Chapter 7 Characteristics of CIS Environment v2
Chapter 7 Characteristics of CIS Environment v2
Manual Accounting
Receipt >
1. Meaning
*Columnar Journal, worksheet vs Quickbooks
*Practice Set
2. Recording
*You cannot record a transaction without the books at hand vs Quickbooks (mobile
app/laptop)
3. Calculation
*Prone to error vs more accurate information
*Sample (Quickbooks Journal Entry and Sales Invoice)
1. Meaning
*Columnar Journal, worksheet vs Quickbooks
*Practice Set
2. Recording
*You cannot record a transaction without the books at hand vs Quickbooks (mobile
app/laptop)
3. Calculation
*Prone to error vs more accurate information
*Sample (Quickbooks Journal Entry and Sales Invoice)
Computerized Accounting
Receipt >
1. Meaning
*Columnar Journal, worksheet vs Quickbooks
*Practice Set
2. Recording
*You cannot record a transaction without the books at hand vs Quickbooks (mobile
app/laptop)
3. Calculation
*Prone to error vs more accurate information
*Sample (Quickbooks Journal Entry and Sales Invoice)
Lack of Visible Transaction Trail - one of the reason why auditors having a hard
time
Manual (physical paper) vs CIS virtual documents ( pdf invoice)- cannot be read
without a computer.
Auditors need pdf reader and other software to read the documents)
Consistency of Performance
Programmed (AI technology)- Uniform manner (less clerical errors)
If programmed incorrectly, errors are also consistent (controls)
Concentration of Duties
Recording/Disbursement in Manual Accounting (Lapping/Fraud) vs Automated (Bill Pay
and recording) -
Incompatible duties can be combined in a CIS environment, cost benefit
AI has no motivation to commit fraud
Application Controls
General Controls
Internal Control in a CIS Environment
7
- Relates to the overall CIS
General Controls
Organizational Controls
Systems Development and Documentation Control
Access Controls
Data Recovery Controls
Monitoring Controls
8
General Controls
1. Organizational Controls
a. Segregation of duties between the CIS department and the user department.
9
General Controls
These relates to the overall computer information system
Segregation between the CIS department and the users
- CIS/IT dept separated to users and all departments (sales, purchasing
department, etc)
- To avoid fraud – user want to commit fraud , he can do it if he has duties as
well in the CIS Dept
Systems Analyst - design and develop software and computer systems. They also
improves existing systems. (Formulation and thinking)
Data Entry Operator - prepares and verify input data for processing
11
General Controls
2. Systems Development and Documentation Control
The accounting software developed by the systems development team must be tested,
modified and approved by the appropriate level of management
13
2. Systems Development and Documentation Control
Documentation Control
General Controls
3. Access Control
Systems should have adequate security controls The computer should only be accessed
by authorized individuals
14
3. Access Control
Data recovery is the process of restoring data that has been lost, accidentally
deleted, corrupted or made inaccessible. In enterprise IT, data recovery typically
refers to the restoration of data to a desktop, laptop, server or external storage
system from a backup
15
3. Data Recovery Control – back up files and off site storage procedures
- Computer files are copied Daily and store them OFF SITE (USB disket)
- Cloudbased technology (online) google drive , dropbox , built in system
(quickbooks online)
- Grandfather – father son
In the traditional GFS approach, a full backup is completed on the same day of each
month (for example, the last day of each month or the fourth Friday of each month—
however you want to define it). This is the “grandfather” cycle. It’s best practice
to store this backup off-site or in the cloud. This also helps satisfy the off-site
requirement of a 3-2-1 strategy.
Next, another full backup is set to run on a more frequent basis, like weekly.
Again, you can define when exactly this full backup should take place, keeping in
mind your business’s bandwidth requirements. (Because full backups will most
definitely tie up your network for a while!) This is the “father” cycle, and,
ideally, your backup should be stored locally and/or in hot cloud storage,
like Backblaze B2 Cloud Storage, where it can be quickly and easily accessed if
needed.
Last, plan to cover your bases with daily incremental backups. These are the “son”
backups, and they should be stored in the same location as your “father” backups.
