Impact of Information Technology on the Audit Process

Others 5298 views 1 replies
1          The proper installation of IT can lead to internal control enhancements by replacing manually-performed controls with computer-performed controls. IT-based accounting systems have the ability to handle tremendous volumes of complex business transactions cost effectively. Computer-performed controls can reduce the potential for human error by replacing manual controls with programmed controls that apply checks and balances to each transaction processed. The systematic nature of IT offers greater potential to reduce the risk of material misstatements resulting from random, human errors in processing.
            The use of IT based accounting systems also offers the potential for improved management decisions by providing more and higher quality information on a more timely basis than traditional manual systems. IT-based systems are usually administered effectively because the complexity requires effective organization, procedures, and documentation. That in turn enhances internal control.
 
2          When entities rely heavily on IT systems to process financial information, there are new risks specific to IT environments that must be considered. Key risks include the following:
 
<                  Reliance on the functioning capabilities of hardware and software. The risk of system crashes due to hardware or software failures must be evaluated when entities rely on IT to produce financial statement information.
<                  Systematic versus random errors. Due to the uniformity of processing performed by IT based systems, errors in computer software can result in incorrect processing for all transactions processed. This increases the risk of many significant misstatements.
<                  Unauthorized access. The centralized storage of key records and files in electronic form increases the potential for unauthorized on-line access from remote locations.
<                  Loss of data. The centralized storage of data in electronic form increases the risk of data loss in the event the data file is altered or destroyed.
<                  Visibility of audit trail. The use of IT often converts the traditional paper trail to an electronic audit trail, eliminating source documents and paper-based journals and records.
<                  Reduced human involvement. The replacement of traditional manual processes with computer-performed processes reduces opportunities for employees to recognize misstatements resulting from transactions that might have appeared unusual to experienced employees.
<                  Lack of traditional authorization. IT-based systems can be programmed to initiate certain types of transactions automatically without obtaining traditional manual approvals.
<                  Reduced segregation of duties. The installation of IT-based accounting systems centralizes many of the traditionally segregated manual tasks into one IT function.
<                  Need for IT experience. As companies rely to a greater extent on IT-based systems, the need for personnel trained in IT systems increases in order to install, maintain, and use systems.
 
 
3          The audit trail represents the accumulation of source documents and records maintained by the client to serve as support for the transactions occurring during the accounting period. The integration of IT can change the audit trail by converting many of the traditionally paper-based source documents and records into electronic files that cannot be visually observed. Because many of the transactions are entered directly into the computer as they occur, some of the documents and records are even eliminated.
 
 
4          Random error represents errors that occur in an inconsistent pattern. Manual accounting systems are especially prone to random errors that result from honest mistakes that occur as employees perform day-to-day tasks. When those mistakes do not consistently occur while performing a particular task, errors are distributed randomly into the accounting records. An example of a random error is when an employee accidentally pulls the wrong unit price off the approved price list when preparing a sales invoice for a particular customer.
            Systematic error represents errors that occur consistently across all similar transactions. Because IT-based systems perform tasks uniformly for all transactions submitted, any mistake in software programming results in the occurrence of the same error for every transaction processed by the system. An example of a systematic error occurs when a program that is supposed to post sales amounts to the accounts receivable subsidiary records actually posts the sales amount twice to customers’ accounts.
 


5          In most traditional accounting systems, the duties related to authorization of transactions, recordkeeping of transactions, and custody of assets are segregated across three or more individuals. As accounting systems make greater use of IT, many of the traditional manually performed tasks are now performed by the computer. As a result, some of the traditionally segregated duties, particularly authorization and recordkeeping, fall under the responsibility of IT personnel. To compensate for the collapsing of duties under the IT function, key IT tasks related to programming, operation of hardware and software, and data control are segregated. Separation of those IT functions restricts an IT employee’s ability to inappropriately access software and data files in order to misappropriate assets.
 
6          General controls relate to all aspects of the IT function. They have a global impact on all software applications. Examples of general controls include controls related to the administration of the IT function; software acquisition and maintenance; physical and on-line security over access to hardware, software, and related backup; back-up planning in the event of unexpected emergencies;
and hardware controls. Application controls apply to the processing of individual transactions. An example of an application control is a programmed control that verifies that all time cards submitted are for valid employee id numbers included in the employee master file.
 
7          The typical duties often segregated within an IT function include systems development, computer operations, and data control. Systems development involves the acquisition or programming of application software. Systems development personnel work with test copies of programs and data files to develop new or improved application software programs. Computer operations personnel are responsible for executing live production jobs in accordance with a job schedule and for monitoring consoles for messages about computer efficiency and malfunctions. Data control personnel are responsible for data input and output control. They often independently verify the quality of input and the reasonableness of output. By separating these functions, no one IT employee can make changes to application software or underlying master files and then operate computer equipment to use those changed programs or data files to process transactions.
 
