Thank You to our Sponsors

37
Thank You to our Sponsors

description

Thank You to our Sponsors. Checks & Balances. Internal Controls to Achieve a Successful Audit. Once Upon a Time…. Approximately $96,000 18 months Mid 30s female YMCA finance director and accountant. What are Internal Controls?. Internal Control. - PowerPoint PPT Presentation

Transcript of Thank You to our Sponsors

Page 1: Thank You  to our Sponsors

Thank You to our Sponsors

Page 2: Thank You  to our Sponsors

Checks & BalancesInternal Controls to Achieve a Successful Audit

Page 3: Thank You  to our Sponsors

Once Upon a Time…

Approximately $96,000

18 months

Mid 30s female

YMCA finance director and accountant

Page 4: Thank You  to our Sponsors

What are Internal Controls?

…a process effected by an organization's structure, work and authority flow, and people and management information systems, designed to help the organization accomplish specific goals or objectives. It is a means by which an organization's resources are directed, monitored, and measured. It plays an important role in preventing and detecting fraud and protecting the organization's resources

Internal Control

Page 5: Thank You  to our Sponsors

What are Internal Controls?

Separation of Duties:

Checks & Balances

Permissions

Page 6: Thank You  to our Sponsors

What are Internal Controls?

Role Based Access Control Using Technology:

DAXKO Operations

DAXKO Accounting

Page 7: Thank You  to our Sponsors

Internal Controls Process

Establish Environmen

tAssess Risks

Control Activities

Monitor Performanc

e

Page 8: Thank You  to our Sponsors

Establish Environmen

tAssess Risks

Control Activities

Monitor Performance

Establish Environment

Page 9: Thank You  to our Sponsors

Establish Environment

A Receptive Environment Requires a Top Down Approach

Page 10: Thank You  to our Sponsors

Establish Environment

Define Roles

Assign Responsibilities

Communicate Clearly

Page 11: Thank You  to our Sponsors

Establish Environment

Page 12: Thank You  to our Sponsors

Establish Environmen

t

Assess Risks

Control Activities

Monitor Performanc

e

Assess Risks

Page 13: Thank You  to our Sponsors

Assess Risks

Vulnerability to Theft

Vulnerability to Mistakes

Vulnerability to Data Compromise

Vulnerability to Misrepresentation

Page 14: Thank You  to our Sponsors

Assess Risks

Vulnerability to Theft

Vulnerability to Mistakes

Vulnerability to Data Compromise

Vulnerability to Misrepresentation

Page 15: Thank You  to our Sponsors

Assess Risks

Vulnerability to Theft

Vulnerability to Mistakes

Vulnerability to Data Compromise

Vulnerability to Misrepresentation

Page 16: Thank You  to our Sponsors

Assess Risks

Vulnerability to Theft

Vulnerability to Mistakes

Vulnerability to Data Compromise

Vulnerability to Misrepresentation

Page 17: Thank You  to our Sponsors

Assess Risks

Vulnerability to Theft

Vulnerability to Mistakes

Vulnerability to Data Compromise

Vulnerability to Misrepresentation

Page 18: Thank You  to our Sponsors

Establish Environmen

tAssess Risks

Control Activities

Monitor Performanc

e

Control Activities

Page 19: Thank You  to our Sponsors

Control Activities

Prevention of Theft

Prevention of Mistakes

Prevention of Data Compromise

Prevention of Misrepresentation

Page 20: Thank You  to our Sponsors

Control Activities

Prevention of Theft

Prevention of Mistakes

Prevention of Data Compromise

Prevention of Misrepresentation

Page 21: Thank You  to our Sponsors

Control Activities

Prevention of Theft

Allocate new apply one time adjustment permission

Separate duties for shift close-outs and deposits

Separate duties for invoice entry and posting

Separate duties for check printing and signing

Activities to Implement

Page 22: Thank You  to our Sponsors

Control Activities

Prevention of Theft

Prevention of Mistakes

Prevention of Data Compromise

Prevention of Misrepresentation

Page 23: Thank You  to our Sponsors

Control Activities

Prevention of Mistakes

Assign account permissions to increase simplicity

Separate duties for entry and posting of journal entries

Use importing feature to import entries

Activities to Implement

Page 24: Thank You  to our Sponsors

Control Activities

Prevention of Theft

Prevention of Mistakes

Prevention of Data Compromise

Prevention of Misrepresentation

Page 25: Thank You  to our Sponsors

Control Activities

Prevention of Data Compromise

Restrict users to applicable branches or departments

Restrict users to necessary major codes

Activities to Implement

Page 26: Thank You  to our Sponsors

Control Activities

Prevention of Theft

Prevention of Mistakes

Prevention of Data Compromise

Prevention of Misrepresentation

Page 27: Thank You  to our Sponsors

Control Activities

Prevention of Misrepresentation

Budget for Revenue before Expense

Establish levels of review

Encourage use of comments

Lock down budget after board approval

Activities to Implement

Page 28: Thank You  to our Sponsors
Page 29: Thank You  to our Sponsors

Establish Environmen

tAssess Risks

Control Activities

Monitor Performanc

e

Monitor Performance

Page 30: Thank You  to our Sponsors

Monitor Performance

Use the Event Log in DAXKO Operations and DAXKO Accounting to monitor performance

Page 31: Thank You  to our Sponsors

Accounts Payable

General Ledger

Budget

Monitor Performance

DAXKO Accounting

Page 32: Thank You  to our Sponsors
Page 33: Thank You  to our Sponsors
Page 34: Thank You  to our Sponsors
Page 35: Thank You  to our Sponsors
Page 36: Thank You  to our Sponsors

Review

Establish Environmen

tAssess Risks

Control Activities

Monitor Performanc

e

Page 37: Thank You  to our Sponsors

Action Items

Determine your Vulnerabilities

Set Goals to Improve Internal Controls

Utilize Roles and Permissions

Establish Policies for Monitoring the Event Log

Evaluate Processes on a Regular Basis