COSO Committee of Sponsoring Organizations of the Treadway Commission
Principle 10: The organization selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels.
The following points of focus highlight important characteristics relating to this principle:
-
Integrates with Risk Assessment—Control activities help ensure that risk responses that address and mitigate risks are carried out.
-
Considers Entity-Specific Factors—Management considers how the environment, complexity, nature, and scope of its operations, as well as the specific characteristics of its organization, affect the selection and development of control activities.
-
Determines Relevant Business Processes—Management determines which relevant business processes require control activities.
-
Evaluates a Mix of Control Activity Types—Control activities include a range and variety of controls and may include a balance of approaches to mitigate risks, considering both manual and automated controls, and preventive and detective controls.
-
Considers at What Level Activities Are Applied—Management considers control activities at various levels in the entity.
-
Addresses Segregation of Duties—Management segregates incompatible duties, and where such segregation is not practical management selects and develops alternative control activities.
Control activities support all the components of internal control, but are particularly aligned with the Risk Assessment component. Along with assessing risks, management identifies and puts into effect actions needed to carry out specific risk responses. Typically, control activities are not needed when an entity chooses to either accept or avoid a specific risk. There may, however, be instances where the organization decides to avoid a risk and chooses to develop control activities to avoid that risk. The action to reduce or share a risk serves as a focal point for selecting and developing control activities. The nature and extent of the risk response and any associated control activities will depend, at least in part, on the desired level of risk mitigation acceptable to management.
Control activities are those actions that help ensure that responses to assessed risks, as well as other management directives such as establishing standards of conduct in the control environment, are carried out properly and in a timely manner. For example, suppose a company sets an operations objective "to meet or exceed sales targets for the ensuing reporting period," and management identifies a risk that the organization's personnel have insufficient knowledge about current and potential customers’ needs. Management's response to address this identified risk includes developing buying histories for existing customers and undertaking market research initiatives to increase the organization's understanding of how to attract potential customers. Control activities might include tracking the progress of the development of the customer buying histories against established timetables, and taking steps to help ensure the quality of the reported marketing data.
When determining what actions to put in place to mitigate risk, management considers all aspects of the entity's internal control components and the relevant business processes, information technology, and locations where control activities are needed. This may require considering control activities outside the operating unit, including shared service or data centers, and processes or functions performed in outsourced service providers. For example, entities may need to establish control activities to address the integrity of the information sent to and received from the outsourced service provider.
Because each entity has its own set of objectives and implementation approaches, there will be differences in objectives, risk, risk responses, and related control activities. Even if two entities have identical objectives and structures, their control activities could be different. Each entity is managed by different people with different skills who use individual judgment in effecting internal control. Moreover, controls reflect the environment and industry in which an entity operates, as well as the complexity of its organization, its history and its culture, nature, and scope of operations.
Entity-specific factors can impact the control activities needed to support the system of internal control. For instance:
-
The environment and complexity of an entity, and the nature and scope of its operations, both physically and logically, affect its control activities.
-
Highly regulated entities generally have more complex risk responses and control activities than less-regulated entities.
-
The scope and nature of risk responses and control activities for multinational entities with diverse operations generally address a more complex internal control structure than those of a domestic entity with less-varied activities.
-
An entity with a sophisticated enterprise resource planning (ERP) system will have different control activities than an entity that uses an off-the-shelf computer accounting system.
-
An entity with decentralized operations and an emphasis on local autonomy and innovation presents different control circumstances than another whose operations are constant and highly centralized.
Business processes are established across the entity to enable organizations to achieve their objectives. These business processes may be common to all businesses (such as purchasing, payables, or sales processing) or unique to a particular industry (such as claims processing, trust services, or drilling operations). Each of these processes transforms inputs into outputs through a series of transactions or activities. fn 14 Control activities that directly support the actions to mitigate transaction processing risks in an entity's business processes are often called "application controls" or "transaction controls." fn 15
Transaction controls are the most fundamental control activities in an entity since they directly address risk responses in the business processes in place to meet management's objectives. Transaction controls are selected and developed wherever the business process may reside, ranging from the organization's financial consolidations process at the entity level to the customer support process at a particular operating unit.