General Controls
5. Monitoring Controls
Application Controls
General Controls
Internal Control in a CIS Environment
17
Application control – specific use of a system or software
- all transactions are authorized, complete,
accurate and timely
Transaction Processing in CIS Environment
Input
(User)
Process
(Computer/Program)
Output
18
Processing of Transactions in CIS Environment
Application Controls
Input Controls
Processing Control
Output Control
19
Specific app, or program you are using (Xero Quickbooks)
- goal : completeness and accuracy of the records/validity of the entries
made,
Input Control
- data should be properly authorized and approved
- human readable data to computer readable data
- prone to error – that is why we need control
- reasonable assurance that the data submitted for processing are complete,
authorized accurate
Application Controls
1. Input Controls
Key Verification
Field Check
Integrity test/ Validity Check
Self Checking Digit/Check Digit
Limit Check
Control Totals /Batch Input Totals
Financial Totals
Hash Totals
Record Counts
20
Key Verification
- Data are entered twice (usually by different person) to secure that there are
no key entry committed.
Batch Total Input Control – The sum of a particular field in a collection of items
used as a control total to ensure that all data has been entered into the computer
(completeness)
Application Controls
2. Processing Controls
Integrity test/ Validity Check (input control)
Sequence Test
Input Control totals verification (Input control)
Label Check
Limit and Reasonable checks (input control)
Matching Control
23
Why do we need processing controls? if input controls fails or not detected errors,
hoping it be caught on the processing controls
Error/Report or Exception Report:
Where these processing controls embedded in the system, during the development
stage of the system (programmer)/incorporated in the system
Processing Controls – provide reasonable assurance that the input data are
processed accurately , and that the data are not lost , excluded , duplicated, or
improperly changed. Almost all Input controls are also processing controls
Application Controls
3. Output Controls
Visual review of the output
Output comparison to original documents
Output distribution control (authorized people only)
24
Output Controls – provide reasonable assurance that the results of processing (FS
or other reports) are complete, accurate and MUST BE DISTRIBUTED ONLY TO AUTHORIZED
USERS
If we did not caught the errors in the input and processing controls
- post processing step
- reviewer somehow knowledgeable at the output
Auditing around the computer (testing from the outside) – Used in Less Complex IT
Environment/Simple IT (not reliant to IT)
3 main phases (Input , Process, Output)
FOCUS - INPUT and OUTPUT (PROCESS - ignore)
Process (blinded) - that is why it is called black box approach
- Data – client/auditee, Processing – client/auditee
• Input data are simply reconciled with the computer output to verify the accuracy
of processing. (Data (Input) > System > Output)
• Assumption: If the input reconciles with the output, then the computer program
must have processed the transaction accurately. (without testing the actual system)
• Blackbox approach/testing – visible input documents (paper) and detailed output
that will enable the auditor to trace individual transactions back and forth.
Program Testing
a. Historical Audit Techniques
b. Continuous Audit techniques
Program Testing
- literally testing the program
Program Analysis
- more complex, IT language, scripts etc.
27
Questions :
Whose Data to be used? Auditor
Whose system/software you using? – Client/Auditee
are
Data = valid and invalid > fictitious data (dummy/has intentional errors) created
by the auditors (Expectation/Behavior on the output already) (NO REAL CLIENT DATA
Involved)
Process/System = Program by the auditee client
Data:
Expectation vs Reality
Example:
(employee number , sales over credit limit, excess hours) –
80 hours a week
Advantages:
Simple to operateRequires limited technical knowledge
Helps the auditor learn how the system operates
Disadvantages:
1. Live testing is dangerous as it may contaminate client files/ Do not forget to
ELIMINATE or REVERSE the data
2. Confirms the operation of the program at the time it is tested.
This is automated and ongoing technique that enables the auditor to test an
applications logic and controls during normal operations
Similar with test data but this time integrated in the program (embedded)
- (Unlike Test data = separate, run independently)
Data = both auditor and client (sabay) (valid and invalid fictitious transactions)
System = The actual system by the auditee/client
Advantages:
Continuous monitoring of controls
Testing without interrupting the client operations and without the intervention of
client personnel
Testing can be scheduled and unknown to other staff
Disadvantages
1. Contamination of client data
Parallel Simulation
31
Parallel Simulation
Auditor’s system:
Purpose Written Programs / Generalized Audit Software
Excel
Reconcile your findings to their actual result (since you know what it should look
like)
Parallel Simulation
32
Parallel Simulation
Auditor’s system:
Advantages
The size of the sample can be expanded
The auditor can independently run the test
Helps the auditor to focus on items where there are differences
Disadvantages
Time Consuming
Incopatibility of auditor and client software
Cost of audit programming
Technical or the auditor needs special training
Parallel Simulation
33
Parallel Simulation
34
Controlled Reprocessing
35
Controlled Reprocessing
Difference
Controlled Reprocessing
Client’s Program
Copy
CONTROLLED REPROCESSING
36
Controlled Reprocessing
Difference
Audit Modules
Systems control audit review files (SCARFs)
Audit Hooks
Transaction tagging
Extended records
37
Continuous audit techniques (Concurrent Auditing)
Audit Modules
Audit modules – an audit system that is inserted into the client's system so that
it can apply audit procedures to data as it is being processed
38
Audit modules
- Real Time
- Programmed audit routines incorporated into an application program that are
designed to perform an audit function such as a recalculation, or logging activity
- Does the system make an error? No! That is why we test the control.
