Unit-4 Audit in Computerized Enviroment
Unit-4 Audit in Computerized Enviroment
Computer Auditing, also known as EDP (Electronic Data Processing) Auditing, refers to the
process of evaluating and verifying the accuracy, reliability, security, and effectiveness of
computerized information systems, particularly in the context of accounting and management
controls.
With the widespread use of computer systems in businesses, traditional auditing methods are
no longer sufficient. Computer auditing ensures that electronic systems are operating as
intended, data is secure and accurate, and internal controls are effective in a digital
environment.
• Verify that systems safeguard against unauthorized access and data breaches.
• Financial accounting systems (e.g., ERP, accounting software like Tally, SAP).
• Solution: Implement system-generated audit trails or logs to track all activities and
changes.
• Implication: Unauthorized users can alter data without leaving visible traces, which
compromises the integrity of financial records.
• Solution: Use of firewalls, encryption, role-based access control, and regular security
audits.
• Solution: Require up-to-date and comprehensive documentation for all systems and
applications.
4. Technical Complexity
• Problem: Auditors may not possess the technical knowledge to understand complex
IT systems, databases, networks, and programming logic.
• Solution: Periodic source code review, program change management, and testing of
applications.
• Problem: In small or poorly controlled systems, one person may have access to
multiple critical operations (e.g., data entry, program changes, and report
generation).
• Solution: Enforce role-based access control and segregation of duties through system
configuration.
• Solution: Integrate built-in validation checks, automatic alerts, and exception reports.
• Problem: Data and systems may be hosted offsite or managed by external providers.
• Implication: Limited visibility into the controls and security of outsourced services.
• Solution: Ensure service level agreements (SLAs) include audit rights and third-party
assurance reports like SOC 2.
10. Difficulty in Testing and Sampling
Specialized software like ACL, IDEA used to test data and analyse
Audit Software
records.
Integrated Test Facility Dummy records are created within the system to test live
(ITF) processing.
Generalized Audit Tools that allow access to data files for performing analysis,
Software (GAS) validations, and checking controls.
Two key components of internal control that require special attention are:
1. Procedure Controls
2. Facility Controls
Both are vital for protecting organizational assets, ensuring accurate data processing, and
mitigating risks (including fraud, data breaches, and operational failures).
1. Risk Mitigation
• Ensure that risks related to financial reporting, operations, and compliance are
minimized.
2. System Reliability
• Identify control weaknesses that may affect data accuracy or system performance.
3. Regulatory Compliance
• Ensure compliance with standards like SOX (Sarbanes-Oxley Act), GDPR, ISO, or
industry-specific regulations.
4. Safeguarding Assets
• Protect physical and digital assets (e.g., cash, inventory, servers, data files) from loss
or damage.
5. Operational Efficiency
1. Input Controls – Ensure data entered into the system is accurate and authorized.
Error Detection Identifies points where errors may be introduced and ensures there
are checks to catch them.
Fraud Prevention Ensures segregation of duties and approval procedures are in place
to prevent misuse.
Audit Trail Ensures adequate logging of all significant activities for traceability.
Validation
2. Environmental Controls
4. Hardware Maintenance
5. Equipment Protection
Disaster Preparedness Verifies readiness for unexpected events like fire, flood, or
cyberattack.
• Check for the presence and functionality of fire and climate control systems.
Auditing the EDP output is a crucial step in the computer auditing process because it
provides evidence that computer systems have processed data accurately, completely, and
as intended. The output is the final result of all input and processing activities, and it
includes reports, printouts, dashboards, statements, invoices, and electronic files used for
decision-making or compliance.
Here’s a detailed explanation of the techniques used to audit EDP output effectively:
• Purpose: To verify that data has been processed accurately and nothing has been
omitted or altered.
• Example: Matching a payroll register output with original employee time records.
2. Reprocessing Technique (Parallel Simulation)
• Example: Feeding historical sales orders into audit software to recalculate invoice
totals and comparing them with actual invoices generated.
• Description: Exception reports highlight anomalies or data that fall outside expected
ranges (e.g., unusually high payments, negative inventory).
• Description: The auditor evaluates whether output figures are logical, within
expected limits, and consistent with historical data or trends.
• Example: Verifying that monthly sales figures do not show unrealistic spikes without
valid reasons.
• Description: The auditor inputs pre-determined test transactions into the system
and then examines the output.