A business process will likely cover many objectives and sub-objectives, each with its own set of risks and risk responses. A common way to consolidate these business process risks into a more manageable form is to group them according to information-processing objectives fn 16 of completeness, accuracy, and validity.
The following information-processing objective definitions are used in the Framework. fn 17
-
Completeness—Transactions that occur are recorded. For instance, an organization can mitigate the risk of not processing all transactions with vendors by selecting actions and transaction controls that support all invoice transactions being processed within the accounts payable business process.
-
Accuracy—Transactions are recorded at the correct amount in the right account (and on a timely basis) at each stage of processing. For instance, transaction controls over data elements and master data, such as the item price in the vendor master file, can address the accuracy of processing a purchasing transaction. Accuracy in the context of an operational process can be defined to cover the broader concept of quality (e.g., the accuracy and precision of a manufactured part).
-
Validity—Recorded transactions represent economic events that actually occurred and were executed according to prescribed procedures. Validity is generally achieved through control activities that include the authorization of transactions as specified by an organization's established policies and procedures (i.e., approval by a person having the authority to do so). In an operational context, the parts used in making an automobile are obtained from an authorized supplier.
The risk of untimely transaction processing may be considered a separate risk or included as part of the completeness or accuracy information-processing objective. Restricted access is an important consideration for most business processes and is often included as an information-processing objective because without appropriately restricting access over transactions in a business process, the control activities in that business process can be overridden and segregation of duties may not be achieved.
Restricted access is especially important where technology is integral to an organization's processes or business. For example, many organizations use ERP applications. Configuring the security in these applications to address restricted access can become very complex and requires technical knowledge and a structured approach. Considerations for restricted access are discussed in more detail under the Security Management Processes section of Principle 11.
While the information-processing objectives are most often associated with financial processes and transactions, the concept can be applied to any activity in an organization. For instance, a candy maker will strive to have control activities in place to help ensure that all the ingredients are included in its cooking process (completeness), in the right amounts (accuracy), and from approved vendors whose products passed quality testing (validity).
As another example, the information-processing objectives and related control activities also apply to management's decision-making processes over critical judgments and estimates. In this situation, management should consider the completeness of the identification of significant factors affecting estimates for which it must develop and support assumptions. Similarly, management should consider the validity and reasonableness of those assumptions and the accuracy of its estimation models.
This does not mean that if management considers the information-processing objectives the organization will never make a faulty judgment or estimate; judgments and estimates are always subject to human error. However, when appropriate control activities are in place, and the information management uses is, in its judgment, accurate, complete, and valid, then the likelihood of better decision making is improved.
A variety of transaction control activities can be selected and developed, including the following:
-
Authorizations and Approvals—An authorization affirms that a transaction is valid (i.e., it represents an actual economic event or is within an entity's policy). An authorization typically takes the form of an approval by a higher level of management or of verification and a determination if the transaction is valid. For example, a supervisor approves an expense report after reviewing whether the expenses seem reasonable and within policy. An example of an automated approval is where an invoice unit cost is automatically compared with the related purchase order unit cost within a pre-established tolerance level. Invoices within the tolerance level are automatically approved for payment. Those invoices outside the tolerance level are flagged for additional investigation.
-
Verifications—Verifications compare two or more items with each other or compare an item with a policy, and perform a follow-up action when the two items do not match or the item is not consistent with policy. Examples include computer matching or a reasonableness check. Verifications generally address the completeness, accuracy, or validity of processing transactions.
-
Physical Controls—Equipment, inventories, securities, cash, and other assets are secured physically (e.g., in locked or guarded storage areas with physical access restricted to authorized personnel) and are periodically counted and compared with amounts shown on control records.
-
Controls over Standing Data—Standing data, such as the price master file, is often used to support the processing of transactions within a business process. Control activities over the processes to populate, update, and maintain the accuracy, completeness, and validity of this data are put in place by the organization.
-
Reconciliations—Reconciliations compare two or more data elements and, if differences are identified, action is taken to bring the data into agreement. For example, a reconciliation is performed over daily cash flows with net positions reported centrally for overnight transfer and investment. Reconciliations generally address the completeness and/or accuracy of processing transactions.
