ENDEAVOR E-MAGAZINE ENDEAVOR | Page 24

WORLD ACADEMY OF INFORMATICS AND MANAGEMENT SCIENCES ISSN : 2278-1315 Other RPA examples include automating a workflow (e.g., How has management evaluated the sufficiency of existing open, read, and create emails), automating rule-based policies and procedures related to the safeguarding of calculations (e.g., calculation of the depreciation charge on assets when implementing the emerging technology? property, plant, and equipment), and recording the journal entry to the general ledger each month. Has management identified intermediaries or third parties Certain business functions may be better suited for integral to the emerging technology functionality? If so, automation than others. An RPA strategy could be applied are current third-party risk management practices to business functions with the following characteristics: sufficient to adequately address the emerging technology?  A need for a high degree of precision, accuracy, and consistency In Director FAQ: Board Oversight of Emerging  Repetitive, manual transaction processing Technologies, the National Association of Corporate  Information being housed in multiple systems Directors (NACD) recommends the following practices to  Dependency on manually intensive yet simple tasks support board oversight of emerging technologies: such as data entry, data manipulation, and report  Consider recruiting technology experts to fill open generation. board seats.  Invest in technology-focused director education.  Consider establishing a board-level technology committee or setting up a technology advisory board.  Integrate the topic of technology disruption into discussions about strategy and risk. ©2013, Committee of Sponsoring Organizations of the Treadway Commission COSO). Used by permission MANAGEMENT’S RISK IDENTIFICATION AND ASSESSMENT PROCESS Risk assessment involves a dynamic and ongoing process for identifying and assessing risks in order to achieve financial reporting objectives. Audit committees might consider whether management has assessed the risks associated with changes to company processes as a result of emerging technology projects and whether controls are in place to identify new risks as they arise. Audit committees may think about whether they have adequate access to technology expertise (which could be external). Audit committees also may consider what procedures are in place to help ensure that risk assessment of how technology impacts financial reporting is an ongoing exercise and does not become stale as technology evolves. OVERSIGHT IN ACTION What risks associated with the use of the emerging technology have management considered?  How has management identified and addressed fraud risks associated with emerging technology environments?  Has management considered additional transparency-related risks (e.g., risks related to the identification of related parties and illegal acts). If so, what are the plans to address these risks?  Were any new compliance or regulatory risks introduced by using the emerging technology? Has management considered the adequacy of the current risk assessment process relative to the risks introduced by the emerging technology? www.waims.co.in UNDERSTAND THE CONTROL ACTIVITIES: IDENTIFIED RISKS Control activities are the specific actions established to ensure that the risk of failing to meet an objective is mitigated to an appropriate level. Audit committees may seek to understand from management that control activities address:  How systems that rely on emerging technologies are ready to respond to financial reporting needs prior to deployment;  If the technology is functioning as intended and the output is reliable;  How emerging technologies will be tested and integrated with other systems;  How information technology (IT) considerations regarding unauthorized access, user provisioning, and segregation of duties are controlled; and  How important assets (including customer data and intellectual property assets) are safeguarded. If the emerging technology involves intermediaries or third parties, audit committees may want to understand how management has satisfied themselves that such organizations also operate in a well-controlled manner and do not pose a threat to timely and accurate financial reporting. OVERSIGHT IN ACTION: How has management assessed the current control environment to determine whether new controls are needed in response to the additional risks introduced by the emerging technology? Are controls in place to address the risk that the technology is not operating as intended (i.e., to assess the reliability of the outputs from the technology)? For an AI project, how is the introduction of bias in the data and algorithm used by the model prevented? What controls are in place to help ensure that those charged with oversight would be informed if a cyber- security breach occurred? ENDEAVOR 2019 | WAIMS ACADMIC PRESS 24 | P a g e