Uploaded by Elle Engelbrecht

Auditing Course Material: Principles & Process

advertisement
AUDITING
378
MADE BY TAKINGNOTES.CO.ZA
to
CAS
WWW.TAKINGNOTES.CO.ZA
Auditing 288/388
The following topics will be dealt with in Audit 288/388:
- Introduction and background to auditing
- Internal control and cycles
- Ethics and auditor’s legal responsibility
- Audit process
Introduction and background to auditing:
(AF Ch. 1,3)
Foundational principles:
- Auditor
- Definition of an audit
- Purpose of an audit
- Auditing profession
- Types of audits
- Types of auditors
- Types of services
- Company act requirements
Learning outcomes:
- Describe the definition of an audit, and explain the duties and environment in which
the auditor works
- Describe the underlying principles of the audit profession
- Differentiate between types of audits, services and auditors
- Discuss the companies act requirements
- Discuss the link between the different subjects
- Fundamental principles in auditing – auditing postulates
Background:
Why the need for accounting records?
Used by management to:
- Record and keep track of transactions and economic activities
- Obtain relevant information in a timely manner so management can make informed
decisions
- Measure results and evaluate performance against goals and targets
- Prepare financial statements for reporting to external parties
Objective of financial statements:
To provide financial information about an entity that is useful to users in making economic
decisions.
Responsibilities w.r.t the financial statements:
Accounting department = day-to-day responsibilities of the financial function
Directors = Responsible for accounting records and financial statements
CFO = Overseeing and finalisation of the financial statements
Audit committee = Subcommittee of the directors, for assistance
What is an auditor?
- They are assurance givers, express conclusion designed to enhance the degree of
confidence of the intended user
- Satisfy him of herself to the truth of bookkeeping of others
- Independent
Why do we need auditors?
- Statutory audits – Required by statute
- Principal-Agent theory - Owners (Sh/h) and management are split:
• Owners delegate decision-making powers to the directors
• The directors have to act in the best interest of the owners
• Therefore, independent party (auditor) reports to the owners whether the
directors fairly present the financial effects of activities in the financial statements
Auditors reinforce trust
What is the definition of an audit?
- Systematic process
- To gather and evaluate evidence and information objectively
- To evaluate the assertions about economic actions and situations made by
management of the entity
- To determine the correlation with predefined criteria - quantitative and qualitative
- And communicate the results in writing
- To users
What is the purpose or objective of an audit?
- To express an opinion on the financial statements
- That they are free of material misstatements
- And that they are a fair representation in all material aspects
- Of the financial position and performance of the company/ entity
- In accordance with the appropriate financial reporting framework
The objective is to provide reasonable assurance. There are unavoidable risks due to the
inherent limitations of an audit.
The objective is NOT to:
- Guarantee the existence of the company
- Detect fraud
The auditors’ opinion enhances the credibility of the financial statements but does not
warrant the future feasibility of the company and does not warrant the capability and
effectiveness with which management manages the operations of the entity.
How does an external audit add value?
- Encourages good corporate governance
- Makes it safer to invest in an entity
- Improves legitimate tax collection, therefore reducing tax for all
- Improves the accuracy of information in financial statements
- Enhances credibility from the users perspective
- Leads to better decision-making
What are the inherent limitations of an audit?
1. The nature of financial reporting:
• Management use judgement in preparing financial statements when applying
IFRS and making estimates
2. The nature of audit procedures:
• Practical and legal limitations on audit
• Management provides documentation and explanation on which to base
conclusions, may be intentionally or unintentionally wrong (incorrect, incomplete
or misrepresented)
• Management may try to hide fraud
3. Timeliness of financial reporting and balance between benefit and cost
• Reliability of evidence versus cost
• Time and resources available – Use of sampling
Impractical to verify or audit all information due to cost constrains on time and
resources available. Therefor samples are used and unavoidable risks rise due to
undetected errors
Auditing profession:
Types of auditors:
- External auditor: Independent auditor
- Internal auditor: Employee, renders a service to the entity
- Attorney General (Public auditor): Auditor General, SARS
- Forensic auditor: Investigates fraud
- Special purpose auditor: Whether particular provisions of a contractual agreement,
such as a loan agreement have been complied with.
What are the duties and responsibilities of an auditor?
- To communicate opinion
- To investigate annual financial statements
- To ensure that appropriate accounting records have been kept in accordance with
the company’s requirements
- To ensure that minute books and attendance registers in respect of company,
directors’ and managers’ meetings have been kept in the appropriate form as
required by the Companies Act
- To acquire all information and explanations, that to his/her knowledge and conviction
are necessary for the purpose of the performance of duties
- To ascertain that annual financial statements agree with the accounting records and
accounts
- To investigate the accounting records of company and to perform tests and other
audit procedures found necessary to ensure that annual financial statements:
• Reasonably reflect the financial position of the company
• The results of its operations are in accordance with generally accepted
accounting practise, applied on a basis that is compatible with that of the
previous year
- To ensure that the directors’ report is not in breach of or its meaning distorted with a
reasonable interpretation of the annual financial statements and accompanying notes
- To adhere to any appropriate requirements of the Auditing Profession Act at all times
What are the characteristics of an auditor?
- Independence
- Integrity
- Objectivity
- Professional competence and due care
- Confidentiality
- Professional behaviour
Types of audits:
- Financial statement audit
- Compliance audit
- Operational or performance audit
Types of services:
- Assurance services
• Reasonable assurance – Audit
• Moderate assurance – Independent Review
- Non-assurance services
• Consultation services – Tech, International, Financial planning, Taxation
• Compilation
• Agreed upon procedures
What elements have to be present to have an assurance engagement?
- Three party relationship (Owner, Director, and Auditor)
- Appropriate subject matter
- Suitable criteria
- Evidence
- Assurance report
What is the difference between a private audit and a public sector audit?
Private audit:
- Audit of entities
- In terms of the auditing profession act
- Audit of: Financial statements
Public Sector Audits:
- Audit of government
- In terms of The Public Audit Act
- Audit of:
• Financial statements
• Compliance with laws and regulations
• Performance in terms of predetermined criteria
What are the Companies Act requirements
Directors/ Company:
- Fin YE date
- Accounting records
- Compile AFS
- Approve & AGM
Auditor:
- With inception - members or directors
- Otherwise Registrar
- Annual appointment
- Access to records, books, docs, info and explanations
- Report to members
- Other responsibilities (s90-93)
What are the postulates or assumptions on which the theory of auditing is based?
- The information subject to an audit is verifiable
- The information subjected to an audit must be compiled or prepared in accordance
with an identified set of criteria
- When an auditor investigates information with the purpose of expressing an opinion
about it, he/ she acts exclusively in his/ her capacity as auditor
- An audit must be performed by a person who is independent from the entity being
audited and who is able to make objective decisions and come to unbiased
conclusions
- The process of creating an opinion consists of the collection of persuasive audit
evidence in accordance with a risk approach
- The auditor’s opinion is expressed in the form of a report on the audited information
- The professional status of an independent auditor imposes commensurate
obligations
The auditing postulates are based on:
- Truth and fairness
- Independence
Internal control and introduction to cycles
(AF Ch. 4)
Underlying principles of internal control:
- Audit process
- Definition of internal control
- Inherent limitations of internal control
- Auditor’s duty
- Components of internal control
- Control objectives
Learning outcomes:
- Outline and discuss the definition of internal control (IC)
- Describe the inherent limitations of IC
- Outline the auditor’s responsibility in respect of IC
- Name, describe and practically apply the components of IC
- Formulate control objectives for different transactions (TO ENSURE THAT)
How does the audit process look?
International Standards on Auditing (ISA’s) govern the audit process.
There are 4 stages of the audit process:
1. Pre-engagement
2. Planning
3. Obtaining evidence
4. Evaluation, conclusion and reporting
Covered in detail in the topic: Audit Process
Internal controls are part of the planning stage of the audit process. The auditor has to gain
an understanding of the accounting system and the internal controls of the company (client)
it is auditing. The planning stage consists of: Gaining knowledge of the business, Risk
evaluation, Materiality
What is the definition of a system of IC?
The process designed and effected by management to provide reasonable assurance about
the achievement of entity’s objectives relating to:
- Reliability of financial reporting
- Effectiveness and efficiency of operations
- Compliance with laws and regulations
Discuss the definition a system of IC:
- Process
• System of IC that involves a combination of systems, policies and procedures
• 5 Components of IC
- Responsibility
• IC executed by people/ computers. Board should acknowledge responsibility
- Objectives
• IC measures implemented are determined based on risks which threaten the
achievement of the entity’s objectives relating to reporting, operations and
compliance
- Reasonable assurance
• Due to the inherent limitations of a system of internal control.
What are the inherent limitations of IC?
IC can only provide reasonable assurance because:
- Cost vs Benefit: Implement cost-effective IC’s, not always the best
- Directed at routine, repetitive transactions
- Risk of human error: Judgement of employee can be incorrect (time constraints,
insufficient information)
- Collusion to circumvent controls
- Abuse of responsibility and override IC measures for own benefit
- IC become inadequate over time
What are the auditor’s duties and responsibilities in an audit?
For what should an auditor obtain an understanding of the client’s IC?
- Risk evaluation
• To identify types of potential material misstatements and
• Consider factors that influence material misstatements
Response to controls as evaluated
• Influence nature, timing and extent of audit procedures
• Also consider other parties
Of what should the auditor gain an understanding?
The design and implementation of controls
- Properly developed and implemented
- Properly designed to detect and prevent mistakes
What does the auditor do?
- Evaluate applicability/ risk (CR)
• Determine how it is addressed by management
- 2. Test/ measure
• Conduct tests of control
How does an auditor gain the necessary knowledge to perform his/ her duties?
- Prior experience and knowledge
- Discussions and enquiries with staff
- Reading manuals
- Inspect documentation and records
- Observation
- Walk through tests
What needs to be present in the documentation?
- System description
- Internal control questionnaire
• Yes: Sound IC
• No: Weakness in IC – potential risk
• Consider compensating control
- System flow charts
• Standardised symbols
• Flow of documents
• Sequence of events
• Duties and responsibilities of staff.
How do you design a system of internal control?
Identify risks > Formulate your control objective > Use components of IC to design
Internal Control Components:
What are the IC components?
Components used by management to design a suitable system of IC to mitigate risks
Five components:
1. Control environment
2. Risk assessment process
3. Information system for financial reporting and communication
4. Control activities
5. Monitoring
All five these components have to be present for a sound system of IC.
Description of the components of a system of IC:
1. Control environment
The control environment is created by management and provides a favourable environment
in which the other components of IC could function.
Encompasses the attitude of management toward IC.
What are the characteristics of a sound system of IC?
Management can create and foster a positive attitude by implementing the characteristics.
- Integrity and ethical values
- Commitment to competence
- Board of Directors and Audit Committee
- Managements philosophy and operating structure
- Organisational structure
- Assignment of authority and responsibility
- Human resource policies and procedures
Why does an auditor want to evaluate the control environment?
It is important for the auditor to evaluate the environment, because an effective system of IC
is not possible if a favourable control environment was not created. This helps us to access
the risk of material misstatements of the financial statements
2. Risk assessment process
What is the definition of risk assessment in a system of IC?
The risk assessment process is the way that management of an organisation:
- Identifies risks relevant to the business
- Estimates the significance and likelihood of the risk occurring (or assesses the risk)
- Decides on actions to respond to manage the risk = Risk management
What is risk management?
It is the identification and evaluation of actual and potential risks followed by a procedure of
adequate response.
Risk identification – Identify risks to which the entity is exposed using:
- Triple context: Economic, Environment and Society
- Capitals: Financial: Financial, Manufactured, Intellectual, Human, Social and
Relationship, and Natural.
Risk evaluation – Determine the significance of the risk.
- Consider impact and likelihood of materialisation
- Quantify, rank and prioritise the identified risks
After the risks is identified and evaluated – Decide on appropriate risk response
On what does an appropriate risk response depend?
- Risk appetite
How much and which type of risk entity is willing to accept
- Levels of risk tolerance (determined by Board)
Specific quantified limits of risk the entity can tolerate to achieve objectives
- Residual risk
Risk that remains after treating the risk with the most appropriate risk response
What types of risk responses are there?
- Tolerance or acceptance of the risk
• Only react if/ when risk occurs
• Insignificant risks, cost to recover < cost to plan
- Transferring the risk to a third party
• Moving risk to third party
• Not eliminating risk, you only have insurance for when the risk occurs
- Mitigation (treatment/ reduction) of identified risks
• Reduce the probability or impact of unacceptable risk
• Suitable system of IC
- Avoidance/ termination of activity or process that creates the risk
• Possibility of the risk occurring is eliminated
- Exploitation of the opportunity created by the risk
• Exploit the opportunity to entity’s benefit
• Take the action to ensure that risk occurs
• Thus, there are no uncertainty
- Combination or integration of all of the above
Keep a risk register of the relevant information regarding the identified risks.
It should be regularly updated and include the following:
- Key risks to which the entity is exposed
- Likelihood of them materialising
- Potential impact on business
- Management’s responses
3. Information system for financial reporting and communication
What is the information system?
It is the procedures and records established to initiate, record, process and report entity
transactions, events and conditions and to maintain accountability for related assets,
liabilities and equity
It consists of the following 4 stages:
- Initiate and execute – transaction
Physical activities relating to where transaction initiated (decision and approval) or
execution through performing activities to complete the transaction (implementation)
- Record – documentation/ records
Information applicable to the transaction is recorded on a source document (HC/ ET)
- Process – accounting records and FS closing process
Transaction is processed and corresponding entries are made in accounting records
Accounting records are records of initial accounting entries and supporting records
Includes general and subsidiary ledgers, journal entries and spreadsheets
- Report – financial statements
Stage where the transaction included in the financial statements, embody assertions
4. Control activities
What are control activities?
They are IC measures, policies and procedures implemented and designed by management
to ensure the objectives are achieved
There are six control activities: (SCRRAM):
- Segregation of duties
- Access control
- Independent review and reconciliations
- Documentation and records
- Authorisation
- Monitoring (detective)
S – Segregation of duties
- Segregate incompatible functions
- Reduces the probability that one person can commit error or fraud and hide it
- Authorisation, execution, record, control and safeguarding should always be
segregated.
Guidelines to effect proper segregation of duties:
- No transaction is performed by the same person from beginning to end
- Optimally each irreconcilable function should be performed by different individuals
- The irreconcilable functions that should be separated are:
• Authorisation of transaction
• Execution of transaction
• Record-keeping of transaction
• Control over/ safekeeping of asset
- There should be identification of responsibility with regard to persons who have
completed the work (e.g. stamp/ signature)
- Person in charge of an asset should not also be in charge of its accounting records
C – Access control
- Restricting physical access including control to protect assets, stationary, and
information
- Logical and physical access.
Rv – Independent review and reconciliations
- The work/ duties of one person independently reviewed/ checked by second person
- Evidence of review by signature, also assigns responsibility
Rc – Documentation and records
- Document design – pre-printed, pre-#, layout, initials, numerous copies,
- Stationary control – safeguarded, sequential numbering, register
- Chart of accounts – list of general ledger accounts
A – Authorisation
- Different levels of approval for various classes of transactions/ values determined by
the company policy
- Before authorisation, review is allowed.
- Evidence of authorisation required – signature
M – Monitoring
- Comparison (actual vs recorded) and reconciliation (SL vs GL)
5. Monitoring of controls
What is monitoring?
- Evaluate effectiveness of IC and take corrective actions where needed
What are the control objectives?
Validity:
Control ensures that transaction/ event:
- Authorised AND
- Occurred
- During the period AND
- Supported by documentation
Completeness:
Control ensures that all the transactions that occurred during the period are:
- All recorded
- Recorded in a timely manner
- None omitted
Accuracy:
Control ensures that the transaction/ event accounted for:
- Correct amounts (quantity, calculations, price)
- Correctly classified
- Correctly summarised and posted to …
Very important.
When formulating control objective remember to ask yourself: What do you want to do?
And start answer with:
TO ENSURE THAT!
Remember when you formulate a control objective, there are NO PEOPLE, ACTIONS, OR
DOCUMENTS.
How do you formulate control objectives?
Ask the following:
- Which part of transaction?
- What is the specific control objective?
- What are the risks linked to that control objective?
- Then formulate: TO ENSURE THAT…
Cycles:
The following cycles will be covered in Audit 288/388:
- Revenue and receipt cycle
- Purchases and payment cycle
- Inventory and production cycle
- Bank and cash cycle
- Salaries and wage cycle
- Investment and financing cycle (Self-study)
How does a business work?
Framework of cycles:
- Transaction types and functions
- Risks
- Controls
- Recommendations
- Weaknesses
Learning outcomes for cycles:
- Describe the nature of various cycles including the application accounts and
transaction types and functions
- Describe the control objectives applicable in the cycle
- Explain what could go wrong (risks or weaknesses) in the cycle including the
consequences thereof
- Make recommendations to improve weaknesses
- Design a suitable internal control system
Remember: Consequences are always linked to a control objective
CASH SALES CYCLE
Stuvia.com - The Marketplace to Buy and Sell your Study Material
ACCEPT AND PROCESS ORDER
ORDER FORM
1.
2.
3.
4.
5.
Customers’ orders goods
The order clerk must prepare a prenumbered order form that includes the
details of the purchaser, description &
amount
• Prices as quoted to client
• Prices according to approved price
lists
• The previous year sales levels to
determine if the person qualifies for
discount
The order must be sent to the credit
manager:
• Check that all info is correct and if
client is a member
• Ensures that clients fill credit form /
authorizes credit
• Sign document
• Compare the prices with the
approved prices
The copy that remains in the dept. must
then be:
• Filed in # sequence & check
• Outstanding orders must be followed
up on
Copies:
• Customer – as evidence that order is
executed
• Acc dept. – as evidence that the
order has been received
• Warehouse – order can be prepared
• Order clerk – for our own records
and invoicing
WHEN THE GRANTING
OF CREDIT OCCURS
ORDER FORM
1.
2.
New client
• There should
be a credit
application
and approval
• Credit checks
• A credit limit
should also be
set
Existing client
• Available
credit
• Additional
credit
DISPATCHING OF GOODS
DELIVERY NOTE (INVENTORIES AVAILABLE)
1.
2.
3.
4.
5.
6.
7.
8.
In the warehouse:
• The order is sent to the WH
• The storeman then sends an email to the sales
dept. to confirm receipt of the order
• The chief storeman then instructs the packers to
pack the order
The delivery note must be & incl:
• Pre-numbered and prepared by one of the
storeman
• Date of dispatch
• The purchaser and address
• The description and amount in fivefold
The delivery note must be authorised & signed by chief
storeman
Before goods leave WH, the storeman must:
• Compare physical goods with delivery note
• Check QQD and ensure correct stock has been
dispatched
• If differences à notify order clerk in writing
A list of undelivered items should be kept à once
available the storeman should inform the order clerk
The # sequence of the delivery note must be checked and
outstanding items must be followed up on
The delivery register must be reviewed regularly by the
security guard
Copies:
• Two copies to client for QQD review
• One signed by the client and returned to delivery
staff
• The order must be signed by delivery staff to
ensure he is happy with the conditions of goods
• Sales dept. – as evidence that order was executed
• Remains at WH – as evidence that inventories have
been dispatched
• Inventory clerk – so inventory records can be
updated
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
INVOICING AND RECORDING
SALES INVOICE
1.
2.
3.
4.
5.
6.
7.
8.
9.
The signed delivery note is sent to the Invoicing
clerk who checks signature and a pre-numbered
sales invoice is drawn up in duplicate:
• Info of purchaser
• Sales transaction & amount owing
• Payment conditions
The # sequence is checked by the accountant &
outstanding orders must be followed up on
The invoicing clerk/accountant (SoD) must:
• Agree to info on invoice
• Check castings and VAT
• Compare price with the authorised price list
A suspense file for no signed delivery notes must
be kept and checked regularly by the accountant
The accountant will then post the invoice to the
sales journal and then to debtors and general
journal
The accountant must then perform a monthly
recon and signs as proof
Copies:
• Customer – so that he can pay for the goods
delivered
• Acc dept. – as evidence that the goods have
been invoiced
Account/monthly statement
• Monitoring of control objectives
• A pre-numbered monthly statement must
be created in twofold:
i. Customer – inform of
account balance
ii. Acc dept – as a record of
statements issued
• Details: Invoices issued, payments made,
discounts allowed, returns & end balance
Payment advice slip – attached to the monthly
statement indicating payment
CASH RECEIPTS CYCLE
Stuvia.com - The Marketplace to Buy and Sell your Study Material
RECEIVE MONEY
RECEIPT
1. Cash receipt
• Payment by cash, cheque and credit card,
together with the payment advice presented
via mail or in person
• To ensure good internal control, the mail
must be opened by 2 people and there
should be a mail register
2. The cash receipts must be kept safe & the accuracy
is checked and authorised by the manager and
signed
3. Copies:
• Once payment is received, a pre-numbered
cash receipt in twofold is issued.
• Details include: details of payee, the date and
amount.
• Customer – as proof of payment
• Acc dept. – for recording money received.
This can be done in either a receipt book or in
a cash register roll
DEPOSIT RECEIPTS
DEPOSIT SLIP
1. Segregation of duties
• Deposit cash daily
• CRJ posted to GL and DL by a different person
• Bank reconciliation
2. Deposit slip – this is a bank document filled in by
the business to record a deposit of payments
received from customers
3. Details include:
• Date of deposit
• Details of the cheque
• Amount of the cash and cheque
• Total amount received
4. The accuracy should be checked & authorised my
management and signed (SoD)
5. The depositing of cash should be done daily
6. The deposit slip is then used to complete the CRJ
which is posted to the GL & DL (SoD)
7. Monitoring
• Monthly recons must be conducted by the
accountant
• Bank recon
• Debtors’ recon
8. All these docs must be signed as evidence that they
have occurred
9. The recording and recons of deposit slips must be
done by separate people
10. Copies:
• Bank – for depositing of money received
• Acc dept. - so that the business can record
money deposited
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
RECORDING
1.
2.
3.
4.
CRJ
GL
DL
Reconciliations performed
RETURNS CYCLE & CREDIT LOSSES
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1.
2.
3.
4.
5.
6.
7.
RETURNS AND GRANTING OF CREDIT
ALLOWANCE FOR CL & WRITE-OFF OF BAD DEBTS
CREDIT NOTE
BAD DEBT AUTHORISATION FORM
Credit note – when goods are received back from customers, the clerk
1. Provision for bad debts
checks the returned goods (QQD) with proof of purchase (invoice)
• Management must calculate a figure for P4BD by using a debtors’
age analysis
A pre-numbered credit note is then issued
• Details on the person returning the goods
• Management must authorise the P4BD by issuing a signed notice
• Description of goods and amount
• The amount must equal a % of the debtors balance
The credit note must be checked and authorised by the credit manager
• The amount may need to be adjusted at the end of the period
and signed
• The provision must be correctly recorded in the SFP and SCI
The credit note is then used to compile the sales return journal, which is
• Authorised à Calculated à Adjustment of the provision à
then posted to the ledgers
recorded in the SFP & SCI
2. Write off debtor as a bad debt
The returned goods must then be sent to inventory dept. or WH. The
goods are checked by the storeman with the credit note
• When the debtor is not paying & we have launched an investigation
– a pre-numbered bad debt authorisation form must be compiled by
The number sequence must be checked and then missing orders followed
up on
a committee or minutes of meeting and presented in two-fold
The inventory records are then updated and include goods returned
• Details must include:
i. Info on the debtor
ii. The date
iii. The amount written off
• The debtors recording dept. will decrease the debtors account by
the amount stipulated
• Own records of the committee authorising the write-off must be
adjusted in order to have a history of debt written off
• The writing off of bad debts must be authorised by management
after an independent staff member has checked whether the client
can pay or not
• The write off must then be recorded in the SCI where the decrease
of debtors and increase in bad debts occurs.
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
TEST OF CONTROLS
REVENUE & RECEIPTS CYCLE
FORMULATE CONTROL OBJECTIVES
CASH RECEIPTS
To ensure that
• cash receipts are authorised in terms of the company policy. – N/a
• cash receipts relate to actual cash that has been received during the current financial period.
• no cash receipts are stolen.
• cash receipts are supported by a receipt.
• all cash receipts recorded in the cash receipts journal and none were omitted.
• all cash receipts that occurred are recorded in a timely manner.
• cash receipts were recorded at the correct amounts in the cash receipts journal
• calculations on the receipts were performed accurately
• cash receipts are classified currently/included in the correct general ledger accounts.
• cash receipts were correctly summarised and posted from the cash receipts journal to the general ledger
ORDERS FROM CUSTOMERS
To ensure that
• orders are from valid customers (real customers/not fictitious)
• orders are only accepted when there is inventory available to sell
• orders are only accepted from credit worthy customers
• credit is approved in terms of the company policy
INVOICING OF SALES TO CUSTOMERS
To ensure that
• the correct quantity and type of goods that were delivered to the customer are invoiced (accuracy)
• goods are only invoiced if they were ordered by & delivered to the customer (validity)
• goods are invoiced at the correct prices (accuracy)
• calculations on invoices are correct (accuracy)
INTIAL RECEIPT OF THE LONG TERM LOAN
To ensure that:
• The long term loan is appropriately authorised in accordance with company policy and if applicable is allowable in terms
of the requirements of the Companies Act
• The long term loan that has been recorded has occurred during the period (thus not be fictitious)
• The long term loan relates to funds actually received by the business during the current period.
• The long term loan is accounted for at the correct amount in the financial records.
• The long term loan is classified correctly in the accounting records.
FORMULATE CONTROL OBJECTIVES IN RESPECT OF VALIDITY AND ACCURACY FOR DELIVERY & INVOICING
To ensure that:
• Delivery only occurs to clients who actually ordered products (validity).
• Goods do not go missing during consignment (validity).
• Delivery occurs to the correct client (who ordered the products) (accuracy).
• The delivery of the correct quantity and type of products takes place (delivery corresponds to the order placed)
(accuracy).
• Invoicing only takes place for products that were ordered and delivered (validity).
• Invoicing is accurate (correct debtor, correct amount) (accuracy).
CONTROL OBJECTIVES FOR THE VALIDITY AND ACCURACY OF INVIOCING
To ensure that:
• Invoicing only occurs for actual deliveries that have occurred. (1)
• Invoicing is to the correct customer. (1)
• Invoicing is based on the quantity, type and description of goods delivered. (1)
• Invoicing is based on the correct price (and VAT).
• Invoicing calculations are accurate.
INVOICING AND RECORDING IN THE SALES JOURNAL:
•
•
•
•
One of the invoicing clerks should prepare a pre-printed, pre-numbered invoice in triplicate.
The invoice should be based on the signed delivery note returned from the customer and the approved sales order
form.
The other invoicing clerk checks performs an independent review of the invoice as follows:
- re-performs the calculations on invoice
- compares the prices on invoices with the approved sales order form, approved price lists (if general) or,
in the case of a contract, the contract prices
- compares the quantities and descriptions with the approved sales order form and delivery note and
stamps both invoiced
- and then signs the invoice as evidence of doing so.
On a monthly basis the accountant (Mr Ngobese) should prepare sales journal from the invoices (in number
sequence) and follow up on missing invoices.
The sales journal should then be reviewed by Miss Fourie, the financial manager, by:
- recalculating the journal for accuracy and
- agreeing a sample of the sales entries signed by both invoicing clerks.
- she must sign as evidence of this review.
Select a sample entries from the sales journal and trace it to the delivery notes received back from clients, picking slips and
order forms to confirm that the journal entries are valid (validity).
