{"id":1236,"date":"2019-05-08T09:00:03","date_gmt":"2019-05-08T06:00:03","guid":{"rendered":"https:\/\/teolupus.com\/?p=1236"},"modified":"2023-10-26T10:30:17","modified_gmt":"2023-10-26T07:30:17","slug":"information-internal-control","status":"publish","type":"post","link":"https:\/\/teolupus.com\/en\/information-internal-control\/","title":{"rendered":"Relevant Information Used: Principle 13 Focal Points\u00a0"},"content":{"rendered":"<p><!--StartFragment--><\/p>\r\n\r\n<h2><b>Principle 13:\u00a0Uses Relevant Information<\/b><\/h2>\r\n<p><span style=\"font-weight: 400;\">The organization obtains or produces and uses relevant, qualified information to support the functioning of internal control.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">The information is necessary for the organization to fulfill its internal control responsibilities in a manner that supports achieving its objectives. Management obtains, produces, and uses relevant and qualified information from internal and external sources to help other internal control components perform their functions. Communication is a continuous and iterative process of providing, sharing, and obtaining necessary information.\u00a0<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Inside communication is how information is distributed from bottom to top, top to bottom, and crosswise throughout the organization. This type of communication ensures that staff receive a clear message from senior management that their control responsibilities must be taken seriously. External Communication, on the other hand, is two-sided, enables the relevant external information to flow inward, and provides information to external parties to meet their requests and information.<\/span><\/p>\r\n<h2><strong>Focus Points<\/strong><\/h2>\r\n<p><span style=\"font-weight: 400;\">The following focal points highlight essential features of this principle:<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>Defines Information Requirements<\/strong><\/h3>\r\n<p><span style=\"font-weight: 400;\">Information regarding the organization&#8217;s objectives is obtained from the board and senior management activities and summarized so that management and others can understand the organization&#8217;s goals and their roles in achieving them. For management to obtain relevant information, it must define information requirements at the relevant level and with the required concreteness. Defining information requirements is an iterative and continuous process as long as an effective internal control system operates.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Management develops and implements controls to identify relevant information supporting components&#8217; operation. The following examples illustrate how information supporting other internal control components is identified and defined.<\/span><\/p>\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td>\r\n<p><b>Internal Control Components<\/b><\/p>\r\n<\/td>\r\n<td>\r\n<p><b>Example of Information Used<\/b><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Control Environment<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Management conducts an organization-wide staff survey yearly to collect information on individual staff behavior relative to the organization&#8217;s code of conduct. The survey is part of the process that produces the data that supports the Control Environment component. It can also provide input on selecting, developing, implementing, or maintaining control actions.<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Risk assessment<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">As a result of changes in customer demands, an organization changes its product mix and delivery mechanisms. The increase in online sales has led to a significant increase in credit card transactions. To assess the risk of non-compliance with security and privacy regulations associated with credit card information, management collects information on the number of transactions in the last financial year, their total value, and the type of data stored. It evaluates their significance during the risk analysis.<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Control Actions<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Some devices used in high-volume production environments break down when operated for longer than a specific period. To maximize device life, management obtains and reviews daily operating records and compares them to values \u200b\u200bestablished by senior management. This information supports control actions regarding mitigation procedures that should be applied when maximum operating levels are exceeded.<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Monitoring Actions<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">A sizeable electric company collects, processes, and reports accident and injury records associated with its power generation business. Comparing this information to employee health insurance claims reveals deviations from anticipated expectations. This may indicate that control actions to identify, process, report, investigate, and resolve accident and injury incidents may not work as intended.<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p>&nbsp;<\/p>\r\n<h3><strong>Obtains Internal and External Data Sources<\/strong><\/h3>\r\n<p><span style=\"font-weight: 400;\">Information is obtained from a wide variety of sources and formats. Examples of internal and external data sources from which management can generate helpful information regarding internal controls are summarized below.<\/span><\/p>\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td>\r\n<p><b>Intra-Organizational Data Source Examples<\/b><\/p>\r\n<\/td>\r\n<td>\r\n<p><b>Intra-Organizational Data Examples<\/b><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">E-mail messagesInspection of process at the production site minutes or notes of Operations Committee meetingsEmployee time reporting systems reports obtained from production systems responses to customer surveysDirect reporting line<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Organizational changes On-time and quality production experience Measures taken in response to energy consumption measurements Hours spent on time-based projects Number of units shipped within a month Factors affecting customer churn rates Complaints regarding manager&#8217;s behavior<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Non-Organizational Data Source Examples<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Non-Organizational Data Examples<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Data from external service providersSectoral research reports reports from similar companies in the industry regulatory authoritiesSocial media and other blog post trade fairsDirect tip line.