Control Matters. Computer Auditing. (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising)
|
|
|
- Barbara Greene
- 10 years ago
- Views:
Transcription
1 Computer Auditing Control Matters (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising) The introduction of a computerized or electronic data processing (EDP) accounting system has not brought any changes to auditors audit objectives, i.e. to enable the auditor to express an opinion whether the financial statements are prepared, in all material respects, in accordance with an applicable financial reporting framework. However, the methods of applying audit procedures in gathering audit evidence may be influenced by the way accounting data is processed. Characteristics of Computerized Accounting Systems Computerized accounting systems have the following characteristics: (i) Audit trail A transaction trail that can be used for audit purposes might only exist for a short period of time or only be in computer readable form. This is because computerized accounting systems eliminate some steps and some documents used that would otherwise be present in manual systems. (ii) Nature of processing errors Clerical errors are ordinarily associated with manual processing. In an EDP environment, processing errors are mainly caused by programming errors or systematic errors in the hardware or software. Furthermore, in computerized systems, data must be converted into machine-readable form; this introduces the possibility of input errors, which are supposed to be detected by input controls. (iii) Central processing of transactions When transactions are centrally processed in an EDP department, sometimes many incompatible functions are combined. To keep incompatible duties separate, segregation of duties is often established. (iv) Alteration of data or files Permanent data (such as a worker s hourly rate) stored in master file can often be altered without being
2 detected; this kind of fraud may not be detected for a long time. EDP Controls The control environment in complex EDP systems is even more critical than that in more simple systems because there is greater potential for misstatement. The types of controls in an EDP system are general controls and application controls. The difference between general and application controls is illustrated in the diagram below, in which three computer applications are shown. General controls affect all three applications, but separate application controls are developed for purchases, cash payments and inventory. Although some application controls affect one or only a few transactionrelated audit objectives, most of the procedures prevent or detect several types of misstatements in all phases of the application. Relationship of General Controls and Application Controls to Audit Applications General Controls General Controls If general controls are ineffective, there may be potential for material misstatement in each computerbased accounting application. General controls relate to the environment within which systems are developed, maintained and operated. Such controls related to all parts of the EDP system and they apply to any one application. Auditors usually evaluate the effectiveness of general controls before evaluating application controls. If general controls are ineffective, there may be potential for material misstatement in each computer-based accounting application. The general controls must therefore be evaluated early in the audit. Purchases Cash payments Inventory General controls are to ensure the integrity of application development and implementation and to ensure that computer operations are properly administered to protect hardware, programmes and data files. There are five main types of general controls: (i) Organization of EDP department for purchases for cash payments for inventory 1. An application is a programme or group of programmes designed to process a particular group of transactions such as payment of creditors. No one individual should be able to (a) access the data; (b) alter the computer system or programmes; and (c) access the computer.
3 There should be segregation of duties within EDP Department, so as to prevent EDP personnel from authorizing and recording transactions to hide theft of assets, and to minimize the possibility of recording and processing errors. In principle, no one individual should be able to (a) access the data; (b) alter the computer system or programme, and (c) access the computer. Suppose that there is inadequate segregation of duties such that computer operators are also programmers and have access to computer programmes and data files, then the auditors would be concerned about the potential for fictitious transactions or unauthorised data and omissions in the accounts. Assume that the auditors find that there are inadequate safeguards over data files, they may then conclude that there is a significant risk of loss of data because the general controls affect each application. The following functions should be separated within the EDP Department: Applications and programming (design and maintenance of computer hardware and software). It is important that the programmer does not have access to input data on computer operations, since his understanding of the programme can easily be used for personal benefit. The librarian provides a means of important physical control over the computer programmes, transaction files, and other important computer records and releases them only to authorized personnel. Operations (running the computer, executing jobs). Ideally, the operator should be prevented from having sufficient knowledge of the programme to modify it immediately before or during its use. Data Control (data input and output). The function of the data control group is to test the effectiveness and efficiency of all aspects of the system. This includes the application of various controls, the quality of the input, and the reasonableness of the output. (ii) Application Development and Maintenance Controls The purpose of this general control area is to ensure that the client adequately controls computer programmes and related documentation. The primary controls are included in the design and use of systems manuals. Documentation is often the best source of information about control features within computer programmes, and thus the auditor s review of computer controls may depend, in part, on adequate documentation. Common types of computer documentation include programme flowcharts and narratives, record and file layouts and operator instructions. (iii) Hardware Controls Hardware controls are built into the equipment by the manufacturer to
