83% found this document useful (6 votes)
13K views457 pages

Icitss It Module 2

Uploaded by

Jigar Sangani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
83% found this document useful (6 votes)
13K views457 pages

Icitss It Module 2

Uploaded by

Jigar Sangani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 457

INFORMATION TECHNOLOGY

(ICITSS)

COURSE MATERIAL
MODULE – II

Board of Studies
The Institute of Chartered Accountants of India, New Delhi
The objective of this compilation of background material is to provide uniform reference
material to the students undergoing Information Technology under ICITSS. All attempts
have been made to make the discussion simple and comprehensive.
Students may note that this is intended to help them acquire knowledge and skill in
the subject and gain hands on experience. This is also expected to serve as a source
of reference book in their future education and training. In case students have any
suggestions to make for further improvement of the material contained herein, they
may write to Board of Studies, A-29, Sector-62, and NOIDA.
Queries can also be sent to [email protected]
All care has been taken to provide the material in a manner useful to the students.
However, the material has not been specifically discussed by the Council of the
Institute or any of its Committees and the views expressed herein may not be taken to
necessarilyrepresent the views of the Council or any of its Committees.
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any forms, or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without prior permission, in writing, from the
Institute.© The Institute of Chartered Accountants of India, January 2009

© The Institute of Chartered Accountants of India

Revised Edition : July, 2017

ISBN : 978-81-8441-037-2

Published by The Publication Department on behalf of The Institute of Chartered


Accountants of India, ICAI Bhawan, Post Box No. 7100, Indraprastha Marg, New
Delhi - 110 002, India.

Designed & Printed at Repro India Limited, 50/2, TTC MIDC Industrial Area, Mahape,
Navi Mumbai 400 710, India.
August / 2011 / 30,000 Copies (Revised)
Contents
Section D : MS Access-2010 .................................................................................................... 1

Chapter 1 : Introduction to Database ............................................................................. 2

Chapter 2 : Working with Tables & Forms.................................................................... 9

Chapter 3 : Working with Queries and Reports ........................................................... 65

Unit 4 : Core Banking Solution ............................................................................................. 111

Chapter 1 : CBS Basics and Its Working Methodology ............................................... 112

Chapter 2 : CBS Interfaces-their Functionality and Controls ..................................... 134

Chapter 3 : Systems Audit of CBS and Its Interfaces ................................................... 160

Unit 5 : Computer Assisted Audit Techniques ................................................................... 173

Chapter 1 : Introduction to CAAT ................................................................................. 174

Chapter 2 : Data Analysis and Audit Techniques ....................................................... 180

Chapter 3 : Data Analysis using IDEA .......................................................................... 185

Chapter 4 : Advanced Analytics using IDEA ............................................................... 230

Unit 6 : Accounting Package .................................................................................................. 307

Chapter 1 : Principles of Accounting ............................................................................. 308

Chapter 2 : Introduction to Tally.ERP 9 ........................................................................ 318

Chapter 3 : Voucher Entry in Tally.ERP 9 ..................................................................... 347

Chapter 4 : Generating Reports in Tally.ERP 9............................................................. 360

Chapter 5 : Financial Analysis Tools in Tally.ERP 9 .................................................... 371

Chapter 6 : E-Filing Process ............................................................................................. 376


Section - D
MS Access-2010
1
Office automation-Data Bases
C
H
A
P
INTRODCUTION TO
T
E MICROSOFT ACCESS,
R
2010

LEARNING OBJECTIVES
 What is MS-Access?
 What are databases used for?
 Component of databases.
 Opening file in Access.

1.1 INTRODUCTION TO MICROSOFT ACCESS 2010


Microsoft Access 2010 for Windows is a Database Management System or DBMS, which helps us
manage data stored in a computer database. In this chapter, the readers will be given exposure to
the basics of Access and the various data types used in Access. A database is a tool for collecting and
organizing information. Databases can store information about people, products, orders or anything
else. A computerized database is a container of objects. One database can contain more than one
table. For example, an inventory tracking system that uses three tables is not three databases, but
one database that contains three tables.
An Access database stores its tables in a single file, along with other objects, such as forms, reports,
macros and modules. Databases created in the Access 2010 format have the file extension .accdb
and databases created in earlier Access formats have the file extension .mdb.
Using Access, we can do the following:
 Add new data to a database, such as a new item in an inventory,
 Edit existing data in the database, such as changing the current location of an item,
 Delete information, perhaps if an item is sold or discarded,
 Organize and view the data in different ways,
 Share the data with others via reports, e-mail messages, an intranet or the Internet.
Microsoft Access 2010 can be started in Windows 95 or later versions of windows operating system
in the following way:
(i) Click on the Start button on the Windows Taskbar and then choose Program >> Microsoft
Access 2010.
(ii) After a short delay, the Microsoft Access 2010 main window displays a dialogue box offering
the user a choice of creating a new database or opening one of the existing databases as shown
2 INFORMATION TECHNOLOGY
Introduction to Microsoft Access, 2010
in Fig. 1.1.1. The lower panel contains the names of the databases that have been opened
recently.

Fig. 1.1.1: Start-up MS Access 2010 Screen


1.1.1 The parts of an Access database
The following sections are short descriptions of the parts of a typical Access database.
1. Tables
2. Forms
3. Reports
4. Queries
5. Macros
6. Modules
1.1.2 Tables
A database table is similar in appearance to a spreadsheet, in that data is stored in rows and columns.

INFORMATION TECHNOLOGY 3
Office automation-Data Bases
As a result, it is usually quite easy to import a spreadsheet into a database table. The main difference
between storing data in a spreadsheet and storing it in a database is in how the data is organized.
To get the most flexibility out of a database, the data needs to be organized into tables so that
redundancies don’t occur. For example, if we’re storing information about employees, each employee
should only need to be entered once in a table that is set up just to hold employee data. Data about
products will be stored in its own table and data about branch offices will be stored in another table.
This process is called Normalization.
Each row in a table is referred to as a Record. Records are where the individual pieces of information
are stored. Each record consists of one or more fields. Fields correspond to the columns in the table.
1.1.3 Forms
Forms are sometimes referred to as "Data Entry Screens", which are the interfaces we use to work
with our data and they often contain command buttons that perform various commands. We can
create a database without using forms by simply editing our data in the table datasheets. However,
most database users prefer to use forms for viewing, entering and editing data in the tables.
Forms provide an easy-to-use format for working with the data and we can also add functional
elements, such as command buttons, to them. We can program the buttons to determine which
data appears on the form, open other forms or reports or perform a variety of other tasks. For
example, we might have a form named "Customer Form" in which we work with customer data.
The customer form might have a button which opens an order form where we can enter a new
order for that customer.
Forms also allow us to control how other users interact with the data in the database. For example,
we can create a form that shows only certain fields and allows only certain operations to be
performed. This helps protect data and to ensure that the data is entered properly.
1.1.4 Reports
Reports are what we use to summarize and present data in the tables. A report usually answers
a specific question, such as "How much money did we receive from each customer this year?" or
"What cities are our customers located in?" Each report can be formatted to present the information
in the most readable way possible.
A report can be run at any time and will always reflect the current data in the database. Reports
are generally formatted to be printed out, but they can also be viewed on the screen, exported to
another program or sent as e-mail message.
1.1.5 Queries
Queries are the real workhorses in a database and can perform many different functions. Their
most common function is to retrieve specific data from the tables. The data we want to see is usually
spread across several tables and queries allow us to view it in a single datasheet. Also, since we
usually don't want to see all the records at once, queries let us add criteria to "filter" the data down
to just the records we want. Queries often serve as the record source for forms and reports.
1.1.6 Macros
Macros in Access can be thought of as a simplified programming language which we can use to
add functionality to our database. For example, we can attach a macro to a command button on a
form so that the macro runs whenever the button is clicked. Macros contain actions that perform

4 INFORMATION TECHNOLOGY
Introduction to Microsoft Access, 2010
tasks, such as opening a report, running a query or closing the database. Most database operations
that we do manually can be automated by using macros, so they can be great time-saving devices.
1.1.7 Modules
A module is a collection of declarations, statements and procedures that are stored together as a
unit. A module can be either a class module or a standard module. Class modules are attached
to forms or reports and usually contain procedures that are specific to the form or report they're
attached to. Standard modules contain general procedures that aren't associated with any other
object. Standard modules are listed under Modules in the Navigation Pane, whereas class modules
are not.

1.2 CREATING DATABASES


The primary step involved in creating any application is to set up a database file. There are various
methods of creating a database. The user could either start with creating a database from the scratch
or create a database using the database wizard having predefined objects.
1.2.1 Create a Database using a Template
Access provides us wide variety of templates that can be used to speed up the database creation
process. A template is a ready-to-use database containing all the tables, queries, forms and reports
needed to perform a specific task. For example, there are templates that we can use to track issues,
manage contacts or keep a record of expenses. Some templates contain a few sample records to
help demonstrate their use. Template databases can be used as they are or we can customize them
to better fit our needs.
If one of these templates fits our needs, using it is usually the fastest way to get a database started.
However, if we have data in another program that we want to import into Access, it is better to
create a database without using a template. Templates have a data structure already defined and
it might require a lot of work to adapt our existing data to the template's structure. The steps to
be followed are:

(i) If we have a database open, click File and then click Close Database to display the
Getting Started with MS Office Access page.
(ii) Several featured templates are displayed in the middle of the Getting Started with
MS-Office Access page and more become available when we click the links in the Sample
Templates pane as shown in Fig. 1.2.1.

INFORMATION TECHNOLOGY 5
Office automation-Data Bases

Fig. 1.2.1: MS Access showing Local Template Categories


(iii) Click the template we want to use. For example - Let us choose Event Template.
(iv) Access suggests a file name for our database in the File Name box - we can change the file
name, if we want. To save the database in a different folder from the one displayed below the
file name box, click Browse to the folder in which we want to save it and then click OK.
(v) Click Create (or Download for an Office Online template). Access creates or downloads the
database and then opens it. A form is displayed in which we can begin entering data. If our
template contains sample data, we can delete each record by clicking the record selector (the
shaded box or bar just to the left of the record) and then click Home >> Records >> Delete.
(vi) To begin entering data, click in the first empty cell on the form and begin typing. Use the
Navigation Pane to browse for other forms we might want to use.
1.2.2 Create a Database without using a Template
If we are not interested in using a template, we can create a database by building our own tables,
forms, reports and other database objects. In most cases, this usually involves one or both of the
following :
Entering, pasting or importing data into the table that is created when we create a new database
and then repeating the process with new tables that we create by using the Table command on
the Create tab.
Importing data from other sources and creating new tables in the process.

6 INFORMATION TECHNOLOGY
Introduction to Microsoft Access, 2010
1) Create a blank database
(i) On the Getting Started with MS Office Access page, under New Blank Database, click
Blank Database, as shown in Fig. 1.2.2.

Fig. 1.2.2: Creating and Naming the Blank Database


(ii) In the Blank Database pane, type a file name in the File Name box. If we do not supply
a file name extension, Access adds it for us. To change the location of the file from the
default, click Browse for a location to put for our database, (next to the File name box),
browse to the new location and then click OK.
(iii) Click Create, Access creates the database with an empty table named Table1 and then
opens Table1 in Datasheet view. The cursor is paces in the first empty cell in the Click to
Add column.
(iv) Begin typing to add data or data can be pasted from another source.

INFORMATION TECHNOLOGY 7
Office automation-Data Bases

Fig. 1.2.3: Datasheet View


Entering information in Datasheet view (as shown in Fig. 1.2.3) is designed to be very similar to
working in a Microsoft Office Excel 2010 worksheet. The table structure is created while we enter
data - any time we add a new column to the table, a new field is defined. Access automatically sets
each field's data type, based on the data we enter.

If we do not want to enter information in Table1 at this time, click Close . If any changes are
made in the table, Access prompts us to save changes to the table. Click Yes to save the changes,
click No to discard them or click Cancel to leave the table open.

8 INFORMATION TECHNOLOGY
2
Working with Table and Forms
C
H
A
WORKING WITH
P
T TABLES AND FORMS
E
R

LEARNING OBJECTIVES
 To understand the concept of table.
 To introduce table and field properties.
 To know all data types.
 To work with database design and creation of a table.
 To save, delete, rename and open a table.
 To introduce the concept of SharePoint List.
 Form and its importance.
 General types of forms.
 General steps in creating a form.
 Creating a form using form view.
 Creating a form using Form Wizard.
 Form controls, its types and properties.
 Inserting controls on a form.

2.1 INTRODUCTION TO TABLES


When we create a database, we store our data in tables - subject-based lists of rows and columns.
For instance, we might create a Contacts table to store a list of names, addresses and telephone
numbers or a Products table to store information about products. We should always start the
design of a database by first creating its tables - even before we create any other database objects.
2.1.1 WHAT IS A TABLE?
A Table is a database object used to contain data about a particular subject, such as employees
or products. Each record in a table contains information about one item, such as a particular
employee. A record is made up of fields, such as name, address and telephone number. A record
is also commonly called a Row and a field is referred as a Column.

INFORMATION TECHNOLOGY 9
Office automation-Data Bases

Fig. 2.1.1 : An example of a 'Customers' Table


In Fig. 2.1.1, point 1 indicates Record or Row whereas point 2 indicates Field or Column. A database
can contain many tables, each storing information about a different subject. Each table can contain
many fields of different types, including text, numbers, dates and pictures.
The following list shows some common examples of tables we might create.
 A Customers table that lists our company's customers and their addresses,
 A Catalogue of products sold, including prices and pictures for each item,
 A Tasks table that tracks tasks and due dates,
 An Inventory of equipment or stock on hand.
We should plan and design our database carefully to ensure its correctness and to avoid having
to make too many changes later.
(1) Table and Field Properties
Tables and fields have properties that one can set to control their characteristics or behaviour.
(i) Table property : In an Access database, table properties are attributes of a table that
affect the appearance or behaviour of the table as a whole. A table opens in Design view
and its properties are set in the table's property sheet. For example, one can set a table's
Default View property to specify how the table is displayed by default.
(ii) Field property : A field property defines one of the field's characteristics or an aspect of
the field's behaviour and applies to a particular field in a table through Datasheet view.
One can also set any field property in Design view by using the Field Properties pane.
Datasheet View : In Datasheet view, we can enter data immediately and let Access build the table
structure behind the scenes. Field names are assigned numerically (Field1, Field2 and so on…)
and Access automatically sets each field's data type, based on the data we enter. In this, we can
edit fields, add and delete data and search for data.

10 INFORMATION TECHNOLOGY
Working with Table and Forms
(2) Data Types
Every field has to be assigned a data type which indicates the kind of data that the field stores,
such as large amounts of text or attached files. A data type is a field property, but it differs from
other field properties as follows :
 We set a field's data type in the table design grid, not in the Field Properties pane.
 A field's data type determines what other properties the field has.
The DataType property can be set only in the upper portion of table Design view. The data types
and their explanation is highlighted in Table 2.1.1.

Setting Type of Data Size


Text (Default) Text or combinations of text and Up to 255 characters or the
numbers, as well as numbers that don’t length set by the FieldSize
require calculations, such as phone numbers. property, whichever is less.

Memo Lengthy text or combinations of text and Upto 63,999 characters.


numbers.

Number Numeric data used in mathematical 1, 2, 4 or 8 bytes.


calculations.

Date/Time Date and time values for the years 100 - 9999. 8 bytes.

Currency Currency values and numeric data used in 8 bytes.


mathematical calculations involving data
with one to four decimal places. Accurate
to 15 digits on the left side of the decimal
separator and to 4 digits on the right side.

AutoNumber A unique sequential (incremented by 4 bytes (16 bytes if the FieldSize


1) number or random number assigned property is set to Replication
whenever a new record is added to a table. ID).
AutoNumber fields can’t be updated.

Yes/No Yes and No values and fields that contain 1 bit.


only one of two values (Yes/No, True/False
or On/Off).

OLE Object An object (such as a Microsoft Excel Up to 1 gigabyte (limited by


spreadsheet, a Microsoft Word document, available disk space)
graphics, sounds or other binary data)
linked to an embedded in a Microsoft Access
table.

INFORMATION TECHNOLOGY 11
Office automation-Data Bases

Setting Type of Data Size


Hyperlink Text or combinations of text and numbers Each part of the three parts
stored as text and used as a hyperlink of a Hyperlink data type can
address A hyperlink address can have up contain up to 2048 characters.
to three parts:
text to display — the text that appears in a
field or control.
address — the path to a file (UNC path) or
page (URL)
subaddress — a location within the file/
page.

Attachment screentip — the text displayed as a tooltip. To attach images, spreadsheet


files, documents, charts and
Any supported type of file. other types of supported files
to the records in the database
and to view and edit attached
files.

Lookup Wizard The same size as the primary


key field use to perform the
Creates a field that allows the user to choose lookup, typically 4 bytes.

Table 2.1.1 : Data types and their explanation


Calculated Field: Result of calculation. The calculation must refer to other fields in the same table.
You would use the expression builder to create the calculation.

(3) Table Relationships


Although each table stores data about a different subject, tables in a database usually store data
about subjects that are related to each other. For example, a database might contain the following:
 A Customers table that lists our company's customers and their addresses.
 A Products table that lists the products that we sell, including prices and pictures for each
item.
 An Orders table that tracks customer orders.
Because we store data about different subjects in separate tables, we need some way to tie the data
together so that we can easily combine related data from those separate tables. To connect the data
stored in different tables, relationships are created. A relationship is a logical connection between
two tables that specifies fields that the tables have in common.
Keys: Fields that are part of a table relationship are called keys. A key usually consists of one field,
but may consist of more than one field. There are two kinds of keys :
(i) Primary key : A table can have only one primary key which consists of one or more fields that

12 INFORMATION TECHNOLOGY
Working with Table and Forms
uniquely identify each record that is stored in the table. Often, there is a unique identification
number, such as an ID number or a code, that serves as a primary key.
(ii) Foreign key : A foreign key contains values that correspond to values in the primary
key of another table. A table can also have one or more foreign keys. For example,
we might have an Orders table in which each order has a customer ID number that
corresponds to a record in a Customers table. The customer ID field is a foreign key
of the Orders table.
The correspondence of values between key fields
forms the basis of a table relationship. We use a table
relationship to combine data from related tables. For
example, suppose that Employee and Salary are
two database tables. In each Employee and Salary
table, each record is identified by the primary key
field, Employee_Id.
Benefits of using relationships
Keeping data separated in related tables produces
the following benefits:
 Consistency : Because each item of data is
recorded only once, in one table, there is less
opportunity for ambiguity or inconsistency. For
example, we store a customer's name only once
in a table about customers, rather than storing
it repeatedly (and potentially inconsistently) in
a table that contains order data.
 Efficiency : Recording data in only one place
implies less disk space. Moreover, smaller tables
tend to provide data more quickly than larger
tables. If separate tables for separate subjects
are not used, null values (means the absence
of data) and redundancy can waste space and
impede performance.
 Comprehensibility : The design of a database is
easier to understand if the subjects are properly
separated into tables.
(4) Introduction to Navigation Pane
When a new or existing database is opened in Office
Access 2010, the objects in our database - the tables,
forms, reports, queries, macros and so on - appear in
the Navigation Pane. Our tables reside in a group
called Tables, forms in a group called Forms and Fig. 2.1.2 : Navigation Pane
so on. The Fig. 2.1.2 shows the groups in the Object
Type category.
INFORMATION TECHNOLOGY 13
Office automation-Data Bases
The Navigation Pane appears by default when a database in Office Access 2010. For example, if
a data is to be entered into a new table row, the task can be performed from the Navigation Pane.
Prevent the Navigation Pane from appearing by default

(i) Click the File and then click Access Options. The Access Options dialog box appears.
(ii) Click Current Database and, under Navigation, select or clear the Display Navigation Pane
check box. By default, this option is selected. Fig. 2.1.3 depicts the same.

Fig. 2.1.3 : Access Option Dialog Box under Option 'Current Database'
Set global options for the Navigation Pane
Several global options in the Navigation Pane can be set or changed according to the user's
requirements. The following Table 2.1.2 lists the options and describes how to use them.

14 INFORMATION TECHNOLOGY
Working with Table and Forms

Option Purpose
Show Hidden Objects Display hidden objects as semi-transparent disabled icons.
Clear this option when we want to hide objects completely.
Show System Objects Display system objects, such as system tables.
Single Click Open Open objects with a single mouse click.
Double Click Open Open objects with a double mouse click.

Table 2.1.2 : Options in Navigation Pane


To do so, left click the menu at the top of the Navigation Pane and then click Navigation Options
as shown in Fig. 2.1.4.

Fig. 2.1.4 : Navigation Options Dialog Box


(5) Database Design
A properly designed database provides us with the access to up-to-date, accurate information.
Certain principles that guide the database design are as follows :
(i) The first principle is that duplicate information (redundant information) is bad, as it wastes
space and increases the likelihood of error and inconsistencies.
(ii) The second principle is that the correctness and completeness of information is important.
If our database contains incorrect information, any reports that pull information from the
database will also contain incorrect information.

INFORMATION TECHNOLOGY 15
Office automation-Data Bases
A good database design is, therefore, one that
– divides the information into subject-based tables to reduce redundant data,
– provides Access with the information it requires to join the information in the tables together
as needed,
– helps support and ensure the accuracy and integrity of the information,
– accommodates the data processing and reporting needs.
The design process consists of the following steps :
(i) Determine the purpose of the database.
(ii) Find and organize the information required.
(iii) Divide the information into tables.
(iv) Turn information items into columns.
(v) Specify primary keys.
(vi) Set up the table relationships.
(vii) Refine the design.
(viii) Apply the normalization rules.

2.2 CREATE A NEW TABLE


A simple database, such as a Contact list, might use only a single table, whereas many databases,
however, may use several tables. When a new database is to be created, a new file on the computer
is to be created that acts as a container for all of the objects in our database, including our tables.
We can create a table by creating a new database, by inserting a table into an existing database
or by importing or linking to a table from another data source - such as a Microsoft Office Excel
2007 Workbook, a Microsoft Office Word 2007 document, a text file or another database. When
we create a new blank database, a new empty table is automatically inserted for us. We can then
enter data to start defining our fields.
2.2.1 Create a new Table in a new Database

(i) Click the File and then click New.


(ii) In the File Name box, type a file name. To change the location, click the folder icon to
Browse.
(iii) Click Create.
The new database is opened and a new table named Table1 is created and opened in Datasheet
view.
2.2.2 Create a new table in an existing Database

(i) Click the File and then click Open.


(ii) In the Open dialog box, select and open the database.

16 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.2.1 : Tables Group

(iii) On the Create tab, in the Tables group, click Table. (as depicted in point 1, Fig. 2.2.1). A new
table gets inserted in the database and the table is opened in Table tools as shown in Fig.
2.2.2.

Fig. 2.2.2 : Datasheet view of the Table


2.2.3 Create a table based on a Table Template
To create a Contacts, Tasks, Issues, Events or Assets table, start with the Table Templates that
come with Office Access 2010. The steps to be followed are as follows :
(i) Click the File and then click Open.
(ii) In the Open dialog box, select and open the database.
(iii) On the Create tab, in the Templates group, click Application parts and then from Quick
start select one of the available templates from the list (Point no. 2, Fig. 2.2.1). A new table is
inserted, based on the table template (shown in Fig. 2.2.3) we choose.

INFORMATION TECHNOLOGY 17
Office automation-Data Bases

Fig. 2.2.3 : Table Templates

2.3 IMPORT OR LINK TO CREATE A TABLE


We can create a table by importing or linking to information stored elsewhere. For instance, we can
import or link to information in an Excel worksheet, SharePoint list, an XML file, another Access
database, a Microsoft Office Outlook 2010 folder and a number of other sources.
 When we import any information, we create a copy of the information in a new table in the
current database.
 Conversely, when we link to the information, we create a linked table in the current database
that represents a live link to the existing information that is stored elsewhere. Thus, when we
change data in the linked table, we change it in the original source too. When information is
changed in the original source by using another program, that change is visible in the linked
table.
In some cases, we cannot make changes to our data source through a linked table, most notably
when the data source is an Excel worksheet.
Note : SharePoint is a web site that can be displayed in a browser such as Internet Explorer
and includes an interface for displaying lists and libraries in a secure database. SharePoint
also contains various web-parts that can display sorted or filtered information in various ways
or can display some kind of custom functionality. SharePoint can be used for something as
simple as a list of contacts or for something as complex as a project management dashboard
for a new store opening.
2.3.1 Create a new table by importing or linking to External Data

(i) To use an existing database, on the File menu, click Open.


(ii) In the Open dialog box, select and open the database.
(iii) To create a new database, on the File menu, click New.
 In the File Name text box, type a file name. To change the location, click the folder
icon.
 Click Create.
 The new database is opened and a new table named Table1 is created and opened in
Datasheet view.
(iv) On the External Data tab, in the Import group, click one of the available data sources as shown
in Fig. 2.3.1.

18 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.3.1 : Import Group in External Data Tab


(v) Follow the instructions in the dialog boxes. Access creates the new table and displays it in
the Navigation Pane.
One can also import or link to a SharePoint list by using a command on the Create tab.
2.3.2 Create a Table based on a Share Point list
We can create a table in our database that imports from or links to a SharePoint list. The list can
pre-exist which we can import or link to or we can create a new custom list or a new list based on
a predefined template. The predefined templates in Office Access 2010 include Contacts, Tasks,
Issues and Events as shown in Fig. 2.3.2.

Fig. 2.3.2 : Options in SharePoint Lists

INFORMATION TECHNOLOGY 19
Office automation-Data Bases
First, open the database in which we want to create the table.

(i) Click the File and then click Open.


(ii) In the Open dialog box, select and open the database.
(iii) On the Create tab, in the Tables group, click SharePoint Lists. (point 3, Fig 3.2.1)
The Fig. 2.3.2 gets opened showing predefined templates in Office Access 2010 - Contacts, Tasks,
Issues and Events.
(iv) Then, do one of the following:
1) Create the list based on a template
(i) Click either Contacts, Tasks, Issues
or Events. Fig. 2.3.3 shows the
selection of option Tasks from the
group of SharePoint List.
(ii) In the Create New List dialog box,
type the URL for the SharePoint
site where we want the list to reside.
Also, enter the name of the new
SharePoint list and its description.
If we want the linked table to open
after it is created, select the Open
the list when finished check box (it
is selected by default). Otherwise,
clear the check box.
(iii) Click OK.
2) Create a new custom list
(i) Click Custom in Fig. 2.3.2. The Custom Dialog Box shown in Fig. 2.3.4 gets opened.
(ii) In the Create New List dialog box, type the URL for the SharePoint (point 1, Fig. 2.3.4)
site where we want the list to reside. Also, type the name of the new SharePoint list
(point 2, Fig. 2.3.4) and its description.
(iii) If we want the linked table to open after it is created, select the Open the list when
finished check box (it is selected by default). Otherwise, clear the check box.
(iv) Click OK.

20 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.3.4 : 'Custom' option Dialog Box from SharePoint List


3) Import the data from an existing list
(i) Click Existing SharePoint List in Fig. 2.3.2.
(ii) In the Get External Data dialog box, type the URL for the SharePoint site that
contains the list as depicted in Fig. 2.3.5.
(iii) Click Import the source data into a new table in the current database (point 1,
Fig. 2.3.5).
(iv) Click Next and select a check box next to any SharePoint lists we want to import.
(v) Click OK.
4) Link to an existing list
(i) Click Existing SharePoint List. The dialog Box shown in Fig. 2.3.5 gets opened.
(ii) In the Get External Data dialog box, type the URL for the SharePoint site that contains
the list.
(iii) Click Link to the data source by creating a linked table (point 2, Fig. 2.3.5).
(iv) Click Next.
(v) Select a check box next to any SharePoint lists to which we want to link.
(vi) Click OK.

INFORMATION TECHNOLOGY 21
Office automation-Data Bases

Fig. 2.3.5 : Existing SharePoint List Dialog Box

2.4 ADD FIELDS TO A TABLE IN DATASHEET VIEW


We store the information items we want to track in fields (also called columns). For example, in a
Employee_Details table, we might create fields for EmpCode, LastName, FirstName, Telephone_
Number and Address, among others.
A field defines certain characteristics and are to be selected carefully. For example, every field has
a Name that uniquely identifies the field within a table. A field also has a data type that's chosen to
match the information to be stored. The data type determines the values that can be stored and the
operations that can be performed, as well as how much storage space to set aside for each value.
Every field also has an associated group of settings called properties that define the appearance
or behaviour characteristics of the field. For example, the Format property defines a field's display
layout - that is, how it should appear when displayed.
When we create a new table, the table opens in Datasheet view. We can immediately add a field
by typing some information in the Add New Field column as shown in Fig. 2.4.1, point 1.

22 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.4.1 : 'Add New Field' Column Header


2.4.1 Add a new field to an existing table

(i) Click the File and then click Open.


(ii) In Open dialog box, select and open the database.
(iii) In the Navigation Pane, double-click one of the available tables to open it.
(iv) Type the data in the cell below the Click to Add coloumn header.
2.4.2 Add a new field to a new table

(i) Click the File and then click Open.


(ii) In Open dialog box, select and open the database.
(iii) On the Create tab, in the Tables group, click Table (shown in point 1, Fig. 2.2.1).
Access inserts a new table in the database and opens it in Datasheet view. Type the data in the cell
below the Click to Add column header. When we enter data in the new column, Office Access 2010
uses the information we type to recognize the appropriate data type for the field. For example, if a
date is inserted in a column, such as 1/1/2010, Office Access 2010 recognizes it as a date and sets
the data type for the field to Date/Time. If Access doesn't have enough information from what
we enter to guess the data type, the data type is set to Text. The Table 2.4.1 shows how automatic
data type detection works in Datasheet view.
If we type Office Access 2010 creates a data type with a field of
Mary Text
45,000.98 Number, Double
45000 Number, Long Integer
1/12/2009 or 1st December 2009 Date/Time
Table 2.4.1: Default data type by MS Access 2010
2.4.3 Explicitly set the Data Type /Format
If we want to explicitly set the data type and format for a field, overriding the choice that Office
Access 2010 makes, we can do so by using the commands in the Data Type & Formatting group
on the Datasheet tab as shown in Fig. 2.4.2.

INFORMATION TECHNOLOGY 23
Office automation-Data Bases

Fig. 2.4.2 : Data Type & Formatting Option in Datasheet View


Do the following steps:
(i) On the Field tab, in the Add & Delete group, click Data Type.
(ii) Choose the data type/format of our choice.
When we add a field by typing information into the cell below the Click to Add header, Office
Access 2010 automatically assigns a name to the field. These names start with Field1 for the first
field, Field2 for the second field and so on. It is a good practice to use more descriptive field names.
One can rename the field by right-clicking its header and then clicking Rename Column on the
shortcut menu.
Field names can consist of up to 64 characters (letters or numbers), including spaces. We should try
to give fields descriptive names so that we can easily identify them when we view or edit records.
2.4.4 Add fields by using field templates
A Field Template is a predefined set of characteristics and properties that describes a field. The
field template definition includes a field name, a data type, a setting for the field's format property
and a number of other field properties that, when taken together, form a model that serves as the
basis for creating a new field.
One can use the Field Templates task pane to choose from a list of predefined fields than to
manually create a field. Office Access 2010 comes with a set of built-in field templates that can
save our considerable time when we create fields. To create a new field using a field template, we
display the Field Templates pane and then drag and drop one or more templates to the table that
is opened in Datasheet view.
(i) Open up the table in a Datasheet view.
(ii) On the Field tab, in the Add & Delete group, click More Fields as shown in
point 1, Fig. 2.4.3.

Fig. 2.4.3 : Fields & Columns Option in Datasheet View


24 INFORMATION TECHNOLOGY
Working with Table and Forms
(iii) Select one or more fields in the Field Templates pane and drag them to the table. The fields
appear in the datasheet as shown in Fig. 2.4.4.
Field templates are models, which provide a basis from which we can create a new field. In addition
to creating a new field from a field template, we can also create a new field from an existing field
in another table.

Fig. 2.4.4 : Field Template in Datasheet View


2.4.5 Add a field from an existing table
If a database contains multiple tables, we can add a field from another table. In a relational database,
we store information in separate subject-based tables and then define relationships to bring the
information together as needed. Office Access 2010 allows user to create a new field by adding it
from another related table or by adding it from another table for which no relationship is created.
We add the field by using the FieldList, which shows us fields available in other tables in our
database.
1) Open and add a field from the Field List pane
(i) Click the File and then click Open.
(ii) In the Open dialog box, select and open the database.
(iii) In the Navigation Pane, double-click the table in which we want to add an existing field.
The table opens in Datasheet view.

INFORMATION TECHNOLOGY 25
Office automation-Data Bases
(iv) On the Datasheet tab, in the Fields & Columns group, click Add Existing Fields, as
shown in point 2, Fig. 2.4.3. The Field List pane appears as depicted in Fig. 2.4.5.

Fig. 2.4.5 : FieldList Pane


The Field List pane lists all of the other tables in our database, grouped into categories.
(v) Click the plus sign (+) next to a table to display the list of fields in that table and drag the
field we want from the Field List pane to the table in Datasheet view. The Lookup Wizard
starts. Follow the instruction to complete the wizard.
2.5 SAVE A TABLE
Once a table's fields are added and its design is set, one should save it. When a new table is to be
saved for the first time, a name is to be given to it that describes the information it contains. We
can use up to 64 characters (letters or numbers), including spaces, for example, a table name may
be Customers, Parts Inventory, Products and so on.
To save a table, do any of the following :

(i) Click the File and then click Save.

26 INFORMATION TECHNOLOGY
Working with Table and Forms
(ii) Right-click the table's document tab and then click Save on the shortcut menu.
(iii) Click Save on the Quick Access Toolbar.
If we are saving the table for the first time, type a name for the table and then click OK.

2.6 SET THE PRIMARY KEY


The primary key of a table consists of one or more fields that uniquely identify each row we store
in the table. The primary key is never empty or null - there is always a value and it rarely (ideally
never) changes. Access uses primary key fields to quickly bring together data from multiple
tables. We should always specify a primary key for a table. Access automatically creates an index
for the primary key, which helps speed up queries and other operations and ensures that every
record has a value in the primary key field and that it is always unique. For example, we might
have an Employee table where each employee has a unique employee_ID, which can be made as
a primary key of the table.
When we create a new table in Datasheet view, Access automatically creates a primary key for us
and assigns it a field name of ID and the AutoNumber data type. The field is hidden in Datasheet
view, but we can see it if we switch to Design view.
2.6.1 Switch to Design View
To switch to Design View, do any of the following:
(i) Right click the document tab and then click Design View.
(ii) Right-click the table name in the Navigation Pane and then click Design View.
(iii) Click Design View in the Access status bar.
To change or remove the primary key or to set the primary key for a table that doesn't already
have one, we must use Design view.

INFORMATION TECHNOLOGY 27
Office automation-Data Bases

Fig. 2.6.1 : Design View


1) Set or change the primary key
When a new table is created without setting a primary key, Access prompts the user to create one.
If we choose Yes, Access creates an ID field that uses the AutoNumber data type to provide a
unique value for each record. If the table already includes a AutoNumber field, Access uses it as
the primary key. Do the following:
(i) Open the table in Design view.
(ii) Select the field or fields we want to use as the primary key. To select one field, click the row
selector for the field we want. To select more than one field, hold down the CTRL key and
then click the row selector for each field.
(iii) On Design tab in Tools group, click Primary Key as shown in Fig. 2.6.1, point 1. A key indicator
is added to the left of the field or fields that we specify as the primary key.
2) Remove the primary key
(i) Open the table in Design view.
(ii) Click the row selector for the current primary key. If the primary key consists of a s i n g l e
field, click the row selector for that field. If the primary key consists of multiple fields, click
the row selector for any field in the primary key.
(iii) On the Design tab, in the Tools group, click Primary Key. (point 1, Fig. 2.6.1).
The key indicator is removed from the field or fields we previously specified as the primary key.

2.7 SET FIELD PROPERTIES


One can control the appearance of information, prevent incorrect entries, specify default values,
speed up searching and sorting and control other appearance or behavior characteristics by setting
28 INFORMATION TECHNOLOGY
Working with Table and Forms
field properties. For example, we can format numbers to make them easier to read or we can define
a validation rule that must be satisfied for information to be entered in a field.
The data type of the field determines the properties we can set. For example, the Format, InputMask
and Caption properties affect how our information appears in table and query datasheets. In
addition, any controls on new forms and reports that are based on the fields in the table inherit
these same property settings by default.
1) Set a field property for a table in Datasheet view
(i) Open the table in Datasheet view.
(ii) Click in the field for which we want to set the property.
(iii) On the Field tab, in the Field Validation group, select one of the following commands
in Fig. 2.7.1:
 Unique - Sets the Indexed property.
 Is Required - Toggles the setting of the Required property. If it was set to Yes, it is
set to No. If it was set to No, it is set to Yes.

Fig. 2.7.1 : Datasheet View


We can set only a few of the available field properties in Datasheet view. To set additional
field properties, we must open the table in Design view. To have access to and set the complete
list of field properties, we must use Design view.
2) Set a field property for a Table in Design view
(i) Open the table in Design view.
(ii) In the upper portion of the table Design grid, click the field for which we want to set
properties (or move to the field by using the arrow keys).
(iii) Access displays the properties for this field in the lower portion of the table Design grid.
The data type of the field determines the properties we can set.
(iv) In the lower portion of the window, under Field Properties, (point 2, Fig. 2.6.1) click
the box for the field property we want to set. Alternatively, we can press F6 and then
move to the property by using the arrow keys.

INFORMATION TECHNOLOGY 29
Office automation-Data Bases
(v) Type a setting for the property or, if an arrow appears at the right side of the property
box, click the arrow to choose from a list of settings for the property. The following
Table 2.7.1 lists the available field properties.

Use this Field Property To


Field Size Set the maximum size for data stored as a Text, Number or
AutoNumber data type.
New Values Set whether an AutoNumber field is incremented or assigned a random
value.
Format Customize the way the field appears when displayed or printed.
Caption Set the text displayed by default in labels for forms, reports and queries.
Indexed Speed up access to data in this field by creating and using an index.
Smart Tags Attach a smart tag to this field.
Text Align Specify the default alignment of text within a control.
Table 2.7.1: Field Property
To save the changes made, do any of the following:
(i) Click Save on the Quick Access Toolbar.
(ii) Right-click the table's document tab and then click Save on the shortcut menu.

(ii) Click the File and then click Save.


The following table provides additional information about the FieldSize, Format and New Values
field properties.

2.8 SET TABLE PROPERTIES


In addition to field properties, we can set properties that apply to an entire table and to entire
records. We set these properties in the table's property sheet.
1) Set a Table property
(i) Open the table in Design view.
(ii) On the Design tab, in the Tools group, click Property Sheet (point 3, Fig. 2.6.1). The
table's property sheet is displayed.
(iii) Click the box for the property we want to set and type a setting for it as shown in
Fig. 2.8.1.

30 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.8.1: Property Sheet


The following Table 2.8.2 lists the available table properties.

Use this Table Property To


Display Views On Share Point Specify whether forms and reports associated with this table
should be available on the View menu in Windows Share
Point Services if the database is published to a SharePoint site.
Subdatasheet Expanded Set whether to expand all subdatasheets when we open the
table.
Subdatasheet Height Specify whether to expand to show all available subdatasheet
rows (the default) when opened or set the height of the
subdatasheet window to show when opened.
Orientation Set the view orientation, according to whether our language is
read left-to-right or right-to-left.
Description Provide a description of the table.
Default View Set Datasheet, Pivot Table or PivotChart as the default view
when we open the table.
Validation Rule Supply an expression that must be true whenever we add a
record or change a record.
Validation Text Enter text that appears when a record violates the Validation
Rule expression.

INFORMATION TECHNOLOGY 31
Office automation-Data Bases

Filter Define criteria to display only matching rows in Datasheet


view.
OrderBy Select one or more fields to specify the default sort order of
rows in Datasheet view.
SubdatasheetName Specify whether a subdatasheet should appear in Datasheet
view and if so, which table or query should supply the rows
in the subdatasheet.
LinkChildFields List the fields in the table or query used for the subdatasheet
that match this table's primary key field(s).
LinkMasterFields List the primary key field(s) in this table that match the child
fields for the subdatasheet.
FilterOnLoad Automatically apply the filter criteria in the Filter property
(by setting to Yes) when the table is opened in Datasheet
view.
OrderByOnLoad Automatically apply the sort criteria in the OrderBy property
(by setting to Yes) when the table is opened in Datasheet
view.
Table 2.8.2 : Table Properties in /Access
To save the changes made, do any of the following:
(i) Click Save on the Quick Access Toolbar.
(ii) Right-click the table's document tab and then click Save on the shortcut menu.
(iii) Click the File and then click Save.

2.9 DELETING A TABLE


If we have a table we don't need anymore, we can remove it from our database. Because we cannot
delete a table if it is opened, we must first close it. To remove a table from our database, do any
of the following:
(i) In the Navigation Pane, right click the table and click Delete.
(ii) In the Navigation Pane, click the table to select it. Then, on the Ribbon, click Home. In the
Records group, click Delete.
(iii) In the Navigation Pane, click the table to select it and press Delete.

2.10 RENAMING A TABLE


If for some reason, the name of the table is to be changed, it can be done by right-clicking the table
in the Navigation Pane and clicking Rename.
Sources:
[1] http://cisnet.baruch.cuny.edu/holowczak/classes/2200/access/accessall.html
[2] Microsoft Office Access Help

32 INFORMATION TECHNOLOGY
Working with Table and Forms
2.11 CREATING FORMS
This topic deals with forms, their importance, general types of forms available under MS-Access
and how to create simple form using form wizard and form design view. It also put focus on the
various controls, their types and properties which could be used while designing a form using form
design view. The chapter also explores the topic on how to insert controls in a form.
2.11.1 Introduction
Although Access provides a convenient spreadsheet-style datasheet view for entering data, it is not
an ideal tool for safe and secured data entry. In such situation Microsoft Access 2010 offers a facility
called forms through which the user can enter data to their respective databases. A form provides
the user with a better interface to work with. Microsoft Access 2010 form offers many new options
for creating a form which make form creation much easier. Generally forms can be created using the
form wizard or by opting for form design view where the user needs to create the form manually.
The form should be created in such a way that it reflects its user friendliness and the user should
feel at ease while using it.
2.11.2 Definition
A form is a database object that the user can use to enter, edit, display data from a table or a query.
The user can use the forms to control access of data in a database.
2.11.3 Form and Its Types
As mentioned above, the user can create a form in MS-Access in either of the following two ways:-
 Choose the Form Wizard provided by Microsoft Access. Opting for form wizard make the
form creation an easy task. But the form thus created is very simple with little options.
 Create form from scratch using Form Design view. Opting for form design view provides the
user with more controls to customize and design the form in a complex yet effective way.
The general types of forms that MS-Access offers are as follows:-
2.11.3.1 Simple Form
This is the simplest and most common type of form available in MS-Access. It lets the user create a
form that lets him / her to enter information for one record at a time.
2.11.3.2 Split Form
This form lets the user see the datasheet in the upper section and a form in the lower section for
entering information about the record selected in the datasheet.
2.11.3.3 Multiple Items
This form lets the user to see multiple records in a datasheet, with one record per row.
2.11.3.4 Blank Form
This form lets the user start with a blank form and then add fields and other controls manually.
2.11.3.5 PivotChart
PivotChart lets the user create a PivotChart form.
2.11.3.6 Form Wizard
Form wizard lets the user create a form instantly using step by step instructions.

INFORMATION TECHNOLOGY 33
Office automation-Data Bases
2.11.3.7 Datasheet
Datasheet lets the user see a form in a datasheet view. The user can see the data in a row and column
format in which the user can provide limit on which fields are displayed and editable.
2.11.3.8 Modal Dialog
Modal Dialog lets the user create a dialog box which may be used by a user to host or carry other
controls. A dialog box is characterized as modal if the user must close it before continuing with
another task on the same application.
2.11.3.9 PivotTable
In MS-Access 2010 the user instead of creating PivotTable forms, can open an existing form in
PivotTable view and build the layout of the view or use the PivotTable wizard to help you design
the PivotTable view for a new form.
2.11.3.10 Form Design
Form Design lets the user create a blank from and displays it in design view.
2.11.4 General Steps to create a form
The general steps to create a form in MS-Access are as follows:-
 Choose the table or query for creating the form.
 Specify the type of form by selecting from Forms option under Create menu tab.
 The user may need to provide necessary details for successful creation of form.
 For activities adding records, editing records, etc., the user may switch to form view. And for
customization of form, the user may go to design view.
 After the creation, the newly created form should be saved under a meaningful and valid
name.
2.11.5 Create a Form using Form Wizard
Form wizard may be used by a user to automatically create a simple form. Although, the form
wizard provides less control in creating a form but the user has the option to customize using form
design view.
Source:
Database : Northwind 2010
Table : Customers
Steps:-
1. On the Create tab, in the Forms group, click More Forms and choose Form Wizard as shown
in Fig. 2.11.1.

34 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.11.1: Form Wizard (i)


2. Now, specify the table or query for which the user wants to create the form as shown in
Fig. 2.11.2.

Fig. 2.11.2: Form Wizard (ii)


After choosing the table or query, the user will see a screen similar to Fig. 2.11.3 as shown below:-

INFORMATION TECHNOLOGY 35
Office automation-Data Bases

Fig. 2.11.3: Form Wizard (iii)


After selecting the desired field(s) from the table or query, the following screen will appear as shown
in Fig. 2.11.4.

Fig. 2.11.4: Form Wizard (iv)

36 INFORMATION TECHNOLOGY
Working with Table and Forms

Here, the user needs to specify the form layouts which are as follows:-
Columnar: By default, the form layout is Columnar as shown in Fig. 2.11.4.
Tabular: As shown in Fig. 2.11.5.

Fig. 2.11.5: Form Wizard (v)


Datasheet: As shown in Fig. 2.11.6.

Fig. 2.11.6: Form Wizard (vi)

INFORMATION TECHNOLOGY 37
Office automation-Data Bases
Justified: As shown in Fig. 2.11.7.

Fig. 2.11.7: Form Wizard (vii)


4. The user may then specify the title of the form and may further specify whether they want
to open the newly created form in form view to carry out form related activities like addition
of records, editing existing records, etc or to modify the form in form design view for further
customization as shown in Fig. 2.11.8.

Fig. 2.11.8 : Form Wizard (viii)

38 INFORMATION TECHNOLOGY
Working with Table and Forms
After making the choice, the user can click Finish to see a screen similar to the Fig. 2.11.9.

Fig. 2.11.9 : Resultant Screen

2.12 CREATE FORM USING FORM VIEW


The user may use the form view available under Forms Group of Create tab as shown in
Fig. 2.12.1.

Fig. 2.12.1: 'Form' option


Source:
Database : Northwind 2010
Table : Customers

INFORMATION TECHNOLOGY 39
Office automation-Data Bases
Steps:-
1. Select the desired table or query for the form to be created.
2. Click the Form view option available under Forms group of Create tab as shown in Fig. 2.12.1.
3. The user will be shown a screen similar to Fig. 2.12.2.

Fig. 2.12.2: Form Design Screen


4. The user may further go to design view to customize the form as per the requirements.
Now, before proceeding with the creation of form through design view, the user needs to
understand the various form controls that are available to them for placing in the form as per
the field types.

2.13 CONTROLS
Control is an object on a form such as labels, text boxes, buttons etc.
The various form controls available under Control group, as shown in Table 2.13.1, are as follows:-

Logo Lets the user to insert a picture into the form.

Title Lets the user specify a title of the form.

Insert Page Number Lets the user insert page number.

Date & Time Insert current date and time.

40 INFORMATION TECHNOLOGY
Working with Table and Forms

Text Box Displays and allows users to edit data.

Label Displays static text that typically doesn't change.

Button Also called a command button. Calls macros or runs VBA code
when clicked.

Combo Box A drop-down list of values.

List Box A list of values that is always displayed on the form or report.

Subform / Subreport Displays another form or report within the main form or
report.

Line A graphical line of variable thickness and color, which is used


for separation.

Rectangle A rectangle can be any color or size or can be filled in or blank;


the rectangle is used for emphasis.

Bound Object Frame This frame holds an OLE object or embedded picture that is
tied to a table field.

Option Group Holds multiple option buttons, check boxes or toggle buttons.

Check Box A two-state control, shown as a square that contains a check


mark if it's on and an empty square if it's off.

Option Button Also called a radio button, this button is displayed as a circle
with a dot when the option is on.

Toggle Button This is a two-state button-up or down-which usually uses


pictures or icons instead of text to display different states.

Tab Control Displays multiple pages in a file folder type interface.

Insert Page Adds a "page" on the form or report. Additional controls are
added to the page and multiple pages may exist on the same
form.

Insert Chart This chart displays data in a graphical format.

INFORMATION TECHNOLOGY 41
Office automation-Data Bases

Unbound Object This frame holds an OLE object or embedded picture that is
Frame not tied to a table field and can include graphs, pictures, sound
files and video.

Image Displays a bitmap picture with very little overhead.

Insert or Remove This is usually used for reports and indicates a physical page
Page Break break.

Insert Hyperlink This control creates a link to Web page, a picture, an e-mail
address or a program.

Attachment This control manages attachments for the Attachment data


type.

Line Thickness This control is used to specify the line thickness.

Line Type This control is used to specify the line type.

Line Color This control is used to specify the line color.

Special Effect This control is used to specify special effect for a control on a
form like flat, raised etc.

Set Control Defaults This control doesn't add a control to a form. Instead, it
determines whether a wizard is automatically activated when
you add certain controls.
Note: The Option Group, Combo Box, List Box, Subform /
Subreport, Bound and Unbound Object Frame and Command
Button controls all have wizards that Access starts when the
user add a new control.

Select All This control is used to select all the control present on a form.

Select This control is used to select a particular control present on a


form.

Control Wizard

Insert ActiveX This control is used to insert ActiveX controls like RealPlayer
Control G2 Controls, Windows Media Player, Yahoo! Toolbar etc.

42 INFORMATION TECHNOLOGY
Working with Table and Forms
2.13.1 Types of Controls
These are the three basic categories of controls available under MS-Access, which are as follows:-
Bound Controls: Bound controls are those controls which are bound to a table field. When the user
enters a value into a bound control, Access automatically updates the table field in the current record.
Most of the controls that let the user enter information can be bound. These include OLE (Object
Linking and Embedding) fields. Controls can be bound to most data types, including text, dates,
numbers, Yes / No, pictures and memo fields.
Unbound Controls: Unbound controls are those controls which retain the entered value, but they
don't update any table fields. The user can use these controls for text label display, for controls
such as lines and rectangles or for holding unbound OLE objects (such as bitmap pictures or logo)
that aren't stored in a table but on the form itself. Unbound controls are also known as variables or
memory variables.
Calculated Controls: Calculated controls are those controls which are based on expressions, such
as functions or calculations. Calculated controls are also unbound because they don't update table
fields. An example of a calculated control is =[Quantity] x [Price]. This control calculates the total
of two table fields for display on a form but is not bound to any table field.
There are two ways to add a control in a form which is as follows:
 User may click a button in the Design ribbon's Controls group and draw a new unbound
control on the form.
 User may drag a field from the Field List to add a bound control to the form.
A bound control is one that is linked to a table field, while an unbound control is one that is not bound
to a table field. A control bound to a table places the data directly into the table by using the form.
2.13.2 Properties
Properties are named attributes of controls, fields or database objects that are used to modify the
characteristics of a control, field or object. Examples of these attributes are the size, color, appearance
or name of an object. Properties are used extensively in forms and reports to change the characteristics
of controls. Each control on the form has properties. The form itself also has properties. A property
can also modify the behavior of a control, determining, for example, whether the control is read-only
or editable and visible or not visible.
Properties are display in a property sheet also called property window. Whenever a user clicks any
control present on the form, the property sheet shows the related properties of that control. The
users can then change or modify the associated properties of that control from the property sheet.
The property sheet groups the types of property of an associated control and presents them to the
user under specific tabs which are as follows:-
Format: These properties determine how a label or value looks: font, size, color, special effects,
borders and scroll bars.
Data: These properties affect how a value is displayed and the data source it is bound to: control
source, input masks, validation, default value and other data type properties.
Event: Event properties are named events, such as clicking a mouse button, adding a record, pressing
a key for which you can define a response (in the form of a call to a macro or a VBA procedure) and
so on.
Other: Other properties show additional characteristics of the control, such as the name of the control
or the description that displays in the status bar.
All: It lets the user see all the properties for a control.

INFORMATION TECHNOLOGY 43
Office automation-Data Bases

2.14 INSERTING CONTROLS ON A FORM


2.14.1 Insert Logo
1. Click Logo option under Header / Footer group. The user will be prompted to specify image
or picture as shown in Fig. 2.14.1.

Fig. 2.14.1: Insert Logo (i)


2. After choosing an image or picture, the user will be required to click Open.
3. When the user will click Open, picture will be inserted in the Form Header section as shown
in Fig. 2.14.2.

Fig. 2.14.2: Insert Logo (ii)

44 INFORMATION TECHNOLOGY
Working with Table and Forms
Note: The user may move the image or picture used as a logo from Form Header section to Detail
section, as per requirement.
2.14.2 Insert Title
1. Click Title option under Header / Footer group. The user will be prompted to specify a title
on the Form Header section as shown in Fig. 2.14.3.

Fig. 2.14.3: Insert Title


2.14.3 Insert Date & Time
1. Click Insert Date & Time option under Header / Footer group. The user will be prompted to
specify some additional information as shown in Fig. 2.14.4.

INFORMATION TECHNOLOGY 45
Office automation-Data Bases

Fig. 2.14.4: Insert 'Date & Time'


2. After providing additional information as per requirement, the user will be shown a screen
similar to Fig. 2.14.5 (A) in form design view. The output will be shown in form view as shown
in Fig. 2.14.5 (B).

Fig. 2.14.5 (A): Form Header (i)

Fig. 2.14.5 (B): Form Header (ii)

46 INFORMATION TECHNOLOGY
Working with Table and Forms
2.14.4 Insert Label
1. Click Label option under Controls group.
2. Draw a Label in Detail section as shown in Fig. 2.14.6 (A) (Form Design View) and
Fig. 2.14.6 (B) (Form View):

Fig. 2.14.6 (A): Insert Lable (i)

Fig. 2.14.6 (B): Insert Lable (ii)


2.14.5 Insert Text Box
To add unbound Text Box
1. Click Text Box option under Controls group.
2. Draw a text box in Detail section as shown in Fig. 2.14.7.

Fig. 2.14.7: Insert Text Box (i)

INFORMATION TECHNOLOGY 47
Office automation-Data Bases
To add bound Text Box
1. Click Add Existing Fields option under Tools group as shown in Fig. 2.14.8.

Fig. 2.14.8: Add Existing Fields


2. After clicking Add Existing Fields option, a screen similar to Fig. 2.14.9 will be shown to the
user:-

Fig. 2.14.9: Field List Dialog Box


3. The user may drag and drop the required fields in the detail section form the Field List dialog
box showing Fig. 2.14.9. The user will be shown in Fig. 2.14.10 (A) (Form Design View) and
Fig. 2.14.10 (B) (Form View):

Fig. 2.14.10 (A): Form Design View of Text Box

48 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.14.10 (B): Form view of Text Box


2.14.6 Insert Button
Insert Unbound Button
1. Click Button option under Controls group.
2. Draw a button in the Details section as shown in Fig. 2.14.11.

Fig. 2.14.11: Insert Button


3. Provide a meaningful name to the newly created Button as shown in Fig. 2.14.12 (A) (Form
Design View) and Fig. 2.14.12 (B) (Form View):

Fig. 2.14.12 (A): Naming a Button

INFORMATION TECHNOLOGY 49
Office automation-Data Bases

Fig. 2.14.12 (B): Form view of Button


Events Associated with a Button
The user may attach an event procedure on an activity associated with the button as follow:-
 On Click
 On Got Focus
 On Lost Focus
 On Dbl (Double)Click
 On Mouse Down
 On Mouse Up
 On Mouse Move
 On Key Down
 On Key Up
 On Key Press
 On Enter
 On Exit
As stated in the above sections, events are procedures which get triggered on an associated activity
of a control.
Insert bound Button
1. Before clicking the Button option under Controls groups, the user must ensure that the Use
Control Wizard option under Controls group is activated. Use Control Wizard is a toggle
button, once clicking it wick activate it and another time clicking with deactivate it.
2. Click the Button option under Controls groups.
3. Draw the Button in the Details section of the form. The user will see a screen similar to
Fig. 2.14.13.

Fig. 2.14.13: Command Button Wizard (i)

50 INFORMATION TECHNOLOGY
Working with Table and Forms
4. The user needs to specify the Category and associated Action related with the newly created
Button. Following table lists all the categories and associated actions to be found under
Command Button Wizard:-
Categories Actions
Record Navigation Find Next
Find Record
Go to First Record
Go to Last Record
Go to Next Record
Go to Previous Record
Record Operations Add New Record
Delete Record
Duplicate Record
Print Record
Save Record
Undo Record
Form Operations Apply Form Filter
Close Form
Open Form
Print a Form
Print Current Form
Refresh Form Data

Report Operations Mail Report


Open Report
Preview Report
Print Report
Send Report to File
Application Quit Application
Miscellaneous Auto Dialer
Print Table
Run Macro
Run Query
Table 2.14.1: Command Button Categories & Actions
5. After specifying the category and associated action related with the newly created Button,
the user will be shown the following Fig. 2.14.14.

INFORMATION TECHNOLOGY 51
Office automation-Data Bases

Fig. 2.14.14: Command Button Wizard (ii)


6. The user may specify to use text or a picture on the button as per the requirements. Further,
the user will be shown the following Fig. 2.14.14.

Fig. 2.14.15: Command Button Wizard (iii)

52 INFORMATION TECHNOLOGY
Working with Table and Forms
7. The user needs to give a meaningful name to the Button which could be user in future to refer
to the button control as shown in Fig. 2.14.15.
8. Click Finish to close the wizard.
2.14.7 Insert Combo Box
1. Click the Combo Box option under Controls group.
2. Draw the Combo Box in the Details section of the form. The user will see a screen similar to
Fig. 2.14.16.

Fig. 2.14.16: Insert Combo Box (i)


3. Select the concerned Combo Box control and click the Property Sheet option under Tools
group.
4. On the Property Sheet, Click the Data Tab.
5. As shown in Fig. 2.14.17, under Row Source Type of Property Sheet, select Value List to
supply user defined values to the Combo Box control. Alternatively, the user may also select
Table / Query or Field List to associate the Combo Box control with desired table and field.

Fig. 2.14.17: Insert Combo Box (ii)

INFORMATION TECHNOLOGY 53
Office automation-Data Bases
6. Selecting Row Source will show the user a screen similar to Fig. 2.14.18.

Fig. 2.14.18: Insert Combo Box (iii)


7. The user needs to type in the items that the user wishes to include in the Combo Box control
as shown in Fig 2.14.18.
8. Click OK and see the output in Form View as shown in Fig. 2.14.19:

Fig. 2.14.19: Insert Combo Box (iv)


2.14.8 Insert List Box
1. Click the List Box option under Controls group.
2. Draw the List Box in the Details section of the form. The user will see a screen similar to
Fig. 2.14.20.

54 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.14.20: Insert List Box (i)


3. Select the concerned List Box control and click the Property Sheet option under Tools group.
4. On the Property Sheet, Click the Data Tab.
5. As shown in Fig. 2.14.20, under Row Source Type of Property Sheet, select Value List to supply
user defined values to the List Box control. Alternatively, the user may also select Table /
Query or Field List to associate the List Box control with desired table and field.
6. Selecting Row Source will show the user a screen similar to Fig. 2.14.21:

Fig. 2.14.21: Insert List Box (ii)


7. The user needs to type in the items that the user wishes to include in the List Box control as
shown in Fig. 2.14.21.
8. Click OK and see the output in Form View as shown in Fig. 2.14.22:

INFORMATION TECHNOLOGY 55
Office automation-Data Bases

Fig. 2.14.22: Insert List Box (iii)


2.14.9 Insert Check Box, Option Button and Toggle Button
Bound Controls:
1. Create a table name Membership_Statistics with the structure as shown in Fig. 2.14.23:

Fig. 2.14.23: Insert Bound Controls (i)

56 INFORMATION TECHNOLOGY
Working with Table and Forms
2. Add the following data as shown in Fig. 2.14.24:

Fig. 2.14.24: Insert Bound Controls (ii)


3. Save and close the table.
4. Open a form in design view and click the field list pane as shown in Fig. 2.14.25:

Fig. 2.14.25: Insert Bound Controls (iii)


5. Add the fields from field list pane one by one. The user will see a screen similar to
Fig. 2.14.26:

INFORMATION TECHNOLOGY 57
Office automation-Data Bases

Fig. 2.14.26: Insert Bound Controls (iv)


Note: Depending on the setting of the field's Display Control property, a check box, a text box or a
combo box is created and bound to the field. When the user creates a new Yes/No field in a table,
the default setting of the field's Display Control property is Check Box.
The form when shown in form view will look similar to Fig. 2.14.27:

Fig. 2.14.27: Form in Form View


2.14.10 Insert Option Group
An option group displays a limited set of alternatives and only one option in an option group can be
selected at a time. An option group consists of a group frame and a set of check boxes, toggle buttons
or option buttons. If an option group is bound to a field, only the group frame itself is bound to the
field, not the controls contained inside the frame. Instead of setting the Control Source property
for each control in the option group, the user sets the Option Value property of each control to a
number that is meaningful for the field to which the group frame is bound. When the user selects
an option in an option group, Access sets the value of the field to which the option group is bound
to the value of the selected option's Option Value property. The value of an option group can only
be a number, not text.

58 INFORMATION TECHNOLOGY
Working with Table and Forms
1. Create a table Customer_Status with the structure as shown in Fig. 2.14.28:

Fig. 2.14.28: Insert Option Group (i)


2. Add the following data as shown in Fig. 2.14.29.

Fig. 2.14.29: Insert Option Group (ii)


3. Save and close the table.
4. Open a form in design view and click the field list pane and select Customer_Status Table.
5. Add Customer_Number and Customer_Name field from the field list pane.
6. Now, select option group from Design tab. Add three Option Button and provide name to
them as shown in Fig. 2.14.30:

INFORMATION TECHNOLOGY 59
Office automation-Data Bases

Fig. 2.14.30: Insert Option Group (iii)


7. Select the Option Group control and in its property sheet click Data tab. Specify the control
source as Customer_Type as shown in Fig. 2.14.31:

60 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.14.31: Insert Option Group (iv)


8. Now, click individual Option Buttons and specify their option value as follows:-
Option Button Option Value
General 1
Regular 2
Special 3
9. Select the Form View to see a form similar to Fig. 2.14.32.

INFORMATION TECHNOLOGY 61
Office automation-Data Bases

Fig. 2.14.32: Insert Option Group (v)


Note: As the user will go to the next record, the value of Customer Status will change as per the data
entered in the table and the same will be reflected on the form, too.
2.14.11 Insert Image
1. Select the image from Controls under Design tab.
2. Click on insert image, then browse it.
3. Specify the image that user wants to use in the form.
4. Click the form view to see the output as shown in Fig. 2.14.33.

62 INFORMATION TECHNOLOGY
Working with Table and Forms

Fig. 2.14.33: Insert Image


2.14.12 Insert Hyperlink
1. Open a form in design view.
2. Select the hyperlink from controls under Design tab.
3. Specify the text the user wants to have for the hyperlink message along with the file name to
open as shown in Fig. 2.14.34:

Fig. 2.14.34: Insert Hyperlink (i)

INFORMATION TECHNOLOGY 63
Office automation-Data Bases
4. Click the Form View to see the output as shown in Fig. 2.14.35.

Fig. 2.14.35: Insert Hyperlink (ii)

64 INFORMATION TECHNOLOGY
3
Working with Queries and Reports
C
H
A
WORKING WITH
P
T QUERIES AND
REPORTS
E
R

LEARNING OBJECTIVES
In this chapter, we will learn:
 Types of queries.
 General steps in creating a query.
 Query using query wizard & design view.
 Sorting a query.
 Running & saving query.
 Create parameter query.
 Creating query using multiple tables.
 Reports & its importance.
 Types of reports.
 Steps in creating a report.
 Creating a report with the report wizard & design view.
 Saving & printing report.

3.1 INTRODUCTION
At times the data stored in a single table is so large in volume that it becomes difficult for a user to
find specific information. Further, it becomes more complex when two or more tables get involved
in searching specific information. In such situation, it is a good idea to use the concept of queries.
Query is a mechanism for retrieving information from a database and consists of questions presented
to the database in a predefined format. A user may use a query to answer a simple question, to
perform calculations, to combine data from different tables or even to add, change or delete data
from a table(s). A user may use queries to filter the desired data, to perform calculations with the
data and to summarize the data present in table(s). Queries can also be used to supply data for a
form or report. Additionally, queries can also be used to automate many data management tasks
and to review changes in the data before actually committing the changes the user wants to make.

INFORMATION TECHNOLOGY 65
Office automation-Data Bases

3.2 DEFINITION
Query can be defined as an operation that extracts record(s) from a database based on a given
condition. A query consists of search criteria expressed in a database language called SQL. For
example, the query can specify that only certain columns or only certain records be included in
a result.

3.3 QUERY AND ITS TYPES


The user can create a query in MS-Access in either of the following two ways:-
 Choose the Query Wizard provided by Microsoft Access for the ease of user to build a query.
 Create own queries from scratch using query design.
Now, before a user start to build query, he / she should know the general types of queries that
MS-Access offers as follows:-
3.3.1 Select Query
The select query is the simplest and most common type of query available in MS-Access. Such
queries may be used to select and display data from either one or more table(s) depending upon
the requirement. The user-determined criteria convey to the database about the selection of records
from table(s). After the select query is called, it creates a "virtual" table where the data can be
changed one record at a time.
3.3.2 Crosstab Query
Crosstab queries are useful for summarizing information, calculating statistics, spotting bad data
and looking for trends. The results of a crosstab query are read-only - data cannot be added,
edited or deleted in a crosstab result. An aggregate function, such as sum or count, is used to help
summarize the data. At times, the user wants to create a query for some specific purpose such as
to group data into categories and display values in a spreadsheet like format with summary totals.
Such queries can also be used to compare values and observe the trends in the data and to obtain
summary data such as monthly, quarterly, semiannually or annually sales figures.
3.3.3 Action Query
Action query is used to create new table(s), delete rows from existing table(s) and update records or
creating entirely new ones in a table(s). When the action query is called, the database undergoes a
specific action depending on what was specified in the query itself. Action queries are very popular
in data management because they allow for many records to be changed at one time unlike only
single record in a select query. There may be four sub-types of action queries which are as follows:-
 Append Query: The append query takes the set results of a query and "appends" them to an
existing table. In other words, we can say that, an append query copies specified or all the
records from one table to the bottom of another table. This query is useful when two different
tables with similar structures are used. If the source table has more fields than the target tables,
extra fields are ignored. Moreover, if the source table has fewer fields than the target table,
fields with matching names are updated and any additional fields are left blank.
 Delete Query: The delete query deletes all records in an underlying table from the set results
of a query. In simpler terms, we can say that, the delete query is used to delete a group of
records that meets specific search criteria. The process for setting up a delete query depends
on whether the user wants to delete records from single table or from multiple tables that
have an established and valid relationship among them.

66 INFORMATION TECHNOLOGY
Working with Queries and Reports
 Make Table Query: The make table query creates a table based on the set results of a query.
In simpler terms, we can say that, the make table query is used to create a new table and
populate it with data from one or more existing tables. By creating a make table query, the
user actually created a backup copy of a table. Moreover, it may be useful, when the user
wants to save delete records in a separate history table for future use. In may also be useful
in situations, where a subset of data needs to be generated as a report and may be created as
a table for exporting to other applications.
 Update Query: The update query allows for one or more field in table(s) to be updated. In
other words, we can say that, the update query allows the user to make global changes to
data in one or more tables.
3.3.4 Parameter Query
A parameter query is used to pass a parameter to a different query such as an action or a select
query. The parameter can either be a value or a condition. This parameter conveys to the other
query what is supposed to be done. It allows for a dialog box where the end user can enter
whatever parameter value they wish each time the query is run. The parameter query can be seen
as a modified select query.
3.3.5 Aggregate Query
Aggregate query is a special type of query which works on other queries such as selection, action
or parameter but instead of passing a parameter to another query it totals up the items by selected
groups. It essentially creates a summation of any selected attribute in a table. The SQL aggregate
functions available to Microsoft Access are:
 Sum
 Avg
 Min
 Max
 First
 Last
 Group By
 Count
 StDev
 Var
 Expression
 Where
3.4 GENERAL STEPS TO CREATE A QUERY
The general steps to create a query in MS-Access are as follows:-
 Choose the tables or queries as sources of data.
 Specify the fields that the user wishes to include from the data sources.
 Optionally, specify criteria to limit the records that the query returns.
 Run the query to see the results.

INFORMATION TECHNOLOGY 67
Office automation-Data Bases

3.5 CREATING SELECT QUERY USING QUERY WIZARD


Query wizard may be used by a user to automatically create a simple query. Although, the query
wizard provides less control in handling a query but surely, query once created using query wizard
can always be modified using design view.
Before, running the query wizard, the user must ensure that all relationships are created before
hand in case the query is created using two or more tables.
Source:
Database : Northwind 2010
Table : Customers
Steps:-
1. On the Create tab, in the Queries group, click Query Wizard, as shown in Fig. 3.5.1

Fig. 3.5.1: Query Wizard option


2. In the New Query dialog box, click Simple Query Wizard and then click OK, as shown in
Fig. 3.5.2.

Fig. 3.5.2: New Query Dialog Box

68 INFORMATION TECHNOLOGY
Working with Queries and Reports
We will see a screen similar to Fig. 3.5.3 as shown below:-

Fig. 3.5.3: Simple Query Wizard (i)


3. After selecting the desired field(s) from the table, the result is as shown in Fig. 3.5.4.

Fig. 3.5.4: Simple Query Wizard (ii)


The user can add up to 255 fields from as many as 32 tables or queries.

INFORMATION TECHNOLOGY 69
Office automation-Data Bases
For each field, the user depending upon the requirement may perform the following two steps:-
 Under Tables/Queries, click the table or query that contains the field.
 Under Available Fields, double-click the field to add it to the Selected Fields list.
4. When the user has added all the desired fields, he / she may click Next and may see
Fig. 3.5.5 as follows:

Fig. 3.5.5: Simple Query Wizard (iii)


Although, the query wizard suggests a query title for the query being prepared still the user may
specify his / her own query title. For this, the user has to type the desired query title inside the
text box provided for the same as shown in Fig. 3.5.5. Moreover, the query wizard provides the
user with a choice to either open the query to view information or to modify the query in query
design view.

70 INFORMATION TECHNOLOGY
Working with Queries and Reports
5. The user may click Finish to complete the query wizard and may see the results of the query
as shown in Fig. 3.5.6 as follows:-

Fig. 3.5.6: Resultant Sheet


Now, if the user has included any numeric field (number field) from table(s), the wizard asks the
user, whether, he / she may want the query to return details or summary data. The following
step by step discussion will explain few more options which the user may use for a specific need:-
Source:
Database : Northwind 2010
Table : Products
1. Step 1 and Step 2 given above for Customers table step by step instruction to be repeated.
After selecting the desired field(s) from the table, the result wil be shown as Fig 3.5.7.

Fig. 3.5.7: Simple Query Wizard (iv)

INFORMATION TECHNOLOGY 71
Office automation-Data Bases
2. When the user has added all the desired fields, he / she may click Next and may see
Fig. 3.5.8 as follows:-

Fig. 3.5.8: Simple Query Wizard (v)


The user will be provided with two choices and are supposed to do one of the following activities:-
 If the user wishes to see individual records, they will be required to click Details and further,
the user will be required to go directly to step 5.
 If the user wishes to see summarized numeric data, such as averages, they will be required
to click Summary, followed by Summary Options as shown in Fig. 3.5.9.

Fig. 3.5.9: Simple Query Wizard (vi)

72 INFORMATION TECHNOLOGY
Working with Queries and Reports
3. The following Fig. 3.5.10 will be provided to the user for further inputs, when the user will
click Summary Options:-

Fig. 3.5.10: Summary Options (i)


4. In the Summary Options dialog box, the user will be required to specify which fields he or she
wants to summarize and how the user wants to summarize the data. Only number fields will
be listed in the dialog box. For each number field, the user may choose one of the following
functions:
 Sum: If the user wants that the query should returns the sum of all the values of the field.
 Avg: If the user wants that the query should returns the average of the values of the field.
 Min: If the user wants that the query should returns the smallest value of the field.
 Max: If the user wants that the query should returns the largest value of the field.
After providing all the necessary details, the user will be required to click ok as shown in
Fig 3.5.11.

INFORMATION TECHNOLOGY 73
Office automation-Data Bases

Fig. 3.5.11: Summary Options (ii)


5. The user will be taken to figure 4.9, where the user will be required to click Next.
6. The user will be required to perform Step 4 and Step 5 given above for Customers table step
by step instructions. The resultant screen will look as shown in Fig. 3.5.12.

Fig. 3.5.12: Resultant Screen

74 INFORMATION TECHNOLOGY
Working with Queries and Reports
3.6 CREATING SELECT QUERY USING DESIGN VIEW
The user may use the query design view to create a select query manually. The query design view
provided by MS-Access offers more control during the design of query. The user may commit some
design mistakes while creating a query using query design view. Moreover, designing a query
may take longer time than creating the same query through a query wizard.
Source:
Database : Northwind 2010
Table : Customers
Steps:-
1. On the Create tab, in the Queries group, click Query Design, as shown in Fig. 3.6.1.

Fig. 3.6.1: 'Query Design' option


2. Following Fig. 3.6.2 containing the details of tables and queries available under Show Table
dialog box will be shown to the user:-

Fig. 3.6.2: 'Show Table' Dialog box (i)

INFORMATION TECHNOLOGY 75
Office automation-Data Bases
3. Choose any table / query from the list provided in the Show Table dialog box and click Add.
The following Fig. 3.6.3 will be shown to the user:-

Fig. 3.6.3: 'Show Table' Dialog Box (ii)


4. If the user wants to add more table(s) or query(s), he / she may do so as per requirement.
Further, the user has to click Close to see Fig. 3.6.4.

76 INFORMATION TECHNOLOGY
Working with Queries and Reports

Fig. 3.6.4: On Close of 'Show Table'


4. To choose field(s), the user will be required to click the down-arrow available with the Field
option as shown in Fig. 3.6.5. The table name appears on the table option. The user may choose
as may fields as required for the query by repeating this step.

INFORMATION TECHNOLOGY 77
Office automation-Data Bases

Fig. 3.6.5: Query Tools (i)


After selecting the desired number of fields, the screen will look as Fig. 3.6.6 which is a follows:-

Fig. 3.6.6: Query Tools (ii)

78 INFORMATION TECHNOLOGY
Working with Queries and Reports
5. On the Design tab, in the Results group, click Run, as shown in Fig. 3.6.7.

Fig. 3.6.7: 'Run' option of Query


6. The user will be shown a screen similar to Fig. 3.6.8 as follows:-

Fig. 3.6.8: On executing a Query


Note: For saving a query the user may follow the normal steps for saving a file in MS-Office
environment. Alternatively, the user may follow the steps mentioned as follows to save a query:-
1. Right click Query tab as shown in Fig. 3.6.9 as follows:-

INFORMATION TECHNOLOGY 79
Office automation-Data Bases

Fig. 3.6.9: Saving a Query


2. Choose Save option from the drop down box available. The user will be shown the following
Fig. 3.6.10.

Fig. 3.6.10: Naming a Query


3. Provide a meaningful name to the query and click OK to complete the save process.

80 INFORMATION TECHNOLOGY
Working with Queries and Reports
3.7 DISPLAY ALL RECORDS AND ALL FIELDS
Sometime the user wants to see all complete information contained in the table. The query design
view offers an option that lets the user display all of the fields and all the records from the table as
shown in Fig. 3.7.1, which is as follows:-

Fig. 3.7.1: Query Design View (i)

3.8 CHANGE FROM DATASHEET VIEW TO QUERY DESIGN VIEW


Once the user has seen the result of the query created, he or she may wish to do some modification
in the query as per a particular requirement, in such case, the user has to switch from datasheet
view to query design view by clicking View, under results group in Design tab option and choosing
Design view as shown in Fig. 3.8.1.

INFORMATION TECHNOLOGY 81
Office automation-Data Bases

Fig. 3.8.1: Query Design View (ii)

3.9 SORTING A QUERY


The query created by the user may be sorted in ascending and descending mode, as per requirement.
For sorting, the user may specify the order of sorting available under Sort option as shown in Fig.
3.9.1, which is as follows:-

Fig. 3.9.1: Query Sorting

82 INFORMATION TECHNOLOGY
Working with Queries and Reports
3.9.1 Sorting Multiple Columns in a Query
For sorting the result of a query based on multiple fields, the user may specify sort within a sort.
For example, taking the customer table as source, the user may sort the query result by state and
then within a state, the user may sort by city and within a city, the user may sort as per last name
and then by first name as shown in Fig. 3.9.2, which is as follows:-

Fig. 3.9.2: Sorting multiple columns


Note: The user may want to sort by state, then by city within a state and then by last name within a
state and then by first name within last name. The user is required to enter the sort in the following
order: state, city, last name, first name. The sort order may not agree with the order in which the
user wants to display fields in the result. In such a case, the user may first choose the required
fields for display in the query result and along with that, the user then mention the fields as per
sort order. To prevent a field from displaying twice, the user will have to deselect the Show box
on the Show row option.
The result of the query thus generated is shown in Fig. 3.9.3, which is as follows:-

INFORMATION TECHNOLOGY 83
Office automation-Data Bases

Fig. 3.9.3: Query Result

3.10 RETRIEVING SPECIFIC RECORDS


As per requirements, the user may wish to retrieve specific records, instead of retrieving all the
records. For example, the user may wish to retrieve only those records where the product list price
is greater than $ 18.00. In such cases, the user may specify some criteria (condition) to retrieve
specific records. For this purpose, logical operators are used. The valid logical operators which
could be used by the user to specify criteria are as follows:-

Logical Operators
Operator Meaning Field Type Entry Format
= Equal to Character = "DE"
Number =5
Date = #2/16/88#
<> Not equal to Character <> "DE"
Number <> 5
Date <> #2/16/88#
> Greater than Character > "DE"
Number >5
Date > #2/16/88#
>= Greater than Character > = "DE"
or equal to Number >=5
Date > = #2/16/88#

84 INFORMATION TECHNOLOGY
Working with Queries and Reports

< Less than Character < "DE"


Number <5
Date < #2/16/88#
<= Less than Character <= "DE"
or equal to Number <= 5
Date <= #2/16/88#
In Equal to any Character In ("DE", "NJ")
item in a list Number In (5, 9, 17)
Date In (#2/16/88#, #2/3/
90#, #12/15/88#)
Not In Not equal to Character Not In ("DE", "NJ")
any item in a list Number Not In (5, 9, 17)
Date Not In (#2/16/88#, #2/3
/90#, #12/15/88#)
Between Between two values, Character Between "C" And "F"
greater than or Number Between 5 And 10
equal to one and Date Between #1/1/88# And
less than or equal #12/31/88#
to the other
Not Between Not between Character Not Between "C" And "F"
two values Number Not Between 5 And 10
Date Not Between #1/1/88#
And #12/31/88#
Is Null The value is Character Is Null
missing from Number Is Null
the field Date Is Null
Is Not Null The value is not Character Is Not Null
missing from Number Is Not Null
the field Date Is Not Null
Like Like a specified Character Like "S*"
pattern. Number Like "1*"
* means any series Date Not Applicable
of characters.
? means any
single character.
Not Like Not like a specified Character Like "S*"
pattern. Number Like "1*"
* means any series Date Not Applicable
of characters.
? means many
single character.
Table 3.10.1: Logical operators
Taking the above mentioned example of product table, the screen will look like Fig. 3.10.1 which
is as follows:-

INFORMATION TECHNOLOGY 85
Office automation-Data Bases

Fig. 3.10.1: Resultant Screen (i)


The resultant screen would be like Fig. 3.10.2 which is as follows:-

Fig. 3.10.2: Resultant Screen (ii)

86 INFORMATION TECHNOLOGY
Working with Queries and Reports
3.10.1 Applying Multiple Criteria
Multiple criteria could be applied to the same table as shown in Fig. 3.10.3, which is as follows:-

Fig. 3.10.3: To apply multiple criteria


Here, the user wants to view only those records from the product table where the Standard
Cost of a product is above 18 and the List Price is above 21. The resultant screen is shown as
Fig. 3.10.4, which is as follows:-

INFORMATION TECHNOLOGY 87
Office automation-Data Bases

Fig. 3.10.4: Resultant Screen (iii)

3.11 CREATING QUERIES USING MULTIPLE TABLES


The user can create a query using two or more tables. In such cases, it is necessary to establish
proper relationship between the concerned tables. Following are the steps which will show how
to create query using two tables:-
Source:-
Database : Northwind 2010
Table 1 : Products
Table 2 : Purchase Order Details
1. Repeat the steps for opening Query Design View as explained earlier.
2. Repeat steps for inserting the table(s) as explained earlier.
3. Choose the fields as shown in Fig. 3.11.1, which is as follows:-

88 INFORMATION TECHNOLOGY
Working with Queries and Reports

Fig. 3.11.1: Query Design using two tables


4. On the Design tab, in the Results group, click Run and see the result as shown in
Fig. 3.11.2 as follows:-

INFORMATION TECHNOLOGY 89
Office automation-Data Bases

Fig. 3.11.2: Resultant Screen


Note: The same example can be performed by the user by opting for Query Wizard.
3.12 CREATE MAKE TABLE QUERY
There are instances, when a user wants to save the result of a query as a table, which containing
multiple and selected fields from more than one table, for future use. This can be achieved by
using Make Table available under Query Type option as shown in Fig. 3.12.1. A query saved
using make table option retrieves data from one or more tables and then loads the result set into
a new table. That new table can be saved in the database that is the working database or the user
may also create it in another database.
Source:-
Database : Northwind 2010
Table 1 : Products
Table 2 : Purchase Order Details

90 INFORMATION TECHNOLOGY
Working with Queries and Reports

Fig. 3.12.1: 'Make Table' option


Once, query is created, as explained in the above sections, the user is required to do the following
steps:-
1. Click Make Table available under Query Type option, the user will see a screen similar to
the one shown in Fig. 3.12.2, which is as follows:-

Fig. 3.12.2: 'Make Table' Dialog Box (i)


2. The user will be required to give some meaningful name to the new table as shown in
Fig. 3.12.3, which is as follows:-

INFORMATION TECHNOLOGY 91
Office automation-Data Bases

Fig. 3.12.3: 'Make Table' Dialog Box (ii)


3. Further, the user is required to specify the location of the table as either Current Database
or as Another Database. In the case the user choose Current Database, he or she needs to
simply click OK, else, the user will have to specify the location of the database in which the
user wished to save the file and after specifying the location of the database, the user needs
to click OK to finish the activity.

3.13 CREATE PARAMETER QUERY


There are times, when a user wants to supply value to a query as parameter. This can be achieved
by using parameter query. A parameter query prompts a user for some input before running a
query. To achieve this, the user needs to enclose a question in square brackets ([]). Taking the
previous example in to consideration, if the user wishes to see the purchase order quantity of a
selected product, the user needs to do the following steps:-
Source:-
Database : Northwind 2010
Table 1 : Products
Table 2 : Purchase Order Details
1. The user needs to mention [Which Product Name?] in the criteria row as shown in
Fig. 3.13.1, as follows:-

92 INFORMATION TECHNOLOGY
Working with Queries and Reports

Fig. 3.13.1: To Supply value to a query


2. The user then needs to click Run and the a screen similar to the one shown in Fig. 3.13.2 will
be displayed to the user:-

Fig. 3.13.2: On 'Run' of Query

INFORMATION TECHNOLOGY 93
Office automation-Data Bases
3. Click OK and the user will be shown the result as shown in the following Fig. 3.13.3.

Fig. 3.13.3: Resultant Screen


Following Table 3.13.1 provides some options which the user can use in parameter query:-
Like "*" & [Prompt] & "*" Returns all records that contain the value you enter.
Example: If you enter ad, Access returns all records that
include the sequence ad anywhere in the field.
Like "*" & [Prompt] Returns all records that end with the value you enter.
Example: If you enter S, Access returns all records that
end with S.
Like [Prompt] & "*" Returns all records that begin with the value you enter.
Example: If you enter S, Access returns all records that
begin with S.
> [Prompt] Find all records with a value greater than the value you
Note: You can also use enter.
< (less than) ,<= (less than Example: If you enter 5, Access returns all records that are
or equal to) >=, >= (greater greater than 5.
than or equal to),
or <> (not equal)
Table 3.13.1: Parameter Query Option

94 INFORMATION TECHNOLOGY
Working with Queries and Reports
This topic deals with reports, their importance, general types of reports available under
MS-Access and how to create simple reports using form wizard and report design view. It also put
focus on the various report sections which could be used while designing a report using report
design view.

3.14 INTRODUCTION
Reports provide the most flexible way of viewing and printing summarized information. Reports
display information with the desired level of detail, while enabling the user to view or print the
information in almost any format. The user can add multilevel totals, statistical comparisons and
pictures and graphics to a report.

3.15 DEFINITION
A database report presents information retrieved from a table or query in a preformatted, attractive
manner.

3.16 REPORTS AND ITS TYPES


There are basically following types of reports provided by MS-Access:-
3.16.1 Tabular Report
Tabular reports (also known as groups/totals reports) are similar to a table that displays data in
neat rows and columns. Tabular reports, unlike forms or datasheets, usually group data by one
or more fields. Often, tabular reports calculate and display subtotals or statistical information for
numeric fields in each group. Some reports include page totals and grand totals. You can even have
multiple snaked columns so that you can create directories (such as telephone books). These types
of reports often use page numbers, report dates or lines and boxes to separate information. Reports
may have color and shading and display pictures, business graphs and memo fields. A special type
of summary tabular report can have all the features of a detail tabular report but omit record details.
3.16.2 Columnar Report
Columnar reports generally display one or more records per page, but do so vertically. Columnar
reports display data very much as a data-entry form does but are used strictly for viewing data
and not for entering data. Another type of columnar report displays one main record per page (like
a business form) but can show many records within embedded subforms. An invoice is a typical
example. This type of report can have sections that display only one record and at the same time
have sections that display multiple records from the many side of a one-to-many relationship and
even include totals.
3.16.3 Labels
Another type of columnar report displays one main record per page (like a business form) but can
show many records within embedded subforms. An invoice is a typical example. This type of report
can have sections that display only one record and at the same time have sections that display multiple
records from the many side of a one-to-many relationship and even include totals.

3.17 GENERAL STEPS IN CREATING A REPORT


The report process begins with your desire to view your data in a table, but in a way that differs
from datasheet display. You begin with a design for this view; Access begins with raw data. The

INFORMATION TECHNOLOGY 95
Office automation-Data Bases
purpose of the report is to transform the raw data into a meaningful set of information. The process
of creating a report involves several steps:
 Defining the report layout
 Assembling the data
 Creating the report design using the Access Report Design window
 Printing or viewing the report
3.18 CREATING A REPORT WITH REPORT WIZARDS
Report wizard helps the user to create the report in a easy and efficient manner. Report Wizards
give the user a basic layout for the report. The report can further be customized as per requirement.
Report Wizards simplify the layout process of the controls that are meant to be used in the report.
It helps the user to create a report by asking a series of questions about the type of report that the
user wants to create and then automatically creates the report for the user.
1. Select the Report Wizard button in the Reports group of the Create Ribbon tab as shown in
Fig 3.18.1.

Fig. 3.18.1: Report Wizard (i)


2. Select a query or a table for the report as shown in Fig. 3.18.2:

Fig. 3.18.2: Report Wizard (ii)


Note: The user can also choose fields from more than one table or query.

96 INFORMATION TECHNOLOGY
Working with Queries and Reports
3. Next, specify the fields that should be included in the table as shown in Fig. 3.18.2.
4. Now, the user is prompted through a dialog box which enables the user to specify the field(s)
for grouping data in the report as shown in Fig. 3.18.3 (A) and Fig. 3.18.3 (B):

Fig. 3.18.3 (A): Before Grouping

Fig. 3.18.3 (B): After Grouping

INFORMATION TECHNOLOGY 97
Office automation-Data Bases
The user may click the Grouping Options button provided at the bottom left corner of the Group
dialog box to display another dialog box, which enables the user to further define how the report
uses the group field. For instance, the user can choose to group by only the first character of a field
chosen for grouping. This means that all records with the same first character in the grouping field
are included as a single group. If the user group a customers table by the CustomerName and specify
to group on the first character of the CustomerName field, a group header and footer appears for
the set of all customers whose name begins with the same character. There would be a group for
all records with a CustomerName beginning with the letter A, another group for all records with
CustomerName beginning with the letter B and so on.
The Grouping Options dialog box, which is displayed when the user click the Grouping Options
button enables the user to further define the grouping. The selection is dependent on the type of
data being grouped. The Grouping intervals list box displays different values for the various data
types as also shown in Fig. 3.18.4:
Text: Normal, 1st Letter, 2 Initial Letters, 3 Initial Letters, 4 Initial Letters, 5 Initial letters
Numeric: Normal, 10s, 50s, 100s, 500s, 1000s, 5000s, 10000s, 50000s, 100000s.
Date: Normal, Year, Quarter, Month, Week, Day, Hour, Minute.

Fig. 3.18.4: Report Wizard (iii)


5. Further, the user is prompted to specify the sorting order as ascending or descending as shown
in Fig. 3.18.5. The user can select fields that they have not already chosen to group and can use
them as sorting fields. The fields selected in the sorting dialog box does not affect grouping.

98 INFORMATION TECHNOLOGY
Working with Queries and Reports

Fig. 3.18.5: Report Wizard (iv)


6. The user may use the Summary Option button which opens up a dialog box which provides
additional display options for numeric fields as shown in Fig. 3.18.6.

Fig. 3.18.6: Summary Options Dialog Box

INFORMATION TECHNOLOGY 99
Office automation-Data Bases
7. Further, the user is prompted to specify the layout of the report. The dialog box shown in
Fig. 3.18.7, enables the user to determine the basic layout of the data. The user can also specify
the orientation of the report as portrait or landscape.

Fig. 3.18.7: Report Wizard (v)


8. The user is further prompted to specify the title of the report as shown in Fig. 3.18.8:

Fig. 3.18.8: Report Wizard (vi)

100 INFORMATION TECHNOLOGY


Working with Queries and Reports
9. The user is then provided with the option of either to preview the report or to modify the
report in report design view as shown in Fig. 3.18.9.
10. The user may click finish to see a report as shown in Fig. 3.18.9 (A).

Fig. 3.18.9 (A): Report Resultant


Fig 3.18.9 (B) shows the report in report design view, from where the user can further customize
the report.

Fig. 3.18.9 (B): Report Design View

INFORMATION TECHNOLOGY 101


Office automation-Data Bases

3.19 CREATING REPORT IN REPORT DESIGN VIEW


The report design view gives the user a high level of control over the controls on a report, as well as
the report itself. The report design view is divided into a number of sections. The following Access
sections are available in report design view:
Report Header Section
Controls in the Report Header section are printed only once at the beginning of the report. A common
use of a Report Header section is as a cover page or a cover letter or for information that needs to
be communicated only once to the user of the report. The user can also have controls in the Report
Header section print on a separate page, which enables them to create a title page and include a
graphic or picture in the section. The Force New Page property in the Report Header section needs
to be set to After Section that will place the information in the report header into a separate page.
Page Header section
Text or text box controls in the Page Header section normally print at the top of every page. If a report
header on the first page is not on a page of its own, the information in the Page Header section prints
just below the report header information on the first page. Page headers serve as column headers
in group/total reports; they can also contain a title for the report. The user can also change special
effects such as color, shading, borders, line thickness, font type and font size for each control. Both
the Page Header and Page Footer sections can be set to one of four settings through the Report's
properties as follows:
 All Pages: The page header and page footer print on every page.
 Not with Report Header: Neither the page header nor footer prints on a page with the report
header.
 Not with Report Footer: The page header does not print with the report footer. The report
footer prints on a new page.
 Not with Report Header/Footer: Neither the page header nor the footer prints on a page with
the report header or footer.
Group Header Section
A Group Header section normally displays the name of the group. Access knows when all the records
in a group have been displayed in a Detail section when the group name changes. It is possible to
have multiple levels of group headers and footers. However, in some reports the user ou might have
groups of information with date values. The user could group these sections by year or month and
year and within those sections by another group such as category.
Detail Section
The Detail section processes every record in the data and is where each value is printed. The Detail
section frequently contains a calculated field such as profit that is the result of a mathematical
expression.
Group Footer Section
The Group Footer section is used to calculate summaries for all the detail records in a group. The
value of this text box control is automatically reset to 0 every time the group changes.

102 INFORMATION TECHNOLOGY


Working with Queries and Reports
Page Footer Section
The Page Footer section usually contains page numbers or control totals. In very large reports, such
as when there are multiple pages of detail records with no summaries, the user may want page totals
as well as group totals. The user can also print the date and the time printed. A text box control
with the following expression in the Control Source property can be used to display page number
information that keeps track of the page number in the report:
="Page: " & [Page] & " of " & [Pages]
Report Footer Section
The Report Footer section is printed once at the end of the report after all the detail records and
group footer sections are printed. Report footers typically display grand totals or other statistics such
as averages, percentages, etc for the entire report. The Report Writer in Access is a two-pass report
writer, capable of preprocessing all records to calculate the totals such as percentages needed for
statistical reporting. This capability enables the user to create expressions that calculate percentages
as Access processes those records that require foreknowledge of the grand total.
1. Click the Report Design button of Reports Section under Create tab as shown in Fig. 3.19.1.

Fig. 3.19.1: 'Report Design' Option


2. Click Add Existing Fields button on Tools section and select the desired table(s) / query(s)
as shown in Fig. 3.19.2.

INFORMATION TECHNOLOGY 103


Office automation-Data Bases

Fig. 3.19.2: Report Design Tools (i)


Note: By default the report contains only Page Header, Details and Page Footer section in the report
design view. IF the user wishes to have Report Header and Report Footer section then he or she may
right click inside the report design window and include Report Header / Report Footer.
3. The user may specify the Report Title as shown in Fig. 3.19.3.

104 INFORMATION TECHNOLOGY


Working with Queries and Reports

Fig. 3.19.3: Report Design Tools (ii)


4. Right Click on the report design view to select Sorting and Grouping as shown in Fig. 3.19.4.

Fig. 3.19.4: Report Design Tools (iii)


5. Click the Add a group button shown in Fig. 3.19.4.

INFORMATION TECHNOLOGY 105


Office automation-Data Bases

Fig. 3.19.5: Report Design Tools (iv)


6. Either select from the list of available fields in the select field dropdown box of Group on as
shown in Fig. 3.19.5 or Click the expression option as shown in Fig. 3.19.5.
7. For grouping, specify the table to be used and select the field from the list of available fields
as shown Fig. 3.19.6.

106 INFORMATION TECHNOLOGY


Working with Queries and Reports

Fig. 3.19.6: Report Design Tools (v)


8. Click OK to return to the report design. A separate section as Group Header Section will
appear as shown in Fig. 3.19.8.

Fig. 3.19.7: Report Design Tools (vi)

INFORMATION TECHNOLOGY 107


Office automation-Data Bases
9. Now, from the field list pane select the table and put the fields as shown in Fig. 3.19.8.

Fig. 3.19.8: Report Design Tools (vii)


10. Further, as per Fig. 3.19.9, the user can attach totals.

Fig. 3.19.9: Report Design Tools (viii)

108 INFORMATION TECHNOLOGY


Working with Queries and Reports
11. The resultant output that will generated as a report will be similar to the one shown in
Fig. 3.10.10.

Fig. 3.19.10: Resultant Report

3.20 SAVING AND PRINTING A REPORT


The process of saving and printing a report is similar to that of a normal document under windows
environment.

INFORMATION TECHNOLOGY 109


Office automation-Data Bases

110 INFORMATION TECHNOLOGY


Unit – 4
Core Banking Solution
Core Banking Solution

1
C
H
A
CBS BASICS AND
P
T ITS WORKING
METHODOLOGY
E
R

LEARNING OBJECTIVES
 What is Core Banking Solution
 Technology behind CBS
 Comparison of TBA (Total Branch Automation) with CBS
 Data Centre and Network Connectivity
 Functions of IT Department under CBS environment
 Modules of CBS
 Operations of CBS Branch
 Security and Controls at Data Centre and Branch

1.1 WHAT IS CORE BANKING SOLUTION?


Core Banking Solution (CBS) is centralized Banking Application software. It has several components
which have been designed to meet the demands of the banking industry. Core Banking Solution is
supported by advanced technology infrastructure. It has high standards of business functionality.
These factors provide the banks a competitive edge.
There are different vendors in the market providing CBS. The software, (CBS) is developed by
different software development companies like Infosys, TCS, Iflex Solutions etc., Each of the software
has different names:
Name of the Vendor : Software
Infosys : Finacle
TCS : Quartz
Iflex Solutions : Flex Cube
Apart from the above, some institutions have developed the software in house.
The software resides in a Central application server which is located in the Central Office Data Centre.
The application software is not available at the branch but can be accessed from the branches. Along
with Data base servers and other servers, application server is located at the Central Data Centre.

112 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
All of the branches of the bank are connected to the Central Data Centre as shown in Fig.1.1.1

Fig. 1.1.1. Branches of the bank are connected to the Central Data Centre
Core Banking Solution brings significant benefits.
A customer is a customer of the bank and not only of the branch.
The CBS is capable of being implemented in stages.
Initially basic modules like Savings Account, Current Account, Fixed Deposits, Bills & Remittances,
Loans and advances models implemented. Subsequently alternate delivery channels like ATM,
Internet banking, RTGS/ NEFT, Mobile Banking, Treasury, Government Business etc., could be
added.
As servers are on all 24 hours on all days, banking can be done any time and also from anywhere.
Data base of customers is updated on line, e.g., amount withdrawn at ATM is deducted from the
customer’s balance almost instantly.

1.2 TECHNOLOGY BEHIND CORE BANKING SOLUTIONS


As already observed Core Banking describes the banking services provided by a group of networked
bank branches.

INFORMATION TECHNOLOGY 113


Core Banking Solution
As they are networked, customers can access their accounts and perform certain transactions from
any of the bank’s branches.
Broadly speaking, the customer is no longer a customer of the branch but a customer of the bank.
Core banking solutions (CBS) is a combination of an application software and network devices. There
is a Central Data Centre. Data Centre is a large data housing infrastructure that provides high band
width access to its clients. The Data Centre houses many services, Networking devices, Firewalls
and other related equipments. The figure below represents the technology and connectivity details
in a very simple structure for the implementation of the CBS. The circled portion in the diagram
would normally be in the Data Centre as shown in Fig.1.2.1

Fig. 1.2.1. CBS Network Diagram


The servers in the Data Centre could be many e.g., there are application servers, Data Base Servers,
Web server, mail server, Report Generating Servers etc. It needs to be specifically emphasised that all
the servers though placed in the same Data Centre are not in the same Local Area Network (LAN).
Each of the servers are segregated using the concept of Virtual Local Area Network (VLAN). VLAN is
a method of creating virtual networks within a physical network. Each virtual network thus created
will act a a separate network. This concept has got distinct advantages:
Data communication between the 2 VLANs can be controlled as per business requirements.
Thus you will observe that in the diagram application server and data base servers are on two
different VLANs (In the picture VLAN2 and VLAN3).
The various components of a core banking environment would be:

114 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
A Central Application Server that runs the core banking solutions (CBS). The application is centrally
accessed by the branches. There are different core banking solutions available in the market like,
Finacle developed by Infosys, Flexcube developed by I-Flex Solutions, Bankmate developed by the
HCL Technologies, Quartz developed by TCS. There are other CBS software also some developed
in-house by the bankers; others developed by other vendors.
Central Data Base Servers that store the data of the bank. It must be noted only this data base server
that is centrally located stores the data for the bank which means that the data for all of the branches
of the bank are stored in this central data base server.
Other infrastructure needed for internet banking and automated teller machine (ATM) operations.
Necessary infrastructure to provide security for stored data and data transferred across the network.
In the following paragraphs, we shall briefly discuss the various servers and their location and the
purpose served.
At this juncture let us recapitulate the concept of a server. The server is a sophisticated computer
that accepts service requests from different machines which are called clients. The requests are
processed by the server and sent back to the clients. There are different types of servers as follows:
Application Server, Data Base Server, Anti Virus Server, Web Server, ATM Server, Internet Banking
Application Server (IBAS),Internet Banking Data base Server, Proxy Server, Mail Server etc
Application server hosts the core banking application like Finacle, Flexcube, Quartz or Bankmate
etc. This server has to be a powerful and robust system as it has to perform all the core banking
operations. The branch does not have the entire application. It will have only a version which is
called the “client version” of the application. The client version of the application is capable of only
entering the data at the end point that is branches.
The validation is a complete process in the computer so that it ensures that data that is fed in conforms
to certain prerequisite conditions e.g., if an operator keys in data for withdrawal of money , the
account number of the customer would be entered by the operator naturally. But there would be a
built in control so that further processing would be entertained only after the systems verifies that
the account number which is now entered is already in the data base i.e., it is an existing customer.
After the data is validated at the branch, it would be sent to the application server in the centralised
data centre. The application server (which houses the banking software) after receiving the data
performs necessary operations and updates the central data base etc., Customer “A” deposits
Rs.10000/- is passed on to the data centre. The application server performs necessary operations
and this updates the account of the customer “A” in the data base server. The customer may do some
other operation in branch “Y”. The process is validated at branch “Y” and the data is transmitted
to the application software at the data centre. The results are updated in the data base server at the
centralised data centre. Thus it would be observed that whatever operations a customer may do
at any of the branches of the bank the accounting process being centralised at the centralised data
centre is updated at the centralized data base e.
The application software which is in the application server is always to be a latest version as accepted
after adequate testing; the application software is never static and would require some changes to be
effected either due to any bugs discovered or a change in this process or any other justified reason.
Such changes are never made directly into the live application server. These changes are made to
a separate server called a test server. The programs are debugged and certified that the program is

INFORMATION TECHNOLOGY 115


Core Banking Solution
now amended as required and performs as expected. The changed and latest application software
will be moved into the application server under proper authority. Earlier version would be archived.
The latest copy of the software would always have a back up copy.
Location
The application server would be placed in a trusted inside zone in a separate Virtual Local Area
Network (VLAN) - please see diagram.
There is no direct access to the application server. The communication has to pass through a firewall,
properly directed by a switch which is also located behind the firewall.
Data Base Server
The Data Base Server of the Bank, as already observed contains the entire data of the Bank. The
data would consist of various accounts of the customers, as also certain master data e.g., master
data are – base rates FD rates, the rate for loans, penalty leviable under different circumstances,
etc., Application software would access the data base server. The data contained in the data base
has to be very secure and no direct access would be permitted to prevent unauthorised changes.
Strict discipline is followed regarding the maintenance of the data base server. There is a designated
role for maintenance of the data base. This individual who performs the role is called the Data Base
Administrator. His activities will also be monitored as all changes made would be recorded in a
Log. Scrutiny of the log would disclose the type of activities and the effect of such activities. Security
aspects of data base server are an audit concern. Apart from the normal application server, the
Automated Teller Machine server (ATMS) and Internet Banking Application Server (IBAS) would
also access the Data Base Server.
However, it would be only through VLAN. It must be noted that whatever be the operation that the
customer has performed, etc., at the branch, through ATM, by Internet, mobile banking or any other
alternate delivery channels his account at the Centralised Data Base would be updated.
Automated Teller Machines Server
This server contains the details of ATM account holders. Soon after the facility of using the ATM is
created by the Bank, the details of such customers are loaded on to the ATM server.
When the Central Data Base is busy with central end-of-day activities or for any other reason, the file
containing the account balance of the customer is sent to the ATM switch. Such a file is called Positive
Balance File (PBF). Till the central data base becomes accessible, the ATM transactions are passed
and the balance available in the ATM server. Once the central data base server becomes accessible
all the transactions that took place till such time as the central data base became un-accessible would
be updated in the central data base. This ensures not only continuity of ATM operations but also
ensures that the Central data base is always up-to-date.
The above process is applicable to stand alone ATM at the Branch level. As most of the ATM are
attached to central network the control is through ATM SWITCH only.
Internet Banking Data Base Server
Just as in the case of ATM servers, where the details of all the account holders who have ATM
facility are stored, the Internet banking data base server stores the user name, password of all the
internet banking customers IBDS (Internet Banking Data Base Server) software stores the name and
password of the entire internet banking customers (Please note that the ATM server does not hold

116 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
the PIN numbers of the ATM account holders). For further discussion, please refer to the chapter
dealing with ATM. IBDS server also contains the details about the branch to which the customer
belongs. The Internet Banking customer would first have to log into the bank’s website. The next
step would be to give the user name and password. The Internet Banking software which is stored
in the IBAS (Internet Banking Application Server) authenticates the customer with the log in details
stored in the IBDS. Authentication process as you know is a method by which the details provided
by the customer are compared with the data already stored in the data server to make sure that the
customer is genuine and has been provided with internet banking facility.
Location
The IBDS is located in a demilitarised zone. It has a separate VLAN that connects a proxy server,
mail server, web server and IBAS.
Internet Banking
Internet Banking refers to banking transactions routed through the Internet. This facility permits
registered customers of the bank to perform banking operations at any time of the day from any
computer - now it may also be possible to do it from a cell phone.
No doubt, Internet Banking facilitates banking through the medium of internet. However, it also
needs specialized software and hardware. The internet as you all know is a public network. Hence
proper security features are built into the system to maintain confidentiality and integrity of the
data that is being transferred through the internet.
Some Banks provide this facility automatically soon after a customer opens an account with them.
Some others require a special request from the customer to provide this facility.
However, whatever be the method of providing internet facility, there is a process to be followed.
The main components of Internet banking system consist of Web Server, Internet Banking Application
Server (IBAS), Internet Banking Data Base Server (IBDS), Middleware, and Central Data Base Server.
Anti Virus Software
In the pre Core Banking Solution scenario, when Total Branch Automation systems were in force
updating the Anti Virus Software was yet another problem. As separate servers not connected to
each other or to the Data Centre at the head office were in existence each of the server had to be
updated with the latest version of the Anti-Virus Software separately
While in theory, it was agreed and presumed that all of the branches would have latest version of the
Anti Virus Software, it was practically not so. As each one of the servers had to be updated manually
with the latest version, the logistics proved to be inadequate with the result different versions of the
Anti Virus Software were in existence in the different servers in the various branches.
In the Core Banking Solution as there is a Centralised Data Centre and also as there was a Centralised
Data Base server, application server etc., the Anti Virus Software was also available only in the
Centralised Data Centre. This copy of the Anti Virus Software was updated promptly and regularly
at the Data Centre and pushed into all of the servers and in all the systems in the branches by push-
pull method
Some Banks had, for back up purposes as also for business of the bank continuity planning had
decided to have servers in the different branches. All the servers also were updated with the latest
Anti Virus Software automatically every day as day beginning operations.

INFORMATION TECHNOLOGY 117


Core Banking Solution
This process ensured that there was only one version of the Anti Virus Software and that too the
latest one present in all of the bank’s servers unlike in the TBA scenario.

1.3 COMPARISON OF TBA WITH CBS


Total Branch Automation System (TBA) was in existence before Core Banking Solution (CBS) was
implemented. TBA itself was deemed a technology development compared to its predecessor ALPMS
(Advanced Ledger Printing Machines).
In the Total Branch Automation system each branch was performing the branch operations in
totality at the respective branch. The final output was transmitted to the head office. The data was
transmitted either on a CD or a Floppy. The information on this media was processed at the Central
Office for consolidation of accounts and preparation of reports.
As each branch was self reliant in as much as all the information regarding the branch operations
was available at the server located at the branch.
 The technology infrastructure at the branch was as follows:
 There would be a server which would be either in the Branch Manager’s room or more
commonly kept in a separate air conditioned enclosure with a separate entrance, so that entry
to the server room can be restricted.
 At the most the Systems Administrator may be inside the cabin along with the server.
 There would be four or five nodes or more depending upon the need of the branch or the
volume of transactions. Each of the nodes would be connected to the server.
 The server would have the application systems as also the data base.
 The bank as a whole would have one banking software which might have been developed
in-house or purchased from an outside vendor. A copy of this software is loaded in each of
the servers in all the branches of the bank.
 The server also hosts data base of the branch.
 The data base would have a master data, and all the details of the transactions entered into.
 The master data consists the data relating to standing information like the name, address of
the customer interest payable on all Deposits. This would have the details of interest payable
for various Deposits with different tenures eg. 8.5% pa, 9% pa 9% for two years and so on.
 Additional/ concessional interest for senior citizen, staff members, educational loan for girl
child, various concessional rates during festive seasons etc.
Transactions of the customers would be stored account-wise, so that it would have the opening
balance and the details of the transactions which have taken place.
The application software which is also residing in the server at the branch actually does the banking
operations. Eg. A person operating a particular node (also called a client) (which is nothing but the
front end machine from which the operations take place, enters the transactions. The customer might
have come to withdraw Rs.10,000/-. The operator accesses the machine when he is prompted to give
the user ID and password. Once he gives it correctly, a screen would pop up by which he would
click the SB A/c and in the SB menu he would type the name of the customer as also the account
number. He has now accessed to the specific account of the customer.

118 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
Next step that he would be doing would to be entering this transaction and request for withdrawal
for the customer. In the example specified, he would be typing cash Rs.10,000/- in the appropriate
fields. This command executed at the node end (client’s end) is transmitted to the server through
the communication channels (or net working cables).
At the server level the application accesses the data available of the customer in the data base and if
there is balance available gives back the information. The transaction is put through.
Once the transaction is put through again this information is retransmitted to the server. The
customer’s data base is updated by the application and the customer’s account would be suitably
modified.
At this point of time, we are only discussing the process and not going into the details of the normal
controls which are in place. Eg.
 If the customer does not have the required balance at his credit
 Is the withdrawal of cash a routine procedure which the person at the counter can authorise
through controls built in the system whether the transaction can be entered by the person but
would have to be authorised by an individual at a higher level say, the Accounts Officer. These
procedures are built into the application software as part of built in controls of the software.
This is known as maker-checker system or four-eye principle.
Similarly transactions relating to Current Accounts, Fixed Deposits, Loans, Foreign Exchange (where
the branch is authorised to also deal with foreign exchange) would have to be dealt with by different
nodes or same node and the data base of the branch is updated. By this process by the end of the
day all the transactions which have taken place during the day have all been recorded and correct
postings have been made to the respective accounts held in the database which resides in the server.
At the end of the day under the authority of the Branch Manager the Branch level Systems
Administrator would perform End of Day operations (EOD).
The End of Day operations when completed would result in all the entries being posted and
a final trial balance and other financial statements (including the complete ledger)(Opening
Balance+Transactions leading to the Closing balance would be available).
The introduction of the Total Branch Automation hastened processing activities at the branch and
also totally eased the time consuming End of Day Operations of preparing a tallied trial balance with
all the ledger entries having been posted. A copy of the ledger is available in the system and this
would be copied on a CD or a Floppy for outward transmission to the Head Office/ Central Office.
At the Head Office, the CDs and the floppies received from various branches would form a copy for
them to prepare a consolidated ledger/ Balance sheet/ General Ledger
 The advantage of the TBA was that maintenance of manual ledgers and day books were
dispensed with.
 At the end of the day, a neatly printed set of day books and ledgers with totals tallying (!)
would be ready after last of the transactions are posted (in the initial stages due to technology
snags or due to inadequate resources, the end of day operations were taking even 6-8
hours. However, after ironing out the teething problems, the time frame was considerably
reduced.

INFORMATION TECHNOLOGY 119


Core Banking Solution
Disadvantages
 As mentioned in the earlier paragraphs a copy of the software had to be loaded into each of
the servers at various branches
 As we all know, the program require constant changes either due to bugs in the program or
due to changes in the business process or for any other justifiable reasons.
 These changes are made at the central office (Computer Planning and Policy Department-
CPPD). Copies of this program would have to be made effective at the branches.
 The methodology adopted for updating is that a copy of the programme would be taken on a
CD or Floppy and passed over to a branch or personally carried by a member of the staff of the
CCPD for updating the copy of the programme residing in the server of the branch. Sometimes
it was also communicated through e-mail.
 While theoretically it seems simple, the problems that have been faced are with the need to
change program often. There were different versions of the program available and operational
at different branches of the bank. Version control mechanism was not effective.
 In addition to changes in programme master data regarding rates of Fixed Deposits, Loans,
Penalties, etc., have to take place almost immediately in the entire bank at a single point of
time. This was possible only by sending e-mails to the branches and instructing the Branch
Managers to get the Systems Administrators of their respective branches to update the masters.
 The Branch Managers being busy with operations were not devoting time to personally ensure
that these corrections are made properly. This resulted in a situation when modifications were
made differently at different branches at different points of time.
 Also intentionally some ‘mistakes’ could be committed. This situation led to a great extent
of chaotic condition of branch transactions at the head office and not to speak of suspense or
sundry accounts created in each branch to ensure the trial balance tallied.
To get over this problematic situation, certain steps were taken to resolve the problems.
 For speedy resolution of problems at the branches, it was decided that source code would
be made available at the regional office. All bugs would be dealt with at the regional level
and corrected copies of the program would be given to the branches much earlier than it was
possible earlier when all corrections were made only in the CPPD.
 The availability of the source code at the regional office and the different corrections being
made by different people on different occasions lead to lack of control of programme changes
and implementation of master data.
 The availability of source code at the different regional office itself was a matter of serious
concern. The source code is the basic code which later becomes an object code. It is not possible
easily to change a object code while the source code could be changed by anybody who knows
the programming language.
 Apart from the serious operational problems and security concerns, there were certain other
disadvantages like updation of anti-virus software.
 Scalability of the software was restricted. It wasn’t possible to introduce further useful products
like ATMs and Internet banking etc. It would have meant a great deal of patch work and it

120 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
will restrict new products. Already with various versions of program being available (and
made necessary) in the total branch automation system, the programme was very weak with
different versions having too many patches. To think of enhancing this to add further banking
products like ATMs and Internet banking was bound to be impossible. ATM was introduced
and work for the account holder of that branch only.

1.4 DATA CENTRE AND NETWORK CONNECTIVITY:


Data Centre houses all the main servers. They are:
1. Application Server
2. Database Server
3. ATM Server
4. Web Server
5. Antivirus Server
6. Internet Banking Application Server
7. Internet Banking Data Base Server
8. Proxy Server
9. Mail Server
Most of the servers are placed behind a firewall. The firewall is generally hardware and it plays the
role of preventing unauthorized access. The servers though located in the same place will not be in
the same Local Area Network (LAN). These servers are segregated by using the concept of Virtual
Area Network (VLAN). VLAN has got its own security. The fig 1.4.1 below shows the network
diagram at the data centre.

INFORMATION TECHNOLOGY 121


Core Banking Solution

Fig. 1.4.1. Network Diagram at Data Center


Network connectivity
In a core banking concept all the systems of the bank are connected to the Central Office by means
of a connectivity which may be either a leased line or a dial up line.
As the connectivity of the branch bank to the data centre is very critical arrangements was made for
back up connectivity. In case the primary connectivity fails, there will be a fall back arrangement
with a secondary line. There should be adequate band width capacity to deal with the volume of
transactions that are expected to take place. When the band width is not adequate and the transaction
load is higher, the system slows down and the efficiency also drops. Hence the banks should ensure
that there is adequate band width to manage heavy load of transactions even during peak period
like beginning of the month or end of the month/ year
Apart from the cables other important components of a network are devices like routers, switches
and hubs. Routers enable data transmission over different networks. They are capable of making
intelligent decisions to ensure data is transmitted across the network by using the best path. Switches
have many ports that are connected to different systems. Switches facilitate data transmission with
the network (this switch should not be confused with the ATM switch - discussed later). Virtual
networks are capable of being connected only when devises are connected to a switch as shown in
Fig 1.4.2.

122 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology

Fig. 1.4.2. Virtual Network Diagram


The picture above describes how the various servers are connected and where exactly the firewalls,
routers and switches are placed. It will be observed that firewalls will always be placed whenever
there is an access from outside the network.
Proxy Server
A Proxy server always acts in conjunction with a firewall. The Proxy Server provides network security
by preventing malicious data from entering the network. In the network diagram, it will be noticed
that the Proxy server is placed inside the demilitarized zone wherein the mail server, web server,
internet banking application server, are placed.
Domain Controller
This is used for authentication. Access to a set of servers is controlled by the Domain Controller.
Network connectivity and security thereof plays a very important role in any organization especially
in a core banking environment as the entire system is networked. The importance of network
connectivity and its security can never be over emphasized. As dependence upon the network
being available is crucial, adequate arrangements should be made for a fall back. The moment the
primary network fails for any reason, the fall back arrangement comes into place due to the steps

INFORMATION TECHNOLOGY 123


Core Banking Solution
already taken while establishing the connectivity. The network is vulnerable to “hacking”. The
hacking is a process of unauthorized entering a network. To prevent this hacking there have to be
many controls in place. It is necessary to constantly monitor the network to ensure that there is no
potential possibility of the vulnerability being exploited. All network traffic is required to be tested
for vulnerability against hacking, phreaking, malware, spyware etc. There should be a specific team
who will have the sole responsibility of constantly testing the network connectivity to ensure that it
is secure. There are software tools available which would be utilized to assess the vulnerabilities. The
tools when used would highlight any vulnerability discovered. The team in charge of maintaining
the network would immediately take adequate steps that the weak points are strengthened. It is also
possible that the network can be intruded. In any application and more so in banking applications
vulnerability in the network or the possibility of a intrusion into the network are matters of grave
concern. It is possible to use certain procedures so that any time an intrusion would be detected and
prevented. A simplification of the concept could be that of installing a burglar alarm. Preventive
controls have to be in place and it is the responsibility of the bankers to ensure the same. However, it
is the duty of an auditor to verify and satisfy himself that the controls are in place and that competent
and qualified people have verified and given satisfactory reports. Care should be taken to improve
the security on ongoing basis as hackers are employing newer methodologies to attack network and
stealing confidential information.

1.5 FUNCTIONS OF IT DEPARTMENT IN CBS ENVIRONMENT


As explained earlier, in core banking solution environment of Information Technology functions (IT
functions) are centralised at the data centre. There are specific roles and responsibilities for different
individuals like in all IT Departments. There are certain functions which are incompatible, which
means that under no circumstance can one individual perform two different functions as those
specific functions are sensitive. These functions have to be performed by two different individuals.
This concept is similar to what we are aware of in a purchase function. The officer who is in charge of
the purchase would not be the person who would be passing the goods. The person who passes the
purchase invoice will be definitely different from these two. The rationale for the separation is that
control will be compromised. This is known as segregation of duties and is very important in any
computerized function. A brief description of the roles of different individuals in an IT Department
is given below:
 Security Administration: It is advisable and necessary for all organizations including banking
to have a security policy which is approved at the Board level. The officer in charge of the
security administration is expected to understand the policies and procedures mentioned in
the security policy. He should be able to assess the risks for non compliance. His duties would
include deciding on access rules to data and other IT resources.
 There will be separate set of people who will be Issuing of user ID passwords and manage it.
Monitoring the security architecture constantly with a view to ensuring that there are no weak
points which can be exploited is the duty of security administrator. Security administrator
should not have any access to transaction level data
 System Administration: This particular job is more sensitive. The Systems Administrator
has the powers to create, modify and delete users in accessing the system. The individual is to
be technically competent. He is also expected to have a proven record of integrity. His duties
would briefly include the following:

124 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
 User creation
 User deletion
 Locating a branch code and providing connectivity to the branch
 Creation of new products
 Defining interest rates for deposit loans and other products.
 Be responsible for processing of end of day operations and beginning of day operations.
 Be responsible for introducing latest application of the program.
 Data base administration: As the very name indicates, the Data Base Administrator is the
custodian of the bank’s data. He is responsible for ensuring that access is given to the Central
Data Base in a secure manner in line with business requirements. His responsibilities would
include
  Ensuring data integrity
 Ensuring data availability
 Ensuing security to access data
 Importantly ensure recoverability of data in case of system failure
 Maintaining size and volume of database and corresponding processes
 Network Administration: Networking, generally and more specifically in a core banking
environment plays a very significant role. The Network Administrator has the following
important responsibilities:
  To place routers, switches and hubs at the appropriate places and ensure a secure network
configuration.
  Sensitive devises like firewalls and intrusion detection systems/ IPS need to be strategically
placed to ensure security for the network.
  At periodical intervals arrange for vulnerability assessment and penetration tests to take
corrective action whenever these tests throw up weak points.
 Librarian: Normally we understand that the Librarian is in charge of maintaining the Library,
issuing books and receiving them back. In a computerised environment, the Librarian has
got similar functions excepting that instead of dealing with books, he will be dealing with
software. As we are aware, the software, which is being developed and tested, would be clear
as a complete product ready for use by the Project Leader. Such a program then moves from
a test environment into the production environment. But there is an intermediary process
by which the Project Leader hands over the finished product to the Librarian. The Librarian
maintain records of the various versions of the program records all the various versions of the
program just as we have different editions of a book and generally a later edition is expected
to be important over the earlier one. Similarly, software may have different versions and it is
extremely important to remember them and this number is referred to as the version number.
The Librarian has the following responsibilities:
  Moving the correct version of the software into production environment.

INFORMATION TECHNOLOGY 125


Core Banking Solution
  Maintain detailed documentation of all receipts and issues of software.
 Keep a record of all licenses obtained for the usage of software.
 Be in charge of user manual and system manual
None of these groups of administrators should have access to the database having transaction data.
Implementation of maker checker concept will ensure proper segregation of duties.
Changed Management Procedures
In the normal course, due to any change in the business process or upgradation of technology or
due to program bugs discovered subsequent implementation changes are warranted in hardware,
software and communication systems.
There needs to be a well documented procedure in place and a strict adherence to such procedure.
Changes to hardware and communication systems need to be entered in a register apart from a
softcopy of the register being available on the system. The latest copy of the network program should
always be available. These documents should always be maintained up to date incorporating all the
changes and the dates when such changes have been incorporated.
Application Software
There needs to be a control on the various versions of software. At the stage of initial implementation
of the software (for the first time software which has been debugged thoroughly moved from the
test environment to the production environment) a specific version number should be provided e.g.
CBS Version No: 1.1. There needs to be a document which contains details regarding the Version
No. and date of implementation.
Thereafter for all subsequent procedures, there needs to be a strict procedure to be adhered to. The
procedures would be as follows:
 There should be a specific request from an authorised person like the Manager of the
user department. The request should be approved by the person in charge of the Systems
Department.
 Changes to programs should necessarily be made in the test environment.
 After thoroughly debugging the program, the corrected program would be handed over to
the Librarian.
 The Librarian would then give the next Version No. for the changed program, e.g. Version
No: 1.2 (as compared to the previous Version No:1.1).
 The documentation would contain details of the changes made and the date when it was made.
Strict adherence to the procedures and technologies
The changes would ensure that the corrected latest version of the program alone is used. If such a
procedure is not strictly adhered to, there is every possibility of an earlier version of the program
being used, which would result in inaccurate processing.
Organization Structure of the IT Department
The standard for the organization structure for the IT Department is the same whether it is a banking
environment or any other. The standards stipulate as follows:

126 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
 Production environment should be different from development environment.
 In the development environment all aspects of the program viz., functionality, built in controls,
etc., will be tested by both the users as also the programmers. The programmers would test it
first and then it would be provided to the user department for them to test it. This version is
called the ‘beta version’. Various types of tests like unit test, system test, and integration test
conducted at this stage.
 After it has been tested by the users also, the Project Leader would hand over the software copy
to the Librarian, who after completing the necessary documentation, transfers the program
into the production environment. This is also known as user acceptance test (UAT)
 No one in the development and testing environments should have access to the production
system.
 Production system is in a live environment and is accessible only by authorized users.
 Under no circumstances, should there be any connectivity between a test server and a
production server.
As already discussed, there are certain incompatible functions which under no circumstances should
be performed by the same individual. The Matrix provided below highlights the functions which
are incompatible and those which are not.
Help Desk Database Network Security Tape
Admin. Admin. Admin. Librarian
Help Desk X X X
Database Admin. X X
Network Admin. X X X
Security Admin. X
Tape Librarian X X X

1.6 OPERATIONS OF CBS BRANCH


A branch in a Core Banking Solution environment is very different from a branch in a total branch
automation system, as explained in detail earlier. Branches in a Core Banking Solution do not have
independent operation in the sense that a copy of the application software or a copy of the data
base of the customer is not separately available in the branch. Branches are connected to the central
data centre, wherein there are separate servers housing the application software, data base as also
antivirus software. Users at the branch have to be created by the System Administrator at the central
data centre after due authorisation by the Branch Manager. Even a Branch Manager will not be able
to create his own user access rights as everything is centralised.
At the Branch all operations that take place normally in an banking environment do take place;
however, all master data are parameterised at the central office e.g., FD rates for various time periods,
penalty, interest payable for premature closure, rates for different loans, interest rates applicable
for staff members for loans and deposits, rates applicable to senior citizens etc., are to be decided
centrally and parameterised at the central office. There is no possibility of any changes being made at
the Branch as they have no rights to do so. There are certain account level parameters like preferential
rates, addresses etc. can be controlled at branch level.

INFORMATION TECHNOLOGY 127


Core Banking Solution
The various staff members operating at the branch have been given access rights by creating a User
ID by the Central Office and also providing an initial password which necessarily will have to be
changed by the individual employees soon after they make the initial log in.
There would be a register maintained at the branches, where in each of the individual would have
acknowledged their user ID and the recommended format for the register would be as follows:

1. Name of the 2. User ID 3. When created 4. When 5. Signature of


Employee deactivated the employee

Maintenance of this register is of utmost importance as it acts as evidence that the respective
employees have acknowledged their user IDs. All the transactions performed during the period
from the time the account was created to the time it was deactivated would be attributable to the
employee in view of the accountability being established, employees would be extremely careful
not to disclose their password or share it with others. The minimum level of controls which needs
to be in operation would include the following:
 A branch should have an extract of the bank’s security policy as applicable to it.
 There should be some evidence of having created awareness amongst the employees regarding
the existence of the security policy of the bank.
 There should be a well written procedure in place to record and document all incidents of
security lapses.
 There should be regular procedures to create basic IT security awareness amongst employees.
Access Control Procedures
 The system should prompt for change of password during the first log in.
 There should be a maximum number (usually 3) of failed log in attempts. The rationale for
this requirement is to prevent multiple guesses being made by unauthorized user
 There should be a procedure for reviving such accounts which should have been deactivated.
 All USB ports, the CD Rom drives should all be disabled. This is necessary to both prevent
unauthorised data or software being loaded and also to prevent any leakage of data and
information. If this facility is not strictly adhered to, the possibility of virus being introduced
into the system is very high & there is a chance of data loss/ leakage to unauthorized user.
Server related procedures
Generally there should be no servers available at the branch. However in some instances a local
server is installed to get over slow connectivity problems. Under such circumstances, the local server
serves as a temporary storage. The discipline connected with the local server is as important as any
server and there should be a specially designated branch system administrator who would be having
a specific password to access the server. A copy of the password should be kept in a sealed cover
under the control of the Branch Manager, so as to enable him to utilize the same should the system
administrator of the branch be not available on any day.
Physical and environmental controls
Moisture and temperature in the room where the server is located should be under control. There
should be no inflammable material stored in the server room. In some instances, it is not uncommon

128 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
to find bundles of paper and some thermo cool boxes being stored safely in the server room which
need to be reused immediately
There should be a fire extinguisher in the room, which should always be in an active condition with
the refills of gas being done at regular intervals or there should be other mechanized process for
extinguishing the fire.
Network related procedures
Network devises like the router, switches and hubs should be secured. Unused routers, switches
and hubs should be protected, if not they could be misused and there could be unauthorised use of
handling the system but also leakage of important data. All network cables should also be protected
properly. There are instances when these cables are running outside the building without being
properly encased. Unprotected cables have the potential for being hacked.
ATMs being attached to the Branches
 ATM cards which are awaiting to be handed over to the customers should be secured with a
lock and key.
 There should be regular reconciliation procedures for the stock of ATM cards.
 There should be procedures to update core banking solutions with details of cards issued to
the customers. This would prevent the possibility of usage of the card before it is issued to the
customers.
 Frauds do occur when ATM cards and Pin mailers are not kept separately & securely. Especially
the ATM cards should be with one officer and the Pin Mailer should be with another officer.
Under no circumstances both the ATM cards and Pin Mailers are kept together. When they are
kept together any employee can pick up the ATM card and a pin mailer with similar address
and try using them fraudulently at the ATM. Such occurrences of fraud have been reported
several times.
 When ATMs are attached to the branch, there should be procedures for loading cash, recording
and reconciliation of cash. The master key of the ATM should be under dual control. The ATM
journal rolls should be stored safely in the branch as they form an important document for
reconciliation purposes & for detecting any unauthorized use/ transaction
 There should be strict procedures for dealing with swallowed card.
 There should be clear procedures for dealing with cash which is in the reject bin.
Business Continuity Planning and Disaster Recovery Planning
 There should be a document detailing the Disaster Recovery procedures as well as Business
Continuity Planning.
 There should be evidence of having created awareness amongst the employees for action to
be taken for DRP and BCP.
 There should be evidence of periodic drills having taken place. This would act as a proactive
control.
 There should be clear documentation and alternate connectivity being established by the banks
with the data centre in case of their being a brake down in the primary connectivity.

INFORMATION TECHNOLOGY 129


Core Banking Solution

1.7 SECURITY AND CONTROLS AT THE DATA CENTRE AND


BRANCHES
Branch
Branches are not generally in a position to generate new reports locally. Only those already provided
in the application would be generated at the data centre. In some core banking environments at the
data centre, there is a server normally referred to as “Report Generating Server”. The CBS application
generates these reports and stores it in the report generation server. The branches have access to
the report generation server and would be in a position to down load the required reports. There is
also a practice of a folder being created for each branch in the report generation server. Evaluation
of security controls are as already mentioned very different from that in a total branch automation
(TBA) environment. In all the reports that may be required for audit is available in the branch for
‘view’ & print only.. Given below is a brief check list for evaluation of security and controls of a
branch in the CBS environment. The various aspects which would be covered are as follows:
1. Information Security Policy
2. Access Control Procedures
3. Procedures connected with branch servers
4. Physical and environmental control for the servers
5. Network & Communication control
6. Limited verification of applications
7. Operations connected with ATM/ Internet Banking
8. Business Continuity Plan
9. Change control procedures
10. Others
In the core Banking scenario, auditors may be given specific access through which he can download
the data as per his requirement and export to a excel sheet for further analysis. In certain Bank,
various other analytical reports are available from data ware house system which takes the data
dump from core banking solution and generates various intelligent reports as per requirements.
Information Security Policy
 Does the Bank have a Security Policy? Is a copy available at the Branch? If the whole copy
is not available at least those relating to the Branch Operations are available? Any job-cards
available?
 Are the employees aware of the existence of the security policy, its contents and the expectation
of the management regarding their compliance?
 Is there any record maintained of any security lapses? Are security incidents reported?
 Are there guidelines available at the branch for reporting such incidents of security handling?

130 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
Access Control Procedures
Password Management:
 Is there a procedure built into the system by which change of password is enforced before
password lapses?
 Does the system ensure that during the first log in the password is changed?
 The original password given is known to the system administrator as he has allotted it. Hence it
is absolutely essential that at the first log in using the default password, the process of creating
a fresh password should be completed. If this process is not in place the sanctity of having a
password is lost.
 Verify the procedure adopted for communicating the user ID to new employees. This is
generally done by e-mail. But it is necessary to have a hard copy and the signature of the
employee obtained on the same.
 Is there a procedure in place to ensure that the account gets locked if wrong password is used for
say three times? This is to ensure that an unauthorised person would not indulge in accessing
the password.
 Verify the procedure in place to revive locked accounts. The locked accounts should be capable
to being unlocked only by the system administrator at the data centre. Or a centralized process
is available to unlock by the same user after authenticating himself via previously set question
answer.
User ID Register
There should be an user ID register (a hard copy) which should contain details of when the user ID
was given and when it was disabled. This information should be signed by the employee. Obtaining
the employee’s signature alone establishes accountability and also the time period for which he has
been using the user ID. In the absence of such conclusive evidence established, fool proof evidence
of accountability in a case of fraud or any other unauthorised activity would be difficult.
Session Activity
Is there a procedure to ensure that a system is not open after a certain period of time? Generally
the session will not be allowed to be idle for more than ten minutes. This is to ensure that when the
session is kept open unauthorised usage will not be made. The users are expected to log off if they
are going to be away from their seats for more than a reasonable length of time.
Disabling the drives
All external drives like floppy drive, CD Rom drives or USB ports should be disabled in all the systems
at the branch. If this procedure is not followed, it is possible both to insert and leak unauthorised
information. More importantly also virus may be introduced.
Server related procedures
In a core banking solution as already mentioned all servers are hosted only at the central data centre.
However, in some cases, for the purpose of operational efficiency, a bank may decide to have a server
installed at the branch. It should be ensured that the contents of the servers are verified. At the most,
it would be acting as an intermediary server to solve connectivity problems. It is not uncommon to
find that when the traffic is slow, band width seems insufficient and processing slows down. Some

INFORMATION TECHNOLOGY 131


Core Banking Solution
banks have a server at the branch for this purpose. In some other cases, at the time of beginning
of the day, the opening balances of the branches are loaded so that if connectivity is lost with the
data centre, the bank will be able to continue with the operations till such time such connectivity is
reestablished.
It should be verified whether there is a specifically designated systems administrator for the server
at the branch. His password should be available in a sealed envelope which can be used by the
Branch Manager in his absence.
Physical and environmental controls
 Ensure that there is some automated system installed to monitor humidity and temperature
in the server room.
 Are there procedures in place to restrict entry only to authorised persons to the server room.
Whether multi factor authentications are in place?
 Is there a register being maintained where the name of the person and his signature and time
of entry to the server room are entered.
Network
 Verify whether all network cables are protected adequately. In some instances, the network
cables may be running on the external walls of the building. In such circumstances potential
for intrusion is very high and communication passing through those cables is insecure.
 Verify that there are no unused ports in router, hubs and switches.
 Unused ports should not be available or if available should be adequately protected. If they
are not adequately protected an unauthorised node could be connected.
Application level verification
 Application needs to be decided to verify whether it permits back dated entries.
 Does the system have built in control which ensures that significant parameters like interest
on deposits, interest on loan are range bound.
 Testing this aspect would ensure that unreasonable parameterization by mistake or intentionally
would get introduced.
 Verify whether application logs are generated. This needs to be comprehensive enough to
provide information regarding user ID for each of the transactions. It should also provide
information as to be able to identify node/machine from each transaction was generated.
Process regarding to ATM Operations attached to the Branch
 Are the procedures for storing the ATM cards secure?
 Are there procedures in place to reconcile the physical stock of ATM cards, eg., a register should
be maintained regarding cards received and cards issued to customers. Cards returned by
customers and balance on hand.
 Is the branch received pin mailers. Generally the mailers should be sent by secure methods like
reputed couriers directly to the customer. Should the Pin mailer and the ATM card be received
at the branch and retained their security is a matter of concern. The possibility of matching the

132 INFORMATION TECHNOLOGY


CBS Basics and Its Working Methodology
pin mailer with the corresponding card by looking at the address could lead to unauthorised
and fraudulent transactions.
 Are there procedures in place to ensure that the pin mailers and cards are under the safe custody
of two different officers?
 Procedures for returned PIN mailer & cards to be verified invariably.
 Are there procedures in place for updating the main core banking system with the details of
the cards issued to the customers?
 It is necessary that this procedure should always be in a set of updatedness as otherwise there is
a possibility of a customer being denied ATM access as the details of his card are not available
in the main data base.
Operations of ATM that are attached to the branch itself
 Verify whether there are procedures for cash loading, recording of cash transactions and a
final reconciliation of the balance.
 Verify whether the ATM master key is under dual control. This is extremely important as
encryption process depends upon the security procedure adopted. The encryption key is
divided into two parts and each of the officers would be able to load only one half. Hence, if
the dual control is effective no one person will know the encryption key.
 Verify the procedures for storing the ATM journals. The ATM journals play a very significant
role in reconciling the transactions which have taken place in the ATM.
 Verify the procedures which are in place for dealing with swallowed cards. Swallowed cards
should be kept in safe custody and after proper scrutiny they have to be returned to the
established owners of the cards or returned safely to the central office.
 Verify the procedures for reconciling the cash in the reject bin.

INFORMATION TECHNOLOGY 133


Core Banking Solution

2
C
H
A
P
T
E
R

LEARNING OBJECTIVES
 Automated Teller Machine (ATM)
 Internet Banking / e-banking
 Real Time Gross Settlement (RTGS)
 Cash Management System (CMS)

2.1 AUTOMATED TELLER MACHINE


Automated Teller Machine (ATM) is a computerised telecommunication devise. Usage of this
facility dispenses with the need for a bank teller. This facility provides a customer to access financial
transactions in a public place. ATMs may be installed within the branches, away from the branches
and at shopping malls also.
The facility of ATMs provided by one bank may be utilised by ATM card holders of other banks
also, who would have entered into an agreement to share such facility.
ATM Card
The ATM card has a magnetic strip. The card contains an unique number and some other security
information apart from date of expiry of the card. The ATM card is issued only to existing customers
of the bank. The customer has to fill up an application form and submit the filled in form to the
branch to which he belongs. The concerned Branch Manager recommends and authorises the issue
of an ATM card by forwarding the application to the Central Office which deals with the issue of
ATM cards.
In view of the severe competition now almost all the banks provide to their customers soon after
they open an account with the facility to perform internet banking and possess an ATM Card.
Procedure for issuing ATM Cards
At the Central Office, there is a specifically designated computer system which has specific software.
The application form received from the customer is the input for the process and the output consists
of a file containing data for the preparation of a ATM card. The software checks whether the customer
details provided in the application tally with the data contained in the Central Data Base of the Core
Banking Solution. Only after the details tally, the output file is generated. The Personal Identification

134 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls
Number (PIN) is generated by the software and directly sent to equipment for printing the Pin Mailer.
It is to be noted that the PIN generated is not stored in the memory of any machine.
As a concurrent process, a natural PIN is generated and stored in the data base of the ATM switch.
ATM switch should not be confused with normal switches.
ATM switch is a computer with a server attached to it. Data base resides on the server.
Natural Pin
There are different methods of generating a natural PIN. The natural PIN is a number. One of the
methods adopted is to encrypt the card number. After encryption, the encrypted value of the card
number is obtained. This encrypted value is decimalized which in turn will produce a number with
several digits. The first four digits of the above number is called natural PIN. The natural PIN (the
first four digits of the above mentioned number) is deducted from the PIN value. As mentioned in
the earlier paragraphs, the PIN number is generated even while preparing a file for preparation of
ATM Cards. The value of the natural PIN is deducted from the PIN value which gives the offset value.
PIN No (-) Natural Pin (=) offset value.
It will thus be observed that every time the value of the natural PIN is added to the offset value, the
PIN of the customer is generated. It is important to note that the PIN number of the ATM customer
is not stored in any ATM machine or ATM switch. Only the offset value is stored and only the
customer knows the PIN number. The PIN is communicated to the customer by means of delivery
of a cover which contains the PIN mailer. As we all know neither the PIN mailer nor the ATM card is
sent through ordinary mail but only through trusted couriers. It is a good practice to send the ATM
cards to the concerned branches and the PIN mailer by courier to the customer directly.
ATM Operations
The ATM generally performs the following functions:
(a) Cash Withdrawal
(b) Balance Inquiry
(c) Registering requests for cheque book
(d) Changing of PIN number
A sample of the ATM network would be as shown in the fig 2.1.1 below:

INFORMATION TECHNOLOGY 135


Core Banking Solution

Fig. 2.1.1. ATM Network Structure


All the ATMs of a particular bank are connected to an ATM switch of the bank and the ATM switch
in turn is connected to the server of the bank by means of internet connection. The ATM switch is
not like other switches; but it is a server. There is an operating system residing in the server.
ATMs may also be connected to the switch by means of a leased line or dial uip line.
A single data base of all the customers of the bank resides in the Central Data Base at the Data Centre
of the Bank. The data base itself resides in the data base server to the Data Centre.
Functioning of the ATM
 The customer swipes his ATM card and information provided in the magnetic strip is read by
the machine.
 The customer has to key in his Personal Identification Number (PIN), which he has received
by means of PIN mailer sent by the bank
 The PIN entered is immediately encrypted by the machine called the PIN machine. Sometimes
this process is also achieved by means of the software which resides in the ATM server. The
encryption may be done by means of a hardware or software. When it is done by the hardware,
there is a hardware security model (HSM); if this is done by software, there is a Software
Security Model (SSM). HSM or SSM encrypts the PIN entered by the customer by means of an
encryption algorithm. This algorithm is loaded into the machine by the officers of the bank.
As it is necessary to ensure security, the loading process is done under dual control by two
officers each loading one half of algorithm.
 When the account number and PIN provided by the customer tally with the data available at the
data base of the switch and PIN generated by the PIN machine the customer is authenticated;
it means that the customer has been recognized as a genuine customer of the Bank.
136 INFORMATION TECHNOLOGY
CBS Interfaces their Functionality and Controls
 It will be observed that loss of ATM card alone is not a matter of concern such as losing both
the ATM card and the PIN information
 Once the customer is authenticated the process requested by the customer is initiated, e.g., the
customer has asked for cash withdrawal. This request for withdrawal of cash is passed on to
the data base of the bank, which is available in the data base server at the central data base. At
this juncture, the system verifies whether the customer has adequate balance to enable him
to withdraw the cash required. Once it is ascertained that adequate balance is available, the
ATM switch which receives the information authorises dispensation of cash required at the
ATM machine.
 The activity of the cash disposal is facilitated by the ATM switch. The cash is then picked up
by the customer.
 After the cash has been dispensed and the customer has picked up the cash, the ATM switch
communicates with the Central Data Base server so that the cash withdrawal is recorded and
the balance is accordingly reduced.
At the ATM: Cash journal and the ATM log are generated recording the process which has taken
place. There are also electronic journals which are generated at the ATM. When ATMs are located
in remote places, the information with the electronic journal can be retrieved by a process called as
Electronic Journal Pulling.
 As we all know, there are arrangements between banks by which ATM card of one bank can be
processed at the ATM kiosk of another bank. This process is possible within the banks which
have entered into an agreement to this effect. The process that follows when the ATM card of
a different bank is swiped at the ATM kiosk is slightly different. As the ATM card of another
bank is swiped, the information regarding the bank and the customer number are available
to the ATM. The information so obtained is directed to the ATM switch of the other bank. The
process thereafter is similar to the process discussed in the above paragraphs.
 It is possible that a customer did not or could not collect the cash dispensed by the cash
dispenser. In such a case, the cash dispensed would be collected in a secure tray for collecting
rejected cash. Also the fact that cash was not collected would be reported by the ATM to the
switch. The switch in turn would request the host computer for reversal of entry. This would
result in the original debit entry passed at the central data base being reversed so that the
customer is not debited with an amount he did not or could not collect.
 The switch and the host computer log all the events, thus facilitating reconciliation of cash and
entries.
In view of the facility of the usage of ATM card of one bank in another bank’s ATM kiosk there are
certain other factors of importance. The cash is dispensed by one bank on behalf of another bank. As
this operation takes place in all the banks, there is a process of reconciling these cash transactions,
so that the respective banks are reimbursed with the net amount due to them.
Verification of the PIN
The customer enters his PIN and there is a process which takes place before the PIN is accepted and
authentic by the machine. The various steps are as follows:
1. The customer inserts the card and thereafter types the PIN.

INFORMATION TECHNOLOGY 137


Core Banking Solution
2. The encrypted PIN is sent to the ATM switch.
3. The details of ATM card issued are already in the data base and when the ATM card is inserted
the machine verified to see whether the number is in the data base and satisfies itself of its
existence.
4. From the card number natural PIN is generated. As already discussed natural PIN is generated
by decimalizing the encrypted value of the card and considering only the first four digits
represent the natural PIN.
5. (a) The difference between the actual Pin and the natural PIN is stored in the ATM switch as
an initial step. Subsequently whenever the customer inserts his ATM and keys his PIN
in the machine, the correctness of the PIN is verified by the system by adopting a process
as described below: The system has stored the offset value (offset value is the Difference
between the actual PIN and the natural PIN)
(b) When the card is inserted, the card number is encrypted by the HSM or the SSM. The
encrypted value is decimalized and the natural PIN is obtained (which is the first four
digits of the value obtained by encrypting the card number and decimalizing the same).
6. This value of the natural PIN obtained is added to the offset value available already in the
system. At this stage, the relevant PIN is generated within the system.
7. The generated PIN as described above is compared with the PIN typed by the customer; if
they tally the customer is authenticated.
Knowing the PIN alone will not facilitate a person to access the ATM facility. It is a combined effect
of the ATM card and the PIN which permits access to the ATM.
Change of PIN
Just as there is a facility for an user of a computer to change his password, it is admissible and possible
for an ATM card user also to change his PIN. This may be done for security reasons. The process of
changing the PIN is as follows:
On the key pad at the ATM, there is a key ‘Change No.’ when this key is pressed the ATM will ask
for the old PIN. The customer is to key in his old number and then only key in the new PIN number
he proposes to have. By making use of the process of generating the natural PIN and summing it
up with the card number, the ATM will be able to arrive at the old number and satisfy itself that the
person who wants to change his PIN is an existing customer, who has been given an ATM facility.
After thus satisfying, the machine permits the customer to enter his new PIN. As the natural PIN is
already available the new offset value is computed and stored. The old offset value is erased. For all
future operations making use of the natural PIN and the offset value available, it generates a new
PIN with which it able to compare the PIN keyed in by the customer. It is important to note that
nowhere in the system is the PIN stored. There is only a process of computing PIN corresponding
to the ATM card inserted.
Normal operational problems faced with the ATMs
 Cash may not be sufficient. There may be a sudden overdraw of cash contrary to expectations.
 The journal paper roll might have been exhausted and a refill may not have been placed.
 If the network connection is lost or there is some other operational problem, the ATMs may
not function.

138 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls
 There is a monitoring facility available with the Bank by which information is available as to
which ATM has stopped for what reason.
It is possible that a card holder by mistake may key in a wrong PIN. The ATM machine will not give
him right to access. Generally all ATMs permit only three chances to commit mistakes and should
a fourth attempt be made, the card will be rejected.
It is also possible that the card may be stolen. The owner of the card might have instructed the
bank to hot list it. Hot listing is similar to countermanding of a cheque. If a card which is hot listed
is inserted into an ATM, the machine will swallow the card thus preventing the usage of the card.
Evaluation of Control of ATM Operations
As already discussed, there are various processes in ATM operations and it is absolutely essential
to evaluate the adequacy of controls in each of these areas. In the paragraphs to follow, the controls
which have to be in place in the different operations are discussed. The different heads of operations
are:
1. Card and Pin generation
2. Method of dealing with surrendered and captured cards
3. Security of the PIN
4. Control over cash
5. Minimum records to be maintained for transactions
6. Method of dealing with lost and stolen cards
7. ATM switch operations
For evaluating adequacy of controls one should be aware of what controls need to be in place.
Card and Pin generation
 There should be separate departments and members of staff for card and pin generation.
 The pin mailer tape should have card and account number
 There should be reconciliation procedure for the number of PIN mailer and cards produced.
 This should take into account not only the number of cards and pins produced but also those
spoiled.
 There should be adequate security procedures for
(a) Access to the building
(b) Stock of blank cards
(c) Stock of live cards and pin mailers
 The pins on the tape should be in an encrypted state.
 Live cards and pin mailers should be dispatched separately from different locations eg.,
(a) ATM card should be dispatched from the Branch and
(b) Pin mailer should be dispatched from the Central Office.

INFORMATION TECHNOLOGY 139


Core Banking Solution
 There should be proper records for all delivered cards.
 The returned cards and returned pin mailers should be with two different officers. This
procedure is extremely important to avoid any fraud being committed by a person picking
up a card and the corresponding pin mailer. This could be easily done with reference to the
address being the same on both.
Surrendered and Captured Cards
 There should be clear documentation regarding surrendered and captured cards.
 There should be documentation for issuing replacement for cards and pin numbers.
 There should be procedures for making the captured cards ineffective either by the card holder
or by the bank.
 Instructions should be in place to inform the customer that the pin mailer should not be returned
to the bank.
 There should be a register maintained for all surrendered cards. The captured cards in the bin
should be opened in the presence of two officers and details thereof entered in a register duly
signed by both of them.
 The journal roll at the ATM would also be recording details of the captured cards. The captured
cards should be removed on a regular basis and reconciled with the journal roll.
 The host computer at the data centre should be producing a report on the captured cards.
 There should be clear procedures available for reissue of cards or change of the PIN numbers.
 There should be a control procedure by which the ATM swallows the customer’s card after
the customer has made three failed attempts to key in the correct PIN number.
Security of the PIN
There should be a procedure in place to stop the card operation, when the card holder reports to the
bank that his PIN has been compromised.
The customer should be advised never to disclose the PIN number to any other third party including
the Police.
 There should be procedures in place for generating a new PIN number on a timely basis should
the PIN be lost or stolen.
 PIN number should be held in data files only in a encrypted from.
 PIN offsets also should always be encrypted.
 There should be a process in place for either hardware encryption or software encryption
(HSM - Hardware Security Model and SSM - Software Security Model).
 There should be procedures in place by which all work and storage areas used for PIN
encryption are zeroized after each calculation.
 There should be no hard copy available in the system of records of PIN produced.
Control over Cash
 There should be documented procedures for cash control and balancing process.

140 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls
 Data roll should automatically record all insertion and withdrawal of cassettes.
 There should be records indicating amount of cash inserted into each cassette.
 The Bank staff should reconcile duly the following:
 (a) Cash inserted
(b) Cash dispensed
(c) Cash remaining
(d) Miffed notes
 There should be a procedure to monitor all discrepancies reported.
 Individual responsibility for the reconciliation should naturally be a person different from the
person responsible for the maintenance of cash.
 There should be a procedure to ensure that wrong denomination notes are not inserted into
the cassettes.
 Daily balancing process should ensure that:
(a) The currency deposited and dispensed should agree with the ATM cumulative total;
(b) The total of the deposit and withdrawal transactions generated by ATM should also be
logged by the host computer and the branch System.
Minimum records to be maintained for transactions
 There should be a journal roll fitted to each ATM. The journal roll records all events at the ATM
and hence is of great importance.
 Hard copies of the journal should be preserved securely.
 There should be a built-in procedure to have a soft copy of the journal.
 The soft copy is also called an ‘Electronic Journal’. It should not be possible to modify the soft
copy. The soft copy should be stored securely.
 Only the authorised key holders should be permitted to make weekly check of the journal
roll machine record. Verification by the of the record would disclose if there had been any
unauthorised opening of the ATM or any operation removal of cassettes.
Standard methods of dealing with Lost and Stolen Cards
 There should be documented procedures to be followed to deal with stolen /lost cards.
 An up-to-date file containing all details of reported lost and stolen cards should be available.
 The access to this file should be restricted.
 There should be a facility to immediately identify when a stolen or lost card is used.
 There should be a trigger to reject the transaction or capture the card.
 Even when instructions to stop usage of ATM cards are given verbally there should be provision
to take action against the same.
 There should be a written notification from the card holder about his card being stolen or lost
and then only a replacement card issued.

INFORMATION TECHNOLOGY 141


Core Banking Solution
 There should be a policy in line with legal provisions relating to the liability for withdrawals
made prior to and after notification of a card being stolen or lost.
 All reports regarding lost and stolen cards should be retained for a reasonable length of time,
ATM Switch Operations
As already mentioned ATM switch consists of a computer with a server attached to the same. Details
of the ATM card holders is available at the data base, The details would include
(a) Card No. and corresponding offset value (offset value has already been discussed earlier)
(b) Details of hot listed cards
(c) Details of surrendered cards and
(d) Account balance of customers. (This account balance is also called positive balance file - PBF.
This is made available at the ATM switch. Even when the ATM is offline, the balance of the
customer is available.
The important control points to be reviewed for audit purposes would include the following:
 There should be a Security Guard as also a CCTV (Close Circuit Camera)
 A register should be maintained at the entry point.
 The server has an operating system. The settings of the operating system need to be reviewed
to ensure it is in line with the best practices.
 Only the Systems Administrator and none else capable should be capable to access to the
operating system.
 The ADMIN Password should be kept secure.
 The application software, which is in the switch, has details of the maximum number of
withdrawals per day, the limit for the withdrawal, number of failed attempts etc., these are
parameterized.
 The procedure for configuration the parameter should be reviewed.
 Only an authorised person should be capable of making these modifications.
 Procedures in place for key storage should be reviewed. Security of key used for encryption
and decryption purposes should be evaluated.
 Review of procedure for hot listing of ATM cards needs to be reviewed.
 Examination of the types of logs that are generated and review of such logs is important.
 When there is an agreement with other bank’s for usage of their ATMs such agreement should
be reviewed especially with reference to customer claims for “money not received but account
debited”.
 Very importantly, review should be undertaken of procedures in place to deal with another
bank / branch reconciliation.
 Any undue delay in reconciling these may give rise to mushrooming of unauthorised entries
getting masked in the account

142 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls
2.2 INTERNET BANKING
Internet Banking refers to banking transactions routed through the Internet. This facility permits
registered customers of the bank to perform banking operations at any time of the day from any
computer - now it may also be possible to do it from a cell phone.
No doubt, Internet Banking facilitates banking through the medium of internet. However, it also
needs specialized software and hardware. The internet as you all know is a public network. Hence
proper security features are built into the system to maintain confidentiality and integrity of the
data that is being transferred through the internet.
Some Banks provide this facility automatically soon after a customer opens an account with them.
Some others require a special request from the customer to provide this facility.
However, whatever be the method of providing internet facility, there is a process to be followed.
Process
The main components of Internet banking system consist of Web Server, Internet Banking Application
Server (IBAS), Internet Banking Data Base Server (IBDS), Middleware, and Central Data Base Server.
We give below a broad Data flow diagram describing the Internet Banking Process.:

Customer Web Server IBAS IBDS Middleware Central Database


& Web host Server
Customer using Internet Internet
a browser such as Banking Banking All data to and
Internet Explorer application Database from the Core
to access the Web Server Server Database server
is scann ed by
Firewall
De-Militarized Zone (DMZ) Trusted Inside Zone

Web host is a system that has an operating system and runs the services from the Web server. All data to and from
the Web server are scanned by the Firewall as shown in Fig 2.2.1(A) and Fig 2.2.1(B)

INFORMATION TECHNOLOGY 143


Core Banking Solution

Fig 2.2.1(A): Broad Data flow diagram describing the Internet Banking Process

144 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls

Fig 2.2.1(B): Broad Data flow diagram describing the Internet Banking Process

INFORMATION TECHNOLOGY 145


Core Banking Solution
The customer applies to the bank for such a facility. He is provided with an User ID and Password.
As is he best practice the password is expected to be changed soon after the first log on.
 Internet facility could be used only by accessing the website of the bank. For accessing the
website, naturally a browser like internet explorer is used.
 The website is hosted in the web server. The web server is in the central data centre of the bank.
Access to the web server is permitted only to authorised users.
 To protect the web server from unauthorised use and abuse, the traffic is necessarily to go
past a firewall. The firewall is designed in such a fashion that only traffic addressed to the web
server through the authorised port is permitted.
 An individual who accesses the website of bank through the browser will be able to access
the web server and there will be a display of the bank’s web page on the screen of the client’s
computer.
 The web page will also provide all information generally of interest to the public. The web
page also will have a specified area wherein a mention of user ID and password will be made.
Those who have been provided with the user ID and password would be expected to enter
the same.
 As we are all aware, the password will not be displayed in plain text but will only be in an
encrypted form.
 The web server forwards the customer details to the internet banking applications server which
in turn accesses the IDBS. The server has already the data base of all the customers who have
been provided with internet banking facility. For each customer, it would be having details
about user ID and password.
 The information received from the web server is verified with the data of the customer held
in the internet banking (IBAS).
 Should the information not tally, the message ‘access denied’ would appear giving the reason
giving the ‘user ID wrong / password wrong’. The customer realising the mistake may rectify
the mistake and make another attempt. Normally three such attempts would be permitted.
After three attempts, the customer will be logged out for security reasons. If more attempts
are permitted, there is a possibility of a person just trying out different combination of user
ID and password to break into the system.
 Based on the authentication check, the IBAS sends an acknowledgement to the web server.
The web server displays the message. Once the authentication process is completed correctly,
the customer is provided internet banking facility, which would include:
(a) Password change
(b) Balance inquiry
(c) Fund transfer
(d) Request for cheque book
(e) Stop payment
(f) Copy of statement of account and
(g) ATM / Credit Card related queries
146 INFORMATION TECHNOLOGY
CBS Interfaces their Functionality and Controls
 The customer then chooses one of the services from the list. The service requested is directed
by the web server to the IBAS for processing. The IBAS will access the internet banking data
base server for further processing.
 The IBDS will retrieve the data from the central data base server. The IBDS will be able to
access the central data base server only through a middleware and firewall. The middleware
is expected to convert the data to suit the requirements of IBDS.
 Internet banking data base server then forwards the customer data to the IBAS which processes
the transaction eg., The statement of account from the central data base server is made available
to the internet banking data base server (IDBS). The IBDS then sends the data to the IBAS. The
IBAS then sends the same to the web browser (internet explorer).
 The web server generates a dynamic web page for the service requested eg., the accounts
statement generated by the web server and presented to the internet explorer (say) the
information is provided to the web browser in an encrypted form.
The customer would be able to get the service required eg., viewing of the statement of account or a
screen made available for him to request for a cheque book or instructions for ‘stop payment’ etc.,
After the services provided, the explorer may choose to log out.
Depending upon the software, the customer may be permitted to request for more than one service
in one session. Some software would automatically log out the customer after one service has been
completed and expect him to log in again.
It needs to be emphasised that security is a serious concern in internet banking and should be
implemented with great care.
The security concerns could be:
(a) Privacy issues - customers being able to view accounts other than their own.
(b) Wrong or fraudulent fund transfers. The transfer requested by the customer may be executed
wrongly i.e., instead of one account being credited or debited, a different account may be
accessed.
(c) This weakness could be exploited by customers with fraudulent intentions by making
unauthorised access to certain customers’ accounts and transferring to their account.
PROCEDURES FOR EVALUATING CONTROLS
In any process of evaluation of controls, one needs to be aware of security concerns in an environment.
Main security concerns in Internet Banking are:
 Unauthorised access to any of the access points
 Incomplete or inappropriate procedure regarding identification of user.
 Lack of segregation of duties in the operation facilities, applications and data.
 Roles and responsibilities of system administrator not clearly defined.
 Firewall not clearly configured and monitoring procedures absent / inadequate.
 Absence of segregation of lives and test environments.
 Inadequate network security.

INFORMATION TECHNOLOGY 147


Core Banking Solution
 Routers improperly positioned.
 Inadequacy of security of web server.
 Inadequate security of Internet Banking system.
 Inadequate security of Data Base System.
 Insufficient built in Application Controls.
 User authentication.
 Incomplete and cancelled transaction.
 Insufficient data security.
 Informal / unstructured change management procedure.
Broadly, the audit program should be on following lines
1. Security Policy
Verify whether there is a written Internet Banking Security Policy – which should include firewall
policy and access policy. Overall policy guidelines should be documented and available. It should
cover policy and procedures for all access points to the Internet Banking system.
The access points should include:
(a) User System.
(b) Front end application.
(c) Router, switch, firewall.
(d) Application Server.
(e) Web Server.
(f) Database Server.
(g) Network.
(h) Infrastructure of Internet Banking.
2. User Identification
Unauthorized access to other customer accounts will amount to violation of privacy rights.
Existing security mechanisms should be verified to ensure this requirement. Even weak password
could lead to security lapse.
 Internet Banking Application Program should be accessible only to authorised users. In the
absence of such discipline, unauthorised changes could be made to application program.
 There should be adequate logs maintained to provide monitoring facility.
 Any attempt at penetrating the network should be proactively detected by installing Intrusion
detection / prevention systems.
 There should be provision to automatically log such attempts and these logs should be reviewed
on a daily basis.

148 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls
3. Access Control to Operation facilities
(a) There should be adequate segregation of duties. Incompatible functions should not be
performed by the same individual.
(b) There should be a procedure in place to ensure that soon after an employee designs his user
ID and password are revoked. His logical access should be denied.
4. Roles and Responsibilities of System Administrator
System administration is a sensitive function and should be allocated to a specific individual. He
needs to have access only to perform system administration function. There should be built in control
to report by means of a log if he performs any other function.
5. Firewall
It has to be ensured that internet banking services is only through a dedicated Firewall.
Periodically penetration tasks (tests to unauthorized enter the network) should be performed to
ensure it is not possible
If vulnerabilities are highlighted it should be verified whether immediate corrective steps have
been taken.
There should be approval from appropriate senior management before firewall, routers and other
associated systems are changed or upgraded.
6. Segregation of Live and Test Environments
Like in all Computer Systems, test environment should be separate from live environment. No
testing should be done in the live environment. Live environment is the environment where the live
program is running. Such a program would have been thoroughly tested and moved under proper
authority from test environment to live environment.
7. Network Security
There should be adequate control mechanism in place to ensure that access to both in and out of
internal network are controlled.
Review whether there is any provision (usage of tools) to monitor suspicious activity.
8. Router Configuration
Routers should be properly configured to ensure that network is restricted to only necessary systems
and none else.
9. Web Server Security
Web Server should run only required processes and none else. The Web Server would have its own
operating system (e.g., Windows 2003) and it should be ensured that all security settings of the
operating system are in order.
10. Security of Internet Banking System
A list of authorised users should be maintained and the system should not allow access to any other
user.
Internet Banking system configuration should be well documented.

INFORMATION TECHNOLOGY 149


Core Banking Solution
There should be adequate controls in place to ensure that integrity and security of transactions are
not affected.
11. Data Base
Data Base should be accessible only to the Computer application in the normal course. In addition
Data Base administrator has access for maintenance. There should be a log generated if any other
access has been made.
Personal Identification Number (PIN) of clients which will be stored in the Data Base should be
only in encrypted form.
12. Operational Controls - Built in Controls
Application should have been tested extensively so that all validity criteria are complied with before
a transaction is processed.
13. Operational Controls - User Authentication
User authentication mechanism should be in the place to ensure access is restricted to authorised
personnel.
14. Operational Controls - Incomplete and cancelled transactions
Procedure for incomplete processing needs to be reviewed. Special attention needs to be paid to
study the possibility of a client canceling a transaction which has been entered. E.g., Fund transfer
might have been entered and authorised - whether system will permit reversal - needs to be studied.
Operational Controls - Data Security
Key management procedures (for encryption) in place must be in line with best practices (Dual
control)
Review whether critical data like PIN encryption keys should be stored in a physical environment e.g.,
in a physically secure hardware like HSM (Hardware Security Model). There should be satisfactory
restart and recovery procedures in place.
Review application testing procedure for its adequacy i.e., conforming to best accepted procedures.
15. Change Management Procedure
Ensure there is a formal procedure in place for change management. Special attention needs to be
paid for Emergency Procedures..
16. Library Procedures
Documenting and numbering of different version of programs, storing safely different version of
programs, moving program from test environment to production environment etc. needs to be
reviewed for their adequacy and conformity to standard procedures.

2.3 REAL TIME GROSS SETTLEMENT


The acronym RTGS stands for “Real Time Gross Settlement”. RTGS system enables transfer of money
from one bank to another on a “Real Time” and on “Gross” basis. Real time means that the transactions
are settled as soon as they are processed. There is no waiting period. Gross settlement means that
this transaction is settled on a one to one basis. There is no bunching with another transaction. The
money transfer takes place in the books of the Central Bank of the country - Reserve Bank of India

150 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls
in our country. As the money transfer takes place in the books of the RBI, the payment is final and
irrevocable.
Difference between Electronic Fund Transfer System (EFT) or National Electronics Fund Transfer
System (NEFT) and RTGS:
EFT and NEFT are also electronic fund transfer modes. However, they operate on a Deferred Net
Settlement (DNS) basis. In DNS basis transactions are settled in batches. Transactions which take
place after a particular settlement time would have to wait till the next designated settlement time.
In RTGS, transactions are processed continuously throughout the RTGS business time.
RTGS system is primarily for large value transactions. As of now, the minimum amount to be remitted
through RTGS is Rs.1.00 lakh and there is no upper ceiling. In EFT and NEFT systems, there is no
stipulation regarding the minimum and maximum amount. The time taken for the transaction to be
effected would be within two hours. The beneficiary bank (Bank which is receiving the amount) has
to credit to the beneficiary’s account within two hours of receiving the fund transfer message. The
remitting customer would receive an acknowledgment for the money credited to the beneficiary’s
account as the remitting bank receives a message from the RBI that the money has been credited to
the receiving bank.
However, if the money is not credited for any reason, the receiving bank would have to return the
money to the remitting bank within two hours. The remitting bank would in turn reverse the original
entry - the debit entry in the customer’s account.
The essential information that the remitting customer would have to provide to the bank for the
remittance to be effected are:
(a) Amount to be remitted
(b) His account number
(c) Name of the beneficiary bank
(d) Name of the beneficiary customer
(e) Account number of the beneficiary customer
(f) Sender to receive information if any and
(g) IFSC Code of receiving branch (IFSC stands for Indian Financial System Code. (Explained
later in the Chapter)
The beneficiary customer would be able to obtain the IFSC Code from his branch. This information is
also available in the cheque leaf. The beneficiary can inform the remitting customer details regarding
Code number and Bank branch.
Most of the Banks are providing RTGS service. The latest list of such branches is also available in
the RBI Website.
Procedure for tracking the remittance transaction
Some banks which have the internet banking facility provide the service on line. The remitting
customer would be able get confirmation from his bank either by e-mail or SMS on the Mobile
phone.

INFORMATION TECHNOLOGY 151


Core Banking Solution
Real Time Gross Settlement Process
The Banks which wish to be recognized for RTGS processing need to apply to the Reserve Bank of
India to be recognized as participant banks by the Reserve Bank of India. The various steps involved
in the transaction processing of RTGS are as follows:
 The customer, who wishes to remit from his account in Bank A to the recipient in Bank B,
approaches Bank A.
 The transaction is entered in the client machine at the Bank A.
 The client machine is connected to a server.
 Each of the participants Bank is allotted a code number.
 This code number is called Indian Financial System Code (IFSC).
 Each of the branches of the participant bank of RTGS is allotted a unique code (RTGS Branch
Code).
 A combination of these two codes referred to, act as the identification.
R.T.G.S. Technical Environment
The Diagram below explains the functional architecture of Next Generation Real Time Gross
Settlement System, (NG-RTGS) as shown in Fig. 2.3.1

Fig.2.3.1: Functional Architecture of NG-RTGS


Features of NG-FTGS
 Interface with RBI’s CBS
 STP capability with Ancillary systems

152 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls
 Advanced MIS tools for report generation
 Scalability of system, including efficient and optimal threading time for transaction and
capability to handle large volume of transaction
 Flexibility to add new transaction types and participant membership types
 Future value date settlement
 Balance status enquiry from central system
 Compliance to international standards including Core principles for SIPS issued by BIS
 Multi currency system
 Extended business hours
 Centralized Anti Money Laundering filtering
 Monitoring and control of payment messages

Fig 2.3.2: Communication Channels

INFORMATION TECHNOLOGY 153


Core Banking Solution

Fig 2.3.3. Design Architecture

Fig 2.3.4: Settlement Account Structure

154 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls

Fig 2.3.5 RTGS External Interfaces


Alerts
 Alerts are predefined, parameterized notifications generated by the NG-RTGS automatically
and sent to the Participant users.
 Format:
 Visual, audible or pop-up window: delivered only to the users logged in to the Web interface
of the NG-RTGS.
 Email: delivered by email to the address specified in the user’s RTGS profile
 Sample alerts:
 User account was blocked due to repetitive failed login attempts
 System’s timetable has been updated by the RBI
 Suspicious high amount transaction was received by NG-RTGS
MIS Reports
 Generated automatically, at predetermined moments (e.g. EOD)
 Ad-hoc, upon user request
 Format:
 XML (ISO camt.053), PDF, Excel (CSV).
 Availability:
 Online, as file download from the central NG-RTGS

INFORMATION TECHNOLOGY 155


Core Banking Solution
 As email attachments for EOD statements
 Content:
 Analytic reports of the RTGS activity: summary of the transactions, net position, chargingreports
etc.
Benefits of new messaging System
 The standard supports end-to-end inter-operability.
 ISO 20022 is more powerful to represent complex data structures (because of its modeling
approach and XML data representation.
 It offers synergies with other payment instruments and markets allowing for convergence
into a single platform.
 It reduces the impact of proprietary technology.
 It is independent of transport mechanism
 It allows easier adoptability to payment system participants to connect to their varied functional
systems & channels with low investment.
 Availability of and access to growing pool of technical resources and expertise on technologies
used in the standard.
 ISO 20022 enables use of inexpensive and widely available tools for basic data manipulation
& simplifies integration with XML enabled applications and processes.
 Majority of format & business validations can be implanted inside ISO 20022 thus minimizing
application level coding requirements.
 XML approach allows incremental expansion for scope as and when new business case arrives
with no changes to the processing system to accommodate or validate the message
 It helps improve straight through processing.
 It reduces the impact of maintenance.
 Standardized validation processes.
 Faster and more flexible development if messages needed to be extended.
 Standardized status & error codes.
 End-to-end customer references (with more characters than are used today).
 Fewer processing errors, due to consistent formatting standards.

156 INFORMATION TECHNOLOGY


CBS Interfaces their Functionality and Controls

Fig.2.3.6: Message transformation in NG-RTGS


SMS securities settlement scheme
In the initial days of RTGS, transactions were manually keyed into the member institutions account
system and into the RTGS system. These two independent manual operations often led to data
inaccuracies. But today many member institutions have implemented Straight Through Processing
(STP) modules. STP implies that the member institutions software system and RTGS software talk
to each other through defined interfaces. As a result it is sufficient if data is entered in one system
only and it automatically flows into the other. Thus an outward remittance transaction is entered
into the member institution’s system (say, a Bank’s Core Banking System) and it is automatically
processed and posted into the RTGS PI. Similarly an incoming remittance transaction automatically
flows from the RTGS PI to the member institutions accounting system.
A special feature of STP is that Uniform Transaction Reference (UTR) number for any outbound
RTGS transaction is generated by the STP system. However, such a message has to be necessarily
routed through the RTGS Member’s PI to RBI’s IFTP system.
Obviously STP system requires that the member institutions internal processes and back office
functions are robust and reliable. Incidentally some of the big banks now allow their customers to
initiate an RTGS remittance transaction through the bank’s Internet Banking facility also.
Important Security Features of RTGS
Unique Transaction Reference (UTR) Number:
Every message, sent by the member bank to the RTGS system is allotted a Unique Transaction
Reference (UTR) and this number is embedded in the RTGS message itself. This UTR is used by
the parties to identify the transaction among them for any enquiry / investigation / complaint. A
message without a UTR will be rejected by all systems forming part of the RTGS.

INFORMATION TECHNOLOGY 157


Core Banking Solution
Also every message released by the member bank to the RTGS system will be assigned a Sequence
Number (SN). The Sequence Number (SN) is continuously incremented with every message.
Therefore, any message, received at the RTGS system with a SN, which is not the next expected SN
from the concerned member bank, will be rejected by the RTGS System.
Handling Duplicate Messages:
If the RTGS system receives a duplicate copy of an earlier message (i.e., two messages with the same
UTR and contents), then it will be treated as a duplicate. It will not be processed by the RTGS System.
In case a response to the earlier message had already been sent, then the same response will be sent
again. Also the response will be marked as a potential duplicate emanation.
On the other hand, if the contents of the duplicate message (i.e. message with the UTR as an earlier
one) are difference from those of the earlier message, then the RTGS system will consider the situation
as a breach of security and will disconnect the PI associated with the duplicate message. However,
such situations are rare.

2.4 CASH MANAGEMENT SYSTEM (CMS)


Cash Management System (CMS) is a new product developed by banks. The objective of the product
is to meet the needs of the customers who have operations all over the country. Such organizations
would naturally have collection and payments in various locations.
In the normal course, cheques would be collected in one single location and then deposited in the
main branch. This causes cash flow problems as there is uncertainty regarding the dates when the
cheques would be realised. In view of this uncertainty both scenarios of excess cash and deficit cash
were arising. As in receipts by way of cheques a similar situation arises when a high volume of
disbursement has to be made e.g.,
(a) Salaries for the different branches
(b) Dividend payments.
To get over these problems of cash management and to make the process of cash management
effective, banks have introduced this new product - CMS. The broad features of CMS are as follows:
 Multiple collection centres have been authorised to receive the cheques / drafts of the
customers.
 It is not necessary to open a separate account in each of these centres.
 At the client’s main account which is maintained at the pooling centre credit is offered on the
same day for all the cheques / drafts deposited and cleared at the branches.
 The product also provides Management Information System to customers providing details
location wise and also party wise.
 If necessary, information can even be provided by e-mail.
Evaluation of Controls of CMS:
Parameter settings (Master Settings): There needs to be adequate controls over parameter settings,
authorization as also modification of such settings. E.g., Parameters would include:
(a) Clearing cycle
(b) Credit limit
158 INFORMATION TECHNOLOGY
CBS Interfaces their Functionality and Controls
(c) Charges (various slabs)
(d) Interest ( “ )
Processing Charges: When the bank offers CMS product to the customer, naturally there are
associated charges for the same which would include:
(a) DD / Pay Order issue charges
(b) Courier Charges
(c) Cheque return charges
(d) Interest charges for credit offered.
There needs to be a process logic for computing the various charges. Any defect in the logic would
lead to income leakage. While evaluating the controls, it is necessary to verify the correctness of the
parameters and also test the program logic. It is important to verify the authorization process for
creating and modifying parameters.
In certain circumstances the customer may be offered a credit limit which exceeds the sanctioned
limit. This can be done only under proper authorization. Aspects of this nature need to be verified
at the time of performing the audit.
End of Day Processing
The various amounts collected and different amounts disbursed are all pooled in a designated
account. There needs to be a control to ensure the accuracy of such pooling.
The CBS product is interfaced with the core banking solution. The charges and other items need to
find a place in the general ledger. Mapping of entries need to be verified. It should also be verified
whether there is a built in control to prepare an exception report in case of apparently wrong entries
e.g., collection charges being credited. Normally the CMS product provides various audit trails
which include listing of parameter settings, transaction authorization and waiver charges. While
evaluating the trails and performing the audit, the adequacy of audit trials need to be verified.

INFORMATION TECHNOLOGY 159


Core Banking Solution

3
C
H
A
SYSTEMS AUDIT
P
T OF CBS AND ITS
INTERFACES
E
R

LEARNING OBJECTIVES
 Introduction to ISA
 Evaluation of security and Controls in CBS
 CBS control and Audit of branches
 Using reporting / SQL feature for analysis, reviewing controls at different layers with case
study.

3.1 INTRODUCTION TO INFORMATION SYSTEMS AUDIT


Systems auditing is an important aspect in the present context of extensive computerisation. The
control objectives and audit objectives always remain the same. However, audit methodology
in a computerised environment is distinctly different from that in a manual environment.
In 1967, in the United States, a significant event took place in history of systems audit. It is
commonly and popularly referred to as the “Equity Funding Case”. The Managers and Directors
of Equity Funding Corporation of America, with the idea of increasing the share value of their
company profits were falsified by creating bogus insurance policies. Apart from that, other
methods were also used. The auditor for the parent company was not the auditor of the insurance
company. This was done with the main idea of confusing and confounding the audit process so
that over dues could not be detected.
These matters were further complicated by the external auditors confirming the existence of
the insurance policies (the faked ones)! The confirmation was obtained on the telephone. It was
reported that the calls went through the equity fund switch board to the employees who were
colluding with the managers and they confirmed the existence of the policies.
In 1973, after nearly six years, the fraud was exposed, that too by a disgruntled employee who
alerted the authorities. Thereafter the Stock Exchange suspended trading of Equity Fund shares.
A leading audit firm with partners who had necessary knowledge and experience to perform
audit in a computerised environment was appointed. It was discovered that US $2.00 billion
worth of bogus insurance policies were there. Thereafter all the things that happened is history.
The fact that came to light was that the original external auditors missed out many clues that
there was an apparent fraud. The management to proliferate the bogus insurance policies had
used the computers to take advantage of their speed. The computer files contained details of
the policies, a mere reading of which would have highlighted the fraud.

160 INFORMATION TECHNOLOGY


Systems Audit of CBS and Its Interfaces
The importance of performing systems audit was very much appreciated as the cause for the
non detection of the fraud was more because there was lack of knowledge on the part of the
auditors. Though some auditors colluded in the equity funding case provocated a well-known
authority on the subject of systems audit to comment that the equity funding case contributed
a great deal to systems audit! He further said that recognition and development of the systems
audit than any other single event. The case had however certain other positive effects too. The
management which previously did not want the auditors to be “snooping around” the computer
department changed its attitude and welcomed the auditors and their report.
The management sought an independent assurance as to whether the information systems on
which they rely is dependable in terms of controls, were built into the system or outside.
Confidentiality, Integrity and Availability (CIA) are the components of information security.
Systems Audit, which verifies the controls in a computerised environment evaluates the controls
and provides assurance regarding adequacy.
In a banking environment, where all of manual maintenance of accounts have been shifted to
computers, the importance of performing systems audit can never be over emphasised.
Many controls for information systems and important ones at that are built into computers.
Hence as verification of internal controls are of utmost importance, systems audit as distinct
from manual audit assumes importance.
With the Core Banking Solution being implemented, the computer technology has become
more advanced and all of the operations at all of the branches are all networked to the Central
Office. The hardware and the communication are distributed and the software is centralised.
Audit objectives of performing audit of banks have not undergone any change. However, audit
methodology has undergone a ‘sea change’. Reserve Bank of India has in these circumstances
issued many circulars which are available in the RBI website - www.rbi.org.
The Institute of Chartered Accountants has issued guidelines for performing audit in an
information technology environment. As of now, many of them are as guidelines and hence
though not mandatory, members are expected to comply with the requirements. One such
important guideline came in the name of Gopalakrishnan committee report which is taken as a
mandatory guidelines by RBI.
In certain cases, the RBI has as a prerequisite instructed that systems audit should be performed
before implementation of certain products e.g., internet banking. The bank would not be
permitted to commence internet banking operations unless the requisite security and controls
have been certified by a competent systems auditor.

3.2 SECURITY AND CONTROLS IN CBS


In any information technology environment, there are certain controls and standards to be adhered
to. When specific products like internet banking, ATM. RTGS/ NEFT, and CMS are introduced, there
are certain additional controls specific to those systems which have been discussed in the respective
chapters. In the following pages, we would be discussing the security and controls which need to
be in place. Given below are the broad specifications of controls. Under each head there are other
specific controls. The main heads would be
(a) Management Controls
(b) Organizational Controls
INFORMATION TECHNOLOGY 161
Core Banking Solution
(c) Operational Controls and
(d) Application Controls.
(Infrastructure controls already covered in previous chapter)
Management Controls
Management controls would include (a) formulating a security policy, (b) developing a business
continuity planning and (c) laying down procedures for systems development.
Security Policy
Security Policy is a document approved at the Board level. Reserve Bank of India mandates that
every bank should have a security policy. The contents of the policy at the minimum should cover
the following:
1. Formation of Security Committee/ Steering Committee
2. Asset Management
3. Human Resources Management
4. Physical and Environmental security
5. Communication and operative management
6. Access Control
7. Systems development and Change Management Procedure
Business Continuity Planning
There should be a comprehensive document in place taking into consideration critical operations
of the bank. Reserve Bank of India mandates on every bank having a Business Continuity Plan in
place. From the accounting point of view, one needs to look at it from the “going concern concept”.
The existence of a Business Continuity Plan, evidence of testing and evidence of updating are
essential. The various likely scenarios of business interruptions should be envisaged and a plan to
meet such situations and keep the business going should be documented. There should be evidence
of awareness being created among the employees.
Systems Development and Change Management
Best practices for development of systems and change management should be documented. Constant
monitoring of its being complied with should be in place. The procedures would include program
development, program testing, and movement to library, movement from library to production,
roles and responsibilities of Computer Team members, highlighting incompatible functions.
Organizational Controls
Organizational Controls would include the organization structure of the IT Department, IT Strategies
roles and responsibility including incompatible functions would include.
Operational Controls
This would include physical access, logical access, environmental controls, evaluation controls in
operation systems and evaluation controls of network.

162 INFORMATION TECHNOLOGY


Systems Audit of CBS and Its Interfaces
Application Controls
The controls would broadly come under the following heads:
 Input
 Output
 Process
Input
The input controls would ensure that the data entered is complete and correct. To ensure the same
the following built in checks would be in the application software.
 Data validation
 Reasonableness check
 Format check (Mandatory files)
 Range check
Process
Controls ensure that the software comprehensively covers the business process in the different
modules. Process control would also include the existence of built in controls in the system to ensure
proper processing of input data so as to provide the required output.
Core Banking Solution
The various application modules which would normally form part of the total Core Banking Solution
would be
(a) Customer ID generation (create a customer with a specific No.
(b) Accounts Management. (To ensure that the account opening process is in line with the bank’s
laid down procedures. This module will deal with creating savings account, current account,
cash credit account, overdraft etc.,
(c) Savings Bank and Current Accounts
(d) Fixed Deposits, Recurring Deposits and other Term Deposits.
(e) Cash Operations Module
(f) Clearing Module - which would include inward clearing as also outward clearing?
(g) Bank Guarantee: This module would cover bank guarantees issued by the bank on behalf
of the customers in favour of third party’s guaranteeing to fulfill the terms of the guarantee.
Guarantees may be in the nature of
(i) Performance guarantee or
(ii) Deferred Payment guarantee.
(h) Bills: Bills involve trade transactions and would include
(i) Clean supply of bills
(ii) Payment Usance Bills

INFORMATION TECHNOLOGY 163


Core Banking Solution
(iii) Outward Bills (Cheques)
(iv) Inward bills
(i) Letter of Credit: Letter of Credit refers to an arrangement wherein the issuing bank acts on the
request and instructions of a customer.
(j) Remittances: This process involves remittances of money by way of DDs or Money Transfers
etc.
(k) Advances: The banks collect demand deposits and term deposits. Out of the funds collected
they maintain Statutory Liquidity Ratio (SLR) and Cash Reserve Ratio (CRR) as per the RBI’s
requirements. Out of the balance funds available they lend to priority and non priority sectors.
The functionality of each of the modules has to be comprehensive.
l. Master Maintenance - the core banking solution would need to have master data
(i) Parameter setting for account type and structure settings keeping in view the General
Ledger
(ii) Parameter settings for interest rates applicable. These interest rates would vary for
different parties e.g., staff, senior citizens etc.
(iii) Rates would vary also for the tenor deposits eg. 1 year, 2 years etc.
The parameters should be entered into the system with due care. The updation of the parameters is
more important if not more than the original creation. Other examples of critical parameters used by
CBS applications would include list of holidays, authorization rights for exceptional transactions,
list of deposits, penalty payable in case of default in RD etc., defining various warning, exceptions,
error codes, work class of various user, type of user etc.
Operational Parameters
Given type wise operational parameters - TDS, Anywhere banking parameters.
Charges Parameters
Standing instructions charge, Stop Payment instruction charge, cheque book issues, account closing
charges.
User Related Password Change Parameters: validity, password history, length, structure etc.
Interest related parameters
Term Deposits interest rates, Interest calculation for advances, interest calculated for staff, loan
interest calculation for senior citizens – frequency, start date, end date, fised-flexible, simple-
compound etc.
Authorization Parameters
Authorization of users varies for exceptional transactions.
Log Maintenance
Logs are record of activities that have taken place in the system irrespective of the modules. The
contents of the log would include:
 The activity

164 INFORMATION TECHNOLOGY


Systems Audit of CBS and Its Interfaces
 The user (system)
 Date and Time
These logs need to be preserved carefully as they are the conclusive and relevant evidence to prove
that a transaction occurred. Naturally the logs should not be capable of being modified. The logs
should be accessible only by the authorised person and by none other.
The points discussed above provide an over view of controls that need to be in place in a Core
Banking Solution.

3.3 AUDIT OF CORE BANKING SOLUTION


Audit is the process of evaluating the adequacy of controls and also ensuring relevant application
modules deal comprehensively with business process. The various aspects to be verified while
performing the audit in the Core Banking Solution environment would be:
(a) Review of Security Policy
(b) Review of Business Continuity Planning & BCP policy
(c) Review of Systems Development and Change Management Procedures & process
(d) Network vulnerability Assessment of Effectiveness of Intrusion Detection Systems.
(e) Evaluation of controls in operating systems.
(f) Control in databases
When any of the services like software development, database management, network
management are outsourced, review of the service level agreement to ensure that confidentiality
integrity and availability are taken care of is extremely important. Service level agreements
should provide for a systems auditability clause. So that Banks will have the right to have
systems audit conducted of the third party services.
(g) Testing of application modules of the Core Banking Solution.
(h) Review of Systems logs.
(i) Audit of Internet Banking, Audit of ATM and RTGS/ NEFT also need to be done and these
have been considered separately under their respective heads.
That means IS Audit of outsourcing activities should form part of IS Audit of Core Banking.
A. Review of Security Policy
Reserve Bank of India has mandated that every bank should have a security policy which is approved
by the management. The document should be constantly updated. There should be awareness of
the contents of the security policy amongst the employees as applicable to different operations. The
security policy applies to the entire organization and to all of its employees, customers and also to
third parties to whom services have been outsourced.
The broad contents of the security policy should be
1. Formulation of a security committee to manage information security within the
organization.

INFORMATION TECHNOLOGY 165


Core Banking Solution
2. Asset Management: The policy would deal with the procedure for maintaining proper
protection of organizational assets. The assets need to be classified according to their sensitivity
and criticality to the organization.
3. Human Resources: This would deal with procedures to be followed in connection with the
employees, contractors and third party users. There should be procedures to be followed under
the following circumstances.
(i) Prior to employment
(ii) During employment and
(iii) On termination or change of employment.
Before employing, background verification should be done. During employment, there should
be absolute compliance of the requirements of the security policy. A formal disciplinary
procedure for violation of the security requirements should be in place.
On termination all access rights to information processing facilities should be removed
immediately
4. Physical Environment: Procedures should be in place to ensure unauthorized access, damage
or interference is prevented.
5. Communications and Operations Management: Operating procedures should be documented
and proper segregation of duties should be implemented, where appropriate, to reduce risk
or intentional systems misuse. This would also apply to outsourced third parties.
The other aspects would include network security management policy, e-mail policy, firewall
security policy, internet policy etc., access control policy, cyber security policy etc.
6. Media Handling: It is important that media should be disposed off securely and safely when
no longer required. This would prevent leakage of data specially the sensitive data.
7. Access Control: There should be an Access Control Policy to control access to information
which needs to be reviewed based on business and security requirements. There should be
a formal user registration and deregistration procedure. Allocation of password should be
controlled through a formal management process. There should be a regular review of user
access rights at frequent intervals.
Users also have their own responsibility and should follow the security practices, e.g., selecting
passwords, having a clear desk etc.
8. Network Access Policy: Access rights should be purely on a need to know basis. Groups of
information service users and information systems should be segregated on networks.
9. Operating System Access Control: Access to operating system should be controlled by a secure
log on procedure. There should be proper monitoring procedures in place.
10. System Acquisition Development and Maintenance: Best practices should be in place for
program development, testing, modification, library maintenance and also back up procedures
for programs and data.
11. Information Security Incident Management: In spite of best intentions and documentations,
there could be a security lapse. Any such incident notices would be required to be reported to
the appropriate management channels.
166 INFORMATION TECHNOLOGY
Systems Audit of CBS and Its Interfaces
B. Business Continuity Planning
A well managed process should have been developed and maintained for business continuity
throughout the organization. Thus information security is needed for the organization’s business
continuity. Business Continuity Planning should be tested and updated regularly.
(a) Compliance with local requirements: There should be appropriate procedures in place to
ensure proper compliance and legislative, regulatory and contractual requirements.
(b) Review of Business Continuity Planning: The Business Continuity Planning is a process by
which the bank ensures the maintenance and recovery of operations. The objectives of Business
Continuity Planning would include minimizing financial losses, continue to serve customers
without interruption, and keep up the image of the bank. The Business Continuity Planning is
distinct from Disaster Recovery Planning (DRP). The Disaster Recovery Planning has the objective
to plan to recover from the impact of disaster, to bring back support service and to restore normalcy.
The Business Continuity Planning should take into consideration critical business functions and
priorities them. The plan should cover the following important & critical processes:
 Branch Operations
 Administrative Operations
 Internet Banking
 ATM Operations
 RTGS/ NEFT
 All other alternate delivery channels
The various disaster scenarios need to be considered and a few examples are given below:
 There is no access to the Computer Services Department building and also to the Data Centre.
 There is access to the Computer Systems Department building; but Data Centre cannot be
accessed.
 The main server at the data centre would have gone down though access to systems department
is available.
 Computer systems department and data centre site are available but connection to all branches
and Head Office is unavailable.
The various likely scenarios need to be envisaged and a plan has to be in place so that the bank’s
business operations are carried on without interruption.
So, while auditing, we need to verify whether there is a Business Continuity Plan and whether it
has been tested and whether it is constantly updated.
C. Review of Systems Development and Change Management Procedures: Core Banking Solution
software will consist of many modules. System Development refers to the process of developing
software which would produce the required output from the input provided of course, using the
necessary hardware and communication systems. The systems whether supplied by outsiders or

INFORMATION TECHNOLOGY 167


Core Banking Solution
developed in house should meet the deliverables, accepted and approved by the management. The
objectives of audit would include reviewing the following:
(a) Whether the systems are implemented with adequate internal controls.
(b) Whether the business functionality is comprehensive.
In a banking scenario the management may requisition the services of the audit for implementation
or while in the process of being implemented. Irrespective of when the audit is going to be done, there
needs to be a procedure which is strictly adhered to as far as development of systems. There should be
a formal request from an authorised person. The programs after they are developed should be tested
in a test environment. The programs would be tested for functionality and adequacy for internal
controls. When programs are tested certain inadequacies and deficiencies could be discovered. It
would go back to the Programming Team for correction. Again it would be tested. This is an iterative
process. It is important that whenever a program is changed to set right a particular situation, the
entire program should be tested. This would ensure that the changed program continues to perform
in the same manner in all other aspects before the change was implemented.
Process of moving a tested program from the Testing Environment to the Production Environment.
The Development Department and the Production Department should be separate and isolated.
Under no circumstances should any members of the development team have access to the production
environment. These aspects have been discussed in detail while discussing the organization structure
of a computer department and incompatible functions.
A completely tested program from the development department should be moved to the library
and the librarian should move the same to the production environment with full documentation
being maintained.
Change Management:
However, well developed software, it could require to be changed. This could arise either due to
additional business process requirements or technology changes as also additional bugs being
discovered.
There should be a formal and well documented procedure in place for changes effected. There
should be a register maintained to keep a tag on different versions in the program. These registers
could also be maintained on the computer.
(d) Network Security: In a core banking solution, as discussed in the earlier chapters, there is a
complicated network system. All the servers (Application Server, Data Base Server, Antivirus Server,
Web Server, Internet Server etc.,) are all at the data center in a central location. The branches are
situated all over the country. ATM kiosks, e-lobby are situated in different places and customers are
accessing the facilities from different places. Customers are provided internet banking. In view of
all these facilities, we can imagine the complicated network which has to be in place. In view of this
network security assumes great importance. Performing the vulnerability assessment of a network,
it requires technical knowledge. However, it is necessary that network vulnerability assessment is
performed periodically by competent people and a report should be available. Weaknesses in the
communication systems which would have been highlighted need to be plugged. Vulnerability
assessment is a continuous process. ‘Patches’ (solution for dealing with vulnerabilities discovered)
are made available on the net. The network administrator is to constantly be applying the patches.
If the patches are not updated and the weak points highlighted by the vulnerability assessment is

168 INFORMATION TECHNOLOGY


Systems Audit of CBS and Its Interfaces
not attended to immediately the bank’s network is open to exploitation. It can easily be hacked. To
prevent such security lapses, it is imminent that vulnerability assessment is performed by competent
people. There are certain tools available which properly trained people can use.
The systems auditor must verify whether constant network vulnerability assessments have been
performed by the competent people. Similarly, it is also important to ensure that intrusion detection
and intrusion prevention is taken care of. There are tools again which could be used by competent
people, who would evaluate the strength of the network and detect if there are any weak points,
which could be exploited by an intruder.
(e) Evaluation of Controls in Operating Systems: Operating System is a set of computer programs
that manage the hardware and software resources of a computer. Operating systems contain the
whole list of policies and the systems administrator administers the policies. It is the responsibility
of the system administrator to ensure that all patches applicable to the particular operating system
are applied. The systems administrator should also ensure that unnecessary services and facilities
are disabled. Applying of patches is an ongoing process. An Administrator Guide is available with
every operating system and it provides all important information including implications of security
settings. Proper testing is required before applying any patches.
(f) Testing Application Systems: This process consists of independently ensuring that computer
systems (hardware, software and communication systems) produce the required output from the
given input. Each of the modules needs to be tested. The auditor needs to be knowledgeable of
the business process of each of the modules e.g., Savings Bank Account, Current Account, Fixed
Deposits, Loans, Bills etc.,
Procedure for testing:
The Bank would be required to provide separate systems complete with copy of the Core Banking
Solution software, data base, master files etc.,
The auditor should request the bank to create at least two user IDs and passwords. The software has
to be the exact replica of the one running in the live environment i.e., the version number should
be the same.
The auditor will verify all the application modules one by one to verify the completeness of the
functionality, built in controls in the system and controls if any outside the system.
Broad guidelines for testing one of the modules viz, Fixed Deposits are provided below:
When the system is switched on, it will ask for the user ID and password. The auditor should give
the user ID and password provided by the Bank. He should take necessary steps to change the
password, as otherwise the accountability for the usage of the computer would be lost. There will
be a screen which would give the option for choosing the module. The FD module could be chosen.
A study of the flow of the process for the FD system and the various screens need to be initially
studied to get an over view.
The FD system cannot be tested straight away as a customer would need to be created. KYC (Know
Your Customer) norms required by the Reserve Bank of India need to be complied with.
Now the process to be tested is FD system. Choose one customer and create a cheque deposit for
the deposit account. Naturally unless the customer is got adequate funds the cheque cannot be
honoured. So the program has to verify the same presuming that there are enough funds. Data for
the cheque is keyed in the relevant screen.

INFORMATION TECHNOLOGY 169


Core Banking Solution
The auditor is always testing to verify whether system will function properly under specific
conditions. In principle, a post dated cheque should not be accepted. For testing purposes the auditor
can try to enter a cheque with a date which is beyond the system date. Having entered the data on
the screen, the user can now press “accept”. If the programme is working properly, the computer
would pop up a message “cheque date beyond system date” or similar message to convey that it
is a post dated cheque. Whatever be the attempts made, the cheque should not be accepted by the
system. Similarly a cheque not belonging to the customer or a cheque belonging to a customer but the
customer is having no balance could be one of the many testing conditions. In case an error message
is flashed, corrective action needs to be taken and the data is properly entered.
However, the system should not accept it unless another individual authorises the same. The entry
should wait for authorization. The authorization should be capable of being done only with another
user ID and password. This concept is called “maker-checker concept”. This is very essential as this
ensures there is dual control. To test the “maker-checker concept”, the auditor can try to authorise a
transaction using his user ID and password. The system, if correctly functioning, should not accept
the operation. It should flash a message similar to “illegal”. Similarly after an authorization has been
completed properly, none of the entries should be amenable to modification. Hence the auditor can
try to change any of the fields like maturity date, amount etc., That should not be possible.
Presuming there are no errors in logic after passing through certain sequential menus, the FD would
be created in the system depending upon the tenure (one year, two years etc.,). The interest rate will
be picked up from the master data. One of the earlier screens may require information regarding
the customer type. When it expects them, we should provide information regarding the customer
like ‘senior citizen’, ‘staff member’ etc.
Based upon the customer type and time period of FD, the programme (the CBS software) will look
up the parameterised table and choose the correct rate.
If parameterization of master data is not correctly done (and also not tested properly), naturally
an incorrect rate would be picked up. Under normal circumstances, these basic components of the
program would have been tested before releasing the same. However, the auditor who tests these
aspects as while changing the rates, errors are likely to crop up.
The auditor could test it for other aspects like pre closing of FD, for issuing of duplicate receipt etc.,
while testing for the pre closing, the auditor would verify whether the logic is working properly like
applying the appropriate penalty rate and making proper adjustments against the amount payable
to the customer. In the case the application for issue of duplicate FD receipt, the system should verify
whether the original FD is in existence and also before issuing a duplicate FD receipt that fact should
be noted in the system by “flagging -the FD record in the computer system”. If such a procedure is
not in place, possibilities of amounts being repaid both on the original as well as on the duplicate
cannot be ruled out. This may be discovered much later!
This extensive and exhaustive testing of the program depends entirely on the in-depth knowledge
of the auditor and his capability to test the system in different conditions.
All of the application modules in core banking solution would need to be tested similarly, taking
into consideration the respective business process and accepted built in controls.
Testing of internet banking, ATM, RTGS as mentioned earlier are not considered here as the same
have been dealt with separately.

170 INFORMATION TECHNOLOGY


Systems Audit of CBS and Its Interfaces
(g) Review of Systems Logs: Logs as already mentioned are reports generated by the system
automatically. However, it needs to be mentioned that they generate automatically once it is
programmed to do so. Auditors should review the systems logs. The systems logs could be classified
as:
(a) Operating System Logs
(b) Application Logs and
(c) Data Base Logs
Above are exclusive of logs generated by network devises.
Operating System Logs:
Depending upon the operating systems (Windows-2000, Windows 2003, Unix etc.) logs are generated
containing authentic information related to security. The concerned administration manual of the
operating system would provide enough guidance to evaluate security concerns, if any.
Application Logs:
Application logs are logs generated by the application programs. While developing the programs,
decisions are taken regarding the aspects to be reviewed and logs to be prepared.
In banks, logs would be generated for loan authorisation, limit creation, preclosure of deposits &
all such activities etc.,
A review of these logs would provide information to the auditor for security evaluation. The system
could also be programmed to provide to generate exception reports. An auditor should collect
details about exception reports which have been generated. The exception reports could include:
(a) Account opened and closed during the month and
(b) Loan Arrears and
(c) Temporary Over Drafts granted etc.,
Date Base Logs:
These logs are available only for the computer systems department and could be viewed only by
an authorised user like data base administrator. There could be other significant data base logs to
review changes at the data base level but not through the application. This is a matter of serious
data concern,
The log management is essential to ensure that computer security records are stored in sufficient
detail for appropriate period of time.

INFORMATION TECHNOLOGY 171


Unit – 5
Computer Assisted
Audit Techniques
Computer Assisted Audit Techniques

1
C
H
A
INTRODUCTION TO
P
T CAAT
E
R

LEARNING OBJECTIVES
The learning objectives of the CAAT module are:
 Understand how to use office automation software for performing various tasks as relevant to
services provided by chartered accountant in areas of accounting, assurance and compliance.
 How to use CAAT/SQL queries for data analysis as required.
 How to review controls implemented at various levels/layers such as: Parameters, user creation,
granting of access rights, input, processing and output controls in enterprise applications.

1.1 INTRODUCTION
Auditors deal with information in myriad ways encompassing the areas of accounting, assurance,
consulting and compliance and most of this information is now available in electronic form. This is
true not only in case of large and medium enterprises but even in small enterprises. In case there are
enterprises who have still not adapted the digital way, then it is an opportunity for Auditors to help
such enterprises to ride the digital wave. Hence, it has become critical for Auditors to understand
and use information technology as relevant for the services we provide. It is rightly said: “one
cannot audit data which is flying in bits and bytes by using the ancient method of riding on a horse
back”. We are living in a knowledge era where the skill sets are keys to harnessing the power of
technology to be effective as knowledge workers. Computer Assisted Audit Techniques (CAATs)
refers to using technology for increasing the effectiveness and efficiency of auditing. CAATs enable
auditors to do more with less and add value through the assurance process which is more robust
and comprehensive. This chapter provides an overview of the process, approach and techniques
which could be used across various technology platforms and in diverse enterprises.

1.2 THE ALL-ENCOMPASSING ELECTRONIC DATA


A great blessing in ancient times was: “May you live in exciting times”. Indeed, we are living in
exciting times without even being aware of it. We are experiencing how technology innovations are
making our life and living simpler by bridging global boundaries and bringing global information
on our finger tips. For enterprises as well as professionals, the question is no longer what technology
can do for us but what we can do with technology. The question “do I need to use technology” is no
longer relevant instead the relevant decision is about “how do I use technology to remain relevant”.

174 INFORMATION TECHNOLOGY


Introduction to CAAT
Information technology is all pervasive and more so as the government and regulatory agencies
also are using technology platform to provide services to citizens and compelling information to be
filed in electronic form. The government at all levels has drawn up ambitious plans to implement
e-Governance initiatives to improve speed, access and transparency of services. The Information
Technology (IT) Act 2000 with IT Amendment Act 2008 and IT rules 2011 provide the regulatory
framework and mechanism for recognizing electronic records and electronic transactions thereby
facilitating ecommerce and also identifying cybercrimes and providing penalties and compensation
for them. Hence, we can expect IT usage to only keep growing in the near future impacting all areas
of life more so in our work as professionals.

1.3 AUDITORS AND CAATs


As auditors, we come across computers and communication technology as the most common
denominator among our clients, both large and small. Further, we use computers and communication
technology for providing services to our clients. In today’s complex and rapidly changing technology
environment, it is important to master the right techniques which could be used across enterprises
and across various technology platforms. Typical of a IT environment are the speed of processing,
large capacity of storage, lack of the paper based trails, the radically different way of information
processing, the ease of information access, internal controls being imbedded and the ever-present
risk of failure of IT and loss of data. All these factors make it imperative for auditors to harness power
of technology to audit technology environment by taking into consideration the risks, benefits and
advantages. CAATs empower Auditors with the key survival techniques which effective used in
any IT environment. CAATs are not specialist tools designed for use by specialist IT auditors but
these are common techniques which can be easily mastered to audit in a computerized environment
for statutory audit, tax audit and internal audit as also for providing consulting services.

1.4 AUDITORS AND CAATs


CAATs are tools for drawing inferences and gathering relevant and reliable evidence as per
requirements of the assignment. CAATs provide direct access to electronic information and empower
auditors not only to perform their existing audits more efficiently and effectively but also facilitate
them in knowing how to create and execute new type of IT related audit assignments. CAATs provide
a mechanism to gain access and to analyze data as per audit objective and report the audit findings
with greater emphasis on the reliability of electronic information maintained in the computer system.
There is higher reliability on the audit process as the source of the information used provides and
greater assurance on audit findings and opinion. CAATs are available in specific general audit
software designed for this purpose but the techniques of CAATs can be applied even by using
commonly used software such as MS Excel and by using query/reporting features of commonly
used application software. CAATs can be used to perform routine functions or activities which
can be done using computers, allowing the auditors to spend more time on analysis and reporting.
A good understanding of CAATs and know where and when to apply them is the key to success.
ICAI has published a guidance note on CAAT and publication titled: “Data Analysis for Auditors”
which may be referred for more details.

1.5 NEED FOR CAATs


In a diverse digital world of clients’ enterprises, the greatest challenges for an Auditor is to use
technology to access, analyze and audit this maze of electronic data. CAATs enable auditors to move
from the era of ticks of using pencil or pen to the era of clicks by using a mouse. CAATs will help

INFORMATION TECHNOLOGY 175


Computer Assisted Audit Techniques
auditors to change focus from time-consuming manual audit procedures to intelligent analysis of
data so as to provide better assurance to clients and also mange audit risks. Some of the key reasons
for using CAATs are:
1. Absence of input documents or lack of a visible paper trail may require the use of CAATs in
the application of compliance and substantive procedures.
2. Need for obtaining sufficient, relevant and useful evidence from the IT applications or database
as per audit objectives.
3. Ensuring audit findings and conclusions are supported by appropriate analysis and
interpretation of the evidence
4. Need to access information from systems having different hardware and software environments,
different data structure, record formats, processing functions in a commonly usable format.
5. Need to increased audit quality and comply with auditing standards.
6. Need to identify materiality, risk and significance in an IT environment.
7. Improving the efficiency and effectiveness of the audit process.
8. Ensuring better audit planning and management of audit resources.

1.6 OBTAINING AUDIT DATA


In most cases where CAATs are used, it becomes necessary to obtain copy of data in their original
format for independent analysis. The data has to be obtained in commonly accepted format. It is
important to understand the format in which the data is stored in the application which is being
audited. If the data is a native format which is not readable by audit software, then it is necessary
to use the reporting feature of application software and export this data to commonly recognizable
format of audit software. For example, auditor may not be aware of the data structure/tables of
a software developed through a vendor by the client. In such case, auditor may have to study the
reporting features and use the export feature to get the data in the required format. It is very important
to educate the client about the need to obtain copy of the data as required for audit. Based on the
audit scope and relevant audit environment, auditor may have to finalize the required approach
for getting the data for audit. This may include installing audit software on client system or using
the application software for audit as feasible.

1.7 KEY STEPS FOR OBTAINING DATA


1. Discuss with client about the requirement of raw data for audit and issue a request letter for
getting the requested data in specified form as per the audit objectives.
2. Discuss with the IT personnel responsible for maintain data/application software and
obtain copies of record layout and definitions of all fields and ensure that you have an
overall understanding of the data. The record layout should describe each field and provide
information about the starting and ending positions and the data type (numeric, alphanumeric,
character, etc.).
3. Print sample list of the first 100 records in the data file and compare this to a printout of the
obtained data to confirm they are correct.

176 INFORMATION TECHNOLOGY


Introduction to CAAT
4. Verify data for completeness and accuracy by checking the field types and formats, such as
identifying all records with an invalid date in a date field.
5. Obtain control totals of all the key data and compare with totals from the raw data to ensure
all records have been properly obtained. This can be performed by importing the data in audit
software and reviewing the statistics of all the key fields.

1.8 KEY CAPABILITIES OF CAATs


CAATs refer to using computer for auditing data as per audit objectives. This requires understanding
of the IT environment and most critically the core applications and the relevant database and
database structure. CAATs could be used by using the relevant functionalities available in general
audit software, spreadsheet software or the business application software. However, broadly the
key capabilities of CAATs could be categorized as follows:
1. File access: This refers to the capability of reading of different record formats and file structures.
These include common formats of data such as database, text formats, excel files. This is
generally done using the import/ODBC function.
2. File reorganization: This refers to the features of indexing, sorting, merging, linking with
other identified files. These functions provide auditor with an instant view of the data from
different perspectives.
3. Data selection: This involves using of global filter conditions to select required data based on
specified criteria.
4. Statistical functions: This refers to the features of sampling, stratification and frequency
analysis. These functions enable intelligent analysis of data.
5. Arithmetical functions: This refers to the functions involving use of arithmetic operators.
These functions enable performing re-computations and re-performance of results.
Precautions in using CAATs
CAATs have distinct advantages for Auditors and enable them to perform various types of tests.
However, it is important to ensure that adequate precautions are in taken in using them. Some of
the important precautions to be taken by Auditors are:
1. Identify correctly data to be audited
2. Collect the relevant and correct data files
3. Identify all the important fields that need to be accessed from the system
4. State in advance the format the data can be downloaded and define the fields correctly
5. Ensure the data represent the audit universe correctly and completely.
6. Ensure the data analysis is relevant and complete.
7. Perform substantive testing as required.
8. Information provided by CAATs could be only indicators of problems as relevant and perform
detailed testing as required.

INFORMATION TECHNOLOGY 177


Computer Assisted Audit Techniques

1.9 STEP BY STEP METHODOLOGY FOR USING CAATs


CAATs are very critical tools for Auditors. Hence, it is important to formulate appropriate strategies
to ensure their effective use. Some of the key strategies for using CAATs are:
1. Identify the scope and objectives of the audit. Based on this, auditor can decided about the
need and the extent to which CAAT could be used.
2. Identify the critical data which is being audited as per audit scope and objectives.
3. Identify the sources of data from the enterprise information system/application software.
These could be relating to general ledger, inventory, payroll, sundry debtors, sundry creditors.
4. Identify the relevant personnel responsible for the data and information system. These
personnel could be from the IT department, vendors, managers, etc.
5. Obtain and review documents relating to data/information systems. This should provide
information about data types/data structures and data flow of the system.
6. Understand the software by having a walk-through right from user creation, grant of user
access, configuration settings, data entry, query and reporting features.
7. Decide what techniques of CAATs could be used as relevant to the environment by using
relevant CAAT software as required.
8. Prepare a detailed plan for analyzing the data. This includes all the above steps.
9. Perform relevant tests on audit data as required and prepare audit findings which will be used
for forming audit report/opinion as required.
1.10 EXAMPLES OF TESTS PERFORMED USING CAATs
CAATs can be used for compliance or substantive tests. As per the audit plan, compliance tests are
performed first as per risk assessment and based on the results of the compliance tests; detailed
compliance tests could be performed. Some examples of tests which can be performed using CAATs
are given below:
1. Identify exceptions: Identify exceptional transactions based on set criteria. For example, cash
transactions above Rs. 20,000.
2. Analysis of Controls: Identify whether controls as set have been working as prescribed. For
example, transactions are entered as per authorised limits for specified users.
3. Identify errors: Identify data, which is inconsistent or erroneous. For e.g.: account number
which is not numeric.
4. Statistical sampling: Perform various types of statistical analysis to identify samples as
required.
5. Detect frauds: Identify potential areas of fraud. For example, transactions entered on week-
days or purchases from vendors who are not approved.
6. Verify calculations: Re-perform various computations in audit software to confirm the results
from application software confirm with the audit software. For e.g.: TDS rate applied as per
criteria.
7. Existence of records: Identify fields, which have null values. For example: invoices which do
not have vendor name.

178 INFORMATION TECHNOLOGY


Introduction to CAAT
8. Data completeness: Identify whether all fields have valid data. For example: null values in
any key field such as date, invoice number or value or name.
9. Data consistency: Identify data, which are not consistent with the regular format. For example:
invoices which are not in the required sequence.
10. Duplicate payments: Establish relationship between two or more tables as required. For
example duplicate payment for same invoice.
11. Inventory obsolescence: Sort inventory based on data of purchase or categories as per specified
aging criteria or period and identify inventory which has become obsolete.
12. Accounts exceeding authorized limit: Identify data beyond specified limit. For example,
transactions entered by user beyond their authorized limit or payment to vendor beyond
amount due or overdraft allowed beyond limit.
1.11 ANALYTICAL REVIEW PROCEDURES
The various standards on auditing highlight need for acquiring the required skill-sets to audit in an
IT environment and using relevant techniques. Many of the requirements of the auditing standards
can be complied by adapting them for use in an IT environment as required. For example: Standard
on Auditing (SA) 520Analytical Procedures states:
A1. Analytical procedures include the consideration of comparisons of the entity’s financial
information with, for example:
 Comparable information for prior periods.
 Anticipated results of the entity, such as budgets or forecasts, or expectations of the auditor,
such as an estimation of depreciation.
 Similar industry information, such as a comparison of the entity’s ratio of sales to accounts
receivable with industry averages or with other entities of comparable size in the same industry.
A2. Analytical procedures also include consideration of relationships, for example: Among elements
of financial information that would be expected to conform to a predictable pattern based onthe
entity’s experience, such as gross margin percentages.
Most of the analytical procedures can be performed in an IT environment using CAATs which makes
the audit process much more effective and efficient.

SUMMARY
CAATs enable auditors to use computers as a tool to audit electronic data. CAATs provide auditors
access to data in the medium in which it is stored, eliminating the boundaries of how the data can be
audited. As auditors start using CAATs, they will be in a better position to have a considerable impact
on their audit and auditee as more time is spent on analysis and less time on routine verification. It is
important to understand the client IT environment and chart out which techniques of CAAT could
be used. Initially, time needs to be invested in this Endeavour but once the audit plan is prepared
based on the IT environment as per audit scope, re-use becomes easier. However, the audit plan
and tests need to be updated based on changes in the IT environment as relevant. Using CAATs
provides greater assurance of audit process to the auditor and also to the auditee. The key to using
CAAT is recognizing the need, learning how to use CAATs and using them in practical situations.

INFORMATION TECHNOLOGY 179


Computer Assisted Audit Techniques

2
C
H
A
DATA ANALYSIS AND
P
T AUDIT TECHNIQUES
E
R

ICAI has issued guidelines on CAAT and the various assurance standards highlight the importance
of using CAATs as relevant for audit. ISACA has also issued standards and guidelines on auditing
and CAATs. Some of the key aspects from these standards and guidelines are given below.

2.1 NEED FOR USING CAATs


As entities increase the use of information systems to record, transact and process data, the need for
the auditors to utilize tools to adequately assess risk becomes an integral part of audit coverage. The
use of computer-assisted audit techniques (CAATs) serves as an important tool for the auditor to
evaluate the control environment in an efficient and effective manner. The use of CAATs can lead
to increased audit coverage, more thorough and consistent analysis of data, and reduction in risk.
CAATs include many types of tools and techniques, such as generalized audit software, customized
queries or scripts, utility software, software tracing and mapping, and audit expert systems.
CAATs may be used in performing various audit procedures including:
 Tests of details of transactions and balances
 Analytical review procedures
 Compliance tests of general controls
 Compliance tests of application controls
CAATs may produce a large proportion of the audit evidence developed on audits and, as a result,
the auditor should carefully plan for and exhibit due professional care in the use of CAATs.

2.2 KEY FACTORS TO BE CONSIDERED IN USING CAATs


When planning the audit, the IS auditor should consider an appropriate combination of manual
techniques and CAATs. In determining whether to use CAATs, the factors to be considered include:
 Computer knowledge, expertise, and experience of the IS auditor
 Availability of suitable CAATs and IS facilities
 Efficiency and effectiveness of using CAATs over manual techniques
 Time constraints
 Integrity of the information system and IT environment
 Level of audit risk

180 INFORMATION TECHNOLOGY


Data Analysis and Audit Techniques
2.3 CAATs PLANNING STEPS
The major steps to be undertaken by the auditor in preparing for the application of the selected
CAATs include the following:
 Set the audit objectives of the CAATs, which may be included in the terms of reference for the
exercise.
 Determine the accessibility and availability of the organization’s IS facilities, programs/systems
and data.
 Clearly understand composition of data to be processed including quantity, type, format and
layout.
 Define the procedures to be undertaken (e.g., statistical sampling, recalculation, confirmation).
 Define output requirements.
 Determine resource requirements, i.e., personnel, CAATs, processing environment (the
organization’s IS facilities or audit IS facilities).
 Obtain access to the organization’s IS facilities, programs/systems and data, including file
definitions.
 Document CAATs to be used, including objectives, high-level flowcharts and run instructions.

2.4 AUDIT EVIDENCE AND CAATs


Audit is primarily said to be the process of collecting and evaluating audit evidence as per audit
objectives. Based on the scope and objectives of audit, auditor can obtain the audit evidence by:
 Inspection
 Observation
 Inquiry and confirmation
 Re-performance
 Recalculation
 Computation
 Analytical procedures
 Other generally accepted methods

2.5 CAATs DOCUMENTATION


Work papers
The step-by-step CAATs process should be sufficiently documented to provide adequate audit
evidence. Specifically, the audit work papers should contain sufficient documentation to describe
the CAATs application, including the details set out in the following sections.
Planning
Documentation should include:
 CAATs objectives

INFORMATION TECHNOLOGY 181


Computer Assisted Audit Techniques
 CAATs to be used
 Controls to be exercised
 Staffing and timing
Execution
 Documentation should include:
 CAATs preparation and testing procedures and controls
 Details of the tests performed by the CAATs
 Details of inputs (e.g., data used, file layouts), testing periods, processing (e.g., CAATs high-
level flowcharts, logic) and outputs (e.g., log files, reports)
 Listing of relevant parameters or source code
Audit Evidence
Documentation should include:
 Output produced
 Description of the audit analysis work performed on the output
 Audit findings
 Audit conclusions
 Audit recommendations
In audits where CAAT is used, it is advisable that the audit report includes a clear description of
the CAATs used in the objectives, scope and methodology section. The description of CAATs used
should also be included in the body of the report, where the specific finding relating to the use of
CAATs is discussed. This description should not be overly detailed, but it should provide a good
overview for the reader.

2.6 AUDIT TEST USING CAATs


If the data to be audited is available in electronic form, then CAATs could be used for:
 Inquiry and confirmation – identifying accounts for which external confirmation is to be
obtained. Request letters for confirmation of balances can be printed using CAAT software.
 Re-performance: The processing of transactions done by the application software can be re-
performed and the resultant data can be compared to verify correctness and completeness. For
example: Postings of transactions to personal ledger can be re-performed using the original
transaction data base and compared with classified transactions as per ledgers.
 Re-calculation: All the computations which were done electronically by the application software
used in the enterprise can be independently validated by re-performing the computations.
For example, Tax deducted at source or VAT charged on sales, interest computation, etc. can
be re-computed in CAAT software and validated with the computed totals from the original
application software to confirm correctness of processing of transactions.

182 INFORMATION TECHNOLOGY


Data Analysis and Audit Techniques
 Computation: using CAAT software, it is possible to compute totals to confirm correctness. For
example, the VAT payments made for the year can be total in CAAT software to compare with
the total payments as per VAT returns. The interest debited can be computed and compared
with actual debit to interest a/c for the year.
 Analytical procedures: Based on the data available in electronic format, various analytical
procedures can be performed by comparing and relating various aspects of financial and on-
financial information.

2.7 AUDIT SAMPLING


Auditor has to design and select an audit sample and evaluate sample results. Appropriate sampling
and evaluation will meet the requirements of ‘sufficient, reliable, relevant and useful evidence’ and
‘supported by appropriate analysis. Auditor should consider selection techniques that result in a
statistically based representative sample for performing compliance or substantive testing.
When using either statistical or non-statistical sampling methods, auditor should design and select
an audit sample, perform audit procedures, and evaluate sample results to obtain sufficient, reliable,
relevant and useful audit evidence. Audit sampling is defined as the application of audit procedures
to less than 100 percent of the population to enable the IS auditor to evaluate audit evidence about
some characteristic of the items selected to form or assist in forming a conclusion concerning the
population.
Statistical sampling involves the use of techniques from which mathematically constructed
conclusions regarding the population can be drawn. Non-statistical sampling is not statistically
based, and results should not be extrapolated over the population as the sample is unlikely to be
representative of the population.
Design of the Sample
When designing the size and structure of an audit sample, IS auditors should consider the specific
audit objectives, the nature of the population, and the sampling and selection methods.
Auditor should consider the need to involve appropriate specialists in the design and analysis of
samples.
Selection of the Sample
There are four commonly used sampling methods. Statistical sampling methods are:
 Random sampling—Ensures that all combinations of sampling units in the population have
an equal chance of selection
 Systematic sampling—Involves selecting sampling units using a fixed interval between
selections, the first interval having a random start. Examples include Monetary Unit Sampling
or Value Weighted selection where each individual monetary value (e.g., Rs. 1) in the population
is given an equal chance of selection. As the individual monetary unit cannot ordinarily be
examined separately, the item which includes that monetary unit is selected for examination.
This method systematically weights the selection in favour of the larger amounts but still gives
every monetary value an equal opportunity for selection. Another example includes selecting
every ‘nth sampling unit

INFORMATION TECHNOLOGY 183


Computer Assisted Audit Techniques
Non-statistical sampling methods are:
 Haphazard sampling—The IS auditor selects the sample without following a structured
technique, while avoiding any conscious bias or predictability. However, analysis of a
haphazard sample should not be relied upon to form a conclusion on the population
 Judgmental sampling—The IS auditor places a bias on the sample (e.g., all sampling units over
a certain value, all for a specific type of exception, all negatives, all new users). It should be
noted that a judgmental sample is not statistically based and results should not be extrapolated
over the population as the sample is unlikely to be representative of the population.
Auditor should select sample items in such a way that the sample is expected to be representative
of the population regarding the characteristics being tested, i.e., using statistical sampling methods.
To maintain audit independence, the IS auditor should ensure that the population is complete and
control the selection of the sample. For a sample to be representative of the population, all sampling
units in the population should have an equal or known probability of being selected, i.e., statistical
sampling methods.

184 INFORMATION TECHNOLOGY


Data Analysis Using IDEA

3
C
H
A
DATA ANALYSIS
P
T USING IDEA
E
R

LEARNING OBJECTIVES
 To gain understanding on Importing different file formats into IDEA.
 To understand on how to generate field statistics for the database.
 To understand formatting Data.
There are many audit software available in the market. However, for the purpose of learning
CAATs, we will be using IDEA software in this chapter and also for performing exercises in
the lab. Students may refer to the ICAI publication titled: “Practical application of CAAT–case
studies” for more examples and details of CAATs using IDEA Software.

3.1 IMPORTING DATA


Function Description
Important Assistant brings the selected file or files into IDEA database management system. User-
friendly Import assistant guides user through a series of steps and instructions for importing the file
into the Software. All the functionalities of IDEA can be performed only when the file is available
within IDEA. Hence, the first step in data analysis is ensuring that the files to be audited are in
selected format acceptable in IDEA and are imported into IDEA.
Let us assume you have an Excel or Access file and you want to perform certain idea functionalities
on it, then it is important to import these files into IDEA.IDEA facilitates user to import external
files in different formats like Access, Excel, dbase or other ODBC/DSN formats into IDEA database.
We are explaining below step by step how to import a file into IDEA. If you have access to IDEA
Server, you can also import files to IDEA Server. For now, you will have to import a file to your
Working Folder. A Working Folder is simply a folder that contains the IDEA databases that you
wish to analyze. It is recommended that all the files related to each audit or investigation be stored
in a separate folder or directory to simplify file management and housekeeping.
Note: The sample files which are used for explaining how to perform various functionalities of
idea are available in the C:\Program Files\IDEA\UserFiles\Tutorial\ when IDEA is installed
with default settings. You can perform exercises using the relevant sample data files. Please check
with your lab instructor about the location of these files. We will be using tutorial/sample files for
explaining different functionalities of IDEA in this booklet.

INFORMATION TECHNOLOGY 185


Computer Assisted Audit Techniques
You can import files of different format into IDEA. However, for this exercise, we are giving below
an example for importing an Access file into IDEA.
Step by Step Procedure for Importing Data into IDEA
Location
 File>Import Assistant >Import to IDEA
 Alternatively, on the Operations toolbar, click the Import to IDEA button. Import Assistant
dialog box appears as shown in Fig 3.1.1.

Fig. 3.1.1 Import Assistant Location


Step 1: Select the Format

Fig. 3.1.2 Import Assistant Step 2

186 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
(a) In the Import Assistant Dialog Box, select Microsoft Access from the list.
(b) Click the Browse button next to the File namebox to select the Microsoft Access database you
want to Import.
(c) Navigate to and select C:\Program Files\IDEA\UserFiles\Tutorial\Customer.MDB.
(d) Click Open.
(e) The Select File dialog box closes and the selected file name and path appear in the File namebox
inthe Import Assistant dialog box.
(f) Click Next.
The Microsoft Access dialog box appears.
Step 2: Select Tables as shown in Fig 3.1.3

Fig. 3.1.3 Import Assistant Step 3


(g) In the Select tables box, select Database1.
Note: If you import a Microsoft Access file that contains more than one table, you may
simultaneously import multiple tables by selecting the associated check boxes. However, any
options you select will apply to all imported tables.
(h) All Character fields will be imported with a length of 255 characters unless changed. This is
not likely to be the underlying Character field length. Therefore, leave the Scan records for
field length check box selected. Also, accept the default value in the Scan only box in order to
scan 10,000 records to determine the maximum field length.
(g) Accept the default output file name (Customer), and then click OK. When the file is imported,
the database name becomes filename-tablename. In this case, the file you imported becomes
an IDEA database called Customer-Database.

INFORMATION TECHNOLOGY 187


Computer Assisted Audit Techniques
Step 3: Result - Customer-Database
On clicking Ok, the Customer Database is imported into IDEA. The imported database is opened in
the Database Window. In the File Explorer Window the imported database is highlighted as shown
in Fig 3.1.4

Fig. 3.1.4. Customer Database is imported into IDEA


Exercises:
1. Please perform the following exercises in your lab.
2. Please import excel file following the above steps.
3. Please import text delimiter file and notice the different steps.
4. Please import excel file using ODBC option.

3.2 IMPORTING DATA


Click on field statistics after importing the files and understand the nature of data which is imported.
Function Description
You can use the Export Database task to create an external file from an IDEA database so that you
can use the data in other applications, such as a spreadsheet package. IDEA exports data in a number
of text, database, spreadsheet, and mail merge formats.

188 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
You can use the Export Database task to create an external file from an IDEA database so that you
can use the data in other applications, such as a spreadsheet package. You can also use Copy and
Paste to incorporate portions of text or sections of database into other Windows applications. IDEA
also supports drag and drop into any other OLE2 container application, such as Microsoft Excel.
IDEA exports data in a number of text, database, spreadsheet, and mail merge formats.
Step by step process for exporting files from IDEA.
Location
 File>Export Database

Fig. 3.2.1 Export Database Location


Database Used
 Customer-Database1

INFORMATION TECHNOLOGY 189


Computer Assisted Audit Techniques
Export Dialog Box

Fig. 3.2.2. Export Database


(a) In Records to Select, on selecting All will select the entire records. On selecting Range allows
the user to select the Starting and Ending record number.
(b) By default the path is set to C:\Users\Saranya\Documents\IDEA\Samples\Customer-
Database1.
(c) In Export Type, user can select the format in which the current file has to be exported and also
name the resultant exported file.
(d) In Filename allows the user to select the path to which the file has to be exported.
(e) On clicking Fields, we can select or unselect the fields that have to be exported.
(f) During Exporting process, condition or criteria can be applied using the criteria button. On
clicking this button, Equation Editor Dialog box is opened which facilitates the user to write
in query or condition.
(g) Clicking Ok, exports the active file into given desired format.
Exercise:
1. Export actual idea file to different formats such as: HTML, Excel, text delimited file and check
the results.

3.3 SUMMARIZATION
Learning Objectives:
To total the sales transaction by INVOICENO to produce a list of outstanding Sales as well as to
identify the number of INVOICENO and the Sales per INVOICENO.
Function Description
Summarization accumulates the values of Numeric fields for each unique key. For example,

190 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
summarizing an Accounts Payable database by account number (the key) and totalling invoice
amounts produces a database or Results output of outstanding liabilities by supplier. The
Summarization task provides:
 A list of unique items (keys) in the database
 The number of records for each key
 Totals of one or more numeric fields for each key
You may select up to eight fields to summarize by or if using one field you can use the Quick
Summarization option. If using multiple fields, the Summarization task works faster and is more
efficient on a database that has been sorted.
You may select any number of Numeric fields to total. The resultant database provides a list of unique
key items and the number of records (NO_OF_RECS) for each key from where you can drill down
to display the individual records for the key. You can select additional field data to be selected from
fields from the first occurrence or the last occurrence.
The summarization result grid is limited to 4,000 rows and does not display results beyond 4,000
rows. If you expect your result will have more than 4,000 rows, you must choose to create a database.
Step by Step Procedure for summarization
Ensure that Sales Transactions is the active database and the Data property is selected in the
Properties window.
Location
 Analysis > Summarization

Fig. 3.3.1 Summarization Location


(a) In the Summarization Dialog Box, select the following:
  Fields to summarize: INVOICENO
INFORMATION TECHNOLOGY 191
Computer Assisted Audit Techniques
  Numeric fields to total: SALES
(b) Click Fields. The Fields dialog box appears. Note that no fields are selected. This stops
unnecessary information from being included in the summarized database.
(c) Click OK to return to the Summarization dialog box.
Select the Use Quick Summarization check box. The Use Quick Summarization check box may be
selected as a faster means to summarize your database. However, Quick Summarization may only
be used if the database has no more than 4,000 unique keys. In addition, Quick Summarization
allows you to select only one field to summarize.
There are two types of output from the Summarization task:
 Summarization database
 Summarization result
Note that as with most tasks in IDEA, you may apply a criterion to the task, for example; only
summarize transactions for a specified period. As with all other tasks where you can apply a criterion,
if you apply the criterion to the database using the Criteria link in the Properties window, the criterion
equation appears in the Criteria text box on the task dialog box. However, you may enter a new
criterion or modify an existing one using the Equation Editor as shown in Fig 3.3.2.

Fig. 3.3.2 Summarization


(d) In the Statistics to include area, accept the default selections of Sum.
(e) Click OK.
View the resultant database and note the following fields:
 INVOICENO- List of unique INVOICENO
 NO_OF_RECS - Number of records for each INVOICENO
 Sales_SUM- Total Sales of the transactions for each INVOICENO

192 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
Also note the number of records (989) on the Status bar displayed in the below figure. Note that IDEA
automatically creates an Action Field link to the parent database (Sales Transactions). It allows you
to display the records from the Sales Transactions database by clicking on a value (in blue) in the
NO_OF_RECS field as shown in Fig 3.3.3.

Fig. 3.3.3 Summarization Result


Exercises:
1. Use the sample employees file in the sample database of idea and perform summarization
on branch and total on salary. Click on the hyperlink of the number of records and check the
result.
2. Use the sample employees file in sample database of idea and perform summarization on
country and total on salary and check the result.

3.4 STATISTICS
Learning Objectives
Understanding to view the field statistics for the Numeric fields in the active database.
The statistics is used for reconciling totals, obtaining a general understanding of the ranges of values
in the database, and highlighting potential errors and the area of weakness to focus subsequent tasks.
Function Description
The Field Statistics property provides statistical information about all Numeric, Date, and Time
fields within the active database. The field statistics are available and displayed for all records in
the database, with any applied criteria ignored.
By default, the Field Statistics window displays the statistics for Numeric fields. Ensure that
Customer-Database is the active database and the Data property is selected in the Properties window.
Step by Step Procedure for Statistics
Location
 In the Properties window, click Field Statistics.

INFORMATION TECHNOLOGY 193


Computer Assisted Audit Techniques

Fig. 3.4.1 Statistics Location


(a) On clicking Field Statistics in property window, IDEA displays below message box.
(b) Click Yes to generate field statistics for all fields.

Fig. 3.4.2 Statistics


(c) By Default By default, the Field Statistics window displays the statistics for Numeric fields.
In this case, field statistics appear for all the available numeric fields. To view field statistics
for the Date fields and Time fields in a database, click Date and Time in the Field Type area
of the Field Statistics window. In the current database, there are no Date or Time fields.
(d) If the database contained more than one Date, Numeric, or Time field, multiple date, numeric,
or
Time field statistics would appear together on the same screen for easy comparison of values.

194 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
Statistics for Numeric Fields

Fig. 3.4.3 Numeric Statistics


As shown in the above image, active database contains six numeric fields and the statistics for all six
numeric fields are displayed in Field Statistics window which allows easy comparison between them.
Study the field statistics for the all Numeric fields. Note in particular:

UNIT_ QTY PROD_ AMOUNT PAYMENT_


PRICE CODE AMT
# of Records 1,000 1,000 1,000 1,000 1,000 1,000
# of Zero Items 0 0 49 0 49 49
Average Value 8.08 8.08 90.07 9627.42 710.36 710.36
Minimum Value 3 3.84 0 9598 0.00 0.00
Maximum Value 10 9.99 3496 9951 27793.20 27793.20
Below two Images displays statistics for Date and Time fields for current active database.
Statistics for Date Fields

Fig. 3.4.4 Date Statistics

INFORMATION TECHNOLOGY 195


Computer Assisted Audit Techniques
Statistics for Time Fields

Fig. 3.4.5 Time Statistics


Exercise:
 Click on field statistics for sample employees and understand profile of data.
 Click on field statistics for sample-inventory and understand profile of data.

3.5 SAMPLING
Learning Objectives
 To draw a number of records with fixed interval for testing.
 To select a random sample of records for testing.
 To extracts a random sample with a specified number of records from each of a series of bands.
Function Description
Sampling in IDEA is broadly statistical and probability-based.
The probability-based sampling techniques are: Systematic, Random and Stratified Random
The statistical sampling techniques are: Attribute, Classical Variable and Monetary Unit sampling
We will be covering examples of systematic and random sampling only in this training. Students
may try other forms of sampling in the lab exercise.
Systematic Record Sampling
Systematic Record Samplings a method to extract a number of records from a database at equal
intervals to a separate database. It is often referred to as interval sampling.

196 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
There are two methods of determining the sample:
 Entering the number of records, in which case IDEA computes the interval size.
 Entering the selection interval, in which case IDEA computes the number of records.
IDEA calculates the above parameters on the number of records in the database and defaults to the
first to last records. However, we can extract the sample from a range of records, if required.
Step by Step Procedure for performing Systematic Sampling
Ensure that Sales Transaction-Sales Trans is the active database and the Data property is selected
in the Properties window.
Location
 Sampling >Systematic.
 Alternatively, click the Random Record Sampling button on the Operations toolbar. The
Random Record Sampling dialog box appears as shown in Fig 3.5.1

Fig. 3.5.1 Systematic Sampling

INFORMATION TECHNOLOGY 197


Computer Assisted Audit Techniques
Step 1: Number of Records

Fig. 3.5.2 Number of Records


(a) In the Number of records to select box, enter 100.
(b) Accept the random number seed provided by IDEA. IDEA uses the random number seed to
start the algorithm for calculating the random numbers. If a sample needs to be extended, then
entering the same seed but with a larger sample size produces the same original selection plus
the required additional records.
(c) Accept the defaults in the Starting record number to select and the Ending record number
to
(a) Select boxes.
(b) IDEA sets the defaults as the first and last records; in this case 1 and 1000.
(d) In the File name box, enter Systematic Sales.
Step 2: Selection Interval

Fig. 3.5.3 Selection Interval

198 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
(a) In Selection Interval tab page, enter 10 for selection interval. This means it picks every 10th
records from 1 to 1000 records. Total records picked are 100.
(b) Click Ok.
Step 3: Result of Systematic Sampling

Fig. 3.5.4 Systematic Result


(a) As displayed in the result, every 10th record is picked from the active database and total numbers
of records are 100.
Random Record Sampling
Random Record Sampling is a commonly used method of sampling. With it we enter the sample size
as well as the range of records from which the sample is to be extracted to a separate database. Then,
using a random number seed, IDEA generates a list of random numbers and selects the appropriate
records associated with these numbers.
Step by Step Procedure for performing Random Sampling
Ensure that Sales Transaction-Sales Trans is the active database and the Data property is selected
in the Properties window.

INFORMATION TECHNOLOGY 199


Computer Assisted Audit Techniques
Location
 Sampling >Random.
 Alternatively, click the Random Record Sampling button on the Operations toolbar. The
Random Record Sampling dialog box appears as shown in Fig 3.5.5

Fig. 3.5.5 Random Sampling Location

Fig. 3.5.6 Random Sampling


(a) In the Number of records to select box, enter 10.
(b) Accept the random number seed provided by IDEA. IDEA uses the random number seed to
start the algorithm for calculating the random numbers. If a sample needs to be extended, then
entering the same seed but with a larger sample size produces the same original selection plus
the required additional records.
(c) Accept the defaults in the Starting record number to select and the Ending record number
to Select boxes.
IDEA sets the defaults as the first and last records; in this case 1 and 999.
(d) Leave the Allow duplicate records check box unselected.
(e) In the File name box, enter Random Sales.
(f) On clicking Ok total 10 records are extracted from active database.

200 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
Random Sampling Result

Fig. 3.5.7 Random Sampling Result


Exercises:
1. Perform sampling on different sample files available in sample database.
2. Perform stratified sampling using one of the tables in the sample database.

3.6 STRATIFICATION
Learning Objectives
To stratifying the data from the file into bands and gaining the profile of the data. The data can be
stratified based using the numeric, date or character field to select a random sample of records for
testing.
Function Description
The process of stratification involves creating bands based on ranges of values (normally from the
minimum to the maximum values of one or more fields) and accumulating the records from the
database into the appropriate bands. By totaling the number of records and value of each band, you
can gain a profile of the data in the database. You can then investigate any deviations from expected
trends. You may have up to 1,000 stratification bands. The stratification analysis is also useful for
determining high and low cut-off values for testing exceptional items.
A numeric stratification analysis can also be created for each unique value or key in a field by
selecting that field from the Group by drop down list. For example, you could produce a profile of
sales for each salesperson. This can potentially create an extremely large volume of output however
the maximum number of groups that will be displayed in the result is 80. If there are more than 80
groups, only the first 80 are displayed. Therefore, there is an option to specify low and high cut-off
values to restrict output. Only groups whose total value of transactions is between the specified
range are output.
To include all items in the stratification analysis, the bands should start less than the minimum value
and the upper band greater than the maximum value of all fields.
Date and Character stratification are different than Numeric Stratification in the sense that different
fields are totaled to the one used for banding.

INFORMATION TECHNOLOGY 201


Computer Assisted Audit Techniques
Step by Step Procedure for performing Numeric Stratification
Ensure that Sales Transaction-Sales Trans is the active database.
Location
 Analysis >Stratification.

Fig. 3.6.1 Stratify Location


(a) In the Field to stratify box, select SALES.
(b) In the Fields to total on box, select SALES.
(c) Group By USERID.
(d) Specify the stratification bands:
  Change the increment to 10,000.
  Click in the < Upper Limit text box of the first row. Note the text box is filled with the
value 10,500.
  Click the second row of the spreadsheet area. This automatically fills with 10,500to 20,500
  Highlight the next three rows of the spreadsheet area to take the range to 50,500.

Fig. 3.6.2 Stratification

202 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
Ensure the Create result check box is selected. In the Result name box, enter Stratification
Sales.
(e) Click OK.
(f) The Numeric Stratification result output for the Sales Transactions database becomes active
and appears as a link in the Results area of the Properties window. Note that there are 6
accounts in the first band ( >= 500 and < 10,500).

Fig. 3.6.3 Stratification Result


Exercises
Use sample-employees file and perform numeric stratification on salary with various bands.
Use sample-employees and perform character stratification based on name.

3.7 SORTING
Learning Objectives
 To create a new database in which its records are physically sorted in a specified order.
Ensure that Sales Transaction-Sales Trans is the active database.
Location
 Data>Sort.

INFORMATION TECHNOLOGY 203


Computer Assisted Audit Techniques

Fig. 3.7.1 Sorting Location


Function Description
The fields you select to sort the records by are known as keys. A sort order may contain up to eight
keys. When creating a sort order, the most significant field is selected first (primary key), followed
by the next most significant field, and so on down to the least significant field (secondary keys).
With the Sort task, a new database is created with the records in the sequence of the key. This new
database is a child database and appears in the File Explorer below the main database. Once you
have sorted a database, IDEA displays the records in the database in the sort order and updates the
list in the Indices area of the Properties window.
Step by Step Procedure for performing Sorting
Click on the Field list button (down arrow) on the Field column of the first row of the dialog grid
to display a list of all fields in the database. Select the required field.
The Direction column displays Ascending order for each field selected. To change the order for a
field, click the Direction column to activate the Direction list button.
To add further fields to the sort order, click the next available row in the Field column and select
the field and its direction as above. A maximum of eight fields may be entered. Note: If required,
you can delete a key from the sort order by selecting the required row and then clicking Delete Key.
Here DATE field is selected in descending direction.

204 INFORMATION TECHNOLOGY


Data Analysis Using IDEA

Fig. 3.7.2 Sort Database


(e) In File name box enter Sorted database.
(f) Click OK. Date field is sorted in descending direction as shown in the below figure.
Sorted-Database

Fig. 3.7.3 Sorted database

INFORMATION TECHNOLOGY 205


Computer Assisted Audit Techniques
Exercises:
1. Use Sample-Employees and sort on city.
2. Use Sample-Employees and sort on First Name, City and Salary.
3. Duplicate Detection and Gap Detection

3.8 DUPLICATE DETECTION


Learning Objectives
 To test the validity of invoices.
 To test for duplicate invoice numbers.
Function Description
IDEA includes two key functions to identify exceptions, irregularities, anomalies and errors.
These are: Duplicate Detection and Gap Detection
These functions assist the user to sift through large volumes of data and help pin-point specific
duplicate entries or specific missing entries. These also help the user obtain an assurance on all
the data reviewed by it. The duplicate or missing items identified can be taken up for testing after
running the respective duplicate and gap tests within IDEA.
Duplicate Detection and Gap Detection tests are standard passing tests which are run on every
database right at the (inception prior to detailed excepting and analytical testing within IDEA.
The tests do not require much querying experience and resemble plug-n-play tests. Both tests run
largely on formatted sequential data fields like Invoice Number, Purchase Order Number, Cheque
Number, etc.
Step by Step Procedure for Duplicate Detection
Ensure that Sales Transaction-Sales Trans is the active database.
Location
 Analysis >Duplicate Key >Detection.

Fig. 3.8.1 Identify Duplicates Location

206 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
(a) The Duplicate Key Detection dialog box appears.

Fig. 3.8.2 Duplicate Key Detection


(b) Leave the Output Duplicate Records option selected.
(c) Click Fields and select INVOICENO, INVDATE and USERID.

Fig. 3.8.3 Fields


(d) Click Key. The Define Key dialog box appears
(e) .In the Field column, select INVOICENO and leave the direction as Ascending.

Fig. 3.8.4 Define Key

INFORMATION TECHNOLOGY 207


Computer Assisted Audit Techniques
(f) Click OK to return to the Duplicate Key Detection dialog box.
(g) In the File name box, enter Duplicate.
(h) Click OK to run the task.
Duplicate Result
(a) In the resultant database of 8 transactions with DATE, INVOICENO and USERID duplicate
values are investigated.
(b) Duplicate file is opened as current active database.
(c) The given result is sorted based on INVOICENO field in ascending direction.

Fig. 3.8.5 Duplicate Result


Exercises:
1. Use Sample-Employees file and find out duplicates based on name.
2. Use Sample-Employees and identify duplicates based on fields: First Name and Name.
3. Use Sample-Employees file and identify duplicates based on Address.

3.9 GAP DETECTION


Learning Objectives
 To test for completeness.
 To test for gaps in the invoice number sequence.
Ensure that Sales Transaction is the active database.
Location
 Analysis >Gap Detection.

208 INFORMATION TECHNOLOGY


Data Analysis Using IDEA

Fig 3.9.1 Gap Detection Location


Step by Step Procedure for Gap Detection
(a) In the Field to use list box, select INVOICENO.
(b) In the Output area, ensure the Create result check box is selected.
(c) In the Result name box, enter Gap Detection Sales.
(d) On clicking Ok, the result database contains the gaps occurring From: INVOICENO, To:
INVOICE and Number in the active database.

Fig 3.9.2 Gap Detection

INFORMATION TECHNOLOGY 209


Computer Assisted Audit Techniques

Fig 3.9.3 Gap Detection Result


Exercise:
1. Use Sample-Bank Transactions file and identify gaps based on date.

3.10 AGING
Learning Objectives
 To age a selected database from a particular date for up to six specified intervals.These intervals
can be days, months, or years.
 To age the outstanding debts at the yearend in order to determine provisions required against
bad debts.
Function Description
Aging function presents aged summaries of data. This summary may be based on the current date
or a specified cutoff date. Use the Aging task to age a selected database from a particular date for up
to six specified intervals. These intervals can be days, months, or years. For example, you can age
the outstanding debts at the yearend in order to determine provisions required against bad debts.
The most common use of the Aging task is with Accounts Receivable or Debtor Ledgers. However,
also consider using Aging on inventory databases (date of last movement) or on short-term loan
databases.
The Aging task optionally produces:
 A detailed aging database
 A key summary database
 A Results output
Ensure that Sales Transaction-Sales Trans is the active database.

210 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
Location
 Analysis >Aging.

Fig. 3.10.1 Aging Location


Step by Step Procedure for performing Aging:
(a) Enter the Aging date to 2012/06/27 i.e yyyy/mm/dd format.
(b) Set the Aging field to use to DATE.
(c) Set the Amount field to total to SALES.
(d) Aging interval in Days. The other options are Months and year.
(e) The Aging task optionally produces:
  A detailed aging database.
 A key summary database.
  A result output.
(f) Select only Create result option.
(g) In the Name box enter Aging Sales.
(h) On clicking Ok, the below output is displayed.

INFORMATION TECHNOLOGY 211


Computer Assisted Audit Techniques

Fig. 3.10.2 Aging Location


Aging Result

Fig. 3.10.3 Aging Result


Exercise:
Use Sample Bank Transactions file and perform aging by entering the aging date as: 2003/11/06.

3.11 DATA EXTRACTION


Learning Objectives
 To perform an extraction to identify accounts where the new credit limit has been exceeded.
Function description
Extract selected data from a file for further investigation for creating a new file of logically selected
records. For example: you can use Direct Extraction to perform a single extraction on a database, or
up to 50 separate extractions with a single pass through the database.

212 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
Step by Step Procedure for Data Extraction
Ensure that Sales Transaction is the active database.
Location
 Data >Extractions >Direct Extraction.

Fig. 3.11.1 Direct Extraction Location

Fig. 3.11.2 Direct Extraction


(a) In the File Name column, replace the default file name with Sales Greater than 20,000.
(b) Click the Equation Editor Button, and then enter the equation SALES >= 20000.
(c) Click the Validate and Exit button to return to the Extract to File(s) dialog box.
(d) On clicking Ok creates a new child database with name Sales Greater than 20,000which contain
records where Sales is greater than 20,000.

INFORMATION TECHNOLOGY 213


Computer Assisted Audit Techniques
Record Extraction Result

Fig. 3.11.3 Direct Extraction Result


Exercises:
 Use Sample-Suppliers file and extract supplier details where supplier no. is from 30000 to
90000.
 Use Sample-Suppliers file and extract supplier details where country is “Chile”.

3.12 BENFORD’S LAW


Learning Objectives
To compare the data with the data pattern predicted by Benford’s Law analysis.
Function Description
Benford’s Law states that digits and digit sequences in a data set follow a predictable pattern.
TheBenford’s Law task generates a database, and optionally a Results output, that you can analyze
to identify possible errors, potential fraud, or other irregularities. If artificial values are present in the
selected database, the distribution of the digits may have a different shape, when viewed graphically,
than the shape predicted by Benford’s Law.
A Benford’s Law analysis is most effective on data:
 Comprised of similar sized values for similar phenomena.
 Without built-in minimum and maximum values.
 Without assigned numbers, such as bank accounts numbers and zip codes.
 With four or more digits.
Step by Step Procedure for using Benford’s Law function
Ensure that Sales Transaction is the active database.

214 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
Location
 Analysis >Benford’s Law.

Fig. 3.12.1 Benford’s Law Location


The analysis counts digit sequences of values in the database and compares the totals to the predicted
result according to Benford’s Law. Non-zero digits are counted from left to right and values below
10 are ignored.

]
Fig. 3.12.2 Benford’s Law
Steps for Benfords Law
(a) Select the field to analyze. In the Field to analyze drop-down list, select the Numeric field for
which you want to analyze with Benford’s Law.
(b) Select the number type. In the Include Values area, select the check box for the required number
type (Positive or Negative).
(c) Optionally, specify the upper and lower boundaries. The upper and lower boundaries define
the acceptable range of values where the actual result can appear. Select the Show boundaries
check box to include the boundaries in the Results output and resultant database.
(d) Select the required analysis types. In the Analysis Type area, select the required analysis types,
and then accept or change the associated database file names.
(e) Optionally, create a Results output.

INFORMATION TECHNOLOGY 215


Computer Assisted Audit Techniques
(f) On Clicking Ok, we get results for Benford’s First Digit, Second Digit, First Three Digit and
First Two Digit.
(g) In the below image, Benford First Digit result is displayed. To view Second, Third and Fourth
Digit result, click on the IDEA files explorer.

Fig. 3.12.3 Benford’s LawFirst Digit Result


Exercise: Use Sample-Bank Transactions file and perform Benford’s Law function on amount.
3.13 CONSOLIDATION OF DATA
Learning Objectives
 To summarize data and create a report based on many calculations.
 To define how your data is displayed and organized.
Function Description
Consolidation is the process of combining values from several ranges of data. Data can be
consolidated by Pivot Table.
Step by Step Procedure for reporting
Ensure that Sales Transaction is the active database.
Location
 Analysis>Pivot Table.

Fig. 3.13.1 Pivot Table Location


216 INFORMATION TECHNOLOGY
Data Analysis Using IDEA
In the Result name box, enter a name for the Pivot Table Results output.

Fig. 3.13.2 Pivot Table


Click OK. The Pivot Table Field List dialog box appears. It contains the list of available fields in the
database, with their field types in adjacent brackets.

Fig. 3.13.3 Pivot Table Field List


(a) Create the table by dragging fields to summarize from the Pivot Table Field List dialog box
to the following areas: Drop Column Fields Here, Drop Row Fields Here, Drop Data Items
Here and Drop Page Fields Here:
(b) You can drag the same field more than once into the data area creating a new statistic each
time - sum, amount, and so on.
(c) You can add multiple fields to the Column and/or Row area. When more than one field is
added to a column or row area the data in the rightmost header column or lowest header row
is grouped by data in the preceding row or column.
(d) You can also select a field from the Pivot Table Field List dialog box, select the area of the
pivot table to which you want to add the selected field from the drop-down list, and then click
Add To. Once a field has been added to the table, it is highlighted in the Pivot Table Field List
dialog box.
(e) For every field added to the pivot table, its sort order is added to the Indices area of the
Properties window. You may delete these indices from the Indices area without affecting the
pivot table.
(f) From the Pivot Table Field List dialog box, click Close.

INFORMATION TECHNOLOGY 217


Computer Assisted Audit Techniques
Pivot Table Result

Fig. 3.13.4 Pivot Table Result


Exercises:
1. Use Sample-Employees file and perform pivot table function with branch as row and salary
as column name.
2. Use Pivot table to find out salary as per country/branch and total of salary.

3.14 EQUATION EDITOR


Learning Objectives
 To create formulae and equations in IDEA.
Functions
Use functions to perform more complex calculations and exception testing. You can use them for date
arithmetic, text searches, and some statistical operations. They are very similar in style and operation
to functions found in other software packages such as Microsoft Excel, Lotus 1-2-3, and dBASE.
Each function calculates a result based upon the parameters passed to the function. Parameters are
passed in parentheses.

Fig 3.14.1 Equation Editor

218 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
Select the type of function you require from the following category list to view the details for the
associated functions:
 All - Complete list of all functions.
 Character - Text manipulation or conversion Numeric - Calculations and statistics
 Date and Time - Date and time calculations and conversions
 Matching - Matching of multiple and similar items
 Conditional - IF statements to select different items
 Financial - Financial calculations
 Custom - User-defined functions
Entering Functions in Equation Editor
Entering a function involves entering the function name along with any necessary parameters.
Functions are entered in the Equation area of the Equation Editor.
Entering the Function Name
To enter the function name in the Equation area, expand the appropriate function category and
then double-click the required function name. Alternatively, if you know the name of the function,
you can type it directly into the Equation area. As you type the function name, the Equation Editor
provides a list of possible function names.
Entering the Parameters
Parameters may be complete equations with references to other functions, such as nested
functions, or simple constants. Parameters are separated by a list separator. The list separator
is defined in your Windows Regional Settings and is usually a comma or a semi-colon. Most
functions require a specific number of parameters. A syntax error occurs if you provide the
wrong type of parameter to a function.

TYPE EXPLANATIONS EXAMPLES


String Represents text or a character expression. A character expression “Smith”
can contain characters or a Character data field. “123456”
“Joe” +
“Bloggs”
Number 123.45
Represents a numeric expression. A numeric expression can contain
ACCNT BAL
numeric constants or Numeric data fields.
QTY*COST
Time Represents a time expression. It is displayed in the grid as HH:MM:SS.
“23:59:59”
A time expression can contain a time constant expressed as a string,
TRANS_
a numeric constant, a Time field or a Numeric field. Numeric values
TIME
are interpreted as the number of seconds.
Date Represents a date expression. A date expression is a character “19960131”
string that is eight characters long and contains a valid date in TRANS_
YYYYMMDD format. DATE

INFORMATION TECHNOLOGY 219


Computer Assisted Audit Techniques

3.15 REPORTING
Learning Objectives
 To generate a report for the current active database.
Function Description
You can use the reporting feature to generate various types of reports from idea.
Step by Step Procedure for reporting
Create a report using the view settings by selecting File >Print >Create Report. Alternatively, click
the Create Report button on the Operations toolbar. The Report Assistant dialog box appears.
Report Assistant
Accept all defaults and select the Allow headings to span multiple lines check box. Click Next.

Fig. 3.15.1 Report Assistant


Step 1: Heading Step
Modify the report headings as follows, and then click Next:
 Date – Invoice Date
 INVOICENO – Invoice Number
 NAME – User Name
 SALES – Sales
 USERID – User Id

220 INFORMATION TECHNOLOGY


Data Analysis Using IDEA

Fig. 3.15.2 Report Assistant- Heading


Step 2: Define Breaks Step
(a) During this step, define if and where control breaks (required for totals in reports) are required.
(b) Sequence the database records in the following order:
 INVOICENO : Ascending

Fig. 3.15.3 Report Assistant - Define Breaks


(c) Click Next.
Note: IDEA displays the records in the report in the order of the index. IDEA displays the index
description in the Indices area of the Properties window once you have completed the report.

INFORMATION TECHNOLOGY 221


Computer Assisted Audit Techniques
Step 3: Report Breaks Step
Create a break and total the Sales field for each INVOICENO. Select the options as in the image
below, and then click Next.

Fig. 3.15.4 Report Assistant - Report Breaks


Step 4: Grand Totals Step
Create grand totals for the Sales field only, set the font style to bold, and then click Next.

Fig. 3.15.5 Report Assistant -Grand Totals


Step 5: Header/Footer Step
Enter/select the following information, and then click Finish.
 Print cover page: Select this check box.
 Title: Sales Transactions.
 Comments: Ordered by User Id and date.
 Prepared by: Enter your name or initials.
 Header: Enter the name of your organization.
 Date/Time: Accept the defaults unless you have particular preferences.
Note: The options you have selected effect how the report is printed. The name entered into the
Prepared by field appears on reports accessed via the Print Preview of a Results output.
222 INFORMATION TECHNOLOGY
Data Analysis Using IDEA

Fig. 3.15.6 Report Assistant – Header/Footer


On clicking finish, you can preview the report generated.

3.16 FIELD MANIPULATION


Learning Objectives
To view field definitions, add or delete fields, change field properties such as field name and type.
Function Description
You can use this to modify the fields as required. Please note that making changes to a field through
Field Manipulation may cause any output based on that field (results, drill-downs, indices, views,
etc) to appear incorrect or become invalid. Results may be made valid again by returning the settings
to what they were when the result was created. To avoid this, instead of changing a field definition,
append a new field to the database with the required definition. For example, instead of changing
the type of a field from Character to Numeric, create a new Virtual Numeric field using @Val.
Select Data>Field Manipulation. Field Manipulation Dialog Box is opened.

Fig. 3.16.1 Field Manipulation


 Add a field
 Click Append.
 Enter the field definition:

INFORMATION TECHNOLOGY 223


Computer Assisted Audit Techniques
 Field Name: A unique field name up to 40 characters in length that does not contain spaces or
special characters.
 Type: Click the Type text box to display the type options, and then select the required type.
 Length: The total length of the field in characters. IDEA automatically determines the length
for Editable Numeric fields.
 Decimal: If applicable, enter the number of decimal places. If the decimal is implied, enter 0.
The maximum number of decimals places allowed is six.
 Parameter: Click the Parameter field to invoke the Equation Editor.
 Tag Name: If you have Smart Analyzer installed, click the <No tag> link to add a tag.
 Description (optional): A brief description of the field. The maximum length of the description
is 256 characters.
 Click Ok
 Delete a field
 Click in the row corresponding to the field to be deleted.
 Click Delete.
 Click Yes to confirm the deletion.
Note: As a security feature, by default, native fields cannot be deleted
Change a field type
Click the Type text box to display the type options, and then select the required type.
Notes:
 Virtual field types can only be changed to other Virtual field types. For example, a Virtual
Character field could be changed to a Virtual Date field.
 Field types cannot be changed for Editable, Boolean or Multistate fields; however the data
within this field in the database can be changed.
Change a field name
Click in the Field Name cell of the field name to be changed and enter the new name.
Exercise:
Use Sample-employees file and modify different field and understand the impact.

224 INFORMATION TECHNOLOGY


Data Analysis Using IDEA

Annexure - Using Audit software: Some Practical Examples


These are samples of analysis which can be performed using audit software for various types of
audits/reviews.
Category Type of Analysis CAAT Function
Creditors  Payment terms  Extraction, Date difference

 Credit Control Policy  Extraction, Date difference,


 Aging of creditors  Aging, date difference
 Discount policy  Stratification, Summarization,
 Authorised suppliers  Join, Relation, Sort,
 Authorization  Filter, Extract, Summarization
 Accounting  Sort, Total, Count, Summarization
 Supplier classification on purchases  Sort, Relation, Join, Summarization,
 Analysis of purchases by period
Sort
 Aging, MIS, date difference
Tax Audit  Identify cash loan\deposits>20000  Sort, Filter, Extract, Export, Index,

 Identify cash payment > 10000


analytical tool Sort, Filter, Extract,
Export, analytical tool
 Review of TDS compliance
 Join, Relation, Sort, analytical tool
 Analysis of Inventory
 Aging, MIS, Summarization, Count,
Total
Financial  Review of Authorization  Filter, Extract, Summarization
audit  Review of discount policy  Stratification, Summarization,
 Compliance with tax rates – sales tax,  Join, relation, filter, extract, sort,
excise duty, etc count, Total, Compare files
 Verification of financial accuracy  Summarization, Sort, Statistics,
 Aging of debtors Total, Summarization
 Aging, MIS, Periodicity check
Internal  Overall statistical analysis  S t a t i s t i c s , B e n f o r d ’ s L a w ,
Audit  Identification of exception items Summarization

 Duplicate payment for invoices  Benford’s Law, Filter, Gap detection

 Debtors outstanding > credit period  Identify duplicates, Sequence,


 Join, Relation, Aging, Summarization
 Age-wise analysis of debtors
 A g i n g , M I S , S u m m a r i z a t i o n ,
 Age-wise analysis of inventory
Statistics
 Aging, MIS, date difference. total,
count

INFORMATION TECHNOLOGY 225


Computer Assisted Audit Techniques

Purchases  Duplicate payments  Duplicates, Sequence, Relation


 Invalid vendors  Join, Relation, Sort, Summarization,
 Duplicate invoices Filter

 Invalid purchases  Duplicates, Sequence, Relation

 Payments without receipt of goods  Join, Relation, Sort, Summarization,


Filter
 Inflated prices
 Join, Relation, Compare files, Filter,
 Excess quantities purchased Exceptions
 Filter, Sort, Stratify, Join, Relation
 Filter, Sort, Stratify, Join, Relation
Payroll  Ghost employees  Join, Relation, Summarization, Sort,

 TDS Statistics

 Duplicate direct credits  Re-computation using analytical tool

 Duplicate home addresses  Identify duplicates, Sequence,


Relation
 PO Box addresses
 Identify duplicates, Sequence,
 Work Phone Nos. Relation
 Work Location  Identify duplicates, Sequence,
 Deductions Relation
 Vacation and sick leave  Identify duplicates, Sequence,
Relation
 Wage level
 Identify duplicates, Sequence,
 Terminated employees Relation
 Overpayment, overtime  Re-computation using analytical tool
 Re-computation using analytical tool
 Join, Relation, Summarization,
Statistics
 Join, Relation, Filter, Statistics
 Summarization, Statistics, MIS, Join,
Relation

226 INFORMATION TECHNOLOGY


Data Analysis Using IDEA

Aging  Overdue A.R. and A.P.  Aging, MIS, date difference


 Favorable credit terms  Aging, MIS, date difference,
 Inventory turnover rates  Stratify, Filter, Summarization,
 Dormant accounts  Identify Gaps, date difference
 Records with future, blank or  Sort, Filter, Sequence, Identify Gaps,
otherwise invalid dates Date difference, Statistics, Count
 Items past a cutoff date  Date difference, Aging, Filter,
 Contracts awarded before contract  Date difference, Aging, Filter,
date Summarization, Statistics
 Transactions outside of billing  Aging, Filter, Summarization,
period Statistics
 Length in days of various activities  Date difference, Aging, Filter,
Summarization,….

QUESTIONS
1. Computer Assisted Audit Techniques (CAATs) refers to using _________for increasing the
effectiveness and efficiency of auditing.
A. Technology
B. Standards
C. Documentation
D. Systematic Process
2. Which of the following statements pertaining to CAAT is true?
A. CAATs are specialist tools designed for use by specialist IT auditors
B. CAATs refer to common techniques which can be easily mastered to audit in a
computerized environment.
C. CAATs cannot be used for compliance audit.
D. CAATs can be used for Information systems audit only.
3. Which of the following statements pertaining to CAAT is incorrect?
A. CAATs are tools for drawing inferences and gathering relevant and reliable evidence.
B. CAATs provide direct access to electronic information
C. CAATs provide a mechanism to gain access and to analyze data
D. CAATs techniques are available in general audit software only.
4. Which of the following is a key reason for using CAATs?
A. Availability of input documents
B. Availability of visible paper trail.

INFORMATION TECHNOLOGY 227


Computer Assisted Audit Techniques
C. Need to access information from systems having different IT environments.
D. Need to perform audit in lesser time.
5. Which of the following is a not a benefit of using CAATs?
A. Increased audit quality and comply with auditing standards.
B. Identify materiality, risk and significance in an IT environment.
C. Identifying fraud in audit area.
D. Ensuring better audit planning and management of audit resources.
6. For effective use of CAATs it is necessary to:
A. Understand programming language of the software being audited.
B. Obtain source code of the software being audited.
C. Obtain copy of data in their original format for independent analysis.
D. Audit data is retained in the original database format.
7. Which of the following step is important for validating the correctness of data obtained for
audit?
A. Issue a letter for getting the requested data in specified form as per the audit objectives.
B. Obtain copies of record layout and definitions of all fields.
C. Ensure that auditor has an overall understanding of the data.
D. Compare the imported in audit software with control total of key data.
8. File access in CAATs refers to the capability of:
A. Reading of different record formats and file structures.
B. Conversion of data to common formats of data
C. Using the import/ODBC function.
D. Reviewing access controls of application software.
9. File reorganization feature of CAATs refers to:
A. Functions provide auditor with an instant view of the data from different perspectives.
B. Indexing, sorting, merging, linking with other identified files.
C. Using of global filter conditions to select required data based on specified criteria.
D. Useof sampling, stratification and frequency analysis.
10. Which of the following statement pertaining precautions in using CAATs is incorrect?
A. Collect the relevant and correct data files.
B. Identify all the important fields that need to be accessed.
C. Ensure the data represents audit universe correctly and completely.
D. Information provided by CAATs is clear indicator of problems and no further testing is
required.

228 INFORMATION TECHNOLOGY


Data Analysis Using IDEA
11. Which of the following is the first step in using CAATs?
A. Identify the sources of data from the enterprise information system/application software.
B. Based on scope and objectives of audit, decide about the need and extent to which CAAT
could be used.
C. Identify the critical data which is being audited as per audit scope and objectives.
D. Identify the relevant personnel responsible for the data and information system.
12. Which of the following is the final step in using CAATs?
A. Obtain and review documents relating to data/information systems.
B. Decide what techniques of CAATs could be used as relevant to the environment
C. Prepare a detailed plan for analyzing the data.
D. Perform relevant tests on audit data as required and prepare audit findings and include
in audit report/opinion.

ANSWERS
1. A 2. B 3. D 4. C
5. C 6. C 7. D 8. A
9. B 10. D 11. B 12. D

REFERENCES
Below are sample list of references:
www.icai.org
www.isaca.org
www.auditnet.org
www.caseware-idea.org
www.acl.com
www.theiia.org

INFORMATION TECHNOLOGY 229


Computer Assisted Audit Techniques

4
C
H
A
ADVANCED
P
T ANALYSIS USING
IDEA
E
R

LEARNING OBJECTIVES
 Using advance extraction options for performing complex data analytics
 Understanding use of Benford’s Law in audit
 Understanding advance @ functions
 Learning Macro and IDEA Script

4.1 EXTRACTING SELECTED RECORDS


IDEA offers various options under “Extract Group” to select and extract records from databases and
perform further analysis and/or to save the extracted records as a separate database.
Following options are provided in IDEA to perform extraction under analysis menu:
1. Direct
2. Key Value
3. Top Records
4. Indexed
5. Duplicate Key Detection
6. Gap Detection
4.1.1 DIRECT
Direct function is used to extract records by writing one more criteria’s and allows to save result in
new database. With direct function we can provide one or more criteria to extract records.
Step by step procedure for using direct function
Open database ‘sales register’. Total records in the file are 999 and extract records having INV_
AMOUNT more than 10000.

230 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
Step 1: Analysis > Direct

Fig. 4. 1.1.1 – Direct option. Number of records 999


Step 1: Analysis > Direct Extract
Step 2: Records to extract:
  All – select this option to apply criteria on entire databases
  Range - select this option to apply criteria on range of records and not on entire database
Step 3: Database order: Criteria can be defined on indexed or sorted database by using this option.
Step 4: File Name: Give new file name

Fig. 4.1.1.2 – Give file name


Step 5: Click on equation editor icon to define the criteria
Step 6: Define the criteria on equation editor screen INV_AMOUNT > 10000 and click on validate
and exit option or press Ctrl+U

INFORMATION TECHNOLOGY 231


Computer Assisted Audit Techniques

Fig. 4.1.1.3 – Define criteria

Fig. 4.1.1.4 – Save file


Step 7: Click on OK

Fig. 4.1.1.5 – Result saved in new database

232 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
Step 8: A new file meeting the criteria is created with 896 records out of 999 having invoice amount
more than 10000
Note: Any Criteria defined in the equation editor can be saved by using Ctrt+S and it will save in
Equations.ILB folder of the active project. Same can be reused as it is or edited for further references.
Exercises: 1. Extract records of sales of more than or equal to 15000 in East region
Exercises: 2. Extract records of mobile phones sold to foreign customer
4.1.2 KEY VALUE
Helps to extract records using values in a key. This function is used to extract records for a key in
the entire database in a separate file. Key can be a region, product, zone, customer type, etc.
Step by step procedure for using Key Value function
Open database ‘sales register’. Total records in the file are 999.
Extract records based on key being ‘Product’
Step 1: Analysis > key Value

Fig. 4.1.2.1 Using Key Value


Step 2: Click on … besides ‘Existing keys:’ option

INFORMATION TECHNOLOGY 233


Computer Assisted Audit Techniques

Fig. 4.1.2.2 Existing Keys


Step 3: Select product from the drop down option and click on OK
Step 4: Idea will extract all the key values and will pop up under group found section

Fig. 4.1.2.3 Key values displayed


Step 5: Under output section, provide file name under ‘prefix for each database’
Step 6: Click on create a separate database for each unique key, will extract all the records for each
unique key in a separate database
Step 7: Use criteria tab to define condition for extraction of records key wise

234 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig. 4.1.2.4 Key wise databases created


Key value wise databases (product wise in our example) created and saved under master file sales
register
Exercises: 1. Extract records based on key value region for south and east region
Exercises: 2. Extract records based on EXEC_NAME for INV_AMOUNT exceeding 25000
4.1.3 TOP RECORDS:
Helps to extract specified number of top or bottom records for each value of key in a separate database.
Step by step procedure for using Top Records function
Open database ‘sales register’. Total records in the file are 999.
Extract 3 top records INV_AMOUNT wise for each of the customer type
Step 1: Analysis > Top Records

Fig. 4.1.3.1 – Top records Extraction

INFORMATION TECHNOLOGY 235


Computer Assisted Audit Techniques
Step 2: Number of records to extract - type 3
Step 3: Type: select Top records. Selecting bottom records option here will extract bottom records
for the given conditions
Step 4: Top Records for: select INV_AMOUNT
Step 5: Under Group (optional): select Customer Type
Step 6: File name – type Top 3 invoices customer wise
Step 6: Enter condition to apply the function on selected type of records

Fig. 4.1.3.2 – Top records Extraction customer type wise

Exercise 1: extract bottom 5 invoices for each executive


Exercise 2: extract top 3 invoices above Rs15,500/- for each region
4.1.4 INDEXED
Uses an existing index to narrow down the scope of extraction. This function can be used along with
criteria to get better results. It combines the capabilities of criteria and range extraction.

Step by step procedure for using indexed function


Open database ‘sales register’. Total records in the file are 999.
Extract records of INV_AMOUNT >= 15000 having invoice date between 3nd April to 10th April, 2014
Step 1: Analysis > Indexed
Step 2: Field- select INVOICE_DATE
Step 3: Value is - >= 20140403 (YYYYMMDD)
Step 4: and - <= 20140410
Step 5: Criteria – INV_AMOUNT > 15000

236 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
Step 6: File Name - Invoices above 15K between 3 to 10 April. 16 records extracted as an output

Fig: 4.1.4.1 – Index function options

Fig: 4.1.4.2 – Output of indexed function


Exercise 1: Extract invoices for west region having invoice value between 8000 to 48000
Exercise 2: Extract invoices for product refrigerator having invoice date between 21st March to 28th
March 2014
4.1.5 DUPLICATE KEY
IDEA includes two tasks for finding duplicate records:
Duplicate Key Detection: Identifies all records where the fields in the key are identical.
Duplicate Key Exclusion: Similar to Duplicate Key Detection, except that an additional field must
be different.
The Duplicate Key Detection task is used to identify duplicate items in a database. Duplicate Key
Detection can be used to identify duplicates within a single field, such as duplicate invoice numbers,
or duplicates in a combination of up to eight fields.
Duplicate Key Detection can also be used to identify non-duplicate keys (unique) by selecting the
Output Records without duplicates option instead of the default Output Duplicate Records option.

INFORMATION TECHNOLOGY 237


Computer Assisted Audit Techniques
The Duplicate Key Exclusion task is used to identify duplicate items in a database where a further
specified field is different, such as duplicate purchase order numbers for different suppliers.
Duplicate Key Exclusion can be used to identify duplicates within a single field, such as duplicate
invoice numbers, or duplicates on a combination of up to eight fields.
Step by step procedure for Duplicate Key Detection
The director of accounting is worried that several invoices may have been issued on multiple
occasions. Verify if there have been any multiple invoices issued.
Step 1: Ensure that Sales Transactions-Database is the active database and that the Data property
is selected in the Properties window.
Step 2: On the Analysis tab, in the Explore group, click Duplicate Key and then click Detection.
Alternatively, from the Quick Access Toolbar, click the Duplicate Key Detection button.

Fig: 4.1.5.1 Duplicate Key Detection dialog box.


Step 3: Click Key. The Define Key dialog box appears.
Step 4: Select INV_DATE in Ascending order and then select CUSTOMER_NO in Ascending order.

Fig 4.1.5.2 Define Key dialog box.


Step 5: Click OK.
Step 6: Accept the default selection of the Output duplicate records option.
Step 7: In the File name field, enter Duplicate Customer Sales on Same Day as in Fig 4.1.5.3.

238 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig 4.1.5.3
Step 8: Click OK.
The new database, containing all transactions with sales to the same customer more than once on
the same day, is created and opened in the Database window.
Step 9: Ensure that Duplicate Customer Sales on Same Day is the active database and that the Data
property is selected in the Properties window.
Step 10: On the Analysis tab, in the Tasks groups, click Re-run.
Step 11: In the Duplicate Key Detection dialog box, click Key.
Step 12: Add QTY as the third key.
Step 13: Click OK.
Step 14: In the Duplicate Key Detection dialog box, enter Refined Duplicate List as the file name.
Step 15: Click OK.
The new database of potential duplicates is displayed.
Step by step procedure for searching Non-Duplicate records
While Duplicate Key Detection allows you to search for more than one occurrence of a record, IDEA
allows you to extract records that appear only once in the database.
Step 1: Ensure Sales Transactions-Database is the active database and that the Data property is
selected in the Properties window.
Step 2: On the Analysis tab, in the Explore group, click Duplicate Key and then click Detection.
Alternatively, from the Quick Access Toolbar, click the Detection button.
Step 3: Select the Output records without duplicates option.
Step 4: In the File name field, enter Non-Duplicate Invoices

INFORMATION TECHNOLOGY 239


Computer Assisted Audit Techniques

Fig 4.1.5.4 Select Non-Duplicate records


Step 5: Click Key and ensure INV_NO is selected as your first field in Ascending order.
Step 6: Click OK.
Step 7: In the Duplicate Key Detection dialog box, click OK.
The new Non-Duplicate Invoices database will appear.
4.1.6 Gap Detection
The Gap Detection task identifies “missing” information in a database. The results of the test are
displayed in the Results area of the Properties window. The Gap Detection task can be used on a
Numeric field to identify gaps in a numerical sequence, such as missing check numbers in a payment
database.
The Gap Detection task can be used on a Character field to identify gaps in a numerical sequence
that is a sub-set of a Character field. For example, it may be used to identify gaps in an invoice
number sequence for each store where the first character of the invoice number identifies the store
(for example, A123).
The Gap Detection task can be used on a Date field to identify gaps in a range of dates. It provides
the option for excluding weekends and/or holidays, if required. For example, you can identify sales
transactions that occurred on non-working days.
Step by step procedure for Gap Detection on Numeric field
Step 1: Ensure that Sales Transactions-Database is the active database and that the Data property
is selected in the Properties window.
Step 2: On the Analysis tab, in the Explore group, click Gap Detection. Alternatively, on the Quick
Access Toolbar, click the Gap Detection button.

Fig 4.1.6.1 Gap Detection dialog box


Step 3: From the Field to use drop-down list, select INV_NO.
Select a range of values to test. By default, all values in the INV_NO field are tested and the minimum
and maximum values are listed as starting key value and Ending key value. You can also change

240 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
the Gap Increment to set a minimum gap to report.
Step 4: Ensure the Create result check box is selected.
Step 5: In the Result name field, enter Missing Invoice Sequences.

Fig 4.1.6.2 Result name.


Step 6: Click OK.
The result will display the ranges of invoice numbers that are missing in the database. Note that each
row shows a gap. Certain rows may contain more than one missing invoice number.

Fig 4.1.6.3 Result Missing invoice


Step by step procedure for Gap Detection on Date field
Step 1: Ensure that Sales Transactions-Database is the active database and that the Data property
is selected in the Properties window.
Step 2: On the Analysis tab, in the Explore group, click Gap Detection.
The Gap Detection dialog box appears.
Step 3: In the Field to use drop-down list, select INV_DATE.

INFORMATION TECHNOLOGY 241


Computer Assisted Audit Techniques
You can select a range of dates to test. By default, all values in the INV_DATE field are tested and
the minimum and maximum values are listed as Starting date value and Ending date value. You
can also choose to ignore weekends and holidays that are set by the user.
Step 4: Accept the default option to test all values.
Step 5: Select the Ignore weekends check box.
Step 6: Select the Ignore holidays check box and click Set Holidays….
The Set Holidays dialog box appears.
Step 7: From the Set Holidays toolbar, click the New button.
Step 8: Click the Browse button to select December 25 and December 26 (Fig 4.1.6.4).

Fig 4.1.6.4
Step 9: Click OK.
Step 10: In the Gap Detection dialog box, ensure the Create result check box is selected.
Step 11: In the Result name field, enter Missing Dates.

Fig 4.1.6.5 Missing Dates

242 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
Step 12: Click OK.
The result will display the ranges of dates that are missing in the database. Note that each row shows
a gap. Certain rows may contain more than one missing date.

Fig 4.1.6.6 Resulted Data base

4.2 DEFINE ACTION FIELD


Defines a custom action to be executed when the field is selected. It allows looking up for the
corresponding values in the linked file. For example, you have two files. Account details file has
details such as account number, branch code, status of the account and balance amount in the
account. customer details file has details such as account number, customer name, address, etc. this
function will allow you to perform a defined task on common fields present in both the files in our
case account number and will fetch the data from another file corresponding to the selected field.
Step by step procedure for using indexed function
Open databases ‘Account Details’ and ‘customer details’
Define action on filed ACC_NO
Step 1: Data > Define Action Field
Step 2: Click on column ACCNO heading to select entire column

INFORMATION TECHNOLOGY 243


Computer Assisted Audit Techniques

Fig: 4.2.1 – Define Action Field Options


Step 3: Click on … besides file name ‘account details.imd’ and select ‘customer details.imd’ from
the list

Fig. 4.2.2 – Create Action link


Step 4: Select look up field option and click select field ACCNO and click on OK

244 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig. 4.2.3 – Select Lookup field


Step 5: Click ok on the Define action field dialogue box
Step 6: Observe ACCNO field. Filed converted into a hyperlink type filed.
Step 7: Click on any record in accno field to see the corresponding information available for the
selected ACCNO in the customer detail file. Refer Fig. 4.2.4 below for results

Fig. 4.2.4 – Result of define action field


Step 8: To remove the link created by using define action field, go the option and select remove
action link option

INFORMATION TECHNOLOGY 245


Computer Assisted Audit Techniques

4.3 SEARCH
IDEA offers a variety of search options such as character, date, numeric field search. In character
based search feature a particular word is searched in multiple databases and within databases in a
particular field. This option is mostly used for character intensive databases having multiple character
fields. IDEA offers an option of saving the search result in a separate database for future reference.
IDEA offers advanced search features as under:
Boolean Search: Boolean Search is a type of search allowing users to combine keywords with operators
such as AND, NOT and OR to produce more relevant results.
Wildcard Search: Wildcard searches are not simply exact string matches, but are based on character
pattern matching between the characters specified in a query and words in documents that contain
those character patterns.
Proximity Search: Proximity search looks for documents where two or more separately matching
term occurrences are within a specified distance, where distance is the number of intermediate
words or characters.
Step by step procedure for using search function
Step 1: Data > Search

Fig. 4.3.1 Search


Step 2: In ‘text to find’ - type the word to search
Step 3: Tick case sensitive for more accurate search result
Step 4: Tick ‘Create an extraction database’ and provide file name to save search result
Step 5: Under scope option select field in which search word will be searched
Step 6: Cick on … besides ‘look for other databases’ to look for search word in other databases

246 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig: 4.3.2 Search options

Fig: 4.3.3 Search result

INFORMATION TECHNOLOGY 247


Computer Assisted Audit Techniques

Fig: 4.3.4 Search result


By clicking on the respective record in search window Fig 4.3.4. IDEA opens the database and points
the cursor to that record in the database
4.4.BENDFORD’S LAW
Benford’s Law, also called the first-digit law, was made famous in 1938 by Physicist Frank Benford,
who after observing sets of naturally occurring numbers, discovered a surprising pattern in the
occurrence frequency of the digits one through nine as the first number in a list. In essence, the
law states that in numbered lists providing real-life data (e.g., a journal of cash disbursements and
receipts, contract payments, or credit card charges), the leading digit is one almost 33 percent (i.e., one
third) of the time. On the other hand, larger numbers occur as the leading digit with less frequency
as they grow in magnitude to the point that nine is the first digit less than 5 percent of the time.
In the 1970s, Hal Varian, a professor at the University of California’s Berkeley School of Information,
suggested that the law could be used to detect possible fraud in lists providing socioeconomic
information. Since then, Benford’s law has been applied to large numbers of data to detect unusual
patterns that are often the result of errors or, worse, fraud. As part of their work, internal auditors
often employ tools and scientific methods that enable them to detect instances of fraud.
Benford’s law states that if there is a set of non-manipulated, naturally occurring numbers, the
occurrence frequency of digits one through nine as the first digit should be expected. As we can
see from the numbers in table 1, naturally 30 percent of numbers have one as a leading digit, and
nine occurs as a leading digit only one time in twenty. Because most financial and accounting data
conform to naturally occurring numbers, by comparing the occurrence frequency of these first digits
to Benford’s pattern, auditors should be able to determine irregularities and possible manipulations.
In 1938, the research and calculations were performed manually, which was painstaking. Today,
with computing power and the ease of accessing big data sets, one can see that Benford’s Law of
expected numbers is valid. It tests data such as Twitter users by followers’ count, most common

248 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
iPhone passcodes, population of Indian cities, government spending, and even includes the first
652,066 Fibonacci numbers.
The expected values for any data set of the first leading digit and also for the first two leading digits
are outlined in Table 6.1 below. For the first digit test, the first leading digit output is depicted in the
graph in Fig 4.4.1. For example, the leading digit 1 appears 30 percent of the time, whereas the leading
digit 9 appears 4.6 percent of the time. The bars are the actual data counts and the lines are the lower
and upper boundaries along with the expected count. This data set conforms to Benford’s Law.

First Digit Frequency Second Digit Frequency


0 --- 0.11968
1 0.30103 0.11389
2 0.17609 0.10882
3 0.12494 0.10433
4 0.09691 0.10031
5 0.07918 0.09668
6 0.06695 0.09337
7 0.05799 0.09035
8 0.05115 0.08757
9 0.04576 0.08500
Table 4.4.1: Benford’s Law First Digit Frequency and First Two Digits Frequency
Following are the assumptions of Benford’s Law: The numbers in the data set should describe the
same object
There should be no built-in maximum or minimum to the numbers
The numbers should not be assigned, such as telephone numbers, bank account numbers, social
insurance, or social security numbers
Does not apply to uniform distributions such as lottery balls where the uniform balls are selected
and not the actual numbers
Primary Benford’s Law tests are the first digit, first two digits, first three digits, and second digit
tests. Advanced Benford’s Law tests are summation and second order. Associated tests are last two
digits, number duplication, and distortion factor model. All but the last two tests can be automatically
executed from within the IDEA software.
The number duplication test identifies specific numbers causing spikes or anomalies in primary
and summation tests. Spikes in the primary tests are caused by some specific numbers occurring
abnormally too often. Abnormally large numbers in value cause spikes in the summation test.
The distortion factor model shows whether the data has an excess of lower digits or higher digits.
It assumes that the true number is changed to a false number in the same range or percentage as
the true number.
Most presentations and articles discuss using Benford’s Law to detect numbers near their
authorization limits. For example, if someone’s authorization limit is Rs. 10,000, then many first two

INFORMATION TECHNOLOGY 249


Computer Assisted Audit Techniques
digits in the 99, 98, and 97 areas will be detected using Benford’s Law if they are trying to maximize
authorizing expenditures.
Another example Bank has the limit upto Rs 50,000/- for cash deposit without PAN. For money
laundering transactions one will deposit just below the limit i.e Rs 49,999/- or Rs 49,500/-. Then last
two digits in the 99 and 00 will be detected using Benford’s law last two digits in IDEA.
Some other practical applications include:
 Accounts payable (expenses) data
 Estimations (accruals) in the general ledger
 Sales
 Purchases
 Non-arm’s-length transactions
 Customer refunds
 Bad debts
 Anti–money laundering
BENFORDS’S LAW IN IDEA
The Benford’s Law feature in IDEA can provide a valuable reasonableness test for large data sets.
IDEA only tests positive numbers 10 and over in the data file. For negative numbers, values greater
than minus 10 are excluded (exclude –9, –8, . . . –1). These steps eliminate immaterial items from the
analysis. Positive and negative numbers are analyzed separately.
The positive and negative numbers are evaluated on their own due to the fact that positive
numbers behave very differently from negative numbers. For example, where positive earnings are
manipulated for management bonuses, there is motivation to increase the earnings, moving away
from zero toward larger numbers. Where there are losses and management wishes to improve stock
prices, there is incentive to move the larger negative number to a smaller one toward zero.
IDEA can apply most of the Benford’s Law tests and can also display suspicious results in graphical
format. Tests provided in IDEA are the first digit, first two digit, first three digits, second digit, last
two digits, second order, and summation tests as shown in Fig 4. 4.2
Analysis > Benford’s Law

250 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig: 4.4.2 Applying Benford’s Law feature in IDEA

Fig: 4.4.3 Benford’s first digit test

INFORMATION TECHNOLOGY 251


Computer Assisted Audit Techniques

Fig: 4.4.4 Benford’s second digit test


This first two-digit primary test output from IDEA indicates that it does not conform in Fig 4.4.4 The
graph highlights the three most highly suspicious numbers and the three most suspicious items. By
placing the cursor over highly suspicious bar numbers 21, 70, 99, options for extracting or displaying
the records are offered. Field statistics may also be displayed.
Conclusion
Benford’s analysis, when used correctly, is a powerful tool for identifying suspect accounts or
amounts for further analysis. Benford’s analysis is a tool to complement additional tests/tools.
Benford’s Law is a wonderful tool for initial risk assessment of the contents of a data set. It provides
the auditor or investigator with a good starting point. The user must understand the business and the
industry to effectively use this tool. Knowledge of the business can quickly eliminate false positives.

4.5 ADVANCE @ FUNCTIONS


Step by Step procedure for accessing @Functions:
 Open any database
 In the Properties window, click Criteria.
 The Equation Editor is displayed. The right-side of the window displays the list of available
@Functions and displays the help page for selected @Functions.

252 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

 Expand a category node to display a list of associated @Functions.


 Select a @Function from the list to display its information.
IDEA provides more various @Functions for performing operations such as date arithmetic, financial
and statistical calculations as well as text searches.
The @Functions are accessed through the Equation Editor. Quick help including the syntax, a
description, and an example of use for each of the @Functions is available when the @Function is
highlighted in the list in the Equation Editor window.
Read the definitions below to become familiar with each @Function:
 Numeric expression: Refers to a number or an equation that evaluates to a number.
 String: A series of characters, such as a name or address.

@Function Description
@Abs Returns the absolute value of a numeric expression.
Returns 0 if time is in the AM and 1 if time falls in the PM and -1 for
@Afternoon
an invalid time.
@Age Calculates the number of days between two dates.
@AgeDateTime Returns the number of seconds between two dates and times.
@AgeTime Returns the number of seconds between two times.
@AllTrim Removes all leading and trailing spaces.
@Ascii
Provides the ASCII value of a character.
(not in IDEA Unicode)
@Between Determines if a numeric expression falls within a specific range.
Returns a number indicating whether a date value falls within a
@BetweenDate
specified range (1) or not (0).

INFORMATION TECHNOLOGY 253


Computer Assisted Audit Techniques

@Function Description
Returns a number indicating whether a time value falls within a
@BetweenTime
specified range (1) or not (0).
@Bit Identifies a bit value.
@BitAnd To mask out unwanted bits.
@BitOr To set required bit.
@Chr (not in IDEA
Provides the character equivalent of a specified ASCII code.
Unicode)
@CompareNoCase Ignores uppercase letters when comparing expressions.
@CompIf Determines if a record satisfies multiple criteria.
@Ctod Converts character dates to IDEA Date Format.
@Ctot Converts character time values to IDEA Time Format.
@CurForm Converts numeric value into a formatted text.
@CurVal Converts formatted character fields to numeric fields.
@Date Returns the present date.
@Day Returns the day in a date expression.
@DaysToD Converts a number of days since Jan. 1, 1900 to date format.
Calculates the fixed declining-balance depreciation for a specified
@Db
period.
@Ddb Calculates double declining-balance depreciation.
@Delete Deletes a specified number of characters from a string.
@Dow Returns the day of the week.
@Dtoc Converts date expressions to character.
@DToDays Reveals the number of days between Jan. 1, 1900 and a specified date.
@Dtoj Converts dates to Julian format.
@Exp Calculates the exponent of a numeric expression.
@FieldStatistics Returns the numeric value for a specified field statistic.
@FindOneOf Finds the position of the first matching character in 2 strings.
@FinYear Returns the financial year for a given date based on the year end.
@Format12hourClock Returns a string representing time formatted as HH:MM:SS TT.
@Fv Calculates the future value of an investment.
@GetAt Returns the character that appears in a specified numeric position.
@GetNextValue Returns the next value in the selected field.
@GetPreviousValue Returns the previous value in the selected field.
@Hours Returns the hours portion of a given time.
@If Allows a choice of two results based on the evaluation of a condition.
@Insert Inserts a string into an existing string.
@Int Returns the integer portion of a numeric value.

254 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

@Function Description
@Ipmt Calculates the interest payment for a given period.
@Irr Calculates internal rate of return.
@IsBlank Tests if a character field is blank.
@IsFieldDataValid Returns a 1 if the data in the field is valid or a 0 if the data is invalid.
Returns the starting position of a string within another string (case-
@Isin
sensitive).
Returns the starting position of a string within another string (NOT
@Isini
case-sensitive).
@Jtod Converts Julian dates to IDEA Date Format.
@JustLetters Returns a string with all the numeric characters removed.
@JustNumbers Returns all the numbers (leading and trailing).
@JustNumbersLeading Returns the leading numbers.
@JustNumbersTrailing Returns the trailing numbers.
@LastDayofMonth Returns the last day for any given month and year combination.
@Left Returns the specified leftmost characters in a string.
@Len Returns the length of a string, including any trailing spaces.
@List Determines which criteria in a list of values is met by an expression.
@Log Calculates natural logarithms.
@Log10 Calculates logarithm 10x.
@Lower Converts all characters in a string to lower-case.
@Ltrim Removes leading spaces from a string.
@Match Determines which criteria in a list of values are met by an expression.
@Max Returns the greater value of two numeric expressions.
@Mid Extracts a portion of text from within a string.
@Min Returns the smallest value of two numeric expressions.
@Minutes Returns the minutes portion of a given time.
@Mirr Calculates modified internal rate of return.
@Month Returns the month in a date expression.
@NoMatch Determines if an expression meets none of the criteria in a list of values.
@Npv Calculates the net present value of an investment.
@Ntod Converts a numeric expression into an IDEA date format.
@Ntot Converts a numeric expression into an IDEA time format.
@Pmt Calculates a loan payment.
@Ppmt Returns the Principal amount of a loan payment.
@Precno Returns the physical record number.
@Proper Capitalizes the first letter of each word in a string.
@Pv Returns the present value of an investment.

INFORMATION TECHNOLOGY 255


Computer Assisted Audit Techniques

@Function Description
Returns 1-4 representing the quarter a given date falls in based on the
@Qtr
specified year end.
@Random Generates a random number.
@Rate Calculates the interest rate of an investment/loan.
@Recno Returns the logical record number (index-sensitive).
@RegExp Matches character expressions using a complex set of rules.
@Remove Eliminates all instances of a specified character.
@Repeat Repeats the first character of a string a specified number of times.
@Replace Replaces a string or substring with another.
@Reverse Reverses the order of characters in a string.
@Right Isolates the specified rightmost characters in a string.
@Round Rounds to the nearest integer.
@Seconds Returns the seconds portion of a given time.
@Seed Sets the random-number seed.
Measures the similarity between two specified phrases or Character
@SimilarPhrase
fields.
Measures the similarity between two strings (either single words or
@SimilarWord
character expressions) or Character fields.
Extracts a specified occurrence of a segment of a character string that
@SimpleSplit
resides between certain characters like hyphens or backslashes.
@Sln Returns the straight-line depreciation of an asset.
@SpacesToOne Strips spaces leaving only one space between words in a string.
Returns the characters in a string that appear before any characters
@SpanExcluding
in a specified string.
Returns the characters at the beginning of a string that match any
@SpanIncluding
character of a specified string.
Breaks a character string into segments separated by characters, such
@Split
as spaces or commas, and returns a specified segment.
@Sqrt Calculates a square root.
@Str Converts numeric expressions to strings.
@Stratum Groups records by interval.
@Strip Removes all spaces, punctuation and control characters.
@StripAccent Removes an accent from an accented character.
@Syd Returns the sum-of-years digit depreciation for an asset.
@Time Returns the present time.
@Trim Removes trailing spaces.
@Ttoc Converts a time or number into a string with the HH:MM:SS format.
@Upper Converts all characters in a string to upper-case.

256 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

@Function Description
@Val Converts a character expression to numeric.
@Workday Returns 1 if a given date falls between Monday-Friday and 0 if the
date falls on a Saturday or Sunday.
@Year Returns the year in a date expression.
Examples of @functions:

@Function Purpose Example


@age For creating a new virtual To arrive at the difference in days between
numeric field with difference ‘Token Date’ and ‘Cheque Date’ in ANY BILL
in days. PAY FILE use @age(Cheque Date, Token Date)
through Field Manipulation.
@dow Identify transactions made on To capture cheques issued on Sunday use
any day of the week. @dow(Cheque Date)=1 through a Direct
Extraction. (1 is Sunday in IDEA)
@isblank Filter out blank character fields To present blank scheme agency name in
GRANTS-IN-AID data use @isblank(Scheme
Name) through Criteria.
@isini Capture specific character To display cheque in favour of field containing
strings from a character or alpha- ‘Shri’ for cheques issued inter-se Government
numeric field where the strings use @isini(“shri”, cheque in favour) through
are not case sensitive. Direct Extraction.
@compif Conditional function which In the Disaster Claim file, to create a new virtual
allows for preparing an numeric field titled Sanctioned Amount using
expression with multiple @compif(Category=”0400”, 1000000, Category
conditions and consequent = “0104”, 100000, “0103”, 500000, 1, 0) through
results. Useful for ‘If then field manipulation. This means if the category
analysis’ is 0400 the result in the new virtual numeric
field will be Rs. 1000000 and so on so forth.
@strip Removes all special characters, To check if the same sanction number has been
spaces and punctuation marks used more than once in the same controller,
from a character or alpha- DDO, PAO, Function Head and Scheme
numeric field. by inserting special characters or spaces to
bypass inbuilt system checks. Append a virtual
character field with criteria @strip(Sanction
Number). Then run a duplicate key detection
test on the stripped sanction number field.

