Chapter 2
Chapter 2
Chapter 2
Risk management
Chapter learning objectives
Lead Component
A2. Evaluate risk exposure (a) Evaluate the impact of risk
(b) Assess the likelihood of
risks.
(c) Analyse the interaction of
different risks
A3. Discuss ways of (b) Discuss risk tolerance,
managing risk. appetite and capacity
(c) Discuss risk management
frameworks
(d) Discuss risk analytics
C2. Recommend internal (a) Discuss the COSO risk
controls for risk management management framework
37
Risk management
1 Risk management
Risk management is defined as:
‘the process of understanding and managing the risks that the organisation is
inevitably subject to in attempting to achieve its corporate objectives’
CIMA Official Terminology
The traditional view of risk management has been one of protecting the
organisation from loss through conformance procedures and hedging
techniques – this is about avoiding the downside risk.
The new approach to risk management is about taking advantage of the
opportunities to increase overall returns within a business – benefiting
from the upside risk.
The following diagram shows how risk management can reconcile the two
perspectives of conformance and performance (as discussed previously in
chapter 1).
38
Chapter 2
39
Risk management
40
Chapter 2
41
Risk management
42
Chapter 2
43
Risk management
Benefits of ERM
Benefits of effective ERM include:
enhanced decision-making by integrating risks
reduced performance fluctuations and fewer interruptions to operations
the resultant improvement in investor confidence, and hence shareholder
value
focus of management attention on the most significant risks
a common language of risk management which is understood throughout
the organisation enabling performance improvement
increased ability to benefit from upside risk and reduced susceptibility to
downside risk
reduced cost of finance through effective management of risk.
improved utilisation of resources
increased opportunities for the organisation
44
Chapter 2
45
Risk management
46
Chapter 2
47
Risk management
Risk identification
The risk identification process will often be controlled by a risk committee
or risk management specialists (see later in this chapter).
The risks identified in the process should be recorded in a risk register,
which is simply a list of the risks that have been identified, and the
measures (if any) that have been taken to control each of them.
There are a variety of methods that can be used by businesses to identify
the risks that they face.
48
Chapter 2
49
Risk management
(7) Staff receive training every 2 years which highlights the risks. All
laptops are encrypted. Regular audits are undertaken. Any incidents
are reported to the Audit Committee.
(8) Overall risk rating = 7
(9) Encryption technology to be implemented which meets industry
standard.
(10) Mike Smith
(11) 31.7.X4
(12) Risk level target = 3
50
Chapter 2
51
Risk management
52
Chapter 2
Value at risk
Value at Risk (VaR) allows investors to assess the scale of the likely loss in
their portfolio at a defined level of probability. It is becoming the most widely
used measure of financial risk and is also enshrined in both financial and
accounting regulations.
VaR is based on the assumption that investors care mainly about the probability
of a large loss. The VaR of a portfolio is the maximum loss on a portfolio
occurring within a given period of time with a given probability (usually small).
Calculating VaR involves using three components: a time period, a
confidence level and a loss amount or percentage loss.
Statistical methods are used to calculate a standard deviation for the
possible variations in the value of the total portfolio of assets over a
specific period of time.
Making an assumption that possible variations in total market value of the
portfolio are normally distributed, it is then possible to predict at a given
level of probability the maximum loss that the bank might suffer on its
portfolio in the time period.
A bank can try to control the risk in its asset portfolio by setting target
maximum limits for value at risk over different time periods (one day, one
week, one month, three months, and so on).
VaR may be calculated as standard deviation × Z-score (the Z-score can
be found from the normal distribution tables).
Normal distribution
Normal distributions can be found when we measure things such as:
Exam results
Staff performance gradings
The heights of a group of people etc
A normal distribution has the following characteristics:
The mean is shown in the centre of the diagram and the curve is
symmetrical about the mean. This means that 50% of the values will be
below the mean and 50% of the values will be above the mean.
Note: The mean, median and mode will all be the same for a normal
distribution.
53
Risk management
How far the values spread out from the mean is the standard deviation.
This can be seen in the following diagram:
In general 68% of values are within one deviation (between -1 and 1),
95% of values are within two standard deviations (between -2 and 2) and
99.7% of values are within three standard deviations (between -3 and 3).
From this we can see that if we look at a set of data which fits a normal
distribution the majority of values will occur closer to the mean, with fewer
and fewer occurring the further from the mean we move.
54
Chapter 2
Where:
z is the score
x is the value being considered
µ is the mean
is the standard deviation
This calculation is used to convert any value to standard normal
distribution.
Looking up the normal distribution tables
Once we have calculated our 'z score' we can look this up on the normal
distribution table to find the area under the curve, which equates to the
percentage chance (probability) of that value occurring.
So if we calculated a z score of 1.00. From the table the value is 0.3413.
This means that (0.3413 ÷ 1.0) or 34.13% is the area shown from 0 -1 on
the diagram
From this we can deduce that 34.13% would be the area shown from 0 -1
on the diagram. So we can say that 68.26% of values will fall within one
standard deviation (-1 to 1).
55
Risk management
VaR calculation
For VaR, there are two types of calculation to consider:
(1) The confidence level that the result will be above a particular figure
– this is referred to as a one tail test.
(2) The confidence level that a figure will be within a particular range –
this is referred to as a two tail test.
In both cases we are working backwards from the percentage to find the
value of x.
One tail test
If you are asked to calculate the 95% VaR, this is a one tail test. As we
are looking at risk, it is usually about being 95% certain that the outcome
will be above a particular value.
50% of the distribution is on one side of the mean, within the tables we
are looking for as close to 0.4500.
We would be looking for 0.4750 in the tables, 47.5% above and below the
mean.
56
Chapter 2
57
Risk management
Example of VaR
Suppose a UK company expects to receive $14 million from a US
customer. The value in pounds to the UK company will depend on the
exchange rate between the dollar and pounds resulting in gains or losses
as the exchange rate changes. Assume that the exchange rate today is
$1.75/£ and that the daily volatility of the pound/dollar exchange rate is
0.5%.
Calculate the
(a) 1-day 95% VaR
(b) 1-day 99% VaR.
The value of the $14 million today is £8 million ($14 million ÷ $1.75/£) with
a daily standard deviation of £40,000 (0.5% × £8 million).
(a) The standard normal value (Z) associated with the one-tail 95%
confidence level is 1.645 (see Normal Distribution tables). Hence,
the 1-day 95% VaR is 1.645 × £40,000 = £65,800. This means that
we are 95% confident that the maximum daily loss will not exceed
£65,800. Alternatively, we could also say that there is a 5% (1 out of
20) chance that the loss would exceed £65,800.
(b) The standard normal value (Z) associated with the one-tail 99%
confidence level is 2.33 (see Normal Distribution tables). Hence, the
1-day 99% VaR is 2.33 × £40,000 = £93,200. Thus, there is a 1% (1
out of 100) chance that the loss would exceed £93,200.
If we wanted to calculate the VaR for longer period, say 5 days, at
the 95% level the calculation would be:
5 day 95% VaR = 1 day 95% VaR × √5 = £65,800 × 2.236 =
£147,133
There is a 5% chance that the company’s foreign exchange loss
would exceed £147,133 over the next 5 days.
Similarly, the 30-day 99% VaR would be:
1 day 99% VaR × √30 = £93,200 × 5.477 = £510,477
This illustrates the longer the holding period, the greater the VaR.
58
Chapter 2
Regression analysis
This can be used to measure a company’s exposure to several risk factors at
the same time. This is done by regressing changes in the company’s cash flows
against the risk factors (changes in interest rates, exchange rates, prices of key
commodities such as oil). The regression coefficients will indicate the
sensitivities of the company’s cash flow to these risk factors.
The drawback with this technique is that the analysis is based on historical
factors which may no longer be predictors of the company in the future.
59
Risk management
Simulation analysis
This is used to evaluate the sensitivity of the value of the company, or its cash
flows, to a variety of risk factors. These risk factors will be given various
simulated values based on probability distributions, and the procedure is
repeated a number of times to obtain the range of results that can be achieved.
The mean and standard deviation are then calculated from these results to give
an expected value and measure of the risk.
This technique can be complex and time-consuming to carry out, and is limited
by the assumptions of the probability distributions.
Other methods of measuring or assessing the severity of an identified risk
include:
scenario planning – forecasting various outcomes of an event;
decision trees – use of probabilities to estimate an outcome;
sensitivity analysis – asking 'what-if?' questions to test the robustness of a
plan. Altering one variable at a time identifies the impact of that variable.
60
Chapter 2
61
Risk management
Example
The following simple risk map might be prepared for a firm of auditors
Impact/consequences
Low High
High New audit Loss of non-audit
regulations for the work from
profession existing clients
Probability/likelihood Low Increases in Loss of audit
salaries above the clients within the
general rate of next two years.
inflation
Using a risk map
A risk map immediately indicates which risks should be given the highest
priority.
High-probability, high-impact risks should be given the highest
priority for management, whether by monitoring or by taking steps to
mitigate the risk.
Low-probability, low-impact risks can probably be accepted by the
organisation as within the limits of acceptability.
High-probability, low-impact risks and low-probability, high-impact
risks might be analysed further with a view to deciding the most
appropriate strategy for their management.
For each high-probability, high-impact risk, further analysis should be
carried out, with a view to:
estimating the probability of an adverse (or favourable) outcome
more accurately, and
assessing the impact on the organisation of an adverse outcome.
This is an area in which the management accountant should be able
to contribute by providing suitable and relevant financial information.
An alternative layout for a risk map (other than the cruciform style shown
above) would be a tabular format. The table might have the following
columns:
(1) The risk name e.g. fraud.
(2) The likelihood of that risk arising e.g. medium.
(3) The impact of the risk if it does arise e.g. high.
(4) Controls already in place.
(5) The risk owner i.e. the name of a manger or director who watches
out for this risk arising.
(6) Whether assurance is sufficient. This might be given a score out of,
say, 10, or a yes/no type response.
(7) Controls to be implemented in the future.
62
Chapter 2
63
Risk management
Assuming that the business does want to manage its risks a number of methods
can be used. These methods will limit the risks, and the overall risk
management strategy may define how the risks will be managed and the way
these methods will interact.
Avoid risk
A company may decide that some activities are so risky that they should
be avoided.
This will always work but is impossible to apply to all risks in commercial
organisations as risks have to be taken to make profits.
