Vous êtes sur la page 1sur 10

Use ERP Internal Control

Exception Reports to
Monitor and Improve
Controls
BY LESLIE D. TURNER, CMA, CFM, DBA, AND VINCENT OWHOSO, PH.D.

ORGANIZATIONS WITH ERP SYSTEMS CAN USE INTERNAL REPORTS TO CONTINUOUSLY

MONITOR AND IMPROVE THEIR INTERNAL CONTROLS THROUGH PERIODIC

ON-DEMAND OR SPECIALIZED REPORTS. USING THESE REPORTS TO MONITOR AND

IMPROVE USER ACCESS CONTROLS AND SEGREGATION OF DUTIES CAN REDUCE COSTS

AND THE LIKELIHOOD OF UNNECESSARY EXPOSURE WHILE IMPROVING EFFICIENCY,

RESPONSIVENESS, AND COMPLIANCE PROCEDURES.

he extensive use of enterprise resource plan- monitoring internal control compliancespecifically,

T ning (ERP) systems provides opportunities


for continuous monitoring and improvement
of internal control systems. This continual
monitoring and improvement of internal con-
trols, in turn, assures that management can comply with
relevant sections of the Sarbanes-Oxley Act of 2002
(SOX). In this article, we will describe critical processes
the use of control reports to monitor and improve user
access controls and segregation of duties.
Control reports can be defined in many ways. Our
use of control reports will refer to standard or special-
ized reports available in ERP systems to report autho-
rization or user access violations. Some reports may
have an enterprise-wide focus, while others may be
and systems that are necessary to monitor internal con- within specific business processes, such as purchasing.
trol compliance and the implications for SOX compli- For example, a report of conflicting capabilities can
ance. Internal controls have been integrated into show users with conflicts across various business
accounting software systems for many years, and ERP processes. A report examining a history of changes to a
systems have enabled monitoring of internal controls record for control violations would focus on a specific
that was not possible with legacy systems. For example, business process. These reports are used for several
ERP systems can provide control reports that highlight purposes. The appropriate manager or internal auditor
inappropriate segregation of duties from an enterprise- can review such reports for internal control self-
wide perspective. assessment and control improvement.
The focus here will be on such newer approaches to Monitoring internal control compliance is important

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 41 SPRING 2009, VOL. 10, NO. 3