(1)
• Compare (re-perform) the quantity and description of inventory ordered according to the picking slips with the
order forms (accuracy).
(1)
• Inspect the delivery notes received back from clients for their signatures (validity).
(1)
•
Compare (re-perform) the entries in the sales journal with:
o The delivery notes signed by clients to confirm the quantities of each product sold (accuracy).
(1)
o The approved price list to confirm the price of each product sold (accuracy).
(1)
o Recalculate the quantities x price per item sold to confirm the accuracy of the journal entries (accuracy).
(1)
Select a sample of order forms and trace it to the delivery notes received back from clients, picking slips and entries in die
sales journal to confirm that the sales journal is complete (completeness).
(1)
Attend the packaging and consignment process of inventory and:
• Observe and confirm that John Smith, the finished product foreman, compares the quantity, quality and
description of the packaged items with the picking slips before the packaged goods leave the finished
product warehouse (accuracy).
(1)
• Compare (re-perform) a sample of packaged items yourself and ensure that the quantity, quality and
description of the packaged inventory corresponds with the picking slips, before the inventory leaves the
finished product warehouse (accuracy).
• By means of observation, confirm that the truck driver compares the quantity and description of the
packaged items with the delivery notes before the packaged goods were loaded onto the truck (accuracy).
(1)
•
Compare (re-perform) a sample of packaged items loaded onto the truck yourself, to ensure that the
quantity and description of the goods correspond with the relevant delivery notes (accuracy).(1)
Select a sample of sequentially filed order forms. Confirm, by means of inspection and re-performance, that the order forms
were actually filed in number sequence and confirm that there are no order form that are not paired with a delivery note.
Follow up on any outstanding delivery notes with the sales manager (completeness).
(1)
Confirm by means of observation and enquiry and studying the organisation charts, that proper segregation of duties exists
between (validity, accuracy):
(1)
• The receipt and processing of orders;
(½)
• Consignment of goods; and
(½)
• Recording of sales transaction
(½)
Formulate the tests of controls you would perform to evaluate the company’s controls over consignment, invoicing
and recording the transaction
1.
Confirm by means of observation, enquiry and studying the organogram and job descriptions
that sufficient segregation of duties exists between incompatible functions.
2.
Select a number of transactions from the sales journal to the supporting invoice and delivery
note and confirm as follows:
validity
a
Inspect and compare the details with those on the invoice and the delivery note
accuracy
b
Re-perform the calculations and castings of the invoice.
accuracy
c
Inspect the delivery note for the signature of the client.
validity
d
Inspect the date on the delivery note and confirm that it was recorded in the correct accounting period.
cut-off
e
Compare the prices on the invoice with the official pricelist
accuracy
validity
3.
a
For goods ready to leave the premises:
.
inspect that there are two copies of the delivery note, that the number corresponds to the number
written on the container and that it actually appears on the list of deliveries.
Through observation inspect that the driver is present when the delivery vehicle is loaded and that he
compares the delivery note-number with the list of deliveries
4.
Follow a few transactions through from the source documents via the audit trail to the sales
journal.
b
5.
validity
accuracy
completeness
completeness
Select the daily list of deliveries for a few days
a
Inspect for the signature of both the driver and the accounting clerk.
validity
b
Reperform the reconciliation
accuracy
c
Enquire regarding reconciling items
validity
3.
Select a number of weeks’ sales journals and
a
Recalculate the castings and calculations in the sales journal and debtors ledger to ensure accuracy. (1)
accuracy
b
Follow the entry through to the debtors ledger and inspect that the entry was posted to the correct
debtor.
classification
Formulate the tests of control you would perform on the SALES AND RECEIPTS cycle
1.
a
b
c
d
e
Select a number of entries from the sales journal and follow it through to the invoice, delivery
note signed by the client, quote, credit application form and order form and compare the
unique debtors’ number on the respective documents
Inspect the credit application form for the signature of the financial accountant to ensure that the client’s
credit limit was actually approved.
validity
accuracy
Direct enquiries to the financial accountant to determine the criteria for the approval of credit limits to
ensure that the background checks were actually performed before credit limits were approved.
Compare (re-perform) the invoice with the following documents:
- Signed delivery note received back from the client: to confirm the quantity and
description of the goods delivered.
- Most recent quote: to confirm the cost of the design and manufacturing of the
furniture.
- Order form: to confirm the location of the client and consequently, the delivery
distance and
Recalculate the delivery cost by multiplying the distance in kilometres with R3. Compare the amount with
the cost of delivery on the invoice
Recalculate the total amount (design, manufacturing and delivery) on the invoice.
Inspect the delivery note received back from the client for the client’s signature.
2.
Select a number of approved quotes and follow it through along the audit trail to the sales
journal to ensure that all transactions were actually recorded
completeness
3.
Follow the details of the invoice through to the sales journal and debtors’ ledger to ensure
accurate recording of the transactions.
completeness
4.
Compare (re-perform) the outstanding amount per debtor in the debtors’ ledger with the debtor’s credit limit
according to the debtor’s approved credit application form to ensure that the credit limit was not exceeded.
5.
Inspect the debtors’ ledger for the signature of the debtors’ manager to ensure that he reviewed the age analysis
and credit limits.
6.
Observe the consignment process to ensure that the foreman of the consignment division actually compares the
delivery note with the physical goods to ensure that the description and quantity agrees.
4.
By means of re-performance, compare the delivery note with the furniture before consignment to ensure that
the description and quantity agree.
5.
Select a number of approved bad debt forms and follow it through to the collection register and
the age analysis and compare the unique debtors’ number on the various documents
validity
a
Inspect the bad debt form for the signature of the head of the collection division to ensure that the writeoff of the balance was approved.
b Compare the amount according to the bad debt form with the amount that has been overdue for longer
than 30 days as per the age analysis
c Inspect the collection register to confirm that the debtor was actually contacted three times before the
balance was written off.
6.
Select a number of debtors, who have outstanding balances for more than 30 days according to
the age analysis, and follow it through to the collection register and the bad debt form to ensure
that all debtors’ balances that should have been written off, were indeed written off
7.
Confirm by means of observation and enquiry and studying the organisation charts, that proper
segregation of duties exists between:
• Setting credit limits;
a
• Consignment of furniture;
• Invoicing; and
• Write-off of bad debts.
completeness
Formulate the tests of controls you would perform on the SALES AND RECEIPTS system: rendering of services
1.
Select a sample of quotations throughout the financial year and follow to the performance or
job log, deposit invoice, final invoice & revenue journal and perform the following
completeness
Compare the rate used on the quotation to the rate contained in the approved pricelist and follow up on
any difference
accuracy
Inspect the performance log and compare the hours quoted to the hours indicated in the performance log
& follow up on any differences
validity
Recalculate the amount on the deposit invoice based on the quotation
accuracy
completeness
accuracy
completeness
completeness
Inspect the quotation and invoice for the signature of the manager as proof the documents were compare
Inspect the reconciliation of performance logs received back from the employees (at the end and
beginning of the day) for the manager’s signature
2.
Recalculate the amount on the final invoicing noting the following through inspection:
that the total hours on the final invoice agrees to the quotation
the rate used is the appropriate rate according to the quotation
accuracy
accuracy
the deposit invoice amount deducted agrees to the deposit invoice issued to the customer
accuracy
Inspect the performance log for the signature of the manager as proof of the reconciliation between the
performance log and invoice was performed
completeness
3.
Inspect the revenue journal and compare amounts, dates and customer details between
revenue journal & invoices
accuracy
completeness
4.
Inspect the invoices for the signature of the revenue clerk, indicating that the revenue journal
has been updated with the invoice
Reperform a sample of reconciliations between the invoice packs and jobs listed on the
performance logs and follow up on any differences
completeness
5.
completeness
Formulate the tests of controls you would perform on the SALES AND RECEIPTS system: cancellations & credit notes
1.
Select a sample of credit notes from the accounting records & follow through to the booking
cancellation logs to perform the following:
completeness
Inspect the booking cancellation logs to confirm that the booking orders were cancelled
validity
Inspect the booking form to confirm the time of cancellation was in line with the policy
accuracy
completeness
Formulate the tests of controls you would perform on the SALES system to ensure all sales transactions are accurate,
complete & valid using a system-based audit approach
1.
Select a number of entries from the sales journal and follow it through to the invoice, delivery note
validity
signed by the client, quote, credit application form and order form and compare the unique
debtors’ number on the respective documents
Inspect the credit application form for the signature of the financial accountant to ensure that the client’s credit limit was
actually approved.
Direct enquiries to the financial accountant to determine the criteria for the approval of credit limits to ensure that the
background checks were actually performed before credit limits were approved.
Inspect the delivery note received back from the client for the client’s signature
Recalculate the total amount (design, manufacturing and delivery) on the invoice.
Compare (re-perform) the invoice with the following documents:
The delivery notes signed by clients to confirm the quantities of each product sold
The approved price list to confirm the price of each product sold
Most recent quote: to confirm the cost of the design and manufacturing of the furniture
Recalculate the quantities x price per item sold to confirm the accuracy of the journal entries
Recalculate the delivery cost by multiplying the distance in kilometres with R3. Compare the amount with the cost of delivery
on the invoice
2.
Select a sample of order forms and trace it to the delivery notes received back from clients, picking
completeness
slips and entries in the sales journal to confirm that the sales journal is complete
3.
Select a number of approved quotes and follow it through along the audit trail to the sales journal
to ensure that all transactions were actually recorded
completeness
4.
Follow the details of the invoice through to the sales journal and debtors’ ledger to ensure accurate
recording of the transactions
5.
Compare (re-perform) the outstanding amount per debtor in the debtors’ ledger with the debtor’s credit limit
according to the debtor’s approved credit application form to ensure that the credit limit was not exceeded.
6.
Inspect the debtors’ ledger for the signature of the debtors’ manager to ensure that he reviewed the age analysis
and credit limits
2.
Observe the consignment process to ensure that the foreman of the consignment division actually compares the
delivery note with the physical goods to ensure that the description and quantity agrees.
3.
By means of re-performance, compare the delivery note with the furniture before consignment to ensure that the
description and quantity agree.
4.
Select a number of approved bad debt forms and follow it through to the collection register and the validity
age analysis and compare the unique debtors’ number on the various documents
Inspect the bad debt form for the signature of the head of the collection division to ensure that the write-off of the balance was
approved.
Compare the amount according to the bad debt form with the amount that has been overdue for longer than 30 days as per the
age analysis.
Inspect the collection register to confirm that the debtor was actually contacted three times before the balance was written off
5.
6.
Select a number of debtors, who have outstanding balances for more than 30 days according to the
age analysis, and follow it through to the collection register and the bad debt form to ensure that all
debtors’ balances that should have been written off, were indeed written off
Confirm by means of observation and enquiry and studying the organisation charts, that proper
segregation of duties exists between:
The receipt and processing of orders;
Consignment of goods; and
Recording of sales transaction
completeness
validity
accuracy
Formulate the tests of controls you would perform on the SALES system to ensure all sales transactions are accurate,
complete & valid using a system-based audit approach
1.
Select sample entries from the sales journal and trace it to the delivery notes received back from
clients, picking slips and order forms to confirm that the journal entries are valid
validity
Compare the quantity and description of inventory ordered according to the picking slips with the order
forms
accuracy
Inspect the delivery notes received back from clients for their signatures
validity
Compare (re-perform) the entries in the sales journal with:
The delivery notes signed by clients to confirm the quantities of each product sold
accuracy
The approved price list to confirm the price of each product sold
accuracy
Recalculate the quantities x price per item sold to confirm the accuracy of the journal entries
accuracy
2.
Select a sample of order forms and trace it to the delivery notes received back from clients,
picking slips and entries in die sales journal to confirm that the sales journal is complete
7.
Attend the packaging and consignment process of inventory and:
8.
completeness
Observe and confirm that John Smith, the finished product foreman, compares the quantity, quality and
description of the packaged items with the picking slips before the packaged goods leave the finished
product warehouse
accuracy
Compare (re-perform) a sample of packaged items yourself and ensure that the quantity, quality and
description of the packaged inventory corresponds with the picking slips, before the inventory leaves the
finished product warehouse
accuracy
By means of observation, confirm that the truck driver compares the quantity and description of the
packaged items with the delivery notes before the packaged goods were loaded onto the truck
accuracy
Compare (re-perform) a sample of packaged items loaded onto the truck yourself, to ensure that the
quantity and description of the goods correspond with the relevant delivery notes
accuracy
Select a sample of sequentially filed order forms.
completeness
Confirm, by means of inspection and re-performance, that the order forms were actually filed in number
sequence and confirm that there are no order form that are not paired with a delivery note. Follow up on
any outstanding delivery notes with the sales manager
9.
Confirm by means of observation and enquiry and studying the organisation charts, that proper
segregation of duties exists between:
The receipt and processing of orders;
Consignment of goods; and
Recording of sales transaction
validity
accuracy
Formulate the tests of controls you would perform on the SALES AND RECEIPTS system: authorisation of sales orders
1.
2.
Confirm by means of observation and enquiry studying the organisation charts that there is
proper segregation of duties between:
- setting credit limits
- consignment of inventory
- invoicing
- writing off bad debts
For a sample of the debtor’s accounts:
Inspect the related credit application forms for evidence of a credit limit allocated to the customer
validity
validity
Inspect the supporting documentation attached to the application from as evidence of the credit check
having took place
Enquire about changes made to the system during the year
Observe staff performing a credit background check
Inspect the credit application for the review and signature of the credit manager
Recalculate the credit limits and inspect for the credit manager’s signature to ensure operating
effectiveness
ALSO: perform a similar TOC for existing debtors whose credit limits have changed during the year
Formulate the tests of controls you would perform on the SALES AND RECEIPTS system: dispatch of goods
1.
2.
For goods ready to leave the premises
Compare the details of the customer signed copy of the invoice with the details of the original invoice sent
to the customer
accuracy
Inspect that an approved order form and invoice exists
validity
3.
Observe & inspect that the driver is present when the delivery vehicle is loaded and that the
compares the delivery note number with the list of deliveries
Reperform security checks by comparing the delivery notes to the goods leaving the premises
4.
Select the daily delivery list for a few days:
10.
validity
completeness
accuracy
Inspect the signature of the driver and accounting clerk
validity
Reperform the reconciliation
accuracy
Enquire about reconciling items
validity
Observe the consignment process to ensure the foreman and consignment division actually
compare the delivery note with the physical goods to ensure the description and quantity agree
validity
AUDIT PLAN OF TESTS OF CONTROL TESTS OF CONTROL TO EVALUATE THE CONTROLS OF THE COMPANY’S OVER
RESERVATIONS AND DEPOSITS AND CANCELLATIONS
•
Inspect the approved tour schedules from a number of tours for the signature of the managing director as proof of his
authorisation.
Inspect the booking spreadsheets to ensure that they are properly written up, they contain all the suite numbers and that
there is a separate sheet for each tour.
Compare the tours on the tour schedule with the booking spreadsheets to ensure that each tour has a spreadsheet
(completeness)
Inspect the layout of booking forms and cancellation forms to ensure that they are pre-numbered and pre-printed.
•
•
Inspect the file with used booking forms and check the numerical order/sequence of the booking forms.
Investigate any missing or duplicate numbers and obtain explanations for the missing numbers
•
Inspect the file with booking forms and ensure that each booking form has a cancellation form or proof of payment of the
deposit attached to it
Enquire from the senior booking agent about the process that is followed to identify and follow up outstanding deposits.
Page through the filed booking forms to identify forms that contain notes (date, time and contact person) as proof that this
function has been performed.
(Note: these details will only appear on the booking forms if the customer has delayed payment of the deposit)
•
•
•
•
•
Select a number of booking forms to which cancellation forms are attached and by examining it, verify that the booking
details does not appear (are omitted)(are re-performed) on the printed booking spreadsheet.
•
For cancelled bookings that have been refunded:
-
Inspect the customer’s written request for cancellation.
Inspect the copy of the cheque issued and compare the name of the customer and the amount of the cheque (deposit
as paid) with the booking form.
Compare the date of the cheque with the date of the request to cancel to, ensure that the customer was refunded in
time.
Inspect the cheque for the signature of the managing director, as proof of his approval.
Inspect all supporting documentation for the initials of the managing director as proof of hid review, and to prevent that
the documents are used more than once for a refund.
Ensure that the date of the request is more that one month prior to the date of arrival.
•
Select a number of booking forms attached to proof of deposits and test the system and controls by inspecting and reperforming as follows:
- inspect the booking form for the signature of the senior booking agent as proof of her verification.
- Compare the tariffs on the booking form with the authorised tariff schedule for the specific suite.
- Compare the tours as indicated on the booking form with the authorised tour schedule
- recalculate the total costs on the booking form regarding the reservation;
- trace the booking form through to the relevant month’s booking spreadsheet and;
- Inspect the spreadsheet to ensure that the correct suites have been booked as indicated on the booking form.
- Inspect the dates blocked out on the booking spreadsheet and compare them with the dates on the booking form.
- Compare the customers name on the booking form with the spreadsheet.
- Compare the tour(s) as indicated on the booking form with the spreadsheet
•
Recalculate the deposit as 50% of the total tour income.
- Inspect the proof of receipt of the deposit and compare the amount with the calculated amount.
- Inspect the date of the proof of deposit and ensure that this date is within two weeks after the date on the booking form.
•
Inspect the booking spreadsheets for the signature of the senior booking agent and date of the signature as proof of the
weekly controls she did.
PURCHASES CYCLE
Stuvia.com - The Marketplace to Buy and Sell your Study Material
RECEIVING OF GOODS
GOODS RECEIVED NOTE
PLACE AN ORDER
PURCHASE REQUISITION (informs purchasing dept. of goods needed)
1.
2.
3.
A pre-numbered purchase requisition made out by production/factory
manager (when goods are needed) in a twofold approved and signed by
the head store manager
It should contain details on: description of the items, amount, date and
department
Copies:
• Purchasing division – in order to request the goods
• Own records – as a proof of goods requested
1.
PURCHASE ORDER
(completed by purchasing dept. and addressed to supplier detailing goods requested)
1.
2.
3.
4.
5.
6.
7.
8.
RECORDING
(Segregation of Duties)
A pre-numbered purchase order must be created in fivefold (purchasing
clerk) when the requisition is received and has been signed and approved
by the head store manager
Details include:
• Supplier info
• Date
• Description of items
• Quantity ordered
Purchasing orders must be: according to approved suppliers list (policy) and
must be contacted regarding quantity and price available
If no satisfactory supplier, purchasing clerk must get a number of
quotations
The purchasing manager must approve the purchasing order after checking
the details of above and he must sign
Purchasing orders exceeding a certain amount must be approved by the
financial manager and signed
Outstanding orders must be kept in a suspense file by the purchasing
division and followed
Copies:
• Supplier – in order to request the goods
• Acc dept. – in order to match the invoice when the payment is
acquired
• Store manager – to inform that the order has been placed so that he
can update the list of outstanding requisitions
• Receiving division – to match against the delivery note from the
supplier and to ensure that goods ordered are accepted
• Purchasing dept. - in order to record the orders placed
2.
3.
4.
5.
6.
7.
Receiving division:
• There should be a separate area for
receiving goods
• Two goods receiving clerks who check
QQD and compare the purchase order
and supplier’s delivery note
• The supplier deliver note must be signed
after rejecting incorrect deliveries and
shortages
Two receipt clerks must make pre-numbered
GRN’s in six fold – must agree to supplier
delivery note and physical goods received, and
must sign
Details include: supplier info, description of
goods and quality
Goods received must immediately be placed in
safe keeping (access control)
GRNs must be pre-numbered and be in the
correct number sequence that must be checked
by the receipt clerks. All outstanding orders
should be followed up on.
Inventory and production cycle:
• Inventory is transferred from the goods
receiving dept.to the WH
• The inventory records are updated to
include the new stock received
Copies:
• Supplier – proof of goods received
• Storeman – to check physical goods
received
• Inventory records – updating inventory
records
• Purchasing division – to match the
purchase order and as proof of delivery
and follow up on outstanding orders
• Accounting division – as agreement with
invoice and purchase order
• Own records – as the goods are received
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
1.
2.
3.
4.
5.
6.
7.
8.
9.
Accounting division
• Recording in Acc dept.
• The accountant or invoicing clerk will
receive the supplier’s invoice/monthly
statement
The supplier’s invoice must be compared
with:
• The purchase order
• Delivery note
• GRN
The accountant should check the invoice
prices against the approved price list
The accountant should also check the
accuracy of the calculations in order to
ensure that quantities and descriptions agree
The clerk or accountant who does the above
must sign the invoice as proof of
performance
The monthly statements should be checked
by an independent person
Monitoring (Reconciliation)
• The invoice received is used to
compile the purchases journal by the
clerk/accountant
• The journals are then posted to the
ledgers
• There should be a number sequence
check of the GRN to ensure all
purchases are recorded, and
outstanding orders should be followed
up on
• At the end of the month:
i. Monthly recons of invoices
and creditors ledger,
Creditors control and CL
The accountant/credit manager must check
and sign the recons
Regular inventory counts must be performed
Stuvia.com - The Marketplace to Buy and Sell your Study Material
PAYMENTS CYCLE
MAKE PAYMENT
CHEQUE REQUISITION & EFT REQUISITION
RECORDING
(completed by creditors’ section that a cheque be made out for a particular creditor)
When payment is required by the creditor, a pre-numbered cheque requisition
must be prepared in twofold by the creditors clerk/payment clerk A.
2. The cheque requisition details: the cheque, the supplier, date, amount and
reason for payment
3. The cheque requisition must be signed and compiled by the payment clerk A
and must be approved be senior management (signed)
4. Copies:
• Cheque preparer – to use info to compile cheque
• Own records of credit section – as a record of cheques requested
1.
CHEQUE
(the bill of exchange used to pay the supplier)
The payment clerk B must prepare a pre-numbered cheque in twofold
Should contain details on: the supplier, date, amount in words & figures
The details of the cheque must be:
• Checked against supporting documentation and
• Signed and authorised by two members of senior management,
with reference to vouchers
4. The cheque must also be crossed to vouchers and cheques marked “nonnegotiable”
5. The supporting documentation must then be cancelled in order to
prevent duplication of payment (PAID stamp)
6. The accountant/senior management must check if supplier actually exists
7. The cheque book must be kept safe with a register to access (access
control)
8. No cash cheques should be written out rather use a petty-cash voucher
9. In order to ensure that the payment was made to the correct creditor,
the cheque should not be returned to the person who wrote it but rather
someone else e.g. secretary – in order to ensure that the person who
wrote the cheque cannot change info on the cheque
10. Payment by cash:
• Done by either cashing a cheque or
• By issuing a petty cash voucher
1.
2.
3.
The CPJ should be compiled by the cash book clerk (clerk C) based on the
cheque counterfoil
2. This must then be posted to the GL and CL
3. The accountant must:
• Review that all cheques have been recorded in the relevant journals
and the ledgers
• He must sign as evidence of doing so and he must follow up on all
differences
4. At the end of the month, the following should occur:
• Reconciliations between the bank statement and the cash book
must be conducted by the cash book clerk
• Reconciliations between the creditors’ ledger, then creditors’
control account and the invoice must be done by the creditor clerk
• The accountant must review the bank reconciliation and sign as
evidence of doing so
• The accountant must also review the accuracy of the creditors’
reconciliations and sign as evidence of doing so
• Any differences should be followed up on
1.
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
PURCHASES & PAYMENTS CYCLE
FORMULATE CONTROL OBJECTIVES
PURCHASE AND PAYMENT SYSTEMS
To ensure that:
• Orders for stock are only placed when and according to the need that has been identified. (validity and accuracy)
• All orders placed have been authorized – no orders for private use. (validity)
• All orders placed are executed (delivered). (completeness)
• Stock delivered (receipts) agree with the relevant order. (accuracy)
• Stock is only accepted if it has been ordered. (validity)
• Suppliers are only paid if items have been ordered and delivered – no fictitious and unauthorized payments.
(validity)
• Suppliers are paid the correct amount. (accuracy)
• No duplicate payments are made to suppliers. (completeness and validity)
• All goods receipts and payments are recorded and recorded correctly
RAW MATERIAL ORDERS
To ensure that:
• raw material orders are approved in terms of the company policy (or unusual or excessive amounts are specifically
authorised). (V)
• raw material orders (and the amounts thereon) relate to valid purchase request/ need. (V)
• raw materials are always ordered when the need for it arises during the period. (V)
• all raw material orders are in fact executed (or delivered). (C)
• raw material orders are completed accurately and correctly (A)
• raw material orders are from approved suppliers. (V)
• raw material orders are at the approved price. (V)
EFT PAYMENTS
To ensure that:
• EFT payments are captured at the correct amount paid.
• All EFT payments are recorded in the accounting records.
• Unusual EFT amounts are specifically authorised.
• EFT payments are authorised in terms of the approved payment policy.
• EFT payments are for transactions that actually occurred and goods and services were received.
• EFT payments are to the correct suppliers.
• EFT payments are classified in the correct accounts in the financial records.
• EFT payments are correctly and accurately summarised and posted from the cash book to the general ledger.
PAYMENTS
To ensure that:
• invoices are not presented as payment more than once
• payment is made to the right creditor
• all payments are recorded
• payments have been posted correctly in the GL and CL
BAD DEBTS WRITTEN OFF
To ensure that:
• All bad debts written off are authorised.
• Only debts that are no longer recoverable are written off.
• All debts that are not recoverable are written off.
• Bad debts are classified correctly in the accounting records.
• Bad debt calculations are accurate (contain no errors).
Formulate the tests of controls for PAYMENTS TO CREDITORS if following a system-based audit approach
11.
12.
Select a sample of payments made from the cash-book:
validity
Inspect that an order, GRN, delivery note and invoice exist for each payment
Validity
Agree the name of the creditor and amount paid according to the cash-book with the details on the order,
GRN and invoice (and amount on the invoice), delivery note and list of payments
Accuracy
Agree the prices on the invoice with the signed contract from the supplier
Accuracy
Agree the amount and name of the creditor that was paid according to the cash-book with: the list of
creditor payments as prepared by Greg Nel with the bank statement
Inspect that the supporting documents used to do the payment were actually stamped as “paid”
Accuracy
Select a sample of payments according to the list of creditor payments and vouch with the
order, invoice, GRN, bank statement and cash-book to ensure that all payments that were
requested, were recorded
Validity
completeness
Formulate the tests of controls for CREDITORS RECONCILIATION if following a system-based audit approach
1.
2.
Select a sample of creditor reconciliations and:
Recalculate the mathematical accuracy and check the logic of the creditors’ reconciliation
Accuracy
Follow up on the reconciled items with discussions with Greg Nel and supporting documentation
Validity
Agree the opening balance according to the reconciliation with the creditors’ statement received from the
creditor
Agree the closing balance with the creditors’ ledger
Accuracy
Inspect the creditors’ reconciliation for the signature of the office manager
Validity
Select a sample of creditors from the creditors’ list and follow it through to the creditors’
reconciliations to ensure that creditors’ reconciliations exist for all the creditors
Accuracy
completeness
Formulate the tests of controls you would perform on PURCHASES & RECEIPTS CYCLE
1.
Reperform the numerical sequence of orders and goods received notes (GRNs) issued. Obtain
explanations for any missing numbers.
accuracy
2.
Enquire the purchasing manager to confirm that he does check the numerical sequences.
3.
Inspect the order and goods received notes (GRN) that they are indeed prenumbered and pre-printed.
4.
Reperform the sequence check of the orders and goods received notes (GRN) issued. Obtain explanations for any
missing numbers.
