2014. Today s Agenda

7/17/2014 Internal Controls:  LCEC’s Case Study &  an External Auditor’ss Perspective an External Auditor Perspective Presented by: Peggy Boldissar ...
Author: Amber Sims
28 downloads 0 Views 368KB Size
7/17/2014

Internal Controls:  LCEC’s Case Study &  an External Auditor’ss Perspective an External Auditor Perspective

Presented by: Peggy Boldissar & Heidi Lee August, 2014 NSAC Tax & Accounting Conference

Presenters Peggy Boldissar, 

Heidi Lee, CPA

Manager of Financial  Accounting

Jackson Thornton

Principal

LCEC LCEC  (Lee County Electric  Cooperative) Ph. (239) 656‐2117 Fax (239) 656‐2256 [email protected]

Ph. (334) 240‐3669 Fax (334) 956‐5069 [email protected]

Today’s Agenda • LCEC: a case study in evaluating internal  controls (Peggy Boldissar) • Internal Controls: an audit perspective  (Heidi Lee)

1

7/17/2014

About LCEC  Electric Transmission & Distribution Cooperative  5‐County area in Southwest Florida  Serve approx. 200,000 customers  In business since 1940 In business since 1940  # of Full‐time Employees (Equivalents) approx. 400  230 miles of Transmission, 6,120 miles of Overhead  Distribution, 1,769 miles of Underground  Distribution  https://www.lcec.net/

Guidelines for Best Practices   

COSO (Committee of Sponsoring Organizations of  the Treadway Commission)  SOX 404 (Section 404 of the 2002 Sarbanes‐Oxley  Act)) Electric Utility Industry practices

From  COSO

2

7/17/2014

Internal Control Defined “Internal control is a process, effected by an entity’s  board of directors, management, and other  personnel, designed to provide reasonable assurance  regarding the achievement of objectives in the  following categories: 1) Effectiveness and efficiency of operations. 2) Reliability of reporting. 3) Compliance with applicable laws and  regulations.” From:  http://www.coso.org/documents/coso_framework_body_v 6.pdf

General triggers for assessment • Processes that are suspected of containing  significant deficiencies or material weaknesses • Processes about which little information is  available • Recent merger & acquisition activity • Implementation of new computer systems • Changes in staffing, policies, or procedures • Reported audit findings (internal or external)

LCEC‐specific triggers for assessment • New budgeting and new accounting system  implementations within 2‐year time frame • Substantial change in many business  processes as a result of new systems processes as a result of new systems • Change in some accounting staff members  (some long‐time employees left Finance  Department)

3

7/17/2014

LCEC Functional Areas Evaluated • • • • • • • •

Financial Reporting Accounts Payable Cash Management and Treasury Budgeting Purchasing Inventory Billing and Collections Plant Accounting

* Payroll not evaluated (is an HR function @ LCEC)

LCEC Project Plan  Departmental Project initiated titled “Financial Accounting  Departmental Analysis, Assessment, and Recommendation of  Internal Controls”  Followed LCEC’s PMO (Project Management Office) project  methodology  Project Plan developed to address project:  Business Case Business Case  Scope   Objectives/Deliverables  Measures of success  Project team (Accounting/Finance staff, IT PMO staff)  Project schedule (4 months) Sought out   Budget Student Intern   Project risk plan from FGCU to  assist  Project communications plan

LCEC Project Research  Main documentation used:  “Accounting Best Practices” by Steven Bragg (textbook)   Sample Internal Control Questionnaires from different  sources  Internal Control Checklists  Internal Control Best Practice Documentation  LCEC Policies and Procedures for Functional Areas  LCEC Internal Control Documentation  LCEC Financial Statement Audit Reports

4

7/17/2014

LCEC Project Steps Used documentation to:  Evaluate internal controls for each functional area  Staff completed questionnaires, follow‐up meetings held

 Identify important controls necessary for LCEC  Ensure best practice controls were in place for each  E b t ti t l i l f h functional area, identify gaps and recommend new  controls based upon risk assessments  Prepare cost‐benefit analysis of implementation if new  control was to be recommended  Analyze and document the risks of not implementing a  control that was considered best practice

5 Best Practices Evaluated for  Effectiveness of each Control Authorization Documentation Reconciliation

Gaps  Identified

Security Separation of Duties

Risk Assessment Performed  Five Steps Followed:

Then Categorized:

• Identify • Decide • Evaluate • Record • Review

• High Risk • Medium Risk • Low Risk

5

7/17/2014

Generalized Findings Gaps Identified by Category Total Gaps = 56 19

4

33

High

Medium

Low

Number of Gaps Identified by Category 20 18 16 14 12 10 8 6 4 2 0

High

Medium

Low

Case Study Conclusions • High risk items – recommended controls were  implemented a.s.a.p. • Medium/Low risk items – low‐hanging  opportunities addressed and implemented • Remaining Medium/Low risk items – Remaining Medium/Low risk items under  under further analysis or tabled, mitigating controls  considered • Monitoring processes implemented for  continuous improvement of existing controls • Risk categorization was subjective, and could vary  depending upon perspectives

6

7/17/2014

Questions

Reducing Fraud Risk in an Increasingly Paperless Environment Heidi Lee, CPA | Jackson Thornton

Disclaimer The information contained herein is general in nature and based on authorities that are subject to change. Jackson Thornton guarantees neither the accuracy nor completeness of any information and is not responsible for any errors or omissions, or for results obtained by others as a result of reliance upon such information. Jackson Thornton assumes no obligation to inform the reader of any changes in tax laws or other factors that could affect information contained herein. This publication does not, and is not intended to, provide legal, tax or accounting advice, and readers should consult their tax advisors concerning the application of tax laws to their particular situations. Circular 230 Disclosure This analysis is not tax advice and is not intended or written to be used, and cannot be used, for purposes of avoiding tax penalties that may be imposed on any taxpayer.