INFORMATION TECHNOLOGY 257


Computer Assisted Audit Techniques

@Function Purpose Example


@left R e m o v e s t h e l e f t m o s t In the Disaster Claim file, every case claim is
occurrences of a character field administered a Unique Case ID of 12 digits.
or alpha-numeric field. The first 4 digits represent the category of
claim i.e. death (0400) etc. can be captured
separately by creating a virtual character field
using @left(Unique Case ID, 4) through Field
Manipulation.
@right R e m o v e s t h e r i g h t m o s t In the Disaster Claim file, every case claim is
occurrences of a character field administered a Unique Case ID of 12 digits. The
or alpha-numeric field. last 6 digits represent the claim serial number
which can be captured separately by creating
a virtual character field using @right(Unique
Case ID, 6) through Field Manipulation.
@mid Removes the central most In the Disaster Claim, every case claim is
occurrences of a character field administered a Unique Case ID of 12 digits.
or alpha-numeric field. The 5th and 6th digit together represent the
case tribunal number which can be captured
separately by creating a virtual character field
using @mid(Unique Case ID, 5,2) through Field
Manipulation.
@year Derives the year from any date In Tax collection data via APPLICATION
field in IDEA SYSTEM containing nodal scroll date, a new
virtual numeric field can be created using @
year(nodal scroll date) to derive the year of
collection through Field Manipulation.
@month Derives the month from any date In Tax collection data via APPLICATION
field in IDEA SYSTEM containing nodal scroll date, a new
virtual numeric field can be created using @
month(nodal scroll date) to derive the month
of collection through Field Manipulation.
@day Derives the day from any date In Tax collection data via APPLICATION
field in IDEA SYSTEM containing nodal scroll date, a new
virtual numeric field can be created using @
day(nodal scroll date) to derive the day of
collection through Field Manipulation.
@DtoDays C o m p u t e s t h e d a y s In Gradation List to compute the days for the
corresponding to any date field retirement date add a virtual numeric field
in IDEA with criteria @DtoDays(Retirement Date)
through Field Manipulation

258 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

@Function Purpose Example


@DaystoD Reverse compute Date from In Gradation List to compute the date from the
days. days add a virtual date field with criteria @
DaystoD(Retirement Date Days+30) through
Field Manipulation. The +30 is to suggest
adding 30 grace-days as an example.
@match Looks for multiple values in In Pension payments file to filter out basic
a field of choice through one pension equal to Rs. 3500 or Rs. 40000 (i.e.
single equation without the outliers) @match(Basic, 3500, 40000) can be
need of having to write multiple run through a Direct Extraction. This avoids
equations. the need to run two equations like (Basic=3500)
.OR. (Basic=40000)

4.6 CUSTOM FUNCTIONS


Custom functions are written using IDEAScript. Custom functions are used just like the included @
Functions within IDEA. The custom functions are accessible in the equation editor in the same area
as the @ functions. Custom functions are prefixed with the # symbol instead of the @ symbol as in
regular functions and have the file extension .ideafunc. Custom functions should be located under
the active IDEA project in the Custom Functions.ILB folder.
Step by Step guide to write custom functions:
Step 1: Click on Criteria under properties section
Step 2: Click on # sign in equation editor

Fig: 4.6.1 Open equation editor


Step 3: Select new to create new custom function and define a short but very effective custom function
as shown in Fig. 4.6.2 below.

INFORMATION TECHNOLOGY 259


Computer Assisted Audit Techniques

Fig. 4.6.2 Custom Function to Convert a Character Field into a Date Field
The custom function converts a character field containing date information into a date field in IDEA
format.
CDate is a Visual Basic function that converts a character date field into an actual date field that
is usable by IDEA. For example, the function can convert April 26, 2017, Apr 26/17, or 4/26/17
characters to an IDEA date field in the default format of DD/MM/YYYY.
Step4: Click on OK to save the custom function
The saved custom function is now available for use within equation editor dialogue box under
custom function section as shown in Fig. 4.6.3

Fig 4.6.3 – Custom function available within equation editor

260 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
4.7 ADVANCE SAMPLING
Statistics involves the study of research designs, the collection of the data, describing the data,
analyzing the data, and then forming a conclusion. We are interested mainly in the analysis of data
that has already been collected by us from various business systems. We hope to be able to arrive
at various conclusions after analyzing the data. Understanding some basic statistics allows you to
understand the makeup or distribution of your data files. This is especially useful when your data
file is large and contains millions of records. There are various types of statistical analysis, but the
two major categories are descriptive statistics and inferential statistics.
SAMPLING
The act, process, or technique of selecting a representative part of a population for the purpose of
determining parameters or characteristics of the whole population. Simply put, sampling is a process
of selecting a subset of the population or a number of records from the data set for the purpose of
making inferences or conclusions to the entire population or data set.
Audit sampling is the audit procedure of examining of a portion of items within a class of transactions
in order to evaluate one or more characteristics of that entire class. Either statistical or non-statistical
sampling methods may be used against a part of the entire data set to make a conclusion regarding
the entire data set.
Sampling is effective when the audit procedure or step does not require a 100 percent review of the
population of the class, but a decision or conclusion is required and it is not cost effective to audit
100 percent of the transactions.
STATISTICAL SAMPLING
Statistical sampling uses statistical mathematical calculations for selecting and then evaluating a
sample from the data set. Statistical sampling outlines in numeric terms the parameters and precision
levels associated with the sample conclusion.
One such use of statistical sampling that we are most familiar with are polls used to determine
candidate’s current standings in upcoming elections or in popularity surveys.
An auditor may be verifying an account balance through statistical sampling and conclude that it is
Rs. 100,000 plus or minus 5 percent or Rs. 5,000 each way (Rs. 95,000 to Rs. 105,000), 19 times out of
20. The conclusion would be that given the precision of the sample at 5 percent (plus or minus Rs.
5,000), there is assurance that the balance is correct with a confidence level of 95 percent. In addition,
if the materiality was predetermined to be at 7 percent, then it can be concluded that there would
no material error based on the precision level.
Confidence level is the remaining factor when the acceptable sampling risk is eliminated. In the
example of selecting a 95 percent confidence level, you allow only a 5 percent chance of getting the
wrong sample that does not adequately represent the entire population.
Using statistical samples to obtain familiarity with the data set might be useful but if it is not used to
reach a conclusion, it cannot be considered as part of the audit procedure. In addition to formulating
a conclusion, statistical sampling must use statistical calculations, and the sample must be random.
Proper use of statistical sampling is beneficial because it:
 Requires a scientifically accepted and defined approach.

INFORMATION TECHNOLOGY 261


Computer Assisted Audit Techniques
 Allows the auditor to maintain professional judgment in regard to audit risks and materiality.
 Displays the sample results and conclusion in relation to the selected data set population along
with defined judgment selections.
NON- STATISTICAL SAMPLING
Non-statistical sampling does not involve the use of statistical calculations. It relies on the subjective
sampling selections by the auditor and has less of a standardized approach. Non-statistical sampling
is beneficial where:
 The auditor needs to employ professional subjective judgment.
 There is a unique issue where there is a need for a less rigid standardized approach.
 The auditor should not be restricted to explicit numbers as to materiality or risk.
In order to effectively perform non-statistical sampling, the auditor must have a good knowledge of
the data set. Knowing the contents of the data or population allows for a supportable sample selection
choice and also supports the conclusion of the results. Sample selection may be based on random
sampling or other nonmathematical techniques such as judgmental, haphazard, or block selection.
Judgmental selection is frequently used when the auditor is very experienced and selects samples
based on sound judgment. Typically, the auditor will make the selections based on a combination
of representativeness of the population, value of the items, and relative risk of the items.
Haphazard selection is where the auditor picks items without basis of any mathematical formula.
The auditor believes that the items selected are representative of the population and no intentional
bias was applied to any of the included or excluded items.
Block selection is where a contiguous sequence of items is selected as samples. These blocks may be
invoice numbers from 1000 to 1100 or a specific type of transactions for the month of March. Block
selection effectiveness can be much improved by sampling several blocks.
SAMPLING RISK
The sample selected either through statistical sampling or non-statistical sampling methods might
not truly reflect the population even if done with the utmost care. This is the cause for sampling
risk, where the auditor’s conclusion based on the selected sample may differ from the reality of the
conditions of the entire population of the data set. Sampling risk occurs due to limited time and
resources that prevent an audit of the entire population.
Alpha or Type I risk is the risk of incorrect rejection. That is, the auditor incorrectly concludes from
the sample that the population errors are worse than they actually are.
Beta or Type II risk is the risk of incorrect acceptance. That is, the auditor incorrectly concludes from
the sample that the errors in the population are better than they really are.
Auditors are usually more interested in beta (Type II) risks, as they are concerned about the failure
to detect material misstatements.
NON-SAMPLING RISK
Auditors may draw incorrect conclusions from using sampling techniques where the wrong
inferences are not because of the selected samples themselves, but for other reasons not directly
connected with the sample contents.

262 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
Non-sampling risk is where the auditor may have selected an appropriate sample but arrived at a
wrong conclusion. Examples include employing inappropriate audit procedures, failure to recognize
errors present, or misinterpreting the results or evidence.
NON-STATISTICAL SAMPLING METHODS IN IDEA
The non-statistical sampling features built into IDEA are shown in Fig 4.7.1. IDEA has easy-to-use
random, systematic, and stratified random sampling built in.

Fig: 4.7.1 Non-statistical Sampling Feature in IDEA


STATISTICAL SAMPLING METHODS
There are three basic types of sampling methods that auditors may use. The choice of methods
depends on the main purpose of the sample and substantive test.
MONETARY UNIT SAMPLING (MUS)
Monetary Unit Sampling method is used to estimate the total monetary amount of potential
misstatement in a population. While other methods are based on occurrences or number of records,
this method is based on rupee values where the higher monetary value transactions have a higher
likelihood of being chosen in a sample. MUS is similar to systematic sampling, but where systematic
sampling may sample every thousandth record, MUS will sample every thousandth rupees. It is
typically used to determine the accuracy of financial accounts, where size is the most important factor,
and where errors are expected to be few and far between. MUS provides a substantive assessment
of error or misstatement in rupee figures and is specifically designed to predict overall error.
MUS should be used when:
 The process audited is well established and known to be reliable.
 The likelihood of errors (misstatements) is low.
 Obtaining a small sample size is important.
 You want to target larger rupee transactions, and expect to see some spikes in the data.

INFORMATION TECHNOLOGY 263


Computer Assisted Audit Techniques
Step by step procedure to perform MUS sampling:
1. Planning:
 Determine the objectives of the exercise.
 Define the population.
 Define what a misstatement means.
 Determine sample size, using the following:
 Confidence level - A percentage value comfort level that the sample will be representative
and that you have the capabilities to interpret the results correctly.
 Tolerable error -The point of no return past which you would no longer have faith in the
process audited, nor the validity of the sample.
 Expected error - The amount of errors or misstatements that are reasonably expected in a
population.
2. Performing MUS Sampling Procedures
 Select the samples.
 Perform the audit procedures.
 Record and analyze any errors observed.
3. Evaluation
 Create a projected misstatement by summarizing errors and extrapolating these across
population.
 Compare ranges of the projected misstatement against the tolerable error limit.
 Draw final conclusions.
As seen in Fig 4.7.2, IDEA will simplify all these steps for you.

Fig: 4.7.2 Monetary Unit Sampling Feature

264 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
In the example of testing sales, seen in Fig 4.7.3, we select absolute values as there are a few credit or
refund values that are negative amounts in the Total field. We select a confidence level of 95 percent.
Confidence levels below 90 percent are not generally recommended for MUS sampling. It should
be recognized that the higher the confidence level, the larger the sample size needed.
The tolerable error amount or percentage must be entered. This is the absolute error limit that can
be tolerated. The higher the tolerable error, the more errors you can accept and the lower the sample
size needs to be. In this example, with sales in excess of Rs.1.7 million, 1 percent or Rs. 17,000 was
decided as the maximum tolerable error. A 1 percent loss would be material enough to take actions
such as to initiate an investigation or redesign the sales system. Since MUS is only to be used for
processes where there is a high degree of confidence based on actual experience, significant errors
may indicate fraud, embezzlement, or untrained or incompetent staff.
The expected error is the anticipated misstatement that is a realistic estimate of likely errors expected
to found in the process. It is historical experience that dictates the estimate amount. Both the
expected error and tolerable error can be entered either as an amount or percentage. In this example,
management estimates that approximately 10 percent or Rs. 1,700 is the expected error.
When the Estimate button is selected, IDEA’s MUS calculation determines that in order to be 95
percent confident, it is necessary to set the sample size at 363 records and that there should be no
more than 36.25 percent tainting or total percentage of errors found.
Once the Accept button is selected, the Monetary Unit Sampling—Extract screen appears as displayed
in Fig 4.7.4

Fig: 4.7.3 Monetary Unit Sampling planning

INFORMATION TECHNOLOGY 265


Computer Assisted Audit Techniques

Fig: 4.7.4 Extracting the sample records for Monetary Unit Sampling
Three hundred sixty-three records are then extracted and an AUDIT_AMT field is created as in Fig
4.7.5 The value of this field is equal to the field being audited but can be changed to reflect the proper
amount determined during the execution of the audit procedures.

Fig: 4.7.5 Random Record Selection Results for Monetary Unit Sampling
Suppose three discrepancies were found, including the one in record number 250 where the actual
amount was Rs. 60.00 instead of the Rs. 55.32 recorded in the sales system as shown in Fig 4.7.6. To
evaluate the MUS sample, select the Single Sample option.

266 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig: 4.7.6 Audit Results of the Sampled Records


The screen in Fig 4.7.7 appears

Fig: 4.7.7 Evaluating Single Sample Results in Monetary Unit Sampling


Once OK is selected, the summary shown in Fig 4.7.8 appears displaying:
 Zero overstatements were discovered.
 Three understatements were discovered.

INFORMATION TECHNOLOGY 267


Computer Assisted Audit Techniques
 The net most likely error is Rs. 1,512.47.
 Both the gross and net upper error limits are less than materiality (tolerable error) of Rs. 17,000.
The conclusion is that with 95 percent certainty the projected total errors based on errors found in
the sample is within the accepted range and will not exceed the tolerable error of Rs. 17,000. That is,
you are 95 percent assured that the sample is representative of the population and that no actions
to investigate or redesign the sales system are needed.

Fig: 4.7.8 Summary and Conclusion of Audit Results of MUS


ATTRIBUTE SAMPLING
Attribute sampling is a statistical sampling technique often used to test internal controls; it evaluates
the individual attributes of a record to be either true or false. Examples include:
 Having two required signatures for check authorizations over certain amounts.
 Whether account receivables are overdue.
 If travel expense claims are valid or not.
Attribute sampling should be used when:
 There is a need for a statistical sampling solution and judgmental sampling will not suffice.
 The objective of the review is to test compliance to internal controls.
 The compliance testing should evaluate to a true or false result.
 A random selection process will meet the objectives of your review.

268 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
Step by step procedure to perform attribute sampling:
1. Planning
 Determine the objectives of the exercise.
 Define the population.
 Define what a misstatement means.
 Determine sample size, using the following:
 Confidence level: A percentage-value comfort level that the sample will be representative
and that you have the capabilities to interpret the results correctly.
 Tolerable error: The point of no return past which you would no longer have faith in the
process audited, nor the validity of the sample.
 Expected error: The amount of errors or misstatements that are reasonably expected in a
population.
2. Performing Attribute Sampling Procedures
 Select the sample.
 Perform the audit procedures.
 Record and analyze any errors observed.
3. Evaluation
 Create a projected misstatement by summarizing errors and extrapolating these across the
population.
 Compare ranges of the projected misstatements against the tolerable error limit.
 Draw final conclusions.
Similar to MUS sampling, attribute sampling requires a user to set certain boundaries and tolerances
for the calculations to be performed.
 Tolerable deviation rate as a percentage: Also known as tolerable error rate, this is the absolute
maximum percentage of transactions in error (i.e., not in compliance) that is acceptable as a cost
of doing business. If you have more errors than the tolerable error rate, this internal control is
not working and must be redesigned. The higher the tolerable error, the more errors you can
tolerate, and the lower the sample size needs to be.
 Expected deviation rate as a percentage: Also known as expected error rate, this is the
percentage of errors (i.e., noncompliance) you would reasonably expect to see, based on
experience. As a rule, the lower the expected error, the lower the sample size.
 Confidence level as a percentage: This is the likelihood that the sample records chosen are
indeed representative of the population at large, and that you will correctly interpret the
results. The more confident you need to be; the more samples you require.
In the example in Fig 4.7.9, management decided that the maximum percentage tolerable deviation
rate is 10 percent. Anything above 10 percent would suggest that the control is not working and may
need to be redesigned. Based on previous history, management expects a deviation rate of 3 percent.

INFORMATION TECHNOLOGY 269


Computer Assisted Audit Techniques
Management is happy to accept a confidence level of 90 percent that the sample is representative of
the population or data set. The population size or number of records is 89,979.
The population size, percentage tolerable deviation rate, percentage expected deviation rate, and
the confidence level must be entered into the Planning tab of the Attribute Sampling box.

Fig: 4.7.9 Planning for Attribute Sampling


Once the compute button is clicked, based on the information entered, IDEA informs you that you
would need a sample size of 52 and that there must not be more than two deviations or errors in the
sample to achieve a 90 percent confidence level that deviation level of the population is not more
than 10 percent. Refer to Fig 4. 7.10

Fig: 4.7.10 Conclusion to achieve attributes sampling objectives


270 INFORMATION TECHNOLOGY
Advanced Analysis Using IDEA
The random record sampling feature in Fig 4.7.11 can be used to randomly select the 52 required
records. A detailed audit of the 52 selected records determines whether the control was met. The
number of deviations is noted.

Fig: 4.7.11 Obtaining sample for attribute sampling


In the Sample Evaluation tab of the Attribute Sampling box, entries for the population size, sample
size, and percentage of desired confidence level are made again. The number of deviations (five)
discovered during the audit of the 52 samples must also be included, as noted in Fig 4.7.12.
Since five deviations are more than the critical number of deviations (two) in the sample calculated in
the planning stage, the conclusion is that there is 90 percent certainty that the number of deviations
could be significantly higher in the overall population than the 10 percent tolerable percentage. It
is 90 percent certain that there could be as many as 17.11 percent of errors if the entire population
was audited. As such, this sample cannot be considered as representative and it is likely the control
must be redesigned.

Fig: 4.7.12 Conclusion from the audit results of attribute sampling

INFORMATION TECHNOLOGY 271


Computer Assisted Audit Techniques

4.8 USING ADVANCED STATISTICAL METHODS


4.8.1 – CORRELATION
A correlation is a relationship between two things or mathematical variables that tend to vary or
move together. The data is represented by the letters x and y where x is the independent variable and
y is the dependent variable. The independent variable x is usually described first. There is usually
some logical connection between the two variables.
Many studies have been done on income levels of high school graduates, college, and university
graduates and those with post-graduate degrees. The question in those studies is whether there is
a connection or correlation between educational levels and income levels. Educational level would
be x, the independent variable that would influence the income level variable of y, the dependent
variable.
How much does the independent variable have influence over the dependent variable can be
determined by calculating the correlation coefficient and is designated as r. A perfect linear
correlation would have r equaling to 1 and a perfect negative correlation would have r equaling –1.
The closer r is to 1 or –1, the stronger the correlation. Where there is no correlation, r would equal to 0.
There are three basic formulas for calculating r. The correlation coefficient can be calculated for the
population, the sample, or the product moment.
The most common one is the product-moment correlation coefficient as shown below.
r = ∑(xy)/sqrt[(∑ ∑x2) (*y2)]
Σ denotes the summation symbol, so the formula for the top part or numerator is to multiply the
x variables by the y variables and then take the sum of those numbers. For the denominator, you
square the x variables and take the sum of them. Do the same for the y variables and then multiple
the resulting two sums. Apply the square root to the results and then divide the final results of the
numerator by the final results of the denominator to obtain the correlation coefficient.
Since we already know how to calculate the Z-scores (or have IDEA calculate it for us), a simpler
method of obtaining r would be to multiply the Z-scores of the x variables by the Z-scores of the y
variables and then total up all the results. Take the total of the results and divide by the number of
records less one.
The formula would be r = Σ(Z x * Z y )/( n – 1) where Z x is the Z-score for the x variable and Z y is
the Z-score for the y variable. The letter n in the formula represents the number of records.
In general, the correlation coefficient, whether negative or positive, can be interpreted as:

.0 to .2 No correlation
.2 to .4 Weak correlation
.4 to .6 Moderate correlation
.6 to .8 Strong correlation
.8 to 1.0 Very strong correlation
The calculations of the correlation coefficients were shown for a better understanding of correlation.
The auditor does not need to perform the calculations using the formulas, as IDEA has a built-in
correlation feature that provides the correlation coefficient and you merely have to interpret the

272 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
results.
Using a summarized monthly sales file from a POS system, we select correlation from the statistics
area of IDEA. For demonstration purposes, the fields we correlate will be the HD_NETAMOUNT_
SUM field, which is the sales amount before taxes, and the PAYAMOUNT_SUM_SUM_SUM field,
which are amounts paid that include taxes. We will also include payments of cash only and payments
of debit cards only for the correlation calculation as shown in Fig 4.8.1.1. In addition to the results
being displayed, which can be exported to various file formats, you may optionally create an IDEA
database of these results.
As expected, there is a perfect positive correlation of 1.000 between sales before taxes and payments.
As sales go up or down, the sales tax moves accordingly, so the total payment by customers’ correlates
to sales net of taxes.
There is a strong correlation between both the cash tender and the debit cards tender to the payment
amounts of 0.710 and 0.792, respectively. There is no correlation between cash and debit cards
payments as the correlation coefficient is 0.189. See Fig 4.8.1.2.

Fig: 4.8.1.1 Applying the Advanced Statistical Analysis Correlation Feature of IDEA

Fig: 4.8.1.2 Correlation coefficient results

INFORMATION TECHNOLOGY 273


Computer Assisted Audit Techniques
While IDEA does not calculate the coefficient of determination, it can be done simply by squaring
the correlation coefficient that is already calculated for you. The coefficient of determination, or
r2, tells us how much of the variation in one variable can be attributed to the variation of the other
variable. This calculation when multiplied by 100 will be expressed in a percentage.
In our example of the correlation between cash tender and the payment amount of 0.710, 50.41
percent (0.710 × 0.710 × 100) of the variation can be attributed to the other variable.
One has to be mindful that even if the variables are calculated to have a strong correlation, there
may not be a cause-and-effect relationship.
Are there direct cause-and-effect relations? That is, does x cause y or, in our previous example, does
the level of education cause the income level? Maybe it is a reverse cause and effect where y causes
x. That is, income levels determine your education level.
Possibly there is a third variable or a combination of several other variables that caused the
relationship, such as networking relationships while in school that resulted in higher paying jobs.
Maybe the whole relationship between the two variables was just a coincidence?
4.8.2 TREND ANALYSIS
Trend analysis is based on regression analysis. Regression analysis produces a line of best fit and
predictions can be made based on the line. It is also known as the least square line, because the line
passes through the distribution where the distance squared from the line is minimized.
Similar to that of correlation, the x variable can estimate or predict the y variable. That is, if x changes,
then how much y changes can be estimated. For two numeric variables, you can predict y from the x
variable if the correlation coefficient is strong and there is a linear pattern for the variables. Normally
you would want the r correlation coefficient to be better than plus or minus 0.60.
Unless there is perfect correlation, the prediction for the value of y, given x, is merely a prediction. It
is a guess but an educated guess with some sound scientific basis. The prediction will be subject to
some amount of error. The standard error of the estimate measures how much the predicted values
deviate from the actual y values. IDEA uses the mean absolute percent error (MAPE) to calculate the
accuracy of predictions. MAPE is the average of the percentage errors, is expressed in percentage
terms, and works best with positive amounts. The MAPE number is the predicted line on the average
that is away from the actual line in percentages. Low MAPE values mean that the past data has a
good fit to the regression line and you can have more confidence in the data and prediction.
To use trend analysis in IDEA, the database needs at least one numeric field, and the field where
trend analysis is to be applied cannot contain any bad data. The audit unit field cannot be the same
field as the trend analysis field. In addition, the database should not contain seasonal data. If it
contains seasonal data, then time series analysis should be selected over trend analysis. Time series
works similarly to trend analysis.
In our data file, we will perform trend analysis on the 12-month data from the debit card payments
field of DEBIT_2010_2011 and generate 3 months of forecasts. It is not necessary to provide a reference
field or audit units. Refer to Fig 4.8.2.1.
For debit card payments, it is trending slightly downward, and it is predicted that at the end of the
three months, debit payments would drop to approximately Rs. 18,000 for that month as seen in
Fig 4.8.2.2.

274 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
The MAPE is 5.36 percent, which provides high confidence as the reliability of the predictions.
In contrast to the debit card payments, cash payments are trending upward when we select
CASH_2010_2011 as the field to trend.
There is less reliability in the prediction as the MAPE percentage is 23.17. It is predicted that at the
end of the three months, cash payments would increase to approximately Rs. 14,500, as displayed
in Fig 4.8.2.3.
We will perform a trend analysis showing a reference field and audit units. There are five branches
and we will include all of them as audit units. The reference field of GLOBAL_AVERAGE_SALES
is the average sales for the five stores broken down by months. We have eight years of data so each
store would have 96 records (8 years × 12 months). We will generate forecasts for three months as
shown in Fig 4.8.2.4.

Fig. 4.8.2.1 Trend analysis in IDEA

Fig. 4.8.2.2 Trend analysis results of debit card payments with forecast of three months

INFORMATION TECHNOLOGY 275


Computer Assisted Audit Techniques

Fig. 4.8.2.3 Trend analysis results of cash payments with forecast of three months

Fig. 4.8.2.4 Applying trend analysis of sales referencing global average sales for each branch
Branch A outperformed the average of the five branches. The actual data is above the reference
data line and shows good promise of trending upward in Fig 4.8.2.5. The prediction is sound as the
MAPE is 5.26 percent.

276 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

By selecting all five branches as the audit unit, we can display other branches by choosing from the
Audit unit pull-down menu. We will look at one more by selecting

Fig: 4.8.2.5. Result of branch A’s trend analysis with three month’s forecast
Branch B see Fig 4.8.2.6 fits right in around the global average sales and is also trending up.

Fig: 4.8.2.6. Result of branch B’s trend analysis with three month’s forecast

INFORMATION TECHNOLOGY 277


Computer Assisted Audit Techniques
4.8.3 TIME SERIES
For data with seasonal values where there are higher values in certain months (or any other time
units) and lower values in other months, the time series analysis option is more appropriate. In
our example in Fig 4.8.3.1, we will use gas-heating costs as the field for the time series and all five
branches as the audit units. We ensure that we input the correct season length of 12 as our records
are broken down by months. We will generate 12 months of forecasts.

Fig: 4.8.3.1. Applying Time Series Trend Analysis of Heating Costs for Each Branch
with 12 Month Forecast

Fig. 4.8.3.2 Result of branch A’s time series analysis with 12 months’ forecast
From the Fig 4.8.3.2, you can see that heating costs are higher in the winter months and lower in
the summer months for branch A. The mean absolute percentage error of 11.40% is fairly reliable
in terms of the forecast. You can also view the other branches by using the pull-down menus from

278 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
the Audit unit area.
Trend analysis using IDEA is simple and the auditor need not be concerned with the complex
formulas to calculate the regression line and the mean average percentage error.

4.9 IDEA SCRIPT


IDEA Script is a programming tool in IDEA that allows for combining numerous steps into a single
procedure. The programming language is similar to that of Microsoft’s Visual Basic for Applications.
IDEA Script files are also known as macro files. It is a file that performs a series of actions when
executed. IDEA Script can record actions for editing and modification to make the macro good for
general use. Any user can apply the script to any suitable data files. IDEA Script is a powerful tool
that speeds up repetitive procedures.
The tools built into IDEA eliminated the need to enter your computer codes from scratch. The
record macro task can be used to record a sequence of steps that will be the framework for your
application or macro. The Dialog Editor will help you design customized dialog boxes that you can
use to control the flow of your application and to prompt the users for required input. However,
IDEAScript cannot always anticipate all of the details you may want to incorporate in your macro
so you will still have to write or edit some of the code.
IDEA Script can be used for:
 Automating repetitive tasks: Regular tasks, such as monthly data that needs to be analyzed,
can use IDEA Script to run and repeat the required procedures automatically. IDEA Script can
be efficiently used when certain procedures are required to be applied in multiple locations
such as departments, divisions, and branches. Another frequent repetitive task is to import
files. This can be automated to select the input files, specify the output names, perform the
imports, and perform required data cleanup or scrubbing.
 Creating an automated analysis system: A set of tests or procedures can be integrated into
an IDEA Script where the user may select particular tests to apply.
 Controlling other software packages: Using Microsoft’s object linking and embedding (OLE)
technology, other OLE-enabled software can be controlled from within IDEA. One example
is that of sending IDEA data into an Excel spreadsheet. IDEA Script performs analysis tasks
such as summarization, sends the summarized data into an Excel spreadsheet, and then the
IDEA Script instructs Excel to chart the summarized data into bar graphs.
 Creating custom tests: IDEA Script can be used to create specific tests based on the user’s
or the organization’s needs. Typically, these would be performing calculations that involve
comparisons and equations.
In using IDEA Script, work will be performed faster and the results will contain fewer errors. The
analyses are done more consistently and can be undertaken by other staff members. Standards are
adhered to by all users.
Consideration for Automation
The following steps should be considered when planning to create an IDEA Script.
 Identify those tasks that are frequently repeated.
 Select those procedures that are well defined and well understood.

INFORMATION TECHNOLOGY 279


Computer Assisted Audit Techniques
 Plan the macros carefully to ensure the results are those expected.
 Include user-input dialog boxes so that others can use the IDEA Script.
 Make the script as flexible as possible so it is useful to other users.
 Test IDEA Script on other computers with different versions of IDEA for compatibility and to
ensure that the script works as expected.
Visual Script versus IDEA Script
Visual Script can create and edit macros in IDEA. Visual Script is a visual representation of batch
processing that allows for simple dragging (or double clicks) of desired action choices from the left
side of the window to the right side for project steps of the Visual Script screen, as shown in Fig 4. 9.1.
Visual Script, like IDEA Script, allows for automation of repetitive tasks. However, the automation
can be performed without the complexity of knowing any programming and writing code. There
are limitations, such as not being able to create message boxes, nor will Visual Script run in the IDEA
Server environment. Visual Scripts have the .vscript filename extension and are saved to the default
Macros .ILB folder under the active project folder.
Visual Scripts can be later converted to IDEA Scripts, through an option in the Visual Script Editor.
Because of the easy conversion to IDEA Script, you can start the steps for your macro in Visual Script,
convert it to IDEA Script, and then code additional functionalities within the IDEA Script editor.
Visual Script has the ability to include IDEA Scripts into it. This makes it simple to group together a
number of IDEA Scripts and have Visual Script run them all. Visual Script is an excellent personal tool.
IDEA Script can use dialog boxes, control other software applications, and interact with the operating
system. An example of the IDEA Script editor window with a sample script is shown in Fig 4.9.2.

Fig 4.9.1: Visual script Editor Window

280 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig 4.9.2: IDEA Script Editor Window


Creating IDEA Scripts:
The script in Fig 4.9.3 is an example of interacting with the Windows operating system function of
renaming a file in a folder. This script does not include dialog windows to allow a user to select the
folder and file to be renamed. It is hard-coded into the script that the “text.txt” file must be in the
C:\data folder. It can only be renamed to “text_renamed.txt.” The “CreateObject” function allows
IDEA Script in IDEA to access Windows file-system functions and other application functions, such
as in Microsoft Excel.

Fig: 4.9.3 IDEA Script to rename a file


An example of a dialog box is shown in Fig 4.9.4. The IDEA Script extracts transactions with even
thousand amounts from the active file in IDEA. The script takes all numeric fields within the file
and allows the user to select the field to apply the test on. In this case, the AMOUNT field is the
appropriate one to select from the pull-down selection box.

INFORMATION TECHNOLOGY 281


Computer Assisted Audit Techniques

Fig: 4.9.4 Dialog Box for Extracting Records with Even Thousand Amounts

Fig: 4.9.5 Visual Script for Extracting Records with Even Thousand Amounts
In contrast, when using Visual Script, as shown in Fig 4.9.5, the procedure is:
 Under File, select Open Database. All databases in the current project are offered for selection.
Choose the file to open.
 Under Extract, select Direct. The direct extraction option opens up. Enter in the File Name area
MOD Thousand. Enter the equation of (AMOUNT % 1000) = 0 in the Criteria area or Equation
editor.
 By double clicking on the “Payments” filename under the Project Steps, all databases in the
current project are offered again.
 By double clicking on Direct Extraction under the Project Steps, the Direct Extraction option
opens up where you can modify the output filename and change the equation.

282 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
CREATING MACRO:
Visual Scripts are simpler to create but the user needs some knowledge to apply, such as being able
to understand the equation and modify it. IDEA Scripts are more complex for the programmer but
easier for the user. They are also more accurate if error checking is built in. Creating simple IDEA
Scripts can be as easy as recording the steps that you are taking to accomplish a task. Fig 4.9.6 shows
how you can start and stop recording a macro.

Fig: 4.9.6 Recording Macro


Start recording the macro. Perform the procedures and then stop recording the macro. A window
will then pop up as shown in Fig 4.9.7.

Fig: 4.9.7 Macro option after ending recording of macro


You can select either Visual Script or IDEA Script. Selecting either one will open the appropriate
editor window and automatically paste the actions or codes in. When procedures are performed
in IDEA, they are logged in the history found under the Properties window. You can copy all the
procedures into IDEA Script or selected tasks. In our example in Fig 4.9.8, we select the “Copy the
IDEA Script for the selected task(s)” option since we right-clicked on the record extraction area to

INFORMATION TECHNOLOGY 283


Computer Assisted Audit Techniques
bring up the selection. Once the selection is made, the IDEA Script editor opens and the script is
automatically created for you.

Fig: 4.9.8 Creating Macro from file History


You can make changes to both the source and output filenames along with the equation from within
the IDEA Script editor to suit you. Alternatively, you can add dialog boxes and coding to allow for
user input. The dialog box shown in Fig 4.9.4 was created in the IDEA Script editor’s dialogs area,
displayed in Fig 4.9.9.

Fig: 4.9.9 Dialogue Editor

4.10 IMPORTING FILES WITH REPORT READER


The information you want to audit is usually available as a printout. In most cases, the printout can
be routed or “spooled” to disc, and then transferred to the auditor’s personal computer. Occasionally,
it may be necessary to use a print file interceptor, which will redirect the print file being sent to the
printer to a file on disc.
The differences between an ASCII file and a Print Report file are mostly in the header and footer, and
in the extra lines and totals that you have to include or remove in order to import the file into IDEA.

284 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
Report Reader extracts data from plain text reports saved to file or some Adobe Acrobat PDF files
and translates it into the specialized file formats of IDEA.
Step-by-step procedure to import file with Report Reader:
1. Access the print report or .PDF file.
2. Create the Base Layer.
Report Reader uses a set of layers to define the data to be imported into IDEA. The first layer defined
is the Base Layer. The Base Layer tells Report Reader to write a record for each occurrence of the
information defined by the layer. The Base Layer must be defined at the detail line, or transaction level.
A detail line is the line or lines that contain the information to be identified as a single transaction or
record in the resulting IDEA database. The detail line can be a single or multi-line entry in the report.
IDEA will be prompt to:
 Create a standard layer: Select this option when the report is in columnar format.
 Create a floating layer: Select this option if the data is not displayed in columns.
 Exclude it from the output: This option is only available after the Base Layer is created.
This option allows you to exclude lines that contain data not required for import.
3. Create an Append Layer.
An Append Layer captures information that is associated with the Base Layer and that may be
shared by more than one record. Data defined in the Append Layer will be appended to the records
defined in the Base Layer. For example, in a report with transactions categorized by account number,
it is possible to have one account number associated with a group of transactions. The individual
transaction data is captured in the Base Layer and the Append Layer captures the account number
that applies to the group of transactions.
If the information in the Append Layer is located before the transactions in the Base Layer, it is called
a Pre-Append Layer. If the information in the Append Layer is located after the transaction in the
Base Layer, it is called a Post-Append Layer. For example, in the following report, if the first entry
(12-5-2017, Raj Malhotra) was selected as a sample for the Base Layer, the sample for the Append
Layer should be Account 1023 and it will be a Pre-Append Layer because it is located before the
sample line for the Base Layer

Account 1023
12-5-2017 Raj Malhotra 539.00
12-5-2017 Arun Dubey 235.00
Account 1024
3-5-2017 Praveen Jain 326.75
4-5-2017 Rahul Gupta 434.50
4. Preview the resulting database.
5. Scan the file for errors.
6. Import the file into IDEA.

INFORMATION TECHNOLOGY 285


Computer Assisted Audit Techniques
Exercise: Import Print file into IDEA
Step 1: On the Home tab, in the Import group, click Desktop to begin the import process.
Step 2: In order to import reports into IDEA, select Print Report and Adobe PDF, then select the
samplefile.txt file.
Step 3: Click Next. The Report Reader opens and displays the contents of the samplefile.txt file. The
report will be displayed as in the following Fig 4.10.1

Fig. 4.10.1 Report reader Screen


Step 4: Scroll through the report and note the formatting within the report, including:
 General information (company name, report name)
 Report headings (range of accounts and period)
 Account information (number description)
 Detail information
Step 5: Creating a Base Layer
 Any detail line of the report can be used as a Base Layer 1.
 Drag your cursor across any detail line in the report to define it as your sample line.
 A message box appears, prompting you to create a standard layer or a floating layer
 Accept the default of Create a standard layer and then click Yes. Refer Fig 4.10.2
 The selected line is now copied to a section at the top of the page that is referred to as the Field
Editor. Refer Fig 4.10.3.

286 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig. 4.10.2. Selection of Layer Type

Fig. 4.10.3. Field Editor in Yellow


 The Field editor is the section between the two yellow lines with a red arrow in the left margin.
In a multi-line entry, one of the lines must be the Anchor Line. The Anchor Line is highlighted
with a red arrow in the left margin. By default, it is the first line, but a different line can be
selected by clicking in the left margin of the line required to be the Anchor Line.
 The Field Details window also slides out from the right. When you define a field, this window
will display the properties and attributes of the field.
Step 6: Define Trap:
 You must at this point define what distinguishes this detail line from the other lines in the report.
It can be specific text, a combination of numbers, or a date. In Report Reader, these formats are

INFORMATION TECHNOLOGY 287


Computer Assisted Audit Techniques
called Traps. For this report, you can see that the third field or column in the report is a Date
field and it appears to be formatted the same way throughout the entire report (NNNN-NN-
NN). Using this information, a trap can be defined in the Anchor Editor section (the line above
the Field Editor).
 Place your cursor in the Anchor Editor directly above the first character of the date, just above
the number 2. Since you want to import all the transactions (any entry with a date), click four
times on the Numeric Trap button followed by a hyphen (-). Refer Fig 4.10.4.

Fig. 4.10.4. Anchor Editor


 Note that all the lines in the report that meet the criteria or follow the pattern are highlighted
in blue. If you were to leave out the hyphen (-) you would end up trapping the header line
above the field name row (Accrual Basis January through December 2012) because the 2012
lines up with your NNNN trap.
 The other options available to trap information are:
 Text Trap
 Space Trap
 Non-Blank Trap
 You can browse through the report to ensure that all the detail lines and only the detail lines are
highlighted. When satisfied that the required lines are selected, you must define the information
you want to import into IDEA from the detail lines. This information will be brought into IDEA
as separate fields.
Step 7: Define Fields:
 In the Field Editor (the row with the red arrow), highlight the Trans # information.
 The colour of the selected field will be orange and all the corresponding records of the detail
lines in the report will be highlighted. Scroll through the report to verify that the field width

288 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
is sufficient to capture records with larger amounts of data and adjust the field width in the
Field Editor if required. Refer Fig 4.10.5.

Fig. 4.10.5. Define Fields


 In the Field Details window, enter the following details:
 Name: TRANSNO
 Type: Numeric
 Decimals: 0
 In the Field Editor, highlight the Type information, leaving enough room for the larger data.
 In the Field Details window, enter the following details:
 Name: TYPE
 Type: Character
 In the Field Editor, highlight the Date information.
 In the Field Details window, enter the following details:
 Name: DATE
 Type: Date
 Mask: YYYY-MM-DD
 In the Field Editor, highlight the Num information, leaving enough room for the larger data.
 In the Field Details window, enter the following details:
 Name: NUM
 Type: Character (Note mix of numbers and character data, hence the Character type)

INFORMATION TECHNOLOGY 289


Computer Assisted Audit Techniques
 In the Field Editor, highlight the Name information, leaving enough room for the larger data.
 In the Field Details window, enter the following details:
 Name: NAME
 Type: Character
 In the Field Editor, highlight the Memo information, leaving enough room for the larger data.
 In the Field Details window, enter the following details:
 Name: MEMO
 Type: Character
 In the Field Editor, highlight the Debit information, leaving enough room for a bigger number.
 In the Field Details window, enter the following details:
 Name: DEBIT
 Type: Numeric
 Decimals: 2
 In the Field Editor, highlight the Credit information, leaving enough room for a bigger number.
 In the Field Details window, enter the following details:
 Name: CREDIT
 Type: Numeric
 Decimals: 2
When you are done the fields should match the following table

Field Name Type Parameter


TRANSNO Numeric Decimal :0
TYPE Character
DATE Date Mask: YYYY-MM-DD
NUM Character
NAME Character
MEMO Character
DEBIT Numeric Decimal :2
CREDIT Numeric Decimal :2
 Click the Save Layer button
Step 7: Creating an append layer
You now have to create an Append Layer to ensure you have an account name attributed to the
correct detailed transaction information. In this report, you will be creating a Pre-Append Layer
because the account name is located before the transactions of the Base Layer.
 Highlight the line under the report column titles that contains the account name, and then
create a new standard layer. In the Anchor Editor, you need to make use of the Space Trap and

290 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Text Trap buttons. The account names are indented a specified amount of spaces in this report
so if you trap all the spaces up to when the text begins to identify the account name, you will
eliminate any detail information you already pickup and header information in the report.
 Place your cursor in the Anchor Editor at the far left and click the Space Trap button to add
spaces up to the start of the account names.
 Click the Text Trap button.

Fig. 4.10.6
 In the Field Editor, highlight the account name information.
 In the Field Details window, enter the following details:
 Name: ACCTNAME
  Type: Character
 Blank Cells: Use value from previous record.
 The field you just defined is located in the header which means that you would like to repeat
the information it contains for each record (detail line) below it. To indicate to Report Reader
that you want to repeat that information, the Use value from previous record option is selected
in the Blank Cells box in the Attributes section of the Field Details window. Refer Fig 4.10.7
 Click save layer button.

INFORMATION TECHNOLOGY 291


Computer Assisted Audit Techniques

Fig. 4.10.7 Attribute Section on right hand side

Step 8: Previewing the resulting database .


 On the Report Reader toolbar, click the Preview Database button. The entire report will be
displayed in a Preview Data Window.

Fig. 4.10.8 Database Preview


 Click close to exit preview data window
 If you need to change information for a field, click on the field and make any necessary changes
through the Field Details window. Changes can also be made by re-opening the layer for editing

292 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
through the Layer Manager.
 To access the Layer Manager, select Layers > Layer Manager. From the Layer Manager, you
can edit, copy, or delete a layer. For more information on the Layer Manager refer to the Report
Reader Help system
Step 9: Importing into IDEA
 You are now ready to import the file into IDEA. Click the import button
 When prompted to proceed with the import, click Yes.
 Report Reader prompts you to save the template. Click OK.
 The Save As dialog box appears. You are prompted to save your template file .jpm in your
current project folder. The template is similar to a record definition. It contains all the
information you defined in Report Reader. You can reuse the template to import a similar
report or you can open the template and make changes to it.
 In the File name field, enter sample file and click Save.
 The last import screen allows you to enter the name of the generated IDEA database.
 In the Database name field, enter name and click Finish
 Final output in IDEA format. Refer Fig 4.10.9.

Fig. 4.10.9 Converted database


Reconciliation of data Imported
Once the data has been defined and imported into IDEA, and before commencing audit testing, it
is imperative that the data be reconciled back to the host system. There are several potential errors
that may be made during the import process, such as:
 Requesting the wrong data
 Being supplied with the wrong data and/or for the wrong period
 Errors on the extraction of the data from the host system

INFORMATION TECHNOLOGY 293


Computer Assisted Audit Techniques
 Problems with the media while transferring the data
 Errors when importing the data
The data can be reconciled back to the host system by reviewing Numeric field totals, the record
count, or a sample of records compared to a print from the host system. It is important that
reconciliation reports and control totals are requested along with the data and that they are filed
with the documentation from the download/import process.
There are different ways to reconcile the data. Certain IDEA tasks are particularly useful for
reconciling data. First, it might be useful to browse the IDEA database. Use the Field Statistics and
the Control Total properties, accessible from the Properties window, to reconcile totals and to ensure
that the dates match the data you requested and do not include transactions from another period.

4.11 FILED MANIPULATION


The Field Manipulation task is used to modify the layout of the fields in a database. There are two
ways to access Field Manipulation:
 On the Data tab, in the Fields group, click the arrow in the bottom right corner

 Double-click any value in the Database window. The Field Manipulation dialog box appears.

MODIFYING FIELDS
To rename a field double-click the field’s name in the Field Name column. Any changes made to the
field name will be recorded in the History. The information in the Type column is initially entered
by IDEA during import. Four general types of fields: Character, Numeric, Date, Time and three
special types of fields: Virtual, Editable and Multistate are available. You cannot change the length
of a field or the number of decimals unless you have modified the information in the Type column.
You can double-click in the Description column to change field descriptions

294 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
EXERCISE 1
Make the following changes to the Sales Transactions-Database.
 Ensure that Sales Transactions-Database is the active database and that the Data property is
selected in the Properties window.
 Double-click any record in the Database window.
 The Field Manipulation dialog box appears.
 Rename the CUSTOMER_NO field to CLIENT_NO.
 In the Description column for the SALES_TAX field, enter 8%.
 In the Description column for the INV_NO field, enter Invoice number.
 Click OK.
 Click Yes to make the changes to the fields in the database.
APPENDING FIELDS
IDEA maintains data integrity upon import. The data cannot be changed. Instead, IDEA allows
the creation of Virtual and Editable fields. For example, you can add a Virtual or Editable field that
contains a calculation performed on an original data field
Virtual fields compute results “on the fly”. The results are not stored in the database. However, any
database created from a database with a Virtual field contains that field as a calculated value. Virtual
fields can be Character, Numeric, Date, or Time fields.
Editable fields and regular fields are stored in the database and require some processing time in
order to be physically added to the IDEA database.
EXERCISE 2: APPENDING VIRTUAL FIELDS
Adding new fields might be useful when proving or verifying calculations, when creating a new
field with calculated values, or when transforming existing data.
In this exercise, you will create a Virtual field called AMOUNT_CHECK in the Sales Transactions-
Database. By creating a calculation, you will determine if the amount in the AMOUNT field is correct.
 Ensure that Sales Transactions-Database is the active database and that the Data property is
selected in the Properties window.
 Double-click any record in the Database window.
 The Field Manipulation dialog box appears.
 Click Append.
 A new line is added to the Field Manipulation dialog box.
 Enter the following details for the new field:
 Field Name: AMOUNT_CHECK
 Type: Virtual Numeric
 Length: n/a

INFORMATION TECHNOLOGY 295


Computer Assisted Audit Techniques
 Decimals: 2
 Parameter: QTY * UNIT_PRICE
 Description: Calculated amount
 Click OK.
 If prompted, click Yes to make the changes to the database.

Fig 4.11.1: Appending virtual field

Fig 4.11.2: Virtual field AMOUNT_CHECK


Note the colour of the data in the AMOUNT_CHECK field, which indicates that this is a virtual field
not part of original data but field appended by auditor
EXERCISE 3: APPENDING REGULAR FIELDS
In IDEA, you can also add regular Numeric, Character, Date, and Time fields through Field
Manipulation. These fields will appear as if they were added during import. They will retain the
same colour as the other fields and will not have any parameters displayed. As with Virtual fields,
any additions or changes made to these fields will be recorded in the History. The parameter of a
regular field cannot be changed.
In this exercise, you will create a Numeric field that is identical to the AMOUNT_CHECK Numeric
field.
 Ensure that Sales Transactions-Database is the active database and that the Data property is
selected in the Properties window.

296 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
 Double-click any record in the Database window.
 The Field Manipulation dialog box appears.
 Click Append.
 Enter the following details for the new field:
  Field Name: NUM_AMOUNT_CHECK
  Type: Numeric
  Length: n/a (by default it will become 8)
  Decimals: 2
 Parameter: AMOUNT_CHECK
 Description: Calculated amount
 Click OK.
 Click Yes to make the changes to the database

Fig 4.11.3: Regular field NUM_AMOUNT_CHECK


Note the colour of the data in the NUM_AMOUNT_CHECK field, which indicates that this is a
regular protected field.
 Re-open the Field Manipulation dialog box.

Note that the parameter is not displayed for the NUM_AMOUNT_CHECK field.
 Click OK to return to the database.
EXERCISE 4: APPENDING EDITABLE FIELDS
IDEA also allows for the creation of Editable fields. These fields will allow you to create a notation,
or manually enter a value to add to a database. The creation and editing of these Editable fields is
recorded in the History. Editable fields are also displayed as a different colour to distinguish them

INFORMATION TECHNOLOGY 297


Computer Assisted Audit Techniques
from Virtual and Regular fields.
 With Sales Transactions-Database as the active database, append an Editable Character field
to the database in order to add notes.
 You will need to add an empty value (represented by double quotes) in the Parameter column
so IDEA knows you want to enter characters into the field at a later time.
 Enter the following details for the new Editable field:
  Field Name: NOTES
  Type: Editable Character
  Length: 50
  Decimal: n/a
  Parameter:
  Description: Notes on line items
Note that the Editable field created will wrap the text within the field as you type in order to display
everything in the current column width.
EXERCISE 5: APPENDING SPECIAL FIELDS
IDEA further allows for the creation of special fields. These fields are termed as Boolean and
Multistate fields. They are used generally by auditor to provide remarks in sample file in a symbolic
way. Refer Fig 4.11.4 to see types of fields options provided by IDEA

Fig. 4.11.4 – Types of fields


Boolean fields offer two options to user whereas multistate field offers three options. Refer Fig 4.11.5
below.

298 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig. 4.11.5 – Boolean and multistate fields

4.12 JOIN DATABASES AND VISUAL CONNECTOR


IDEA has two main methods of joining databases together based on a key field:
 Join Databases
 Visual Connector
JOIN DATABASES:
Data required for auditing is often spread across several files and perhaps across different computer
systems. In order to carry out most audit tests and analyses, the data must be contained within a
single file. IDEA provides a Join Databases task, which can be used to:
Combine fields from two databases into a single database for testing. For example, to carry out
an inventory valuation, data is required from both the inventory master and pricing information
databases.
Test for data, which matches or does not match across systems. For example, match the monthly
payroll transactions database with the master payroll database to ensure there are no “ghost”
employees, or that all former employees have been removed from the payroll.
Databases can be joined or matched if they contain a common link (referred to as the “key”), such
as an employee number field.
Join Databases can perform a host of different join option on two databases, including all records in
primary database, matches only, records with no secondary match, records with no primary match,
as well as all records in both databases.
Join Databases Precautions
 Only two databases can be joined at one time. If more than two databases must be joined, you
must combine two databases, then join a third to the resultant database, and so on. You should
also consider the Visual Connector task if you need to join more than two databases.
 The common fields (the “key”) do not need to have the same name, but they must be of identical
field type.

INFORMATION TECHNOLOGY 299


Computer Assisted Audit Techniques
 The databases must be in the same location. For example, a database in the Samples project
cannot be joined to a database in the test project.
 When using the Join Databases task, care must be taken to select the primary and secondary
databases in the correct order as the secondary database is joined to the primary database.
Transaction file should be the Primary file and Master file should be the secondary file. There
should be Many to one relationship.
IDEA provides five join options:
Matches only

In this option, IDEA processes each record in the primary database (in “key” order), cross matching
with the secondary database on the key. If there is a match on the key, a record is written to the
output database. If there is no match, the next primary database record is processed. Matches only
will search for the keys in the secondary database for matches against each record.
Records with no secondary match

In this option, IDEA processes each record in the primary database in turn, cross matching with
the secondary database on the key. It writes a record to the output database if the key exists in the
primary database only.
Records with no primary match

IDEA processes each record in the secondary database in turn, cross matching the key with the
primary database. IDEA writes a record to the output database if any key exists in the secondary
database only.
All records in primary file

IDEA processes each record in the primary database (in “key” order) in turn, cross matching with
the secondary database on the key.
Each record in the primary database is written to the resultant output database including the selected
fields from the secondary database if the key exists.

300 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA
All records in both files

In this option, IDEA processes the database in key order, writing a record to the output database
for every record in each database where there is a key match.
If there is more than one record for a particular key in both the primary and secondary databases,
each of the primary database records are matched against the first record for the key in the secondary
database as in the options Matches only and All records in primary file. However, all additional
records for the key in the secondary database are also written to the output database but all primary
fields will be blank for Character fields, 0000/00/00 for Date fields and zero for Numeric fields.
JOIN Vs VISUAL CONNECTOR
Join Databases has two important limitations:
 It can only join two databases at a time.
 The Matches only option is similar to Visual Connector but has the following limitations:
  When a many-to-many relationship exists, only the first matched record from the
secondary database is included in the result.
  The resulting joined database does not exceed the number of records in the primary
database, regardless of the matching ability of the key fields. In other words, there is only
one primary match for every secondary match. With the exception of matching types
such as all records in secondary database and all records from both files that can and will,
respectively, have more records than the primary database.
 On the other hand, Visual Connector is an easy-to-use, visual method of connecting two or
more databases together by drawing lines between key fields on a canvas, and does not have
any limitations on how many records are joined.
 Visual connector can join more than two files at a time
 Visual connector unlike Join option which has five different options has only two options –
matches only and all records in primary file
EXCERCISE:1 – Join Customer details.imd with account details.imd
Account details file has fields – ACCNO, STATUS, BR_CODE, BALTODAY, BALYESTDAY
Customer details file has fields – ACCNO, CUST_NAME, CUST_ADD, LOCALITY, STATE
Join both the file using common field ACCNO
Step 1: Open primary file account details and ensure it is active file in IDEA
Step 2: Go to analysis tab and click on join button

INFORMATION TECHNOLOGY 301


Computer Assisted Audit Techniques

Fig: 4.12.1 – Join options


Step 3: Primary database automatically selected is Account Details. Select Secondary database
customer details
Step 4: Select option ‘All records in both the files” since we want to join both the files
Step 5: Provide file name as ‘combined customer details”. Refer Fig 4.12.2

Fig. 4.12.2 – User Input to join options


Step 6: Click on Match option
Step 7: Provide primary and secondary key which is common in both the files ACCNO. Refer Fig
4.12.3

302 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig. 4.12.3 – User Input to match option


Step 8: Click on OK
Step 9: See the output in combined customer details file. Refer Fig 4.12.4. you would observe that
joined file contains all the fields from customer details and account details files

Fig: 4.12.4 – Joined database using join function


EXCERCISE: 2 – Join using visual connector option - Customer details.imd with account details.
imd
Account details file has fields – ACCNO, STATUS, BR_CODE, BALTODAY, BALYESTDAY
Customer details file has fields – ACCNO, CUST_NAME, CUST_ADD, LOCALITY, STATE
Join both the file using common field ACCNO
Step 1: Open primary file account details and ensure it is active file in IDEA
Step 2: Go to analysis tab and click on visual connector button. Refer Fig 4.12.5
Step 3: From the list of databases on the left panel, select file customer details

INFORMATION TECHNOLOGY 303


Computer Assisted Audit Techniques
Step 4: Create a link between both the files by dragging the mouse starting from ACCNO field
in account details file and dropping at ACCNO filed at customer details file. This will establish a
connection between two files. Refer Fig 4.12.6

Fig: 4.12.5 – Visual Connector Options

Fig: 4.12.6 – Establishing connection using key field


Step 5: Click on Ok and select appropriate option. In this case your objective is to join the file, select
option “all records in primary file, all matches”. Refer Fig 4.12.7
Step 6: Provide file name – combined details visual connector and click on OK. Refer Fig 4.12.7
Step 7: Observe the output in combined file created using visual connector option. Refer Fig 4.12.8

304 INFORMATION TECHNOLOGY


Advanced Analysis Using IDEA

Fig. 4.12.7 – visual connection option

Fig. 4.12.8 – Joined database using visual connection option

4.13 COMPARE DATABASES


IDEA can compare the financials from one year to the next, and it’s called Compare Databases.
This task requires two databases to be defined, a field in each database to be designated the “total”
field, and a field in each database designated as key fields (match fields). The function generates
the number of records in the primary database (P_NRECS), the number of records in the secondary
database (S_NRECS), the sum of the total field defined in the primary database (P_TOTAL), the
sum of the total field defined in the secondary database (S_TOTAL), and a DIFFERENCE column
which subtracts the TOTAL fields from each other.
EXERCISE: Compare two purchase databases
 Open the Purchases-L4-2010 database.
 You need to add a Virtual Numeric field with two decimal places called TOTAL_GROSS. The
field must use a criterion that calculates the sum of all the gross monthly purchases for the
year (JAN_GROSS + FEB_GROSS…etc.)

INFORMATION TECHNOLOGY 305


Computer Assisted Audit Techniques
 Open the Purchases-L4-2011 database.
 You need to add a Virtual Numeric field with two decimal places called TOTAL_GROSS. The
field must use a criterion that calculates the sum of all the gross monthly purchases for the
year (JAN_GROSS + FEB_GROSS…etc.)
 On the Analysis tab, in the Relate group, click Compare.
 The Compare Databases dialog box appears.
 Click Select and select the Purchases-L4-2010 database as the secondary database.
 Click Match to select key fields that are common between both databases.
 Select SUPPNO for both and click OK.
 From the Total field drop-down list for both databases, select TOTAL_GROSS.
 In the File name field, enter Purchases 2011 vs 2010 for L4.
 Click OK.

Fig. 4.13.1 – Compare database options

306 INFORMATION TECHNOLOGY


Unit – 6
Accounting Package
Accounting Package

1
C
H
A
PRINCIPLES OF
P
T ACCOUNTING
E
R

1.1 INTRODUCTION TO ACCOUNTING


1.1.1 What is Accounting ?
Accounting, in simplest terms, is keeping track of our Income, Expenses, Assets and Liabilities. This
is true for a business, for a household or for an individual.
In the case of a business Accounting can be defined as:
“... the art of systematic recording, classifying, summarising in a significant manner and in terms of money,
transactions and events which are, in part at least, of financial character, and interpreting the results thereof.”
From the above definition, we note the following features of accounting :
Only financial aspects are considered in Accounting. A financial transaction is one which brings
some change in the financial position of a business. For example, we buy raw material or sell our
goods. Thereby, we spend money and earn money. These are financial transactions. But when
we place an order to a supplier for a particular machinery, it does not alter the financial position
of the business. Thus, it is not a financial transaction and cannot be included in Accounts Books.
The transactions are to be recorded primarily in some documents. Later they are to be grouped and
summarised. This leads to different steps in Accounts Compilation.
The process at different steps in the Compilation of Accounts should be performed on some basic
rules, which are common for all business organisations, be it Manufacturing, Trading or the Service
Industry.
The entire organised, grouped and summarised data should reveal some information for executives
at different levels in the organisation. We prepare reports of standard formats for interpretation
purposes.
1.1.2 Process of Financial Accounting System
The basic documents used in the Financial Accounting System are :
Voucher where transactions are entered first
Journal where transactions are entered chronologically and denote which accounts
will be affected.
Ledger where the transactions of particular account are segregated and balanced
for each account.

308 INFORMATION TECHNOLOGY


Principles of Accounting
Using the above documents, the main reports prepared in the Financial Accounting System are as
stated below:
(a) Trial Balance : It gives the consolidated list of various Accounts and their balances. Brings out
any error, procedural or arithmetical, in Journalising or Posting of transactions. This is the source
point for preparing other reports.
(b) Profit & Loss Report : This statement is prepared to find the operating profit in the business
for a given period. The net profit is the basis of calculating the tax. The final net profit will
be transferred to the Balance Sheet. The P & L statement shows the efficiency of performing
operations in the business for a given period.
(c) Balance Sheet : The Balance Sheet shows the financial status of the business as at a particular
date. The effectiveness of managing the business is depicted here.
The P & L Account and the Balance Sheet together form the basis for different analysis. The results
of such analysis will be used by different groups of people such as the Income Tax Department,
Banks for providing Working Capital Loans, existing and potential investors for investing in
the business, and so on.

1.2 DOUBLE ENTRY SYSTEM OF ACCOUNTING


1.2.1 What is Double Entry System of Book-keeping ?
Every financial transaction in an organisation has two aspects. There will always be inflow of cash
or kind on one side and outflow on the other. For example, purchase material from the supplier on
credit. Our stocks of material increase. At the same time our liability towards the supplier (which
is outflow of cash) also increases.
The double entry system of Book-keeping allows us to keep track of both these aspects. Thus, as per
this system, at least two accounts are affected when a transaction is recorded.
In the example above, the accounts affected are the Material Purchase account and the supplier
account.
1.2.2 Debit and Credit Entries in the Double Entry System
How do we account for the two sides of a transaction ?
The respective accounts, which get changed by a transaction, get any of the two entries - Debit or
Credit. In other words, one account will be debited and the other account will be credited.
Passing of the Debit and Credit entries is the basic, but crucial process in Accounting. Any error in
this process will have a ripple effect and will affect the final reports.

1.3 ACCOUNTS AND RULES FOR ACCOUNTING


1.3.1 Account Type: Accounts can be any of four types :
Asset What the business owns and what is due to the business
Liability What the business owes to others
Expense A source of expenditure for running the business pertaining to a period
Income A source of earning money in the business pertaining to a period.

INFORMATION TECHNOLOGY 309


Accounting Package

Exercise : Identify the following types of Accounts :


Debentures Bank of India
Factory Shed Furniture and Fittings
Taxes Payable Interest Received
Sales Electricity Charges
1.3.2 Rules for Recording Transactions
Classification of Accounts by the Nature of Account and the Golden Rules of Accounting :
(i) Personal Account
All accounts which are in the name of any Individual, Firm or Company
such as Ram & Co., Shyam Gupta, Metro Transport, and so on.
Rule : Debit the Receiver and
Credit the Giver
(ii) Real Accounts
Accounts which relate to the Assets or Liabilities of the Business,
Such as Cash A/c, Goods A/c, Furniture A/c, and so on.
Rule : Debit what comes in and
Credit what goes out
(iii) Revenue or Nominal Accounts
Accounts which relate to Income or Expense, such as Purchase,
Sales, Interest Received, Salary & Wages, and so on.
Rule : Debit all Expenses and
Credit all Income
Let us suppose we have a transaction
“Purchase of goods worth Rs. 7000/- on Credit from Mahesh Traders”
What accounts will be affected by this transaction ?
Which account will be Debited and which will be credited ?
To find answers for the above questions, take the help of some basic rules of recording transactions.
The rules are given below.
Account Type Debit Credit
Personal Receiver Giver
Asset/liability/Capital (Real) What comes in What goes out
(in cash or kind) (in cash or kind)
Revenue (Income and Expenses) Expenses and Losses Income or Gains
Table 1.3.1
Also known as Nominal
Let us understand the rules with some examples. Consider the same transaction :

310 INFORMATION TECHNOLOGY


Principles of Accounting
(a) Purchase of goods worth Rs. 7000/- on Credit from Mahesh Traders
Accounts affected Purchase Mahesh Traders
Type Expense Personal
Status Money paid/to be paid Giver
Rule Debit Expenses Credit the Giver
Entry Debit Purchase A/c Credit Mahesh Traders A/c
Amount 7000/- 7000/-
 Purchase A/c Dr. 7000/- (Debit all Expenses)
To Mahesh Traders A/c Cr. 7000/- (Credit the Giver)
Table 1.3.2
(b) Cash drawn from United Bank Rs. 5500/-
Accounts affected Cash United Bank
Type Asset Asset
Status Money comes in Money goes out
Rule Debit what comes in Credit what goes out
Entry Debit Cash A/c Credit United Bank A/c
Amount 5500/- 5500/-
 Cash A/c Dr. 5500/- (Debit what comes in)
To United Bank A/c Cr. 5500/- (Debit what goes out)
Table 1.3.3

1.4 ACCOUNTS COMPILATION & REPORTS


1.4.1 Basic steps in Accounts Compilations, documents used and report
In this section, let us learn how to go through the different steps of Accounts compilation and see
what document is used and created/updated at each stage.
The steps are as indicated below :
Step 1 Recording
Step 2 Classifying
Step 3 Summarising
Step 4 Interpreting (by preparing reports)
The sequence is best represented in the flow diagram below:

INFORMATION TECHNOLOGY 311


Accounting Package
Recording Classifying
Transaction Voucher Journal Entry

Posting

Consolidating
Trial Balance Ledger Accounts

Report Generation

Profit & Loss Account Balance Sheet

Fig. 1.4.1: Basic Steps in Accounting


Let us start with a payment transaction for example :
Paid cash Rs. 700 for Local Conveyance
(i) Voucher or Entry Document: The first document where the transaction is entered is called a
Voucher. A voucher can exist in the form of an Expense Bill, Sales Bill, Receipt, Payment, and so on.
(ii) Journal Entry: The second step is the stage where we classify the transaction that is, to find
out which are the accounts to be debited or credited. The transaction is now entered in the form of
a journal entry in a book called a Journal Proper. A paper journal entry has a typical format. Given
below is the journal entry for the Cash payment transaction above :
25.04.02 Electricity Charges Dr. 1000
To Cash A/c 1000
The process of passing a journal entry such as the one above is based on the rules for recording
transactions, discussed in the earlier section.
(iii) Ledger Posting and Balancing: Ledger posting and balancing is done to findout the payments
receipt, income or expense through any Account.
For example, in the above case the Electricity Charges are posted to the Debit side of Electricity
Charges ledger and the Cash A/c is Credited.
Thus the process of Posting is transfer of individual transaction amounts from the journal to the
debit or credit side in a given Account.
A sample Cash Account is shown in next page with posting entries.

312 INFORMATION TECHNOLOGY


Principles of Accounting

CASH ACCOUNT
RECEIPTS PAYMENTS
DATE PARTICULARS AMOUNT DATE PARTICULARS AMOUNT
01.03.02 To Bal B/d 2500 02.03.02 By Electricity Charges 50
05.03.02 To Bank A/c 500 04.03.02 By Printing A/c 35
26.03.02 To Tour Advance A/c 1500 06.03.02 By Stationery A/c 55
(Amount Refunded) 07.03.02 By Tour Advance A/c 460
05.03.02 By Other Expenses A/c 100
31.03.02 By Bal C/F 4400
31.03.02 Total 5000 31.03.02 Total 5000
Table 1.4.1
From the above we see that the total of payments (credit total, omitting the last entry) is different from
the total of receipts on the left side. But in the manual system the total of both sides are matched. To
get them matched, a new entry is passed on the right side (if the Debit Total is more than the credit
total) or on the debit side (if the debit total is less than the credit side). This new entry is known
as balancing entry and it will have the difference between the totals in the amount column. In the
above cash account, the balancing entry is “By Balance Carried Forward” and the balance amount is
4400. This is the actual cash availability as at the end of March 2002. In other words, it is the closing
balance as on March 31, 2002. The ledger accounts are usually posted every month.
(iv) Consolidating in Trial Balance: Once we get the closing balance of all accounts for the last month
of the fiscal year (March), we are ready to prepare the reports. But first we get the consolidated list
of such balances. The list is called the Trial Balance. The Trial Balance has three columns, namely
Account Name, Debit Column and Credit Column. When an account has debit Balance (that is Debit
Total more than Credit Total in Ledger), the amount appears in the debit column, otherwise in the
credit column. A sample Trial Balance is shown below:
ACCOUNT NAME DR CR Type of Account
Capital 500000 Liability
General Reserve 150000 Liability
Surplus in P&L Account 132500 Liability
Tax Deducted at source 21000 Liability
Expenses Payable 49000 Liability
Sales Tax Payable 10000 Liability
Furniture 227500 Asset
Land & Building 242500 Asset
Plant & Machinery 355000 Asset
State Bank of India 413000 Asset

INFORMATION TECHNOLOGY 313


Accounting Package

Cash in Hand 3500 Asset


Fixed Deposits 250000 Asset
Opening Stock 140000 Expense
Material Purchased 382500 Expense
Stores Consumed 55500 Expense
Labour Charges 6300 Expense
Factory Electricity 11750 Expense
Salary & Wages 55000 Expense
Travelling Expenses 131500 Expense
Other Expenses 211500 Expense
Sales 1417500 Income
Interest Received 43000 Income
Other Income 126000 Income
Accounts Payable 322050 Liability
Accounts Receivable 285500 Asset
Total 2771050 2771050

Table 1.4.2
The Trial Balance is a source for preparing the reports. As per double entry system, every transaction
has debit and credit entries of equal sum in different accounts. Hence, the total of debit balances and
credit balances should be equal in the trial balance. Preparation of this consolidated report reveals
any manual or procedural errors in the earlier steps of accounts compilation.
There is one more input required before we go for preparing the P&L report and the balance sheet.
That is the closing entry. Closing entry is given for stock value at the end of the year.
Closing stock is the value of stock available at the end of the year. The closing stock can be valued
by any method such as LIFO, FIFO, Weighted Average and Moving Average.
The value of stock is shown as a current asset in the Balance Sheet.
The closing stock of finished goods is treated as an income in the Profit & Loss (P & L) statement.

1.5 PREPARING FINAL REPORTS


1.5.1 Profit & Loss Statement
This report depicts the operating profit/loss for a given period. In many organisations, this report
is prepared in two steps - Trading Account and P & L Account.
The trading account is a list of all direct production-related expenses on one side and the direct source
of income (usually income through sales and services) on the other side. The difference between
their total is the Gross Profit or Gross Loss. Given below is a sample Trading Account showing the
balances in the Trial balance above.

314 INFORMATION TECHNOLOGY


Principles of Accounting
The closing stock of Finished goods is assumed as Rs. 25000 and the depreciation for the year is
assumed as Rs. 37000.
Trading Account of ABC Company for the year ending 31 March, 2001
Expenses Income
Opening Stock 140000 Sales Turnover 1417500
Add Material Purchased 382500 Closing Stock 25000
1045000
Labour charges 6300
Factory Power 11750
Gross profit transferred
to P & L Account 901950
Total 1442500 Total 1442500
Table 1.5.1
The P & L Account is prepared by listing all other expenses, which were not included in the Trading
Account, on one side and all other incomes on the other. Additionally, the Depreciation is included in
the expense list. The first entry on the income side is the Gross profit taken from the Trading Account.
The Profit & Loss Account using the balances from the Trial Balance and the Closing Entries above
is given below.
Profit & Loss Statement for ABC Co. For the year ending 31 March, 2001
Expenses AMOUNT Income AMOUNT
Stores Consumed 55500 Gross Profit from trading A/c 901950
Salary & wages 55000 Interest earned of fixed Deposits 43000
Travelling Expenses 131500 Other Income 126000
Other Expenses 211500
Depreciation for the year 37000
Net Operating Profit 580450
Total 1070950 Total 1070950
Table 1.5.2

1.5.2 Balance Sheet


The P & L statement depicts the operating profit earned or loss suffered by doing the business for the
last one year. But the Balance sheet provides information about the financial status of the company
as on a particular date. The balance sheet is prepared taking the asset and liability type accounts
from the Trial Balance.
The balance Sheet of ABC Co. as at March 31, 2002 is given in next page. The values are taken from
the Trial Balance and the Closing entries for Depreciation and Closing Stock.

INFORMATION TECHNOLOGY 315


Accounting Package

Liabilities Assets
Share Capital 500000 Furniture 227500
General Reserve 150000 Land & Building 242500
Surplus in P&L Account 132500 Plant & Machinery 355000
Tax Deducted at Source 21000
Expenses payable 49000
Sales Tax Payable 10000 Less Depreciation 37000
Accounts Payable 322050
Net profit from P&L A/c 580450 Net Fixed Assets 788000
Bank Balance 413000
Cash in Hand 3500
Fixed Deposits 250000
Accounts Receivable 285500
Closing Stock 25000
Total Liabilities 1765000 Total Assets 1765000
Table 1.5.3

1.6 USE OF DAY BOOKS IN ACCOUNTING


We learnt that all the transactions are entered from vouchers to the Journal in a chronological order.
Using this method, the Journal becomes a voluminous book and extracting entries for posting in
Ledgers becomes a time-consuming job. Moreover, the debit and credit entries are written in the
Journal and Ledger. This is a duplication of effort.
To avoid these disadvantages, the day books are used. Day books are specialised books, where
transactions relating to a particular type, say Sales or Purchase, are entered directly from the voucher.
They are not written into the journal. At intervals, say every month, the totals from these books are
carried forward and used for posting in the Ledger. When the ledger is posted from the day books,
there is only one entry written.
Thereby, we can get the details such as total sales or total purchase at a glance from the Ledger. If we
want to know the details, we have to refer to the Day books using a reference number usually the folio
number of the respective Day book. These books are also called Books of Original Entry.

