In recent years, information technology (IT) used by firms,



Similar documents
Continuous auditing: the audit of the future

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

IT Governance and Outsourcing

While Microsoft Access database is not an enterprise

2. Auditing Objective and Structure What Is Auditing?

INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT CONTENTS

Information security governance has become an essential

Module 7: Computer auditing

Neural networks (NNs) are becoming more commonplace

OBSERVATIONS FROM 2010 INSPECTIONS OF DOMESTIC ANNUALLY INSPECTED FIRMS REGARDING DEFICIENCIES IN AUDITS OF INTERNAL CONTROL OVER FINANCIAL REPORTING

Feature. Log Management: A Pragmatic Approach to PCI DSS

Reporting on Control Procedures at Outsourcing Entities

INTERNATIONAL STANDARD ON AUDITING 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 530 AUDIT SAMPLING AND OTHER MEANS OF TESTING CONTENTS

This release of the FISCAM document has been reformatted from the January 1999 version.

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

This article describes the history of the Payment Card

Module 2 IS Assurance Services

January (1) CHAPTER 5. Table of Contents

Technology plays a key role in today s business

auditing in a computer-based

Navigating the Standards for Information Technology Controls

Journal Online. Impact of Security Awareness Training Components on Perceived Security Effectiveness. Do you have something to say about this article?

Audit Sampling. AU Section 350 AU

Agreed-Upon Procedures Engagements

Internal Controls, Fraud Detection and ERP

Inspection Observations Related to PCAOB "Risk Assessment" Auditing Standards (No. 8 through No.15)

October 14, (1)

HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015

INTERNATIONAL STANDARD ON AUDITING 620 USING THE WORK OF AN AUDITOR S EXPERT CONTENTS

ISSAI Planning an Audit of Financial Statements. Financial Audit Guideline

Control Matters. Computer Auditing. (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising)

Risk Assessment Standards

Chapter 15 Auditing the Expenditure Cycle

2012 AICPA Newly Released Questions Auditing

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS

Auditing Standard ASA 330 The Auditor's Responses to Assessed Risks

Accounting 408 Test 3a Section Row

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

; ; ; ; MICROSOFT BUSINESS SOLUTIONS NAVISION STANDARD

10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process

WEEK 6. Objective 1: Sales Transaction Cycle Risks

Planning an Audit 255

Knowledge Management Series. Internal Audit in ERP Environment

Information for Management of a Service Organization

THE AUDITOR S RESPONSES TO ASSESSED RISKS

Article: Control Systems and Controls Testing: General Review

ISA 620, Using the Work of an Auditor s Expert. Proposed ISA 500 (Redrafted), Considering the Relevance and Reliability of Audit Evidence

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects

Audit Evidence and Documentation AN AUDIT: SUMMARY CHAPTER PCAOB ONE-UP S THE AICPA MANAGEMENT S ASSERTIONS

Risk Management Advisory Services, LLC Capital markets audit and control

Commission Accounting User Manual

IT Enabled System : Opportunities & Challenges for Assurance Professionals

SESSION 3 AUDIT PLANNING

ISSAI Audit Evidence Specific Considerations for Selected Items. Financial Audit Guideline

Activity Code Material Management and Accounting System (MMAS) Version 9.10, dated September 2015 B-1 Planning Considerations

Part II. Audit process by phase 3. Testing and evidence

THE EXPENDITURE CYCLE Part I

SuccessWare 21 Online Class Curriculum

3. Current Auditing Computerized Tools

New Audit Standards: How Will They Impact the Audit

CUNY SCHOOL OF PROFESSIONAL STUDIES: DEPARTMENTAL RETENTION SCHEDULE 4/7/2014 OFFICE OF INFORMATION TECHNOLOGY

ORACLE FUSION ACCOUNTING HUB

Accounting 408 Test 3b Section Row

CONTINUOUS AUDITING: A STRATEGIC APPROACH TO IMPLEMENTATION. A CaseWare IDEA Research Report

Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016

Impact of Computer-Assisted Audit Techniques on Sarbanes-Oxley Act Sections 404 and 409. Scarlett Choi ACC 626

