AUD-7.4 - Updated (w.e.f. July 2021) - Miles Education Home Page

Transcription

Miles CPA ReviewAUD-7AUD-7.4 Updated (w.e.f. July 2021)7.4)I)II)III)IV)Effect of Information Technology on AuditEffect of IT on Internal ControlsAuditor’s consideration of I/C in IT environmentsAuditing Techniques in IT environmentsAuditor’s Computerized Tools for IT environmentsA7.4-1

AUD-7Miles CPA Review7.4) Effect of IT on AuditingI) Effect of IT on Internal ControlsI A) Internal Controls in an IT Environment Effects of IT on I/C - IT may be essential to support management's pursuit of the entity's objectives{FAR-REG-BEC} and to better control the organization's activities Effect on components of I/C - Use of IT may affect any of the 5 components of I/C {CRIME}relevant to the achievement of the entity's objectives {FAR-REG-BEC} Note: Though IT affects how an entity designs, implements, and conducts I/C (consideringthe greater availability of information and the use of automated procedures) but the sameI/C components and principles (per COSO Framework) remain suitable and relevant E.g., An entity may use IT as part of discrete systems that support only particular business units, functions, oractivities (e.g., unique A/R system for a particular business unit, system that controls theoperation of factory equipment), OR Complex, highly integrated systems that share data and that are used to support allaspects of I/C FAR-REG-BEC objectives Varied effects on transaction processing - Entity's mix of manual and automated elements inI/C (which varies with the nature and complexity of the entity's use of IT) affects the manner inwhich transactions are initiated, authorized, recorded, processed, and reported Controls in a manual system may include such procedures as approvals and reviews oftransactions and reconciliations and follow-up of reconciling items. Alternatively, an entitymay use automated procedures to initiate, authorize, record, process, and reporttransactions, in which case records in electronic format replace paper documents Controls in IT systems consist of a combination of automated controls (e.g., controlsembedded in computer programs) and manual controls. Manual controls may be independent of IT or may use information produced by IT. Theyalso may be limited to monitoring the effective functioning of IT and automated controlsand to handling exceptions. When IT is used to initiate, authorize, record, process, or report transactions or otherfinancial data for inclusion in F/S, the systems and programs may include controlsrelated to the corresponding assertions for material accounts or may be critical to theeffective functioning of manual controls that depend on IT IT environments - Vary significantly in size, complexity, and extent of integration Range from large, centralized, and integrated systems to decentralized systems thatoperate independently within a specific operating unit May involve real-time processing environments that enable immediate access toinformation, including mobile computer applications that can cut across many systems,organizations, and geographies Enables organizations to process high volumes of transactions, transform data intoinformation to support sound decision making, share information efficiently across theentity and with business partners, and secure confidential information from inappropriateuse. In addition, technology can allow an entity to share operational and performance datawith the publicA7.4-2

Miles CPA Review AUD-7Benefits of IT - IT benefits an entity's I/C by enabling an entity to Consistently apply predefined business rules and perform complex calculations inprocessing large volumes of transactions or data Enhance the timeliness, availability, and accuracy of information Facilitate the additional analysis of information Enhance the ability to monitor the performance of the entity's activities and its policies &procedures Reduce the risk that controls will be circumvented Enhance the ability to achieve effective segregation of duties by implementing securitycontrols in applications, databases, and operating systems Manual vs. Automated elements in I/C Manual elements in I/C May be more suitable when judgment and discretion are required; e.g., Large, unusual, or nonrecurring transactions Circumstances in which errors are difficult to define, anticipate, or predict Changing circumstances that require a control response outside the scope of an existingautomated control Monitoring of the effectiveness of automated controls Automated elements are generally more reliable than manual elements (since manual elementscan be more easily bypassed, ignored, or overridden, and they also are more prone to simpleerrors/mistakes and inconsistencies) E.g., 3-way match for A/P performed within an ERP system May be more suitable for High volume or recurring transactions or in situations in which predictable errors can beprevented, or detected and corrected, by control parameters that are automated Control activities in which the specific ways to perform the control can be adequatelydesigned and automatedA7.4-3

