< Return to Video

4 steps to design INTERNAL CONTROLS

  • 0:00 - 0:03
    What's up audit fans. I'm back and today
  • 0:03 - 0:05
    we're looking at designing
  • 0:05 - 0:07
    internal controls. A big thank you to
  • 0:07 - 0:08
    Charlene who wrote to me
  • 0:08 - 0:10
    through facebook and said, "Oh look I'd
  • 0:10 - 0:12
    really love something
  • 0:12 - 0:15
    about how to design internal controls".
  • 0:15 - 0:16
    This isn't something that the auditor
  • 0:16 - 0:17
    would normally
  • 0:17 - 0:19
    do because when we design internal
  • 0:19 - 0:21
    controls for our client we
  • 0:21 - 0:23
    actually create a self-review
  • 0:23 - 0:25
    independence threat.
  • 0:25 - 0:27
    But if you're an internal auditor or
  • 0:27 - 0:29
    you're providing some recommendations
  • 0:29 - 0:30
    or if you're studying and it's quite a
  • 0:30 - 0:32
    common question to be asked
  • 0:32 - 0:35
    what sort of internal controls should be
  • 0:35 - 0:36
    used
  • 0:36 - 0:38
    to minimize a particular risk, today I'm
  • 0:38 - 0:40
    going to address it with a four-step
  • 0:40 - 0:41
    process.
  • 0:41 - 0:46
    Let's get into it.
  • 0:46 - 0:52
    [Music]
  • 0:54 - 0:57
    Hi and welcome to AmandaLovesToAudit.
  • 0:57 - 0:58
    My name is Amanda, I do love
  • 0:58 - 1:02
    audit, and I'm really excited to be
  • 1:02 - 1:04
    here back again on my YouTube channel.
  • 1:04 - 1:05
    We're just starting our
  • 1:05 - 1:07
    university semester here in Australia so
  • 1:07 - 1:09
    it's full steam ahead for me,
  • 1:09 - 1:11
    really, really busy. But I wanted to give
  • 1:11 - 1:12
    a shout out to
  • 1:12 - 1:15
    all of my returning viewers from places
  • 1:15 - 1:16
    like
  • 1:16 - 1:18
    Canada, Indonesia, Namibia, Nigeria, South
  • 1:18 - 1:19
    Africa, USA,
  • 1:19 - 1:22
    Germany, Uganda, did I say Uganda twice?
  • 1:22 - 1:23
    No.
  • 1:23 - 1:26
    Ghana. It's really amazing. Somebody in
  • 1:26 - 1:28
    the comments asked if I'm Malaysian
  • 1:28 - 1:31
    and I'm not. So my parents are both from
  • 1:31 - 1:31
    China
  • 1:31 - 1:35
    in the Guangzhou region of China. I
  • 1:35 - 1:37
    don't speak any Chinese. So my parents
  • 1:37 - 1:39
    came here, my mom came here when she was
  • 1:39 - 1:40
    five years old,
  • 1:40 - 1:43
    my dad came in his teenage years.
  • 1:43 - 1:46
    And when my mom was growing up, she
  • 1:46 - 1:49
    went to kindergarten not knowing any
  • 1:49 - 1:50
    English,
  • 1:50 - 1:52
    so when she talked with an accent she
  • 1:52 - 1:54
    received a lot of bullying,
  • 1:54 - 1:56
    even then you know a lot of racism
  • 1:56 - 1:57
    against Asians. So
  • 1:57 - 2:00
    when she had kids, and we were the only
  • 2:00 - 2:02
    Asian kids in our school,
  • 2:02 - 2:04
    she said I want you to sound Aussie. I
  • 2:04 - 2:06
    want you to be able to blend in so that
  • 2:06 - 2:09
    if you can sound like everybody else,
  • 2:09 - 2:11
    then hopefully you won't experience the
  • 2:11 - 2:12
    same
  • 2:12 - 2:15
    levels of racism and discrimination
  • 2:15 - 2:18
    that she experienced as a child growing
  • 2:18 - 2:19
    up.
