.
The CAE is required to Assess the objectivity of internal auditors, but the CAE and internal auditors
themselves is required to Maintain their objectivity.
Conflict of Interest:
• Conflict of interest is a situation in which an internal auditor, who is in a position of trust, has a
competing professional or personal interest. Such competing interests can make it difficult to
fulfill his or her duties impartially.
• A conflict of interest can create an appearance of impropriety that can undermine confidence in
the internal auditor, the internal audit activity, and the profession.
• A conflict of interest could impair an individual’s ability to perform his or her duties and
responsibilities objectively.”
Subunit 3: Impairment to Independence and Objectivity
Any scope limitation faces the internal auditor, along with its potential effect, needs to be communicated
to the board at first.
Internal auditors may provide consulting services relating to operations for which they had previous
responsibilities
Objectivity is presumed to be impaired if an internal auditor provides assurance services for an activity for
which the internal auditor had responsibility within the previous year.
An appropriate internal auditing role in a feasibility study is to Ascertain if the feasibility study addresses
cost-benefit relationships. (Assessing the adequacy of a feasibility study is properly within the scope of
work of internal audit).
An internal auditor most likely will have a conflict of interest by providing an assurance service with regard
to a Purchasing activity if a major supplier is owned by the internal auditor’s sister-in-law (Relative).
Internal auditors are not to accept fees, gifts, or entertainment from an employee, client, customer,
supplier, or business associate that may create the appearance that the auditor’s objectivity has been
impaired. The status of engagements is not to be considered as justification for receiving fees, gifts, or
entertainment. Internal auditors are to report immediately the offer of all material fees or gifts to
their supervisors.
The chief audit executive may be asked to take on additional roles and responsibilities outside of internal
auditing, such as responsibility for compliance or risk management activities. These roles and
responsibilities may impair, or appear to impair, the organizational independence of the internal audit
activity or the individual objectivity of the internal auditor.
Safeguards are those oversight activities, often undertaken by the board, to address these potential
impairments, and may include such activities as periodically evaluating reporting lines and
responsibilities and developing alternative processes to obtain assurance related to the areas of
additional responsibility. The potential impairments exist because the chief audit executive is expected
to take responsibilities that fall outside of internal auditing. Accordingly, increasing the budget for the
internal audit activity CAN NOT (Least Likely) provide the necessary safeguards.
To Safeguard the Internal Audit in such situation, the following are possible actions:
• The board evaluates roles and responsibilities undertaken by the CAE and the controls in place to
address risks related to the undertaking.
• Outsourcing to an independent assurance services provider oversight of the performance of the new
duties by the CAE.
• The CAE discusses the potential impairments with the board and seeks approval to report functionally
to the board.
Designing, installing, or drafting procedures for information systems impairs the objectivity of
internal auditors. Such services may create a conflict of interest, a situation in which internal auditors
have a competing professional or personal interest. This may create an appearance of impropriety
that undermines confidence in the internal audit activity.
Continuation on an engagement at a division for which he will soon be responsible as the result of a
promotion is most likely impair the objectivity of the internal auditor.
The preparation of the engagement work program offers significant opportunities for bias;
therefore, it can not be done by an internal auditor who used to work for the client engagement, he should
suggest that the engagement be performed by another member of the internal audit staff.
The CAE may assume responsibilities in risk management, provided that safeguards are in place
to address the risks of impairments to independence or objectivity.
Organizational independence is effectively achieved when the CAE reports functionally to the board (Inter.
Attr. Std. 1110). Failing to report fully about the reason for corrective action may imply bias (a loss
of objectivity) with regard to the audit client.
Persons transferred to, or temporarily engaged by, the internal audit activity should NOT be assigned to
audit activities they previously performed until at least 1 year has elapsed. Such assignments are
presumed to impair objectivity.
Objectivity is presumed to be impaired if the internal audit activity designs, installs, or drafts
procedures or systems for which they also evaluate. Accordingly, the internal audit activity’s
responsibilities should NOT include designing and implementing controls.
The CAE’s objectivity could be impaired by the bonus, if the annual bonus is based on monetary
amounts recovered or recommended future savings as a result of engagements.
Which of the following is most likely to address ) (من المرجح أن يعالجthe risks of potential impairments of
independence or objectivity when the chief audit executive (CAE) undertakes major responsibilities in the
compliance department? Address the issue: يعالجto treat
(2) Available technology-based audit techniques to perform their assigned work. But not all internal
auditors are expected to have the expertise of an internal auditor whose primary responsibility is
information technology auditing.
• The ability to conduct training sessions in specific areas is NOT among the required
competencies.
• the success of an internal auditor will depend, in part, on the auditor’s ability to organize and express
thoughts well.
• The internal audit activity collectively must possess or obtain the knowledge, skills, and other
competencies needed to perform its responsibilities, it includes consideration of current
activities, trends, and emerging issues as a basis for relevant advice and recommendations.
• The auditors in this situation do not have such expertise. Thus, planning and executing the audit
engagement without the appropriate background and skills is a violation of this standard.
• Determining the hours needed to complete the engagement is NOT necessary during the
selection of the audit team. This question should be answered during the budgeting phase of
planning for the engagement.
However, oversight of and responsibility for the internal audit activity must NOT be outsourced.
Conducting periodic skills assessments to make sure each member of the internal audit activity is
qualified in all disciplines is not appropriate way to ensure that internal audit activity is able to fulfil its
responsibilities (The internal audit as a whole, not each auditor individually, must be proficient in all
necessary competencies)
An external service provider associated with the engagement client is unacceptable because the
person would not be independent or objective.
In a large organization, outsourcing would have advantage because of Structure. It may more easily
accommodate engagement requirements in distant locations.
Use of external service providers with expertise in healthcare benefits is appropriate when the internal
audit activity is:
• Is appropriate when comparing healthcare costs with those of other programs and training staff to
conduct healthcare audits.
• Is appropriate when comparing healthcare costs with those of other programs and evaluating the
estimated liability for postretirement benefits.
• Is appropriate when comparing the cost of the organization’s healthcare program with other
programs offered in the industry.
Requiring certain professional certifications could limit the range of services offered by the internal
audit activity. Each member of the internal audit activity need not be qualified in all disciplines. The
internal audit activity should have an appropriate balance of experience, training, and skills to permit
the performance of a wide range of services.
