ACCG340 Study Guide - Final Guide: Internal Control, Data Integrity, Business Process

116 views6 pages
WK 9
IT systems: Internal control
1. The IT environment
a. A computer information (IT) system encompasses automated means of originating,
processing, storing and communicating information, and is an integral part of the IT
environment of a business.
b. Key elements of IT System
i. Technology (e.g. hardware, software)
ii. People (e.g. database administrators, data entry operators)
iii. Procedures (e.g. policies and guidelines, training)
iv. Data
2. Auditing IT systems
a. Auditing in an IT system is similar to auditing in a manual environment
b. The main
differences
are:
i. additional issues need to be considered in relation to an IT system with respect
to
business risks
and
internal control evaluation
and,
ii. auditors may need to utilise computer assisted audit techniques (CAATs) for audit
testing.
c. Planning:
i. level of IT dependence / IT business related risks
ii. IT related IC strengths and weaknesses
d. Audit Evidence:
i. use of CAATs for
1. tests of controls
2. substantive testing
3. Examples of IT risks relevant to the auditor
a. Planning and organisation
i. IT strategy not aligned with the business strategy è unable to support business
information needs / accounting processes and increasing risk of errors
b. Acquisition, implementation and maintenance
i. implementation of new accounting application under time pressure è e.g. inadequate
testing may lead to operation problems and processing errors
ii. unauthorised changes to programs è increase risk of processing and reporting errors
iii. interface problems è loss, duplication or corruption of data
c. Delivery and support
i. unauthorised access to application, operating systems and data è improper initiation,
approval or execution of transactions
ii. inadequate
backup and recovery
procedures è loss of data
d. Monitoring
i. access
violations
not monitored è difficult to enforce responsibility and
accountability
4. Specific internal control risks posed by IT processing (ASA 315.A63)
a. Programs processing data inaccurately and/or processing inaccurate data
b. Destruction of data, improper changes to data, recording non-existent transactions
c. User privileges not limited to assigned duties
d. Unauthorised changes to master files and/or systems or programs
e. Failure to make necessary changes to systems or programs
f. Inappropriate manual intervention
g. Loss or inability to access data as required
5. Internal controls in an IT system
a. Controls in a IT environment can be divided into general and application controls. They
must be reviewed by the auditor in order to assess the level of risk in relation to IT
systems and internal control.
b.
General controls
are
manual
and computer controls surrounding the environment in which
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 6 pages and 3 million more documents.

Already have an account? Log in
computer systems operate and relate to
all or many computerised accounting applications
.
c.
Application controls
relate to
individual computerised accounting applications
e.g.
sales, inventory. They may be
programmed = automated (means it’s inside the computer)
or manual
and are located in the user or IT departments.
d.
e. IT control should be processed by IT Auditors
6. Categories of IT general controls
a.
Segregation of duties
i. Separation between IT and user department functions e.g. users are not programmers
ii. Separation of incompatible functions within the IT department i.e. those who develop
and understand the systems (programmers) aren’t responsible for its access and
operation e.g. operators are not programmers.
b.
System implementation/change controls
i. Ensure that systems acquisition (authorisation), development and modification
processes are properly managed
c.
Physical hardware controls
i. Ensure continuity of processing in the event of hardware malfunction or breakdown
ii.
Prevent unauthorised access to physical hardware (e.g. lock the laptop in the draw )
d.
Software controls
i. prevent unauthorised changes to computer programs(log in and password (or fingerprint)
should be implemented to all applications)
ii. ensure reliability of system software
e.
Data and network security controls
i. prevent unauthorised access or changes to data
ii. data is not lost, integrity is maintained
7. Testing of IT general controls
a. There is no change in the approach to testing as many of these controls are generally
manual. Test procedures include:
i.
Inquiry
in conjunction with the following 3.
ii.
Inspection
(inspect a sample of initial temporary password to ensure companies do
have the initial control)
iii.
Observation
(observe an employee do have typed its log in and password)
iv.
re-performance
(typing log in and password to an computer to see whether the access
has been granted)
8. Categories of IT application controls
a. Application controls (ASA 315.A105) are manual or automated/programmed procedures that
operate at a business process level and therefore apply to the processing of individual
applications.
b. The reliance that can be placed on application controls often depends on the reliability
of the general controls.
c. Categories:
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 6 pages and 3 million more documents.

Already have an account? Log in

Document Summary

It related ic strengths and weaknesses use of caats for: tests of controls, substantive testing, examples of it risks relevant to the auditor, planning and organisation. They may be programmed = automated (means it"s inside the computer) or manual and are located in the user or it departments: it control should be processed by it auditors, categories of it general controls, segregation of duties. Separation between it and user department functions e. g. users are not programmers. Separation of incompatible functions within the it department i. e. those who develop and understand the systems (programmers) aren"t responsible for its access and operation e. g. operators are not programmers: system implementation/change controls. Ensure that systems acquisition (authorisation), development and modification processes are properly managed: physical hardware controls, software controls. Ensure continuity of processing in the event of hardware malfunction or breakdown. Inspection (inspect a sample of initial temporary password to ensure companies do have the initial control)

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers

Related Documents

Related Questions