The Impact of Information Technology on the Audit Process



Similar documents
Learning Objective 1. The Impact of Information Technology on the Audit Process. Describe how IT improves internal control.

Materiality and Risk. Chapter Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 9-1

PART 10 COMPUTER SYSTEMS

Control Matters. Computer Auditing. (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising)

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT CONTENTS

Audit of the Payroll and Personnel Cycle

SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE

Audit Sampling for Tests of Controls and Substantive Tests of Transactions

1/21/2014. Agenda. Audit Testing. The Basics of Internal Auditing January 23-24, 2014

Audit of the Sales and Collection Cycle: Tests of Controls and Substantive Tests of Transactions

Audit of the Inventory and Warehousing Cycle

Module 7: Computer auditing

SECTION 15 INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY CONTROLS

Audit of Cash Balances

Audit Evidence. Chapter Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 7-1

Main Reference : Hall, James A Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

auditing in a computer-based

A424: Chapter 15 Audit Sampling for Tests of Controls and Substantive Tests of Transactions

Audit Phases. Phase 1: Planning and Risk Identification

Accounts Payable Outsourcing Audit April 2014

Solutions to Student Self Assessment Questions

IT Enabled System : Opportunities & Challenges for Assurance Professionals

Information Technology Auditing for Non-IT Specialist

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

INFORMATION SYSTEM AUDITING AND ASSURANCE

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant

Accounting 408 Test 3a Section Row

Application controls testing in an integrated audit

IT - General Controls Questionnaire

International Banking. Security in MultiCash

CONTROLLING COMPUTER-BASED INFORMATION SYSTEMS, PART I

AUDITING IN COMPUTER ENVIRONMENT. What is audit in a computer environme nt?

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Guideline on risk management and other aspects of internal control in stock exchange

Internal Controls. A short presentation from Your Internal Audit Department

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

5:31-7 Appendix B LOCAL AUTHORITIES - ACCOUNTING AND AUDITING IF ANY ARE NOT APPLICABLE, INSERT N/A AS YOUR ANSWER. FIRE DISTRICT YEAR UNDER AUDIT

AV Parking System Review

SOLUTION: AUDIT AND INTERNAL REVIEW, MAY 2014

PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

Interim Audit Report. Borough of Broxbourne Audit 2010/11

Basic Concepts of Accounting Subsidiary Subsidiary Special Special Inform Infor a m tion Ledgers Ledger Journals Jour Systems

Cash Receipts Internal Controls

Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014

The Information Systems Audit

FINANCIAL ADMINISTRATION MANUAL

Continuous auditing: the audit of the future

Formal Software Testing. Terri Grenda, CSTE IV&V Testing Solutions, LLC

ACCOUNTING INFORMATION SYSTEMS

Guideline on risk management and other aspects of internal control in central securities depository

KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER

DeltaV Capabilities for Electronic Records Management

DETAIL AUDIT PROGRAM Information Systems General Controls Review

Internal Control Guide & Resources

While Microsoft Access database is not an enterprise

Continuous Auditing in Big Data Computing Environments: Towards an Integrated Audit Approach by Using CAATTs

FutureNet Technologies Corporation has become a vital player in the Medical

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference

APLUS R-SERIES SOFTWARE PRODUCT INFORMATION

Information Security Policies. Version 6.1

Silent Safety: Best Practices for Protecting the Affluent

SCAD V: Parts 2 and 3 - Assessing Control Risk

Operational Risk Publication Date: May Operational Risk... 3

ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL

General Computer Controls

SAMPLE INVITATION TO TENDER ADVERTISEMENT (CONTRACT)

Certified Information Systems Auditor (CISA)

Module 2 IS Assurance Services

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Knowledge Management Series. Internal Audit in ERP Environment

ISO 9001:2015 Internal Audit Checklist

Information Technology General Controls (ITGCs) 101

Internal Controls Best Practices

Good Internal Controls for Small Businesses

4 Testing General and Automated Controls

Developing Effective Internal Controls Using the COSO Model

How To Audit A Financial Statement

Chapter 1 Getting Started

Payment Procedures. Corruption Prevention Department

Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls

Internal Control Deliverables. For. System Development Projects

INFORMATION SYSTEMS. Revised: August 2013

Payroll Direct Deposit

Internal Control Systems

BDO OUTSOURCING. Outsourcing services

IT Sr. Systems Administrator

Master Document Audit Program

Transcription:

The Impact of Information Technology on the Audit Process Chapter 12 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-1

Learning Objective 1 Describe how IT improves internal control. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-2

How Information Technologies Enhance Internal Control Computer controls replace manual controls Higher-quality information is available 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-3

Learning Objective 2 Identify risks that arise from using an IT-based accounting system. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-4

Assessing Risks of Information Technologies Risks to hardware and data Reduced audit trail Need for IT experience and separation of IT duties 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-5

Risks to Hardware and Data Reliance on the functioning capabilities of hardware and software Systematic versus random errors Unauthorized access Loss of data 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-6

Reduced Audit Trail Visibility of audit trail Reduced human involvement Lack of traditional authorization 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-7

Need for IT Experience and Separation of Duties Reduced separation of duties Need for IT experience 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-8

Learning Objective 3 Explain how general controls and application controls reduce IT risks. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-9

Internal Controls Specific to Information Technology General controls Application controls 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-10

Relationship Between General and Application Controls Risk of unauthorized change to application software Risk of system crash Cash receipts application controls Sales application controls Payroll application controls Risk of unauthorized master file update Other cycle application controls GENERAL CONTROLS Risk of unauthorized processing 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-11

General Controls Administration of the IT function Separation of IT duties Systems development Physical and online security Backup and contingency planning Hardware controls 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-12

Administration of the IT Function The perceived importance of IT within an organization is often dictated by the attitude of the board of directors and senior management. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-13

Segregation of IT Duties Chief Information Officer or IT Manager Security Administrator Systems Development Operations Data Control 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-14

Systems Development Typical test strategies Pilot testing Parallel testing 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-15

Physical and Online Security Physical Controls: Keypad entrances Badge-entry systems Security cameras Security personnel Online Controls: User ID control Password control Separate add-on security software 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-16

Backup and Contingency Planning One key to a backup and contingency plan is to make sure that all critical copies of software and data files are backed up and stored off the premises. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-17

Hardware Controls These controls are built into computer equipment by the manufacturer to detect and report equipment failures. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-18

Application Controls Input controls Processing controls Output controls 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-19

Input Controls These controls are designed by an organization to ensure that the information being processed is authorized, accurate, and complete. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-20

Batch Input Controls Financial total Hash total Record count 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-21

Processing Controls Validation test Sequence test Arithmetic accuracy test Data reasonableness test Completeness test 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-22

Output Controls These controls focus on detecting errors after processing is completed rather than on preventing errors. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-23

Learning Objective 4 Describe how general controls affect the auditor s testing of application controls. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-24

Impact of Information Technology on the Audit Process Effects of general controls on control risk Effects of IT controls on control risk and substantive tests Auditing in less complex IT environments Auditing in more complex IT environments 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-25

Learning Objective 5 Use test data, parallel simulation, and embedded audit module approaches when auditing through the computer. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-26

Test Data Approach 1. Test data should include all relevant conditions that the auditor wants tested. 2. Application programs tested by the auditors test data must be the same as those the client used throughout the year. 3. Test data must be eliminated from the client s records. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-27

Test Data Approach Input test transactions to test key control procedures Master files Application programs (assume batch system) Transaction files (contaminated?) Contaminated master files Control test results 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-28

Test Data Approach Control test results Auditor makes comparisons Auditor-predicted results of key control procedures based on an understanding of internal control Differences between actual outcome and predicted result 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-29

Parallel Simulation The auditor uses auditor-controlled software to perform parallel operations to the client s software by using the same data files. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-30

Parallel Simulation Production transactions Master file Auditor-prepared program Client application system programs Auditor results Client results Auditor makes comparisons between client s application system output and the auditor-prepared program output Exception report noting differences 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-31

Embedded Audit Module Approach Auditor inserts an audit module in the client s application system to identify specific types of transactions. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-32

Learning Objective 6 Identify issues for e-commerce systems and other specialized IT environments. 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-33

Issues for Different IT Environments Issues for network environments Issues for database management systems Issues for e-commerce systems Issues when clients outsource IT 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-34

End of Chapter 12 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 12-35