in ERP systems because core business processes such as Potential damage to customer or shareholder confi-
purchasing, accounts payable, cost accounting, banking/ dence, public image, and reputation.
treasury functions, and human resource systems are inte- The possibility of incurring additional costs.
grated into an enterprise-wide system. The ERP plat- A breach of legal, regulatory, or contractual
forms allow companies to reduce costs, become more obligations.
efficient, and respond faster to changes in the market- The potential disruption of business activity.
place. This increased functionality, however, creates dif-
ferent risk profiles that, if not monitored properly, can To lessen these risks, internal controls should be
result in control breakdowns and potentially significant properly established, monitored, and improved.
losses for a company. ERP systems also push initiation The use of control reports to monitor authorization or
or authorization of transactions to lower levels of the user access violations is important in continuous moni-
organization, thereby causing increased control prob- toring and improvement of internal control. As an analo-
lems. These control risks and problems must be coun- gy, the use of cost accounting systems with variance
terbalanced by effective internal controls that should be reports can be useful in continual monitoring and
monitored constantly to ensure organizational effective- improvement of manufacturing efficiency and effective-
ness, efficiency, and safeguarding of processes. ness. Yet such variance reports are not useful unless an
underlying structure has been established with a proper
I M P O R TA N C E OF INTERNAL CONTROLS accounting system to monitor costs against standards
Managers, accountants, and internal auditors bear and unless management regularly reviews variance
responsibility for developing, monitoring, and improv- reports and uses the reports to improve manufacturing
ing internal control systems. Their responsibilities control. Likewise, control reports in an ERP system can
include preventing, detecting, and correcting control be useful if a proper underlying structure is established
weaknesses and risks that may cause a failure to achieve and management uses the resulting control reports
operational and information-processing objectives. The properly to monitor and improve internal controls.
key risks of which each of these parties must be aware
as they develop and monitor internal controls include: CO N T I N U O U S M O N I TO R I N G U S I N G E R P
The risk of fraud, particularly for systems with E XC E P T I O N R E P O R T S
payment-generation capability, when a single person A model of continuous monitoring using ERP excep-
has ERP authorizations that allow control of two tion reports presents a dynamic, iterative, and interac-
parts of a transaction. This inappropriate segregation tive process whereby a properly configured ERP system
of duties can lead to fraudulent activity. generates reports for the purpose of monitoring and
Noncompliance with privacy guidelines. ERP improving internal control (see Figure 1).
systems store enormous amounts of data, including The use of a system based on this model improves
customer, vendor, and employee data. Without prop- control over business goals and objectives, business
er internal control, privacy can be violated intention- processes, and control activities. The controls moni-
ally or unintentionally. tored include controls over user access, segregation of
Inappropriate disclosure of time-sensitive business duties, operations, policies and procedures, information
data. technology, and external compliance. The model
Malicious or accidental damage to data. If weak ensures that internal control weaknesses within core
internal controls allow inappropriate access to data, it business processes routinely are prevented, detected,
is possible for data to be altered or destroyed. and corrected at the business unit levels. Business unit
A potential loss of competitive advantage. administrators periodically run and review exception
The potential for incorrect management decisions to reports for control deficiencies. This allows administra-
be made. tors to improve affected controls. At the enterprise lev-
A potential loss of business. el, the model ensures that generated reports are used

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 42 SPRING 2009, VOL. 10, NO. 3


Figure 1: A Model of Internal Control Compliance
Through Exception Reporting

Improved
Safeguard Assets Organizational Data Integrity SOX Compliance
Efficiency
ACHIEVES

EXCEPTION REPORTS

Feedback to improve Feedback to improve


ERP SYSTEM

Segregation of Access User Access


Duties Administrator

for the purpose of monitoring internal controls over master data. The model also assumes that there is a
strategic goals and external compliance. well-established reporting chain in the organization to
ensure that upper management follows up exception
ASSUMPTIONS OF THE MODEL reports on safeguarding of assets, improvement of orga-
The model assumes the existence of a proper organiza- nizational effectiveness, data integrity, and compliance
tional structure that is integrated with the operational or with SOX (and other laws and regulations) and con-
business processes, information technology objectives, tracts. The model expects the organizational structure
and the various internal players. It also assumes that the to include well-defined information technology and
organization is committed to a culture that encourages operations and control objectives, policies, and proce-
regular monitoring and control of user access through dures that are available to the access administrators for
segregation of duties and avoidance of conflicting capa- setting up the ERP for appropriate user access, segrega-
bilities. The model further assumes the existence of a tion of duties, and the required control objectives and
properly configured ERP system with access adminis- control activities at each business process or departmen-
trators at each major unit within the organization to tal unit.
assist in the development, continuous monitoring, and The model begins with the performance of control
improvements of internal controls. The access adminis- activities by the internal players. These control activi-
trators should provide updates of user profiles as ties create dynamic and iterative processes for monitor-
changes in duties occur, should schedule regular control ing and improving internal controls through the
reports of conflicts in user profiles and changes to mas- generation of control reports. The control reports allow
ter data, and should use control reports regularly to business unit managers to identify potential deficien-
reduce profile conflicts and unauthorized changes to cies in the user access profiles and conflicting capabili-

