{"id":1232,"date":"2019-05-01T09:00:23","date_gmt":"2019-05-01T06:00:23","guid":{"rendered":"https:\/\/teolupus.com\/?p=1232"},"modified":"2023-10-26T10:33:38","modified_gmt":"2023-10-26T07:33:38","slug":"control-activities-policies","status":"publish","type":"post","link":"https:\/\/teolupus.com\/en\/control-activities-policies\/","title":{"rendered":"Control Activities: Deploying Policies &#038; Procedures"},"content":{"rendered":"\r\n<h2><b>Principle 12: Enforces through Policies and Procedures<\/b><\/h2>\r\n<p><span style=\"font-weight: 400;\">The organization controls actions through policies that set expectations and implement procedures.<\/span><\/p>\r\n<h2><b>Focus Points:<\/b><\/h2>\r\n<p><span style=\"font-weight: 400;\">The following focal points highlight essential features of this principle:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Establishes Policies and Procedures to Support the Transmission of Management&#8217;s Instructions &#8211; Management establishes control actions built into the daily actions of business processes and employees through policies that set expectations and procedures that determine appropriate actions.<\/span><\/li>\r\n<\/ul>\r\n<p><b>Policies: <\/b><span style=\"font-weight: 400;\">It reflects management&#8217;s explanations of what needs to be done to implement controls. These statements may be documented, explicitly stated in communications, or implied by management actions and decisions. Procedures consist of activities related to the implementation of this policy.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Control actions relate specifically to policies and procedures that will contribute to reducing risks to achieving objectives to acceptable levels. For example, a policy may require a retail branch manager to review customers&#8217; trades at a securities brokerage firm. The procedure is the review itself and is carried out promptly and with attention to the factors prescribed in the policy, such as the relationship between the nature and volume of the securities subject to the transaction and the net value and age of the securities held by the client.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Policies and procedures are usually communicated verbally. Unwritten policies can be effective in organizations where the policy has existed for a long time, and its application is understood, as well as in smaller organizations that have communication channels that involve a limited number of levels of management and where management can keep staff in close interaction and supervision. Although a cost-effective alternative for some organizations, unwritten policies, and procedures can be more easily circumvented, can also be more costly in organizations with high staff turnover, and can reduce accountability. \u00a0Policies and procedures are expected to be formally documented in case of external review.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Establishes Responsibility and Accountability for Implementation of Policies and Procedures &#8211;\u00a0Management exercises responsibility and accountability for control actions in conjunction with management (or other authorized personnel) of the business unit or function that contains the relevant risks.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">However, whether a policy is written or not, it should establish the responsibilities and accountability that ultimately belong to the management of the business and its subunit where the risks are located. In addition, policies must be implemented thoughtfully and fairly, and their procedures must be carried out diligently and consistently, on time, and by competent personnel.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Performs Control Actions promptly &#8211; Responsible personnel perform control actions promptly, as defined in the relevant policies and procedures.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">The timing of a control action and any subsequent corrective actions should be specified in the procedures. Untimely applied procedures may reduce the usefulness of the control action. For example, the relevant business process owner regularly reviews user accounts for improper access rights to reduce the risk of unauthorized access to an acceptable level. The longer the intervals between reviews, the greater the chance that unauthorized access will not be detected promptly.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Takes Corrective Action \u2013\u00a0Responsible personnel investigate problems identified as a result of implementing control actions and take necessary action.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">When carrying out a control action, problems identified for follow-up should be investigated and, if appropriate, corrective action taken as necessary. For example, let&#8217;s say a reconciliation between cash accounts detects a difference in one of the accounts. The accounting officer and the personnel responsible for keeping cash records investigate the difference and determine that a cash receipt has not been properly recorded in the accounting records. In this case, the cash receipt is processed again, and the account reconciliation reflects the correction.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Performs Control Actions Using Competent Personnel-\u00a0Performs control actions diligently and with constant focus, with the help of competent personnel with sufficient authority.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">A well-designed control action often cannot be implemented without personnel with sufficient authority to perform that control action. The level of competence required to complete a control action varies depending on factors such as the complexity of the control action and the complexity and volume of the underlying operations. Moreover, a procedure will not be applicable if it is implemented by rote and without a clear and constant focus on the risks covered by the relevant policy. Sufficient authority may be required to fully exercise all control aspects, such as taking corrective action.<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reassesses Policies and Procedures &#8211; Management periodically reviews control actions to determine whether they remain valid and renews them as necessary.<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Management should periodically re-evaluate policies, procedures, and related control actions for ongoing suitability and effectiveness, regardless of being sensitive to significant changes in the organization&#8217;s risks and objectives. Considerable differences are evaluated through the risk assessment process. Changes in people, processes, and technology may reduce the effectiveness of control actions or make some control actions unnecessary.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Whenever such changes occur, management should reassess the appropriateness of existing controls and replace them if necessary. For example, management may upgrade an ERP system&#8217;s purchasing module and begin implementing automated transaction control actions, making the old manual control actions idle and unnecessary.<\/span><\/p>\r\n<h2><b>Resources<\/b><\/h2>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dr. Davut Pehlivanl\u0131, Current Internal Audit Practices, Beta 2010<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prof. Dr. Nejat Bozkurt, Accounting Audit, Alfa 1998<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prof.Dr.Nejat Bozkurt, T\u00dcRMOB Independent Audit Training Lecture Notes, 2012<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dr.\u00d6zg\u00fcr \u00c7at\u0131kka\u015f, KGK, Marmara University. Corporate Governance Lecture Notes, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u0130SMMMO-Practical Information for Internal Audit in SMEs, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Internal Audit Institute, www.tide.org.tr<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alp Buluch, Article, Internal Control, Hurses, 19 March 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Commercial Code No. 6102<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">International Internal Auditing Standards, www.theiia.org<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">www.coso.org Treadway Commission Supporting Institutions Committee, Internal Control-Integrated Framework, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public Financial Management and Control Law<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public Internal Control Standards<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public Internal Control Guide<\/span><\/li>\r\n<\/ul>\r\n","protected":false},"excerpt":{"rendered":"<p>Principle 12: Enforces through Policies and Procedures The organization controls actions through policies that set expectations and implement procedures. Focus Points: The following focal points highlight essential features of this&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1444,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[845],"tags":[],"class_list":{"0":"post-1232","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-insights"},"_links":{"self":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/comments?post=1232"}],"version-history":[{"count":0,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1232\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media\/1444"}],"wp:attachment":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media?parent=1232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/categories?post=1232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/tags?post=1232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}