SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
The Use of Spreadsheets:
Considerations for Section 404
of the Sarbanes-Oxley Act*
July 2004




*connectedthinking
The Use of Spreadsheets: Considerations for Section
404 of the Sarbanes-Oxley Act
Introduction

Many companies rely on spreadsheets as a key tool in their financial reporting and operational processes. As
a result, the use of spreadsheets is an integral part of the information and decision-making framework for
these companies. In developing and using spreadsheets, companies need to balance their ease and flexibility
against the importance of reliable information for management’s use. The requirements under Section 404
of the Sarbanes-Oxley Act increase the focus on controls related to the development and maintenance of
spreadsheets. This paper discusses the evaluation of the control environment and specific control activities
that should be considered by management in evaluating the use of significant spreadsheets as part of their 404
process.

As users of spreadsheet applications such as Microsoft Excel® or Lotus 1-2-3® have become more
sophisticated, so have spreadsheets. Once used to support simple functions such as logging, tracking and
totaling information, spreadsheets with enhanced formulas and built-in advanced features are now used to
support such business functions as complex valuation models. The use of macros and multiple spreadsheets
which are linked together allows users to build very complicated—and sometimes convoluted—models and
other business functions with minimal or no documentation. In addition, these complex spreadsheets are not
normally supported by the same control environment as formally-developed, purchased applications. For
example, the developers and users of spreadsheets are usually not trained in structured programming, testing,
version control or systems development life cycles, and spreadsheets are rarely restricted from unauthorized
access by security controls.

Background

Spreadsheets typically have a wide range
                                                     A spreadsheet error at a major financial institution was
of complexity and usage. It is important to
                                                     deemed a significant factor in a $1 billion financial statement
separate the complexity and usage issues, as
                                                     error in the classification of securities. The error resulted
the control requirements may be different for a
complex spreadsheet used by one person with from a flawed change control process—an unapproved
                                                     change to a formula within the spreadsheet—and other
specific expertise than for a spreadsheet used
                                                     control deficiencies, including lack of technical and user
and modified by many people. Whatever the
situation, companies need to carefully evaluate documentation, insufficient testing and inadequate backup
if it is possible to implement adequate controls and recovery procedures.
over the spreadsheets supporting significant
accounts and disclosures. As some companies have discovered, errors in relatively simple spreadsheets can
result in potential material misstatements in their financial results. Recently, several large companies have either
publicly disclosed control deficiencies or been publicly censured by regulators related to insufficient spreadsheet
controls.

An article in the May 24, 2004 issue of Computer World indicated that, “Anecdotal evidence suggests that 20%
to 40% of spreadsheets have errors, but recent audits of 54 spreadsheets found that 49 (or 91%) had errors,
according to research by Raymond R. Panko, a professor at the University of Hawaii.” The Journal of Property
Management on July 1, 2002 stated, “30 to 90 percent of all spreadsheets suffer from at least one major user
error. The range in error rates depends on the complexity of the spreadsheet being tested. In addition, none
of the tests included spreadsheets with more than 200 line items where the probability of error approaches 100
percent.” Perform an online search for spreadsheet errors or spreadsheet audit, and you will find a number of
major failures attributed to spreadsheet inaccuracies that hit the press in the past year alone.




                                                                                                            Page 1
Even seemingly simple calculations may
                                                   A utilities company took a $24 million charge to earnings
present the risk of a misstatement. Macros
                                                   after a spreadsheet error—a simple mistake in cutting and
(symbols, names or keys that represent a
                                                   pasting—resulted in an erroneous bid for the purchase of
list of commands, actions or keystrokes) or
                                                   hedging contracts at a higher price than it wanted to pay.
other functions embedded into spreadsheets
may drastically impact the functioning of the
spreadsheet. For example, a macro embedded into a spreadsheet designed to total invoices for recording an
accounts receivable balance may add unsupported amounts to the balance. Visual review of the spreadsheet
would probably not identify the error, and analytical review would also not identify the error if the macro is
consistently present across the periods under review. Controls that may help mitigate these risks include access
controls that limit which employees may view and update the spreadsheet, recalculation of key spreadsheet
metrics and comparison to calculated values, and detail review and testing of calculations embedded in the
spreadsheet.
                                                   A trader at a bank was able to perpetrate fraud through
The use of spreadsheets—and, more                  manipulation of spreadsheet models used by the bank’s
importantly, the lack of controls over             risk control staff. While an independent check of the
spreadsheets—has been a contributing factor        trader’s activities and Value at Risk (VaR) was supposed
in financial reporting errors at a number of        to be conducted by the bank’s risk control staff, instead
companies. The examples included here              a spreadsheet was relied upon that obtained information
highlight the importance of understanding          from the trader’s personal computer which included figures
how spreadsheets are used in a company’s           for transactions that were not real. Because of inadequate
financial reporting process and evaluating          controls over the spreadsheet, this fraud continued for
the controls over spreadsheets as part of the      months.
company’s overall Section 404 process.

How Are Companies Using Spreadsheets?

To assess how companies are using spreadsheets, it is helpful to categorize both the uses and complexity of
spreadsheets. The uses of information contained in spreadsheets can be grouped into the following categories:

      Operational: Spreadsheets used to facilitate tracking and monitoring of workflow to support operational
      processes, such as a listing of open claims, unpaid invoices and other information that previously would
      have been retained in manual, paper file folders. These may be used to monitor and control that financial
      transactions are captured accurately and completely.
      Analytical/Management Information: Spreadsheets used to support analytical review and management
      decision-making. These may be used to evaluate the reasonableness of financial amounts.
      Financial: Spreadsheets used to directly determine financial statement transaction amounts or balances
      that are populated into the general ledger and/or financial statements.

The complexity of spreadsheets may be categorized in the following manner:

      Low: Spreadsheets which serve as an electronic logging and information tracking system.
      Moderate: Spreadsheets which perform simple calculations such as using formulas to total certain
      fields or calculate new values by multiplying two cells. These spreadsheets can be used as methods to
      translate or reformat information, often for analytical review and analysis, for recording journal entries or
      for making a financial statement disclosure.
      High: Spreadsheets which support complex calculations, valuations and modeling tools. These
      spreadsheets are typically characterized by the use of macros and multiple supporting spreadsheets
      where cells, values and individual spreadsheets are linked. These spreadsheets might be considered
      “applications” (i.e., software programs) in their own right. They often are used to determine transaction
      amounts or as the basis for journal entries into the general ledger or financial statement disclosures.


                                                                                                               Page 2
The importance of the integrity and reliability of the information generated by spreadsheets increases as the
complexity progresses from low to high and as usage increases. This assessment should dictate the strength of
the control environment surrounding each spreadsheet.




Potential Risks and Issues with Spreadsheets

When evaluating the risk and significance of potential spreadsheet issues, consider the following:

      Complexity of the spreadsheet and calculations
      Purpose and use of the spreadsheet
      Number of spreadsheet users
      Type of potential input, logic, and interface errors
      Size of the spreadsheet
      Degree of understanding and documentation of the spreadsheet requirements by the developer
      Uses of the spreadsheet’s output
      Frequency and extent of changes and modifications to the spreadsheet
      Development, developer (and training) and testing of the spreadsheet before it is utilized

Because spreadsheets can be easily changed and may lack certain control activities, they are subject to
increased inherent risk and error. Some of the typical errors that occur in spreadsheets include:

      Input error: Errors that arise from flawed data entry, inaccurate referencing or other simple cut-and-paste
      functions.
      Logic error: Errors in which inappropriate formulas are created and generate improper results.
      Interface errors: Errors from the import or export of data with other systems.
      Other errors: Errors include inappropriate definition of cell ranges, inappropriately referenced cells or
      improperly linked spreadsheets.




                                                                                                             Page 3
Practical Steps for Evaluating Spreadsheet Controls

Implementing a process to ensure appropriate controls over spreadsheets is a critical element of compliance
with Sarbanes-Oxley Section 404. There are five high-level steps to implementing such a process:

   1. Inventory spreadsheets
   2. Evaluate the use and complexity of spreadsheets
   3. Determine the necessary level of controls for “key” spreadsheets
   4. Evaluate existing “as is” controls for each spreadsheet
   5. Develop action plans for remediating control deficiencies


1. Inventory Spreadsheets

The first step is to inventory all spreadsheets within the organization that are used to support significant financial
processes. It is important to identify how the spreadsheets support all significant accounts and financial
statement disclosures and their relationship to relevant financial statement assertions. All departments utilizing
spreadsheets should be evaluated, including, but not limited to, financial reporting, plant/cost accounting, tax,
actuarial and operations.

The inventory should include:

      Name of the spreadsheet
      Brief description of the spreadsheet and the financial amounts calculated
      Department responsible for the “development” as well as any other departments that utilize the
      spreadsheet
      Frequency and extent of changes to the spreadsheet

This step is critical to ensuring that the population of spreadsheets in use within the organization is defined and
subjected to evaluation.

2. Evaluate the Use and Complexity of Spreadsheets

After the inventory, it is necessary to evaluate the use and complexity of each spreadsheet. This involves
determining a spreadsheet’s category of uses (operational, analytical and financial) and then assigning and
documenting a level of complexity (low, moderate or high) based upon the factors discussed above.