  • 2:19 - 2:22
    And so when I was, I think three or four
  • 2:22 - 2:22
    years
  • 2:22 - 2:26
    old, my mother said to my grandmother,
  • 2:26 - 2:27
    who she looked after us a lot. She
  • 2:27 - 2:29
    said look that's it, we're not speaking
  • 2:29 - 2:30
    any Chinese anymore,
  • 2:30 - 2:34
    English only. So I really only know
  • 2:34 - 2:35
    enough
  • 2:35 - 2:38
    Cantonese to get by at Yum Cha. I know
  • 2:38 - 2:39
    that I want to eat
  • 2:39 - 2:42
    ha gao, cha siu bao,
  • 2:42 - 2:46
    pai gwat, dan tats. I know that I don't want
  • 2:46 - 2:47
    to eat the fung jao which is
  • 2:47 - 2:50
    the chicken foot, but really that's the
  • 2:50 - 2:51
    extent of
  • 2:51 - 2:54
    my Chinese language skills, so that's
  • 2:54 - 2:55
    enough about me.
  • 2:55 - 2:59
    I've been a tiny bit busy recently,
  • 2:59 - 3:02
    I've just won the national teaching
  • 3:02 - 3:03
    excellence award
  • 3:03 - 3:06
    for the business, economics law and
  • 3:06 - 3:07
    related
  • 3:07 - 3:09
    category. I'll have a video more on that
  • 3:09 - 3:11
    a little bit later because I'm doing a
  • 3:11 - 3:12
    big speech,
  • 3:12 - 3:13
    a whole lot of other things, so I was
  • 3:13 - 3:15
    really excited to
  • 3:15 - 3:18
    receive that. And all of you out there in
  • 3:18 - 3:20
    YouTube land were a really big part of
  • 3:20 - 3:21
    that as well, so
  • 3:21 - 3:23
    I did a survey a little while ago asking
  • 3:23 - 3:25
    about whether you thought the resources
  • 3:25 - 3:26
    were high quality
  • 3:26 - 3:28
    and some feedback and a lot of those
  • 3:28 - 3:30
    quotes and a lot of those
  • 3:30 - 3:32
    pieces of information made it into my
  • 3:32 - 3:34
    application so thank you
  • 3:34 - 3:36
    so much to everybody that's out there
  • 3:36 - 3:38
    that filled in that survey.
  • 3:38 - 3:41
    For everyone who's new, welcome! I love
  • 3:41 - 3:42
    audit,
  • 3:42 - 3:44
    and you'll hear that, you'll see that in
  • 3:44 - 3:46
    everything that we do. So I'm just going
  • 3:46 - 3:49
    to switch camera positions a little bit
  • 3:49 - 3:51
    so that then I can have my writing
  • 3:51 - 3:54
    coming up here so just hang on.
  • 3:54 - 3:56
    So today we're getting into how do I
  • 3:56 - 3:58
    design an internal control? It's a really
  • 3:58 - 3:59
    common exam
  • 3:59 - 4:01
    question just to see that you can do the
  • 4:01 - 4:02
    other perspective.
  • 4:02 - 4:04
    And if you're studying management
  • 4:04 - 4:06
    accounting, how to design an internal
  • 4:06 - 4:08
    control can be really important because
  • 4:08 - 4:09
    management accounting is about,
  • 4:09 - 4:11
    number one doing accounting from within
  • 4:11 - 4:12
    the firm, but also
  • 4:12 - 4:15
    designing the management systems that
  • 4:15 - 4:16
    make sure that
  • 4:16 - 4:19
    everyone in the organization is working
  • 4:19 - 4:23
    together, moving in the same direction.
  • 4:23 - 4:25
    There are going to be four steps in our
  • 4:25 - 4:27
    process. So step number one
  • 4:27 - 4:32
    is going to be about identifying
  • 4:32 - 4:36
    the potential misstatement.
  • 4:37 - 4:41
    Now the reason that we need to do this
  • 4:41 - 4:47
    is that remember a control is a response
  • 4:47 - 4:50
    to a risk. So essentially we have to
  • 4:50 - 4:52
    identify the risk. What is the potential
  • 4:52 - 4:53
    misstatement,
  • 4:53 - 4:56
    the potential error that could occur? So
  • 4:56 - 4:56
    that's
  • 4:56 - 5:01
    step number one. Then step number two,
  • 5:01 - 5:02
    And I'm going to just move that up a
  • 5:02 - 5:04
    little bit, is
  • 5:04 - 5:06
    we have to ask ourselves the question, do
  • 5:06 - 5:07
    we want to
  • 5:07 - 5:11
    prevent the issue from happening or
  • 5:11 - 5:14
    are we trying to detect an error
  • 5:14 - 5:18
    afterwards? So in a lot of circumstances
  • 5:18 - 5:21
    where it's a control around a process,
  • 5:21 - 5:22
    I want to try and prevent, right?