The main purpose of conducting staff performance appraisals at the end of any major internal audit
engagement is to Assess future training needs and current staff abilities.
The least useful application in having a reasonable assurance that the internal auditors are qualified in
doing their work is to determining that all applicants have an accounting degree, the internal audit activity
collectively must possess or obtain the knowledge, skills, and other competencies needed to
perform its responsibilities. however, NOT all auditors need to be qualified in all disciplines.
During a consulting engagement, an internal auditor should exercise due professional care by
considering which of the following?
Due professional care implies reasonable care and competence, not infallibility or extraordinary
performance. Thus, due professional care requires the internal auditor to conduct examinations and
verifications to a reasonable extent.
Accordingly, internal auditors cannot give absolute assurance that noncompliance or irregularities do not
exist. Nevertheless, the possibility of material irregularities or noncompliance needs to be
considered whenever the internal auditor undertakes an internal auditing assignment. Thus,
considering the possibility of nonconformance or material irregularities at all times during an
engagement is the only way of demonstrating that due professional care has been taken in an
internal audit assignment.
Perform assurance procedures with due professional care so that all significant risks are identified is
wrong statement, because even when performed with due professional care, do NOT guarantee that
ALL significant risks will be identified.
Practicing and nonpracticing CIAs must complete 40 hours and 20 hours, respectively, of CPE
annually, including at least 2 hours of ethics training.
Internal auditors who fail to maintain their proficiency through continuing education could be found to be
in violation of Both the International Standards for the Professional Practice of Internal Auditing and The
IIA’s Code of Ethics.
Due professional care implies reasonable care and competence, not infallibility or extraordinary
performance. It requires the internal auditor to conduct examinations and verifications to a reasonable
extent. (The conduct of extensive examinations is NOT required).
Engagement effort may be required for a quantitatively immaterial item if adverse effects are likely
to occur, for example, a material contingent liability arising from an illegal payment that is otherwise
immaterial.
An exhaustive review of petty cash is not an efficient and effective use of limited internal audit
resources because it will not prevent or detect significant fraud. The amount of any theft of petty cash
will not be substantial.
An engagement communication should never be viewed as providing an infallible truth about a subject.
Accordingly, internal auditors cannot give absolute assurance that noncompliance or irregularities do not
exist.
• Prior approval by The IIA is NOT necessary for CPE courses.
• Attendance, as an officer or committee member, at formal IIA meetings meets the criteria of CPE.
• Practicing certified internal auditors are required to obtain 40 hours of CPE annually.
• CIAs have formal requirements that must be met in order to continue as CIAs.
The Internal Audit Competency Framework consists of ten core competencies, listed below:
(Technical Expertise)
Internal auditors are competent regarding business acumen when they maintain expertise related to
(1) the business environment, (2) industry practices, and (3) specific organizational factors.
The most appropriate preventive measure for staff communication problems with engagement clients
is to provide staff with sufficient training to enhance communication skills.
Subunit 7: Quality Assurance and Improvement Program (QAIP)
Feedback, Feedforward
The following are designed to provide feedback on the effectiveness of an internal audit activity:
1. Proper Supervision
2. Internal reviews (Ongoing reviews).
3. External reviews (External Assessment).
The (CAE) must develop and maintain a quality assurance and improvement program that covers
all aspects of the internal audit activity.
Oversight of the work of external auditors, including coordination with the internal audit activity,
is the responsibility of the Board.
It is NOT within the scope of the process for monitoring and assessing the QAIP.
Appraising each internal auditor’s work at least annually is a function of the human resources
program of the internal audit activity NOT an element of QAIP.
Internal assessments consist of ongoing monitoring and periodic self-assessments, which evaluate
the internal audit activity’s:
External assessments provide an opportunity for an independent assessment team to identify areas
for improvement for the internal audit activity.
Deming Cycle (Plan, Do, Check, and Act.)
Plan, Do, Check, and Act are the four key steps of the Deming Cycle that operate in an interactive
manner. The Deming Cycle can be used to establish an organization’s quality assurance and
improvement program (QAIP) in a planned and methodological manner.
(1) Plan, establish standards and expectations for operating a process to meet goals.
(2) Do, execute the process and collect data for further analysis in the latter steps.
(3) Check, compare actual results with expected results and analyze the difference.
(4) Act, provide feedback by identifying and implementing improvements to the process.
The CAE should examine departmental procedures and the conduct of the specific engagement
mentioned to ascertain that proper planning and quality assurance procedures are in place and are
being followed.
The CAE is responsible for ensuring that the internal audit activity conducts an external assessment at
least once every five years.
Subunit 8: Internal and External Assessments
The broad scope of coverage of the external assessment of internal audit activity is include the
following:
The external assessment should consist of a broad scope of coverage that includes:
(1) Conformance with the Definition of Internal Auditing, Standards, Code of Ethics and the
charter, plans, policies, procedures, practices, and applicable legislative and regulatory
requirements.
(2) Expectations of the IAA expressed by the board, executive management and operational
managers
(3) Integration of the IAA into the organization’s governance process, including the relationships
between the key groups involved in the process.
(4) Tools and techniques employed by the IAA
(5) The mix of knowledge, experience, and disciplines within the staff, including staff focus on
process improvement.
(6) If the IAA adds value and improves the organization’s operations.
A detailed cost-benefit analysis of the IAA would NOT be part of the external assessment.
External assessments provide an independent and objective evaluation of the internal audit activity’s
compliance with the Standards and Code of Ethics.
The processes and tools used in Ongoing Internal Assessments include, among other things,
measures of project budgets, timekeeping systems, and audit plan completion. These may help to
determine whether the appropriate amount of time was spent on all parts of the engagement.
The following will be examined by the internal assessment team to evaluate the quality of engagement
planning and documentation for individual engagements:
• Measures of project budgets.
• Audit plan completion.
• Timekeeping systems.
Those conducting internal assessments generally should report to the CAE while performing the reviews
and communicate directly to the CAE.
External assessments of an internal audit activity contain an expressed opinion or conclusion on overall
conformance with the Standards and possibly an assessment for each standard or series of
standards. An external assessment also includes, as appropriate, recommendations (corrective action
plans) for improvement.
The external assessment report typically includes an assessment for each standard and an overall
assessment for each standard series (attribute and performance). These assessments are in addition
to the overall conformance results. A rating scale may be used to show the degree of conformance.