5.
Trace transactions from the inventory records to the underlying documents and confirm as follows:
GRN: inspect whether it has been signed by the storeman, and that it contains the number and condition of the items received.
Order:
- inspect for the signature of the purchasing manager.
- recalculate the purchase price in rand value as entered on the order (taking into account the details of the rate)
Requisition: inspect for the signature of the marketing manager.
Reperform and inspect that the forward-cover documentation is attached and effected on the date of the transaction.
Reperform and inspect that the details on the above underlying documents agree with those entered in the inventory records.
6.
Compare the details on the above-mentioned underlying documents (GRN) with that which have been recorded in
the inventory records.
7.
Trace a number of transactions from the source documentation along the transaction trail as indicated above to the
inventory records.
Reperform and ensure that transactions have been recorded, and that they have been recorded correctly (number and type).
Inspect the reconciliations of the inventory records and the ledger to confirm that these are done monthly.
Inspect the reconciliations for the signature of the ledger clerk
Reperform the logic of the accuracy of the reconciliations to ensure that it was perfronmed accurately
8.
Confirm by means of observation, enquiry and inspection job descriptions that there is adequate separation of
duties between the following functions:
- authorization for purchases (purchasing manager);
- receipt and storing of items (storeman);
- updating the inventory records (inventory clerk in accounting division).
3.
Observe the storemen while they are receiving the inventory and confirm that the goods are checked properly with
regard to accuracy and completeness of the delivery
Perform the receipt of inventory above yourself during receipts to confirm it.
4.
Inspect the stationery register, in which employees sign for receipt of stationery, is kept with regard to all stationery
Inspect and enquire that stationery is kept safely
8.
Check the accuracy and test the logic of the reconciliations by reperforming the
reconciliation. Investigate any unusual reconciling items.
INVENTORY & PRODUCTION CYCLE
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1. PLACING OF ORDERS
PURCHASES & PAYMENTS CYCLE
PURCHASE REQUISITION
(informs the purchasing department what goods are needed)
• A pre-numbered purchase requisition made out by the
production/factory manager (when goods are needed in
two-fold approved & signed by the head store manager
• Details: description, amount, date & dept.
• Copies:
o Purchasing division- in order to request the goods
o Own records – as proof of goods requested
• A purchasing clerk must prepare purchasing orders on a
prenumbered purchasing order
• Only a purchasing clerk may prepare purchasing orders if
he has received a purchasing requisition, signed by the
head storeman
• Purchasing orders must be prepared according to a list
of approved suppliers
• If no satisfactory supplier, purchasing clerk must get
quotations before preparing the order
• The purchasing manager must approve the purchasing
order after has agreed the details with the approved
requisition & suppliers & he must sign
• Purchasing orders exceeding a certain amount must also
be approved by the financial manager & signed
• 5 copies of purchasing orders should be made:
o Accounting division – agreement with the invoice
o Head storeman – to update list of outstanding
requisitions
o Receipts division – ensure that only goods have
been ordered are accepted
o Supplier – to place the order
o Own records – As evidence that the order has
been placed
• Outstanding purchase orders must be kept in a suspense
file in the purchasing division & followed up regularly all
orders are finalised timely
2. RECEIPT OF GOODS (RMs)
PURCHASES & PAYMENTS CYCLE
3. STORING OF RMS
• There should be a separate demarcated area for
receiving goods
• Two receipt clerks must receive the delivered inventory
• The supplier’s delivery note must be signed after the
following have been done: (QQD)
o Details: on the delivery note from the supplier
must be compared with the delivered items & the
details on the purchasing order
o Goods that have not been ordered may not be
received
o Quality aspects of the goods must be reviewed
• The two receipt clerks must take out a prenumbered
goods-received note (GRN) of which the details must
agree with the supplier’s delivery note & the physical
goods received
• 6 Copies of the GRN should be generated:
o Accounting division - agreement with the invoice
& purchasing order
o Accompanies the goods to the inventory store
o Purchasing division – for comparison with
outstanding purchasing orders
o Inventory clerk – for updating the inventory
records
o Own records – file with purchasing order to show
that order has been received
o Supplier – if supplier has not provided a delivery
note
• Goods received must be placed in safekeeping
immediately
• The receipt clerks must perform sequence checks &
follow up on all outstanding orders
• The inventory records must then be updates to record
new stock (RMs)
• RMs must be stored & protected until required in
production
• Stock should be barcoded onto the perpetual inventory
system
o To ensure physical stock can be checked against
theoretical stock on a frequent basis (weekly) &
there is a tracking system
o The system should record: serial number, title,
director, description ß for smaller items
• All RMs purchased & received must be stored &
protected until needed in the production process, the
goods should be stored as follows:
o Stored in a separate isolated area
o Access to the material must be limited (only one
entrance from within the shop)
o Any doors or windows from the outside must be
secured
o The shop must have security gate at the entrance
so that it only opens with a press of a button
located at the cashier’s counter. It must also have
an alarm system
o The shop must be protected against fires & there
must be fire extinguishers & sprinklers on the
premises
o Authorised & signed documentation (requisition)
required for the movement of the RMs.
GOODS RECEIVED NOTE (GRN)
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
4. PRODUCTION CYCLE
a. Issuing Inventory from the central inventory WH to the branches:
• Branch managers/manufacturing clerk must place an order at the central inventory
WH by making use of a pre-printed standard RM requisition (order form)
• The RM requisition must be prepared in triplicate:
o RM WH – to prepare the correct quantity & type of product for dispatching &
to update their records regarding the movement of inventory
o Accounting department – to update inventory records
o Branch/ WH – as evidence of quantity & type of product requested
§ Must be pre-numbered, Contain the date of request, Authorised
signature of the branch manager, Indicate the branch name, Accurately
explicate the quantity & description of the product
• The WH assistant at the central WH prepares the items for issuing to the
branch/factory on the basis of the RM requisition & completes a RM transfer note
(issue note) for the materials/products that must be issues
• A RM transfer note should be prepared in triplicate:
o Branch/factory together with the items – branch can be sure of the quantity &
type of materials issued to them
o Held at central WH – evidence of quantity & type of … issued to the branch
o Accounting Dept – after delivery in order to update inventory records. Copy
also serves as proof of delivery
§ Contain dispatching date; Must be pre-numbered; Contain the
authorised signature of the WH reviewer after he compared it with the
order form received; Indicate branch name; QQD
• With dispatch, the security guard/head store manager must compare the items being
sent with the RM transfer note & must not allow that any items leave the premises
that do not appear on the documentation & sign as evidence from doing so
• Daily basis – the WH reviewer of the central WH must check that all RM transfer
notes refer to & are supported by a valid authorised RM requisition
• Branch/production managers must compare their duplicate RM requisition with the
RM transfer notes received with delivery on a daily basis
• The WH reviewer & the branch/production managers respectively must review the
number sequence of RMs requisition & RM transfer notes & followed up on missing
numbers
b. Receipt of invent at
c. Physical control over the inventory at the
• The branch managers
must be responsible
for the receipt of the
inventory items from
the central WH
• With receipt the
branch manager must:
o Compare the
quality &
quantity of the
items with the
issue note &
order form
o Initial/sign as
evidence that it
has been
checked &
corresponds
• If there are any
deviations between
the physical items &
the documentation, it
must be recorded on
the issue note a&
signed by both the
deliverer & branch
manager
• The branch manager
must keep the issue
note & file it with the
order form
• The branch manager must keep records of the
inventory on hand. These records must be updated with
the issue note & sales invoice
• The branch manager & sales assistant must frequently
hold inventory counts on a sample basis & compare the
counted inventory per item with the quantity according
to the inventory records
• The internal auditor must perform inventory counts at
the branches on a surprise basis & must compare the
physical inventory with the inventory records. The
branch managers must be held liable for any shortages
• The storeroom of each branch must only have an
entrance from within the shop. Any doors or windows
must have security gates.
• Staff must have access to the storeroom, but it is very
important that staff make sure that no delivery people
go into the storeroom
• The shop must be protected against fires & have a
security gate with an alarm system
• Sales assistants must count the amount of items clients
want to buy & that they come out with the right
amount
• The layout of the shop must be designed so that clients
must walk past the cashier before they leave
• A security guard must be appointed & all clients’
purchases must be compared with the cash register slip
& sales invoice before they may leave the shop
• The staff’s packages must be examined when they leave
they do not walk out with inventory items
branches
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
branches
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5. TRANSFER TO FINSIHED GOODS STORE
a. Finished Goods Transfer
Note
b. Stock Records
c. Cost System
d. Determination &
Calculation of
production costs of
e. Additional (for that of a
perpetual system)
finished goods
• Record transfer of
• Inventory records should
manufactured goods from
be updated to reflect the
the production division to
transfer by an
independent accounting
the finished goods store
personal (accountant)
• A pre-numbered finished
o Finished goods
goods transfer note must
should increase
be issued in 3 fold by one
o Work in Progress
of the production foremen
decreases
& must be authorised &
signed by the production
manager
• Details:
o The QQD
o Date
o Department sent to
• Copies:
o Finished goods store
(whilst accompanying
the goods) - can
match to the physical
goods received
o Own records (factory)
-proof that the goods
have been transferred
o Accounting
department - to
update inventory
records
• Unit costs determined by
a variety if methods
o Processing costing
o Job costing
o Standard costing
• Each method requires
different ways of
accumulating costs &
unit cost calculations
I
• Production reports
(made up of the
calculations within them)
provide information
concerning amount of
raw materials used in
production, labour
required to produce
goods, & allocation of
overheads
• Production cost will
depend on the system in
use
• Calculation of production
costs must be checked &
authorised (signed) by
management
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
• The stock should be barcoded
rather than maintaining A4 pieces
of paper
• The barcoded physical stock must
be checked against the theoretical
stock on a frequent basis (Weekly)
& have a tracking system, by the
sales assistant / branch managers
• There should be a designated
accountant that should be
employed to keep record & update
the perpetual system, when stock
is received, sold, destroyed, etc.
This person should not have
access to the stock
• The re-order level should be put
into the system so that stock can
be reordered when the levels are
too low
• There should be frequent stock
counts, this must be done in
conjunction with an independent
person & shortages/surpluses
must be reported to the general
manager for further investigation.
The GM must also perform regular
surprise stock takes
Stuvia.com - The Marketplace to Buy and Sell your Study Material
6. SEND FINISHED GOODS TO CUSTOMERS
PICKING & DISPATCH OF ORDERS BEFORE THE GOODS ARE LOADED ONTO
7. DELIVERY
1. The approved sales order form is sent to an access-controlled
demarcated area of the WH where the storemen pack boxes for
dispatch & one of the storemen then. Sends an email to the sales
department to confirm receipt of the order. The chief storemen
then instructs the packers to pack the order accordingly.
2. Pre-numbered, pre-printed delivery note is prepared by the
storeman responsible & then attached to the packed goods.
3. Delivery note details:
o Order #, Quantity, Product Code, Customer, Delivery Date,
Delivery Address, Storeman signed the delivery note as proof
that all is correct
4. The chief storeman then compares the physical goods to the
delivery note as well as the approved sales order form & checks
the QQD is correct thereafter he signs the delivery note as
evidence of doing so
5. Delivery note is distributed as follows:
o 2 copies accompanying the goods to client – one must be
signed by the client & returned with the delivery staff. The
signed copy is then sent to the accounting dept. so that an
invoice can be prepared
o Sales dept. - as evidence that order has been executed
o Remains @ WH – evidence that inventories have been
dispatched & for number sequence check
o Inventory clerk – inventory records can be updated as evidence
that order has been executes
6. The number sequence of the delivery notes must be checked by
the chief storeman (independent person) on a regular basis &
outstanding items must be followed up.
1. The driver then packs the goods into the delivery vehicle
ensuring the goods match the delivery note
2. He signs as evidence of doing this
3. Before the delivery vehicle leaves the premises, the gatekeeper
ensures that all the physical goods have been provided with
delivery notes that agree with the delivery note, this can be
documented on a gate register or the delivery not
4. The client must sign the delivery note as proof of receipt of the
physical goods, that the QQD match what was ordered & what
is on the delivery note
5. The client keeps one copy & the other copy is returned to the
invoicing department by the delivery vehicle
6. [insert name] must review the number sequence of the
delivery notes & investigate any missing numbers
TRUCKS FOR DELIVERY BY THE DRIVER
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Inventory count:
•
Describe the inventory count procedures that you would recommend
Before count:
• [Insert name Ltd.] must inform all persons concerned of the date on which the
inventory count will take place by means of written instructions
• Inventory count has to take place as close as possible to year-end
• A planning meeting should be held with all persons concerned so that everybody can
know what their duties and responsibilities are (must take place well in advance of
the inventory count date)
• Based on the nature of the stock, the following staff must be appointed:
- 3 supervisors (one per store)
- 12 counters (two teams of two per store) or 6 counters (three teams of two
rotating)
- 1 coordinator
• Staff involved in the inventory count should not be responsible for the daily control
and recording of stock items
• The three stores must be neatly packed before the inventory count so that items can
be easily counted
• Make sure there are no open spaces on the shelves and that all items are
appropriately identifiable
• Stock should be marked in such a way that it can be identified during the inventory
count
• Access to the premises must be restricted to the counters, supervisors and the
coordinator
• If it is practically possible, there must be no movement of stock items during the
counting day
• If there is a movement of stock, it should be kept separately and documented
appropriately
• Two counting teams must be allocated per store
• The counting teams that have to follow up on differences must be appointed in
advance
During count:
• Prenumbered counting sheets must be issued to the counting teams by the
supervisors and the counters must sign for it
• Supervisors are responsible for all counting sheets (even unused ones) handed in by
the counters after counting has been concluded and all counters have signed as
confirmation of delivery
• A counting sheet register can be used for the purpose of recording which sheets
have been issued to which counting teams
• The counting sheets should have headlines so that the following information can be
recorded:
- Description of the items
- Location of the items
•
•
•
•
•
- Count per item
- Space for signature of the counters
All counting sheets must be completed in ink
Unused lines must be crossed out
Counters must make sure that they work through the store systematically so that all
items are counted
After an item has been counted, it should be marked as counted to prevent it from
being counted twice (with a sticker)
All stock items must be counted by the second team
After count:
• The supervisors receive the counting sheets and confirm that:
- All counting sheets have been received back (check number sequence)
- There are no errors or missing numbers
- That no unauthorised changes have been effected to the counting sheets
- That the counters have signed as confirmation
• After the supervisors have received all counting sheets, they sign the counting sheet
register and hand in the complete counting sheets over to the coordinator
• The coordinator confirms that all stores and items haven been counted
• The coordinator reconciles the counting sheets of the two counting teams and if
there are any differences they should be counted again (by pre-identified counting
teams)
• No additional unauthorised changes may be made on the inventory sheets once
returned
• The inventory manager should compare the figures from the first and second count
to confirm that the two figures are the same
• Teams may not leave the premises until all differences between the first and second
counts have been resolved
• The quantities on the inventory system and the physical count sheet must be
compared
• If the quantities do not correspond:
- The inventory item must be returned
- The necessary corrections must be made on the system
• An independent person must review the comparison and the inventory corrections
• She/ he must sign as evidence of having performed the review
Stuvia.com - The Marketplace to Buy and Sell your Study Material
PRODUCTION CYCLE DOCUMENTS
Raw Material Requisition
Raw Material Transfer Note (RMT)
(RM)
Finished Goods Transfer Note (FGT)
1. #
•
Pre-numbered
•
Pre-numbered
•
Pre-numbered
2. Details
•
Date of request
•
Dispatch date (transfer)
•
Dispatch date (transfer)
•
•
3. Check
•
•
Quantity
•
Description of raw material
Production manager only authorises by
Cost of item
Description of order
•
•
2 storemen pick & prepare RMT & sign
•
The factory storeman must compare the
•
records w.r.t. the movement
2) Manufacturing – evidence of
5. Number Sequence
•
Signed by storeman & head storeman
•
as evidence. QQD
Signed by the factory supervisor & the
production manager
1) Finished goods WH – evidence of
2) Manufacturing – to be sure of quantity
2) Manufacturing – as evidence of the
quantity & type of RM issued
store
3) Accounting dept. – Update inventory
Production manager review number
Head storeman review number sequence of
missing/outstanding numbers
missing/outstanding numbers
sequence of RM requisitions & investigate
Compare it to the physical goods & sign
1) Raw material store – evidence of
3) Accounting dept. – Update inventory
records
& then;
prepared – (Raw Materials Foreman
& type of RM issued by raw materials
quantity/type of RM
RMTs quantity & description to the FGT
checks QQD)
•
quantity & type for dispatching & update
Match (compare) raw material
requisition to RMT & physical goods
been agreed to the production schedule
1) Raw material store – prepare right
Quantity
•
signing, after details on the RM have
4. Copies
•
Description of RMs dispatched
•
Manufacture clerk prepares & signs
Quantity
records
RMT (issue note) & investigate
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
quantity & type of finished goods issued
quantity & type of finished goods issued
3) Accounting dept. – Update inventory
records
Production manager must do a sequence
check for any missing/outstanding numbers
INVENTORY & PRODUCTION CYCLE
FORMULATE CONTROL OBJECTIVES
INVENTORY
To ensure that:
1.
2.
3.
4.
5.
6.
7.
inventory is properly protected against damage (accuracy)
inventory is properly safeguarded against theft (validity)
accuracy, valuation & allocation of inventory
the factory has the correct & sufficient raw materials during the production process
only raw materials needed during the production process are requisitioned
only valid transfers of raw materials to production are needed
no theft of inventory takes place during manufacturing and spillage is minimised
TRANSFERING OF FINISHED GOODS TO THE FINISHED GOODS STORE:
To ensure that:
• only finished goods that have completed the production process and are transferred to the finished goods store. (Validity)
• finished goods transferred from production to the finished goods store are not damaged. (Validity)
• finished goods transfers accounted for in the inventory records actually occurred during the financial period and are
supported by a supporting documentation (transfer note). (Validity)
• all finished goods that have completed the production process are in fact transferred from production to the finished
goods store. (Completeness)
• all finished goods transferred from production are in fact received at the finished goods store. (Completeness)
• all finished goods transferred from production to the finished goods store are recorded in the inventory or accounting
records. (Completeness)
BANK & CASH CYCLE
Stuvia.com - The Marketplace to Buy and Sell your Study Material
2. RECEIPTS
1. GENERAL CONTROLS
1.
2.
3.
4.
5.
6.
7.
8.
9.
There should be notices at a cashier counter
or a policy (e.g. notice on insisting on
evidence/receipts)
Receipt’s/slips should be kept as a proof of
purchase
a. Issued in triplicate:
i. Client – evidence of execution
ii. Own records – evidence of cash
received
iii. Accounting dept – for bookkeeping
Regular number sequence checks of the
receipts must be done (number sequence
should be automatically created by the cash
register)
There should be reconciliations between
accounting records: CRR & the physical
money in the cash register
a. Must be done by an independent
accounting senior person
Cash should be cleared out of the cash
register on a frequent basis & placed in a
drop sage with one key being held on-site &
the other off, until cash uptime. (When
money is moved, it must be locked up)
The general manager should perform
surprise inspections & cash counts to
determine if cashiers & office managers are
doing their work
The manager should review: sales register,
deposit slips, bank recon & follow up on
differences
The staff should be well trained & should
receive additional training as the need arises
– staff should be rotated on a regular basis
Adequate segregation of duties:
a. Making the sale: cashier
b. Recording the receipt: bookkeeper
c. Making the bank deposit: general
manager & security guard
d. Review the bank recon: accountant
e. Review of registers: general manager,
etc.
a.
1.
2.
3.
4.
5.
1.
2.
3.
4.
CREDIT CARD RECEIPTS
b. CASH RECEIPTS CONTINUED
Online sales by credit card should be
processed online to the banks or the cashier
should review the credit card number
against a list of invalid or stolen credit cards
the customer is creditworthy & has sufficient
funds.
Alternatively, the cashier could also request
the client’s ID & review the signature &
details to the details on the credit card slip
The cashier could make an imprint or
photocopy of the customer’s credit card thus
maintaining records of the customer’s details
& the card’s security code
The cashier should review the:
a. Customer’s signature
b. Details such as the expiry date, name &
signature & details on the credit card
slip
The credit card slips should be prenumbered & the manager should perform a
sequence review when the cash register is
cashed up
The payment should be followed up with the
bank until payment is received
5.
b. CASH RECEIPTS
2.
Cash registers should be used over cash
drawers with the price & amount due being
displayed prominently, visible to the client.
Prices should not be rounded amounts to
force the cashier to open the cash register &
give the customer change
All sales on the cash register should be
recorded on a CRR to which the cashier does
not have access
The cash register should be lockable, with
the cash register being removed if the
cashier goes on a break. The till should only
be opened when an amount is entered on
the till or if the manager opens the till with
his key
6.
7.
The till role should be used to write up the
accounting records, not the deposit slips
The manager should review the CRR for
unusual amounts, or any altered transactions
The following should occur with the cash
that is received:
a. Should be deposited into the bank
daily/weekly
b. Safeguarded on the safe from the time
of receipt until banking
c. There should be SoD between all the
functions involving cash (same as that
of general controls)
1.
2.
3.
4.
c. RECEIPT OF CHEQUES BY POST
1.
3.
4.
5.
6.
7.
There should be at least 2 persons (1
independent) who opens the post. They
should review the details:
a. Cheques are made out in the company’s
name
b. Is crossed (non-transferable)
c. The date (post-dated cheques should
not be accepted until payment is due)
d. Signatures on the cheque
e. Clients had been pre-approved by GM
A mail register should be kept & record the
following details:
a. Date of receipt
b. Debtors name
c. Amount received
Both staff members who open the post
should sign the mail register
They should hand the cheques received to
the cashier & must sign as proof of receipt
The cheques should be inspected by 2 staff
members for any amendments.
There should also be a company policy in
place to reject amended cheques
The GM should have copies of all their
clients’ IDs or proof of incorporations,
contact details & address & there should be
pre-approval before cheques are accepted &
approval by the bank
Downloaded by: notesbyjana | janagrey1401@gmail.com
E
DEPOSITS
Distribution of this document is illegal
5.
6.
7.
8.
B.
1.
2.
3.
4.
a. DEPOSITING CASH RECEIPTS
Chief cashier completes duplicate bank
deposit slip indicating total cash received
a. One copy goes to the bank – in order
to deposit the money received
b. One copy remains in own records – as
evidence of cash being deposited
Cash kept securely in safe
Security company collects cash daily &
banked by guard
The cashbook clerk should file the
stamped deposit slip & compare it to the
carbon copy & investigate any
amendments. Must sign
Person independent from cashing up &
banking: Reconcile bank-stamped deposit
slip with company’s copy of deposit slip &
cashing up sheets (compiled by cashiers)
File deposit slip in date sequence &
regularly review for unbanked cash
Update cash journal
Reconcile bank statement with cash
journal
DIRECT DEPOSITS
The person responsible for funds received
should provide the bookkeeper with
details of the deals/sponsorships
negotiated in order to clear direct deposits
to the correct debtor account & to write
up journal
A suspense account should be used for all
uncleared/unknown direct deposits &
follow up
List of unidentified deposits must be
prepared by the cashbook clerk
The accountant should regularly reconcile
the list of unidentified deposits with
unusual (recurring items)
Stuvia.com - The Marketplace to Buy and Sell your Study Material
3. PAYMENTS
a.
•
•
•
•
•
•
PAYMENT BY DIRECT BANK
There should be segregation of
duties between the person that
prepares the details & the
authorisation & the person who
checks the details when sent.
There should be strict access
controls to the computer & its
functions.
There should be double
authorisation
o From a senior member of
management
o Passwords & pins
The manager must check the details
of the payment with the various
documents & inspect all payment
terms.
Other controls applicable to
documents still remain such as
cancel all supporting documents.
The underlying documents or the
general ledger must be reconciled
to the actual amount stated on the
bank statement.
4. PETTY CASH
b. PAYMENTS BY CHEQUE
TRANSFER & EFT
•
•
•
•
•
•
•
•
•
•
There should be adequate stationary control over blank,
pre-printed unused cheques.
The cheque book should be locked away in safekeeping
when not used.
There should be an authorised cheque requisition for all
cheques.
The cheques should contain the following:
o Beneficiaries name
o Reasons should be clearly stipulated
o Crossed (non-transferrable)
Cash cheques (except for wages) & cheques with open
spaces & non- crossed cheques should be rejected.
The cheque should be authorised by the payments manager
& there should be segregation of duties among the
following functions:
o Preparing the cheque
o Signing the check
o Cheque should not be returned to the person
requesting the cheque.
The cheque should be signed by a senior member of
management
o It should be signed only after it has been clarified
whether the cheque is authorised.
o The cheque requisition has been checked.
o The accuracy of the details of the cheque has been
checked.
All supporting documentation should be cancelled (cheque
requisition).
The payment terms should be inspected.
There should be a review & investigation by the manager:
o Number sequence check as well as following up on
all missing numbers.
o All returned cheques should be investigated:
§ Check number sequence
§ The amount on the cheque agrees with the
amount of the counterfoil.
1.
The responsibility of controlling the petty cash must be allocated to
a single, competent, independent person.
2. Petty cash should be kept secured in a lockable box.
3. The cash in the petty cash must not be mixed with other funds or
activities of the enterprise, specifically customer receipts.
4. A policy must be determined regarding the maximum amount &
type of expenses which will be allowed to be compensated from
petty cash.
5. All cash expenses should be paid from the petty cash.
6. Petty cash receipts must be properly authorised (by referring to the
amount & the reason for the expense) & signed as proof of this.
7. The person in control of the petty cash must prepare a
reconciliation in which the cash in the petty cash is reconciled with
the amount of the petty cash advance, by adding the total amount
of the petty cash receipts issued (according to the petty cash
journal). This person must do the reconciliation once a month.
8. Surprise counts must be performed by the owner or independent
person who performs the reconciliation at that stage.
9. Any differences/errors/irregularities found by performing abovementioned reconciliation must immediately be investigated.
10. At the end of each month, the total amount of the petty cash
receipts issued (per petty cash journal) must be compensated from
the cashbook by means of cheque that is cashed
11. All petty cash slips already compensated must be cancelled to
prevent submission & compensation thereof
12. Petty cash slips must be pre-printed & pre-numbered & an
independent person should perform a number sequence check on a
regular basis & follow up missing petty cash slips
13. Supporting documentation:
a. The amount should be paid first & then the amount may be
claimed from the petty cash with a petty cash slip
b. Money could be requested; the change is then brought back &
given a slip
14. Petty cash slips should be issued for each expense paid (when
money is taken from petty cash journal, a pre-numbered petty cash
receipt must be issued):
a. Pre-numbered
b. Date, requester, purpose & proof
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5. CASH COUNT
At the end of each shift & surprise occasions,
the cashier & general manager/supervisor (2
persons) should count the cash & the petty cash
doing the following:
• Keep the cash takings in a till bag with a lock
which should be sealed until it is counted.
• Calculate the sales for the day from the cash
register roll.
• Reconcile the cash received to the total
sales calculated & recorded in the general
ledger according to the cash register roll in
order to identify any shortages & surpluses.
• Enter the details on the sales return
form/reconciliation.
• The cash book clerk & the general
manager/supervisor should sign the sales
return form/reconciliation/count sheet/roll
as evidence of:
o Cash being taken custody of
o Reviewed
o Evidence of this being
accurately performed
6. BANK RECONCILIATION
What is it?
• Monitoring of differences between
balances in:
o company records
o cashbook & general ledger
o balance according to bank
Controls:
• The bank reconciliation must be drafted
on a monthly basis by an independent
person/cashbook clerk.