8          If general controls are ineffective, there is a potential for material misstatement in each computer-based accounting application, regardless of the quality of automated application controls. If, for example, the systems development process is not properly controlled, there is a greater risk that unauthorized and untested modifications to accounting applications software have occurred that may have affected the automated control. If general controls are strong, there is a greater likelihood of placing greater reliance on automated application controls. Stronger general controls should lead to greater likelihood that underlying automated application controls operate effectively and data files contain accurate, authorized, and complete information. When general controls are effective, the auditor may not have to test the automated application control in the current year, as long as the automated control has not changed since it was last tested by the auditor and that test was performed within the last three years.
Replies (1)
9          Application controls apply to the processing of specific individual transactions within a transaction cycle, such as a computer performed credit approval process for sales on account. Due to the nature of these types of controls, application controls generally link directly to one or more specific transaction objectives. For example, the credit approval application control directly links to the occurrence objective for sales. Auditors typically identify both manual and computer-performed application controls for each transaction-related objective using a control risk matrix similar to the one discussed in Chapter 10.
 
10        “Auditing around the computer” represents an audit approach whereby the auditor does not use computer controls to reduce control risk. Instead, the auditor uses non-IT controls to support a reduced control risk assessment. In these situations, the use of IT does not significantly impact the audit trail. Typically, the auditor obtains an understanding of internal control and performs tests of controls, substantive tests of transactions,   and account   balance verification
procedures in the same manner as if the accounting system was entirely manual. The auditor is still responsible for gaining an understanding of general and application computer controls because such knowledge is useful in identifying risks that may affect the financial statements.
 
11 The test data approach involves processing the auditor’s test data using the client’s computer system and the client’s application software program to determine whether the computer-performed controls correctly process the test data. Because the auditor designs the test data, the auditor is able to identify which test items should be accepted or rejected by the computer. When using this approach the auditor should assess the following:
 
<                  How effectively does the test data represent all relevant conditions that the auditor wants to test?
<                  How certain is the auditor that the application programs being tested by the auditor’s test data are the same programs as those used by the client throughout the year to process actual transactions?
<                  How certain is the auditor that test data is effectively eliminated from the client’s records once testing is completed?
 
            Parallel simulation with audit software involves the auditor’s use of an auditor-controlled software program to perform parallel operations to the client’s software by using the same data files. Because the auditor’s software is designed to parallel an operation performed by the client’s software, this strategy is referred to as parallel simulation testing. Parallel simulation could be used in the audit of payroll by writing a program that calculates the accrued vacation pay liability for each employee using information contained in the employee master file. The total liability calculated by the auditor’s software program would then be compared to the client’s calculation to determine if the liability for accrued vacation pay is fairly stated at year-end.
 


 
12         Often companies that purchase and install vendor developed software applications on computer hard drives rely on IT consultants to assist in the installation and maintenance of that software because those companies do not have dedicated IT personnel. Also, assignment of responsibility may reside with user departments. Companies can reduce these risks related to not having IT personnel by performing sufficient reference and background checks about software vendor and IT consultant reputations. In addition, companies can load software programs onto hard drives in a format that does not permit changes by client personnel, particularly non-IT user department personnel who may have primary responsibility for the system. Companies should also consider segregating key duties related to access to master files and responsibilities for processing transactions.
 
13        Because many companies that operate in a network environment decentralize their network servers across the organization, there is an increased risk for a lack of security and lack of overall management of the network operations. The decentralization may lead to a lack of standardized equipment and procedures. In many instances responsibility for purchasing equipment and software, maintenance, administration, and physical security, often resides with key user groups rather than with a centralized IT function. Also, network-related software often lacks the security features, including segregation of duties, typically available in traditionally centralized environments because of the ready access to software and data by multiple users.
 
14        In database management systems, many applications share the same data files. This increases risks in some cases given that multiple users, including individuals outside accounting, access and update data files. Without proper database administration and access controls, risks of unauthorized, inaccurate, and incomplete data files increase. The centralization of data also increases the need to properly back-up data information on a regular basis.
 
15        An online sales ordering system poses many potential risks for an audit client. Risks that may exist include:
 
1.                  Customer data is susceptible to interception by unauthorized third parties.
2.                  The client company’s data, programs, and hardware are susceptible to potential interception or sabotage by external parties.
3.                  An unauthorized third party may attempt to transact business with the client company.
 


 
These risks can be addressed by the use of firewalls, encryption techniques, and digital signatures. A firewall is a system of hardware and software that monitors and controls the flow of e-commerce communications by channeling all network connections through a control gateway. A firewall protects data, programs, and other IT resources from external users accessing the system through networks, such as the Internet. Encryption techniques are based on computer programs that transform a standard message into a coded (encrypted) form. One key (the public key) is used for encoding the message and the other key (the private key) is used to decode the message. Encryption techniques protect the security of electronic communication during the transmission process. Finally, the use of digital signatures can enhance internal controls over the online sales order system by authenticating the validity of customers and other trading partners who conduct business with the client company.
 
16        It is unacceptable for an auditor to assume an independent computer service center is providing reliable accounting information to an audit client because the auditor has no firsthand knowledge as to the adequacy of the service center’s controls. If the client’s service center application is involved in processing significant financial data, the auditor must consider the need to obtain an understanding of internal control and test the service center’s controls.
            The auditor can test the service center’s system by use of the test data and other tests of controls. Or, he or she may request that the service center auditor obtain an understanding and test controls of the service center, which are summarized in a special report issued by the service center auditor for use by the customer’s auditor.


CCI Pro

Leave a Reply

Your are not logged in . Please login to post replies

Click here to Login / Register