The CAE must communicate the results of the quality assurance and improvement program the
assessor’s conclusion in the disclosure to Senior Management and The Board.
The following would be appropriate outcomes of a quality assurance and improvement program in an
internal audit activity:
1. Modification of resources.
2. Corrections to procedures.
3. Changes in processes.
4. Implementation of new technology.
The CAE also may consider:
(1) Adding the recommendations and action plans to the internal audit activity’s existing
monitoring of progress related to internal audit engagement findings.
(2) Reporting on resolutions (Recommendations to address areas that were not in conformance
with the Standards).
(3) Verification that recommendations identified during the external assessment have been
implemented is communicated to the board either:
(a) As part of the internal audit activity’s monitoring of progress.
OR
(b) By following up separately through the next QAIP internal assessment.
(4) The CAE may provide action plans to address recommendations from the external assessment.
The results of External Assessment OR Periodic Internal Assessments are communicated upon
completion of such assessments.
Initial use of the conformance phrase requires the completion of an External Assessment within the
past 5 years.
Internal auditors may include in their audit report that their activities conform with The IIA Standards only
if it is supported by the results of the quality program (QAIP Program).
1- An internal audit activity has a charter, policies, and processes, and their execution and results
conform with the Standards. (generally conforms).
2- Deficiencies in practice are judged to deviate from the Standards. But they do not preclude
the internal audit activity from performing its responsibilities. (partially conforms).
CAE recommend that the results of an external quality assessment be shared with the board to
provide accountability and transparency for the IAA’s operations.
* * *
Governance | Subunit 1: Governance Principles
2) Oversight is the governance component with which internal auditing is most concerned. It is also the
component to which risk management and control activities are most likely to be applied.
The internal audit activity periodically assesses the elements of the Ethical Climate of the
organization and its effectiveness in achieving legal and ethical compliance. Internal auditors
therefore evaluate the effectiveness of code of conduct and related Statements and Policies.
Thus, in an assurance engagement, the internal audit activity must evaluate the design,
implementation, and effectiveness of the organization’s ethics-related objectives, programs, and
activities.
Ethical Culture, bylaws, corporate charter and board of directors and internal audit function are
examples of Internal Corporate Governance, and laws, regulations, and the government regulators
who enforce them are examples of external governance.
The role of the internal audit activity depends on the Maturity of the Governance System.
- In a LESS mature system, the internal audit activity emphasizes compliance with policies,
procedures, laws, etc. and the Basic Risks to the organization. (Providing advice about
basic risks to the organization)
- In a MORE mature governance system, the internal audit activity’s emphasis is on optimizing
structure and practices (Consulting role). (Evaluating the effectiveness of specific
governance processes)
A less mature governance system will emphasize the requirements for compliance with policies,
procedures, plans, laws, regulations, and contracts. It will also address the basic risks to the
organization. Thus, the internal audit activity will provide advice about such matters. As the
governance process becomes more structured, the internal audit activity’s emphasis will shift to
optimizing the governance structure and practices maybe by playing a consulting role in optimizing
them.
Internal auditors impair their objectivity by designing processes. However, evaluating the design and
effectiveness of specific processes is a typical internal audit role.
What is Culture?
• According to the COSO Enterprise Risk Management framework, culture consists of the attitudes,
behaviors, and understanding about risk, both positive and negative that influence the
decisions of management and personnel and reflect the mission, vision, and core values of the
organization.
“A reflection of the organization’s mission and vision and consists of the attitudes, behaviors, and
understanding about risk”.
The board of directors has oversight responsibilities over risks and controls.
The board of directors is responsible for the following:
• Selecting and removing officers
• Making decisions about capital structure
• Adding, amending, or repealing bylaws
• Initiating fundamental changes
• Declaring and distributing dividends
• Setting management compensation
• Coordinating audit activities
• Evaluating and managing risks
(The board may be the head of the organization)
However, shareholders can elect or remove directors at the annual meeting.
The board of director’s primary responsibility regarding internal control is to identify stakeholders
and the outcomes that are unacceptable.
(The board acts on behalf of the entity’s stakeholders. Typically, the board discusses yearly
performance and expected outcomes at an annual shareholders’ meeting)
Internal auditors (NOT Senior Management) are responsible for the following:
• Evaluating the adequacy and effectiveness of controls.
• Review the reliability and integrity of financial and operational information.
Organizational performance is measured by achieving objectives. The IIA Glossary defines governance
as the combination of processes and structures implemented by the board to inform, direct,
manage, and monitor the activities of the organization toward the achievement of its objectives.
Thus, ensuring effective organizational performance management and accountability is most
directly the proper function of governance.
“Governance (not control) is directly responsible for ensuring effective organizational performance
management and accountability”
The Chief Ethics Officer should NOT Proposes and Implements any processes or procedures for the
organization such as design or implement a new whistleblower program for the organization, because
the Implementation is a management function and therefore it is considered conflict of the
independence of the internal audit activity.
Recommending or evaluating a new whistleblower program does not conflict with the independence
attribute of the internal audit activity.
Recommend or evaluate but not implement of any new process or procedure does not conflict
with independency of IAA.
Stakeholders are persons or entities who are affected by the activities of the entity. Among others,
these include (1) shareholders, (2) employees, (3) suppliers, (4) customers, (5) neighbors of the
entity’s facilities, and (6) government regulators.
The audit plan should include higher-risk governance processes. It should define:
(1) The nature of the work
(2) The governance processes
(3) The nature of the assessments, e.g., consideration of specific risks, processes, or activities.
The internal auditor should consider the following in assessing the Governance:
• Audits of specific processes.
• Governance issues arising from audits not focused on governance.
• The results of other assurance providers’ work.
• Other information such as adverse incidents indicating an opportunity to improve governance.
The design and implementation of governance processes are the responsibility of the board and
management.
The Chief Audit Executive (CAE) is likely to use Consultants to Assess Governance when the
organization’s process is:
(1) Not mature, or
(2) Control issues are known.
The CAE may use consultant to assess governance if the Governance is NOT matured OR Control
issues are known.
Governance has a range of definitions depending on the circumstances. The CAE should work with
the board and senior management, as appropriate, to determine how governance should be defined
for internal audit purposes.
