Control Objectives.

Slides:



Advertisements
Similar presentations
Audit of Autonomous District Councils (in an IT environment using FAAM)
Advertisements

Bodnar/Hopwood AIS 7th Ed1 Chapter 5 u TRANSACTION PROCESSING AND INTERNAL CONTROL PROCESS.
Chapter 10 Accounting Information Systems and Internal Controls
Auditing Concepts.
Auditing Computer Systems
Auditing Computer-Based Information Systems
The Islamic University of Gaza
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
The Demand for Audit and Other Assurance Services Chapter 1.
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
IS Audit Function Knowledge
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
Auditing A Risk-Based Approach To Conducting A Quality Audit
Internal Control in a Financial Statement Audit
The Information Systems Audit Process
Control environment and control activities. Day II Session III and IV.
Internal Auditing and Outsourcing
(SIA) 14 Internal Audit in an Information Technology Environment Standard should be read in the conjunction with the “Preface to the Standards on Internal.
Introduction to Internal Control Systems
Chapter Three IT Risks and Controls.
Chapter 5 Internal Control over Financial Reporting
Internal Control in a Financial Statement Audit
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Internal Control in a Financial Statement Audit
9 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 9.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Evaluation of Internal Control System
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
Evaluation of Internal Control System. Learning Objective 1 Contrast management’s need for internal control with the auditor’s need to consider internal.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
RTI, Nagpur 1 Day 3- Session I  Role of audit in consideration of fraud.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 3-Auditing Computer-based Information Systems.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Modern Auditing: Assurance Services and the Integrity of Financial Reporting, 8th Edition William C. Boynton California Polytechnic State University at.
Jean-Pierre Garitte Budapest 29 March 2017
Auditing Concepts.
The Demand for Audit and Other Assurance Services
Internal Control in a Financial Statement Audit
Internal Control Principles
Internal Control.
Question 4-1 Which of the following statements concerning noncompliance by clients is correct?    A.  An auditor's responsibility to detect noncompliance.
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
ISO/IEC
The Demand for Audit and Other Assurance Services
Compliance with Framework of Quality Control - General & Specific Controls CA Vimal Chopra, Ex Chairman of CIRC of ICAI.
Chapter 1 An Introduction to Assurance and Financial Statement Auditing.
Developing the Overall Audit Plan and Audit Program
Internal Control in a Financial Statement Audit
Auditing Information Technology
Revenue and Collection Cycle
Canadian Auditing Standards (CAS)
FORMATION & AUDIT OF NGO’s
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Tools and Techniques for the Auditor: Fieldwork
Financial Control Measures
Presentation transcript:

Control Objectives

IS Controls Control : Policies, procedures, practices and enterprise structure that are designed to provide reasonable assurance that business objectives will be achieved and undesired events are prevented or detected and corrected

IS auditing includes reviewing the implemented system or providing consultation and evaluating the reliability of operational effectiveness controls

Effect of Computer Internal Controls Personnel : whether or not staffs are trustworthy, if they know what they are doing and if they have the appropriate skills and training to carry out their jobs to a competent standard Segregation of duties : a key control in an information system. Segregation basically means that the stages in the processing of a transaction are split between different people, such that one person cannot process a transaction through from start to finish. The various stages in the transaction cycle are spread between two or more individuals. However, in a computerized system, the auditor should also be concerned with the segregation of duties within the IT department. Within an IT environment, the staff in the computer department of an enterprise will have a detailed knowledge of the interrelationship between the source of data, how it is processed and distribution and use of output. IT staff may also be in position to alter transaction data or even the financial applications which process the transactions. This give them the knowledge and means to alter data, all they would then require is a motive

Authorization procedures : to ensure that transaction system written evidence of individual data entry authorization Record keeping : the controls over the protection and storage of documents, transaction details and audit trails Access to assets and records : a client’s financial data and computer programs are vulnerable to unauthorized amendment at the computer or from remote locations. The use of wide area network, including the internet, has increased the risk of unauthorized access. The nature and types of control available have changed to address these new risk

Management supervision and review : management’s supervision and review helps to deter and detect both errors and fraud Concentration of programs and data : transaction and master file data may be stored in a computer readable form on one computer installation or on a number of distributed installations. Computer programs such as file editors are likely to be stored in the same location as the data. Therefore, in the absence of appropriate controls over these programs and utilities, there is an increased risk of unauthorized access to and alteration of financial data

Internal controls used within an organization comprise of the following five interrelated components : Control environment Risk assessment Control activities Information and communication monitoring

Effect of Computers on Audit Two basic functions carried out to examine changes : Changes to evidence collection : changes in the audit rail say the existence of an audit trail is a key financial audit requirement. Without an audit trail, the financial auditor may have extreme difficulty in gathering sufficient, appropriate audit evidence to validate the figures in the client’s acounts

Changes to evidence evaluation : evaluation of audit trail and evidence is to trace consequences of control strength and weakness through the system.

