IT Controls Part I: Sarbanes-Oxley & IT Governance 1 Accounting Information Systems, 5 th edition James A. Hall.

Slides:



Advertisements
Similar presentations
IT Controls Part I: Sarbanes-Oxley & IT Governance
Advertisements

Hall, Accounting Information Systems, 7e ©2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Control and Accounting Information Systems
Auditing Concepts.
Auditing Computer Systems
9 - 1 Computer-Based Information Systems Control.
Auditing IT Governance Controls
SOX and IT Audit Programs John R. Robles Thursday, May 31, Tel:
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Standar Pekerjaan Lapangan: Pemahaman Memadai atas Pengendalian Intern Pertemuan 5.
Chapter 9 The Study of Internal Control and Assessment of Control Risk
Auditing A Risk-Based Approach To Conducting A Quality Audit
18- 1 © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 18 Integrated Audits of Internal Control (For Public Companies Under Sarbanes-Oxley.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Purpose of the Standards
Nature of an Integrated Audit
Information Systems Auditing and Assurance
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Auditing Internal Control over Financial Reporting
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Auditing Internal Control over Financial Reporting
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Implementation Issues of Sarbanes-Oxley CASE Presentation September 23, 2004 By Denise Farnan.
Chapter 5 Internal Control over Financial Reporting
Considering Internal Control
Internal Control in a Financial Statement Audit
BusinessAllstars.com 1 BusinessAllstars.com Presents Copyright © 2004 by Gainbridge Associates All right reserved This material may not be used or reproduced.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Internal Control in a Financial Statement Audit
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
© 2011 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Evaluation of Internal Control System
Evaluation of Internal Control System. Learning Objective 1 Contrast management’s need for internal control with the auditor’s need to consider internal.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
CHAPTER 5 INTERNAL CONTROL OVER FINANCIAL REPORTING.
Casualty Loss Reserve Seminar General Session II September 9, 2003 Section 302/404 of Sarbanes-Oxley Act What Actuaries Need to Know Jan A. Lommele, FCAS,
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
Chapter 9: Introduction to Internal Control Systems
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
A Guide for Management. Overview Benefits of entity-level controls Nature of entity-level controls Types of entity-level controls, control objectives,
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
18-1 Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Chapter 15A IT Controls Part I: Sarbanes-Oxley & IT Governance.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Internal Control and Control Risk Chapter 10.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Auditing Concepts.
Internal Control Evaluation: Assessing Control Risk
Controlling Computer-Based Information Systems, Part I
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

IT Controls Part I: Sarbanes-Oxley & IT Governance 1 Accounting Information Systems, 5 th edition James A. Hall

 Key features of Sections 302 and 404 of Sarbanes-Oxley Act  Management and auditor responsibilities under Sections 302 and 404  Risks of incompatible functions and how to structure IT function  Controls and security of organization’s computer facilities  Key elements of disaster recovery plan

 The 2002 Sarbanes-Oxley (SOX) Act established new corporate governance rules ◦ Created company accounting oversight board ◦ Increased accountability for company officers and board of directors ◦ Increased white collar crime penalties ◦ Prohibits a company’s external audit firms from providing financial information systems

 Section 302—in quarterly and annual financial statements, management must: ◦ certify the internal controls over financial reporting ◦ state responsibility for internal control design ◦ provide reasonable assurance as to the reliability of the financial reporting process ◦ disclose any recent material changes in internal controls

 Section 404—in annual report on internal control effectiveness, management must: ◦ state responsibility for establishing and maintaining adequate financial reporting internal control ◦ assess internal control effectiveness ◦ reference the external auditors’ attestation report on management’s internal control assessment ◦ provide explicit conclusions on the effectiveness of financial reporting internal control ◦ Identify the framework management used to conduct their internal control assessment  For example - COBIT

 Modern financial reporting is driven by information technology (IT)  IT initiates, authorizes, records, and reports the effects of financial transactions. ◦ Financial reporting internal control are inextricably integrated to IT.  COSO identifies two groups of IT controls: ◦ application controls – apply to specific applications and programs, and ensure data validity, completeness and accuracy ◦ general controls – apply to all systems and address IT governance and infrastructure, security of operating systems and databases, and application and program acquisition and development

 Pre-SOX, audits did not require internal control tests. ◦ Only required to be familiar with client’s internal control ◦ Audit consisted primarily of substantive tests  SOX – radically expanded scope of audit ◦ Issue new audit opinion on management’s internal control assessment ◦ Required to test internal control affecting financial information, especially internal control to prevent fraud ◦ Collect documentation of management’s internal control tests and interview management on internal control changes

 Tests of controls – tests to determine if appropriate internal controls are in place and functioning effectively  Substantive testing – detailed examination of account balances and transactions

 Audit objective – verify that individuals in incompatible areas are segregated to minimize risk while promoting operational efficiency  internal controls, especially segregation of duties, are affected by the type of organizational structure: ◦ Centralized model ◦ Distributed model

President VP Marketing VP Computer Services VP Operations VP Finance Systems Development Database Administration Data Processing New Systems Development Systems Maintenance Data Control Data Preparation Computer Operations Data Library President VP Marketing VP Finance VP Operations Work station VP Administration TreasurerController Manager Plant X Manager Plant Y CENTRALIZED COMPUTER SERVICES FUNCTION DISTRIBUTED ORGANIZATIONAL STRUCTURE Work station Work station Work station Work station Work station

