Commission Guidance Regarding Management's Report on Internal Control Over Financial Reporting Under Section 13(a) or 15(d) of the Securities Exchange Act of 1934, 35324-35343 [E7-12299]
Download as PDF
35324
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
SECURITIES AND EXCHANGE
COMMISSION
17 CFR Part 241
[Release Nos. 33–8810; 34–55929; FR–77;
File No. S7–24–06]
Commission Guidance Regarding
Management’s Report on Internal
Control Over Financial Reporting
Under Section 13(a) or 15(d) of the
Securities Exchange Act of 1934
Securities and Exchange
Commission.
ACTION: Interpretation.
AGENCY:
SUMMARY: The SEC is publishing this
interpretive release to provide guidance
for management regarding its evaluation
and assessment of internal control over
financial reporting. The guidance sets
forth an approach by which
management can conduct a top-down,
risk-based evaluation of internal control
over financial reporting. An evaluation
that complies with this interpretive
guidance is one way to satisfy the
evaluation requirements of Rules 13a–
15(c) and 15d–15(c) under the Securities
Exchange Act of 1934.
DATES: Effective Date: June 27, 2007.
FOR FURTHER INFORMATION CONTACT: Josh
K. Jones, Professional Accounting
Fellow, Office of the Chief Accountant,
at (202) 551–5300, or N. Sean Harrison,
Special Counsel, Division of
Corporation Finance, at (202) 551–3430,
U.S. Securities and Exchange
Commission, 100 F Street, NE.,
Washington, DC 20549.
SUPPLEMENTARY INFORMATION: The
amendments to Rules 13a–15(c) 1 and
15d–15(c) 2 under the Securities
Exchange Act of 1934 3 (the ‘‘Exchange
Act’’), which clarify that an evaluation
of internal control over financial
reporting that complies with this
interpretive guidance is one way to
satisfy those rules, are being made in a
separate release.4
rwilkins on PROD1PC63 with RULES3
I. Introduction
Management is responsible for
maintaining a system of internal control
over financial reporting (‘‘ICFR’’) that
provides reasonable assurance regarding
the reliability of financial reporting and
the preparation of financial statements
for external purposes in accordance
with generally accepted accounting
principles. The rules we adopted in
June 2003 to implement Section 404 of
1 17
CFR 240.13a–15(c).
CFR 240.15d–15(c).
3 15 U.S.C. 78a et seq.
4 Release No. 34–55928 (Jun. 20, 2007).
2 17
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
the Sarbanes-Oxley Act of 2002 5
(‘‘Sarbanes-Oxley’’) require management
to annually evaluate whether ICFR is
effective at providing reasonable
assurance and to disclose its assessment
to investors.6 Management is
responsible for maintaining evidential
matter, including documentation, to
provide reasonable support for its
assessment. This evidence will also
allow a third party, such as the
company’s external auditor, to consider
the work performed by management.
ICFR cannot provide absolute
assurance due to its inherent
limitations; it is a process that involves
human diligence and compliance and is
subject to lapses in judgment and
breakdowns resulting from human
failures. ICFR also can be circumvented
by collusion or improper management
override. Because of such limitations,
ICFR cannot prevent or detect all
misstatements, whether unintentional
errors or fraud. However, these inherent
limitations are known features of the
financial reporting process, therefore, it
is possible to design into the process
safeguards to reduce, though not
eliminate, this risk.
The ‘‘reasonable assurance’’ referred
to in the Commission’s implementing
rules relates to similar language in the
Foreign Corrupt Practices Act of 1977
(‘‘FCPA’’).7 Exchange Act Section
13(b)(7) defines ‘‘reasonable assurance’’
and ‘‘reasonable detail’’ as ‘‘such level
of detail and degree of assurance as
would satisfy prudent officials in the
conduct of their own affairs.’’ 8 The
Commission has long held that
‘‘reasonableness’’ is not an ‘‘absolute
standard of exactitude for corporate
records.’’ 9 In addition, the Commission
recognizes that while ‘‘reasonableness’’
is an objective standard, there is a range
of judgments that an issuer might make
as to what is ‘‘reasonable’’ in
implementing Section 404 and the
Commission’s rules. Thus, the terms
‘‘reasonable,’’ ‘‘reasonably,’’ and
‘‘reasonableness’’ in the context of
Section 404 implementation do not
imply a single conclusion or
methodology, but encompass the full
range of appropriate potential conduct,
5 15
U.S.C. 7262.
No. 33–8238 (Jun. 5, 2003) [68 FR
36636] (hereinafter ‘‘Adopting Release’’).
7 Title 1 of Pub. L. 95–213 (1977).
8 15 U.S.C. 78m(b)(7). The conference committee
report on the 1988 amendments to the FCPA also
noted that the standard ‘‘does not connote an
unrealistic degree of exactitude or precision. The
concept of reasonableness of necessity contemplates
the weighing of a number of relevant factors,
including the costs of compliance.’’ Cong. Rec.
H2116 (daily ed. Apr. 20, 1988).
9 Release No. 34–17500 (Jan. 29, 1981) [46 FR
11544].
6 Release
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
conclusions or methodologies upon
which an issuer may reasonably base its
decisions.
Since companies first began
complying in 2004, the Commission has
received significant feedback on our
rules implementing Section 404.10 This
feedback included requests for further
guidance to assist company
management in complying with our
ICFR evaluation and disclosure
requirements. This guidance is in
response to those requests and reflects
the significant feedback we have
received, including comments on the
interpretive guidance we proposed on
December 20, 2006. In addressing a
number of the commonly identified
areas of concerns, the interpretive
guidance:
• Explains how to vary evaluation
approaches for gathering evidence based
on risk assessments;
• Explains the use of ‘‘daily
interaction,’’ self-assessment, and other
on-going monitoring activities as
evidence in the evaluation;
• Explains the purpose of
documentation and how management
has flexibility in approaches to
documenting support for its assessment;
• Provides management significant
flexibility in making judgments
regarding what constitutes adequate
evidence in low-risk areas; and
• Allows for management and the
auditor to have different testing
approaches.
The Interpretive Guidance is
organized around two broad principles.
The first principle is that management
should evaluate whether it has
implemented controls that adequately
address the risk that a material
misstatement of the financial statements
would not be prevented or detected in
a timely manner. The guidance
describes a top-down, risk-based
approach to this principle, including the
role of entity-level controls in assessing
financial reporting risks and the
adequacy of controls. The guidance
promotes efficiency by allowing
management to focus on those controls
that are needed to adequately address
the risk of a material misstatement of its
financial statements. The guidance does
not require management to identify
every control in a process or document
the business processes impacting ICFR.
Rather, management can focus its
10 Release Nos. 33–8762; 34–54976 (Dec. 20,
2006) [71 FR 77635] (hereinafter ‘‘Proposing
Release’’). For a detailed history of the
implementation of Section 404 of Sarbanes-Oxley,
see Section I., Background, of the Proposing
Release. An analysis of the comments we received
on the Proposing Release is included in Section III
of this release.
E:\FR\FM\27JNR3.SGM
27JNR3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
evaluation process and the
documentation supporting the
assessment on those controls that it
determines adequately address the risk
of a material misstatement of the
financial statements. For example, if
management determines that a risk of a
material misstatement is adequately
addressed by an entity-level control, no
further evaluation of other controls is
required.
The second principle is that
management’s evaluation of evidence
about the operation of its controls
should be based on its assessment of
risk. The guidance provides an
approach for making risk-based
judgments about the evidence needed
for the evaluation. This allows
management to align the nature and
extent of its evaluation procedures with
those areas of financial reporting that
pose the highest risks to reliable
financial reporting (that is, whether the
financial statements are materially
accurate). As a result, management may
be able to use more efficient approaches
to gathering evidence, such as selfassessments, in low-risk areas and
perform more extensive testing in highrisk areas. By following these two
principles, we believe companies of all
sizes and complexities will be able to
implement our rules effectively and
efficiently.
The Interpretive Guidance reiterates
the Commission’s position that
management should bring its own
experience and informed judgment to
bear in order to design an evaluation
process that meets the needs of its
company and that provides a reasonable
basis for its annual assessment of
whether ICFR is effective. This allows
management sufficient and appropriate
flexibility to design such an evaluation
process.11 Smaller public companies,
which generally have less complex
internal control systems than larger
public companies, can use this guidance
to scale and tailor their evaluation
methods and procedures to fit their own
facts and circumstances. We encourage
smaller public companies 12 to take
advantage of the flexibility and
scalability to conduct an evaluation of
ICFR that is both efficient and effective
at identifying material weaknesses.
The effort necessary to conduct an
initial evaluation of ICFR will vary
among companies, partly because this
effort will depend on management’s
existing financial reporting risk
assessment and control monitoring
activities. After the first year of
compliance, management’s effort to
identify financial reporting risks and
controls should ordinarily be less,
because subsequent evaluations should
be more focused on changes in risks and
controls rather than identification of all
financial reporting risks and the related
controls. Further, in each subsequent
year, the documentation of risks and
controls will only need to be updated
from the prior year(s), not recreated
anew. Through the risk and control
identification process, management will
have identified for testing only those
controls that are needed to meet the
objective of ICFR (that is, to provide
reasonable assurance regarding the
reliability of financial reporting) and for
which evidence about their operation
can be obtained most efficiently. The
nature and extent of procedures
implemented to evaluate whether those
controls continue to operate effectively
can be tailored to the company’s unique
circumstances, thereby avoiding
unnecessary compliance costs.
The guidance assumes management
has established and maintains a system
of internal accounting controls as
required by the FCPA. Further, it is not
intended to explain how management
should design its ICFR to comply with
the control framework management has
chosen. To allow appropriate flexibility,
the guidance does not provide a
checklist of steps management should
perform in completing its evaluation.
The guidance in this release shall be
effective immediately upon its
publication in the Federal Register.13
rwilkins on PROD1PC63 with RULES3
12 While
11 Exchange Act Rules 13a–15 and 15d–15 [17
CFR 240.13a–15 and 15d–15] require management
to evaluate the effectiveness of ICFR as of the end
of the fiscal year. For purposes of this document,
the term ‘‘evaluation’’ or ‘‘evaluation process’’
refers to the methods and procedures that
management implements to comply with these
rules. The term ‘‘assessment’’ is used in this
document to describe the disclosure required by
Item 308 of Regulations S–B and S–K [17 CFR
228.308 and 229.308]. This disclosure must include
discussion of any material weaknesses which exist
as of the end of the most recent fiscal year and
management’s assessment of the effectiveness of
ICFR, including a statement as to whether or not
ICFR is effective. Management is not permitted to
conclude that ICFR is effective if there are one or
more material weaknesses in ICFR.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
a company’s individual facts and
circumstances should be considered in determining
whether a company is a smaller public company
and the resulting implications to management’s
evaluation, a company’s public market
capitalization and annual revenues are useful
indicators of its size and complexity. The Final
Report of the Advisory Committee on Smaller
Public Companies to the United States Securities
and Exchange Commission (Apr. 23, 2006),
available at https://www.sec.gov/info/smallbus/
acspc/acspc-finalreport.pdf, defined smaller
companies, which included microcap companies,
and the SEC’s rules include size characteristics for
‘‘accelerated filers’’ and ‘‘non-accelerated filers’’
which approximately fit the same definitions.
13 The Commission finds good cause under 5
U.S.C. 808(2) for this interpretation to take effect on
the date of Federal Register publication. Further
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
35325
As a companion 14 to this interpretive
release, we are adopting amendments to
Exchange Act Rules 13a–15(c) and 15d–
15(c) and revisions to Regulation S–X.15
The amendments to Rules 13a–15(c) and
15d–15(c) will make it clear that an
evaluation that is conducted in
accordance with this interpretive
guidance is one way to satisfy the
annual management evaluation
requirement in those rules. We are also
amending our rules to define the term
‘‘material weakness’’ and to revise the
requirements regarding the auditor’s
attestation report on ICFR. Additionally,
we are seeking additional comment on
the definition of the term ‘‘significant
deficiency.’’ 16
II. Interpretive Guidance—Evaluation
and Assessment of Internal Control
Over Financial Reporting
The interpretive guidance addresses
the following topics:
A. The Evaluation Process
1. Identifying Financial Reporting Risks
and Controls
a. Identifying Financial Reporting Risks
b. Identifying Controls That Adequately
Address Financial Reporting Risks
c. Consideration of Entity-Level Controls
d. Role of Information Technology General
Controls
e. Evidential Matter To Support the
Assessment
2. Evaluating Evidence of the Operating
Effectiveness of ICFR
a. Determining the Evidence Needed To
Support the Assessment
b. Implementing Procedures To Evaluate
Evidence of the Operation of ICFR
c. Evidential Matter To Support the
Assessment
3. Multiple Location Considerations
B. Reporting Considerations
1. Evaluation of Control Deficiencies
2. Expression of Assessment of
Effectiveness of ICFR by Management
3. Disclosures About Material Weaknesses
4. Impact of a Restatement of Previously
Issued Financial Statements on
Management’s Report on ICFR
5. Inability To Assess Certain Aspects of
ICFR
A. The Evaluation Process
The objective of internal control over
financial reporting 17 (‘‘ICFR’’) is to
delay would be unnecessary and contrary to the
public interest because following the guidance is
voluntary. Additionally, delay may deter companies
from realizing all the efficiencies intended by this
guidance, and immediate effectiveness will assist in
preparing for 2007 evaluations and assessments of
internal control over financial reporting.
14 Release No. 34–55928.
15 17 CFR 210.1–01 et seq.
16 Release No. 34–55930 (Jun. 20, 2007).
17 Exchange Act Rules 13a–15(f) and 15d–15(f)
[17 CFR 240.13a–15(f) and 15d–15(b)] define
internal control over financial reporting as:
E:\FR\FM\27JNR3.SGM
Continued
27JNR3
35326
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
rwilkins on PROD1PC63 with RULES3
provide reasonable assurance regarding
the reliability of financial reporting and
the preparation of financial statements
for external purposes in accordance
with generally accepted accounting
principles (‘‘GAAP’’). The purpose of
the evaluation of ICFR is to provide
management with a reasonable basis for
its annual assessment as to whether any
material weaknesses 18 in ICFR exist as
of the end of the fiscal year.19 To
accomplish this, management identifies
the risks to reliable financial reporting,
evaluates whether controls exist to
address those risks, and evaluates
evidence about the operation of the
controls included in the evaluation
based on its assessment of risk.20 The
evaluation process will vary from
company to company; however, the topdown, risk-based approach which is
described in this guidance will typically
be the most efficient and effective way
to conduct the evaluation.
The evaluation process guidance is
described in two sections. The first
A process designed by, or under the supervision
of, the issuer’s principal executive and principal
financial officers, or persons performing similar
functions, and effected by the issuer’s board of
directors, management and other personnel, to
provide reasonable assurance regarding the
reliability of financial reporting and the preparation
of financial statements for external purposes in
accordance with generally accepted accounting
principles and includes those policies and
procedures that:
(1) Pertain to the maintenance of records that in
reasonable detail accurately and fairly reflect the
transactions and dispositions of the assets of the
issuer;
(2) Provide reasonable assurance that transactions
are recorded as necessary to permit preparation of
financial statements in accordance with generally
accepted accounting principles, and that receipts
and expenditures of the issuer are being made only
in accordance with authorizations of management
and directors of the registrant; and
(3) Provide reasonable assurance regarding
prevention or timely detection of unauthorized
acquisition, use or disposition of the issuer’s assets
that could have a material effect on the financial
statements.
18 As defined in Exchange Act Rule 12b–2 [17
CFR 240.12b–2] and Rule 1–02 of Regulation S–X
[17 CFR 210.1–02], a material weakness is a
deficiency, or a combination of deficiencies, in
ICFR such that there is a reasonable possibility that
a material misstatement of the registrant’s annual or
interim financial statements will not be prevented
or detected on a timely basis. See Release No. 34–
55928.
19 This focus on material weaknesses will lead to
a better understanding by investors about the
company’s ICFR, as well as its inherent limitations.
Further, the Commission’s rules implementing
Section 404, by providing for public disclosure of
material weaknesses, concentrate attention on the
most important internal control issues.
20 If management’s evaluation process identifies
material weaknesses, but all material weaknesses
are remediated by the end of the fiscal year,
management may conclude that ICFR is effective as
of the end of the fiscal year. However, management
should consider whether disclosure of such
remediated material weaknesses is appropriate or
required under Item 307 or Item 308 of Regulations
S–K or S–B or other Commission disclosure rules.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
section explains the identification of
financial reporting risks and the
evaluation of whether the controls
management has implemented
adequately address those risks. The
second section explains an approach for
making judgments about the methods
and procedures for evaluating whether
the operation of ICFR is effective. Both
sections explain how entity-level
controls 21 impact the evaluation
process, as well as how management
should focus its evaluation efforts on
the highest risks to reliable financial
reporting.22
Under the Commission’s rules,
management’s annual assessment of the
effectiveness of ICFR must be made in
accordance with a suitable control
framework’s 23 definition of effective
internal control.24 These control
21 The term ‘‘entity-level controls’’ as used in this
document describes aspects of a system of internal
control that have a pervasive effect on the entity’s
system of internal control such as controls related
to the control environment (for example,
management’s philosophy and operating style,
integrity and ethical values; board or audit
committee oversight; and assignment of authority
and responsibility); controls over management
override; the company’s risk assessment process;
centralized processing and controls, including
shared service environments; controls to monitor
results of operations; controls to monitor other
controls, including activities of the internal audit
function, the audit committee, and self-assessment
programs; controls over the period-end financial
reporting process; and policies that address
significant business control and risk management
practices. The terms ‘‘company-level’’ and ‘‘entitywide’’ are also commonly used to describe these
controls.
22 Because management is responsible for
maintaining effective ICFR, this interpretive
guidance does not specifically address the role of
the board of directors or audit committee in a
company’s evaluation and assessment of ICFR.
However, we would ordinarily expect a board of
directors or audit committee, as part of its oversight
responsibilities for the company’s financial
reporting, to be reasonably knowledgeable and
informed about the evaluation process and
management’s assessment, as necessary in the
circumstances.
23 In the Adopting Release, the Commission
specified characteristics of a suitable control
framework and identified the Internal Control—
Integrated Framework (1992) created by the
Committee of Sponsoring Organizations of the
Treadway Commission (‘‘COSO’’) as an example of
a suitable framework. We also cited the Guidance
on Assessing Control published by the Canadian
Institute of Chartered Accountants (‘‘CoCo’’) and
the report published by the Institute of Chartered
Accountants in England & Wales Internal Control:
Guidance for Directors on the Combined Code
(known as the Turnbull Report) as examples of
other suitable frameworks that issuers could choose
in evaluating the effectiveness of their ICFR. We
encourage companies to examine and select a
framework that may be useful in their own
circumstances; we also encourage the further
development of existing and alternative
frameworks.
24 For example, both the COSO framework and
the Turnbull Report state that determining whether
a system of internal control is effective is a
subjective judgment resulting from an assessment of
whether the five components (that is, control
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
frameworks define elements of internal
control that are expected to be present
and functioning in an effective internal
control system. In assessing
effectiveness, management evaluates
whether its ICFR includes policies,
procedures and activities that address
the elements of internal control that the
applicable control framework describes
as necessary for an internal control
system to be effective. The framework
elements describe the characteristics of
an internal control system that may be
relevant to individual areas of the
company’s ICFR, pervasive to many
areas, or entity-wide. Therefore,
management’s evaluation process
includes not only controls involving
particular areas of financial reporting,
but also the entity-wide and other
pervasive elements of internal control
defined by its selected control
framework. This guidance is not
intended to replace the elements of an
effective system of internal control as
defined within a control framework.
1. Identifying Financial Reporting Risks
and Controls
Management should evaluate whether
it has implemented controls that will
achieve the objective of ICFR (that is, to
provide reasonable assurance regarding
the reliability of financial reporting).
The evaluation begins with the
identification and assessment of the
risks to reliable financial reporting (that
is, materially accurate financial
statements), including changes in those
risks. Management then evaluates
whether it has controls placed in
operation (that is, in use) that are
designed to adequately address those
risks. Management ordinarily would
consider the company’s entity-level
controls in both its assessment of risks
and in identifying which controls
adequately address the risks.
The evaluation approach described
herein allows management to identify
controls and maintain supporting
evidential matter for its controls in a
manner that is tailored to the company’s
financial reporting risks (as defined
below). Thus, the controls that
management identifies and documents
are those that are important to achieving
the objective of ICFR. These controls are
then subject to procedures to evaluate
evidence of their operating
environment, risk assessment, control activities,
monitoring, and information and communication)
are present and functioning effectively. Although
CoCo states that an assessment of effectiveness
should be made against twenty specific criteria, it
acknowledges that the criteria can be regrouped
into different structures, and includes a table
showing how the criteria can be regrouped into the
five-component structure of COSO.
E:\FR\FM\27JNR3.SGM
27JNR3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
rwilkins on PROD1PC63 with RULES3
effectiveness, as determined pursuant to
Section II.A.2.
a. Identifying Financial Reporting Risks
Management should identify those
risks of misstatement that could,
individually or in combination with
others, result in a material misstatement
of the financial statements (‘‘financial
reporting risks’’). Ordinarily, the
identification of financial reporting risks
begins with evaluating how the
requirements of GAAP apply to the
company’s business, operations and
transactions. Management must provide
investors with financial statements that
fairly present the company’s financial
position, results of operations and cash
flows in accordance with GAAP. A lack
of fair presentation arises when one or
more financial statement amounts or
disclosures (‘‘financial reporting
elements’’) contain misstatements
(including omissions) that are material.
Management uses its knowledge and
understanding of the business, and its
organization, operations, and processes,
to consider the sources and potential
likelihood of misstatements in financial
reporting elements. Internal and
external risk factors that impact the
business, including the nature and
extent of any changes in those risks,
may give rise to a risk of misstatement.
Risks of misstatement may also arise
from sources such as the initiation,
authorization, processing and recording
of transactions and other adjustments
that are reflected in financial reporting
elements. Management may find it
useful to consider ‘‘what could go
wrong’’ within a financial reporting
element in order to identify the sources
and the potential likelihood of
misstatements and identify those that
could result in a material misstatement
of the financial statements.
The methods and procedures for
identifying financial reporting risks will
vary based on the characteristics of the
company. These characteristics include,
among others, the size, complexity, and
organizational structure of the company
and its processes and financial reporting
environment, as well as the control
framework used by management. For
example, to identify financial reporting
risks in a larger business or a complex
business process, management’s
methods and procedures may involve a
variety of company personnel, including
those with specialized knowledge.
These individuals, collectively, may be
necessary to have a sufficient
understanding of GAAP, the underlying
business transactions and the process
activities, including the role of
computer technology, that are required
to initiate, authorize, record and process
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
35327
transactions. In contrast, in a small
company that operates on a centralized
basis with less complex business
processes and with little change in the
risks or processes, management’s daily
involvement with the business may
provide it with adequate knowledge to
appropriately identify financial
reporting risks.
Management’s evaluation of the risk
of misstatement should include
consideration of the vulnerability of the
entity to fraudulent activity (for
example, fraudulent financial reporting,
misappropriation of assets and
corruption), and whether any such
exposure could result in a material
misstatement of the financial
statements.25 The extent of activities
required for the evaluation of fraud risks
is commensurate with the size and
complexity of the company’s operations
and financial reporting environment.26
Management should recognize that
the risk of material misstatement due to
fraud ordinarily exists in any
organization, regardless of size or type,
and it may vary by specific location or
segment and by individual financial
reporting element. For example, one
type of fraud risk that has resulted in
fraudulent financial reporting in
companies of all sizes and types is the
risk of improper override of internal
controls in the financial reporting
process. While the identification of a
fraud risk is not necessarily an
indication that a fraud has occurred, the
absence of an identified fraud is not an
indication that no fraud risks exist.
Rather, these risk assessments are used
in evaluating whether adequate controls
have been implemented.
(that is, in use) that adequately address
the company’s financial reporting risks.
The determination of whether an
individual control, or a combination of
controls, adequately addresses a
financial reporting risk involves
judgments about whether the controls, if
operating properly, can effectively
prevent or detect misstatements that
could result in material misstatements
in the financial statements.28 If
management determines that a
deficiency in ICFR exists, it must be
evaluated to determine whether a
material weakness exists.29 The
guidance in Section II.B.1. is designed
to assist management with that
evaluation.
Management may identify preventive
controls, detective controls, or a
combination of both, as adequately
addressing financial reporting risks.30
There might be more than one control
that addresses the financial reporting
risks for a financial reporting element;
conversely, one control might address
the risks of more than one financial
reporting element. It is not necessary to
identify all controls that may exist or
identify redundant controls, unless
redundancy itself is required to address
the financial reporting risks. To
illustrate, management may determine
that the risk of a misstatement in
interest expense, which could result in
a material misstatement of the financial
statements, is adequately addressed by a
control within the company’s periodend financial reporting process (that is,
an entity-level control). In such a case,
management may not need to identify,
for purposes of the ICFR evaluation, any
b. Identifying Controls That Adequately
Address Financial Reporting Risks
Management should evaluate whether
it has controls 27 placed in operation
function or activity in a process. A control’s impact
on ICFR may be entity-wide or specific to an
account balance, class of transactions or
application. Controls have unique characteristics—
for example, they can be: Automated or manual;
reconciliations; segregation of duties; review and
approval authorizations; safeguarding and
accountability of assets; preventing or detecting
error or fraud. Controls within a process may
consist of financial reporting controls and
operational controls (that is, those designed to
achieve operational objectives).
28 Companies may use ‘‘control objectives,’’
which provide specific criteria against which to
evaluate the effectiveness of controls, to assist in
evaluating whether controls can prevent or detect
misstatements.
29 A deficiency in the design of ICFR exists when
(a) Necessary controls are missing or (b) existing
controls are not properly designed so that, even if
the control operates as designed, the financial
reporting risks would not be addressed.
30 Preventive controls have the objective of
preventing the occurrence of errors or fraud that
could result in a misstatement of the financial
statements. Detective controls have the objective of
detecting errors or fraud that has already occurred
that could result in a misstatement of the financial
statements. Preventive and detective controls may
be completely manual, involve some degree of
computer automation, or be completely automated.
25 For example, COSO’s Internal Control Over
Financial Reporting—Guidance for Smaller Public
Companies (2006), Volume 1: Executive Summary,
Principle 10: Fraud Risk (page 10) states, ‘‘The
potential for material misstatement due to fraud is
explicitly considered in assessing risks to the
achievement of financial reporting objectives.’’
26 Management may find resources such as
‘‘Management Antifraud Programs and Controls—
Guidance to Help Prevent, Deter, and Detect
Fraud,’’ which was issued jointly by seven
professional organizations and is included as an
exhibit to AU Sec. 316, Consideration of Fraud in
a Financial Statement Audit (as adopted on an
interim basis by the PCAOB in PCAOB Rule 3200T)
helpful in assessing fraud risks. Other resources
also exist (for example, the American Institute of
Certified Public Accountants’ (AICPA) Management
Override of Internal Controls: The Achilles’ Heel of
Fraud Prevention (2005)), and more may be
developed in the future.
27 A control consists of a specific set of policies,
procedures, and activities designed to meet an
objective. A control may exist within a designated
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
E:\FR\FM\27JNR3.SGM
27JNR3
35328
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
rwilkins on PROD1PC63 with RULES3
additional controls related to the risk of
misstatement in interest expense.
Management may also consider the
efficiency with which evidence of the
operation of a control can be evaluated
when identifying the controls that
adequately address the financial
reporting risks. When more than one
control exists and each adequately
addresses a financial reporting risk,
management may decide to select the
control for which evidence of operating
effectiveness can be obtained more
efficiently. Moreover, when adequate
information technology (‘‘IT’’) general
controls exist and management has
determined that the operation of such
controls is effective, management may
determine that automated controls are
more efficient to evaluate than manual
controls. Considering the efficiency
with which the operation of a control
can be evaluated will often enhance the
overall efficiency of the evaluation
process.
In addition to identifying controls that
address the financial reporting risks of
individual financial reporting elements,
management also evaluates whether it
has controls in place to address the
entity-level and other pervasive
elements of ICFR that its chosen control
framework prescribes as necessary for
an effective system of internal control.
This would ordinarily include, for
example, considering how and whether
controls related to the control
environment, controls over management
override, the entity-level risk
assessment process and monitoring
activities,31 controls over the period-end
financial reporting process,32 and the
policies that address significant
business control and risk management
practices are adequate for purposes of
an effective system of internal control.
The control frameworks and related
guidance may be useful tools for
evaluating the adequacy of these
elements of ICFR.
When identifying the controls that
address financial reporting risks,
management learns information about
31 Monitoring activities may include controls to
monitor results of operations and controls to
monitor other controls, including activities of the
internal audit function, the audit committee, and
self-assessment programs.
32 The nature of controls within the period-end
financial reporting process will vary based on a
company’s facts and circumstances. The period-end
financial reporting process may include matters
such as: Procedures to enter transaction totals into
the general ledger; the initiation, authorization,
recording and processing of journal entries in the
general ledger; procedures for the selection and
application of accounting policies; procedures used
to record recurring and non-recurring adjustments
to the annual and quarterly financial statements;
and procedures for preparing annual and quarterly
financial statements and related disclosures.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
the characteristics of the controls that
should inform its judgments about the
risk that a control will fail to operate as
designed. This includes, for example,
information about the judgment
required in its operation and
information about the complexity of the
controls. Section II.A.2. discusses how
these characteristics are considered in
determining the nature and extent of
evidence of the operation of the controls
that management evaluates.
At the end of this identification
process, management has identified for
evaluation those controls that are
needed to meet the objective of ICFR
(that is, to provide reasonable assurance
regarding the reliability of financial
reporting) and for which evidence about
their operation can be obtained most
efficiently.
c. Consideration of Entity-Level
Controls
Management considers entity-level
controls when identifying financial
reporting risks and related controls for
a financial reporting element. In doing
so, it is important for management to
consider the nature of the entity-level
controls and how those controls relate
to the financial reporting element. The
more indirect the relationship to a
financial reporting element, the less
effective a control may be in preventing
or detecting a misstatement.33
Some entity-level controls, such as
certain control environment controls,
have an important, but indirect, effect
on the likelihood that a misstatement
will be prevented or detected on a
timely basis. These controls might affect
the other controls management
determines are necessary to adequately
address financial reporting risks for a
financial reporting element. However, it
is unlikely that management will
identify only this type of entity-level
control as adequately addressing a
financial reporting risk identified for a
financial reporting element.
Other entity-level controls may be
designed to identify possible
breakdowns in lower-level controls, but
not in a manner that would, by
themselves, adequately address
financial reporting risks. For example,
an entity-level control that monitors the
results of operations may be designed to
detect potential misstatements and
investigate whether a breakdown in
33 Controls
can be either directly or indirectly
related to a financial reporting element. Controls
that are designed to have a specific effect on a
financial reporting element are considered directly
related. For example, controls established to ensure
that personnel are properly counting and recording
the annual physical inventory relate directly to the
existence of the inventory.
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
lower-level controls occurred. However,
if the amount of potential misstatement
that could exist before being detected by
the monitoring control is too high, then
the control may not adequately address
the financial reporting risks of a
financial reporting element.
Entity-level controls may be designed
to operate at the process, application,
transaction or account-level and at a
level of precision that would adequately
prevent or detect on a timely basis
misstatements in one or more financial
reporting elements that could result in
a material misstatement of the financial
statements. In these cases, management
may not need to identify or evaluate
additional controls relating to that
financial reporting risk.
d. Role of Information Technology
General Controls
Controls that management identifies
as addressing financial reporting risks
may be automated,34 dependent upon IT
functionality,35 or a combination of both
manual and automated procedures.36 In
these situations, management’s
evaluation process generally considers
the design and operation of the
automated or IT dependent application
controls and the relevant IT general
controls over the applications providing
the IT functionality. While IT general
controls alone ordinarily do not
adequately address financial reporting
risks, the proper and consistent
operation of automated controls or IT
functionality often depends upon
effective IT general controls. The
identification of risks and controls
within IT should not be a separate
evaluation. Instead, it should be an
integral part of management’s top-down,
risk-based approach to identifying risks
and controls and in determining
evidential matter necessary to support
the assessment.
Aspects of IT general controls that
may be relevant to the evaluation of
ICFR will vary depending upon a
company’s facts and circumstances. For
purposes of the evaluation of ICFR,
management only needs to evaluate
those IT general controls that are
necessary for the proper and consistent
operation of other controls designed to
adequately address financial reporting
risks. For example, management might
consider whether certain aspects of IT
34 For example, application controls that perform
automated matching, error checking or edit
checking functions.
35 For example, consistent application of a
formula or performance of a calculation and posting
correct balances to appropriate accounts or ledgers.
36 For example, a control that manually
investigates items contained in a computer
generated exception report.
E:\FR\FM\27JNR3.SGM
27JNR3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
general control areas, such as program
development, program changes,
computer operations, and access to
programs and data, apply to its facts and
circumstances.37 Specifically, it is
unnecessary to evaluate IT general
controls that primarily pertain to
efficiency or effectiveness of a
company’s operations, but which are
not relevant to addressing financial
reporting risks.
e. Evidential Matter To Support the
Assessment
As part of its evaluation of ICFR,
management must maintain reasonable
support for its assessment.38
Documentation of the design of the
controls management has placed in
operation to adequately address the
financial reporting risks, including the
entity-level and other pervasive
elements necessary for effective ICFR, is
an integral part of the reasonable
support. The form and extent of the
documentation will vary depending on
the size, nature, and complexity of the
company. It can take many forms (for
example, paper documents, electronic,
or other media). Also, the
documentation can be presented in a
number of ways (for example, policy
manuals, process models, flowcharts,
job descriptions, documents, internal
memorandums, forms, etc). The
documentation does not need to include
all controls that exist within a process
that impacts financial reporting. Rather,
the documentation should be focused
on those controls that management
concludes are adequate to address the
financial reporting risks.39
rwilkins on PROD1PC63 with RULES3
37 However, the reference to these specific IT
general control areas as examples within this
guidance does not imply that these areas, either
partially or in their entirety, are applicable to all
facts and circumstances. As indicated, companies
need to take their particular facts and circumstances
into consideration in determining which aspects of
IT general controls are relevant.
38 See instructions to Item 308 of Regulations SK and S-B.
39 Section II.A.2.c also provides guidance with
regard to the documentation required to support
management’s evaluation of operating effectiveness.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
In addition to providing support for
the assessment of ICFR, documentation
of the design of controls also supports
other objectives of an effective system of
internal control. For example, it serves
as evidence that controls within ICFR,
including changes to those controls,
have been identified, are capable of
being communicated to those
responsible for their performance, and
are capable of being monitored by the
company.
2. Evaluating Evidence of the Operating
Effectiveness of ICFR
Management should evaluate
evidence of the operating effectiveness
of ICFR. The evaluation of the operating
effectiveness of a control considers
whether the control is operating as
designed and whether the person
performing the control possesses the
necessary authority and competence to
perform the control effectively. The
evaluation procedures that management
uses to gather evidence about the
operation of the controls it identifies as
adequately addressing the financial
reporting risks for financial reporting
elements (pursuant to Section II.A.1.b)
should be tailored to management’s
assessment of the risk characteristics of
both the individual financial reporting
elements and the related controls
(collectively, ICFR risk). Management
should ordinarily focus its evaluation of
the operation of controls on areas posing
the highest ICFR risk. Management’s
assessment of ICFR risk also considers
the impact of entity-level controls, such
as the relative strengths and weaknesses
of the control environment, which may
influence management’s judgments
about the risks of failure for particular
controls.
Evidence about the effective operation
of controls may be obtained from direct
testing of controls and on-going
monitoring activities. The nature, timing
and extent of evaluation procedures
necessary for management to obtain
sufficient evidence of the effective
operation of a control depend on the
assessed ICFR risk. In determining
whether the evidence obtained is
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
35329
sufficient to provide a reasonable basis
for its evaluation of the operation of
ICFR, management should consider not
only the quantity of evidence (for
example, sample size), but also the
qualitative characteristics of the
evidence. The qualitative characteristics
of the evidence include the nature of the
evaluation procedures performed, the
period of time to which the evidence
relates, the objectivity 40 of those
evaluating the controls, and, in the case
of on-going monitoring activities, the
extent of validation through direct
testing of underlying controls. For any
individual control, different
combinations of the nature, timing, and
extent of evaluation procedures may
provide sufficient evidence. The
sufficiency of evidence is not
necessarily determined by any of these
attributes individually.
a. Determining the Evidence Needed To
Support the Assessment
Management should evaluate the
ICFR risk of the controls identified in
Section II.A.1.b as adequately
addressing the financial reporting risks
for financial reporting elements to
determine the evidence needed to
support the assessment. This evaluation
should consider the characteristics of
the financial reporting elements to
which the controls relate and the
characteristics of the controls
themselves. This concept is illustrated
in the following diagram.
40 In determining the objectivity of those
evaluating controls, management is not required to
make an absolute conclusion regarding objectivity,
but rather should recognize that personnel will
have varying degrees of objectivity based on, among
other things, their job function, their relationship to
the control being evaluated, and their level of
authority and responsibility within the
organization. Personnel whose core function
involves permanently serving as a testing or
compliance authority at the company, such as
internal auditors, normally are expected to be the
most objective. However, the degree of objectivity
of other company personnel may be such that the
evaluation of controls performed by them would
provide sufficient evidence. Management’s
judgments about whether the degree of objectivity
is adequate to provide sufficient evidence should
take into account the ICFR risk.
E:\FR\FM\27JNR3.SGM
27JNR3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
Management’s consideration of the
misstatement risk of a financial
reporting element includes both the
materiality of the financial reporting
element and the susceptibility of the
underlying account balances,
transactions or other supporting
information to a misstatement that
could be material to the financial
statements. As the materiality of a
financial reporting element increases in
relation to the amount of misstatement
that would be considered material to the
financial statements, management’s
assessment of misstatement risk for the
financial reporting element generally
would correspondingly increase. In
addition, management considers the
extent to which the financial reporting
elements include transactions, account
balances or other supporting
information that are prone to material
misstatement. For example, the extent to
which a financial reporting element: (1)
Involves judgment in determining the
recorded amounts; (2) is susceptible to
fraud; (3) has complex accounting
requirements; (4) experiences change in
the nature or volume of the underlying
transactions; or (5) is sensitive to
changes in environmental factors, such
as technological and/or economic
developments, would generally affect
management’s judgment of whether a
misstatement risk is higher or lower.
Management’s consideration of the
likelihood that a control might fail to
operate effectively includes, among
other things:
• The type of control (that is, manual
or automated) and the frequency with
which it operates;
• The complexity of the control;
• The risk of management override;
• The judgment required to operate
the control;
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
• The competence of the personnel
who perform the control or monitor its
performance;
• Whether there have been changes in
key personnel who either perform the
control or monitor its performance;
• The nature and materiality of
misstatements that the control is
intended to prevent or detect;
• The degree to which the control
relies on the effectiveness of other
controls (for example, IT general
controls); and
• The evidence of the operation of the
control from prior year(s).
For example, management’s judgment
of the risk of control failure would be
higher for controls whose operation
requires significant judgment than for
non-complex controls requiring less
judgment.
Financial reporting elements that
involve related party transactions,
critical accounting policies,41 and
related critical accounting estimates 42
generally would be assessed as having a
higher misstatement risk. Further, when
the controls related to these financial
reporting elements are subject to the risk
of management override, involve
41 ‘‘Critical accounting policies’’ are defined as
those policies that are most important to the
financial statement presentation, and require
management’s most difficult, subjective, or complex
judgments, often as the result of a need to make
estimates about the effect of matters that are
inherently uncertain. See Release No. 33–8040 (Dec.
12, 2001) [66 FR 65013].
42 ‘‘Critical accounting estimates’’ relate to
estimates or assumptions involved in the
application of generally accepted accounting
principles where the nature of the estimates or
assumptions is material due to the levels of
subjectivity and judgment necessary to account for
highly uncertain matters or the susceptibility of
such matters to change and the impact of the
estimates and assumptions on financial condition
or operating performance is material. See Release
No. 33–8350 (Dec. 19, 2003) [68 FR 75056]. For
additional information, see, for example, Release
No. 33–8098 (May 10, 2002) [67 FR 35620].
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
significant judgment, or are complex,
they should generally be assessed as
having higher ICFR risk.
When a combination of controls is
required to adequately address the risks
related to a financial reporting element,
management should analyze the risk
characteristics of the controls. This is
because the controls associated with a
given financial reporting element may
not necessarily share the same risk
characteristics. For example, a financial
reporting element involving significant
estimation may require a combination of
automated controls that accumulate
source data and manual controls that
require highly judgmental
determinations of assumptions. In this
case, the automated controls may be
subject to a system that is stable (that is,
has not undergone significant change)
and is supported by effective IT general
controls and are therefore assessed as
lower risk, whereas the manual controls
would be assessed as higher risk.