4 detect equipment failure. Auditors are less concerned with the adequacy of the hardware controls in the system than with the organization s methods of handling the errors that the computer identifies. (iv) Access to Computer Equipment, Data Files and Programmes These general controls are important for safeguarding EDP equipment and records. This is accomplished through locked doors, segregation of duties, locked cabinets containing data files, passwords or security codes and reports of jobs run on the computer. (v) Data or Procedural Controls Copies of all important files and programmes should be kept off site. This may prevent losses due to accidental erasure, intentional vandalism, or catastrophic loss (e.g. because of fire). One commonlyused data storage method is the grandfather-father-son method. Application Controls are controls specific to a particular accounting application. Separate application controls are developed for different applications. must be evaluated specifically for every audit area in which the client uses the computer where the auditor plans to reduce assessed control risk. There are four main types of application controls: (i) Input controls; (ii) Processing controls; (iii) Output controls; and (iv) Controls over Master File information. are to ensure the completeness and accuracy of all processing and the validity of the accounting entries made. There are four main types of application controls: (i) Input controls Controls over input are designed to assure that the information processed by the computer is valid, complete, and accurate. These controls are critical because a large number of errors in computer systems are the results from input errors. Common input controls include check digits, batch totals, hash totals, limits or reasonableness tests, validity checks etc. (ii) Processing controls Controls over processing are designed to assure that data input into the system is accurately processed. This means that all data entered in the computer are processed, processed only once, and processed accurately. Most processing controls are also programmed controls, which mean that the computer is programmed to do the checking. Common examples include control totals, logic tests, and completeness tests. (iii) Output controls Controls over output are designed to assure that data generated by the computer are valid, accurate, and complete. Moreover, outputs should be distributed in the appropriate quantities only to authorized people. The most important output control is review of the data for reasonableness by someone who knows what the output should look like. (iv) Controls over Master File information Many transactions depend on the accuracy of information in the Master File. For example, all sales transactions depend on price list, or all payroll amounts depend on hourly rate or salary rate. User departments should get periodic reports containing the contents of the Master File. There should be procedures in place to verify that the correct version of the Master File is being used.
5 How do Auditors Test Controls in an EDP Environment? Auditors obtain information on general and application controls by: (i) interviewing EDP staff; (ii) reviewing flowcharts and documentation that describe the system and programmes; and (iii) reviewing internal control questionnaires they have given the client to complete. Audit around the computer only when: (a) the audit trail is complete; (b) processing operations are straightforward, and (c) systems documentation is complete and readily available When the audit trail is incomplete and the computer processing operations are complicated, it is inappropriate to audit around the computer. This technique should only be used when the audit trail is complete, computer-processing operations are straightforward and systems documentation is complete and readily available. Under the technique of auditing around the computer, auditors bypass the computer and treat it as a giant book-keeping machine. This is acceptable in some situations but becomes unacceptable if the relationship between the output and the input cannot be properly understood without examining the intervening computer processing, e.g. when there is no visible audit trail. Audit through the computer with: (i) audit test data; (ii) parallel simulation; and (iii) integrated test facility In more complex EDP environments, clients retain data in electronic format only. The loss of audit trail means auditors must test application controls directly by auditing through the computer. Auditors test application controls using three types of tests: (i) audit test data, (ii) parallel simulation and (iii) integrated test facility.
INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT CONTENTS
INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph
AUDITING IN COMPUTER ENVIRONMENT. What is audit in a computer environme nt?
AUDITING IN COMPUTER ENVIRONMENT What is audit in a computer environme nt? Wherever computer based accounting system, large or small are operated by an enterprise, or by a third party on behalf of the
PART 10 COMPUTER SYSTEMS
PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
Internal Controls. A short presentation from Your Internal Audit Department
Internal Controls A short presentation from Your Internal Audit Department The Old Internal Audit Department The New Internal Audit Department We re here to help! Teach + Train = Change Our goal: Promote
Internal Control Guide & Resources
Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process Chapter 12 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-1 Learning Objective 1 Describe how IT improves internal
Learning Objective 1. The Impact of Information Technology on the Audit Process. Describe how IT improves internal control.
