MINNESOTA MANAGEMENT & BUDGET GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Internal Control & Accountability Unit (http://www.mmb.state.mn.us/fin/ic Revised March 2014 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES TABLE OF CONTENTS INTRODUCTION ...................................................................................................................................... 2 RISK ASSESSMENT PLAN ..................................................................................................................... 4 CONDUCTING A RISK ASSESSMENT.................................................................................................. 6 1. Coordinate the project ......................................................................................................................... 6 2. Document the business process .......................................................................................................... 7 Grant Programs ................................................................................................................................... 8 Functional Areas ................................................................................................................................. 8 3. Identify risks ....................................................................................................................................... 9 4. Prioritize risks ................................................................................................................................... 12 Risk Ranking..................................................................................................................................... 12 Risk Responses ................................................................................................................................. 13 5. Identify and evaluate control activities ............................................................................................. 14 Facts about Control Activities .......................................................................................................... 14 Control Activity Design .................................................................................................................... 15 Control Activity Classifications ........................................................................................................ 16 Control Activity Categories .............................................................................................................. 16 Control Activity Gaps and Redundancies ......................................................................................... 20 Prioritizing Control Activities........................................................................................................... 21 Validating Key Controls ................................................................................................................... 21 6. Create action plans to address control gaps and redundancies ......................................................... 23 7. Communicate results to management ............................................................................................... 23 SUSTAINABLE RISK ASSESSMENTS ................................................................................................ 24 APPENDIX A .............................................................................................................................................. i APPENDIX B ............................................................................................................................................. v APPENDIX C .......................................................................................................................................... viii APPENDIX D ............................................................................................................................................ xi BIBLIOGRAPHY ..................................................................................................................................... xii Note: Shaded text boxes in the guide contain useful examples and best practices. Refer to the boxes to gain more insight into the concepts discussed in that particular section. GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES INTRODUCTION To many people, risk assessments are a mystery. This is not because we do not understand risk— we think about risk everyday—but rather because we rarely write down or perform these risk assessments in a structured manner. There are many reasons why organizations perform risk assessments, including: Avoiding surprises by proactively recognizing major risks and ensuring these risks are being effectively managed Identifying and mitigating risks of fraud, waste and abuse Identifying control weaknesses and formulating action plans to plug control gaps, strengthen existing controls, or remove control redundancies where appropriate Providing documentation, including business process narratives, flowcharts, and risk/control matrices to identify key control activities Ensuring key control activities are not overlooked during periods of change, such as employee turnover, new programs, new regulations, or realignment of job duties For Minnesota state agencies, another reason to perform risk assessments is Minn. Stat. Section 16A.57 Sub. 8, which makes the head of each executive branch agency responsible for designing, implementing, and maintaining an effective internal control system within the agency. Because risk assessments are essential to an effective internal control system, completing them helps agencies comply with Minn. Stat. Section 16A.57. The COSO Framework1defines risk assessment as “…the identification and analysis of relevant risks to achievement of the [entity’s] objectives, forming a basis for the determination of how the risks should be managed.” The key elements to the above definition are: 1) identifying and analyzing risks, and 2) managing these risks. Risks are anything—big or small—that could prevent the achievement of a goal or objective. In government, the level and types of risk vary among agencies, as well as within agency divisions. Regardless of the agency’s mission, each agency faces risks. These risks must be managed to protect the state’s employees, resources, citizens and reputation. Risks are managed through the implementation of control activities. Control Activities (the third component of the COSO framework2) are actions taken to reduce risk or to minimize obstacles to achieving goals and objectives. Examples of control activities include authorization and approval, reconciliations, access security and separation of duties. 1 In 1992, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) published a report titled Internal Control—Integrated Framework, often referred to as the “COSO Framework”. The COSO Framework consists of five interrelated internal control components: control environment, risk assessment, control activities, monitoring, and information/communication. The State of Minnesota has adopted the COSO Framework as its internal control standard. (NOTE: The COSO framework was revised effective May 14, 2013, with a transition period of May 14, 2013 – December 15, 2014.) 2 The revised COSO framework contains underlying principles for each component of the framework. See Appendix D for a list of the principles. GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Proper risk management requires a balance between risks and control activities. As it relates to financial and compliance goals, being out of balance can cause the following problems: Excessive Risks (Control Gaps) Excessive Controls (Redundancies) Loss of assets, donors or grants Poor business decisions Noncompliance Regulatory sanctions Public scandals Increased bureaucracy Reduced productivity Increased complexity Increased cycle time Increase of no-value activities The information in this guide is provided to help state agency personnel conduct their own risk assessments. Contained in the appendices to the guide are information and examples that can be used right now, starting today, to complete a risk assessment. Agencies are free to customize the information and examples or adopt other risk assessment methodologies best suited to their business. In addition, the guide and appendices do not address every potential risk or control activity that may exist in an agency.3 Instead, these materials are living documents that will be added to and modified in the months and years ahead. In fact, agencies are encouraged to adapt the tools to fit their specific circumstances. A word of caution: questionnaires and checklists Many internal control questionnaires and checklists are available on the internet, and these documents list common risks and control activities for various business processes. However, because people who lack knowledge of your specific organization’s operations prepared these checklists, standard checklists are unlikely to be sufficient for documenting your organization’s specific risks or processes. Nevertheless, these questionnaires and checklists may be useful in validating the completeness of a risk assessment once it has been prepared and provide users with common control activities. 