AUD-7Miles CPA Review Risks of IT for I/C IT also poses specific risks to an entity's internal control; e.g., Reliance on systems or programs that are inaccurately processing data, processinginaccurate data, or both Unauthorized access to data that may result in destruction of data or improper changes todata, including the recording of unauthorized or nonexistent transactions or inaccuraterecording of transactions Particular risks may arise when multiple users access a common database Possibility of IT personnel gaining access privileges beyond those necessary to perform theirassigned duties, thereby breaking down segregation of duties Unauthorized changes to data in master files Unauthorized changes to systems or programs Failure to make necessary changes to systems or programs Inappropriate manual intervention. Potential loss of data or inability to access data as required A7.4-4Nature & extent of the risks to I/C vary depending on the nature & characteristics of the entity'sinformation system. The entity responds to the risks arising from the use of IT or the use ofmanual elements in I/C by establishing effective controls in light of the characteristics of theentity's information system E.g., Multiple users may access a common database of information that affects F/S. In suchcircumstances, a lack of control at a single user entry point might compromise the securityof the entire database, potentially resulting in improper changes to, or destruction of, data E.g., When IT personnel or users are given, or can gain, access privileges beyond thosenecessary to perform their assigned duties, a breakdown in segregation of duties can occur.This could result in unauthorized transactions or changes to programs or data that affect F/S

Miles CPA ReviewAUD-7I B) Segregation of Duties in an IT Environment Entities operating in an IT environment often have a separate Information Systems department.Note that roles/responsibilities and job titles for IT are defined by the entity, and could vary fromentity-to-entity (below roles & job titles are only indicative) Systems Development - Responsible for planning, creating, testing, and deploying aninformation system Systems analyst – Analyzes & designs IT systemsSystem May recommend specific changes to the existing IT systems, or design a new IT system.Development Coordinates regularly with the user departments and the programmers to ensure ITsystems meet business requirements Application programmer - Codes, tests, debugs & maintains application programs per thespecifications provided by the systems analyst Database administrator - Administers & maintains the database Ensures that data is available to users and is secure from unauthorized access DataProcessingData processing operations in an IT function - Includes collection & preparation of raw data,inputting them into the IT system, processing by the IT system, output & interpretation ofprocessing information, and storage of data/information for future use Data entry clerk - Inputs data into the IT system Computer operator - Schedules & processes programs on the IT system Data Librarians - Maintains custody of entity’s data (master files, transaction files, records &documentation) and ensures that data is accessible only by authorized users as needed Data control - Liaises between the users and the data processing team. Responsible forreviewing and testing input procedures, monitoring processing, and reviewing anddistributing outputs Other Technical Services Systems programmer or technical support - Installs, supports, monitors & maintains theoperating system Security administrator - Assign initial passwords (and may maintain the passwords).Responsible for the overall security of the IT systems Network engineer - Maintain computer networks and voice & data connections Web-related positions - for website & e-commerce Web administrator (Web manager) - Oversees development & maintenance of the website Web master - Responsible for design, analysis, security, maintenance, content developmentand updates on the website Web developer - Programmer responsible for developing the website Web designer - Creates visual content for the website Web coordinator - Responsible for the daily operations of the websiteA7.4-5

AUD-7Miles CPA ReviewInformation Systems Manager*Systems seProgrammer AdministratorAAuthorizationData ProcessingManagerData EntryClerkComputerOperatorDataLibrarianControl Clerk /Control GroupRC1C2RecordingCustodySegregation of dutiesA7.4-6Comparison