64
Chapter 2
Transfer risk
In some circumstances, risk can be transferred wholly or in part to a third
party.
A common example of this is insurance. It does reduce/eliminate risks but
premiums have to be paid.
Pool risks
Risks from many different transactions can be pooled together: each
individual transaction/item has its potential upside and its downside. The
risks tend to cancel each other out, and are lower for the pool as a whole
than for each item individually.
For example, it is common in large group structures for financial risk to be
managed centrally.
Diversification
Diversification is a similar concept to pooling but usually relates to different
industries or countries.
The idea is that the risk in one area can be reduced by investing in
another area where the risks are different or ideally opposite.
A correlation coefficient with a value close to –1 is essential if risk is to be
nullified.
65
Risk management
66
Chapter 2
Risk reduction
Even if a company cannot totally eliminate its risks, it may reduce them to
a more acceptable level by a form of internal control.
The internal control would reduce either the likelihood of an adverse
outcome occurring or the size of a potential loss.
The costs of the control measures should justify the benefits from the
reduced risk.
More will be seen on internal controls in chapter 5.
67
Risk management
Hedging risks
Hedging is considered in detail in F3.
The concept of hedging is reducing risks by entering into transactions with
opposite risk profiles to deliberately reduce the overall risks in a business
operation or transaction.
Risk sharing
A company could reduce risk in a new business operation by sharing the
risk with another party.
This can be a motivation for entering into a joint venture.
68
Chapter 2
69
Risk management
70
Chapter 2
71
Risk management
Scenario
You are the management accountant of a large private company,
Twinkletoes. Twinkletoes manufactures a high volume of reasonably
priced shoes for elderly people. The company has a trade receivables
ledger that is material to the financial statements containing four different
categories of account. The categories of account, and the risks
associated with them, are as follows:
(i) small retail shoe shops. These accounts represent nearly two thirds
of the accounts on the ledger by number, and one third of the
receivables by value. Some of these customers pay promptly,
others are very slow;
(ii) large retail shoe shops (including a number of overseas accounts)
that sell a wide range of shoes. Some of these accounts are large
and overdue;
(iii) chains of discount shoe shops that buy their inventory centrally.
These accounts are mostly well-established `high street' chains.
Again, some of these accounts are large and overdue; and
(iv) mail order companies who sell the company's shoes. There have
been a number of large new accounts in this category, although
there is no history of irrecoverable debts in this category.
Receivables listed under (ii) to (iv) are roughly evenly split by both value
and number. All receivables are dealt with by the same managers and
staff and the same internal controls are applied to each category of
receivables. You do not consider that using the same managers and
staff, and the same controls, is necessarily the best method of managing
the receivables ledger.
Trigger
Twinkletoes has suffered an increasing level of irrecoverable debts and
slow payers in recent years, mostly as a result of small shoe shops
becoming insolvent. The company has also lost several overseas
accounts because of a requirement for them to pay in advance.
Management wishes to expand the overseas market and has decided
that overseas customers will in future be allowed credit terms.
Task
Management has asked you to classify the risks associated with the
receivables ledger in order to manage trade receivables as a whole more
efficiently. You have been asked to classify accounts as high, medium or
low risk.
Write an email to the finance director:
(a) Classifying the risks relating to the four categories of trade
receivables as high, medium or low and explain your classification
(Note: More than one risk classification may be appropriate within
each account category.)
72
Chapter 2
6 Risk reporting
Risk reports now form part of UK annual reports. It is an important disclosure
requirement. (Examples of these are available on larger companies’ websites.
Candidates are encouraged to read some.)
Managers of a business, and external stakeholders, will require information
regarding the risks facing the business. A risk reporting system would include:
A systematic review of the risk forecast (at least annually).
A review of the risk strategy and responses to significant risks.
A monitoring and feedback loop on action taken and assessments of
significant risks.
A system indicating material change to business circumstances, to provide
an ‘early warning’.
The incorporation of audit work as part of the monitoring an information
gathering process.
Within Marks and Spencer's annual report for 2013 there is a risk report
section. This has been duplicated in part below.
It states their approach to risk management and key areas of focus:
What is our approach to risk management?
The Board has overall accountability for ensuring that risk is effectively
managed across the Group and, on behalf of the Board, the Audit
Committee reviews the effectiveness of the Group Risk Process.
Risks are reviewed by all business areas on a half-yearly basis and
measured against a defined set of likelihood and impact criteria. This is
captured in consistent reporting formats, enabling Group Risk to
consolidate the risk information and summarise the key risks in the form
of the Group Risk Profile.
Our Executive Board discusses the Group Risk Profile ahead of it being
submitted to the Group Board for final approval.
To ensure our risk process drives improvement across the business, the
Executive Board monitors the ongoing status and progress of action
plans against key risks on a quarterly basis.
Risk remains an important consideration in all strategic decision-making
at Board level, including debate on risk tolerance and appetite
73
Risk management
74
Chapter 2
Economic outlook
Economic conditions worsen or do not improve, impacting our ability to
deliver the plan
As consumers’ disposable incomes come under pressure from price
inflation and government austerity measures, trading conditions continue
to remain a challenge for our business.
