You are on page 1of 27

Module 2:

Introduction to risks and


internal controls in a
computerised environment

Chapter 5: Auditing Fundamentals


STUDY
MATERIAL

• Lecture slides
• Text Book: Auditing Fundamentals in a South Africa Context – Chapter
5
• Question Bank: Auditing Fundamentals in a South African Context:
Graded Questions
STUDY
MATERIAL
• This module will be divided into 3 parts namely:
• Part A- Introduction
• Part B- General Controls
• Part C- Application Controls
Introduction
• Information and technology has become an integral part of modern
business
• Most business enterprises in the modern world use at least some elements
of information technology
• Irrespective of the nature of the system, the general risks, related internal
controls and principles outlined in this chapter must be implemented by all
companies that use IT.
Introduction……continued
• Homework: Google terms and technologies in this chapter that are
unknown to you. E.g.:
• Networks (LAN vs. WAN)
• Hardware
• Software (system software vs. application software)
• Master files
• Transaction files
• Real-time systems vs. batch processing systems
• Data / Field / Record / File
• Database
Introduction……continued

• System Software • Application Software


• Is the Program that gives the • Is software that performs specific
computer the instruction to functions required by users e.g.
perform task e.g. Microsoft Pastel accounting, Microsoft
Windows 7 and Linux (the are Word, Outlook
called operating systems)
• Accounting packages are an
example of application software
Introduction…..continued
Masterfile Transaction file
• Used to store permanent information or • Used to record transaction details of
standing data such as customer’s full each individual transaction in both real
name, contact details and inventory time and batch processing systems
descriptions

• Store information and cumulative totals


How has technology evolved
 Mainframe, centralised • Computers earlier on were not
computer department connected to each other.
 Personal computers on
standalone basis • Documents were printed and
 Paper printing, extensive controls implemented by users.
manual controls
• Today the world is a global village
 LAN and WAN connecting
computers
where transactions occur in real-time
all over the world
 Many automated controls
replaced manual controls
 Internet allowed on-line
transacting
 Decentralization of computer
processing
 Risks with standalone computers and
network systems.
MANUAL AND/ VS COMPUTERISED CONTROLS

MANUAL COMPUTERISED

• Focus on organizational • User changes from preparer


controls to user of output
• Managerial • Enhance controls
involvement • BUT lead to additional
Consist of: risks concerning the
• Review processing of information
• Segregation of
duties
• Stationery and
document control
Why and how do companies govern the computer information system

• In today’s advanced technology environment, IT is at the centre of any business activity and
has an impact at both operational and strategic levels in business.
• Advantages / benefits of good IT governance:
• A company’s reputation is improved, and the trust of internal and external parties is
enhanced.
• Strategically aligning IT with business goals and processes makes business operations
more efficient and creates a competitive advantage.
• Non-IT executives gain a better understanding of IT and better decision- making
processes are possible due to timely and quality information being available.
• A greater level of compliance with laws and regulations.
• Risk management procedures are maximised by implementing good IT controls.
Why and how do companies govern the computer information system?.....continued

• Risks due to poor IT governance:


• The company may encounter problems in running its operations, machines
and production lines.
• There may be loss of confidentiality.e.g. Imagine what will happen
when the salary schedule of employees gets leaked.
• Systems become less available, less reliable and less effective.
• Unauthorised use, access to and changes to IT systems may take place.
Why and how do companies govern the computer information system?.....continued

• Key elements of a computerised system of internal control

Control Environment

Risk Assessment process

Information System and Business Process

Initiate
execute Record Process

Report
Manual Controls Computer Controls

Application General
Controls Controls
Impact of upgrading a manual system to an electronic system

• Effect on business’s risk profile


• Additional risks arise
• Three principles in identifying IT risks:
– Complexities that are non-existent in manual system
– Effect on management objectives
– Respond to risks to achieve control objectives.