3 MN.IT Services (formerly OET) provides all information technology (IT) services for the executive branch, having consolidated all IT under the State CIO (Chief Information Officer) as prescribed by 2011 law. Therefore, risks and controls related to the IT environment (e.g., updates, implementation, system security, change management and maintenance) are not discussed in the guide. See Enterprise Security Control Policies at: MN.IT website (http://mn.gov/oet/policies-andstandards/information-security/) Page 3 of 24 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES RISK ASSESSMENT PLAN Prior to performing a risk assessment, a risk assessment plan4 and timeline should be developed. A plan prioritizes business processes to ensure risk assessments are performed on processes critical to achieving agency goals and objectives. A timeline provides a means for senior management to monitor plan progress. The first step in developing a plan is to identify the business processes operating within the organization. Appendix A provides a description and some examples of business processes. The second step is to prioritize the business processes. Agencies can have a multitude of business processes, but it is not cost beneficial to conduct risk assessments on all processes. Therefore, agency management can use both qualitative and quantitative factors in determining the high profile business processes most significant to achieving the agency’s goals and objectives. Special consideration should be given to the following business processes: Processes audited as material to the financial information presented in the Comprehensive Annual Financial Report (CAFR) Federal programs identified as major in the Financial and Compliance Report on Federally Assisted Programs Processes relating to the organization’s primary sources of funding and major expenditures Other processes critical to achieving the organization’s primary mission and objectives 1 IDENTIFY PROCESSES 2 PRIORITIZE PROCESSES Appendix B provides factors to consider when determining the business processes to include in the plan. The third step is to create a risk assessment plan. Plans can take on many different forms, depending on the organizational structure and business practices of the organization. At a 3 minimum, the plan must include the following information: CREATE C PLAN riteria used to identify significant business processes, including why some processes/sub-processes were included in the plan and why other processes/subprocess were not N ame and brief description of each business process B reakdown of a more complex or large process into manageable sub-processes T entative timeline for performing each identified risk assessment Name of employee(s) responsible and accountable for ensuring risk assessments are completed 4 Most agencies are required to prepare risk assessment plans (see the Minnesota Management & Budget Statewide Procedure: Risk Assessment, No. 0102-01.2). Page 4 of 24 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES MONITOR PLAN As a final point, senior management is responsible for monitoring the agency’s progress in completing the risk assessment plan. At least annually, management must also revisit and revise the plan, reflecting on any significant changes within the organization or external to the organization, such as regulatory changes, new program or service offerings, staff turnover, and reorganizations. Such changes may require revising or updating the plan accordingly. UPDATE PLAN Best Practice: Financial Reporting and Federal/State Program/Grant Compliance Consider significant business processes associated with internal and external financial reporting are included in a risk assessment plan. Citizens, investors, regulators, legislators, boards and agency management make decisions based on financial report information, expecting accuracy and reliability. Examples of financial reporting are: 1. Information provided to MMB for inclusion in the state’s Comprehensive Annual Financial Report (CAFR) and Financial and Compliance Report on Federally Assisted Programs (Single Audit Report); 2. Agency financial statements and reports prepared for public distribution 3. Financial information prepared for use by senior management, boards or legislative oversight committees A standard best practice for identifying these processes is referred to as a “top-down” approach, where management identifies significant financial processes by making three determinations: 1. Which financial reports are significant 2. Which line items (e.g., cash, accounts receivable) contain large dollar amounts in the reports 3. What significant processes support these line items (e.g., processes supporting cash may include: cash receipts, procurement, payroll, recipient/grant payments; processes supporting account receivable may include, cash receipts, revenues, estimates for expected receipts such as sales tax payments) Qualitative factors (see Appendix B) are also considered in the above approach. Equally important are the processes supporting federal/state programs/grants, since many agencies receive considerable funding to manage these programs. To identify significant programs/grants, agency management should consider the following elements: 1. Size – Which programs/grants are material to the agency 2. Complexity – Whether administration of the program/grant is routine or complex (e.g., are staff experienced/ knowledgeable? Have any significant regulatory or compliance requirements occurred?) 3. Susceptibility – Whether there have been audit findings related to the program; whether there has been any fraudulent activity impacting the program; and/or whether there is the probability that fraud would impact the program Not all processes supporting the program need to be included in the risk assessment plan. Identify the processes supporting the program/grant compliance requirements (e.g., allowable costs, eligibility, sub-recipient monitoring). Then, assess the complexity and susceptibility (steps 2 & 3 above) to determine what processes to include in the plan. Page 5 of 24 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES CONDUCTING A RISK ASSESSMENT Risk assessment projects need to be completed for each business process included in the risk assessment plan. A risk assessment project can be broken down into seven phases: 1. Coordinate the project 2. Document the business process 3. Identify risks 4. Prioritize risks 5. Identify and evaluate control activities 6. Create action plans to address control gaps and redundancies 7. Communicate results to management 1. Coordinate the project The fundamental elements that need to be in place prior to starting a risk assessment project are senior leadership sponsorship, assignment of the risk assessment team, team training and availability, and a clear project scope. Ultimately, for a risk assessment project to succeed, senior leadership needs to be supportive. Employees take their cues from senior management. If risk assessments appear unimportant to their leaders, employees will also perceive risk assessments as unnecessary. Senior management can show their support through written communications, staff meeting discussions, attendance at the initial risk assessment kickoff meeting and involvement in meetings where the project’s results are discussed. Just as important as senior leadership sponsorship is the assignment of the risk assessment team. Team members ought to represent a cross-section of subject matter experts familiar with the business process being assessed. For example, grant managers and administrators would be involved in the risk assessment for grants, as would the accountants who make payments to grantees. Similarly, the payroll risk assessment may be conducted by a team consisting of human resources, payroll, and accounting staff. In addition, the risk assessment team ought to be trained to enable them to participate effectively in risk assessment projects. Training can occur through seminars or completion of pilot risk assessments on small discrete processes, providing staff with valuable hands-on experience. Likewise, management needs to allocate time to the project to allow sufficient team member availability to complete thorough risk assessments. Finally, a clear project scope (i.e., clear determination of process beginning and end points) is necessary to ensure projects are completed on time and to avoid scope creep. Typically, the manager or supervisor responsible for the process is in the best position to decide where the beginning and end points are positioned for each risk assessment project. Page 6 of 24 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES 2. Document the business process The importance of business process documentation is to provide the risk assessment team with a common understanding of the process. Existing documentation, such as step-by-step procedures, provide the team with a basic understanding of the process. In some cases, procedures sufficiently describe the process and eliminate the need to create additional process documentation. If the existing documentation is not sufficient or non-existent, narratives or flowcharts are common tools for documenting processes. See examples of narratives and flowcharts on the MMB Internal Control and Accountability website (http://www.beta.mmb.state.mn.us/risk-examples). There are many ways to document business processes. The documentation style will depend on the size of the agency, resources available, and the complexity of the agency’s processes. In short, documentation is dependent upon agency preferences. Business process documentation should be thorough but not so detailed as to overwhelm a reader. To make efficient use of resources, documentation should focus on high-level activities, rather than on every activity within the process. In addition, the document format should allow for easy review and updating. The following should be considered when reviewing existing or developing new process documentation: What are the activities and tasks within the process? What are the key inputs (beginning) and outputs (ending) of the process? What are the decision points and alternative paths? It is important for the assessment team to identify all decision points within a process or compliance requirement, as there may be alternative paths that work items can take. If not all the alternative paths are identified, it may not be possible to identify all of the key risks and controls. What are the transfer points, or hand-offs, with other areas5 outside the department or agency? Because risks are present at hand-offs with other areas, it is important to understand where these transfer points are. If required, identify contacts for additional information. What key IT systems support the process? The supporting IT systems may determine how transactions are processed and recorded, as well as the types of risks and controls included. Who are the responsible personnel within a process? Identify positions or job titles rather than names, because personnel may be changes over time. What is the time frame of the process or compliance requirement? It is important to understand both the actual and elapsed time for tasks in the process. What is the impact on the financial statements? What general ledger accounts are affected? What are the key performance measures, monitoring controls and reporting controls? 5 Examples of handoffs outside an agency: while state agencies are typically responsible for their own staff recruitment, the central payroll services unit is responsible for ensuring employees receive wage and salary payment. Consequently, some risks, such as staff hiring and training, reside with the agency while other risks, such as accurate calculation of wages, and deduction of appropriate taxes and union dues, etc., reside with the central payroll unit. Other examples of hand-offs between agencies and centralized state agency providers include information technology, vendor contract management, and financial reporting. Page 7 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Grant Programs Process documentation for grant programs will depend on what is significant for these programs. The federal Office of Management and Budget (OMB) has identified recommended controls within 13 risk areas common to most federal grant programs. A discussion of these risk areas can be found in OMB Circular A-133 Compliance Supplement, Part 6.6 Although this guidance is aimed at federal grant programs, it can be applied to any grant program. While Part 6 of the OMB Compliance Supplement has a helpful list of objectives and risks to be considered for all grants, this list is very generic. Relying solely on Part 6 of the Compliance Supplement can result in an incomplete list of objectives and risks. On the other hand, not every area addressed by Part 6 of the Compliance Supplement is applicable to every grant program. A comprehensive list of objectives and risks for a grant is best developed independently, with Part 6 forming a backstop to the risk identification process. The Minnesota Department of Administration’s Office of Grants Management has developed policies and procedures7 that are applicable to all grant programs, federal and state. There is considerable overlap between the objectives and risks noted in OMB Circular A-133 Compliance Supplement, Part 6 and the state statutes, policies, and procedures listed by the Office of Grants Management. Both aim to improve the administration of grant programs by suggesting or requiring best practices in grant administration. As with the suggested control objectives in OMB Circular A-133 Compliance Supplement, Part 6, when using the Department of Administration policies, grant risk assessments should describe how the required objectives are being achieved. Functional Areas Unlike federal and state grant programs where objectives and risks are dictated, for the most part, by the federal or state governments, processes within functional areas can vary from one agency to the next. Unfortunately, no guidance exists that identifies every possible process one might find in a functional area along with a list of potential objectives and risks. The best resources for identifying the objectives for these processes are the functional area manager and subject matter experts within these areas. Other published and internet resources can provide a starting point for documenting generic processes that one would expect to find in any organization, such as procurement, payroll or financial. The risk assessment team should pay close attention when using these materials to ensure the final documentation is an actual representation of the agency’s process. 6 See OMB Circular A-133 Compliance Supplement, Part 6 (http://www.whitehouse.gov/omb/circulars/a133_compliance_supplement_2013) 7 See Minnesota Office of Grants Management Policies and Statutes (http://mn.gov/admin/government/grants/policies-statutes-forms/) Page 8 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES 3. Identify risks The risk assessment team uses the process documentation to brainstorm risks within the business process. The team will identify countless risks given time and a little imagination. The number of risks may seem unmanageable at this point but will be reduced by prioritizing risks later in the risk assessment process. Make sure the list includes risks relating to compliance, reporting, operations, safeguarding of assets and intangible risks (e.g., reputation, loss of public trust). The risk being assessed is the inherent risk—the chance of something going wrong BEFORE steps (i.e., control activities) are in place to reduce the chance of the risk occurring. Activities with high inherent risk have a greater potential for loss from fraud, waste, unauthorized use, or misappropriation due to the nature of the activity or asset. Cash, for example, has a much higher inherent risk for theft than a stapler does. Control activities used to reduce these risks are identified and evaluated later on in the process. For each step indicated in the process documentation, ask these questions: What can go wrong? How could we fail? What must go right for us to succeed? Where are we vulnerable? How could someone steal from the department? How could someone disrupt our operations? How do we know whether we are achieving our objectives? On what information do we most rely? What would happen if key employees or subject matter experts were suddenly unavailable? Is the input or support for this process dependent on other entities or processes? What would happen if those entities or other processes failed to deliver? What decisions require the most judgment? What activities are most complex? What activities are regulated? How complex are the regulatory requirements? What is our greatest legal exposure? What could tarnish the organization’s reputation, or cause loss of public confidence or impact employee morale? Does past experience highlight any areas of concern (e.g., audit findings, media attention, and fraud)? Do not overlook fraud risks that can cause not only financial loss, but also loss of public trust in the agency. Fraud is intentional misconduct to evade detection of a wrongdoing. Both state employees and persons outside the agency can perpetrate fraud (e.g., a vendor or benefit recipient). Page 9 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES The following three conditions are generally present when fraud occurs: 1. Pressure: the motive or incentive, which provides a reason to commit the fraud. This could include lifestyle issues, such as debts from gambling or drugs. Other reasons to commit fraud may be family pressures like unemployment, medical costs, or other crises, including business pressures such as unrealistic deadlines. 2. Rationalization: the ability to justify the person’s actions in his or her own mind. Examples of rationalization may include: “I don’t get paid what I am worth!” “I intend to pay it back later.” “Nobody will miss the money.” “There is no other way to manage my problems.” “If they don’t know I’m doing it, they deserve to lose the money.” 3. Opportunity: the circumstance within the organization that allows the fraud to occur and not be detected. Opportunity most likely results from a lack of or ineffective control activities especially lack of segregations of duties. It also can result from seemingly welldesigned control activities that are not enforced or monitored. Agency management has little influence over the first two conditions but can limit opportunity by implementing control activities to reduce fraud risks. Questions that help identify fraud risks are: How might a fraudster exploit weaknesses in the system? How could a fraudster override or circumvent procedures or activities? What could a fraudster do to conceal the fraud? Examples: Fraud Risks Manipulating financial information (e.g., recording transactions in an incorrect reporting period to cover up budget overruns) Falsifying or inflating expense claims Misappropriating assets (e.g., cash, checks, inventory, laptops) Committing identity theft (e.g., from paper documentation or IT systems) Accepting bribes, kickbacks or gratuities (e.g., accepting a bribe in return for approving a vendor contract) Paying fictitious employees Submitting/approving fraudulent employee time sheets (e.g., unrecorded vacation or sick leave, inflated regular or overtime hours) Paying inflated or fictitious invoices submitted by an insider or third party vendor Submitting fraudulent eligibility applications Page 10 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Submitting fraudulent claims submitted by an insider, sub-recipient, grantee or third party provider Processing fictitious transactions to hide an unplanned variance Covering up mistakes to avoid confrontation or disciplinary action Page 11 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES 4. Prioritize risks When prioritizing risks, the team should evaluate the inherent risk, regardless and without consideration of any existing control activities intended to reduce the likelihood or impact of the risk. The identity and effectiveness of existing control activities at addressing inherent risks are evaluated later on in the risk assessment process. Risk Ranking It is impossible and unwise to attempt to address all risks. Actions taken to minimize risk (referred to as control activities) can be expensive and labor intensive. Efforts should be focused on the most critical risks, which, if they fail, could potentially disrupt or derail achievement of an agency’s goals and objectives. Risk ranking should take into consideration two criteria: 1. Likelihood - What is the possibility of the risk happening? How often does it occur or is likely to occur? 2. Impact - What is the effect on the achievement of objectives? What is the materiality or magnitude of the consequences if it happens?). As an example, the risk of loss from theft of cash easily meets the likelihood criterion—the cash can be stolen. In addition, in the absence of control activities, the probability of theft is high. The impact criterion requires more analysis and is dependent on the amount of the loss and the related consequences. The risk grows with the size of the potential loss. In addition, small repeated losses could become material if unchecked. There are many ways to rank risk; no one way is right or wrong. Whatever method is selected, it should include the following: a. A ranking scale such as high, medium, low, or 1, 2, 3, etc. The ranking scale should be simple enough to allow the quick communication of the severity of the risk associated with an activity. b. A brief explanation for choosing the risk ranking. Documenting the reasons for the rankings preserves the information for future reference. Page 12 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Best Practice: Risk Rankings Agency management may choose to go an additional step in ranking risks by developing standard ranking categories. The table below depicts some examples of basic ranking categories; agency management can customize the categories further by establishing quantifiable values, such as number of occurrences (e.g., high: more than 5, medium: 2-4, and low: less than 2). Likelihood Risk Ranking Impact Comments Ranking Comments Ave. Ranking Risk A Risk B Risk C 3 2 3 Happens frequently (high) Sometimes occurs (medium) Predictable (high) 1 2 3 Inefficient work, some or limited rework (low) Extra work, re-work (medium) Showstopper - loss of program (high) 2 2 3 Risk D Risk E 1 2 Has not happened (low) Sometimes occurs (medium) 3 2 Loss of life/death, significant injuries/illness (high) Minor injury/illness (medium) 2 2 Risk F 2 Not very predictable (medium) 1 Minor loss of assets or funds (low) 1.5 The overall risk ranking exercise is judgmental even when standard ranking criteria have been established by the entity. After applying the ranking criteria, the risk assessment team may decide to adjust the ranking of one or more risks based on additional information specific to that risk. Justification or rationale for any manual adjustments (e.g., low to high risk or vice versa) should be documented. Risk Responses In theory, there are at least four potential responses to risk: 1. Transfer the risk by having someone else assume it. However, the entity transferring the risk often remains ultimately responsible for the final outcome. Typical examples are outsourcing or obtaining insurance. In these situations, the transferring entity is still ultimately responsible for monitoring the outsourced activity and ensuring insurance coverage is sufficient. 2. Avoid the risk by choosing not to engage in the activity or program. However, in government it is impossible to avoid a mandate from the legislature. 3. Accept the risk when it has a low probability of occurrence and low impact on the organization. In this scenario, management weighs the cost of the risk occurring against the cost of implementing mitigating controls (i.e., a cost-benefit analysis). It is important to document the rationale for accepting the risk. 4. Reduce the risk by implementing control activities to reduce or mitigate the risk. Because of the difficulty in anticipating every possible outcome or circumstance, it is usually difficult and very expensive to eliminate risk completely. Generally, risk is reduced to a point where the residual (i.e., remaining) risk is acceptable to the decision maker, thus providing reasonable assurance of meeting the agency’s goals and objectives. Ultimately, senior management decides whether to accept residual risk. These decisions and rationale should be documented. Page 13 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Examples: Risk Responses Most grant programs have an eligibility risk—the chance that funds will be paid to an ineligible person or organization. A program can transfer the eligibility risk by outsourcing the eligibility determination to a third party provider. However, this will have a limited effect because the program remains ultimately responsible for ensuring grants are made to eligible grantees. The program may attempt to avoid that risk by not engaging in any grant activity—a course of action that may not be acceptable to the legislature or the public. If management is confident of the control measures in place and decides that the cost of additional measures outweighs any potential benefits, it may accept the remaining risk of paying an ineligible grantee. Management may take certain actions to reduce the eligibility risk, for example, instituting a review process for all applications and requiring supervisory review of payments before they are made. 5. Identify and evaluate control activities The next step in the risk assessment process is to identify and evaluate methods currently in place to minimize high priority risks. These methods are collectively referred to as control activities, the third component of the COSO Framework.8 Control activities are the actions and tasks imbedded in a process to help achieve expected results. Control activities occur at all levels and functions. They include a wide range of diverse activities such as training, procedures, approvals, authorizations, verifications, reconciliations, performance reviews, security measures, and the creation and maintenance of appropriate documentation. Facts about Control Activities No “one size fits all” set of control activities provides the ultimate solution to manage risk effectively. In some situations, a combination of control activities should be used, and in others, one control activity may be sufficient in reducing one or more risks. Some risks may be similar across all agencies, but the form and formality of mitigation strategies (i.e., control activities) will vary. Smaller agencies may rely on management oversight rather than other types of control activities. For example, management’s retention of authority for approving significant purchases can provide strong control over this activity, lessening the need for additional control activities. Setting up an appropriate segregation of duties can also be challenging in a smaller agency. However, even agencies with only a few employees can assign responsibilities to achieve appropriate segregation, or use management oversight of the incompatible activities to achieve a strong control system. Control activities benefit, rather than hinder, the agency by helping to achieve organizational goals. They are not intended to limit or interfere with an agency’s duly granted authority related to legislation, rule-making or other discretionary policy-making. Instead, control activities can actually help ensure the agency is acting within their authority and complying with legislative requirements. 8 Committee of Sponsoring Organizations (COSO): Internal Control-Integrated Framework Page 14 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Risks and controls need to be in balance. The cost of implementing and sustaining a control activity should not exceed the benefits derived from that control activity, especially since most agencies struggle with limited resources, such as staffing, funding, and time. Attempting to eliminate a risk completely is generally not achievable, would be prohibitively expensive, could create unnecessary obstacles and Impact Impact from from delays in providing agency services and would most risks risks likely slow down productivity. For example, purchasing an expensive locked cabinet to limit access to basic office supplies may not be cost effective. Alternatively, using a locked cabinet to secure highly negotiable assets such as daily cash receipts would be cost effective. Cost Cost of of controls controls Control Activity Design An effective control activity has three features: a carefully thought-out design, effective operation, and routine re-evaluation. A good understanding of the underlying process, obtained by performing a risk assessment, and the participation of staff directly involved in the process, are critical to the creation of a well-designed control activity that addresses the risk in question. Control activities, especially those dependent on human actions, are effective only if they are addressed in written policies and procedures, and are performed consistently. Finally, periodically updating risk assessments keeps related control activities current and relevant. Positive results, including fewer errors and less rework, allow management and staff to focus resources on the agency’s primary goals and objectives. In summary, a control activity has the following characteristics: 1. It addresses the risk in question 2. It is mandatory (i.e., addressed in policies and procedures) 3. It is currently in operation (e.g., has occurred within the last 12 months) Ineffective control activities often disrupt the underlying process and cause operational bottlenecks. A poorly designed control activity is particularly dangerous because it can lull management and staff into a false sense of security. Example: Control Design Flaws In 2003, The U. S. Government Accountability Office (GAO) issued a report titled, Travel Cards, Internal Control Weaknesses at DOD Led to Improper Use of First and Business Class Travel. The report indicated breakdowns in key controls, which resulted in improper premium class travel and millions of dollars of unnecessary costs incurred annually by the Department of Defense (DOD). For fiscal years 2001 and 2002, DOD spent almost $124 million on about 68,000 premium class airline tickets that included at least one leg of premium class service, primarily business class. To put the $124 million into perspective it exceeded the total travel expenses—including airfare, lodging, and meals—spent by each of 12 major federal agencies. In addition, GAO estimated that 72 percent of DOD’s fiscal years 2001 and 2002 premium class travel was not properly authorized, and that 73 percent was not properly justified. GAO estimated that senior civilian and military employees accounted for almost 50 percent of premium class travel. Further, analysis showed that 27 of the 28 most frequent premium class travelers were senior DOD officials. Page 15 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Control Activity Classifications Control activities can be classified as preventive or detective. Preventive control activities (also known as front-end control activities) are designed to avoid errors or improprieties before a transaction is processed. Examples of preventive control activities are delegation of authority assignments, security access restrictions, system edit checks and requiring supervisor approval prior to processing. Detective control activities (also known as back-end control activities) are designed to identify errors or irregularities that have already occurred and enable management to take prompt corrective action. Examples of detective controls are reconciliations and exception report reviews. Control activities can also be manual, automated, or IT-dependent manual. It is not unusual for a process to include a combination of these three classes of control activities. Manual control activities are performed by individuals, such as preparing a bank deposit or performing a reconciliation. Automated controls are incorporated into application systems. Automated control activities are considered more reliable, due to their ability to prevent errors from being entered into the system (e.g., inaccurate vendor number) and by detecting errors within the system (e.g., edit checks). Additionally, automated control activities occur consistently with every transaction, whereas manual control activities are more susceptible to human error. IT-dependent manual control activities are manually performed but require input based on the results of computer-produced information. Examples of IT-dependent manual control activities include management’s review and follow up of a monthly variance report. Management relies on the information system to identify variances and produce the variance report for follow-up. Control activities can also be considered soft or hard. Soft control activities are those that provide notice of a requirement but do not by themselves immediately terminate a transaction for failing to meet that requirement. Examples of soft control activities include statutes, rules, policies and procedures, all of which tell people what should and should not be done. Soft control activities are less effective if not paired up with hard control activities to enforce them. Hard control activities are those that terminate a transaction for failing to meet a requirement. Examples of hard control activities include passwords and authorization codes. Hard control activities can be preventative, such as passwords, or detective, such as audits. Control Activity Categories The following are categories of commonly used control activities. This is by no means an exhaustive list. Authorization and Approval Authorization is the power granted to an employee to perform a task. It is a delegation of duties. Management defines the terms of the authorization and ensures that these terms are documented and clearly communicated. Approval is the confirmation or sanction of employee decisions, events or transactions, based on an independent review. It signifies that the approver has reviewed the supporting Page 16 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES documentation and is satisfied that the transaction is accurate and complies with applicable laws and regulations. Management’s responsibility is to ensure significant transactions are approved and executed only by persons acting within the scope of their authority. Verification/Reconciliation Verification (or reconciliation) typically involves the comparison of an internally prepared document (e.g., purchase order) to an independent source (e.g., vendor invoice) to determine the completeness, accuracy, authenticity and/or validity of transactions, events or information. It is a control activity that enables management to ensure that other control activities are being performed in accordance with directives. Management determines what needs to be verified or reconciled, based on the inherent risk of the underlying process. Management also clearly communicates and documents these decisions in procedures. Employees responsible for conducting the verifications/reconciliations should be required to document that these activities did indeed occur. Examples: Verification/Reconciliation Reviewing vendor invoices for accuracy by comparing to purchase orders and contracts Reviewing grantee documentation prior to making grant payments Comparing cash receipt transactions to cash receipt logs and bank deposit records Reviewing and verifying a participant’s eligibility for state program services Reconciling a department’s cash records to bank statements Documentation Documentation is perhaps the most critical control activity because it preserves evidence to substantiate a decision, event, transaction, or system. All documentation should be complete, accurate, and recorded timely. Documentation should have a clear purpose and be in a usable format that will add to the efficiency and effectiveness of the agency. Examples: Documentation Critical decisions and significant events generally involve senior management. These decisions and events usually result in the use, commitment, exchange or transfer of resources, such as in strategic plans, budgets and executive policies. By recording the information related to such events, management creates an agency-wide history that can serve as justification for subsequent actions and decisions and will be of value during selfevaluations, leadership transitions and audits. Transactions should be traceable from inception through completion to demonstrate how agency resources were utilized and control activities were applied to ensure compliance with agency objectives. This means the entire life cycle of a transaction should be documented, including: (1) identifying the initiator and authorizer; (2) tracking progress and hand-offs through all stages of processing; and, (3) pinpointing where documentation is maintained and for how long. Policies and procedures are critical to the daily operations of a department. These documents set forth the fundamental framework and the underlying methods and processes all employees rely on to do their jobs, including key control activities (see discussion of key control activities on page 20). Policies and procedures provide specific direction and help form the basis for decisions made every day by employees. Without this framework of understanding by employees, conflicts or inconsistencies can occur, poor decisions can be made and serious harm can be done to the department’s reputation. Further, the efficiency and effectiveness of operations can be adversely affected. Page 17 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Position descriptions communicate control activity expectations and responsibilities to staff. At a minimum, position descriptions should include the key control activity critical to the success of the agency’s goals and objectives. Annual employee performance evaluations provide the perfect opportunity for supervisors and staff to discuss the importance of the control activities and hold staff accountable for performance of these control activities. Supervision Supervision is the ongoing oversight, management and guidance of an activity by designated employees to help ensure the results of the activity achieve the established objectives. Those with the responsibility for supervision should: Assign tasks and hold staff accountable for key control activities Establish written procedures for completing assignments Systematically review and evaluate each staff member's work Approve work at critical points to ensure quality and accuracy Provide guidance and training when necessary Document supervisory reviews (for example, initialing examined work) Separation of Duties Separation of duties is the division or segregation of key duties and responsibilities among different people to reduce the opportunities for any individual to be in a position to commit and conceal errors (intentional or unintentional), or perpetrate fraud in the normal course of their duties. The fundamental premise of segregated duties is to prevent any one individual from controlling and performing all key functions of a transaction or event: authorization/approval, Recording/ recording/accounting, reconciliation and custody. A Accounting combination of two or more of these functions performed by the same employee is called incompatible duties.9 Authorization/ Approval Separation of Duties Triangle Reconciliation Custody of Assets In cases where duties cannot be effectively separated, management can substitute increased review or supervision as an alternative control activity (i.e., a compensating control) to help reduce the risks. In an environment with a very limited number of employees, management needs to be involved in reviewing and approving transactions, reports, and reconciliations. Compensating controls are less desirable as they generally require more resources and typically occur after the fact. Examples: Incompatible Duties Requiring Separation of Duties Individuals responsible for data entry of invoices should not be responsible for approving these documents (recording/accounting and authorization/approval) Individuals responsible for acknowledging the receipt of goods or services should not also be responsible for 9 Lists of incompatible duties related to statewide systems are available on-line (http://www.beta.mmb.state.mn.us/security) (SWIFT: Conflict Matrix and Instructions for SWIFT Statewide Systems Access Form; SEMA4: Incompatible Access) Page 18 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES purchasing or payment activities (custody and recording/accounting) Individuals doing personnel onboarding (i.e., direct deposit, update/correct and personal data/job data updates) should not have access to mass time entry, business expenses or payroll adjustments (authorization/approval and recording/accounting) Managers should review and approve payroll expenses and time sheets before data entry, but should not be involved in preparing payroll transactions (authorization/approval and recording/accounting) Individuals performing physical inventory counts should not be involved in maintaining inventory records nor authorize withdrawals of items maintained in inventory (reconciliation, custody, and recording/accounting) Individuals receiving cash into the office should not be involved in authorizing and recording bank deposits in the accounting records (recording/accounting, authorization/approval and custody) Individuals receiving revenue or making deposits should not be involved in reconciling the bank accounts (custody, recording/accounting and reconciliation) Access Security Securing access to resources and information reduces the risk of unauthorized use or loss. Management should protect the department's equipment, information, cash receipts, documents and other resources that could be wrongfully used, damaged or stolen. Management can protect these resources by limiting access to authorized individuals only. Management decides which resources should be safeguarded and to what extent. Management makes this decision based on the vulnerability of the items being secured and the likelihood of loss. Examples: Access Security to Safeguard Physical Assets Securing mobile items within locked facilities Locking up cash receipts Utilizing key cards to limit access to agency facilities Performing periodic physical inventories of assets for verification of values, location, and appropriate utilization Access controls restrict access and safeguard data files and information maintained in information systems. Access controls are set based on the employee’s need to access data files and information necessary to perform his or her specific job duties while maintaining acceptable separation of duties. Periodic management reviews of system access must ensure employee access is appropriate based on any new or changed job duties. Examples: Access Security to Safeguard Electronic Assets Use of multilevel security User identification along with regularly changed passwords Callbacks and dial-up systems Firewalls Limited access to not public data Encryption of confidential information Reporting Page 19 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Reporting is a means of conveying information. Effective and accurate reporting control activities provide information on issues such as timely achievement of goals, accurate financial position and payroll irregularities. Reporting also, helps promote accountability for actions and decisions. Examples: Effective and Accurate Reporting Project status