The consideration of entity-level
controls (for example, controls within
the control environment) may influence
management’s determination of the
evidence needed to sufficiently support
its assessment of ICFR. For example,
management’s judgment about the
likelihood that a control fails to operate
effectively may be influenced by a
highly effective control environment
and thereby impact the evidence
evaluated for that control. However, a
strong control environment would not
eliminate the need to evaluate the
operation of the control in some
manner.
b. Implementing Procedures To Evaluate
Evidence of the Operation of ICFR
Management should evaluate
evidence that provides a reasonable
basis for its assessment of the operating
E:\FR\FM\27JNR3.SGM
27JNR3
ER27JN07.000
rwilkins on PROD1PC63 with RULES3
35330
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
rwilkins on PROD1PC63 with RULES3
effectiveness of the controls identified
in Section II.A.1. Management uses its
assessment of ICFR risk, as determined
in Section II.A.2 to determine the
evaluation methods and procedures
necessary to obtain sufficient evidence.
The evaluation methods and procedures
may be integrated with the daily
responsibilities of its employees or
implemented specifically for purposes
of the ICFR evaluation. Activities that
are performed for other reasons (for
example, day-to-day activities to
manage the operations of the business)
may also provide relevant evidence.
Further, activities performed to meet the
monitoring objectives of the control
framework may provide evidence to
support the assessment of the operating
effectiveness of ICFR.
The evidence management evaluates
comes from direct tests of controls, ongoing monitoring, or a combination of
both. Direct tests of controls are tests
ordinarily performed on a periodic basis
by individuals with a high degree of
objectivity relative to the controls being
tested. Direct tests provide evidence as
of a point in time and may provide
information about the reliability of ongoing monitoring activities. On-going
monitoring includes management’s
normal, recurring activities that provide
information about the operation of
controls. These activities include, for
example, self-assessment 43 procedures
and procedures to analyze performance
measures designed to track the
operation of controls.44 Self-assessment
is a broad term that can refer to different
types of procedures performed by
individuals with varying degrees of
objectivity. It includes assessments
made by the personnel who operate the
control as well as members of
management who are not responsible for
operating the control. The evidence
provided by self-assessment activities
depends on the personnel involved and
the manner in which the activities are
conducted. For example, evidence from
self-assessments performed by
personnel responsible for operating the
control generally provides less evidence
43 For example, COSO’s 1992 framework defines
self-assessments as ‘‘evaluations where persons
responsible for a particular unit or function will
determine the effectiveness of controls for their
activities.’’
44 Management’s evaluation process may also
consider the results of key performance indicators
(‘‘KPIs’’) in which management reconciles operating
and financial information with its knowledge of the
business. The procedures that management
implements pursuant to this section should
evaluate the effective operation of these KPI-type
controls when they are identified pursuant to
Section II.A.1.b. as addressing financial reporting
risk.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
due to the evaluator’s lower degree of
objectivity.
As the ICFR risk increases,
management will ordinarily adjust the
nature of the evidence that is obtained.
For example, management can increase
the evidence from on-going monitoring
activities by utilizing personnel who are
more objective and/or increasing the
extent of validation through periodic
direct testing of the underlying controls.
Management can also vary the evidence
obtained by adjusting the period of time
covered by direct testing. When ICFR
risk is assessed as high, the evidence
management obtains would ordinarily
consist of direct testing or on-going
monitoring activities performed by
individuals who have a higher degree of
objectivity. In situations where a
company’s on-going monitoring
activities utilize personnel who are not
adequately objective, the evidence
obtained would normally be
supplemented with direct testing by
those who are independent from the
operation of the control. In these
situations, direct testing of controls
corroborates evidence from on-going
monitoring activities as well as
evaluates the operation of the
underlying controls and whether they
continue to adequately address financial
reporting risks. When ICFR risk is
assessed as low, management may
conclude that evidence from on-going
monitoring is sufficient and that no
direct testing is required. Further,
management’s evaluation would
ordinarily consider evidence from a
reasonable period of time during the
year, including the fiscal year-end.
In smaller companies, management’s
daily interaction with its controls may
provide it with sufficient knowledge
about their operation to evaluate the
operation of ICFR. Knowledge from
daily interaction includes information
obtained by on-going direct involvement
with and direct supervision of the
execution of the control by those
responsible for the assessment of the
effectiveness of ICFR. Management
should consider its particular facts and
circumstances when determining
whether its daily interaction with
controls provides sufficient evidence to
evaluate the operating effectiveness of
ICFR. For example, daily interaction
may be sufficient when the operation of
controls is centralized and the number
of personnel involved is limited.
Conversely, daily interaction in
companies with multiple management
reporting layers or operating segments
would generally not provide sufficient
evidence because those responsible for
assessing the effectiveness of ICFR
would not ordinarily be sufficiently
PO 00000
Frm 00009
Fmt 4701
Sfmt 4700
35331
knowledgeable about the operation of
the controls. In these situations,
management would ordinarily utilize
direct testing or on-going monitoringtype evaluation procedures to obtain
reasonable support for the assessment.
Management evaluates the evidence it
gathers to determine whether the
operation of a control is effective. This
evaluation considers whether the
control operated as designed. It also
considers matters such as how the
control was applied, the consistency
with which it was applied, and whether
the person performing the control
possesses the necessary authority and
competence to perform the control
effectively. If management determines
that the operation of the control is not
effective, a deficiency exists that must
be evaluated to determine whether it is
a material weakness.
c. Evidential Matter To Support the
Assessment
Management’s assessment must be
supported by evidential matter that
provides reasonable support for its
assessment. The nature of the evidential
matter may vary based on the assessed
level of ICFR risk of the underlying
controls and other circumstances.
Reasonable support for an assessment
would include the basis for
management’s assessment, including
documentation of the methods and
procedures it utilizes to gather and
evaluate evidence.
The evidential matter may take many
forms and will vary depending on the
assessed level of ICFR risk for controls
over each of its financial reporting
elements. For example, management
may document its overall strategy in a
comprehensive memorandum that
establishes the evaluation approach, the
evaluation procedures, the basis for
management’s conclusion about the
effectiveness of controls related to the
financial reporting elements and the
entity-level and other pervasive
elements that are important to
management’s assessment of ICFR.
If management determines that the
evidential matter within the company’s
books and records is sufficient to
provide reasonable support for its
assessment, it may determine that it is
not necessary to separately maintain
copies of the evidence it evaluates. For
example, in smaller companies, where
management’s daily interaction with its
controls provides the basis for its
assessment, management may have
limited documentation created
specifically for the evaluation of ICFR.
However, in these instances,
management should consider whether
reasonable support for its assessment
E:\FR\FM\27JNR3.SGM
27JNR3
35332
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
rwilkins on PROD1PC63 with RULES3
would include documentation of how
its interaction provided it with
sufficient evidence. This documentation
might include memoranda, e-mails, and
instructions or directions to and from
management to company employees.
Further, in determining the nature of
supporting evidential matter,
management should also consider the
degree of complexity of the control, the
level of judgment required to operate
the control, and the risk of misstatement
in the financial reporting element that
could result in a material misstatement
of the financial statements. As these
factors increase, management may
determine that evidential matter
supporting the assessment should be
separately maintained. For example,
management may decide that separately
maintained documentation in certain
areas will assist the audit committee in
exercising its oversight of the company’s
financial reporting.
The evidential matter constituting
reasonable support for management’s
assessment would ordinarily include
documentation of how management
formed its conclusion about the
effectiveness of the company’s entitylevel and other pervasive elements of
ICFR that its applicable framework
describes as necessary for an effective
system of internal control.
3. Multiple Location Considerations
Management’s consideration of
financial reporting risks generally
includes all of its locations or business
units.45 Management may determine
that financial reporting risks are
adequately addressed by controls which
operate centrally, in which case the
evaluation approach is similar to that of
a business with a single location or
business unit. When the controls
necessary to address financial reporting
risks operate at more than one location
or business unit, management would
generally evaluate evidence of the
operation of the controls at the
individual locations or business units.
Management may determine that the
ICFR risk of the controls (as determined
through Section II.A.2.a) that operate at
individual locations or business units is
low. In such situations, management
may determine that evidence gathered
through self-assessment routines or
other on-going monitoring activities,
when combined with the evidence
derived from a centralized control that
monitors the results of operations at
individual locations, constitutes
45 Consistent with the guidance in Section II.A.1.,
management may determine when identifying
financial reporting risks that some locations are so
insignificant that no further evaluation procedures
are needed.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
sufficient evidence for the evaluation. In
other situations, management may
determine that, because of the
complexity or judgment in the operation
of the controls at the individual
location, the risk that controls will fail
to operate is high, and therefore more
evidence is needed about the effective
operation of the controls at the location.
Management should generally
consider the risk characteristics of the
controls for each financial reporting
element, rather than making a single
judgment for all controls at that location
when deciding whether the nature and
extent of evidence is sufficient. When
performing its evaluation of the risk
characteristics of the controls identified,
management should consider whether
there are location-specific risks that
might impact the risk that a control
might fail to operate effectively.
Additionally, there may be pervasive
risk factors that exist at a location that
cause all controls, or a majority of
controls, at that location to be
considered higher risk.
B. Reporting Considerations
1. Evaluation of Control Deficiencies
In order to determine whether a
control deficiency, or combination of
control deficiencies, is a material
weakness, management evaluates the
severity of each control deficiency that
comes to its attention. Control
deficiencies that are determined to be a
material weakness must be disclosed in
management’s annual report on its
assessment of the effectiveness of ICFR.
Control deficiencies that are considered
to be significant deficiencies are
reported to the company’s audit
committee and the external auditor
pursuant to management’s compliance
with the certification requirements in
Exchange Act Rule 13a–14.46
Management may not disclose that it
has assessed ICFR as effective if one or
more deficiencies in ICFR are
determined to be a material weakness.
As part of the evaluation of ICFR,
management considers whether each
deficiency, individually or in
46 Pursuant to Exchange Act Rules 13a–14 and
15d–14 [17 CFR 240.13a–14 and 240.15d–14],
management discloses to the auditors and to the
audit committee of the board of directors (or
persons fulfilling the equivalent function) all
material weaknesses and significant deficiencies in
the design or operation of internal controls which
could adversely affect the issuer’s ability to record,
process, summarize and report financial data. The
term ‘‘material weakness’’ is defined in the
Commission’s rules in Exchange Act Rule 12b–2
and Rule 1–02 of Regulation S–X. See Release No.
34–55928. The Commission is seeking additional
comment on the definition of the term ‘‘significant
deficiency’’ in the Commission’s rules in Exchange
Act Rule 12b–2 and Rule 1–02 of Regulation S–X.
See Release No. 34–55930.
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
combination, is a material weakness as
of the end of the fiscal year. Multiple
control deficiencies that affect the same
financial statement amount or
disclosure increase the likelihood of
misstatement and may, in combination,
constitute a material weakness if there
is a reasonable possibility 47 that a
material misstatement of the financial
statements would not be prevented or
detected in a timely manner, even
though such deficiencies may be
individually less severe than a material
weakness. Therefore, management
should evaluate individual control
deficiencies that affect the same
financial statement amount or
disclosure, or component of internal
control, to determine whether they
collectively result in a material
weakness.
The evaluation of the severity of a
control deficiency should include both
quantitative and qualitative factors.
Management evaluates the severity of a
deficiency in ICFR by considering
whether there is a reasonable possibility
that the company’s ICFR will fail to
prevent or detect a misstatement of a
financial statement amount or
disclosure; and the magnitude of the
potential misstatement resulting from
the deficiency or deficiencies. The
severity of a deficiency in ICFR does not
depend on whether a misstatement
actually has occurred but rather on
whether there is a reasonable possibility
that the company’s ICFR will fail to
prevent or detect a misstatement on a
timely basis.
Risk factors affect whether there is a
reasonable possibility 48 that a
deficiency, or a combination of
deficiencies, will result in a
misstatement of a financial statement
amount or disclosure. These factors
include, but are not limited to, the
following:
• The nature of the financial
reporting elements involved (for
example, suspense accounts and related
party transactions involve greater risk);
47 There is a reasonable possibility of an event
when the likelihood of the event is either
‘‘reasonably possible’’ or ‘‘probable’’ as those terms
are used in Financial Accounting Standards Board
Statement No. 5, Accounting for Contingencies. The
use of the phrase ‘‘reasonable possibility that a
material misstatement of the financial statements
would not be prevented or detected in a timely
manner’’ is intended solely to assist management in
identifying matters for disclosure under Item 308 of
Regulation S–K. It is not intended to interpret or
describe management’s responsibility under the
FCPA or modify a control framework’s definition of
what constitutes an effective system of internal
control.
48 The evaluation of whether a deficiency in ICFR
presents a reasonable possibility of misstatement
can be made without quantifying the probability of
occurrence as a specific percentage or range.
E:\FR\FM\27JNR3.SGM
27JNR3
rwilkins on PROD1PC63 with RULES3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
• The susceptibility of the related
asset or liability to loss or fraud (that is,
greater susceptibility increases risk);
• The subjectivity, complexity, or
extent of judgment required to
determine the amount involved (that is,
greater subjectivity, complexity, or
judgment, like that related to an
accounting estimate, increases risk);
• The interaction or relationship of
the control with other controls,
including whether they are
interdependent or redundant;
• The interaction of the deficiencies
(that is, when evaluating a combination
of two or more deficiencies, whether the
deficiencies could affect the same
financial statement amounts or
disclosures); and
• The possible future consequences of
the deficiency.
Factors that affect the magnitude of
the misstatement that might result from
a deficiency or deficiencies in ICFR
include, but are not limited to, the
following:
• The financial statement amounts or
total of transactions exposed to the
deficiency; and
• The volume of activity in the
account balance or class of transactions
exposed to the deficiency that has
occurred in the current period or that is
expected in future periods.
In evaluating the magnitude of the
potential misstatement, the maximum
amount that an account balance or total
of transactions can be overstated is
generally the recorded amount, while
understatements could be larger. Also,
in many cases, the probability of a small
misstatement will be greater than the
probability of a large misstatement.
Management should evaluate the
effect of compensating controls 49 when
determining whether a control
deficiency or combination of
deficiencies is a material weakness. To
have a mitigating effect, the
compensating control should operate at
a level of precision that would prevent
or detect a misstatement that could be
material.
In determining whether a deficiency
or a combination of deficiencies
represents a material weakness,
management considers all relevant
information. Management should
evaluate whether the following
situations indicate a deficiency in ICFR
exists and, if so, whether it represents
a material weakness:
49 Compensating controls are controls that serve
to accomplish the objective of another control that
did not function properly, helping to reduce risk to
an acceptable level.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
• Identification of fraud, whether or
not material, on the part of senior
management; 50
• Restatement of previously issued
financial statements to reflect the
correction of a material misstatement; 51
• Identification of a material
misstatement of the financial statements
in the current period in circumstances
that indicate the misstatement would
not have been detected by the
company’s ICFR; and
• Ineffective oversight of the
company’s external financial reporting
and internal control over financial
reporting by the company’s audit
committee.
When evaluating the severity of a
deficiency, or combination of
deficiencies, in ICFR, management also
should determine the level of detail and
degree of assurance that would satisfy
prudent officials in the conduct of their
own affairs that they have reasonable
assurance that transactions are recorded
as necessary to permit the preparation of
financial statements in conformity with
GAAP. If management determines that
the deficiency, or combination of
deficiencies, might prevent prudent
officials in the conduct of their own
affairs from concluding that they have
reasonable assurance that transactions
are recorded as necessary to permit the
preparation of financial statements in
conformity with GAAP, then
management should treat the deficiency,
or combination of deficiencies, as an
indicator of a material weakness.
2. Expression of Assessment of
Effectiveness of ICFR by Management
Management should clearly disclose
its assessment of the effectiveness of
ICFR and, therefore, should not qualify
its assessment by stating that the
company’s ICFR is effective subject to
certain qualifications or exceptions. For
example, management should not state
that the company’s controls and
procedures are effective except to the
extent that certain material weakness(es)
have been identified. In addition, if a
material weakness exists, management
may not state that the company’s ICFR
is effective. However, management may
state that controls are ineffective for
specific reasons.
50 For purposes of this indicator, the term ‘‘senior
management’’ includes the principal executive and
financial officers signing the company’s
certifications as required under Section 302 of
Sarbanes Oxley as well as any other members of
senior management who play a significant role in
the company’s financial reporting process.
51 See FAS 154, Accounting Changes and Error
Corrections, regarding correction of a misstatement.
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
35333
3. Disclosures About Material
Weaknesses
The Commission’s rule implementing
Section 404 was intended to bring
information about material weaknesses
in ICFR into public view. Because of the
significance of the disclosure
requirements surrounding material
weaknesses beyond specifically stating
that the material weaknesses exist,
companies should also consider
including the following in their
disclosures: 52
• The nature of any material
weakness,
• Its impact on the company’s
financial reporting and its ICFR, and
• Management’s current plans, if any,
or actions already undertaken, for
remediating the material weakness.
Disclosure of the existence of a
material weakness is important, but
there is other information that also may
be material and necessary to form an
overall picture that is not misleading.53
The goal underlying all disclosure in
this area is to provide an investor with
disclosure and analysis that goes
beyond describing the mere existence of
a material weakness. There are many
different types of material weaknesses
and many different factors that may be
important to the assessment of the
potential effect of any particular
material weakness. While management
is required to conclude and state in its
report that ICFR is ineffective when
there are one or more material
weaknesses, companies should also
consider providing disclosure that
allows investors to understand the cause
of the control deficiency and to assess
the potential impact of each particular
material weakness. This disclosure will
be more useful to investors if
management differentiates the potential
impact and importance to the financial
statements of the identified material
weaknesses, including distinguishing
those material weaknesses that may
have a pervasive impact on ICFR from
those material weaknesses that do not.
4. Impact of a Restatement of Previously
Issued Financial Statements on
Management’s Report on ICFR
Item 308 of Regulation S–K requires
disclosure of management’s assessment
of the effectiveness of the company’s
ICFR as of the end of the company’s
most recent fiscal year. When a material
misstatement of previously issued
52 Significant deficiencies in ICFR are not
required to be disclosed in management’s annual
report on its evaluation of ICFR required by Item
308(a).
53 See Exchange Act Rule 12b–20 [17 CFR
240.12b–20].
E:\FR\FM\27JNR3.SGM
27JNR3
35334
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
financial statements is discovered, a
company is required to restate those
financial statements. However, the
restatement of financial statements does
not, by itself, necessitate that
management consider the effect of the
restatement on the company’s prior
conclusion related to the effectiveness
of ICFR.
While there is no requirement for
management to reassess or revise its
conclusion related to the effectiveness
of ICFR, management should consider
whether its original disclosures are still
appropriate and should modify or
supplement its original disclosure to
include any other material information
that is necessary for such disclosures
not to be misleading in light of the
restatement. The company should also
disclose any material changes to ICFR,
as required by Item 308(c) of Regulation
S–K.
Similarly, while there is no
requirement that management reassess
or revise its conclusion related to the
effectiveness of its disclosure controls
and procedures, management should
consider whether its original disclosures
regarding effectiveness of disclosure
controls and procedures need to be
modified or supplemented to include
any other material information that is
necessary for such disclosures not to be
misleading. With respect to the
disclosures concerning ICFR and
disclosure controls and procedures, the
company may need to disclose in this
context what impact, if any, the
restatement has on its original
conclusions regarding effectiveness of
ICFR and disclosure controls and
procedures.
rwilkins on PROD1PC63 with RULES3
5. Inability To Assess Certain Aspects of
ICFR
In certain circumstances, management
may encounter difficulty in assessing
certain aspects of its ICFR. For example,
management may outsource a
significant process to a service
organization and determine that
evidence of the operating effectiveness
of the controls over that process is
necessary. However, the service
organization may be unwilling to
provide either a Type 2 SAS 70 report
or to provide management access to the
controls in place at the service
organization so that management could
assess effectiveness.54 Finally,
54 AU Sec. 324, Service Organizations (as adopted
on an interim basis by the Public Company
Accounting Oversight Board (‘‘PCAOB’’) in PCAOB
Rule 3200T), defines a report on controls placed in
operation and test of operating effectiveness,
commonly referred to as a ‘‘Type 2 SAS 70 report.’’
This report is a service auditor’s report on a service
organization’s description of the controls that may
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
management may not have
compensating controls in place that
allow a determination of the
effectiveness of the controls over the
process in an alternative manner. The
Commission’s disclosure requirements
state that management’s annual report
on ICFR must include a statement as to
whether or not ICFR is effective and do
not permit management to issue a report
on ICFR with a scope limitation.55
Therefore, management must determine
whether the inability to assess controls
over a particular process is significant
enough to conclude in its report that
ICFR is not effective.