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 43 SPRING 2009, VOL. 10, NO. 3


ties and then make timely improvement to the control being met in a timely, continuous manner.
profiles. In summary, the iterative steps in the model of ERP
The access administrator is a key internal player who control reports are proper setup of the organizational
first implements the control objectives (as agreed to by structure and the ERP system, management review of
management) and control activities within the informa- control reports, and improvement of the organizational
tion technology area of the organization. He or she sets and ERP setup.
up the ERP properly to allow for the generation of on- Now we examine the major critical issues in the
demand and periodic reports for continued monitoring model and its application and analysis in a real Fortune
and improvement of the setup. Some of the critical set- 500 company. As it is not possible to cover the entire
up areas are user access and segregation of duties. User array of internal controls in a single article, we will focus
access is the determination of which data and modules on a set of extremely critical internal controls. Our focus
a user is authorized to access, and segregation of duties is on user access and the prevention of conflicting
prevents a single person from controlling two ends of a capabilities.
transaction. These activities are determined and con-
trolled by the access administrator, who assigns segrega- A C C E S S A D M I N I S T R AT O R
tion of duties profiles to each and every user according The role of the access administrator in the model is a
to the policies and procedures of the organization. critical one because the access administrator is responsi-
These specific user profiles in the ERP system also ble for monitoring and granting user access. The pur-
allow the organization to implement the policies and pose of this role is to ensure that all users have the
procedures regarding segregation of duties, access con- appropriate system access that allows them to work effi-
trols, delivery and support services, IT solutions and ciently and within boundaries that minimize the risk of
services, and other business processes. The access fraud, inappropriate access, or the loss of data. The
administrator feeds these policies, procedures, and con- access administrator is responsible for delivering control
trol activities into the ERP and the enterprise-wide sys- reports to each business unit manager, who is then
tems and restricts each user to specific control activities. responsible for reviewing the capabilities of individual
Then the appropriate unit managers (or other autho- employees authorized roles for compliance and conflict
rized individuals) monitor these activities for the resolution. (The access administrator only delivers the
desired outcomes in their departments through on- reports; the responsibility to review and validate the
demand or regular control reports related to safeguard- correctness is with the businessi.e., the users
ing assets, organization efficiency, data integrity, and managers.)
SOX compliance. By reviewing these reports for excep- Persons appointed as access administrators should be
tions or violations, the business unit managers and IT well trained in their field and be responsible for admin-
administrators are able to identify weaknesses in the istering user access to the ERP system, including the
various control activities. Upon evaluating the implica- ability to create, suspend, remove, and maintain user
tions of the weakness, the managers respond to the accounts as defined for a specific class or group of users
deficiencies by designing improvements that, in turn, and manage and reset credentials and services as autho-
are fed into the ERP systems. This ends an iteration rized by management. In addition, access administrators
process for one period and begins another iterative step should possess the ability to define and update key
in a dynamic process of monitoring internal controls. business process information or transactions, monitor
(We want to note that the outcome of the iterative and the status of key transactions, validate processes and
feedback process also results in reports that are generat- data periodically, review errors and control reports, and
ed and used for ensuring that goals relate to organiza- document standards, guidelines, and procedures. These
tion efficiencies and the maintenance of data integrity.) responsibilities suggest that the role of access adminis-
This outcome also helps ensure that external compli- trator should be assigned to business unit managers.
ance such as SOX compliance requirements are also Some of the duties that access administrators perform

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 44 SPRING 2009, VOL. 10, NO. 3