reports to alert management to potential cost or time overruns Payroll Register reports to confirm accuracy of current and prior pay period adjustments, salary increase adjustments, special payments, earnings codes, hours, pay rates, salary amounts, and amounts of any lumpsum payments The state’s Comprehensive Annual Financial Report (CAFR) audited and issued for the public’s review of Minnesota’s financial performance and position Control Activity Gaps and Redundancies Once all the control activities within a business process are identified, it may become apparent that control gaps and redundancies exist. A control gap occurs when there are either insufficient or no actions (i.e., control activities) taken to avoid or mitigate a significant risk. For example, in a process that involves the collection of large amounts of cash, there is a control gap if no effort is made to secure the cash before depositing it. A redundancy occurs when multiple control activities address the same risk. Control redundancies often occur by design to provide additional assurance in high-risk circumstances. Control gaps should be clearly documented in the risk assessment in a manner that draws them to the attention of management. Each control gap should be reviewed to confirm that there is a control gap and to evaluate potential steps to sufficiently mitigate the risk. Where possible, a plan should be formulated to address the gap, assign responsibility and establish a target resolution date. Risk assessments with control gaps should be reviewed more frequently so that management can ensure corrective action is being taken where necessary. On the other hand, redundant controls should only be removed after careful consideration, and where written documentation substantiates that eliminating the control activity would not jeopardize the process. Redundancy should not be the only factor leading to elimination of the control activity. Seemingly, redundant controls may address other risks or add another level of protection against occurrence of a significantly high risk. Page 20 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Prioritizing Control Activities The initial exercise of identifying control activities within a particular business process may result in an extensive list of control activities. Even though it may be beneficial, in certain situations, to have backup controls in case a main control activity fails, managing a large number of redundant control activities can reduce process effectiveness and efficiency. Control activities are only as important as the risks they address, and management cannot devote the same amount of resources to all control activities. At this point, the judgment of management and subject matter experts are needed to determine which individual controls are key10 to addressing one or more significant risks in the event that all other controls fail. Once key control activities have been identified by the team, documentation is essential to showing that key control activities actually exist and are effectively designed. The documentation also provides management with a clear picture of critical points requiring special attention when proposing modifications to the existing process. Documented details about each key control include: Who is performing the control When the control occurs and at what frequency How the control is performed What evidence exists proving the control was performed Which reports, if any, are used in the operation of the control activity Best Practices: Documenting Key Controls Draw attention to each key control activity in the business process narrative or flowchart (e.g., bold font or shaded flowchart box, making the key control activity more visible) Include key control activities in policies and procedures Include key control activities in position descriptions of employees responsible for carrying them out and discuss the responsibilities during formal performance reviews Validating Key Controls To ensure a key control activity operates as intended, a three-step validation is performed: (1) determining whether the control activity is properly designed, (2) confirming whether the control activity is operating as intended, and (3) effectively mitigating the applicable risks. To determine whether a key control activity is properly designed, a tester11, independent of the business process, validates the design of the control by answering the following questions: Does the control activity occur at the right point in the process? Does the control activity occur at the right frequency? Would the control activity prevent or detect the intended error or nonconforming circumstance (e.g., ineligible recipient, inaccurate amount, etc.)? Is the control activity the most cost effective way to address the risk? 10 A key control activity is (1) one that addresses one or more significant risks to an organization or process, or (2) one that addresses multiple risks that cumulatively are significant. However, even though the control activity meets one or both of these criteria, whether it is a key control activity is a management decision. 11 A tester can be an employee in the division; department or unit as long as that person is not directly involved in performing the actions or steps in the business process. Page 21 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES To ensure a key control activity is operating as intended, the tester performs a walkthrough of the process to ensure the employee or application performing the key control activities is in fact doing the tasks described in the narrative or flowchart. A walkthrough is normally performed by following a transaction or work item through the process, focusing on the key control activities. To begin the walkthrough, the tester selects at least one transaction or work item (e.g., recipient eligibility documentation) and follows the item through the process. To corroborate the process documentation that was used for the risk assessment, the tester: Asks employees to demonstrate how the control activity is performed and documented Asks how exceptions to the prescribed processing procedures and controls are identified as well as any differences and verifies the exception procedures were followed Documents differences between what the narrative or flowchart indicate and what is actually done Examples: Walkthrough Steps for Selected Control Activities (to be completed by the tester) Approval: Ask an employee what he/she is looking for prior to approval, such as reviewing supporting documentation to ensure a transaction is accurate and posted to the appropriate account. Inquire as to how the approval is documented (e.g., initials and date), and what the approver does if an error or discrepancy is found. The tester examines documents to confirm approval (i.e., evidence of supporting documentation and approver initials) and ensure error resolution procedures were performed as discussed. Reconciliation: Ask employee to explain or demonstrate how a reconciliation is performed. Obtain a completed reconciliation and perform the following steps: o Review one or more of the reconciliations to determine whether all the relevant data are accurately and promptly included o Note the explanation and disposition of any unusual items o Inquire about actions taken when actual or potential errors are indicated on the reconciliation o Inquire how the errors occurred o When practical, obtain evidence of the error corrections noted during the reconciliation process o Ensure timely completion of the reconciliation and clearing of reconciling items In addition to walking through the physical flow of documents and forms, the flow of data and information through IT systems is equally as important. These steps may include inquiry of independent and knowledgeable personnel, review of user manuals, observation of a user processing transactions at a terminal in the case of an online application, and review of documentation such as output reports. The following outcomes are possible upon completion of a walkthrough: 1. The process outlined in the narrative/flowchart matches the actual process, and the key control activities are documented and operating as intended. 2. The process outlined in the narrative/flowchart does not match the actual process, indicating some key control activities are not operating as intended. Action steps should be developed to revise the narrative/flowchart and improve compliance with these control activities. 3. The process outlined in the narrative/flowchart matches the actual process and the key control activities are operating, but one or more of the key control activities is not mitigating the risk as intended. Action steps should be developed to either evaluate the situation and implement corrections, such as revising the existing control activity or develop/implement a new control activity. At a later point in time, any revised or new control activities should be re-evaluated to ensure they are operating effectively. Page 22 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Walkthroughs of business processes and related control activities should be documented (i.e., brief memos) describing the procedures performed. This documentation provides proof that management determined whether the key control activities were effectively operating to mitigate risks. 6. Create action plans to address control gaps and redundancies Over the course of the risk assessment project, it is likely the assessment team and/or tester will identify situations where the existing internal control structure contains deficiencies, thereby requiring further action, such as: Modification or enhancement to strengthen a weak or ineffective control activity Development and implementation of a control activity to mitigate an uncontrolled or under controlled risk Automation of manual controls to improve both efficiency and compliance within the business process Removal of redundant control activities or other procedures that do not add value to controlling a risk To address the above deficiencies, management, or employees assigned the responsibility, develop and monitor any action plans to ensure issues are followed up and resolved in a timely manner. Action plans typically include the following: Business process name Description of control activity Issue (control gap or redundancy) Risk or implication of the control issue Actions planned for improvement Person(s) responsible for resolving the issue Target completion date for resolving the issue 7. Communicate results to management At the completion of a risk assessment project, the project leader or team communicates the results, both positive and negative, to senior management. The method of communication can take on various forms, such as a written report or oral presentation. Depending on management’s experience and perspective, the assessment team might decide to provide some general background on internal controls and an overview of the risk assessment process. The risk assessment results should include a discussion of the team’s views on the effectiveness of the control system and opportunities for improvement (e.g., action plans). Senior management can use this information to track risk assessment plan progress. The agency head can use the information to support the annual certification of the agency’s internal control system. Page 23 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES SUSTAINABLE RISK ASSESSMENTS Internal and external influences (e.g., new management, regulatory changes) can trigger agency business processes to evolve and change over time. These changes often affect the internal control structure by introducing new risks and/or making existing control activities ineffective or obsolete. Therefore, it is important and necessary for agencies to reassess completed risk assessments affected by change and revise the risk assessment documentation accordingly. Examples of documentation revisions may include: Updating business process documentation Identifying and prioritizing any new risks Assessing the effectiveness of existing control activities at addressing new risks Developing and implementing action plans to address any control gaps or weaknesses Appendix C, Ongoing Change Indicators for Completed Risk Assessment Questionnaire, provides guidance in detecting changes requiring updates to completed risk assessment documentation, Risk assessments requiring updating should be communicated to management and added to the risk assessment plan. Also, agencies may encounter instances where certain business processes appear to be static and not affected by changes. However, subtle changes may have occurred over time, such as control activities becoming ineffective or no longer being performed. Completed risk assessments for these processes should be reviewed periodically to ensure documentation remains accurate, key control activities continue to operate as intended and as described in the documentation, and key control activities are effectively mitigating applicable risks. The review may be accomplished by performing a walkthrough of the process, testing a sample of applicable transactions, or a combination of both. (Refer to the “Validating Key Controls” section of this guide.) Page 24 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Page 25 of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES APPENDIX A BUSINESS PROCESS DEFINITION (Back to RISK ASSESSMENT PLAN) Management can easily become overwhelmed by the volume and complexity of activities performed within an organization, such as grant management, payroll, procurement, cash receipts, etc. To simplify this task, we suggest grouping activities into business processes or sub processes. A business process can be defined as a group of interrelated activities or tasks initiated in response to an event that achieves a specific result for the customer of the process. Adding more specific detail to that general definition: group of interrelated: o the process steps relate to each other o interrelationship is through sequence and flow (e.g., the completion of one step leads to, or flows into, the beginning of the next step) o steps are related by dealing with the same goal or objective o steps are related by being traceable back to the same initial event activities or tasks: o a collection of actions or steps making up a process initiated in response to an event: o a clear starting point exists o the process must be initiated in response to a specific occurrence (e.g., a request for benefits, employee completes time entry) o having an event AND a result allows the tracing of the sequence of tasks that turns the event into the result achieves a specific result: o delivery of a specific goal or objective (e.g., determination of recipient eligibility, employee gets paid) o a clear endpoint exists customer of the process: o the customer can be a person or an organization that is internal (employee, other state agencies) or external to the organization (recipient of grant or service) o a customer receives the result or is the beneficiary of it (e.g., recipient becomes eligible for benefits, employee gets paid) Below are some examples of processes one might find operating within an agency: Human Resources/Payroll New hire on-boarding Bi-weekly payroll processing Employee separations Competitive Grants Grant awarding Grant payments Grant closeout i Cash Receipts/Accounts Receivable Billing and accounts receivable Cash collections GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Breaking down complex or large business processes into sub processes might become necessary to effectively manage risk assessments. Sub processes create efficiencies, such as having a smaller group of actions or steps that can be more easily understood and evaluated for risks and control activities. In addition, sub process risk assessment projects typically take less time to complete and involve a fewer number of subject matter experts or team members. Below are some examples of possible sub processes within the Bi-Weekly Payroll Processing business process: SEMA4 Self Service Central payroll processing through SEMA4 Payroll and deduction distributions The following diagram illustrates an event, activities/tasks and result for a SEMA4 Self Service sub process: Page ii of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES There are two interconnected approaches (see image below) for identifying business processes within an agency: by functional area and by program/service. Identifying processes by functional area is appropriate when the activities and tasks performed are consistent, regardless of the program or service (e.g., cash management). This approach is also efficient, in that the process is looked at one time for all programs, rather than duplicated on a program-by-program basis. Conversely, identifying processes within a program/service is appropriate where processes are unique to a particularly large or complex program/service. A combination of both approaches should be considered to ensure process identification is efficient and includes all significant processes within the entity. Programs/Services* Functional Areas* Disbursements/ Purchasing/ Accounts Payable Competitive Grants Licensing X Recipient Benefits Administrative Expenditures Capital Construction X X X X X X Receipts/Accounts Receivable Payroll X X Recipient Eligibility X X Sub-Recipient Monitoring X X Cash Management X X Financial/Program Reporting X X X X X Budgeting X X X X X Capital Assets X X * The above functional areas and programs/services are for illustrative purposes only and not intended to be all-inclusive. Page iii of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Page iv of 23 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES APPENDIX B BUSINESS PROCESS PRIORITIZING FACTORS (Back to RISK ASSESSMENT PLAN) Below is a list of factors agency management might consider when evaluating business processes for inclusion in the agency’s risk assessment plan (i.e., those processes/programs that inherently pose the greatest risks and threats to achieving agency mission and objectives). The list is provided as a starting point. It is not meant to be all-inclusive; each factor may not be relevant to every agency. Agency management is encouraged to add, delete or revise the factors, as they deem appropriate to better align them with the agency’s mission and responsibilities. Size and Composition (materiality) – the significance of total dollars flowing through the process or program/grant compared to the agency’s overall budget. Special consideration should be given to the following processes/programs: o Processes audited as material to the financial information presented in the Comprehensive Annual Financial Report (CAFR) o Federal programs identified as major in the Financial and Compliance Report on Federally Assisted Programs (Single Audit) o Processes relating to the organization’s primary sources of funding and major expenditures o Other processes critical to achieving the organization’s primary mission and objectives Volume or frequency of transactions – number of transactions funneled through the process or program/grant, and/or how often transactions occur Complexity of transactions – whether transactions are routine or require calculations, estimates or adherence to complex accounting or program requirements Operating changes – significance of process changes, regulatory changes, new personnel, new products/services, new programs, rapid growth, rapid downsizing Policies and procedures – whether policies and procedures exist, are kept current and reflect operating changes as these changes occur External environment – outside influences that may impact the organization and cause volatility/uncertainty in the way the organization currently operates (e.g., economic, regulatory, technological, legal, and physical conditions) IT – whether activities are automated or manual, new technologies have been recently implemented, significant changes have been made to existing technology, and/or whether the business process is reliant on a legacy or unsupported system Staffing – tenure and expertise of employees, staffing levels, succession planning, training and development plans, cross-training Legal – complexity of existing legal and regulatory requirements, pending litigation/legislation, previous legal proceedings v GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Audit Issues – significance of internal/external audit findings (e.g., material weaknesses or significant deficiencies), repeat audit findings Reputation – susceptibility to media exposure/scrutiny; probability of negative publicity associated with perceived or actual breaches in an organization’s business practices, such as security breaches, fraud, lawsuits, mismanagement, customer complaints and public concerns Not Public data – whether or not public data is collected and how the data is managed (i.e., business purpose, storage, security, access, retention and disposal practices) Fraud – consideration of the types of fraud or misconduct that could occur, such as: o Reporting: intentional misstatements, omissions, misrepresentations or intentional misapplication of accounting principles o Assets: misappropriation of physical assets and