Auditing: Computerized
Auditing: Computerized
AUDITIN
On the
other hand, orrect rprogram
an incorrect
eliminated.
sult to consiste
consistc: and charged automaticaly to customers' account balances on the
processing
are
because it
wil result
could be very
coud
devastating basis of pre-authorized terms contained in a computer program.
erroneous data processing
Programs
Data and Computer
Ease of Access to Vulnerability of dataand program storage media
be accessed
data and computer programs may
In a CIS environment, In a manual system, the records are written in ink on substantial
unauthorized persons leaving visible evidence. Ttis
no Daper. The only way to lose the infotmation is to lose or to destroy
and altered by controls are incoporated to
that appropriate
physicalrecords. The stuation is completely different in a CIS
important, therefore, to data fies and programs only to the
the system to limit the access environment. The ntormation on the computer can be easly
could
authorized personnel. changed, leaving trace of the original content. This change
no
can be quickly
happen inadvertently and huge amount of information
Concentration of duties lost.
sound
is an essential characteristic of a
Proper segregation of duties of the
Internal Control in a CISEnvironment
internal control system. However, bccause of the ability
data there are functions that are
efficiently, apply in
computer to process uscd in manual processing also
in manual processing that are combined
in a
( Manr of the control proccdures
normally segregated a CIS environment. Examples of such procedures include
control
ot duties, and
authorization of transactions, proper segregation
environment.
the
clements of internal control are the same;
the function or independent checking. Thc elements
As a particular example, n manual processing, Computer just changes the
mcthods by which these
the responsbily
recording cash disbursements is incompatible with implemcnted.
servcs as
tor reconcling disbursements. Since one of these functions
a check upon the other, assigning both functions to one employee
would enable that employee to commit and conceal errors completeness, and
A
Taricty of controls performed to check accuracy,
are
used in
rregularities. A properly programmed computer, on the other hana. \Vhen computer processing is
transactions.
onceal ts unorization of can be
has no tendency
ormotivation to commit irregularities or internal control procedures
errors. Hence, what appears to be an
ot significant accounting applications, controls.
incompatible combinat ASSIEiCd into two types: general
and application
General Controls
and procedures
nat t
relate
CIS DIRECTOR
controlpolicies
e
Geoeral
contros are
those
infomation sy'stem. nese controls include
These conttole
responsibility. In a
CIS environment, zation Systems Computer
system include segregation
should include scote
Analyst
for an entity's computer Operator Librarian
CIS department, and segregation
of duti
berween the user and
within the CIS department.
authorized personnel.
4. Data recovery controls
that each of the aho.
Optimal segregation of dutes dictates bove
employees. However, soma Onc of the characteristics of the CIS is the
asks should be assigned
to different vulnerability of files
not have
resources to maintain a large Cie
enough
and programs. Computer files can be casily lost and the loss of
entities may
these fles can be disastrous to an entdty. The survival of an
department entity
affected by such disaster depends on its ability to recover the files
limited number ot personnel, there are
ate
on a timely basis.
In small entities, with
some functions that may
be combined. But as a minimum, the
and computer operations A data recovery control provides for the maintenance of back-up
functions of systems development
and programmer should not files and off-site storage procedures. Computer files should be
must be segtegated. Systems analyst
and they should copied daily to tape or disks and secured off-site. In the event of
be allowed to use the progams they developcd,
the computer. Also, computer disruption, reconstruction of files is achieved by updating the
not be allowed to operate
should not participate in most recent back-up vith subseqvent transaction data. When
operators who nun the program
program design. A number
of computer related frauds have magnetic tapes are used, a common practice in file retention
resulted when these functions are combined. called Grandfather, fatler, son practice requires an entity to keep
the two most recent generaton of master tiles and transacton
tiles, in order to permit reconstruction of master files if needed.
2 Systems development and documentation controls
Software development as well as changes thercof must be
approved by the appropriate level of management and the user 5. Monitoring controls
department lo ensure that computer programs are tunctronng Monitoring controls are designed to ensure that CIS controls are
as designed, the program must be tested and modified, it needeu, working effectively as planned. These include periodic evaluation
by the user and CIS department. of the adequacy and effectiveness of the overall CIS operations,
conducted by persons within or outside the enty.
Moreover, adequate systems documentation must be mac
order to facilitate the use of the program as well as changes
may be introduced later into the system.
Vulidity chec
Application Controls Infornation1 Cntered are
determinecompared
Intor
fn fle to with valid
transaction
involves ee stages:
three stages: the master ile
the authent infom
unformaton the
of involves capturiPu th emplotee master fle of the
Tbe
The processing
stage.
