No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Risk

Examining Systems Output Controls

by James Bone
March 1, 2010
in Risk
Wooden blocks as stairs pointing up

Technology has become ubiquitous in the processing of millions of business transactions. Computer programs and analytical software have contributed to major increases in productivity, consistency and accuracy of today’s work product. Output controls ensure that computer programs process these transactions accurately and produce the results we expect to see. But what happens when things go wrong or undetected for long periods of time? We place tremendous faith in the accurate operation of these varied output controls. So what happens when system controls themselves are inadvertently changed without the proper authorization, testing, or verification?

System output controls are primarily automated controls but may include manual controls as well. Examples include controls that ensure holiday calendars accurately reflect current or future dates, proxy tabulations are cross-referenced with share counts and customer accounts, data is transmitted without change, and customer confirmations and account statements are complete. Manual controls may include macro uploads from excel spreadsheets into system databases for further processing. Or a manual step required to add a metadata tag to a file to ensure the correct information is posted to a website.

Why should I worry about output controls?

The following are a few examples that should illuminate the importance of focusing on output controls.

In March 2008, the Tokyo Stock Exchange stock trading system failed.

“The fundamental cause was the fact that the TSE did not adequately verify that the setting values that had been appropriate until this point were still currently effective and will continue to be effective in the future. The settings were not appropriate given the environmental change brought about by factors such as the enhanced processing capacity of both the Stock Trading System and trading participants’ systems, as well as participants’ diversified order placement methods.”

In the Washington post, February 7, 2004, a headline read “Shuttle Again Fails to Deploy Satellite as the Guidance System Malfunctions”

A headline from a Associated Press report from August 7, 2009, read “Airspeed Systems Failed on US Jets” . On at least a dozen recent flights by U.S. jetliners, malfunctioning equipment made it impossible for pilots to know how fast they were flying, federal investigators have discovered.

Remember the Y2K scare? Businesses spent millions of dollars to ensure that a simple change of the calendar from 1999 to 2000 would not shut down computer systems the world over! The lessons of Y2K are informative when thinking about the costs and complexity of system output controls. Namely, the expense of Y2K remediation could have been avoided had businesses incorporated a regular output controls assessment protocol .

Was Y2K a waste of money, or a prudent investment to ensure the smooth transition the world experienced? The answer to that question is beyond the analysis of this article. However, to prevent your own mini Y2K scare, now and in the future, it is critical to incorporate an annual periodic review of output controls into your toolkit of internal controls over financial reporting and operations.

Output Controls: Opportunities and challenges

The good news is that performing a review of output controls is not an expensive or labor intensive exercise. One should be able to tackle a few critical output controls each year until you have covered the key controls. The reviews can be conducted in weeks, not months and the intelligence gleamed from these exercises will help to improve your overall control environment.

To start, define the scope of the output controls review. One simple way to decide is to start with the most critical “customer output controls”. (Customer confirmations, monthly financial statements, prospectus delivery, web site controls, etc.) More complex output controls may include system application interfaces with spreadsheets and other upstream applications or change controls for financial databases.

These more complex output controls should be segregated into critical categories such as financial output controls, operations output controls, administrative output controls, or maintenance output controls where one system relies on the accuracy of another system to process data or complete transactional processing. Segregating these controls allows you to prioritize and easily manage the cycle of your review of these controls.

If you conduct annual SysTrust or SAS 70 audits, some of these controls will be tested as part of the independent exams performed by external auditors. External auditors increasingly rely on systems controls for assurance that financial controls are operating effectively. However, one should not rely solely on these examinations to assure themselves that all of their critical output controls are covered.

Once you have identified the scope of your review, assemble a small team of subject matter experts to begin the assessment process. Start with a simple assessment map of the controls: input, activity, output. Your SMEs should be able to determine who is accountable for the control, how the control is suppose to work, how to validate or test its accuracy, and to provide policies and procedures that ensure the controls are operating as designed.

Developing a visual map is critical to ensure all are in agreement that the key controls are presented in entirety and no gaps exist. Visual maps also help illuminate inter-dependencies across departments or other, more formal business line accountabilities. (Think of how many times one department believed another ensured the accuracy of data, only to find otherwise when a serious failure occurred.) Documenting in narrative form the controls and handoffs serves to clarify the controls operation and strengthen gaps that may exist.