<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-weight: 400;\">Products shipped by contract manufacturers Competitor Product InformationMarket and industry measurements new or expanded requirementsOpinions about the organization Customers changing preferencesAlleged misuse of funds, bribery<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p><span style=\"font-weight: 400;\">Management evaluates in detail potential events, actions, and data sources, both internal to the organization and from reliable external sources, and selects the most appropriate and valuable in terms of the current organizational structure, business model, or objectives.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><b>Processes Relevant Data and Converts it into Information<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">Organizations develop information systems to source, capture, and transform large amounts of data from internal and external sources into meaningful and actionable data to meet predetermined information needs. Information systems support business processes managed within the organization. It includes people, processes backed by data and technology, and relationships with external service providers and other parties interacting with the organization.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">Enterprise Resource Planning (ERP) systems, enterprise management systems (AMS), intra-enterprise networks, collaboration tools, interactive social media tools, data warehouses, business intelligence systems, operating systems (e.g., factory automation and energy usage systems), web-based applications and other technology solutions provide management with opportunities to use technology as a lever in the development and implementation of effective and efficient information systems.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<h3><b>Preserves Quality Throughout Information Processing<\/b><\/h3>\r\n<p><span style=\"font-weight: 400;\">Protecting the quality of information is essential for an effective internal control system, especially considering today&#8217;s data volume and the dependence on advanced and automated information systems. The ability to produce quality information starts with data sources. Inaccurate or incomplete data, or information derived from data of this nature, could lead to erroneous judgments, estimates, or other management decisions.<\/span><\/p>\r\n<p><span style=\"font-weight: 400;\">The quality of the information depends on whether the data in question has the following attributes:<\/span><\/p>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">accessible<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">TRUE<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Current<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">(Confidentiality) Protected<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">stored<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Sufficient<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">On-time<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Valid<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Verifiable<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Considers Costs and Benefits<\/span><\/li>\r\n<\/ul>\r\n<p><span style=\"font-weight: 400;\">Striking the right balance between benefit and cost and information systems to obtain and manage information is critical in establishing an information system that meets the organization&#8217;s needs.<\/span><\/p>\r\n<h2><b>Resources for Internal Control Article\u00a0<\/b><\/h2>\r\n<ul>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">International Internal Auditing Standards, International Institute of Internal Auditors<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dr. Davut Pehlivanl\u0131, Current Internal Audit Practices, Beta 2010<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prof. Dr. Nejat Bozkurt, Accounting Audit, Alfa 1998<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prof.Dr.Nejat Bozkurt, T\u00dcRMOB Independent Audit Training Lecture Notes, 2012<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dr.\u00d6zg\u00fcr \u00c7at\u0131kka\u015f, KGK, Marmara University. Corporate Governance Lecture Notes, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u0130SMMMO-Practical Information for Internal Audit in SMEs, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Internal Audit Institute, www.tide.org.tr<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Alp Buluch, Article, Internal Control, Hurses, 19 March 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Commercial Code No. 6102<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">International Internal Auditing Standards, www.theiia.org<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">www.coso.orgTreadway Commission Supporting Institutions Committee, Internal Control-Integrated Framework, 2013<\/span><\/li>\r\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Public Financial Management and Control Law<\/span><\/li>\r\n<\/ul>\r\n<h2>\u00a0<\/h2>","protected":false},"excerpt":{"rendered":"<p>Principle 13:\u00a0Uses Relevant Information The organization obtains or produces and uses relevant, qualified information to support the functioning of internal control. The information is necessary for the organization to fulfill&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1444,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[845],"tags":[962,951,947,952,954,220,963,964,955],"class_list":{"0":"post-1236","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-insights","8":"tag-adequate-usage-of-information-en","9":"tag-corporate-governance-en","10":"tag-corporate-risk-management-en","11":"tag-coso-internal-control-en","12":"tag-governance-en","13":"tag-information-and-communication","14":"tag-internal-control-communication-en","15":"tag-quality-information-en","16":"tag-risk-management-en"},"_links":{"self":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/comments?post=1236"}],"version-history":[{"count":0,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/posts\/1236\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media\/1444"}],"wp:attachment":[{"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/media?parent=1236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/categories?post=1236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teolupus.com\/en\/wp-json\/wp\/v2\/tags?post=1236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}