  • 5:22 - 5:24
    Prevention is always better than a cure.
  • 5:24 - 5:25
    So you have to think am I going to
  • 5:25 - 5:26
    prevent
  • 5:26 - 5:29
    or do I want to detect. Now detecting is
  • 5:29 - 5:30
    about
  • 5:30 - 5:31
    picking up that there's a mistake
  • 5:31 - 5:34
    perhaps after a process has happened.
  • 5:34 - 5:36
    So you have a manufacturing process,
  • 5:36 - 5:39
    you're making a good and then
  • 5:39 - 5:42
    there is quality control. So you know you
  • 5:42 - 5:43
    have everything in the process, the
  • 5:43 - 5:44
    machines doing the right things, checking
  • 5:44 - 5:46
    their parts.
  • 5:46 - 5:49
    And the quality control at the end is to
  • 5:49 - 5:49
    make sure
  • 5:49 - 5:52
    that you detect any issues before they
  • 5:52 - 5:54
    go out, you know the product goes out to
  • 5:54 - 5:55
    the customer. So you have to think
  • 5:55 - 5:57
    do I want to try and prevent or do I
  • 5:57 - 5:58
    want to try and detect.
  • 5:58 - 6:00
    Now I'm going to do this with a live
  • 6:00 - 6:02
    example as well after, so I'm just going
  • 6:02 - 6:03
    to go through the theory first.
  • 6:03 - 6:06
    So part one, identify the potential
  • 6:06 - 6:09
    misstatement, so what is the risk?
  • 6:09 - 6:12
    Part two, am I thinking about preventing
  • 6:12 - 6:14
    or detecting?
  • 6:14 - 6:20
    Then, you actually need to design
  • 6:20 - 6:24
    an effective
  • 6:25 - 6:28
    and efficient
  • 6:31 - 6:34
    internal control. Now what do I mean by
  • 6:34 - 6:34
    effective?
  • 6:34 - 6:37
    Effective, I mean, that it has to work. It
  • 6:37 - 6:38
    has to prevent
  • 6:38 - 6:41
    the error that you've got. And when I say
  • 6:41 - 6:42
    efficient,
  • 6:42 - 6:45
    I mean that efficient is it's not going
  • 6:45 - 6:46
    to cost us too much resources
  • 6:46 - 6:49
    because remember when it comes to
  • 6:49 - 6:50
    internal controls
  • 6:50 - 6:53
    you have to think about the cost versus
  • 6:53 - 6:54
    the benefit.
  • 6:54 - 6:57
    So, in a supermarket, to make sure that
  • 6:57 - 6:58
    people don't
  • 6:58 - 7:01
    steal from a supermarket, I could make
  • 7:01 - 7:02
    every single person have to go through
  • 7:02 - 7:03
    an airport
  • 7:03 - 7:05
    x-ray screening type of thing when they
  • 7:05 - 7:07
    leave the store.
  • 7:07 - 7:10
    That would be very, very beneficial,
  • 7:10 - 7:13
    however, it would cost a lot in terms of
  • 7:13 - 7:14
    time
  • 7:14 - 7:18
    for my customers, effort
  • 7:18 - 7:22
    to get it done, and also
  • 7:22 - 7:25
    it would be really expensive, okay?
  • 7:25 - 7:28
    So I need to balance the benefit
  • 7:28 - 7:30
    of preventing or detecting a
  • 7:30 - 7:32
    misstatement with the cost.
  • 7:32 - 7:33
    So you got to think about that in
  • 7:33 - 7:35
    your design. Now
  • 7:35 - 7:37
    also, when you're thinking about the
  • 7:37 - 7:40
    design, you have to consider whether you
  • 7:40 - 7:41
    want
  • 7:41 - 7:44
    a manual control, so somebody physically
  • 7:44 - 7:48
    doing something, versus some sort of
  • 7:48 - 7:51
    automated or
  • 7:51 - 7:55
    IT or systems
  • 7:56 - 7:58
    based solution, okay? Because if you do
  • 7:58 - 7:59
    have
  • 7:59 - 8:01
    something that needs a manual control,
  • 8:01 - 8:03
    remember humans can make mistakes.