information, including theft of property, embezzlement of receipts, fraudulent payments and identity theft o Fiduciary cash or property: theft or mismanagement of cash or property held in a fiduciary capacity for the benefit of another person or organization o Corruption: bribery and other illegal acts o Waste: the act of using or expending agency resources carelessly, extravagantly or to no purpose o Abuse: improper behavior, including misuse of authority/position for personal gain vi GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES Best Practice: Business Process Prioritization Agency management may choose to develop standard criteria for prioritizing business processes as demonstrated in the table below: Factor Size and composition – impact of process on account balance or total program expenditures Probability of error or fraud impacting the process Complexity – degree of judgment or subjectivity involved, such as estimating a transaction amount/account balance or determining recipient eligibility Operations – length of time business process has been operating without significant changes. IT Dependency Total Score High (3 points) Process impacts the account balance or program expenditures > 30% Recent or history of recurring audit findings and/or material adjustments; recent fraudulent activity Highly complex Medium (2 points) Process impacts the account balance or program expenditures < 30% but > 10% History of past audit findings or immaterial adjustments; past fraudulent activity Low (1 point) Process impacts the account balance or program expenditures < 10% No history of audit findings or fraud in previous 5 years Moderately complex Not complex Less than one year. Staff is relatively inexperienced 5 years or less; no significant changes to process within last 12 months; no turnover of key employees within last 12 months Moderately automated Process has been in operation for over 5 years; no significant changes to process; no turnover of key employees Highly automated Highly manual and complex; IT infrastructure is older with many manual interfaces > 15 < 15 but > 10 vii < 10 GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES APPENDIX C Ongoing Change Indicators for Completed Risk Assessments Questionnaire Agency: ___________________________________________________________________ Certification Year: ___________________________________________________________________ Risk Assessment: ___________________________________________________________________ Person(s) Responsible: ___________________________________________________________________ To be completed annually for all risk assessments included in the plan Yes: No: 1. Has there been any significant change(s) in the operating environment since the risk assessment was last completed/updated? 2. Has there been any significant change(s) in leadership or personnel since the risk assessment was last completed/updated? 3. Has there been any change(s) in information technology equipment or information systems (e.g. software, operating systems, etc.) since the risk assessment was last completed/updated? 4. Has there been any expansion or reduction(s) in personnel or funding of the business process area since the risk assessment was last completed/updated? 5. Has there been any change(s) in service delivery models, legislation, program requirements, products or activities since the risk assessment was last completed/updated? 6. Has there been any audit findings (Internal, OLA, Federal, External, etc.) associated with business process area since the risk assessment was last completed/updated? 7. Has there been any indication of failure in control activities since the risk assessment was last completed/updated (e.g. media reports, legal issues, litigation, fraud, customer or public complaints, etc.)? 8. Have any other issues developed or relevant incidents occurred since the risk assessment was last completed/updated that should be considered or evaluated? Total (add up the number of “yes” and “no” responses in each column): A. Based on the responses to the questions in the change factors questionnaire above, does this risk assessment area need to be reviewed and updated? (Note: A risk assessment that scored three or more “yes” responses may provide a strong indication of needing review and updating). ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ________________________________ B. If you answered ‘yes’ to question ‘A’ above, what is your plan and timing for updating this risk assessment and the supporting documentation? viii GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ________________________________ C. Comments ______________________________________________________________________________ ______________________________________________________________________________ ______________________________________________________________________________ ________________________ ix GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES x GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES APPENDIX D COSO FRAMEWORK - PRINCIPLES The revised COSO Framework, effective May 2013, added a set of underlying principles for each internal control component, including the components of risk assessment and control activities. To have an effective internal control system, the COSO Framework emphasizes the need for each component and relevant principle to exist and be functioning. The principles are considered suitable for any organization; however, some organizations may determine that one or more principles are not relevant based on their specific business model. In these instances, management should document the rationale for excluding a principle. The underlying principles for the risk assessment component and control activities component were incorporated into the guide unless otherwise noted. Risk Assessment 1. The organization specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives. 2. The organization identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managed. 3. The organization considers the potential for fraud in assessing risk to the achievement of objectives. 4. The organization identifies and assesses changes that could significantly impact the system of internal control. Control Activities 1. The organization selects and develops control activities that contribute to the mitigation of risk to the achievement of objectives to acceptable levels. 2. The organization selects and develops general control activities over technology to support the achievement of objectives. (Not addressed in the guidance. General control activities relating to the IT environment are managed by MN.IT Services.) 3. The organization deploys control activities though policies that establish what is expected and procedures that put policies into action. xi GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES BIBLIOGRAPHY 1. American Institute of Certified Public Accountants Statement of Auditing Standards No. 106, Audit Evidence. (A.U. § 326, para .14 & .15). 2. Committee on Sponsoring Organizations of the Treadway Commission (COSO). (1994). Internal Control – Integrated Framework. American Institute of Certified Public Accountants. 3. Gauthier, S. J. (1994). An Elected Official’s Guide to Internal Controls and Fraud Prevention. Government Finance Officers Association. 4. Institute of Internal Auditors (January 2008). SARBANES-OXLEY SECTION 404: A Guide for Management by Internal Controls Practitioners. Retrieved July 2011 from www.theiia.org/download.cfm?file=31866 5. Mattie, A.J., Hanley, P.F., & Cassidy, D.L. (2005). Internal Controls: The Key to Accountability. Retrieved August 2010 from PriceWaterHouseCoopers: www.pwc.com/education 6. Minnesota Department of Administration, Office of Grants Management, Minnesota Grants Management—Policies and Statutes. 7. Minnesota Statute 16A.057 Internal Controls and Internal Auditing 8. National Association of State Auditors, Controllers and Treasurers (NASACT). (July 2008). The Internal Control Guidebook. Retrieved March 15, 2010 from http://www.nasact.org/nasc/committees/multistate/downloads/Internal_Control_Guidebook.pdf 9. North Carolina State University, Poole College of Management, Enterprise Risk Management Initiative. Retrieved March 2013 from http://poole.ncsu.edu/erm/ 10. Raftery, W. J. (Revised April 2005) State of Wisconsin: Instructions for the Preparation of an Agency Internal Control Plan. Retrieved June 2010, from http://www.nasact.org/nasc/committees/multistate/index.cfm 11. Sponsoring organizations (AICPA, IIA, and ACFE). Managing the Business Risk of Fraud: A Practical Guide. Retrieved May 2013, from http://www.aicpa.org 12. State of Maine, Office of the State Comptroller, Internal Audit. Internal Control Guide for Managers. Retrieved March 2013 from http://www.maine.gov/osc/internalaudit/guideformgrs.shtml 13. State of Mississippi Department of Finance and Administration. (2008, 30 June). Internal Control. Retrieved June 2011 from http://www.dfa.state.ms.us/Offices/OFM/BFR%20Files/MAAPP%20files/30%20Internal%20Contro l%201.pdf 14. State of Montana Department of Administration, State Accounting Division. Retrieved April 2013 from http://accounting.mt.gov/forms/chapters/default.mcpx xii GUIDE TO RISK ASSESSMENT AND CONTROL ACTIVITIES 15. State of New York Comptroller. (October 2007). Standards for Internal Control in New York State Government. Retrieved July 2011 from http://www.osc.state.ny.us/agencies/ictf/docs/intcontrol_stds.pdf 16. State of North Carolina Office of the State Controller. EAGLE Program Guidance Manual. Retrieved June 2011 from http://www.osc.nc.gov/eagle 17. State of Vermont Department of Finance and Management. Internal Control Standards: A Guide for Managers. Retrieved June 2011 from http://finance.vermont.gov/sites/finance/files/pdf/IC/IC_Standards_Guide_Managers.pdf 18. State of Washington Office of Financial Management, Risk Management Basics (September 2008). Retrieved April 2013 from http://www.docstoc.com/docs/25241340/Risk-Management-BasicsManual 19. United States General Accounting Office (November 1999) Standards for Internal Control in the Federal Government. 20. United States Office of Management and Budget (June 2010) Circular A-133, Audits of States, Local Governments and Non-Profit Organizations, Compliance Supplement, Part 6—Internal Controls. 21. United States Office of Management and Budget (July 2005) Circular A-123, Management's Responsibility for Internal Control, Appendix A—Implementation Guide. 22. University of California, Understanding Internal Controls. Retrieved April 2013 from http://www.ucop.edu/ucophome/businit/boi/docs/03-understanding_internal_control.pdf. xiii