- Meaning this should be planted at the beginning of the year or the period being
audited.
log that collects transaction information for subsequent review and analysis by the
auditor
39
System Control Audit Review Files
Best Audit Tool - Embedded during the design phase of the program, or embedded by
the auditor
Types of Errors
Profiling Data = Data profiling is the process of examining, analyzing, and
creating useful summaries of data
Sales Dept > Data regarding sales,(customer sales etc. No payroll info)
IT Dept > Data Regarding Sales
Audit Hooks
The software tags transactions reports (list) are immediately generated and sent to
the auditors
40
Audit hooks are embedded in application system to capture exceptions or suspicious
transactions
The auditor can set different criteria to capture the exceptions or suspicious
transactions (depending on materiality, audit planning)
Transaction Tagging
41
Similarity with Audit Hook - both are to capture exceptions and suspicious
transactions
- PLUS List plus audit trail (how it was processed in the system)
- auditor uses to electronically mark (or "tag") specific transactions and follow
them through the client's system
Trail/Path of the transactions: Document > journal > Ledger > SL > FS (Output)
Extended Records
This technique attaches additional audit data which would not otherwise be saved to
regular historic records and thereby helps to provide a more complete audit trail
42
Support for tagging and Audit Hooks
For a transaction that was hooked - the system attaches all the supporting/records
files related to it
Sales transactions P100,000 - Copy of the invoices auto attach, sales contract,
shipping documents
Hooked > all records/ data are attached to the transaction (saved in a folder)
Code Review
Program Tracing and Mapping
Flowcharting software
Snapshot
43
-techniques that allow the auditor to gain an understanding of the client’s program
-not detailed discussion (sorry)
Code Review
This involves actual analysis of the logic of the program’s processing routines.
44
- The source code review involves the examination of program source code as it has
been written by the programmers.
Flowcharting software
Used to produce a flowchart of a program’s logic and may be used both in mainframe
and microcomputer environments.
46
inserted in the systems and to produce a flowchart based on the logic of the
program and is compared to the flow chart of the CIS dept
Why not get the system flowchart from the IT department? We are testing or
verifying
help in the analysis of programs and can somewhat reduce the need for specific
knowledge of programming languages
Mainframe – big database in large companies (centralized/complex IT)
Microcomputer – small business (simple IT)
Snapshots
Snaps (pictures) are taken when a transaction moves through the various stages in
the application system
47
- This technique involves the installation of a snapshot software at that capture
photos at critical processing points of an application or a system.
- The software proceeds to capture images of the transaction as it flows through
the application
- Similar to transaction tagging but the difference is it produces pictures
Process: Sales Invoices > Journal > Ledger > Subsidiary Ledgers > FS
Picture :Code
48
Operating System – other than the data processing of the software
Communication tools, libraries and
storage(internal and external), system logs.
These logs that track particular functions (job). The auditor may be able to use
them to review the work processed, to determine whether unauthorized applications
were processed and to determine that authorized applications were processed
properly
49
- Provide record of activity on how the job is done, communications logs –
activity logs
- For example, the auditor could use job accounting data to determine whether
production programs were run at the correct time and the expected number of times
according to the schedule set up in the client’s control procedures.
This creates logs of activities occurring in the data library. These library logs
contain information on the programs, data files accessed, changes made to programs.
This also provide other security or access control functions, which could include
encryption or, more frequently, the use of passwords to restrict access to programs
in the library.
50
- can replace the librarian
- reviewing these logs, where volume permits, can keep the auditor informed of
access and manipulation of the libraries
- it also
Text retrieval systems allow the user to view any text that is available in an
electronic format.
Text Retrieval Systems
57
- Find Function
- The software programs allow the user to browse through text files much as a user
would through books, only faster
59