Washington County, NC REQUEST FOR PROPOSAL. Financial, Revenue Collection, and Personnel ERP System

Analytical Procedures

FS Regulatory Brief SEC Proposes Amendments to Broker- Dealer Financial Reporting Rule

Audit Evidence. AU Section 326. Introduction. Concept of Audit Evidence AU

Connecting the dots: IT to Business

A REPORT FROM THE OFFICE OF INTERNAL AUDIT

Auditing Derivative Instruments, Hedging Activities, and Investments in Securities 1

three TESTS OF CONTROLS AND TESTS OF DETAILS

Comparison of ISA 330 with AS-402 Objectives and Requirements Only

How To Use A Bank Service On A Bank System

3.B METHODOLOGY SERVICE PROVIDER

Questions from GAQC Conference Call The Impact of SAS 112 on Governmental Financial Statement Audits January 4, 2007

Sage 300 ERP Bank Services User's Guide

General Ledger User Guide


AUD. Auditing & Attestation. Roger Philipp, CPA

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

Chapter 9 The Study of Internal Control and Assessment of Control Risk

Chapter 8--Materiality, Risk and Preliminary Audit Strategies

Audit Risk, Complex technology, & Auditing Processes

JOB READY ASSESSMENT BLUEPRINT ACCOUNTING-BASIC - PILOT. Test Code: 4100 Version: 01

COSO s 2013 Internal Control Framework in Depth: Implementing the Enhanced Guidance for Internal Control over External Financial Reporting

Increasing the Productivity and Efficiency of Business Transactions with Microsoft Business Solutions Navision Intercompany Postings

Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014

IAASB Main Agenda (June 2010) Agenda Item. April 28, 2009

Case Study Top-Down, Risk-Based Approach Purchase to Pay Process

in THE WAKE OF FIRST-YEAR FILINGS FOR SECTION 404 a guide to Section 404 project management

Microsoft Navision Axapta Project

Guidelines for Financial Institutions Outsourcing of Business Activities, Functions, and Processes Date: July 2004

New, changed, or deprecated features

INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

General Accounting Applications (As featured in this pdf document) Licensing Applications. Additional Applications

Transcription:

