CIS Reviewer
CIS Reviewer
Application Controls-
- consist of manual and automatic procedures that relate to specific accounting systems such as payroll,
accounts, receivable and cash disbursements.
- the purpose is to ensure an acceptable level of internal control in each accounting system. - these are
located in each of the data processing functions of input, processing and output.
A. Controls methodology - a description of the role that controls play in accounting systems. - auditors
must make a series of evaluation and determination before the usefulness of controls can be defined.
a. Unreliable data
b. Improper processing
e. Operational inefficiency
B. Audit trail - consists of the input, processing and output documentation and file data that permit the
tracing of transaction processing.
Risk controllable during data entry: a. Unreliable data i. Omission ii. More than once iii. Inaccurate data
Risk controllable during data entry: b. Non-adherence to accounting policies i. Wrong accounting period
ii. Improper valuation or classification c. Loss of assets and records i. Unauthorized/invalid transactions
C. Data entry controls: prevention and detection
Prevention Controls a. Computer assisted procedures > screen formats and computer dialogue Detection
Controls a. Data entry validation tests b. Record confirmation check c. Data approval test
D. Processing controls
Risk controllable during processing: a. Unreliable data i. Incorrect calculations ii. Incorrect processing
logic iii. Use of wrong file / record
Risk controllable during processing: b. Adherence to accounting policies i. Wrong version of the program
c. Loss of assets and records i. System generated transactions and financial entries may not be in
accordance with agreed policy.
Prevention Controls a. General controls Detection Controls a. Arithmetic accuracy test i. Double
arithmetic, e.g., reverse multiplication ii. Overflow check b. Dual field input c. Run-to-run totals
Correction Control a. Errors corrected and processed with current job b. Errors removed and corrected
subsequently c. Errors discovered subsequent to processing - Corrected through adjusting entry
E. Output controls
Risk controllable during data processing output: a. Unreliable data i. Output received by the user may be
inaccurate or incomplete ii. Non-adherence to accounting policies iii. Improper classification and
valuation
Risk controllable during data processing output: b. Loss of assets and records i. Distribution or display to
unauthorized individuals
Prevention Controls i. Distribution checklist and schedule Detection Controls i. Review of the checklist
and schedule Correction Controls i. Should be corrected at source
b. Integration of types of tests i. Separate tests on each program or file ii. Single tests combining the test
of programs and files iii. Multiple tests combines mixture of compliance and substantive tests
Conditions necessary for using approach The auditor must be able to:
2. read the source documents and accounting reports without the aid of a computer
3. trace transactions from the source documents to the accounting reports and from the accounting
reports back to the source
- using standard financial accounting software, modified as necessary for a particular system.
- generally, much of the same information is requested and analyzed as in a traditional audit.
- once verified using computer techniques, data is retained so it can be used in other areas of the audit
including error identification and segregation of transactions within accounts.
- customized reports are generated by computer and a standard audit trail is maintained.
- data analysis is focused and allows for any future adjustment to be made with minimal effort.
- preliminary data can be analyzed early in the audit process and a more efficient audit plan can be
devised earlier.
Computer Assisted Sampling -permits the use of random statistical sampling, which tends to be more
accurate and saves time in those instances in which it is appropriate.
File Management - files are combined, compared, managed, segregated and ordered automatically using
generally accepted computerized file management.
Report Generation - once data integrity is verified, the auditor can produce various reliable reports from
the overall data population.
Commonly Used Compliance Testing Techniques
- test data
used to verify: - input validation routines; - error detection capabilities; - processing logic and
calculations; - the accuracy of reports;
- provides an in-built testing facility through the creation of a dummy department or company
within the normal accounting system.
- parallel simulation
- Utility programs are used to compare two versions of a program, and report difference
between the two. - to ensure that only authorized changes have been made.
- it generally involves a fair degree of programming skill, and a thorough knowledge of program
specification
Using audit software to review information held in computer files, by performing the following:
7. comparing the contents of two or more files, and printing either record matches or exceptions;
- It examines each transaction as it enters the system based on selection criteria before further
processing.
Types of CIS
- One that is not connected to or does not communicate with another computer system.
- All input data and its processing takes place on the machine.
- A desktop or laptop computer that is used on its own without requiring a connection to a local area
network (LAN) or wide area network (WAN).
On-Line CIS
- computers or devices are connected to a network for purposes of real-time processing of transactions
and immediately update the corresponding files.
- enable users to access data and programs directly through terminal devices.
- general purpose terminals such as basic keyboard/screen, intelligent terminals that can perform a
certain amount of data validation, and microcomputers. - special purpose terminals such as POS devices,
automated teller machines, and voice response systems such as those used in telebanking.
Database System
- allows users to interact with one or more databases and, - provides access to all of the data contained
in the database
Database Management System
- a "software system that enables users to define, create, maintain and control access to the database".
Functions