Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.

Slides:



Advertisements
Similar presentations
Chapter 6 Computer Assisted Audit Tools and Techniques
Advertisements

©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
General Ledger and Reporting System
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
Commercial Data Processing Lesson 2: The Data Processing Cycle.
การควบคุมในระบบบัญชีที่ใช้คอมพิวเตอร์
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
Consideration of Internal Control in an IT Environment.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Accounting Information Systems, 5 th edition James A. Hall COPYRIGHT © 2007 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star.
1 Output Controls Ensure that system output is not lost, misdirected, or corrupted and that privacy is not violated. Exposures of this sort can cause serious.
Processing Integrity and Availability Controls
Chapter 4-1 The Islamic University of Gaza Accounting Information System The Expenditure Cycle : Purchases and Cash Disbursements Procedures Dr. Hisham.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
PowerPoint Presentation by Charlie Cook Copyright © 2004 South-Western. All rights reserved. Chapter 9 Controlling Information Systems: Process Controls.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
General Ledger and Reporting System
Chapter 6 The Expenditure Cycle Part II: Payroll Processing and
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Chapter 17: Computer Audits ACCT620 Internal Accounting Otto Chang Professor of Accounting.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Transaction Processing and the Internal Control Process Small Business Information Systems Professor Barry Floyd.
Implications of Information Technology for the Audit Process
Copyright © 2007 Pearson Education Canada 1 Chapter 13: Audit of the Sales and Collection Cycle: Tests of Controls.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Information Systems Security Operational Control for Information Security.
System Analysis and Design
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
Internal Control & EDP “ Man is a tool using animal” –Thomas Carlyle, 1836 “A tool is but an extension of a man’s hand. He that invents a machine augments.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
Chapter 10 THE ACQUISITION CYCLE— PURCHASE INVOICES AND PAYMENTS.
Auditing the Revenue Cycle. Learning Objectives After studying this chapter, you should: Understand the operational tasks associated with the revenue.
Enterprise Resource Planning System (ERP) Flowchart #7
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
The Impact of Information Technology on the Audit Process
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Electronic Data Processing Systems Chapter 6.
Accounts Receivable, Accounts Payable & Cash
Accounting Information Systems: A Business Process Approach
Transaction processing systems
Internal Control and Cash
Controlling Computer-Based Information Systems, Part II
Processing Integrity and Availability Controls
Managing the IT Function
The Impact of Information Technology on the Audit Process
The Impact of Information Technology on the Audit Process
Problem DC 10-2, Page 547 What is K? The confidence factor
Chapter 10: Auditing the Expenditure Cycle
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Internal Controls and Cash
Footwear Planning and Production Process
Presentation transcript:

Chapter 14 System Controls

A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The dog will be there to keep the man from touching the equipment.” Warren Bennis

Learning Objectives l To understand controls in computer-based accounting systems. l To learn the objectives of system controls - preventive, detective, corrective. l To study general controls and application controls.

System Controls l Internal Controls implemented in a computer-based accounting information system are called system controls.

Objectives of Controls l Preventive Controls »e.g. credit card approval check, valid account check, valid purchase order check, check authorization, segregation of duties... l Detective Controls »e.g. Trial balance, using pre-numbered forms, requiring documentation of program changes... l Corrective Controls »e.g. policy of writing an adjusting entry to correct an error found in the trial balance, procedures to change a program...

Scope of Controls l General Controls »Controls affecting all applications l Application Controls »Controls specific to applications

What are some of the General Controls ? l Organization of the MIS department such that there is segregation of duties »Systems Analysts and Programmers »Computer Operators and Programmers »Data Control and Librarian l Procedures for system and program changes »Formal review and authorization for new systems »Adequate documentation »Formal testing procedures for new and modified systems »Authorization and documentation for changes made in systems

General Controls Contd... l Hardware controls »Parity check »Dual read »Read after Write »Echo check

General Controls Contd... Access Controls l Segregation of duties l Identification and Authentication Procedures »Userid and password »Automatic callback »Limited data file access - read/write access l Physical security »only authorized personnel should be allowed to enter the data center, tape library, computer operations desk.

General Controls Contd... l Other data and procedure controls »File backup procedures. »Batch and Batch with on-line inquiry - grandfather- father-son technique. »On-Line real time systems - file dumps and transaction logs.

General Controls Contd... Contingency Plans l Adequate insurance for lost equipment, software and business loss. l Designated alternative processing location. l Identifying vital applications. l Off-site storage location. l Assigning responsibility to carry out the contingency plan.

What are some of the Applications Controls ? l Input Controls l Processing Controls l Output Controls

Input Controls Data Validation (preventive control) l Field check (e.g. Numeric field should contain numeric data) l Validity check (e.g. Valid account numbers) l Sign Check (e.g. positive) l Limit check (e.g. age field should be between 20 and 65, weekly hours worked should be less than 80, l Sequence check (e.g., check no., transaction no.) l Completeness check (no blank amounts or no blank accounts) l Default values e.g. if a field is blank, assume a default value.

Input Controls Contd... l Check Digits »self checking number (modulus 11) l Control Totals (used in detective controls) »Batch total - used in a batch system. »Amount or Quantity total - serves as control total and used for decision maker. »Hash total - only serves as control total e.g. sum of account numbers. »Record count.

Input Controls Contd... Direct data entry procedures l Source input documents. e.g. Optical character reader for multiple choice exam forms l Turnaround documents (magnetic ink character reader) l Point of sale data entry (Cash registers acts as computer terminal)

Processing Controls l Sequence Checks »confirms the sort order l Run-to-run Controls »uses control totals l Physical File Identification »external file labels »internal file labels l Programmed Controls »crossfooting check

Output Controls l To ensure the accuracy of the results of processing. l To ensure that only authorized personnel receive the reports produced by an application. l Performed by data control group. l Output distribution log.

End of Chapter 14