Governance models generally treat governance as a process or a system that is NOT static. The
approach in the Standards emphasizes the board and its governance activities.
Governance does NOT exist as distinct processes and control structures but instead as
relationships with risk management and control.
ISO 14000 is merely a set of criteria for certification of an environmental management system. It
states no requirements and has no enforcement process.
CSR can be profitable. Serving the community involves certain costs; however, the benefits of CSR may
exceed the costs. Examples of the benefits are:
1- Positive public perception on a local, national, and international level
2- Retention of workers.
3- Charity as a form of advertising (brand building).
4- Deductibility of charitable donations.
Four responsibilities that an organization must fulfill to be called Socially Responsible:
(1) Economic responsibility
(2) Legal responsibility
(3) Ethical responsibility
(4) Philanthropic responsibility.
Compliance with an ISO 14000 criterion is not one of the four responsibilities to be called socially
responsible.
The Global Reporting Initiative (GRI) has developed a sustainability-reporting framework that
provides specific guidance on measuring CSR performance against predefined criteria.
CSR controls are actions taken to manage CSR risks. Thus, an organization considers CSR risks
before projects are approved and communicates and integrates CSR principles and controls into
the business decision-making processes.
“Integrating CSR principles and controls into the decision-making process is the CSR business
activity which an organization would consider CSR risks before projects are approved”
CSR elements:
1- Governance:
Tests relating to the governance element most likely concern the board and reporting
information to stakeholders.
2- Ethics:
It includes determining whether the organization reflects an anti-corruption culture, for
example, in the organization’s risk assessment, code of conduct, or policies.
3- Environment:
It is concern about social and environmental issues (e.g., social and environmental impact
assessments).
4- Working conditions and Human Rights:
It is concern about fair pay and hiring practices, among others.
5- Transparency:
It is most likely concern about protecting personal information of our clients and customers.
6- Health, Safety and Security:
The Company consider everything done and reporting any issues.
The internal audit activity should assist the organization by identifying and evaluating significant
exposures to risk and contributing to the improvement of risk management and control systems.
The internal audit activity must evaluate risk exposures and evaluates the adequacy and
effectiveness of controls related to governance, operations, and information systems regarding the
safeguarding of assets (Impl. Std. 2120.A1). For example, internal auditors evaluate risk exposure
arising from theft, fire, improper or illegal activities, and exposure to the elements.
The internal auditor should evaluate the adequacy of controls over the safeguarding of assets from
all of the following:
- Improper employee usage (Not Under-usage of facilities)
- Misappropriation schemes.
- Exposure to the elements.
- Theft.
- Fire.
- Improper or illegal activities.
Senior management and the board determine the role of internal auditing in the risk management
process.
Their view on internal auditing’s role is likely to be determined by factors such as:
- The culture of the organization.
- Ability of the internal audit staff.
- Local conditions and customs.
Internal auditors need to obtain sufficient and appropriate evidence to determine that key objectives
of the risk management processes are being met to form an opinion on the adequacy of risk
management processes.
The following are roles of Senior Management (Not the Internal Auditor):
The Documents which demonstrate the internal audit activity’s roles regarding risk management are
the following:
Assessing Significant risks and Ongoing monitoring activities by the internal audit activity is part
of the risk management process, but review of previous risk evaluation reports by management, internal
auditors, external auditors, and any other sources is an audit procedure, to obtain evidence for an
assessment.
Overseeing the establishment, administration, and assessment of the organization’s system of risk
management processes is the role of senior management, not the CAE.
In situations where the organization does NOT have Formal Risk Management Processes, the CAE
should formally discuss with management and the board their obligations to understand, manage, and
monitor risks within the organization and the need to satisfy themselves that there are processes operating
within the organization. Even if informal, that’s provide the appropriate level of visibility into the key
risks and how they are being managed and monitored.
The key input in the evaluation of risk is informed judgment of the internal auditors.
The following processes or tools can be used as ongoing internal assessments of the performance
of the internal audit activity:
1. Analyses of audit plan completion and cost recoveries.
2. Selective peer reviews of work papers by staff involved in the respective audits.
3. Feedback from audit customers and stakeholders.
Validation by a qualified independent reviewer is NOT a process of ongoing internal Assessement.
Risk Modeling in a consulting service is done by ranking the engagement’s potential to:
(1) Improve management of risks
(2) Add value
(3) Improve the organization’s operations
Determining risk management processes are effective is a judgment resulting from the internal
auditor’s assessment that:
(1) Organizational objectives support and align with the organization’s mission;
(2) Significant risks are identified and assessed;
(3) Appropriate risk responses are aligning with the organization’s risk appetite.
(4) Relevant risk information is captured and communicated in a timely manner
The internal audit activity have a consulting role in identifying, evaluating, and implementing risk
management methods and controls.
Done by Senior Management: After all risks that could impact the achievement of organizational
objectives have been identified, the next step is to rank the risk areas in terms of seriousness
(Prioritization). i.e. the combination of probability (Likelihood) and potential impact.
The senior management and the board can use the Internal Audit Activity as a source of information
about risk management process considering the following facts:
- The IAA is objective about risk management process as all internal auditors must have an
impartial, unbiased attitude and avoid any conflict of interest.
- Operational management proximity to the daily functioning of the RMP makes it important
source of information, however the IAA still considered an important source of information as
well.
- The board approves the internal audit activity’s work plan; therefore, the IAA needs information
about RMP before the Senior management and the board.
- The internal audit activity should be used as a source of information about the success of
ongoing risk management activities.
The two most important sources of information for ongoing assessments of the adequacy of risk
responses (and the changing nature of the risks) are those Closest to the Activities Themselves and
the Audit Function.
Operating managers may not always be objective about the risks facing their units, especially if they
had a stake in designing a particular response strategy.
An impact factor نتائج الحدثis a potential result of an event. These events are usually identified through
the risk assessment process. For example, the consequences of fraud may include direct financial
loss in the form of fines and penalties.
“An impact factor of fraud involving senior management is fines and penalties”
For an engagement to evaluate the controls over credit approval, the internal auditor does NOT
need to establish valuation criteria for the outstanding debt. Debt already acquired by the organization
does not require further credit approval.
Also, the adequacy of controls is NOT the primary objective of an engagement involving the valuation
of complex debt instruments.
(The internal auditor does NOT need to determine whether loans and other liabilities are valued in
accordance with industry regulations)
The following are Core Assurance Roles provided by the Internal Audit Activity:
Risk management should provide Reasonable Assurance that entity’s objectives are achieved.
Risk management is a key responsibility of Senior Management and the Board.
Boards have an oversight function and determine that risk management processes are in place,
adequate, and effective.
The Risk Appetite is the level of risk that an organization is willing to accept (The IIA Glossary).
Thus, communicating about the risk appetite with external parties is an important aspect of risk
management. It allows the organization to develop strategies to work with suppliers who may have
different objectives.
The following are all factors that could influence an organization’s risk appetite:
• The viewpoints of the major stakeholders, including the views of the company’s major
shareholders, bondholders, lenders, analyst, and many others. Each stakeholder might have a
different opinion as to how much risk a company should take on.
• Accounting factors, such as the volume of transactions, the complexity of the accounting
system,
• Changing rules and regulations.
• The opportunity for fraud to be committed.
• External factors, such as changing economic considerations, changes in industry, changes
in technology, etc.
• Governmental restrictions.
• Entity-level factors, such as the quality and quantity of hired personnel, quality for training
courses, changes in key personnel, etc.
Unit 4: Risk Management
Subunit 2: COSO Framework - Enterprise Risk Management (ERM)
An entity’s risk capacity is the maximum that can be assumed. The risk appetite is the maximum the
entity is willing to accept. Both appear on the risk profile.
But the purpose of the Risk profile is to view the relationship between RISKS and the Strategy or
Business Objective AND their effect on PERFORMANCE.
“Risk Profile is a view of the relationship between Risk and Performance”
The COSO ERM framework incorporates some concepts of the COSO Internal Control Framework.
The COSO ERM framework is a basis for coordinating and integrating all of an organization’s risk
management activities. Effective integration to:
(1) Improves decision-making.
(2) Enhances performance.
The components and principles of ERM, and their related controls should be Present and
Functioning to help the entity achieve its strategy and business objective.
“Present” means such components, principles, and controls exist in the design and implementation
of ERM.
“Functioning” means to continue to operate to achieve strategy and business objectives.
What are the Components of ERM and what each one addressing?
5- Review and revision Addresses the review of, and changes in, strategy,
(Common Process) performance targets and tolerance, and ERM practices
When ERM is effective regarding all of the objectives, the board and management have reasonable
assurance that:
(1) Reporting is reliable.
(2) Compliance is achieved.
(3) The extent of achievement of strategic and operations objectives is known.
Sharing Risk reduces the severity of the risk by transferring some risk to another party.
Examples of Sharing Risks (Mitigating Control):
- Insurance
- Hedging
- Joint ventures
- Outsourcing
- Contractual agreements with customers and vendors, or other business partners.
Example: Purchasing Currency Futures is a risk transfer (Sharing).
Risk Retention: is a risk response strategy which accepts the risk of an activity and is synonymous with
self-insurance.
Example: The company maintains a fund to pay for repairs to warehouse equipment.
The company accepts the risk of equipment repairs by using a form of self-insurance (a company fund) to
pay for repairs.
The entity defines risk appetite in the strategy and objective-setting component of ERM. In defining
risk appetite, the entity considers its mission, vision, culture, prior strategies, and risk capacity.
“The underlying premise of the COSO ERM framework is that every organization exists to provide
value for its stakeholders”
The COSO’s Internal Control Framework is a process affected by an entity’s board of directors,
management, and other personnel, designed to provide reasonable assurance regarding the
achievement of objectives relating to operations, reporting, and compliance.
- Strategy is the plan to achieve the entity’s mission and vision and apply its core values.
- Business objectives are the steps taken to achieve the entity’s strategy.
1. Operational excellence.
2. Financial performance.
3. Compliance obligations.
An Enterprise Risk Management (ERM) Program is MOST EFFECTIVE when led by a Centralized
Coordinator, such as a Risk Officer. This person facilitates ERM by working with other managers in
establishing effective risk management in their areas of responsibility.
BUT Risk Exposure is NOT considered an activity, it is a condition for the risk.
“The function of the chief risk officer (CRO) is most effective when the CRO Monitors risk as part of
the enterprise risk management team”
Which of the following is the most accurate term for a process to identify, assess, manage, and
control potential events or situations to provide reasonable assurance regarding the achievement of
the organization’s objectives?
A. The internal audit activity.
B. Control process.
C. Risk management.
D. Consulting service.
ISO 31000 is a principles-based approach to risk management. Its principles are the foundation for
risk management. They also communicate the characteristics, value, and purpose of effective and
efficient risk management.
The ISO 31000 model describes three approaches to provide assurance on risk management processes:
1- The Maturity Model Approach: (Value is added at each stage of maturation)
It is based on the principle that effective risk management processes develop as value is added at
each stage of maturation. Accordingly, this approach determines where risk management is on the
maturity curve and whether it:
(1) Is progressing as expected
(2) Adds value
(3) Meets organizational needs.
2- The Process Element Approach: (Certain Elements have been implemented)
It determines whether certain elements (i.e., formal risk identification, formal risk analysis, risk
evaluation, etc.) have been implemented.
3- The Key Principles Approach: (Risk Management Principles are in place)
It determines whether the risk management principles are in place (e.g., integrated, structured,
comprehensive, and customized).
Exam Alert: There are two approaches to risk management which are widely practiced: top down (start
with objectives, risk and then controls over the process) and bottom up (start with the process,
then controls, risk, and objectives).
Exam Alert: Understand bottom up approach. It is a philosophy that an organization need to identify risk
in following level: Process Level - Project/Department Level - Vertical/Functional Level- Business
Unit Level-Organization Level.
Bottom-up approach could completely consume all resources and take all your time, but it would
represent the most precise picture of the risk and could be completely quantified. However, it is not
widely used.
ISO 31000 is based on the Plan, Do, Check, and Act method:
Five Components of the Risk Management Framework of the ISO 31000 model:
(I I I D E)
1- Integration
2- Implementation
3- Improvement
4- Design
5- Evaluation
Risk appetite is considered during risk treatment, but is not a separate element.
The risk assessment element of a risk management process is the process of identifying, analyzing, and
evaluating risk.
Risk evaluation supports decision making by comparing the defined risk criteria with the outcome of
risk analysis and determining whether any action is required.
The elements of control include: The following are implied in the definition of Control.
Planning provides needed tools for the control process by establishing standards, i.e., the first step.
Control is “any action taken by management, the board, and other parties to manage risk and
increase the likelihood that established objectives and goals will be achieved”
Efficient Performance: accomplishes objectives and goals in an accurate, timely, and economical
fashion.
Cost-benefit considerations apply even to employee theft, so the cost-benefit should be calculated in order
to decide if the control needs to be implemented or not. A Limiting Factor is that the cost of internal
control should not exceed its expected benefits.
Controls DO NOT directly address management’s planning, organizing, and directing processes.
Internal auditors evaluate management processes to determine whether reasonable assurance exists that
objectives and goals will be achieved.
“Control processes are expected to ensure that operations are performed efficiently and achieve
established results”
An aversion to risk Organization can use the Standard Operating Procedures (SOPs) as controls
as it will be more effective than in a risk tolerant organization (An entrepreneurial Focus Organization)
An organization with an entrepreneurial focus has a high risk appetite and risk tolerance.
The more risk averse an organization, the more likely its members will comply with controls.
Internal control is a process, effected by those charged with governance, management, and other
personnel, designed to provide reasonable assurance about the achievement of the entity’s
objectives.
They include:
(1) Reliability of financial reporting
(2) Effectiveness and efficiency of operations
(3) Compliance with applicable laws and regulations.
• Ascertain that management has established adequate criteria to determine whether objectives and
goals have been accomplished.
• If adequate, internal auditors must use management’s adequate control criteria in their
evaluation.
• If inadequate, internal auditors must work with management to develop appropriate control
evaluation criteria.
To determine whether management has overridden approvals, the auditor should compare actual
expenditures with budgeted amounts. (Verifying that approved spending limits are not exceeded).
Internal controls are designed to provide reasonable assurance that material errors or fraud will be
prevented, or detected and corrected, within a timely period by employees in the course of
performing their assigned duties.
❖ The Limitations of Internal Controls increase the risk that an internal auditor may not detect a
material error or fraud during an audit.
1- Validity check: Validity checks compare the data entered in a given field with a table of valid values
for that field. For example, a customer number must already be on the list of approved customers, it
is used to detect a data input error in the customer account number field.
2- Limit, Reasonableness or Range check: Reasonableness, limit, and range checks are based upon
known limits for given information. For example, the hours worked per week are not likely to be greater
than 45; it is used to catch certain types of errors within the payment amount field of a transaction.
3- Control total: A record count is a control total of the number of records processed during the
operation of a program. Financial totals summarize dollar amounts in an information field in a
group of records.
4- Hash total: A hash total is the number obtained from totaling the same field value for each
transaction in a batch. The total has no meaning or value other than as a comparison with
another hash total.
5- Record count: A record count determines the number of documents entered into a process.
6- Echo check: An echo check tests the reliability of computer hardware. For example, the CPU
sends a signal to a printer that is echoed just prior to printing. The signal verifies that the proper print
position has been activated.
7- Check digit: A self-checking number is generated by applying an algorithm to an identification
number.
8- Check digit verification: Check digit verification is used to identify incorrect identification
numbers. The digit is generated by applying an algorithm to the ID number. During input, the check
digit is recomputed by applying the same algorithm to the entered ID number.
9- Redundant data check: A redundant data check searches for duplicate information in a database.
10- Sequence checks: Sequence checks are based on the logic that processing efficiency is greatly
increased when files are sorted on some designated field. If the system discovers a record out
of order, it may indicate that the files were not properly prepared for processing.
11- Format checks: Format (field) checks are tests of the characters in a field to verify that they are
of an appropriate type for that field. For example, an alphabetic character field would not allow a
number to be entered.
The process or the case The Control needed
When shipping documents are not received in the shipping department (such as copies of the sales
invoice, customer order form, and bill of lading), the clerk should attempt to obtain the proper
documentation from the originating organization. This type of control is detective because it detects and
attempts to correct an undesirable event that has occurred. It is also active because it takes a conscious
intervention by the clerk to ensure the documentation is received.
• Segregation of duties.
• Using prenumbered standard purchase order forms.
• Review and approval of each procurement action.
Directive control is designed to cause or encourage a desirable event to occur.
e.g., Providing management with assurance of the realization of specified minimum gross margins
on sales is a Directive Control.
Application Controls:
Application controls are those that pertain to the scope of individual Business Processes or
Application Systems.
The objectives of application controls are to ensure that:
Establishing Logical Access Controls over infrastructure, applications, and data is an IT General
Control.
IT General Controls:
The IT general controls over information and related technologies are those that pertain to all systems
components, processes, and data present in an organization’s IT environment.
• The Operating controls should be designed with regard to the management functions of
planning, organizing, directing, and controlling, it is often DIFFICULT for internal auditors to
evaluate because of the lack of criteria or standards, because those controls are used in the
management processes of directing and controlling and are based on comparison of results with
standards, therefore, standards become more difficult to determine.
• The Output controls ensure that processing results are complete, accurate, and properly
distributed. An important output control is user review. Users should be able to determine when
output is incomplete or not reasonable, particularly when the user prepared the input
• The Input controls designed with primary consideration given to authorization, validation, and
error notification. Those controls that pertain to the scope of individual business processes are
application controls. They include the data cycle process from input to storage and to the eventual
output.
Controls by Levels (T-P-EM-EG):
A control matrix is useful for matching controls with risks. Controls do not necessarily match risks one-
to-one. Certain controls may address more than one risk, and more than one control may be needed to
address a single risk (More Than One Control May Be Needed to Adequately Address A Single Risk,
This Is A Characteristic of a Control Matrix)
The control environment is a set of standards, processes, and structures that includes: -
Internal control as a process designed to provide reasonable assurance regarding the achievement
of objectives related to:
1- Reliability of financial reporting.
2- Effectiveness and efficiency of operations.
3- Compliance with laws and regulations.
• Senior management is primarily responsible for establishing a proper organizational culture and
specifying a system of internal control, Senior Management is not likely to be involved in the
detailed design and day-to-day operation of a control system.
The eSAC Model
1- A = Availability A
2- C = Capability Court
3- F = Functionality Finds
4- P = Protectability People
5- A = Accountability Accountable
SOFT CONTROLS:
- Purpose.