  • 8:03 - 8:05
    With an automated system you've got to
  • 8:05 - 8:06
    be really careful because
  • 8:06 - 8:08
    if you don't program the system
  • 8:08 - 8:10
    correctly, it can still make a mistake so
  • 8:10 - 8:11
    if you don't program it correctly it
  • 8:11 - 8:12
    could still
  • 8:12 - 8:15
    go wrong. So our
  • 8:15 - 8:18
    fourth thing that we want to think about
  • 8:18 - 8:21
    is monitoring,
  • 8:22 - 8:24
    all right? Are we doing something to
  • 8:24 - 8:26
    check the control?
  • 8:26 - 8:28
    Essentially we need to make sure that we
  • 8:28 - 8:29
    are
  • 8:29 - 8:32
    checking the
  • 8:32 - 8:35
    operation
  • 8:36 - 8:41
    of the control.
  • 8:41 - 8:43
    Okay, a really great example of that
  • 8:43 - 8:45
    monitoring aspect
  • 8:45 - 8:48
    is if we have a bank and you go with
  • 8:48 - 8:50
    your card,
  • 8:50 - 8:54
    and I have one in my pocket actually,
  • 8:54 - 8:58
    so here's my card for my bank account.
  • 8:58 - 9:01
    I go to the ATM, I put it in, I get the
  • 9:01 - 9:01
    pin wrong.
  • 9:01 - 9:04
    Oh okay, that's the wrong pin. I remember
  • 9:04 - 9:05
    the right pin, I put it in.
  • 9:05 - 9:08
    The bank at the end of the day, will get
  • 9:08 - 9:09
    a report
  • 9:09 - 9:11
    that says what are all the cards where
  • 9:11 - 9:13
    an incorrect pin was entered
  • 9:13 - 9:16
    or perhaps an incorrect pin was entered
  • 9:16 - 9:16
    more than
  • 9:16 - 9:19
    three times or we actually chewed up the
  • 9:19 - 9:20
    card.
  • 9:20 - 9:22
    So we want to check that the control is
  • 9:22 - 9:24
    operating effectively. We want to check
  • 9:24 - 9:25
    that the operation of the control is
  • 9:25 - 9:27
    working because remember,
  • 9:27 - 9:32
    we know that when the control
  • 9:32 - 9:35
    stops working,
  • 9:35 - 9:38
    what happens? My regular viewers will
  • 9:38 - 9:41
    know this. When the control stops working
  • 9:41 - 9:44
    then we have an increased risk
  • 9:44 - 9:52
    of errors and misstatements,
  • 9:52 - 9:53
    all right? And we definitely don't want
  • 9:53 - 9:55
    that. We don't want to have misstatements
  • 9:55 - 9:56
    going
  • 9:56 - 9:59
    into the financial records and
  • 9:59 - 9:59
    the
  • 9:59 - 10:02
    accounting of the firm. So to recap,
  • 10:02 - 10:04
    I'm going to scroll quickly back up.
  • 10:04 - 10:07
    Number one, identify the potential
  • 10:07 - 10:08
    misstatements.
  • 10:08 - 10:10
    Number two, decide whether you want to
  • 10:10 - 10:12
    prevent or detect.
  • 10:12 - 10:16
    Number three, design an effective
  • 10:16 - 10:18
    and efficient internal control, thinking
  • 10:18 - 10:20
    about the cost versus the benefit.
  • 10:20 - 10:22
    That cost could be the time it takes, the
  • 10:22 - 10:23
    dollars
  • 10:23 - 10:25
    to actually implement it, the effort it
  • 10:25 - 10:26
    might take.
  • 10:26 - 10:28
    Think about whether you want manual or
  • 10:28 - 10:31
    automated systems.
  • 10:31 - 10:33
    And then consider the monitoring. What
  • 10:33 - 10:36
    are we doing to monitor this control
  • 10:36 - 10:38
    to make sure that it's always working? Is
  • 10:38 - 10:39
    it if something goes wrong a system
  • 10:39 - 10:41
    flags with us.
  • 10:41 - 10:44
    So now let's look at a practical example.
  • 10:44 - 10:46
    So in my practical example, I'm going to
  • 10:46 - 10:48
    think about
  • 10:48 - 10:51
    a retail operation. And I'm using a
  • 10:51 - 10:52
    retail operation
  • 10:52 - 10:55
    because it's something that we can
  • 10:55 - 10:57
    imagine in our minds, we've all been
  • 10:57 - 10:59
    shopping to a store. Now I need to find
  • 10:59 - 11:01
    something, oh let's just, I have a
  • 11:01 - 11:02
    notebook here.
  • 11:02 - 11:05
    So a big thank you to Microsoft for
  • 11:05 - 11:06
  • 11:06 - 11:07
    they sent me a notebook the other day.
  • 11:07 - 11:09
    I'm an MIE expert which is a Microsoft
  • 11:09 - 11:10
    Innovative
  • 11:10 - 11:12
    Educator expert and I got a little
  • 11:12 - 11:14
    goodie bag from them and it includes a notebook.
  • 11:14 - 11:15
    So say we're
  • 11:15 - 11:18
    a retail operation and we're selling
  • 11:18 - 11:20
    fancy notebooks. So let's say this is
  • 11:20 - 11:21
    like, you know, it's leather and it's
  • 11:21 - 11:22
    really fancy.
  • 11:22 - 11:25
    So what is the risk? So let's start with
  • 11:25 - 11:26
    step one.
  • 11:26 - 11:30
    The risk is going to be
  • 11:30 - 11:33
    theft of inventory,
  • 11:34 - 11:36
    all right? If people steal the inventory
  • 11:36 - 11:37
    they're not buying it and we're not
  • 11:37 - 11:39
    making revenue, so we've got our risk
  • 11:39 - 11:43
    of misstatement, is a theft of inventory.
  • 11:43 - 11:45
    And we might also have the, so let's talk
  • 11:45 - 11:47
    about the theft of inventory risk.
  • 11:47 - 11:52
    So then I have to think prevent
  • 11:52 - 11:55
    or detect so that's P or D. In this one, I
  • 11:55 - 11:56
    definitely want
  • 11:56 - 11:59
    to try and prevent theft, okay? I don't
  • 11:59 - 12:00
    want to detect the theft
  • 12:00 - 12:02
    after it's happened, I want to try and
  • 12:02 - 12:04
    prevent people from stealing
  • 12:04 - 12:08
    my item from my store, so prevent or
  • 12:08 - 12:08
    detect.
  • 12:08 - 12:12
    Now number three comes the actual part
  • 12:12 - 12:12
    of
  • 12:12 - 12:15
    designing the internal control. Well I
  • 12:15 - 12:16
    want something
  • 12:16 - 12:18
    that will stop people from stealing my
  • 12:18 - 12:20
    product. I got a couple of different
  • 12:20 - 12:21
    options
  • 12:21 - 12:24
    here. And it might be that I might need
  • 12:24 - 12:27
    to have multiple things in place.
  • 12:27 - 12:31
    I could have security cameras,
  • 12:31 - 12:33
    all right? But if i have security cameras
  • 12:33 - 12:34
    someone's going to need to be watching
  • 12:34 - 12:37
    them, so if i have security cameras
  • 12:37 - 12:41
    that could be a deterrent potentially.
  • 12:41 - 12:46
    I could also have RFID
  • 12:46 - 12:49
    stickers
  • 12:49 - 12:54
    on the inventory,
  • 12:54 - 12:56
    all right? So an RFID sticker or one of
  • 12:56 - 12:58
    those security tags, so
  • 12:58 - 12:59
    often it could be like a little sticker
  • 12:59 - 13:01
    that's placed on an individual item or
  • 13:01 - 13:03
    it could be a big removable tag. So if
  • 13:03 - 13:04
    you bought clothing
  • 13:04 - 13:06
    from a department store often those will
  • 13:06 - 13:08
    have like a big tag on it
  • 13:08 - 13:10
    that the sales checkout person will have
  • 13:10 - 13:11
    to remove. So
  • 13:11 - 13:14
    an RFID sticker or some sort of security
  • 13:14 - 13:16
    tag,
  • 13:16 - 13:19
    or security tag.
  • 13:19 - 13:22
    Now given that this is a book, like
  • 13:22 - 13:24
    a hole, I don't want to punch a hole in
  • 13:24 - 13:26
    my notebook for the tag,
  • 13:26 - 13:28
    so a little RFID sticker might be a good
  • 13:28 - 13:30
    idea and that's why a lot of stuff comes
  • 13:30 - 13:34
    shrink wrapped in plastic. That is
  • 13:34 - 13:35
    just so
  • 13:35 - 13:37
    that they can then stick the RFID
  • 13:37 - 13:39
    sticker on there and it's come a long
  • 13:39 - 13:40
    way.