Mitigating activities:
Proactive management of costs
Regular review of customer feedback and marketplace positioning
Continued focus on value proposition in the context of a balanced
product offer, including market leading innovation
Ongoing monitoring of pricing and promotional strategies
Regular commercial review of product performance
Food safety and integrity
A food safety or integrity related incident occurs or is not effectively
managed
As a leading retailer of fine quality fresh food, it is of paramount
importance that we manage the safety and integrity of our products and
supply chain, especially in light of the business’ greater operational
complexity and the heightened risk of fraudulent behaviour in the supply
chain.
Mitigating activities:
Dedicated team responsible for ensuring that all products are safe
for consumption through rigorous controls and processes
Continuous focus on quality
Proactive horizon scanning including focus on fraud and
adulteration
Established supplier and depot auditing programme
(The risk report continues for several pages covering many other risks.)
The Group Risk Profile reflects the most important risks facing the
business at this point in time; these risks receive specific attention by the
Board to ensure that sufficient mitigating activity is in place to reduce net
risk to an acceptable level. The Group Risk Profile will evolve as these
mitigating activities succeed in reducing the residual risk over time, or
new risks emerge. As such, we have removed a number of risks from our
Group Risk Profile since the prior year:
Last year we included Business continuity on the Group Risk Profile in
response to the heightened level of risk driven by the UK’s summer 2012
events. With the risk now returning to a normal level it has been removed,
recognising the strength of our controls in this area
75
Risk management
76
Chapter 2
77
Risk management
If the residual risk is considered to be too great then the company will
need to:
not expose itself to the risk situation; or
put in place better controls over the risk.
The amount of residual risk a company can bear is ultimately a
management decision.
It is possible to measure that residual risk, possibly as a proportion of
profit/capital/turnover, in order to help management make that
judgement.
78
Chapter 2
79
Risk management
Cost-benefit example
A manufacturing company is concerned about the rate of rejected items
from a particular process. The current rejection rate is 5% of items input,
and it has been estimated that each rejected item results in a loss to the
company of $10.Each day 600 items go through the process.
It is estimated that by introducing inspections to the process, the rejection
rate could be reduced fairly quickly to 3%. However, inspections would
result in an increase of costs of $70 per day.
Required:
How should this control through inspection be evaluated?
Solution
The example is a simple one, but it is useful for suggesting an approach
to risk management and control evaluation.
80
Chapter 2
Risk identification is very important, because risks are often interrelated. This
means that if one risk is more likely or will have a more significant impact for an
organisation, then it may be more likely to be exposed to other risks or more
susceptible to other risks.
This is a theme throughout P3, but it is highlighted to here to make sure that it is
something that is in your thought processes as you go through the rest of the
material.
Here are some examples:
81
Risk management
82
Chapter 2
Risks combining
A company could be considering the risk of somebody breaking into a
warehouse to steal some of the inventory. The company has controls in
place already, with an alarm system fitted, and security guards patrolling
the warehouse.
They have identified the following:
The risk of an intruder getting past the alarm is 30%
The risk of an intruder getting past the guards is 25%
This means the overall risk of the intruder getting in is:
0.3 × 0.25 = 7.5%
One of the treatments of risk discussed in this chapter is diversification, and the
idea of creating a portfolio of products or services to help manage risks. This is
another example of how risks interact. In this case we are considering the up
and downside risk that we first discussed in chapter 1. The portfolio will have
different risks and the idea is that they could offset one another – one product
does well while another struggles. In an ideal world all of the organisation’s
portfolio does well, but if demand is affected by different factors then they might
tend to even out overall.
83
Risk management
If the company being considered is divisional there may be a risk officer for
each division who will help to identify and manage tactical and operational level
risks.
84
Chapter 2
All employees have a role and responsibility for risk too. You should be aware
of possible risks (through policies issued and training given) and you should be
audible if you believe a risk needs to be managed (by reporting it to your
manager or by whistleblowing).
85
Risk management
Northern Rock
86
Chapter 2
A bank run (the first on a UK bank for 150 years) on Northern Rock by its
customers led to the government providing ‘lender of last resort’ funding
and guarantees for the bank’s depositors totalling about £20 billion. The
result was a 90% fall in the bank’s share price, a deteriorating credit
rating and a loss of reputation. The CEO resigned and several directors
also left the board.
Northern Rock had a formal approach to risk management, including
liquidity, credit, operational and market risk, fully described in its
Securities and Exchange Commission filings. Northern Rock’s assets
were sound so there was no significant credit risk. Market risk was also
well managed in terms of interest rate and foreign exchange exposure.
However, despite formal procedures and a demonstrated compliance
with regulations, there was an assumption by managers that access to
funds would continue unimpeded. The US sub-prime crisis led to liquidity
risk materialising, causing the Northern Rock problems. The
consequence was also the loss of reputation that followed press reports
which blamed the bank’s management for not having a contingency plan
to cover the possibility of disruption to its funding – an operational risk. It
is likely that the board of Northern Rock failed in monitoring both liquidity
risk and the effectiveness of the existing controls.
The lesson of Northern Rock is that we need to move beyond the tick-box
approach to compliance and that good governance requires a more
insightful approach to risk management and internal control.
87
Risk management
88
Chapter 2
Scenario
L manufactures a range of very high quality tinned foods. The company
was established eight years ago and it has grown steadily by selling to
independent grocers in prosperous areas. Most consumers associate
tinned food with poor quality and are unwilling to pay high prices.
