IT Controls Part I: Sarbanes-Oxley & IT Governance

Slides:



Advertisements
Similar presentations
Basic Principles of GMP
Advertisements

Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 14-1 Chapter Fourteen Auditing Financing Process: Prepaid Expenses.
Internal Control in a Financial Statement Audit
INTERNAL CONTROLS.
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
1 Introduction to Safety Management April Objective The objective of this presentation is to highlight some of the basic elements of Safety Management.
The Managing Authority –Keystone of the Control System
Module N° 7 – Introduction to SMS
Threshold System Presented by Jan Stanley, State Title I Director Office of Assessment and Accountability Fall Title I Directors Conference October 23-25,
Site Safety Plans PFN ME 35B.
1 Dr. Ashraf El-Farghly SECC. 2 Level 3 focus on the organization - Best practices are gathered across the organization. - Processes are tailored depending.
Information Systems Today: Managing in the Digital World
Slide © The McGraw-Hill Companies, Inc., 2006 Inventories and Cost of Goods Sold.
Developing a Successful Integrated Audit Approach September 14, 2010.
Introduction to Databases
All Rights Reserved, Duke Medicine 2007 IT Security Presented by: Trisha Craig and Don Elsner Principal Auditors – IT Audit Duke University 1.
Section 404 Audits of Internal Control and Control Risk
© 2004 Dechert LLP FORM N-CSR, CERTIFICATIONS AND DISCLOSURE CONTROLS AND PROCEDURES James F. DesMarais, Esq. MFS Investment Management Brian S. Vargo,
Internal Control and Control Risk
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Database Administration
© Prentice Hall CHAPTER 15 Managing the IS Function.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Chapter 14 Fraud Risk Assessment.
Sarbanes-Oxley Act of 2002 UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Chapter 10 Accounting Information Systems and Internal Controls
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
Auditing IT Governance Controls
The Islamic University of Gaza
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Chapter 9 The Study of Internal Control and Assessment of Control Risk
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
IT Controls Part I: Sarbanes-Oxley & IT Governance 1 Accounting Information Systems, 5 th edition James A. Hall.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Information Systems Auditing and Assurance
Overview of Systems Audit
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
Chapter 5 Internal Control over Financial Reporting
BusinessAllstars.com 1 BusinessAllstars.com Presents Copyright © 2004 by Gainbridge Associates All right reserved This material may not be used or reproduced.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Evaluation of Internal Control System
Accounting Information Systems: Introduction
1 Sarbanes-Oxley Overview. 2 Sarbanes-Oxley Act Summary The Sarbanes-Oxley Act of 2002 §201Prohibited Non-Audit Services §202Audit Committee Pre-Approval.
Database Administration
Chapter 9: Introduction to Internal Control Systems
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Chapter 15A IT Controls Part I: Sarbanes-Oxley & IT Governance.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Controlling Computer-Based Information Systems, Part I
The Information System: An Accountant’s Perspective
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

IT Controls Part I: Sarbanes-Oxley & IT Governance Chapter 15 IT Controls Part I: Sarbanes-Oxley & IT Governance Accounting Information Systems, 5th edition James A. Hall 1

Objectives for Chapter 15 Key features of Sections 302 and 404 of Sarbanes-Oxley Act Management and auditor responsibilities under Sections 302 and 404 Risks of incompatible functions and how to structure IT function Controls and security of organization’s computer facilities Key elements of disaster recovery plan

Sarbanes-Oxley Act The 2002 Sarbanes-Oxley (SOX) Act established new corporate governance rules Created company accounting oversight board Increased accountability for company officers and board of directors Increased white collar crime penalties Prohibits a company’s external audit firms from providing financial information systems

SOX Section 302 Section 302—in quarterly and annual financial statements, management must: certify the internal controls over financial reporting state responsibility for internal control design provide reasonable assurance as to the reliability of the financial reporting process disclose any recent material changes in internal controls

SOX Section 404 Section 404—in annual report on internal control effectiveness, management must: state responsibility for establishing /maintaining adequate financial reporting internal control assess internal control effectiveness Refer to the external auditors’ attestation report on management’s internal control assessment provide explicit conclusions on the effectiveness of financial reporting internal control Identify the framework management used to conduct their internal control assessment Examples – COSO or COBIT

http://www.microsoft.com/msft/reports/ar08/10k_fr_con.html

IT Controls & Financial Reporting Modern financial reporting is driven by information technology (IT) IT initiates, authorizes, records, and reports the effects of financial transactions. Financial reporting internal controls are inextricably integrated to IT. COSO identifies two groups of IT controls: application controls – apply to specific applications and programs, and ensure data validity, completeness and accuracy general controls – apply to all systems and address IT governance and infrastructure, security of operating systems and databases, and application and program acquisition and development

