0% found this document useful (0 votes)
77 views54 pages

Auditing Data Management Systems Overview

Auditing EDP systems presents challenges due to a lack of paper trails. Objectives of general controls for EDP systems include ensuring responsibilities are assigned, information needs are met efficiently, and resources and security are managed appropriately. Input, processing, and output controls help ensure accuracy and authorization of data entry, processing, and reports. The auditor can audit around the computer through extensive testing of inputs and outputs, or audit through the computer using techniques like test data and parallel simulation to test hardware, software, and processing. SAS No. 80 and 94 provide guidance on audit planning and evaluating internal controls in an IT environment.

Uploaded by

Samonte Jemimah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views54 pages

Auditing Data Management Systems Overview

Auditing EDP systems presents challenges due to a lack of paper trails. Objectives of general controls for EDP systems include ensuring responsibilities are assigned, information needs are met efficiently, and resources and security are managed appropriately. Input, processing, and output controls help ensure accuracy and authorization of data entry, processing, and reports. The auditor can audit around the computer through extensive testing of inputs and outputs, or audit through the computer using techniques like test data and parallel simulation to test hardware, software, and processing. SAS No. 80 and 94 provide guidance on audit planning and evaluating internal controls in an IT environment.

Uploaded by

Samonte Jemimah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd

Chapter 3 with added info

Auditing
Data Management
Systems

Challenges of Sophisticated
Computer Systems
electronic method of sending
documents between companies
no paper trail for the auditor to follow
increased emphasis on front-end controls
security becomes key element in
controlling system

Objectives of General Controls

1.
2.
3.
4.

Responsibility for control


Information system meets needs of entity
Efficient implementation of information systems
Efficient and effective maintenance of information
systems
5. Effective and efficient development and acquisition
of information systems
6. Present and future requirements of users can be met
7. Efficient and effective use of resources within
information systems processing

Objectives of General Controls


8. Complete, accurate and timely processing of
authorized information systems
9. Appropriate segregation of incompatible
functions
10. All access to information and information
systems is authorized
11. Hardware facilities are physically protected from
unauthorized access, loss or damage
12. Recovery and resumption of information
systems processing
13. Maintenance and recovery of critical user
activities

Input Controls
input data should be authorized &
approved
the system should edit the input data &
prevent errors
Examples include: validity checks, field
checks, reasonableness check, record
counts etc.

Processing Controls

assure that
data entered into
the system are
processed, processed
only once, and
processed accurately

Processing Controls
Examples
control, batch, or proof total - a total of a
numerical field for all the records of a batch
that normally would be added (example:
wages expense)
logic test - ensures against illogical combina
tions of information (example: a salaried employee does not report hours worked)

Output Controls

assure that
data generated by
the system are valid,
accurate, complete,
and distributed to
authorized persons in
appropriate quantities

Objectives of Application Controls

1. Design application controls with regard to:


- segregation of incompatible functions
- security
- development
- processing of information systems
2. Information provided by the systems is:
- complete
- accurate
- authorized
3. Existence of adequate management trails

There are two general approaches


to auditing EDP systems:
1. Auditing around the computer
involves extensive testing of the
inputs and outputs of the EDP
system and little or no testing of
processing or computer hardware.

This approach involves no tests of the


computer programs and no auditor use
of the computer.

There are two general approaches


to auditing EDP systems:
1. Auditing around the computer
depends on a visible, traceable, hard
copy audit trail made of manually
prepared and computer-prepared
documents.

There are two general approaches to


auditing EDP systems:
2. Auditing with use of the computer
involves extensive testing of
computer hardware and software.

Techniques for auditing


with use of the computer
1. Test data involves auditor preparation of a
series of fictitious transactions; many of
those transactions will contain intentional
errors. The auditor examines the results
and determines whether the errors were
detected by the clients
system.

What are the shortcomings of the


use of test data?
- possibility of accidental integration of
fictitious and actual data
- preparation of test data that examines
all aspects of the application is difficult
- the auditor must make sure that the
program being tested is the one
actually used in routine processing

techniques for auditing


with use of the computer
2. Parallel simulation
-the auditor writes a computer program that
replicates part of the clients system
-the auditors program is used to process
actual client data

- the results from the auditors program and


that of the clients routine processing are
compared

Auditing Software
Generalized audit software involves
the use of auditor programs, client
data, and auditor hardware. The
primary advantage of GAS is that the
client data can be down-loaded into
the auditors system and manipulated
in a variety of ways.