However, the consumers who buy L’s products are willing to pay a
premium for higher quality.
L’s only large customer is H, a major supermarket chain that has a
reputation for selling high-quality produce. L began sales to H just under
a year ago, with H purchasing small quantities of L’s most popular
product in order to assess demand. After a successful period of test
marketing, H started to place larger orders with L. Now H accounts for
20% of L’s sales by volume.
89
Risk management
Trigger
L has traditionally had a functional organisational structure. There is a
director in charge of each of sales, production, finance and human
resources. Each director has a team of senior managers who support
their function. The hierarchy for organising and supervising staff is
generally based on this functional structure. The only exception arose on
the appointment of Peter, who is the Account Manager in charge of L’s
dealings with H. H insisted on the appointment of a designated account
manager as a condition of placing regular, large orders with the company.
Peter is the designated point of contact on all matters between L and H.
Peter’s job description states that he is responsible for all decisions,
including pricing, relating to L’s relationship with H and that he is
expected to base all such decisions on the promotion of L’s commercial
interests.
There have been a number of complaints from L’s managers since
Peter’s appointment. These include several occasions when staff have
received contradictory instructions. For example, Peter has ordered the
production department to give priority to H’s requests for large deliveries,
even though that has led to regular orders to other customers being
delayed. Peter has also told the staff in the credit control department not
to press H for payment even though the company had several overdue
invoices.
L’s Sales Director believes that the company could sell even greater
quantities to H and that other large supermarket chains will start placing
orders in the near future once H has demonstrated that there is a
demand for high quality tinned food. She has warned L’s Chief Executive
that additional account managers will have to be employed in the event
that L starts to supply further supermarket chains.
Task
Write a report to the Board of L which:
(a) Evaluates the potential risks that might arise from L’s appointment
of an account manager to deal with H’s business; and
(b) Recommends, stating reasons, the changes that L’s board should
introduce in order to minimise the threats arising from having an
autonomous account manager.
(40 minutes)
90
Chapter 2
Scenario
D is a dental practice that was established eight years ago. The practice
was founded by six dentists, each of whom has an equal share.
Trigger
The six dentists have decided that they should undertake a formal
evaluation of the risks affecting their business. To that end, they have
engaged a consultant to act as a facilitator.
The facilitator began with a brainstorming session. The dentists were
provided with a flipchart and they were asked to list as many risks as they
could think of. Then the risks were transferred to a risk map based on the
TARA framework. A simplified version of the risk map is shown below:
Impact/consequences
Low High
High Reduce Avoid
Negligence Cross infection
claims arising
from failed dental
Probability/likelihood implants
Low Accept Transfer/share
Spiral staircase Unknown
allergies
All six dentists agreed that each of these risks is worth classifying, but
there was considerable debate as to where each should appear on the
risk map. The facilitator has used the opinion of the dentist who identified
the risk as a starting point and has asked for some discussion as to how
best to classify each.
Dental implants
Dental implants are false teeth that are rooted in the patient’s jaw using
titanium screws. Fitting an implant is a very time-consuming and
expensive procedure that costs the patient in excess of GBP 2,000. The
patient’s bone structure usually accepts the implant and fuses with it to
form a very strong bond. In 3-5% of cases the implant causes an adverse
reaction and has to be removed. The practice warns patients of this
possibility and does not offer any refund in this event because the failure
is beyond the dentist’s control. Some patients who suffer an adverse
reaction do seek compensation despite these warnings, alleging
negligence on the part of the dentist.
91
Risk management
Cross infection
Cross infection can occur when patients pass infections on to the dental
staff (and vice versa) or when dental instruments transmit infections
between patients. Apart from the need to work in close proximity to the
patient, dental procedures always involve contact with the patient’s saliva
and can sometimes involve contact with blood if a tooth is extracted or
the patient’s gums bleed.
Spiral staircase
The dental surgery is located one floor up from street level. Patients enter
via a narrow hallway and climb to the reception using a narrow spiral
staircase. The building cannot be remodelled to accept a lift or a more
suitable staircase.
Unknown allergies
The dentists are often required to prescribe antibiotics and other drugs in
order to treat gum infections. These can cause severe allergic reactions
that are impossible to foresee unless the patient has been prescribed that
drug in the past and has notified the practice of this allergy.
Task
(a) Discuss the benefits that the dental practice may obtain from the
risk mapping exercise described above.
(b) Critically evaluate the placing of each of the identified risks in the
risk map, stating with reasons whether or not you agree with the
placement.
(30 minutes)
92
Chapter 2
“Directors of banks will be asked to pay a fee to the bank for the privilege
of being a director. This fee will be set by the remuneration committee of
each bank. Directors will be paid a bonus based solely on appropriate
profit and growth indicators. The more the bank succeeds, the higher will
be the bonus. This proposal directly links performance of the bank to
directors’ pay. I see this as a more realistic option than simply limiting
salaries or bonuses by statute as proposed at the recent central bank
governors’ conference.”
B Bank board and strategy
The constitution of the board of B Bank is in accordance with the
internationally agreed code of corporate governance.
Overall board strategy has been to set targets based on previous
(profitable) experience, with increased emphasis on those areas where
higher potential profits can be made such as mortgage lending (this is
discussed below). The bank’s executive information systems are able to
compute relative product profitability, which supports this strategy. This
strategy generated substantial profits in recent years. The last major
strategy review took place four years ago. Non-executive directors do not
normally query the decisions of the executive directors.