Learning Objective 1 The Impact of Information Technology on the Audit Process Describe how IT improves internal control. Chapter 12 12-1 12-2 How Information Technologies Enhance Internal Control Learning
Chapter 9 The Study of Internal Control and Assessment of Control Risk
Review Questions Chapter 9 The Study of Internal Control and Assessment of Control Risk 9-1 There are seven parts of the planning phase of audits: preplan, obtain background information, obtain information
How To Audit A Financial Statement
INTERNATIONAL STANDARD ON 400 RISK ASSESSMENTS AND INTERNAL CONTROL (This Standard is effective, but will be withdrawn when ISA 315 and 330 become effective) * CONTENTS Paragraph Introduction... 1-10 Inherent
Module 7: Computer auditing
Module 7: Computer auditing Module 7: Computer auditing Overview In this module, you learn about the effects that computer processing has on both the control environment and the audit of financial systems.
Internal Control Systems
D. INTERNAL CONTROL 1. Internal Control Systems 2. The Use of Internal Control Systems by Auditors 3. Transaction Cycles 4. Tests of Control 5. The Evaluation of Internal Control Component 6. Communication
Connecting the dots: IT to Business
Connecting the dots: IT to Business Jason Wood, CPA, CISA, CIA, CITP, CFF April 2015 1 Speaker Bio Jason Wood Over 18 years of international business experience in planning, conducting, and quality reviewing
5:31-7 Appendix B LOCAL AUTHORITIES - ACCOUNTING AND AUDITING IF ANY ARE NOT APPLICABLE, INSERT N/A AS YOUR ANSWER. FIRE DISTRICT YEAR UNDER AUDIT
5:31-7 Appendix B LOCAL AUTHORITIES - ACCOUNTING AND AUDITING AUDIT QUESTIONNAIRE FOR FIRE DISTRICT AUDITS EACH QUESTION MUST BE ANSWERED. PLEASE CIRCLE YES OR NO. IF ANY ARE NOT APPLICABLE, INSERT N/A
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE Learning objective: explain the use of computer assisted audit techniques in the context of an audit discuss and provide relevant examples of the use of test
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Auditing in an Automated Environment: Appendix C: Computer Operations
Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations
Master Document Audit Program
Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on
GENERALIZED AUDIT SOFTWARE
EVIDENCE COLLECTION The auditors problem is not a shortage of evidence collection techniques to use, but it is knowing what technique or set of techniques is best to use for a given system or program.
DETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/[email protected] DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
IT Application Controls Questionnaire
IT Application Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks A1.a. MULTIPLE USER PROCESSING INPUT CONTROLS Input controls are the procedures and methods utilized by
Chapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
Knowledge Management Series. Internal Audit in ERP Environment
Knowledge Management Series Internal Audit in ERP Environment G BALU ASSOCIATES Knowledge Management Series ISSUE-5 ; VOL 1 Internal Audit in ERP Environment APRIL/2012 Editorial Greetings..!!! Raja Gopalan.B
Ethics, Fraud, and Internal Control
Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in
Information System Audit Report Office Of The State Comptroller
STATE OF CONNECTICUT Information System Audit Report Office Of The State Comptroller AUDITORS OF PUBLIC ACCOUNTS KEVIN P. JOHNSTON ROBERT G. JAEKLE TABLE OF CONTENTS EXECUTIVE SUMMARY...1 AUDIT OBJECTIVES,
Interim Audit Report. Borough of Broxbourne Audit 2010/11
Interim Audit Report Borough of Broxbourne Audit 2010/11 The Audit Commission is an independent watchdog, driving economy, efficiency and effectiveness in local public services to deliver better outcomes
Internal Control Guidelines
Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth
Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014
Electronic Audit Evidence (EAE) and Application Controls Tulsa ISACA Chapter December 11, 2014 Agenda Recent IT-related PCAOB inspection themes: Internal control over financial reporting Multi-location
auditing in a computer-based
auditing in a computer-based RELEVANT TO cat paper 8 and ACCA QUALIFICATION PAPERs f8 The accounting systems of many companies, large and small, are computer-based; questions in all ACCA audit papers reflect
MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE
MANAGEMENT AUDIT REPORT OF ACCOUNTS PAYABLE REPORT NO. 04-108 CITY OF ALBUQUERQUE OFFICE OF INTERNAL AUDIT AND INVESTIGATIONS of Accounts Payable Report No. 04-108 Executive Summary Background The Department
Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology
6G Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology TABLE OF CONTENTS Page Report on Internal Controls Related to Information Technology Network and Network Security 1
10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process
10-1 Auditing Business Process Auditing Business Process Objectives Understand the Auditing of the Enteties Business Process Identify the types of transactions in different Business Process Asses Control
CITY OF SAN ANTONIO OFFICE OF THE CITY AUDITOR. Audit of Center City Development & Operations Department. Parking Revenue. Project No.
CITY OF SAN ANTONIO OFFICE OF THE CITY AUDITOR Audit of Center City Development & Operations Department Parking Revenue Project No. AU14-010 September 25, 2014 Kevin W. Barthold, CPA, CIA, CISA City Auditor
[300] Accounting and internal control systems and audit risk assessments
[300] Accounting and internal control systems and audit risk assessments (Issued March 1995) Contents Paragraphs Introduction 1 12 Inherent risk 13 15 Accounting system and control environment 16 23 Internal
STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS
STATEMENT OF AUDITING STANDARDS 300 AUDIT RISK ASSESSMENTS AND ACCOUNTING AND INTERNAL CONTROL SYSTEMS (Issued January 1997; revised January 2004) SAS 300 (revised January 04) Contents Paragraphs Introduction
REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the
REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the maintenance, retention and submission of electronic records.
The policy and procedural guidelines contained in this handbook are designed to:
BASIC POLICY STATEMENT The Mikva Challenge is committed to responsible financial management. The entire organization including the board of directors, administrators, and staff will work together to make
Basic Concepts of Accounting Subsidiary Subsidiary Special Special Inform Infor a m tion Ledgers Ledger Journals Jour Systems
COMPUTERIZED ACCOUNTING SYSTEMS Basic Concepts of Accounting Information Systems Subsidiary Ledgers Special Journals Computerized accounting systems Manual accounting systems Example Advantages Sales journal
4 Testing General and Automated Controls
4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn
Information Technology Audit
IT Audit Monograph Series # 1 Information Technology Audit General Principles Introductory As computer technology has advanced, Government organisations have become increasingly dependent on computerised
Full Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
Audit Manual PART TWO SYSTEM BASED AUDIT
Audit Manual PART TWO SYSTEM BASED AUDIT Table of content 1. Introduction...3 2. Systems based audit...4 2.1. Preparing for & planning the audit assignment...5 2.2. Ascertaining and recording the system...7
Good Internal Controls for Small Businesses
Good for Small Businesses SOX and the Importance of Good for Small Businesses MENDELSON CONSULTING Mario Nowogrodzki, CPA.CITP America s QuickBooks Specialists www.qbspecialists.com MARIO NOWOGRODZKI,
Solutions to Student Self Assessment Questions
Solutions to Student Self Assessment Questions Chapter 9 Testing and evaluation of systems Questions Two questions are placed within the text: (9.1) Case study 9.1 Broomfield plc: sales and trade receivables
Chapter 7 Securing Information Systems
1 Chapter 7 Securing Information Systems LEARNING TRACK 4: GENERAL AND APPLICATION CONTROLS FOR INFORMATION SYSTEMS To minimize errors, disaster, computer crime, and breaches of security, special policies
MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center
MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
Transactional Flowchart: Guidelines and Examples
Transactional Flowchart: Guidelines and Examples A Transactional Flowchart depicts all the activities in a process, from beginning to end. You can use a Transactional Flowchart to: Provide a pictorial
1 INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN
1 INTRODUCTION TO SYSTEM ANALYSIS AND DESIGN 1.1 INTRODUCTION Systems are created to solve problems. One can think of the systems approach as an organized way of dealing with a problem. In this dynamic
DISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and
The audit of inventories
The audit of inventories Why is it important? Easiest assets to manipulate Misstatement affect reported profit: misstatement of inventory balances has a direct effect on reported profit. Inventories identification:
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
IT Enabled System : Opportunities & Challenges for Assurance Professionals
IT Enabled System : Opportunities & Challenges for Assurance Professionals Acknowledgements: - ISACA - ITGI - Wikipedia - The Economist - ICMAB - SCB March 31, 2011; ICAB (Chartered Accountant Bhaban)
TRANSFERRING INTERNAL CONTROL KNOWLEDGE FROM LEGISLATION TO SCHOOL MANAGEMENT: THE CASE OF SLOVENIA
TRANSFERRING INTERNAL CONTROL KNOWLEDGE FROM LEGISLATION TO SCHOOL MANAGEMENT: THE CASE OF SLOVENIA Tatjana Horvat International School for Social and Business Studies, Slovenia [email protected]
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
INFORMATION SYSTEM AUDITING AND ASSURANCE
CHAPTER INFORMATION SYSTEM AUDITING AND ASSURANCE As more and more accounting and business systems were automated, it became more and more evident that the field of auditing had to change. As the systems
GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.
GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers
TRAINING IN FINANCIAL AND BUSINESS MANAGEMENT FOR ROAD CONTRACTORS MODULE ONE: SESSION FIVE PARTICIPANTS NOTES FINANCIAL ACCOUNTING FRAMEWORK
TRAINING IN FINANCIAL AND BUSINESS MANAGEMENT FOR ROAD CONTRACTORS 1.0 Purpose of session: The purpose of this session is; MODULE ONE: SESSION FIVE PARTICIPANTS NOTES FINANCIAL ACCOUNTING FRAMEWORK 1)
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
FEDERAL FAMILY EDUCATION LOAN PROGRAM (FFELP) SYSTEM
REPORT NO. 2015-007 AUGUST 2014 DEPARTMENT OF EDUCATION FEDERAL FAMILY EDUCATION LOAN PROGRAM (FFELP) SYSTEM Information Technology Operational Audit DEPARTMENT OF EDUCATION Pursuant to Article IX, Section
CHAPTER 3. Data Modeling and Database Design- Part1
CHAPTER 3 Data Modeling and Database Design- Part1 INTRODUCTION Questions to be addressed in this chapter include: What is the purpose of documentation? Why do accountants need to understand documentation?
CPA Student Training Records
CPA Student Training Records INDEX Page Introduction 1 The Route to Membership 2 The Structure of the Training Record 3 Note for Employers 3 Note for Students 4 Section A Detailed Record of Practical Experience
Department of Consumer Affairs Cash Disbursements by Agency Checks
Internal Control Audit of the Department of Consumer Affairs Cash Disbursements by Agency Checks January 2008 Audit No. 2007-102 Internal Audit Office TABLE OF CONTENTS Report Summary Auditor s Report
Point to note: computer information system is NOT equal to computer assisted audit techniques
COMPUTER ASSISTED AUDIT TECHNIQUES (CAAT) Point to note: computer information system is NOT equal to computer assisted audit techniques CAAT s are computer programs and data that the auditor uses as part
ETHICS, FRAUD, AND INTERNAL CONTROL
CHAPTER ETHICS, FRAUD, AND INTERNAL CONTROL The three topics of this chapter are closely related. Ethics is a hallmark of the accounting profession. The principles which guide a manager s decision making
SOLUTION: AUDIT AND INTERNAL REVIEW, MAY 2014
SOLUTION 1(a) (a) The Auditing guideline points out that the amount or quantity of audit evidence required for the auditor to achieve the level of assurance is a matter of professional judgment. The factors
In recent years, information technology (IT) used by firms,
Copyright 2003 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. Impact of SAS No. 94 on Computer Audit Techniques By M. Virginia Cerullo, CPA, CIA, CFE, and Michael
Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications
Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.
THE HUD PARTNERSHIP CENTER S CAPACITY BUILDING WORKSHOP SERIES: FINANCIAL MANAGEMENT MODULE
THE HUD PARTNERSHIP CENTER S CAPACITY BUILDING WORKSHOP SERIES: FINANCIAL MANAGEMENT MODULE U.S. Department of Housing and Urban Development Center for Faith Based and Neighborhood Partnerships Financial
Practice Note. 25(Revised) February 2011 ATTENDANCE AT STOCKTAKING
February 2011 Practice Note 25(Revised) ATTENDANCE AT STOCKTAKING The Auditing Practices Board (APB), which is part of the Financial Reporting Council (FRC), prepares for use within the United Kingdom
Internal Controls over Cash for Small Nonprofits
Internal Controls over Cash for Small Nonprofits Internal controls may be a sensitive issue in small nonprofit organizations. These organizations are built on the concepts of honesty, truthfulness, and
Introduction to Systems Analysis and Design
Introduction to Systems Analysis and Design What is a System? A system is a set of interrelated components that function together to achieve a common goal. The components of a system are called subsystems.
