Implications of Information Technology for the Audit Process

Slides:



Advertisements
Similar presentations
Audit of Autonomous District Councils (in an IT environment using FAAM)
Advertisements

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
ITAuditing Using GAS & CAATs
Auditing Concepts.
The Audit Standards’ Setting Process
Auditing Computer-Based Information Systems
Auditing Computer-Based Information Systems
Nature of IT Based Systems
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Chapter 13 Auditing Information Technology
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Chapter 12/2 Audit Software Techniques
Chapter 12 The Impact of Information Technology on the Audit Process
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Today’s Lecture application controls audit methodology.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Islamic University of Gaza
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Considering Internal Control
Auditing Complex EDP Systems
Chapter 9 Designing Databases Modern Systems Analysis and Design Sixth Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
Evaluation of Internal Control System
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
Considering Materiality and Audit Risk
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Audit Responsibilities and Objectives
Nature and Type of Audit Evidence
Controls design Controls are “the plan of organization and all the methods and measures to safeguard its assets, check the accuracy and reliability of.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
AUDIT IN COMPUTERIZED ENVIRONMENT
Skills for Success with Microsoft Office 2013 Volume 1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Kris Townsend, Catherine.
Copyright © 2014 Pearson Education Chapter 19 Completing the Tests in the Acquisition and Payment Cycle: Verification of Selected Accounts.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
8-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Audit of the Inventory and Warehousing Cycle
Completing the Tests in the Sales and Collection Cycle:
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
The Impact of Information Technology on the Audit Process
Chapter 3-Auditing Computer-based Information Systems.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
David M. Kroenke and David J. Auer Database Processing: Fundamentals, Design, and Implementation Chapter Ten: Managing Databases with SQL Server 2012,
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
8 INTERNAL CONTROL. Definition Duty  mgt (CEO)  Board  Internal auditor  Employee  External person.
TECHNOLOGY IN ACTION. Chapter 11 Behind the Scenes: Databases and Information Systems.
Auditing Concepts.
Chapter 08 Consideration of
Developing the Overall Audit Plan and Audit Program
Controlling Computer-Based Information Systems, Part II
Processing Integrity and Availability Controls
Managing the IT Function
The Impact of Information Technology on the Audit Process
Computer-Based Processing: Developing an Audit Assessment Approach
The Impact of Information Technology on the Audit Process
Chapter 2 The Sources of Software
CHAPTER 15 AUDITING EDP SYSTEMS.
Presentation transcript:

Implications of Information Technology for the Audit Process Chapter 12 Implications of Information Technology for the Audit Process 1

Learning Objectives Describe how IT improves internal control. Identify risks to accounting systems specific to IT. Explain how general controls and application controls reduce IT risks. Describe how general controls affect the auditor’s testing of application controls.

Learning Objectives Use test data, parallel simulation, and embedded audit module approaches to test automated controls. Identify issues for e-commerce systems and other specialized IT systems.

Describe how IT improves internal control. 1 Describe how IT improves internal control.

How Information Technologies Enhance Internal Control Computer controls replace manual controls Higher-quality information is available

Identify risks to accounting systems specific to IT. 2 Identify risks to accounting systems specific to IT.

Assessing Risks of Information Technologies Risks to hardware and data Reduced audit trail Need for IT experience and separation of IT duties IT can improve a company’s internal controls; however, it can also affect the company's overall control risk. If IT systems fail, organizations can be paralyzed by the inability to retrieve information or by the use of unreliable information caused by processing errors. Specific risks to IT systems include the aforementioned.

Risks to Hardware and Data Reliance on hardware and software Unauthorized access Without proper physical protection, hardware or software may not function or may function improperly. When organizations replace manual procedures with technology-based procedures, the risk of random error from human involvement decreases. However, the risk of systematic error increases because once procedures are programmed into computer software, the computer processes information consistently for all transactions. IT cased accounting systems often allow online access to electronic data in master files software and other records. Because online access can occur from remote access points, there is potential for illegitimate access. Since much of the data is stored in centralized electronic files, this increases the risk of loss or destruction of entire data files. Systematic vs. random errors Data loss

Reduced Audit Trail Visibility of audit trail Lack of traditional authorization Detection risk With the use of computers, IT often reduces or even eliminates source documents and records that allow the organization to trace accounting information. In many IT systems, employees who deal with the initial processing of transactions never see the final results. Therefore, they are less able to identify mistakes. Advanced IT systems can often initiate transactions automatically, such as calculating interest on savings accounts and ordering inventory when pre-specified order levels are reached. Reduced human involvement

Need for IT Experience and Separation of IT Duties Reduced separation of duties Need for IT experience It is important to have personnel with knowledge and experience to install, maintain, and use the system.

Explain how general controls and application controls reduce IT risks. 3 Explain how general controls and application controls reduce IT risks.

Internal Controls Specific to Information Technology Information technology controls General controls apply to all aspects of the IT function including IT admin, separation of IT duties, systems development, physical and online security over access to hardware, software and related data. Application controls apply to processing transactions. Application controls General controls

Relationship Between General and Application Controls

Categories of General and Application Controls

Administration of the IT Function The perceived importance of IT within an organization is often dictated by the attitude of the board of directors and senior management.

Segregation of IT Duties The CIO or IT manager should be responsible for oversight of the IT function. Systems analysts are responsible for the overall design of each application system Computer operators are responsible for the day-to-day operations of the computer following the schedule established by the CIO.

Systems Development Typical test strategies Pilot testing Parallel testing Pilot testing is when a new system is implemented in one part of the organization while other locations continue to rely on the old system. Parallel testing is when the new and old systems operate simultaneously in all locations.

Physical and Online Security Online Controls: User ID control Password control Separate add-on security software Physical Controls: Keypad entrances Badge-entry systems Security cameras Security personnel Physical controls decrease the risk of unauthorized changes to programs and improper use of programs and data files. Proper user IDs and passwords control access to software and related data files this reducing the likelihood that unauthorized changes are made to software applications and data files.

Backup and Contingency Planning Offsite storage of critical files is a key element to a backup and contingency plan One key to a backup and contingency plan is to make sure that all critical copies of software and data files are backed up and stored off the premises.

Hardware Controls These controls are built into computer equipment by the manufacturer to detect and report equipment failures.

Application controls are designed for each software application Input controls Output controls Processing controls

Input Controls These controls are designed by an organization to ensure that the information being processed is authorized, accurate, and complete.

Batch Input Controls Total for all Financial total records in a batch Total of codes from all batch records Hash total Total of records in a batch Record count

Processing Controls accuracy test Correct file, database, or program? Validation test Correct processing order? Sequence test Arithmetic accuracy test Accuracy of processed data? Data exceeds preset amounts? Data reasonableness test Completeness of record fields? Completeness test

Output Controls These controls focus on detecting errors after processing is completed rather than on preventing errors.

4 Describe how general controls affect the auditor’s testing of application controls.

Impact of Information Technology on the Audit Process Effects of general controls on system-wide applications Effects of general controls on software changes Obtaining an understanding of client general controls Ineffective general controls create the potential for material misstatements across all system applications regardless of the quality of the application controls. Client changes to application software affect the auditor’s reliance on automated controls. Auditors obtain information about general and application controls through interviews, examination of system documentation, and reviews of detailed questionnaires completed by IT staff. If general controls are ineffective, the auditor’s ability to rely on IT-related application controls to reduce control risk in all cycles is reduced. After identifying specific IT-based application controls that can be used to reduce control risk, auditors can reduce substantive testing. Relating IT controls to transaction-related audit objectives Effect of IT controls on substantive testing

Auditing in IT Environments with Varied Complexity Audit around the computer LESS Smaller companies IT controls < effective Audit through the computer MORE Parallel simulation Test data

Auditing Around and Through the Computer

5 Use test data, parallel simulation, and embedded audit module approaches to test automated controls.

Test Data Approach 1. Test data should include all relevant conditions that the auditor wants tested. 2. Application programs tested by the auditors’ test data must be the same as those the client used throughout the year. Auditor’s process their own test data using the client’s computer system and application program to determine whether the automated controls correctly process the test data. 3. Test data must be eliminated from the client’s records.

Test Data Approach Input test transactions to test key control procedures Master files Application programs (assume batch system) Transaction files (contaminated?) Contaminated master files Control test results

Test Data Approach Control test results Auditor makes comparisons Auditor-predicted results of key control procedures based on an understanding of internal control Differences between actual outcome and predicted result

Parallel Simulation The auditor uses auditor-controlled software to perform parallel operations to the client’s software by using the same data files.

Parallel Simulation Production transactions Master file Auditor-prepared program Client application system programs Auditor results Client results Auditor makes comparisons between client’s application system output and the auditor-prepared program output Exception report noting differences

Embedded Audit Module Approach Auditor inserts an audit module in the client’s application system to identify specific types of transactions.

Embedded Audit Module Approach

6 Identify issues for e-commerce systems and other specialized IT systems.

Issues for Different IT Environments Network Environments Database Management Systems Outsourced IT e-Commerce systems

Are there any questions?

Copyright All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.