In recent years, the profile of the major shareholders of the bank has
moved. Traditionally the major shareholders were pension funds and
other longer term investors but now these are overshadowed by hedge
funds seeking to improve their short-term financial returns.
One of the major sources of revenue for the bank is interest obtained on
lending money against securities such as houses (termed a “mortgage” in
many countries) with repayments being due over periods varying
between 15 and 25 years. Partly as a result of intense competition in the
mortgage market, the values of the mortgages advanced by B Bank
regularly exceed the value of the properties. For example, B Bank has
made advances of up to 125% of a property’s value. Internal reports to
the board estimate that property prices will reverse recent trends and will
rise by 7% per annum for at least the next 10 years, with general and
wage inflation at 2%. B Bank intends to continue to obtain finance to
support new mortgages with loans from the short-term money-markets.
Task
Write a report to the Board:
(a) Evaluating the proposal made by the governor of the central bank;
and
(b) Evaluating the risk management strategy in B Bank (except for
consideration of directors’ remuneration). Your evaluation should
include recommendations for changes that will lower the bank’s
exposure to risk.
(45 minutes)
93
Risk management
Scenario
W is a leading manufacturer of consumer electronics devices. The
company has a significant share of the markets for mobile phone and
personal music players (“mp3 players”).W’s main areas of expertise are
in design and marketing. The company has a reputation for developing
innovative products that set the trend for the market as a whole. New
product launches attract a great deal of press interest and consequently
W spends very little on advertising. Most of its promotional budget is
spent on maintaining contact with leading technology journalists and
editors.
Manufacturing and supply
W does not have a significant manufacturing capacity. New products are
designed at the company’s research laboratory, which has a small factory
unit that can manufacture prototypes in sufficient quantity to produce
demonstration models for test and publicity purposes. When a product’s
design has been finalised W pays a number of independent factories to
manufacture parts and to assemble products, although W retains control
of the manufacturing process.
W purchases parts from a large number of suppliers but some parts are
highly specialised and can only be produced by a small number of
companies. Other parts are standard components that can be ordered
from a large number of sources. W chooses suppliers on the basis of
price and reliability.
All assembly work is undertaken by independent companies. Assembly
work is not particularly skilled, but it is time consuming and so labour can
cost almost as much as parts.
W has a large procurement department that organises the
manufacturing process. A typical cycle for the manufacture of a
batch of products is as follows:
W’s procurement department orders the necessary parts from parts
suppliers and schedules assembly work in the electronics factories.
The parts are ordered by W but are delivered to the factories where
the assembly will take place.
The finished goods are delivered directly to the customer.
This is a complicated process because each of W’s products has at least
100 components and these can be purchased from several different
countries.
94
Chapter 2
Supplier communications
W insists on communicating with its suppliers via electronic data
interchange (EDI) for placing orders and also for accounting processes
such as invoicing and making payment. This is necessary because of the
degree of coordination required for some transactions. For example, W
may have to order parts from one supplier that are then delivered to
another supplier to carry out some assembly work. Both suppliers have to
be given clear and realistic deadlines so that the resulting assemblies are
delivered on time to enable W to meet its own deadlines.
Trigger
W recently launched a new range of mp3 players. The launch of the first
batches of players attracted a great deal of adverse publicity:
The supplier which produces the unique memory chips used in the mp3
player was unable to meet the delivery deadlines and that delayed the
launch. The supplier owns the patent for the design of these memory
chips.
Supplies of the memory chip are now available. The assembly factories
have been asked to increase their rates of production to shorten the
timescale now that the memory chips have become available.
Task
Write a report to W's finance director:
(a) Evaluating THREE operational risks associated with the
manufacture of W’s products including an explanation of how each
of these risks could be managed; and
(b) Evaluating the risks associated with the use of EDI for managing
W’s ordering and accounting processes.
(45 minutes)
Scenario
SPM is a manufacturer and distributor of printed stationery products that
are sold in a wide variety of retail stores around the country. There are
two divisions: Manufacturing and Distribution. A very large inventory is
held in the distribution warehouse to cope with orders from retailers who
expect delivery within 48 hours of placing an order.
SPM’s management accountant for the Manufacturing division charges
the Distribution division for all goods transferred at the standard cost of
manufacture, which is agreed by each division during the annual budget
cycle. The Manufacturing division makes a 10% profit on the cost of
production but absorbs all production variances. The goods transferred to
Distribution are therefore at a known cost and physically checked by both
the Manufacturing and the Distribution division staff at the time of
transfer.
95
Risk management
Trigger
The customer order process for SPM’s Distribution division is as follows:
SPM’s customer service centre receives orders by telephone, post,
fax, email and through a new on-line Internet ordering facility (a
similar system to that used by Amazon). The customer service
centre checks the creditworthiness of customers and bundles up
orders several times each day to go to the despatch department.
All orders received by the despatch department are input to SPM’s
computer system which checks stock availability and produces an
invoice for the goods.
Internet orders have been credit checked automatically and stock
has been reserved as part of the order entry process carried out by
the customer. Internet orders automatically result in an invoice being
printed without additional input.