Common Audit Software Functions


- verifying extensions and footings
- examining records
- comparing data on separate files
- summarizing or re-sequencing data and
performing analyses
- comparing data obtained through other
audit procedures with company records
- selecting audit samples
- printing confirmation requests

Differences with Computer


Processing
Audit trails are different than with manual
accounting systems
Portions of audit trails may be temporary
or never exist
Processing is more uniform
Computer may initiate and complete
transactions
Greater potential for fraud

Impact of Computers on Planning


Extent to which computers are used
Complexity of computer operations
Organizational structure of computer
operations
Availability of data
Use of CAATs
Need for specialized skills by auditor

Audit Alternatives
Continuous (Electronic) Auditing
Auditing Around the Computer
Auditing Through the Computer
Non-concurrent (after-the-fact) auditing
Can be used for tests of transactions and
balances (substantive tests)
Can be used to test the effectiveness of
controls at various times in the past
Recent SAS pronouncements reduce
applicability of non-concurrent auditing

Audit Alternatives
Concurrent auditing provides greater
information about the effectiveness of
controls
Special audit test records can be used
to examine system effectiveness
Embedded audit modules collect,
process and report audit evidence as
it is processed by the system

SAS No. 80
In entities where significant information is
transmitted, processed, maintained, or
accessed electronically, the auditor may
determine that it is not practical or
possible to reduce detection risk to an
acceptable level by performing only
substantive tests for one or more financial
statement assertions.

SAS No. 80
Due to the short-term nature of electronic
data, the auditor should consider the time
during which information exists or is
available in determining the nature, timing
and extent of his tests

SAS No. 94
The Effect of Information Technology on
the Auditors Consideration of Internal
Control in a Financial Statement Audit
Amends SAS No. 55 Consideration of
Internal Control in a Financial Statement
Audit
SAS No. 94 does NOT change the
requirement that the auditor obtain a
sufficient understanding of internal control
to plan the audit

SAS No. 94
SAS No. 94 acknowledges that IT use presents
benefits as well as risks to an entitys internal
control
The auditor should expect to encounter IT
systems and electronic records rather than paper
documents
An entitys IT use may be so significant that the
quality of the audit evidence available to the
auditor will depend on the controls that business
maintains over its accuracy and completeness

SAS No. 94
As companies rely more and more on IT
systems and controls, auditors will need
to adopt new testing strategies to obtain
evidence that controls are effective
An auditor might need specialized skills to
determine the effect of IT on the audit
In some instances, the auditor may need
the skills of a specialist

Areas of Audit Focus

Auditing computer programs


Auditing computer processing
Auditing computer files and databases

Auditing Computer Programs


Non-processing of data
Program logic flowchart verification
Program code checking
Examination of job accounting and
control information
Review printouts

Non-concurrent Auditing
The Black Box Approach (still allowed?)
Must be able to locate copies of source
documents for transactions and the
accounting reports resulting from those
transactions
Must be able to read the source
documents and reports without the aid
of the clients computer
Auditor must assess a low level of risk
on controls external to EDP

Black Box Approach


Must trace transactions from the source
documents (cradle) to the accounting
reports (grave) and from the reports
back to the source documents
Computer
(Black Box)
Document
Document
with error
Document
Source Documents

Manual Verification

Document
Document
with error
Document
Output Reports

Need for Concurrent Auditing


Disappearing paper-based audit trail
Continuous monitoring required by
advanced systems
Increasing difficulty of performing
transaction walkthroughs
Presence of entropy (disorder) in
systems
Outsourced and distributed IS
Increased interorganizational IS (EDI)

EDP Controls
Categories:

General

Application

Specific Types of Organization and


Operation
Controls:

Input
Processing
Systems Development Output
and Documentation
Hardware and Systems
Software
Access
Data and Procedural

Nature:

Pertain to EDP
environment and all
EDP activities

Pertain to specific
EDP tasks

Errors and Irregularities

Necessary Control
Procedures
INPUT
Valid data are incorrectly converted to
Verification controls
machine-sensible form.
Computer editing
Batch controls
Data control group monitoring
Properly converted input is lost,
Transmittal controls
duplicated or distorted during handling.
Control totals
Detected erroneous data are not
Error logs
corrected and resubmitted for processing. Data control group monitoring
PROCESSESSING
The wrong files are processed and
External file labels
updated.
Internal file labels
Processing errors are made on valid input Control totals
Limit and reasonableness tests
data.
Illogical or unreasonable input is
processed.
OUTPUT
Output may be incorrect because of
Output control totals
processing errors.
Output may be incorrect because file
Periodic comparisons of file
revisions are unauthorized or approved
data with source documents

