Computer-Assisted Audit Tools
Computer-Assisted Audit Tools
Computer-Assisted Audit Tools
and Techniques
APPLICATION CONTROLS
Application controls are programmed procedures designed to deal with potential exposures that
threaten specific applications, such as payroll, purchases, and cash disbursements systems.
1. input controls
2. processing controls, and
3. output controls
Input Controls
are designed to ensure that these transactions are valid, accurate, and complete.
-Transcription errors
The batch transmittal sheet captures relevant information such as the following about
the batch.
• A unique batch number
• A batch date
• A transaction code (indicating the type of transactions, such as a sales order or cash
receipt)
• The number of records in the batch (record count)
• The total dollar value of a financial field (batch control total)
• The total of a unique nonfinancial field (hash total)
4. Validation controls
-Intended to detect errors in data before processing
-Most effective if performed close to the source of the transaction
-Some require referencing a master file
-This technique includes centralized procedures to manage the data input for all of the
organization’s transaction processing systems.
Processing Controls
After passing through the data input stage, transactions enter the processing stage of
the system.
1. run-to-run controls
-use batch figures to monitor the batch as it moves from one programmed procedure
(run) to another.
Output Controls
-Not misplaced
-Not misdirected
-Not corrupted
-Privacy policy not violated
-Batch systems more susceptible to exposure, require greater controls
Print Programs
Print Program controls
are designed to deal with two types of exposures presented
by this environment:
(1) the production of unauthorized copies of output and
(2) employee browsing of sensitive data.
Bursting
The primary control against these exposures is supervision. For very sensitive reports,
bursting may be performed by the end user.
Waste
It is important to dispose of aborted reports and the carbon copies from multipart paper
removed during bursting properly.
Data control
The data control group is responsible for verifying the accuracy of computer output
before it is distributed to the user.
Report Distribution
The primary risks associated with report distribution include reports being lost, stolen,
or misdirected in transit to the user. A number of control measures can minimize these
exposures. Maintaining adequate access control over this file becomes highly important.
Tracing
Tracing performs an electronic walkthrough of the application’s internal logic.
The tracing procedure involves three steps:
1. The application under review must undergo a special compilation to activate the
trace option.
2. Specific transactions or types of transactions are created as test data.
3. The test data transactions are traced through all processing stages of the
program, and a listing is produced of all programmed instructions that were
executed during the test.
Advantages of Test Data Techniques:
1. They employ through the-computer testing, thus providing the auditor with
explicit evidence concerning application functions.
2. Test data runs can be employed with only minimal disruption to the
organization’s operations.
3. They require only minimal computer expertise on the part of auditors.
Disadvantages of Test Data Techniques:
1. Auditors must rely on computer services personnel to obtain a copy of the
application for test purposes
2. Provide a static picture of application integrity at a single point in time
3. Relatively high cost of implementation, which results in audit inefficiency
The Integrated Test Facility (ITF)
The integrated test facility (ITF) approach is an automated technique that enables the auditor to
test an application’s logic and controls during its normal operation. The ITF is one or more audit modules
designed into the application during the systems development process.
Advantages of ITF:
1. ITF supports ongoing monitoring of controls as required by SAS 78.
2. Applications with ITF can be economically tested without disrupting the
user’s operations and without the intervention of computer services
personnel
Disadvantage of ITF:
1. The potential for corrupting the data files of the organization with test
data
This problem is remedied in two ways:
1. Adjusting entries may be processed to remove the effects of ITF from
general ledger account balances.
2. Data files can be scanned by special software that remove the ITF
transactions.
Parallel Simulation
Parallel simulation requires the auditor to write a program that simulates key features or
processes of the application under review. The simulated application is then used to reprocess
transactions that were previously processed by the production application.