3. Determine the Necessary Level of Controls for the Spreadsheet

The appropriate combination of the following controls should be considered to help mitigate the risks inherent in
a spreadsheet environment:

   a) Change Control – Maintaining a controlled process for requesting changes to a spreadsheet, making
      changes and then testing the spreadsheet and obtaining formal sign-off from an independent individual
      that the change is functioning as intended.
   b) Version Control – Ensuring only current and approved versions of spreadsheets are being used by creating
      naming conventions and directory structures.




                                                                                                             Page 4
c) Access Control (e.g., Create, Read, Update, Delete) – Limiting access at the file level to spreadsheets on a
      central server and assigning appropriate rights. Spreadsheets can also be password protected to restrict
      access.
   d) Input Control – Ensuring that reconciliations occur to make sure that data is inputted completely and
      accurately. Data may be inputted into spreadsheets manually or systematically through downloads.
   e) Security and Integrity of Data – Implementing a process to ensure that data embedded in spreadsheets is
      current and secure. This can be done by “locking” or protecting cells to prevent inadvertent or intentional
      changes to standing data. In addition, the spreadsheets themselves should be stored in protected
      directories.
   f) Documentation – Ensuring that the appropriate level of spreadsheet documentation is maintained and
      kept up-to-date to understand the business objective and specific functions of the spreadsheet.
   g) Development Lifecycle – Applying a standard Software Development Life Cycle to the development
      process of the more critical and complex spreadsheets covering standard phases: requirements
      specification, design, building, testing and maintenance. Testing is a critical control to ensure that the
      spreadsheet is producing accurate and complete results.
   h) Back-ups – Implementing a process to back up spreadsheets on a regular basis so that complete and
      accurate information is available for financial reporting.
   i) Archiving – Maintaining historical files no longer available for update in a segregated drive and locking
      them as “read only.”
   j) Logic Inspection – Inspecting the logic in critical spreadsheets by someone other than the user or
      developer of the spreadsheet. This review should be formally documented.
   k) Segregation of Duties/Roles and Procedures – Defining and implementing roles, authorities,
      responsibilities and procedures for issues such as ownership, sign-off, segregation of duties and usage.
   l) Overall Analytics – Implementing analytics as a detective control to find errors in spreadsheets used for
      calculations. However, analytics alone are not a sufficient control to completely address the inherent risk
      of financial amounts generated using spreadsheets.

The level of controls implemented should be considered relative to the spreadsheet’s use, complexity and
required reliability of the information. Even for spreadsheets categorized as low in complexity and importance,
control-types (a) through (e) above should generally be in place.

Standard manual controls and processes, such as those described above, can be used to help mitigate the risks
associated with spreadsheets. However, as the importance of the information being generated by a spreadsheet
increases and the complexity increases, reliance on manual controls and processes may not be sufficient to
satisfy the requirements under Sarbanes-Oxley Section 404. For more significant amounts and/or spreadsheets
with higher complexity, it may be very difficult to achieve an adequate level of control without migrating these
functions to an application system with a more formalized information technology controls environment.

4. Evaluate Existing “As Is” Controls for Each Spreadsheet

Evaluation of existing controls is typically done by comparing the existing spreadsheet controls against a
checklist of “necessary” controls, such as those listed above, based upon the use and complexity of the
spreadsheet. In addition, management must develop and execute a test plan to ensure that the controls operate
effectively. Any gaps between existing and “necessary” controls should be identified as remediation items as
well as any gaps in operating effectiveness.




                                                                                                             Page 5
Spreadsheets used as part of their financial reporting process should be treated as manual processes and tested
accordingly. Examples include:

      A company can maintain two copies of a spreadsheet, with changes made to both spreadsheets by
      separate individuals and the results compared.
      A company can use cell protection to restrict access to a spreadsheet, and management can test a
      sample of cells to ensure passwords are assigned for their protection.
      A company can employ standard naming conventions to ensure the use of the current spreadsheet
      version, and management can inspect a sample of spreadsheets to confirm that they follow the standard
      naming convention. If the standard naming convention requires that the spreadsheet name include the
      date and time of the modification, management would test that the spreadsheet name corresponds to the
      modification date.


5. Develop Action Plans for Remediating Control Deficiencies

An action plan should be developed for each control gap identified. These action plans should increase the
controls over the spreadsheet to the necessary controls based upon the use and complexity of the spreadsheet.

