Auditing Ina Computerized Environment
Auditing Ina Computerized Environment
Auditing Ina Computerized Environment
In A
Computerized Environment
With the rapid development in technology in recent years, computer information systems
(CIS) have become feasible, perhaps essential for use even in small scale business. Almost
all entities now use computers to some extent in their accounting systems.
This widespread use of computers has offered new opportunities for professional
accountants and has also created some challenging problems to auditors.
Characteristics of Computer Information System
2 Consistency of Performance
In CIS environment, data and computer programs may be accessed and altered by unauthorized
persons leaving no visible evidence.
4 Concentration of duties
There are functions that are normally segregated in in manual processing that are combined in
CIS environment.
Certain transactions may be initiated by the CIS itself without the need for an input document.
In manual system the records are written in ink on a substantial paper. The only way to lose the
information is to lose or to destroy the physical records. While on the CIS environment the information on
the computer can be easily changed; leaving no trace of the original content.
Internal Control in a CIS Environment
The elements of internal control are the same; the computer just changes the methods by which these elements are
implemented. A variety of controls are performed to check accuracy, completeness, and authorization of transactions.
When computer processing is used in significant accounting applications, internal control procedures can be classified
into two types: General and Application controls.
IMPACT OF COMPUTERS ON ACCOUNTING AND INTERNAL
CONTROL SYSTEM
GENERAL CONTROL – are those control policies and procedures that relate to the OVERALL computer information
system.
OBJECTIVE: Are to ensure the proper development and implementation of application and the integrity of
program and data files and of computer operations.
1. ORGANIZATIONAL CONTROL
a. SEGREGATION OF DUTIES BETWEEN THE CIS AND USER DEPARTMENT
- Why there is a segregation of duties between the two department?
- one of the reason is conflict of interest between the two department. And those who process the data should
have no responsibilities for initiating or altering the data that. That ‘s why the;
- CIS department must be independent of all department within the entity who provide input data or that use
output generated by the CIS.
CIS DIRECTOR
DATA ENTRY
PROGRAMMERS CONTROL GROUP
OPERATOR
CIS DIRECTOR- Exercise control over the CIS Department.
SYSTEM ANALYST- Design new system, evaluate and improve existing system and prepares program specifications
for programmer.
PROGRAMMER- Guided by the program specifications, writes the program, test and debug such program and prepare
computer operating instructions.
COMPUTER OPERATOR- Using the program and detailed computer operating instructions prepared by the programmer, it
is the one who operates the computer to process transactions.
DATA ENTRY OPERATOR- Prepares and Verifies input data for processing.
A. Access to program documentation should be limited to those person who require it in the performance of their duties.
B. Access to data files should be limited to those individual authorized to process data.
C. Access to computer hardware should be limited to authorized individual such as computer operator and their supervisor.
- This control seek to prevent access to restricted data and program. As well as preventing unauthorized person from gaining
access to system as a whole.
- Once the access control is lower, there’s a probability and maybe possibility of fraud or alteration. Because anyone can access
to the system.
- One of the appropriate access control is the used of passwords.
4. DATA RECOVERY CONTROL
-all critical data files program should be backed-up and stored off-sites.
-one of the characteristics of CIS is the vulnerability of files. Because files can
be easily lost. And such lost can be disastrous to the entity.
- it’s survival depend on the ability to recover the files on a timely basis.
-The files should be copied daily to tape or disk and secured off-sites. So, in the
event of disruption, the most recent with subsequent transaction data is the
one would be recovered.
5. MONITORING CONTROLS
-designed to ensure that CIS control are working effectively as planned.
Controls;
A. Periodic Evaluation of the adequacy
B. Effectiveness of the overall CIS operation conducted by person within or outside entity.
APPLICATION CONTROLS-
are those policies that and procedures that relate to specific use of the system.
Key Verification- this requires data to be entered twice to provide assurance that there are no key entry errors committed
.
Field Check- this ensures that the input data agree with the required field format.
Validity Check- information entered are compared with valid information in the master file to determine the authenticity
of the input.
Self-Checking Digit- this is mathematically calculated digit which is usually added to a document number to detect comm
on transpositional errors in data submitted for processing.
Limit Check- is designed to ensure that data submitted for processing do not exceed a pre-determined limit or a reasonabl
e amount.
Control Totals- ensure the completeness of data before and after they are processed.
CONTROLS OVER PROCESSING
-are designed to provide reasonable assurance
that input data are processed accurately and that data are
not lost, added, excluded, duplicated or improperly changed.
The overall objective and scope of an audit does not change in a CIS environment. However, use of a computer changes the
processing, storage and communication of financial information and may affect the accounting and internal control systems em
ployed by the entity. Accordingly , a CIS environment may affect:
The procedures followed by the auditor in obtaining a sufficient understanding of the accounting and internal control
systems.
The consideration of inherent risk and control risk through which the auditor arrives at the risk assessment.
The auditor’s design and performance of test of control and substantive procedures appropriate to meet the audit
objective.
Computer Assisted Audit Techniques (CAATs)
Computer Assisted
Audit Techniques (CAATs)
CAATs are computer programs and data which the auditor uses as part of the audit procedures to
process data of audit significance contained in an entity's information systems. Some of the commonly used
CAATs include test data, integrated test facility and parallel simulation.
1.Test data
The test data technique is primarily designed to test the effectiveness of the internal control procedures
which are incorporated in the client’s computer program. The objective of the test data technique is to
determine whether the client’s computer programs can correctly handle valid and invalid conditions as they
arise.
Test Data
Auditor’s
Test Data
Processed
Using client’s
program
Auditor’s
Output Compare Expected
Manually Output
2.Integrated test facility (ITF)
A disadvantage of the test data technique is that the auditor does not have an assurance that the program tested i
s the same program used by the client throughout the accounting period. When using the ITF, the auditor creates dummy or fict
itious employee or other appropriate unit for testing within the entity's computer system.
Auditor’s Client’s
Test Data Data
Processed
Using client’s
program
Auditor’s
Output Compare Expected
Manually Output
3. Parallel Simulation
Parallel simulation requires the auditor to write a program that simulates key features or processes of
the program under review. The simulated program is then used to reprocess transactions that were previously
processed by the client’s program.
Auditor’s Client’s
Test Data Data
Processed Processed
Using client’s Using auditor’s
program program
Auditor’s
Output Compare Expected
Manually Output
Parallel simulation can be accomplished by using generalized audit software or purpose
written programs. Generalized audit software consists of generally available computer package
which have been designed to perform common audit task such as performing or verifying calculations,
summarizing and totalling files and reporting in a format specified by the auditor.
Other Computer Assisted Audit Techniques (CAATs)
1. Snapshots
This technique involves taking a picture of a transaction as it
flows through the computer systems