Effects of Computers On Internal Control
Effects of Computers On Internal Control
COMPUTERS ON
INTERNAL CONTROL
Internal Control System
- achieved the goals of asset
safeguarding,data integrity system effectiveness
and efficiency
- controls help to ensure that the financial
statement assertions are valid
Major Components of an Internal Control
System:
separation of duties
clear delegation of authority and responsibility
recruitment and training of high-quality personnel
a system of authorization
adequate document and record
physical control over assets
records management supervision
independent checks on performance
periodic comparison of recorded accountability with
assets.
Segregation of Duties
Manual System
Audit trail
enables the auditor to trace any transaction
through all phases of its processing from
the initiation of the event to the financial
statements.
Computer Systems
Purpose:
To ensure that only authorized personnel
have access to the firm's assets
Manual system
management supervision of employee activities
is relatively straightforward
Computer system
supervision of employees might have to be
carried out remotely
make the activities of employees less visible to
management
In an IT environment, supevision must be more
elaborate than in manual system for the
following reasons:
Manual System
independent staff prepare the basic data used
for comparison purposes
Computer System
software is used to prepare this data
Back-up
refers to plans made by the entity to obtain
access to comparable hardware, software and
data in the event of their failure, loss or
destruction
it is important for users to perform on a regular
basis
The Effect of Personal computers on the Accounting
System and Related Internal Controls
* use of passwords
* specilized access control software and
devices (firewalls, authorization tables,
biometrics)
* physical controls such as cable locks on
workstations
2. Controls over users IDs and passwords
- procedures for the assignment and maintenance
of passwords to restrict access to authorized users
5. Transaction logs
- reports, which are designed to create an audit
trail for each on-line transaction
2. Data Ownership
A single data owner should be assigned responsibility for
defining access and security rules, such as who can use the
data (access) and what functions they can perform (security)
3. Access to the Database
Auditor's considerations: