AUDITING IN COMPUTER ENVIRONMENT. What is audit in a computer environme nt?

Size: px
Start display at page:

Download "AUDITING IN COMPUTER ENVIRONMENT. What is audit in a computer environme nt?"

Transcription

1 AUDITING IN COMPUTER ENVIRONMENT What is audit in a computer environme nt? Wherever computer based accounting system, large or small are operated by an enterprise, or by a third party on behalf of the enterprise, for processing information supporting the amounts included in the financial statements. The audit is said to be performed in computer environment. 1 Auditing in Computer Environment Issues The audit objective remain to enable the auditor to express an opinion whether the financial statements are prepared, in all material respects, in accordance with an applicable financial reporting framework. However, the methods of applying audit procedures in gathering audit evidence may be influenced by the way accounting data is processed. 2 Computer Environment Audit Trail Auditing in Computer Environment In manual processing, clerical errors in computer environment programming errors or systematic errors in hardware or software Central Processing of transactions (keep incompatible duties separate.) Alteration of data or files without being detected (possibility of fraud) 3 1

2 Auditing in computer environment Approaches Auditing around the computer Auditing through the Computer Auditing with the computer 4 Approaches to auditing in Computer Environment 1. Auditing around the computer Computer as a black box Test transaction method e.g. multiplying unit price with number of products No attempt is made to establish and evaluate existence of controls Appropriate where no significant computer controls are required, for example where computers are used only for calculation purposes Should not be used because of auditor s lack of knowledge on computerized systems. Audit around the computer ONLY WHEN; the audit trail is complete, processing operations are straight forward and system documentation is complete and readily available. 5 Approaches to auditing in Computer Environment 1. Auditing through the computer Auditor evaluate client s software and hardware for reliability hard for human eyes to view Test operating effectiveness of related computer controls (Access Controls) Controls are embedded in the IS of most companies It is impractical to ignore them due to legal and compliance requirements External auditors use this to test the controls Internal auditors frequently uses this to ensure that errors are discovered and corrected. 6 2

3 Approaches to auditing in Computer Environment Around or through the computer Nothing is wrong with auditing around the computer But auditor should be satisfied with the control system in place and able to gather sufficient evidence. But what about various requirements of gaining sufficient understanding of system (internal control) Auditing through the computer is the best for auditors to follow Some standards restricts auditors to issue opinions on the operating effectiveness of internal control of the business if auditing around the computer approach is used. Which approach minimize auditor s risk? 7 Approaches to auditing in the computer environment Auditing with the computer Use of computer of audit automation Working Papers Statistical sampling and analytical procedures Decision Support System; Audit Review and Reporting 8 Auditing with the Computer Types of software on PC in order to aid audit work Standard software for word processing, spreadsheets Expert systems such as teammate, Generally, an auditor can use the PC to assist for Production of time budget and budgetary control. Analytical procedures. The maintenance of permanent file information 9 3

4 Auditing in computer environment The computer systems challenges lack of visible evidence and systematic errors. What to do? techniques available to an auditor, The internal controls, the availability of the data the length of time it is retained in a readily usable form. 10 AUDITING IN COMPUTER ENVIRONMENT Controls over audit computers Security, and Accuracy (of input, processing and output). The auditor should exercise controls when PCs are used by auditor in their work are as follows: Access controls for users by means of passwords 11 AUDITING IN COMPUTER ENVIRONMENT Controls over audit computers Back up of data contained on files, regular production of hard copy; backup disks held off the premises. Viral protection for programs and Training users. Evaluation and testing of programs use Proper recording of input data, to ensure reasonableness of output. 12 4

5 INTERNAL CONTROLS IN CIS The internal control over computer based accounting system General controls Application controls 13 General controls; INTERNAL CONTROLS IN CIS relates to the environment CIS are developed, maintained and operated, and which are therefore applicable to all the applications. The application controls and general controls are inter-related. Strong general controls contribute to assurance, which may be obtained by an auditor in relation If general controls are ineffective, there may be potential for material misstatement in each computer APT based Financial Consultants accounting application. 14 Auditing in Computer Environment 15 5

6 INTERNAL CONTROLS IN CIS Specific Requirements in order to achieve the overall objective of general controls:- Control over applications development To prevent or detect unauthorized changes to programs To ensure that all programs changes are adequately tested and documented Control to prevent and detect errors during program execution To prevent unauthorized amendments to data files To ensure that system software is properly installed and maintained To ensure that proper documentation is kept To ensure continuity of operations. 16 AUDITING IN COMPUTER ENVIRONMENT Types of General Controls 1. Organizational controls of EDP unit No one individual should be able to a. access the data; b. Alter the computer system or programme, c. Access the computer 17 AUDITING IN COMPUTER ENVIRONMENT Types of General Controls 2. Application development and maintenance controls Computer programs and related applications design and use of systems manuals, program flow charts, narratives, records and file layout and operators instructions. 3. Hardware controls Manufacturer to detect equipment failure, how the organisation handles 18 errors the computer identifies 6

7 AUDITING IN COMPUTER ENVIRONMENT Types of General Controls 4. Access to Computer equipment, data files and programs Safeguarding equipment and records e.g. locked doors, locked cabinets, segregation of duties, locked cabinets, cabinets containing data files, passwords or security codes and job reports for the computer. 5. Data or procedural controls Keeping the files and programmes off site. This may prevent losses due to accidental erasure, intentional vandalism or catastrophic 19 loss (fire). Grandfather-father-son method INTERNAL CONTROLS IN CIS Application controls: The objective of application controls (manual or programmed) are to Ensure completeness and accuracy of accounting records validity of entries made resulting from both manual and programmed processing. 20 INTERNAL CONTROLS IN CIS The specific requirements in order to achieve the overall objectives of application controls are:- Control over the completeness and authorization of input Control over the completeness and accuracy of processing Control over the maintenance of master files and the standing data contained therein 21 7

8 Application Controls Internal Controls in CIS They are specific to particular accounting application Major types of application controls 1. Input Controls Ensures validity, completeness and accuracy of processed information e.g. Check digits, batch totals, hash totals, limits or reasonableness checks, and validity checks. 2. Processing Controls Accurate processing of data input into the system Data are processed, processed only once and processed accurately. Most of processing controls are also programmed controls i.e. the computer is programmed to do the checking. Examples, control totals, logic tests and completeness tests. 22 Internal Controls in CIS 3. Output Controls Ensures that data generated by computer are valid, accurate, and complete. Output distributed in appropriate quantities only to authorized people. The most important output controls is review of the data for reasonableness by someone who knows what the output should look like. 23 Internal Controls in CIS 4. Controls over master file information Most transactions depends on the accuracy of information on the master file. For example Sales transactions depends on price list or all payroll amounts depends on hourly rate or salary rate. User departments should get periodic reports containing content of the master file. There should be procedures in place to verify that the correct version of Master File is being used. 24 8

9 Internal Control in CIS Auditors obtain information on the general and application controls by Interviewing EDP staff Reviewing flowcharts and documents Reviewing internal control questionnaires 25 5 Minutes Break 26 AUDITING IN THE COMPUTER ENVIRONMENT - Techniques What are the tools to use? What are the techniques? What are the tricks? What are the risks? What is the examiners focus? 27 9

10 COMPUTER ASSISTED AUDIT TECHNIQUES (CAATs) Definition Techniques in that the auditors are afforded opportunities to use either the enterprises or another computer to assist them in performance of audit work. CAATs, are ways in which the auditor may use the computer in a computerized information system to gather, or assist in gathering, audit evidence. 28 CAATs Advantages Are independent of the system being audited and will use a read-only copy of file to avoid corruption of an organization's data Simplifies audit routines such as sampling Provides documentation of each test performed in the software that can be used as documentation in auditor s work papers Can perform activities such as data queries, data stratification, sample extraction, missing sequence identification, statistical analysis, calculations, duplicate inquiries, pivot tables and cross tabulation 29 CAATs Uses Creation of electronic work papers Fraud detection Analytical tests Data analysis reports Continuous monitoring 30 10

11 CATEGORIES OF CAAT Audit software Test data Other techniques 31 CATEGORIES OF CAAT 1. Audit software: generalized audit software specialized audit software or Interrogation software utility programs and existing entity programs. Regardless of the source of the programs, the auditor should substantiate their validity for audit purposes prior to use. 32 CATEGORIES OF CAAT Audit software some uses Stratify accounting population and select monetary unit statistical samples. Carry out an aging /usage analysis of stocks Perform detailed analytical reviews of financial statements 33 11

12 Test data TYPES OF CAATs Is a CAAT in which test data prepared by the auditor is processed on the current production version of the client's software, but separately from the client's normal input data. 34 TYPES OF CAATs Other techniques embedded audit facilities Integrated test facility System Review and control file ( SCARF) Application program examination Internal control evaluation via; Flowchart verification (Logical Path analysis ),Program code verification (Code Comparison Programs), Printout examination. 35 CAATs and Sustentative testing During substantive testing some, CAATs are used frequently. Audit software is used extensively to examine accounting records maintained on computer files CAATs assists in carrying out analytical review procedures 36 12

13 Limits of CAATs Limits of CAATs Evaluation of general controls Use ICQ or the ICE approach. 37 Program authenticity Source Program authenticity guarantee that the correct application program is being tested. Live test data, integrated test facilities and embedded audit facilities as described above are audit techniques, which help in this respect. General controls Copy must be identical to orignal 38 Knowledge based system Knowledge based systems Decision Support Systems and Expert systems can be used to assist with the auditors own judgment and decisions

14 MANUAL Vs CAATs Factors to consider in choosing between CAATs and manual Techniques:- Practicability of carrying out audit tests manually Cost effectiveness of the procedures under considerations. Availability of audit time The availability of appropriate computer facilities and independence issue The level of audit experience and expertise. The extent of possible reliance upon internal audit work 40 Factors to consider in using CAATs IT knowledge and experience of the audit team Availability of CAATs and suitable computer facilities and data Impracticability of manual tests Effectiveness and efficiency timing 41 PLANNING AN AUDIT IN A COMPUTER ENVIRONMENT Planning an audit in a Computer environment Possibilities of attending during system development stage Consideration of use of CAATs Practicability of manual audit Expertise 42 14

15 PLANNING AN AUDIT IN A COMPUTER ENVIRONMENT Use of CAATS The pattern cost associated with CAATs, The extent of tests of controls or substantive procedures achieved by both alternatives, Ability to incorporate within the use of CAAT a number of different audit tests. Time of reporting 43 PLANNING AN AUDIT IN A COMPUTER ENVIRONMENT In using CAAT, computer facilities, computer files and programs should be available; the auditors should plan the use of CAAT in good time so that these copies are retained for their use. Internal auditor CAATs, consider ISA Availability of computer facilities 44 INTERNAL CONTROL EVALUATION Internal control evaluation ICQ. Weak controls = extensive substantive procedures In determining whether they wish to place reliance on application controls or general controls,the auditors will be influenced by the cost effectiveness and ease of testing by the following matters General controls and application controls 45 15

16 INTERNAL CONTROL EVALUATION Check systematic errors and program intergrity Manual examination may be useful in small computer application Observation, examination of documentary evidence or reperforming the procedures may be useful. CAATs can also be useful 46 Review of financial statements Review of financial statements CAATs (audit software) e.g analytical review. The working papers should indicate the work performed by CAAT, the auditors conclusion, the manner in which any technical problems were resolved and may include any recommendations about modification of CAAT for future audits. 47 AUDIT TRAIL. Audit trail. As the complexity of computer systems has increased there has been a corresponding loss of audit trail. Most systems have searching facilities that are much quicker to use than searching through print outs by hand. This offsets the so- called loss of audit trail to a significant extent. The trail is still there, although it may have to be followed through in electronic form

17 2 MINUTES BREAK 49 COMPUTER SERVICE BUREAUX These are third part service organization who provide EDP facilities to their clients Factor to consider in using CSB make or buy decisions Consider and Analyze the cost benefit; Level of management s own computing knowledge and their willingness to take risk to unknown third party; 50 COMPUTER SERVICE BUREAUX Factors to consider The volume and frequency of processing requirements ; The complexity of the program package required ;The simpler the program the easier it would be to process in house on Micro; The importance of timelines in processing of data check the efficiency and economy of DP The confidentiality of the data being processed

18 Types of Bureaux Independent companies formed to provide specialist computer services Computer manufacturers with bureau Computer users (e.g. universities) 52 PLANNING AND CONTROL EXERCISED BY THE USER When the system using CSB is set up it is essential that a full feasibility study and system design should be carried out. In practice the bureau may provide assistance in performing these tasks. 53 PLANNING AND CONTROL EXERCISED BY THE USER The control should include : Prior vetting of bureau standards ; Input controls at preparer s end; bunching and providing or authorizing in the same way as usual; Transit controls ;Physical transfer of documents ; batch controls,physical security and authorized personnel; 54 18

19 PLANNING AND CONTROL EXERCISED BY THE USER The control should include : Electronic transmission of data ;batch totals, passwords and possibly encryption coding for very sensitive data; Control over and action on rejection; there must be strong control over the level of rejections; whose fault, the bureaus or ours?; 55 COMPUTER SERVICE BUREAUX Output controls :logging /registering receipt of output material and original documentation,distribution and filing; Master file amendment controls; suggested control include the usual use of pre-numbered properly authorized forms. Special control of periodic print out of all master file amendments; Adequate insurance covering loss of data or documents and computer breakdown at the bureau itself ;The external auditor review of bureau controls ; 56 COMPUTER SERVICE BUREAUX A third party review an independent firm to carry out review of internal controls, both the general and application based. The report is then made available to the auditors of clients of the bureaus. This saves the bureau having to make provision for many different sets of auditors all asking to run CAATs on the bureaux system and complete roughly similar ICQ/ICE forms. Direct evaluation of the bureau by the auditor using the CAATs, ICQ and ICE.; Standby /back up /emergency arrangement ; 57 19

20 COMPUTER SERVICE BUREAUX The compliance and substantive testing of programmed procedures, the CAATs such as discussed above are appropriate where the client has the data and files on the premises. They may not be possible in context of the computer service bureau. The client may have to arrange to have files copied by the bureau or supplied to the auditor for testing Minutes Break 59 CONTROLS IN ON-LINE AND REAL TIME SYSTEMS Controls in real time systems The main control problem is that primarily the concern is on large, multi user systems with terminals (dumb terminals or networked PCs) The same person is often responsible for producing and processing the same information. Internal check,supervisory controls should be strengthened (segregation of duties) ; The ability of a person using remote terminal to gain access to databases at will results in the need for special controls to ensure that files are neither read nor written to (nor destroyed)

21 CONTROLS IN ON-LINE AND REAL TIME SYSTEMS Physical controls; Operating system; Use passwords( or lockwords) or special badges or key; Restriction by the operating system of a certain users to certain files.eg wages dept can be given access to only wages file; Logging of all attempted violation of the above controls.eg Automatic shut down of the PC or terminal used; All violations should be speedily and thoroughly investigated Application controls; Validity checks on input; Reporting of unusual transactions; Passwords 61 DATABASE MANAGEMENT SYSTEMS (DBMS) Main controls; Control to prevent or detect unauthorized changes to programs; No access to live program file by any personnel except for the operation personnel at the central computer; Password protection on programs; Restricted access to the central computer and terminal ; Maintenance of console; Periodic comparison of live production programs to control copies and supporting documentation. 62 Main controls; DATABASE MANAGEMENT SYSTEMS (DBMS) Controls to prevent or detect error during operation; Restriction of access to terminals by use of password; Satisfactory application control over input, processing and master file ; Use of operation manuals and training all users; Maintenance of logs showing unauthorized attempts to access; Physical protection over data files ;Training in emergency procedures Controls to ensure integrity of the database system; Restriction of access to data dictionary 63 21

22 DATABASE MANAGEMENT SYSTEMS (DBMS) Controls to ensure integrity of the database system; Restriction of access to data dictionary( point of definition and interrelationship of data); Segregation of duties between data processing manager and data base administration personnel; Liaison between database administration function and systems development personnel Preparation and update as necessary of user manual in conjunction with data dictionary 64 DATA BASE MANAGEMENT SYSTEM The audit of DBMS creates particular problems as the two principal CAATs, test data and audit software, tend to work unsatisfactorily on programs and files contained within such system. The auditor may, however, be able to use embedded audit facilities. Close liaison with the internal auditor may provide audit comfort. The auditors should if possible be involved at the evaluation, design and development stages, so that they are able to determine their audit requirements and identify control problems before implementation Minutes Break QUESTION 3 ( P18. MAY, 2010) You have been asked to evaluate the system of internal control in an electronic date processing system. REQUIRED: Specify some of the matters to which you would give attention in relation to: Division of responsibilities File storage What will be the auditor s work or the areas in which he requires to pay special attention in auditing: College and schools? Charitable institutions? 66 22

23 2 MINUTES BREAK REQUIRED: (NBAA CPA - Nov. 2009) a) (i) List the audit procedures to be followed by your assistant in verifying the bank reconciliation in sufficient details for an inexperienced staff member to follow.(6marks) (ii) Explain the purpose of each procedure in terms of audit objectives. (5 marks) (b) Discuss the reliability of bank statements as audit evidence. What steps can be taken if it is considered desirable to increase their reliability? (3 marks) (c) (i) Distinguish between auditing around the computer and auditing through the computer.(3 marks) (ii) Explain the circumstances when it would be inappropriate for the auditor to rely on auditing around the computer. (3 marks) (Total = 20 marks) 67 SMALL COMPUTER SYSTEM Control problems in small computer systems The problems surrounding PC s can be grouped as ; Lack of planning over the acquisition and use of PCs; Lack of documentary evidence ; Lack of security and confidentiality MINUTES BREAK NBAA: QUESTION 5 NOVEMBER, 2010 The auditors of Malaga Co. a large engineering company, are now in the course of auditing the company's financial statements for the year ended 31 st October, At the audit briefing, the audit manager made the following statements: 'Whilst we are all aware of the benefits that Malaga Co. should have gained from using a computer based accounting system, we need to be alert to the specific risks that a computer-based accounting system poses to an entity's internal controls. We will be using audit software. REQUIRED: (a) State four benefits that Malaga Co.. should have gained from using a computer-based accounting system. (b) State six specific risks that the use of a computer-based accounting system poses to an entity's internal controls. c) Explain the term audit software. D) Describe any four functions performed by audit software and for each function suggest how it could be used for a specific task by the external auditors of Malaga Co. (8 marks) 69 23

24 COMPUTER FRAUD Input fraud : Processing fraud; Fraudulent use of computer system; Output fraud; 70 FACTORS- RISK TO COMPUTER FRAUD Increase in computer literacy Communications e.g. telephone and PCs and hackers Reduction of internal Check Improvements in quality of software and increase in implementation of good software has not kept pace with improvements in hard ware 71 COUNTERACT COMPUTER FRAUD Planned approach to counteract computer fraud. All staff should be properly trained and should fully appreciate their role in computer function Management policy on fraud should be clear and firm A study should be carried to examine where the company is exposed to possible fraud A company should map out an approach or plan in each area of the business to tackle and prevent fraud

25 CONTROLS TO PREVENT COMPUTER FRAUDS As with a control system, three areas to examine are; prevention, detection and correction Access to the computer terminals and other parts of the computer should be restricted Access to sensitive areas of the system should be logged and monitored Errors logs and reports should be monitored and investigated on regular basis Staff recruitment should include careful vetting,include taking up all references Expert systems software may be used to monitor unusual transactions 73 2 Minutes Break See the separate question detailed one 74 DEVELOPMENTS IN COMPUTERIZED ENVIRONMENT Many auditors are now finding their clients conducting business through the internet. As always, the principle audit concern, will be controls over the use of the internet and the strength of audit evidence obtained through the internet 75 25

26 INTERNET Controls over the Internet Unauthorized use of the internet Staffs may use internet for unauthorized purchases Staff may use internet for accessing data which have a costs (call) People may be able to access business internal systems via the internet and obtain confidential information or launch virus which disrupts internal systems 76 CONTROLS IN INTERNET Controls from these risks include Use of passwords, Disabling certain terminals Firewalls Authorization the technique make sure that a message has come from an authorized sender Virus control software regular updating Physical controls ;against fire, damage etc 77 AUDIT EVIDENCE IN THE INTERNET Audit evidence in the Internet Certain general observations can be made about audit evidence obtained through the Internet Internet evidence generated by the auditor will be stronger than evidence generated by client. Comfort may be obtained if the auditor can access the internet and test what the client has posted Internet evidence can be obtained in written form and thus stronger than oral evidence If the internal controls mentioned above are strong,the auditors will have more confidence in the quality of evidence 78 26

27 WHAT ABOUT ? may have numerous advantages in reducing office paperwork and speeding up communication, but it also has dangers from an audit point of view. e.g. unscrupulous employee in a large organization might find it quite easy to send and from his or her boss s computer authorizing a substantial bonus /payrise H/W; what controls could you put to prevent this from happening 79 CONTROL IN INTERNET SYSTEM Control of network system is of uttermost importance.the auditors must be able to analyse the risk of unauthorized access such as line tapping or interception and to evaluate preventive measures Authentication programs and encryption are used for security, the auditor must understand those matter and should be able to make recommendations on implementation. Password security is extremely important, and the auditors may be called upon to recommend complex password procedures for sophisticated APT systems. Financial Consultants 80 ELECTRONIC DATA INTERCHANGE Electronic data interchange (EDI) is now used very widely because it cuts the task of re-inputting data that has already been input into a system in electronic form, saving time and improving accuracy EDI is authentic? What authorization measures are in place to ensure that transactions above certain value are properly authorized before being transmitted or accepted? What is the legal position of the two parties if the transaction is disputed? Encryption and authentication offer some help, as do transaction logs that identify the originator or any transactions generated and transmitted

28 WHAT IS EDI Is the automated computer-tocomputer exchange of structured business transactions between an enterprise and its vendors, customers, or other trading partners in a standard format, with a minimum of human intervention 82 CONSIDERATION OF AUDIT STANDARDS ISA 315, Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement and ISA 330, The Auditor s Procedures in Response to Assessed Risks became effective. 83 CONSIDERATION OF AUDIT STANDARDS Major issues to be considered by an auditor as per ISA An auditor should consider new CIS environment affects the audit The overall objective of audit in CIS audit never changes. The design and performance of appropriate tests of Controls and Substantive procedures to achieve the audit objective are likely to change

29 CONSIDERATION OF AUDIT STANDARDS Major issues to be considered by an auditor as per ISA The existence of computer is likely to have an impact on the clients inherent risk and control risk. The auditor should have sufficient knowledge of CIS to plan, direct supervise and review the work performed. The auditor should consider whether specialized CIS skills are needed in an APT Financial audit. Consultants 85 ISA The ISA makes it clear that auditors should have sufficient knowledge of the CIS to perform such audit effectively. It is not necessary for overly member of audit team to be a computer expert auditors must consider need for specialized CIS skills.isa 620 using the work of expert is relevant. In planning the portions of audit which may be affected by the clients environment the auditor should obtain an understanding of significance and complexity of CIS activities and the availability of data for use in the audit. 86 ISA Auditor must obtain understanding of accounting and IC sufficient to plan an effective approach. Where CIS is significant, the auditor must assess the effect of the CIS on in hereunto control risk. Complexity normally increases risk and deficiencies in program development, mtc, physical security and access controls would have an effect on all applications that the system served

30 ELECTRONIC COMMERCE IAPN Is any Commercial activity that takes place by means of connected computers. E.g. offering goods for sale directly from office computer; the purchasers computer and office computer is connected over Internet. How do we audit ex-commerce? International Audit Practice Note (IAPN) in intended to assist auditors in identifying and assessing the new risk to which the business in exposed when it undertakes e-commerce transactions. 88 MAJOR AREAS OF FOCUS BY THE IAPS 1013 The skill and knowledge required to understand the implications of e- commerce on audit The extent of knowledge an auditor should have about the client s business environment and activities. 89 MAJOR AREAS OF FOCUS BY THE IAPS 1013 The business, legal, regulatory and other risk faced by entities engaged in e-commerce transactions. The effect of electronic records on audit evidence. The statement may be also helpful to the auditor of any business engaged in e-commerce

31 5 MINUTES BREAK See the Class Presentation on the question 91 What is an IT audit? Like operational, financial and compliance auditors, Information Technology (IT) auditors work to: Understand the existing internal control environment Identify high risk areas through a formal methodology Ensure that adequate internal controls are in place and operate effectively (through the testing of said controls) Recommend control implementation where risk exists 92 Why IT AUDIT? Because of Information Technology RISK!! Risk: The probability that a particular threat exploits a particular vulnerability (i.e. an issue which may impact ability to meet objective). Threat: Event with the potential to cause unauthorized access, modification, disclosure, or destruction of info resources. Vulnerability: Weakness in a system control, or a design flaw, that can be exploited to violate system, network, or data integrity

32 What Reduces IT Risk and What about any Remaining Risk? Internal Controls (i.e. safeguards) Control: Protective measure implemented to ensure company assets (IT or otherwise) are both available and accurate in order to meet the business requirements of that asset. Residual Risk: The risk that is left over after reasonable internal controls have been both evaluated and implemented. Internal Controls do not eliminate all risk!! 94 INTERNAL CONTROLS OTHER MATTERS The are two major types of controls: Application Controls General Controls

33 What about OTHER types of audits that may impact IT Traditional Audit Types: Financial opinion audits (CPAs) Operational process audits now includes environmental & construction Compliance laws/regulations and policies, standards, and procedures IT usually considered operational unless performed so opinion auditors may rely on financial info provided Hybrid - Integrated Audit today almost all audits are actually hybrid 97 Operational Audits Review operating policies/procedures Documented policies/procedures? Informal policies/procedures? Work flow examined (thru flowchart or description requested/developed) Controls identified and documented Examine the business process and recommend improvements control related or efficiency/effectiveness 98 MANUAL AND PROGRAMMED CONTROLS Many controls over computers are manual controls, and prodding that the manual controls exercised by users are sufficient to provide reasonable assurance of the completeness, accuracy and authorization of output, test of control may be limited to those manual controls. In a payroll system, for example, if users test check gross pay, deductions net pay and authorization at the output stage, and if they compare net pay with approved bank transfer documentation and perform regular bank reconciliation s; there may be no need to test programmed controls

34 Other Controls: MANUAL CONTROLS Manual Controls Physical Controls: -Is a matter of common sense. -Limit access to a computer room, - Locks and keys, only to specified people -Prevention of smooking. Back-up of disks: -Create and update an identical back up disk for every disk in the system; Data files&program files; The disk should be stored in separate place. 100 Other Controls: MANUAL CONTROLS Manual Controls Data filing: -Each disk should be labeled clearly and filed securely.the labeled disks should be filed in special disk boxes to provide a degree of protection against liquid being spoilt on the disks or their being bent or plied. Documentation: It is vital, as it provides both a support system for work already stored on disk and filed, and progress report on data currently being processed or updated. Staff Training: Proofing:There is always room for manual checking or proofing, to control data on disk. 101 Programmed Controls: PROGRAMMED CONTROLS Passwords; Date/time stamps for compass on of two revisions of data; Prompts Asking the user to continue with an action or not. Check Digit: A means of control on that they ascertain whether or not a number, such as ISBN is valid. E.g. customer account No. The computer will detect of the number is ever input incorrectly. Batch totals and hash totals:

35 Programmed Controls: PROGRAMMED CONTROLS Reasonable checks: Checks to ensure that data input is reasonable given the type of input it is e.g. A payroll system would check that his recorded for a falls within a range of 30 to 50. Existence checks: Checks to ensure that the data input is valid by checking that the entity already exists in the system. E.g. employee number. Dependency checks: Data input fields can be compared with other fields for reasonableness. 103 SMALL STAND ALONE MICRO-COMPUTER Main problems. Internal Controls. Major controls appropriate in this environment are:- Authorization: Physical security AUDIT PROCEDURES Substantive tests 104 Internal controls Inherent limitations of the system of IC in elimination of frauds & errors. The need to balance the cost of control with its benefits; The fact that IC are applied to systematic transaction, not one-off year-end adjustments, which are often larger and subject to error; The potential human error; Possibility of circumvention of IC through collusion of managers or employees with other parts inside /outside the entity; Abuse of controls or override of controls e.g. ordering of personal goods; Obsolescent of controls

36 FURTHER CONSIDERATION OF CAATs Further considerations of CAATs ISA requires auditors to obtain appropriate audit evidence to be able to allow reasonable conditions on which to base their opinion. Advantages of CAATS: Helps to test larger number of data hence increase confidence in their opinion; Help s to test Accounting Systems its records (Tables & Disk files) rather than relying on testing printout; Are cost effective once set up for obtaining audit evidence; Comparison can easily be made from clerical audit work hence increase confidence. 106 OTHER DETAIL MATTERS Difficulties of using computer programs cost. Cost; Changes to clients system; Small installations PC; Over elaboration; Larger quantities of output; Version of file used for lest. Test Data: Is a data submitted by the auditor for processing the clients computer-based accounting system. 107 OTHER MATTERS Major approached to the use of test data Using live data Using dummy data in a normal production nun. Using dummy data in special nun. Difficulties of test data: Cost Limited objective Dangers of live testing Difficult in recording audit evidence

Control Matters. Computer Auditing. (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising)

Control Matters. Computer Auditing. (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising) Computer Auditing Control Matters (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising) The introduction of a computerized or electronic data processing (EDP) accounting system has

More information

SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE

SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE Learning objective: explain the use of computer assisted audit techniques in the context of an audit discuss and provide relevant examples of the use of test

More information

INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT CONTENTS

INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT CONTENTS INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph

More information

How To Audit A Financial Statement

How To Audit A Financial Statement INTERNATIONAL STANDARD ON 400 RISK ASSESSMENTS AND INTERNAL CONTROL (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph Introduction... 1-10 Inherent

More information

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge

More information

[300] Accounting and internal control systems and audit risk assessments

[300] Accounting and internal control systems and audit risk assessments [300] Accounting and internal control systems and audit risk assessments (Issued March 1995) Contents Paragraphs Introduction 1 12 Inherent risk 13 15 Accounting system and control environment 16 23 Internal

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

Internal Control Systems

Internal Control Systems D. INTERNAL CONTROL 1. Internal Control Systems 2. The Use of Internal Control Systems by Auditors 3. Transaction Cycles 4. Tests of Control 5. The Evaluation of Internal Control Component 6. Communication

More information

auditing in a computer-based

auditing in a computer-based auditing in a computer-based RELEVANT TO cat paper 8 and ACCA QUALIFICATION PAPERs f8 The accounting systems of many companies, large and small, are computer-based; questions in all ACCA audit papers reflect

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

4 Testing General and Automated Controls

4 Testing General and Automated Controls 4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn

More information

STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS

STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS (Issued January 1997; revised January 2004) SAS 300 (revised January 04) Contents Paragraphs Introduction

More information

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS

More information

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior GAO United States General Accounting Office Report to the Secretary of the Interior July 2001 INFORMATION SECURITY Weak Controls Place Interior s Financial and Other Data at Risk GAO-01-615 United States

More information

Internal Control Guide & Resources

Internal Control Guide & Resources Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

SOLUTION: AUDIT AND INTERNAL REVIEW, MAY 2014

SOLUTION: AUDIT AND INTERNAL REVIEW, MAY 2014 SOLUTION 1(a) (a) The Auditing guideline points out that the amount or quantity of audit evidence required for the auditor to achieve the level of assurance is a matter of professional judgment. The factors

More information

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)

More information

IT Application Controls Questionnaire

IT Application Controls Questionnaire IT Application Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks A1.a. MULTIPLE USER PROCESSING INPUT CONTROLS Input controls are the procedures and methods utilized by

More information

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

1 (a) Audit strategy document Section of document Purpose Example from B-Star

1 (a) Audit strategy document Section of document Purpose Example from B-Star Answers Fundamentals Level Skills Module, Paper F8 (IRL) Audit and Assurance (Irish) June 2009 Answers 1 (a) Audit strategy document Section of document Purpose Example from B-Star Understanding the entity

More information

Master Document Audit Program

Master Document Audit Program Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on

More information

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.

More information

INFORMATION SYSTEM AUDITING AND ASSURANCE

INFORMATION SYSTEM AUDITING AND ASSURANCE CHAPTER INFORMATION SYSTEM AUDITING AND ASSURANCE As more and more accounting and business systems were automated, it became more and more evident that the field of auditing had to change. As the systems

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

Accounting Information Systems, 4th. Ed. CHAPTER 4 THE REVENUE CYCLE

Accounting Information Systems, 4th. Ed. CHAPTER 4 THE REVENUE CYCLE Accounting Information Systems, th. Ed. CHAPTER THE REVENUE CYCLE The revenue cycle is the set of activities in a business which brings about the exchange of goods or services with customers for cash.

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Practice Note. 25(Revised) February 2011 ATTENDANCE AT STOCKTAKING

Practice Note. 25(Revised) February 2011 ATTENDANCE AT STOCKTAKING February 2011 Practice Note 25(Revised) ATTENDANCE AT STOCKTAKING The Auditing Practices Board (APB), which is part of the Financial Reporting Council (FRC), prepares for use within the United Kingdom

More information

Point to note: computer information system is NOT equal to computer assisted audit techniques

Point to note: computer information system is NOT equal to computer assisted audit techniques COMPUTER ASSISTED AUDIT TECHNIQUES (CAAT) Point to note: computer information system is NOT equal to computer assisted audit techniques CAAT s are computer programs and data that the auditor uses as part

More information

Chapter 9 The Study of Internal Control and Assessment of Control Risk

Chapter 9 The Study of Internal Control and Assessment of Control Risk Review Questions Chapter 9 The Study of Internal Control and Assessment of Control Risk 9-1 There are seven parts of the planning phase of audits: preplan, obtain background information, obtain information

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

Reporting on Control Procedures at Outsourcing Entities

Reporting on Control Procedures at Outsourcing Entities Auditing Guidance Statement AGS 1042 (July 2002) Reporting on Control Procedures at Outsourcing Entities Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation

More information

The Basics of Internal Controls

The Basics of Internal Controls The Basics of Internal Controls Presented to: The Institute of Internal Auditors (IIA) Topeka Chapter April 7, 2009 Today s Objectives Provide Insight into Internal Controls! Risk and Fraud the basis for

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR

More information

INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS

INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING (Effective for audits of financial statements for periods beginning on or after December 15, 2004) CONTENTS Paragraph Introduction...

More information

Managing & Validating Research Data

Managing & Validating Research Data Research Management Standard Operating Procedure ISOP-H02 VERSION / REVISION: 2.0 EFFECTIVE DATE: 01 03 12 REVIEW DATE: 01 03 14 AUTHOR(S): CONTROLLER(S): APPROVED BY: Information Officer; NBT Clinical

More information

Ethics, Fraud, and Internal Control

Ethics, Fraud, and Internal Control Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in

More information

This release of the FISCAM document has been reformatted from the January 1999 version.

This release of the FISCAM document has been reformatted from the January 1999 version. United States General Accounting Office This release of the FISCAM document has been reformatted from the January 1999 version. It includes only formatting changes, refers to several different GAO documents,

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

Chapter 7 Securing Information Systems

Chapter 7 Securing Information Systems 1 Chapter 7 Securing Information Systems LEARNING TRACK 4: GENERAL AND APPLICATION CONTROLS FOR INFORMATION SYSTEMS To minimize errors, disaster, computer crime, and breaches of security, special policies

More information

IAASB. EMERGING PRACTICE ISSUES REGARDING t h e USE o f EXTERNAL CONFIRMATIONS STAFF AUDIT PRACTICE ALERT NOVEMBER 2009.

IAASB. EMERGING PRACTICE ISSUES REGARDING t h e USE o f EXTERNAL CONFIRMATIONS STAFF AUDIT PRACTICE ALERT NOVEMBER 2009. IAASB NOVEMBER 2009 STAFF AUDIT PRACTICE ALERT International Auditing and Assurance Standards Board The IAASB is an independent standard-setting board of the International Federation of Accountants. EMERGING

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

Information Technology Audit

Information Technology Audit IT Audit Monograph Series # 1 Information Technology Audit General Principles Introductory As computer technology has advanced, Government organisations have become increasingly dependent on computerised

More information

Fundamentals Level Skills Module, F8 (IRL)

Fundamentals Level Skills Module, F8 (IRL) Answers Fundamentals Level Skills Module, F8 (IRL) Audit and Assurance (Irish) June 2008 Answers 1 (a) Prior year internal control questionnaires Obtain the audit file from last year s audit. Ensure that

More information

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...