• An independent review (e.g. by the
accountant) must be performed & the
following must be tested:
o The logic of the reconciliation
o Ensure that the reconciling items
match the subsequent
documentation such as the bank
statements.
o Investigate long outstanding
items
7. OTHER NB CONSIDERATIONS: FRAUD
Cause
•
Occurs due to time span between transaction date & date
recorded.
• Purpose: to hide fraud or theft or to overstate bank.
Examples:
• Lapping
• Kiting
• Window dressing
Fraudulent financial reporting techniques
• Kiting
o Company with > 1 bank account with different banks
o Timespan to cash cheque & carry it over from one
account to another
o Manipulate transfers during y/e – to overstate the bank
& cash balance in the AFS.
Misappropriation risk
• Rolling of cash / Lapping
o Cashier takes cash paid by a debtor, covers the shortfall
with a subsequent debtor's receipt.
o Higher risk in companies where:
§ Cash & cheques are received from debtors;
§ Poor SOD between cashier & recording of
receipts functions;
§ Lack of review over the abovementioned
functions
• Window dressing
o Manipulate the ratio between current assets & liabilities
o Write cheque out before y/e & give it to the creditor
after y/e.
• Theft of cash
• Dishonoured cheques
o A cheque is made out by a client, but there are no funds
available in the client's bank account.
• Fictitious deposits
o Where clients can pay via direct deposit / EFT →
Receive fictitious proof of payment from the client &
consequently deliver the goods/service to them
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5. CASH COUNT CALCULATION:
6. BANK RECONCILIATION CALCULATION
BANK RECONCILIATION AS AT 31 MARCH 2014
Balance according to cash book
XXX
Plus: outstanding cheques (payments)
+ XX
Less: outstanding deposits
-XX
Plus/Min: other reconciling items
+/- XX
Balance according to bank statement follow
XXX
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
BANK & CASH CYCLE
FORMULATE CONTROL OBJECTIVES
BANK & CASH
To ensure that:
1.
2.
3.
4.
5.
6.
payments are authorised in terms of the company policy
payments made to the correct supplier
payments calculated correctly
payments for transactions actually occurred & goods and services were received
payments classified in the correct accounts in the financial records
all payments recorded in the accounting records
RECEIPT OF CASH
To ensure that:
1. All receipts relate to genuine tickets sales or sponsorships and are therefore supported by underlying documents such as
tickets, deposit slips, sponsorship agreements et cetera evidencing as having actually taken place.
2. All discounts and refunds (i.e. adjustments) of cash are either authorised specifically by management or general authorisation
exists in terms of management policy.
3. All receipts are adequately safe guarded.
4. All receipts in cash, credit card or via direct deposits are recorded at the correct amount (not duplicated) actually received.
5.
6.
7.
8.
All receipts are correctly calculated net of discounts.
All direct deposits are recorded in the correct debtors or revenue account.
All receipts of cash are recorded to the correct sales account.
All receipts, discounts et cetera are correctly summarised, classified and posted to the correct accounts in the general ledger
and annual financial statements according to nature.
9. All receipts (from for example ticket sales and direct deposits) are recorded in the accounting records and no receipts are
misappropriated or omitted.
10. All receipts from ticket sales are banked.
11. All receipts of cash are recorded timely in the correct accounting period.
All receipts from ticket sales and sponsorships are banked timely.
CASH SALES PERFECT CYCLE
RECEIVING ORDERS FROM CUSTOMERS & APPROVAL:
•
•
customer calls to place an order & order clerk prepares a pre-numbered sales order form
pre-numbered sales form contains:
complete details:
•
•
a copy of the sales order form is sent to the customer & returned
must be signed before sales order is approved = proof that they are happy with the order
•
approved order form must be distributed in quadruplicate:
1) to customer – evidence order has been placed
2) to inventory store – to select goods for delivery
3) to sales department – for sequence check & follow up of orders
4) to accounting department – to match documents before invoicing
•
an independent person must:
review the number sequence – to investigate missing numbers
agree approved delivery notes – follow up outstanding orders
product codes, quantity, approved price per price list, delivery date, address & name of customer
SALES APPROVAL FOR CREDIT SALES:
-
credit manager received completed sales order form and checks:
credit limits, current outstanding balances, creditworthiness for new customers
-
before sales order form is approved, approved credit manager must perform checks:
- appropriate inventory in store
- price agrees to approved price list
- credit manager sign form - evidence client may purchase on credit
- re-calculate invoice – for accuracy
PICKING & DISPATCHING OF ORDERS BEFORE GOODS ARE LOADED ONTO TRUCKS FOR DELIVERY BY DRIVER:
•
approved sales order form is sent: sent by email
1) to access controlled, demarcated area of warehouse where storeman packs boxes for dispatch
2) receipt of order to sales department – to confirm receipt of order
•
•
•
delivery note = pre-numbered, pre-printed, prepared by responsible storeman & attached to packed goods
delivery note includes: order number, quantity, product code, customer, delivery date, delivery address
delivery note signed by storeman – proof all inventory packed correctly & to assign responsibility
•
delivery note copies:
1)
2)
3)
4)
remains in warehouse – evidence inventories dispatched & for number sequence check
to inventory clerk – to update inventory records
2 copies to customer – one copy signed by customer & returned to warehouse -> forwarded to accounting dep
(invoice can be prepared)
to sales department – evidence order is executed
number sequence check of delivery notes by independent person (chief storeman) on a regular basis & follow
up on outstanding items
DELIVERY:
•
driver packs goods into delivery goods making sure goods match delivery note & signs as evidence
before delivery vehicle leaves – gatekeeper ensures physical goods been provided with delivery notes that
agree with the delivery note, documented on gate register / delivery note
• client must sign delivery note – to confirm receipt of goods
• COPIES:
1) client keeps one
2) one returned to invoicing department by delivery vehicle
• independent person must review the number sequence on delivery note and investigate missing numbers
INVOICING / SENDING OUT OF MONTHLY STATEMENTS:
•
•
one of the invoicing clerks prepares a pre-numbered invoice in triplicate on account of the signed delivery note
returned from the customer & approved sales order form
invoice contain:
•
•
order number, date, delivery note number, quantity, product code, price according to approved order,
signature of preparer
other invoicing clerk checks calculations on invoices & compares prices on invoices with approved sales order
form & quantities and descriptions with the approved sales order form & delivery note – signs as evidence of
doing so
three invoices sent:
1) CLIENT– to know the outstanding amount / amount payable
2) SALES DEPARTMENT – filed as evidence of transaction and number sequence check
3) ACCOUNTING DEPARTMENT – record sale in sales journal & debtor’s ledger
•
•
•
on monthly basis an independent person (accountant) prepares prenumbered statements for credit clients
contains:
starting balance, invoices purchased, interest, payments / returns, closing balance
•
two copies prepared:
1) ACCOUNTING DEPARTMENT - remains in accounting department for future reference
2) CUSTOMER – remittance advice for payment & to assess details
-
CASH RECEIPTS PERFECT CYCLE
RECEIVING MONEY
•
•
•
cash receipt = payment by cash
contains: details of payee, date & amount
mail opened by 2 people & a mail register
•
pre-numbered cash receipt issued:
1) CUSTOMER – proof of payment
2) ACCOUNTING DEPARTMENT – money received (receipt book)
3) cash kept safe, accuracy checked & authorised by manager + SIGNED
CMISS
DEPOSIT MONEY
•
deposit slip = bank document filled in by the business to record a deposit of payments received from customers
details: date of deposit, details of cheque, amount of cash & cheque, total amount received
-
copies:
•
monitoring:
o monthly reconciliations by the accountant
o bank reconciliation (cash book & bank statement)
o debtor’s reconciliation (debtor’s control v debtor’s ledger balance)
•
•
•
accuracy checked by management & signed
depositing of cash daily
deposit slip = used to complete the cash receipts journal which is posted to the GL and the DL
•
•
recording & reconciliations done by separate people
all documents signed as evidence of occurring
•
1) ACCOUNTING DEPARTMENT – record money deposited
2) BANK – deposit money received
DRAB
MACRO
SALARIES & WAGES CYCLE
Stuvia.com - The Marketplace to Buy and Sell your Study Material
1. APPOINTMENT & AUTHORISATION
•
•
•
•
•
•
•
•
Specific department/head of the personnel
division requiring employees; informs the
personnel division of the position needing to be
filled
The personnel division will then do the following:
o Advertise the position (with authorization
from higher management)
o Receive applications together with the CV
(which should contain their qualifications)
o Suitable candidates are then interviewed
§ The interview should be
performed by the personnel
division
§ Two employees (one from the
personnel division & one from the
division requiring employees
should conduct the interview)
§ Aptitude tests must be
performed
The individual shall then be offered the job
A pre numbered appointment letter or contract of
employment shall be authorized & signed by the
personnel manager in twofold:
o One copy shall go to the new employee
o One copy should be kept by the personnel
division
Appointment letter / contract of employment
should contain details on the terms & conditions of
the employment
It must be signed by the employee accepting the
job
The hourly wage shall be determined by the wage
form & an authorized & signed by the personnel
wage manager
Or factory foremen together with the personnel
Department must decide on a wage & this shall be
authorized & signed by management
2. PERSONNEL RECORDS
a) Employee file (or permanent file)
• Information about every employee is kept in the personnel division with an employee file
o Each employee shall have their own file
o The file can be a physical paper file or a computerized file
• The following information should be kept in the files:
o Personal information, Employee number, Appointment date, Compensations, Fringe benefits, Deductions
• Any amendment in the wages must be recorded in the employee's personnel file by the personnel Department
b) Deduction authorisation form (NB: signing)
• A pre numbered deduction authorization form should be completed by the wage foreman giving permission to
the company to deduct certain amounts of the employee’s wage & to pay those amounts to third parties on his
behalf
• This should be signed by the employee as proof
• This form must be authorized & signed by the personnel manager & shall be issued in two-fold
o 1 is kept by the employee
o One should be kept by the personnel division
c) Compensation amendment form
• Any change in the following functions:
o Remuneration rate; Working conditions; Terms of employment
Must be recorded in this document
• A pre numbered compensation amendment form must be issued in two-fold & authorized & signed by the head of
the personnel division:
o One copy shall go to the employee in order to notify the employee of wage changes
o One copy should be kept by the personnel division
• Wage scale adjustment shall be authorized by the wage foreman
• Made out by two persons from the personnel division in writing
• The following party shall be notified in writing:
o The payment division wages division
o The employee (compensation amendment form)
d) Termination of service form
• When either party decides to terminate the employment contract, this must occur in writing
• This form can be completed by either parties:
o Employee upon resignation or employer through retrenchment or firing
• A pre numbered termination of service form must be completed by either one of the parties in two-fold & must be
authorized & signed by the head of the personnel division:
o One copy should be kept by the employee
o One copy should be kept by the personnel division
o Both parties must sign
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
wages
Stuvia.com - The Marketplace to Buy and Sell your Study Material
3. TIMEKEEPING & CHECKING HOURS WORKED
a)
Timecard/clock card/timesheet: record the hours of which a wage earner has
worked
• Clock card / time sheets should be prenumbered & prepared by the personnel
department using the employee list & must be authorized inside by the
foreman/supervisor
• Details include
o Employee number, name, date, number of hours worked, overtime
hours worked
• There should be control over the issue & receiving of clock cards namely that
there should be a register for cards issued & received back
• The issuing of the timecard shall be done by admin clerk A & the receiving of
the card shall be done by admin clerk B of the personnel division (segregation
of duties over issuing & receiving)
• The blank clock card shall be kept secure in a safe
b) Clock card machine
• Location: entry slash exit point (only in one location preferably)
• protected by a turnstile mechanism - where employees must use their
timecards to swipe in & swipe out
• There should be adequate supervision/foreman:
o Only one clock card machine
o Supervision during clocking in & out times the employee only swipes
their own card & to ensure the validity of information recorded
• All clock cards / timesheets must be collected at the end of the day & not left
for a period of time
• Clock card should be checked for errors & manipulation by the supervisor/
foreman which should be signed
• Overtime hours recorded on the clock card should be checked by an
independent person an approved in terms of the company's policy
•
•
•
•
4. CALCULATION & PREPARATION OF PAYROLL
The wages journal / payroll should be prepared with reference to the hours
worked through the club cards as well as the reference to the Clock card
machine
The following details should be included in the wages journal/payroll:
o Employee number, employee name, date, tariff, number of hours
worked, overtime hours worked, gross wage, deductions
The wage journal / payroll shall be checked & authorized independent person
/ manager of the wage department for validity (common weakness):
o Recalculation
o Checked with reference to the budget
o Checked for unusual expenses
o Check that hours indicated match the Clock cards
o Any difference should be investigated by the supervisor wage foreman
Calculation:
Hours (clock card) x tariff (tariff form)
= gross wage
Less deductions
= net wage
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
5. PAYMENTS
•
•
•
A cheque shall first be requested for total wages for the week from the personnel division & the wage journal / payroll should be sent as proof / supporting documentation (which
has been signed & authorized), The supporting documentation should be cancelled to prevent double recording
A cash cheque shall be then issued by the payment’s division with evidence of the money withdrawn such as a bank slip. The cheque is then cashed immediately, the cash should be
kept in a safe until they are placed in the pay packets.
The wage manager must compare the total of the wage journal with their cheques & cancel the wage journal in order to prevent double recording
a) Wage slip / wage record
• The wages for the employees are placed in a pay packet by the wage clerk:
o Wage clerk my sign is evidence of receipt of the cash
o The making up of the pay packet should be performed by two wage clerks from the payment division
o The contents must be checked & authorized by the manager of the wage department
• A pre-numbered wage slip shall be issued by the payment wage clerk in two-fold which indicates all the transactions applicable to the employee & total of their wages to date these
shall be approved & signed by the manager of the wages department:
o One copy sent to the employee and one is sent to the payment’s division
b) Wage payout
1. The payout must be attended by the accountant & the foreman (i.e. two persons).
2. Employees must identify themselves when they come to fetch their wages e.g. by means of a personnel card of identity document.
3. Employees must sign the wage journal as evidence that they received their wages.
4. The employee must immediately check the cash in the envelope under supervision of the accountant & foreman & any differences must be recorded immediately.
5. Wage envelopes must be handed to the employees in person only.
6. Wage envelopes, not fetched, must be taken back to the secretary who will keep it safe together with an unclaimed wage register. Wage must be recorded unpaid in wage journal
& entered in the unclaimed wage register.
7. The unclaimed wage register & the wage journal must be reconciled weekly.
8. Similar procedures must be in place as in 1-4 above, when the employee claims his/her wage envelope at a later stage. Entries then in unclaimed wage register only & not in wage
journal.
9. The unclaimed wages must be banked again within a reasonable period.
10. Long-outstanding wages must be checked by a senior member & reasons must be obtained.
c)
•
•
•
•
•
Unclaimed wages
The details of all unclaimed wage envelopes (employee name & number, date of payout & amount of wages) must immediately be recorded in a register of unclaimed wages & it
must be indicated in the wage journal that the relevant wage was not paid out.
The wage envelope, together with the register of unclaimed wages, must be handed over to the accountant who must sign the register as proof of receipt.
Until it is claimed (or banked) unclaimed wages must be placed in for example, a safe.
If an employee comes to claim his/her wage:
o the employee must be identified property (by for example, an employee card or identity book); the employee must check his/her wage & sign the register as proof of
receipt of his/her wage; & wage must be handed to the employee in person only.
• All envelopes which are not claimed in a reasonable time (3-5 days), must be handed to the cashiers, who must sign the register as proof of receipt of the money.
• The cash must then be deposited in the bank account of the company.
The register of unclaimed wages must be reviewed by the managing director in order to identify & follow up on any long-outstanding wages or regular unclaimed wages.
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
SALARIES
Salaries are similar to wages but:
• There are no clock cards
• No unclaimed wages
a) Calculation and preparation of the payroll
Basic salary (tariff form)
+ fringe benefits
Less deductions
= net salary
b) Salary journal
• A pre-numbered salary journal must be prepared by the payments division with reference to the
employee list provided by the personnel division, which shall be authorised and signed by the head
of the personnel division.
• This shall be prepared a week before payment is made
• Details:
o Employee number
o Employee name
o Date
o Salary scale
o Net salary
o Fringe benefits
o Gross salary
o Deductions
• The salary journal shall be checked by the head of the personnel division and authorised and
signed:
o Recalculated
o Checked with reference to the budget
o Checked for the unusual expenses
o Any differences shall be investigated
c) Payslip
• A pre-numbered pay slip shall be issued in two-fold by the payments division in order employees
receive their correct amount
• Copies:
o Employee
o Personnel division
• Details:
o Employee number
o Employee name
o Basic salary
o Salary scale
o Net salary
o Fringe benefits
o Gross salary
o Deductions
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
d) Payments by cheque (refer to payments & purchases cycle)
• The cheque shall be requested with the necessary supporting documentation (cheque requisition)
• Supporting documentation shall be cancelled to prevent double recordings
• The cheque number shall be noted in the salary journal, to note if the cheque has already been paid
• The cheque shall be signed and authorised by 2 persons
• The cheque shall be made out in the employee’s name and crossed (non-transferrable)
• The cheque shall be compared with the salary journal to ensure the results are the same before the
cheque is signed
• A salary control account or separate bank account shall be used to pay the salaries
e) Payments by direct bank transfer and electronic funds transfer
• This shall be performed by the responsible individual
• Should prepare an EFT file and details shall be recorded in the file such as: salary, name & number
of the employee and banking details, etc.
• The manager of the payments division should review the file and compare it to the salary journal,
the file shall then be approved by a password being entered
• The actual paying of the salaries should occur from a separate bank account or a salary control
account
• Proof of payment must be printed out as evidence
• The head of the personnel division/accountant should check for fictitious employees
• There shall then be reconciliation between the separate salary control/bank account and the
transfer made by the accountant
f) Payments of deductions to third parties
I.
IRP 5 FORM: deals with the income tax of the employee
• Must be pre-numbered
• Details on: payments received by the employee for the year and the corresponding tax deductions
• 2 Copies
o Employee
o Own records (accounting department)
• Other deductions included should be checked and authorised by the head of the payments
division/accountant
II.
•
•
•
•
Monthly return: all deductions of company in total
Includes: tax, pension funds, medical aid fund, RAF, RSC UIF (All these amounts must be checked
against the company own records)
Shall be checked, authorised and signed by the accountant of the personnel division
o Preparation and authorisation of the cheque (supporting documentation, supporting
documentation cancelled, signed by 2 persons, etc.)
The deductions shall then be paid over the 3rd party after being authorised and signed
Late payments will lead to the business being liable for fines and penalties
6. Account
• Preparation of the age journal entries
• Processing of the wage journal entries to the general journal and general ledger
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
Additional theory to look at
List the controls that should be in place over the authorising and payout of bonuses
1. The directors’ resolution on the bonus issues (in detail per employee or per post level) must be
recorded in the minutes of the meeting.
2. Minutes must be approved and kept safe in a systematic manner.
3. A separate ledger account for bonuses must be opened, so that the bonus payout is easy to identity
4. The financial accountant must:
a. Agree amount in ledger account with amount in minutes.
b. Select a sample of employees and ask the wage manager to provide him with the payslips and
IRP5 certificates of the relevant employees in order to check that bonus amount per individual
agrees with approved list.
5. The financial accountant must check the supporting documentation before he authorises the bonus
cheques.
6. The cheques must be approved by a member of management as second assignee.
Internal control objectives: Salary systems
To ensure that….
•
•
•
•
•
•
•
•
•
•
•
•
Only authorised engagements of competent, qualified persons occur.
Payments take place at authorised, approved scales or tariffs.
All salary calculations are accurate.
All deductions and fringe benefits/ allowances are properly authorised.
Payments to employees (salary cheques) are properly authorised.
All salary changes/increases/adjustments are properly authorised.
All dismissals are duly authorised.
No fictitious employees exist in the salary system (or that payments only occur to valid employees).
All salary transactions (salary expenses and payments) are properly (completely) recorded in the
accounting records.
All salary transactions are recorded accurately in the accounting records.
Salary journals are correctly casted and that all salary transactions are accurately posted to the
correct general ledger account.
All salary transactions are recorded in time and are classified correctly in the accounting records.
Internal control objectives: wages
To ensure that….
•
•
•
•
•
•
•
•
•
•
All wage pay-outs are prepared according to actual hours worked as per authorised clock cards
All wages calculated at authorised rates
All changes to wage rates are correct and authorised
All deductions and fringe benefits are authorised
All payments of deductions are correctly calculated
All deductions are paid to the correct organisation
All wage payments are correctly calculated
All wage payments are made to actual employees of the organisation
All wage payments are made to the correct employee
All wage workers are paid for services rendered
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Powered by TCPDF (www.tcpdf.org)
SALARIES & WAGES CYCLE
CONTROL OBJECTIVES:
VALIDITY
- appointments are authorised
- employees on system are actual employees of the business
- changes to salaries / wages are authorised i.t.o company policy
- dismissals are authorised
- employees who resign are removed from the journal
- payment of wages relates to services rendered in the period
- clock cards issued & collected are for actual employees only and only for actual hours worked
- cash is kept in safe custody
ACCURACY
- changes to salaries & wages are recorded accurately
- normal and overtime hours calculated correctly
- payment takes place at authorised rates
- calculations of salaries & wages done accurately
- correct wage amount is requested
- correct wages placed in wage enveloped for each employee
- deductions & liabilities calculated correctly and paid over to the third party
COMPLETENESS
- all wage earning employees paid for their services
- all employees who worked are paid
- salaries are paid to all employees entitled to payment
SALARIES
To ensure that:
• only authorised engagements of competent, qualified persons occur.
• payments take place at authorised, approved scales or tariffs.
• all salary calculations are accurate.
• all deductions and fringe benefits/ allowances are properly authorised.
• payments to employees (salary cheques) are properly authorised.
• all salary changes/increases/adjustments are properly authorised.
• all dismissals are duly authorised.
• no fictitious employees exist in the salary system (or that payments only occur to valid employees).
• all salary transactions (salary expenses and payments) are properly (completely) recorded in the accounting records.
• all salary transactions are recorded accurately in the accounting records.
• salary journals are correctly cast and that all salary transactions are accurately posted to the correct general ledger
account.
• all salary transactions are recorded in time and are classified correctly in the accounting records.
WAGES
To ensure that:
• all wage pay-outs are prepared according to actual hours worked as per authorised clock cards.
• all wages are calculated at authorised rates.
• all changes to wage rates are correct and authorised.
• all deductions and fringe benefits are authorised.
• all payments of deductions are correctly calculated.
• all deductions are paid to the correct organisation.
WAGES: preparation and calculation - validity
Internal control objectives: VALIDITY: Wages calculation and preparation of wages & deductions in wage journal
To ensure that:
• Only authorised appointment occur.
• Payment of wages are only made for hours actually worked.
• Payment of wages takes place at authorised tariffs/rates.
• Deductions and fringe benefits/ allowances are properly authorised. • Dismissals are duly authorised.
• Wage payments only for authorised hours
DESIGN A SYSTEM OF INTERNAL CONTROL : WAGE PAYOUT
1) There should be limited access to the wage pay out area
2) Each employee should only be allowed access to the wage pay out area if they show valid identification (identity
document/employee card).
3) Wage pay-outs must be attended by the wage clerk and the head of the human resources division.
4) Workers must identify themselves properly when they come to fetch their wages e.g. by means of a personnel card of
identity document.
5) No employee should be allowed to claim wages on behalf of any other employee.
6) Each employee should present their proof of identification (employee card) and:
7) Mr Moore should validate they have worked for him in the week and confirm they are the person on the photo,
8) Mr Moore and Miss Jackson must agree the employee number on their employee card to the corresponding pay packet.
9) Wage envelopes must be handed to the workers in person only.
10) The workers must immediately, under the supervision of the wage clerk and the head of the human resources division,
check the cash in the envelope and immediately record any differences in the wage journal.
11) Workers must sign the wage journal as evidence that they received their wages
12) The wage clerk and the head of the human resources division must record all unclaimed wages as 'unpaid’ in the wage
journal and then also record it in the unclaimed wage register .
13) Uncollected wage envelopes, together with the unclaimed wage register, must immediately be handed over to the
financial accountant for safekeeping (e.g. in a safe).
14) The financial accountant must reconcile the unclaimed wage register and the wage journal on a weekly basis.
15) Similar procedures must be in place as in 1-5 above, when the worker claims his/her wage envelope at a later stage.
16) The unclaimed wages not claimed after a reasonable time, must be deposited at the bank.
17) Long outstanding or regularly unclaimed wages must be checked by the financial director and reasons must be obtained.
TEST OF CONTROLS: WAGE PAYOUT
PASTE TAPE
P
Observe an interview to confirm that the HR manager, GM and foreman are present in the interview. If not
possible to observe an interview, enquire from them if they are always present in every interview
A
Select a sample of new appointments from the new appointment list and obtain the employee files to perform the
following:
•
Inspect the file:
- contract signed by the manager and the employee
- each employee is allocated a unique employee number
- certified copy of the employee’s ID book
•
Follow the employees to the applicable wage journal in the month of first payment based on the date on the
contract.
Inspect the contract for the normal and overtime wage rate included in the contract and agree it to the approved
wage rate authorisation form on the date of employment
•
S
Obtain the wage rate approval forms and inspect the form for the owner’s signature as well as normal and
overtime rates.
T
Select a sample of sequential timesheets and follow up and missing timesheets
(re-performing the timesheet sequence check.)
Observe the handing out of timesheets to the employees, confirming that she agrees the employee number on
their employee card to their timesheet and their photo to the person
Select a sample of timesheets from the weekly files and trace the timesheets through to the wage journal for the
applicable month
E
Inspect a sample of employee cards and confirm the detail to their employee file
T
Select a sample of transactions from the wages account where the whole amount was not transferred out of the
account in one batch (beneficiaries that were not loaded)
-
Inspect that the wage journals themselves have been signed by the accountant
Recalculate the totals of the wage journals.
Re-perform the reasonability check and enquire from the factory manager regarding any abnormalities
identified in his comments to the reasonability check
A
Inspect the access profile / authorization of the wages bank account to confirm that only the FD can add
beneficiaries to the wages account
P
Select a sample of wage payments from entries in the wage journal and perform the following
-
E
Agree (re-perform) the hours worked to the approved timesheet that has been signed by the employee as
well the factory manager
Inspect the timesheets for specific approval of overtime with by the factory manager, note his signature
Recalculate the gross and net wage
Agree (re-perform) the workings from the wage journal to the wage slips
Inspect the wage slips are signed by the accountant as evidence of the review
Observe that employees’ employee cards are checked by the foreman at the beginning and end of a day
Formulate the tests of controls you would perform on the WAGES system
1.
Enquire of managers if all interviews are conducted by both the human resources manager and
the factory manager and corroborate with new employees.
validity
2.
Select a sample of new appointments from the new appointment list and obtain the employee
files to perform the following:
validity
Inspect that the file contains a contract signed by the manager and the employee
Inspect that each employee is allocated a unique employee number by reviewing a sample of consecutive appointments’
employee numbers are not duplicated.
Inspect the personnel file for the certified copy of the employee’s identity book
Follow the employees to the applicable wage journal in the month of first payment based on the date on the contract.
Inspect the contract for the normal and overtime wage rate included in the contract and agree it to the approved wage rate
authorisation form on the date of employment
3.
Select a sample of new wage employee files and confirm (re- perform) that the employees were completeness
added to the new employee list on the appropriate date.
4.