include: access to execute and therefore might cause consid-
Determining business and information security erable rework or system availability issues.
requirements that are based on management
objectives. In summary, monitoring user access in an ERP sys-
Ensuring information and systems are protected in tem will ensure that breaches of unauthorized access to
line with their importance to the enterprise. the system are found and that procedures and employ-
Granting user access based on each unit manager ees with conflicting roles are quickly identified and
determining which users are authorized to access those authorizations are terminated in a timely manner.
particular information and systems.
Developing service-level agreements. S U P E R - U S E R OV E R S I G H T
Signing off on specifications for business require- We cannot overemphasize the need for super-users in
ments (including security requirements). ERP environments. Super-users must have user profiles
Authorizing new or significantly changed systems. that allow conflicting capabilities access. Specifically, a
Ensuring users are aware of their security responsi- super-user is a user who has unrestricted access to the
bilities and are able to fulfill them. entire system whether it is the system commands or
Being involved with security audits/reviews. system files, regardless of their permission levels.
These super-users require such access to manage risks
Access administrators should be accountable to a across the enterprise by enforcing segregation-of-duty
supervisor who is in upper management in line with the profiles and preventing security and control violations
responsibilities specified and documented for protect- before they occur in core business processes. For exam-
ing the organizations information as well as its informa- ple, super-users are able to address segregation-of-duty
tion technologies. The supervisor may engage IT issues by detecting, removing, and preventing access
auditors to monitor and review the activities of the authorizations risks within and across business process-
access administrator to ensure that he or she abides by es. In this regard, super-users typically have access to
sound policies and procedures regarding separation of the systems files and setup and have the highest level
duties and performs only those activities that are autho- of privilege for applications.
rized by management. Because super-users possess unlimited access to
the systems root, commands, and applications, they can
U S E R AC C E S S CO N T R O L S cause damage to the system and expose the organiza-
An effective model of continuous monitoring should tion to untold hardship and embarrassment. For exam-
include a process to ensure that system access of all ter- ple, they can mount and dismantle file systems, change
minated and/or transferred employees is revoked imme- another users password without knowing the password,
diately upon a change. More specifically, the process remove any file directory, and even shut down the
should ensure that users access is restricted to their entire system. As a result, the activities of super-users
required job activities to avoid having inappropriate should be controlled by management. Management
ability to: should:
Commit fraud. Review super-user access privileges and align them
Edit or modify financial statement information or with IT auditors for highly critical and conflicting
data that directly impacts financial statements (i.e., capabilities.
consolidated information, journal entry posting, price Control super-users activities through audit trail
lists, formula cards, etc.). documentation of creation, modification, distribu-
Edit or view highly restricted data that is important tion, and usage.
operationally but not from a financial reporting per- Assign independent person(s) to review the super-
spective (i.e., budgeting files, personnel files, etc.). user audit trail (i.e., a record of sources of informa-
Perform something that they should not have the tion and changes made by date and by an

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 45 SPRING 2009, VOL. 10, NO. 3


accountable individual or organization). These need S E G R E G AT I O N OF DUTIES
to be reviewed frequently to identify suspicious or To accomplish internal control objectives, any organiza-
dubious activities and responsibility for particular tion must segregate user duties properly. ERP systems
events. allow segregation of duties via user authorizations. User
profiles determine the type of access and authority each
An independent manager should review audit trails user has within the system. A user profile should not
frequently and follow up on issues arising such as: allow any user to have incompatible duties. An organi-
Instances of access to applications by super-users. zation must develop, maintain, and monitor appropriate
These should be examined by event logs that have segregation of duties properly. This requires a detailed
been configured properly to generate appropriate analysis of individual job functions and a determination
event types, including time spent while logged on, of which functions are incompatible activities. A contin-
tasks performedcreation of data, deletions, modifi- uous reporting system should be able to report and use
cation of named files, event attributes in event these reports to avoid segregation-of-duty violations by
entries (e.g., IP address, user identity, time and date, performing a test of the entire ERP system, control
protocol and port used, files or system utilities activities, or specified business processes at unit levels.
accessed, method of connection, name of device, and For instance, by testing the systems process, the exam-
object name). ples presented in Table 1 show a detailed analysis of
Any activities performed by a super-user with anoth- incompatible duties. Individual organizations may refer
er users ID must be tracked, monitored, and logged. to incompatible duties by different names. At this
This should be established to allow the tracking of Fortune 500 company, incompatible duties are called
inputs into the system down to the field value level, conflicting abilities. This specific example provides
including any sorting, filtering, and downloading of detailed information about the conflicting ability of
information from the system. new vendor account and post an MM Document in