III. Discussion of Comments on the
Proposing Release
The Proposing Release proposed for
public comment interpretive guidance
for management regarding the annual
evaluation of ICFR required by Rules
13a-15(c) and 15d-15(c) under the
Exchange Act. We received letters from
211 commenters in response to the
Proposing Release.56 The majority of
commenters were supportive of the
Commission’s efforts in developing this
Interpretive Guidance. We have
reviewed and considered all of the
comments received on the proposal, and
we discuss our conclusions with respect
to the comments in more detail in the
following sections.
A. Alignment between Management’s
Evaluation and Assessment and the
External Audit
Commenters expressed concern that
confusion and inefficiencies may arise
from differences between the proposed
guidance for management’s evaluation
of ICFR and the PCAOB’s proposed
be relevant to a user organization’s internal control
as it relates to an audit of financial statements, on
whether such controls were suitably designed to
achieve specified control objectives, on whether
they had been placed in operation as of a specific
date, and on whether the controls that were tested
were operating with sufficient effectiveness to
provide reasonable, but not absolute, assurance that
the related control objectives were achieved during
the period specified.
55 See Item 308(a)(3) of Regulations S–K and S–
B [17 CFR 229.308(a)(3) and 228.308(a)(3)].
56 Of the 211 commenters, 43 were issuers, 33
professional associations and business groups, 19
foreign private issuers and foreign professional
associations, 10 investor advocacy and other similar
groups, 8 major accounting firms, 11 smaller
accounting firms and Section 404 service providers,
8 banks and banking associations, 4 law firms and
law associations, and 75 other interested parties
including students, academics, and other
individuals. The comment letters are available for
inspection in the Commission’s Public Reference
Room at 100 F Street, NE., Washington, DC 20549
in File No. S7–24–06, or may be viewed at
https://www.sec.gov/comments/s7–24–06/
s72406.shtml.
PO 00000
Frm 00012
Fmt 4701
Sfmt 4700
auditing standard for ICFR.57
Commenters cited a lack of alignment
between the two with regard to the
terminology and definitions used 58 as
well as differences in the overall
approach. Some commenters that were
supportive of the principles-based
approach to the proposed interpretive
guidance expressed concern that
improvements in the efficiency of
management’s evaluation of ICFR would
be limited by what they viewed as
comparatively more prescriptive
guidance for external auditors in the
Proposed Auditing Standard.59 Other
commenters suggested that maximizing
their auditor’s ability to rely on the
work performed in management’s
evaluation would require aligning the
evaluation approach for management
with the Proposed Auditing Standard.60
Even so, some of these commenters still
viewed the interpretive guidance as an
improvement because it provides
management the ability to choose
whether, and to what extent, it should
align its evaluation with the auditing
standard; whereas commenters said that
management feels compelled to align
with the auditing standard under the
current rules. Other commenters
suggested that the proposed interpretive
guidance was compatible with the
Proposed Auditing Standard and that
improvements in implementation could
be attained with close coordination
between management and auditors.61
In response to the comment letters,
we have revised our proposal to more
closely align it with how we anticipate
the PCAOB will revise its proposed
auditing standard. For example, the
57 In PCAOB Release No. 2006–007 the PCAOB
proposed for public comment An Audit of Internal
Control Over Financial Reporting That Is Integrated
With An Audit of Financial Statements and
Considering and Using the Work of Others in an
Audit. See https://www.pcaobus.org/Rules/
Docket_021/2006–12–19_Release_No._2006–007.pdf
(hereinafter ‘‘Proposed Auditing Standard’’).
58 See, for example, letters from American Bar
Association’s Committees on Federal Regulation of
Securities and Law and Accounting of the Section
of Business Law (ABA), Association of Chartered
Certified Accountants (ACCA), Edison Electric
Institute (EEI), European Federation of Accountants
(FEE), Financial Executives International
Committee on Corporate Reporting (FEI CCR), Frank
Gorrell (F. Gorrell), Society of Corporate Secretaries
and Governance Professionals, and The Institute of
Chartered Accountants in England and Wales
(ICAEW).
59 See, for example, letters from Eli Lilly and
Company (Eli Lilly), FEI CCR, Hutchinson
Technology Inc. (Hutchinson), Independent
Community Bankers of America (ICBA), MetLife
Inc. (MetLife), Procter & Gamble Company (P&G),
and Supervalu Inc. (Supervalu).
60 See, for example, letters from Heritage
Financial Corporation and Southern Company.
61 See, for example, letters from BDO Seidman
LLP (BDO), McGladrey & Pullen LLP (M&P), and
PricewaterhouseCoopers LLP (PwC).
E:\FR\FM\27JNR3.SGM
27JNR3
rwilkins on PROD1PC63 with RULES3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
definition of a material weakness and
the related guidance for evaluating
deficiencies, including indicators of a
material weakness, have been revised.62
In addition, alignment revisions were
made to the guidance for evaluating
whether controls adequately address
financial reporting risks, including
entity-level controls, the factors to
consider when identifying financial
reporting risks and the factors for
assessing the risk associated with
individual financial reporting elements
and controls.
However, some differences between
our final interpretive guidance for
management and the PCAOB’s audit
standard remain. These differences are
not necessarily contradictions or
misalignment; rather they reflect the fact
that management and the auditor have
different roles and responsibilities with
respect to evaluating and auditing ICFR.
Management is responsible for
designing and maintaining ICFR and
performing an evaluation annually that
provides it with a reasonable basis for
its assessment as to whether ICFR is
effective as of fiscal year-end.
Management’s daily involvement with
its internal control system provides it
with knowledge and information that
may influence its judgments about how
best to conduct the evaluation and the
sufficiency of evidence it needs to
assess the effectiveness of ICFR. In
contrast, the auditor is responsible for
conducting an independent audit that
includes appropriate professional
skepticism. Moreover, the audit of ICFR
is integrated with the audit of the
company’s financial statements. While
there is a close relationship between the
work performed by management and its
auditor, the ICFR audit will not
necessarily be limited to the nature and
extent of procedures management has
already performed as part of its
evaluation of ICFR. There will be
differences in the approaches used by
management and the auditor because
the auditor does not have the same
information and understanding as
management and because the auditor
will need to integrate its tests of ICFR
with the financial statement audit. We
agree with those commenters that
suggested coordination between
management and auditors on their
respective efforts will ensure that both
the evaluation by management and the
independent audit are completed in an
efficient and effective manner.
62 The revisions made to the proposed definition
of material weakness and the related guidance,
including the strong indicators, are discussed in
Section III.F. of this document.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
B. Principles-based Nature of Guidance
for Conducting the Evaluation
The guidance is intended to assist
management in complying with two
broad principles: (1) Evaluate whether
controls have been implemented to
adequately address the risk that a
material misstatement of the financial
statements would not be prevented or
detected in a timely manner and (2)
evaluate evidence about the operation of
controls based on an assessment of risk.
We believe the guidance will enable
companies of all sizes and complexities
to comply with our rules effectively and
efficiently.
Commenters expressed support for
the proposed guidance’s principlesbased approach.63 However, some
requested that the proposal be revised to
include additional guidance and
illustrative examples in the following
areas: 64
• The identification of controls that
address financial reporting risks; 65
• The assessment of ICFR risk,
including how evidence gained over
prior periods should impact
management’s assessment of risks
associated with controls identified and
therefore, the evidence needed to
support its assessment; 66
• How varying levels of risk impact
the nature of the evidence necessary to
support its assessment; 67
• When on-going monitoring
activities, including self-assessments,
could be used to support management’s
assessment and reduce direct testing; 68
• Sampling techniques, sample sizes,
and testing methods; 69
• The type and manner in which
supporting evidence should be
63 See, for example, letters from ACE Limited
(ACE), American Electric Power Company, Inc.
(AEP), Business Roundtable (BR), Canadian Bankers
Association, Center for Audit Quality (Center),
Ernst & Young LLP (EY), Grant Thornton LLP (GT),
ING Groep N.V. (ING), Manulife Financial
(Manulife), PwC, P&G, and Reznick Group, P.C.
(Reznick).
64 See, for example, letters from Brown-Forman,
Ford Motor Company, MasterCard Incorporated
(MasterCard), Northrop Grumman Corporation,
Supervalu, UFP Technologies (UFP), and
UnumProvident Corporation (UnumProvident).
65 See, for example, letter from Nina Stofberg (N.
Stofberg).
66 See, for example, letters from ISACA and IT
Governance Institute (ISACA), Manulife, and Ohio
Society of Certified Public Accountants (Ohio).
67 See, for example, letters from Cardinal Health,
Inc. (Cardinal), Cleary Gottlieb Steen & Hamilton
LLP (Cleary), and ISACA.
68 See, for example, letters from BASF
Aktiengesellschaft (BASF), Cardinal, Computer
Sciences Corporation (CSC), ING, ISACA, Ohio, PPL
Corporation (PPL), R. Malcolm Schwartz, N.
Stofberg, and UnumProvident.
69 See, for example, letters from BDO, National
Association of Real Estate Investment Trusts,
Reznick, and UFP.
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
35335
maintained; 70 including specific
guidelines regarding the amount, form
and medium of evidence; 71 and
• How management should document
the effectiveness of monitoring activities
utilized to support its assessment, as
well as how management should
support the evidence obtained from its
daily interaction with controls as part of
its assessment.72
We have considered the requests for
additional guidance and decided to
retain the principles-based nature of the
proposed guidance. We believe an
evaluation of ICFR will be most effective
and efficient when management makes
use of all available facts and information
to make reasonable judgments about the
evaluation methods and procedures that
are necessary to have a reasonable basis
for the assessment of the effectiveness of
ICFR and the evidential matter
maintained in support of the
assessment. Additional guidance and
examples in the areas requested would
likely have the negative consequence of
establishing ‘‘bright line’’ or ‘‘one-size
fits all’’ evaluation approaches. Such an
outcome would be contrary to our view
that the evaluations must be tailored to
a company’s individual facts and
circumstances to be both effective and
efficient. Moreover, an evaluation by
management that is focused on
compliance with detailed guidance,
rather than the risks to the reliability of
its financial reporting, would likely lead
to evaluations that are inefficient,
ineffective or both.
Detailed guidance and examples from
the Commission may also limit or
hinder the natural evolution and further
development of control frameworks and
evaluation methodologies as technology,
control systems, and financial reporting
evolve. As we have previously stated,
the Commission supports and
encourages the further development of
control frameworks and related
implementation guidance. For example,
the July 2006 small business guidance
issued by COSO addresses the
identification of financial reporting risks
and the related controls. Additionally,
we note that COSO is currently working
on a project to further define how the
effectiveness of control systems can be
monitored.73 As such, companies may
70 See, for example, letters from AEP, BDO,
Center, EEI, Frank Consulting, PLLP (Frank), The
Hundred Group of Finance Directors (100 Group),
Institut Der Wirtschaftsprufer [Institute of Public
Auditors in Germany] (IDW), Managed Funds
Association (MFA), Nasdaq Stock Market, Inc.
(Nasdaq), Ohio, N. Stofberg, and UFP.
71 See, for example, letter from Nasdaq.
72 See, for example, letters from BDO and Center.
73 In a press release on January 8, 2007, COSO
announced that Grant Thornton LLP had been
E:\FR\FM\27JNR3.SGM
Continued
27JNR3
35336
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
find that there are other sources for the
additional guidance in the areas they are
seeking.
Commenters also expressed the view
that companies may abuse the flexibility
afforded by the proposed principlesbased guidance to perform inadequate
evaluations, thereby undermining the
intended investor protection benefits.74
Other commenters have observed that
material weakness disclosures to
investors are too often simultaneous
with, rather than in advance of, the
restatement of financial statements,
which undermines the usefulness of the
disclosures.75 In response to these
comments, we note that this principlesbased guidance enables management to
tailor its evaluation so that it focuses on
those areas of financial reporting that
pose the highest risk to reliable financial
reporting. We believe that a tailored
evaluation approach that focuses
resources on areas of highest risk will
improve, rather than degrade, the
effectiveness of many company’s
evaluations and improve the timeliness
of material weakness disclosures to
investors.
rwilkins on PROD1PC63 with RULES3
C. Scalability and Small Business
Considerations
Commenters believed that the
proposed interpretive guidance can be
scaled to companies of all sizes and will
benefit smaller public companies in
completing their assessments.76
However, some commenters requested
more guidance to enable them to
conduct the evaluation in an effective
and efficient manner. For example,
commenters requested more guidance
on how some of the unique
characteristics of smaller companies,
including a lack of segregation of duties,
should be considered in the
evaluation.77
commissioned to develop guidance to help
organizations monitor the quality of their internal
control systems. According to that press release, the
guidance will serve as a tool for effectively
monitoring internal controls while complying with
Sarbanes-Oxley. The press release is available at
https://www.coso.org/Publications/COSO%
20Monitoring%20GT%20Final%20Release_
1.8.07.pdf.
74 See, for example, letters from Joseph V.
Carcello, Consumer Federation of America,
Consumer Action, U.S. Public Interest Research
Group (CFA), and Moody’s Investors Service
(Moody’s).
75 See, for example, letters from CFA and
Moody’s.
76 See, for example, letters from American
Bankers Association (American Bankers), Anthony
S. Chan, Chandler (U.S.A.), Inc. (Chandler), CNB
Corporation & Citizens National Bank of Cheboygan
(CNB), Financial Services Forum, GT, Greater
Boston Chamber of Commerce, Minn-Dak Farmers
Cooperative (MDFC), RAM Energy Resources, Inc.,
and San Jose Water Company.
77 See, for example, letters from American
Electronics Association (AeA), EY, Financial
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
Other commenters, mostly comprised
of investor groups, requested that the
guidance emphasize that scaled or
tailored evaluation methods and
procedures for smaller public
companies should be based on both the
size and complexity of the business and
do not imply less rigorous evaluation
methods and procedures.78
Some commenters indicated that
smaller public companies should
continue to be exempt at least until a
thorough examination is conducted of
both the Interpretive Guidance and the
new Auditing Standard to ensure that
smaller companies are not
disproportionately burdened.79 Some
commenters requested that the SEC
further delay the implementation for
one additional year 80 or continued to
call for a complete exemption from
Section 404 for smaller public
companies.81 Other commenters
requested that smaller public companies
not be exempted.82
We believe the principles-based
guidance permits flexible and scalable
evaluation approaches that will enable
management of smaller public
companies to evaluate and assess the
effectiveness of ICFR without undue
cost burdens. The guidance recognizes
that internal control systems and the
methods and procedures necessary to
evaluate their effectiveness may be
different in smaller public companies
than in larger companies. However, the
flexibility provided in the guidance is
not meant to imply that evaluations for
smaller public companies be conducted
with less rigor, or to provide anything
Executives International Small Public Company
Task Force (FEI SPCTF), Frank, Institute of
Management Accountants (IMA), MFA, U.S.
Chamber of Commerce (Chamber), and U.S. Small
Business Administration’s Office of Advocacy
(SBA).
78 See, for example, letters from California Public
Employees’ Retirement System (CalPERS), CFA,
Council of Institutional Investors, Ethics Resource
Center, International Brotherhood of Teamsters, and
Pension Reserves Investment Management Board
(PRIMB).
79 See, for example, letters from AeA,
Biotechnology Industry Organization, Committee on
Capital Markets Regulation (CCMR), Financial
Reporting Committee of the Association of the Bar
of the City of New York (NYC Bar), International
Association of Small Broker Dealers and Advisers,
National Venture Capital Association, SBA, Silicon
Valley Leadership Group (SVLG), Small Business
Entrepreneurship Council, TechNet, and
Telecommunications Industry Association.
80 See, for example, letters from American
Bankers, America’s Community Bankers, Chandler,
CNB, FEI SPCTF, F. Gorrell, ICBA, MFA, and
Washington Legal Foundation (WLF).
81 See, for example, letters from American Stock
Exchange, ICBA, UFP, and WLF.
82 See, for example, letters from American
Federation of Labor and Congress of Industrial
Organizations (AFL-CIO), CalPERS, Frank, F.
Gorrell, PRIMB, and WithumSmith+Brown Global
Assurance, LLC.
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
less than reasonable assurance as to the
effectiveness of ICFR at such companies.
Rather, smaller public companies
should utilize the flexibility provided in
the guidance to cost-effectively tailor
and scale their methods and approaches
for identifying and documenting
financial reporting risks and the related
controls and for evaluating whether
operation of controls is effective (for
example, by utilizing evidence gathered
through management’s daily interaction
with its controls), so that they provide
the evidence needed to assess whether
ICFR is effective.
In addition, as previously mentioned,
companies may find that there are other
sources for guidance, such as the July
2006 guidance for applying the COSO
framework to smaller public companies.
We believe our guidance, when used in
conjunction with other such guidance,
will enable smaller public companies to
have a better understanding of the
requirements of a control framework, its
role in effective internal control systems
and the relationship to our evaluation
and disclosure requirements. This
should enable management to plan and
conduct its evaluation in an effective
and efficient manner.
The Commission believes that
compliance with the ICFR evaluation
and assessment requirements by smaller
public companies will further the
primary goal of Sarbanes-Oxley which is
to enhance the quality of financial
reporting and increase investor
confidence in the fairness and integrity
of the securities markets. We note that
all financial statements filed with the
Commission, even those by smaller
public companies, result from a system
of internal controls. Such systems are
required by the FCPA to operate at a
level that provides ‘‘reasonable
assurance’’ about the reliability of
financial reporting. Our rules
implementing Section 404 direct
management of all companies to
evaluate and assess whether the
company’s system of internal controls is
effective at achieving reasonable
assurance. Our guidance is intended to
help them do so in a cost-effective
manner. Given the principles-based
nature of our guidance and the
flexibility it provides, we do not believe
further postponement of the evaluation
requirements are needed for smaller
companies. We believe that the timing
of the issuance of the Interpretive
Guidance is adequate to allow for its
effective implementation in 2007
evaluations.
E:\FR\FM\27JNR3.SGM
27JNR3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
D. Identifying Financial Reporting Risks
and Controls
rwilkins on PROD1PC63 with RULES3
1. Summary of the Proposal
The proposal directed management to
consider the sources and potential
likelihood of misstatements, including
those arising from fraudulent activity,
and identify those that could result in
a material misstatement of the financial
statements (that is, financial reporting
risks). The proposal indicated that
management’s consideration of the risk
of misstatement generally includes all of
its locations or business units and that
the methods and procedures for
identifying financial reporting risks will
vary based on the characteristics of the
individual company. The proposal
discussed factors for management to
consider in selecting methods and
procedures for evaluating financial
reporting risks and in identifying the
sources and potential likelihood of
misstatement.
The proposal directed management to
evaluate whether controls were placed
in operation to adequately address the
financial reporting risks it identifies.
The proposal indicated that controls
were not adequate when their design
was such that there was a reasonable
possibility that a misstatement in a
financial reporting element that could
result in a material misstatement of the
financial statements would not be
prevented or detected in a timely
manner. The proposal discussed the fact
that some controls may be automated or
may depend upon IT functionality. In
these situations, the proposal stated that
management’s evaluation should
consider not only the design and
operation of the automated or IT
dependent controls, but also the aspects
of IT general controls necessary to
adequately address financial reporting
risks.
The proposal also indicated that
entity-level controls should be
considered when identifying financial
reporting risks and related controls for
a financial reporting element. The
proposal discussed the nature of entitylevel controls, how they relate to a
financial reporting element and the
need to consider whether they would
prevent or detect material
misstatements. If a financial reporting
risk for a financial reporting element is
adequately addressed by an entity-level
control, the proposal indicated that no
further controls needed to be identified
and tested by management for purposes
of the evaluation of ICFR.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
2. Comments on the Proposal and
Revisions Made
The Commission received a number
of comments on the proposed guidance
for identifying financial reporting risks
and controls. As discussed in Section
III.B above, many of these commenters
requested more examples or more
detailed guidance. Other comments
received related to the identification of
fraud risks and related controls; entitylevel controls; and IT general controls.
Identification of Fraud Risks and
Related Controls
Commenters suggested the guidance
be revised to more strongly emphasize
management’s responsibility to identify
and evaluate fraud risks and the related
controls that address those risks.83
Commenters also discussed the nature
of fraud risks that most often lead to
materially misstated financial
statements and requested additional
guidance regarding which fraud related
controls are within the scope of the
evaluation; 84 whether management can
consider the risk of fraud through the
overall risk assessment or if a specific
fraud threat analysis is required; 85 and
examples of the types of fraud that
should be considered.86 Other
commenters noted that there is existing
guidance for management, beyond what
was referenced in the proposal, for
assessing fraud risks and the related
controls. These commenters suggested
that the proposal be revised to directly
incorporate the most relevant elements
of such guidance.87
In response to the comments, the
proposal was revised to clarify that
fraud risks are expected to exist at every
company and that the nature and extent
of the fraud risk assessment activities
should be commensurate with the size
and complexity of the company.
