Auditing-in-a-computerized-environment
Auditing-in-a-computerized-environment
environment
Outline
Effect of IT on internal controls
Manual vs. automated controls
General and application controls
IT benefits and risks
Manual vs. computerized environments
Effect of IT on evidence gathering
• IT encompasses automated means of originating, processing,
storing and communicating information.
• Affects how transactions are initiated, recorded, processed and
reported.
• Client’s use of IT affects both the auditor’s evaluation of internal
controls and the procedures to gather evidence.
• Audit objectives are the same in a computerized environment as
they are in a manual environment.
Effect of IT on Internal Controls
Effect on internal controls
1. Management’s failure to appropriately address IT risks may negatively impact the control
environment.
2. The use of IT may enhance an entity’s risk assessment by providing more timely
information.
3. Many information and communication systems make extensive use of IT, and the way in
which IT is used often affects an entity’s internal control.
4. Much of the information used in monitoring is provided by IT, and therefore, the accuracy
of the IT system is crucial.
5. The use of IT may affect the way in which existing control activities are implemented.
Also, the effectiveness of use controls may depend upon the accuracy of information
provided to the user by IT systems.
o If evidence is not retrievable, it is difficult to determine the timing of control
testing and substantive testing.
o IT system may make it impossible to resolve the detection risk through
substantive testing alone.
PSA 315:
The auditor shall determine whether substantive procedures alone cannot provide
sufficient appropriate audit evidence for any of the risks of material misstatement at the
assertion level.
Due to the nature of the risk, the only way to obtain sufficient appropriate evidence is to test
the operating effectiveness of controls.
This applies to routine business transactions subject to highly automated processing with
little or no manual intervention, such as in circumstances where a significant amount of an
entity’s information is initiated, recorded, processed, or reported only in electronic form such
as in an information system that involves a high degree of integration across its IT applications.
In such cases:
• Audit evidence may be available only in electronic form, and its sufficiency and
appropriateness usually depend on the effectiveness of controls over its accuracy and
completeness.
• The potential for improper initiation or alteration of information to occur and not be detected
may be greater if appropriate controls are not operating effectively.
• Example:
Revenue for a telecommunications entity.
Evidence of call or data activity does not exist in a form that is observable.
Instead, substantial controls testing is typically performed to determine
that the origination and completion of calls, and data activity is correctly
captured (e.g., minutes of a call or volume of a download) and recorded
correctly in the entity’s billing system.
Manual vs. Automated Controls
Manual controls
Manual controls are internal controls performed by people and are more suitable when
judgment and discretion are required, such as when there are:
• Large, unusual, or nonrecurring transactions
• Potential misstatements are difficult to define or predict
• Changes in circumstances that require changes in controls
Manual controls are also used to monitor automated controls. Manual controls, however,
may pose additional risks because they can be more easily ignored or overridden, they
are subject to human error, and they are less consistent than automated controls.
Automated controls
Automated controls are internal controls performed using IT and are more suitable for:
• High volume or recurring transactions
• Control activities that can be adequately designed and automated
General and application controls
General controls
These are policies and procedures that relate to many applications and support the
effective functioning and proper operation of the information system.
Application controls are controls over input, processing, and output, including:
a. Administrative access rights
b. Controls over interfaces, integrations, and e-commerce
c. Checking the mathematical accuracy of records
d. Maintaining and reviewing accounts and trial balances
e. Automated edit checks of input data
f. Manual follow-ups of exception reports
Input controls
These are controls designed to ensure that input is authorized, complete, accurate and
timely. Dependent on the complexity of the application program in question, such controls
will vary in terms of quantity and sophistication.
Range checks
• These ensure that information input is reasonable in line with expectations. For example, where an
entity rarely, if ever, makes bulk-buy purchases with a value in excess of $50,000, a purchase
invoice with an input value in excess of $50,000 is rejected for review and follow-up.
Compatibility checks
• These ensure that data input from two or more fields is compatible. For example, a sales invoice
value should be compatible with the amount of sales tax (assuming sales tax is based on invoice
amount) charged on the invoice.
Input controls
Validity checks
• These ensure that the data input is valid.
• For example, where an entity operates a job costing system – costs input to a previously completed
job should be rejected as invalid.
Exception checks
• These ensure that an exception report is produced highlighting unusual situations that have arisen
following the input of a specific item.
• For example, the carry forward of a negative value for inventory held.
Sequence checks
• These facilitate completeness of processing by ensuring that documents processed out of
sequence are rejected.
• For example, where pre-numbered goods received notes are issued to acknowledge the receipt of
goods into physical inventory, any input of notes out of sequence should be rejected.
Input controls
Control totals
• These also facilitate completeness of processing by ensuring that pre-input, manually
operated control totals are compared to control totals input.
• For example, non-matching totals of a ‘batch’ of purchase invoices should result in an on-
screen user prompt, or the production of an exception report for follow-up. The use of
control totals in this way are also commonly referred to as output controls.
• Other processing controls should include the subsequent processing of data rejected at the point of input, for
example:
A computer produced print-out of rejected items
Formal written instructions notifying data processing personnel of the procedures to follow with regard
rejected items
Appropriate investigation/follow-up of rejected items
Evidence that rejected errors have been corrected and re-input
Output controls
• These exist to ensure that all data is processed and that output is distributed only to prescribed
authorized users.