SOX Audit Implications Pre-SOX, audits did not require internal control tests. Only required to be familiar with client’s internal control Audit consisted primarily of substantive tests (tests of account balances) SOX – radically expanded scope of audit Issue new audit opinion on management’s internal control assessment Required to test internal control affecting financial information, especially internal control to prevent fraud Collect documentation of management’s internal control tests and interview management on internal control changes

Types of Audit Tests Tests of controls – tests to determine if appropriate internal controls are in place and functioning effectively Substantive testing – detailed examination of account balances and transactions

Organizational Structure IC Audit objective – verify that individuals in incompatible areas are segregated to minimize risk while promoting operational efficiency internal controls, especially segregation of duties, are affected by the type of organizational structure: Centralized model Distributed model 25 25

President VP Marketing VP Computer Services VP Operations VP Finance CENTRALIZED COMPUTER SERVICES FUNCTION VP Marketing VP Computer Services VP Operations VP Finance Systems Development Database Administration Data Processing New Systems Development Data Control Data Preparation Data Library Systems Maintenance Computer Operations DISTRIBUTED ORGANIZATIONAL STRUCTURE President VP Marketing VP Finance VP Administration VP Operations Manager Plant X Manager Plant Y Treasurer Controller Work station Work station Work station Work station Work station Work station

Centralized DP Organizational Controls Need to separate: systems development from computer operations/processing database administrator and other computer service functions especially database administrator (DBA) and systems development DBA authorizes access maintenance and new systems development data library and operations (assumes internally developed software) 26

Distributed DP Organizational Controls Many advantages to using DDP, yet there are control implications: incompatible software among various work centers data redundancy may result consolidation of incompatible tasks lack of standards 28 28

Organizational Structure Controls Corporate computer services function/information center may help to alleviate potential problems associated with DDP by providing: central testing of commercial hardware and software user services staff standards setting body reviewing technical credentials of prospective systems professionals 29

General Control Framework for CBIS Exposures Organizational Structure Internet & Intranet Data Management Internet & Intranet Operating System Systems Development Systems Maintenance Personal Computers EDI Trading Partners Applications Computer Center Security General Control Framework for CBIS Exposures

Computer Center Internal Controls Audit objectives: physical security internal control protects the computer center from physical exposures insurance coverage compensates the organization for damage to the computer center operator documentation addresses routine operations as well as system failures (centralized or DDP) 18

Computer Center Controls (assumes centralized processing) Considerations: location away from human-made and natural hazards utility and communications lines underground keep windows closed – use air filtration systems access limited to operators and other necessary workers; others required to sign in and out fire suppression systems should be installed backup power supplies (centralized or DDP) 36

Segregation of Duties Transaction authorization is separate from transaction processing. Asset custody is separate from record- keeping responsibilities. The tasks needed to process the transactions are subdivided so that fraud requires collusion. 3

Audit Procedures Review corporate policy on computer security Verify that security policy is communicated to employees Review documentation to determine if individuals or groups are performing incompatible functions Review systems documentation and maintenance records Verify that maintenance programmers are not also design programmers Observe if segregation policies are followed in practice. Example: check operations room access logs to determine if programmers enter for reasons other than system failures Review user rights and privileges Verify that programmers have access privileges consistent with their job descriptions

Audit Procedures Review insurance coverage on hardware, software, and physical facility Review operator documentation, run manuals, for completeness and accuracy Verify that operational details of a system’s internal logic are not in the operator’s documentation

Disaster Recovery Planning Disaster recovery plans (DRP) identify: actions before, during, and after the disaster disaster recovery team priorities for restoring critical applications Audit objective – verify that DRP is adequate and feasible for dealing with disasters 37

Disaster Recovery Planning Major IC concerns: second-site backups critical applications and databases including supplies and documentation back-up and off-site storage procedures disaster recovery team testing the DRP regularly 37

Disaster Recovery Planning (DRP) Include all actions to be taken before, during, and after disaster Disaster Recovery Team identified critical applications (modules/programs) must be identified restore these applications first Backups and off-site storage procedures databases and applications documentation supplies 37

Second-Site Disaster Backups Mutual Aid Pact - agreement between two or more organizations (with compatible computer facilities) to aid each other with their data processing needs Empty Shell/Cold Site - involves two or more user organizations that buy or lease building and remodel it into computer site, but without computer equipment Recovery Operations Center/Hot Site - completely equipped site; very costly and typically shared among many companies Internally Provided Backup - companies with multiple data processing centers may create internal excess capacity 38

Audit Procedures Evaluate adequacy of second-site backup arrangements Review list of critical applications for completeness and currency Verify procedures are in place for storing off-site copies of applications/ data Check currency back-ups and copies Verify that documentation, supplies, etc., are stored off-site Verify that disaster recovery team knows its responsibilities Check frequency of testing DRP

The End