Additionally, we expanded the
references to existing guidance to
include the AICPA’s 2005 Management
Override of Internal Controls: The
Achilles’ Heel of Fraud Prevention and
COSO’s July 2006 Guidance for Smaller
Public Companies. Given the
availability of existing information and
guidance on fraud and consistent with
the principles-based nature of the
83 See, for example, letters from ACE, ACCA,
BDO, Center, CSC, Deloitte & Touche LLP (Deloitte),
GT, IMA, KPMG LLP (KPMG), M&P, Moody’s, and
PwC.
84 See, for example, letters from BASF, BDO, and
GT.
85 See, for example, letter from Tatum LLC
(Tatum).
86 See, for example, letters from FEI CCR, P&G,
and N. Stofberg.
87 See, for example, letters from Center, GT,
KPMG, and M&P.
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
35337
interpretive guidance, we determined
that it was unnecessary to provide a list
of fraud risks expected to be present at
every company or a list of the areas of
financial reporting expected to have a
risk of material misstatement due to
fraud. Moreover, providing such a list
may result in a ‘‘checklist’’ type
approach to fraud risk assessments that
would likely be ineffective as financial
reporting changes over time, or given
the wide variety of facts and
circumstances that exist in different
companies and industries. While
management may find such checklists a
useful starting point, effective fraud risk
assessments will require sound and
thoughtful judgments that reflect a
company’s individual facts and
circumstances.
Entity-Level Controls
Commenters requested further
clarification of how entity-level controls
can address financial reporting risks in
a top-down, risk based approach.88
Commenters also suggested that the
guidance place more emphasis on
entity-level controls given their
pervasive impact on all other aspects of
ICFR.89
In response to the comments received,
we expanded the discussion of entitylevel controls and how they relate to
financial reporting elements. This
discussion further clarifies that some
entity-level controls, such as controls
within the control environment, have an
important, but indirect, effect on the
likelihood that a misstatement will be
prevented or detected on a timely basis.
While these controls might affect the
other controls management determines
are necessary to address financial
reporting risks for a financial reporting
element, it is unlikely management will
identify only this type of entity-level
control as adequately addressing a
financial reporting risk. Further, the
guidance clarifies that some entity-level
controls may be designed to identify
possible breakdowns in lower-level
controls, but not in a manner that
would, by themselves, adequately
address financial reporting risks. In
these cases, management would identify
the additional controls needed to
adequately address financial reporting
risks, which may include those that
operate at the transaction or account
balance level. Consistent with the
proposal, management does not need to
identify or evaluate additional controls
relating to a financial reporting risk if it
88 See, for example, letters from EY, Frank,
MetLife, and UnumProvident.
89 See, for example, letters from ACCA, ACE, Eli
Lilly, European Association of Listed Companies
(EALIC), and PwC.
E:\FR\FM\27JNR3.SGM
27JNR3
35338
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
determines that the risk is being
adequately addressed by an entity-level
control.
We have also revised the proposed
guidance to further clarify that the
controls management identifies in
Section II.A.1 should include the entitylevel and pervasive elements of its ICFR
that are necessary to have a system of
internal control that provides reasonable
assurance as to the reliability of
financial reporting. Management can
use the existing control frameworks and
related guidance to assist them in
evaluating the adequacy of these aspects
of their ICFR.
Information Technology General
Controls
rwilkins on PROD1PC63 with RULES3
Commenters expressed concern that
the proposal’s guidance on IT general
controls was too vague or that it lacked
sufficient clarity 90 and requested
further guidance and illustrative
examples 91 to clarify the extent to
which IT general controls are within the
scope of the ICFR evaluation.92
Commenters also suggested that the
Commission directly incorporate the
May 16, 2005 Staff Guidance 93 on IT
general controls 94 and that we clarify
that IT general controls alone, without
consideration of application controls,
will not sufficiently address the risk of
material misstatement.95 One
commenter noted that providing such
guidance could have the unintended
consequence of setting a precedent for
providing more detailed guidance in
other areas of the evaluation.96
Commenters also suggested that we
revise the proposal to clarify how a topdown approach considers IT general
controls,97 that we encourage a
‘‘benchmarking’’ approach for
evaluating automated controls,98 and
that we permit companies who
implement IT systems late in the year to
do so while still being able to satisfy
their ICFR responsibilities.99
90 See, for example, letters from Aerospace
Industries Association, MasterCard, and Nasdaq.
91 See, for example, letter from Microsoft
Corporation (MSFT).
92 See, for example, letters from Faisal Danka,
ISACA, MSFT, Rod Scott, and The Travelers
Companies, Inc. (Travelers).
93 Division of Corporation Finance and Office of
the Chief Accountant: Staff Statement on
Management’s Report on Internal Control Financial
Reporting (May 16, 2005), available at https://
www.sec.gov/spotlight/soxcom/.htm.
94 See, for example, letters from FEI CCR and
P&G.
95 See, for example, letter from IDW.
96 See, for example, letter from ICAEW.
97 See, for example, letters from Cardinal and
ISACA.
98 See, for example, letter from CSC.
99 See, for example, letter from Chamber.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
We made several revisions to the
proposed guidance based on the
comment letters. We revised the
proposal to explain that the
identification of risks and controls
within IT should be integral to, and not
separate from, management’s top-down,
risk-based approach to evaluating ICFR
and in determining the necessary
supporting evidential matter. We
clarified that controls which address
financial reporting risks may be
automated, dependent upon IT
functionality, or require a combination
of both manual and automated
procedures and that IT general controls
alone, without consideration of
application controls, ordinarily do not
adequately address financial reporting
risks. We also incorporated guidance
from the May 16, 2005 Staff Statement
which explains that it is unnecessary to
evaluate IT general controls that
primarily pertain to efficiency or
effectiveness of operations, but which
are not relevant to addressing financial
reporting risks.
We have declined to further specify
categories or areas of IT general controls
that will be relevant to the ICFR
evaluation for all companies. We
continue to believe that such
determinations require consideration of
each company’s individual facts and
circumstances. Moreover, we have
concluded it is not necessary to include
a discussion of a ‘‘benchmarking’’
approach to evaluating automated
controls. The lack of such discussion in
our guidance does not preclude
management from taking such an
approach if they believe it to be both
efficient and effective.
Additionally, we did not revise the
proposed guidance to discuss
implementation of IT systems, or
changes thereto, late in the year because
we do not believe such decisions should
be impacted by the requirement to
evaluate and assess the effectiveness of
ICFR. Even without the evaluation and
assessment requirements, the
implementation of an IT system late in
the year does not change management’s
responsibility to maintain a system of
internal control that provides reasonable
assurance regarding the reliability of
financial reporting. Allowing an
exclusion from the evaluation for
controls placed in operation late in the
year could have the unintended
consequence of negatively impacting the
reliability of financial reporting.
Management has the ability to mitigate
the risk of material misstatement that
arises from ineffective controls in a new
IT system. For example, management
may perform pre-implementation testing
of the IT controls needed to adequately
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
address financial reporting risks.
Additionally, management may
implement compensating controls, such
as manual reconciliations and
verification, until such time that
management has concluded that the IT
controls within the system are adequate.
Accordingly, we do not believe it is
necessary or appropriate to exclude new
IT systems or changes to existing
systems from the scope of the evaluation
of ICFR.
E. Evaluating Evidence of the Operating
Effectiveness of ICFR
1. Summary of the Proposal
Our proposal indicated that
management should consider both the
risk characteristics of the financial
reporting elements to which the controls
relate and the risk characteristics of the
controls themselves (collectively, ICFR
risk) in making judgments about the
nature and extent of evidence necessary
to provide a reasonable basis for the
assessment of whether the operation of
controls is effective. The proposal
identified significant accounting
estimates, related party transactions and
critical accounting policies as examples
of financial reporting areas that
generally would be assessed as having a
higher risk of misstatement and control
failure. However, the proposed guidance
recognizes that since not all controls
have the same risk characteristics, when
a combination of controls is required to
adequately address the risks to a
financial reporting element,
management should analyze the risk
characteristics of each control
separately. Further, under the proposed
guidance, when evaluating risks in
multi-location environments,
management should generally consider
the risk characteristics of the controls
related to each financial reporting
element, rather than making a single
judgment for all controls at a particular
location when determining the
sufficiency of evidence to support its
assessment.
Our proposal indicated that the
evidence of the operation of controls
that management evaluates may come
from a combination of on-going
monitoring and direct testing and that
management should vary the nature,
timing and extent of these based on its
assessment of the ICFR risk. Our
proposal stated that this evidence would
ordinarily cover a reasonable period of
time during the year and include the
fiscal year-end. The proposal also
acknowledged that, in smaller
companies, those responsible for
assessing the effectiveness of ICFR may,
through their on-going direct knowledge
E:\FR\FM\27JNR3.SGM
27JNR3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
and supervision of the operation of
controls (that is, daily interaction) have
a reasonable basis to evaluate the
effectiveness of some controls without
performing direct tests specifically for
purposes of the evaluation.
The proposal explained that the
evidential matter constituting
reasonable support for the assessment
would generally include the basis for
management’s assessment and
documentation of the evaluation
methods and procedures for gathering
and evaluating evidence. Additionally,
the proposal indicated that the nature of
the supporting evidential matter,
including documentation, may take
many forms and may vary based on
management’s assessment of ICFR risk.
For example, management may
determine that it is not necessary to
maintain separate copies of the evidence
evaluated if such evidence already
exists in the company’s books and
records. The proposal also indicates that
as the degree of complexity of the
control, the level of judgment required
to operate the control, and the risk of
misstatement in the financial reporting
element increase, management may
determine that separate evidential
matter supporting a control’s operation
should be maintained.
rwilkins on PROD1PC63 with RULES3
2. Comments on the Proposal and
Revisions Made
The Commission received a number
of comments on the proposed guidance
for evaluating whether the operation of
controls was effective. As discussed in
Section III.B above, many of these
commenters requested more examples
or more detailed guidance. Other
comments received related to the
appropriateness of various ‘‘rotational’’
approaches to evaluating evidence of
whether the operation of controls was
effective; the nature of on-going
monitoring activities, including selfassessments and daily interaction; the
time period to be covered by evaluation
procedures; and supporting evidential
matter.
Rotational Approaches to Evaluating
Evidence
Commenters requested that the
guidance explicitly allow management
to rotate its evaluation of evidence of
the operation of controls and a variety
of different approaches for doing so
were suggested. These approaches
included, for example, a rotational
approach for lower risk controls,100 a
rotational approach in areas where
management determines there are no
100 See, for example, letters from CSC, EALIC,
ING, MasterCard, and NYC Bar.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
changes in the controls since the
previous assessment,101 or a rotational
approach where there is both lower risk
and no changes in controls.102 In
addition, some suggested a
‘‘benchmarking’’ approach, similar to
that used for IT controls, be allowed for
non-IT controls.103 Other commenters
agreed with the proposal’s requirement
that management consider evidence of
the operation of controls each year.104
Others noted that while they believed it
is appropriate for management to
consider the results of its prior year
assessments, the guidance should make
it clear that the evaluation of operating
effectiveness is an annual
requirement.105
Other commenters raised the issue of
a rotational approach specific to multilocation considerations. For example,
commenters suggested that the guidance
allow for rotation of locations based
upon risk (for example, once every three
years).106 However, some commenters
suggested that the risk-based approach
provided in the proposed guidance
would appropriately allow companies to
vary testing in locations based more on
risk than coverage, which would
improve the efficiency of their
assessment.107
After considering the comments, the
Commission has retained the guidance
substantially as proposed. We did not
introduce a concept that allows
management to eliminate from its
annual evaluation those controls that
are necessary to adequately address
financial reporting risks. For example,
management cannot decide to include
controls for a particular location or
process within the scope of its
evaluation only once every three years
or exclude controls from the scope of its
evaluation based on prior year
evaluation results. To have a reasonable
basis for its assessment of the
effectiveness of ICFR, management must
have sufficient evidence supporting the
operating effectiveness of all aspects of
its ICFR as of the date of its assessment.
The guidance provides a framework to
assist management in making judgments
regarding the nature, timing and extent
of evidence needed to support its
101 See, for example, letters from P&G and
Travelers.
102 See, for example, letters from EEI and
Supervalu.
103 See, for example, letters from Eli Lilly and FEI
CCR.
104 See, for example, letters from CCMR, Deloitte,
and KPMG.
105 See, for example, letters from AFL-CIO,
Center, CFA, Deloitte, and PwC.
106 See, for example, letter from CSC.
107 See, for example, letters from MSFT, New
York State Society of Certified Public Accountants,
and Plains Exploration & Production Company.
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
35339
assessment. Management can use this
framework to scale its evaluation
methods and procedures in response to
the risks associated with both the
financial reporting elements and related
controls in its particular facts and
circumstances.
However, the guidance has been
clarified to reflect that management’s
experience with a control’s operation
both during the year and as part of its
prior year assessment(s) may influence
its decisions regarding the risk that
controls will fail to operate as designed.
This, in turn, may have a corresponding
impact on the evidence needed to
support management’s conclusion that
controls operated effectively as of the
date of management’s assessment.
Nature of On-Going Monitoring
Activities
Commenters expressed concern that,
as defined in the proposal, some ongoing monitoring activities would not be
deemed to provide sufficient
evidence.108 Other commenters were
concerned that the guidance placed too
much emphasis on the amount of
evidence that could be obtained from
on-going monitoring activities and
called for further examples of when they
may provide sufficient evidence and
when direct testing would be
required.109 With regard to selfassessments, commenters suggested that
self-assessments can be an integral
source of evidence when their effective
operation is verified by direct testing
over varying periods of time based on
the manner in which the selfassessments were conducted and on the
level of risk associated with the
controls.110 Other commenters
requested the proposed guidance be
revised to clarify how, based on the
definitions provided, self-assessments
differed from direct testing.111
Some commenters questioned the
sufficiency of evidence that would
result from management’s daily
interaction with controls and requested
more specifics on when it would be
appropriate as a source of evidence 112
and how management should
demonstrate that its daily interaction
with controls provided it with sufficient
evidence to have a reasonable basis to
108 See, for example, letters from BASF and Cees
Klumper & Matthew Shepherd (C. Klumper & M.
Shepherd).
109 See, for example, letters from Center and EY.
110 See, for example, letters from GT and C.
Klumper & M. Shepherd.
111 See, for example, letter from Cardinal.
112 See, for example, letters from BDO, EY, Ohio,
and Tatum.
E:\FR\FM\27JNR3.SGM
27JNR3
rwilkins on PROD1PC63 with RULES3
35340
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
assess whether the operation of controls
was effective.113
Based on the feedback received, we
modified the discussion of on-going
monitoring activities, including selfassessments, and direct testing to clarify
how the evidence obtained from each of
the activities can vary. As commenters
in this area noted, on-going monitoring,
including self-assessments,
encompasses a wide array of activities
that can be performed by a variety of
individuals within an organization.
These individuals have varying degrees
of objectivity, ranging from internal
auditors to the personnel involved in
business processes, and can include
both those responsible for executing a
control as well as those responsible for
overseeing its effective operation.
Because of the varying degrees of
objectivity, the sufficiency of the
evidence management obtains from ongoing monitoring activities is
determined by the nature of the
activities (that is, what they entail and
how they are performed).
We clarified the proposed guidance to
indicate that when evaluating the
objectivity of personnel, management is
not required to make an absolute
conclusion regarding objectivity, but
rather should recognize that personnel
will have varying degrees of objectivity
based on, among other things, their job
function, their relationship to the
control being evaluated, and their level
of authority and responsibility within
the organization. Management should
consider the ICFR risk of the controls
when determining whether the
objectivity of the personnel involved in
the monitoring activities results in
sufficient evidence. For example, for
areas of high ICFR risk, management’s
on-going monitoring activities may
provide sufficient evidence when the
monitoring activities are carried out by
individuals with a high degree of
objectivity. However, when
management’s support includes
evidence obtained from activities
performed by individuals who are not
highly objective, management would
ordinarily supplement the evidence
with some degree of direct testing by
individuals who are independent from
the operation of the control to
corroborate the information from the
monitoring activity.
With regard to requests for more
guidance related to management’s daily
interaction, we have adopted the
guidance substantially as proposed. We
believe that in smaller companies,
management’s daily interaction with the
operation of controls may provide it
113 See,
for example, letter from Ohio.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
with sufficient evidence to assess
whether controls are operating
effectively. The guidance is not
intended to limit management’s
flexibility with regard to the areas of
ICFR where its interaction can provide
it with sufficient evidence or the
manner by which management obtains
knowledge of the operation of the
controls. However, as noted in the
guidance, daily interaction as a source
of evidence for the operation of controls
applies to management who are
responsible for assessing the
effectiveness of ICFR and whose
knowledge about the effective operation
is gained from its on-going direct
knowledge and direct supervision of
controls. In addition, the evidence
management maintains in support of its
assessment should include the design of
the controls that adequately address the
financial reporting risks as well as how
its interaction provides an adequate
basis for its assessment of the
effectiveness of ICFR.
Time Period Covered by Evaluation
Procedures
Commenters requested that the
guidance allow for, and encourage,
management to gather evidence
throughout the year to support its
assessment in lieu of having to gather
some evidence close to or as-of yearend.114 These commenters believed that
such guidance would encourage
companies to better integrate their
evaluation procedures into the normal
activities of their daily operations,
spread the effort more evenly
throughout the year, and help reduce
the strain on resources at year-end when
company personnel are preparing the
annual financial statements and
complying with other financial
reporting activities.
We agree with the comments received
in this area with respect to allowing
management the flexibility to gather
evidence in support of its assessment
during the year. Since management’s
assessment is performed as of the end of
its fiscal year-end, the evidence
management utilizes to support its
assessment would ordinarily include a
reasonable period of time during the
year, including some evidence as of the
date of its assessment. However, the
proposal was not intended to limit
management’s flexibility to conduct its
evaluation activities during the year.
Rather, the proposed guidance was
intended to provide management with
the ability to perform a variety of
114 See, for example, letters from Eli Lilly, The
Financial Services Roundtable, and Neenah Paper,
Inc.
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
activities covering periods of time that
vary based on its assessment of risk in
order to provide it with a sufficient
basis for its evaluation. This could
include, for example, a strategy that
employs direct testing over a control
during the year (but prior to year-end),
that is supplemented with a selfassessment activity at year-end. As a
result, we have adopted the guidance
related to the period of time for which
management should obtain evidence of
the operation of controls substantially as
proposed.
Supporting Evidential Matter
Commenters expressed support for
the guidance in the proposal related to
the supporting evidential matter and
believed it would allow management to
make better judgments and allow for
sufficient flexibility to vary the nature
and extent of evidence based on the
company’s particular facts and
circumstances.115 Other commenters
observed that a certain level of
documentation was required in order to
facilitate an efficient and effective audit
and suggested the guidance explicitly
state this fact and/or clarify how the
guidance for management was intended
to interact with the requirements
provided to auditors.116 One commenter
requested that we clarify our intention
related to the audit committee’s
involvement in the review of evidential
matter prepared by management in
support of its assessment.117
After consideration of the comments,
we are adopting the guidance
substantially as proposed. We continue
to believe that management should have
considerable flexibility as to the nature
and extent of the documentation it
maintains to support its assessment,
while at the same time maintaining
sufficient evidence to provide
reasonable support for its assessment.
Providing specific guidelines and
detailed examples of various types of
documentation would potentially limit
the flexibility we intended to afford
management.
With respect to the concerns raised
regarding the interaction of the
proposed guidance and the audit
requirements, we determined that no
changes were necessary. Similar to an
audit of the financial statements, the
nature and extent of evidential matter
maintained by management may impact
how an auditor conducts the audit and
the efficiency of the audit. We believe
115 See, for example, letters from BR, EY, Hudson
Financial Solutions (HFS), and MSFT.
116 See, for example, letters from Center, Deloitte,
EY, GT, M&P, MetLife, MDFC, PwC, and N.
Stofberg.
117 See, for example, letter from ABA.
E:\FR\FM\27JNR3.SGM
27JNR3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
that the most efficient implementation
by management and the auditor is
achieved when flexibility exists to
determine the appropriate manner by
which to complete their respective
tasks. However, we also believe that the
Proposed Auditing Standard allows
auditors sufficient flexibility to consider
various types of evidence utilized by
management. The audit standard allows
auditors to adjust their approach in
certain circumstances, if necessary, so
that audit procedures should not place
any undue burden or expense on
management’s evaluation process.
F. Evaluation of Control Deficiencies
rwilkins on PROD1PC63 with RULES3
1. Summary of the Proposal
The proposal directed management to
evaluate each control deficiency that
comes to its attention in order to
determine whether the deficiency, or
combination of control deficiencies, is a
material weakness. The proposal
defined a material weakness as a
deficiency, or combination of
deficiencies, in ICFR such that there is
a reasonable possibility that a material
misstatement of the company’s annual
or interim financial statements will not
be prevented or detected on a timely
basis by the company’s ICFR. The
proposal contained guidance on the
aggregation of deficiencies by indicating
that multiple control deficiencies that
affect the same financial reporting
element increase the likelihood of
misstatement and may, in combination,
constitute a material weakness, even
though such deficiencies may be
individually insignificant. The proposal
also highlighted four circumstances that
were strong indicators that a material
weakness in ICFR existed. In summary,
the following four items were listed:
• An ineffective control environment,
including identification of fraud of any
magnitude on the part of senior
management; significant deficiencies
that remain unaddressed after some
reasonable period of time; and
ineffective oversight by the audit
committee (or entire board of directors
if no audit committee exists).
• Restatement of previously issued
financial statements to reflect the
correction of a material misstatement.
• Identification by the auditor of a
material misstatement of financial
statements in the current period under
circumstances that indicate the
misstatement would not have been
discovered by the company’s ICFR.
• For complex entities in highly
regulated industries, an ineffective
regulatory compliance function.
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
2. Comments on the Proposal and
Revisions Made
35341
Strong Indicators of a Material
Weakness
Commenters noted there were
differences in the list of strong
indicators included in the proposal and
the list of strong indicators included in
the Proposed Auditing Standard, raising
concern that the failure of the two
proposals to provide similar guidance
would cause unnecessary confusion
between management and auditors.121
Commenters also provided suggested
changes, additions or deletions to
circumstances that were included on the
list of strong indicators. For example,
commenters raised questions about the
‘‘identification of fraud of any
magnitude on the part of senior
management,’’ questioning the
appropriateness of the term ‘‘of any
magnitude’’ or which individuals were
encompassed in the term ‘‘senior
management.’’ 122 Commenters also felt
the Commission’s proposed list of
indicators should be expanded to
include the indicator relating to an
ineffective internal audit function or
risk assessment function that was
included in the Proposed Auditing
Standard.123 One commenter felt that
the list of strong indicators needed to be
made more specific, and should include
more illustrative examples.124 Another
commenter stated that the indicator of
‘‘significant deficiencies that have been
identified and remain unaddressed after
some reasonable period of time’’ should
be clarified to mean unremediated
deficiencies.125 Other commenters
suggested that the list of strong
indicators be eliminated completely,
stating that designating these items as
strong indicators creates a presumption
that such items are, in fact, material
weaknesses, and may impede the use of
judgment to properly evaluate the
identified control deficiency in light of
the individual facts and
circumstances.126 Commenters also felt
the Commission should clearly indicate
that a company may determine that no
deficiency exists despite the fact that
one of the identified strong indicators
was present.127
After consideration of the comments,
we have decided to modify the
proposed guidance. We believe
judgment is imperative in determining
whether a deficiency is a material
weakness and that the guidance should
encourage management to use that
judgment. As a result, we have modified
the guidance to emphasize that the
evaluation of control deficiencies
requires the consideration of all of the
relevant facts and circumstances. We
agreed with the concerns that an overly
detailed list may create a list of de facto
material weaknesses or inappropriately
suggest that identified control
deficiencies not included in the list are
of lesser importance. At the same time,
however, we continue to believe that
highlighting certain circumstances that
are indicative of a material weakness
provides practical information for
management. As a result, rather than
referring to ‘‘strong indicators,’’ the final
guidance refers simply to ‘‘indicators.’’
This change should further emphasize
that the presence of one of the
indicators does not mandate a
conclusion that a material weakness
exists. Rather management should apply
professional judgment in this area.
These examples include indicators
related to the results of the financial
statement audit, such as material audit
adjustments and restatements, and
118 See, for example, letters from EEI, FEI CCR,
FEI SPCTF, ICAEW, N. Stofberg, and SVLG.
119 See, for example, letters from FEE and ICAEW.
120 Release No. 34–55928.
121 See, for example, letters from BDO, BR,
Center, Cleary, CSC, Deloitte, KPMG, M&P, and
Schneider Downs & Co., Inc. (Schneider).
122 See, for example, letters from 100 Group, Eli
Lilly, FEI CCR, and P&G.
123 See, for example, letters from BR, Crowe
Chizek & Company LLC (Crowe), Deloitte, and
M&P.
124 See, for example, letter from Chamber.
125 See, for example, letter from EEI.
126 See, for example, letters from Cleary, Institute
of Internal Auditors (IIA), and NYC Bar.
127 See, for example, letters from Chamber,
Cleary, CSC, PPL, and Schneider.
Definition of Material Weakness
Commenters expressed concern about
differences between our proposed
definition of material weakness and that
proposed by the PCAOB in its Proposed
Auditing Standard and requested that
the two definitions be aligned.118
Commenters provided feedback on the
reasonably possible threshold for
determining the likelihood of a potential
material misstatement as well as the
reference to interim financial statements
for determining whether a potential
misstatement could be material.
Commenters also suggested that a single
definition of material weakness be
established for use by both auditors and
management and that definition be
established by the SEC in its rules.119
Based on comments on the proposal, we
are amending Exchange Act Rule 12b–
2 and Rule 1–02 of Regulation S–X to
define the term material weakness.
Further discussion and analysis of the
definition of material weakness and
commenter feedback can be found in
that rule release.120
PO 00000
Frm 00019
Fmt 4701
Sfmt 4700
E:\FR\FM\27JNR3.SGM
27JNR3
35342
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
indicators related to the overall
evaluation of the company’s oversight of
financial reporting, such as the
effectiveness of the audit committee and
incidences of fraud among senior
management. These examples are by no
means an exhaustive list. For example,
under COSO, risk assessment and
monitoring are two of the five
components of an effective system of
internal control. If management
concludes that an internal control
component is not effective, or if
required entity-level or pervasive
elements of ICFR are not effective, it is
likely that internal control is not
effective.
Lastly, we agreed with commenters
that it is appropriate for the
Commission’s guidance in this area to
mirror the PCAOB’s auditing standard.
As a result, we have worked with the
PCAOB in reaching conclusions
regarding the guidance in this area, and
we anticipate the PCAOB’s auditing
standard will align with our final
management guidance.
rwilkins on PROD1PC63 with RULES3
G. Management Reporting and
Disclosure
Comment letters expressed various
viewpoints regarding the information
management provides as part of its
report on the effectiveness of ICFR. For
example, commenters raised concerns
regarding the ‘‘point in time’’
assessment and suggested various
alternative approaches.128 Commenters
also made suggestions regarding the
disclosures management provides when
a material weakness has occurred.
Certain commenters felt the suggested
disclosures indicated in the proposing
release should be mandatory,129 while
other commenters wanted the
Commission to specify where in the
Form 10-K management must provide
its disclosures.130 Commenters also
requested that the Commission include
in its release additional possible
disclosures for consideration by
management to include in its report.131
In addition, commenters expressed
concerns regarding the language in the
Proposing Release with respect to
management’s ability to determine that
ICFR is ineffective due solely to, and
only to the extent of, the identified
material weakness(es). Some
commenters felt that this language was
essentially the same as a qualified
128 See, for example, letters from BHP Billiton
Limited, Eli Lilly, and IIA.
129 See, for example, letters from HFS, IDW, and
Tatum.
130 See, for example, letters from Crowe and
KPMG.
131 See, for example, letters from PCG Worldwide
Limited and PepsiCo, Inc. (Pepsi).
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
opinion, which is prohibited by the
guidance,132 while two others stated
that the Commission needed to provide
additional guidance around the
circumstances under which this
approach would be appropriate.133
Based on the feedback we received,
we have eliminated this from the final
interpretive guidance and revised the
proposed guidance to simply state that
management may not state that the
company’s ICFR is effective. However,
management may state that controls are
ineffective for specific reasons.
Additionally, certain of the requests
received seemed inconsistent with the
statutory obligation. For example,
Section 404(a)(2) of Sarbanes-Oxley
requires that management perform the
assessment as of the end of its most
recent fiscal year. As a result, we do not
believe any further changes to the
proposed guidance around
management’s expression of its
assessment of the effectiveness of ICFR
are necessary.
H. Previous Staff Guidance and Staff
Frequently Asked Questions
Commenters raised questions
regarding the status of guidance
previously issued by the Commission
and its staff, on May 16, 2005,134 as well
as the Frequently Asked Questions
(‘‘FAQs’’).135 Some commenters
requested the FAQs be retained in their
entirety,136 while others requested that
some particular FAQs be retained.137 As
we indicated in the proposed guidance,
the May 2005 guidance remains
relevant. Additionally, we have
instructed the staff to review the FAQs
and, as a result of the final issuance of
this guidance, update them as
appropriate.
I. Foreign Private Issuers
The Commission received comments
directed towards the information
included in the proposed guidance
132 See,
133 See,
for example, letters from BDO and CFA.
for example, letters from Crowe and
Deloitte.
134 Commission Statement on Implementation of
Internal Control Reporting Requirements, Press
Release No. 2005–74 (May 16, 2005); Division of
Corporation Finance and Office of the Chief
Accountant: Staff Statement on Management’s
Report on Internal Control Financial Reporting
(May 16, 2005), available at https://www.sec.gov/
spotlight/soxcom/.htm.
135 Office of the Chief Accountant and Division of
Corporation Finance: Management’s Report on
Internal Control Over Financial Reporting and
Certification of Disclosure in Exchange Act Periodic
Reports Frequently Asked Questions (revised Oct. 6,
2004), available at https://www.sec.gov/info/
accountants/controlfaq1004.htm.
136 See, for example, letters from BP p.l.c. (BP),
GT, IIA, ISACA, MSFT, and Tatum.
137 See, for example, letters from BDO, EY,
KPMG, and Stantec Inc.
PO 00000
Frm 00020
Fmt 4701
Sfmt 4700
related to foreign private issuers. While
three commenters noted that no
additional guidance for foreign private
issuers was necessary,138 other
commenters suggested changes.
Commenters raised concerns regarding
potential duplicative efforts and costs
foreign registrants are subject to, as a
result of similar regulations in their
local jurisdictions.139 These
commenters requested that the
Commission attempt to minimize or
remove any duplicative requirements,
with some requesting the Commission
exempt foreign registrants entirely from
the ICFR reporting requirements if the
registrant was subject to similar
regulations in their home country. Other
commenters raised concerns relating to
the unique challenges that foreign
registrants face in evaluating their ICFR,
including language and cultural
differences and international legal
differences.140
Commenters also made suggestions
regarding how the reconciliation to U.S.
GAAP should be handled in the
evaluation of ICFR. Certain commenters
expressed support for the Commission’s
position that foreign private issuers
should scope their evaluation effort
based on the financial statements
prepared in accordance with home
country GAAP, rather than based on the
reconciliation to U.S. GAAP.141
However, other commenters requested
that the Commission exempt the
reconciliation to U.S. GAAP from the
scope of the evaluation altogether,142
while others sought further clarification
as to whether and how the
reconciliation was included in the
evaluation of ICFR,143 with one
commenter suggesting the Commission
staff publish additional Frequently
Asked Questions to address any
implementation issues.144 One
commenter requested the Commission
exclude from the evaluation process
those financial statement disclosures
that are required by home country
GAAP but not under U.S. GAAP to
minimize the differences in the ICFR
evaluation efforts between U.S.
registrants and foreign filers as much as
possible.145
138 See, for example, letters from BP, Manulife,
and Pepsi.
139 See, for example, letters from 100 Group,
´
Banco Itau Holding Financeira SA, CCMR, Eric
Fandrich, and FEI CCR.
140 See, for example, letters from IIA and GT.
141 See, for example, letters from 100 Group, BDO,
and ICAEW.
142 See, for example, letters from CCMR, Cleary,
EALIC, and NYC Bar.
143 See, for example, letters from Deloitte, EY,
KPMG, and N. Stofberg.
144 See, for example, letter from Ohio.
145 See, for example, letter from ING.
E:\FR\FM\27JNR3.SGM
27JNR3
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 / Rules and Regulations
rwilkins on PROD1PC63 with RULES3
After considering the comments
received, the Commission has
determined not to exempt foreign
registrants from the ICFR reporting
requirements, regardless of whether
they are subject to similar home country
requirements. The Commission’s
requirement for all issuers to complete
an evaluation of ICFR is not derived
from the Commission’s Interpretive
Guidance for Management; this
requirement has been established by
Congress. Further, the Commission does
not believe it is appropriate to exclude
the U.S. GAAP reconciliation from the
scope of the evaluation as long as it is
a required element of the financial
statements. Currently, however, the
Commission is evaluating, as part of
another project, the acceptance of
International Financial Reporting
Standards (‘‘IFRS’’) as published by the
International Accounting Standards
VerDate Aug<31>2005
16:20 Jun 26, 2007
Jkt 211001
Board (‘‘IASB’’) without reconciliation
to U.S. GAAP.146
In light of the comment letters, the
Commission realizes that there are
certain implementation concerns and
issues that are unique to foreign private
issuers. As a result, the Commission has
instructed the staff to consider whether
these items should be addressed in a
Frequently Asked Questions document.
List of Subjects in 17 CFR Part 241
Securities.
35343
Text of Amendments
For the reasons set out in the
preamble, the Commission is amending
Title 17, chapter II, of the Code of
Federal Regulations as follows:
I
PART 241—INTERPRETATIVE
RELEASES RELATING TO THE
SECURITIES EXCHANGE ACT OF 1934
AND GENERAL RULES AND
REGULATIONS THEREUNDER
Part 241 is amended by adding
Release No. 34–55929 and the release
date of June 20, 2007 to the list of
interpretative releases.
I
146 In
a press release on April 24, 2007, the
Commission announced its next steps pertaining to
acceptance of IFRS without reconciliation to U.S.
GAAP. In that press release, the Commission stated
that it anticipates issuing a Proposing Release in
summer 2007 that will request comments on
proposed changes to the Commission’s rules which
would allow the use of IFRS, as published by the
IASB, without reconciliation to U.S. GAAP in
financial reports filed by foreign private issuers that
are registered with the Commission. The press
release is available at https://www.sec.gov/news/
press/2007/2007–72.htm.
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
Dated: June 20, 2007.
By the Commission.
Nancy M. Morris,
Secretary.
[FR Doc. E7–12299 Filed 6–26–07; 8:45 am]
BILLING CODE 8010–01–P
E:\FR\FM\27JNR3.SGM
27JNR3
Agencies
[Federal Register Volume 72, Number 123 (Wednesday, June 27, 2007)]
[Rules and Regulations]
[Pages 35324-35343]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E7-12299]
[[Page 35323]]
-----------------------------------------------------------------------
Part III
Securities and Exchange Commission
-----------------------------------------------------------------------
17 CFR Part 241
Commission Guidance Regarding Management's Report on Internal Control
Over Financial Reporting Under Section 13(a) or 15(d) of the Securities
Exchange Act of 1934; Final Rule
Federal Register / Vol. 72, No. 123 / Wednesday, June 27, 2007 /
Rules and Regulations
[[Page 35324]]
-----------------------------------------------------------------------
SECURITIES AND EXCHANGE COMMISSION
17 CFR Part 241
[Release Nos. 33-8810; 34-55929; FR-77; File No. S7-24-06]
Commission Guidance Regarding Management's Report on Internal
Control Over Financial Reporting Under Section 13(a) or 15(d) of the
Securities Exchange Act of 1934
AGENCY: Securities and Exchange Commission.
ACTION: Interpretation.
-----------------------------------------------------------------------
SUMMARY: The SEC is publishing this interpretive release to provide
guidance for management regarding its evaluation and assessment of
internal control over financial reporting. The guidance sets forth an
approach by which management can conduct a top-down, risk-based
evaluation of internal control over financial reporting. An evaluation
that complies with this interpretive guidance is one way to satisfy the
evaluation requirements of Rules 13a-15(c) and 15d-15(c) under the
Securities Exchange Act of 1934.
DATES: Effective Date: June 27, 2007.
FOR FURTHER INFORMATION CONTACT: Josh K. Jones, Professional Accounting
Fellow, Office of the Chief Accountant, at (202) 551-5300, or N. Sean
Harrison, Special Counsel, Division of Corporation Finance, at (202)
551-3430, U.S. Securities and Exchange Commission, 100 F Street, NE.,
Washington, DC 20549.
SUPPLEMENTARY INFORMATION: The amendments to Rules 13a-15(c) \1\ and
15d-15(c) \2\ under the Securities Exchange Act of 1934 \3\ (the
``Exchange Act''), which clarify that an evaluation of internal control
over financial reporting that complies with this interpretive guidance
is one way to satisfy those rules, are being made in a separate
release.\4\
---------------------------------------------------------------------------
\1\ 17 CFR 240.13a-15(c).
\2\ 17 CFR 240.15d-15(c).
\3\ 15 U.S.C. 78a et seq.
\4\ Release No. 34-55928 (Jun. 20, 2007).
---------------------------------------------------------------------------
I. Introduction
Management is responsible for maintaining a system of internal
control over financial reporting (``ICFR'') that provides reasonable
assurance regarding the reliability of financial reporting and the
preparation of financial statements for external purposes in accordance
with generally accepted accounting principles. The rules we adopted in
June 2003 to implement Section 404 of the Sarbanes-Oxley Act of 2002
\5\ (``Sarbanes-Oxley'') require management to annually evaluate
whether ICFR is effective at providing reasonable assurance and to
disclose its assessment to investors.\6\ Management is responsible for
maintaining evidential matter, including documentation, to provide
reasonable support for its assessment. This evidence will also allow a
third party, such as the company's external auditor, to consider the
work performed by management.
---------------------------------------------------------------------------
\5\ 15 U.S.C. 7262.
\6\ Release No. 33-8238 (Jun. 5, 2003) [68 FR 36636]
(hereinafter ``Adopting Release'').
---------------------------------------------------------------------------
ICFR cannot provide absolute assurance due to its inherent
limitations; it is a process that involves human diligence and
compliance and is subject to lapses in judgment and breakdowns
resulting from human failures. ICFR also can be circumvented by
collusion or improper management override. Because of such limitations,
ICFR cannot prevent or detect all misstatements, whether unintentional
errors or fraud. However, these inherent limitations are known features
of the financial reporting process, therefore, it is possible to design
into the process safeguards to reduce, though not eliminate, this risk.
The ``reasonable assurance'' referred to in the Commission's
implementing rules relates to similar language in the Foreign Corrupt
Practices Act of 1977 (``FCPA'').\7\ Exchange Act Section 13(b)(7)
defines ``reasonable assurance'' and ``reasonable detail'' as ``such
level of detail and degree of assurance as would satisfy prudent
officials in the conduct of their own affairs.'' \8\ The Commission has
long held that ``reasonableness'' is not an ``absolute standard of
exactitude for corporate records.'' \9\ In addition, the Commission
recognizes that while ``reasonableness'' is an objective standard,
there is a range of judgments that an issuer might make as to what is
``reasonable'' in implementing Section 404 and the Commission's rules.
Thus, the terms ``reasonable,'' ``reasonably,'' and ``reasonableness''
in the context of Section 404 implementation do not imply a single
conclusion or methodology, but encompass the full range of appropriate
potential conduct, conclusions or methodologies upon which an issuer
may reasonably base its decisions.
---------------------------------------------------------------------------
\7\ Title 1 of Pub. L. 95-213 (1977).
\8\ 15 U.S.C. 78m(b)(7). The conference committee report on the
1988 amendments to the FCPA also noted that the standard ``does not
connote an unrealistic degree of exactitude or precision. The
concept of reasonableness of necessity contemplates the weighing of
a number of relevant factors, including the costs of compliance.''
Cong. Rec. H2116 (daily ed. Apr. 20, 1988).
\9\ Release No. 34-17500 (Jan. 29, 1981) [46 FR 11544].