Responsibility for Controls Structure of Control Environment

Long – range planning : includes documenting goals and objectives, explaining how strength will be used and how weakness will be compensated for or corrected The goals and objectives of the plan for use in measuring progress : Revenue and expense estimates Time allowance and target dates Strength and weakness

Long – range planning and IT department : the information system managers must take systematic and proactive measures to : Develop and implement appropriate, cost effective internal control for results oriented management Asses the adequacy of internal control in programs and operations Separately asses and document internal control over information systems consistent with the information security policy of the organization Identify needed improvements Take corresponding corrective action Report annually on internal control through management assurance statements

Short – range planning or tactical planning : the functions and activities performed every day are established to meet the long – range goals. Personnel management controls : the involves activities and functions to accomplish the administration of individuals, salary and benefit costs. The control techniques are : Job descriptions Salary and benefits budget Recruiting standards and criteria Job performance evaluations Screening and security standards

The IS audit Process The audit of an IS environment to evaluate systems, practices and operation may include one or both of the following : Assessment of internal controls within the IS environment to assure validity, reliability, and security information Assessment of the efficiency and effectiveness of the IS environment in economic terms

Responsibility of IS auditor : Sound knowledge of business operations, practices and compliances requirements Should possess the requisite professional technical qualification and certifications An good understanding of information risks and controls Knowledge of IT strategies, policy and procedure controls Ability to understand technical and manual controls relating to business continuity and Good knowledge of professional standards and best practices of IT controls and security

Function of IS auditor IT auditor often is the translator of business risk, as it relates to the use of IT, to management, someone who can check the technicalities well enough to understand the risk (not necessarily manage the technology) and make a sound assessment and present risk oriented advice to management

IT auditors review risks relating to IT systems and processes, some of them are : Inadequate information security Inefficient use of corporate resources, or poor governance Ineffective IT strategies, policies and practices IT related frauds

Categories of IS audits System and Applications Information Processing Facilities Systems Development Management of IT and Enterprise Architecture Telecommunications, intranets and extranets

Steps in Audit Process

Scoping and pre – audit survey : the auditors determine the main areas of focus and any areas that are explicitly out of scope, base normally on some form of risk – base assessment. Information sources at this stage include background reading and web browsing, previous audit reports, pre audit interview, observations and sometimes subjective impressions that simply deserve further investigation

Planning and preparation : during which the scope is broken down into greater levels of detail, usually involving the generation of an audit work plan or risk control matrix Fieldwork : gathering evidence by interviewing staff and managers, reviewing documents, printouts and data, observing processes, etc Analysis : this steps involves desperately sorting out, reviewing and trying to make sense of all that evidence gathered earlier. SWOT and PEST techniques can be used for analysis Reporting : reporting to the management is done after analysis of data gathered and analysis Closure : closure involves preparing notes for future audits and following – up management to complete the actions they promised after previous audits

Audit Standards IS auditors needs guidance on how : IS should be assessed to plan their audit effectively To focus their effort on high risk areas To assess the severity of any errors or weaknesses found

Standards from The institute of Chartered Accounts of India is AASs, that can be adapted for the IS Audits : Basic principles governing audit Objective and scope the audit of financial statements Documentation The auditor’s responsibility to consider detect/ error in an audit of financial statements

Audit evidence Risk assessment and internal controls Relying upon the work of an internal auditor Audit planning Using the work of an expert Using the work of another auditor Representations by management Responsibility of joint auditors Audit materiality Analytical procedures Audit sampling Going concern Quality control for audit work

Audit of accounting estimates Subsequent Events Knowledge of business Consideration of Laws and regulations in and audit of financial statements initial engagements opening balances Related parties Audit considerations relating to using service organizations Comparatives Terms of Audit Engagement

Communication of audit matters with those charged with governance The auditor’s report on financial statements Auditing in a computer information system environment External confirmations Engagements to compile financial information Engagement to perform agreed upon procedures regarding financial information

Other standards came from several well known organizations : ISACA : IS auditing standards IS auditing guidelines ISO 27001 (Information security management – specification with guidance for use)

IIA (The institute of Internal Auditors) : issued GTAG (Global Technology Audit Guide) ITIL (IT Infrastructure Library) ISACF ( The Information Systems Audit and Control Foundation) : issued COBIT (Control Objectives for Information Related Technology)

Questions Find out about : IS auditing standards IS auditing guidelines ISO 27001 GTAG ITIL COBIT

Reading Tasks System Development methodology Levels of System testing ERP (Enterprise Resource Planning) Management Information System

TO BE CONTINUE …