Chapter14 - Auditing IT Controls Part 1 - BSA2A
Chapter14 - Auditing IT Controls Part 1 - BSA2A
Overview of Auditing
External Auditor
- is a public accountant who conducts audits, reviews, and other works for his or her clients.
-is independent of all clients, and so is in a good position to make an impartial evaluation of
the financial statements and systems of internal controls of those clients.
Objective
-assuring the fair representation of financial statements
Securities and Exchange Commission (SEC) requires all publicly traded companies be subject
to a financial audit annually
CPA
-represent the interest of outsider
-role is to collect and evaluate evidence and render opinion
Independence
-which a CPA should have
-wherein the judge must remain independent in his/her deliberations
External Auditor follows strict rules in conducting financial audits. These are authoritative rules have
been defined by the SEC, FASB, AICPA, and by federal law (Sarbanes-Oxley Act of 2002)
Example:
AICPA rules state that an accountant’s independence will be impaired if the accountant:
-makes investment decisions on behalf of audit clients or otherwise has discretionary authority over
an audit client’s investments.
-has custody of assets of the audit client, such as taking temporary possession of securities
purchased by the audit client.
Auditing Standards
are divided into 3 classes: General Qualification Standard, Field Work Standards, and
Reporting Standards. Although GAAS establishes the framework for prescribing auditor
performance, it is not sufficiently detailed to provide meaningful guidance in specific circumstances.
For specific guidance, the AICPA issues Statement on Auditing Standards (SASs) as
authoritative interpretations of GAAS
SAS
-first SAS was issue by the AICPA in 1972
-provide auditors with guidance on a spectrum of topics, including methods of investigating
new clients, procedures for collecting information from attorneys regarding contingent
liability claims against clients, and techniques for obtaining background information on the
client’s industry.
-are regarded as authoritative pronouncements because every member of profession must
follow their recommendation or be able to show why a SAS does not apply in a given
situation
Structure of an Audit
Conducting audit is a systematic and logical process that consists of three conceptual
phases: Audit Planning, Tests of Control, and Substantive Testing.
IT Audit-is the examination and evaluation of an organization's information technology
infrastructure, policies and operations. Information technology audits determine whether IT
controls protect corporate assets, ensure data integrity and are aligned with the business's
overall goals.
1. Audit planning
-first phase
-before the auditor can determine the nature and extent of the tests to be performed, he or
she must gain a thorough understanding of the client’s business
-auditor’s objective at this point is to obtain sufficient information about the firm to plan the
other phases of the audit
2. Test of Controls
-objective of this phase is to determine whether adequate internal controls are in place and
functioning properly
-evidence gathering techniques used in this phase include both manual techniques and
specialized computer audit techniques (Chapter 16)
-the auditor assesses the quality of the internal control by assigning a level of control risk
3. Substantive Control
-focuses on gathering evidence pertaining to financial data
-involves a detailed investigation of specific account balances and transactions through what
are called substantive control
-tend to be physical, labor incentive activities such as counting cash, counting inventories in
a warehouse, and verifying the existence of stock certificates in a safe
Much of the data needed to perform substantive tests are stored in digital form in data files
and must be extracted using CAATTs software (Computer Assisted Audit Tools and
Techniques)
The nature (what to examine), timing (when to examine), and extent (how many items to
examine) of substantive tests are audit decision that are driven by the concepts of
Management Assertions and Audit Risk.
Management Assertions – are claims made by management regarding the content of the
issued financial statements. Through substantive procedures, auditors gather evidence to
test the validity of management assertions, which fall into the following general categories
1. Assertions about classes of transaction and events for the period under audit
a. Occurrence
b. Completeness
c. Accuracy
d. Cutoff
e. Classification
2. Assertions about account balances at the period end
a. Existence
b. Rights and obligation
c. Completeness
d. Valuation and allocation
3. Assertions about presentation and disclosure
a. Occurrence
b. Completeness
c. Classification and understandability
d. Accuracy and valuation
The auditors develop Audit Objectives and design Audit Procedures to gather evidence that
corroborates or refutes management’s assertions.
This table shows the relationship between management’s assertions, audit objectives, and audit
procedures
Audit Risk – is the probability that the auditor will render an unqualified (clean) opinion on
financial statements that are, in fact, materially misstated because of undetected errors or
irregularities or both
Section 302 requires corporate management, including the CEO to certify financial and other
information contained in the organization’s quarterly and annual reports (and also the internal
controls over financial reporting). It is to provide reasonable assurance as to the reliability of the
financial reporting process.
Section 404 requires the management of public companies to assess the effectiveness of
their organization’s internal control over financial reporting. Under this section of the act,
management is required to provide an annual report addressing the following points:
Prior to SOX, external auditors were not required to test internal controls as part of their
attest function. They were required to be familiar with the client organization’s internal control.
SOX legislation dramatically expands the role of external auditors by mandating that they
attest to the quality of internal control, this constitutes the issuance of a separate audit opinion in
addition to the opinion on the fairness of the financial statements
IT control relationship
Compliance with Section 404 requires management to provide the external auditor with
documented evidence of functioning controls to relate to selected material accounts in its report on
control effectiveness.
Section 302 also carries significant auditor implications. Specifically, auditors must perform
the following procedures quarterly to identify any material modifications in controls over financial
reporting:
Management is responsible for implementing such controls, and auditors are specifically
required to test them. Because computer lie at the heart of the modern organization’s
accounting and financial reporting system, the topic of computer fraud falls within the
management and audit responsibilities specified by SOX. The following section deals with
several computer fraud issues.
Computer Fraud
The General Model for Accounting Information System conceptually portrays the key stages of
an information system. In this section, we examine only the general nature of the risk; specific
control techniques needed to reduce the risk.
DATA COLLECTION
-is to ensure that event data entering the system are valid, complete, and free from material
error
DATA PROCESSING
Program Fraud
(1) Creating illegal programs
(2) Destroying or corrupting a program’s logic
(3) Altering program logic
Operations Fraud
-is the misuse or theft of the firm’s computer resources
-often involves using the computer to conduct personal business
DATABASE MANAGEMENT
The organization’s data base is its physical repository for financial and non-financial data.
Database management fraud includes altering, deleting, corrupting, destroying, or stealing an
organization’s data.
INFORMATION GENERATION
-is the process of compiling, arranging, formatting, and presenting information to users
IT Governance Controls
-is a broad concept relating to the decision rights and accountability for encouraging
desirable behavior in the use of IT. In this chapter, we consider three governance issues that do
organizational structure of the IT function, computer operation, and disaster recovery planning
Inadequate Documentation
Poor quality systems documentation is a chronic IT problem and a significant
challenge for many organizations seeking SOX compliance
Program Fraud
When the original programmer of a system is also assigned maintenance
responsibility, the potential fraud is increased. Program fraud involves making unauthorized
changes to program modules for the purpose of committing an illegal act
A Superior Structure for System Development
New System Development is responsible for designing, programming, and
implementing new systems project
System maintenance is responsible for the system’s ongoing maintenance upon
successful implementation
Advantages of DDP
1. Cost Reduction- powerful yet inexpensive small-scale computer system, which can cost-
effectively perform specialized functions, have changed the economics of data processing
dramatically.