1 Pertemuan 6 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.

Slides:



Advertisements
Similar presentations
Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Advertisements

Chapter 10 Accounting Information Systems and Internal Controls
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Auditing Computer Systems
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
Operational Auditing--Fall Operational Auditing Fall 2009 Professor Bill O’Brien.
6-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Internal Control Evaluation: Assessing Control Risk.
1 Pertemuan 4 Auditing Standards and Responsibilities Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Internal Control Pertemuan 05 s.d 06 Matakuliah: F0712 / Lab Sistem Informasi Akuntansi Tahun: 2007.
1 Pertemuan 10 Department Organization Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
1 Pertemuan 9 Department Organization Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Expanded Version of COSO a presentation by Steve Wadleigh Expanded Version of COSO a presentation by Steve Wadleigh Standards for Internal Control in the.
Auditing A Risk-Based Approach To Conducting A Quality Audit
18- 1 © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 18 Integrated Audits of Internal Control (For Public Companies Under Sarbanes-Oxley.
Internal Control in a Financial Statement Audit
1 Pertemuan 19 Audit Reporting Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
1 Pertemuan 24 Managing The Effectiveness of The Audit Department Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
1 Pertemuan 5 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Purpose of the Standards
Sarbanes-Oxley Project Summary of COSO Framework Presented by Larry Dillehay & Scott Reitan Parkfield Group LLC.
COSO Framework Update IIA Columbus Chapter May 17, 2013
© Copyright 2012 Pearson Education. All Rights Reserved. Chapter 10 Fraud & Internal Control ACCOUNTING INFORMATION SYSTEMS The Crossroads of Accounting.
Internal Auditing and Outsourcing
Control and Accounting Information Systems
Chapter 3 Internal Controls.
Introduction to Internal Control Systems
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
This Lecture Covers Review of Internal Control Definitions.
COSO: Current ERM Challenges and Our Responses RIMS 2012 Annual Conference April 17, 2012 by David Landsittel COSO Chairman.
Chapter Three IT Risks and Controls.
Chapter 5 Internal Control over Financial Reporting
Internal Control in a Financial Statement Audit
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Chapter 7 Control and AIS. Threats to AIS Natural disasters –DSM flood (p. 249) Political disasters –Terrorism Cyber crime (as opposed to general terrorism)
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Evaluation of Internal Control System
1 Information Technology (IT) Auditing & Control Instructor: Dr. Princely Ifinedo Cape Breton University (CBU)
5-1 McGraw-Hill/Irwin ©2007 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 5 Internal Control Evaluation: Assessing Control Risk.
Richard F. Chambers, CIA, CGAP Vice President, IIA Learning Center The Institute of Internal Auditors.
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
Chapter 9: Introduction to Internal Control Systems
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
1 Pertemuan 1 Background Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Pertemuan 15 Business and Information Process Rules, Risks, and Controls Matakuliah: M0034 /Informasi dan Proses Bisnis Tahun: 2005 Versi: 01/05.
1 Pertemuan 8 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Internal/External Audit Corporate Governance part 5.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Section 404 Audits of Internal Control and Control Risk Chapter 10.
Pertemuan 14 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Internal control objectives
اطار الرقابة الداخلية و فقا للجنة دعم المنظمات COSO
Fraud & Internal Control
Fraud & Internal Control
COSO Internal Control s Framework
Fraud & Internal Control
Presentation transcript:

1 Pertemuan 6 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1

2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Mahasiswa dapat menunjukkan Internal Control System.

3 Outline Materi Effective Internal Control Models –The COSO Model (AICPA, AAA, FEI, IIA and IMA) –The CobiT Model (ISACA) –The SAC and eSAC Reports (IIA) –SysTrust (AICPA and CICA) –Conclusions: Comparing and Contrasting the Models Regulations –Securities and Exchange Commision (1933, 1934) –Foreign Corrupt Practices Act (1977) –Copyright Laws (1976 et al.) –Environmental Laws (Various) –Sarbanes-Oxley Act (2002)

4 Policies –Systems Development Life Cycle Policy –Systems Usage Policy (End Users) –Security Policy –Password Policy – Policy –Business Recovery Policy –Privacy Policy

5 Effective Internal Control Models There are numerous proven internal controls models that internal auditors can rely on in developing and maintaining an effective internal control system. These come from reliable professional organizations such as COSO, ISACA, IIA, AICPA and the Canadian Institute of Chartered Accountants (CICA).

6 The COSO Model (AICPA, AAA, FEI, IIA and IMA) The COSO Model was developed by the Committee of Sponsoring Organizations (COSO), originally known as the Treadway Commission. Organizations in COSO include American Institute of Certified Public Accountants (AICPA), American Accounting Association (AAA), Financial Executives International (FEI), Institute of Internal Auditors (IIA) and the Institute of Management Accountants (IMA).

7 COSO recognizes that people are involved with internal control as members of the board of directors (especially the audit committee), management and other netity personnel such as internal auditors. The cost-benefit consideration is part of the COSO Model, as well as the dynamic nature of risk assessment.

8 The CobiT Model (ISACA) The CobiT Model is the culmination of the evolution of ISACA’s Control Objectives. Control objectives include not only objectives related to control but also audit procedures. CobiT helps bridge the gaps between business risks, control needs and technical issues. It is a control model, or framework, to meet the needs of information technology governance and ensure the integrity of information and information systems applied on an international basis, from international input.