5.
6.
7.
8.
Obtain the wage rate approval forms and inspect the form for the owner’s signature as well as
normal and overtime rates.
Inspect a sample of employee cards and confirm the detail to their employee file
Observe Mrs Jackson handing out the timesheets to the employees, confirming that she agrees
the employee number on their employee card to their timesheet and their photo to the person
Select a sample of sequential timesheets and follow up and missing timesheets (re-performing
the timesheet sequence check.)
Select a sample of wage payments from entries in the wage journal and perform the following:
validity
Agree (re-perform) the hours worked to the approved timesheet that has been signed by the employee as well the
factory manager
Inspect the timesheets for specific approval of overtime with by the factory manager, note his signature
Agree the wage rate to the appropriate quarterly wage approval form signed by the owner
Recalculate the gross and net wage
Agree (re-perform) the workings from the wage journal to the wage slips
Inspect the wage slips are signed by the accountant as evidence of the review
9.
10.
Select a sample of timesheets from the weekly files and trace the timesheets through to the
wage journal for the applicable month
Select a sample of months’ wage journals and perform the following:
completeness
validity
Inspect that the wage journals themselves have been signed by Mr Ngobese.
Recalculate the totals of the wage journals.
Re-perform the reasonability check and enquire from the factory manager regarding any abnormalities identified in
his comments to the reasonability check.
Formulate the tests of controls you would perform on the WAGES system
1.
Observe an interview to confirm that the HR manager, GM and foreman are present. If not
possible to observe an interview, enquire from them if they are always present in every
interview
Select a sample of appointments that were made in the year from list of appointments and
follow through to employee files to perform the following
validity
a
Inspect that the file contains an employment contract signed by the employee and the HR manager
validity
b
Inspect the employee contract to confirm that each employee has been issued with a staff number
and confirm by inspection that none of the staff numbers are the same
validity
Inspect the copies of the ID, driver’s license and certified letter from the bank and compare details to
employment contract
3.
Select a sample of payments from the wages bank account and follow through to the wage
requisition, monthly wage calculation, weekly wage journals and logbooks and perform the
following
a Reperform the comparison of the amounts on the wage requisition, current account bank statement
and wage account bank statement and follow up any differences
accuracy
validity
validity
Inspect the wage requisition, current account bank statement and wage account bank statement for
the signature of the FD
Reperform the comparison of the wage requisition to the monthly wage calculation and follow up
any differences
accuracy
accuracy
e
Reperform the comparison of the monthly wage calculation to the total of weekly wage journals and
follow up any differences
Confirm by inspection that the foreman initialed next to any amendments in the weekly wage journal
f
Reperform the wage calculation and follow up any differences
2.
c
b
c
d
Inspect the weekly wage journal for the foreman’s signature
Reperform the comparison between the weekly wage journal and logbooks for the week
Inspect the logbook for the foreman’s signature at the end of the day to confirm that he had checked
the employee cards upon their return
Inspect the logbook for the foreman and gardeners’ signatures to confirm that they were assigned to
the particular truck on a day
4.
Observe that employees’ employee cards are checked by the foreman at the beginning and end
of a day
5.
Inspect the access profile / authorization matrix of the wages bank account to confirm that only
the FD can add beneficiaries to the wages account
6.
Select a sample of transactions from the wages account where the whole amount was not
transferred out of the account in one batch (beneficiaries that were not loaded)
a For these transactions, confirm through inspection that the wage clerk sent an email to the FD
requesting for the beneficiary to be loaded
b Reperform the comparison of the bank details in the employee file to the bank details of the
beneficiary loaded on the bank account
accuracy
validity
accuracy
accuracy
accuracy
validity
accuracy
accuracy
validity
accuracy
validity
validity
validity
validity
validity
validity
validity
validity
Formulate the tests of controls you would perform on the WAGES system
1.
2.
Observe an interview to confirm that the HR manager, GM and foreman are present. If not
possible to observe an interview, enquire from them if they are always present in every
interview
Select a sample of appointments that were made in the year from list of appointments and
follow through to employee files to perform the following
validity
Inspect that the file contains an employment contract signed by the employee and the HR manager
validity
Inspect the employee contract to confirm that each employee has been issued with a staff number
and confirm by inspection that none of the staff numbers are the same
validity
Inspect the copies of the ID, driver’s license and certified letter from the bank and compare details to
employment contract
accuracy
validity
accuracy
validity
Inspect the contract for the normal and overtime wage rate included inthe contract and agree it to the
approved wage rate authorisation form on the date of employment.
3.
Select a sample of new wage employee files (completeness) and confirm (re- perform) that the
employees were added to the new employee list on the appropriate date.
4.
Follow the employees to the applicable wage journal in the month of first payment based on the
date on the contract
5.
Select a sample of sequential timesheets and follow up and missing timesheets (re-performing
the timesheet sequence check.)
7.
Select a sample of wage payments from entries in the wage journal (validity) and perform the
following:
Agree (re-perform) the hours worked to the approved timesheet that has been signed by the employee as
well as Mr Moore.
validity
accuracy
Inspect the timesheets for specific approval of overtime with by Mr Moore, note his signature.
Agree the wage rate to the appropriate quarterly wage approval form signed by Mrs Harris. (
Recalculate the gross and net wage.
Agree (re-perform) the workings from the wage journal to the wage slips
Inspect the wage slips are signed by Mr Ngobese as evidence of the review. (1) a sample of timesheets
from the weekly files (completeness) and trace the timesheets through to the wage journal for the
applicable month.
8.
Select a sample of months’ wage journals and perform the following:
validity
Recalculate the totals of the wage journals.
Inspect that the wage journals themselves have been signed by Mr Ngobese.
Re-perform the reasonability check and enquire from Mr Moore regarding any abnormalities
identified in his comments to the reasonability check.
9.
Observe that employees’ employee cards are checked by the foreman at the beginning and end
of a day
validity
Stuvia.com - The Marketplace to Buy and Sell your Study Material
INVESTMENT & FINANCING CYCLE
FINANCING
Issue of shares (shares certificate)
Dividends
Raising a long-term loan
Finance charger & loan repayments
A.
INVESTMENTS
Acquisition of PPE
Disposal of PPE
Depreciation & Net Asset Values
Property – title deed
Equipment – invoice
Market value – registered in your name
INITIATION
•
•
•
•
•
B.
Authorisation:
o company policy & director’s resolution (minutes of director’s meetings)
Adhere to any limitations set out in the MOI
any requirements in the Companies Act (e.g. section 40 regarding the share price)
cash flow considerations, budget preparation & cash flow statements
liquidity & solvency must be considered
TRANSACTION TYPES
I.
Investment transactions
•
•
•
•
II.
Acquisition & disposal of tangible non-current assets & financial instrument investments
Acquisition internal generation & disposal of intangible assets
Receipt & accrual of interest income & dividends received on investments
Accounting for the use of & changes in value of tangible & intangible assets through:
i. Depreciation / amortization
ii. Revaluation / other fair value adjustments
iii. Impairments & write downs
iv. Profits / losses on disposal
Financing transactions
•
•
•
•
Issue an repurchase of shares
Receipt of loan funding & payment thereof
Issue of debentures & subsequent repayments
Handling of accounting for the obligations that arise out of financing
i. Dividends declared & paid
ii. Finance charges accrued & paid (on loans)
iii. Finance charges & accounting adjustment in relation to debentures
Purpose of the transaction:
• Ensure that an entity invest funds in non-current assets to commence & operate a business & generate
working capital that ultimately provide profits for the entity (directly or indirectly)
• Also invest funds into to other investment assets to generate investment returns
• Ensure that the entity obtain sufficient financing in order to be able to comment & operate a business
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
Stuvia.com - The Marketplace to Buy and Sell your Study Material
C.
CHARACTERISTICS OF THEY CYCLE
•
•
•
•
•
D.
i.
Magnitude of transactions in the cycle are usual material on FS
Frequency of transactions are usually lower than for other cycles
Transaction is not subject to routine IC.
Since many transactions are done internally, often done without supporting external documentation
Transactions are governed by statutory & governance requirements such as:
o Company acts 2007
o MOI
FUNCTIONAL AREAS
FINANCING
Issue of shares
Payment of
dividends
Raising a long
term loan
Finance charges
& loan
repayment
PURPOSE
To obtain
cash flows by
allowing
potential or
current
shareholders
to purchase
an interest in
the company
To provide
returns for
shareholders
for their
investment
in the
company
To obtain
cash flows
from a bank
or lender for
funding
purposes
To account
for finance
charges &
lonely
payments in
terms of
agreement
•
•
•
•
•
•
•
•
•
•
•
•
•
1.
2.
3.
4.
5.
ACTIVITY
Approval of issue of additional shares by
board of directors (approval must be had
by parent company & resolution minuted)
Above must be in accordance with S 38,
S39 & S 40 of the companies act
Shareholders agreement must be drawn
up & entered into by new investors & the
entity
Investor pays for shares in terms of the
agreement
Share certificate issues.
Transaction record it in accounting records
Dividend is authorised by a resolution of
the board of directors )must comply with
S46 companies act.) Must be minuted.
Settlement of dividend takes place in
accordance with the decision of the board
of directors.
Dividend recorded in accounting records
Directors decide on the best financial
decision to acquire new PPE
Obtain approval from board & reach
agreement with lenders on details of loan
& repayments
Documented in a formal agreement
Signing of loan agreement, funds
advanced & general ledger accounts
updated to reflect transaction
Interest calculated by Linda Ann added to
loan account
Statement sent entity on a monthly basis
reflect monthly interest charge
Payment of interest takes place
automatically
Accounting records updated monthly to
reflect payment of interest
Repayments have to be made in terms of
agreement. Take form in monthly amount,
usually automatically paid
Updates to accounts in general Ledger are
made
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
PEOPLE
1. Board of directors
2. Company secretary
3. Accountant
1. Board of directors
2. Company secretary
3. Accountant
1. Board of directors
(specifically financial
director)
2. Accountant
1. Accountant
Stuvia.com - The Marketplace to Buy and Sell your Study Material
ii.
INVESTMENTS
PURPOSE
Acquisition of
To invest
PPE
funds in noncurrent
assets to
commence
and operate
the business
& to
generate
working
capital
provides for
profits for
the entity
Disposal of PPE
•
•
•
•
•
•
•
•
Accounting for
use of assets &
changes in
asset values
To account
for the use
of and
changes in
value of PPE
over time
•
•
•
•
•
E.
ACTIVITY
Gaining approval from board of directors
for significant transactions
Conducting feasibility studies
Acquisition process ensues - invoice by
suppliers processed
Acquisition of requisition document is
completed for less significant acquisitions
All new PPE are recorded on the fixed
asset register and general ledger
Significant transactions require approval
by board of directors and have to be
within memorandum mandate of MOI
Once board of directors approved sales,
asset is advertised for sale, buyers are
identified, invoice for the sale price issued
by the entity. Buyer settles the invoice and
takes delivery of the asset
Original cost and accounting Department
of asset must be removed from general
Ledger account after sale. Profit or loss
must also be recorded she's here she's
with me
Depreciation is calculated according to
useful life of the category class of PPE
Accordingly, entity staff estimate useful
lives and residual values
Recorded on fixed asset register and GL
Qualified member of staff consider the
impairment of assets annually
If no one is suitably qualified – expert in
the field may be appointed by BoD
DOCUMENTS AND RECORDS
I.
Investment activities
•
Ordering and acquisition of assets
o Capital budget
o MOI
o Minutes of the board meeting
o Asset requisition
o Specific purchase agreements/contracts
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
PEOPLE
1. BoD
2. Department head /
person requesting asset
3. Relevant accounting
personnel
1. BoD
2. Accountant
3. Relevant accounting
personnel
1. BoD
2. Production
managers/directors
3. Accountant
4. Other relevant accounting
personnel
Stuvia.com - The Marketplace to Buy and Sell your Study Material
•
II.
Receipt and custody of assets
o Share certificate
o Detailed fixed asset register
o Master file amendments forms
o Schedule calculations
Financing Activities
•
Receipt of debt or equity funds
o Minutes of board meeting
o MOI
o Specific financing agreement/contract
•
Holding of debt or equity funds
o Securities register
o Master file amendments forms
o Schedules of financing calculations
F.
RISKS IN THE CYCLE
I.
•
•
•
•
•
•
•
II.
•
•
•
•
G.
Investing activities
Fictitious or obsolete assets no longer used recorded in SFP
Management manipulate asset values as IFRS estimates are subjective
Inappropriate capitalisation of expense costs may occur
Entity may record an asset it does not have rights to
An asset may need to be impaired due to a loss in value owing to various internal and external (necessary
write-down may be recorded incorrectly)
Accounting of complex financial instrument investments may be incorrect
Misappropriation risk may arise because of theft of tangible assets and personal use of assets by
management
Financing activities
Failure to recognise financial liabilities at reporting date
Understanding of value of loans/debentures at reporting date
Accounting of complex liabilities incorrectly
Failing to account for accruals in relation to financing expenses (e.g. interest expense and dividends
declared)
CONTROL
VALIDITY
•
•
ACCURACY
•
Incorrect recording of investment
revenue & expenditure
• Financing:
o Inaccurate recording of equity and loan
receipts / repayments
o Over/understatement of OE
o Overstatement of expenditure due to
invalid recording of finances
COMPLETENESS
• Investments:
o Assets purchased are omitted from
recording = understatement of assets
o Incorrect recording of investment
revenue and expenditure
• Financing:
o Incomplete equity and loan receipts or
invalid recording of loan repayments =
understatements of equity
o Incomplete recording of financing
expenditure
o
Investments:
o Invalid purchases or capitalisation of
assets
o Overstatements of assets due to fictitious
purchases
o Invalid development costs being
capitalised
Financing:
o Unauthorised financing obtained
o Overstatement of owners’ equity and
liabilities
o Overstatement of expenditure due to
invalid recording of finances
Investments:
o Purchases or capitalisation of assets
recorded inaccurately
Downloaded by: notesbyjana | janagrey1401@gmail.com
Distribution of this document is illegal
INVESTMENT & FINANCING CYCLE
FORMULATE CONTROL OBJECTIVES
INITIAL RECEIPT OF LONG-TERM LOAN
To ensure that:
• The long term loan is appropriately authorised and is allowed in terms of the Companies Act.
• The long term loan relates to funds actually received by the business during the current period.
• The long term loan is accounted for at the correct amount in the financial records.
• The long term loan is classified correctly in the accounting records.
• The long term loan is accounted for timeously in the accounting records.
INTERNAL CONTROLS
FOR THE LOAN FROM XXX BANK
•
•
The approval must be given at a directors’ meeting and noted in the minutes of the meeting.
Before the decision is authorised, the following must be considered:
o Statutory requirements such as the Companies Act;
o The company’s policy and Memorandum of Incorporation;
o The estimated cash requirements of the company, supported by cash flow estimations and budgets.
o Any other valid point.
•
Legal advice should be obtained to consider any legal implications for the company.
Contracts with all relevant terms and conditions must be signed by an authorised staff member of TGS (one of the directors), as well as a
representative from the party advancing the loan.
Formulate the tests of controls you would perform on the LOAN FINANCING
11.
Inspect the financial statements to ensure the loan balances are correctly disclosed in terms of
IFRS
accuracy
completeness
12.
Recalculate the interest expense & agree it to the loan
accuracy
13.
Confirm the outstanding capital & interest amount with the party providing the loan
SIC
Formulate the tests of controls you would perform on INVESTMENT
1.
2.
3.
Select a sample of fixed asset purchases and inspect the supporting requisition
Enquire about the procedures in terms of purchasing fixed assets & the comparison of the
physical assets with the recorded assets
Inspect the signature of senior management as proof the comparisons were performed
Enquire about the policies in terms of purchases & disposals
validity
validity
completeness
Inspect supporting documentation and the minutes as proof of authorisation
4.
Inspect the requisitions for numerical sequences and proof the client’s signature
completeness
5.
Inspect the fixed asset register for proof of a senior management’s signature
completeness
6.
Select & compare a sample of purchases from records & compare to the invoice amount
accuracy
7.
Inspect for the reviewer’s signature as evidence
accuracy
8.
9.
Select purchases & disposals of fixed assets from the cash book & follow through to the source
documents, fixed asset register and entries in the ledger
must agree the date / amount / description and category
Inspect the reconciliation and agree it with the accounting records and source documents
Inspect the signature as evidence of review
10.
Verify the procedure by enquiry
11.
Select purchases & disposals from source documents and follow through to the ledger accounts
& fixed asset register to ensure all is recorded in the correct period
12.
Enquire about the company’s policy and inspect the application
accuracy
completeness
Audit Approach
ISA 300, 330
Learning outcomes:
• Explain the difference between a combined approach and a substantive approach
• Explain elements which must be included in an overall audit approach
• Formulate an overall audit approach for practical situations
• Distinguish between audit plan and overall audit approach
Overview of the Audit Process
Audit Approach background:
• Why?
Plan of action or work method on how to approach the audit to obtain sufficient
audit evidence to evaluate the fair representation of the financial statements as a
whole or per account
• What?
Audit procedures to be performed based on the nature, timing and extent
• Procedures?
1. Test of Controls (TOC) - test working of controls
2. Substantive procedures (SP) - Detailed tests - verify year end balances,
transactions
Reasons for the Audit Approach:
• Why do we formulate an Audit Approach?
- Co-ordinate the audit
- Limit audit risk
- Audit evidence in cost effective way
•
- Determine the nature/extent/timing of audit procedures
Using what?
- Knowledge of the business and industry
- Planning materiality
- Risk evaluation
Overall Audit Approach:
ISA 330
Risk based Audit Approach: AR = IR x CR x DR
Risk identified at financial statement level
Risks identified at account/ assertion level
Determine the overall approach:
- Nature
- Timing
- Extent
Specific audit procedures applied to
respond to material misstatements of
assertions
Nature, timing and extent of the Audit Approach:
Nature:
Refers to the purpose of the procedures
that the auditor chooses to perform and to
the types of procedures used for obtaining
audit evidence
Timing:
Refers to when the audit procedure is
performed
• The most common factor that
affects timing of the audit
procedures is the risk of
•
•
Test of controls
Substantive procedures
•
Extent:
Refers to the quantity of the audit
procedures to be performed, therefore
often referring to the sample size used for
an audit procedure
•
•
•
Year-end stage
The higher the assessed risk is, the
more likely auditors are to perform
procedures at or after the end of
the financial reporting period
Interim period
The controls have proved effective
in prior periods
Test up to year-end, in order to
obtain evidence that the controls
tested at the interim stage operated
effectively for the entire year under
review
Extensive
Limited
None
•
Two scenarios:
Nature
CR Ý
•
Timing
•
Substantive approach
Therefore, substantive
procedures
Substantive procedures
Year-end stage
CR ß
•
•
•
Extent
•
Substantive procedures
Extensive
•
•
Combined audit approach
Test of controls
Substantive procedures
Test of controls
Year-end stage
Interim period
Substantive procedures
Year-end stage
Test of controls
CR ß Extensive
CR Ý Limited
Substantive procedures
Limited
How to know what audit approach to follow:
• Can you rely on the Internal Controls?
• Yes = Combined approach
• No = Substantive approach
How to answer a question: CR Ý
•
•
•
•
•
Control risk was previously evaluated as high, which means that there is no proper
system of internal control in place
No reliance can therefore be placed on the system of internal control, consequently
no tests of control will be performed
This will be achieved by following substantive based audit approach
Extensive substantive procedures will be performed
Extensive substantive procedures will be performed after year-end
Audit Materiality
ISA 320
Learning outcomes:
• Discuss the concept of materiality and apply in practical situations
• Describe the role that materiality plays in the different stages of the audit
• Calculate the materiality figure (with discussion of the factors which were evaluated)
• Describe the relationship of materiality with audit risk and apply practically
Introduction:
ISA 220:
Purpose of audit of FS – to enable the auditor to express an opinion as to whether the FS in
all material respects are prepared in accordance with the applicable financial reporting
framework
ISA 320:
Auditor should consider materiality and its relation to the audit risk whilst concluding an
audit
What is ‘material’?
Info is material if:
• omission thereof or misstatement thereof can influence the economic decisions of
users made on financial statements
Depends on:
• The size (rand value) of item/ mistake (quantitative) or
• Nature (qualitative)
• Judged in surrounding circumstances
• Professional judgement
Why is it necessary?
• Auditor does not provide 100% guarantee
• Only reasonable assurance
• That financial statements are free from material misstatements
• Planning: Determine acceptability materiality level
- For the detection of qualitative material misstatements
- Determining factor: extent of audit tests
What will cause the AFS to be materially misstated
Help determine which financial items to inspect, audit procedures
When?
Materiality needs to be considered during various stages of the audit process
• Planning (ISA 320):
- Materiality during planning of the audit
- Preliminary information
- Helps identify which FS items to investigate
•
•
- Determine audit procedures
Review during audit (ISA 315):
- Re-evaluate
Completion (ISA 320):
- Materiality during finalisation of the audit
- Audited figures
- More knowledge, circumstances can change
- Evaluate audit differences
How is it determined?
Apply professional judgement
• Quantitative indicator: calculate figure
- Follow framework
- Provide cut-off point/ threshold
• Qualitative considerations:
- Consider nature of item/ mistake
• Material account balance:
- Contains risk of material misstatement
- Based on size (quantitative) or qualitative characteristics
Materiality:
• Last phase of the planning process involves the auditor determining the level of
misstatement that will be acceptable to the users of the FS
• Planning materiality can only be properly determined once the auditor has:
- Fully understood the entity and its users
- Assesses the inherent and control risk at FS level to determine the detection risk
at this level
- Considered the auditor’s response to this required level of detection risk
Audit (AR)
Detection
Risk (DR)
Want low = 0
RMM
(Risk of Material
Misstatement)
Business
High
Want low = 0
Want low = 0
Medium
Low
Medium
High
Determination of IR and CR
DR WTA
Types of materiality:
1. Planning materiality
2. Performance materiality
3. Final materiality
Auditor
Low
Materiality figure
Low figure – more audit
evidence
Average figure
High figure – less audit
evidence
Planning materiality:
• For the overall financial statements
• 5 step materiality approach
1. Which financial information should be used
2. Bases available
3. Bases suitable for client, discuss:
- User
- Nature of business
- Stability of bases
4. Calculate range
5. Decide on materiality
Identify IR and CR level so that you can decide on DR
Performance materiality:
• Calculate for each individual account
• % of planning materiality
• Performance materiality may not be higher than planning or final materiality
Final materiality:
• Final check after any audit adjustments that materiality if calculated on the 5 step
approach is higher than materiality used to adjust
PLANNING MATERIALITY
Step 1: Which financial information is used?
CURRENT YEAR
â—¦
The current year's figures are not available for the entire year and the turnover cannot be compared
with the previous 9 months, therefore we cannot use it.
â—¦
The current year’s financial information (2018 actual) is available and there is no indication of any
significant changes since the preparation of this information
â—¦
â—¦
The current year's figures are available and show the actual results for nine months.
There is no indication of any significant changes since this information was compiled or indications
that this information will change significantly
The current year’s figures are available and there is no indication that these figures will change
significantly.
â—¦
CURRENT YEAR
BUDGET:
â—¦
The current year budgeted sales (revenue) show a significant decrease and is below actual figures for
2018 and consequently the budgeted figures are not appropriate.
â—¦
The current year's budget is available and the budget higher than the actual results achieved and is
not applicable to be used for materiality.
It looks like the original budget will not be reached and therefore it cannot be used.
â—¦
PREVIOUS YEAR:
CONCLUSION:
â—¦
They say that the Financial Manager is known for his accurate budget preparations. The figures that
would give the most accurate indication for planning purposes are the adjusted budgeted figures for
2010
â—¦
Figures of the previous financial year are available and have been audited, but cannot be used as
the company’s financial situation has changed significantly from the previous year audit, mainly due
to acquisition of new airplanes.)
â—¦
Figures of the previous financial year are available and have been audited, but cannot be used as the
company’s financial situation has changed considerably since the previous year’s audit.
â—¦
The previous financial year’s figures are available and were audited, but are not appropriate since the
company’s business model changed since the previous year’s audit and the previous year's figures are
no longer a reasonable account of the financial situation of OCC.
The actual figures for 2018 are the most accurate indication of the company’s substance, because it
reflects the change in the company’s operations best and will be used.
â—¦
â—¦
The actual figures for 2019 is the most accurate reflection of the company’s operations for the
financial year under review, if it is adjusted to represent the entire financial year (12 months, thus
12/9).
Step 2: Bases as given
•
•
•
0.5% to 1% of income
5% to 10% of net profit before tax;
1% to 2% of total assets
3. Which basis to use
Users:
•
Owners:
â—¦
â—¦
The company is not listed and is owned, in equal parts, by middle-aged brothers.
They want to earn a good income from the company and want to expand to earn additional
income. Therefore their dividends are their main focus and the statement of comprehensive
income will be an appropriate basis.
â—¦
Statement of
Comprehensive
Income
Shareholders:
•
â—¦
â—¦
•
The company is a listed company.
The owners will mainly be interested the firm’s profitability and dividend payable to them and
capital growth.
Statement of
Comprehensive
Income
â—¦
Statement of
profit and loss
â—¦
Statement of
Comprehensive
Income.
SARS:
The financial statements would also be of importance to the South African Revenue Service since the
company has to pay tax on its taxable income
•
â—¦
Credit providers:
SHORT-TERM
â—¦
The short-term credit providers consist of creditors and overdraft
bank account and they will be interested in the profitability
â—¦
Statement of
Comprehensive
Income.
LONG-TERM:
â—¦
The long-term credit providers will be interested in the firm’s
profitability- which is needed to maintain interest rates and do
capital repayments and which might have impact on the company’s
ability to redeem the finance charges
â—¦
Statement of
Comprehensive
Income
â—¦
â—¦
The long-term credit providers will be interested in financial stability
and the assets, that may be assessed when the company experiences
financial problems
â—¦
Statement of
Financial Position.
â—¦
The bank (that provided the long term loan) is one of the main users
of the financial statements.
They are especially interested in two factors: assets, which are
security for the loans and may be claimed if the company
experiences financial problems (statement of financial position) and
the firm's profitability which can have an impact on the company’s
ability to redeem finance charges and capital
â—¦
Statement of
profit and loss
Statement of
comprehensive
income
The company is a manufacturing company which manufactures
furniture. As a result of the nature of the business the company owns
inventory and assets that are used for the production of inventory
(capital intensive).
Without the assets the business will not survive.
â—¦
Statement of
Financial Position
The company is a producer and distributer of food products. As a result
of the nature of the business the company owns inventory and assets
that are applied for the production of inventory. Without the assets
the business will not survive.
â—¦
Statement of
Financial Position
â—¦
The companies’ main business is the selling of goods
Revenue is what drives the business.
This is confirmed by the size of the revenue figures on the statement
of profit and loss and other comprehensive Income.
â—¦
Statement of
comprehensive
income
Statement of
comprehensive
income
The business is also driven by income from rendering services and
upgrades
This is supported by the size of income compared to the other
elements of the financial statements.
â—¦
â—¦
â—¦
Nature of the business:
MANUFACTURING
COMPANY
â—¦
â—¦
DISTRIBUTION
COMPANY
SALE OF GOODS
RENDERING SERVICES
â—¦
â—¦
â—¦
â—¦
â—¦
â—¦
â—¦
â—¦
Statement of
Profit & Loss
Statement of
comprehensive
income
CAPITAL INTENSIVE
BUSINESS
â—¦
â—¦
The business is also capital intensive and require airplanes to operate
The size of the assets in relation to the other elements of the
financial statements is significant
â—¦
Statement of
Financial Position
NON-CURRENT ASSETS
= KEY DRIVER
â—¦
With the change in the business model during the current year,
expensive, specialised machinery is required for services and
upgrading. Therefore the non- current assets are the key drivers of
the business
This is supported by the size of the assets compared to the other
elements of the current year's financial statements
â—¦
Statement of
Financial Position
â—¦
The expansion in the bank overdraft will be applied for the payment
of salaries, for overtime and for the purchasing of generators.