7

7/17/2014

Considering Fraud Risk Areas  Can you really teach me to steal?  Who is responsible?  Where did all the paper go?  The good old day The good old day  Risk areas  No worries, we’re bonded.  How do we reduce risk?

Can you really teach me to steal?

Well only if you promise not to Well … only if you promise not to.

Board Responsibilities • Five groups – To customers – To lenders – To management To management – To employees – To owners or stakeholders

8

7/17/2014

Board Responsibilities • • • •

Appropriate policies Hiring top management Good service Appropriate rates Appropriate rates • Adequate to meet debt covenants • Adequate to appropriately staff system • Reasonable to customer

• Fiscal responsibility • System for reporting known or suspected fraud

Management Responsibilities • Implementation of policies established by the Board • Appropriate work environment for employees • Appropriate internal control to provide asset safeguards • Adequate quantity of staff • Appropriate qualifications of staff

• Appropriate software  • To maintain required accounting records • To safeguard client information

• Financial reporting • Financial statements • Budgets • Rate recommendations

Appropriate Internal Controls Designing internal control • Controls that prevent fraud • Controls that deter fraud • Controls that detect fraud Controls that detect fraud

9

7/17/2014

Appropriate Software • • • •

Financial reporting Customer information Security Physical access y

The Good Old Day • • • •

Internal control designed Assets are protected Reputation is protected How long does a well‐designed internal control last? How long does a well‐designed internal control last?

Where did all the paper go? • • • • •

Checks Deposit slips Payroll checks Inventory receiving reports Inventory receiving reports Spreads ‐ overhead and transportation costs Controlling physical access was key

10

7/17/2014

Fraud Categories • Asset misappropriations • Corruption • Fraudulent statements

Asset Misappropriation • Theft or misuse of an organization’s assets • Skimming revenues • Stealing inventory • Payroll fraud

Corruption • Misuse of  influence  • To procure some benefit  • For themselves or another person, contrary to  their duty • Accepting kickbacks A i ki kb k • Engaging in conflicts of interest

11

7/17/2014

Fraudulent Statements • Falsification of an organization’s financial  statements • Overstating revenues • Understating liabilities or expenses

Risk Areas

Revenue, Billing and Accounts Receivable • • • •

Billing adjustments Billing adjustments and cash receipts Access to customer information Storage of customer banking and credit card  information

Risk Areas

Cash Receipts • Mail payments • Over‐the‐counter payments • Cash and checks • Access to mail payments

• Electronic drafts • Credit cards

12

7/17/2014

Risk Areas Cash Management • Bank deposits • Currency versus checks

• Wire transfers between internal accounts • Wire transfers to vendors • Reconciling bank accounts • Reviewed • To the penny • Timely

Risk Areas Cash Disbursements & Accounts Payable • Establishment of vendor • Access to vendor details • Establishment of accounts payable • Approval of accounts payable for payment • Preparation, signing, and mailing of checks

Risk Areas Payroll • Communication of company policies and  expectations • Granting access to the information system • Strict IT policies that are enforced l h f d • Access to employee information

13

7/17/2014

No Worries – We’re Bonded

• When does bonding pay?  • When you prosecute! – Will your controls prove that you tried to  prevent theft? – Can your records stand the scrutiny? – How will it look on the front page of the  paper? – What is my company’s reputation worth?

How do we reduce risk?

Tone at the Top • Goes beyond the code of ethics p • Creates positive work environment • Increases deterrence effectiveness

How do we reduce risk? Brainstorm • Conduct session at least annually • Think like a perpetrator • Address vulnerable areas

14

7/17/2014

Vulnerable Areas

Which assets are most susceptible to  misappropriation? The answer will vary slightly from  organization to organization, but the most  common ones are: – Cash – Inventory – Assets easily converted into cash – Equipment that is readily marketable

How do we reduce risk?

Effective Monitoring • Internal Audit – employees or contract • Have an outsider review your controls • Anonymous Tip Hotline

How do we reduce risk?

Regulations & Laws • Competitive Bids y g • Lobbying & Gifts • Private Use of Public Assets

15

7/17/2014

Elements for an effective program • Tone at the top: Create an expectation in the  workplace • Brainstorm: Think like a thief • Policy: Give employees an opportunity to report Monitor: Don’tt just establish controls  just establish controls – test  test • Monitor:  Don controls – – – –

Internal audit External audit Special engagements Compliance with the law

Ask us more about internal controls: Peggy Boldissar  Manager of Financial Accounting | LCEC 239.656.2117 [email protected] Heidi H. Lee, CPA Principal  |  Jackson Thornton 334.240.3669  [email protected] jacksonthornton.com 

16