9 CobiT classifies information technology processes into four domains: –Planning and organizations –Acquisition and implementation –Delivery and support –Monitoring

10 The SAC and eSAC Reports (IIA) The SAC report also has a long history of development and evolution. The eSAC report defines the system of internal control, describes its components, provides several classifications of controls, describes control objectives and risks, and defines the internal auditor’s role.

11 The system of internal controls consists of three components: –The control environment –Manual and automated systems –Control procedures

12 The control environment includes: –Organization structure –Control framework –Policies and procedures –External influences

13 Automated systems consist of systems and application sofware. The eSAC report discusses the control risks associated with end-user and departmental systems but neither describes nor defines manual systems. Control procedures consist of general, application and compensating controls.

14 The eSAC report provides five classification schemes for internal controls in information systems: –Preventive, detective and corrective –Discretionary and non-discretionary –Voluntary and mandated –Manual and automated –Application and general controls

15 Risk in eSAC are defined as: –Fraud –Errors –Business interruptions –Inefficient and ineffective use of resources

16 The role of internal auditors is also defined in eSAC. Their responsibilities include ensuring the adequacy of the internal control system, the reliability of data and the efficient use of the organization’s resources. Internal auditors are also to be concerned with preventing and detecting fraud and coordinating activities with external auditors. The integration of audit and information systems skills and an understanding of the impact of information technology on the audit process are necessary for internal auditors.

17 Internal audit professionals now perform financial, operational and information systems audits.

18 SysTrust (AICPA and CICA) SysTrust focuses on providing assurance of the reliability of the controls of a system. To evaluate the reliability of a system objectively, the CPA evaluates SysTrust’s four essential principles – availability, security, integrity and maintainability – individually against four categories of criteria – policies, communication, procedures and monitoring.

19 The evaluation of a system’s reliability begins by understanding the basic components of the system. A system is defined as a set of procedures used to accomplish specific results and an information system consists of five basic components organized to transform data inputs (raw facts) into information outputs.

20 These five basic components of a system are: –Infrastructure –Software –Personnel –Procedures –Data

21 A reliable system is capable of operating without material error, fault or failure during a specified period in a specified environment. Availability is defined by the system being available for operations. Security is the protection of the system against unauthorized physical or logical access – including both the physical components and the data. Integrity refers to system processing being complete, accurate, timely, components and the data.

22 Conclusion: Comparing and Contrasting The Models The CobiT Model views internal control as a process that includes policies, procedures, practices and organizational structures that support business processes and objectives.

23 Regulations Internal auditors know the importance of adhering to federal and state regulations.

24 Securities and Exchange Commission (1933, 1934) The Securities Act of 1933 and the Securities Exchange Act of 1934 require all corporations that report to the Securities and exchange Commission (SEC) to maintain a system of internal control that is evaluated as part of the annual external audit. The SEC laws have a direct impact on companies that have publicly traded stock, especially regarding the need for a system of internal control and its evaluation.

25 Foreign Corrupt Practices Act (1977) The Foreign Corrupt Practices Act of 1977 also requires SEC companies to maintain an internal control system with reasonable assurance that the organization’s objectives are being met and even providing penalties for violations.

26 Copyright Laws (1976 et al.) The Copyright Laws of 1976 (and other years) protect intellectual property. One aspect of intellectual property crucial to internal controls is software. Unauthorized software poses a legal and financial risk to firms.

27 According to ISAC, information systems auditors have a responsibility regarding the risks of software piracy to: –Be aware of such risks –Communicate these risks to management –Review software implementation –Develop adequate control procedures –Incorporate appropriate techniques or tools in audit programs to detect unauthorized use of software

28 Environmental Laws (Various) In addition, there are federal laws regarding environmental issues that affect many oranizations.

29 Sarbanes-Oxley Act (2002) Several public frauds carried out in the year prior to 2002 focused attention on all aspects of financial reporting. Enron collapsed after what amounted to financial fraud by some of its executive managers.

30 Policies Internal controls should have objectives related to assets, security and auditability – ideally, objectives shared with executive management. Policies may be developed before a risk assessment is formally conducted, but if so, they are definitely affected by an appropriate risk assessment.

31 Systems Development Life Cycle Policy A key policy consideration is information systems, especially systems development and implementation. One systems development life cycle (SDLC) concept that is often overlooked in actual practice in that of taking systems off-line for upgrades, updates, and so on, and bringing them back online only after testing the new system thoroughly. It is recommended that this concept be included as corporate policy.

32 Systems Usage Policy (End Users) A second related area is computer usage.

33 Security Policy Internal auditors need to assist management in establishing fundamental security objectives tied to business objectives and assets that need protection from identified risk. A security policy will remind employees of the importance and value of information they handle and the risks or exposures that exist.

34 Password Policy A significant part of the security policy is a password policy. An effective password policy is a strategic advantage in maintaining strong internal controls and helps to minimize adverse events such as computer crime, fraud and other unauthorized activities. It has been shown that an effective password system in operation prevents the majority of potential unauthorized activities.

35 Policy Internal auditors should also assist management in developing an policy that describes appropriate use of corporate resources.

36 Business Recovery Policy For disaster recovery, the policy should include some basics of the disaster recovery plan.

37 Privacy Policy Information about individuals, either personal data or data about actions, is generally considered private information.

38 The End