Miles CPA ReviewAUD-7I C) IT Controls - General Controls vs. Application Controls Effect of IT on I/C may be analyzed using the five components of I/C {CRIME}: Control environment - Organization structure (separate systems department & userdepartment) Risk assessment - Assess risk of IT on internal controls Information and communication – Assess whether Information systems are developed withintegrated, technology-enabled processes Monitoring - Monitoring of the IT environment Existing control activities - General Controls & Application controls Two broad groupings of IT controls: General Controls - Overall policies & procedures that relate to many applications Support the effective functioning of Application controls by ensuring continued & properoperation of IT systems Application controls - Relate to the processing of individual applications E.g., Purchasing, Payables, Sales processingGeneral ControlsApplication ControlsOverall Computer EnvironmentSpecific Program Controls; Includes- Programmed & manual application controls (for input& processing)- User controls (for output)1) Personnel Policies (ARCCS)- A: Systems Development & Maintenance(system analyst, application programmer,database administrator)- R: Operations Input (data entry - better ifcomputer operator is computer illiterate)- CC: Operations Output (custody withlibrarian and comparison by control clerk)1) Input (programmed/manual application control)- Field Check (SSN in #, not letters)- Validity Check (Valid SSN)- Limit Test (SSN not greater than 9 characters)- Check Digit (SSN inputted correctly)- Edit Test (Rejected SSNs for review)- Record count, Financial total, Hash total2) File Security (access controls)- Passwords- Lock Out- Read-Only3) Contingency Planning - Disaster Recovery- Back Up - Grandfather/father/son retention- Hot Site (computers ready at site)- Cold Site (no computers at site)- Mirrored web server (off site)2) Processing (programmed/manual application control)- System & software documentation- Error-checking compiler- User Acceptance Testing- Test data (simulated data)- System testing3) Output (manual user control)- Distribution lists- Shredders- System testing4) Hardware Controls- Parity Check- Echo Check5) Documentation (new programs & alterations)A7.4-7

AUD-7Miles CPA ReviewI C-1) General Controls General controls - Policies & procedures that relate to many applications and support the effectivefunctioning of application controls. Maintain the integrity of information and security of data General controls over technology Include control activities over the IT infrastructure - May be shared by different business units within the entity (e.g., ashared service center) or outsourced either to third-party service organizations or tolocation-independent technology services (e.g., cloud computing) Security management - Generally cover access rights at the data, operating system(system software), network, application, and physical layers IT acquisition, development, and maintenance – E.g., SDLC (System Development LifeCycle) covered in BEC-7.1 Apply to all technology - from IT applications on a mainframe computer; to client/server,desktop, end-user computing, portable computer, and mobile device environments; tooperational technology, such as plant control systems or manufacturing robotics The extent and rigor of control activities will vary for each of these technologiesdepending on various factors, such as the complexity of the technology and risk of theunderlying business process being supported Similar to application controls, general controls may include both manual and automatedcontrol activities Effect of general controls on financial reporting Although ineffective general IT controls do not by themselves cause misstatements, theymay permit application controls to operate improperly and allow misstatements to occurand not be detected E.g., If deficiencies in the general IT controls over access security exist and applicationsare relying on these general controls to prevent unauthorized transactions from beingprocessed, such general IT control deficiencies may have a more severe effect on theeffective design and operation of the application control Assessed with regard to their effect on applications & data that become part of F/S E.g., If no new systems are implemented during the period of F/S, deficiencies in thegeneral IT controls over application system acquisition and development may not berelevant to F/S being audited Examples of General IT controls Program change controls Controls that restrict access to programs or data Controls over the implementation of new releases of packaged software applications Controls over system software that restrict access to, or monitor the use of, system utilitiesthat could change financial data or records without leaving an audit trailA7.4-8