Copyright 2003 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. Impact of SAS No. 94 on Computer Audit Techniques By M. Virginia Cerullo, CPA, CIA, CFE, and Michael J. Cerullo, CPA, CITP, CFE In recent years, information technology (IT) used by firms, large and small, has become increasingly sophisticated and complex. The explosive growth in IT includes computer hardware, databases, networks, telecommunications, the Internet, extranets, electronic commerce, client/server architecture, data warehouses, integrated accounting systems software (such as enterprise resource planning software), automated reasoning systems and neural networks software. The advances in IT have significantly changed the methods firms employ to gather and report information. Thus, auditors encounter many IT environments that maintain data on electronic media rather than paper-based media. Auditors must determine how the firm uses IT systems to initiate, record, process and report transactions or other financial data. 1 This understanding is necessary to plan the audit and to determine the nature, timing and extent of tests to be performed to gain a sufficient understanding of internal controls. SAS No. 94 was recently issued to provide guidance to auditors concerning the proper assessment of internal control 2 activities in IT systems. The auditing standard states that computer-assisted auditing techniques (CAATs) are needed to test automated controls in certain types of IT environments. This paper revisits auditing-through-the-computer techniques, which should become more widely used with the issuance of SAS No. 94, and focuses on the test data technique, which can be applied in almost any audit to test automated programmed controls. This technique is relatively easy to apply and does not require the auditor to have a high degree of computer expertise. An extended illustration of the steps involved in applying this technique is presented. SAS No. 94 and Tests of Controls Under the auditing standards (SAS Nos. 48, 55 and 78) relevant to computer-based systems issued prior to SAS No. 94, a large percentage of auditors assessed control risk at the maximum and performed only substantive tests of account balances and classes of transactions to gather evidence about financial statement assertions. SAS No. 94 recognizes that this approach may not be viable in complex IT environments. When evidence of a firm s initiation, recording and processing of transactions exists only in electronic form, the auditor s ability to obtain the desired assurance only from substantive tests is significantly diminished. SAS No. 94 does not change the requirement to perform substantive tests on significant amounts, but states that it is not practical or possible to restrict detection risk to an acceptable level by performing only substantive tests. 3 When assessing the effectiveness of the design and operation of controls in complex IT environments, it is necessary for the auditor to test these controls. The decision to test controls is not related to the size of the firm but to the complexity of the IT environment. Examples of Situations Requiring Testing of Controls The following are examples of complex IT situations that require the auditor to conduct tests of controls and substantive tests to obtain sufficient evidence about financial statement assertions. They include: IT systems that significantly automate the process of initiating, recording, processing or reporting financial information, such as integrated enterprise resource planning systems Electronic data interchange and payment transfer systems that electronically transmit (paperless) orders and payments from one computer system to another Systems that provide electronic services to customers. In these situations, the IT system automatically initiates bills for the services rendered and processes the billing transactions. Automated reasoning systems (ARS) (e.g., artificial intelligence systems) that employ complex heuristical if/then rules to make decisions (for instance, an ARS system that automatically prepares journal entries for complex transactions or a neural network application that uses financial ratios as independent variables to predict bankruptcy) Computer programs containing algorithms or formulas that make complex calculations, such as automatically computing, allowance for doubtful accounts, reorder points, loan reserves and pension funding calculations Testing of Controls In the above situations, the auditor should identify control activities policies and procedures in place to prevent or detect material misstatements in specific financial statement assertions. Two major categories of control activities related to information processing are general controls and application controls. General controls concern all computer activities and include controls over systems development, access security, program change, data center and networks, and maintenance. Application controls relate to specific tasks performed by individual applications. They include checks performed by IT, such as editorial checks of input data and checks performed by individuals, including the manual follow-up of reconciliations and exception reports.

