Module 5 Part 2 Computer Controls
Module 5 Part 2 Computer Controls
Module 5 Part 2 Computer Controls
Topics to discuss
TRANSFER OF
ACCESS INPUT STAFF ISSUES
DATA
SPECIFIC
PROCESSING OUTPUT CONTINUITY ISSUES
QUALITY OF
COMPUTER OPERATING
ACCESS MANAGEMENT
FRAUD ISSUES
INFO
CONTROLS IN AN INFORMATION TECHNOLOGY
ENVIRONMENT
Risks and controls in IT system will depend on the characteristics of the IT system
CONTROL RISKS IN AN IT
ENVIRONMENT AUDITOR NEEDS TO ESTABLISH THE
(examples) EXISTENCE OF EFFECTIVE IT CONTROLS
= Programs processing data DESIGNED TO ENSURE THE INTEGRITY OF
inaccurately INFORMATION AND SECURITY OF DATA
= Inaccurate data
= Failure to make necessary
changes to systems Controls can consist of:
= Unauthorised access to data = Automated controls
= Inappropriate manual = Manual controls independent on IT
intervention = Manual controls dependent on info
= A breakdown in segregation of produced by IT
duties = Limited to monitoring the effective
functioning of IT automated controls and
exceptions
CONTROLS IN AN INFORMATION
TECHNOLOGY ENVIRONMENT
What are the benefits of IT controls?
User controls
Programmed controls
Access controls apply to both general controls (data and
program) and Information processing controls (validity
of input, processing and output)
Umbrella controls under which each application will
operate
Objective of GC
Encompass/ surround the framework of overall
controls over IT activities providing a reasonable
level of assurance that the overall objective of
internal controls are achieved.
IMPORTANCE OF GC
◦ Have profound influence over the environment
within which Information processing controls
operate.
GENERAL COMPUTER CONTROLS
Systems maintenance
To ensure changes to system is authorised, meet user’s
needs and made effectively.
Business continuity
Prevent/Limit system interruption
Self developed (in house)
System development Purchased
APPROVAL
◦ Final approval for implementation after testing and
correction of errors by management, users and IT
TRAINING
◦ Training of staff and user manuals
SYSTEM DOCUMENTATION
◦ Maintain comprehensive system documentation for all
systems analyses, programming and system descriptions
BACK-UPS
◦ All programs – back up and stored in program library at
separate premises.
CONVERSION
◦ Plan, control the conversion
POST-IMPLEMENTATION REVIEW
◦ Consider if successful and address any difficulties
LONG-TERM PLANS
◦ Devised for future system changes
PACKAGES
User has little control over specifications, development and
testing of package
Emphasis thus on determining if the package meets the
users’ requirements
Controls over implementation and testing
Steps to take:
Perform a feasibility study to determine:
◦ Users’ needs, specifications and requirements of available
packages, costs, assistance and support of the supplier,
adaptability and expansion ability of the packages, standing
and reputation of the supplier
IMPLEMENTATION
Consisting of:
USER AUTHENTICATION
USER AUTHORISATION
= Identification of a user
through unique logon = Access rules to determine
identifications, passwords, the computer resources
access cards etc. each use may access
PROGRAM SECURITY DATA FILE SECURITY
= Implemented by
computer software
PHYSICAL CONTROLS
= Implemented by users
Terminals and other Identification of Authorisation of
electronic devices users users
Communication lines
Password controls Restrict access
and networks
Controls in case of
emergency
OBJECTIVE
43
General controls Information processing controls
System development &
Transaction data Objectives
implementation controls
Input *validity
Systems maintenance
Processing
Organisational and management
*completeness
controls
Master file *accuracy
Access controls
(standing data)
Computer operating controls
Output
System software controls
Business continuity
44
= Controls over input, processing, output & master
file maintenance of information to ensure it is valid,
◦ Consists of useraccurate
& programmed controls
& complete
(Relates to the control procedures (manual or
automated) to initiate, record, process and report
transactions)
Capturing or Processing of
Final form in
initiation of transaction to
which data is
transactions ensure that
used
on a specific individual
application. components
eg, Pastel or are recorded
Peoplesoft correctly into
various files
and databases 46
Control Objectives
Validity, completeness & accuracy of
transactions (input, processing & output)
Validity, completeness & accuracy of standing
data (master files)
Explain the following concepts:
• Application program
• Information processing control
• User controls
• Programmed controls
• Transaction files
• Master files
• Control objectives
47
OBJECTIVE
To implement controls designed to ensure that
data entered to update the master files is
VALID, COMPLETE AND ACCURATE
POSSIBLE ERRORS:
• Unauthorised data/transactions entered onto the system
• Errors in creation of data on the source document, or
during the capturing of data onto the computer application
• Errors in capture/input of data
• Data could be lost during the input
• Data could be added to or altered
• Errors in correction and re-entering of rejected data
• Corruption of data during capture or transfer
48
Accuracy Completenes
• Matching • Sequential
• Edit/validation numbering
Validity
checks • Matching by
• Access controls
• Authorisation of tx • Batch input and the compute
• Authorisation of processing • Field presenc
• Matching • Review by
• Edit/validation user/senior staff
checks • Batch input and
• Batch input and processing
processing • Use well-designed
• Use user-friendly documents to
screens to minimise errors
minimise errors • Staff training 51
EDIT/VALIDATION CHECKS
53
VALIDITY
USER CONTROLS
COMPUTERISED /
PROGRAMMED CONTROLS
• Segregation of duties,
staff training and staff
• Access controls
recruitment policies
• Authorisation of tx
• Authorisation of tx by
• Authorisation of
users
changes to data
• Review of authorisation
• Tx generated by
procedures
computer
• Authorisation of changes
• Validation checks
to data 54
COMPLETENESS, ACCURACY AND
VALIDITY
USER CONTROLS
COMPUTERISED /
• Control totals and
PROGRAMMED
reconciliations
CONTROLS • Batch processing
• Reviewing of output
• Control totals and reports by users
reconciliations • Regular back-ups
during input and after
processing
• Batch processing • Adequate error
correction procedures
55
OBJECTIVE
To implement controls designed to ensure that
only valid data (valid and authorised) is
processed, and that data is processed
completely and accurately by the computer.