Tests of Controls Techniques


Auditing Around the Computer
Manually processing selected
transactions and comparing results to
computer output
Auditing Through the Computer
Computer assisted techniques
Test DecksProcessing dummy transactions
and records with errors and exceptions to see
that program controls are operating

Tests of Controls Techniques


Controlled ProgramsProcessing real and test
data with a copy of the clients program
under the auditors control
Program Analysis TechniquesThe
examination of a computer generated
flowchart of the clients program to test the
programs logic
Tagging and Tracing Transactions
Examination of computer generated details of
the steps in processing tagged transactions

Tests of Controls Techniques


Integrated Test FacilityA system that
processes test data simultaneously with real
transactions to allow the system to be
constantly monitored
Parallel SimulationThe use of an auditorwritten program to process client data and
comparison of its output to the output
generated by the clients program

Clients
Program

Auditors
Test Data

Computer
Processing

Computer
Results

should
match

Auditors
Predetermined
Results

System Concept of Parallel Simulation


Master
file

Transactions

Live
system

Live
file

Simulated
system

Comparison

Simulated
output

Exceptions
Source: W.C. Mair, New Techniques in Computer Program Verification, Tempo
(Touche Ross & Co., Winter 1971-72), p. 14.

Parallel Simulation
Input Transaction
File

Input Master
File

System
Application

Parallel
Simulation

Output
Master File

Generalized
Audit
Software
Discrepancies

Output
Master File

Types of Concurrent Auditing


Testing real data
Tracing transactions
Snapshot/extended record (EAM)
System Control Audit Review File
(SCARF)
Testing simulated data
Test deck approach
Integrated test facility (ITF)

Auditing Using Clients ComputerTracing Real Data


Provides direct confirmation that controls
functioned as prescribed
Weaknesses of approach

Actual transactions selected may not


trigger all of the controls- in fact,
finding actual transactions to test
every control may not be possible
May be disruptive to clients
operation

Auditing using Clients ComputerTracing Real Data


Weaknesses, continued

Difficult to verify that program


tested is program normally used
Difficult to verify that procedures
used during test are procedures
normally employed
Auditor needs to understand IT
operations

Auditing using Clients ComputerUsing Simulated Data


Strengths

Auditor can reduce substantially


the number of records that have
to be processed (one record can
test several controls)
Permits testing of every control

Auditing using Clients ComputerUsing Simulated Data


Weaknesses

Only those conditions known to


exist can be tested
Same program and procedures
questions as in processing real
data
Removal of simulated data from
client's records

Auditing using Clients ComputerUsing Simulated Data


Verify that no amounts, accounts, or
transaction types are omitted
Verify pricing, extensions, and other
valuation procedures
Verify account coding and classification
Verify proper time period recording
Test subsidiary records footing and
reconciliation to control account
balances

Auditing using Clients ComputerUsing Simulated Data


Test data or test record approach

Simulated data is controlled and


processed separately from real
data
Output is compared to auditorcalculated output

Auditing using Clients ComputerUsing Simulated Data


Integrated test facility (ITF)

Simulated data is assigned a special


code to distinguish it from real data
Simulated data is integrated with real
data and processed in normal course
of business
Weakness - simulated data may be
processed differently than real data

Generalized Audit Software


Off-the-shelf software that allows
examination of client data on auditors
computer
Information systems vary widely
between clients
Hardware and software environments
Data structures
Record formats
Processing functions

Generalized Audit Software


GAS developed specifically to
accommodate a wide variety of hardware
and software platforms
Allows auditor to quickly modify audit
approach as audit objectives change
Allows auditors relatively unskilled in
computer systems to audit effectively in
an electronic environment

Functional Capabilities of GAS


File access
File reorganization (sorting and
merging)
Filtering (Boolean operators: =, >=, <=,
<>, AND, OR, etc.)
Statistical (sample selections)
Arithmetic
Stratification
File creation
Reporting

Available CAATs
CA-Easytrieve (Computer Associates)
Works in UNIX or LAN (primarily mainframes)
Uses a background language similar to COBOL

SAS
Statistical analysis
Data mining

ACL
IDEA

Electronic Workpapers
Electronic working papers

Standardizes audit forms and formats


Improves quality and consistency
Coordinates efforts
Can centralize management efforts

Centralized Vs Distributed Systems


Some activities should remain centralized
DDP is more expensive but can add
efficiencies over straight client-server
approach
Data can be distributed in different ways
May raise security issues
Auditor must question how each site is
secured
DDP may be partitioned or replicated
DDP requires concurrency control

End Ch 3

You might also like