Tests of controls consist of gathering evidential matter concerning how effectively and consistently the current control procedures function. These tests include inquiries, inspection of documents or electronic files, observation of the application of the control and reprocessing transactions. In designing tests of automated controls, the auditor should consider the need to obtain evidence supporting the effective operation of controls directly and indirectly related to the assertions. The techniques used to test automated controls may differ from the techniques used to test manual controls. 4 Audit techniques to test automated controls are discussed below. Computer-assisted Audit Techniques The auditor may use three broad categories of computerassisted techniques to test controls: Auditing around the computer Auditing with the computer Auditing through the computer Auditing Around the Computer With this technique, auditors test the reliability of computergenerated information by first calculating expected results from the transactions entered into the system. Then, the auditors compare these calculations to the processing or output results. If they prove to be accurate and valid, it is assumed that the system of controls is effective and that the system is operating properly. The auditing around the computer approach is adequate when automated systems applications are relatively simple and straightforward. SAS No. 94 does not eliminate the use of this technique. This approach may be suitable for firms using a variety of accounting software that process applications periodically and, when the audit trail generated is extensive, allow outputs to be traced back to inputs. The major weakness of the auditing around the computer approach is that it does not determine whether the program logic is correct. In addition, this approach does not reveal how the automated controls respond to a wide variety of transactions containing errors. Therefore, in complex IT environments, this approach may overlook potentially significant errors and may be ineffective in restricting detection risk to an acceptable level. Auditing With the Computer The auditing with the computer approach embraces a variety of techniques and often is referred to as computer-assisted audit techniques (CAATs). CAATs involve using computers, often a microcomputer, to aid auditors. Although the utilization of CAATs has radically improved the capabilities and effectiveness of auditors, they are primarily used to perform substantive tests. One widely used CAAT, known as general audit software (GAS), is frequently employed to perform substantive tests and may be used for limited testing of controls. For example, GAS can be used to test the functioning of complex algorithms in computer programs, but it requires extensive experience in using the software. In contrast, the auditing through the computer techniques are designed specifically to test automated controls, and some techniques do not require extensive IT experience. Auditing Through the Computer These techniques focus on testing automated processing steps, programming logic, edit routines and programmed controls. The approach assumes that, if the processing programs are soundly developed and incorporate adequate edit routines and programmed checks, then errors and irregularities are not likely to slip by undetected. If these programs are functioning as designed, the outputs can reasonably be accepted as reliable. The auditing through the computer approach is particularly appropriate for testing controls in the complex IT systems emphasized in SAS No. 94. This approach embraces a family of techniques (see table 1), including test data, parallel simulation, integrated test facility and embedded audit module. In a survey conducted by the authors, only 26 of 91 responding Fortune 500 firms, or 28.6 percent, indicated that auditing through the computer techniques were used in an audit of the purchase function, usually a highly automated and complex IT application. This survey, conducted before SAS No. 94, confirms that a majority of auditors continue to set control risk at the maximum level and rely solely on substantive testing to obtain evidence about the accuracy and completeness of the relevant information. When SAS No. 94 becomes widely adopted, the number of all firms, regardless of size, using auditing through the computer techniques should increase. Table 1 Auditing Through the Computer Approach: A Family of Techniques Test data technique Parallel simulation Integrated test facility (ITF) Embedded audit module Uses a set of hypothetical transactions to audit the programmed checks and program logic in both transaction and nontransaction processing programs. The test data approach requires only a modest investment in time to apply in practice and does not require an extensive background in information technology. Attempts to simulate or duplicate the firm s actual processing results. To employ this technique, the auditor writes a computer program, using an audit software package, or using packaged accounting software, such as BusinessWorks, Oracle Financials, PeopleSoft Financials, M.A.S. 90 Evolution/2 and Sap R/3. The auditor s objective is to use the software to input the firm s actual data for a past period and generate the same output as live production programs. The auditor s simulated results and the actual processing results are compared, and differences noted, investigated and corrected. Enables test data to be continually evaluated when transactions are processed by online systems. The auditor creates fictitious situations, such as a bogus department completing purchasing requisitions or purchase orders being sent to bogus vendors, and performs a wider variety of tests compared to the test data approach. The implementation of ITF is time-consuming and costly, requiring a high-level of computer expertise. Is a programmed module or segment that is inserted into an application program. Its purpose is to monitor and to collect data based on transactions, particularly those processed by online computer-based systems. The data are then used by the auditor in the tests of controls and the evaluation of control risk. The application of this method requires the auditor to have a good working knowledge of computer technology, including computer programming.

The first two techniques described in table 1 are noncontinuous audit approaches, and the last two are continuous audit approaches. Continuous audit approaches are relevant for firms employing real-time financial reporting of transaction processing applications. Noncontinuous audit techniques are relevant for firms using periodic financial reporting of transaction processing applications. Currently, most firms employ periodic financial reporting. In the future most firms will employ a mix of the two approaches. Thus, both sets of approaches are important in assessing the reliability of the internal controls and the financial reporting information. Of all the auditing through the computer techniques, the test data technique is recommended as a first choice for auditors attempting to meet the requirements of SAS No. 94. The test data technique uses a set of hypothetical transactions to audit the edit checks, programmed checks and program logic in computer programs. It is a relatively inexpensive technique to implement and requires little IT experience on the part of the auditor. This technique is powerful and easy to use in periodic financial reporting applications. Another advantage of the test data technique is that it can be employed in almost any audit to test those segments that constitute the significant risks in computer programs. The remainder of this paper presents a simple illustration of the steps involved in designing test data for a portion of a application that involves calculations of sales. Test Data Illustration The firm in this illustration uses an integrated BusinessWorks ERP accounting software package to automate a variety of accounting applications. All software modules are installed on a server computer. This software package is more sophisticated and complex than the previous software package used by the firm. BusinessWorks can transfer transaction totals automatically to the general ledger and initiate, record and process journal entries and recurring adjustments to the financial statements in the general ledger. The following BusinessWorks modules, or cycles, have been implemented: General ledger and financial reporting, including relevant special journals Accounts receivable Accounts payable Order entry Billing and invoicing Inventory control Payroll Job cost Considering SAS No. 94 requirements, the audit manager decided that it was critical to determine if significant internal controls edit routines and programmed checks had been incorporated into the BusinessWorks software package sufficiently to address the relevant risks associated with initiating, recording and processing journal entries. This illustration is limited to applying the test data technique to selected controls in the application. Before beginning, the auditor must first understand the major objectives of the cycle subsystems. Figure 1 illustrates the steps in applying the test data technique for a application. In the planning phase, the auditor: Obtained and studied the most recent copy of the BusinessWorks documentation Determined the relevant or significant risks that could impede the achievement of the cycle objectives Determined the significant or critical edit routines and programmed checks required to address the relevant risks Tests were performed for control areas considered to be vital to the overall accounting function. These are the areas that have the greatest potential for the control of material financial statement errors. These control areas were identified based upon the potential size or frequency of erroneous transactions. 1 Obtain documentation 2 Evaluate programs to be tested Prepare simulated transactions 5 Auditor s manual pre-computed results from test data Figure 1 The Test Data Technique for a Payroll Application 6 4 3 Key 9 10 Exception report A Determine conditions to be tested Payroll computer processing 8 Auditor s summary results from test data The illustration of test data design is limited to testing the program logic in calculating sales. After studying the record layouts and the conditions to be tested, the fourth step shown in figure 1 is to prepare a collection of test transactions. Therefore, the auditor developed simulated test transactions for a past period. The auditor used decision tables to aid the design of the test data. These tables show, in a matrix format, all the rules pertaining to a processing transaction or decision situation. 7 Simulated transactions Payroll program to be tested A 11 Evaluate and analyze exceptions 12 Written recommendations 13 To client

A decision table for sales is shown in table 2. Sales expense is considered a material item, therefore the auditor developed test data to test controls over the calculation of sales. A decision table is constructed to aid in developing the test data using the following steps: List all the conditions that apply to the calculation of sales commission. Place those conditions in the condition stub of the decision table. Construct the rules for the decision table by constructing all combinations of condition values. If there are n conditions in the decision table, each of which can take on a yes or no value, the number of conditions will be 2n. Show which actions will be taken under which combination of condition values. The above rules were used to construct the decision table in table 2. In this example, there are three possible conditions stated in the condition stub and, therefore, there are eight rules. The correct actions are shown in the action stub. For instance, rule 1 is If sales are less than US $500, then the salary is equal to the base plus 5 percent of sales. Test data are designed by choosing at least one test transaction for each rule of the decision table. Table 3 shows test data results for the accurate calculation of under rules 1, 5 and 8. Table 2 Decision Logic Table for Commissions Rules 1 2 3 4 5 6 7 8 Condition Stub Sales < 500 Y Y Y N N N Y N Sales > 500 < 1000 N Y Y Y N N N Y Sales > 1000 N N Y Y Y N Y N Action Stub Salary = base + 5% sales > 0 X base + 25 + 10% sales > 500 X base + 75 + 15% sales > 10 X Error X X X X X The fifth step in figure 1 is for the auditor to manually precompute the expected results. Table 3 shows the test purpose, test description and expected results for four test data. The sixth step, which creates the simulated transactions, is to enter the test transactions using a PC. The auditor must ascertain that the program used during testing is the actual production program used during normal processing. A convenient way of obtaining this assurance is to arrive unannounced at the processing site during the scheduled time for processing. When the processing is completed, the auditor then requests the operator either to process the test transactions before removing the program or to download them to a laptop. Table 3 Example of Results for Accuracy of Commission Computations Test Test Expected Actual Output Purpose Description Results Results Pass Reference Test for Enter Commis- Commis- Y (Omitted accurate $499.99 in sion of sion of for this calculation of sales field $25 $25 illustrasales tion) with sales less than US $500 Low boundary Enter Commis- Commis- Y test for $500.01 in sion of sion of accurate sales field $25 $25 calculation of sales with sales between US $500 and US $1,000 High boundary Enter Commis- Commis- Y test for $999.99 in sion of sion of accurate sales field $75 $75 calculation of sales with sales between US $500 and US $1,000 Test for Enter Commis- Commis- Y accurate $1,500 in sion of sion of calculation of sales field $150 $150 sales greater than US $1,000 After processing the test transactions, the auditor evaluates the critical control strengths and weaknesses that existed in the pay programs. For the test data illustrated in table 3 (i.e., rules 1, 5 and 8), the precomputed results and the actual results are equal, indicating no error in program logic. In a similar manner, all the test data are designed to test the operation of the internal controls implemented into the module and to determine how the pay programs processed data (i.e., program logic). The simulated transactions and programs are processed to generate the auditor s summary results, which are printed on a summary report (e.g., a weekly register). The eighth step depicted in figure 1 is to compare the register with the auditor s manually computed results. The ninth step is to prepare an exception report listing detected errors. The final steps are to analyze and evaluate the exceptions, and write a letter of reportable conditions to the board of directors covering deficiencies in internal controls.