Miles CPA ReviewAUD-7 Personnel policies ARCCS: Authorization - The development of new programs and changes to existing programs should beperformed by systems analysts and programmers. These personnel should not be involved inthe supervision of computer operations or the control and review of output. Systems analystswork with operating systems and compilers. Further, the database must be under the charge ofthe database administrator who would maintain the database and restrict database access toauthorized personnel Recording - Data entry clerks and computer operators have the role of entering informationinto the computer and running the programs. These personnel should not have access toprogram code that would enable them to modify programs nor should they control the output. Custody - Librarians retain custody of the removable media (disks, tapes, etc.) and maintainprogram & system documentation Comparison - Control clerks obtain and review the output from computers to review exceptionreports indicating inappropriate functioning of the computer, send printouts and other outputto the appropriate destinations, and ensure compliance with control totals. Segregation of the incompatible duties of ARCC E.g., Computer operators should have custody of the data E.g., Control clerks should not have the ability to create or alter programs or to operate thecomputers that generate the informationPhysicalAccessElectronicAccess File Security (access controls) - General controls over access to computers and files are of greatsignificance in evaluating internal control in an IT environment (particularly important in networks,where the data is widely distributed) Access to programs and data should require the entry of passwords or identification numbers,and different levels of password authority should apply so that individuals only gain access toE.g.,Read-Only the programs and files that are compatible with their assigned responsibilities (may be testedby an auditor by entering invalid passwords to see that they rejected and verifying that validAccesspasswords only provide compatible access) Good practice to require that individual users change assigned passwords when newaccounts are created User accounts should be removed when an employee leaves a client Systems access log should also periodically be reviewed to detect computer-related fraudA7.4-9

AUD-7Miles CPA Review Contingency planning refers to controls that are designed to protect the information fromaccidental or intentional destruction or unauthorized alteration. Includes: Back up & controls - Copies of files and programs should be maintained to allow reconstructionof destroyed or altered files. This may include copies on the same computer, backups toremovable storage media such as disks, and off-premises backups to computers and locationoutside the company Copies may be identical or the client may use the grandfather-father-son retention systemin which periodic saving of data versions allows the reconstruction of records by startingwith an older file, and reentering lost data since that time {the name comes from thegeneral idea of saving at least two generations of older data so that, if the immediateversion before the lost file is also lost, reconstruction can start two versions back withreentry of all data processed since that point} Checkpoint - Similar to grandfather-father-son, but at certain “checkpoints”, the systemmakes a copy of the database and this “checkpoint” file is stored on a separate disk or tape.If a problem occurs, the system is restarted at the last checkpoint Planned downtime - Since some downtime is inevitable, planned downtime allowsmaintenance so that unplanned downtime does not interrupt system operations Disaster recovery - The Company should have plans in place that will allow operations to berestored and continued in the event of physical destruction or disabling of the site of computeroperations. A complete disaster recovery plan would provide for an alternative processing site,backup and off-site storage procedures, identification of critical applications, and a testing ofthe planWarm Site Hot site - Site has available computers and data ready to begin operations immediately inSite the event of the disaster Site Hardware SoftwareHardware Cold site - Site has available space for operations but will require setup of computers andloading of data before operations can begin at that site Only Site Mirrored web server - off-site server to assure continuity of operations in the event of anatural disaster (effective particularly for e-commerce companies)A7.4-10

Miles CPA ReviewAUD-7 Hardware controls are built into computers by the manufacturer. Binary computers can only thinkin terms of bits (binary digits) of information that are on or off (“1” or “0”). A series of 8consecutive bits will produce a byte of information that represents a unit of human thought such asa letter, number, or other character. Hardware controls may include: Parity check - In the storage of bytes, one bit will a “dummy” bit that does not represent anyactual information, but is turned on automatically when necessary so that the total number ofbits in the on position is an odd number (in an odd-parity computer). When the computer isreading bytes of data from a chip or disk drive, a byte with an even number of bits turned onwill be known to be functioning improperly. Echo check (Echo control) - When data is being transmitted from one computer to another,especially over telephone lines, distortions caused by static or other causes can causeinformation to be transmitted improperly. An echo check involves the data sent from onecomputer to another being transmitted back to the original one, which will verify that it hasreceived what it sent. If the echoed data does not agree with the transmission, the packet ofdata is then resent Documentation of new programs and alterations to existing programs ensures that IT personnelare aware of the availability and proper use of programs and that changes in programmingpersonnel during projects does not interfere with the ability of other employees to understandwhat has been done previouslyA7.4-11