 Need to separate: ◦ systems development from computer operations/processing ◦ database administrator and other computer service functions  especially database administrator (DBA) and systems development  DBA authorizes access ◦ maintenance and new systems development ◦ data library and operations 11

 Many advantages to using DDP, yet there are control implications: ◦ incompatible software among various work centers ◦ data redundancy may result ◦ consolidation of incompatible tasks ◦ lack of standards 12

 Corporate computer services function/information center may help to alleviate potential problems associated with DDP by providing: ◦ central testing of commercial hardware and software ◦ user services staff ◦ standards setting body ◦ reviewing technical credentials of prospective systems professionals 13

Operating System Data Management Systems Development Systems Maintenance Organizational Structure Internet & Intranet EDI Trading Partners Personal Computers Computer Center Security Applications Internet & Intranet General Control Framework for CBIS Exposures

Audit objectives: ◦ physical security internal control protects the computer center from physical exposures ◦ insurance coverage compensates the organization for damage to the computer center ◦ operator documentation addresses routine operations as well as system failures

Considerations:  location away from human-made and natural hazards  utility and communications lines underground  keep windows closed – use air filtration systems  access limited to operators and other necessary workers; others required to sign in and out  fire suppression systems should be installed  backup power supplies 16

 Transaction authorization is separate from transaction processing.  Asset custody is separate from record- keeping responsibilities.  The tasks needed to process the transactions are subdivided so that fraud requires collusion.

Authorization Processing Custody Recording Task 1Task 2 Task 3Task 4 CustodyRecording Control Objective 1 Control Objective 3 Control Objective 2 TRANSACTION

 Review corporate policy on computer security ◦ Verify that security policy is communicated to employees  Review documentation to determine if individuals or groups are performing incompatible functions  Review systems documentation and maintenance records ◦ Verify that maintenance programmers are not also design programmers  Observe if segregation policies are followed in practice. ◦ Example: check operations room access logs to determine if programmers enter for reasons other than system failures  Review user rights and privileges ◦ Verify that programmers have access privileges consistent with their job descriptions

 Review insurance coverage on hardware, software, and physical facility  Review operator documentation, run manuals, for completeness and accuracy  Verify that operational details of a system’s internal logic are not in the operator’s documentation

 Disaster recovery plans (DRP) identify: ◦ actions before, during, and after the disaster ◦ disaster recovery team ◦ priorities for restoring critical applications  Audit objective – verify that DRP is adequate and feasible for dealing with disasters

 Major IC concerns: ◦ second-site backups ◦ critical applications and databases  including supplies and documentation ◦ back-up and off-site storage procedures ◦ disaster recovery team ◦ testing the DRP regularly

 Disaster recovery plan ◦ Include all actions to be taken before, during, and after disaster ◦ Disaster Recovery Team identified ◦ critical applications (modules/programs) must be identified  restore these applications first  Backups and off-site storage procedures ◦ databases and applications ◦ documentation ◦ supplies 23

 Mutual Aid Pact - agreement between two or more organizations (with compatible computer facilities) to aid each other with their data processing needs  Empty Shell/Cold Site - involves two or more user organizations that buy or lease building and remodel it into computer site, but without computer equipment  Recovery Operations Center/Hot Site - completely equipped site; very costly and typically shared among many companies  Internally Provided Backup - companies with multiple data processing centers may create internal excess capacity 24

 Evaluate adequacy of second-site backup arrangements  Review list of critical applications for completeness and currency  Verify that procedures are in place for storing off-site copies of applications and data ◦ Check currency back-ups and copies  Verify that documentation, supplies, etc., are stored off-site  Verify that disaster recovery team knows its responsibilities ◦ Check frequency of testing the DRP

From Appendix

 Attestation: ◦ CPA is engaged to issue written communication that expresses conclusion about reliability of written assertion that is responsibility of another party.  Assurance: ◦ professional services that are designed to improve quality of information, both financial and non-financial, used by decision-makers ◦ includes, but is not limited to attestation

 An independent attestation by professional (CPA) regarding the faithful representation of the financial statements  Three phases of a financial audit: ◦ familiarization with client firm ◦ evaluation and testing of internal controls ◦ assessment of reliability of financial data

 External auditors – represent interests of third party stakeholders (financial institutions, shareholders, other creditors, etc.)  Internal auditors – serve an independent appraisal function within the organization ◦ Often perform tasks which can reduce external audit fees and help to achieve audit efficiency and reduce audit fees

Since most information systems employ IT, the IT audit is a critical component of all external and internal audits.  IT audits: ◦ focus on the computer-based aspects of an organization’s information system ◦ assess the proper implementation, operation, and control of computer resources

 Systematic procedures are used  Evidence is obtained ◦ tests of internal controls ◦ substantive tests  Determination of materiality for weaknesses found  Prepare audit report & audit opinion

Phases of an IT Audit

the probability the auditor will issue an unqualified (clean) opinion when in fact the financial statements really are materially misstated.

 Inherent risk is associated with unique characteristics of business/industry of client.  Control risk is likelihood that the control structure is flawed because controls are either absent or inadequate to prevent/detect errors in the accounts.  Detection risk: the risk that auditors are willing to take that errors not detected/ prevented by the control structure, and will also not be detected by the auditor.

38