The input stage a
example,
ndicate the emplo may contain two input
For
the ma"
processing, and output olves
involves converting mass o gender "1" for male andvalid codes
mass of data; the
processing stage
information; and output stage invo
invo.
of
Acode
femalc. of "3" Is
Considered "2" for
invalid and will be rejected
raw data into useful br the computer.
to those who need
information in a form usetul
preparation of as input to these
relevant data are captrured sy'stem,
To ensure that all Sol-edecking digi
It. ensure that the data are accurately processed during the aring their
and to
financial intormation, controls or athother 1his is a mathematicaly calculated digit which is
conversion into meaningful
into the system. ro a document umber to detect common
usually added
mechanisms must be incorporated
in data submitted for processing transpositional errors
Application controls are
those policies and proccdures that relate,
Limit eherk
These designed to provide reasonable
are
specific use of the systen. and that thev aare Timit check or reasonable check is designed to ensure
assurance that all transactions are authorized, that data
processed completely, accurately and in a tumely' manner. These submitted for processing do not exceed a pre-detemined imit
or a reasonable amount.
include
Control lotals
1. Controls over input
A large number of errors in a computer system are caused by
These are totals computed based on the data submitted for
inaccurate or incomplete data entry. Input controls are designed processing Control totals ensure the completeness of data
to provide reasonable assurance that data submitted for before and after they are processed. These controls include
processing are complete, properly authorized, and accurately
fnancial totals, hash totuls, and record counts. As an example,
transated into machine readable form. assume the following data regarding the entity's disbursements
for the day.
Examples of input controls include: Voucher Na 141
Koy wrifhiatio
This requires data to be entered twice (usually by different
operators) to provide assurance that there are no key entry P15,000
errors committed. Voucher No. 142
Processing controls
that input data are processed accurately, and that data
assurance
A person who knows what an output should look like must 1. Audit around the computer, or
review the CIS output for teasonableness. Control totals are 2 Use Computer-Assisted Audit Techniques.
compared with those computed prior to processing to ensure
completeness of information. Finally, CIS outputs must be
restricted only to authorized employees who will be using such
outputs. Auditing Around the Computer
The effectiveness of the general CIS controls is essential to the Auditing around the computer is simlar to testing control in a
effectiveness of CIS appication conttols. Thus, it may be more efficient manual control structure in that it involves examination of
to review the design of the general controls first, before reviewing the documents and reports to determine the reliability of the system.
application controls. When this approach, the auditor ignores the cient's data
using documents and
processing procedures, focusing solely on input
the
to
the CIS output. Input data are simply recoiciled with the output
around the computer is
Vetity the accuracy of processing:Auditing
recomciles with the output,
DaScd on the assumption that if the input
the tra
To accomplish this objecve
the auditor
program
must
have processed
ransaction
about the relon
knowledge about liability transactons)
the
that consist of prepares test data
then the computer auditor obtains
Hence, the the computer pro
conditions. The audtor
enters the test
valid and invaid
data into the system and
accurately.
without
examining
directly rogram of haye the data processed the
by entity's
of the system computer program.
the system. Because the auditor is the one who
auditor knows what the output creates the test data, the
only if there
. .
be used isible
ate
Processed
CAATs are computer programs and data which the auditor uses as using cientr's
using client's
independenty of the cient's data, an ITF integrates the
processing of test data with the achual processing of ordinary program
transactions without management being aware of the
testing
process. The resultant output, relating to the dummy unit, is
then compared with the predetermined results to evaluate the Compar Auditor's
reliability of the cieat's program. Output e
Manually Expected
Output
By processing test data simultaneously with client data, ITF
provides assurance that the program tested by the auditor is the
same
program used by the client in the processing of When using ITF, the auditor must be alert to the danger of
transactions.
contaminating the cient's masterfiles. Thus, care must be
taken to reverse or eliminate the effects of all
audit test
transactions in order to avoid contamination of client
computer
files
3. Parallel simulation
PARALLEL SIMULATION
o the auditor may include CAATs 2ribable
1 Snapshots
Chent'sData
Clienr's Dat This technique involves taking a picture of a transaction s it
flows through the
computer systems. Audit software rounes
are embedded at different
the
points in the procesing log to
cApture mages ot the transaction as it progresses
Processed the various stages ot through
Processed processing. Soch a techigoe dows sn
using chent's using auditor's auditor track data and evakate the
to
computer process
program program pplied to the data