â—¦
â—¦
As a result of the high debt levels credit suppliers will focus on the
stability of the Statement of Financial Position. Yet, they will not
ignore the Statement of Comprehensive Income and will be
interested in profit before tax.
â—¦
Statement of
Comprehensive
Income
Statement of
Financial Position
•
information is not very stable. Income decreased from R850 million in 2016 to R756 million in
2017 and then increased again, to R829 million in 2018.
•
information is very volatile and can therefore it cannot be used.
•
With the change in business model, there was also an increase in the net profit before tax
percentage (18% to 33%) as well as sales (41%, attributed to 12/9 months) The statement of
comprehensive income is therefore not stable.
â—¦
Funding of the business:
Stability:
Statement of
Comprehensive Income
•
Statement of Financial
Position
Net profit before tax
•
The statement of financial position figures is not stable due to the acquisition of the airplanes.
•
•
Total assets
•
the company made a net loss ð not a suitable measurement or an appropriate basis
A loss is budgeted for the current year therefore profit before tax will not be an appropriate
basis.
There was a once-off classification error between work-in-progress and finished products, but it
does not affect the total asset basis, since it is within the basis and can easily be corrected. It is
only an allocation error and does not eliminate the basis.
With the new business model and purchase of machinery, PPE also increased considerably
during the current year and therefore the total assets are also not stable.
not suitable - expect problems with the inventory count and doubts exist about inventory
figure.
•
•
•
the assets are fully depreciated even though they are still in use, indicating that the total asset
base might not be appropriate.
•
There might be uncertainty regarding when ownership transferred on the generator (as it was
delivered on year end in an emergency), which might mean that assets are misstated – this
eliminates this base.
Revenue
•
Revenue figures showed a steady increase, and is thus more stable
Income
•
A decrease in income is expected during the year therefore it does not show a steady growth
pattern and will not be an appropriate basis.
Gross Profit
•
The gross profit percentage stays stable at 40%
Since all users are interested in the Statement of financial position of the company and since the value of the company is in its
assets, total assets will be selected as basis.
Step 4: Calculations
5% to 10% of profit before tax of R1 200 000 x 12/9 = R1 600 000
= R80 000 to R160 000
1% to 2% of Total Assets: (R11 850 000* 1% - 2%)
R 118 500 - R 237 000
Step 5: Decide on materiality figure
Conclusion:
•
•
•
INHERENT RISK
Inherent risk was
determined to be
low and control risk
is also low.
Inherent risk was
determined to be
medium and
control risk is also
medium.
Inherent risk was
evaluated high and
control risk is also
high.
•
•
•
DETECTION RISK
Therefore detection
risk should be
estimated at a high
level.
Detection risk is
medium
Therefore detection
risk should be
estimated at a lower
level
•
•
•
WHERE
at the top of
the margin
a figure in
the middle
of two
margins will
be selected
at the
bottom of
the margin
•
PLANNING MATERIALITY
Therefore the planning materiality figure in
the bracket (R 118 500 - R 237 000) for the
2010 audit of Bakersman Limited is R 237 000
•
The planning materiality figure is therefore
R120 000. (R80 000 to R160 000)
•
Therefore the planning materiality figure for
the audit of Supaspa Limited is R41 700 (R 41
700- R 83 400)
Audit Risk
ISA 200, 315
Learning outcomes:
• Describe and evaluate audit risk
• Name and describe components of audit risk
• Identify the factors that influence the components of audit risk and apply practically
• Describe the relationship between audit risk and audit evidence
Risk Evaluation
Audit risk
as low as possible
Risk that the auditor expresses
an inappropriate opinion when
the financial statements are
materially misstated
AR = IR x CR x DR
Inherent risk
Susceptibility to a
misstatement that could
be material, before any
related controls
Control risk
Detection risk
Risk that a misstatement
that could be material, will
not be prevented,
detected and corrected,
on a timely basis by the
entity's internal control
Risk that specific audit
procedures performed will
not detect a material
misstatement
Use detection risk to
reduce audit risk to an
acceptable level
Evaluate risks on two levels:
• ROMM on financial level:
- Risk factors affecting the overall financial statements
• ROMM on account/ assertion level:
- It affects a specific account/ assertion
Business risk
Inherent risk: Absence of Internal Control
Risk Factors
Staff competence and
experience
New industry
Well established brand with
good reputation
Complexity of transactions
or unusual/ difficult
transactions
• Forex
• Large assets
• Provisions for
guarantees
• Contingent liabilities
Management/ staff
incentives or aggressive
financial targets
• Mgt cannot reach
budgeted figures
• Business has
suffered a loss
New client
Established client
Impact (Why?)
Staff does not have
knowledge of the business
system or know the risk
profile of the industry which
may lead to the team
making errors
This is due to good
customer services/ quality
products/ sustainable
practices
Complex calculations or
calculations for which staff
is not qualified
Link to AFS
Increase errors in AFS
Decrease going concern risk
Increase risk of errors in AFS
Overstated income or assets Increase risk to manipulate
and understated liabilities
AFS
and expenses
Client- may not be well
established and may have a
small market share
There is no proven track
record of profits
Well established with
proven track record = high
probability of certainty of
future cash flows
Founders have extensive
experience in the industry
which indicates that they
are competent to perform
the role of running the
business
Continually made a profit
having built a brand that has
Increase going concern risk
and increase errors in AFS
Decrease going concern risk
a proven track record of
being profitable and sales
continue to grow which
indicates that the company
has a proven track record
Types of products/ services
• Luxury
Limited market share
Impact on cash flow and
profits as demand drops
Increase going concern risk
•
Unique
High demand for product
and have competitive
advantage
Decrease going concern risk
•
Obsolete due to
technology
Write down inventory to
NRV (complex) = overvalued
and thus errors in AFS
Loss of revenue due to the
inability to sell products
Increase going concern risk
•
Manufacturing
products
Manufacturing of the
products leads to complex
calculations and the
accounting treatment
This increases the risk of
errors in FS with reference
to the inventory balance
and cost of sales
•
Product is sold in a
highly competitive
industry
Many businesses are selling
the product it may lead to a
decrease in the market
share and an excess supply
and a decrease in sales
Increase going concern risk
Forex exchange risks and
delays due to an increase in
complex calcs
Foreign sales may be
subject to exchange rate
fluctuations that may
impact the company’s profit
if negative
Increase going concern risk
and increase errors in AFS
Location and geographical
distribution
• Products imported
from overseas
suppliers
•
Products are sold to
poorer countries
Decrease their market share
and affect cash flow
Increase going concern risk
•
Located in all main
centres within SA
Competitive advantage and
therefore increase sales
Decrease going concern risk
Widely distributed
Difficult to implement and
monitor IC = poor IC
Increase errors in AFS and
increase control risk
Distribute to both
global and local
markets
Related party transactions
Increases the available
market which could
increase sales
Bias judgement calls and
familiarity of the parties
may result in manipulation
of figures
Decrease going concern risk
Cash flow issues
Increase going concern risk
Poor quality
equipment
purchased:
- Less popular
- Client submits
claims
- Contingent liab
- Inventory val
Level of sophistication of
information system
Loss of market share
(reputation) and thus cash
flow issues
Complex calcs and
valuations may be over or
undervalued which may
lead to errors
Increase going concern risk
and increase errors in AFS
High degree of
computerisation and
transactions via the internet
allows for theft and fraud
Increase going concern risk
and increase the risk of
fraud in AFS
Age of information system
New systems may be new to
staff and errors may occur
or loss of data
Impact the current year’s
AFS if there are prior
misstatements
If there are poor quality
goods, NRV may be
estimated too high or too
low
Contravene the CPC and
mgt integrity is questioned
= indicates the possibility of
the manipulation of the AFS
and can damage the
business’s reputation which
may lead to loss of sales
Must be in compliance with
the regulations otherwise it
Increase errors in AFS
•
•
Cashflow challenges or
financial position
• Business makes a
loss
•
History of misstatements
Transactions that require
judgements/ Estimates
• Inventory valuations
False marketing
Non-compliance with laws
Increase risk to manipulate
AFS
Increase errors in AFS
Increase errors in AFS
Increase going concern risk
and increase the risk of
fraud in AFS
Increase going concern risk
Compliance with laws
Decrease in the availability
of natural resources
Delays due to bad weather
Not replacing machinery
that has reached the end of
its useful life
Specialised machinery
No remaining cash reserves
to replace machinery
Management integrity
• Senior employee
resigns
• Aggressive targets
will result in penalties and
legal liabilities which result
in cash outflow
This can also harm the
business’s reputation
This highlights mgt integrity
and improves the brand’s
reputation
This affects the cost of raw
material which may
increase the cost of
production and decrease
the profits of the business
A delay in the production
may lead to a loss of market
revenue
This may lead to inferior
quality products which
could impact the sales of
the products
Decrease the risk of fraud
and errors in AFS
Increase going concern risk
Increase going concern risk
Increase going concern risk
This may also indicate that
the incorrect useful life was
determined for their fixed
assets and that fixed assets
are incorrectly valued
May require complex
calculations to determine
the value of the machinery
and the depreciation
Need to apply for a loan and
this could negatively
influence cash flows
Accumulating interest on
loans resulting in cash flow
issues
Increases the risk of errors
in the AFS
Mgt may want to
manipulate the FS for them
to be more appealing for an
Investor to secure a loan
Increase the risk of fraud in
the AFS
Estimates require mgt to
exert judgement and mgt
might manipulate the
machinery figure to assist in
securing the bank loan
Increase the risk of fraud in
the AFS
Increase the risk of errors in
AFS
Increase going concern risk
Listed company
Client pays a deposit
Recording of revenue takes
place over end year
Imports
• Reliability
Increases risk since the
Increase the risk of fraud in
existing shareholders want
the AFS
to see the growth in the
company’s earnings, which
may give directors reason to
fraudulently increase
earnings
May not meet the JSE or
other listing requirements
which can lead to penalties
or errors in the FS
Record keeping of the
deposit may be complex
and subject to errors
Increase the going concern
risk and increases the risk of
errors in AFS
Non-refundable deposit will
decrease the risk of clients
not paying, thus decreasing
the risk of bad debts
The recording of revenue
over year end may be
complex with adjustments
required which may result
in errors
Decrease the going concern
risk
Reliability of foreign
suppliers to provide
products on time and of
correct quantity and to
render proper after-sales
services which may result in
delay of productions and
sales (which leads to loss of
market share)
Increase going concern risk
Increase the risk of errors in
AFS
Increase the risk of errors in
AFS
•
Quality
Quality of imported parts
Increase going concern risk
and equipment may be poor
since it’s imported from
overseas which may lead to
manufacturing defects and
a loss of market share
•
Impact on cash flow
Imports are exposed to
exchange rate fluctuations
that can influence prices
and profits negatively
Increase going concern risk
Forex transactions are
complex due to the
different currencies and
exchange rates which
results in errors if the
employee is not properly
trained
•
Complexity of
transactions
•
Laws and regulations There will be regulations
and tariffs which is not
complied with may result in
the products not being able
to be imported which will
affect sales and the
reputation of the company
Increase the risk of errors in
the AFS
Increase going concern risk
Control risk: Absence of internal controls
Risk factors
New accounting system or
internal control
New accounting personnel
Degree to which the duties
are segregated
Good internal control
activities
Weak internal control
activities:
• New company =
internal controls not
well established
• New accounting
system
Good internal control
environment
Impact (Why?)
Complexity of
implementation of new
systems
Staff does not know how to
operate the system
Lack of SOD results in one
person performing
incompatible functions and
higher chance of ROMM
and incomplete accounting
records
Improvements in IC due to
positive attitude of mgt
Good internal control
activities will prevent,
detect and correct
misstatements from
reaching the AFS
Weak internal control or
lack of monitoring means
there is never any
improvement leading to
many misstatements not
being prevented and the
business may not succeed
Mgt places emphasis on
sound internal control and
staff members are aware
Link to AFS
Increases the risk of errors
in the AFS
Increase the risk of errors in
the AFS
Increase the risk of errors in
the AFS and increases the
risk of theft and fraud
Decrease risk of errors in
AFS
Increases risk of errors in
the AFS
Increases going concern risk
Decease risk of fraud and
errors in the AFS
Weak internal control
environment
Many mistakes
Few mistakes
Types of payments
• Only cash sales
permitted
and thus fewer
misstatements
Mgt does not place
emphasis on sound internal
control and misstatements
are generally overlooked by
staff and likely to occur
May indicate similar
mistakes in the AFS
Indicates that there will
likely be limited mistakes on
AFS
Increase risk of fraud and
errors in AFS
Increase risk of errors in AFS
Decrease errors in AFS
There are no receivables =
simplified admin and thus
no risk of bad debts
Decrease going concern risk
•
Large amounts of
cash
Large amounts are held on
the premises
Increase the risk of fraud
and theft
•
How is cash kept
safe?
Easy access to the safe and
staff could easily steal
Increase the risk of fraud
and theft
•
How are
transactions
accounted for?
Cash receipts only
accounted for upon request
of staff = incomplete AFS
May indicate a bad attitude
of mgt towards IC
Increase the risk of errors in
AFS
Increase the risk of errors in
AFS
Detection risk: Absence of internal control
Risk factors
Time pressure/ pressure on
auditor
Impact (Why?)
Risk that there won’t be
enough time to perform a
proper audit – may
influence independency and
objectivity
Contact with previous
Could obtain needed
auditor
information which will
decrease ROMM in the RS
will remain undetected
New industry
Don’t have enough
New system
knowledge of the business –
New client
relevant experience and
don’t know the risk profile
Auditors have been auditing Therefore, they will have
the company for many years the necessary knowledge
Link to AFS
Increase the risk of errors
remaining undetected in the
AFS
Decrease the risk of errors
remaining undetected in the
AFS
Increase the risk of errors
remaining undetected in the
AFS
Decrease the risk that
misstatements in the AFS
Auditor has extensive
experience in the industry
and experience in order to
perform the audit or risk of
familiarity and fraud if there
are no external reviews
Therefore, has the
appropriate knowledge to
perform the audit
may not be detected by the
audit procedures
Decrease the risk that
misstatements in the AFS
may not be detected by the
audit procedures
Evaluate audit risk on account and assertion level
Management assertions:
Claims made by the members of management regarding certain aspects of a business
Structure of test of controls
•
•
•
Test of controls are used when control risk is evaluated as low (good internal
controls are in place, meaning well designed and have been implemented)
The auditor then chooses to rely on the internal controls and tests the operating
efficiency thereof
One cannot perform test of controls if there is no or insufficient internal controls in
place
INHERENT RISKS ON AN ASSERTION LEVEL
Discuss:
the inherent risks at account/assertion level for the audit
the factors evident which will increase the risk of material misstatement on account/assertion level
IDENTIFY THE
RELEVANT
TRANSACTION /
BALANCE
APPLY RELEVANT
ASSERTIONS
SHIPPED FROM A DIFFERENT COUNTRY (IMPORTS)
Inventory is sent free-on-board and some was still at sea on year-end. The risk
exists that all inventory is not recorded in the financial records
Inventory
Completeness
Inventory is imported which results in complicated foreign exchange transactions,
which may increase errors during the conversion and recording in the accounts
which could be affected by this
Inventory
Accuracy, valuation &
allocation
Inventory is imported which increases the risk regarding the right of ownership
Inventory
Rights & Obligations
There are foreign creditors to be revalued at year-end to calculate the liability
outstanding at the spot rate. Errors can be made with the re-valuation
Inventory Creditors
Accuracy, valuation &
allocation
Inventory is imported which results in complicated foreign exchange transactions,
which may increase errors during the conversion and recording in the accounts
which could be affected by this
Inventory Purchases
Exchange rate profit
& loss
Accuracy
Accuracy
STANDARD COSTING SYSTEM IS USED
Standard costing is a complex system & the inventory value may be incorrectly
determined
Inventory
Accuracy, valuation &
allocation
Luxury market: due to the luxury nature, furniture may not sell under the current
economic circumstances which increases the risk that adequate write-off to NRV
is not made
MANUFACTURING COMPANY
Inventory
Accuracy, valuation &
allocation
Raw materials / WIP may be incorrectly classified or % completion may not be
calculated accurately
COMPANY OBTAINS A LOAN
Inventory
Classification
Interest on the loan may be capitalised rather than expensed
Loan
Accuracy, valuation &
allocation
Split between current & non-current liabilities may be incorrect
Loan
Accuracy, valuation &
allocation
LUXURY PRODUCT
COMPANY EMPLOYS WAGE WORKERS
Company employs many labourers & therefore can easily create fictitious hours
for employees / record them
Wages
Occurrence
Different rates are used for overtime / normal hours worked. Errors can occur
with the calculation of wages if incorrect rates are used
Wages
Accuracy
Wages can be incorrectly capitalised to inventory / incorrectly calculated due to
standard costing
Wages
Accuracy
Gardeners work without supervision and might attend to private jobs without
bookings while receiving cash for these services.
Doubled its workforce in the last year which makes it harder to detect fictitious
employees.
Completeness
Wages
Occurrence
The company employs many labourers, can therefore create fictitious employees
or fictitious hours for employees & record them
Wages
Occurrence
The company employs many labourers, and so they have to pay many employees
so can therefore make mistakes easily when recording payroll
Wages
Accuracy
LABOUR INTENSIVE COMPANY
DISTRIBUTION TO MAJOR RETAILERS ACROSS THE COUNTRY
Due to distribution throughout the country, shipping terms there could be cut-off
issues
Income
Cut-off
DIRECTORS ARE EXPECTING PERFORMANCE BONUSES
A performance bonus is paid to directors, the risk is that no provision is created
Provision for bonus
Completeness
A provision for bonus must be created in the financial statements which could be
subjective. The risk is that the provision is calculated incorrectly
Provision for bonus
Accuracy, valuation &
allocation
Since a significant part of the trade debtors are in Africa, it could be difficult to
determine the provision for credit losses.
Provision for credit
losses
Accuracy, valuation
and allocation
Debtors’ credit terms are exceeded by far. It increases the risk of bad debt.
(If worked out and not just going by what the company told us)
Bad Debts / Debtors
Accuracy, valuation
and allocation
DEBTORS
Risk of determining whether the debtors really belongs to the company as a
result of the acceptance of returns and free on board transaction terms of
exported goods.
Rights and obligations
Difficult to determine if the debtors in Africa really exist.
Existence
PPE
A new generator was delivered in an emergency on year end. The risk exists that
ownership did not transfer on the same day according to the purchase
agreement.
PPE
Rights & Obligations
Most of the property, plant and equipment are fully depreciated, yet they are still
in service. This might indicate that the useful life estimation and consequently
depreciation period of fixed assets are inadequate.
PPE
Accuracy, valuation and
allocation
INVENTORY
Bakersman is a manufacturing enterprise. A risk exists that the overheads
can be allocated incorrectly.
Inventory
Accuracy, valuation and allocation
There were problems with the inventory system’s ability to determine the
stage of completion / will be determined incorrectly at year-end.
Inventory
Accuracy, valuation and allocation
A risk exists that all costs to bring the inventory to the current condition and
location (including labour and raw material costs) are not included in the
inventory balance.
Inventory
Accuracy, valuation and allocation
Inventory days on hand are much more than the prior year and for the
comparable company, this increases the risk that inventory might be spoilt /
overstated.
Inventory
Completeness
Accuracy, valuation and allocation
There is a risk that not all transport costs to bring inventory to current
condition and location (including labour and material costs) might be
accurately included in the value of inventory.
Raw
Materials
Purchases
Existence
Accuracy
Completeness
A risk exists that not all labour and material cost are allocated to inventory.
Completeness
Accuracy, valuation and allocation
Inventory can be over-valuated since it quickly becomes obsolete and
because management possibly do not want to write-off the inventory.
Accuracy, valuation and allocation
Inventory levels are increasing as sales decrease. This could be an indication
of obsolete inventory.
Accuracy, valuation and allocation
Invoicing is done at different rates and hours. This increases the complexity
of calculations and errors can be made.
Accuracy
The inventory is sold at lower than cost. This inventory must therefore be
written off to net realisable value. No provision was however created for
obsolete inventory in this regard, which means that inventory is overvalued.
Inventory
Accuracy, valuation and allocation
The risk of inventory gone bad is increased.
Inventory
Accuracy, valuation and allocation
The risk exists that the inventory items may have been stolen and no longer
exist in inventory.
Inventory
Existence
Revenue
Cut-off
Classification
TRANSACTIONS
Since deposits expire within 24 hours of the service delivery, there is a risk
at year end that not all deposits relating to the services that are scheduled
for the next day are reclassified to revenue.
Each job is invoiced in two different invoices. This increases the complexity
of calculations and errors can be made in final invoicing
Accuracy
MACHINERY
The manufacturing machine consists of various components, of which the
useful lives differ. It would be difficult to distinguish between the different
components and it can lead to complicated calculations, which can lead to
the incorrect valuation of this machine.
Accuracy, valuation and allocation
There is no indication that the useful life and residual value is reviewed
annually as required by IAS 16. It can lead to the incorrect valuation of
machines.
Accuracy, valuation and allocation
OTHER
Fraud risk in recognition of revenue (ISA 240)
Revenue
ALL ASSERTIONS
Owned by a family: Increases the risk that profits might be understated to
evade taxes.
Income
Completeness
Occurrence
Describe and motivate the audit approach
set inherent risk as ‘low'
•
•
•
•
•
•
•
•
•
•
•
•
•
Inherent risk’s provisional evaluation is low, control risks’ evaluation is low, and therefore the auditor will only
be willing to accept a high detection risk.
Extensive tests of control will therefore be performed, since the auditor will want to place reliance on the
effective functioning of controls (To review CR as low).
The auditor will follow a system based approach to the audit of the company
Tests of control will need to test the functioning of the controls for the entire year (timing).
If the tests of control show that the internal controls are in working order, limited substantive procedures can be
performed
Control risk for the audit has been provisionally evaluated as low which indicates there is a good system of
internal control in place
A combined or control based audit approach will be followed
therefore reliance can be placed on the internal control system
Consequently extensive tests of the controls will be performed
These tests will be performed before year-end
Since the inherent risk has been evaluated as low it means that the detection risk the auditor will be willing to
accept to bring the audit risk to an acceptable level will be higher in order to maintain the audit risk at an
acceptably low level
Therefore, limited substantive procedures will be performed
Some of the substantive testing will be done before year-end with early verification and the rest done at or after
year-end
set inherent risk as ‘medium'
•
•
•
•
•
•
Control risk is medium, which means that a moderate degree of reliance can be placed on the internal controls
A combined (or system-based) audit approach will be followed.
A moderate amount of tests of control will be performed.
Since the inherent risk were evaluated as medium the auditor will be willing to accept a medium level of
detection risk will be accepted to keep the audit risk at an acceptable level.
Therefore a moderate amount of substantive procedures will be performed.
Tests of control will be performed before year-end and substantive procedures on or after year-end.
control & inherent risk evaluated as ‘high'
•
•
•
•
•
•
Control risk for the audit has been provisionally evaluated as high which indicates there is not a good system of
internal control in place
therefore no reliance can be places on the internal control system and consequently no test of the controls will
be performed
since inherent risk and control risk are both evaluated as. high it means that the detection risk the auditor will be
willing to accept to bring the audit risk to an acceptable level will be low
this will be achieved by following the substantive based audit approach by performing substantive procedures
extensive substantive procedures will be performed
all audit procedures will be performed after year-end
risk based audit approach
The International Auditing Standards currently applicable in South-Africa are based on
a risk based approach to auditing.
This implies that the auditor:
• through a process of obtaining knowledge of the business and its environment, (performs risks assessment
procedures);
• the auditor assesses the risk of misstatement in the financial statements; and then
• determines if the identified risks exists at financial statement-level, or are risks which influences specific
assertions/accounts, and then
• responds to the risks in the design of an appropriate audit approach (the nature, extent and timing of audit
procedures) to the audit (more audit attention will be paid to risk areas),
• which will ultimately decrease the risk that material misstatement will not be detected, to an acceptable level.
audit risk at financial statement level
Inherent risk
• The accountants are focussed on takeover transaction under time pressure which increases the risk of errors in the
[recording of transactions due to carelessness] or [financial statements].
• The audited statements will be submitted to the acquiring company in an order to calculate the value of Rafiki Limited,
which could lead to intentional errors in the financial statements to improve the company’s financial position.
• The results will be used to determine if performance bonuses should be paid out in the following financial year, which
could lead to intentional errors in the financial statements in order to improve the company’s financial position.
Detection risk
• I was recently appointed as the auditor of Rafiki Limited and therefore risk that [I do not have any previous knowledge or
experience of the client.] or [This might result in me not detecting some material misstatements.]
• The previous auditor immigrated to India. Problems may be experienced with contacting and communication with him to
obtain information required to properly perform the audit.
• Rafiki Limited’s year-end falls with most of my other clients’ year-ends. As a result of work pressure I may be under a lot
of time pressure when the audit must be completed possibly resulting in misstatements not being detected.
risk assessment procedures: why they alone no not provide sufficient audit evidence to support the audit opinion
•
Risk assessment procedures are the procedures that the external auditor performs to understand the entity and its
environment (including internal control) and identify and assess the risks of material misstatement at the financial
statement and assertion levels.
•
Risk assessment procedures alone do not provide sufficient evidence to support the audit opinion as they merely
identify the risk of material misstatement but do not test if the misstatement is present in the financial statements
(or provide a basis for designing and implementing the response to the assessed risk of material misstatement).
risk assessment procedures: the external auditor can perform
As set out in ISA 315 par 6 – 10 the risk assessment procedures include:
• Inquiries of management, internal audit and others within the entity
• Analytical procedures
• Observation and inspection
• Consideration of the pre-engagement (acceptance and continuance) process
• Information from prior experience within the industry or the client
Explain during which stage of the audit planning process would the auditors use analytical procedures and for what
purpose.
1.
Analytical procedures in the planning phase of the audit assist with:
•
Obtaining an understanding of entity and environment
- Provides useful information on the short-term and long-term financial position of the client.
•
Risk evaluation
- Early identification of potential risks
- Identify accounts which could contain potential misstatement
•
Formulation of the audit approach
- in reaction to risks identified the nature, extent and timing of audit procedures can be determined.
Explain why performance materiality is calculated & which aspects of the audit are affected by it
•
•
Performance materiality is determined to decrease the probability that the total of unadjusted audit differences in
the financial statements exceed the materiality for the total of the financial statements or that it exceeds the class
of transactions, account balances and disclosure that are determined. (ISA 320.10)
It will influence the number of items selected(extend), the nature and timing selected for testing x, the risk
assessment. (ISA 320.11)
Risk & reason why I would like to spend extra audit time
Account
Assertion
Mohair is made using the hair from the Angora goat. The goats’ hair is sheared, sorted into different quality fibres and after
being washed, these fibres are spun into mohair yarns
ð Manufacturing of products leads to complex calculations (eg: apportionment of labour overheads / material) and accounting treatment.