AUD-7Miles CPA ReviewI C-2) Application Controls Application controls - Relate to procedures used to initiate, authorize, record, process, and reporttransactions or other financial data; help ensure that transactions occurred, are authorized, and arecompletely & accurately recorded/processed Manual or automated procedures that typically operate at a business process level and apply tothe processing of transactions by individual applications Because of the inherent consistency of IT processing, audit evidence about theimplementation of an automated application control, when considered in combination withaudit evidence about the operating effectiveness of the entity's general IT controls (inparticular, change controls), also may provide substantial audit evidence about its operatingeffectiveness Application controls can be preventive or detective and are designed to ensure the integrity ofthe accounting records. Typically: Input & Processing controls are preventive controls (designed to prevent errors and fraud) Output controls are detective controls (designed to detect errors and fraud) Examples of Application controls - Include controls which relate to Integrity of data input into the system - Ensure they are authorized Processing of data – Ensure they are processed completely & accurately Integrity of reports and information that are the products of the processing – Ensure thatthe output is complete & accurate Rights granted to specific users to Access the application or data Delete transactions or data that had previously been processed by the application Originate a new transaction or record (e.g., authorized vendor, approved customer, ornew employee)[Note: Controls over system access are considered part of IT general controls] Note for Auditing: Without strong IT general controls where they are relevant, the auditor will havelittle basis to rely upon application controlsA7.4-12

Miles CPA ReviewAUD-7 Input Controls - Ensure the validity, accuracy, and completeness of transactions which are entered/processed/recorded. E.g., Preventive controls Controls to verify data/transactions as these are entered into the system: Field checks - Ensures that data entered contains appropriate format (e.g., numeric,alphabetical, alpha-numeric) E.g., SSN must be in numerical digits, not letters Validity checks - Ensures validity of data by cross-checking with a list of acceptable inputs E.g., For state abbreviation, check if NY is among the list of 50 state abbreviations Limit tests - Ensures that data entered falls within the acceptable range E.g., SSN must not be greater than 9 characters Check digits - Additional digit added to a series based on an algorithm applied; generallydesigned to avoid human transcription errors. E.g., 10th digit of the National Provider Identifier for the US healthcare industry Final (9th) digit of routing transit number (bank code used in the US) 9th digit of a Vehicle Identification Number (VIN) Edit checks - cross-check between files to verify if each entry is appropriate E.g., Comparing time card transactions with employee names in a personnel file to ensure ifthe time card transaction is for a valid employee Rejected transactions may be reviewed by the control clerk Batch controls - When inputting data in batches, manual control totals of the data entered maybe compared with computer-generated totals so as to ensure inputs are accurate. Include: Record count – Control total of number of records entered in the batch Financial total – Control total of amount of entries entered in the batch Hash total – Control total of values where the total is meaningless for financial purposes butwould still help verify if data has been correctly entered (e.g., total of invoice #, total ofcheck #, total of employee SSNE.g., Following is a “batch” of checks issued which are being entered into an application program:Check Number PayeeAmountAccount Code1007Varun International 700.007071008Meenakshi Corp. 6,000.001211009Miles Professional 3,000.009143024 9,700.001742After the data entry clerk has entered all the checks, the IT system will indicate:Checks Entered 3 (record count)Check Number total 3024 (hash total)Amount total 9,700.00 (financial total)Amount code total 1742 (hash total)The data entry clerk then agrees the total from the IT system with the total on his input sheet to ensure that all thedata is correctly entered. Use of documents which are pre-numbered, pre-printed, numerical sequence – Sequenceshould be periodically reconciled to unused numbers to ensure no information is missed out;also, ensure that only valid transactions are enteredA7.4-13