The despatch department uses a copy of the invoice to select goods
from the warehouse, which are then assembled in the loading dock
for delivery using SPM’s own fleet of delivery vehicles.
When SPM’s drivers deliver the goods to the customer, the
customer signs for the receipt and the signed copy of the invoice is
returned to the despatch office and then to the accounts
department.
SPM’s management accountant for the Distribution division
produces monthly management reports based on the selling price of
the goods less the standard cost of manufacture. The standard cost
of manufacture is deducted from the inventory control total which is
increased by the value of inventory transferred from the
manufacturing division. The control total for inventory is compared
with the monthly inventory valuation report and while there are
differences, these are mainly the result of write-offs of damaged or
obsolete stock, which are recorded on journal entry forms by the
despatch department and sent to the accounts department.
Due to the size of inventory held, a physical stocktake is only taken once
per annum by Distribution staff, at the end of the financial year. This has
always revealed some stock losses, although these have been at an
acceptable level. Both internal and external auditors are present during
the stocktake and check selected items of stock with the despatch
department staff. Due to the range of products held in the warehouse, the
auditors rely on the despatch department staff to identify many of the
products held.
Task
(a) Evaluate any weaknesses in the risk management approach taken
by SPM’s Distribution division and how this might affect reported
profitability. (30 minutes)
(b) Recommend internal control improvements that would reduce the
likelihood of risk. (15 minutes)
96
Chapter 2
Scenario
The operations division of ABC, a listed company, has responsibility to
maintain and support the sophisticated computer systems used for call
centres and customer database management. These are relied on by the
organisation’s retail customers as many of their sales are dependent on
access to these systems, which are accessed over the Internet.
Although there is no risk management department, ABC has a large
number of staff in the operations division devoted to disaster recovery.
Contingency plans are in operation and data are backed up regularly and
stored off-site. However, pressures for short-term profits and cash flow
have meant that there has been a continuing under-investment in capital
equipment.
97
Risk management
Trigger
A review of disaster recovery found that although data were backed up
there was a real risk that a severe catastrophe such as fire or flood would
have wiped out computer hardware and although data back-up was off-
site, there was no proven hardware facility the company could use. While
managers have relied on consequential loss insurance, they appear to
have overlooked the need to carry out actions themselves to avoid or
mitigate any possible loss.
Task
Write a report to the Board:
(a) Advising on the main business issue for ABC and the most
significant risks that ABC faces; (10 minutes)
(b) Advising them on their responsibilities for risk management and
recommending a risk management system for ABC that would more
effectively manage the risks of losing business continuity.
(30 minutes)
(c) Evaluating the likely benefits for ABC of an effective risk
management system for business continuity. (5 minutes)
10 The exam
The models and frameworks detailed in this chapter are a starting point for the
exam, however, candidates need to be able to use their common sense in order
to relate this material to exam questions in both the P3 objective test and the
strategic case study exam.
98
Chapter 2
11 Chapter summary
99
Risk management
100
Chapter 2
101
Risk management
For a restaurant:
Impact/consequences
Low High
High A staff member is Head chef
taken ill and resigns
cannot work
C, D and E
Option A – managers may not agree on the key risks facing HH.
The risk map will force them to discuss risks but not to reach a
consensus.
Option B – the legal disputes are ongoing and a new risk map is
unlikely to help with historical cases.
Options C, D and E are benefits.
102
Chapter 2
103
Risk management
104
Chapter 2
105
Risk management
B, C and D
Option A – responses to significant risks only.
Option E – such a review should be carried out at least annually.
106
Chapter 2
A, B and F
Option A – as they will receive a significant fine, this will increase
the financial pressure on the company.
Option B – as disposal of waste is their core work, companies may
be reluctant to use them having breached regulations.
Option F – the issue occurred through employee malfeasance, and
suggests a lack of controls are in place which could mean that fraud
is more likely.
Option C, D and E – There are no commodities or foreign currencies
involved and economic risk links to how changes in the economy
will affect the business.
107
Risk management
108
Chapter 2
109
Risk management
110
Chapter 2
Spiral staircase
The staircase could prevent disabled or infirm patients from
obtaining access to the practice. It may be that a potential patient
will choose to make this a matter of principle and complain that the
practice has not made adequate provision for the disabled. Legally,
the practice is not under any obligation to do more than make
reasonable provision for access and there is no practical solution
that could be offered.
It is unlikely that the impact will be significant. The practice is
already well established, so it has already attracted a viable number
of patients who can cope with this access problem. Any complaints
can be addressed by a polite comment to the effect that the practice
is located in a building that cannot accommodate a lift or a
conventional staircase.
Given that there is no viable response to this risk, it really has to be
accepted in almost any case. Dealing with it would require an
extreme and potentially disproportionate response, such as moving
to new premises.
Allergies
The probability that a patient will suffer an allergic reaction is low.
Pharmaceutical products are tested to ensure that they do not
generally cause reactions. Patients will, hopefully, be aware of most
allergies that they suffer from and the dental practice can record
those in patient files.
The impact of an allergic reaction is probably not high for the
practice, despite the fact that it could be a serious matter for the
patient. Provided the dentist has prescribed the antibiotic in good
faith there is very little risk that the practice will be in trouble for
prescribing a relevant drug to treat an infection. The dentist should
always check that the patient’s medical history is up to date in order
to ensure that there is no reason to avoid any particular medication.
Provided that has been done, any reaction will be viewed as an
unfortunate accident rather than medical negligence.
111
Risk management
112
Chapter 2
113
Risk management
114
Chapter 2
115
Risk management
116
Chapter 2
W has no direct control over the quality of its products, which may
lead to customer dissatisfaction. Parts are sourced from many
different suppliers and so it will be difficult for W to ensure that
every component is manufactured to the required tolerances.
Manufacturing staff at the component and assembly factories will
not feel that they are part of W and they may resent the fact that
they do not enjoy the security of working for a large organisation.
The owners and managers of the factories may not feel that there is
a huge incentive to do much more than meet the minimum
standards for quality and delivery because they may be replaced at
the conclusion of their contract. W can control that risk by
introducing quality checks on both components and finished goods.
W could request samples on a random basis and check these
thoroughly. W could also have a policy of rewarding reliable
suppliers by retaining them and giving them as much work as
possible so that they have an incentive to exceed expectations.
The global nature of W’s manufacturing process creates logistical
problems for manufacturing. Manufacturing may be disrupted by
delays in delivery, which could be outside the control of W and its
suppliers. For example, electronic components are frequently
transported by air freight, which can be affected by weather or
industrial action. Goods crossing international borders can be
delayed by customs inspections. One way round this would be to
localise sources as much as possible, with suppliers for minor parts
such as screws and plastic cases chosen for proximity to the
assembly factories even if they are not necessarily the cheapest. W
might use a specialist logistics company to manage the transport of
parts and assemblies so that there is clarity as to who is
responsible for any logistical problems. W might also have a policy
of keeping safety stocks of all but the most expensive parts and
assemblies to cover any disruption.
(b) EDI
EDI is potentially more efficient than more traditional methods of
communication. W has a very complicated manufacturing process
and EDI makes it possible to break the task of ordering and paying
for a batch of completed mp3 players much simpler. In theory, this
system will reduce W’s staffing costs considerably. The system will
place orders and will keep track of inventory as it is received. The
bookkeeping will be done automatically because invoices will be
received, recorded and passed for payment electronically.
The problem with W is that it does not really have a long-term
relationship with all of its suppliers. It is possible that many of the
suppliers it uses will be replaced in the medium or even the short
term if a cheaper source becomes available. For example, a shift in
currencies could make an alternative source of labour for fabrication
tasks cheaper than the present supplier. Potential suppliers might
not be prepared to install the necessary technology and that could
restrict W’s sources.
117
Risk management
118
Chapter 2
These stock losses or theft may not be accurately recorded and the
reported profits of SPM may overstate profits if physical inventory
does not match that shown in the accounting records. Stock of
stationery is easy to dispose of and losses can easily happen due to
error or carelessness, for instance through water damage, dropping
and so on. The possibility of theft of stock which can readily be sold
in retail stores is also high and the consequences of not identifying
stock losses or theft might be severe over a period of time. There is
a risk that inventory records may substantially overstate the physical
stock. There is a serious limitation of accounting here as it relies on
computer records and a stocktake process that may be severely
impaired and hence there may be hidden losses not reflected in
SPM’s reported financial statements.
Fraud is dishonestly obtaining an advantage, avoiding an obligation
or causing a loss to another party. Those committing fraud may be
managers, employees or third parties, including customers and
suppliers. There are three conditions for fraud to occur: dishonesty,
opportunity and motive. If stock theft is occurring, the weakness in
systems due to the lack of separation of duties provides an
opportunity. Personnel policies and supervision may influence
dishonesty and employment or social conditions among the
workforce may influence motive.
As for all other risks, a risk management strategy needs to be
developed for fraud. This strategy should include fraud prevention;
the identification and detection of fraud and responses to fraud.
Existing risk treatment does not appear to be adequate due to the
lack of separation of duties, the possibility of fraud and the reliance
of internal and external auditors on the Distribution division’s staff.
(b) The main recommendation is for the separation of duties in SPM’s
distribution division. The customer service centre should process all
customer orders, even though this may mean transferring staff from
the despatch department. It may be more effective to use a
document imaging system to reduce paperwork by converting
orders into electronic files that are capable of being read by
computer programs and transferred to the despatch department.
Further separation can be carried out by sending signed paperwork
evidencing delivery to the accounts department and for all write offs
of stock losses due to damage or obsolescence to be carried out by
the accounts department. Finally, the reliance on Distribution staff
for stocktaking needs to be reduced and accountants and internal
auditors need to play a more prominent role in physical counting
and reconciling to computer records.
The second recommendation is for greater emphasis on controls to
prevent dishonesty. These include pre-employment checks, scrutiny
of staff by effective supervision, severe discipline for offenders and
strong moral leadership. Motive can be influenced by providing good
employment conditions, a sympathetic complaints procedure, but
dismissing staff instantaneously where it is warranted.
119
Risk management
120
Chapter 2
121
Risk management
122
Chapter 2
Conclusions
The main risk for ABC is the lack of a disaster recovery plan as this
has an effect on business continuity.
The board is responsible for maintaining a sound system of internal
control to safeguard shareholders’ investment and the company’s
assets.
The benefits of effective risk management outweigh the costs.
123
Risk management
124