Key elements of an action plan include:

      Assigning responsibility for actions in plan
      Establishing required remediation dates
      Prioritizing remediation efforts

For complex spreadsheets that support significant accounts and disclosures, consider whether these “systems”
should be migrated to production processing environments to provide an adequate level of control.

Given the potentially large number of remediation items relating to spreadsheet controls, it is recommended that
these efforts start with high priority items, defined as items related to financial spreadsheets containing complex
calculations which support significant accounts and disclosures.

Summary

Many companies rely on spreadsheets as a key component in their financial reporting and operational
processes. However, it is clear that the flexibility of spreadsheets has sometimes come at a cost. It is
important that management identify where control breakdowns could lead to potential material misstatements
and that controls for significant spreadsheets be documented, evaluated and tested. And, perhaps more
importantly, management should evaluate whether it is possible to implement adequate controls over significant
spreadsheets to sufficiently mitigate this risk, or if spreadsheets related to significant accounts or with higher
complexity should be migrated to an application system with a more formalized information technology control
environment. Understanding how spreadsheets are used and the adequacy of related controls is a critical part
of management’s assessment of the effectiveness of its internal control over financial reporting under Section 404.




                                                                                                           Page 6
PricewaterhouseCoopers (www.pwc.com) provides industry-focused assurance, tax and advisory services for public and private clients.
More than 120,000 people in 139 countries connect their thinking, experience and solutions to build public trust and enhance value for
clients and their stakeholders.

“PricewaterhouseCoopers” refers to the network of member firms of PricewaterhouseCoopers International Limited, each of which is a
separate and independent legal entity.

CI-CI-05-0076-A © 2004 PricewaterhouseCoopers LLP. “PricewaterhouseCoopers” refers to PricewaterhouseCoopers LLP, a Delaware
limited liability partnership or, as the context requires, the network of member firms of PricewaterhouseCoopers International Limited,
each of which is a separate and independent legal entity.
us.pwc.com

Weitere ähnliche Inhalte

Ähnlich wie Pw Cwp Spreadsheet404 Sarbox

eBook Spreadsheet to WebAPP
eBook Spreadsheet to WebAPPeBook Spreadsheet to WebAPP
eBook Spreadsheet to WebAPPAbhishek Ranjan
 
Excel In Managing Spreadsheet Risk Presentation
Excel In Managing Spreadsheet Risk PresentationExcel In Managing Spreadsheet Risk Presentation
Excel In Managing Spreadsheet Risk Presentationgreghawes
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITShahzeb Pirzada
 
Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)Thinksoft Global
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.gueste080564
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.renetta
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computingguestc1bca2
 
Bridging the cost schedule divide - integrating primavera and cost systems wh...
Bridging the cost schedule divide - integrating primavera and cost systems wh...Bridging the cost schedule divide - integrating primavera and cost systems wh...
Bridging the cost schedule divide - integrating primavera and cost systems wh...p6academy
 
What is the relationship between Accounting and an Accounting inform.pdf
What is the relationship between Accounting and an Accounting inform.pdfWhat is the relationship between Accounting and an Accounting inform.pdf
What is the relationship between Accounting and an Accounting inform.pdfannikasarees
 
UX Design to Improve User Productivity in Healthcare Registries
UX Design to Improve User Productivity in Healthcare RegistriesUX Design to Improve User Productivity in Healthcare Registries
UX Design to Improve User Productivity in Healthcare RegistriesCitiusTech
 
Validation of excel spreadsheets
Validation of excel spreadsheetsValidation of excel spreadsheets
Validation of excel spreadsheetsDigital-360
 
5 reasons why spreadsheet based risk management systems don’t work
5 reasons why spreadsheet based risk management systems don’t work5 reasons why spreadsheet based risk management systems don’t work
5 reasons why spreadsheet based risk management systems don’t workRisk Edge Solutions
 
Accelerating Actuarial Processes
Accelerating Actuarial ProcessesAccelerating Actuarial Processes
Accelerating Actuarial ProcessesAgile Technologies
 
The Ideal A/R Dashboard: 5 Reporting Dashboards Required for Every Credit and...
The Ideal A/R Dashboard: 5 Reporting Dashboards Required for Every Credit and...The Ideal A/R Dashboard: 5 Reporting Dashboards Required for Every Credit and...
The Ideal A/R Dashboard: 5 Reporting Dashboards Required for Every Credit and...WilliamJames346254
 
The business-case-for-advanced-data-visualization
The business-case-for-advanced-data-visualizationThe business-case-for-advanced-data-visualization
The business-case-for-advanced-data-visualizationInyene Edwin Etefia
 
Crowe-ACAMS AML System Planning
Crowe-ACAMS AML System PlanningCrowe-ACAMS AML System Planning
Crowe-ACAMS AML System PlanningBrett Rosynek
 
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...Cognizant
 
Platform Driven Finance Architecture
Platform Driven Finance ArchitecturePlatform Driven Finance Architecture
Platform Driven Finance ArchitectureMelissa Luongo
 
05.2 auditing procedure application controls
05.2 auditing procedure   application controls05.2 auditing procedure   application controls
05.2 auditing procedure application controlsMulyadi Yusuf
 

Ähnlich wie Pw Cwp Spreadsheet404 Sarbox (20)

eBook Spreadsheet to WebAPP
eBook Spreadsheet to WebAPPeBook Spreadsheet to WebAPP
eBook Spreadsheet to WebAPP
 
Excel In Managing Spreadsheet Risk Presentation
Excel In Managing Spreadsheet Risk PresentationExcel In Managing Spreadsheet Risk Presentation
Excel In Managing Spreadsheet Risk Presentation
 
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDITComputer Assisted Audit Techniques (CAATS) - IS AUDIT
Computer Assisted Audit Techniques (CAATS) - IS AUDIT
 
Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)Cards Performance Testing (Whitepaper)
Cards Performance Testing (Whitepaper)
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act.
 
Technology Controls in Business - End User Computing
Technology Controls in Business - End User ComputingTechnology Controls in Business - End User Computing
Technology Controls in Business - End User Computing
 
Bridging the cost schedule divide - integrating primavera and cost systems wh...
Bridging the cost schedule divide - integrating primavera and cost systems wh...Bridging the cost schedule divide - integrating primavera and cost systems wh...
Bridging the cost schedule divide - integrating primavera and cost systems wh...
 
What is the relationship between Accounting and an Accounting inform.pdf
What is the relationship between Accounting and an Accounting inform.pdfWhat is the relationship between Accounting and an Accounting inform.pdf
What is the relationship between Accounting and an Accounting inform.pdf
 
UX Design to Improve User Productivity in Healthcare Registries
UX Design to Improve User Productivity in Healthcare RegistriesUX Design to Improve User Productivity in Healthcare Registries
UX Design to Improve User Productivity in Healthcare Registries
 
Validation of excel spreadsheets
Validation of excel spreadsheetsValidation of excel spreadsheets
Validation of excel spreadsheets
 
5 reasons why spreadsheet based risk management systems don’t work
5 reasons why spreadsheet based risk management systems don’t work5 reasons why spreadsheet based risk management systems don’t work
5 reasons why spreadsheet based risk management systems don’t work
 
Accelerating Actuarial Processes
Accelerating Actuarial ProcessesAccelerating Actuarial Processes
Accelerating Actuarial Processes
 
The Ideal A/R Dashboard: 5 Reporting Dashboards Required for Every Credit and...
The Ideal A/R Dashboard: 5 Reporting Dashboards Required for Every Credit and...The Ideal A/R Dashboard: 5 Reporting Dashboards Required for Every Credit and...
The Ideal A/R Dashboard: 5 Reporting Dashboards Required for Every Credit and...
 
ALLL FZL and TD
ALLL FZL and TDALLL FZL and TD
ALLL FZL and TD
 
The business-case-for-advanced-data-visualization
The business-case-for-advanced-data-visualizationThe business-case-for-advanced-data-visualization
The business-case-for-advanced-data-visualization
 
Crowe-ACAMS AML System Planning
Crowe-ACAMS AML System PlanningCrowe-ACAMS AML System Planning
Crowe-ACAMS AML System Planning
 
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...
 
Platform Driven Finance Architecture
Platform Driven Finance ArchitecturePlatform Driven Finance Architecture
Platform Driven Finance Architecture
 
05.2 auditing procedure application controls
05.2 auditing procedure   application controls05.2 auditing procedure   application controls
05.2 auditing procedure application controls
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