Table 1: Contents of a Detailed Conflicting Ability Analysis

SECTION DESCRIPTION
1. Conflicting Ability descriptions Conflicting Ability IDs & descriptions
2. Potential Risk to XYZ Co. Description of the potential risk to XYZ Co. that this conflict ID
is designed to identify
3. Identification of transactions using Method for identifying transactions that utilized Ability 1
Ability 1
4. Identification of transactions using Method for identifying transactions that utilized Ability 2
Ability 2
5. Comparison of transactions to Method for comparing transactions to identify potential fraud
identify potential fraud or damage or damage to XYZ Co.
to XYZ Co.
6. Other considerations Any additional considerations that the business expert would
like to add

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 46 SPRING 2009, VOL. 10, NO. 3


an SAP environment. The ability to create a new ven- tions of control activities and control conflicts:
dor account, coupled with the ability to post a credit When employees change roles (are transferred,

memo or invoice, can allow the user to generate a fraud- promoted, etc.).
ulent payment because the two are incompatible duties. When incompatible activities are flagged dur-

These descriptions of conflicting abilities are main- ing business process/operations.


tained, stored, and accessed through the company When functional departments delay or fail to
intranet. Thus access administrators and managers can periodically seslf-report activities of control
easily review potential conflicting abilities within their conflicts.
subunit. Audit units compliance with control activities.

Provide report to appropriate supervisor on sta-

A N E X A M P L E A P P L I C AT I O N OF THE MODEL tus of control activities and control conflicts.


AT A F O R T U N E 5 0 0 C O M PA N Y
This company implemented SAP as its ERP of choice To prevent internal control breaches, each individual
and maintains a database of conflicting abilities for vari- profile is listed with a corresponding set of conflicting
ous business processes. Conflicting abilities are those activities that those individuals are not expected to per-
activities performed by one individual that violate the form. For example, in Table 2, individual profiles are
rules of segregating incompatible duties (SoD) as a form presented with the relevant conflicting abilities. Indi-
of internal control. When SoD is violated, an organiza- viduals possessing these profiles should be precluded
tion may be subject to fraud and loss of resources from performing the conflicting abilities.
through embezzlement and theft of assets and deletion Because the company is concerned with maintaining
or destruction of company data. Business unit adminis- internal control integrity, it analyzes, documents, and
trators and systems security supervisors can use the updates the inventory of conflicting abilities in its
inventory of conflicting capabilities to monitor and intranet and makes them available to managers and
update internal control violations through periodic access administrators. The availability of the incompati-
reports on conflicting abilities in various operations. ble abilities allows managers and internal auditors to
Proper management of these conflicting abilities mitigate the risks of one or more of these conflicts
involves the correct establishment of user profiles. User occurring by using continuous reporting to review the
profiles are the tasks within the ERP system that are profiles assigned to each user. For example, during
assigned to the user. When determining which conflict- internal transfer of one individual from one department
ing abilities must be identified, business areas must to another, managers, access administrators, and internal
consider not only those conflicts composed of abilities auditors can identify if the individual possesses conflict-
that their business area owns, but also those conflicts ing abilities that must be addressed. Periodic reporting
that are the result of one of their abilities combined also may reveal whether an individual attempted to vio-
with an ability from another business area. Therefore, late his or her user profiles by inappropriately accessing
conflicting abilities may be composed of two abilities a file for which he/she had no authorization to access.
owned by one business area or two abilities, each In summary, a system should be in place to monitor
owned by separate business areas. The company uses system and business processes and be designed to keep
these conflicting capability documents in the following passwords confidential. This may involve having poli-
manner: cies requiring passwords to be changed frequently and
Develop potential list of key control conflicts for not be shared. This policy has the potential to protect
business processes/operations. the employee and ensure that system transactions are
Identify each control activitys control conflicts. performed only by employees with proper authority.
Establish a matrix of control activities and control The internal and external auditors should review the
conflicts. process for managing and changing passwords and test
Use software (SAP) to monitor and correct viola- the effectiveness of password management processes.

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 47 SPRING 2009, VOL. 10, NO. 3


Table 2: Conflicting Abilities of Individual Profiles

PROFILE MUST NOT HAVE THIS PROFILE AS WELL


Create and change general ledger Make journal entry postings to the general ledger.
accounts and cost elements.
Setting pay rates. Maintaining Entering time data. Cutting checks and/or direct deposit.
employee personnel records.
Enter invoices. Pay vendors. Purchasing. Receiving.
Vendor master maintenance. Enter invoices. Pay vendors.
Cash application. Sales order/credit memo entry. Billing.
Sales order/credit memo entry. Billing.
Customer Master Maintenance. Billing. Delivery/Distribution. Sales Order Entry.
Payment Processing.

CONTROL REPORTS AND REPORTING CHAIN Without a separation of these abilities, a fraudster
Based on the user profiles and conflicting abilities data- could assign personal information to a vendor account
base, the User SAP Security Contact (USSC) of each and generate a fraudulent payment to the vendor.
business unit runs a conflicting transactions report from After identifying the conflicting capabilities, a report
SAP at the end of each month. The USSC reviews the must be requested from SAP. In this case, an SAP report
report and forwards it to the business administrator (BU of vendor master changes is run. The report is sorted by
AD) of that business unit. The BU AD signs the report the logon ID of the SAP user with conflicting capabilities.
to indicate it has been reviewed, and the report is main- The Changed By field in the report contains logon ID.
tained and filed for audit purposes. If the USSC or BU This report shows which users created or changed vendor
AD notes any problems to be addressed, the USSC information. (See Table 3 for an example.)
requests those changes to user profiles or conflicting Next, a second table must be reviewed to determine
abilities database. which invoices the SAP user posted. This table identi-
The outlined process has several important internal fies particular invoices entered by user ID. A compari-
control components. First, accountability and responsi- son of the Create/Change Vendor report and the
bility are assigned to the USSC and BU AD. Second, a invoices by user ID allow the USSC to determine any
regular, monthly report is reviewed for continuous mon- conflicting transactions that occurred. Then the USSC
itoring of segregations. Third, signed documentation in can request appropriate changes to user access to avoid
the form of the conflicting transactions report is pre- future conflicting capability transactions.
served as audit evidence of the existence and efficacy
of internal controls. Finally, there is a defined, regular OT H E R C R I T I CA L CO N T R O L R E P O R T S IN

process for improvements to the control process via the A C C O U N T S P AYA B L E


USSC requesting changes. Various other reports are generated to ensure that the
accounts payable process has integrity. To effectively
D E TA I L S OF THE PROCESS generate these reports in a timely manner, the SAP
The first necessary step is the identification of the con- Security Contacts and Business Administrators in each
flicting capabilities that will be the subject of the business unit at the example company also review and
report. In this case, the conflicting abilities are: use these SAP control reports (see Table 4).
Ability 1: Creating a new vendor master account,
and REPORTING CHAIN
Ability 2: Posting an invoice to the vendor. As noted earlier, the use of these various reports is itera-

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 48 SPRING 2009, VOL. 10, NO. 3


Table 3: Conflicting Transaction Report for Purchasing and Payables

tive and ongoing in the review of segregation of duties, ed, including checks and price changes. Similarly, the
proper user access, SAP profile review, conflicting capa- review of the SAP Profile report on a quarterly basis
bilities, global business warehouse spending, purchase ensures that business unit managers have nonconflict-
order (PO) list display, invoice changes report, and ing profiles for SAP or compensating controls. The
blocked invoice reports, to name a few. quarterly review of the conflicting capability report
Specifically, the blocked invoice report is generated ensures that no one person has conflicting abilities that
and reviewed twice a week to detect invoices blocked could enable fraud, such as the ability to create requisi-
for whatever reason. By reviewing this report, the unit tions and purchase orders.
manager is able to identify reasons why invoices are By continuously reviewing these periodic reports
blocked and then track the system so that overdue and updating the system for observed weaknesses,
items are promptly identified and attended to. Second, the organization is committed to ensuring data and
by reviewing the PO changes report monthly, the busi- system integrity in both its IT and business process
ness manager can review everything that is being creat- operations.

