You are on page 1of 6

Chapter 08

Consideration of Internal Control in an Information Technology Environment

Many systems have developed away from centralized systems with one main frame computer using user developed software to a combination of smaller computers using commercially available software
!!

Less expensive software


! Electronic checkbooks (e.g., Quicken)

!!

Moderate system
! Basic general ledger system (e.g.., QuickBooks)

!!

Expensive
! ERP systems (e.g., SAP)
8-2

McGraw-Hill/Irwin

Copyright 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

"!Usually
!!

consists of: Hardware !Digital computer and peripheral equipment !! Software !Various programs and routines for operating the system
8-3

Input/Output Devices Storage

Central Processing Unit

Auxiliary

Card Readers Terminals Electronic Cash Registers Optical Scanners Magnetic Tape Drives Magnetic Disk Drives Optical Compact Disks

Arithmetic Unit Control Unit Primary Storage

Magnetic Disks Magnetic Drums Magnetic Tapes Optical Compact Disks

8-4

"!Two
!!

Types:

Systems software
! Programs that control and coordinate hardware components and provide support to application software ! Operating system (Examples: Unix, Windows)

"!Regardless
!! !!

of size, system possesses one or more of the following elements


Batch processing On-line capabilities !! Database storage !! IT networks !! End user computing
8-6

!!

Application software
! Programs designed to perform a specific data processing task ! Written in programming language (Example: Java)
8-5

"!Input

data gathered and processed periodically in groups "!Example: Accumulate all of a days sales transactions and process them as a batch at end of day "!Often more efficient than other types of systems but does not provide up-to-minute information
8-7

"! Online

systems allow users direct access to data stored in the system "! Two types (a company may use both) !! Online transaction processing (OLTP)
! Individual transactions entered from remote locations ! Online real time (Example: Bank balance at ATM)
!!

Online analytical processing (OLAP)


! Enables user to query a system for analysis ! Example: Data warehouse, decision support systems, expert systems
8-8

"!In
!!

traditional-IT systems, each computer application maintains separate master files


Redundant information stored in several files

"!Database
!! !!

system allows users to access same integrated database file


Eliminates data redundancy Creates need for data administrator for security against improper access
8-9

Networks !! Computers linked together through telecommunication links that enable computers to communicate information back and forth !! WAN, LAN !! Internet, intranet, extranet "! Electronic commerce !! Involves electronic processing and transmission of data between customer and client !! Electronic Data Interchange (EDI)
"!
8-10

"!User

departments are responsible for the development and execution of certain IT applications "!Involves a decentralized processing system "!IT department generally not involved "!Controls needed to prevent unauthorized access
8-11

"!Importance
!! !!

of internal control not diminished in computerized environment


Separation of duties Clearly defined responsibilities !! Augmented by controls written into computer programs

8-12

"!In

a traditional manual system, hard-copy documentation available for accounting cycle "!In computerized environment, audit trail ordinarily still exists, but often not in printed form
!! !!

Can affect audit procedures Consulting auditors during design stage of ITbased system helps ultimate auditability
8-13 8-14

"!

"! "! "!

"!

Information systems management !! Supervise the operation of the department and report to vice president of finance Systems analysis !! Responsible for designing the system Application programming !! Design flowcharts and write programming code Database administration !! Responsible for planning and administering the company database Data Entry !! Prepare and verify input data for processing
8-15

"! "!

"!

"! "!

IT Operations !! Run and monitor central computers Program and file library !! Protect computer programs, master files and other records from loss, damage and unauthorized use Data Control !! Reviews and tests all input procedures, monitors processes and reviews IT logs Telecommunications Specialists !! Responsible for maintaining and enhancing IT networks Systems Programming !! Responsible for troubleshooting the operating system
8-16

History shows the person responsible for frauds in many situations set up the system and controlled its modifications "! Segregation of duties !! Programming separate from controlling data entry !! Computer operator from custody or detailed knowledge of programs "! If segregation not possible need: !! Compensating controls like batch totals "! Organizational controls not effective in mitigating collusion
"!
8-17

"! Interested

in evaluating the overall efficiency and effectiveness of information systems operations and related controls throughout the company "! Should participate in design of IT-based system "! Perform tests to ensure no unauthorized changes, adequate documentation, control activities functioning and data group performing duties.

8-18

General Control Activities


"! Developing "! Changing "! Access "! IT

new programs and systems

existing programs and systems

to programs and data

operations controls

8-19

8-20

"! Programmed
!!

Control Activities
"!Designed

!!

!!

Input validation checks ! Limit test ! Validity test ! Self-checking number Batch controls ! Item count ! Control total ! Hash total Processing controls ! Input controls plus file labels

to test the completeness and accuracy of IT-processed transactions "!Designed to ensure reliability "!Reconciliation of control totals generated by system to totals developed at input phase
!!

"! Manual
!!

Follow-up Activities
8-21

Example: Sales invoices generated by ITbased system tested for clerical accuracy and pricing by the accounting clerk
8-22

Exception reports follow-up

"!Involves

use of one or more user operated workstations to process data "!Needed controls
Train users Document computer processing procedures !! Backup files stored away from originals !! Authorization controls !! Prohibit use of unauthorized programs !! Use antivirus software
!! !!

"!Step "!Step
!!

1 Consider IT system in planning 2 Obtain an understanding of the client and its environment
Documentation of clients IT-based system depends on complexity of system
! Narrative ! Systems flowchart ! Program flowchart ! Internal control questionnaires

8-23

8-24

"! Identify "! Relate

risks the identified risks to what can go wrong at the relevant assertion level "! Consider whether the risks are of a magnitude that could result in a material misstatement "! Consider the likelihood that the risks could result in a material misstatement
!!

"!

Auditing Around the Computer--Manually processing selected transactions and comparing results to computer output Manual Tests of Computer Controls--Inspection of computer control reports and evidence of manual follow-up on exceptions Auditing Through the Computer--Computer assisted techniques
!! !! !! !! !! !!

"!

"!

!!

Evaluate effectiveness of related controls in mitigating risks Test of controls over IT-based systems
8-25

Test Data Integrated Test Facility Controlled Programs Program Analysis Techniques Tagging and Tracing Transactions Generalized audit software parallel simulation

8-26

In general, using client data and generalized audit software


Examine clients records for overall quality, completeness and valid conditions !! Rearrange data and perform analyses !! Select audit samples !! Compare data on separate files !! Compare results of audit procedures with clients records
!!

8-27

8-28

"!Computer

service centers provide processing services to customers who decide not to invest in their own processing of particular data "!Outsourcing companies run computer centers and provide a range of computer processing services to companies

"! Auditor

concerned if service provided are part of the clients information system. Part of system if service organization affect:
!! !! !!

!!

How clients transactions are initiated The accounting records, supporting information The accounting processes from initiation to inclusion in financial statements The financial reporting process

"!Can
8-29

obtain service auditors report


8-30

"!Types
!!

of Service Auditor Reports

Type 1Managements description of the system and the suitability of the design of controls !! Type 2Attributes of 1, plus assurance on the operating effectiveness of controls
! A Type 2 report may provide the user auditor with a basis for assessing control risk below the maximum.

8-31

You might also like