More information

Internal Controls and Political Committees

Internal Controls and Political Committees Internal Controls and Political Committees Under the Federal Election Campaign Act (FECA) and the Commission s regulations all political committees are required to file accurate and complete disclosure

More information

SAS 70 Exams Of EBT Controls And Processors

SAS 70 Exams Of EBT Controls And Processors Appendix VIII SAS 70 Examinations of EBT Service Organizations Background States must obtain an examination by an independent auditor of the State electronic benefits transfer (EBT) service providers (service

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

HIPAA Compliance with LT Auditor+

HIPAA Compliance with LT Auditor+ HIPAA Compliance with LT Auditor+ An Executive White Paper By BLUE LANCE, Inc. BLUE LANCE INC. www.bluelance.com 713.255.4800 info@bluelance.com On February 20, 2003, the Department of Health and Human

More information

Information Systems and Technology

Information Systems and Technology As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS Paragraph Introduction... 1-2 Definitions... 3-12 Audit Evidence... 13-17 Risk Considerations

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

HIPAA Information Security Overview

HIPAA Information Security Overview HIPAA Information Security Overview Security Overview HIPAA Security Regulations establish safeguards for protected health information (PHI) in electronic format. The security rules apply to PHI that is

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region

PATCH MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region PATCH MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Circular to All Licensed Corporations on Information Technology Management

Circular to All Licensed Corporations on Information Technology Management Circular 16 March 2010 Circular to All Licensed Corporations on Information Technology Management In the course of our supervision, it has recently come to our attention that certain deficiencies in information

More information

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1 APPENDIX A Appendix A Learning Continuum A-1 Appendix A Learning Continuum A-2 APPENDIX A LEARNING CONTINUUM E D U C A T I O N Information Technology Security Specialists and Professionals Education and

More information

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy ) Background Due to increased threat of identity theft, fraudulent credit card activity and other instances where cardholder

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Office of Inspector General

Office of Inspector General DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,

More information

Module 7: Computer auditing

Module 7: Computer auditing Module 7: Computer auditing Module 7: Computer auditing Overview In this module, you learn about the effects that computer processing has on both the control environment and the audit of financial systems.

More information

SECTION 15 INFORMATION TECHNOLOGY

SECTION 15 INFORMATION TECHNOLOGY SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of

More information

Auditing in an Automated Environment: Appendix C: Computer Operations

Auditing in an Automated Environment: Appendix C: Computer Operations Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations

More information

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction

More information

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,

More information

University of San Diego University Audit Office Self-Audit Tool. A - General

University of San Diego University Audit Office Self-Audit Tool. A - General University of San Diego University Audit Office Self-Audit Tool Department: Budget Officer: Completed by: Date: The Self-Audit Tool is a guide and is not all-inclusive. Yes indicates a needed control is

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.

More information

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.

More information

CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I

CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I CHAPTER CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I The basic topic of internal control was introduced in 3. These next two chapters discuss the implications of automating the accounting information

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

Tom J. Hull & Company Type 1 SSAE 16 2014

Tom J. Hull & Company Type 1 SSAE 16 2014 Tom J. Hull & Company Type 1 SSAE 16 2014 REPORT ON MANAGEMENT S DESCRIPTION OF TOM J. HULL & COMPANY S SYSTEM AND THE SUITABILITY OF THE DESIGN OF CONTROLS Pursuant to Statement on Standards for Attestation

More information

Solutions to Student Self Assessment Questions

Solutions to Student Self Assessment Questions Solutions to Student Self Assessment Questions Chapter 9 Testing and evaluation of systems Questions Two questions are placed within the text: (9.1) Case study 9.1 Broomfield plc: sales and trade receivables

More information

Chapter 15 Auditing the Expenditure Cycle

Chapter 15 Auditing the Expenditure Cycle Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Interim Audit Report. Borough of Broxbourne Audit 2010/11

Interim Audit Report. Borough of Broxbourne Audit 2010/11 Interim Audit Report Borough of Broxbourne Audit 2010/11 The Audit Commission is an independent watchdog, driving economy, efficiency and effectiveness in local public services to deliver better outcomes

More information

The Information Systems Audit

The Information Systems Audit November 25, 2009 e q 1 Institute of of Pakistan ICAP Auditorium, Karachi Sajid H. Khan Executive Director Technology and Security Risk Services e q 2 IS Environment Back Office Batch Apps MIS Online Integrated

More information

SESSION 3 AUDIT PLANNING

SESSION 3 AUDIT PLANNING SESSION 3 AUDIT PLANNING Learning Objectives: identify and explain the need for planning an audit identify and describe the contents of the overall audit strategy and the audit plan explain the difference

More information

Internal Controls. A short presentation from Your Internal Audit Department

Internal Controls. A short presentation from Your Internal Audit Department Internal Controls A short presentation from Your Internal Audit Department The Old Internal Audit Department The New Internal Audit Department We re here to help! Teach + Train = Change Our goal: Promote

More information

Auditing Module 7 June 2009. Suggested Solutions

Auditing Module 7 June 2009. Suggested Solutions Auditing Module 7 June 2009 Suggested Solutions 1 Question 1 1. Tests of control are tests carried out to obtain assurance about the operating and effectiveness of controls. An example of such a test would

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls

Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls Course Name: Internal Auditing & Controls Module: 5 Module Title: Examination phase of the internal audit Lecture and handouts prepared by Chuck Campbell Examination phase of the internal audit Module

More information

M-MIS. Comptroller of the Currency Administrator of National Banks. Management Information Systems. Comptroller s Handbook. May 1995.

M-MIS. Comptroller of the Currency Administrator of National Banks. Management Information Systems. Comptroller s Handbook. May 1995. M-MIS Comptroller of the Currency Administrator of National Banks Management Information Systems Comptroller s Handbook May 1995 M Management Management Information Systems Table of Contents Introduction

More information

Internal Control Deliverables. For. System Development Projects

Internal Control Deliverables. For. System Development Projects DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...

More information

INTERNET BANKING AGREEMENT & DISCLOSURE

INTERNET BANKING AGREEMENT & DISCLOSURE INTERNET BANKING AGREEMENT & DISCLOSURE This Agreement and Disclosure sets forth your and our rights and responsibilities concerning the use of our Internet Banking Product. In this Agreement, the words

More information