---------------------------------------------------------------------------
Since companies first began complying in 2004, the Commission has
received significant feedback on our rules implementing Section
404.\10\ This feedback included requests for further guidance to assist
company management in complying with our ICFR evaluation and disclosure
requirements. This guidance is in response to those requests and
reflects the significant feedback we have received, including comments
on the interpretive guidance we proposed on December 20, 2006. In
addressing a number of the commonly identified areas of concerns, the
interpretive guidance:
---------------------------------------------------------------------------
\10\ Release Nos. 33-8762; 34-54976 (Dec. 20, 2006) [71 FR
77635] (hereinafter ``Proposing Release''). For a detailed history
of the implementation of Section 404 of Sarbanes-Oxley, see Section
I., Background, of the Proposing Release. An analysis of the
comments we received on the Proposing Release is included in Section
III of this release.
---------------------------------------------------------------------------
Explains how to vary evaluation approaches for gathering
evidence based on risk assessments;
Explains the use of ``daily interaction,'' self-
assessment, and other on-going monitoring activities as evidence in the
evaluation;
Explains the purpose of documentation and how management
has flexibility in approaches to documenting support for its
assessment;
Provides management significant flexibility in making
judgments regarding what constitutes adequate evidence in low-risk
areas; and
Allows for management and the auditor to have different
testing approaches.
The Interpretive Guidance is organized around two broad principles.
The first principle is that management should evaluate whether it has
implemented controls that adequately address the risk that a material
misstatement of the financial statements would not be prevented or
detected in a timely manner. The guidance describes a top-down, risk-
based approach to this principle, including the role of entity-level
controls in assessing financial reporting risks and the adequacy of
controls. The guidance promotes efficiency by allowing management to
focus on those controls that are needed to adequately address the risk
of a material misstatement of its financial statements. The guidance
does not require management to identify every control in a process or
document the business processes impacting ICFR. Rather, management can
focus its
[[Page 35325]]
evaluation process and the documentation supporting the assessment on
those controls that it determines adequately address the risk of a
material misstatement of the financial statements. For example, if
management determines that a risk of a material misstatement is
adequately addressed by an entity-level control, no further evaluation
of other controls is required.
The second principle is that management's evaluation of evidence
about the operation of its controls should be based on its assessment
of risk. The guidance provides an approach for making risk-based
judgments about the evidence needed for the evaluation. This allows
management to align the nature and extent of its evaluation procedures
with those areas of financial reporting that pose the highest risks to
reliable financial reporting (that is, whether the financial statements
are materially accurate). As a result, management may be able to use
more efficient approaches to gathering evidence, such as self-
assessments, in low-risk areas and perform more extensive testing in
high-risk areas. By following these two principles, we believe
companies of all sizes and complexities will be able to implement our
rules effectively and efficiently.
The Interpretive Guidance reiterates the Commission's position that
management should bring its own experience and informed judgment to
bear in order to design an evaluation process that meets the needs of
its company and that provides a reasonable basis for its annual
assessment of whether ICFR is effective. This allows management
sufficient and appropriate flexibility to design such an evaluation
process.\11\ Smaller public companies, which generally have less
complex internal control systems than larger public companies, can use
this guidance to scale and tailor their evaluation methods and
procedures to fit their own facts and circumstances. We encourage
smaller public companies \12\ to take advantage of the flexibility and
scalability to conduct an evaluation of ICFR that is both efficient and
effective at identifying material weaknesses.
---------------------------------------------------------------------------
\11\ Exchange Act Rules 13a-15 and 15d-15 [17 CFR 240.13a-15 and
15d-15] require management to evaluate the effectiveness of ICFR as
of the end of the fiscal year. For purposes of this document, the
term ``evaluation'' or ``evaluation process'' refers to the methods
and procedures that management implements to comply with these
rules. The term ``assessment'' is used in this document to describe
the disclosure required by Item 308 of Regulations S-B and S-K [17
CFR 228.308 and 229.308]. This disclosure must include discussion of
any material weaknesses which exist as of the end of the most recent
fiscal year and management's assessment of the effectiveness of
ICFR, including a statement as to whether or not ICFR is effective.
Management is not permitted to conclude that ICFR is effective if
there are one or more material weaknesses in ICFR.
\12\ While a company's individual facts and circumstances should
be considered in determining whether a company is a smaller public
company and the resulting implications to management's evaluation, a
company's public market capitalization and annual revenues are
useful indicators of its size and complexity. The Final Report of
the Advisory Committee on Smaller Public Companies to the United
States Securities and Exchange Commission (Apr. 23, 2006), available
at https://www.sec.gov/info/smallbus/acspc/acspc-finalreport.pdf,
defined smaller companies, which included microcap companies, and
the SEC's rules include size characteristics for ``accelerated
filers'' and ``non-accelerated filers'' which approximately fit the
same definitions.
---------------------------------------------------------------------------
The effort necessary to conduct an initial evaluation of ICFR will
vary among companies, partly because this effort will depend on
management's existing financial reporting risk assessment and control
monitoring activities. After the first year of compliance, management's
effort to identify financial reporting risks and controls should
ordinarily be less, because subsequent evaluations should be more
focused on changes in risks and controls rather than identification of
all financial reporting risks and the related controls. Further, in
each subsequent year, the documentation of risks and controls will only
need to be updated from the prior year(s), not recreated anew. Through
the risk and control identification process, management will have
identified for testing only those controls that are needed to meet the
objective of ICFR (that is, to provide reasonable assurance regarding
the reliability of financial reporting) and for which evidence about
their operation can be obtained most efficiently. The nature and extent
of procedures implemented to evaluate whether those controls continue
to operate effectively can be tailored to the company's unique
circumstances, thereby avoiding unnecessary compliance costs.
The guidance assumes management has established and maintains a
system of internal accounting controls as required by the FCPA.
Further, it is not intended to explain how management should design its
ICFR to comply with the control framework management has chosen. To
allow appropriate flexibility, the guidance does not provide a
checklist of steps management should perform in completing its
evaluation.
The guidance in this release shall be effective immediately upon
its publication in the Federal Register.\13\
---------------------------------------------------------------------------
\13\ The Commission finds good cause under 5 U.S.C. 808(2) for
this interpretation to take effect on the date of Federal Register
publication. Further delay would be unnecessary and contrary to the
public interest because following the guidance is voluntary.
Additionally, delay may deter companies from realizing all the
efficiencies intended by this guidance, and immediate effectiveness
will assist in preparing for 2007 evaluations and assessments of
internal control over financial reporting.
---------------------------------------------------------------------------
As a companion \14\ to this interpretive release, we are adopting
amendments to Exchange Act Rules 13a-15(c) and 15d-15(c) and revisions
to Regulation S-X.\15\ The amendments to Rules 13a-15(c) and 15d-15(c)
will make it clear that an evaluation that is conducted in accordance
with this interpretive guidance is one way to satisfy the annual
management evaluation requirement in those rules. We are also amending
our rules to define the term ``material weakness'' and to revise the
requirements regarding the auditor's attestation report on ICFR.
Additionally, we are seeking additional comment on the definition of
the term ``significant deficiency.'' \16\
---------------------------------------------------------------------------
\14\ Release No. 34-55928.
\15\ 17 CFR 210.1-01 et seq.
\16\ Release No. 34-55930 (Jun. 20, 2007).
---------------------------------------------------------------------------
II. Interpretive Guidance--Evaluation and Assessment of Internal
Control Over Financial Reporting
The interpretive guidance addresses the following topics:
A. The Evaluation Process
1. Identifying Financial Reporting Risks and Controls
a. Identifying Financial Reporting Risks
b. Identifying Controls That Adequately Address Financial
Reporting Risks
c. Consideration of Entity-Level Controls
d. Role of Information Technology General Controls
e. Evidential Matter To Support the Assessment
2. Evaluating Evidence of the Operating Effectiveness of ICFR
a. Determining the Evidence Needed To Support the Assessment
b. Implementing Procedures To Evaluate Evidence of the Operation
of ICFR
c. Evidential Matter To Support the Assessment
3. Multiple Location Considerations
B. Reporting Considerations
1. Evaluation of Control Deficiencies
2. Expression of Assessment of Effectiveness of ICFR by
Management
3. Disclosures About Material Weaknesses
4. Impact of a Restatement of Previously Issued Financial
Statements on Management's Report on ICFR
5. Inability To Assess Certain Aspects of ICFR
A. The Evaluation Process
The objective of internal control over financial reporting \17\
(``ICFR'') is to
[[Page 35326]]
provide reasonable assurance regarding the reliability of financial
reporting and the preparation of financial statements for external
purposes in accordance with generally accepted accounting principles
(``GAAP''). The purpose of the evaluation of ICFR is to provide
management with a reasonable basis for its annual assessment as to
whether any material weaknesses \18\ in ICFR exist as of the end of the
fiscal year.\19\ To accomplish this, management identifies the risks to
reliable financial reporting, evaluates whether controls exist to
address those risks, and evaluates evidence about the operation of the
controls included in the evaluation based on its assessment of
risk.\20\ The evaluation process will vary from company to company;
however, the top-down, risk-based approach which is described in this
guidance will typically be the most efficient and effective way to
conduct the evaluation.
---------------------------------------------------------------------------
\17\ Exchange Act Rules 13a-15(f) and 15d-15(f) [17 CFR 240.13a-
15(f) and 15d-15(b)] define internal control over financial
reporting as:
A process designed by, or under the supervision of, the issuer's
principal executive and principal financial officers, or persons
performing similar functions, and effected by the issuer's board of
directors, management and other personnel, to provide reasonable
assurance regarding the reliability of financial reporting and the
preparation of financial statements for external purposes in
accordance with generally accepted accounting principles and
includes those policies and procedures that:
(1) Pertain to the maintenance of records that in reasonable
detail accurately and fairly reflect the transactions and
dispositions of the assets of the issuer;
(2) Provide reasonable assurance that transactions are recorded
as necessary to permit preparation of financial statements in
accordance with generally accepted accounting principles, and that
receipts and expenditures of the issuer are being made only in
accordance with authorizations of management and directors of the
registrant; and
(3) Provide reasonable assurance regarding prevention or timely
detection of unauthorized acquisition, use or disposition of the
issuer's assets that could have a material effect on the financial
statements.
\18\ As defined in Exchange Act Rule 12b-2 [17 CFR 240.12b-2]
and Rule 1-02 of Regulation S-X [17 CFR 210.1-02], a material
weakness is a deficiency, or a combination of deficiencies, in ICFR
such that there is a reasonable possibility that a material
misstatement of the registrant's annual or interim financial
statements will not be prevented or detected on a timely basis. See
Release No. 34-55928.
\19\ This focus on material weaknesses will lead to a better
understanding by investors about the company's ICFR, as well as its
inherent limitations. Further, the Commission's rules implementing
Section 404, by providing for public disclosure of material
weaknesses, concentrate attention on the most important internal
control issues.
\20\ If management's evaluation process identifies material
weaknesses, but all material weaknesses are remediated by the end of
the fiscal year, management may conclude that ICFR is effective as
of the end of the fiscal year. However, management should consider
whether disclosure of such remediated material weaknesses is
appropriate or required under Item 307 or Item 308 of Regulations S-
K or S-B or other Commission disclosure rules.
---------------------------------------------------------------------------
The evaluation process guidance is described in two sections. The
first section explains the identification of financial reporting risks
and the evaluation of whether the controls management has implemented
adequately address those risks. The second section explains an approach
for making judgments about the methods and procedures for evaluating
whether the operation of ICFR is effective. Both sections explain how
entity-level controls \21\ impact the evaluation process, as well as
how management should focus its evaluation efforts on the highest risks
to reliable financial reporting.\22\
---------------------------------------------------------------------------
\21\ The term ``entity-level controls'' as used in this document
describes aspects of a system of internal control that have a
pervasive effect on the entity's system of internal control such as
controls related to the control environment (for example,
management's philosophy and operating style, integrity and ethical
values; board or audit committee oversight; and assignment of
authority and responsibility); controls over management override;
the company's risk assessment process; centralized processing and
controls, including shared service environments; controls to monitor
results of operations; controls to monitor other controls, including
activities of the internal audit function, the audit committee, and
self-assessment programs; controls over the period-end financial
reporting process; and policies that address significant business
control and risk management practices. The terms ``company-level''
and ``entity-wide'' are also commonly used to describe these
controls.
\22\ Because management is responsible for maintaining effective
ICFR, this interpretive guidance does not specifically address the
role of the board of directors or audit committee in a company's
evaluation and assessment of ICFR. However, we would ordinarily
expect a board of directors or audit committee, as part of its
oversight responsibilities for the company's financial reporting, to
be reasonably knowledgeable and informed about the evaluation
process and management's assessment, as necessary in the
circumstances.
---------------------------------------------------------------------------
Under the Commission's rules, management's annual assessment of the
effectiveness of ICFR must be made in accordance with a suitable
control framework's \23\ definition of effective internal control.\24\
These control frameworks define elements of internal control that are
expected to be present and functioning in an effective internal control
system. In assessing effectiveness, management evaluates whether its
ICFR includes policies, procedures and activities that address the
elements of internal control that the applicable control framework
describes as necessary for an internal control system to be effective.
The framework elements describe the characteristics of an internal
control system that may be relevant to individual areas of the
company's ICFR, pervasive to many areas, or entity-wide. Therefore,
management's evaluation process includes not only controls involving
particular areas of financial reporting, but also the entity-wide and
other pervasive elements of internal control defined by its selected
control framework. This guidance is not intended to replace the
elements of an effective system of internal control as defined within a
control framework.
---------------------------------------------------------------------------
\23\ In the Adopting Release, the Commission specified
characteristics of a suitable control framework and identified the
Internal Control--Integrated Framework (1992) created by the
Committee of Sponsoring Organizations of the Treadway Commission
(``COSO'') as an example of a suitable framework. We also cited the
Guidance on Assessing Control published by the Canadian Institute of
Chartered Accountants (``CoCo'') and the report published by the
Institute of Chartered Accountants in England & Wales Internal
Control: Guidance for Directors on the Combined Code (known as the
Turnbull Report) as examples of other suitable frameworks that
issuers could choose in evaluating the effectiveness of their ICFR.
We encourage companies to examine and select a framework that may be
useful in their own circumstances; we also encourage the further
development of existing and alternative frameworks.
\24\ For example, both the COSO framework and the Turnbull
Report state that determining whether a system of internal control
is effective is a subjective judgment resulting from an assessment
of whether the five components (that is, control environment, risk
assessment, control activities, monitoring, and information and
communication) are present and functioning effectively. Although
CoCo states that an assessment of effectiveness should be made
against twenty specific criteria, it acknowledges that the criteria
can be regrouped into different structures, and includes a table
showing how the criteria can be regrouped into the five-component
structure of COSO.
---------------------------------------------------------------------------
1. Identifying Financial Reporting Risks and Controls
Management should evaluate whether it has implemented controls that
will achieve the objective of ICFR (that is, to provide reasonable
assurance regarding the reliability of financial reporting). The
evaluation begins with the identification and assessment of the risks
to reliable financial reporting (that is, materially accurate financial
statements), including changes in those risks. Management then
evaluates whether it has controls placed in operation (that is, in use)
that are designed to adequately address those risks. Management
ordinarily would consider the company's entity-level controls in both
its assessment of risks and in identifying which controls adequately
address the risks.
The evaluation approach described herein allows management to
identify controls and maintain supporting evidential matter for its
controls in a manner that is tailored to the company's financial
reporting risks (as defined below). Thus, the controls that management
identifies and documents are those that are important to achieving the
objective of ICFR. These controls are then subject to procedures to
evaluate evidence of their operating
[[Page 35327]]
effectiveness, as determined pursuant to Section II.A.2.
a. Identifying Financial Reporting Risks
Management should identify those risks of misstatement that could,
individually or in combination with others, result in a material
misstatement of the financial statements (``financial reporting
risks''). Ordinarily, the identification of financial reporting risks
begins with evaluating how the requirements of GAAP apply to the
company's business, operations and transactions. Management must
provide investors with financial statements that fairly present the
company's financial position, results of operations and cash flows in
accordance with GAAP. A lack of fair presentation arises when one or
more financial statement amounts or disclosures (``financial reporting
elements'') contain misstatements (including omissions) that are
material.
Management uses its knowledge and understanding of the business,
and its organization, operations, and processes, to consider the
sources and potential likelihood of misstatements in financial
reporting elements. Internal and external risk factors that impact the
business, including the nature and extent of any changes in those
risks, may give rise to a risk of misstatement. Risks of misstatement
may also arise from sources such as the initiation, authorization,
processing and recording of transactions and other adjustments that are
reflected in financial reporting elements. Management may find it
useful to consider ``what could go wrong'' within a financial reporting
element in order to identify the sources and the potential likelihood
of misstatements and identify those that could result in a material
misstatement of the financial statements.
The methods and procedures for identifying financial reporting
risks will vary based on the characteristics of the company. These
characteristics include, among others, the size, complexity, and
organizational structure of the company and its processes and financial
reporting environment, as well as the control framework used by
management. For example, to identify financial reporting risks in a
larger business or a complex business process, management's methods and
procedures may involve a variety of company personnel, including those
with specialized knowledge. These individuals, collectively, may be
necessary to have a sufficient understanding of GAAP, the underlying
business transactions and the process activities, including the role of
computer technology, that are required to initiate, authorize, record
and process transactions. In contrast, in a small company that operates
on a centralized basis with less complex business processes and with
little change in the risks or processes, management's daily involvement
with the business may provide it with adequate knowledge to
appropriately identify financial reporting risks.
Management's evaluation of the risk of misstatement should include
consideration of the vulnerability of the entity to fraudulent activity
(for example, fraudulent financial reporting, misappropriation of
assets and corruption), and whether any such exposure could result in a
material misstatement of the financial statements.\25\ The extent of
activities required for the evaluation of fraud risks is commensurate
with the size and complexity of the company's operations and financial
reporting environment.\26\
---------------------------------------------------------------------------
\25\ For example, COSO's Internal Control Over Financial
Reporting--Guidance for Smaller Public Companies (2006), Volume 1:
Executive Summary, Principle 10: Fraud Risk (page 10) states, ``The
potential for material misstatement due to fraud is explicitly
considered in assessing risks to the achievement of financial
reporting objectives.''
\26\ Management may find resources such as ``Management
Antifraud Programs and Controls--Guidance to Help Prevent, Deter,
and Detect Fraud,'' which was issued jointly by seven professional
organizations and is included as an exhibit to AU Sec. 316,
Consideration of Fraud in a Financial Statement Audit (as adopted on
an interim basis by the PCAOB in PCAOB Rule 3200T) helpful in
assessing fraud risks. Other resources also exist (for example, the
American Institute of Certified Public Accountants' (AICPA)
Management Override of Internal Controls: The Achilles' Heel of
Fraud Prevention (2005)), and more may be developed in the future.
---------------------------------------------------------------------------
Management should recognize that the risk of material misstatement
due to fraud ordinarily exists in any organization, regardless of size
or type, and it may vary by specific location or segment and by
individual financial reporting element. For example, one type of fraud
risk that has resulted in fraudulent financial reporting in companies
of all sizes and types is the risk of improper override of internal
controls in the financial reporting process. While the identification
of a fraud risk is not necessarily an indication that a fraud has
occurred, the absence of an identified fraud is not an indication that
no fraud risks exist. Rather, these risk assessments are used in
evaluating whether adequate controls have been implemented.
b. Identifying Controls That Adequately Address Financial Reporting
Risks
Management should evaluate whether it has controls \27\ placed in
operation (that is, in use) that adequately address the company's
financial reporting risks. The determination of whether an individual
control, or a combination of controls, adequately addresses a financial
reporting risk involves judgments about whether the controls, if
operating properly, can effectively prevent or detect misstatements
that could result in material misstatements in the financial
statements.\28\ If management determines that a deficiency in ICFR
exists, it must be evaluated to determine whether a material weakness
exists.\29\ The guidance in Section II.B.1. is designed to assist
management with that evaluation.
---------------------------------------------------------------------------
\27\ A control consists of a specific set of policies,
procedures, and activities designed to meet an objective. A control
may exist within a designated function or activity in a process. A
control's impact on ICFR may be entity-wide or specific to an
account balance, class of transactions or application. Controls have
unique characteristics--for example, they can be: Automated or
manual; reconciliations; segregation of duties; review and approval
authorizations; safeguarding and accountability of assets;
preventing or detecting error or fraud. Controls within a process
may consist of financial reporting controls and operational controls
(that is, those designed to achieve operational objectives).
\28\ Companies may use ``control objectives,'' which provide
specific criteria against which to evaluate the effectiveness of
controls, to assist in evaluating whether controls can prevent or
detect misstatements.
\29\ A deficiency in the design of ICFR exists when (a)
Necessary controls are missing or (b) existing controls are not
properly designed so that, even if the control operates as designed,
the financial reporting risks would not be addressed.