• Purpose: To assess how the system processes specific types of transactions and
whether output is generated correctly.
• Example: Entering a fictitious invoice with a negative amount to see how the system
handles abnormal input.
• Description: A set of dummy data and users is introduced into the live system, and
the auditor tracks how these transactions are processed and appear in the output.
• Purpose: To evaluate system processing and output generation without disrupting
real operations.
• Example: Setting up a test employee and processing a payroll run to check the
output salary statement.
• Description: Auditors verify whether all expected outputs (e.g., reports, files,
documents) are actually produced and distributed.
• Example: Checking that all customer statements for the month were generated and
mailed.
• Description: Examination of logs and system trails that document each transaction’s
processing steps.
• Purpose: To trace how a transaction was entered, processed, and how the output
was generated.
• Example: Reviewing log entries showing who generated a report, when, and with
what parameters.
• Description: These logs track the generation, review, approval, and distribution of
outputs.
• Purpose: To ensure only authorized personnel access and distribute sensitive output
data.
• Example: Reviewing who accessed and printed financial statements and whether
they were approved.
• Description: The auditor uses analytical methods (ratios, trend analysis, variance
analysis) to identify abnormal patterns in the output.
• Purpose: To detect unexpected results that may point to underlying problems in the
input or processing stages.
• Use computer-assisted audit tools (CAATs) for large volume output testing.
• Validate that output retention policies are followed (e.g., archiving or secure
destruction).
The increasing digitization of business processes has significantly transformed how internal
audits and management audits are conducted. Computers now play a central role in
automating, analysing, and enhancing the effectiveness of audit processes. They offer
auditors advanced tools to handle large volumes of data, conduct real-time evaluations, and
provide better assurance on governance, risk, and controls.
I. Overview: Why Use Computers in Auditing?
Traditional Auditing Computer-Aided Auditing
• Examples:
• Example:
5. Remote/Online Auditing
1. Performance Analysis
• How Computers Help:
• Example:
• Tools: Excel (with macros), @Risk (for risk analysis), IBM SPSS.
• Example:
• Example:
o Under-utilized manufacturing capacity identified via production data.
Data privacy and access Handling confidential data requires strong controls.
System integration Accessing data from multiple ERP systems may be complex.
1. Test Packs
These tools help auditors evaluate system logic, test internal controls, and verify the
correctness of output produced by EDP (Electronic Data Processing) systems.
I. Test Packs
Definition:
Purpose:
• To verify that application controls (like input validation, processing logic, and output
accuracy) are working correctly.
• To test how the system handles normal, boundary, and exceptional transactions.
1. Test Data – Sample transactions (valid and invalid) prepared by the auditor.
2. Expected Results – What the system should produce after processing the test data.
• Valid Input: A purchase order with correct item codes and within budget.
Advantages:
Limitations:
• Inserting test data into live systems can risk data pollution if not managed properly.
Definition:
Purpose:
• To support both internal audits and external audits involving electronic systems.
Features of CAPs:
Data Extraction Import all sales invoices for a given month from the ERP.
Advantages:
Limitations:
Purpose Test application logic and controls Automate and perform audit
procedures
Risk Data contamination if used on live Logic flaws if scripts are incorrect
system
Auditor involvement is important in each stage of the System Development Life Cycle
(SDLC).
Auditor's Role:
• Assess risk factors like data security, change management, and fraud vulnerability.
Contribution:
Auditor's Role:
o Input controls
o Processing controls
o Output controls
Contribution:
Auditor's Role:
Contribution:
Auditor's Role:
• Use test data to verify that the system produces expected results.
Contribution:
• Validates that the system performs as intended and is ready for production.
5. Implementation Stage
Auditor's Role:
• Check whether system backup and recovery plans are in place and tested.
Contribution:
• Ensures a smooth and secure transition with minimal disruption and no data loss.
6. Post-Implementation Review
Auditor's Role:
Contribution:
Compliance Alignment with laws (e.g., SOX, GDPR, Income Tax, GST)
V. Limitations / Considerations
• The auditor must avoid becoming part of the system development team (to maintain
independence).
Conclusion
The involvement of the auditor during the setup of a computer system is a proactive control
measure that ensures the system is robust, secure, auditable, and aligned with internal
control frameworks. Their role supports both financial integrity and operational
effectiveness by embedding controls and safeguards at every step of the system
development process.