-
Supervisory Controls—Supervisory controls assess whether other transaction control activities (i.e., particular verifications, reconciliations, authorizations and approvals, controls over standing data, and physical control activities) are being performed completely, accurately, and according to policy and procedures. Management normally uses judgment to select and develop supervisory controls over higher risk transactions. For instance, a supervisor may review fn 18 whether an accounting clerk performs a reconciliation according to policy. This can be a high-level review (e.g., checking if the reconciliation spreadsheet has been completed) or a more detailed review, (e.g., checking to see if any reconciling items have been followed up and corrected or an appropriate explanation is provided).
Control activities can be preventive or detective, and organizations usually select a mix. The major difference is the timing of when the control activity occurs. A preventive control is designed to avoid an unintended event or result at the time of initial occurrence (e.g., upon initially recording a financial transaction or upon initiating a manufacturing process). A detective control is designed to discover an unintended event or result after the initial processing has occurred but before the ultimate objective has concluded (e.g., issuing financial reports or completing a manufacturing process). In both cases the critical part of the control activity is the action taken to correct or avoid an unintended event or result.
When selecting and developing control activities, the organization considers the precision of the control activity—that is, how exact it will be in preventing or detecting an unintended event or result. For example, suppose the purchasing manager of a company reviews all purchases over $1 million. This control activity may mitigate the risk of errors over $1 million, helping to cap the entity's exposure, but it does not cover all transactions. In contrast, an automated edit check that compares prices on all purchase orders to the price master file and produces a report of variances that is reviewed by a purchasing supervisor addresses accuracy for all transactions. Control activity precision is closely linked to the organization's risk tolerance for a particular objective (i.e., the tighter the risk tolerance, the more precise the actions to mitigate the risk and the related control activities need to be).
When selecting and developing control activities it is important to understand what a particular control is designed to accomplish (i.e., the specific risk response the control addresses) and whether it has been developed and implemented as designed to mitigate the risk. For example, in one entity sales orders undergo an automated or manual edit check that matches a customer's billing address and zip code to information in a standing data file of valid customer relationships. If the match fails, corrective action is taken. This control activity helps achieve the accuracy information-processing objective.
However, it does not help achieve the completeness information-processing objective (i.e., whether all approved sales orders are being processed). Another control activity, such as sequentially numbering approved sales orders and then checking if all have been processed, would be needed to address completeness.
Control activities and technology fn 19 relate to each other in two ways:
-
Technology Supports Business Processes—When technology is embedded into the entity's business processes, such as robotic automation in a manufacturing plant, control activities are needed to mitigate the risk that the technology itself will not continue to operate properly to support the achievement of the organization's objectives.
-
Technology Used to Automate Control Activities—Many control activities in an entity are partially or wholly automated using technology. These procedures are known as automated control activities or automated controls in the Framework. Automated controls include financial process–related automated transaction controls, such as a three-way match performed within an ERP system supporting the procurement and payables sub-processes, and computerized controls in operational or compliance processes, such as checking the proper functioning of a power plant. Sometimes the control activity is purely automated, such as when a system detects an error in the transmission of data, rejects the transmission, and automatically requests a new transmission. Other times there is a combination of automated and manual procedures. For example, the system automatically detects the error in transmission, but someone has to manually initiate the re-transmission. In other cases, a manual control depends on information from a system, such as computer-generated reports supporting a budget-to-actual analysis.
Most business processes have a mix of manual and automated controls, depending on the availability of technology in the entity. Automated controls tend to be more reliable, subject to whether technology general controls, discussed later in this chapter, are implemented and operating, since they are less susceptible to human judgment and error, and are typically more efficient.
In addition to controls that operate at the transaction-processing level, the organization selects and develops a mix of control activities that operate more broadly and that typically take place at higher levels in the organization. These broader control activities usually are business performance or analytical reviews fn 20 involving comparisons of different sets of operating or financial data. The relationships are analyzed and investigated and corrective actions are taken when not in line with policy or expectations. Transaction controls and business performance reviews at different levels work together to provide a layered approach to addressing the organization's risks and are integral to the mix of controls within the organization.
For example, an operating unit may have business performance reviews over the procurement process that include purchase price variances, the percentage of orders that are rush purchase orders, and the percentage of returns to total purchase orders. By investigating any unexpected results or unusual trends, management may detect circumstances where the underlying procurement objectives may not have been achieved.