Pw Cwp Spreadsheet404 Sarbox

  • 1. The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* July 2004 *connectedthinking
  • 2. The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act Introduction Many companies rely on spreadsheets as a key tool in their financial reporting and operational processes. As a result, the use of spreadsheets is an integral part of the information and decision-making framework for these companies. In developing and using spreadsheets, companies need to balance their ease and flexibility against the importance of reliable information for management’s use. The requirements under Section 404 of the Sarbanes-Oxley Act increase the focus on controls related to the development and maintenance of spreadsheets. This paper discusses the evaluation of the control environment and specific control activities that should be considered by management in evaluating the use of significant spreadsheets as part of their 404 process. As users of spreadsheet applications such as Microsoft Excel® or Lotus 1-2-3® have become more sophisticated, so have spreadsheets. Once used to support simple functions such as logging, tracking and totaling information, spreadsheets with enhanced formulas and built-in advanced features are now used to support such business functions as complex valuation models. The use of macros and multiple spreadsheets which are linked together allows users to build very complicated—and sometimes convoluted—models and other business functions with minimal or no documentation. In addition, these complex spreadsheets are not normally supported by the same control environment as formally-developed, purchased applications. For example, the developers and users of spreadsheets are usually not trained in structured programming, testing, version control or systems development life cycles, and spreadsheets are rarely restricted from unauthorized access by security controls. Background Spreadsheets typically have a wide range A spreadsheet error at a major financial institution was of complexity and usage. It is important to deemed a significant factor in a $1 billion financial statement separate the complexity and usage issues, as error in the classification of securities. The error resulted the control requirements may be different for a complex spreadsheet used by one person with from a flawed change control process—an unapproved change to a formula within the spreadsheet—and other specific expertise than for a spreadsheet used control deficiencies, including lack of technical and user and modified by many people. Whatever the situation, companies need to carefully evaluate documentation, insufficient testing and inadequate backup if it is possible to implement adequate controls and recovery procedures. over the spreadsheets supporting significant accounts and disclosures. As some companies have discovered, errors in relatively simple spreadsheets can result in potential material misstatements in their financial results. Recently, several large companies have either publicly disclosed control deficiencies or been publicly censured by regulators related to insufficient spreadsheet controls. An article in the May 24, 2004 issue of Computer World indicated that, “Anecdotal evidence suggests that 20% to 40% of spreadsheets have errors, but recent audits of 54 spreadsheets found that 49 (or 91%) had errors, according to research by Raymond R. Panko, a professor at the University of Hawaii.” The Journal of Property Management on July 1, 2002 stated, “30 to 90 percent of all spreadsheets suffer from at least one major user error. The range in error rates depends on the complexity of the spreadsheet being tested. In addition, none of the tests included spreadsheets with more than 200 line items where the probability of error approaches 100 percent.” Perform an online search for spreadsheet errors or spreadsheet audit, and you will find a number of major failures attributed to spreadsheet inaccuracies that hit the press in the past year alone. Page 1
  • 3. Even seemingly simple calculations may A utilities company took a $24 million charge to earnings present the risk of a misstatement. Macros after a spreadsheet error—a simple mistake in cutting and (symbols, names or keys that represent a pasting—resulted in an erroneous bid for the purchase of list of commands, actions or keystrokes) or hedging contracts at a higher price than it wanted to pay. other functions embedded into spreadsheets may drastically impact the functioning of the spreadsheet. For example, a macro embedded into a spreadsheet designed to total invoices for recording an accounts receivable balance may add unsupported amounts to the balance. Visual review of the spreadsheet would probably not identify the error, and analytical review would also not identify the error if the macro is consistently present across the periods under review. Controls that may help mitigate these risks include access controls that limit which employees may view and update the spreadsheet, recalculation of key spreadsheet metrics and comparison to calculated values, and detail review and testing of calculations embedded in the spreadsheet. A trader at a bank was able to perpetrate fraud through The use of spreadsheets—and, more manipulation of spreadsheet models used by the bank’s importantly, the lack of controls over risk control staff. While an independent check of the spreadsheets—has been a contributing factor trader’s activities and Value at Risk (VaR) was supposed in financial reporting errors at a number of to be conducted by the bank’s risk control staff, instead companies. The examples included here a spreadsheet was relied upon that obtained information highlight the importance of understanding from the trader’s personal computer which included figures how spreadsheets are used in a company’s for transactions that were not real. Because of inadequate financial reporting process and evaluating controls over the spreadsheet, this fraud continued for the controls over spreadsheets as part of the months. company’s overall Section 404 process. How Are Companies Using Spreadsheets? To assess how companies are using spreadsheets, it is helpful to categorize both the uses and complexity of spreadsheets. The uses of information contained in spreadsheets can be grouped into the following categories: Operational: Spreadsheets used to facilitate tracking and monitoring of workflow to support operational processes, such as a listing of open claims, unpaid invoices and other information that previously would have been retained in manual, paper file folders. These may be used to monitor and control that financial transactions are captured accurately and completely. Analytical/Management Information: Spreadsheets used to support analytical review and management decision-making. These may be used to evaluate the reasonableness of financial amounts. Financial: Spreadsheets used to directly determine financial statement transaction amounts or balances that are populated into the general ledger and/or financial statements. The complexity of spreadsheets may be categorized in the following manner: Low: Spreadsheets which serve as an electronic logging and information tracking system. Moderate: Spreadsheets which perform simple calculations such as using formulas to total certain fields or calculate new values by multiplying two cells. These spreadsheets can be used as methods to translate or reformat information, often for analytical review and analysis, for recording journal entries or for making a financial statement disclosure. High: Spreadsheets which support complex calculations, valuations and modeling tools. These spreadsheets are typically characterized by the use of macros and multiple supporting spreadsheets where cells, values and individual spreadsheets are linked. These spreadsheets might be considered “applications” (i.e., software programs) in their own right. They often are used to determine transaction amounts or as the basis for journal entries into the general ledger or financial statement disclosures. Page 2
  • 4. The importance of the integrity and reliability of the information generated by spreadsheets increases as the complexity progresses from low to high and as usage increases. This assessment should dictate the strength of the control environment surrounding each spreadsheet. Potential Risks and Issues with Spreadsheets When evaluating the risk and significance of potential spreadsheet issues, consider the following: Complexity of the spreadsheet and calculations Purpose and use of the spreadsheet Number of spreadsheet users Type of potential input, logic, and interface errors Size of the spreadsheet Degree of understanding and documentation of the spreadsheet requirements by the developer Uses of the spreadsheet’s output Frequency and extent of changes and modifications to the spreadsheet Development, developer (and training) and testing of the spreadsheet before it is utilized Because spreadsheets can be easily changed and may lack certain control activities, they are subject to increased inherent risk and error. Some of the typical errors that occur in spreadsheets include: Input error: Errors that arise from flawed data entry, inaccurate referencing or other simple cut-and-paste functions. Logic error: Errors in which inappropriate formulas are created and generate improper results. Interface errors: Errors from the import or export of data with other systems. Other errors: Errors include inappropriate definition of cell ranges, inappropriately referenced cells or improperly linked spreadsheets. Page 3
  • 5. Practical Steps for Evaluating Spreadsheet Controls Implementing a process to ensure appropriate controls over spreadsheets is a critical element of compliance with Sarbanes-Oxley Section 404. There are five high-level steps to implementing such a process: 1. Inventory spreadsheets 2. Evaluate the use and complexity of spreadsheets 3. Determine the necessary level of controls for “key” spreadsheets 4. Evaluate existing “as is” controls for each spreadsheet 5. Develop action plans for remediating control deficiencies 1. Inventory Spreadsheets The first step is to inventory all spreadsheets within the organization that are used to support significant financial processes. It is important to identify how the spreadsheets support all significant accounts and financial statement disclosures and their relationship to relevant financial statement assertions. All departments utilizing spreadsheets should be evaluated, including, but not limited to, financial reporting, plant/cost accounting, tax, actuarial and operations. The inventory should include: Name of the spreadsheet Brief description of the spreadsheet and the financial amounts calculated Department responsible for the “development” as well as any other departments that utilize the spreadsheet Frequency and extent of changes to the spreadsheet This step is critical to ensuring that the population of spreadsheets in use within the organization is defined and subjected to evaluation. 2. Evaluate the Use and Complexity of Spreadsheets After the inventory, it is necessary to evaluate the use and complexity of each spreadsheet. This involves determining a spreadsheet’s category of uses (operational, analytical and financial) and then assigning and documenting a level of complexity (low, moderate or high) based upon the factors discussed above. 3. Determine the Necessary Level of Controls for the Spreadsheet The appropriate combination of the following controls should be considered to help mitigate the risks inherent in a spreadsheet environment: a) Change Control – Maintaining a controlled process for requesting changes to a spreadsheet, making changes and then testing the spreadsheet and obtaining formal sign-off from an independent individual that the change is functioning as intended. b) Version Control – Ensuring only current and approved versions of spreadsheets are being used by creating naming conventions and directory structures. Page 4