- Commitment
- Capability
- Monitoring
- Learning
P = Purpose Police
C = Commitment Can
C = Capability Catch
M = Monitoring Many
L = Learning Lawbreakers
1- Control activities are the policies and procedures helping to ensure that management directives
are executed and actions are taken to address risks to achievement of objectives.
2- Risk assessment identifies and analyzes external or internal risks to achievement of the objectives
at the activity level as well as the entity level.
3- Information and Communication enable the organization to obtain, generate, use, and communicate
information to (a) maintain accountability and (b) measure and review performance.
4- Monitoring is a process that assesses the quality of the system’s performance over time, it is designed
to ensure that internal controls continue to operate effectively.
5- Control Environments reflect the attitude and actions of the board and management regarding
the significance of control within the organization.
Internal Control Frameworks Is Internal Control
• Under the COBIT 2019 framework, Governance system components can be Generic or Variant.
Generic components are applied in principle to any circumstances. Variant components are
designed for a given purpose or context in a focus area.
• Under the COBIT 2019 framework, Governance distinct from management is one of the six principles
for a governance system. Governance tasks should be differentiated from management tasks.
Accordingly, governance and management activities and structures cannot be combined.
Governance Principles in COBIT 2019:
COBIT contain 4 domains for activities and risks within IT that need to be managed:
1- Plan and Organize (PO): Identification of the way IT can best contribute to the achievement
of the business objectives. Furthermore, the realization of the strategic vision needs to be
planned, communicated and managed for different perspectives. Finally, a proper organization
as well as technological infrastructure should be put in place.
2- Acquire and Implement (AI): Changes in and maintenance of existing systems are covered
by this domain to make sure the solutions continue to meet business objectives
3- Deliver and Support (DS): This domain is concerned with the actual delivery of required
services, which includes service delivery, management of security and continuity, service
support for users, and management of data and the operational facilities
4- Monitor and Evaluate (ME): This domain addresses performance management, monitoring of
internal control, regulatory compliance and providing governance.
Unit 6: Controls: Application | Subunit 1: Flowcharts and Process Mapping
Shapes used in the flowcharts:
1- Diamond shape: The diamond-shaped symbol represents a decision point or tests of a condition
in a program flowchart, that is, the point at which a determination must be made as to which logic
path (branch) to follow.
2- Rectangle Shape:
• A pre-defined processing step is represented by a rectangle with double lines on either side.
5- Parallelogram Shape متوازي االضالع: A parallelogram represents input or output when the medium
is not specified.
6- Circle Shape: A circle on a flowchart is a connection between two points on the same page.
• A systems flowchart is a symbolic representation of the flow of documents and procedures through
a series of steps in the accounting process of the client’s organization.
• In documenting the procedures used by several interacting departments the internal auditor most
likely will use the Horizontal (or System) Flowchart.
• A vertical flowchart displays step-by-step processes effectively, but it does not delineate the system’s
components as well. A vertical flowchart is usually designed to provide for written descriptions (more
room for written descriptions).
• A horizontal flowchart more clearly shows any inappropriate separation of duties and lack of
independent checks on performance. The steps performed by a function or department are presented
in the same column. (Brings into sharper focus the assignment of duties and independent checks on
performance)
A Systems Flowchart is a symbolic representation of the flow of documents and procedures through a
series of steps in the accounting process of the client’s organization. (Symbolic representation of a system
or series of sequential processes)
A Computer Program Flowchart is a pictorial presentation of the flow of instructions in a client’s internal
computer system (Pictorial presentation of the flow of instructions in a client’s internal computer system)
• The payroll department has a recording function. It should not authorize pay rate changes or the
addition or deletion of employees from the payroll. Accordingly, authorization of such changes
should be made by an individual outside the payroll department. Verification of payroll data should
also be made outside the department. Proper segregation of duties is critical in the prevention of
payroll fraud.
• Payroll department processes hours (Not preparing attendance data) and enters employee bank
account numbers.
Adding employees & Processes work hours & Delivering paychecks must be separated.
• Preparing Attendance data are accumulated by the timekeeping function. Preparing the payroll is
a payroll department function. For control purposes, these two functions should be separated to avoid
the perpetration and concealment of irregularities.
• The personnel department (human resources department) is responsible for authorizing and
executing employee transactions such as hiring, firing, and changes in pay rates and deductions.
Segregating these functions helps prevent fraud. Thus, the payroll for each period should be
compared with the active employment files of the personnel department.
Internal control over accounts receivable begins with a proper segregation of duties. Thus,
• The cashier, who performs an asset custody function, should not be involved in recordkeeping.
• Accounts should be periodically confirmed by an auditor.
• Delinquent accounts should be reviewed by the head of accounts receivable and the credit manager.
• Customer statements should be mailed monthly by the accounts receivable department without
allowing access to the statements by employees of the cashier’s department.
• The sales manager should not be the only person to review delinquent accounts because (s)he
may have an interest in not declaring an account uncollectible.
• Management can best strengthen internal control over the custody of inventory stored in an off-
site warehouse by implementing regular reconciliation of physical inventories to accounting
records.
A detective control that will reveal, on a regular basis, any discrepancies between the inventory
records and the actual inventory on hand (off-site warehouse) is needed. Periodic comparison
of the recorded accountability for inventory with the actual physical inventory will accomplish this.
Which of the following would minimize defects in finished goods caused by poor quality raw
materials?
A preventive control is required in this situation, i.e., one that ensures an unwanted event does not take
place. The most cost-effective way of achieving the goal is to keep poor quality raw materials from
entering the warehouse to begin with. Of the controls listed, only required specifications will
accomplish this.
Unit 7: Fraud Risks and Controls | Subunit 1: Fraud -- Risks and Types
• Fraud is defined in The IIA Glossary as “any illegal act characterized by deceit, concealment, or
violation of trust. These acts are not dependent upon the threat of violence or physical force.”
(Intentional deception)
• The internal auditor should have sufficient knowledge to identify the indicators of fraud but is
not expected to be an expert.
• Living beyond one’s means has been linked to Employee Fraud (embezzlement), NOT to
Financial Statement Fraud.
• An increase in sales far out of proportion to the increase in cost of goods sold is an indicator
of possible fraud. Increases in sales are usually accompanied by close to proportional increases
in cost of goods sold.