• While the degree of output controls will vary from one organization to another (dependent on the
confidentiality of the information and size of the organization), common controls comprise:
1. The ability to process large volumes of transactions and data accurately and
consistently
2. Improved timeliness and availability of information
3. Facilitation of data analysis
4. Reduction in the risk that controls will be circumvented
5. Enhanced segregation of duties through effective implementation of security
controls
6. Enhanced ability to monitor the performance of the entity’s activities and its policies
and procedures
IT Risks
• The use of IT may also create additional internal control risks. The auditor must evaluate
the entity’s use of IT to determine whether and to what extent the following risks exist:
The additional risk associated with this (possibly incompatible) concentration of functions
may be mitigated by the implementation of compensating controls.
Computer systems should be designed to supply electronic audit trails, which are often
as effective as paper trails.
Use of IT may make it more difficult to use physical inspection to identify nonstandard or
unusual transactions or adjustments.
Uniform transaction processing
Processing consistency is improved in a computerized environment because clerical errors
(e.g. random arithmetic errors, missed postings, etc.) are virtually eliminated.
1. The opportunity for remote access to data in networked environments increases the likelihood of
unauthorized access. Therefore, specific controls should exist to ensure that users can only access
and update authorized data elements.
2. Concentration of information in computerized systems means that, if system security is breached, the
potential for damage is greater than in manual systems.
Utilization of these opportunities can help mitigate the additional risks associated with a
lack of segregation of duties.
In either event, because the reliability of automated system is highly dependent on the
adequacy of control design and execution, it is critical that the auditor gain a thorough
understanding of the structure and usage of the control system through inquiry and
observation.
Factors to consider
In selecting the appropriate audit procedures in a computerized environment, the auditor
should consider:
Note: When substantive testing alone may not suffice – test of controls should be performed
to assess control risk (in highly computerized system)
Use of an IT professional
Because some systems depend so heavily on computerized processing, it may be difficult or
impossible for the auditor to access certain information without assistance. If specialized IT
skills are needed, the auditor should seek the help of an IT professional from his/her staff or
from outside.
2. The auditor need not personally possess the required level of IT skills.
Auditing around the computer
When auditing around the computer, the auditor does not directly test the application
program. The auditor tests the input data, processes the data independently, and
then compares the independently determined results to the program results.
Emphasis is on the input and output stages of transaction processing.
Auditing around the computer is often appropriate for simple batch systems with a good
audit trail, and will result in the same level of confidence as would auditing through the
computer.
Risks of auditing around the computer include insufficient, paper-based evidence and
insufficient audit procedures.
Computer Assisted Audit Techniques (CAATs)
[auditing through the computer]
When using CAATs, emphasis is on the input and processing stages of transaction
processing. In highly automated systems, complex audit trails and the elimination of physical
source documents may mean that CAATs are the only feasible way to complete the audit in a
timely manner.
Computer Assisted Audit Techniques (CAATs)
[auditing through the computer]
1. Transaction tagging
• This is a technique the auditor uses to electronically mark (or “tag”) specific
transactions and follow them through the client’s system.
• Tagging allows the auditor to test both the computerized processing and the manual
handling of transactions.
• This refers to a technique that uses the application program to process a set of test data, the
results of which are already known. (The client’s system is used to process the auditor’s
data, off-line, while still under the auditor’s control.)
a. The test data contains the type of invalid conditions in which the auditor is interested (it is
not necessary to test all combinations of invalid conditions).
Examples of invalid conditions: invalid employee numbers, excess pay rate, excess hours
b. An advantage of the test data technique is that the live computer files are not affected in
any way.
Computer Assisted Audit Techniques (CAATs)
[auditing through the computer]
4. Integrated Test Facility (ITF)
• An ITF is similar to the test data approach except that the test data is commingled with
live data. (The client’s system is used to process the auditor’s data, on-line.)
a. The test data must be separated from the live data before the reports are created.
This is usually accomplished by processing the test data to dummy accounts (e.g. a
fictitious customer, branch, vendor, etc.)
b. Client personnel are not informed that the test is being run.
Computer Assisted Audit Techniques (CAATs)
[auditing through the computer]
5. Parallel simulation (reperformance test)
• This is a technique where the auditor re-processes some or all of the client’s live data (using software provided by the
auditor) and then compares the results with the client’s files. (The auditor’s system is used to process the client’s data.)
a. With controlled processing, the auditor observes an actual processing run and compares the actual results to the
expected results (based on the auditor’s program).
• (i.e. client’s data is run using the client’s actual processing run and using the auditor’s program)
b. With controlled re-processing, the auditor uses an archived copy of the program in question (generally the auditor’s
control copy) to reprocess transactions. The results are then compared to the results from the normal processing run.
(Differences indicate that there have may been changes to the program.)
• (i.e. client’s data is run using client’s normal processing run and using an archived copy of the client’s program)
• Source code comparison programs are programs that compare two versions of software to determine if they
match. This type of software can be used to look for unauthorized program changes.
c. Programs to accomplish parallel processing can be specifically developed for the application, bought as a packaged
program or utility, or produced by a generalized audit software package.
Auditing with a computer
An auditor may achieve audit efficiency by utilizing a computer during the audit. For example, financial
statements (and related trial balances and lead schedules) may be entered into a spreadsheet (or possibly a
database) program. Achieving efficiency requires the selection of both appropriate audit tasks and appropriate
software for the selected tasks.