The level of detail that one chooses to use is critical here. I would suggest that the reviews and details remain high level enough to ensure that an accurate representation of the controls map show the key controls and accountabilities. The goal of the exercise is to gain assurance that the output controls are accurate and operating effectively. “How do you know” questions typically lead to the desired response. The level of detail is subjective to the SMEs performing the assessment and the level of assurance one obtains from the documentation, reports, or tests performed on the controls.

Don’t repeat your own Y2K

A mini Y2K may exist at many firms in the form of service recoveries, customer rebates for inaccurate calculations, or financial statement restatements. How can these errors be avoided? By implementing a regular health check on your systems output controls you can reduce or eliminate a significant number of these problems.

In today’s fast paced environment where staff changes due to downsizing, business challenges and other demands adversely impact technology we must ensure that changes to our systems are truly understood end to end. If we fail to remember to ensure that one simple change in one application can have serious implications downstream in other applications we begin to build our own Y2K event down the road. There are many examples of a systems change in Year 1 not having an impact until Year 3 due to a change in product features not contemplated when the change occurred. If one is not re-validating assumptions about the operations of output controls IT professionals must be skeptical that business as usual is good enough!

**********

james bone on output controlsJames Bone founded Global Compliance Associates, LLC after more than 20 years in financial services to provide advanced compliance and operational risk approaches to firms seeking to enhance or build a compliance framework beyond the current “COSO” risk model.

James has successfully developed analytical approaches that quantify operational risk, audit, and compliance events to proactively model key controls and processes. Global Compliance Associates, LLC also works with third-party vendors to provide compliance, audit, and risk talent to address targeted or long-term internal control projects.


Tags: Internal Controls
Next Post

Internal Control Checklist: 5 Anti-Fraud Strategies to Deter, Prevent and Detect Fraud

James Bone

James Bone

James Bone’s career has spanned 29 years of management, financial services and regulatory compliance risk experience with Frito-Lay, Inc., Abbot Labs, Merrill Lynch, and Fidelity Investments. James founded Global Compliance Associates, LLC and TheGRCBlueBook in 2009 to consult with global professional services firms, private equity investors, and risk and compliance professionals seeking insights in governance, risk and compliance (“GRC”) leading practices and best in class vendors. James is a frequent speaker at industry conferences and contributing writer for Compliance Week and Corporate Compliance Insights and serves as faculty presenter and independent consultant for several global consulting firms specializing in governance, risk and compliance, IT compliance and the GRC vendor market. James created TheGRCBlueBook.com to provide risk and compliance professionals with transparency into the GRC vendor marketplace by creating a forum for writing reviews on GRC products and sharing success stories on the risk practices that are most effective. James is currently attending Harvard Extension School for a Master of Arts in Management with an emphasis in accounting and finance. James received an honorary PhD in Letters from Drury University in Springfield, Missouri and is a member of the Breech Business School Hall of Fame as well as the Missouri Sports Hall of Fame. Having graduated from the Boston University Graduate School of Education, James received his M.Ed. in Management and Organizational Design in 1997 and a Bachelor of Arts in Business Administration from Drury University in 1980.  

Related Posts

shipping containers aerial view

Beyond the Loading Dock: How Tariff Uncertainty Creates Financial Reporting Challenges

by Lara Long
July 23, 2025

Unpredictable global trade policies, led by a scattershot rollout of tariffs levied by the US, is having widespread implications across...

contactless payment

Can Virtual Credit Cards Outsmart Employee Fraud?

by Cher Pearsall
March 27, 2025

Emerging digital payment tools promise control over operational purchasing while maintaining efficiency

news roundup green bars

2 in 3 Legal Chiefs Also Managing Functions Like Risk, Compliance or Privacy

by Staff and Wire Reports
February 7, 2025

Analysis finds most US retirement plans contain regulatory or fiduciary violations; internal audit group finalizes cybersecurity requirement

uk parliament building

Your Liability for Fraud: Are You Looking the Right Way?

by Mark Hunting
January 31, 2025

Changes to UK regulation make companies responsible for third parties’ fraudulent conduct

Next Post
Internal Control Checklist: 5 Anti-Fraud Strategies to Deter, Prevent and Detect Fraud

Internal Control Checklist: 5 Anti-Fraud Strategies to Deter, Prevent and Detect Fraud

reminder to speak up
No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights