Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Ethical standards rights and wrongs that are not universally agreed upon
Ethics principles of conduct that individuals use in making choices and guiding
their behavior in situations that involve the concepts of right and wrong
Business Ethics involves finding the answers:
1. How do managers decide on what is right in conducting their business?
2. Once managers have recognized what is right, how do they achieve it?
* Ethics are needed when conflicts arise the need to choose
* Conflicts may be b/w employees, management and/or stakeholders
Ethical Issues in Business
1.
2.
3.
4.
Equity
Rights
Honesty
Exercise of corporate power
Hall Chapter 3
1. Privacy raises the issue of ownership of personal information
2. Security (Accuracy and Confidentiality) an attempt to avoid such
undesirable events as a loss of confidentiality or data integrity
3. Ownership of Property intellectual property --- software; what can be
owned?
4. Equity in Access
5. Environmental Issues
6. Artificial Intelligence replacements for experts; what of faulty
programming?
7. Unemployment and Displacement because of incapability to adapt to
changes caused by modernization
8. Misuse of Computers
SOX and Ethical Issues Section 406 Code of Ethics for Senior Financial Officers
- Requires public companies to disclose whether they have adopted a code of
ethics that applies to their CEO, CFO, COO and the likes; if not, state why
- It may disclose in several ways
o Included as an exhibit to its annual report
o As a posting on its website
o By agreeing to provide copies of the code upon request
- A companies code of ethics should apply to all equally
Conflicts of interest code of ethics should outline procedures for dealing
with actual or apparent conflicts of interest b/w personal and professional
relationships; conflicts are dealt with and arent prohibited
Full and fair disclosure objective: to ensure that future disclosure are
candid, open, truthful and void of deception
Legal compliance code of ethics should require employees to follow
applicable governmental laws, rules and regulations
Internal reporting of code violation code of ethics must provide a
mechanism to permit prompt internal reporting of ethics violations
Accountability effective ethics program must take appropriate action when
code violations occur
Fraud false representation of a material fact by one part to another with the intent
to deceive and induce the party to justifiably rely on the fact to his or her detriment
Conditions to be met:
1. False representation false statement or nondisclosure
2. Material fact
3. Intent
4. Justifiable reliance
5. Injury or loss
A.k.a. white-collar crime, defalcation, embezzlement and irregularities
Auditors encounter fraud at two levels:
1. Employee fraud designed to directly convert cash or other assets to
the employees personal benefit
Steps usually involved:
Hall Chapter 3
a. Stealing something of value
b. Converting asset to usable form
c. Concealing crime to avoid detection
2. Management fraud performance fraud
a. Fraud is perpetrated at levels of management above the one to
w/c internal control structures generally relate
b. Fraud frequently involves using the FS to create an illusion that
an entity is healthier and more prosperous than it is
c. If fraud involves misappropriation of assets, frequently shrouded
in a maze of complex business transactions, often involving
related third parties
Fraud Triangle
1.
2.
3.
Situational pressure
Opportunity
Ethics
Use the red-flag checklist to provide insights of these factors
Financial Losses from Fraud there could be direct and indirect losses
-
Position those at top; they have greater access company funds and assets
Gender men; they more high corporate positions
Age older employees; they tend to have higher-ranking positions
Education with more education; they tend to be on top
Collusion collusion b/w those with critical positions; they create
opportunities that otherzise would not exist
Fraud Schemes
1. Fraudulent Statements
- Associated w/ management fraud
- The statement itself should bring a direct or indirect financial benefit to
the perpetrator
- Underlying problems
a. Lack of auditor independence
b. Lack of director independence
c. Questionable executive compensation scheme like abuse of stockbased compensation
d. Inappropriate accounting practices
Hall Chapter 3
-
SOX
o
o
o
o
o
o
2. Corruption
- Involves an executive, manager or employee in collusion with an outsider
- Bribery giving, offering, soliciting or receiving things of value to
influence an official in the performance of his or her lawful duties
- Illegal gratuities giving, receiving, offering or soliciting something of
value because of an official act that has been taken
- Conflicts of interest occurs when employee acts on behalf of a third
party during the discharge of his or her duties or has self-interest in the
activity being performed
- Economic extortion use of force to obtain something of value
3. Asset Misappropriation
- Most common
- Assets are either directly or indirectly diverted to the perpetrators
benefit
- Skimming stealing cash from an organization before it is recorded on
the organizations books and records; example: mail room fraud
Hall Chapter 3
-
Hall Chapter 3
Theft of assets
Corruption of information or the IS
Disruption of the IS
Preventive controls passive technique; designed to reduce frequency of
occurrence of undesirable event
Detective controls designed to identify and expose undesirable events
that elude preventive controls
Corrective controls actions taken to reverse the effects of errors
detected
SAS 78 current authoritative document for specifying internal control
objectives and techniques; based on COSO; for auditors
Committee of Sponsoring Organizations of the Treadway Commission
(COSO) a management tool
SAS 78/COSO
Describes the relationship between the firms :
internal control structure,
auditors assessment of risk, and
the planning of audit procedures
How do these three interrelate?
* The weaker the internal control structure, the higher the assessed level of risk; the
higher the risk, the more auditor procedures applied in the audit
SAS 78/COSO Components
1. Control environment foundation of the other four components tone on top
2. Risk assessment done to identify, analyze and manage risks relative to
financial reporting
3. Information and communication
4. Monitoring process by w/c quality of internal control design and operation
can be assessed
5. Control activities policies and procedures used to ensure that appropriate
actions are taken to deal with the organizations identified risks
a. IT Controls relate specifically to computer environment
i. Application controls ensure the integrity of specific systems
ii. General controls pertain to entity-wide concerns
b. Physical Controls relates primarily to human activities employed in
accounting systems; must be purely manual
i. Transaction authorization purpose is to ensure that all material
transactions are processed by the IS and are valid and in
accordance with managements objective
Authorization may be general or specific
o General Authority granted to operations personnel to
perform day-to-day operations; programmed procedure;
rules are specified in advance and no additional
approval are needed
Hall Chapter 3
o Specific Authority case-by-case decisions
ii. Segregation of duties objectives:
1. Transaction authorization vs. transaction processing
2. Responsibility for the custody of asset vs. record-keeping
responsibility
3. Organizational structure must only let fraud with collusion
of 2 or more employees with incompatible responsibilities
be successful
iii. Supervision often called compensating control; underlying
assumption: firm employs competent and trustworthy personnel
supervisory efficiency
iv. Accounting records consists of source documents, journals and
records; captures the economic essence of transactions and
provide an audit trail of economic events
v. Access controls to ensure that only authorized personnel have
access to firms assets
vi. Independent verification are independent checks of the
accounting system to identify errors and misrepresentations;
differs from supervision because it takes place after the fact, by
an individual who is not directly involved with the transaction or
task being verified (supervision takes place while the activity is
being performed by a supervisory w/ direct responsibility for the
task); through this management can assess the performance of
individuals, the integrity of the transaction processing system
and the correctness of data contained in accounting records