Conclusion IT, which is becoming ever more complex and sophisticated, is revolutionizing businesses. A larger percentage of firms, large and small, rely on IT to initiate, record, process and report financial data. Audit techniques must take into account the impact of this reliance in a financial statement audit, or in an audit of the internal control structure. Prior to the issuance of SAS No. 94, many financial audits of IT systems bypassed testing of controls. In these situations, the auditor often assessed control risk at a maximum level and performed only substantive tests to gather evidence about management s financial statement assertions. SAS No. 94 provides specific guidance when a significant amount of financial information supporting one or more financial statement assertions is automated by complex electronic IT. In these situations, the auditor must assess control risk by performing tests of controls, regardless of firm size. Auditing through the computer techniques, such as test data, parallel simulation or embedded audit module, should be used to test controls when a firm has sophisticated IT systems. The test data technique is recommended for auditors with little IT experience. M. Virginia Cerullo, CPA, CIA, CFE is a professor of accounting at Southwest Missouri State University, Springfield, Missouri, USA. She is the coordinator of the Institute of Internal Auditor s Endorsed Internal Audit Program at Southwest Missouri State. She received her doctorate from Louisiana State University. She has published about 40 articles in professional and academic journals. Michael J. Cerullo, CPA, CITP, CFE is a professor of accounting at Southwest Missouri State University. He specializes in teaching accounting information systems and information systems auditing. He has published about 150 articles in professional and academic journals. He received his doctorate from Louisiana State University. Endnotes 1 Statement on Auditing Standards No. 94, The Effect of Information Technology on the Auditor s Consideration of Internal Control in a Financial Statement Audit, AICPA, New York, USA, May 2001. (Amends Statement on Auditing Standards No. 55, Consideration of Internal Control in A Financial Statement Audit, AICPA, New York, USA, April 1988.) SAS No. 94 is effective for audits of financial statements beginning on or after 1 June 2001, although earlier implementation is allowed. 2 In this paper, internal control and the internal control structure will be used interchangeably 3 SAS No. 94, paragraph No. 66 4 Ibid, paragraphs No. 77 and 79 Information Systems Control Journal, formerly the IS Audit & Control Journal, is published by the Information Systems Audit and Control Association, Inc.. Membership in the association, a voluntary organization of persons interested in information systems (IS) auditing, control and security, entitles one to receive an annual subscription to the Information Systems Control Journal. Opinions expressed in the Information Systems Control Journal represent the views of the authors and advertisers. They may differ from policies and official statements of the Information Systems Audit and Control Association and/or the IT Governance Institute and their committees, and from opinions endorsed by authors' employers, or the editors of this Journal. Information Systems Control Journal does not attest to the originality of authors' content. Copyright 2003 by Information Systems Audit and Control Association Inc., formerly the EDP Auditors Association. All rights reserved. ISCA TM Information Systems Control Association TM Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, Mass. 01970, to photocopy articles owned by the Information Systems Audit and Control Association Inc., for a flat fee of US $2.50 per article plus 25 per page. Send payment to the CCC stating the ISSN (1526-7407), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited. www.isaca.org