---------------------------------------------------------------------------
Management may identify preventive controls, detective controls, or
a combination of both, as adequately addressing financial reporting
risks.\30\ There might be more than one control that addresses the
financial reporting risks for a financial reporting element;
conversely, one control might address the risks of more than one
financial reporting element. It is not necessary to identify all
controls that may exist or identify redundant controls, unless
redundancy itself is required to address the financial reporting risks.
To illustrate, management may determine that the risk of a misstatement
in interest expense, which could result in a material misstatement of
the financial statements, is adequately addressed by a control within
the company's period-end financial reporting process (that is, an
entity-level control). In such a case, management may not need to
identify, for purposes of the ICFR evaluation, any
[[Page 35328]]
additional controls related to the risk of misstatement in interest
expense.
---------------------------------------------------------------------------
\30\ Preventive controls have the objective of preventing the
occurrence of errors or fraud that could result in a misstatement of
the financial statements. Detective controls have the objective of
detecting errors or fraud that has already occurred that could
result in a misstatement of the financial statements. Preventive and
detective controls may be completely manual, involve some degree of
computer automation, or be completely automated.
---------------------------------------------------------------------------
Management may also consider the efficiency with which evidence of
the operation of a control can be evaluated when identifying the
controls that adequately address the financial reporting risks. When
more than one control exists and each adequately addresses a financial
reporting risk, management may decide to select the control for which
evidence of operating effectiveness can be obtained more efficiently.
Moreover, when adequate information technology (``IT'') general
controls exist and management has determined that the operation of such
controls is effective, management may determine that automated controls
are more efficient to evaluate than manual controls. Considering the
efficiency with which the operation of a control can be evaluated will
often enhance the overall efficiency of the evaluation process.
In addition to identifying controls that address the financial
reporting risks of individual financial reporting elements, management
also evaluates whether it has controls in place to address the entity-
level and other pervasive elements of ICFR that its chosen control
framework prescribes as necessary for an effective system of internal
control. This would ordinarily include, for example, considering how
and whether controls related to the control environment, controls over
management override, the entity-level risk assessment process and
monitoring activities,\31\ controls over the period-end financial
reporting process,\32\ and the policies that address significant
business control and risk management practices are adequate for
purposes of an effective system of internal control. The control
frameworks and related guidance may be useful tools for evaluating the
adequacy of these elements of ICFR.
---------------------------------------------------------------------------
\31\ Monitoring activities may include controls to monitor
results of operations and controls to monitor other controls,
including activities of the internal audit function, the audit
committee, and self-assessment programs.
\32\ The nature of controls within the period-end financial
reporting process will vary based on a company's facts and
circumstances. The period-end financial reporting process may
include matters such as: Procedures to enter transaction totals into
the general ledger; the initiation, authorization, recording and
processing of journal entries in the general ledger; procedures for
the selection and application of accounting policies; procedures
used to record recurring and non-recurring adjustments to the annual
and quarterly financial statements; and procedures for preparing
annual and quarterly financial statements and related disclosures.
---------------------------------------------------------------------------
When identifying the controls that address financial reporting
risks, management learns information about the characteristics of the
controls that should inform its judgments about the risk that a control
will fail to operate as designed. This includes, for example,
information about the judgment required in its operation and
information about the complexity of the controls. Section II.A.2.
discusses how these characteristics are considered in determining the
nature and extent of evidence of the operation of the controls that
management evaluates.
At the end of this identification process, management has
identified for evaluation those controls that are needed to meet the
objective of ICFR (that is, to provide reasonable assurance regarding
the reliability of financial reporting) and for which evidence about
their operation can be obtained most efficiently.
c. Consideration of Entity-Level Controls
Management considers entity-level controls when identifying
financial reporting risks and related controls for a financial
reporting element. In doing so, it is important for management to
consider the nature of the entity-level controls and how those controls
relate to the financial reporting element. The more indirect the
relationship to a financial reporting element, the less effective a
control may be in preventing or detecting a misstatement.\33\
---------------------------------------------------------------------------
\33\ Controls can be either directly or indirectly related to a
financial reporting element. Controls that are designed to have a
specific effect on a financial reporting element are considered
directly related. For example, controls established to ensure that
personnel are properly counting and recording the annual physical
inventory relate directly to the existence of the inventory.
---------------------------------------------------------------------------
Some entity-level controls, such as certain control environment
controls, have an important, but indirect, effect on the likelihood
that a misstatement will be prevented or detected on a timely basis.
These controls might affect the other controls management determines
are necessary to adequately address financial reporting risks for a
financial reporting element. However, it is unlikely that management
will identify only this type of entity-level control as adequately
addressing a financial reporting risk identified for a financial
reporting element.
Other entity-level controls may be designed to identify possible
breakdowns in lower-level controls, but not in a manner that would, by
themselves, adequately address financial reporting risks. For example,
an entity-level control that monitors the results of operations may be
designed to detect potential misstatements and investigate whether a
breakdown in lower-level controls occurred. However, if the amount of
potential misstatement that could exist before being detected by the
monitoring control is too high, then the control may not adequately
address the financial reporting risks of a financial reporting element.
Entity-level controls may be designed to operate at the process,
application, transaction or account-level and at a level of precision
that would adequately prevent or detect on a timely basis misstatements
in one or more financial reporting elements that could result in a
material misstatement of the financial statements. In these cases,
management may not need to identify or evaluate additional controls
relating to that financial reporting risk.
d. Role of Information Technology General Controls
Controls that management identifies as addressing financial
reporting risks may be automated,\34\ dependent upon IT
functionality,\35\ or a combination of both manual and automated
procedures.\36\ In these situations, management's evaluation process
generally considers the design and operation of the automated or IT
dependent application controls and the relevant IT general controls
over the applications providing the IT functionality. While IT general
controls alone ordinarily do not adequately address financial reporting
risks, the proper and consistent operation of automated controls or IT
functionality often depends upon effective IT general controls. The
identification of risks and controls within IT should not be a separate
evaluation. Instead, it should be an integral part of management's top-
down, risk-based approach to identifying risks and controls and in
determining evidential matter necessary to support the assessment.
---------------------------------------------------------------------------
\34\ For example, application controls that perform automated
matching, error checking or edit checking functions.
\35\ For example, consistent application of a formula or
performance of a calculation and posting correct balances to
appropriate accounts or ledgers.
\36\ For example, a control that manually investigates items
contained in a computer generated exception report.
---------------------------------------------------------------------------
Aspects of IT general controls that may be relevant to the
evaluation of ICFR will vary depending upon a company's facts and
circumstances. For purposes of the evaluation of ICFR, management only
needs to evaluate those IT general controls that are necessary for the
proper and consistent operation of other controls designed to
adequately address financial reporting risks. For example, management
might consider whether certain aspects of IT
[[Page 35329]]
general control areas, such as program development, program changes,
computer operations, and access to programs and data, apply to its
facts and circumstances.\37\ Specifically, it is unnecessary to
evaluate IT general controls that primarily pertain to efficiency or
effectiveness of a company's operations, but which are not relevant to
addressing financial reporting risks.
---------------------------------------------------------------------------
\37\ However, the reference to these specific IT general control
areas as examples within this guidance does not imply that these
areas, either partially or in their entirety, are applicable to all
facts and circumstances. As indicated, companies need to take their
particular facts and circumstances into consideration in determining
which aspects of IT general controls are relevant.
---------------------------------------------------------------------------
e. Evidential Matter To Support the Assessment
As part of its evaluation of ICFR, management must maintain
reasonable support for its assessment.\38\ Documentation of the design
of the controls management has placed in operation to adequately
address the financial reporting risks, including the entity-level and
other pervasive elements necessary for effective ICFR, is an integral
part of the reasonable support. The form and extent of the
documentation will vary depending on the size, nature, and complexity
of the company. It can take many forms (for example, paper documents,
electronic, or other media). Also, the documentation can be presented
in a number of ways (for example, policy manuals, process models,
flowcharts, job descriptions, documents, internal memorandums, forms,
etc). The documentation does not need to include all controls that
exist within a process that impacts financial reporting. Rather, the
documentation should be focused on those controls that management
concludes are adequate to address the financial reporting risks.\39\
---------------------------------------------------------------------------
\38\ See instructions to Item 308 of Regulations S-K and S-B.
\39\ Section II.A.2.c also provides guidance with regard to the
documentation required to support management's evaluation of
operating effectiveness.
---------------------------------------------------------------------------
In addition to providing support for the assessment of ICFR,
documentation of the design of controls also supports other objectives
of an effective system of internal control. For example, it serves as
evidence that controls within ICFR, including changes to those
controls, have been identified, are capable of being communicated to
those responsible for their performance, and are capable of being
monitored by the company.
2. Evaluating Evidence of the Operating Effectiveness of ICFR
Management should evaluate evidence of the operating effectiveness
of ICFR. The evaluation of the operating effectiveness of a control
considers whether the control is operating as designed and whether the
person performing the control possesses the necessary authority and
competence to perform the control effectively. The evaluation
procedures that management uses to gather evidence about the operation
of the controls it identifies as adequately addressing the financial
reporting risks for financial reporting elements (pursuant to Section
II.A.1.b) should be tailored to management's assessment of the risk
characteristics of both the individual financial reporting elements and
the related controls (collectively, ICFR risk). Management should
ordinarily focus its evaluation of the operation of controls on areas
posing the highest ICFR risk. Management's assessment of ICFR risk also
considers the impact of entity-level controls, such as the relative
strengths and weaknesses of the control environment, which may
influence management's judgments about the risks of failure for
particular controls.
Evidence about the effective operation of controls may be obtained
from direct testing of controls and on-going monitoring activities. The
nature, timing and extent of evaluation procedures necessary for
management to obtain sufficient evidence of the effective operation of
a control depend on the assessed ICFR risk. In determining whether the
evidence obtained is sufficient to provide a reasonable basis for its
evaluation of the operation of ICFR, management should consider not
only the quantity of evidence (for example, sample size), but also the
qualitative characteristics of the evidence. The qualitative
characteristics of the evidence include the nature of the evaluation
procedures performed, the period of time to which the evidence relates,
the objectivity \40\ of those evaluating the controls, and, in the case
of on-going monitoring activities, the extent of validation through
direct testing of underlying controls. For any individual control,
different combinations of the nature, timing, and extent of evaluation
procedures may provide sufficient evidence. The sufficiency of evidence
is not necessarily determined by any of these attributes individually.
---------------------------------------------------------------------------
\40\ In determining the objectivity of those evaluating
controls, management is not required to make an absolute conclusion
regarding objectivity, but rather should recognize that personnel
will have varying degrees of objectivity based on, among other
things, their job function, their relationship to the control being
evaluated, and their level of authority and responsibility within
the organization. Personnel whose core function involves permanently
serving as a testing or compliance authority at the company, such as
internal auditors, normally are expected to be the most objective.
However, the degree of objectivity of other company personnel may be
such that the evaluation of controls performed by them would provide
sufficient evidence. Management's judgments about whether the degree
of objectivity is adequate to provide sufficient evidence should
take into account the ICFR risk.
---------------------------------------------------------------------------
a. Determining the Evidence Needed To Support the Assessment
Management should evaluate the ICFR risk of the controls identified
in Section II.A.1.b as adequately addressing the financial reporting
risks for financial reporting elements to determine the evidence needed
to support the assessment. This evaluation should consider the
characteristics of the financial reporting elements to which the
controls relate and the characteristics of the controls themselves.
This concept is illustrated in the following diagram.
[[Page 35330]]
[GRAPHIC] [TIFF OMITTED] TR27JN07.000
Management's consideration of the misstatement risk of a financial
reporting element includes both the materiality of the financial
reporting element and the susceptibility of the underlying account
balances, transactions or other supporting information to a
misstatement that could be material to the financial statements. As the
materiality of a financial reporting element increases in relation to
the amount of misstatement that would be considered material to the
financial statements, management's assessment of misstatement risk for
the financial reporting element generally would correspondingly
increase. In addition, management considers the extent to which the
financial reporting elements include transactions, account balances or
other supporting information that are prone to material misstatement.
For example, the extent to which a financial reporting element: (1)
Involves judgment in determining the recorded amounts; (2) is
susceptible to fraud; (3) has complex accounting requirements; (4)
experiences change in the nature or volume of the underlying
transactions; or (5) is sensitive to changes in environmental factors,
such as technological and/or economic developments, would generally
affect management's judgment of whether a misstatement risk is higher
or lower.
Management's consideration of the likelihood that a control might
fail to operate effectively includes, among other things:
The type of control (that is, manual or automated) and the
frequency with which it operates;
The complexity of the control;
The risk of management override;
The judgment required to operate the control;
The competence of the personnel who perform the control or
monitor its performance;
Whether there have been changes in key personnel who
either perform the control or monitor its performance;
The nature and materiality of misstatements that the
control is intended to prevent or detect;
The degree to which the control relies on the
effectiveness of other controls (for example, IT general controls); and
The evidence of the operation of the control from prior
year(s).
For example, management's judgment of the risk of control failure
would be higher for controls whose operation requires significant
judgment than for non-complex controls requiring less judgment.
Financial reporting elements that involve related party
transactions, critical accounting policies,\41\ and related critical
accounting estimates \42\ generally would be assessed as having a
higher misstatement risk. Further, when the controls related to these
financial reporting elements are subject to the risk of management
override, involve significant judgment, or are complex, they should
generally be assessed as having higher ICFR risk.
---------------------------------------------------------------------------
\41\ ``Critical accounting policies'' are defined as those
policies that are most important to the financial statement
presentation, and require management's most difficult, subjective,
or complex judgments, often as the result of a need to make
estimates about the effect of matters that are inherently uncertain.
See Release No. 33-8040 (Dec. 12, 2001) [66 FR 65013].
\42\ ``Critical accounting estimates'' relate to estimates or
assumptions involved in the application of generally accepted
accounting principles where the nature of the estimates or
assumptions is material due to the levels of subjectivity and
judgment necessary to account for highly uncertain matters or the
susceptibility of such matters to change and the impact of the
estimates and assumptions on financial condition or operating
performance is material. See Release No. 33-8350 (Dec. 19, 2003) [68
FR 75056]. For additional information, see, for example, Release No.
33-8098 (May 10, 2002) [67 FR 35620].
---------------------------------------------------------------------------
When a combination of controls is required to adequately address
the risks related to a financial reporting element, management should
analyze the risk characteristics of the controls. This is because the
controls associated with a given financial reporting element may not
necessarily share the same risk characteristics. For example, a
financial reporting element involving significant estimation may
require a combination of automated controls that accumulate source data
and manual controls that require highly judgmental determinations of
assumptions. In this case, the automated controls may be subject to a
system that is stable (that is, has not undergone significant change)
and is supported by effective IT general controls and are therefore
assessed as lower risk, whereas the manual controls would be assessed
as higher risk.
The consideration of entity-level controls (for example, controls
within the control environment) may influence management's
determination of the evidence needed to sufficiently support its
assessment of ICFR. For example, management's judgment about the
likelihood that a control fails to operate effectively may be
influenced by a highly effective control environment and thereby impact
the evidence evaluated for that control. However, a strong control
environment would not eliminate the need to evaluate the operation of
the control in some manner.
b. Implementing Procedures To Evaluate Evidence of the Operation of
ICFR
Management should evaluate evidence that provides a reasonable
basis for its assessment of the operating
[[Page 35331]]
effectiveness of the controls identified in Section II.A.1. Management
uses its assessment of ICFR risk, as determined in Section II.A.2 to
determine the evaluation methods and procedures necessary to obtain
sufficient evidence. The evaluation methods and procedures may be
integrated with the daily responsibilities of its employees or
implemented specifically for purposes of the ICFR evaluation.
Activities that are performed for other reasons (for example, day-to-
day activities to manage the operations of the business) may also
provide relevant evidence. Further, activities performed to meet the
monitoring objectives of the control framework may provide evidence to
support the assessment of the operating effectiveness of ICFR.
The evidence management evaluates comes from direct tests of
controls, on-going monitoring, or a combination of both. Direct tests
of controls are tests ordinarily performed on a periodic basis by
individuals with a high degree of objectivity relative to the controls
being tested. Direct tests provide evidence as of a point in time and
may provide information about the reliability of on-going monitoring
activities. On-going monitoring includes management's normal, recurring
activities that provide information about the operation of controls.
These activities include, for example, self-assessment \43\ procedures
and procedures to analyze performance measures designed to track the
operation of controls.\44\ Self-assessment is a broad term that can
refer to different types of procedures performed by individuals with
varying degrees of objectivity. It includes assessments made by the
personnel who operate the control as well as members of management who
are not responsible for operating the control. The evidence provided by
self-assessment activities depends on the personnel involved and the
manner in which the activities are conducted. For example, evidence
from self-assessments performed by personnel responsible for operating
the control generally provides less evidence due to the evaluator's
lower degree of objectivity.
---------------------------------------------------------------------------
\43\ For example, COSO's 1992 framework defines self-assessments
as ``evaluations where persons responsible for a particular unit or
function will determine the effectiveness of controls for their
activities.''
\44\ Management's evaluation process may also consider the
results of key performance indicators (``KPIs'') in which management
reconciles operating and financial information with its knowledge of
the business. The procedures that management implements pursuant to
this section should evaluate the effective operation of these KPI-
type controls when they are identified pursuant to Section II.A.1.b.
as addressing financial reporting risk.
---------------------------------------------------------------------------
As the ICFR risk increases, management will ordinarily adjust the
nature of the evidence that is obtained. For example, management can
increase the evidence from on-going monitoring activities by utilizing
personnel who are more objective and/or increasing the extent of
validation through periodic direct testing of the underlying controls.
Management can also vary the evidence obtained by adjusting the period
of time covered by direct testing. When ICFR risk is assessed as high,
the evidence management obtains would ordinarily consist of direct
testing or on-going monitoring activities performed by individuals who
have a higher degree of objectivity. In situations where a company's
on-going monitoring activities utilize personnel who are not adequately
objective, the evidence obtained would normally be supplemented with
direct testing by those who are independent from the operation of the
control. In these situations, direct testing of controls corroborates
evidence from on-going monitoring activities as well as evaluates the
operation of the underlying controls and whether they continue to
adequately address financial reporting risks. When ICFR risk is
assessed as low, management may conclude that evidence from on-going
monitoring is sufficient and that no direct testing is required.
Further, management's evaluation would ordinarily consider evidence
from a reasonable period of time during the year, including the fiscal
year-end.
In smaller companies, management's daily interaction with its
controls may provide it with sufficient knowledge about their operation
to evaluate the operation of ICFR. Knowledge from daily interaction
includes information obtained by on-going direct involvement with and
direct supervision of the execution of the control by those responsible
for the assessment of the effectiveness of ICFR. Management should
consider its particular facts and circumstances when determining
whether its daily interaction with controls provides sufficient
evidence to evaluate the operating effectiveness of ICFR. For example,
daily interaction may be sufficient when the operation of controls is
centralized and the number of personnel involved is limited.
Conversely, daily interaction in companies with multiple management
reporting layers or operating segments would generally not provide
sufficient evidence because those responsible for assessing the
effectiveness of ICFR would not ordinarily be sufficiently
knowledgeable about the operation of the controls. In these situations,
management would ordinarily utilize direct testing or on-going
monitoring-type evaluation procedures to obtain reasonable support for
the assessment.
Management evaluates the evidence it gathers to determine whether
the operation of a control is effective. This evaluation considers
whether the control operated as designed. It also considers matters
such as how the control was applied, the consistency with which it was
applied, and whether the person performing the control possesses the
necessary authority and competence to perform the control effectively.
If management determines that the operation of the control is not
effective, a deficiency exists that must be evaluated to determine
whether it is a material weakness.
c. Evidential Matter To Support the Assessment
Management's assessment must be supported by evidential matter that
provides reasonable support for its assessment. The nature of the
evidential matter may vary based on the assessed level of ICFR risk of
the underlying controls and other circumstances. Reasonable support for
an assessment would include the basis for management's assessment,
including documentation of the methods and procedures it utilizes to
gather and evaluate evidence.
The evidential matter may take many forms and will vary depending
on the assessed level of ICFR risk for controls over each of its
financial reporting elements. For example, management may document its
overall strategy in a comprehensive memorandum that establishes the
evaluation approach, the evaluation procedures, the basis for
management's conclusion about the effectiveness of controls related to
the financial reporting elements and the entity-level and other
pervasive elements that are important to management's assessment of
ICFR.
If management determines that the evidential matter within the
company's books and records is sufficient to provide reasonable support
for its assessment, it may determine that it is not necessary to
separately maintain copies of the evidence it evaluates. For example,
in smaller compan