This increases the risk of errors in the financial statements, with reference to the inventory balance & cost of sales
Moses Weave is a manufacturing enterprise. There is a risk that
overheads can be allocated incorrectly
Inventory
Accuracy, Valuation & allocation
A risk exists that not all labour and material cost are allocated to
labour
Inventory
Completeness
There has been a lower quality of goat feed (raw materials) which may impact on the quality of mohair produced
ð This may also impact on inventory valuation which increases the risk of errors in the financial statements
Inventory can be over-valued as inventory might be obsolete &
management might not want to write-off inventory
Inventory
Accuracy, Valuation & allocation
The machinery in use has reached the end of its useful life.
ð This may indicate that the incorrect useful life was determined for their fixed assets and that these are incorrectly valued and so may
increase the risk of errors in the financial statements
This may indicate that the incorrect useful life was determined
for their fixed assets and that these are incorrectly valued and
so may increase the risk of errors in the financial statements
Property, Plant &
Equipment
Accuracy, Valuation & allocation
Depreciation may be calculated incorrectly
Depreciation
Accuracy
The company farms Angorra goats
ð The valuation of land & agricultural goods as well as the calculation of tax may be complex which may increase the risk of errors in the
financial statements
The valuation of biological assets may be complex and the
valuation may be wrong
Biological assets must be valued at fair value and the valuation
might be wrong
Valuation of agricultural land and equipment can be complex &
involves judgement, errors can be made
Biological assets
Accuracy, Valuation & allocation
Fair value adjustment
Accuracy
Property, Plant &
Equipment
Accuracy, Valuation & allocation
The machinery used by Moses Weave is specialised
ð The valuation of land & agricultural goods as well as the calculation of tax may be complex which may increase the risk of errors in the
financial statements
This may require complex calculations & increase the risk of
errors
Depreciation may be calculated incorrectly
re-valuation = complex transaction
calculate amount that is wrong
Balances
Property, Plant &
Equipment
Depreciation
Accuracy, Valuation & allocation
Accuracy
Accuracy
Accuracy
Accuracy, Valuation & allocation
Discuss:
the inherent risks at account/assertion level for the audit
the factors evident which will increase the risk of material misstatement on account/assertion level
RISK & MOTIVATION
ASSERTION
SHIPPED FROM A DIFFERENT COUNTRY (IMPORTS)
Inventory is sent free-on-board and some was still at sea on year-end. The risk exists that all
inventory is not recorded in the financial records
Completeness
Inventory is imported which results in complicated foreign exchange transactions, which may
increase errors during the conversion and recording in the accounts which could be affected
by this
Accuracy, valuation &
allocation
Inventory is imported which increases the risk regarding the right of ownership
Rights & Obligations
There are foreign creditors to be revalued at year-end to calculate the liability outstanding at
the spot rate. Errors can be made with the re-valuation
Accuracy, valuation &
allocation
Inventory is imported which results in complicated foreign exchange transactions, which may
increase errors during the conversion and recording in the accounts which could be affected
by this
STANDARD COSTING SYSTEM IS USED
Accuracy
Standard costing is a complex system & the inventory value may be incorrectly determined
Accuracy, valuation &
allocation
LUXURY PRODUCT
Luxury market: due to the luxury nature, furniture may not sell under the current economic
circumstances which increases the risk that adequate write-off to NRV is not made
Accuracy, valuation &
allocation
MANUFACTURING COMPANY
Raw materials / WIP may be incorrectly classified or % completion may not be calculated
accurately
Classification
COMPANY OBTAINS A LOAN
Interest on the loan may be capitalised rather than expensed
Split between current & non-current liabilities may be incorrect
Accuracy, valuation &
allocation
Accuracy, valuation &
allocation
COMPANY EMPLOYS WAGE WORKERS
Company employs many labourers & therefore can easily create fictitious hours for
employees / record them
Occurrence
Different rates are used for overtime / normal hours worked. Errors can occur with the
calculation of wages if incorrect rates are used
Accuracy
Wages can be incorrectly capitalised to inventory / incorrectly calculated due to standard
costing
Accuracy
LABOUR INTENSIVE COMPANY
The company employs many labourers, can therefore create fictitious employees or fictitious
hours for employees & record them
Occurrence
The company employs many labourers, and so they have to pay many employees so can
therefore make mistakes easily when recording payroll
Accuracy
DISTRIBUTION TO MAJOR RETAILERS ACROSS THE COUNTRY
Due to distribution throughout the country, shipping terms there could be cut-off issues
Cut-off
DIRECTORS ARE EXPECTING PERFORMANCE BONUSES
A performance bonus is paid to directors, the risk is that no provision is created
Completeness
A provision for bonus must be created in the financial statements which could be subjective.
The risk is that the provision is calculated incorrectly
Accuracy, valuation &
allocation
DEBTORS
Since a significant part of the trade debtors are in Africa, it could be difficult to determine
the provision for credit losses.
Accuracy, valuation and
allocation
Debtors’ credit terms are exceeded by far. It increases the risk of bad debt. (If worked
out and not just going by what the company told us)
Accuracy, valuation and
allocation
Risk of determining whether the debtors really belongs to the company as a result of the
acceptance of returns and free on board transaction terms of exported goods.
Rights and obligations
Difficult to determine if the debtors in Africa really exist.
Existence
INVENTORY
Bakersman is a manufacturing enterprise. A risk exists that the overheads can be
allocated incorrectly.
Accuracy, valuation and
allocation
There were problems with the inventory system’s ability to determine the stage of
completion.
Accuracy, valuation and
allocation
Inventory can be over-valuated since it quickly becomes obsolete and because
management possibly do not want to write-off the inventory.
Accuracy, valuation and
allocation
Inventory levels are increasing as sales decrease. This could be an indication of obsolete
inventory.
Accuracy, valuation and
allocation
A risk exists that not all labour and material cost are allocated to inventory.
Completeness
Accuracy, valuation and
allocation
IDENTIFY SPECIFIC MANAGEMENT ASSERTIONS FROM WHICH EACH SPECIFIC AUDIT OBJECTIVE WAS DERIVED
.
All salary & wage transactions are included in the SFP and SCI
Test all operating expenses incurred in the financial year were actually recorded
Test if all clients who attended were included in the sales figure and all transactions
correctly recorded
All corrections made to salary & wage transactions in the period were recorded
All payments to creditors during the period were recorded
Completeness
Completeness
Completeness
Salary & wage transactions were carried over correctly from the source documents
Test all sales transactions were recorded with the correct quantities and amounts
Test sales relating to amounts still outstanding at year-end were only made to debtors
who were approved as being able to settle their debts
Accuracy
Accuracy
Accuracy, valuation and
allocation
Salary & wage transactions were recorded in the correct accounting period
Test all sales transactions were recorded in the correct financial period
Cut-off
Cut-off
Salary & wage transactions included in the SFP and SCI took place and relate to the
company under audit
Only salary & wage transactions were recorded in the account
Appropriate disclosures have been made concerning the director’s salaries
Debtors represent amounts receivable from valid customers in the SFP
Creditors in the SFP represent legal claims of the entity on customers for payment
Occurrence
Completeness
Completeness
Classification – proper account
Presentation
Existence
Rights / obligations
INTERNAL CONTROL
System of internal control
ï‚·
The process designed and affected by management to provide reasonable assurance about
achievement of entity’s objectives relating to;
o Reliability of financial reporting
o Effectiveness and efficiency of operations
o Compliance to laws and regulations
Inherent limitations of a system of internal control
Internal control can provide only reasonable assurance
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
ï‚·
Cost benefit consideration
Ability to cope with non-routine transactions
Human error or misunderstanding
Management judgement
Inappropriate management override of controls
Measures may become inadequate over time
The five components of a company’s internal control
1. The control environment
ï‚· The control environment encompasses the attitude of management towards internal control
ï‚· Management can create and foster a positive attitude towards internal control by doing the
following
o Communicate and enforce integrity and ethical values throughout the entity to all
employees who are involved in the development, application and monitoring of internal
control
o Be committed to competence
o Ensure that those people charged with governance participate, and that they act
appropriately and support management in their internal control efforts
o Demonstrate good leadership and judgement
o Develop and put in place an organisational structure which clearly assigns authority
and responsibility and sets out clear reporting lines within the entity
2. The company’s risk assessment process
ï‚· An entity’s risk assessment process refers to the way in which the entity deals with governance of
risk
3. The information system, including the related business processes, relevant to financial reporting,
and communication
ï‚· The information system relevant to financial reporting creates the audit trail of each transaction
and event to which the entity is party, and includes all the processes and activities of the entity
involved in preparing the financial information
ï‚· The information system relevant to financial reporting
o Initiate/Execute
 This stage pertains to the physical activities relating to where the transaction is
initiated or the performing of activities relating to complete the initiated transaction
 Transaction
o Record
 This stage is where the information applicable to each activity is recorded
 Source document
o Process
 During this stage, the transaction is processed and corresponding entries are
made in the accounting records of the entity
 Accounting records and financial statement closing process
o Report
 This stage is where the transaction is included in the financial statements
 Financial statements
WWW.TAKINGNOTES.CO.ZA
see
4. Control activities relevant to the audit
ï‚· Control activities refer to those internal control measures, policies and procedures that
management designs and implements to ensure that their objectives are achieved
Documentation and records
Document
ï‚· Documents used in the accounting system should be pre-printed and designed
design
in a way to assist in the process of using them and to minimise the chances of
making mistakes in the completion and use thereof
ï‚·
Stationery
controls
Proper stationery controls include the sequential pre-numbering of documents
to facilitate the checking of the number sequence later on to ensure
completeness of recording and the cancellation of documents after use to
prevent them from being reused for fraudulent purposes
Chart of
ï‚· To ensure proper control over the accounting records in which transactions are
accounts
recorded, a chart of accounts is necessary
Authorisation
ï‚· Management should set different levels of authorisation and should assign
and approval
responsibility for the approval of transactions to suitable employees whose
duties are not incompatible
ï‚· Before authorising, the approver should review the supporting documents and
records to determine whether the transaction is allowed in terms of the entity’s
approval policy
Segregation of
ï‚· Transactions go through various stages in the accounting process
duties
ï‚· Certain transactions are more susceptible to fraud and error when one
employee is responsible for handling the particular transaction from beginning
to end
Access control
ï‚· It is necessary to control access to the assets properly
5. Monitoring of controls
ï‚· It is important that management assesses the effectiveness of the design and operation of
internal control measures on an ongoing and timely basis, and take the necessary corrective
actions
6. Independence checks and reconciliations
ï‚· It is necessary that the work of a person be independently checked or reviewed by a second
person
ï‚· Should be evidenced by a signature of the reviewer
Control objectives
ï‚·
Validity
ï‚·
ï‚·
Completeness
ï‚·
Accuracy
All transactions and events that are executed were properly authorised in
accordance with management’s policy, and
All transaction and events that are recorded
o Occurred (i.e. are not fictitious)
o During the period, and
o Are supported by sufficient documentation
All transactions and events that occurred during the period
o Are recorded,
o In a timely manner, and
o No transactions or events are omitted
Transactions and events are recorded
o At the correct amounts (quantity, price, calculations)
o Are correctly classified in terms of the entity’s chart of accounts
o Are correctly summarised and posted to the entity’s accounting
records
WWW.TAKINGNOTES.CO.ZA
BUSINESS CYCLES
Underlying Principles
ï‚·
ï‚·
ï‚·
Risks (identify risks, weaknesses, consequences)
Controls (identify the controls / lack of controls in place and make suggestions)
Test of Controls (Test the identified controls)
Designing a System of Internal Control
What must be taken into
Be careful for:
consideration?
Internal Control Objectives:
Limitations in question
ï‚· Validity
ï‚· Accuracy
ï‚· Completeness
Categories of Internal Control:
Or specific requirements
ï‚· Control Environment
ï‚· Risk Assessment Process
ï‚· Information Systems
ï‚· Control Activities (SCRRAM)
ï‚· Monitoring Controls
Suggested System of Internal
Control
How do I formulate my answer?
Clear and specific for management
Answer must be executable for
client
Answer must be understandable
How to answer a test of controls question
5. Remember control objectives (accuracy, validity and completeness)
6. Formulate the test of control:
a. Inspect (not often used)
b. Observe,
c. Enquire,
d. Reperform (often comparison of journals or other sources to supporting documents is done
by the auditor by means of reperformance),
e. Recalculate
7. What are you testing? Remember to include:
a. Person,
b. Price,
c. Amount,
d. Description,
e. Value,
f. Date
8. Reason or purpose of conducting the test:
a. “To obtain information that the IC are applied and to ensure that accuracy is obtained”
ï‚· When testing for completeness, select a sample of source documents and follow it to financial
statement level
ï‚· When testing for accuracy and validity, select a sample from the financial statements and trace
down to source document level
Salary and Wage Cycle
Personnel Division
ï‚· Control Objectives: Validity
ï‚· Confirmed by means of:
ï‚· Observation, inspection of organisational charts and enquiry that the following functions are
performed by different employees
ï‚· Appointment
ï‚· Maintenance of permanent files
ï‚· Safe guarding of clock cards & calculations
WWW.TAKINGNOTES.CO.ZA
e
ï‚·
ï‚·
Account
Pay-out
Appointment Letter (A.L)
ï‚· Appointment, conditions and stipulations
ï‚· Two copies:
ï‚· Employee
ï‚· Personnel Division
ï‚· Control Objectives: Validity
ï‚· Inspect A.L for signature of employee and personnel manager to ensure that it was authorised
correctly
Personnel Records (P.R)
ï‚· Personal info, employee number, appointment date, compensation, fringe benefit, deductions
ï‚· Control Objectives: Validity, accuracy, completeness
ï‚· Compare P.R to A.L to ensure that details actually agree
Deduction Authorisation Form (D.A.R)
ï‚· Two copies:
ï‚· Employee
ï‚· Personnel division
ï‚· Control Objectives: Validity, accuracy, completeness
ï‚· Inspect D.A.R for signature of employee to ensure that he authorised the deduction
ï‚· Compare D.A.F to wage journal to ensure that deductions were taken into account in the wage
journal accurately
Tariff Authorisation Form (T.A.F)
ï‚· Two copies:
ï‚· Employee
ï‚· Personnel Division
ï‚· Control Objectives: validity, accuracy, completeness
ï‚· Inspect T.A.F for signature of head personnel division to ensure authorisation
ï‚· By means of reperformance compare TAF to wage t wage journal to ensure that tariff is correctly
accounted for in wage journal
Termination of Service Form (T.S.F)
ï‚· Two copies:
ï‚· Employee
ï‚· Personnel division
ï‚· Control Objectives: Validity, Completeness
ï‚· Inspect TSF for signature to ensure authorisation
ï‚· Select a sample of termination of service forms and compare them to the age journal for dates after
termination of service to ensure the employee is no longer in the wage journal
Clock Card
ï‚· Employee name, number, date, hours
ï‚· Control Objectives: Validity, accuracy, completeness
ï‚· By means of reperformance compare CC to the wage journal to ensure that hours worked are
recorded accurately
ï‚· Inspect CC for signature of supervisor to ensure that CC are authorised
ï‚· Observe clocking in/out process to ensure that supervisor is present and check that only one clock
card is used by each employee
ï‚· Recalculate the counting of hours
Wage Journal (W.J)
ï‚· Hours x Tariff = Gross Wage – Deductions = Net Wage
ï‚· Control Objectives: Validity, accuracy, completeness
WWW.TAKINGNOTES.CO.ZA
D
•
•
•
Recalculate wage calculations to ensure that it was calculated correctly
Inspect for signature to ensure authorisation
Take a sample of journal entries from the W.J and trace to supporting documentation to ensure
there are no fictitious entries
Wage Slip (W.S)
• Two Copies:
• Employee
• Payment division
• Control Objectives: accuracy, completeness
• Reperform calculations to ensure accuracy
• Inspect signing of the documents to ensure authorisation
• Ensure there are controls over the safe keeping of cash
Wage Payout
• Control Objectives: Validity, accuracy, completeness
• Observe the wage payout to ensure that
• Responsible person
• Two people hand out and the foreman
• Identification of employee must be present
• Sign the register on receipt of cash
• Only pay the employee in person (a friend may not collect)
• Count the money before signing the register
• Inspection of organisational charts, enquiry and observe that the following functions are performed
by different people:
• Preparation of wages
• Authorisation of wage cheque
• Payment of wages
Unclaimed Wages
• Control Objectives: Validity
• Ensure the following has taken place:
• Indicate on wage journal as unclaimed
• Immediately take the cash back to a responsible person
• Sign on receipt
• Keep in secure place
• Keep a register of unclaimed wages
• Date, employee number, amount
• Foreman signs
• Inspect for indication that wage was unclaimed
• Inspect register of unclaimed wages for signature of responsible person as proof of receipt
• Compare the amount on the unclaimed wage register to the amount indicated as unclaimed in the
wage journal
• If wages are claimed:
o Only pay to the employee in person
o Proof of identification must be present
o Employee must count money
o Sign as proof of receipt
• Monitoring:
o If cash is not claimed within a reasonable time, deposit in the bank
o Independent person must check and follow up on the register for:
o Long outstanding
o Regularly unclaimed wages
Salary Journal (S.J)
• Employee number, name, date, scale, allowances, deductions, gross and net salary
• Basic Salary + Allowances / Fringe Benefits – Deductions = Net Salary
WWW.TAKINGNOTES.CO.ZA
t
•
•
•
Control Objectives: Validity, accuracy, completeness
Recalculate calculations to ensure accuracy (A)
Select a sample from the salary journal and trace back to supporting documents to compare details
(V) Compare salary calculations to salary journal (C)
Payslip
• Employee name, number, basic salary + allowances – deductions = net salary
• Inspect payslip for signature of authorised person (V)
• Recalculate, reperform and compare calculations to ensure accuracy (A)
IRP5 Form
• Payments received and tax deducted per employee for the year
• Control Objectives: Validity, accuracy, completeness
• Recalculate and reperform to ensure accuracy ‘
• Take a sample of the letter of employment and trace through to IRP5 form to ensure completeness
• Take a sample of IRP5 forms and trace through to supporting documents
Returns
• Tax pension fund, medical aid, RAF
• Inspect for the signature of the accountant to ensure that returns are authorised
• Compare returns to supporting documents to ensure accuracy
a
WWW.TAKINGNOTES.CO.ZA
SUBSTANTIVE PROCEDURES
UNDERLYING PRINCIPLES
S b a i e
ced e a e
ced e ha he a di
ef m i
de
b ai a di e ide ce
specifically designed to detect material misstatements at the assertion level. They are specially aimed at
detecting material misstatements of amounts and disclosures
x
Objective of TOC/SP distinguishes the two
o TOC: to test the operating effectiveness of controls when deciding to rely on internal controls
Æ therefore support control risk
o SP: to obtain evidence of material misstatement in the financial statements to support or
prove a series of actions conducted in a certain order or manner Æ reduce detection risk
to an acceptable level
Management responsibility for SP:
o Preparation and presentation of financial statements
o Design, implementation and maintenance of internal controls and systems
o Retain supporting documents to support financial events
x
COMBINED AUDIT APPROACH/SYSTEM
BASED
x Reliance on internal control system
x Focus on tests of controls
x TOC results determine whether further SP
should be performed
x SP always performed for all material balances
SUBSTANTIVE AUDIT APPROACH
x
x
Little/no reliance on internal controls
Extensive substantive procedures
TYPES OF SUBSTANTIVE PROCEDURES
GENERAL SUBSTANTIVE PROCEDURES
x Performed on every audit in so far as they are applicable
1. Agreeing opening balances for accounts in SFP with the prior year s audited AFS and the audit
working papers
2. Agreeing closing balances of the GL accounts with the TB and then with the FS
3. Agreeing closing balances of GL accounts with underlying records
4. Casting, cross-casting and recalculating the underlying records
5. Examining GL accounts for provisions, reversals and adjustments
6. Examining GL accounts for unusual or suspicious transactions
7. Obtaining a written representation from management
8. Evaluating all disclosures in AFS in terms of IFRS
SUBSTANTIVE ANALYTICAL PROCEDURES
x
Use comparisons and analyses of relationships among financial and non-financial data to assess
whether account balances, totals and disclosures appear reasonable compared to the auditor s
expectations
1. Month on month analysis of a class of transactions
2. Analysis of FS amounts as a percentage of other directly related FS items
WWW.TAKINGNOTES.CO.ZA
2
Performing Substantive Analytical Procedures
x
x
x
x
Key prerequisite is for the auditor to be able to develop an expectation that is precise enough in
the circumstances to be able to detect unusual results as well as to define a limit beyond which
fluctuations will have to be investigated further
When to use? If risk of material misstatement is high Æ DR low Æ lower reliance on substantive
analytical procedures
Need to consider the audit evidence available directed towards the specific assertion
Need to consider the reliability of the data which includes (1) source of data, (2) comparability of
data, (3) controls applied over preparation of data, (4) ability of auditor to develop sufficiently
precise expectations
Evaluating Results
x
If the auditor does not believe that substantive analytical procedures have provided sufficient
appropriate audit evidence for the assertion concerned, further audit procedures (tests of details)
should be performed
SUBSTANTIVE TESTS OF DETAILS
x
Drill down into the details of the transactions that make up a particular amount or disclosure in the
FS, with the objective of obtaining audit evidence to support the amount or disclosure
x More accurate than substantive analytical procedures but takes more time
1. Inspection of relevant source documents or physical assets
Source Documents: Review for date (cut-off), name of entity (occurrence), amount of transaction
(accuracy, valuation), correct signatures (occurrence)
Asset: verify existence of asset and valuation
2. Reperformance of procedure
3. External confirmation from third parties (ISA 330 A48)
4. Recalculation to ensure accuracy of source documents is correct
5. Enquiry through discussions with internal parties (ie. management), and external parties
Substantive Tests of Details classes of transactions
x Performed on all material classes of transactions for key business processes to verify all the
assertions
x Auditor follows the following steps to develop the substantive tests of details:
Step 1: Identify all classes of transactions impacting the relevant account for which the substantive
procedures are to be formulated (normally by drawing up a T account)
Step 2: Formulate the audit objectives that has to be verified by means of the substantive procedures for
each class
Step 3: Identify all relevant documents and client personnel involved in each class
Step 4: Select the type of procedure to be performed to achieve the audit objective for each class
Substantive Tests of Details disclosures in the FS
(follow same 4 step process as above)
WWW.TAKINGNOTES.CO.ZA
NATURE (WHAT?):
EXTENT (HOW
MUCH?):
TIMING (WHEN?):
AUDIT STRATEGY: PER ACCOUNT AND ASSERTION
Detection risk high
Detection risk low
Substantive analytical
More tests of details (better source of
procedures
evidence)
Fewer tests of details
External confirmation reliance
Internal confirmation reliance
Fewer substantive procedures More substantive procedures
Smaller sample size
Bigger sample size
At year-end and during year
At year-end (this takes more time but provides
better evidence)
General substantive procedures
Substantive analytical procedures
Tests of details on transactions
Tests of details on balances at yearend
BALANCE SHEET ITEM
YES
YES
YES
YES
TRANSACTIONS WHICH ARE TESTED
WWW.TAKINGNOTES.CO.ZA
f
INCOME STATEMENT ITEM
YES
YES
YES
NO
Nature of audit procedures
Depends on the purpose and relates to the type of procedures. Determined by:
1. Necessity of placing reliance on internal controls
x The controls are operating effectively or
x Substantive procedures alone cannot provide sufficient appropriate audit evidence
x TOC-based approach may be chosen because of:
o The nature of the business and the effect of IT on the audit
o Client dependence on a computerized system (some date may only be available in
electronic format)
o Tight audit deadline
o Complexity of the computerized system or a large volume of information processed
2. Possibility placing reliance on internal controls
x The system of internal control needs to be sufficiently strong to justify reliance
x Entity has to allow the auditor access to the system for sufficient periods in order for adequate testing
x Computerized environment – IT systems of client and auditor need to be compatible
3. Desirability of placing reliance on internal controls
x Cost-effectiveness
x Experts could be required which can be costly
Is
WWW.TAKINGNOTES.CO.ZA
Dual purpose audit procedures
x
Objectives and evidence obtained from TOC and SP differentiates the two. Eg: auditor reperforming
bank reconciliation:
TESTS OF CONTROLS
Objective is to verify that the bank reconciliation
has been properly performed
(daily/weekly/monthly) and signed as evidence of
review
SUBSTANTIVE PROCEDURES
Objective is to verify the YE bank balance by
obtaining substantive audit evidence that the bank
balance as included in the FS is free from material
misstatement
DIFFERENCES BETWEEN TESTS OF CONTROLS AND SUBSTANTIVE PROCEDURES
TESTS OF CONTROLS
SUBSTANTIVE PROCEDURES
Tests operating effectiveness of a control activity
Tests the correctness of the rand value of balances
or classes of transactions and whether disclosures
in the FS are free from material misstatement
Results justify assessed level of control risk
Results justify levels of detection risk being
achieved
The result will be a YES/NO answer. “is the control The result will always provide a measure of the
operating effectively – yes or no?” Does not enable rand value of misstatement that exists in an
the auditor to conclude on the rand value effect of
assertion relating to an account balance/class of
misstatements in the account balance/class of
transactions
transactions
The number of errors found does matter – rand
Number of misstatements does not matter – rand
value is irrelevant
values are relevant
Results of TOC have an impact on the related SP
Results of SP never have any impact on the
amount of TOC to be performed. TOC are always
performed prior to SP so that the level of control
risk can be established Æ then the level of
detection risk can be determined. The level of
detection risks drives the nature, timing and extent
of SP
One type of procedure: TOC
General substantive procedures, substantive
analytical procedures and substantive tests of
details
Timing of audit procedures
When the audit procedure is performed, or the period or date to which the audit evidence applies.
