You are on page 1of 1

COSO Control Activities

Control activities are performed at all levels of the entity, at various stages within business
processes, and over the technology environment. They may be preventive or detective in
nature and may encompass a range of manual and automated activities such as
authorizations and approvals, verifications, reconciliations, and business performance
reviews

Today we will continue with the COSO are identified and assessed, the onus is on Outsourcing to a Third Party, Considering activities, including control activities over documented and implemented as
framework and we will be looking at the management and board of the entity the Types of Control Activities, technology, that contribute to the policies. These policies, after being
Control Activities which is the third of the to establish control activities that would Considering Alternative Control mitigation of risks to the achievement of developed, can be cascaded throughout
five (5) integrated components of COSO. eliminate these risks or reduce their Activities to the Segregation of Duties, objectives to acceptable levels. This the organization by leaders in various
Under this component, we will be looking occurrences to the barest minimum or at Identifying Incompatible Functions. principle however elaborates that even positions and parts of the entity. The
at three (3) principles of the seventeen (17) least an acceptable level. Matrices can be though the previous principles are policies, apart from being assessed on a
COSO principles that relates to control drawn up to indicate the risks that the Principle 10 - The organization selects important, their objectives would not be regular basis, should also be reviewed
activities. organization is exposed to as well as the and develops general control activities fulfilled except they are properly when there is a specific need for such.
controls that can be put in place to limit over technology to support the Approaches to applying this principle
Control Activities: Control activities are them. Also, authorization limits can be set achievement of objectives: include Developing and Documenting
the actions established through policies to reduce the entity's exposure to the Since the advent of technology, a lot of Policies and Procedures, Deploying
and procedures that help ensure that possibilities of one man's fraudulent business processes have become Control Activities through Business Unit
management's directives to mitigate risks activities. Duties can be duly segregated computerized and automated. However, or Functional Leaders, Conducting
to the achievement of objectives are
carried out. Control activities are
to prevent one man seeing through all even though technology works to a very
high level of accuracy, its outputs are
Once the Risk Regular and Ad Hoc Assessments of
stages of a transaction. These can, at Control Activities. Although these
performed at all levels of the entity, at least, limit the occurrences of fraudulent based on the inputs fed into it. As a
result, there are risks of producing
Assessment approaches are recommended by the
various stages within business processes, practices even if it does not totally Framework, they should not be seen as
and over the technology environment. eradicate them. inaccurate outputs through errors and
misstatement in the input. There is
component is an exhaustive list. An entity may take
They may be preventive or detective in An entity can employ several approaches steps of its own, especially when not
nature and may encompass a range of to meet this principle such as Using therefore just as much need to place implemented and the addressed by the Framework.
manual and automated activities such as Matrices, Workshops, or an Inventory of controls around the electronic business
authorizations and approvals, Control Activities to Map Identified Risks process as there is over the risks which threaten
verifications, reconciliations, and business to Control Activities, Implementing or manual/people operated processes. For
performance reviews. Segregation of Monitoring Control Activities when that reason, duties can also be the achievement of
duties is typically built into the selection segregated amongst d ifferent
and development of control activities. personnel, so one person does not the entity's objectives
handle too many processes. One person
Where segregation of duties is not
practical, management selects and could be made to input transactions are identified and
develops alternative control activities. Since the advent of while another person would have the
duty of authorizing the transaction. This
assessed, the onus is
For the Control Activities component, technology, a lot of provides a level risk mitigation and on the management
1. The organization selects and develops confidence in reports but this is only
control activities that contribute to the business processes subject to avoidance of collusion among and board of the
mitigation of risks to the achievement these personnel. Oduware is the partner-in-charge of
of objectives to acceptable levels. have become entity to establish Accounting and Financial Advisory
2. The organization selects and develops The Framework provides entity's willing in Akintola Williams Deloitte
general control activities over computerized and to apply it with the following approaches control activities that
technology to support the to achieving this principle. They include This publication contains general
achievement of objectives. automated. However, Using Risk and Control Matrices to would eliminate these information only and Akintola Williams
Document Technology Dependencies, Deloitte is not, by means of this
3. The organization deploys control
activities through policies that establish
even though Evaluating End-User Computing, risks or reduce their publication, rendering accounting,
Implementing or Monitoring Control business, financial, investment, legal, tax,
what is expected and in procedures
that put policies into action.
technology works to Activities when Outsourcing IT Functions occurrences to the or other professional advice or services.

The Framework recommends certain


a very high level of to a Third Party, Configuring the IT
Infrastructure to Support Restricted barest minimum or at Deloitte refers to one or more of Deloitte
Touche Tohmatsu Limited, a UK private
approaches to the application of these
principles. It should however be noted
accuracy, its outputs Access and Segregation of Duties,
Configuring IT to Support the Complete, least an acceptable company limited by guarantee (DTTL),
its network of member firms, and their
that these approaches are not exhaustive,
therefore the entity can also take steps to
are based on the Accurate, and Valid Processing of
Transactions and Data, Administering level. Matrices can be
related entities. DTTL and each of its
member firms are legally separate and
independent entities. DTTL (also referred
achieve these principles where there are inputs fed into it. As a Security and Access, Applying a System
drawn up to indicate to as Deloitte Global) does not provide
no relevant approaches recommended by Development Life Cycle over Packaged services to clients. Please see
the Framework. result, there are risks Software, Applying a System the risks that the www.deloitte.com/about for a more
Development Life Cycle over Software detailed description of DTTL and its
Principle 9 - The organization selects and of producing Developed In-House. organization is member firms.
develops control activities that contribute
to the mitigation of risks to the inaccurate outputs Principle 11 - The organization deploys exposed to as well as Akintola Williams Deloitte a member firm
of Deloitte Touche Tohmatsu Limited,
achievement of objectives to acceptable control activities through policies that
levels: through errors and establish what is expected and the controls that can provides audit, tax, consulting,
accounting and financial advisory,
procedures that put policies into action:
Once the Risk Assessment component is misstatement in the The prior principles on Risk Assessment be put in place to corporate finance and risk advisory
services to public and private clients
implemented and the risks which threaten component state that the organization spanning multiple industries. Please visit
the achievement of the entity's objectives input should select and develop control limit them us at www.deloitte.com/ng

COSO: A Framework for enhancing Internal Control over Financial Reporting


The 2013 COSO Framework update provides an avenue for audit committees and management teams to have a fresh look at internal control and create
value in an organization. The framework can also help the regulators manage shareholders expectations as regards internal control over financial reporting.
At Deloitte we assist companies and regulators in performing the following:
1. Readiness/Gap Assessment
2. Education and Training
3. Implementation of COSO internal control framework
4. Review of operating effectiveness of internal control
For more information, call Jide Onabajo on +234 0 805 349 2055 or email to jonabajo@deloitte.com

You might also like