AUD-7Miles CPA Review Processing Controls - Once the IT system accepts the inputs, processing controls ensure that thedata is processed completely & accurately. E.g.,Preventive controls Essentially, most input controls are also applicable for processing. E.g., processed informationshould indicate batch control totals Systems/software documentation - Allows system analysts to verify if processing is donecompletely & accurately Error testing compilers - May be used to test the IT systems for programming language errors User acceptance testing - by end “users” to ensure that the application meets businessrequirements Test data - Simulated (dummy) data which tests the program with one sample of each type ofpossible exception conditions System testing - To ensure that programs within a system are working in an integrated fashion Database processing integrity procedures - Proper procedures for accessing & updating thedatabase. May have concurrent update controls to prevent 2 or more users to simultaneouslyupdate one record Output Controls - Assess whether the output is complete & accurate. Also monitor the distributionand use of outputDetective controls Completeness, accuracy, and validity of processing results can be checked using activity listings Distribution and use of output can be monitored using numbered forms, distribution lists, andrequiring signatures for certain reports When information is particularly sensitive, users might be instructed to use paper shredders todispose of reports after useA7.4-14

Miles CPA ReviewAUD-7II) Auditor’s consideration of I/C in IT environmentsII A) Auditing in IT environments - Planning Stage Auditor should consider the impact of IT on the entity’s F/S, and whether specialized IT skills areneeded in performing the audit. If yes, the auditor should seek the assistance of a professionalpossessing such skills, who either may be on the auditor's staff (IT auditor) or an outsideprofessional (IT specialist) In determining whether an IT auditor is needed on the audit team, the auditor may considersuch factors as the following: Complexity of the entity's systems and IT controls and the manner in which they are used inconducting the entity's business Significance of changes made to existing systems or the implementation of new systems Extent to which data is shared among systems Extent of the entity's participation in electronic commerce Entity's use of emerging technologies Significance of audit evidence that is available only in electronic form The IT auditor determines the effect of IT on the audit, understand the IT controls, or designand perform tests of IT controls or substantive procedures. Examples of procedures that may beassigned to the IT auditor: Inquiry of an entity's IT personnel how data and transactions are initiated, authorized,recorded, processed, and reported, and how IT controls are designed Inspect systems documentation Observe the operation of IT controls Plan and perform tests of IT controls Note: The audit partner remains responsible for the audit report on the F/S. And needs tosupervise and review the work performed by any IT auditors (same as for the work performedby other members of the engagement team) Auditor may also consider that the entity’s use of IT may affect the availability of informationneeded for the audit. When entity data is processed electronically, the auditor may be Prevented from using only substantive procedures to obtain audit evidence E.g., If the evidence regarding the transaction is not maintained in paper form or observablein the historical record, it may not be observable in the transaction record that thetransaction was authorized by management electronically, thus requiring that theauthorization systems and controls be examined directly for proper application of thecontrol procedure Enabled to electronic data extraction, Audit Data Analytics (ADA) and other Computer AssistedAudit Techniques (CAAT) to gather audit evidence; e.g., by examining an entire population of anaccount balanceA7.4-15

AUD-7Miles CPA ReviewII B) Auditing in IT environments - Risk Assessment Procedures Auditing in IT environments [Source: AICPA Journal of Accountancy, adapted]:A7.4-16

Miles CPA ReviewAUD-7 Risk assessment procedures to understand IT controls and assess the design and implementationof IT controls (general controls and application controls) Auditor should obtain an un

Miles CPA Review AUD-7 A7.4-5 I B) Segregation of Duties in an IT Environment Entities operating in an IT environment often have a separate Information Systems department. Note that roles/responsibilities and job titles for IT are defined by the entity, and could vary from entity-to-entity (below roles & job titles are only indicative) .