Table 4: SAP Control Reports


REPORT NAME FREQUENCY PURPOSE
SAP profile review Quarterly To ensure nonconflicting profiles
Conflicting capabilities report Quarterly To ensure no conflicting capabilities
POs without reference to a requisition Monthly To ensure all materials are requisitioned
POs created after the invoice Monthly To ensure no POs are created after the
invoice
Open purchase documents Monthly To detect POs not fully received or
invoiced
Blocked invoice report Twice per week To resolve invoice discrepancies

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 49 SPRING 2009, VOL. 10, NO. 3


COMPLIANCE WITH S OX S E C T I O N 3 0 2 and in compliance with regulations. Although different
SOX Section 404 requires public companies to publish organizations might pursue different internal control
information within the annual report concerning the strategies, organizations with an ERP system can lever-
scope and adequacy of internal controls. In addition, the age the current system to continuously monitor and
statement on internal controls must assess their effec- improve their internal controls through periodic or on-
tiveness. An effective system of internal controls must demand controls or specialized reports. These reports
include policies and procedures to provide reasonable easily can be created from an ERP system, and they can
assurance that: help alert managers and supervisors about authorization
1. Detailed records accurately reflect the underlying or user access violations.
transactions. Through these control reports, conflicting capabilities
2. Transactions are recorded in accordance with Gener- across various business processes can be detected and
ally Accepted Accounting Principles (GAAP). corrected in a timely manner, either by a business unit
3. Transactions are being carried out only in accordance manager or an access control administrator. By utilizing
with managements authorization. these control reports, organizations can reduce costs,
4. Unauthorized transactions are being prevented or become more efficient, respond faster to changes in the
detected. marketplace, safeguard assets, and avoid unnecessary
business exposures.
The iterative process and the use of control reports Organizations utilizing these control reports also can
described in this article will assist management in expect to comply with the requirements of SOX more
ensuring it has achieved, to the extent possible, the effectively by having available detailed records that
third and fourth items. This iterative process of improv- accurately reflect the underlying transactions and by
ing internal controls is extremely important to the having reports that show unauthorized transactions and
CEOs and CFOs of public companies because of the raise alerts when access to critical areas of the compa-
requirements of SOX Section 302. Section 302 nys system are being prevented or detected.
describes signed certifications required of the CEO and
CFO in corporate financial reports. It also includes a Leslie D. Turner, DBA, CMA, CFM, is a professor of
requirement that these signing officers certify that they accounting in the Rinker School of Business at Palm Beach
are responsible for internal controls and that they have Atlantic University in West Palm Beach, Fla. He is a mem-
evaluated the internal controls within the last 90 days. ber of the Palm Beach Area Chapter. You can reach him at
The continuous reporting and monitoring described in (561) 803-2470 or LESLIE TURNER@pba.edu.
this article allow the CEO and CFO to have some
assurance that controls have been evaluated within the Vincent Owhoso, Ph.D., is a professor in the Department of
last 90 days. Accountancy in the Haile/US Bank College of Business at
The current versions of ERP software also will allow Northern Kentucky University in Highland Heights, Ky. You
real-time notification of problems in internal control. can reach him at (859) 572-7548 or owhosov1@nku.edu.
For example, the system can be configured to send an
e-mail notification to the appropriate unit administrator
if a user conducts transactions with conflicting abilities.
The Fortune 500 company described in this article does
not yet use such real-time notification.

C O N T R O L S A R E V I TA L
In the post Sarbanes-Oxley era, organizations must con-
tinue to improve internal controls over their ERP and
organizational processes to remain effective, efficient,

M A N A G E M E N T A C C O U N T I N G Q U A R T E R LY 50 SPRING 2009, VOL. 10, NO. 3

Vous aimerez peut-être aussi