• Potential severe consequences for company where IT risks not properly


addressed
Impact of upgrading a manual system to an electronic system
…continued

Benefits and risk in computerised systems

Benefits Risks
– Computers apply predefined business – Unwarranted reliance
rules and perform complex calculations – Unauthorised data access
– Consistency of processing: – Unauthorised data changes
Improves the availability and – Unintentional amendments
accuracy of information
– Failure to make changes
– Facilitate extensive analysis of large data
– Input, processing errors
volumes
– Manual override
– Monitoring of activities
– Data loss: process, transmit
– Less control circumvention
– Duplicate, incomplete data
– Segregation of duties
– Overreliance
– Potential loss of data during
processing
Advantages of a
computerised accounting
system…..continued
General characteristics of a computer system

• Increased risk in relation to:


 Multiple locations, data concentration, segregation of duties,
documentation trail, transaction initiation.

• Reduced risk in relation to:


 Consistency of processing, user involvement (where
minimised), processing power (large volumes), assist in decision making.

Improves
management
monitoring and
supervision
General characteristics of a computer system…….CONTINUED

Risk of errors, omissions and  Risk of errors, omissions and


fraud fraud
 User can access data / programs  Transactions are processed in an
from multiple locations / remotely.
uniform manner updating multiple
 Data and functions in an IT system
files and programs consistently.
is concentrated which could result
Minimal opportunity for user
in a breakdown in segregation of
manipulation.
duties.
 Lack of a clear documentation trail  Can analyse and present large
(e.g. very few hard-copy input and volumes of information.
output documents).  Assist in decision making.
 Ability to initiate and process _ Improve management monitoring
transactions automatically. and supervision.
Components of a
computerised
accounting system
How does a computerised accounting system
Document
operate can be put
manually or
using a
Capture data on
Initiate manual source barcode
Transaction
document scanner

[Source Input source Viewed on-


document] document into screen or
Record system
printed and
distributed

Accounting
records: Journals,
Process
general ledger,
Process transaction
trial balance etc.

Master file
amendment
and storage
Report Output
Financial
statements
Flow of transactions in a computerised system

Output Stored
Input
in master files
Input controls (checks, Processing (standing data /
comparisons, calculations totals)
etc.)
Processing controls: and transaction
ensure integrity of data: files (underlying
manual/computerised. computerised.
transactions).
Storage devices.
Print: manual
output
CONTROLS IN AN INFORMATION TECHNOLOGY ENVIRONMENT
Classification of computer controls

General Controls Application controls


• Defined as policies and procedures that • Defined as manual or automated
relate to many applications and that support procedures that typically operate at a
the effective functioning of application business process or application level.
controls by helping to ensure the continued
proper operation of information systems • Application controls are designed to ensure
the integrity of the accounting records (i.e.
• General IT controls include controls relates to procedures that are used to initiate,
over: record, process and report transactions and
other financial data).
• Data centre and network operations.
• Application controls relate to specific
• System software acquisition, changes and transactions within an application and
maintenance. business cycle
• Application system acquisition, • NB Some controls are dual purpose
development and maintenance. e.g. access control (is both a general and
application control)
• Access security
Classification of computer controls……continued
Classification of computer controls………continued

General controls Application controls


System development &
Transaction data
implementation controls
Objective
Systems maintenance
 Input *validity
controls
 Processing *completeness
Organisational and
 Master file *accuracy
management controls
(standing data)
 Access controls
 Output
Computer operating
 User controls
controls
 Programmed controls
System software
controls
 Business
Classification of computer controls………continued

Preventative Controls Detective and Corrective


Controls
• Prevents either the user or the system • Detect errors and fraud after a
from making errors or committing fraud transaction has been processed, report
(i.e. before they happen) the misstatement and take corrective
• Examples :passwords, drop-down action.
menus and validation test • Examples: management review of audit
trails, transaction logs or pop- up error.
INTRODUCTION TO GENERAL CONTROLS

 Umbrella controls under which each application will operate

 Applies to mainframes, micro frame and end-user environments

 Objective of GC
 Encompass the framework of overall controls over IT activities

providing a reasonable level of assurance that the overall objective of


internal controls are achieved.

You might also like