  • 13:40 - 13:41
    The old days RFID stickers were really
  • 13:41 - 13:43
    expensive, now I'm seeing supermarkets
  • 13:43 - 13:44
    even,
  • 13:44 - 13:46
    use them on things like expensive meat
  • 13:46 - 13:47
    products. So
  • 13:47 - 13:50
    I've got my security cameras. I've got my
  • 13:50 - 13:53
    RFID stickers.
  • 13:53 - 13:55
    I'm going to have, with the RFID
  • 13:55 - 13:56
    sticker,
  • 13:56 - 14:01
    needed with that is going to be the RFID
  • 14:01 - 14:04
    detectors
  • 14:04 - 14:08
    at the store, woops
  • 14:08 - 14:12
    can't spell store, entry exit.
  • 14:12 - 14:13
    That is also why a lot of stores will
  • 14:13 - 14:16
    only have one entry exit point
  • 14:16 - 14:18
    so that they can put those big gates up
  • 14:18 - 14:20
    and often you will see those gates will
  • 14:20 - 14:22
    be covered in advertising and things so
  • 14:22 - 14:24
    you don't notice that it's there. So
  • 14:24 - 14:24
    you've got
  • 14:24 - 14:27
    your RFID, your stickers, etc.
  • 14:27 - 14:33
    The last thing that we might do is also
  • 14:33 - 14:36
    a store bag check,
  • 14:37 - 14:38
    all right? So that when you leave the
  • 14:38 - 14:40
    store they say look,
  • 14:40 - 14:43
    can you open your bag, you know bags
  • 14:43 - 14:44
    of a bigger size
  • 14:44 - 14:47
    to make sure that that's happening. So
  • 14:47 - 14:51
    that's an example here for the fact that
  • 14:51 - 14:54
    we've got our theft. Let's do another
  • 14:54 - 14:56
    example. My next example is still going
  • 14:56 - 14:58
    to go back to my notebooks,
  • 14:58 - 15:02
    but my risk is going to be
  • 15:02 - 15:08
    the risk of charging the customer
  • 15:08 - 15:11
    the wrong price, right? And that
  • 15:11 - 15:14
    is going to result, for us, in inaccurate
  • 15:14 - 15:16
    sales. So that's affecting our accuracy
  • 15:16 - 15:17
    assertion.
  • 15:17 - 15:20
    Now of course, in terms of prevention or
  • 15:20 - 15:23
    detection, I want to try and
  • 15:23 - 15:26
    prevent, okay? Then coming
  • 15:26 - 15:29
    into the control.
  • 15:29 - 15:31
    One thing that I could do and I can
  • 15:31 - 15:33
    remember the days where when you went to
  • 15:33 - 15:34
    the supermarket,
  • 15:34 - 15:36
    you didn't actually have barcodes. There
  • 15:36 - 15:38
    was a little sticker that somebody
  • 15:38 - 15:39
    manually added to the product and then
  • 15:39 - 15:41
    you typed it in
  • 15:41 - 15:44
    into the cash register. So we could use
  • 15:44 - 15:46
    barcode scanning,
  • 15:46 - 15:50
    barcodes on good
  • 15:50 - 15:53
    and scan
  • 15:53 - 15:56
    at the register,
  • 15:56 - 15:59
    okay? So that's going to be my control.