Appendix 1: Identity Theft Red Flags Mitigation and Resolution Procedures
Suspicious Personal Identifying Information Documents provided for identification appear to have been altered or forged. The photo or physical description of the person is not consistent with the appearance
Accounting Information Systems, 4th. Ed. CHAPTER 4 THE REVENUE CYCLE
Accounting Information Systems, th. Ed. CHAPTER THE REVENUE CYCLE The revenue cycle is the set of activities in a business which brings about the exchange of goods or services with customers for cash.
Computer Assisted Audit Group 617-887-6996 www.mass.gov/dor. A Guide to Computer Assisted Audit Techniques
Computer Assisted Audit Group 617-887-6996 www.mass.gov/dor Commonwealth of Massachusetts Department of Revenue A Guide to Computer Assisted Audit Techniques THIS PAGE LEFT BLANK INTENTIONALLY General
Internal Control Requirements December 11, 2002
1 Internal Control Requirements December 11, 2002 Internal controls are mechanisms, policies, and procedures used to minimize and monitor operational risks. In order to deter employees and/or members from
September 2005 Report No. 06-009
An Audit Report on The Health and Human Services Commission s Consolidation of Administrative Support Functions Report No. 06-009 John Keel, CPA State Auditor An Audit Report on The Health and Human Services
AUD. Auditing & Attestation. Roger Philipp, CPA
AUD Auditing & Attestation Roger Philipp, CPA AUDIT Written By: Roger Philipp, CPA Roger CPA Review 1288 Columbus Ave #278 San Francisco, CA 94133 www.rogercpareview.com 415-346-4CPA (4272) AUDIT Table
STATE OF NEW YORK OFFICE OF THE STATE COMPTROLLER 110 STATE STREET ALBANY, NEW YORK 12236. February 25, 2011
THOMAS P. DiNAPOLI COMPTROLLER STATE OF NEW YORK OFFICE OF THE STATE COMPTROLLER 110 STATE STREET ALBANY, NEW YORK 12236 STEVEN J. HANCOX DEPUTY COMPTROLLER DIVISION OF LOCAL GOVERNMENT AND SCHOOL ACCOUNTABILITY
CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I
CHAPTER CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I The basic topic of internal control was introduced in 3. These next two chapters discuss the implications of automating the accounting information
Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010
Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 This report has been prepared on the basis of the limitations set
INTERNATIONAL STANDARD ON AUDITING 501 AUDIT EVIDENCE ADDITIONAL CONSIDERATIONS FOR SPECIFIC ITEMS CONTENTS
INTERNATIONAL STANDARD ON AUDITING 501 AUDIT EVIDENCE ADDITIONAL CONSIDERATIONS FOR SPECIFIC ITEMS (This Standard is effective, but contains conforming amendments that become effective at a future date)
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
2. Auditing. 2.1. Objective and Structure. 2.2. What Is Auditing?
- 4-2. Auditing 2.1. Objective and Structure The objective of this chapter is to introduce the background information on auditing. In section 2.2, definitions of essential terms as well as main objectives
Investigate Requirements for Software Solutions
Unit 29: Investigate Requirements for Software Solutions Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Gather and analyse appropriate and relevant
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 501 AUDIT EVIDENCE ADDITIONAL CONSIDERATIONS FOR SPECIFIC ITEMS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 501 AUDIT EVIDENCE ADDITIONAL CONSIDERATIONS FOR SPECIFIC ITEMS CONTENTS Paragraph Introduction... 1-3 Part A: Attendance at Physical Inventory Counting...
ABSTRACT. assesses the perception of billing of consumers via computerized system. The project is aimed
ABSTRACT Bills are documents that services as an evidence of sales of goods and services. This work assesses the perception of billing of consumers via computerized system. The project is aimed at developing