Example: A trend analysis discloses sales increases of 50% and cost of goods sold increases of
25%.
The following are some factors (red flags) which are generally associated with Management fraud:
- Generous reward systems provide incentives for management to distort performance.
- A domineering management: Pressure from superiors provides an incentive for management to
distort performance.
- A management preoccupation with Increased Financial Performance provides an incentive for
managers to distort performance.
- Ineffective controls on comparison of actual results with budgets
• The internal audit activity is responsible for Examining and evaluating the adequacy and
effectiveness of that Preventing Fraud Division’s actions taken to prevent fraud.
• An internal auditor’s responsibilities for detecting fraud include evaluating fraud indicators and
deciding whether any additional action is necessary or whether an investigation should be
recommended.
• Internal auditors are more likely to detect fraud by developing/strengthening their ability to
Recognize and question changes that occur in organizations.
• Rationalization occurs when a person attributes his or her actions to rational and creditable motives
without analysis of one’s true and especially unconscious motives. Feeling that one is not being
paid as much as one is worth is a common rationalization for low-level fraud.
• Tampering with accounting records is a document symptom. The indicator of fraud consists of
the changes in actual company records.
• Check Tampering is a scheme in which an employee steals company funds by intercepting, forging
or altering a check drawn on one of the organization’s bank accounts.
• An employee was living beyond his means. The change in lifestyle was a symptom that
indicated the presence of fraud.
• A drastic change ) (تغيير جذريin an employee’s behavior may indicate the presence of fraud. The guilt
and the other forms of stress associated with perpetrating and concealing the fraud may induce
noticeable changes in behavior (Behavioral symptom).
• Skimming: is a theft of cash before the accounting entry is recorded. Examples include accepting
payment from a customer but not reporting the sale or overcharging the customer for the sale
and keeping the difference. Skimming is very difficult to detect as there is no audit trail.
• Tax evasion: The illegal nonpayment or underpayment of tax is considered tax evasion.
Intentionally falsifying a tax return, failing to remit taxes, and failing to report taxes are examples.
• Payment fraud: involves payment for fictitious goods or services, overstatement of invoices,
or use of invoices for personal reasons.
• Payroll fraud is a false claim for compensation. It can include, for example, falsifying timesheets,
claiming overtime for hours not worked, and payments to fictitious or terminated employees.
• Asset misappropriation fraud is stealing cash or other assets, such as supplies, inventory,
equipment, and information. The theft may be concealed by adjusting records.
• Expense reimbursement fraud is when payment is made for fictitious or inflated expenses, for
example, when an employee submits an expense report that includes personal travel, nonexistent
meals, or extra mileage.
• Check Kiting: A check kiting scheme requires two accounts and usually involves several
accounts at several banks. The nonexistent cash is constantly moved from one bank to another,
rotating in a circular fashion.
Using electronic fund transfer and other networked computer safeguards make electronic
kiting difficult.
Check kiting exploits تستغلthe float time between the deposit of the check and the check
clearing the bank. At one time, float times ranged from 2 days to 10 days. Technology has resulted
in drastically reduced float times.
• The internal auditor should extend tests to determine the extent of fraud are performed after the
fraud has in fact been determined, not suspected.
• Fraud awareness training support fraud prevention by Limits (Minimize) Rationalization by:
- Supporting the ethical tone at the top
- Promoting an anti-fraud environment
- Emphasizing that the organization does not tolerate misconduct of any kind.
• If a purchasing agent may acquire items for personal use with the Company’s funds (purchasing
specified amount per day in open-ended contracts), as he can issue purchase orders and receiving
slips, then the auditor may detect this fraud by performing a trend analysis of printing supplies
expenses for the last 2 years period, as it will identify an excess use of supplies.
Also, as an engagement procedure to detect this kind of fraud, the auditor needs to check a
sample of paid invoices and verify the receipt of services or goods by the department
involved.
• In order to minimize the fraudulent use of the organization credit card, it will be treated like
normal cash by following the same expenses controls used in expense forms. (The problem
of charging the organization for unauthorized expenditures is the same for any type of expense
account, whether credit card or cash. Thus, normal expense controls should preclude credit card
fraud by employees).
Having a written policy describing prohibited activities and the action required whenever
violations are discovered will help to prevent fraud, if the auditor fail to report the absence of this
policy, he is considered not properly fulfilled his responsibility of the prevention of fraud.
The purchasing agent should NOT match the vendor invoice, receiving slip, and purchase order, in order
to decrease the likelihood of fraud, both the receiving reports and the vendors’ invoices must be sent
directly to accounts payable department.
In order to prevent or detect a fraud of continuing to submit fraudulent invoices from the old supplier
since contracting for services and approval of supplier invoices had been delegated to him:
- Comparison by the person signing checks of invoices with an independent verification of services
received.
- Requiring authorization of payments by someone other than who negotiating the contract.
- Budget preparation by someone other than the person signing contracts and approving
payment.
The least likely to prevent of detect such fraud is to segregate of duties between mailing of venders
checks and the one who is responsible to sign the check and approve the invoice.
One way to reduce the risk of the addition of fictitious employees to the payroll is to perform
periodic floor checks of employees on the payroll. (To make a period comparison of the names of the
payroll with persons observed working for the company. Observation of payroll distribution is such a
control).
Study Unit 7: Fraud Risks and Controls | Subunit 3: Fraud – Investigation
FRAUD INVESTIGATIONS:
When conducting fraud investigations, internal auditors or others should assess the level of, and the
extent of complicity in, the fraud within the organization. This assessment can be critical to ensuring
that:
(1) Crucial evidence is not tainted or destroyed.
(2) Misleading information is not obtained from persons who may be involved.
If internal auditing has concluded that an employee has stolen a significant amount of cash
receipts. A draft of the proposed communication on this observation should be submitted for review to
legal counsel. The board should receive a final draft of the report after it has been reviewed and
approved by legal counsel.
If appropriate, the CEO may receive a final draft of the report after it has been reviewed and
approved by legal counsel.
Forensic Auditing relies more heavily on investigative skills; Forensic auditing requires
investigative and accounting skills. The investigative skills are required to collect, analyze, and
evaluate financial evidence. These skills differentiate forensic auditing from internal auditing.
Attempt to get the suspected individual to confess is the least likely approach to be used in an
investigation.
* * *
Tarek Jabri