  • 15:59 - 16:00
    Now,
  • 16:00 - 16:02
    in terms of the control it's very cheap,
  • 16:02 - 16:03
    it's efficient, you have to have,
  • 16:03 - 16:06
    obviously, a cash register system,
  • 16:06 - 16:08
    but the one thing that we want to do
  • 16:08 - 16:12
    here in terms of the monitoring,
  • 16:13 - 16:16
    all right? Is that we might want to do
  • 16:16 - 16:17
    something like
  • 16:17 - 16:23
    check price overrides,
  • 16:23 - 16:24
    all right? So if somebody tries to
  • 16:24 - 16:26
    override the price,
  • 16:26 - 16:28
    there's a couple of different options,
  • 16:28 - 16:29
    you could have you need
  • 16:29 - 16:32
    manager, whoops that's meant to be an r,
  • 16:32 - 16:33
    manager
  • 16:33 - 16:37
    to approve any price overrides
  • 16:37 - 16:39
    or at the end of the day, you could have
  • 16:39 - 16:43
    a daily report
  • 16:43 - 16:45
    about those overrides. And that's really
  • 16:45 - 16:46
    common in retail stores where they'll
  • 16:46 - 16:47
    say okay,
  • 16:47 - 16:49
    give me the end of day report, oh
  • 16:49 - 16:50
    yeah this was overwritten because this
  • 16:50 - 16:51
    was damaged,
  • 16:51 - 16:53
    this person had an extra discount, this
  • 16:53 - 16:55
    was the manager's discretion,
  • 16:55 - 16:57
    so you want to monitor how many prices
  • 16:57 - 16:59
    were incorrect.
  • 16:59 - 17:00
    Often there's also a thing that says
  • 17:00 - 17:02
    oh look if the shelf says
  • 17:02 - 17:05
    five dollars, but your thing says ten
  • 17:05 - 17:06
    dollars you get whatever the shelf
  • 17:06 - 17:08
    price is, so that could be one of your
  • 17:08 - 17:10
    override codes.
  • 17:10 - 17:13
    Now I realized back here when I was
  • 17:13 - 17:14
    designing the controls for
  • 17:14 - 17:18
    the risk of theft. Then,
  • 17:18 - 17:21
    the store bag check
  • 17:21 - 17:23
    could be one of those monitoring
  • 17:23 - 17:24
    controls, so I realized I forgot there that I
  • 17:24 - 17:26
    forgot to talk about the monitoring,
  • 17:26 - 17:30
    but the store bag check could also
  • 17:31 - 17:35
    be part of that monitoring process.
  • 17:35 - 17:38
    I hope that that clarifies to everybody
  • 17:38 - 17:43
    how you can design an internal control
  • 17:43 - 17:45
    and remember to take it step by step.
  • 17:45 - 17:46
    Think about the risk,
  • 17:46 - 17:49
    do I want to prevent or detect, what are
  • 17:49 - 17:51
    the control activities that I could do,
  • 17:51 - 17:53
    automated or manual or with our systems
  • 17:53 - 17:55
    or a combination of both,
  • 17:55 - 17:57
    and then what am I going to put in place
  • 17:57 - 18:00
    to monitor to make sure that control
  • 18:00 - 18:02
    works properly. So I want to thank you
  • 18:02 - 18:03
    for watching this video. Of course, if you
  • 18:03 - 18:06
    haven't already considered subscribing.
  • 18:06 - 18:08
    For all of those internal auditors out
  • 18:08 - 18:10
    there, you might want to check out
  • 18:10 - 18:11
    auditopia. It's a new
  • 18:11 - 18:13
    internal audit community that I'm
  • 18:13 - 18:15
    involved with.
  • 18:15 - 18:17
    It has free resources that people are
  • 18:17 - 18:18
    sharing,
  • 18:18 - 18:20
    internal audit checklists, and
  • 18:20 - 18:22
    documentation.
  • 18:22 - 18:25
    And we've also got regular webinars to
  • 18:25 - 18:26
    help you become
  • 18:26 - 18:28
    a better internal auditor. I'm really
  • 18:28 - 18:31
    excited to be part of the auditopia team.
  • 18:31 - 18:33
    I'll be working with them to create some
  • 18:33 - 18:35
    content for some courses
  • 18:35 - 18:37
    that they're going to have. Big thank you,
  • 18:37 - 18:39
    I want everybody to stay safe,
  • 18:39 - 18:41
    stay well, I've checked myself on the
  • 18:41 - 18:43
    vaccination schedule, I'm hopefully
  • 18:43 - 18:45
    going to be vaccinated in September or
  • 18:45 - 18:47
    October of this year,
  • 18:47 - 18:49
    so I'm really excited about that. But,
  • 18:49 - 18:51
    stay safe, stay well wherever you are
  • 18:51 - 18:58
    and I'll see you next time.
  • 18:58 - 19:12
    [Music]
  • 19:12 - 19:14
Title:
4 steps to design INTERNAL CONTROLS
Description:

more » « less
Video Language:
English
Duration:
19:13

English subtitles

Revisions Compare revisions