Another form of business performance review occurs when senior management conducts reviews of actual performance versus budgets, forecasts, prior periods, and competitor results. Major initiatives are tracked—such as marketing programs, improvements to production processes, and cost containment or reduction programs—to measure the extent to which targets are being reached. Management reviews the status of new product development, joint venture opportunities, or financing needs. Management actions taken to analyze and follow up on such reporting are control activities.
The scope of a business performance review (i.e., how many detailed risks it covers) will tend to be greater than for a transaction control. Also, the span of the review across the organization will tend to be greater as a business performance review is usually performed at higher levels in the organization than a transaction control. However, to effectively respond to a set of risks, the review must be precise enough to detect all errors that exceed the risk tolerance. A transaction control may address a single specific risk, whereas an operating unit business performance review typically addresses a number of risks. For example, the business performance review over rush purchase orders covers several risks in the procurement process but may not address risks concerning the accuracy and completeness of processing specific transactions.
Most business performance reviews are detective in nature because they typically occur after transactions have already taken place and been processed. So while higher-level controls are important in the mix of control activities, it is difficult to fully and efficiently address business process risks without transaction controls.
When selecting and developing control activities management should consider whether duties are divided or segregated among different people to reduce the risk of error or inappropriate or fraudulent actions. Such consideration should include the legal environment, regulatory requirements, and stakeholder expectations. This segregation of duties generally entails dividing the responsibility for recording, authorizing, and approving transactions, and handling the related asset. For instance, a manager authorizing credit sales is not responsible for maintaining accounts receivable records or handling cash receipts. If one person is able to perform all these activities he or she could, for example, create a fictitious sale that could go undetected. Similarly, salespersons should not have the ability to modify product price files or commission rates. A control activity in this area could include reviewing access requests to the system to determine whether segregation of duties is being maintained. For example, a request for a salesperson to have system access to modify product price files or commission rates should be rejected.
The segregation of duties can address important risks relating to management override. Management override circumvents existing controls and is an often-used means of committing fraud. The segregation of duties is fundamental to mitigating fraud risks because it reduces, but can't absolutely prevent, the possibility of one person acting alone. However, there is always the risk that management can override control activities. Collusion is needed to perform fraudulent activities when key process responsibilities are divided between at least two employees. Also, the segregation of duties reduces errors by having more than one person performing or reviewing transactions in a process, increasing the likelihood of an error being found.
However, sometimes segregation is not practical, cost effective, or feasible. For instance, small companies may lack sufficient resources to achieve ideal segregation, and the cost of hiring additional staff may be prohibitive. In these situations, management institutes alternative fn 21 control activities. In the example above, if the salesperson can modify product price files, a detective control activity can be put in place to have personnel unrelated to the sales function periodically review whether and under what circumstances the salesperson changed prices.
fn 14 The term "transactions" tends to be associated with financial processes (e.g., payables transactions), while "activities" is more generally applied to operational or compliance processes. For the purposes of the Framework, the term "transactions" applies to both.
fn 15 The term "transaction controls" is used in the Framework to refer to both manual and automated controls.
fn 16 While related in concept and terminology, information-processing objectives and financial statement assertions are different. Financial statement assertions are specific to the reliability of financial reporting, while information-processing objectives apply to transaction processing.
fn 17 Information-processing objectives refers to an entity's goals for control activities and thus are sub-objectives in the context of a system of internal control.
fn 18 Supervisory reviews can be either control activities or monitoring activities. The difference is discussed further in Chapter 9, Monitoring Activities.
fn 19 "Technology" is a broad term. In the Framework its use applies to technology that is computerized, including software applications running on a computer, manufacturing controls systems, etc.
fn 20 Business performance reviews can be either control activities or monitoring activities. The difference is discussed further in Chapter 9, Monitoring Activities.
fn 21 The Framework prefers the term "alternative controls" over "compensating controls." The latter term has been used to describe additional control activities put in place when segregation of duties could not be achieved. However, this term has evolved to refer to control activities that mitigate the impact of an identified control deficiency when evaluating the operating effectiveness of controls and is used in this context in the Framework.
Generated November 9, 2014 22:46:48 |