  • 6. c) Access Control (e.g., Create, Read, Update, Delete) – Limiting access at the file level to spreadsheets on a central server and assigning appropriate rights. Spreadsheets can also be password protected to restrict access. d) Input Control – Ensuring that reconciliations occur to make sure that data is inputted completely and accurately. Data may be inputted into spreadsheets manually or systematically through downloads. e) Security and Integrity of Data – Implementing a process to ensure that data embedded in spreadsheets is current and secure. This can be done by “locking” or protecting cells to prevent inadvertent or intentional changes to standing data. In addition, the spreadsheets themselves should be stored in protected directories. f) Documentation – Ensuring that the appropriate level of spreadsheet documentation is maintained and kept up-to-date to understand the business objective and specific functions of the spreadsheet. g) Development Lifecycle – Applying a standard Software Development Life Cycle to the development process of the more critical and complex spreadsheets covering standard phases: requirements specification, design, building, testing and maintenance. Testing is a critical control to ensure that the spreadsheet is producing accurate and complete results. h) Back-ups – Implementing a process to back up spreadsheets on a regular basis so that complete and accurate information is available for financial reporting. i) Archiving – Maintaining historical files no longer available for update in a segregated drive and locking them as “read only.” j) Logic Inspection – Inspecting the logic in critical spreadsheets by someone other than the user or developer of the spreadsheet. This review should be formally documented. k) Segregation of Duties/Roles and Procedures – Defining and implementing roles, authorities, responsibilities and procedures for issues such as ownership, sign-off, segregation of duties and usage. l) Overall Analytics – Implementing analytics as a detective control to find errors in spreadsheets used for calculations. However, analytics alone are not a sufficient control to completely address the inherent risk of financial amounts generated using spreadsheets. The level of controls implemented should be considered relative to the spreadsheet’s use, complexity and required reliability of the information. Even for spreadsheets categorized as low in complexity and importance, control-types (a) through (e) above should generally be in place. Standard manual controls and processes, such as those described above, can be used to help mitigate the risks associated with spreadsheets. However, as the importance of the information being generated by a spreadsheet increases and the complexity increases, reliance on manual controls and processes may not be sufficient to satisfy the requirements under Sarbanes-Oxley Section 404. For more significant amounts and/or spreadsheets with higher complexity, it may be very difficult to achieve an adequate level of control without migrating these functions to an application system with a more formalized information technology controls environment. 4. Evaluate Existing “As Is” Controls for Each Spreadsheet Evaluation of existing controls is typically done by comparing the existing spreadsheet controls against a checklist of “necessary” controls, such as those listed above, based upon the use and complexity of the spreadsheet. In addition, management must develop and execute a test plan to ensure that the controls operate effectively. Any gaps between existing and “necessary” controls should be identified as remediation items as well as any gaps in operating effectiveness. Page 5
  • 7. Spreadsheets used as part of their financial reporting process should be treated as manual processes and tested accordingly. Examples include: A company can maintain two copies of a spreadsheet, with changes made to both spreadsheets by separate individuals and the results compared. A company can use cell protection to restrict access to a spreadsheet, and management can test a sample of cells to ensure passwords are assigned for their protection. A company can employ standard naming conventions to ensure the use of the current spreadsheet version, and management can inspect a sample of spreadsheets to confirm that they follow the standard naming convention. If the standard naming convention requires that the spreadsheet name include the date and time of the modification, management would test that the spreadsheet name corresponds to the modification date. 5. Develop Action Plans for Remediating Control Deficiencies An action plan should be developed for each control gap identified. These action plans should increase the controls over the spreadsheet to the necessary controls based upon the use and complexity of the spreadsheet. Key elements of an action plan include: Assigning responsibility for actions in plan Establishing required remediation dates Prioritizing remediation efforts For complex spreadsheets that support significant accounts and disclosures, consider whether these “systems” should be migrated to production processing environments to provide an adequate level of control. Given the potentially large number of remediation items relating to spreadsheet controls, it is recommended that these efforts start with high priority items, defined as items related to financial spreadsheets containing complex calculations which support significant accounts and disclosures. Summary Many companies rely on spreadsheets as a key component in their financial reporting and operational processes. However, it is clear that the flexibility of spreadsheets has sometimes come at a cost. It is important that management identify where control breakdowns could lead to potential material misstatements and that controls for significant spreadsheets be documented, evaluated and tested. And, perhaps more importantly, management should evaluate whether it is possible to implement adequate controls over significant spreadsheets to sufficiently mitigate this risk, or if spreadsheets related to significant accounts or with higher complexity should be migrated to an application system with a more formalized information technology control environment. Understanding how spreadsheets are used and the adequacy of related controls is a critical part of management’s assessment of the effectiveness of its internal control over financial reporting under Section 404. Page 6
  • 8. PricewaterhouseCoopers (www.pwc.com) provides industry-focused assurance, tax and advisory services for public and private clients. More than 120,000 people in 139 countries connect their thinking, experience and solutions to build public trust and enhance value for clients and their stakeholders. “PricewaterhouseCoopers” refers to the network of member firms of PricewaterhouseCoopers International Limited, each of which is a separate and independent legal entity. CI-CI-05-0076-A © 2004 PricewaterhouseCoopers LLP. “PricewaterhouseCoopers” refers to PricewaterhouseCoopers LLP, a Delaware limited liability partnership or, as the context requires, the network of member firms of PricewaterhouseCoopers International Limited, each of which is a separate and independent legal entity.