Possible errors:
• Data could be lost during processing
• Invalid data could be added during processing
• Data could be altered during processing
• Calculative or accounting errors could occur
• Existing data being duplicated
• Incorrect version of the program or data file being used
56
COMPLETENESS
USER (MANUAL)
COMPUTERISED /
CONTROLS
PROGRAMMED CONTROLS
• Reconciliation of
• Reconciliation of
control totals
control totals
• Sequential testing by
• Sequential testing by
the computer
the computer
• Reconciliations of
• Reconciliations of
accounts/balances
accounts/balances
• Logs of processing
• Logs of processing
• Breakpoint re-runs
• Edit tests by computer
• Processing errors
program
should be reported
• Control over
• Adequate back-up
transmission of data
procedures
57
ACCURACY
USER (MANUAL)
CONTROLS
COMPUTERISED / • See completeness:
PROGRAMMED CONTROLS Exception reports,
• Controls over batching and
computer hardware reconciliation
• Edit checks • Operator’s manual
• Exception reports and user
• Reconciliation and instructions
balancing • Supervision and
review by
competent staff 58
VALIDITY
COMPUTERISED /
PROGRAMMED CONTROLS
• Access controls
• Librarian function USER (MANUAL)
• Internal/external CONTROLS
labels • Authorisation of
• Record comparison overrides
and matching • Authorise manual
• Monitors and intervention
prints abnormal • Use of logs
activities for review
by users 59
• Audit trails
OBJECTIVE
To implement controls designed to protect the
integrity of master file information, to ensure
that only valid changes (valid and authorised) to
master files are processed, and that changes
are processed completely and accurately by the
computer
Possible errors:
• Unauthorised amendments
• Not all authorised amendments being updated on master
files
• Errors in capturing amendments, which result in all financial
information that is dependent on the master file being
processed incorrectly
• Errors contained in the master file data going undetected 60
OBJECTIVE
To implement controls designed to protect the
integrity of master file information, to ensure
that only valid changes (valid and authorised) to
master files are processed, and that changes
are processed completely and accurately by the
computer
61
COMPLETENESS
USER CONTROLS
COMPUTERISED /
PROGRAMMED CONTROLS
• Reconciliation of
changes with the
• Sequentially list/register of
numbered audit requests for
trail of master file changes and
changes is follow-up of
produced outstanding items
62
ACCURACY
USER CONTROLS
COMPUTERISED / • Reconciliation of
PROGRAMMED CONTROLS
master file changes
• Edit/validation with master-file
checks are amendment forms,
performed over and with third
data capture party
documentation
63
VALIDITY
USER CONTROLS
• Written
COMPUTERISED / authorisation of
PROGRAMMED CONTROLS
changes
• Access controls • Checking of
changes to master
files
64
COMPLETENESS, ACCURACY AND
VALIDITY
COMPUTERISED /
PROGRAMMED CONTROLS
USER (MANUAL)
• The master file is CONTROLS
protected by:
• Regular review by
• Encryption
management
• Library controls
• Record counts
• Reconciliation
65
OBJECTIVE
To implement controls designed to ensure the
completeness and accuracy of output and to
control distribution of output to authorised
users
66
COMPLETENESS
USER (MANUAL) CONTROLS
• IT control to follow up on
missing numbers
• Reviewing of output
COMPUTERISED / reports by users
PROGRAMMED CONTROLS • Reconciliation of input to
output by IT
• Sequentially • Sequence check on
page/document nr
numbered • Page counts
• Reviewing of reports by
users for
missing/duplicated items
67
VALIDITY (AUTHORISATION)
USER (MANUAL) CONTROLS
COMPUTERISED /
PROGRAMMED CONTROLS • Distribution list of
authorised users, listing
• Logs, listing to whom output is to be
activities and sent
• Distribution schedule
output produced, • Distribution controlled by
maintained by the IT control group
computer system – • Distribution register in
which users sign for
Regular reviewed receipt
by IT group for • Review of reports by users
unauthorised
output 68
ACCURACY
USER CONTROLS
69
CONFIDENTIALITY
USER CONTROLS
70
EXTENT
Determined by:
= Assessment of
NATURE
materiality
= Assessed risk
= Inspection TIMING
= Degree of
= Observation = Depend on the
assurance the
= Enquiry auditor’s objective
auditor plans to
= Re-performance = Should cover the
obtain
= Combination of whole period
above
Items can be
selected using
professional
judgement or
statistical methods
CONTROL TEST OF CONTROL
Auditor’s responsibility
* Communicate significant deficiencies
DEFICIENCY
= Control is designed,
SIGNIFICANT DEFICIENCY
implemented or operated in
= deficiency or a combination
such a way that it is unable to
of deficiencies in internal
prevent or detect and correct
control that in the auditor’s
misstatements in the AFS on a
professional judgement is of
timely basis
sufficient importance to merit
= Control necessary to prevent
the attention of those charged
or detect and correct
with governance
misstatements in the AFS on a
timely basis is missing
ISA
265