1.7 ACCOUNTS RECEIVABLE AND ACCOUNTS PAYABLE


Accounts Receivable, also known as Bills Receivable, gives the details of the dues from the Customers.
The details are maintained in a sub-ledger (called Debtors Ledger or Sundry Debtors). As the sum due
from customers is our money blocked, we have to monitor the receivable closely. This also helps us
keep a watch on our customers’ credit worthiness and reliability. Many statements are prepared to
monitor the Accounts receivable. Some of them are Analysis Statement, Ageing analysis Statement,
Business Summary (month-wise or item-wise) and so on.
Account Payable, also known as Bills Payable, gives details of your dues to suppliers. The details
are maintained in a sub ledger (called Creditors Ledger or Sundry Creditors). A close monitoring
of Accounts Payable is also essential, because it helps us in our cash flow planning and knowing the
Cash requirement at any time. Further, our credit worthiness toward our suppliers is also enhanced,
which is again important.

316 INFORMATION TECHNOLOGY


Principles of Accounting
1.8 BANK RECONCILIATION STATEMENT
When we maintain a bank account, we prepare a bank book. The bank gives us one book, which is
called the pass book. The entries in the bank book are made by us. The Pass book entries are made
by the bank authorities.
At any point of time, the final balance shown as per the Bank book and the Pass book should be the
same. But most of the times it will not be so. This happens because of the following reasons :
When we make a cheque payment, we make the Bank book posting immediately, whereas our
account will be adjusted only when the cheque is presented and honoured.
When we deposit a cheque from the customer, we post the same in our bank book. But our account
with the bank is actually adjusted only when the amount is realised.
For any outstation cheque receipts or for overdrafts, the bank will deduct the service charges. This will
be automatically debited to our account. But we will get the statement only after some time.
But to be sure that everything goes fine and no errors are committed, a statement is regularly
prepared. This statement is called the Bank Reconciliation Statement.
Suppose we have the following entries in our Bank Book and Pass Book for one month ending 30.9.02.
Bank Book Dr. Cr. Pass Book Dr. Cr.
Opening balance 20000 Opening balance 20000
Payment By Cheque Withdrawal as per
No. 489882 1500 Cheque No.2482 1500
Cheque deposited Cheque presented and
No. 2345 3500 realised Cheque No. 48945 3500
Arvind by Cheque Purchase of Demand
No. 22328 3200 Draft by Cheque No. 22343 3200
Cheque Deposited
No. 2434 3000 Service Charges 100
Total 26500 4700 Total 23500
Balance as on 30.9.02 21800 Balance as on 30.9.02 18700 4800
Table 1.8.1
Now comparing the entries in both of the books, we prepare a Bank Reconciliation Statement which
looks like the one below :
Bank Reconciliation Statement as on 30.9.02
Dr. Cr.
Balance as per Bank Book 21800
Add Cheques issued but not presented 0
Less Cheques Deposited but not presented
Cheque No. 2434. Amount - Rs.3000 3000
Service Charges 100
Total 21800 3100
Balance as per pass Book (Bank Statement) 18700 Dr.
Table 1.8.2

INFORMATION TECHNOLOGY 317


Accounting Package

2
C
H
A
INTRODUCTION TO
P
T TALLY.ERP 9
E
R

LEARNING OBJECTIVES
Understanding the concepts of computerized accounting
Understanding ERP software
Understanding the rules for efficient use of accounting software.

2.1 INTRODUCTION
With the advent of computers in India, people started developing software for various needs.
Accounting activity was one of the most important activities which desperately needed automation
for following reasons.
Minimum accuracy level required is 100%
Accounting activity consumes lot of time and energy.
Timely delivery of Financial Statements and Reports
Ratio Analysis
Accounting software is basically aimed at ensuring 100% arithmetical accuracy saving time and
energy to a great extent and ensuring timely delivery of Financial Statements and Reports.
2.1.1 What is accounting software?
It is a system that automatically carries out “Mechanical Activities” in accounting process.
Accounting being the back bone of any business, accounting software becomes the most important
part of office automation activities.
Accounting process includes following seven activities.
Understanding the transaction
(Details of transaction)

Journal / Voucher Entry


(Debiting and Crediting of Accounts)

Ledger Posting
(Posting entries into individual ledgers)

Balancing of Ledger Accounts


(DR & CR Balances in the accounts)

318 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
Trial Balance
(List of DR & CR Balances for checking
arithmetical accuracy & cursory glance)

Profit & Loss Account


(Income reduced by Expenses)

Balance Sheet
(Statement of Assets and Liabilities)

In case of manual accounting, all the seven activities are carried out by human beings, i.e.
accountants. But in case of accounting software, out of the above seven activities, following two
activities only are performed by human beings, i.e.
Understanding the Transactions
 Voucher Entry
Remaining five activities, i.e.
Posting,
Balancing,
Trial Balance
Profit & Loss Account
Balance Sheet
are performed by software automatically. In some special cases, even Voucher Entry job can also
be assigned to software without any human intervention.
E.g. interest calculation and application in banks is carried out by software on a specific assigned
date, automatically.
2.1.2 Advantages of using accounting software :
Following are the major advantages of accounting software over manual accounting.
 Arithmetical accuracy
 Time saving
 Multiple reports on timely basis.
Apart from these advantages, there are many other advantages also. But at the same time, there
are some disadvantages also.
It is very easy to create data in electronic format, but it is extremely easy to loose the data stored
in electronic format !
This must be kept in mind while using accounting software. As compared to manual accounting,
unless and until proper controls are in place, it is extremely easy to loose ,the complete accounting
data besides, tampering and fabrication of the data..
2.1.3 Accounting Structure for Accounting Software
As per any accounting software, there are only two types of ledger accounts, a. Accounts having
debit balance, b. Accounts having credit balances. Zero balance ledgers are not considered in
reporting hence ignored. If a ledger is having debit balance, it can be an Expense ledger or an Asset
ledger. If a ledger is having a credit balance, it can be an Income ledger or a liability ledger. All
income and expense ledger balances are taken to Profit & Loss Account. All Asset and Liability

INFORMATION TECHNOLOGY 319


Accounting Package
ledger balances are taken to Balance Sheet and the difference between income and expenses is also
taken to balance sheet. So ultimately, everything goes to Balance Sheet. Balance Sheet is the end
point in accounting a mirror showing true and fair position of a concern.
Accounting is done keeping in mind two basic reports.
 Profit & Loss Account
 Balance Sheet
Accounting software is able to generate many other reports, but above two reports are the most
important reports.
2.2 DATA STORAGE
2.2.1 How data is stored in Accounting Software ?
Accounting software stored (stores) data in two parts as under.
 Master Data
 Non Master Data
Master data is that data which is not expected to change frequently, which remain relatively
permanent. E.g. Ledger heads, groups, names of stock items, stock groups, etc.
Non master data is the data expected to change frequently. E.g. Voucher recorded is the non
master data.
Master data is stored independently, but storage of non master data requires link to master data.
2.2.2 Type of Master Data
As shown in chart above, there are four types of master data. There can be many other sub types
under each category.
Accounting Master Data : Payroll Master Data :
 Ledgers  Employees
 Groups  Employee Groups
 Cost Centres  Unit (Work)
 Budgets  Attendance / Production Types
 Scenarios  Pay Heads
 Voucher Types  Salary Details
 Voucher Types
Inventory Master Data : Statutory Master Data :
 Stock Items  VAT Classifications
 Stock Groups  Service Categories
 Units of measure  TDS Nature of Payments
 Godowns  Deductee Types
 Categories  Income Tax Classifications
 Reorder Levels  Income Tax Slabs
 Voucher Types

320 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
2.2.3 Voucher Types :
One of the very important master data is Voucher Type. Voucher type typically means type of
voucher. “Voucher” in manual accounting is the documentary proof of transaction. “Voucher”
in computerized accounting means a place where transactions are recorded, a format used for
inputting the data. Voucher types are used to enter variety of non master data, .i.e. transaction data.
In Tally.ERP 9, there are different formats, e.g. voucher types for inputting the transaction data.

Sr. Name of Voucher Use


No. Type
1 Attendance For recording of employee attendance
2 Contra For recording of four types of transactions as under.
 Cash deposited in bank
 Cash withdrawn from bank
 Cash transferred from one location to another
 Fund transfer from one bank account to another.
3 Credit Note For issuing credit note to a party.
4 Debit Note For issuing debit note to a party.
5 Delivery Note For recording delivery of goods after sales order.
6 Job Work In Order For recording of inward of job work order along with inventory.
7 Job Work Out Order For recording of outward of job work order along with inventory.
8 Journal For recording of non cash / bank financial transactions.
9 Material In For recording of inward of stock items without financial impact.
10 Material Out For recording of outward of stock items without financial impact.
11 Memorandum For recording of financial transactions not affecting trial balance.
12 Payment For recording of all types of payments, cash and bank.
13 Physical Stock For recording of physical stock.
14 Payroll For calculation of employee salary and recording of other salary
related transactions.
15 Purchase For recording of all types of trading purchases including cash
purchases and credit purchases.
16 Purchase Order For recording of all types purchase orders issued to suppliers.
17 Receipt For recording of all types of financial receipts, cash and bank.
18 Receipt Note For recording of inward of inventory after sales order.
19 Rejections In For recording of inward of stock items after rejection from
customer.
20 Rejections Out For recording of outward of stock items after rejection.
21 Reversing Journal For recording of temporary vouchers which will have effect till a
particular date only. They will be automatically reversed after a
particular date.
22 Sales For recording of all types of trading sales transactions, including
cash and credit sales.
23 Sales Order For recording of any type of sales order for trading goods.
24 Stock Journal For recording of movement of stock without any financial impact.

INFORMATION TECHNOLOGY 321


Accounting Package
2.2.4 Type of Non Master Data :
As shown in chart above, there are four types of non master data. All types of transactions are
recorded in any of the four types shown above only.
Following table shows division of various vouchers under the above categories.
Accounting Voucher : Inventory Vouchers :
 Contra  Delivery Note
 Credit Note  Material In
 Debit Note  Material Out
 Journal  Physical Stock
 Memorandum  Receipt Note
 Payment  Rejections In
 Purchases  Rejections Out
 Receipt  Stock Journal
 Reversing Journals
 Sales
Order Vouchers : Payroll Vouchers :
 Purchase Order  Attendance
 Sales Order  Payroll
 Job Work In order
 Job Work Out Order

By default there are twenty four voucher types in Tally.ERP 9. These voucher types are the
formats used for recording of various types of transaction. Different voucher types are used for
two purposes.
Simplicity for user to input the data.
Prevention of errors during data entry.
E.g.
Debit ledger field in receipt voucher will accept ledgers grouped under Cash in hand, Bank
Accounts or Bank OD/OCC only. As a receipt can be either in cash or though bank only, the
debit ledger in receipt voucher must be either cash or bank only.
Credit ledger field in payment voucher will accept ledgers grouped under Cash in hand, Bank
Accounts or Bank OD/OCC only. As a payment can be either in cash or through bank only,
the credit ledger in payment voucher must be either cash or bank only.
In case of purchase transaction, credit ledger can be Cash, bank or a Party Ledger only.
In case of sales transaction, debit ledger can be Cash, Bank or a Party Ledger only.
These types of controls can be placed by using different voucher types only.

322 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
2.3 ERP SOFTWARE
2.3.1 What is ERP Software ?
ERP stands for Enterprise Resource Planning. Every business entity uses various types of resources
to achieve its business objectives. Money, Material, Manpower, Machines, etc. are the resources
generally used by any business entity. Managing these resources effectively is the major challenge
before any organization. ERP software is the most effective tool to manage these resources for the
utmost benefit of organization.
2.3.2 Basics Characteristics of ERP software :
Central database :
There may be multiple users from multiple departments, located at multiple physical locations.
All the users from all the departments use the same data. There is only one set of data for all
the users.
This system is used to avoid duplication of efforts in recording transactions and to save
resources.
Inter and intra document connectivity :
Inter document connectivity is the system of linking one document with another. E.g. Sales
order processing where sales order is recorded first, then on the basis of Sales Order, Delivery
Note is recorded and finally on the basis of Delivery Note, Sales Invoice is recorded.
Data from sales order is automatically captured in delivery note and data from delivery note
is automatically captured in sales invoice.
Intra document connectivity is the system of linking of all the steps performed to generate a
single document. E.g. for generation of a sales order, there may be steps as shown below.
 Maintaining prospective list of buyers.
 Sending quotations
 Discussions
 Price negotiations
 Getting final order.
 Maintaining database of orders procured by salesman for disbursement of commission/
incentive at a later date.
All the above steps are recorded internally till generation of a sales order.
Real time updation of data :
Real time updation of data means updating the data immediately after recording of any
transaction or change in master data.
Due to single set of data as central database, it is possible to update all the data for all the
departments on real time basis.
Standardization for all the departments.
Same software and same interface is used for all the modules of software.
Standard software procedures are used across all the departments in an organization.
Basic issue with ERP software is handling of large size data on real time basis. An ERP software is
supposed to cater to the needs of multiple users from multiple departments with different types
of needs, data size goes on increasing everyday. Data size in a big organization may go to even

INFORMATION TECHNOLOGY 323


Accounting Package
100 crore vouchers per year. Hence data handling capacity becomes a primary area of concern for
any type of ERP software.
ERP software are designed and sold in modules. There are different departments in any business
and ERP software is also designed according to the departments in business.
Following chart depicts a typical ERP scenario.
Let us discuss each aspect in brief.
Financial Accounting
This is basic activity that is expected to be handled by any accounting software. ERP software is
also used as accounting software. All types of financial transactions like sales, purchase, receipt,
payment, contra, journal, etc. are recorded to prepare Profit & Loss and Balance Sheet and many
other accounting and MIS reports.
Inventory Accounting
This is an extension to financial accounting where recording of all types of inward and outward of
stock items is done to calculate closing stock in quantity. This closing stock in quantity is multiplied
with a rate factor to arrive at closing stock in value. Closing stock value is used to prepare trading
account and balance sheet. Correctness of financial statements is largely dependant upon correct
value of closing stock. Due large number of transactions, it is almost impossible to calculate correct
value of closing stock in most of the cases. There is a direct co-relation between financial accounting
and inventory accounting. Transactions like purchase, sales, purchase return, sales return are mixed
transactions where financial and inventory accounting both are affected. There may be certain
pure inventory transactions, i.e. transactions which affect inventory accounting only and does not
affect financial accounting. E.g. transfer of goods from one godown to another, conversion of raw
material in WIP, inward / outward of goods for temporary reasons like repair, etc.
Production Accounting
This is an extension to inventory accounting. Here all the transactions relating to manufacture
activity are recorded. This may include steps as under.
Submission of plan of production and requirement of material
 Issue of material from stores to shop floor
 Quality control and assurance
 Conversion of raw material into WIP
 Conversion of WIP into Finished Goods.
 Accounting for Cost control and analysis at each stage of production.
Human Resource Accounting
Human resource is a big resource and has to be managed very carefully. ERP software is also used
to record all the transactions relating to human resource also. This may include.
Recording of employee master data
Recording of employee related transactions like leave, attendance advances, salary calculations,
deductions,
Employee job profile, working location, work allotment, etc.
Supply Chain Management
This is a concept introduced by ERP software to effectively utilize resources which may be lying

324 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
outside the organization. Process of supply chain management starts right from procurement
of goods from supplier and ends on delivery of finished products at customer’s place. Logistics
management is the major part of supply chain management.
Project Management
Execution of big size projects may consume huge resources. ERP software is used to manage the
execution of projects effectively at minimum possible cost.
Customer Relationship Management
This includes handling of all type data of all the customers, communication with them, their
preferences, choices, likes and dislikes, purchase patterns, and many other things. Customer
relationship management has got importance in recent past just because a satisfied customer is
the sign of goodwill of the organization.
2.3.3 Installing Tally.ERP 9 :
As compared to other ERP installation, installing Tally.ERP 9 is comparatively very easy. Following
are the simple steps that can be used to install Tally.ERP 9 software.
Downloading the installable software :
Go to www.tallysolutions.com and download the latest available release of Tally.ERP 9. Tally
offers two options for downloading of Tally.ERP 9.
 Tally.ERP 9 for 32 bit operating system
 Tally.ERP 9 for 64 bit operating system
Any of the option can be selected for download as per need, with or without help file as shown in
Fig. 2.3.1.

Fig 2.3.1 : Tally.ERP 9 Download Centre screen


Lite installer stands for installer file without help file and full installer stands for installer file with
help file. At present, disc space for lite installer is around 30 MB and for full installer it is around
120 MB.

INFORMATION TECHNOLOGY 325


Accounting Package
Anybody can freely download Tally.ERP 9 without any license key and use it for learning
purpose.
Installing Tally.ERP 9 :
Tally.ERP 9 installation process can be started just by double clicking the installer file. During
installation process, following options need to be selected.
Edition : Tally.ERP 9 can be installed as a single user or multiuser software. Single user stands
for installing tally license on one computer only. In case of multiuser tally, license can be
installed on any number of computers.
Application Directory : It is the location where tally installation files are stored. This can be
any location on your hard disc.
Data Directory It the location where you want to save data. It is suggested not to store Tally
Data on the drive where operating system is stored. This will help to get the data back in case
of problem in operating system.
Configuration Directory : It is the location where configuration files are saved. It can be same
as that of application directory.
Language Directory : It is the location where language setting files are saved.
License Directory : It is the location where Tally license is stored as shown in Fig. 2.3.2.

Fig 2.3.2 : Tally.ERP Installer screen

326 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9

Note : Tally.ERP 9 is a Multilanguage software offering a choice of 15 languages. To use it as


a Multilanguage software, it is necessary to install Windows Regional Language Pack. This
pack has to be installed from windows CD. This pack has to be installed only once. If is already
installed on the computer, it need not be installed again. This pack has to be installed on each
computer separately. Without this pack, Multilanguage feature cannot be used.

Types of licenses
Silver (Single User) : This license can be installed and used on a single computer only and
costs Rs. 18,000 per license.
Gold (Multiuser) : This license can be installed on a single computer and can be used on any
number of computers connected in a single local area network. This license costs Rs. 54,000.
Auditor (Multiuser) : This is a special facility given to firm of chartered accountants where
Tally.ERP 9 Gold software is sold at 80% discount. This is multiuser software and can be
used on any number of computers connected in a single local area network. This license costs
Rs. 10,800.
After starting Tally.ERP 9 for the first time, the following “Startup” screen shall appear as shown
in Fig. 2.3.3.

Fig 2.3.3 : Licensing Startup screen


Let us understand meaning of each menu option.
A : Activate License : This option has to be selected in case of activating Tally.ERP 9 for the first
time after buying.
V : Reactivate License : This option has to be used in case of activating Tally.ERP 9 for reactivating,
i.e. activating for anytime after first time. This is needed incase of shifting of tally license from one
computer to another or incase of activating tally license on the same computer once again.
B : Buy Rental License : Tally.ERP 9 is available on rent also. Full functional Tally.ERP 9 can be
used by paying monthly rental as Rs. 600 per month for single user and Rs. 1,800 per month for
multiuser license. Select this option for hiring tally on rent. Rent has to be paid in advance. It can
be paid by credit card, debit card or by using tally currency.

INFORMATION TECHNOLOGY 327


Accounting Package
C : Configure Existing License : Use this if you want to configure existing license. License may be
installed on some other computer and you may want to use it on a network computer. Tally will
search license availability in network and will get connected to that particular license.
L : Login as Remote Tally.Net User : Use this option to get connected to the data stored on a remote
location. Remote login in tally can be used without license also. Valid Tall.Net ID and permission
is required to get access to the remote data.
W : Work in Educational Mode : This is a demo mode of tally. This option can be selected in case
you want to use tally without license. This can be very well used for learning purpose. There are
very few restrictions in Educational Mode. One of the major restrictions in education mode is date
restriction. User is allowed to use only 1st, 2nd and 31st date of any of the month for recording a
voucher or viewing a report. So in all out of 365 dates in a year, only 31 dates are be available for
use in education mode of tally. Barring a very few other restriction, this is almost full functional
software for educational purpose.
Q : Quit : This option is meant for quitting tally software.
2.3.4 Understanding Tally Screen :
After starting tally software, either in activated or in educational mode, following screen shall
appear as shown in Fig. 2.3.4.

Fig 2.3.4 : Company info. screen


Contents of Tally Screen can be classified as under.
Horizontal Button Bar : This button bar contains ten stationary buttons. These buttons will
remain as it is through out all the tally screens. As shown in above figure, these buttons are :

328 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9

Fig 2.3.5 : Horizontal Button Bar screen


 Print - To take printout of any report
 Export – To export any report in six different formats, e.g. ASCII, Excel, HTML, JPEG, PDF
and XML.
 Email – To email any report directly from tally.
 Upload – To upload any tally report directly on a website.
 Shop – To purchase various add on packages available on tally shop
 Language – To select the language for accounting out of fifteen available languages.
 Keyboard – To select the keyboard layout out of seventeen available layouts according to
languages.
 Control Centre - To manage admin and licensing issues about the software
 Support Centre – To obtain online support from Tally, to check status of your query.
 Help – To get help on tally software or tally add on packages.
Vertical Button Bar : Button bar placed at right most part of tally screen is called as vertical
button bar. Buttons on vertical button bar keeps on changing according to the screen / report
you are viewing. Some buttons like “F2 : Date”, are common in most of the screens and
reports. User may keep a close watch on right hand side vertical button bar to understand
tally functionality in better and quicker way.
Info Panel : This is area at the bottom of the first screen. Info panel is divided in to five parts
as under.

Fig 2.3.6 : Info Panel screen


Product – This box is used to display the name of the software product, i.e. Tally.ERP 9.
User can go to www.tallysolutions.com just by clicking on this box.
 Version – This box is used to display software details like version, release, edition that is
being used currently. Latest available release is also displayed here.
 License – Information about software serial number, registered email ID with Tally, i.e.
account ID and validity of Tally.Net Subscription is displayed in this box.
 Configuration – Software technical details like Statutory Master file version, TDLs, Proxy
is displayed in this box.
 Calculator – Calculator can be used in Tally just by pressing “Ctrl + N” in any screen.
Calculator box is also used for display many other type of information, e.g. import of data,
query shooting, connectivity with Tally server at Bengaluru, etc.
Menu Area : This area is used to display menu options in Tally. This area is located in the
middle of screen as shown in Fig.2.3.7.

INFORMATION TECHNOLOGY 329


Accounting Package

Fig 2.3.7 : Tally Menu option screen


 Select Company – To select the already created company.
 Login as Remote User – To access the data stored on a remote computer.
 Create Company – To create a new company
 Backup – To take data backup
 Restore – To restore the data backup to any specified location.
 Quit – To exit from tally software.

Fig 2.3.8 : Tally’s first screen

330 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
Some other information is also displayed on Tally’s first screen, which is explained below.
Current Period : Currently set accounting period is displayed here. It can be anything from
one day to multiple years. Current period can be changed by pressing Alt + F2.
Current Date : It is the current accounting date, i.e. if a user records a transaction in any type
of voucher without setting any date, it shall be recorded in current date.
Name of Company : Name of currently selected and active company is displayed here. More
than once companies can be opened. But only one company will be active at any point of time.
Date of Last Entry : Date of last transaction is displayed here. Vouchers with post dated stamp
are not considered here. Also, number of days for back dated voucher creation / alteration
are calculated from this date.

2.4 SETTING UP A NEW COMPANY


2.4.1 Introduction
Company in Tally means any accounting unit. It may be a sole proprietorship, partnership firm, a
limited company, a trust, society, etc. Creation of a company is the first step in using any accounting
software. Company creation in Tally is very simple, but configuration of tally as ERP software
takes some extra time. For creation of company, select “Create Company” menu on first screen of
tally. Following screen shall appear as shown in Fig. 2.4.1.

Fig 2.4.1 : Company Creation screen


Let us understand meaning and use of all the fields one by one.
Directory : The location where user wants to save the company data. It can be internal hard
disc drive of local computer or a network computer or any external drive also.
Name : The name which you want to use for display on screen.

INFORMATION TECHNOLOGY 331


Accounting Package
Mailing Name : The name which a user wants to print in reports. It can be same as that of
Name or can be a different name also.
Address : The full address of the company should be written here. This will be used in all the
reports while printing.
Statutory compliance for : Tally.ERP 9, release 4.5 offers choice of 41 countries here. Any option
can be selected as per requirement. Tally will apply all the statutory features for the selected
country only.
State : State option is available only if India is selected as a country. State selection is important
for VAT compliance. VAT feature in tally will not work correctly if incorrect state is selected.
Telephone No. : Type the landline telephone number here.
Mobile No. : Type the mobile number here.
E-mail : Type email address here.
Enable Auto Backup : This option shall be no by default. If this option is made “Yes”, tally
will automatically take the backup of company data at the time of loading the company. The
backup shall be stored at the same location and same folder where original data files are stored.
The name of the auto backup file shall be “ABK.900”. Auto backup feature may be of great
help in case of loss of data, but please note :
 Auto back up will consume heavy disc space. Sixty different copies of auto back up for
sixty days shall be kept by Tally as backup. This will increase disc space consumption to a
very big extent. File size of ABK.900 file may be more than 100 times of original data size.
 Tally will create backup at the time of loading the company and not at the time of shutting
the company.
Currency Symbol : New rupee symbol has be introduced by Tally. This will be displayed with
amount in many reports.
Maintain : Two options are available. 1. Accounts only, 2. Accounts with Inventory. Any option
can be selected as per need.
Financial Year from : This is the starting date from which a user wants to start accounting year.
Books beginning from : This is the starting date from which a user wants to start recording
transactions.
Note : Alteration in Financial Year from and Books beginning from may result in total loss of
data. As far as possible, do not try to change these dates.
Tally Vault Password : Tally vault is the highest level of security provided by tally. It is a
system of encrypting data. Tally vault password can be set while creation of company or it
can be set later on also.
Use Security Control : Set this option to “Yes” to enable the security and access control feature
in a particular company. Multiple users IDs with different access rights can be created and
used using this feature. Setting this option to “Yes” will prompt five new field in the same
screen.
Name of Administrator : Administrator is the user responsible to administer tally company.
Administrator will be having total rights over all the facilities and features in the particular
company. Other users rights can be controlled through administrator ID only.

332 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
Password : Set the password for administrator here. Maximum allowed password length is 51
characters. It is suggested to use a password with alphabets, numbers and special characters.
Use Tally Audit Features : Tally has got two types of audit features. One is quantitative audit
and other is qualitative audit. Set this option to “Yes” to start quantitative audit feature. Here
a user can track the changes made in vouchers and masters.
Disallow opening in Educational mode : Setting this option to “Yes” will prevent a user from
opening the company in educational mode. Company will get opened with licensed Tally
only.
Base Currency Information : This may be set as per need.
At the end, accept the screen by pressing “Enter” key or “Y” key to create the company.
After creation of Company, following screen shall appear.
2.4.2 Gateway of Tally Screen

Fig 2.4.2 : Gateway of Tally screen


This screen is called as “Gateway of Tally”. Let us try to understand menu options in this screen.
There are five menu headings and relevant sub menus under each heading.
Masters :
Accounts Info – To create/alter financial accounting masters like Ledger, Group, Voucher
Type, etc.
Inventory Info – To create/alter inventory accounting masters like Stock Item, Stock Group,
Godowns, etc.
Quick Setup – To quickly setup taxation and Tally.Net features.

INFORMATION TECHNOLOGY 333


Accounting Package
Transactions :
Accounting Voucher – To create financial transactions which affect trial balance
Inventory Vouchers – To create pure inventory transactions that does not affect trial balance,
e.g. transfer of stock from one location to another.
Utilities :
Import of Data – To import data from another tally company
Banking – To perform banking related activities like bank reconciliation, cheque printing and
view bank transaction reports.
Audit :
To analyze the data using various audit tools. Till release 3.6, this feature was available in
Auditor Edition of Tally only. But from Release 3.6 onwards, this feature is made available to
all the users.
Reports :
Balance Sheet – To view balance sheet as on any particular date.
Profit & Loss Account – To view Profit & Loss Account for any particular period.
Stock Summary – To view stock position as on any particular date.
Ratio Analysis – To view various ratio calculations.
Multi Account Printing – To take printout of books of accounts in different ways. This option
shall be available only if Tally is activated. This will not be available in educational mode.
Statutory Reports:
 Vat Reports
 Service Tax Reports
 TDS Reports
2.4.3 Setting of Features in New Company
Every newly created company needs to be configured according to the users needs. By default only
financial accounting module is set to ON in tally. All other modules need to be ON and configured
as per needs of every business.
There are two buttons on right hand side bottom corner.
F11 : Features – To set various features ON / OFF
F12 : Configure – To configure tally screens / reports

Note : Changes made by pressing “F11” are applicable to a particular company only, irrespective
of individual computer settings. These changes shall be applicable no matter which computer
is used to open the company and even in remote login also.
Changes made by pressing “F12” are applicable for all the companies opened on a particular
computer. These changes shall not be applicable if computer is changed.
F11 changes are company specific, F12 changes are computer specific.

334 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
F11: Features button offers following options as shown in Fig. 2.4.3 :
 Accounting Features
 Inventory Features
 Statutory & Taxation
 Audit Features
 Tally.Net Features
 Add On Features
Accounting Features Screen

Fig 2.4.3 : Accounting Feattures screen

INFORMATION TECHNOLOGY 335


Accounting Package
Inventory Features Screen

Fig 2.4.4 : Inventory Features screen

336 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
Statutory & Taxation Feature Screen

Fig 2.4.5 : Statutory & Taxation Features screen

INFORMATION TECHNOLOGY 337


Accounting Package
Audit Features Screen

Fig 2.4.6 : Audit Features screen

338 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
Tally.Net Features Screen :

Fig 2.4.7 : Tally.Net Features screen


Tally Add On Features screen may vary according to the add on used.

2.5 USER ADMIN & MANAGEMENT


2.5.1 Introduction
In ERP environment, there shall be multiple users of software. Hence, every user shall have his/
her own user ID and password. Before we start using the software, it is necessary to create users
with respective access rights.
Tally.ERP 9 data can be accessed using two ways.
 Local Data – Accessing data stored on local computer or using Local Area Network
 Remote Data – Accessing data stored on a remote location using internet.
Hence tally users can be classified in two categories as
 Local Users
 Remote Users
There can be two more types of classification of users as –
 Admin User – person having total rights over software
 Non Admin User – any user other than admin user.

INFORMATION TECHNOLOGY 339


Accounting Package
2.5.2 Creating Admin User
Admin user can be created during creation of company itself. If not created while creating the
company, it can be created later on also. Go to company alteration screen of particular company
by following the path as under as shown in Fig. 2.5.1.
Gateway of Tally > Alt + F3 > Alter > Enter

Fig 2.5.1 : Creating Admin User screen


2.5.3 Creating non admin users
Administrator shall have total rights over software, but for other users, it is necessary to define
their respective rights in Tally. It is suggested to create a chart of users along with access rights on
a paper first and then to define it in software.
Step 1 : Define security levels
Step 2 : Create users with respective security levels.
Step 1 : Define security levels
Path : Gateway of Tally > Alt+F3 > Security Control > Types of Security
Following screen shall appear as shown in Fig. 2.5.2.

Fig 2.5.2 : Security Levels screen


By default, there are only three security levels, e.g. Data Entry, Tally.Net User and Tally.Net Auditor,
are created in a tally company. Any number of security levels can be created as per requirement.
Let us set a security level for Accountant.

340 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
Path : Gateway of Tally > Alt+F3 > Security Control > Types of Security >
Use Basic Facilities of : Appropriate security level should be selected here from the list of
available security levels. This is the upper limit of facilities allowed to this particular security
level.
Days allowed for Back Dated vouchers : Days allowed for backdated voucher entry for the
particular security level can be set in this field. Tally will calculate back days from the date of
last entry (Date of last entry is displayed on Gateway of Tally Screen). Post dated vouchers
are ignored while considering date of last entry.
Cut-off date for Back Dated vouchers : This date is the date beyond which a user will be
allowed to create / alter any voucher irrespective of back dated voucher access.
E.g. User 1 is an accountant with back dated access for 30 days
Date of last entry in tally company is 15.05.2013
Cut-off date for back dated vouchers is 30.04.2013
Question : Can User1 record a transaction on 29.04.2013 because he is having 30 days back
dated access ?
Answer : No. As the cut-off date for back dated vouchers is 30.04.13, User1 will not be able to
record a voucher on 29.04.13 even is he/she is having backdated access for 30 days.
“Cut-off date for back dated vouchers” can be effectively used where there is a system of
finalizing books of accounts on periodic basis. This field has an overriding effect on “Days
allowed for Back Dated vouchers”
Set/Alter rules for Print Before Save : This field can be used to allow or disallow facilities
like print / export / email / upload of every individual voucher of a particular voucher type,
before it is saved. Normally, no voucher shall be allowed to be printed / exported / emailed
/ uploaded before it is saved in system. Any voucher type can be selected here for allowing
/ disallowing.
Allow to Connect Company : This option is used for allowing / disallowing a user to connect
a particular company to Tally server at Bangalore. This is necessary for using remote login
feature. Remote login can be used only if a tally company is connected with Tally server.
Use Tally.Net Authentication : Setting this option to “Yes” allows the security level for remote
login use. If this option is set to “No” security level shall be useful for local data only.
Disallow the following Facilities : This section is used for disallowing certain reports /
facilities. There are two parts in this section.
 Type of Access : There are seven different types of access available here as under.
 Alter – Alteration shall be disallowed
 Create – Create shall be disallowed
 Create / Alter – Both shall be disallowed
 Display – Display shall be disallowed
 Display / Print – Both shall be disallowed
 Full Access – None of the above shall be allowed
 Print – Print shall be disallowed.
Any option may be selected as per choice.
 List of Reports : In Tally.ERP9 release 4.5, there are in all 124 options available here for
controlling the access. Multiple permutations and combinations are possible with these

INFORMATION TECHNOLOGY 341


Accounting Package
reports and facilities. Type of access selected for a particular report shall be disallowed
here. E.g. Display/Print – Balance Sheet can be disallowed for accountants.
Allow the following Facilities : Opposite to disallow, here the required facilities can be allowed
to a group of users. Here also the system is similar to disallowing the facilities.

Fig 2.5.3 : Allow Facilities to User screen


Creation of Users and allocation of security level
Path : Gateway of Tally > Alt + F3 > Security Control > Users & Password
Here, two types of users can be created.
Local User – For creation of a local user, security level selected must contain “Use Tally.Net
Authentication – No”. Any security level can be selected as per need.
Remote User – For creation of remote user, two security levels are available by default. Any
number of additional security levels can be created as per requirement.
Let us understand the fields for creation of user and allocation of security level.
Security Level : Select the existing security level from the list. If not created earlier, it can be
created from “Types of Securities” menu.
Name of User : For local user creation, any name can be typed here as per convenience. It is
suggested to keep it as short as possible. For remote user, the user name must be a valid and
operational email ID only. It cannot be anything else.
Password (if any) : Password can be set here for local user creation only. For remote users,
cursor will not stop here as password shall be created by tally and sent to respective user
through email. Password is optional for local user.
Allow Remote Access : This has to be set to “Yes” to enable a remote user to access data
remotely.

342 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9
Allow Local TDL : Tally Definition Language (TDL) is the language used for Tally programming.
Additional add on packages can be developed and attached with original software to enhance
its functionality. These additional add on packages can be stored on web or on local computer.
Even a remote user can use the TDL stored on local computer by setting “Allow Local TDL”
to “Yes”
Allow SMS Access : Data stored in Tally can be accessed through SMS also. E.g. If a user who
is not in office, wants to know current cash balance, he/she can send the request using his/her
mobile phone to the designated number as “cash balance”. This request shall be processed by
Tally server and a reply containing the required information shall be sent to the same mobile
number within few seconds. Some settings need to be done to start using SMS facility. Setting
“Allow SMS Access” to “Yes” is one of the parts of SMS settings.
Note : Allow Remote Access, Allow Local TDL and Allow SMS Access, these three options
are available only if the security level selected is a remote security level. These options are not
available to local users.

Fig 2.5.4 : Display list of Users for Company


2.5.4 Password Policy :
This feature has been introduced by tally from release 3.6, where some additional features about
password can be set conveniently.
Path : Gateway of Tally > Alt+F3 > Security Control > Password Policy
Following screen gives us the idea about features available in password policy. Using password
policy enhances the security control in software as shown in Fig. 2.5.5.

INFORMATION TECHNOLOGY 343


Accounting Package

Fig 2.5.5 : Password Policy for Company screen


2.5.5 Creating / altering Remote Users using Tally website :
Remote users can be created using tally website as under.
Log on to www.tally.solutions.com
Enter your account ID and password.
Click on User Management link on left side panel
Click on “List of Users” to view / alter existing users or click on “Create Users” to create a
new one. List of existing users will be shown as under as shown in Fig. 2.5.6.
2.5.6 User Maintenance from Control Centre
Remote users can be created from Tally website also. At the time of registration / activation of
tally software for the first time, one email ID needs to be given, which acts as account ID, which
is considered as unique identification for each tally serial number. This account ID is displayed
on tally info panel under the heading “License”.
“Control Centre” button on horizontal button bar can be pressed to open control centre.

344 INFORMATION TECHNOLOGY


Introduction in Tally.ERP 9

Fig 2.5.7 : Show Control Centre


Entry into control centre requires valid User ID and Password. Account ID registered with Tally
shall be entered as user ID along with Tally.Net password. Internet must be connected to enter
into Control Centre.

Fig 2.5.8 : Login As Remote Tally.Net User screen


After successful login, following screen shall appear as shown in Fig. 2.5.9.

Fig 2.5.9 : Screen after successful login


Press Alt + U to go to user management menu. Remote users can be created using this menu. Access
control for handling facilities at Control Centre can also set by pressing F8 button.

INFORMATION TECHNOLOGY 345


Accounting Package

Fig 2.5.10 : User Management menu screen


Access Control Screen for Standard User as shown in Fig. 2.5.11 :

Fig 2.5.11 : Access Control screen

346 INFORMATION TECHNOLOGY


Voucher Entry in Tally.ERP 9

3
C
H
A
VOUCHER ENTRY IN
P
T TALLY.ERP 9
E
R

Tally.ERP 9 allows us to record all business transactions through the appropriate Vouchers available
in Tally.ERP 9. To configure Voucher entry, press F12: Configure and enable the required options.

3.1 VOUCHER TYPES IN TALLY.ERP 9


Tally.ERP 9 comprises of the following predefined Vouchers, to suit different business requirements
for recording various transactions. Tally.ERP 9 also allows us to create user-defined Vouchers
(Voucher Types) as per your requirements.
3.1.1 Predefined Vouchers in Tally.ERP 9
Tally.ERP 9 comprises of the following predefined Accounting Vouchers:
 Contra Voucher
 Payment Voucher
 Receipt Voucher
 Journal voucher
 Sales Voucher/Invoice
 Debit Note Voucher
 Credit Note Voucher
 Purchase Voucher/Invoice
3.1.2 Creating Voucher Type
Tally.ERP 9 allows us to create different types of vouchers and record, classify and segregate
vouchers as per our requirements. For example, we can further classify payment vouchers by creating
voucher types with the names Bank Payment and Cash Payment.
To create a new Voucher Type:
(i) Go to Gateway of Tally > Accounts Info. > Voucher Type > Create.
(ii) Enter the Voucher name.
(iii) Specify the Type of Voucher.
(iv) Specify the Method of Voucher Numbering.
(v) Activate or deactivate other functions as required.

INFORMATION TECHNOLOGY 347


Accounting Package

Fig. 3.1.1: Voucher Type Creation

(vi) Press Enter and save.

3.2 ENTERING TRANSACTIONS IN TALLY.ERP 9


3.2.1 Purchase Voucher
In Tally.ERP 9, the Purchase voucher can be passed in Voucher mode or the Invoice mode where
the calculations can be automated and expedite voucher entry.
To create a Purchase Voucher
(i) Go to Gateway of Tally > Accounting Vouchers.
(ii) Press F9 or select F9: Purchase on the Button bar.
(iii) Select the Party’s A/c Name.
(iv) Select the Stock Items, Qty and Rate details.
(v) Select the Tax Ledger and the tax amount is automatically computed.

348 INFORMATION TECHNOLOGY


Voucher Entry in Tally.ERP 9

Fig. 3.2.1: Purchase Voucher

(vi) Enter all other required details.


(vii) Press Enter and save.
During Voucher Entry, we can pre-fill the voucher narration for a specific ledger/ voucher entry,
by pressing
(i) Alt+R, to recall the last narration saved for the first ledger in the voucher, irrespective of the
voucher type.
(ii) Ctrl+R, to recall the last narration saved for a specific voucher type, irrespective of the ledger.
3.2.2 Sales Voucher
In Tally.ERP 9, the Sales Voucher can be passed in Voucher Mode or the Invoice Mode where, the
calculations can be automated and expedite voucher entry.
To create a Sales Voucher:
(i) Go to Gateway of Tally > Accounting Vouchers.
(ii) Press F8 or select F8:Sales on the Button bar.
(iii) Select the Party Name in the By field and specify the amount.
(iv) Select the Sales Ledger in the To field and specify the amount.
(v) Select the Tax Ledger in the To field and specify the amount.

INFORMATION TECHNOLOGY 349


Accounting Package

Fig. 3.2.2(A): Sales Voucher


(vi) Press Enter and save.
Sales Invoice
To create Sales Invoice in Tally.ERP 9:
(i) Press F11: Inventory Features and set Allow Invoicing to Yes.
(ii) In the Sales entry screen, click Ctrl+V (As Invoice) button.
(iii) Select the Party’s A/c Name.
(iv) Select the Stock Items, Qty and Rate details.
(v) Select the Tax Ledger and the tax amount is automatically computed.

350 INFORMATION TECHNOLOGY


Voucher Entry in Tally.ERP 9

Fig. 3.2.2(B): Sales Invoice

(vi) Enter all other required details.


(vii) Press Enter and save.
3.2.3 Receipt Voucher
In Tally.ERP 9, we can record any money received from debtors against sales Invoices or on Account
and for all transactions where money is received, using the Receipt Voucher.
To create the Receipt Voucher,
(i) Go to Gateway of Tally > Accounting Vouchers.
(ii) Press F6 or select F6: Receipt from the button bar.
(iii) Select the Party Name in the To field and specify the amount.
(iv) Select the Bill references in the Bill Wise Details for screen.
(v) Select the Bank Ledger in the By field and press Enter to accept the amount.

INFORMATION TECHNOLOGY 351


Accounting Package

Fig. 3.2.3: Receipt Voucher


(vi) Press Enter and save.
We can also pass the above Receipt Voucher in Single Entry Mode, by pressing F12: Configure and
setting Use Single Entry mode for Pymt/Rcpt/Contra to Yes.
3.2.4 Payment Voucher
In Tally.ERP 9, we can pass the payment voucher in Single Entry or Double Entry mode.
To create Payment Voucher:
(i) Go to Gateway of Tally > Accounting Vouchers.
(ii) Press F5 or select F5: Payment from the button bar.
(iii) Select the Party Name in the By field and specify the amount.
(iv) Select the Bill references in the Bill Wise Details for screen.
(v) Select the Bank Ledger in the To field and press Enter to accept the amount.

352 INFORMATION TECHNOLOGY


Voucher Entry in Tally.ERP 9

Fig. 3.2.4: Payment Voucher

(vi) Press Enter and save.


We can also pass the above Payment Voucher in Single Entry Mode, by pressing F12: Configure
and setting Use Single Entry mode for Pymt/Rcpt/Contra to Yes.
3.2.5 Contra Voucher
In Tally.ERP 9, we can pass the Contra Voucher in Single Entry or Double Entry mode.
To create Contra Voucher:
(i) Go to Gateway of Tally > Accounting Vouchers.
(ii) Press F4 or Select F4: Contra on the Button bar.
(iii) Select the Cash/Bank ledger in To and By fields, as required.

INFORMATION TECHNOLOGY 353


Accounting Package

Fig. 3.2.5: Contra Voucher screen

(iv) Press Enter and save.


3.2.6 Journal Voucher
In Tally.ERP 9, we can create Journal Vouchers for adjustments with respect to debit and credit
amounts without involving the cash or bank accounts.
To create Journal Voucher:
(i) Go to Gateway of Tally > Accounting Vouchers.
(ii) Press F7 or select F7: Journal on the Button Bar.
(iii) Enter the required details.

354 INFORMATION TECHNOLOGY


Voucher Entry in Tally.ERP 9

Fig. 3.2.6: Journal Voucher screen

(iv) Press Enter and save.


3.2.7 Debit Note Voucher
In Tally.ERP 9, we can pass Debit Note for any kind of Purchase Returns, Escalation/ De-escalation
in price or any other expenses incurred by us on behalf of the party, etc.
To enable Debit Notes, press F11: Inventory Features and set Use Debit/ Credit Notes to Yes.
To create Debit Note Entry:
(i) Go to Gateway of Tally > Accounting Vouchers.
(ii) Press Ctrl+F9 or select Ctrl+F9: Debit Note on the Button Bar.
(iii) Enter the required details.

INFORMATION TECHNOLOGY 355


Accounting Package

Fig. 3.2.7: Debit Note Voucher

(iv) Press Enter and save.


We can enter the above entry in Invoice mode, by enabling Use Invoice Mode for Debit Notes to
Yes and entering the transaction in Invoice Mode (Ctrl+V).
3.2.8 Credit Note Voucher
In Tally.ERP 9, we can pass Credit Note for any kind of Sales Returns, Escalation/ De-escalation
in price, etc.
To enable Credit Notes, press F11: Inventory Features and set Use Debit/Credit Notes to Yes.
To create Credit Note Entry:
(i) Go to Gateway of Tally > Accounting Vouchers.
(ii) Press Ctrl+F8 or Select the button Ctrl+F8: Credit Note on the Button Bar.
(iii) Enter the required details.

356 INFORMATION TECHNOLOGY


Voucher Entry in Tally.ERP 9

Fig. 3.2.8: Credit Note Voucher

(iv) Press Enter and save.


We can enter the above entry in Invoice mode, by enabling Use Invoice Mode for Credit Notes to
Yes and entering the transaction in Invoice Mode (Ctrl+V).
3.2.9 Stock Journal
In Tally.ERP 9, we can pass Stock Journals for all types of Stock Adjustments viz., Inter-Godown
Transfer, Manufacturing Process and so on.
To create Stock Journal Voucher:
(i) Go to Gateway of Tally > Inventory Vouchers.
(ii) Press Alt + F7 or select the button F7: Stk Jrnl from the button bar.
(iii) Specify the Stock Items, Godown, Qty details in the Source section.
(iv) Specify the Stock Items, Godown, Qty details in the consumption section.

INFORMATION TECHNOLOGY 357


Accounting Package

Fig. 3.2.9: Stock Journal

(v) Press Enter and save.


3.2.10 Physical Stock Journal
In Tally.ERP 9, we can pass Physical Stock Voucher for recording the actual stock which is verified
or counted. We may also configure to ignore or not ignore physical stock differences recorded in
Physical Stock vouchers.
To create Physical Stock Voucher:
(i) Go to Gateway of Tally > Inventory Vouchers.
(ii) Press Alt+F10 or select the button F10: Phys Stk on the Button Bar.
(iii) Enter the Physical counts (Quantity) of the Stock Items.

358 INFORMATION TECHNOLOGY


Voucher Entry in Tally.ERP 9

Fig. 3.2.10: Physical Stock Voucher

(iv) Press Enter and save.

INFORMATION TECHNOLOGY 359


Accounting Package

4
C
H
A
GENERATING REPORTS
P
T IN TALLY.ERP 9
E
R

4.1 INTRODUCTION
Tally.ERP 9 provides us the capability to generate various financial statements and Management
Information system reports, thereby facilitating better management, effective control and well-
informed decisions.
Following are some of the broad categories of reports available in Tally.ERP 9
 Financial Statements
 Books & Registers
 Statement of Accounts

4.2 FINANCIAL STATEMENTS


Financial Statements summarise the individual transactions to show totals, ratios and statistics
required by the users to analyze the company’s financial data in a wide variety of ways.
Broadly, the financial statements are classified into three major statements, which form part of the
statutory requirements in most countries:
 Balance Sheet
 Profit & Loss A/c
 Trial Balance
4.2.1 Balance Sheet
A Balance Sheet is a financial statement that reports a firm’s financial position at a specific time.
It shows a balance between the assets and liabilities of a firm and the owner’s funds (i.e., Assets =
Liabilities + Owner’s Equity).
To view Balance Sheet:
 Go to Gateway of Tally > Balance Sheet.

360 INFORMATION TECHNOLOGY


Generating Reports in Tally.ERP 9

Fig. 4.2.1: Balance Sheet screen


Select F1: Detailed/Condensed to explode the summarized information. Press F12: Configuration
and set the required parameters to display the Balance Sheet according to our preferences.
4.2.2 Profit & Loss A/c
Profit and Loss Account or Income Statement is a periodic statement, which shows the net result
of business operations for a specified period. In Tally.ERP 9, Profit and Loss account displays the
information based on the default primary groups and is updated instantly with every transaction/
voucher that is entered and saved.
To view Profit & Loss Account:
 Go to Gateway of Tally > Profit & Loss A/c
 Click F1: Detailed, to view the Profit & Loss Account in detailed format.

Fig. 4.2.2: Profit & Loss A/c screen

INFORMATION TECHNOLOGY 361


Accounting Package
Press F2: Period to change the period as required. Press F12: Configuration and set the required
parameters to display the Profit & Loss A/c according to our preferences.
4.2.3 Trial Balance
A Trial Balance is a summary of all ledger balances to check whether the figures are correct and
balanced. In Tally.ERP 9, all the ledgers appear with their ledger balances.
To view the Trial Balance:
 Go to Gateway of Tally > Display > Trial Balance.

Fig. 4.2.3: Trial Balance screen


Tally.ERP 9 shows group wise Trial Balance. Press Shift+Enter to view details of all groups, except
for groups behaving like sub-ledgers. Press F1: Detailed to detail the grouped information for further
detail. Press F5: Led-wise to list all ledgers and their closing balances.

4.3 BOOKS & REGISTERS


Tally.ERP 9 provides us capability to generate various books and registers for any specific period viz.,
month, date, and year and as on date. In Tally.ERP 9, once voucher entry is made, the transactions
are automatically & immediately posted in the Day Book and other Books of Accounts without any
additional effort. Tally.ERP 9 allows us to maintain and generate all primary books of accounts and
registers like
 Cash Book
 Bank Book
 Purchase Register
 Sales Register
 Journal Register

362 INFORMATION TECHNOLOGY


Generating Reports in Tally.ERP 9
 Debit Note Register
 Credit Note Register
4.3.1 Cash Book
To generate Cash Book:
Go to Gateway of Tally > Display > Account Books > Cash / Bank Book(s).
 Select the required Cash Ledger Account.
 Press Enter on the required month to view Cash transactions for a month.

Fig. 4.3.1: Cash Book screen


4.3.2 Bank Book
To generate Bank Book:
 Go to Gateway of Tally > Display > Account Books > Cash / Bank Book(s).
 Select the required Bank Account.
 Press Enter on the required month to view Bank transactions for a month.

INFORMATION TECHNOLOGY 363


Accounting Package

Fig. 4.3.2: Bank Book screen


4.3.3 Purchase Register
To generate Purchase Register:
 Go to Gateway of Tally > Display > Account Books > Purchase Register.
 Press Enter on the required month to view Purchase Transactions for a month.

Fig. 4.3.3: Purchase Register screen

364 INFORMATION TECHNOLOGY


Generating Reports in Tally.ERP 9
4.3.4 Sales Register
To generate Sales Register:
 Go to Gateway of Tally > Display > Account Books > Sales Register.
 Press Enter on the required month to view Sales Transactions for a month.

Fig. 4.3.4: Sales Register screen


4.3.5 Journal Register
To generate Journal Register:
 Go to Gateway of Tally > Display > Account Books > Journal Register > Journal Register.
 Press Enter on the required month to view Journal Entries for a month.

Fig. 4.3.5: Journal Register screen

INFORMATION TECHNOLOGY 365


Accounting Package
4.3.6 Debit Note Register
To generate Debit Note Register:
 Go to Gateway of Tally > Display > Account Books > Journal Register > Debit Note Register.
 Press Enter on the required month to view Debit Notes for a month.

Fig. 4.3.6: Debit Note Register screen


4.3.7 Credit Note Register
To generate Credit Note Register:
 Go to Gateway of Tally > Display > Account Books > Journal Register > Credit Note Register.
 Press Enter on the required month to view Credit Notes for a month or press F2 and specify
the period.

Fig. 4.3.7: Credit Note Register screen


4.3.8 Day Book
To generate Day Book:
 Go to Gateway of Tally > Display > Day Book.
 Specify the required period to view transactions entered for that particular day, week and year
or for any specified period.

366 INFORMATION TECHNOLOGY


Generating Reports in Tally.ERP 9

Fig. 4.3.8: Day Book screen


4.3.9 Stock Summary
To view Stock Summary:
 Go to Gateway of Tally > Stock Summary.
 Press F12: Configure, set Show Opening balance, Goods Inwards, Goods Outwards and
Closing Balance to Yes.

Fig. 4.3.9: Stock Summary screen

4.4 STATEMENTS OF ACCOUNTS


Tally.ERP 9 provides us the capability to generate, print, mail or upload various statements and
reports viz., Receivables, Payable statements, Ageing Analysis Report and so on.

INFORMATION TECHNOLOGY 367


Accounting Package
4.4.1 Receivables and Payables
Accounts Receivables refer to amounts to be received from the sundry debtors while Accounts
Payables are the amounts to be paid to sundry creditors. Tally.ERP 9 provides complete bill-wise
information of amounts receivable as well as payable on party wise, group wise or Bill-wise.
To view Outstandings:
 Set Maintain Bill-wise Details to Yes in F11: Accounting Features.
 Create a Party (Ledger A/c) under Sundry Debtors / Sundry Creditors group.
 Set Maintain balances bill by bill to Yes for the parties during ledger creation.
 Go to Gateway of Tally > Accounting Vouchers > Sales (F8) or Purchase (F9) accordingly and
enter the transaction by specifying a Bill reference No. along with due dates for the amount
to be received or paid in the Bill Allocations for screen.
To view Receivables / Payables Reports:
 Go to Gateway of Tally > Display > Statement of Accounts > Outstandings > Receivables.

Fig. 4.4.1: Bills Outstanding Report - Bills Receivables screen


The report displays bill-by-bill outstanding for all the parties with the pending amount along with
the due date.
To view amounts payable by the company, select Payables in the Outstandings menu. We can also
toggle between Payables or Receivables reports, by clicking F4.
4.4.2 Ledgerwise outstanding
To view individual Party wise outstanding:
 Go to Gateway of Tally > Display > Statement of Accounts > Outstandings > Ledger.

368 INFORMATION TECHNOLOGY


Generating Reports in Tally.ERP 9

Fig. 4.4.2: Ledger Outstandings Report screen


Tally.ERP 9 provides a report displaying bill-by-bill details of all outstanding for the selected party
ledger with the total outstanding amount. To view details of cleared bills, press F12: Configure and
enable the required options.
4.4.3 Groupwise Outstanding
To view Group Outstanding Reports:
 Select Group in the Outstandings menu and then select the specific group or sub group.

Fig. 4.4.3: Group Outstandings Report

INFORMATION TECHNOLOGY 369


Accounting Package
4.4.4 Ageing Analysis Report
Tally.ERP 9 facilitates generation of Ageing Analysis reports for Outstandings. We can define
various range of periods and view outstanding across the specified periods viz., we can specify 0 to
30 days, 30 to 45 days and 45 to 75 days and so on.
To view Ageing Analysis Report:
 Go to Gateway of Tally > Display > Outstandings > Receivables or Payables.
 Select F6 (Age wise).
 Specify Ageing Methods and the Periods.

Fig. 4.4.4: Ageing Analysis Report


We may also view the Ageing Analysis report by due date or by bill date.

370 INFORMATION TECHNOLOGY


Financial Analysis Tools in Tally.ERP 9

5
C
H
A
FINANCIAL ANALYSIS
P
T TOOLS IN TALLY.ERP 9
E
R

5.1 INTRODUCTION
Tally.ERP 9 provides us the capability to generate numerous advanced and critical Management
Information System Reports and analytical tools, thereby facilitating better management, effective
control and well-informed decisions.
Following are the some of analytical reports in Tally.ERP 9:
 Cash Flow Statement
 Fund Flow Statement
 Ratio Analysis
 Budgeting & Controls
 Bank Reconciliation Statement
5.2 CASH FLOW STATEMENT
Tally.ERP 9 facilitates generation of Cash flow statement, which displays the movement of cash
flow viz., cash inflows and cash outflows (both, cash and bank) for a given period. The report also
displays the net flow for any period.
To view Cash Flow Summary:
 Go to Gateway of Tally > Display > Cash/Funds Flow > Cash Flow.
 Select a month and press Enter.

Fig. 5.2.1: Cash Flow Statement screen

INFORMATION TECHNOLOGY 371


Accounting Package
To generate Daily Cash Flow Statement, press F4. To view information on the average cash inflow
/out flow for any period, activate Show Average Details in F12: Configure.

5.3 FUND FLOW STATEMENT


Tally.ERP 9 facilitates generation of Fund Flow Statement, which displays the sources of the Funds
and their applications. This report clearly indicates the movement in sources and application of
funds impacting the business’s working capital and cash position. It includes operational funds,
increase and decrease in inventories, creditors/ debtors.
To view Fund Flow Statement:
 Go to Gateway of Tally > Display > Cash / Funds Flow > Funds Flow.
 Select any month and press Enter.

Fig. 5.3.1: Fund Flow Statement screen

5.4 RATIO ANALYSIS


Ratio Analysis is an indicator of the operating performance of a business. In Tally.ERP 9, we
can generate Ratio Analysis report providing information on critical ratios (viz., operating cost
percentage, return on working capital and so on) in a single report.
To view Ratio Analysis Report:
 Go to Gateway of Tally > Ratio Analysis.

372 INFORMATION TECHNOLOGY


Financial Analysis Tools in Tally.ERP 9

Fig. 5.4.1: Ratio Analysis Report screen

5.5 BUDGETING & CONTROLS


Tally.ERP 9 helps us to create Budgets for different periods and compare the actual financial
performance vs budgeted figures and generate variance reports. We can define budget values for
each Group as well as for Ledgers.
To enable Budgets:
 Go to Gateway of Tally > F11: Features > F1: Accounting Features.
 Set Maintain Budgets and Controls to Yes.
To create Budgets:
 Go to Gateway of Tally > Accounts Info. > Budgets > Create.
 Specify Name for the Budget.
 Specify Date range for the budget.
 Set Yes to Groups‘/ Ledgers and assign budget to selected groups/ledgers.
To view Budget Reports:
 Select any report (i.e., Balance Sheet or Profit and Loss A/c or Trial Balance).
 Press Alt + C (New Column).
 Specify details for period, Currency and Method of Stock Valuation.
 Select the created budget name for Types of Value to show.
 Set Show Variance to No.

INFORMATION TECHNOLOGY 373


Accounting Package

Fig. 5.5.1: Budgeted Vs Actual Figures screen


Variance Analysis
In Tally.ERP 9, we can view Variance Analysis Report which provides information on the difference
between the actual vs the budgeted figures.
To view Variance Analysis report, set Show Variance to Yes from the above Insert Column (Alt+C)
screen or follow the steps given below:
 Go to Gateway of Tally > Display > Trial Balance/Account Books (Group Summary).
 Select Budget Variance (Alt + B).
 Select the Type of budget and press Enter.

Fig. 5.5.2: Budget Variance Report screen

374 INFORMATION TECHNOLOGY


Financial Analysis Tools in Tally.ERP 9

5.6 BANK RECONCILIATION STATEMENT


Tally.ERP 9 provides us the facility to reconcile the transactions of the company’s Bank Book with
the Bank Statement and instantly displays the Balance at Bank and as per the company’s Bank Book.
To view Bank Reconciliation Statement:
 Go to Gateway of Tally > Display > Account Books > Cash/Bank Book.
 Select the required Bank Account and press Enter on the required month.
 Press F5: Reconcile.
 Enter the date of clearing (Bank Date), date on which the transaction is being debited/ credited,
from the Bank Statement.

Fig. 5.6.1: Bank Reconciliation Report screen


We can predefine the date of reconciliation for transactions starting from where we want to reconcile,
by specifying the Effective Date of Reconciliation in the Bank Ledger Master.

INFORMATION TECHNOLOGY 375


Accounting Package

6
C
H
A
E-FILING PROCESS
P
T
E
R

LEARNING OBJECTIVES
 What is e-filing?
 Understanding the procedure of e-filing
 Special points about e-filing process
 Overview on GST

6.1 INTRODUCTION
E-filing of tax returns and other documents is a major change in Indian tax administration scenario.
In this era of information technology, everything is changing to “electronic” format. Change in tax
administration was much awaited and expected. Today, all major tax administration matters are
converted to electronic format. This has proved to be a big step towards increasing transparency
and efficiency in tax administration.

6.2 WHAT IS E-FILING?


In simple words, it is giving information to tax authorities in electronic format. Giving information
in electronic format is much easies for assesse as well as tax authorities.
Difference between e-filing and paper filing :

Sr. Particulars E-filing Paper Filing


1 Convenience Can be filed during any time of To be filed during office working
day. There is no concept called as hours only.
office working hours.
2 Place of filing Can be filed from anywhere in the To be filed at a particular office
world. No concept of office place only.
for filing.
3 Possibility of Very less as all possible electronic Very high as there can not be any
errors checks and controls are there. control or check before filing of
return.
4 Processing of Very fast Very slow
returns

376 INFORMATION TECHNOLOGY


E-Filing Process

5 Obtaining Status of return processing, It is very difficult and time


information status of refund, etc. can be consuming to obtain any type of
from tax obtained within minutes as all information.
authorities the information is stored on the
website only. Also, it is possible
to obtain the information without
any human intervention.
6 Chances of Low High
Malpractices
7. Access to past The documents filed with tax Majority of documents were
records authorities can be retrieved at filed in physical form will
later date for further use like require individual to retain these
obtaining loans, preparation for documents in secure form. Where
tax assessments, verification of original copies get mutilated,
historical records lost, destroyed will cause lots of
problems to the assessee.

6.3 TYPES OF E-FLING


1. E-filing for Income Tax
2. E-filing for Service Tax
3. E-filing for Company Law
4. E-filing for GST
6.3.1 Common E-filing process:
By and large e-filing process is mostly common. In some cases it may differ to some extent. Following
flow chart gives a broad idea of e-filing process.

INFORMATION TECHNOLOGY 377


Accounting Package
(a) Obtaining e-format file :
This is the first step in e-filing process. In some cases, this step may not be needed. File formats are
designed by tax authorities for filing of e-returns. The tax authorities each year at the beginning of the
year notified tax returns format including the efiling format in excel and other java based format for
filing. These file formats have to be obtained first. E.g. for filing of income tax return of a practicing
chartered accountant, the appropriate return form is ITR-3. This is an excel file and this file can be
downloaded from www.incometaxindiaefiling.gov.in, the official website for efiling of tax returns
with income tax department. Similarly, various other formats are available on websites of different
tax authorities for filing of returns. Assessee has to select and download the correct format for e-filing.
(b) Filling information in e-format file :
This is the next step after obtaining the e-format file. Information relating to tax compliance has to
be filled in in this file. There are two ways of doing it.
(a) Filling the information manually
(b) Using some software for filling of information.
In some cases, due to typical file format, it is not possible for any human being to fill the information
manually. In such cases, some software has to be used for filling of information in e-file format.
(c) Validating e-format file :
This is a process where e-file format is checked for mistakes/errors. Different types of errors can be
committed while filling the information. E.g. Calculation of tax payable on taxable income, Interest
payable on late payment of advance tax or setoff of carried forward losses by the assessee, date
of filing return may not be a current date, PAN details of assessee may not be filled correctly, etc.
These types of mistakes can be easily detected in the process of file validation. In some cases, file
validation utility is built in in the e-file format itself. In some cases, it may be used externally. File
validation utility is software, which checks for mistakes in the file. Once the file get validated the
utility program showing errors and once these have been removed the efiling file will be generated
specified format as per tax authorities.
Uploading e-format file :
Once the file is validated and % error free, it can be uploaded on the website of respective tax
authority. This is actual submission of information. It is just like attaching the file to an email. There
are two types of uploading.
(a) Uploading by assesse directly.
(b) Uploading by agent of tax authority.
E.g. Income tax return has to be uploaded by the assessee directly, but TDS return can be uploaded
by the assessee or through an tax intermediary. It has to be given to authorize TIN Facilitation
Centre only.
After successful uploading of any tax return, acknowledgement is generated automatically. This
can be printed immediately or later on also.

378 INFORMATION TECHNOLOGY


E-Filing Process
6.3.2 Income Tax E-Filing
Introduction:
Income tax return has to be filed by every assessee every year. For e-filing of income tax returns all
the assesses are classified in two parts.
Individual / HUF
Firm, Association of Persons, Body of Individuals, Local Authority, Company, Trust,
ITR Forms for Individual, HUF :
Sr Source of Income Individual, HUF
ITR-1 ITR-2 ITR-3 ITR-4S
1 Income from Salary/Pension • • • •
2 Income from Other Sources (only Interest • • • •
Income or Family Pension)
3 Income/Loss from Other Sources • • •
4 Income/Loss from House Property • • •
5 Capital Gains/Loss on sale of investments/ • •
property
6 Partner in a Partnership Firm • •
7 Income from Proprietary Business/Profession •
8 Income from presumptive Business •
Table 6.3.1 (A): ITR Forms for Individual, HUF
ITR Forms for Firms, Associations of Persons (AOP), Body of Individuals (BOI), Local Authority,
Companies, Trusts, Fringe Benefit Tax (FBT) Return
Sr. Source of Income Trusts Only FBT
ITR4/ ITR-6 ITR-7 ITR-8
ITR-5 #See Note
1 Income / Loss from Other Sources • • •
2 Income / Loss from House Property • • •
3 Capital Gains / Loss on sale of • • •
Investments / Property
4 Income / Loss from Business • • •
5 Fringe Benefit Tax • • • •
Table 6.3.1 (B): ITR Forms for Firms, AOP,BOI,Trust,FBT
#Note: ITR-8 is discontinued for e-Filing from AY 2010-11 onwards, still continued for AY 2007-08,
2008-09, 2009-10.

INFORMATION TECHNOLOGY 379


Accounting Package
List of Income Tax Returns:
List of ITRs
Return
Who can use this Return Form Who cannot use this Return Form
Type
ITR 1 1. This Return Form is to be used by This Return Form should not be used by an
(Sahaj) an Individual whose Total Income Individual whose Total Income for the assessment
for the assessment year 2017-18 year 2017-18 includes
includes -
 Income from more than one house property;
 Income from Salary/ Pension; or
or
 Income from winnings from lottery or
 I n c o m e f r o m O n e H o u s e income from Race horses; or
Property (excluding cases
 Income taxable under section 115BBDA; or
where loss is brought forward
from previous years); or  Income of the nature referred to in section
115BBE; or
 Income from Other Sources
(excluding winning from  Income under the head “Capital Gains” e.g.,
lottery and income from Race short-term capital gains or long-term capital
Horses, Income taxable under gains from sale of house, plot, shares etc.; or
section 115BBDA or Income of  Agricultural income in excess of 5,000; or
the nature referred to in section
115BBE)  Income from Business or Profession; or

Note: Further, in a case where the  Loss under the head ‘Income from other
Income from another person like sources’; or
Spouse, Minor Child, etc. is to be  Person claiming relief under section 90 and/
clubbed with the income of the or 91; or
assessee, these Return Form can
 Any resident having any asset (including
be used only if the Income being
financial interest in any entity) located
clubbed falls under the above
outside India or signing authority in any
categories
account located outside India; or
 Any resident having income from any
source outside India.
ITR 2 This Return Form is to be used by an This Return Form should not be used by an
individual or an Hindu Undivided individual whose total income for the assessment
Family who is not eligible to file year 2017-18 includes Income from Business or
Sahaj ITR-1 and whose income Profession under any proprietorship.
chargeable to income-tax under the
head “Profits or gains of business
or profession” is in the nature of
interest, salary, bonus, commission
or remuneration, by whatever name
called, due to, or received by him
from a partnership firm.

380 INFORMATION TECHNOLOGY


E-Filing Process

Note: In a case where the Income


from another person like spouse,
minor child, etc. is to be clubbed with
the income of the assessee, these
Return Form can be used where
such income falls in any of the above
categories
ITR 3 This Return Form is to be used by an
individual or a Hindu Undivided
Family who is carrying out a
proprietary business or profession.
ITR 4 This Return Form is to be used by This form cannot be used in following cases
an individual/ HUF/ Partnership
 Income from more than one house property;
Firm whose total income for the
or
assessment year 2017-18 includes:-
 Income from Winnings from lottery or
 B u s i n e s s i n c o m e w h e r e
income from Race horses; or
such income is computed
in accordance with special  Income under the head “Capital Gains”,
provisions referred to in e.g. Short-term capital gains or long-term
sections 44AD and 44AE of capital gains from sale of house, plot, shares
the Act for computation of etc.; or
business income; or  Income taxable under section 115BBDA; or
 Income from Profession where  Income of the nature referred to in section
such income is computed 115BBE; or
in accordance with special
provisions referred to in  Agricultural income in excess of 5,000; or
sections 44ADA; or  Income from Speculative Business and
 Salary/ Pension; or other special incomes; or

 Income from One House  Income from an agency business or income


Property (excluding cases in the nature of commission or brokerage;
where loss is brought forward  Person claiming relief of foreign tax paid
from previous years); or under section 90, 90A or 91; or
 Income from Other Sources  Any resident having any asset (including
(excluding Winning from financial interest in any entity) located
Lottery and Income from Race outside India or signing authority in any
Horses). account located outside India; or
Note 1: The income computed shall  Any resident having income from any
be presumed to have been computed source outside India.
after giving full effect to every
loss, allowance, depreciation or
deduction under the Income-tax Act.

INFORMATION TECHNOLOGY 381


Accounting Package

Note 2: Further, in a case where


the income of another person like
spouse, minor child, etc. is to be
clubbed with the income of the
assessee, this Return Form can
be used only if the income being
clubbed falls into the above income
categories.
ITR 5 This Form can be used by a person A person who is required to file the return of
being a firm, LLPs, AOP, BOI, income under section 139(4A) or 139(4B) or
artificial juridical person referred 139(4C) or 139(4D) or 139(4F) shall not use this
to in section 2(31)(vii), persons form
referred to in section 160(1)(iii) or
(iv), cooperative society, registered
societies and local authority.
ITR 6 This Return Form can be used by a A Company claiming exemption under section
Company 11 shall not use this Form
ITR 7 This Form can be used by persons
including Companies who are
required to furnish return under
section 139(4A) or 139(4B) or 139(4C)
or 139(4D).
ITR 8 This Form is applicable in case of
a person who is not required to
furnish the return of income but
is required to furnish the return of
fringe benefits.
Note: This Form is applicable from
assessment year 2006-07 to 2009-10
Table 6.3.1 (C): List of Income Tax Returns
# Source : www.incometaxindiaefiling.gov.in

382 INFORMATION TECHNOLOGY


E-Filing Process
6.4 OVERVIEW OF E-FILING WEBSITE:
E-filing website of income tax department has been upgraded recently.

Fig. 6.4.1 E-filing website


E-filing website has become much more user friendly now. So many new features are added for
increasing transparency. The first step for using income tax e-filing website is to register with it.
Registration process is simple process just like creating an email account.
To register for the first time,
 Click on the “Register Yourself” button located on top right part of the website home screen.
 Select the user type, e.g. Individual, HUF, Company, etc.
 Fill in the required information like PAN, Name, Email ID, Mobile No, etc.
 Save the information.
 Linking of Aadhar of the assessee is not made mandatory w.e.f 1 July, 2017 onward
This is a one time activity only. Once registration is over, a user is allowed to enter into his/her own
account and do lot of activities including uploading of his/her income tax return.
Some activities can be carried out on website without registration also.
Services offered by e-filing website:
Following are the services offered by e-filing website.
 Submit returns/ forms
 View Form 26AS (Tax Credit)
 Check the details of outstanding tax demand
 Check ITR-V receipt status

INFORMATION TECHNOLOGY 383


Accounting Package
 Check CPC Refund Status
 Check rectification status
 Know your jurisdictional A.O.
 Know your PAN
 Know your TAN
 Apply online for PAN / TAN
 E-pay taxes
 Request for Reissue of Refund
 Changes in the address, bank details, Email-ID and Contact details
6.4.1 e-Filing Statstics:
Following two tables shows the figures relating status of e-filing till 31.05.2017.
Form Wise receipt of e-Returns:

FY 2015-16 FY 2016-17 FY 2017-18


Form (From 01/04/2015 (From 01/04/2016 (From 01/04/2017
to 31/03/2016) to 31/03/2017) to 31/05/2017)
1 ITR-1 1,79,46,687 2,14,55,515 8,98,887
2 ITR-2(OLD) 22,36,078 21,89,065 46,121
3 ITR-2(NEW) - - 78,538
4 ITR-2A 11,74,205 16,72,759 37,317
5 ITR-3(OLD) 8,88,598 9,66,823 27,406
6 ITR-3(NEW) - - 1,52,725
7 ITR-4S 81,35,210 1,18,57,709 5,57,798
8 ITR-4(OLD) 1,06,46,974 1,23,90,871 4,99,376
9 ITR-4(NEW) - - 3,85,679
10 ITR-5 12,52,465 12,61,922 38,007
11 ITR-6 7,78,069 8,01,115 18,407
12 ITR-7 2,85,451 2,72,258 10,764
Grand Total 4,33,43,737 5,28,68,037 27,51,025
Table 6.4.1 (A): Status of e-filing till 31.5.2017
Income Range & Status Wise e-Filing Returns (FY 2017-18 From 01/04/2017 to 31/05/2017)

384 INFORMATION TECHNOLOGY


E-Filing Process

Income Range U p t o 5,00,001 - 10,00,001 20,00,001 50,00,001 - A b o v e


5,00,000 10,00,000 - 20,00,000 - 50,00,000
Association Of Persons 6,961 139 70 37 13 32
Body Of Individuals 273 8 2 1 - 2
Company 13,990 677 568 651 404 1,237
Firm 30,110 910 526 372 130 202
Government 5 - - - - -
Hindu Un-divided 30,488 2,925 671 167 37 13
Family
Artificial Juridical 546 8 - 3 2 2
Person
Local Authority 134 1 - 1 - 3
Individual 23,03,862 1,73,910 37,964 10,769 2,175 1,155
Trust 9,410 193 53 26 8 13
Grand Total 23,95,779 1,78,771 39,854 12,027 2,769 2,659

Table 6.4.1 (B): Income range & Status wise of e-filing till 31.5.2017
Highlights of e-Filing

No of Registered Users as on 31/05/2017 6,32,49,130


Percentage of returns filed using Utility provided by Department 47.62%
Percentage of returns received outside office hours 47.29%
Table 6.4.1 (C): Highlights of e-filing
What is digital signature certificate?
 Technically, a digital signature is a mathematical scheme for demonstrating the authenticity
of a digital message or document. A valid digital signature gives a recipient reason to believe
that the message was created by a known sender, such that the sender cannot deny having
sent the message (authentication and non-repudiation) and that the message was not altered
in transit (integrity). Digital signatures are commonly used for software distribution, financial
transactions, and in other cases where it is important to detect forgery or tampering.
 Digital Signature Certificates (DSC) are the digital equivalent (that is electronic format) of
physical or paper certificates. Examples of physical certificates are drivers’ licenses, passports or
membership cards. Certificates serve as proof of identity of an individual for a certain purpose;
for example, a driver’s license identifies someone who can legally drive in a particular country.
Likewise, a digital certificate can be presented electronically to prove your identity, to access
information or services on the Internet or to sign certain documents digitally.
 Like physical documents are signed manually, electronic documents, for example e-forms are
required to be signed digitally using a Digital Signature Certificate.

INFORMATION TECHNOLOGY 385


Accounting Package
 A licensed Certifying Authority (CA) issues the digital signature. Certifying Authority (CA)
means a person who has been granted a license to issue a digital signature certificate under
Section 24 of the Indian IT-Act 2000.
 The different types of Digital Signature Certificates are: Class 2: Here, the identity of a person
is verified against a trusted, pre-verified database.
 Class 3: This is the highest level where the person needs to present himself or herself in front
of a Registration Authority (RA) and prove his/ her identity.
 The Certifying Authorities are authorized to issue a Digital Signature Certificate with a validity
of one or two years.
 Digital Signatures are legally admissible in a Court of Law, as provided under the provisions
of IT
 Price of a digital signature may vary from vendor to vendor. It includes the cost of medium (a
UBS token which is a one time cost), the cost of issuance of DSC and the renewal cost after the
period of validity. The company representatives and professionals required to obtain DSCs
are free to procure the same from any one of the approved Certification Agencies as per the
web site. The issuance costs in respect of each Agency vary and are market driven. However,
for the guidance of stakeholders, a suggestive list showing costs of issuance of DSCs at the
consumer end from the Certification Agencies is given as under.
Sr. Name of Cost of USB Cost of DSC Renewal Cost of DSC Support
Certification Cryptotoken with one Charges for with two charges
Agency (CA) year validity DSC with year validity
one year
validity
1. MTNL CA Reference of USB Rs. 300/- Rs. 300/- Rs. 400/- ( for Inclusive
crypto token which (for MTNL (for MTNL MTNL phone
the user can procure phone phone subscriber)
is provided on www. subscriber) subscriber) and Rs. 600/-
mtnltrustline.com. and Rs. and Rs. for others
450/- for 450/- for ( Taxes extra)
others others
(Taxes extra) (Taxes extra)
2. TCS Rs. 750 (Inclusive of Rs. 1245 Rs. 1000/- R s . 1 9 0 0 / - Not Provided
4% Sales Tax). Any (Inclusive (Inclusive ( I n c l u s i v e by CA
other applicable of 12.24% of 12.24% of 12.24%
Taxes Extra. Sales Tax.) Sales Tax) Sales Tax)
Any other Any other Any other
applicable applicable applicable
Taxes Extra. Taxes Extra taxes Extra
3. IDBRT Not provided by the Rs. 750/- Rs. 750/- Rs. 1500/- Inclusive
CA. The user can (Rs. 500/-
procure the token towards
from market directly
and get his DSC
loaded into it

386 INFORMATION TECHNOLOGY


E-Filing Process

4. Rs. 1000/- Rs. 995/- Rs. 995/- Rs. 1650/- Rs. 500/-
Taxes extra (No (No (No per site visit
service tax service tax service tax payable
applicable) applicable) applicable) directly to the
Authorised
Partner.
5. nCODE Rs. 900/- Rs. 1090/- Not Rs. 1650/- Inclusive
Solutions (Inclusive of VAT/ (No Finalised (No
Sales Tax) service tax service tax
applicable) applicable)
6. NIC Certificate provided All NIL NIL for Training
in Smart card. Cost certificates Government Charges: Rs.
of Card Rs. 400/-. provided Rs. 150/- 500/- per
For DSCs on USB with 2 years for PSU, participant
token, the subscribers validity Autonomous (optional)
have to bring NICCA & Statutory
approved USB token Bodies
7. Central
Excise & Does not issue DSCs to person other than those from the Department
Customs
8. e-Mudhra Rs 700/- Rs. 899/- Rs. 899/- Rs. 1149/- Inclusive of
(3i Infotech Telephonic
Consumer • Exclusive of VAT / • Service • Service • Service or Web
Services Sales Tax / Courier tax not tax not tax not support
Limited) charges applicable applicable applicable
Table 6.4.1: Name of Certification agencies
What is Electronic Verification Code (EVC) ?
Now w.e.f from Assessment Year 2015-16 the taxpayer can file verify their income return using
Electronic verification code and thereafter they need not required to furnish physical copy of the
ITRV to the CPC Bangalore within 120 days from the date of Income tax return filed online.
The verification of the ITR by the taxpayer would be possible by submitting an Electronic Verification
Code (EVC) which can be generated presently by any of the following modes:
(a) Internet Banking –
In this process a person (with a PAN validated by the bank) can log in to his Net-banking
account with a bank registered for this purpose with the Department and will be redirected
to the E-filing website (by selecting appropriate option) where he can generate a EVC.
(b) Aadhaar One-Time Password (Aadhaar OTP) –
In this process, the Aadhaar number and the data of name, gender and Date of birth of the person
as per the Permanent Account Number (PAN) database would be authenticated against the
data of Aadhaar maintained by the Unique Identification Authority (UIDAI). On confirmation
UIDAI would send an OTP to the Aadhaar registered mobile number of the person.

INFORMATION TECHNOLOGY 387


Accounting Package
(c) Bank Account Validation –
In this process the taxpayer would submit his bank account particulars which would be
instantly validated with the bank electronically to confirm the PAN of taxpayer submitted
during KYC done by the bank after which taxpayer would be able to generate a EVC for
submission of the return.
(d) Demat Account Validation –
In this process the taxpayer would submit his demat account particulars which would be
instantly validated with NSDL/CDSL depositories electronically to confirm the PAN of
taxpayer submitted during KYC done by the depository after which taxpayer would be able
to generate a EVC for submission of the return.
(e) EVC through ATM –
In this process the taxpayer would log in to account in the ATM using his debit card and select
the option to generate EVC.
(f) E-filing One Time Password (OTP)-
A person having total income as per the Income Tax Return of Rs. 5 lakhs or below without
any refund claim, can generate an EVC on the Efiling website that will be sent to the Registered
Email ID and Mobile Number of person with E-filing Website.
6.4.2 Steps for e-filing of income tax returns:
Before we discuss about the steps for e-filing of income tax returns, it is necessary to understand for
whom it is mandatory and for whom it is optional.
E-filing of income tax returns / forms has been made mandatory for –
 Individual/HUF having total income of Rupees 5 Lakhs and above for AY 2015-16 and
subsequent Assessment years.
 Individual/HUF, being resident, having assets located outside India for AY 2012-13 and
subsequent Assessment years.
 He is not ordinary resident and has assets (including financial interest in any entity) located
outside India or signing authority in any account located outside India or any income outside
India.
 Individual/HUF/Firm auditable u/s 44AB of the IT Act, 1961 for AY 2011-12 and subsequent
Assessment years.
 All companies/partnership form/Limited liability partnership firms
 Digital Signature is mandatory for Companies and Tax Payers audited u/s 44AB as per Income
Tax Act 1961
There can be three types of e-filing options in case of income tax returns.
Option 1: Use Digital Signature Certificate (DSC)/EVC to e-File. There is no further action needed,
if filed with a DSC/EVC.

388 INFORMATION TECHNOLOGY


E-Filing Process
Option 2: e-File without Digital Signature Certificate. In this case an ITR-V Form is generated. The
Form should be printed, signed and submitted to CPC, Bangalore using Ordinary Post or Speed
Post ONLY within 120 days from the date of e-Filing. There is no further action needed, if ITR-V
Form is submitted.
Option 3: e-File the Income Tax Return through an e-Return Intermediary (ERI) with or without
Digital Signature Certificate (DSC).
6.4.3 E-filing Steps:
To upload Income Tax Return:
 Step 1: On homepage, GO TO ‘Downloads’ section and select applicable Income Tax
Return Form of the relevant Assessment Year OR Login to e-Filing application and GO TO
‘Downloads’-->’Income Tax Return Forms’ and select applicable Income Tax Return Form of
the relevant Assessment Year.
 Step 2: Download the excel utility of the Income Tax Return (ITR).
 Step 3: Fill the excel utility and Validate. (You can pre-fill the Personal and Tax Information in
your Income Tax Return. To pre-fill, Login to e-Filing application and GO TO --> Downloads
--> Download Pre-filled XML to the desired path/destination in your desktop/system. Open
the Excel utility (ITR) and click the “Pre-fill” button. This will require you to select the path/
destination where you have saved the XML and click OK. The details will be uploaded into
your utility. You may edit the tax details, if needed).
 Step 4: Generate an XML file and save in desired path/destination in your desktop/system.
 Step 5: LOGIN to e-Filing application and GO TO --> e-File --> Upload Return.
 Step 6: Select the Income Tax Return Form and the Assessment Year.
 Step 7: Browse and Select the XML file
 Step 8: Upload Digital Signature Certificate, if available and applicable.
 Step 9: Click ‘SUBMIT’.
 Step 10: On successful upload, the return can be verified electronically
 Step 11: Four e-Verification options provided – Taxpayer can choose any one of the options
provided to e-Verify the return:
 I already have an EVC to e-Verify the return
 I do not have an EVC and I would like to generate EVC to e-Verify my return
 I would like to generate Aadhaar OTP to e-Verify my return
 I would like to send ITR-V / I would e-Verify later
Note:
 You can upload the returns after you have registered in e-Filing.
 To e-File using Digital Signature Certificate (DSC), the DSC should be registered in the
application. (To register DSC, you should LOGIN and GO TO --> Profile Settings --> Register
Digital Signature Certificate)

INFORMATION TECHNOLOGY 389


Accounting Package
 If the Income Tax Return is uploaded with DSC (digitally signed) or EVC (electronically
verified), on generation of “Acknowledgement”, the Return Filing process is complete. The
return will be further processed and the Assessee will be notified accordingly. Please check
your emails on these notifications.
 If the return is not uploaded with a DSC (digitally signed) or EVC (electronically verified), on
successful upload of e-Return, an ITR-V Form will be generated. This is an Acknowledgement
cum Verification form. A duly verified ITR-V form should be signed and submitted to
Centralized Processing Centre, Income Tax Department, Bengaluru 560500 by Ordinary Post
or Speed Post (without Acknowledgment) ONLY, within 120 days from the date of e-Filing.
 On receipt of the ITR-V at CPC, the return will be further processed and the Assessee will be
notified accordingly. Please check your emails on these notifications
6.4.4 E-filing without DSC/EVC :
The process of e-filing remains the same in both the case, with digital signature/Electronic Verification
Code and without digital signature, except one additional step. E-filing without Digital Signature
Certificate requires one more step of sending the acknowledgement to CPC at Bengaluru. After
successful upload of income tax return, assesse has to take a printout of ITR-V, acknowledgement
of income tax return, sign it and send it to Central Processing Centre at Bengaluru to complete the
return filing process. This signed acknowledgement must reach Central Processing Centre within
120 days of uploading the return.
6.4.5 Important Points about ITR-V :
 Please use Ink Jet /Laser printer to print the ITR-V Form. Use of Dot Matrix printer should be
avoided.
 The ITR-V Form should be printed only in black ink. Do not use any other ink option to print
ITR-V.
 Ensure that print out is clear and not light print/faded copy.
 Please do not print any water marks on ITR-V. The only permissible watermark is that of
“Income tax Department” which is printed automatically on each ITR V.
 The document that is mailed to CPC should be signed in Original. Photocopy of signatures
will not be accepted.
 The signatures or any handwritten text should not be written on Bar code.
 Bar code and numbers below barcode should be clearly visible.
 Only A4 size white paper should be used.
 Avoid typing anything on the reverse side of the paper.
 Perforated paper or any other size paper should be avoided.
 Do not use stapler on ITR-V Acknowledgement.
 In case, you are submitting Original and Revised Income Tax Returns, do not print them back
to back. Use two separate papers for printing ITR-Vs separately.

390 INFORMATION TECHNOLOGY


E-Filing Process
 Please do not submit any annexures, covering letter, pre stamped envelopes, along with ITR-V.
 The ITR-V form is required to be sent to Post Bag No.1, Electronic City Post Office, Bengaluru,
Karnataka-560100, by Ordinary or Speed Post (without Acknowledgment) ONLY
 ITR-Vs that do not conform to the above specifications may get rejected or acknowledgement
of receipt may get delayed.
6.4.6 E-Filing with DSC:
Here, there is no need of sending ITR-V acknowledgement to CPC, Bengaluru as the return is signed
by the assessee digitally. While uploading income tax return, a question is asked as “Do you want
to digitally sign ? ”. Answer to this question must be set to “YES” to upload the return with digital
signature certificate.

Fig.6.4.5: E-filing with Digital Signature


Registration of Digital Signature Certificate:
This is an activity to be performed before uploading the income tax return with digital signature
certificate.
Path : Profile Settings > Register Digital Signature Certificate.
Select appropriate option and submit.

Fig. 6.4.6 (A): Registration of Digital Signature


Steps for register of Digital Signatures
Step1: - Download ITD e-filing DSC management Utility from the link provided in e-Filing website
at the time of XML upload

INFORMATION TECHNOLOGY 391


Accounting Package
Step2: - Extract the zip folder and open the utility (DSC_MGMT_UTILITY.jar)
Step3: - The utility will get opened as mentioned below. Select Register/Reset Password Using
DSC tab.

Fig.6.4.6 (B): Registration of Digital Signature


Step 4: - Enter the e-Filing User ID.
Step 5: Enter the PAN of the DSC registered in e-Filing. In case of NRI User this is not a Mandatory
Field
Step 6: Select the type of DSC
Step 7: Select a valid USB token certificate
Step 8: Enter the USB token PIN and then click OK.
A success message will be displayed and signature file will be generated and saved at the location
where XML was stored.
Steps for uploading of Income Tax Return by Professionals:
Step 1: GO TO ‘Downloads’ section and select applicable Income Tax Form of the relevant
Assessment Year OR Login to e-Filing application and GO TO ‘Downloads’-->’Download
Forms’ and select applicable Income Tax Form of the relevant Assessment Year.
Step 2: Download the excel utility of the Income Tax Form
Step 3: Fill the excel utility and Validate
Step 4: Generate an XML file and save in desired path/destination in your desktop/system.
Step 5: LOGIN to e-Filing application and GO TO --> e-File --> Upload Form.
Step 6: Select the Income Tax Form and the Assessment Year.
Step 7: Browse and Select the XML file
Step 8: Upload Digital Signature Certificate.

392 INFORMATION TECHNOLOGY


E-Filing Process
Step 9: Click ‘SUBMIT’.
Step 10: On successful upload, the Income Tax Form is sent to Assessee’s workflow for acceptance.
Step 11: The Assessee should LOGIN to e-Filing application, GO TO Worklist and accept/reject
the Income Tax Form.
Step 12: On Approval, the Form is successfully submitted with e-Filing application. No further
action is required.
Step 13: If rejected, the Tax Professional can prepare and e-File the Income Tax Form again by
following the above mentioned steps.
Preparation and Submission of ITR-1 Online :
The taxpayer has the option of submitting ITR 1 by way of Uploading XML OR by Online submission
 Step 1: Login to e-Filing application
 Step 2: GO TO ‘e-File’ --> ‘Prepare and Submit Online’
 Step 3: Select the Income Tax Return Form ITR 1 and the Assessment Year.
 Step 4: Fill in the details and click the SUBMIT button
 Step 5: On successful submission, Acknowledgement detail is displayed. Click on the link to
view or generate a printout of Acknowledgement/ITR-V Form.
Common mistakes in filling of Income Tax Return
The accurate and complete filling up of the relevant column or detail in the Income Tax Return (ITR)
form is most crucial for correct calculation of income. In case the computation of Income or refund
is different than what had been entered or what is expected, please verify the accuracy of the data
entered by you in the ITR. Except for limited number of complicated tax returns, for most taxpayers,
the simple check points are the following:
 Salary from all employers, irrespective of whether Form 16 has been issued or not, should be
entered in Item 1 of ITR 1 or details in Schedule Salary in ITR 2.
 Interest income from fixed deposits, savings bank account etc should be entered in Item 3 viz.
Income from other Sources of ITR 1 or Schedule OS-Income from Other Sources in all other
ITR’s.
 House Property Income. Schedule HP should be filled carefully including the address details.
Income from House Property should be entered in Item 1a viz. Annual letable value/ rent
received/ receivable. Municipal taxes paid should be entered in Item 1c viz. tax paid to local
authority in Schedule HP-Income from House Property.
  A flat deduction of 30% of the amount in Item 1e is the only deduction permissible for
repairs and such expenses will be auto-populated in Item 1f of Schedule HP.
  Deduction for Interest on housing loan should be entered in Item 1g viz. Interest payable
on Borrowed Capital and is restricted to Rs 1,50,000 for ‘Self Occupied’ house. Therefore,
correctly mention whether the house property is Self-Occupied or Let Out in Schedule
HP.
  Accordingly, the final value of Income from House Property will auto populate in Item
1i.

INFORMATION TECHNOLOGY 393


Accounting Package
  In case of multiple house properties do not use ITR-1, details of each house property have
to be entered completely as mentioned above.
  In case of ITR-1 , the House Property loss should be entered as a negative (-) value in the
‘Income from House Property’ column.
 Income from Short Term Capital Gains should be entered in Item A of Schedule CG-Capital
Gains.
  Out of value auto-populated in column “Total Short Term Capital Gains”, the amount of
STCG attributable to STCG from sale of equity share in a company or a unit of an equity
oriented mutual fund, typically, should be entered in column namely, ‘Short term capital
gain under section 111A included in 4’.
  Moreover, the STCG under 111A as entered in column referred above is taxed at a lower
flat rate of 10%
  The residual value, where the STCG is due to sale of assets other than Equity Shares in a
Company or Unit of an Equity Oriented Mutual Fund, if any, will auto populate in the
column named, ‘Short term capital gain other than referred to in section 111A’
  The STCG due to sale of assets other than equity share in a company or a unit of an equity
oriented fund is taxed at the normal slab based rates of tax.
  Most mistakes in STCG are due to incomplete filling of the Schedule CG, incorrect
apportionment of Total STCG into STCG on which Section 111A is applicable & STCG
on which Section 111A is not applicable.
 Income from Long Term Capital Gains should be entered in Item B of Schedule CG-Capital
Gains.
  For Long Term Capital Gain (LTCG), the total value of consideration received for assets
sold such as house property etc, typically, should be entered in Column ‘Other Assets
for which option under proviso to section 112(1) not exercised’ in case the benefit of
indexation is claimed.
   Against this value of consideration received, the indexed cost of acquisition /
improvement and allowable expenditure etc should be entered in appropriate
columns provided thereafter.
   The appropriate exemptions, if any, shall be entered in Column provided therein
and the amounts will populate automatically wherever necessary.
   LTCG in case of ‘Asset in the case of others where proviso under section 112(1) not
exercised’ Column of ITR 2 is taxed at a flat rate of 20% and the benefit of indexation
is allowed.
  Where the benefit of indexation is NOT claimed then total value of consideration received
for assets transferred, should be entered in ‘Other Assets for which option under proviso
to section 112(1) exercised’ column.
   Against this consideration, the cost of acquisition / improvement and allowable
expenditure etc should be entered in relevant columns provided in Schedule CG.
   The appropriate exemptions, if any, are filled in column provided for the same &
amounts will auto populate automatically wherever necessary.

394 INFORMATION TECHNOLOGY


E-Filing Process
  LTCG in case of in ‘Other Assets for which option under proviso to section 112(1)
exercised’, where the benefit of indexation is NOT allowed, as being displayed in the
named column is taxed at a lower flat rate of 10%.
  The assessee is required to segregate the information date wise in Column D of Schedule
CG, regarding Accrual or Receipt of Capital Gain failing which Interest under Section
234C will be wrongly calculated.
 Adjustment of current year and brought forward losses- Schedules CYLA, BFLA and CFL
Most taxpayers have left these Schedules completely blank. These schedules are used for
permissible adjustment of loss of one head of income against another head of income. The
main checkpoints are:
  Only positive values need to be entered. No negative value is required to be entered in
CYLA, BFLA & CFL.
  Carry forward of Current year losses though claimed in return will not be allowed if the
return is not filed within due date.
  No value should be entered in the ‘Greyed out’ boxes.
  The Amounts in Schedule CYLA/BFLA will populate automatically, however assessee
will be allowed to claim loss in Schedule BFLA only if appropriate columns have been
entered in Schedule CFL.
  It is to be noted that the newly introduced Schedule namely Schedule UD currently is not
linked with Schedule BFLA, therefore the assessee is required to mention the Brought
Forward Depreciation amount separately in Schedule BFLA for claiming the loss arising
from the same.
 Income chargeable to Income tax at special rates- Schedule SI
  Most mistakes have occurred in this Schedule since taxpayers have not correctly filled
the codes, rates or values. The following points may be considered:
 Currently the Income Tax forms do not have Individual Columns for segregating
DTAA income from Non DTAA income under each head of income therefore, the
taxpayer is advised to give details of DTAA income & Tax thereon in Schedule SI.
 Also, any special income other than Capital Gains income the figures for which auto
populate from Schedule CG, the assessee is required to mention it in Schedule SI
only & that income shall not be specified separately under any other head.
 Deductions from Income under Chapter VIA
  Most mistakes have occurred due to incomplete details or leaving blank the value of
deductions under respective schedules. In most cases only the total deduction value is
mentioned.
 The deduction amount claimed should be entered in Items 5a to 5m in ITR 1 and in
Items a to o in Schedule VIA in ITR 2.
 Eligible donation for the purpose of deduction under 80 G for donations to charitable
institutions (other than certain specified institutions or funds such as Prime Minister’s
Relief Fund or Rajiv Gandhi Foundation) is restricted to 10 % of total income after
excluding income chargeable to special rates of tax.

INFORMATION TECHNOLOGY 395


Accounting Package
 Likewise, all deductions have specific criteria and limits for claims. In the present
utility a user enterable field for claiming deduction has been mentioned &
correspondingly System Value for deduction claimed is also mentioned for the
benefit of the assessee.
 The sum of all deductions also cannot exceed the total income.
 Deduction cannot be claimed against income chargeable to special rate tax.
 Reasons for difference in calculation of Tax or Interest under 234A, 234B or 234C and
Interest on Refund.
 Mistakes in computation of Income as mentioned above leading to an increase in
Income.
 Mistake in entering data or Income chargeable to tax at special rates such as STCG
on sale of shares, LTCG where indexation benefit is claimed, winnings from lottery.
 Incorrectly computing special rates of tax.
 Mistakes in entering data or leaving blank, important fields relevant for computation
of tax such as date of birth (relevant for senior citizens) or gender (relevant for female
taxpayers), resident or non-resident, status (relevant in case of HUF).
 In case of any shortfall of tax payment either due to non-payment or due to non-
matching of the tax payment or TDS, interest may be charged.
 Typically, interest till the date of processing under 234A is charged if the return is
filed beyond due date, interest under 234B is charged for shortfall in payment of
advance tax and interest under 234C is charged for deferment of advance tax.
 Interest under 234C is also charged in case advance tax on account of STCG under
111A, LTCG or Winnings from lotteries is not paid, beginning from the next quarter
from the quarter in which the income is earned.
 Details of quarter wise breakup of STCG, LTCG and Winnings from Lottery as
mentioned in Schedule SI after adjustment of Losses and adjustment of basic
exemption threshold, if applicable, are used for calculation of advance tax liability
and interest under 234C.
 Reasons for mistakes in Credit for tax payments or TDS
A major reason for difference in refund amount during processing is that the details of tax
payment or TDS do not match with the data available with the Department. The critical
checkpoints are as under:
 Corresponding deduction of tax (TDS) on salary by all Employers should be correctly
entered in Schedule TDS1 in ITR1 or Schedule TDS 1 for ITR 2.
 TDS on salary should be entered in Schedule TDS1 ONLY and TDS on other Income
should be entered in Schedule TDS 2 ONLY.
 Tax deduction Account Number (TAN) of the Employer/Deductor is the unique
identifier for matching TDS claims made against TDS reported by Employer/
Deductor. The TAN number is mentioned on the Form 16 given by the Employer or
on the Form 16A given by the Deductor. In case the TAN of the Employer/Deductor
is not correctly mentioned, no matching is possible and TDS credit will not be given.

396 INFORMATION TECHNOLOGY


E-Filing Process
 If the TAN has been correctly entered but the Employer/Deductor does not report
the same TDS details to the Department, especially the taxpayer Permanent Account
Number (PAN), then also the TDS cannot be matched. Therefore it is advised to check
Form 26AS for the amount which has already been deposited by persons deducting
tax on behalf of the taxpayer. Thereafter, the taxpayer should bring this fact in the
notice of persons deducting tax so that they can act accordingly.
 In case of Tax payments of Advance tax or Self Assessment tax, the PAN used to
submit the tax challan to the bank should be the same as the PAN used to submit
the return. Without a valid PAN the tax payment received from the bank would be
in suspense and cannot be matched with tax payment claim as entered in the return.
 While making the tax payment at the Bank, NO MISTAKE should be made in the
challan while entering the PAN, Name, Major head (20 or 21), Assessment Year,
Type of tax payment {advance tax (code 100), Self Assessment tax (code 300)}, tax
applicable (Income tax other than companies).
 Any tax payment made under code 400 corresponding to ‘Tax on regular Assessment’
cannot be used for matching and accordingly credit cannot be given against advance
tax or self assessment tax claims.
 The Challan Identification Number (CIN) is the combination of BSR code (any bank
branch’s unique 7 digit identification number issued by RBI), date of deposit of
challan (DD-MM-YY), and the running serial number of the challan, and is mentioned
by the Bank while accepting tax payment on its seal. In case this is not clearly legible,
the Bank can be requested to provide correct details. This must be entered correctly
in the return while claiming credit.
 Miscellaneous mistakes:
Mistakes in address etc do not affect processing but cause mis-delivery or non-delivery of
communication or in case of Bank Account Number error cause rejection of refund credit to
taxpayer account. The following points may be noted:
 The name in the return should be entered as it appears in the PAN card.
 Address should be correctly filled with correct city, state and PINCODE for faster and
accurate delivery of communication from the Department.
 For faster credit of Income Tax refunds, correct bank account number and MICR code in
the return should be mentioned. In case of any mistake in MICR or Bank Account number,
the refund will not be credited. and a cancelled cheque showing correct particulars would
be required to be submitted to CPC for correction in bank account number or MICR code.
 Do not Copy/Cut/Paste the data in the utility. It may lead to calculation errors.
 In case of Refunds below Rs 100, no refund is issued and if Demand is below Rs 100, it
need not be paid.
 How to rectify the mistake and to get the correct refund Mistakes in the ITR due to any of
the reasons may be corrected by submitting a rectification form. Some basic information is
provided below:
 The procedure for rectification and correction of mistakes is available in HELP on the

INFORMATION TECHNOLOGY 397


Accounting Package
website.
 In case of any difference in Date of Birth or Gender in the Department records or in case
of any need to correct the data, it may be corrected by submitting a PAN Change Request
Form (quoting the existing PAN) with correct details and providing relevant documents
at any TIN facilitation center.
 In case of any mistake in MICR or Bank Account number , please raise a request after
logging in to e-Filing application under ‘My Account’ --> ‘Refund Re-issue request’.
 In case the charging of additional tax and interest is only because of non- matching of tax
payment or TDS, upon correction of the details by taxpayer or employer / deductor, the
additional tax and interest will be automatically reduced or eliminated.
Impact of Errors made while filing returns
 Returns can be classified as defective u/s 139 (9) and in some scenarios the return can be
declared in valid / Non Est. ITD is not introducing this concept to cover certain types of errors
in order to prevent future grievances.
 Computation Errors - In electronic filing, it has been noticed that most of the errors are due to
data errors as filed by the assessee this includes non filling of key schedules, wrong details etc
resulting in rectification requests etc which delay closure of processing.
 Inability to pay refunds to the assessee.
Rules to be followed to ensure trouble free processing
 Once E filing is done (without digital signature), ITR V needs to be sent in time to CPC. In case
ITR V acknowledgement is not received within reasonable time, the assessee may call up the
CPC call centre to verify status
 Nearly 10% of assessee fail to send the ITR V to CPC after E filing.
 Assessee needs to fill his email address, mobile number correctly to ensure appropriate
communication from the Income Tax Department. The use of the Tax practioner/CA’s email
address may not be appropriate.
 The assessee should make sure the correct (latest) address, bank account number, MICR
number is filled
 The assessee should verify tax credits available in Form 26AS/NSDL websites. Mismatches
are the single largest cause of incorrect tax computation. Non credits may be taken up with
the TDS deductor and/or the banker as soon as they are noticed.

6.5 DOS & DON’T - ITR 1-7


Part A - Personal Information Schedule
 Name: Has to match the PAN database
 Date of Birth: Mistakes here will result in computation of higher taxes in case of senior citizens
 Address: House/Flat no, City, PIN Code, are mandatory fields. Non filling will result in refund
delays

398 INFORMATION TECHNOLOGY


E-Filing Process
 E mail Address: Needs to be filled correctly, is the basis of all communication from CPC. Mistake
will result in non receipt of all intimations from CPC. Use of Auditor/Tax practitioner’s ID
may be avoided.
 Mobile No: Full Mobile No without use of +91 needs to be entered. This is essential for all SMS
based communication.
 Sex: Should match the PAN database. If PAN database is wrong, it results in mistakes in
computation.
 Status : Should be correctly filled
 Residential Status - the status of NOR and NRI should be mentioned only where applicable
as they are not eligible for certain benefits available to resident assessee.
 Aadhar Number if available needs to be filled in the tax form.
Part B - TI
 Salary amount entered in BTI should be same as in TDS Salary and final value in Schedule
salary.
 CYLA or BFLA loss has to be mentioned in the appropriate rows, else loss will not be allowed.
 In STCG many users confuse between STCG under section 111A and STCG others and enter
against one another leading doubling to income from Capital Gains.
 In case of HP loss, BTI value for Income HP should be 0 or null and final value in schedule HP
should be a loss
 It is not enough if just part B TI is filled. Respective schedules also need to be filled for Eg
Schedule HP, Sch Depreciation etc. Else the return can be treated as a defective return u/s 139
(9).
Part B - TTI
 Relief under 89, 90, 91 is to be entered ONLY if applicable. The value entered in schedule TDS,
IT and TCS has to be entered in Part B TTI also. Eg. Schedule IT is entered but in no amount is
mentioned in this section as Advance Tax or SAT.
 The Bank account no. has to given correctly and entered even if no refund is due. This is to
ensure that refund arising from re-computation of income by the ITD can be paid to the assessee.
The A/c no and the name in the bank account has to tally.
 The MICR No. should be in 9 DIGITS and first 3 digits of MICR code denotes the place of
residence as mentioned in address’s PIN Code.
Eg. 560056025- ‘560’ refers to Bangalore whose PIN starts with 560 000. The assessees may
avoid giving bank accounts where MICR starts with ‘0’.
Income Schedules Salary, HP
 Net Salary should be entered and not Gross Salary. This will result in higher taxes
 The Salary value should tally with that entered in Schedule TDS

INFORMATION TECHNOLOGY 399


Accounting Package
 In Schedule HP, the loss from house property has to be entered with all mandatory details of
the property including details as to whether it is let out. Entering only the loss as summary
makes it incomplete
 Co-owners of property should enter only the income pertaining to their share in the property.
Entering the gross rental receipt and thereafter offering this share of income from such rental
will increase total income
Capital Gains
 Deemed Capital Gains arising out of Schedule deprecation should be considered by the assessee
in schedule CG.
 Non filing of full value of consideration or filling only expenditure under various sub categories
of CG leads to incorrect computation of income.
 Filling of only cost of acquisition also leads to incorrect computation.
 The quarterly breakup of capital gains in the CG schedule should be post set off of all losses.
 Filling of accurate quarterly breakup is necessary for computation of interest under 234C.
 Correct section codes should be used depending upon the type of capital gains income in the
SI schedule.
 Exempt LTCG should not be entered in CG schedule as well as in BTI, it has to be mentioned
in Schedule EI
Schedule BP
 PBT should NOT BE included Deprecation value
 Income from speculative business included in PBT should be shown separately in Sl. 2 and Sl.
38 of schedule BP.
 Income offered under other heads other than BP included in P&L should be reduced in Sl. 3
of Schedule BP.
 All disallowances in Part A OI should be considered in Schedule BP.
 Income offered under section 44AF(Deemed Income) if included in PBT should be reduced in
Sl. 4 of Schedule BP.
 Deprecation as entered In P&L should be shown in Sl.11 of Schedule BP alone and not in Sl 22
or 7 or another rows in BP. The schedule DPM, DOA should be mandatorily filled.
 Assessee claiming benefit of rule 7A 7B 7C should mention appropriate code in nature of
business schedule.
 PBT in P&L and PBT shown in sl. No.1 of Schedule BP should be same.
 Specific schedule for ESR, 10A etc should also be filled when a claim is made in schedule B
SCHEDULES DPM, DOA, DCG AND DEP
 All the relevant values to arrive at the deprecation mentioned in Schedule BP is to be filled in
Schedule DPM, DOA.

400 INFORMATION TECHNOLOGY


E-Filing Process
 DCG arising out of deprecation schedules should be accounted for in CG and taxes paid.
 The value of depreciation as per Schedule DEP and value mentioned in Schedule BP should
be the same.
Chapter VI A, MATC
 In case of deductions where separate schedules are also required to be filled, the same should
be FILLED WITHOUT FAIL- Eg. 80G,80IA, 80IB, etc. Deductions will not be allowed If specific
schedules are not filled.
 Entering of only total deductions alone in Schedule VIA total will not be result in wrong
computation of deductions. Section wise (amount claimed for 80C, 80IA, 80G etc) should be
broken up and mentioned in as per the schedule
 To compute and avail MAT credit in MATC, sl. No. 1 to 6 should be filled with relevant details
and the final value should be claimed in sl. No. 7 (Lower value of that in Sl.No. 3 or Sl. NO 6)
should be specifically filled.
Schedule CYLA
 Loss sought to be adjusted should be claimed against a specific income and also under the
loss to be adjusted heading. If lottery income is offered as part of OS income, the value to the
extent of lottery income should be excluded while claiming income from OS in CYLA.
 The respective schedules should also contain loss details for CYLA.
Schedule CFL
 Date of filing of return for relevant year in CFL should be filled.
 Loss details should be entered under respective income sources.
Schedule BFLA
 Specific differentiation in allocating the losses under BFLA should be made and the claim of
adjustment should be made based on the relevant heads
Schedule SI (Special Income) & Schedule EI (Exempt Income)
 The assessee has to verify the nature of special income and enter appropriate Section Code.
 Entering wrong section code can lead to consideration of the incorrectly offered income for
taxation
 The assessee needs to bifurcate incomes taxable at special rate and normal rate and if there is
no provision in respective schedules like CG or OS, he/she has to offer income chargeable at
special rate- they need to be disclosed on in Schedule SI.
 The income exempt from tax shown in P&L or BP or BTI should also be filled in EI and they
should tally
Schedule TDS and TCS
 TDS on salary should be claimed ONLY in schedule TDS Salary (ITR1) or TDS1 (ITR 2-4).
 TDS on Interest should be claimed ONLY in TDS on interest(ITR 1) or TDS2(2-4).
 Claiming of TCS claims in TDS schedules and vice versa will lead to mismatch translating into

INFORMATION TECHNOLOGY 401


Accounting Package
excess demand or lower refund The claim of TDS amount should be made in TDS deducted
as well as TDS Claimed for the year columns in schedule TDS2 and TCS.
 TDS claims should tally with Form 26AS or NSDL database which are accessible very easily.
Schedule IT
 Dates of deposits should be entered in DD/MM/YYYY format and not in any other format
like MM/DD/YYYY format. This will lead to mismatches
 Exact amount paid in the challan should be claimed in return- rounding off to nearest 10 or
100 leads to mismatch.
 Individual payments should be separately claimed. Clubbing of multiple challans or entering
consolidated payment will lead to mismatch.

6.6 SERVICE TAX E-FILING


6.6.1 Introduction
Service tax e-filing is taken care by www.aces.gov.in. After introduction of e-filing of Income Tax
and VAT returns, service tax return filing was also changed to electronic format. Common website
for Central Excise and Service Tax is used. User is required to select the option on the home screen
itself as shown in Fig 6.6.1.

Fig.6.6.1: Common website of Central Excise & Service Tax


About ACES :
 ACES stands for Automation of Central Excise and Service Tax. It is a centralized, web based

402 INFORMATION TECHNOLOGY


E-Filing Process
software application which automates various processes of Central Excise and Service Tax for
Assessees and Department, and gives complete end to end solution. Any Assessee can register
with Department using ACES application, can file tax return, claims & intimations, track its
status and get online messages.
 ACES application has two parts, one is for Central Excise and other for Service Tax. Assessee
has to register separately to use each of them.
 In ACES, the various processes of Central Excise automated are Registration, Returns, Refunds
& Rebate, Claims & Intimations, Provisional Assessments, Exports, Dispute Resolution and
Audit.
 Any person who wishes to transact any business with Central Excise or Service Tax Department
can use ACES.
 ACES can be used for:
— Online registration and amendment of registration details
— Electronic filing of documents such as Returns, Claims, Intimations and permissions
— Online tracking of the status of applications, claims and permissions
— Online facility to view documents like Registration Certificate, Returns, Show Cause
Notice, Order-In-Original etc.
 A user not having PAN number can register with ACES application. PAN is required if Assessee
wants to file a refund claim.
 ACES homepage is an interface for users/ Assesses to access the Central Excise and Service
Tax applications. The website also enables users to make online payment through e-Payment
option, download the Returns offline utilities through Download option. The website also
keeps track on latest updates of the ACES application and gives links to various other sites
under CBEC.
 Learning Management Software abbreviated as LMS is self learning software developed in
flash. The software demonstrates to use various functionalities across ACES application. The
software is accessible through Help section of ACES homepage. You need to have flash player
installed at your computer along with speakers before using the same.
 User has to maintain user id and password for Central Excise and Service Tax application
separately. But same email ID can be used for both the applications.
After clicking on “Service Tax” tab on home screen, user is taken to logon screen as under. Here
existing users are required to enter their login details. A new user has to register first before using
the website as shown in Fig 6.6.2.

INFORMATION TECHNOLOGY 403


Accounting Package

Fig.6.6.2: Login Screen


Registration on ACES website:
Click on “Click here” to go to registration page as shown in Fig 6.6.3.

Fig.6.6.3: Registration page


Registration on ACES site is a two step process, where first step is to register online and second step is
to submit documents with Service Tax Department. After completion of both the steps successfully,
user can login into his/her account on ACES.

404 INFORMATION TECHNOLOGY


E-Filing Process
E-filing Process:
It is similar to e-filing of income tax returns. The brief overview of steps is as under.
Login into your account with correct user ID and password.
Download utility for Form ST-3 in excel by following the path : RET > e Filing > Download e-filing
Utility shown in Fig 6.6.4.

Fig.6.6.4: Download utility for Form ST-3


Unzip the downloaded excel utility and open excel file. Fill the excel file as shown below, in offline
mode shown in Fig 6.6.5.

Fig.6.6.5: Unzip the downloaded excel utility & open excel file
Validate the excel file by validating each sheet individually. After successful validation, one XML
file is generated.
To Upload the XML file, go to RET > e filing > Upload File. Select correct financial year, return
period, return type. Browse for the correct XML file and attach it. Press save to upload the file as
shown in Fig 6.6.6.

INFORMATION TECHNOLOGY 405


Accounting Package

Fig.6.6.6: Upload XML file


After successful uploading of XML file, following screen shall appear as shown in Fig 6.6.7.

Fig.6.6.7: Successful uploading of XML file


Special Points:
 Separate excel utility is to be used for each quarterly return.
 The version of Mircosoft Excel should be Microsoft Excel 2003 or above.
 The downloaded excel utility needs to be unzipped using some unzipping software.
 Enable execution of Macros in excel utility.
406 INFORMATION TECHNOLOGY
E-Filing Process
 Data can be input by user in any of the green cell. Grey cells are locked for editing.
 All fields marked with asterisk (*) are mandatory. User is prevented from going ahead in case
a mandatory field is left blank.
 After uploading the return, user can view the status of e-filed return accessing the menu RET
> e-filing > View XML Status. There are three statuses as under along with its meaning.
  Uploaded – Return was uploaded and is under process. Please view again after some
time.
  Filed – Return is accepted by ACES and it can be viewed by going to RET > View ST-3
Return.
  Saved – Uploaded XML is saved in the system but, the return is still not submitted to the
department. User can submit the return by going to menu RET > Fill ST-3 > Complete
ST-3.
  Rejected – Return could not be processed due to errors. The return needs to be corrected
and to be uploaded again. If your return is rejected, then there will be hyperlink appearing
on the return number on clicking which, user can see the errors.
 As per extant provision, ST-3 return filed can be modified only once, by filing a revised return
within 90 days from the date of filing of original return. In case of filing of revised, confirmation
view will be provided with “Submit” button only.

6.7 COMPANY LAW E-FILING


6.7.1 Introduction
Ministry of Corporate Affairs, Government of India brought up a revolutionary change in
administration of company law matters by making it completely “electronic”. Right from
name approval of a company till closing a company, everything is in electronic format. All the
administrative activities are managed through www.mca.gov.in as shown in Fig. 6.7.1.

Fig.6.7.1: Website of Ministry of Corporate Affairs

INFORMATION TECHNOLOGY 407


Accounting Package
6.7.2 Pre-requisite software for e-filing

For e-Filing on MCA21 your Computer must have the following components installed:

Windows 2000 / Windows XP / Windows Vista / Windows 7

All users using below mentioned services on MCA21 are required to have Windows XP ( SP3 )/
Windows Vista/Windows 7 and JDK 1.6 updated version 30 installed on their machine -
 Any user logging on MCA21 using a DSC
 Any existing user registering/updating a DSC
 Any new user registering using a DSC

Internet Explorer v6.0 and above, Google Chrome, Mozilla Firefox

Adobe Reader from version 9.4 or later

Java Runtime Environment (JRE) 1.6 or updated version 8 update 131

6.7.3 E-Filing Process :


In order to carry out e-filing on MCA21 you have facility to download the eform and fill it in an
offline mode. Every form has the facility to pre-fill the data available in MCA21 system. Once the
e-form is filled you would need to validate the e-form using Pre-scrutiny button. You would then
have to affix the relevant digital signatures and save the form. You would need to be connected to the
internet to carry out the pre-fill and pre-scrutiny functions. The step by step process is given below.
The filled up e-form as per relevant instruction kit needs to be uploaded on the MCA21 portal. On
successful upload, the Service request number would be generated and you would be directed to
make payment of the statutory fees. The step by step process is given below. Once the payment has
been made the status of your payment and filing status can be tracked on the MCA21 portal by using
the ‘Track Your Payment Status’ and ‘Track Your Transaction Status’ link respectively.
Please follow the steps given below to proceed to do eFiling:
1. Select a category to download an eForm from the MCA 21portal (with or without the instruction
kit)
2. At any time, you can read the related instruction kit to familiarize yourself with the procedures
(you can download the instruction kit with eform or view it under Help menu).
3. You have to fill the downloaded eForm.
4. You have to attach the necessary documents as attachments (in PDF form only).

408 INFORMATION TECHNOLOGY


E-Filing Process
5. You can use the Prefill button in eForm to populate the grayed out portion by connecting to
the Internet.
6. The applicant or a representative of the applicant needs to sign the document using a digital
signature. Digital Signature should have been registered on MCA21 under one of the categories
namely Director, Manager/Secretary or Practicing Professional.
7. You need to click the Check Form button available in the eForm. System will check the
mandatory fields, mandatory attachment(s) and digital signature(s).
8. You need to upload the eForm for pre-scrutiny. The pre-scrutiny service is available under
the Services tab or under the eForms tab by clicking the Upload eForm button. The system
will verify (pre-scrutinize) the documents. In case of any inadequacies, the user will be asked
to rectify the mistakes before getting the document ready for execution (signature). In certain
forms such as Annual Filing forms namely Form 23AC, 23ACA, 20B and 66 pre-scrutiny is to
be done in the form itself by clicking the tab given at the end of the respective form.
9. The system will calculate the fee, including late payment fees based on the due date of filing,
if applicable.
10. Payments will have to be made through appropriate mechanisms - electronic (credit card,
Internet banking, NEFT) or traditional means (at the bank counter through challan). Payments
up to Rs. 50,000 are compulsorily required to be made through online mode. Recently PAY
LATER facility has also been added whereby forms can be uploaded under this facility and
payments can be made at a later date but before the expiry date mentioned on the Pay Later
Challan generated by the system.
(a) Electronic payments can be made at the Virtual Front Office (VFO) or at PFO
(b) If the user selects the traditional payment option, the system will generate challan in
the prescribed format. Traditional payments through cash, cheques can be done at the
designated network of banks using the system generated challan. There will be five banks
with estimated 200 branches authorized for accepting challan payments.
11. The payment will be exclusively confirmed for all online (Internet) payment transactions using
payment gateways.
12. Acceptance or rejection of any transaction will be explicitly communicated to the applicant
(including facility to print a receipt for successful transactions).
13. MCA21 will provide a unique transaction number, the Service Request Number (SRN) which
can be used by the applicant for enquiring the status pertaining to that transaction.
14. Filing will be complete only when the necessary payments are made.
15. In case of a rejection, helpful remedial tips will be provided to the applicant.
16. The applicants will be provided an acknowledgement through e-mail or alternatively they
can check the MCA portal.
Filing paper attachments with the E-form :
 You have to first get the paper attachments scanned and saved as a soft copy in PDF format.
Then attach the same in the attachment section of the eForm by clicking the appropriate ‘Attach’
button.

INFORMATION TECHNOLOGY 409


Accounting Package
 You can upload / submit the scanned documents by attaching the same with the e-form and
submitting on the MCA Portal.
 It is important to ensure that the size of scanned PDF document is within the permissible size
limits, it is recommended that scanning should be done in ‘black & white’ mode at 200 dpi
resolution and should not exceed 2.5 MB (including size of the form).
Signing an e-form & Payment of fees :
 An e-form can be signed by the authorized signatory/ representative using the Digital Signature
Certificate (DSC). Click the red colour signature box in the e-form to affix the digital signature.
To avoid increase in size of the e-form beyond permissible limit of 2.5 MB, always affix the
DSC using the ‘Sign and Save As’ option.
 Payments can be made electronically through credit card/Debit Cards or Internet Banking.
During the e-filing process, the system will prompt you to make payment. You can choose the
mode of payment and make the payment accordingly.
 If you are not having a credit card or Internet banking facility, you can make payment at the
counter of an authorized bank through the pre-filled challan generated by the system after
e-filing
 Payments of value above Rs. 50,000, stakeholders would have the option either to make the
payment in electronic mode, or paper challan. However such payments would also be made
in electronic mode w.e.f .1st October’2011.)
 For the purpose of collection of payments numerous branches in all major cities and towns of
the following five Banks have been authorized:
  State Bank of India
  Punjab National Bank
  Indian Bank
  ICICI Bank
  HDFC Bank
Details of the branches of the above banks offering this facility are given on ‘List of Authorized
Banks’ link on the MCA21 portal.
 On Successful e-filing and payment you can view the status of your transaction using the
“Track your transaction status” link and you would be required to enter the SRN no. Once the
form has been approved by the concerned official of the Ministry, you will receive an email
regarding the same and the status of the form will get changed to Approved. In case the status
is other than approved , you would need to take the necessary action as detailed below:
Status of SRN:
 Status - Required Resubmission
In this case you are required to re-submit your eForm to rectify the defect(s)/ incompleteness
pointed out by the concerned MCA office, before the due date mentioned in the status of your
SRN. If you fail to re-submit your eForm within prescribed period, you will be required to file
the eForm afresh with payment of fee and additional fee, as applicable.

410 INFORMATION TECHNOLOGY


E-Filing Process
 Status - Waiting For User Clarification
In this case you are required to file eForm 67 (Addendum), to rectify the defects pointed out
or furnish further information/ document(s) called for by the concerned MCA office. As per
revised regulation 17, if you fail to furnish requisite information/ document within prescribed
period, you will be required to file the eForm afresh with payment of fee and additional fee,
as applicable.
 Status - Defective
In case of STP forms, for example annual forms MGT-7, & AOC-4 etc, if there is any defect or
incompleteness, same is marked by the RoC as ‘Defective’. You are required to file such form
afresh after rectifying the defects/ incompleteness with payment of fee and additional fee, as
applicable.
 Status - Invalid and NBTR
In such cases where an eForm has not been re-submitted or the requisite information/
document(s) has not been provided through eForm 67 (Addendum) within prescribed period,
the status of SRN is marked as ‘Invalid and Not been taken on record (Invalid and NBTR)’ and
in case of an application as ‘Invalid and Transaction cancelled’. You are required to file such
form afresh with payment of fee and additional fee, as applicable.
 Status - Pending for approval under regulation 17(6)
It means that the eForm is pending for the want of requisite approval from Central Government,
Regional Director, Company Law Board or any other competent authority.
Viewing public documents on the MCA portal
 To avail the same you can register yourself on the MCA portal and click on the ‘View Public
Documents’ link to view the documents of the specific companies available for viewing to public
pertaining to specific company(s). Once you select the company(s), you will be prompted to
make the payment of Rs. 100/- per company. On receipt of the payment, the system will allow
you to view the documents pertaining to the selected company from the ‘My Documents’ link
after logging on to the portal. You will be able to view the documents for a period of three
hours from the time you start viewing. Documents such as balance sheets, annual returns for
the preceding two years and permanent documents like MoA and AoA are available in the
digital form for the companies falling under ROC going live on the MCA portal.
 User can get certified copies of the public documents by using the Get Certified Copies service.
Once you make the necessary payment, your request will be routed to the concerned person.
Handling of ERRORS
Various types of errors may be committed while availing different services on MCA portal. Different
types of errors, its impact and its remedy is as under.
 Payment of challan not done before the expiry date: If payment of challan is not made before
the expiry date, the transaction gets cancelled and applicant needs to file the eForm again on
MCA portal to generate a fresh challan for payment.
 Payment of fees (via challan) through other option: Once a challan is generated, its payment
has to be made in an auhorised bank branch. Payment against eFiling should not be made

INFORMATION TECHNOLOGY 411


Accounting Package
using any mode of payment on MCA portal e.g. Miscellaneous Fee option, as in such a case
the payment made does not get linked with the original Filing Transaction / SRN.
 Duplicate Payment : Always check the payment status of original / previous SRN before
trying to make payment again for the same transaction. If the payment status is ‘Paid’ do not
pay again.
 Verification of status of eFiling: The SRN No. is the key for verification of status of eFiling. Please
note down the SRN generated by the system before making the payment / for the purpose of
checking the payment / transaction status.
 Inspection of public documents: On confirmation of payment, a link is made available under
‘My documents’ tab to view the documents online. This link will be valid for seven days – you
can view these documents anytime within 7 days of appearing those under ‘My Documents’.
However, online viewing is provided for continuous three hours maximum, once you begin
this activity.
 eForm version used is not latest: Always download a fresh eForm for eFiling from the MCA
portal.
 Modify or Sign the eForm numerous times which increases the size of the eform: While signing
the eform click on ‘Sign and save as’ option to affix the DSC to keep the size of the eForm
minimum.
 Uploading eForm in case of “Required Resubmission” : If the transaction status is “Required
Resubmission”, the eForm needs to be filled again correctly and filed against the original SRN.
Do not use ‘Addendum’ option as transaction through ‘addendum’ will not be processed
against ‘Resubmission’. ‘Addendum’ facility is used for providing additional information, if
any, to RoC.
 Mistaking the status “Required Resubmission” as rejection of the eform and take no action.
If the status of SRN is “Required Resubmission“ then file the eForm again by giving SRN of
original filing and uploading eForm by clicking ‘Resubmit’ button, under ‘eForm upload’ link.
After re-submission the status of SRN will change and eForm will be available for processing
at RoC office.
 Wrong particulars in eForms – ensure accuracy while filling following values in the
corresponding eForm:
Form INC1
Amount of authorized capital ( eg.10 Lacs instead of 1 Lac)
Company type, should be either Private or Public
State under the jurisdiction of same RoC (eg. Jharkhand instead of Bihar)
Common reasons for rejection of a Company Name
Form INC1
Company type (e.g. “Part IX Company” or “Producer Company” in place of “New Company”
or vice-versa)
Company category / sub-category (e.g. “SGC” or “GOI”).
Form CHG-1
Date of charge creation / modification
Original / Final amount while creation / modification of charge
412 INFORMATION TECHNOLOGY
E-Filing Process
Form MGT-14
Type of resolution (Board / Shareholders / Ordinary / Special resolution type) selection differs
from the attachment
Form SH-7
Wrong amount of revised capital
Simultaneous filing of multiple eForm 5 for a company before approval of erstwhile form 5
filed. Wait for first eForm’s approval before proceeding with next eForm 5.
Please check the particulars filled in the eform before filing. Once an eform is approved, any
wrong information given in the eform cannot be rectified.
Update JAVA / Adobe software.
Use only prescribed versions of JAVA / Adobe software, as listed on the portal.
Annual E-filing:
As a part of Annual eFiling, Companies incorporated under the Companies Act, 2013 are required
to e-file the following documents with the Registrar of Companies (RoC):

Sr. No. Document e-Form


1 Financial Statements Form AOC-4 to be filed by all Companies*
2 Annual Return Form MGT-7 to be filed by all Companies l
Table 6.7.1 List of documents with RoC
* If the file size of Form AOC exceeds 5MB, please use Additional Attachment Sheet. Please
follow the step-by-step process as given below, for uploading the Additional Attachment
Sheet.
Step by Step Process for Additional Attachments to form AOC-4:
1. If the size of Form AOC-4 exceeds 5 MB, remove some attachments or split and attach only a
small part of the attachment to limit the Form size to 5 MB. You can upload the remaining/
other parts of attachments separately using ‘Additional Attachment Sheet’ as below.
2. Download the ‘Additional Attachment Sheet’ from ‘Annual Filing Corner’ link on the
homepage of MCA portal.
3. Enter the CIN and click ‘Pre-fill’ button to automatically fill the name and address of the
Company in the eForm.
4. Fill the date of relevant Balance Sheet.
5. Select the type of document from the dropdown list and click ‘Attach’ button to ‘browse and
select’ the file to be attached. You have the option to attach maximum 5 documents.
6. Fill the signatory details i.e. Designation and DIN/ Membership No.
7. Affix the Digital Signature Certificate of the signatory
8. Click ‘Verify’ button. In case of any error, rectify the same and repeat this step.
9. Close the Form and save it again on prompting by the system. Please ensure that size of
‘Additional Attachment Sheet’ does not exceed 2.5 MB.

INFORMATION TECHNOLOGY 413


Accounting Package
10. If you wish to attach more attachments, please download a fresh Form and repeat the above
steps. You have the option to upload maximum two ‘Additional Attachment Sheet’ against
one Form AOC-4.
11. After uploading of Form AOC-4 on MCA portal, system will prompt for SRN Number with
following options:
1. Pay Later
2. Pay Now
12. Proceed to ‘payment option’ screen.
Important Points to Remember
 The Balance Sheet, Profit & Loss Account and Annual Return are filed as attachments to the
respective e-Forms. A scanned copy considerably increases the size of the document besides
being more expensive. You are therefore, advised to convert the Text file/ Excel sheets by using
the PDF converter software (PDF conversion facility is also available on the MCA portal for
business users) and upload these attachments as PDF documents.
 The MCA database in respect of Authorised Capital and Paid-up Capital needs to be verified by
the respective Companies, as it may not be correct. The Companies are requested to apply for
correction of Master Data, should they find any discrepancies. In the meantime, the Companies
can declare the correct amount of Authorised Capital and Paid-up Capital in the respective
annual filing Forms.
 The Company representative can upload the e-Forms on the MCA portal through the ‘Annual
Filing Corner’ link (after registering oneself as a user of the portal) at his convenience from his
office/ home. This is the most convenient way of e-Filing.
 The Company representative can prepare the e-Forms as per guidelines, get them digitally
signed by the authorized signatory, copy them in a CD or a pen drive and visit the nearest
“Registrar’s Front Office” (RFO). RFO staff will assist in uploading of eForms on MCA portal.
For addresses/ phone numbers of RFOs, please refer to the “Facilitation Centre” link on the
homepage of MCA portal.
 The Company representative can also contact any of the Certified Filing Centers (CFCs) for
the Annual Filing of e-Forms by paying the service charges to the CFCs. The details about the
CFCs are available under the ‘Certified Filing Centre’ tab on the homepage of MCA Portal.
Downloading of Forms
Two types of forms are available for download as under
(a) Company Forms
(i) Approval Services – Headquarters
(ii) Approval Services – Regional Director
(iii) Approval Services – Registrar of Companies
(iv) Change Services
(v) Charge Management
(vi) DIN Forms
(vii) Company Registration

414 INFORMATION TECHNOLOGY


E-Filing Process
(viii) Compliance Related Filing
(ix) Informational Services
(x) Investor Services
(xi) Provisions related to managerial personnel
(xii) Annual Filing e-forms
(b) LLP Forms
Approval Services (Headquarters) as shown in Table 6.7.2

Sr. Description e-Form

1 Form of intimation of appointment of cost auditor by the company to Form CRA-2


Central Government.
2 Form for filing application or documents with Central Government Form CG-1
Table 6.7.2 List of e-Form of Company Forms

Approval Services (Regional Director)


Sr. Description e-Form
1 Application for confirmation by Regional Director for change of registered
office of the company within the state from the juridiction of one Registrar Form 1AD
to the juridiction of another Registrar
2 Form for filing application to Regional Director Form 24A
Table 6.7.3 Approval Services (Regional Director)
Approval Services (Regional Director)

Description e-Form
1 Application for removal of auditor(s) from his/their office before expiry Form ADT-2
of term
2 Application to Regional director for conversion of section 8 company into Form INC-18
company of any other kind
3 Application to Regional Director for approval to shift the Registered Office Form INC-23
from one state to another state or from jurisdiction of one Registrar to
another Registrar within the same State
4 Memorandum of Appeal Form ADJ
5 Applications made to Regional Director Form RD-1
6 Application to Central Government for extension of time for filing Form CHG-8
particulars of registration of creation / modification / satisfaction of charge
OR for rectification of omission or misstatement of any particular in respect
of creation/ modification/ satisfaction of charge
Table 6.7.4

INFORMATION TECHNOLOGY 415


Accounting Package
Approval Services (Registrar of Companies)

Description e-Form
1 Application by company to ROC for removing its name from register of Form STK-2
Companies
2 One Person Company- Application for Conversion Form INC-6
3 Application for approval of Central Government for change of name Form INC-24
4 Application to Registrar for obtaining the status of dormant company Form MSC-1
5 Application for seeking status of active company Form MSC-4
6 Applications made to Registrar of Companies Form GNL-1
7 Application for grant of License under section 8 Form INC-12
8 Application for striking off the name of company under the Fast Track Form FTE
Exit(FTE) Mode
Table 6.7.5 Approval Services (Registrar of Companies)
Change Services

Sr. Description e-Form


1 Application for reservation of name Form INC-1
2 One Person Company- Nominee consent form Form INC-3
3 One Person Company- Change in Member/Nominee Form INC-4
4 Notice of situation or change of situation of registered office Form INC-22
5 Conversion of public company into private company or private company Form INC-27
into public company
6 Notice to Registrar of any alteration of share capital Form SH-7
7 Particulars of appointment of Directors and the key managerial personnel Form DIR-12
and the changes among them
8 Return of alteration in the documents filed for registration by foreign Form FC-2
company
9 Annual accounts along with the list of all principal places of business in Form FC-3
India established by foreign company
Table 6.7.6 Change Services
Charge Management

Sr. Description e-Form


1 Application for registration of creation, modification of charge (other Form CHG-1
than those related to debentures)

416 INFORMATION TECHNOLOGY


E-Filing Process

2 Particulars for satisfaction of charge thereof Form CHG-4


3 Notice of appointment or cessation of receiver or manager Form CHG-6
4 Application for registration of creation or modification of charge for Form CHG-9
debentures or rectification of particulars filed in respect of creation or
modification of charge for debentures
5 Details of persons/directors/charged/specified Form GNL-3
Table 6.7.7 Charge Management
DIN Forms

Sr. Description e-Form


1 Application for allotment of Director Identification Number Form DIR-3
2 Application for surrender of Director Identification Number Form DIR-5
3 Intimation of change in particulars of Director to be given to the Central Form DIR-6
Government
4 A Report by a company to ROC for intimating the disqualification of Form DIR-9
the director

Table 6.7.8 DIN Forms


Incorporation services

Description e-Form
1 New Version - Simplified Proforma for Incorporating Company SPICe
Electronically (SPICe) - with mandatory PAN & TAN application
included.
2 eMemorandum of Association (SPICe MoA) SPICe MoA
3 eArticles of Association (SPICe AoA) SPICe AoA
4 Application for reservation of name Form INC-1
5 One Person Company- Nominee consent form Form INC-3
6 Notice of situation or change of situation of registered office Form INC-22
7 Particulars of appointment of Directors and the key managerial personnel Form DIR-12
and the changes among them
8 Application by a company for registration under section 366 Form URC-1
9 Information to be filed by foreign company Form FC-1
10 Application for Incorporation of Company (Part I Company and Form INC-7
Company with more than Seven Subscribers)
Table 6.7.9 Incorporation services

INFORMATION TECHNOLOGY 417


Accounting Package
Compliance Related Filing

Sr. Description e-Form


1 Form for filing Cost Audit Report with the Central Government. Form CRA-4
2 Return of deposits Form DPT-3
3 Information to the Registrar by Company for appointment of Auditor Form ADT-1
4 Notice of Resignation by the Auditor Form ADT-3
5 Statement regarding deposits existing on the commencement of the Act Form DPT-4
6 One Person Company- Intimation of exceeding threshold Form INC-5
7 Return of allotment Form PAS-3
8 Letter of offer Form SH-8
9 Declaration of Solvency Form SH-9
10 Return in respect of buy-back of securities Form SH-11
11 Filing of Resolutions and agreements to the Registrar Form MGT-14
12 Notice of resignation of a director to the Registrar Form DIR-11
13 Form for submission of documents with the Registrar. Form GNL-2
14 Annual Return of a Foreign company Form FC-4
15 Return of dormant companies Form MSC-3
16 Persons not holding beneficial interest in shares Form MGT-6
Table 6.7.10 Compliance Related Filing
Informational Services

Description e-Form
1 Notice of situation or change of situation or discontinuation of situation,of Form MGT-3
place where foreign register shall be kept
2 Form for filing Report on Annual General Meeting Form MGT-15
3 Notice of address at which books of account are maintained Form AOC-5
4 Changes in shareholding position of promoters and top ten shareholders Form MGT-10
5 Intimation to Registrar of revocation/surrender of license issued under Form INC-20
section 8
6 Notice of Order of the Court or any other competent authority Form INC-28
Table 6.7.11 Informational Services

418 INFORMATION TECHNOLOGY


E-Filing Process
Investor Services

Sr. Description e-Form


1 INVESTOR COMPLAINT FORM Form ICP
2 SERIOUS COMPLAINT FORM Form SCP
Table 6.7.12 Investor Services
Provisions related to Managerial personnel

Sr. Description e-Form


1 Form of application to the Central Government for approval of Form MR-2
appointment or reappointment and remuneration or increase in
remuneration or waiver for excess or over payment to managing director
or whole time director or manager and commission or remuneration to
directors
2 Return of appointment of MD/WTD/Manager Form MR-1
Table 6.7.12 Provisions related to Managerial personnel
Annual filing e-Forms

Description e-Form
1 Form for filing XBRL document in respect of financial statement and other F o r m A O C - 4
documents with the Registrar (XBRL)
2 Form for filing annual return by a company. Form MGT-7
3 Form for filing financial statement and other documents with the Registrar Form AOC-4
4 Form for filing consolidated financial statements and other documents F o r m A O C - 4
with the Registrar (CFS)
Table 6.7.13 Annual filing e-Forms
Addendum Form

Sr. Description e-Form


1 Addendum for rectification of defects or incompleteness. Form GNL-4
Table 6.7.14 Addendum Form
Refund Form

Sr. Description e-Form


1 Application for requesting refund of fees paid. Form Refund
Table 6.7.15 Refund Form

INFORMATION TECHNOLOGY 419


Accounting Package
1956 Act Cost Audit forms

Sr. Description e-Form


1 Form of application to the Central Government for appointment of cost Form 23C
auditor.
2 Form for filing XBRL document in respect of cost audit report and other Form I-XBRL
documents with the Central Government
3 Form for filing XBRL document in respect of compliance report and other
documents with the Central Government Form A-XBRL
4 Information by cost auditor to Central Government Form 23D
Table 6.7.16 1956 Act Cost Audit forms
Companies Act, 1956 related
Sr. Description e-Form
1 Form for filing XBRL document in respect of balance sheet and other Form-23AC
documents with the Registrar.
2 Form for filing XBRL document in respect of Profit and Loss account and Form-23ACA
other documents with the Registrar.
3 Filing annual return by a company having a share capital with the Form-20B
Registrar.
4 Particulars of annual return for the company not having share capital Form-21A
5 Filing balance sheet and other documents with the Registrar 2.(a) Form-23AC
6 Filing Profit and Loss account and other documents with the Registrar Form-23ACA
7 Information by auditor to Registrar Form-23B
8 Form for submission of compliance certificate with the Registrar Form-66
Table 6.7.17 Companies Act, 1956 related
Attachments
Sr. Description Attachment
1 A Report by a company to ROC for intimating the disqualification of Form DIR-9
the director
2 Form of application for removal of disqualification of directors Form DIR-10
3 Circular or circular in the form of advertisement inviting deposits Form DPT-1
4 Return of Statutory Compliances Form NDH-1
5 Application for extension of Time Form NDH-2
6 Half Yearly Return Form NDH-3
7 Information Memorandum Form PAS-2
8 Private Placement Offer Letter Form PAS-4
Table 6.7.18 Attachments
420 INFORMATION TECHNOLOGY
E-Filing Process
Limited Liability Partnership Forms

Sr. Description e-Form


No.
1 Application for reservation or change of name Form 1
2 Incorporation document and subscriber’s statement Form 2
3 Details in respect of designated partners and partners of Limited
Form 2A
Liability Partnership
4 Information with regard to limited liability partnership agreement and
Form 3
changes, if any, made therein
5 Notice of appointment, cessation, change in name/ address/
designation of a designated partner or partner. and consentto become a Form 4
partner/designated partner
6 Notice of appointment, cessation, change in particulars of a partners Form 4A
7 Notice for change of name Form 5
8 Statement of Account & Solvency Form 8
9 Annual Return of Limited Liability Partnership (LLP) Form 11
10 Form for intimating other address for service of documents Form 12
11 Notice for change of place of registered office Form 15
12 Application and statement for conversion of a firm into Limited
Form 17
Liability Partnership (LLP)
13 Application and Statement for conversion of a private company/
Form 18
unlisted public company into limited liability partnership (LLP)
14 Notice of intimation of Order of Court/ Tribunal/CLB/ Central
Form 22
Government to the Registrar
15 Application for direction to Limited Liability Partnership (LLP) to
Form 23
change its name to the Registrar
16 Application to the Registrar for striking off name Form 24
17 Application for reservation/ renewal of name by a Foreign Limited
Form 25
Liability Partnership (FLLP) or Foreign Company
18 Form for registration of particulars by Foreign Limited Liability
Form 27
Partnership (FLLP)
19 Return of alteration in the incorporation document or other instrument
constituting or defining the constitution; or the registered or principal
Form 28
office; or the partner or designated partner of limited liability
partnership incorporated or registered outside India.

INFORMATION TECHNOLOGY 421


Accounting Package

20 Notice of (A) alteration in the certificate of incorporation or registration;


(B) alteration in names and addresses of any of the persons authorised
to accept service on behalf of a foreign limited liability partnership Form 29
(FLLP) (C) alteration in the principal place of business in India of FLLP
(D) cessation to have a place of business in India
21 Application for compounding of an offence under the Act Form 31
22 Form for filing addendum for rectification of defects or incompleteness Form 32
Table 6.7.19 Limited Liability Partnership Forms
Firm Conversion Form

Sr. Description Form


1 Form for intimating to Registrar of Firms about conversion of the firm Form 14
into limited liability partnership (LLP). (To be filled in physical form and
submitted to Registrar of Firms)
Table 6.7.20 Firm Conversion Form
DIN Forms

Sr. Description e-Form


1 Application for allotment of Director Identification Number Form DIN 1
2 Intimation of change in particulars of Director to be given to the Central
Form DIN 4
Government
Table 6.7.21 DIN Forms

6.8 XBRL E-FILING


6.8.1 about XBRL
XBRL is a data-rich dialect of XML (Extensible Markup Language), the universally preferred
language for transmitting information via the Internet. It was developed specifically to communicate
information between businesses and other users of financial information, such as analysts, investors
and regulators. XBRL provides a common, electronic format for business reporting. It does not
change what is being reported. It only changes how it is reported
XBRL is a world-wide standard, developed by an international, non-profit-making consortium,
XBRL International Inc. (XII). XII is made up of many hundred members, including government
agencies, accounting firms, software companies, large and small corporations, academics and
business reporting experts. XII has agreed the basic specifications which define how XBRL works.
6.8.2 XBRL tags
In XBRL, information is not treated as a static block of text or set of numbers.
Instead, information is broken down into unique items of data (eg total liabilities = 100). These data
items are then assigned mark-up tags that make them computer-readable. For example, the tag
<Liabilities>100</Liabilities> enables a computer to understand that the item is liabilities, and it
has a value of 100.
422 INFORMATION TECHNOLOGY
E-Filing Process
Computers can treat information that has been tagged using XBRL ‘intelligently’; they can recognize,
process, store, exchange and analyse it automatically using software.
Because XBRL tags are formed in a universally-accepted way, they can be read and processed by
any computer that has XBRL software. XBRL tags are defined and organized using categorization
schemes called taxonomies.
6.8.3 XBRL taxonomies
Different countries use different accounting standards. Reporting under each standard reflects
differing definitions. The XBRL language uses different dictionaries, known as ‘taxonomies’, to
define the specific tags used for each standard. Different dictionaries may be defined for different
purposes and types of reporting. Taxonomies are the computer-readable ‘dictionaries’ of XBRL.
Taxonomies provide definitions for XBRL tags, they provide information about the tags, and they
organize the tags so that they have a meaningful structure.
As a result, taxonomies enable computers with XBRL software to:
 understand what the tag is (eg whether it is a monetary item, a percentage or text);
 what characteristics the tag has (eg if it has a negative value);
 its relationship to other items (eg if it is part of a calculation).
This additional information is called meta-data. When information that has been tagged with XBRL
is transmitted, the meta-data contained within the tags is also transmitted.
Taxonomies differ according to reporting purposes, the type of information being reported and
reporting presentation requirements. Consequently, a company may use one taxonomy when
reporting to a stock exchange, but use a different taxonomy when reporting to a securities regulator.
Taxonomies are available for most of the major national accounting standards around the world.
6.8.4 Working of XBRL
XBRL is a member of the family of languages based on XML, or Extensible Markup Language,
which is a standard for the electronic exchange of data between businesses and on the internet.
Under XML, identifying tags are applied to items of data so that they can be processed efficiently
by computer software.
XBRL is a powerful and flexible version of XML which has been defined specifically to meet the
requirements of business and financial information. It enables unique identifying tags to be applied
to items of financial data, such as ‘net profit’. However, these are more than simple identifiers. They
provide a range of information about the item, such as whether it is a monetary item, percentage or
fraction. XBRL allows labels in any language to be applied to items, as well as accounting references
or other subsidiary information.
XBRL can show how items are related to one another. It can thus represent how they are calculated.
It can also identify whether they fall into particular groupings for organisational or presentational
purposes. Most importantly, XBRL is easily extensible, so companies and other organisations can
adapt it to meet a variety of special requirements.
The rich and powerful structure of XBRL allows very efficient handling of business data by computer
software. It supports all the standard tasks involved in compiling, storing and using business data.
Such information can be converted into XBRL by suitable mapping processes or generated in XBRL

INFORMATION TECHNOLOGY 423


Accounting Package
by software. It can then be searched, selected, exchanged or analysed by computer, or published
for ordinary viewing.
XBRL offers major benefits at all stages of business reporting and analysis. The benefits are seen in
automation, cost saving, faster, more reliable and more accurate handling of data, improved analysis
and in better quality of information and decision-making. All types of organisations can use XBRL to
save costs and improve efficiency in handling business and financial information. Because XBRL is
extensible and flexible, it can be adapted to a wide variety of different requirements. All participants
in the financial information supply chain can benefit, whether they are preparers, transmitters or
users of business data.
XBRL enables producers and consumers of financial data to switch resources away from costly
manual processes, typically involving time-consuming comparison, assembly and re-entry of data.
They are able to concentrate effort on analysis, aided by software which can validate and manipulate
XBRL information.
6.8.5 Data Collection and Reporting
By using XBRL, companies and other producers of financial data and business reports can automate
the processes of data collection. For example, data from different company divisions with different
accounting systems can be assembled quickly, cheaply and efficiently if the sources of information
have been upgraded to using XBRL. Once data is gathered in XBRL, different types of reports using
varying subsets of the data can be produced with minimum effort. A company finance division, for
example, could quickly and reliably generate internal management reports, financial statements
for publication, tax and other regulatory filings, as well as credit reports for lenders. Not only can
data handling be automated, removing time-consuming, error-prone processes, but the data can
be checked by software for accuracy.
6.8.6 Data Consumption and Analysis
Users of data which is received electronically in XBRL can automate its handling, cutting out time-
consuming and costly collation and re-entry of information. Software can also immediately validate
the data, highlighting errors and gaps which can immediately be addressed. It can also help in
analysing, selecting, and processing the data for re-use. Human effort can switch to higher, more
value-added aspects of analysis, review, reporting and decision-making. In this way, investment
analysts can save effort, greatly simplify the selection and comparison of data, and deepen their
company analysis. Lenders can save costs and speed up their dealings with borrowers. Regulators
and government departments can assemble, validate and review data much more efficiently and
usefully than they have hitherto been able to do.
6.8.7 Steps for e-filing of financial statements in XBRL format on MCA portal :
1. Creation of XBRL instance document :
This is the first step in e-filing financial statements in XBRL format on MCA portal. To begin with,
user has to map company’s each financial statement element to a corresponding element in published
taxonomy.
Companies have the option to create their own XBRL documents in house or to engage a third
party to convert their financial statements into XBRL form.The first step in creation of an instance
document is to do tagging of the XBRL taxonomy elements with the various accounting heads in

424 INFORMATION TECHNOLOGY


E-Filing Process
the books of accounts of the company. This would create the mapping of the taxonomy elements
with the accounting heads so that the accounting information can be converted into XBRL form.
Mapping is the process of comparing the concepts in the financial statements to the elements in the
published taxonomy, assigning a taxonomy element to each accounting concept published by the
company. Selecting the appropriate elements for some financial statement elements may require a
significant amount of judgment. For that reason those in the company who are most familiar with
the financial statements should be associated with mapping of accounting concepts to taxonomy
elements.
The mapping should be reviewed before proceeding further as the complete reporting would be
dependent on the mapping.
In case any information is present in the financial statements for which corresponding tag/element is
not available in the taxonomy, then the same needs to be captured in the next-best-fit element in the
taxonomy or should be included under the corresponding ‘Others’ element. This should be followed
only in case the relevant tag is not available in the taxonomy. It should not to be used generally.
Further, it is imperative to include footnote w.r.t. the same while preparing the instance document.
For tagging or capturing the information which is often included in brackets in the labels in the
company’s financial statements, can either be captured as footnote or if detailed tags are available,
the same should be tagged with the detailed tags in the taxonomy. The complete information as
contained in the annual accounts and related documents; and the information required to be filed
with the Registrar of Companies should be reported in the XBRL instance documents to be submitted
with MCA. For preparing instance document, the taxonomy as applicable for the relevant financial
year is to be used.
Once the tagging of financial statement accounting elements with the published taxonomy elements
is done, the next step is to create the instance document. An instance document is a XML file that
contains business reporting information and represents a collection of financial facts and report-
specific information using tags from the XBRL taxonomy. It is to be noted that no extensions to the
core Taxonomy will be allowed. Separate instance documents need to be created for the following:
(a) Stand Alone Balance sheet of the company
(b) Stand Alone Profit and Loss Account of the company
(c) Consolidated Balance sheet of the company
(d) Consolidated Profit and Loss Account of the company
The instance document should contain the financial information for both the current as well as the
previous financial year. Consolidated balance sheet and Profit and Loss instance documents to be
created only in case the same is applicable to the company. Once the instance document has been
prepared, it needs to be ensured that the instance document is a valid instance document and all the
information has been correctly captured in the instance document. MCA Validation Tool provides
for ‘human readable’ pdf printable form as well as a view of the instance document.
2. Download XBRL validation tool :
A Validation Tool has been provided on the MCA XBRL portal for validating the generated XBRL
instance document. Validating the instance document is a pre requisite before filing the balance
sheet and profit & loss account on MCA portal. You are required to download the tool from the

INFORMATION TECHNOLOGY 425


Accounting Package
portal and validate the instance document before uploading the same. The MCA XBRL validation
tool can be downloaded from the XBRL website of the Ministry (www.mca.gov.in/XBRL). This
Validation Tool shall be used for all MCA XBRL filings i.e. Financial Statement FY 2010-11 (based
on previous Schedule VI) and FY 2011-12 (based on new Schedule VI) as well as Cost Audit and
Compliance Report (which shall be enabled later in the tool). Before Validating an Instance document,
the applicable taxonomy is to be selected by the user from the drop down option “taxonomy”.
In case the user is under LAN network, then he/she is required to click the link ‘Proxy Settings’
under ‘Taxonomy’ menu in the tool to enter the Proxy Host and Port along with user name and
password. This is to setup the Internet connection, required to download the taxonomy through
the XBRL Validation Tool.
3. Load the instance document :
To load the instance document, you need to click the open button, select the instance document and
open it. You need not exit the tool to load another instance document just click on ‘open’ again in
the menu bar to open the next document.
The detail of the company is available under the General Information tag in the XBRL viewer.
4. Validate the instance document :
The next step is to validate the instance document. The following validations shall be performed
by the tool-
 Validating that the instance document is as per the latest and correct version of taxonomy
prescribed by MCA
 All mandatory elements have been entered
 Business Rules as specified by MCA
 Validations relating to XBRL technical Specifications as per taxonomy
5. Pre-scrutiny of the instance document :
Once the instance document is successfully validated from the tool, the next step is to pre-scrutinise
the validated instance document with the help of the same tool. For pre-scrutinizing the instance
document, a working internet connection shall be required. In the Pre-scrutiny, the server side
validations (i.e. validations which are to be validated from the MCA21 system) shall be performed.
6. Convert to pdf and verify the contents of the instance document :
This step is essential to ensure that the disclosures contained in XBRL document are as per Audited
Financial Statement adopted in the AGM and the textual information entered in the instance
document are clearly viewable
Once the instance document has been successfully pre-scrutinized, the next step is to generate pdf by
using ‘Export to pdf’ functionality in the tool to verify the final instance document. It is imperative
that the company and the professional certifying the instance documents should use this feature to
verify the accuracy of the instance document.
In case there is pdf conversion error or the size of the converted pdf is zero kilobytes, then check the
textual information entered in the instance document and follow the html guidelines provided under
the technical specifications to correct the instance document and validate and pre-scrutinize again.

426 INFORMATION TECHNOLOGY


E-Filing Process
Please Note:
Verification of PDF document is essential to ensure that the textual information entered in the instance
document is clearly viewable. It shall be ensured that disclosures in this pdf file are as per the adopted
and published financial statement of the company in all material aspects. It may however be noted
that due to XBRL taxonomy, HTML guidelines, etc., the display/presentation of these disclosures
may not exactly match with those in published financial statements of the company. Such variations
in human-readable’ pdf version of the XBRL document and published financial statements of the
company are unavoidable, and thus permitted.
In case of validation errors (other than warnings) with respect to non-adherence to the HTML
guidelines, PDF document will not be created. For such cases, the HTML guidelines needs to be
followed and the in stance document needs to be corrected, validated and pre-scrutinized again
7. Attach instance document to the Form 23AC-XBRL and Form 23ACA-XBRL :
There is a separate set of Form 23AC-XBRL and Form 23ACA-XBRL available on the MCA portal
for filing in XBRL instance documents by the Company under section 220 of the Companies Act.
First fill up the Form 23AC-XBRL and Form 23ACA-XBRL. Thereafter, attach the validated and
pre- scrutinised instance document for Balance sheet to Form 23AC-XBRL. Similarly, the instance
document for Profit and Loss account is to be attached to Form 23ACA-XBRL. Separate instance
documents need to be prepared for Standalone financial statements and consolidated financial
statements
8. Submitting the Form 23AC-XBRL and Form 23ACAXBRL on the MCA portal :
After the forms are filled, you are required to perform pre-scrutiny of the form, sign the form and
then upload the same as per the normal e-Form filing process. It shall be ensured that the attached
instance documents are validated and pre-scrutinised from the XBRL validation tool.
Viewing of balance sheet and profit and loss submitted in XBRL form on MCA portal :
The XBRL instance documents submitted along with Form 23AC-XBRL and 23ACA-XBRL are in
machine readable format. Therefore, for viewing the same in a human readable format, these shall
be converted into human readable format by the MCA21 system. For viewing the same on MCA
portal and for taking certified copies of the same, these converted documents shall be made available
Annual filling-XBRL-eForms

Sr. Description e-Form


1 Form for filing XBRL document in respect of financial statement and Form AOC4-XBRL
other documents with the Registrar
Table 6.8.1 Annual filing-XBRL-e-Forms

6.9 OVERVIEW ON GST


The present system of indirect taxation has multiplicity of taxes levied by the Centre and State.
This has led to a complex and conflicting principles in indirect tax structure, adding to the multiple
compliance and administrative costs. There is no uniformity in tax rates and structure across States.
There is cascading of taxes due to ‘tax on tax’. There are too many restrictions on seamless credit
available, i.e., credit of excise duty and service tax paid at the stage of manufacture is not available

INFORMATION TECHNOLOGY 427


Accounting Package
to the traders while paying the State level sales tax or VAT, and vice-versa. Further, no credit of State
taxes paid in one State can be availed in other States. (CST)
Goods and Service Tax, which subsumes a large number of Central and State taxes into a single tax,
is meant to mitigate the cascading effect of taxes, provide near seamless credit and make way for
a common market. However, realization of all the foregoing objectives appears to be a Herculean
task and requires the co-operation of all States.
6.9.1 Why GST is necessary for India?
 GDP Growth will go Up by about 1 -2 % after the new law stabilizes (2018-19)
 International Competitiveness will increase by about 5%
 Increased Foreign Direct Investments due to improve ease of doing business and serious
reform measures.
 Common Market- Tax distortions due to differential tax structures and entry tax impositions.
Further check post delays would not be there.
 Lower transaction cost (multiples returns on different events at different rates in different
States.
 Reduced corruption due to use of information technology, less interaction and less discretion.
 Increased IDT revenue as grey market operators would slowly start joining the mainstream.
 This would also lead to increased Direct Tax Revenue due to higher sales/ services disclosure.
6.9.2 GST Concepts
Power to tax GST
Under new Article 246A (inserted by the Constitution Amendment Act, 2016), the Parliament has
exclusive power to make laws with respect to GST where the supply of goods or services or both
take place in the course of inter-State trade or commerce. Subject to the above, every State would
have powers to make laws with regard to GST imposed by the Union or that State.
What is GST (Goods and Service Tax)?
GST is a destination based tax and levied at a single point at the time of consumption of goods
or services by the ultimate consumer. GST is based on the principle of value added tax. GST law
emphasizes on voluntary compliance and on accounts based reporting and monitoring system. It
is a comprehensive levy and envisages tax collection on both goods and services at the same rate.
Internationally, GST was first introduced in France and now more than 160 countries have introduced
GST. Most of the countries, depending on their own socio-economic formation, have introduced
National level GST or Dual GST.
Definition of Good and Service Tax (GST) - The term GST is defined in Article 366 (12A) to mean “any
tax on supply of goods or services or both except taxes on supply of the alcoholic liquor for human consumption”.
In terms of Section 2 (52) of the CGST Act “Goods” means every kind of movable property other than
money and securities but includes actionable claims, growing crops, grass and other things attached to or
forming part of land which are agreed to be severed before supply or under a contract of supply.

428 INFORMATION TECHNOLOGY


E-Filing Process
In terms of Section 2(102) of the CGST Act “Services” means anything other than goods, money and
securities but includes activity relating to the use of money or its conversion by cash or by any other mode,
from one form, currency or denomination, to another form, currency or denomination for which a separate
consideration is charged.
Thus, all supply of goods or services or both would attract CGST (to be levied by Centre) and SGST
(to be levied by State) unless kept out of the purview of GST.
There is no requirement of actual sale of goods under GST. The alternative methods of supply of
goods could be in the form of:
 inter State or distinct person stock transfer;
 captive consumption in another State location;
 supply on consignment basis or any other basis by the principal to his agent;
 supply on job work basis (if working under returnable basis- no tax need be paid);
 any other supply such as donation, sample etc.
Structure and type of taxes:
India is proposing to implement dual GST. In dual GST regime, all the transactions of goods and
services made for a consideration would attract two levies i.e. CGST (Central GST) and SGST (State
GST).
 Central Goods and Service Tax (CGST)
The Central GST (CGST) is expected to replace the existing central excise duty and service tax. CGST
would also cover sale transactions.
The Constitutional Amendment Act, 2016 contains suitable provisions to enable Centre to tax sales.
CGST would be administered by the Central Government. The CENVAT credit balance available
under CENVAT Credit Rules with the manufacture or service provider, as on the date of transition
into GST, could be carried forward. In respect of tax paid goods in stock as on the date of transition
credit not availed in the past or not eligible at that point of time, available under GST could also be
availed and used towards disbursing CGST (Central GST) liability. There could be a time bound
transition for carry forward of credit availed prior to introduction of GST. The declaration of closing
stock as on the date of transition to claim credits, which were not earlier captured, would also be
time bound.
 State Goods and Service Tax (SGST)
State GST would replace State VAT, Entry tax, Octroi, Luxury tax, etc. SGST would be levied on
services as well. To enable taxing of services by the State, the Constitutional Amendment Act, 2016
contains suitable provisions. SGST is to be administered by the State Governments. The SGST payable
could be set off from the SGST credit or the IGST credit available. The closing input VAT balance
available under VAT Act would also be made available to the dealer, as on the date of transition
into GST, and could be set off towards SGST (State GST) liability. Further it is expected that the duty
and tax paid on closing stock would also be available as credit, which may not have been claimed
as set off in the VAT regime.

INFORMATION TECHNOLOGY 429


Accounting Package
 Inter-State Goods and Service Tax (IGST)
IGST would be levied on all supplies of goods and /or services in the course of inter-state trade or
commerce. IGST would be applicable to import of goods or services from outside country as well,
which is indicated in the Constitutional Amendment Act, 2016.
The balance of credit under VAT as well as Cenvat Credit can be carried forward from the earlier
regime. Further the duty and tax paid on closing stock would be available as credit where duty paying
documents available, for hitherto exempted products / services which may not have been claimed
as set-off. Lower deemed credit is available for those who do not have duty paying documents.
What are the taxes subsumed and NOT subsumed into GST?
State taxes

subsumed NOT subsumed


Value Added Tax State Excise Duty
Purchase Tax Stamp Duty
Entry Tax, Octroi, Local Profession Tax
Body Tax
Sales Tax partially Motor Vehicle Tax
Entertainment Tax (other Electricity Duty –Doubtful because of inclusion of electricity in the
than the tax levied by definition of term “goods”
Local tax authorities)
Luxury Tax Sale tax on fi ve petroleum products namely Petroleum Crude,
Motor Spirit (petrol), High Speed Diesel, Natural Gas and Aviation
Turbine Fuel for a period of time. GST Council would decide the
date of including them in GST.
Betting, Gambling and
Lottery Tax
Surcharges and State
Cesses
Central taxes

subsumed NOT subsumed


Central Excise Duty Customs Duty.
Additional Duties of Excise
Excise on Medicinal and Toiletries Preparation Act
Additional Customs Duty (CVD) – equal to central excise on like
goods manufactured in India
Special Additional Duty – Supposed to be equal to CST which was
earlier 4%. Not changed inspite of drop in CST rate to 2%.
Surcharge and Cesses
Central Sales Tax

430 INFORMATION TECHNOLOGY


E-Filing Process
6.10 BROAD PRINCIPLES OF GST
A. Levy and Collection of CGST Bill (Section 9)
In terms of Section 9(1) of CGST Act, 2017 Central Goods and Services Tax (CGST) shall be levied
on all intra-State supplies of goods and/or services on the value determined under section 15
and at the rate notified by the Central/State Government in this behalf, on the recommendation
of the Council. However, the aforesaid rate of CGST shall not exceed 20%. Further, the CGST
shall be collected in the prescribed manner.
In terms of Section 9(3) the Central Government may, on the recommendation of the Council, by
notification, specify categories of supply of goods and/or services the tax on which is payable
on reverse charge basis and the tax thereon shall be paid by the recipient of such goods and/or
services. This has been restricted to the very unorganized sectors like transport. (See Notification
for list) Consequently, all the provisions of the CGST Act shall apply to such person as if he is
the person liable for paying the tax in relation to the supply of such goods and /or services.
However, this cannot be adjusted with the credit but only in cash.
In terms of Section 9(4), CGST in respect of supply of goods or services or both by an unregistered
supplier to a registered recipient will be paid by such registered recipient under reverse charge.
This is a significant change which would force even small tax payers to go for the regular
scheme of full tax with credit if they want to deal with any registered businesses. No business
in competitive environment can afford to break the credit chain and may avoid buying from
unregistered or composition dealers. Central Government vide Notification No. 08/2017-Central Tax
(Rate), dt. 28-06-2017 has w.e.f 1st July 2017 exempted supplies of goods or service or both received
by a registered person from any or all such unregistered supplier(s) if the aggregate value of such
supplies does not exceed Rs. 5000 in a day.
In terms of Section 9(5), the Central Government may specify categories of services the tax on
which shall be paid by the Electronic Commerce Operator if such services are supplied through
it. Consequently, all the provisions of the CGST Act shall apply to such Electronic Commerce
Operator as if he is the person liable for paying the tax in relation to supply of such services.
In other cases where the e-com operator only provides a platform the need to pay TCS (Tax
Collection at Source) of 1% and reporting the same has been fastened. The supplier would be
liable for discharge of the GST applicable as such persons not eligible for threshold exemption
of Rs. 20 / 10 Lakhs.
B. Composition Levy (Section 10)
In terms of Section 10(1) a registered person whose aggregate turnover in the preceding financial
year did not exceed Rs.75 lakhs, may opt to pay amount (not tax), in lieu of tax payable in normal
levy but not exceeding following % of turnover in State or in Union Territory:
(i) 1% of turnover, in case of a manufacturer
(ii) 2.5% of the turnover in case of restaurant services (excluding alcohol)
(iii) 0.5% in case of others
Note: a) Barring Uttarakhand, which has opted for a Rs. 75 lakh threshold for the composition
scheme, the Rs. 50 lakh threshold will continue for all other special category states except for Jammu
& Kashmir.

INFORMATION TECHNOLOGY 431


Accounting Package
b) The State GST maybe an equal amount of Rs. 75 Lakh.
The above-mentioned composition levy shall not be granted to a taxable person-
 who is engaged in the supply of services other than supply of food and beverages ( outdoor
caterer/ hotel etc.); or
 who makes any supply of goods which are not leviable to tax under the CGST Act; or
 who makes any inter-state outward supplies of goods; or
 who has any instate or imported stocks in hand
 who makes any supply of goods through an Electronic Commerce Operator who is required
to collect tax at source; or
 who a manufacturer of such goods is as may be notified on the recommendation of the Council.
the registered person shall not be eligible to opt for the composition scheme unless all registered
person opts the scheme. Resultantly, registered taxable person, having the same PAN has obtained
more than one Registration, whether in the same State or in two different States as Head Office and
Branch, then the Head Office and Branch cannot opt for Composition Levy Scheme in isolation. Both
will have to opt for Composition Levy.
In terms of Section 10(3), the Composition Levy Scheme shall stand withdrawn from the day when
the aggregate turnover of the registered taxable person during a financial year exceeds Rs. 75,00,000/-
or specified limit.
In terms of Section 10(4) a taxable person who pays tax under composition levy shall not collect any
tax from the recipient on supplies made by him nor shall he be entitled to any credit of input tax.
It is also worth noting here that in terms of Section 10(5) if the proper officer has reasons to believe
that a taxable person was not eligible to pay tax under Composition Levy Scheme, the concerned
taxable person shall be liable to pay the following:
(a) Any tax which may be payable by him under other provisions of the Act; and
(b) Penalty; provision of section 73 and 74 for shall apply for determination of tax and penalty
It is also to be noted that since Composition Levy Scheme cannot be availed by a taxable person who
is engaged in the supply of Ice-cream, Pan Masala & Tobacco, supply of services, works contractors
providing Works Contract Services shall not be eligible for Composition Levy Scheme. Consequently,
aforesaid Works Contractors would be forced to maintain proper Books of Accounts and Records.
Traders doing B2B activity may not find the composition levy economically viable.
In terms of Section 2(107) Taxable Person means a person who is registered or required to be registered
under Section 22 or 24 of this Act. One who is required to obtain multiple registrations in different
States or within one State would be considered as distinct person in each State.
Following persons are not liable to registration as per sections 22-24:
(a) Any person engaged exclusively in the business of supplying goods and/or services that are
not liable to tax or are wholly exempt from tax under CGST Act.
(b) An agriculturist to the extent of supply of produce out of cultivation of land the persons who
are only engaged in making supplies of taxable goods or services or both, the total tax on which

432 INFORMATION TECHNOLOGY


E-Filing Process
is liable to be paid on reverse charge basis by the recipient of such goods or services or both
under section 9(3) of the CGST Act, 2017
(c) Any supplier if his aggregate turnover in a financial year does not exceed Rs. 20 lakh.
(d) Any supplier if his aggregate turnover in a financial year does not exceed Rs. 10 lakh from
Special Category States. Following is the list of aforesaid “Special Category States”

S. No. Special Category States S. No. Special Category States


1. Arunachal Pradesh 7. Nagaland
2. Assam 8. Sikkim
3. Jammu & Kashmir 9. Tripura
4. Manipur 10. Himachal Pradesh
5. Meghalaya 11. Uttarakhand
6. Mizoram
In terms of Section 24 read with Section 22, following persons are required to be registered
under CGST Act:
(a) Every supplier shall be liable to be registered under the CGST Act in the State from where he
makes a taxable supply of goods and/or services if his aggregate turnover in a financial year
exceeds Rs. 20 lakh. However, in respect of Special Category States, the aforesaid threshold
registration limit has been reduced to Rs. 10 lakh.
(b) Person making any inter-state taxable supply (no threshold limit).
(c) Causal Taxable Persons (No threshold limit).
(d) Persons liable to pay GST under reverse charge (no threshold limit).
(e) Electronic Commerce Operator in respect of specified categories of services if such services
are supplied through it.
(f) Non-Resident Taxable Persons.
(g) Persons who are required to deduct tax at source
(h) Persons who are required to collect tax at source
(i) Persons who supply goods and/or services on behalf of other taxable persons whether as an
agent or otherwise (no threshold limit).
(j) Input Service Distributor.
(k) Persons who supply goods and/or services through Electronic Commerce Operator who is
required to collect tax at source (No threshold limit).
(l) Every Electronic Commerce Operator (No threshold limit).
(m) Every person supplying Online Information and Database Access or Retrieval Services (OIDAR
Services) from a place outside India to a person in India, other than a registered taxable person.
(n) Such other person or class of persons as may be notified by the Government on the
recommendation of the Council.

INFORMATION TECHNOLOGY 433


Accounting Package
C. Meaning and scope of supply (Section 7)
Supply includes:
(a) all forms of supply of goods and/or services such as sale, transfer, barter, exchange, license,
rental, lease or disposal made or agreed to be made for a consideration by a person in the course
or furtherance of business,
(b) importation of service, for a consideration whether or not in the course or furtherance of
business, and
In terms of Section 7(3) the Government may, upon recommendation of the Council, specify,
by notification, the transactions that are to be treated as—
(i) a supply of goods and not as a supply of services; or
(ii) a supply of services and not as a supply of goods; or
(c) In terms of Schedule I to the CGST Act, following are to be treated as supply even if made
without consideration:
1. Permanent transfer or disposal of business assets where input tax credit has been availed
on such business assets.
2. Supply of goods or services between related persons or between distinct persons as specified
in Section 25, when made in the course or furtherance of business. In terms of Section 10,
following are deemed distinct persons
(i) Deemed Distinct Persons in Case of Multiple Registrations- Section 25(4)
A person who has either already obtained or is required to obtain more than one
registration under this Act shall be treated as distinct persons in respect of each such
registration. It is immaterial whether the aforesaid multiple registrations have been
obtained or are required to be obtained in one State or more than one State.
Example
Mr. Ravi is engaged in supply of professional services as Chartered Accountant. He
has obtained a Registration in the State of West Bengal in respect of his Head Office. In
addition, he has obtained registration in the State of Delhi in respect of his branch.
In the above case, in respect of each registration at West Bengal and Delhi, Mr. Ravi shall
be treated as distinct person.
(ii) Deemed Establishments of Distinct Persons in case of Multiple Registration in Different
States –Section 25(5)
An establishment of a person who has either obtained or is required to obtain registration in
a State and any of his other establishments in another State shall be treated as establishment
of distinct persons for the purposes of this Act.
Example
Raj Ltd. is engaged in supply of specified goods. It has obtained a Registration in the State
of Haryana in respect of its Head Office. In addition, it has obtained registration in the
State of Punjab in respect of its branch located at Jalandhar.
In the above case, the establishment in Haryana and establishment in Punjab shall be
treated as establishments of distinct persons.
434 INFORMATION TECHNOLOGY
E-Filing Process
3. Supply of goods-
(a) by a principal to his agent where the agent undertakes to supply such goods on behalf of the
principal, or
(b) by an agent to his principal where the agent undertakes to receive such goods on behalf of the
principal.
4. Importation of services by a taxable person from a related person or from any of his other
establishments outside India, in the course or furtherance of business.
1. Schedule II-following matters to be treated as a supply of goods or a supply of services:
1. Transfer
(a) Any transfer of title to goods is a supply of goods. Normal sale.
(b) Any transfer of goods or right in goods or undivided share without transfer of title is
supply of services. Example- Renting of laptops.
(c) Any transfer of title in goods under an agreement which stipulates that property in goods
will pass at a future date upon payment of full consideration as agreed is a supply of
goods. Example – Supply of Refrigerators under Hire- purchase Agreement
2. Land and Building
(a) Any lease, tenancy, easement, license to occupy land is a supply of services.
(b) Any lease or letting out of the building including a commercial, industrial or residential
complex for business or comer, either wholly or partly, is a supply of services
3. Treatment or process
Any treatment or process which is being applied to another person’s goods is a supply
of services.
4. Transfer of business assets
(a) Where goods forming part of the assets of a business are transferred or disposed of by or
under the directions of the person carrying on the business so as no longer to form part
of those assets, whether for a consideration, such transfer or disposal is a supply of goods
by the person
(b) Where, by or under the direction of a person carrying on a business, goods held or used
for the purposes of the business are put to any private use or are used, or made available
to any person for use, for any purpose other than a purpose of the business, whether for
a consideration, the usage or making available of such goods is a supply of services
(c) Where any person ceases to be a taxable person, any goods forming part of the assets of
any business carried on by him shall be deemed to be supplied by him in the course or
furtherance of his business immediately before he ceases to be taxable person. However,
aforesaid provision of deemed supply of goods shall not apply in the following cases:
(i) Where the business is transferred as a going concerned to another person; or
(ii) Where the business is carried on by a personal representative who is deemed to be
a taxable person
The declared services under the present ST Law shall be treated as supply a service.

INFORMATION TECHNOLOGY 435


Accounting Package
The following shall be treated as supply of goods
Supply of goods by any unincorporated association or body of persons to a member thereof
for cash, deferred payment or other valuable consideration
In terms of Section 8 of the Act, the tax liability on a composite or a mixed supply shall be determined
in the following manner-
(a) a composite supply comprising two or more supplies, one of which is a principal sully, shall
be treated as a supply of such principal supply. Example- Supply of food during the course
of transportation of passengers by air services shall be treated as supply of transportation of
passengers by air.
(b) a mixed supply two or more supplies shall be treated as supply of that particular supply which
attracts the highest rate of tax.
D. Meaning of inter-state and intra-state supply [Section 7 and 8 of the IGST Act]
In terms of Section 7(1) & (3) of the IGST Act supply of goods or services in the course of inter-state
trade or commerce means any supply where the location of the supplier and the place of supply are in
(a) Two different state
(b) Two different union territories
(c) A State and a Union territory
On the other hand, in terms of Section 8(1) and (2), intra-State supply of goods or services means
any supply of goods where the location of the supplier and place of supply are in the same State or
same Union territory. However, the intra-State supply of goods shall not include:
(i) Supply of goods to or by a SEZ developer or to or by an SEZ unit;
(ii) Supply of goods brought into India in the course of import till they cross the customs frontiers
of India.
(iii) Supplies made to a tourist leaving India on any supply of goods taken out of India by him
E. Classification under GST
The classification of goods is to be done with reference to the broad category as per the GST Tariff
Act. In case of any doubt the specific coverage within the alternative entries is to be chosen. The
Harmonized System of Nomenclature (HSN), issued by the World Customs Organization, Brussels,
could be adopted for classification of goods and with respect to services it would be in line with
WTO classification. This would integrate Indian trade and industry with global trade even at each
State level. Further it would ensure that there is uniformity amongst Union and the States in the
matter of classification of goods. Where the entry is not clear or more than one classification appears
to be relevant, then reference could be made to the rules of interpretation contained in the HSN
to resolve such a conflict. The notification issued on the interpretation rules and the rates may be
referred for clarity.
Where there are, still some doubts the decisions of the Courts laying down certain principles (like
trade parlance theory, function based classification, ISI glossary etc.) could be referred. Classification
of service would probably be based on the service tax definitions as they exist presently as also the
provisions as they existed prior to 2012.

436 INFORMATION TECHNOLOGY


E-Filing Process
F. Exemptions under GST (Section 11)
1. Exemption in Public Interest by Notification – Section 11(1)
The Central Government may exempt goods and/or services of any specified description from the
tax leviable thereon. However, following cumulative conditions need to be satisfied:
(a) Exemption is to be granted in public interest only;
(b) Exemption is to be granted on the recommendation of the GST Council;
(c) Exemption is to be granted by a Notification in the Official Gazette;
(d) Exemption to be granted either absolutely [i.e. without any condition] or subject to specified
conditions;
(e) Exemption can be from the whole or any part of the tax leviable thereon; and
(f) The effective date of exemption may either be from the date of issue of notification or any date
subsequent thereto as may be specified in the relevant Notification
Further, in terms of Explanation to Section 11, where an exemption in respect of any goods and /or
services from the whole of the tax leviable thereon has been granted absolutely, the taxable person
providing such goods and/or services is not allowed to pay the tax on such goods and/or services.
However, if the goods or services are exported then there is facility for claiming the rebate or refund
of tax paid on inputs etc.
2. Exemption in Public Interest by Special Order under Circumstances of an Exceptional Nature
–Section 11(2)
The Central Government may exempt from payment of tax any goods and/or services on which
tax is leviable. However, following cumulative conditions need to be satisfied:
(a) Exemption is to be granted in public interest only;
(b) Exemption is to be granted on the recommendation of the GST Council;
(c) Exemption is to be granted by a special order in each case; and
(d) Exemption is to be granted under circumstances of an exceptional nature to be specified in the
aforesaid special order.
3. Insertion of an Explanation in the Notification or Order – Section 11(3)
The Central Government may insert an explanation in the Notification or Order issued under Section
11(1) or Section 11(2) respectively. However, following conditions need to be satisfied cumulatively:
(a) Explanation is to be inserted only if the Central Government considers it necessary or expedient
to do so;
(b) Explanation is to be inserted with a view to clarify the scope or applicability of any Notification
or Order; and
(c) Explanation is to be issued within one year of issue of the Notification or Order.
Further, such Explanation shall have the effect as if it had always been the part of the original /first
relevant Notification or Order.
The classification at higher rates than the correct rate may lead to assesse being uncompetitive.

INFORMATION TECHNOLOGY 437


Accounting Package
The classification at lower rate can severely damage the business when the demand for several years
with interest and penalty is raised.
Therefore, it is important that classification is not done in a hurry and done accurately and ion case
of doubt reference to the entry, HSN, case laws be examined in an independent manner. It may be
noted that the Apex court has held that exemptions are to be construed strictly.
G. Decision on Registration (Section 22)
The decision regarding registration as a supplier of goods or service would be made when GST is
payable. The intermediate goods supplier should not claim exemption and take the registration
from the start of the enterprise to ensure competitiveness due to availability of input credit set off.
The supplier [whether an importer, distributor or retailer] who wishes to pass on the input tax credit
in respect of the GST paid on goods traded/imported by him to customers, would be required to
register under the GST law. Prescribed accounts and records will have to be maintained by them
and they must issue proper invoice for the supply of goods and services.
H. Place of Supply (Sections 10- 14 read with Sections 7 & 8 of the IGST Act)
The place of supply would determine first as to whether the transaction is in India or outside India.
If it is outside India it would not be liable to GST.
It would also determine the place of levy. Most transactions are expected to be taxed at the rate
prevailing at the destination. There would be some exceptions in regard to services and a few in
regard to goods.
Section 7 of the IGST Act provides that place of supply of goods shall, depend on the location of the
supplier and place of supply. In terms of Section 7(1) of the IGST Act Inter-State supply of goods
means any supply of goods where the location of the supplier and the lace of supply are in different
States, On the other hand, in the Section 8(1) intra-State supply of goods means any supply of goods
where the location of the supplier and the place of supply are in the same State.
In terms of Section 12 & 13 of the IGST Act the place of supply for services is quite elaborate and
based partially on the present Place of Provision of Services Rules under the service tax. Place shall
be decided by way of location of immovable property, place of performance of services, place of
event, location of supplier of service, location of recipient of service etc.
I. Time of Supply (Sections 12 & 13 of the CGST Act)
The liability to pay CGST/SGST on the goods shall arise at the time of supply. The time of supply
of goods would be earlier of the following dates, namely:
(a) the date of issue of invoice by the supplier or the last date on which he is required to issue the
invoice with respect to the supply; or
(b) the date of receipt of payment by the supplier
However, in case of supplies in respect of which tax is paid or liable to be paid on reverse charge
basis, the time of supply shall be the earliest of the following date, namely: -
(a) the date of receipt of goods, or
(b) the date of payment as entered in the books of account of the recipient or the date on which
the payment is debited in his bank account, whichever is earlier; or

438 INFORMATION TECHNOLOGY


E-Filing Process
(c) the date immediately following 30 days from the date of issue of invoice or any other document,
by whatever name called, in lieu thereof by the supplier:
In case of service, the time of supply shall be earlier of the following dates, namely: -
(a) the date of issue of invoice by the supplier if the invoice is issued within the prescribe period
(i.e. 30 days)
(b) The date of provision of service, if invoice is not issued within the prescribed period
(c) The date on which the recipient shows the receipt of services in his books of account, in the
case (a) and (b) do not apply.
J. Rate of GST
The rates could be as under:
(a) Revenue Neutral Rate (RNR) – 18%
(b) Products/ service which are basic necessities – 12%
(c) Essential Goods - 5%
(d) Demerit/ luxury goods - 28% + some Cesses
(Upto 160 %)
The Codes and Rates of various goods and services under GST have already been notified by CBEC
and are available on www.cbec.gov.in
K. Valuation (Section 15)
GST would normally be payable on the ‘transaction value’. Transaction value is the price actually
paid or payable for the said supply of goods and/or services between un-related parties and price is
the sole consideration. The transaction value is also said to include:
 Taxes other than GST
 Expenses incurred by recipient in relation to supply
 Incidental expenses charged at the time or before the supply
 Interest etc. for late payment
 Subsides directly linked to the price excluding subsidies provided by the Central and
Governments
As regards discounts/ incentives, it will form part of ‘transaction value’, if it is allowed after the supply
is effected. However, discounts/ incentives given before or at the time of supply would be permissible
as deduction from the transaction value. This would be indicated in the invoice itself.
Volume / quantity discounts would be passed on by way of credit notes.
Valuation Rules provides that, where the supply of goods or services is for a consideration not
wholly in money, the value of supply shall be:
(a) open market value
(b) if (a) is not, then sum total of consideration in money and equivalent thereof
(c) value of like kind and quantity

INFORMATION TECHNOLOGY 439


Accounting Package
(d) cost+10%
(e) by reasonable means.
However, where there is no consideration and the receiver is eligible for credit then the value declared
would be accepted as the proper value. Though not specified, it may be ideal to ensure that reasonable
value is ascribed to such transaction to avoid any questions at the time of audit or otherwise.
The valuation provisions envisaged may result in disputes is the understanding as on date. The
settled case laws in Customs for market value and in Central Excise for other than sole consideration
may assist in guidance in case of tainted transactions.
L. Input Tax Credit (Section 16 – 22)
Current CENVAT Credit regime disallows CENVAT Credit on various services such as motor
vehicle related services, catering services, employee insurance, construction of civil structure etc. Similarly,
State VAT laws restrict input tax credit in respect of construction, motor vehicle etc. Currently, this
denial of credits leads to un-necessary cost burden on assessee though they are used in furtherance
of business.
It was expected that in GST regime, seamless credit would be allowed to business houses without
any denial or any restriction except say goods / services which are availed for personal use and not
for official use (something similar to United Kingdom VAT law).
However, surprisingly, inter-alia, many of the aforesaid credit restrictions continue to remain (in
respect of both goods and services). Further, credit is denied on goods and/or services used for
private or personal consumption, to the extent they are so consumed. This continuation of denial will
lead to substantial tax cascading (as rate of GST would be higher than the current rate of service tax).
Also, another round of litigation will result as interpretation issues would crop up while determining
eligibility or otherwise of GST paid on personal consumptions such as business lunch with clients.
The credit on the inputs and the input services, pertaining to Central GST, Integrated GST and
State GST should be accounted separately. There is likely to be a restriction on cross utilization i.e.
credit pertaining to CGST would not be allowed for set-off against SGST and vice versa. However,
this restriction would not be applicable to inter-State transactions. Further, the rules for taking and
utilization of CGST, IGST and SGST credit would be aligned. The credit on the capital goods could
be aligned with inputs and services and would be available for set off 100% in the first year itself.
The provision of supply of goods or services inter-State between the same entities would be subject
to GST. When there is no supply but input services are commonly used then the concept of Input
Service Distributor would apply.
Doubts/ issues in transition as well as post transition continue to be confusing arbitrary and illogical
leading to disputes as in the past. It is expected that in the next 6 months these would be made
reasonable and cascading impact be reduced further.
M. Set off of input Credit (Sections 16 – 22)
The input tax credit would be eligible for set off as under:
1. The CGST SGST and UTGST paid on supply of service to be set off against the output CGST,
SGST and UTGST respectively.
2. When an item is procured for resale, then credit of CGST and SGST/ UTGST is available for
all items.
440 INFORMATION TECHNOLOGY
E-Filing Process
3. When inputs and consumables are procured for the manufacture of goods on which CGST/
SGST/ UTGST is paid, then credit of CGST and SGST/ UTGST is available for all items.
4. SGST/ UTGST would be allowed first to be utilised against SGST/ UTGST and then IGST.
5. Similarly, would be allowed first to be utilised against CGST for CGST and then IGST.
6. IGST would be allowed for IGST, CGST and then SGST/ UTGST in that order.
The SGST/ UTGST would not be allowed to be adjusted to the CGST and vice versa. This may lead
to accumulation of credit in some places.

N. Number of Legislations:
There would be 38 GST laws in India in GST regime; there would be 1 CGST law and 31 SGST laws
for each of the States including two Union Territories and 5 UTGST Law and 1 IGST law governing
inter-State supplies of goods and/ or services.
O. Whether branch transfer taxable?
At present, the transfer of goods without payment of CST is permissible when one transfers it to self
or agent under Form “F”. Many States have input tax reversal to be made in such cases on value of
goods purchased locally For Example 2% in Karnataka, 5 % In Tamil Nadu and full credit reversal
in some States etc.
Under GST, the movement of goods or services from one State to another on transfer basis would
be subject to IGST [total of CGST+SGST/ UTGST]. Therefore, tax would not cascade to the extent
of restriction. However, it will have issues of increased working capital, storage and logistics.
The transfer of goods or services within a State with a separate business vertical would be liable to
SGST/ UTGST and CGST. In case there is only one registration in the State then there would be no
GST [CGST+SGST/ UTGST] on the stock transfer.
P. Supply in the course of Import (Section 11 of IGST)
At present import of goods is liable to Customs Duties comprising of Basic Customs duty [BCD],
Additional duty of customs equal to Excise duty on like goods manufactured in India [CVD], Special
Additional duty (SAD). Service tax is leviable on services which are provided from outside India
and received in India and payable by the service receiver under reverse charge mechanism.
The import of goods or services would be deemed as inter-State supply of goods or service and be
subjected to the levy of Inter-State GST (IGST). The import of goods would continue to attract Basic
Customs Duty (BCD) and also IGST.

INFORMATION TECHNOLOGY 441


Accounting Package
Q. Supply in course of export (Section 11 of IGST)
GST would not be charged on goods or services exported from India. In case, the supply of goods or
supply of services qualifies as export out of India as per the place of supply provisions, the transaction
would be zero rated. The supplier would be allowed to export the goods or services without charging
any tax, but can avail the CGST/SGST and IGST credits. If they are unable to utilise the credit, then
they can go for refund of. CGST/ SGST/ IGST paid on procurement of such goods and/or services.
R. Transitional Provisions
The key to the success of GST would be when all present tax payers comfortably migrate to GST so
that they can continue their businesses without any difficulty. The transition should also enable all
to start on a level playing field. In the present act and rules there are a couple of aberrations which
treat hitherto exempted manufacturers or taxable and exempted product manufacturers unfairly
and unequally. Some important transition provisions are briefly explained hereunder:
(a) Every person registered under VAT, Central Excise or Service tax etc. having a valid PAN
would be provisionally registered. Further particulars to be provided (online) to enable final
registration. (Section 139)
(b) The CENVAT Credit (manufacturer/ service provider) or the VAT credit (manufacturer/
Trader) or Entry Tax credit (where allowed to be adjusted – few States enable this) can be
carried forward if eligible as input credit under GST. It must be ensured that the last return
before switching over to GST is made very carefully after proper reconciliation with books of
account. Only eligible credits credit to be carried forward. Capturing the complete credits of
VAT, Central Excise and Inputs credit could be a value-added activity. The time limit specified
is 90 days from 1st July or another 90 days if Commissioner extends. (Section 140(1))
(c) Capital goods credit is available to a manufacturer/ service provider normally upto 50% in
the year of acquisition and balance 50% in the subsequent year/s. Where one has either not
availed though eligible or availed 50% pre-GST, the balance can be availed in the subsequent
year. However, this credit has not been extended to traders who have capital goods in use as
well as area based exempted units. (Section 140(2))
(d) All manufacturers/ traders and to a lesser extent service providers would have stock of goods
which may be in the form of raw material/ components, semi-finished goods and finished
goods. Taxes (central excise duty, Input tax credit, service tax) paid under the earlier regime
which are available in GST should be allowed as credit as now the payment would be under
GST. Those not liable to be registered under the earlier law, claiming exemption, providing
works contract service or claiming abatement or 1st and 2nd stage dealer would be eligible to
avail the credit on closing stock. This again may not be fair. The proof of existence of stock
may also be retained such as stock taking, entries in the running stock registers.
The claim for credit of taxes paid on stock can be made for all the above situations along with
duty paying documents to maximize the credit. Where no documents are there, Transitional
Rules prescribe deemed credit of 60% can be availed in case of supply of goods taxed at 18%
or higher and 40% credit can be availed in case of supply of goods taxed at less than 18%
within 6 months, subject to certain conditions. If supply is IGST then it would be 30 % and 20%
respectively. (Sections 140(3))

442 INFORMATION TECHNOLOGY


E-Filing Process
(e) The credit for duty/ tax paid for goods in transit can be claimed within a period of 30 days
with the condition that the same has been recorded in the books. A statement as prescribed
should be submitted. (Section 140(5))
(f) Many dealers and works contractors who are under the composition scheme in the local
VAT laws as well as the service tax law are ineligible or may not find it economically viable
especially if, they are into Business to Business (B2B). However, if such dealers opt for regular
scheme under GST, the credit on inputs held in stock and inputs contained in semi-finished
or finished goods held in stock on the appointed day is allowed subject to certain conditions.
(Section 140(6))
(g) The common input services for services received before GST by an Input Service Distributor
would be available for distribution as credit under GST Act even if invoice(s) relating to such
services is received on or after implementation of GST. [Section 140(7)].
(h) Where a taxable person having Centralized Registration under the earlier law has obtained
a registration under CGST Act, such person shall be allowed to take in his Electronic Credit
Ledger, credit of the amount of CENVAT Credit carried forward in a return, furnished under
the earlier law by him in respect of the period ending with the day immediately preceding
the appointed day. However, the taxable person shall not be allowed to take credit unless the
said amount is admissible as input tax credit under the GST Act. Further, such credit may
be transferred to any of the registered taxable persons having the same PAN for which the
Centralized Registration was obtained under the earlier law. (Section 140(8))
(i) Under the service tax law when one had not paid for services within 3 months, the credit was to
be reversed. If payment is made within 3 months of GST such credit can be re-claimed (Section
140(9))
(j) Where any duty paid Goods under the earlier law are sent 6 months prior to the appointed day
i.e. introduction of GST date and are returned to any place of business on or after the aforesaid
appointed day, the Registered Taxable Person(RTP) shall be eligible for refund of the duty paid
under the earlier law where such goods are returned by a person, other than a RTP, to the said
place of business within a period of six months from the appointed day when such goods are
identifiable to the satisfaction of the proper officer. However, if the said goods are returned
by a RTP, the return of goods shall be deemed to be a supply. (Section 142(1))
(k) When inputs/ Semi Finished/ finished Goods sent for job work on payment of duty are returned
after GST date within 6 + 2 months of GST date no GST will be payable. If not returned, then
the input tax credit would have to be reversed. This provision would apply where the credit on
the stock in hand of job worker is claimed by the principal (sender). Enabling provisions have
been made for receipt of goods directly by job worker or supply from job workers premises.
(Sections 141)
(l) The issue of supplementary invoices, debit/ credit note can be done within 30 days of the date
of price revision. In case of credit note, the reversal of the credit by the receiver needs to be
confirmed. (Section 142)
(m) The claims for refund of any amount of CENVAT credit, duty, tax or interest paid made and
pending as well as claims made after GST date but pertaining to a period prior would be under
the earlier law required to be disposed of as per the earlier law and any amount eventually

INFORMATION TECHNOLOGY 443


Accounting Package
accruing to him shall be paid in cash. In case of a claim being rejected (subject to appeal in the
old law) the amount so rejected would lapse (Section 142)
(n) The claim for CENVAT credit or ITC or output duty or tax liability or dispute on Reverse charge
mechanism made under the earlier law which is in adjudication etc. would be disposed of
under the old law and any amount found to be admissible to the claimant shall be refunded
to him in cash. In case of recovery of credit under old law it would be as per the provisions of
GST. (Sections 142)
(o) The returns under central excise can be revised before the end of the month, and service tax
returns within 90 days; under VAT in most States a 6 months’ time is provided for such revision.
If aforesaid revision of returns results in any amount recoverable from the assessee, the same
shall be recovered as an arrear of tax under GST Act and the amount so recovered shall not
be admissible as input tax credit under GST Act. On the other hand, if pursuant to aforesaid
revision of return, any amount is found to be refundable or CENVAT Credit is found to be
admissible to any taxable person, the same shall be refunded to him in cash. (Section 142(9))
(p) Contracts entered prior to GST spilling over to GST would be liable to tax under GST. No tax
shall be payable on the supply of goods and/or services made on or after the appointed day
where the duty or tax payable thereon has already been paid under the earlier law. (Section
187)
(q) The tax in respect of the taxable services /taxable goods paid under earlier law, tax shall be
levied under this act, and the taxable person shall be entitled to take credit of taxes paid under
the existing law to the extent of supplies made after the appointed day and such credit shall
be calculated in such manner as may be prescribed. (Section 142(11))
(r) In many States the stock transfers are after reversal of input tax credit. No such credit reversal
is permissible under GST though it was desirable.
(s) Where goods are sent on approval and are returned within 6 + 2 months, then no liability
to pay exist under GST. Beyond that tax is payable by the person returning the goods. If not
returned, then the sender has to pay the GST of such earlier supplies. (Section 142(12))
(t) Where a supplier has made any sale of goods in respect of which tax was required to be deducted
at source under the earlier law and the supplier has also issued an invoice for the same before
the appointed day, no tax is to be deducted at source shall be made by the deductor under
Section 46 of the CGST where payment to the said supplier is made on or after the appointed
day. (Section 142(13))
Impact of GST on Trade, manufacture, service
Impact on Traders
(a) Tax on value addition: The impact of tax on the wholesaler or retailer would be limited to the
value addition. The tax paid at earlier stages (except CGST & SGST of other States) would be
available as set off for payment of GST on supplies. Therefore, traders would prefer to buy/
receive supplies with invoice pre-and post GST.
(b) Reduce cascading: Cost of products and services would reduce normally due to the cascading
effect of tax being reduced. Service tax credits would be available and going forward even the
capital goods used for storing, handling etc.

444 INFORMATION TECHNOLOGY


E-Filing Process
(c) SGST/ UTGST levy: CGST and SGST/ UTGST would be levied on the local supply of goods
within State. IGST (comprising of CGST and SGST) would be levied on inter-State supply of
goods.
(d) No subsequent sale or sale in transit under the CST Act against Forms E-1/2: This exemption as per
section 6(2) of the CST Act is not continued under GST levy. GST would be charged on both
transactions.
(e) Export supplies Under Form H/ Supplies to SEZ under form I: Not available.
(f) Stock transfers: Presently, stock transfer is done without charging CST against Form F. Under
GST law, stock transfers from one State to other would be liable to GST.
(g) Stock transfers to branches/consignment agents within the State: Under GST, these transfers would
not be taxed as the registration number of transferor and transferee is same. Where the division/
branch or agent has a different registration CGST & SGST would be charged.
(h) Small Traders: They would be eligible for the composition scheme upto Rs 75 lakhs provided
their aggregate turnover in the preceding financial year did not exceed Rs. 75 lakh. After that,
normal rate will apply. The essential conditions to be complied for availing the benefit of the
aforesaid Composition Scheme are as under
(i) No credit to dealer/ customer;
(ii) No inter-state supply of goods.
Only suitable for Business to Consumer transactions.
2. Impact on Manufacturers
(a) Competitive in market: There would be a saving in taxes due to less restrictions in taking setoff
of taxes paid at various stages of manufacture reducing the cost of goods/ services supplied.
This would make them more competitive both in domestic and the international markets.
(b) Valuation of the supply of goods: At present, excise duty is paid on the event of manufacture of
excisable goods and VAT on the sale of goods. VAT/CST is computed on sale price+ excise
duty paid. With the shift of taxable event from manufacture to supply of goods, the valuation
of goods could be simplified. Under GST, actual value received as a consideration for the
supply of goods would be subject to GST with some exceptions.
(c) Cheaper exports: Exports would be cheaper as taxes paid at earlier stages could be refunded to
a larger extent. [credit restrictions can lead to tax sticking]
(d) Ease of doing Business: Adoption of Information technology in GST regime will enable the
organization to do business with ease.
(e) Transaction costs: The transaction costs of compliance would reduce due to widespread
computerization and online filling of forms and returns and payment of taxes. However, the
need to upload all transactions may lead to increased compliance cost for medium sector while
for the small sector it may not be bearable.
(f) Manufacturers under administration of State VAT officials: Manufacturers having a value of
clearances of less than Rs. 150 Lakhs are exempt under present Excise law. The matter of
administration has not been resolved as on date.

INFORMATION TECHNOLOGY 445


Accounting Package
3. Impact on Service Providers
(a) Present destination based to proposed consumption based levy: Presently, service tax is levied mainly
at the origin and is a destination based levy, the burden of which is borne by the end customer.
Under GST generally they would be taxed in the same way except that the place of supply
would have to be confirmed. Tax would flow to the place of consumption.
(b) Service tax-SGST levied by States: Under GST law, the service tax would be levied not just by
Centre but also by the States which would be empowered to levy SGST by amendment to the
Constitution of India.
(c) Taxes received by consuming State: If services are rendered from one State to another, then tax
would ultimately go to the consuming State.
(d) Increased set off with VAT: The VAT credit for goods which was not available to the service
provider would be available under GST.
4. Impact on the Consumers
(a) Reduction in price: Generally, the purchase price would reduce as tax content of most products
would come down. But if a product has hitherto not been subjected to tax completely then the
price would increase. Further those items which are now taxable where tax rate earlier was
zero may be more expensive as exemption and zero rated lists of items may come down in the
GST regime.
(b) Transparency: The tax paid would be clearly mentioned in the invoice given to the customer.
(c) Options to customer: There would be free trade and commerce between States and throughout
the country which would provide more options to the consumer.
5. Central Government
(a) Increased collection of CGST and IGST: The collection of taxes-CGST and IGST would increase
when more and more assesses register and pay taxes due to simplified tax laws under GST
regime.
(b) Loss of CST revenues: The CST which was 2 % accruing to the State of collection has been
subsumed into GST. This revenue would not be available to the States.
(c) Refunds under GST: The refunds under Central excise and service tax laws take long time.
However, in GST Regime, refunds are expected to be processed faster with 90% of the total
refund amount being available on submission of proper documents.
(d) Reduced corruption: When the laws are simplified, then the chances of multiple interpretations
would get reduced, leading to reduction in disputes and consequent litigation. Also, the
automation of the payments/returns filing and other compliances could mean that the
interaction between the assessee and the department officers would come down to minimum.
This would reduce corruption and increase ethics gradually.
(e) Compensation for loss of revenues to States: The compensation of loss of tax revenues to the States
on account of implementation of GST would be an outgo. In reality there may be minimal
outgo except for the weaker States. All expected to gain due to increased compliance.

446 INFORMATION TECHNOLOGY


E-Filing Process
6. State Government
(a) Proliferation of computerization leading to fall in transaction costs: Due to increase in computerization
due to GSTN, the tax administration would be easier and cost of collection would be less.
(b) The Destination Principle: States which are net consumers would benefit due to the accrual on
destination. The producing States may have a comparative disadvantage.
7. Impact on the country
(a) Increased FDI: The flow of Foreign Direct Investments may increase once GST is implemented
as the present complicated/ multiple tax laws are one of the reasons foreign Companies are
wary of coming to India in addition to widespread corruption.
(b) Growth in overall revenue: It is estimated that India could get revenue of $15 billion per annum
by implementing the Goods and Services Tax as it would promote exports, raise employment
and boost growth. Over a period, the dilution of the principles may see that only part of this
is accruing.
(c) Single point taxation: Uniformity in tax laws will lead to single point taxation for supply of goods
or services all over India. This increases the tax compliance and more assesses will come into
tax net.
(d) Simplified tax laws: This reduces litigation and waste of time of the judiciary and the assessee
due to frivolous proceedings at various levels of adjudication and appellate authorities. Present
law appears to be much worse and an amalgam of the bad parts of VAT/ ST/ CE.
(e) Increase in exports and employment- GST could also result in increased employment, promotion
of exports and consequently a significant boost to overall economic growth and factors of
production -land labour and capital.
Overall Impact
(a) Change in law and procedure: Since it is a major indirect tax reform in India, there would be new
legislations and procedures. The entire indirect tax code would be a new one.
(b) Change in tax-rates: The standard rate of 12.5 % for central excise, Service tax, along with
residuary rate of VAT at 12.5-14.5% brings the overall rate to 25%-30%. But, post GST, the
general rate will be 18%; a net gain of almost 7%-12%. Most of the dealers and consumers would
experience the change in tax rates, either significantly or marginally. When the tax rates are
increased for some products it could lead to continued tax evasion as well.
(c) GST based on HSN: The central excise tariff based classification which had stabilized over a
period of time may no longer be applicable. The present rate structure would substantially
increase the interpretational issues in respect of class of commodities. Disputes expected to
mushroom in the coming years.
(d) Availment of tax credit: GST would facilitate near seamless credit across the entire supply chain
and across all States under a common tax base. At present no cross credits are available across
central excise/service tax to local VAT/sales tax. Under the GST law, the input tax credit
(ITC) (set off) would be given for Central GST against CGST and the States would give input
tax credit (ITC) SGST to SGST. Cross-utilization of credit between Central GST and State GST
would not be allowed.

INFORMATION TECHNOLOGY 447


Accounting Package
(e) Credit availment based on vendor’s invoices: The credit of excise duty paid is available based on
the excise invoice raised by manufacturer or service provider. The credit is available under
the Service Tax law when the invoice amount is paid within 6 months of the invoice date. In
respect of joint charge and reverse charge, based on receipt of payment on the basis of payment
challans of the assessee. Under State VAT law, credit is allowable on the basis of tax invoice.
Under GST the credits could be availed based on the invoices of vendors under CGST and
SGST. But the onus may shift onto the assessee to ensure that the amount of the CGST/SGST
has been deposited in the respective Government treasury by the vendor. This provision has
been added to bring in tax discipline but smaller businesses may find transaction cost increasing
due to this.
(f) Avoidance of Double Taxation: Presently, several transactions suffer VAT as well as Service Tax
such as works contract or licensing of software. This could be resolved under the GST regime
by redefining what is goods and service.
(g) Changes in the Accounting Software: Dealers and service providers need to modify/replace the
accounting and taxation software. Initially there could be investment costs, costs of training
in GST of people at each level starting from junior/mid to higher level managerial staff,
management group/stakeholders.
(h) Training: Comprehensive training would be required to the staff members of the business
community, both at senior level and also at junior level across the purchase, sales and finance
functions. VAT + CE/ ST officers would also need to understand the law well.
(i) Competent Professionals: There are specialized consultants for Excise Duty, Service Tax and
VAT. With the GST, only a single consultant maybe required who can handle all GST matters.
Compliance for the SME may necessitate competent tax preparers.
(j) Amending existing contracts: Assessees have to incorporate an extra clause in the existing
contracts to collect CGST and SGST as applicable.
Impact on Specific Sector
Impact on Agriculture
1. In India, food items are generally exempt from central excise duty. But many food items,
including food grains and cereals, attract State VAT at 4-5%.
2. The exemption under the State VAT laws is restricted to unprocessed food, e.g., fresh fruits
and vegetables, meat and eggs, and coarse grains.
3. These items would be subject to tax in GST at nil rate when unbranded and at a lower rate, 5%
(combined GST rate), which, if so, would certainly make some of these items dearer.
Impact on Works Contract
Works contracts are composite contracts involving material and labour. The material portion
involving the supply of goods is taxable to Value Added Tax (VAT), while the service portion is
liable to service tax. If a new commodity comes into existence, in the process of executing a works
contract, then, Central Excise duty may be levied.
Under GST law, works contract could be taxed on gross value with ITC on goods and services being
available. It would be considered as a service. It would be at 18%.in general and if value of land were
included 12%. Credit in respect of Steel, cement, electrical items would more than offset the present

448 INFORMATION TECHNOLOGY


E-Filing Process
net tax in most States for projects stared after GST implementation. However, projects in progress
maybe severely impacted. Clarity is expected.
Impact on Leasing Companies
1. At present, if there is transfer of right to use goods involving transfer of effective control and
possession, then it is subject to VAT; otherwise, it is subject to service tax.
2. Under GST it would be a service.
Impact on International Trade
Importers of goods and services may be affected under the GST regime due to -
1. Change in tax rates leading to higher tax incidence when the goods or services are imported
into India from outside India.
2. Exports of goods and services shall continue to be zero rated and eligible to claim refund of
input tax credit which could be fast tracked.
Impact on Pure sale of Land or completed building
As they already attract stamp duty may be kept out of GST purview.
Other Impact
1. The 5 specified petroleum products namely Petroleum Crude, Motor Spirit(petrol), High Speed
Diesel, Natural Gas and Aviation Turbine Fuel as well as electricity are outside the ambit of
GST. In addition, tobacco would attract other taxes applicable in addition to GST.
2. At present products known as sin goods and luxury items are taxable not only at higher rate
of tax but also subject to multiple taxes. Under GST they may be taxed at 28% + cesses upto
160%.
Challenges before the Government
Most concerns expressed about the implementation of GST can broadly be divided into three
categories –
A. Design issues
B. Operational issues
C. Infrastructure issues.
A. Design issues
The broad framework of GST is now clear. This is on the lines of the model approved by the
Empowered Committee of the State Finance Ministers in much diluted form. The Revised Model
GST law in terms of quality is analysed hereunder.
Is it simple? – No, amalgam of CST, VAT, CE, Customs; stringent rules expected to be moderated
over period of time.
Is it certain? – No. Increased uncertainty as drafted by tax officers. Next 2 years we can expect a slew
of changes.
Is it fair? – No. Revenue augmentation/ safety have been focused and business needs have not been
addressed fully. Seamless credit is not a reality- restrictions exist in law and also poor drafting will

INFORMATION TECHNOLOGY 449


Accounting Package
lead to denial. Many products the total tax has increased. The concept of equalizing the earlier tax
rate is not in line with inviting those outside to join in. There should have reduction in tax rates of
evasion prone products.
It is transparent? -Yes – due to adoption of information technology- process may be able to keep
distance between the tax payer and officers.
The GST would be a dual tax with both Central and State GST component levied on the same
base. Thus, all goods and services barring a few exceptions would be brought into the GST base.
Importantly, there is no distinction between goods and services for the purpose of the tax with a
common legislation applicable to both.
However, a number of issues remain to be resolved, which are under the consideration of the
Empowered Committee. These issues include:
(a) Enactment of Legislations - It has been stated by the Finance Minister that there would be no
power to tax, if GST is not implemented before September 2017. The date of 1st July seems to
be possible as of now.
(b) GST Rates: Finalizing the rate structure with clarity and with list of exemptions considering
the unintended impact.
B. Operational issues
(a) Common approach of the States, i.e., a common law, a common assessment procedure and
even a common return.
(b) Monitoring of inter-State trade by flying squad and a computer-generated number for every
supply of goods.
(c) Sharing of information using comprehensive IT network.
(d) Improving relations between the Centre and the States.
C. Infrastructural Issues
(a) IT infrastructure - A simple system for inter-State transactions and verification of dealers is
essential to ensure tax compliance and check avoidance. Given the volume of such transactions,
this system necessarily has to be IT based. GSTN appears to be on the job proactively testing
the beta version. It can plug in for States which are not ready. However, SMEs would need
to educate themselves and comply which is not practicable for the uneducated and the
unorganized.
(b) Decision on elimination of Check Posts to avoid enormous delays in road traffic, and reducing
delivery times for goods.
(c) Impact on Small Enterprises - The impact of GST on small enterprises is often cited as a concern.
On the State GST component, the position would exactly be the same as under the present
VAT regime. There may be three categories of small enterprises in the GST regime:
 Those below the threshold of Rs. 20 lakhs (10 lakhs in case of specified) need not register
for the GST. Practically they can only be in business to consumer traders/ manufacturers/
food service providers.
  Those between the threshold and composition turnover of Rs. 50 Lakhs have the option
to pay 2.5 per cent in the case of manufacturers and 1 per cent in the case of traders.

450 INFORMATION TECHNOLOGY


E-Filing Process
Given the possibilities of input tax credit, not all small enterprise that do B2B business
may seek the turnover tax option. Practically they can only be in business to consumer
traders/ manufacturers/ food service providers.
 The third category of small enterprises above the turnover threshold would need to be
within the GST framework.
(d) Harmonization - For GST to be effective there should be identical GST laws across States as
well as at the Centre. Moreover, not only the law but also the procedures relating to levy,
assessment, collection and appropriation of the GST should be similar across States and the
Centre. It would be so, we await the analysis of the SGST law in all States.
(e) There should be a thorough re-engineering of the departments of SGST and the CGST. This is to
clearly define the responsibility, accountability and authority of both departments. The day-
to-day operations should be assigned to the States. The dealers would register and submit
their return to the State department where they are located. The dealers should interact with
a single tax authority only.
(f) Cross-verification of documents must be strengthened - In the absence of proper cross-verification;
the dealers avoid tax payment and claim undue credit for taxable sales. Tax evasion can
be prevented by setting up departments similar to centralized and regional anti-evasion
organisation as in France.
(g) Common procedure for Levy, assessment, collection and appropriation - For industry to reduce the
transaction and compliance costs, it is necessary that apart from a common law, implementation
of the law also be similar across States. All stages of the taxation chain from the levy of the tax
to its assessment, collection and appropriation should be similar. This would involve similar
rules across the States dealing not only with assessments, audit, refunds, but also more basic
issues, like registration, filing of returns, treatment of transportation of goods etc.
(h) A common dispute resolution mechanism as well as a mechanism for giving advance rulings would
further facilitate trade and industry.
(i) Persuasions of the State Government - Few State Governments have recently indicated their
opposition to the implementation of GST at the present juncture. While their objections need
to be carefully examined, it must also be recognized that while implementation of the GST is
aimed at being revenue neutral to the States, it would be budget positive for the Government.
This is because Governments are large purchasers in the market for their own consumption
and their cost of procurement would come down significantly with the implementation of
GST.
(j) Role of the Finance Commission - It is possible that some States may want assurances that existing
revenues would be protected when they implement GST. The Commission is willing to consider
providing for compensation in order to advance the implementation of a “flawless” GST.
(k) Training - Since the dual GST is considerably different from the present indirect tax regime, a
massive training initiative would be required at both Federal and State levels to familiarize
the respective administrations with the concepts and procedures of the dual GST. However,
the task is not limited to technical training but also extends to a similar effort to re-orient the
attitude and approach of the tax administration in order to achieve a fundamental change in
mindset.

INFORMATION TECHNOLOGY 451


Accounting Package
(l) Compensation Package to the States for Losses - Another major challenge before the Government
is to finalize the compensation package for the States in case of loss due to implementation of
the GST.
Centre has provided five-year compensation period.
Under the GST structure, the tax would be collected by the States where the goods or services are
consumed, and hence losses could be unfavorable for the producer States and the Centre would be
required to compensate them for loss of revenue.
It is now universally acknowledged and recognized that the GST, in whatever form, should be
introduced at the earliest as a fundamental fiscal reform measure. If we are really serious about the
early introduction policy makers, as also the tax administrations at the Federal and State levels,
need to be immediately galvanized into action under a clearly laid-out timetable for introduction
and implementation.
GST preparedness –The Way Forward
The GST Act 2017 indicates that the Government may be ahead of the industry and professionals
in GST.
The essence of a GST regime is that it removes the cascading effect of CENVAT and Service tax with
set-offs. Although a transparent and corruption-free tax administration is yet another purpose of
this new Act, its implementation may not be without administrative challenges and legal hurdles.
It is just important that in order to accomplish the objectives of such a regime, business entities
be prepared. Along with having to comprehend, analyze and comply with the perplexing laws
of CGST and IGST, greater challenge could come when each State has its own SGST enactment,
which would lead to a multiplicity of the SGST laws and procedures unless all States agree on basic
commonalities in the SGST law.
Business entities need to take many actions as part of their preparation. Some of the main actions
are listed below:
(a) Sensitize the business eco-system: It is an accepted fact that GST is not merely a tax change
but a business change as it would impact all functions of an organisation such as finance,
product pricing, supply chain, information technology, contracts, commercials etc. Thus, it’s
imperative that all these functional teams should be aware about the GST. But the underlying
question is what should these team members read/ refer for GST?
In this regard, it’s pertinent to note that most of the key aspects of the proposed GST regime
are contained in the Model law though procedures are yet to be finalized.
Thus, based on the aforesaid knowledge available in public domain business entities may
consider sensitizing its employees.
They can consider sensitizing its entire business eco-system i.e. not only the employees but
also vendors (such as Tier-1, Tier-2 vendors etc.) and key customers of the organisation. An
early initiation of training would give the concerned employees, vendors and customers a
sense of involvement in discussion much before GST legislation is put in public domain.
(b) Understand GST Impact on operations GST may provide opportunities but at the same time it
could bring threats. Given this, an organisation may consider carrying out an exercise to identify
how its operations would get impacted because of GST. For GST Impact Analysis exercise, the

452 INFORMATION TECHNOLOGY


E-Filing Process
respective department heads such as finance, supply chain, product pricing, human resource
etc. should be involved to ensure that they provide their inputs and suggestions.
Going one step forward, entities can also identify possible cost savings which key suppliers /
vendors could be entitled to in the proposed GST regime. Based on the possible cost savings
to suppliers / vendors, they can have discussion with its vendors for passing of benefits by
way of cost reduction in the coming years (i.e. after GST is introduced). Early discussion and
engaging with vendors for GST would ensure maximum possible benefit to be passed on to
the organisation.
Business entities in service sector would also have to take into consideration the increase (most
likely!) or decrease (least likely!) in tax compliances. For most of the entities, in GST regime,
compliances are expected to increase dramatically. Take example of a service tax assessee, who
currently files 2 returns on an annual basis. Now, in GST regime, Service tax assessee could be
required to file as many as 61 returns (5 returns per month plus 1 annual return)!!! Thus, the
human resource department would have to be informed about the GST regime so that they
can anticipate the increase (and decrease in certain cases) in the manpower.
(c) Gear up for transition of Information Technology (IT) systems - Information Technology
is a key area for business organisations as irrespective of the fact whether the organisation is
ready or not, on the very first day GST is introduced, the information technology system of an
organisation has to be ready and running else it would bring the entire business to standstill.
(d) Design Alternate Business Strategies - To gear up for GST regime, the organisation may
identify alternate efficient business strategies to ensure smooth transition to GST. Even, supply
chain strategies is expected to undergo a major change as entire India would become one market
and there may not be any tax cost involved for intra-State vis-à-vis inter-State procurement of
goods. An organisation would have to re-visit their pricing strategies as business competitors
may well reduce prices of their product to pass on the GST benefits.
However, while forming alternate business strategies, it goes without saying that the
organisation should take into consideration the commercial feasibility of alternate business
strategies before these strategies are recommended.
(e) Make representation before the Government - Introduction of GST regime could affect
negatively (than positively!) few industries/ sectors. Thus, efforts should be made to identify
the possible issues for which appropriate representation could be made before the Government
though various trade chambers and forums.
Given this, while current economic situation is characterised by volatile economic conditions,
introduction of GST remains a ray of hope; thus, early initiation of aforesaid steps can certainly
help the organisations gain insight of all aspects of the proposed GST regime.
(f) Thorough reading of the GST law draft to pre-empt the possible consequences on one’s business
(g) Assessing the manner and quantum of input credit as available under law.
(h) Evaluation of the competitiveness and the demand for the products in the backdrop of the
new GST rate structure to ensure that products are neither overpriced nor under priced
(i) Preparation of procedures/SOPs to be followed in the organization

INFORMATION TECHNOLOGY 453


Accounting Package
(j) Special attention to:
  Registrations – existing migrants as well as new applicants
  Records to be updated up to the authorized date and necessary amendments/ additions/
deletions to be made in records for meeting the requirements of the new law
  Transition requirements
  Returns to correctly reflect the details of business e.g. CENVAT credit as reflected in the
return for the period ending 30th June, 2017, would only be allowed to be carried forward
post the authorized date
  Inventory check and proper recording
  Development of IT infrastructure to support the GST requirements
  Analysing the MIS reports that would be required post GST implementation
  Analyzing impact of other laws and integration with customs and FTP
(k) Spreading of GST awareness / Trainings: To ensure that the transition is smooth and effected
in a timely and effective manner, spreading of adequate awareness of GST is a must. Regular
workshops and training programs need to be conducted in order to understand the applicability
of GST provisions vis-a-vis the existing business of a person/organization. The following steps
could be taken in this case:
  Start focused reading/ practice in CST/ VAT, Central Excise or Service Tax now!!
  Use online resources – idtc.icai.org, Google GST, caclubindia, yahoo CA groups,
taxindiaonline, linked in.
  Form a small group for GST in your area, meet regularly to understand the latest
developments.
  Make yourself ready before GST is implemented to add value to your organization /
clients.
  Read books/ attend workshops/ seminars on topic.

454 INFORMATION TECHNOLOGY

You might also like