Determinants of the timing of audit procedures
x
x
Influenced by risk of material misstatements Æ higher risk, more likely that procedures will be
performed o or after YE
Influenced by practical factors:
o Involvement of other parties, such as internal auditors and experts
o Non-negotiable dates that the client has set (eg: inventory count)
o Tight reporting deadline
o Availability of audit and client staff
Interim substantive procedures
-
SP aim
ide di ec e ide ce ab
he e i
YE bala ce Æ testing at an interim date can
cause potential problems with the appropriateness of audit evidence gathered
To address this, roll-forward procedures have to be performed (compare YE account balance with
that at the interim date and then performing SP on the movement in the account balance)
WWW.TAKINGNOTES.CO.ZA
__
Consider the following factors:
x Objective of SP Æ more critical objective is, less likely that interim testing will be considered
x Assessed risk of material misstatement in the account Æ higher risk, more likely YE will be chosen
x Control environment and relevant controls Æ stronger control environment, more likely interim SP
x Nature of the class of transactions, account balance or disclosure and relevant assertion Æ more
material, less likely interim SP
x Availability of the information at a later date
x Ability of the auditor to reduce the risk that misstatements existing at YE are not detected
If material misstatements are identified when SP are performed at an interim date, the auditor may need to:
1. Revise the assessed risk of material misstatement for the account balance, class of transaction or
disclosure
2. Revise the planned SP for remainder of period
3. Perform additional SP at YE
Relying on audit evidence obtained in prior audits
x
x
x
x
Possible for the auditor to used evidence about the operating effectiveness of controls obtained in
prior year audits but only after establishing its continuing relevance (ie. that there has been no
change in the design of the control)
Cannot rely on prior year audit evidence for controls that address a significant risk
It is a matter of professional judgement of the auditor to decide whether to rely on evidence for
controls that have not changed and that do not mitigate a significant risk. Have to consider:
o Risk of material misstatement for the assertions affected by the control
o Effectiveness of the control environment
o Whether the control is automated or manual
Auditor required to test controls in at least every third audit, and some controls have to be tested in
every audit
Extent of audit procedures
Quantity of audit procedures Æ often refers to sample size (ISA 330)
x Extent of substantive tests of details increases as the risk of material misstatement increases
x Ways of selecting items for testing:
1. Selecting key or problem items
a. Audit judgement is used to select items that may include unusual items, high-value
items, items prone to higher risk or items in which errors were identified in previous
audits
2. Selecting all items over a certain rand amount
a. No conclusions can be drawn about the items not selected for testing, therefore the
auditor should also consider using audit sampling
Audit sampling
Application of audit procedures to less than 100% of items in a class of transactions, account balance or
disclosure. The auditor should then be able to draw a reasonable conclusion concerning the whole
population from which the sample is drawn (ISA 530).
x The population is the entire set of data
o The objective as well as the type of audit procedure is NB in identifying the population to be
used
ƒ Eg: objective is to test existence of accounts receivable, the population could be the
accounts receivable listing at YE
o If a population is not homogenous (ie. items in the population vary significantly), it may be
stratified by grouping similar items together in smaller subpopulations
ƒ Usually based on factors such as monetary value or nature and characteristics
ƒ Eg: debtors balance consists of several large debtors as well as many small
balances Æ two strata: high value accounts and low value accounts
WWW.TAKINGNOTES.CO.ZA
__
x
x
x
x
Sample sizes for substantive tests of details are directly affected by the level of detection risk
o Lower risk, greater sample size and vice versa
Auditor wants to draw a sample that is representative of the population to avoid bias and minimise
the risk of drawing erroneous conclusions
o When using sampling in performing substantive tests of details, the auditor is concerned with
the expected rand amount of error in the population tested
Sampling risk i he
ibili ha he a di
c cl i , ba ed
a am le, ma be diffe e
from the conclusion reached if the entire population were subjected to the same audit procedure
o For substantive tests of details, the auditor may erroneously conclude:
ƒ That a class of transactions is free from material misstatement when it does contain
material misstatements or vice versa
Methods used:
Statistical sampling
Random selection of a sample whereby all units
have the same chance of selection and probability
theory is used to evaluate sample results
Non-statistical sampling
Using judgemental reasoning, rather than
probability theory concepts, for the determination of
the sample size, the selection of the sample items,
and/or evaluating sample results
To determine which sampling method that should be used, auditor considers:
x When auditors suspect serious error or manipulation in a class of transactions or YE balance,
they will use their professional judgement to select a directed judgement sample as this will be
more effective in addressing the assessed risk of material misstatement Æ non-statistical
sampling
x In substantive tests of details, a statistical analysis and extrapolation of the projected error may
be considered a more appropriate method to use, owing to the difficulty in projecting rand
misstatements to the entire population Æ statistical sampling
x In tests of controls, identifying the nature and cause of errors may be more valuable than
statistically analysing the presence or absence of a particular control
Audit objectives
x
x
Auditor s objective with audit procedures is to gather sufficient appropriate evidence that each
assertion made by management is true (free from material misstatement)
“The auditor s objective is to test that …”
o Formulate the audit objective for a particular class of transactions, account balances or
disclosures so that it is directly derived from the applicable assertions
ƒ For example, “the auditor s objective is to test that … all purchases transactions
have been completely recorded in the accounting records and none have been
omitted” (completeness assertion)
x The auditor can achieve this objective and, in doing so, gather the necessary
audit evidence by performing
o Tests on the operating effectiveness of controls over the
completeness of purchases, but more evidence (substantive
procedures) will be required, and or
o Substantive procedures on the completeness of purchases
ƒ The remainder of the audit evidence required (combined audit
approach), or
ƒ All the audit evidence required (substantive approach)
WWW.TAKINGNOTES.CO.ZA
x
Audit objectives
ASSERTION
Occurrence
Completeness
Accuracy
Classification
Cut-off
Presentation
ASSERTION
Existence
Rights and
obligations
Completeness
Accuracy,
valuation and
allocation
Classification
Presentation
AUDIT OBJECTIVE
Ÿ To test that all transactions that have been recorded in the accounting
records actually took place
Ÿ To test that transactions that took place have been completely recorded in
the accounting records and none have been omitted
Ÿ To test that transactions have been recorded in the accounting records at
the correct amounts and on the basis of correct calculations
Ÿ To test that transactions have been appropriately classified in the accounting
records in accordance with their nature
Ÿ To test that transactions have been recorded in the accounting records in the
accounting period to which they pertain
Ÿ To test that all disclosures relating to the transactions that should have been
included in the FS are appropriately presented and described
Ÿ Financial and other information relating to is disclosed fairly and in the
appropriate accounts
AUDIT OBJECTIVE
Ÿ To test that all amounts included in the account balance at the end of the
year actually exist
Ÿ To test that the entity is the legal owner of all amounts included in the
account balance at the end of the year
Ÿ To test that all amounts have been accounted for at the end of the year and
nothing has been omitted
Ÿ To test that the account balance at the end of the year is correctly valued in
terms of IFRS requirements
Ÿ To test that the account balances have been recorded in the proper
accounts
Ÿ To test that all disclosures relating to the account balances that should have
been included in the FS are appropriately presented and described
Ÿ Financial and other information relating to is disclosed fairly and in the
appropriate accounts
WWW.TAKINGNOTES.CO.ZA
What is the difference between a control objective and an audit objective?
Specific considerations
Wages: Attendance of wage payout
(1) Before the payout
x Take custody of all the pay packets and obtain the week s payroll printout in order to compare and
agree the following:
o Payment details, such as the names of employees and wage amounts
o The total number of pay packets into which wages have been placed
x Select a sample of employees from the payroll for the week and:
o Compare and agree the details recorded on the payroll to the relevant employee details as
recorded in the employee masterfile
o Inspect the employee s personnel records, such as their employment contract, UIF, medical
aid and union details, to confirm their actual existence, and
o Inspect evidence that authorised clock cards, or employee ID cards that operate
electronically, exist for the employee s selected
x Select a sample of pay packets, open them, count the money in them, agree the amount with the
employee payslips and the week s payroll printout and reseal the packets.
(2) During the payout
x
x
Observe the identification of each employee
Verify that the following occurs as the paymaster distributes the wages:
o Positive identification of each wage earner is inspected, and/or
o The use of biometric fingerprint authentication is used and appears to be operating
effectively
(3) After the payout
x
Observe whether pay packets that were not collected (i.e. unclaimed wages) are appropriately
recorded on the payroll and in an unclaimed wage register
WWW.TAKINGNOTES.CO.ZA
__
x
x
x
x
x
Observe the unclaimed pay packets being delivered to the entity s cashier
Inspect the unclaimed wages register for the period since the last payout for evidence of proof of
collection during the period
Identify whether any employee names appear regularly in the unclaimed wage register, and if so
inspect employee personnel records to investigate and confirm their existence in order to identify
possible fictitious employees
Confirm that unclaimed wages are banked within a reasonable period of time, by inspection of the
necessary entries in the unclaimed wages register, bank deposit slips and bank statements,
Inspect the signature of the persons responsible for paying out the wages on the payroll printout.
Bank and Cash
(1) Surprise cash counts
x All cash must be counted by staff simultaneously
x Cash count should be performed in the presence of the cashier
x Compare actual amounts to theoretical amounts per supporting documentation
(2) Interbank transfer schedule
x This shows the details of transfers between accounts around year end
x Investigate the transfer schedule to ensure that all transfers out of an account are matched by
transfers into an account in the same year and that the transaction was timeously recorded
(3) Bank reconciliations
x Obtain external confirmation of bank account balances
x Inspect evidence that the reconciliation has been reviewed by management and any reconciling
items have been investigated
x Investigate reasons for long outstanding items
x
x
x
x
x
x
x
x
Agree bank statement balance on the reconciliation to the bank statement and the GL balance on
the reconciliation with the bank account in the general ledger
Reperform castings and calculations
Review reconciling items for logic and reasonableness
Review subsequent reconciliations to verify that reconciling items have since been resolved
If reconciling items are significant, inspect supporting documentations (EFT payment documentation
and proof of deposits)
Ensure errors or omissions identified in reconciliation that relate to accounting records have been
corrected
Obtain cut-off bank statement (bank statement for 7-10 days after YE) in order to test reconciling
items in reconciliation and clearing of these items
Extend audit procedures to examine reconciling items in prior months reconciliations and compare
to current month
o Identify long-outstanding and suspicious items
BANK RECONCILIATION
COMPANY S NAME AT 31 DECEMBER 2011
Closing balance as per cash book – 31/12/11
Add: Outstanding payments (C)
Cheques
Chq 564
Chq 581
EFTs
30/12
31/12
Less: Outstanding Deposits (D)
Balance as per Bank Statement – 31/12/11
WWW.TAKINGNOTES.CO.ZA
R
11,367
3,150
(5,230)
9,287
Inventory - Attendance of inventory counts:
(1) Before the count
x Obtain and evaluate management s instructions, are they adequately designed?
o Have competent staff been assigned?
o Are the staff in teams of two or more people?
o Is there sufficient control over stationery?
o Are there procedures in place for marking of counted items?
x Understand the area, observe the area if possible, noting how inventory is packed and identifying
items that may be difficult/impractical to count Æ discuss alternative arrangements with
management
(2) During count
x Observe and evaluate the following count procedures to ensure that they are performed properly
and in accordance with management s instructions:
o There is a correct issue of count sheets, signing of the teams and supervisors and recording
thereof in the register
o Counters count in teams of two, one person counts and one records
o There is appropriate supervision and control, all changes are authorised and the
supervisor s signature appears next to each change
o There is control over completed count sheets, and there are count and recount procedures
in place
o There are controls over cut-off and movement of inventory
o All inventory items that are counted are then marked
x Perform test counts to corroborate effectiveness of controls:
o Trace a sample of items from the count records to floor and vice versa
x Look out for slow-moving items or obsolete/damaged items
(3) After count
x Obtain copies of count records, and avoid alteration thereof
o Perform subsequent procedures: ensure that the final inventory records reflect the correct
amounts counted
x Document observations made during the count and report weaknesses to management
(4) Other considerations
x If there is inventory held in multiple locations:
o Audit strategy may state that it is necessary to visit other locations to perform counts, or
other auditors must be appointed to attend these counts
x If the auditor cannot attend the count:
o If it is impractical to do so, alternative procedures should be in place to verify existence and
valuation of inventory
ƒ Verify the sale of material inventory items
o If other procedures are not possible or do not provide sufficient appropriate evidence,
consider the effect of this limitation on the audit report
Creditors reconciliations:
(1) General audit procedures
x Compare and inspect reconciling items of this month to that of the previous and following months to
determine whether the items are repetitive in nature
x Agree creditors GL balance on the creditor s reconciliation to the creditors account in the GL
x Agree outstanding creditors balance on the reconciliation to the statement received from the creditor
x Recalculate the reconciliation (cast and extension)
x Obtain a management written representation confirming the reconciliations are accurate and
complete
(2) If there is a debit balance per the GL
x Test for unrecorded purchase invoices and cut-off errors
WWW.TAKINGNOTES.CO.ZA
x
x
x
Inspect creditor s account for unusual entries/causes of the debit balance
Inspect the financial statements to determine whether this balance is classified as a debtor (as
required by IFRS)
With the client s consent, obtain direct confirmation about the debit balance from the supplier
o If this is not possible, enquire from the supplier about the validity of the reconciling items that
make up the debit balance
(3) If there are payments made that do not appear on the statement
x Agree the payment with:
o Deduction on the bank statement or cashed cheque
o Subsequent creditor s statement or receipt
x Inspect the creditor s statement and verify that the payment is not present
x Inspect the creditor s GL account and verify that the payment is present
(4) If there are goods returned that do not appear on the statement
x Agree the amount of the credit entry to:
o Subsequent month s statement received from creditor
o Journal entry, as a deduction or credit against the inventory account
o Debit notes
x Inspect return documentation: goods returned note or credit note
o Ensure that the note has issued before year end and it has been singed
x Inspect the creditor s statement and verify that the goods are not present
x Inspect the creditor s GL account and verify that the goods returned are present
(5) Goods not received
x Inspect the subsequent statement and confirm the adjustment
x Obtain proof of delivery from the creditor
x Inspect GRN and confirm that a GRN is not made out for these goods
x Enquire from store personnel whether the inventory had arrived
x Inspect the creditor s GL account and verify that the goods are not included
(6) Goods received but no invoice received, therefore no recording
x Agree description and amount to the GRN or delivery note
x Inspect the outstanding invoice (if received) to confirm amount agrees with statement
x Inspect the following month s reconciliation to determine that the amount is no longer a reconciling
item
x Inspect inventory (or sales records if sold) to confirm that goods have been received
x Inspect the GL to confirm that provision has been made for the receipt of goods
x Inspect the creditor s statement to confirm the invoice is present
x Inspect the creditor s GL account to confirm that the goods are not present
WWW.TAKINGNOTES.CO.ZA
Substantive procedures
1. Objective (assertion)
2. Tool (documentation)
3. Action (audit procedure)
STEP 1
Identify applicable classes of transactions, account balances
STEP 2
Identify the relevant documents
STEP 3
Formulate audit objectives directly derived from assertions
Audit procedures to be used
STEP 4
x
x
x
x
x
x
Inspection
Examining records or documents
Observation cannot serve as a substantive procedure as it cannot
provide audit evidence about an amount or disclosure
External Confirmation
Audit evidence obtained by the auditor as a direct written response to the
auditor from a third party
Recalculation
Checking the mathematical accuracy only of documents already recorded
or records
Reperformance
Auditor s independent execution
Inquiry
Seeking information of knowledgeable persons
Select the type of procedure to be performed
STEP 5
1. General procedures
These are substantive procedures that are performed on every audit in so
far as they are applicable
2. Detail tests of transactions
These consist of inspection, external confirmation, recalculation,
reperformance and inquiry
3. Detail tests of balances
These consist of inspection, external confirmation, recalculation,
reperformance and inquiry
4. Analytical procedures
These involve evaluations of financial information through analysis of
plausible relationships among both financial and non-financial data
e
WWW.TAKINGNOTES.CO.ZA
1. General substantive procedures, are the following
1. Obtain a schedule, and recalculate it
2. Agreeing opening balances for the accounts in the SFP with the prior year s audited annual
financial statements and auditing working papers
Also inspecting the notes to the prior year s financial statements for the accounting policies
used to derive the opening balances, and comparing this to the corresponding current year s
accounting policies
3. Agreeing closing balances of
x General ledger accounts with the trial balance and then with the financial
statements;
x Closing balances of general ledger accounts with underlying records
o These underlying records include subledgers
(casting, cross-casting and recalculating the underlying records)
ƒ Casting Ÿ Adding up a column of figures
ƒ Cross-casting Ÿ Adding up the totals of a number of columns to see
whether the total agrees with the grand total
x For example, adding the totals of each column in the debtors
age analysis, to see whether the totals agree with the total
amount owing by debtors
x Other general ledger accounts they could include schedules, analyses and
calculations prepared by management
4. Examining general ledger accounts for unusual or suspicious transactions (duplicated
transactions, negative amounts, journal entries processed very close to year-end) and
transactions that fall outside the normal course of business and may therefore be indicative of
fraud
5. Obtaining a written representation letter from management
6. Evaluating all disclosures in the annual financial statements in terms of accounting
standards, IFRS and other relevant legislation
x Reviewing accounting policies in order to verify appropriateness, in accordance with
IFRS and legislation as well as consistent with prior year
2 & 3. Substantive test of details, has the objective of obtaining audit evidence to support the amount or
disclosure that makes up a particular amount or disclosure in the financial statements
1. Inspection of relevant source documents or physical assets
2. Reperformance whereby the auditor repeats the exact same procedure as that previously
performed by the entity s staff or computer system
x Key objective is to verify that the amounts and classifications included in the
financial statements are free from material misstatement
3. External confirmation by obtaining direct written confirmation from external (third) parties
4. Recalculation by verifying mathematical accuracy of source documents and accounting
records is correct
5. Enquiry through discussions with internal parties and external parties related to the entity
t
WWW.TAKINGNOTES.CO.ZA
TO BE PERFORMED FOR EACH OF THE CLASSES OF TRANSACTIONS
Ÿ Verified by selecting from accounting records to source documents, and when
inspecting these source documents, verifying they relate to the entity
Occurrence
o By doing so, detect any transactions that are not valid (for which a valid
source document does not exist) and thus been invalidly recorded in the
accounting records, resulting in the class of transactions being overstated
Ÿ Verified by selecting from source documents (such as invoices, sales contracts
and agreements of loans provided) to the accounting records
Completeness
o By doing so, detect any documents that have not been recorded
Accuracy
Cut-off
Ÿ Verified by verifying that correct data (such as quantities, prices) has been used
and that calculations have been performed correctly
o Verify the amounts in the underlying source documents and the correctness
of underlying calculations
Ÿ Verified by selecting transactions around year-end (just before and after) from the
accounting records and tracing them to the source documents
Ÿ And also, from source documents to the accounting records, verifying that the
transactions are recorded in the correct period based on the dates of the
documentation inspected
o Inspect documentation for dates
TO BE PERFORMED ON THE BALANCE OF THE ACCOUNT AT YEAR-END
x Whether all the assets and liabilities recorded are valid and thus exist
x Selecting balances from the accounting records and agreeing the balance to
source documents, third parties or by physical inspection
Existence
o By doing so, the auditor will detect any asset or liability recorded in the
entity s records that is invalid (does not exist) and thus resulted in an
overstatement of assets
x Verified by confirming that the entity is the legal owner of the assets and is obliged
to settle the liabilities recorded
o Reviewing documents (title deeds, contracts) for assets owned by the entity
o Enquiry of third parties and obtaining third party external confirmations
from banks (e.g. for bank account balances), the entity s lawyers
o Reviewing minutes of meetings of the entity for any possible discussions
Rights and
and decisions with regard to the entity not remaining the legal owner of any
obligations
assets or not being liable for any of its liabilities
o Review the terms, conditions and other information in contracts
ƒ By doing so, verifies that the entity has the legal right to recorded
assets (or obligation for recorded liabilities), thus detecting any
account balances that have been incorrectly recorded in the
accounting records and have thus resulted in the balance being
overstated (assets) or understated (liabilities)
x Verified by auditing from source documents (such as invoices, banks statements,
minutes of meetings, third party confirmations) to the accounting records, in order
Completeness
to test for an understatement
o By doing so, detect any amounts that have not been recorded
x Detailed testing of management s valuation or valuation methods to gain an
Accuracy,
understanding thereof, and evaluate the calculation for reasonableness based on
valuation and
any assumptions applied
allocation
o Consider the possible use of an expert to review the reasonableness of the
valuation or the valuation methods
WWW.TAKINGNOTES.CO.ZA
4. Substantive analytical procedures, are the following
x
Compare and inspect the following for:
o
o
o
x
x
x
Reconcile data used in ratios with the general ledger
Develop an expectation about the account using knowledge of the business
Inspect the results on the analytical procedures, data and general ledger accounts for
unusual items
o
x
Current year;
Budget;
Previous year(s)
And investigate and confirm significant deviations in management
Substantive analytical procedures are performed if:
x Control risk for the audit is provisionally evaluated as low, which means that the
provisional evaluation of the internal control design appears to be appropriate.
x You will place reliance on the internal control system.
x If the inherent risk can be evaluated as low it means that you will be willing to accept a
higher level of detection risk in order to get audit risk to an acceptable level.
x Therefore a system based audit strategy will be followed.
x Consequently extensive tests of control will be performed.
x Few detail tests will be performed,
to
WWW.TAKINGNOTES.CO.ZA
Substantive procedures
Debtors
Opening balance
Credit sales
Debtors
Bank (customer receipts)
Sales returns
Discount allowed
Bad debts
Allowance for credit losses
Closing balance
General substantive procedures
x
x
x
x
x
Agreeing opening balances with the prior year s audited financial statements and audit working
papers
o (SP) Opening balance in the general ledger account is always compared to the prior year s
financial statements and the audit working papers
Agreeing closing balances of general ledger accounts with the trial balance and then with the
financial statements
o (SP) Agreeing closing balances of the
ƒ Total of outstanding debtors' balances per the age analysis; to the debtors ledger
ƒ Total of the balances in the debtors ledger; to general ledger
ƒ Debtors control account balance in the ledger to the trial balance and then to the
financial statements
Examining general ledger accounts for unusual or suspicious transactions
Obtaining a written representation from management
o (SP) Regarding the existence of debtors
o (SP) Regarding the reasonableness of the disclosed debtors figure and that it has not been
overstated, therefore, valued correctly
Evaluating all disclosures in terms of accounting standards, IFRS and other relevant legislation
o (SP) Reviewing accounting policies in order to verify appropriateness, in accordance with
IFRS and legislation as well as consistent with prior year
ƒ It is disclosed as a current asset
ƒ That the amount of bad debts has been deducted from debtors
Substantive analytical procedures
x
x
x
x
x
x
Compare and inspect the following for:
o Current year
o Budget
o Previous year
ƒ Debtors balance
ƒ Debtors payment term
ƒ Current ratio
ƒ Outstanding balances
ƒ Quick-asset ratio
Calculate the total outstanding per the different terms (30 days, 60 days)
o Calculate it as % of the debtors figure and
o Calculate it as % of sales for the relevant month
And compare and inspect with previous year, budget and company policy
Compare and inspect the total outstanding per category with the previous year
Follow up any significant deviations through queries to management and further audit procedures
Compare and inspect list of debtors with that of previous year to determine whether any are missing
or have been added wrongly
WWW.TAKINGNOTES.CO.ZA
0
Test of details to be performed on each class of transactions
x
x
x
x
x
x
x
x
x
Select a sample of order forms and particularly take note of abnormalities
Test the selected orders above as follows:
o Inspect for the signature of the client and credit controller
o Compare and inspect details with
ƒ DN
ƒ Dispatch documentation (registered postal slip)
ƒ Invoice of which the details are checked as follows
x Price lists and catalogues
x Summations and calculations and
x Entry in debtors ledger and sales journal
Select a sample of credit notes and take note of abnormalities
Test and inspect the credit notes against
o Debit notes or correspondence (also checked like invoices)
o Original invoices
o Entry in SRJ an debtor s ledger
Select a sample of payments received
Inspect details against
o Bank stamped deposit slip for
ƒ Drawer, amount and date
ƒ Entries on the bank statement
ƒ Entry in the cash book and debtors ledger
Reperform number sequence of the following
o Invoices entered in the sales journal
o Credit notes entered in SRJ
Inspect the following suspense files for long outstanding items
o Orders awaiting a DN
o DN awaiting invoices
ƒ And obtain explanations for all long-outstanding items
Cut-off procedures:
o Obtain last DN numbers from inventory records and check that no later document numbers
have been entered in the records for the year
o Select a number of DN around YE and trace to relevant documentation Æ verify been
recorded in correct period
Tests of details to be performed on account balances at year end
x
x
Inspect the reconciliation between the debtor s ledger total and debtors control account balance
All significant reconciling items must be followed up through enquiries and obtaining supporting
evidence
x Obtain the age analysis and select sample of debtors accounts
Circular startso Forward a debtors circular to each debtor. Ensure that the sample is representative and
includes the following:
ƒ High-worth accounts
ƒ Credit balances
ƒ Nil balances
ƒ Normal accounts (more high-worth than low-worth)
o High risk items must be circulated positively – off-shore accounts, balances > 1m and
debtors more than 90 days outstanding
o Select a sample from the remaining categories of debtors and circulate these accounts –
either positive or negative according to judgement
o Examine differences brought to your attention by the returned debtors circulars as follows:
ƒ Unacknowledged invoices with OF, DN, dispatch documentation
WWW.TAKINGNOTES.CO.ZA
x
x
ƒ Unacknowledged returns with credit notes
ƒ Any other differences through discussion with management
o Follow up debtors who have not reacted to the circular as follows:
ƒ Determine whether debtors have not directed their responses to the client by
mistake
ƒ Address a second circular to the debtors by registered post and request confirmation
of balances
ƒ Telephone, with the client s permission, the debtors and
x Request confirmation of the balances
x Perform tests of detail on the unpaid invoices
x Test the summation of the account
ƒ If the debtor still fails to react, or if the alternative procedures do not give sufficient
assurance, consider the unsuccessful answers in the sample result
x If an unsatisfactory result is obtained, the tests on debtors will be expanded
Contact, with the client s permission, the company s legal representatives and enquire about any
legal actions instituted against the debtors
Review the debtor s creditworthiness documents to obtain assurance of their creditworthiness and
ensure that the credit terms have not been exceeded
WWW.TAKINGNOTES.CO.ZA
Accounting Estimates and Presentation (allowance for credit losses or provisions)
General substantive procedures
x
x
x
x
x
x
Enquire from management whether the same procedures and assumptions for the provisions of
doubtful debts were used as in previous years and investigate changes
Evaluate reasonableness of management s estimates by comparing previous years estimates with
actual bad debts written off in subsequent years
Determine whether the data used in the estimate is reasonable and accurate by performing the
following on the age analysis:
o Test the mathematical accuracy horizontally and vertically
o Agree the total on the age analysis and the provisions calculation with the ledger balance
and the annual FS
o Test the ageing of a number of amounts, as shown in the analysis by tracing them to the
supporting documentation
Obtain a management representation regarding the reasonableness of the provision for doubtful
debts and that the debtors have been valued correctly
Scrutinize the provision for doubtful debts account in the ledger for any unusual entries that must
be followed up with queries to management
Determine through reading the minutes of the board and management meetings whether any of the
long-outstanding debtors have been liquidated
Tests of details to be performed on balances at year end use the explanation in one notes
x
x
x
Determine by means of the necessary routine investigations whether any of the long-outstanding
debtors have perhaps not been liquidated
Perform the following tests with regard to the collectability of long-outstanding debtors (by drawing
a sample)
o Follow up the posting register entries after YE with the payment advices and debtors
account to determine whether the accounts have not been settled after YE
o Inspect the posting register entries and compare to deposit slips to determine whether
cash rolling took place
o Inspect the correspondence with debtors according to their correspondence files to detect
problems with collectability
o Discuss the problem cases with the credit controller and enquire specifically about legal
action taken, suspension of credit facilities and the existence of possible disputes
o Examine the accounts and be alert to indications of non-collectability
ƒ Debtors who pay off lump sums on their accounts
ƒ Long-outstanding invoices
ƒ Payment of later invoices while earlier ones are outstanding
o Review payments received after YE against the debtors ledger accounts and the schedule
o Examine any debtors who have been handed over to the attorneys
Review the calculation of provision for bad debts by referring to the following
o The investigations mentioned above
o The debtors age analysis
o The basis on which it was done the previous year
o Post SFP events such as the sequestration or liquidation of a debtor
o Discussions with management
WWW.TAKINGNOTES.CO.ZA
Fixed assets
Fixed Assets
Disposals
Closing balance
Opening balance
Additions
Closing balance
Accumulated Depreciation
Opening balance
Depreciation
General substantive procedures
Fixed assets
x
x
x
x
x
Agreeing opening balances with the prior year s audited financial statements and audit working
papers
o (SP) Agree the opening balance with the previous year s financial statements or working
papers
Agreeing closing balances of general ledger accounts with the trial balance and then with the
financial statements
o (SP) Agree the totals of the cost price, accumulated depreciation, depreciation (expense)
and book value column as per the fixed asset register with the trial balance, general ledger
and the financial statements
o (SP) Cast and cross cast all calculations of the general ledger, fixed assets register and the
financial statements
Examining general ledger accounts for unusual or suspicious transactions
Obtaining a written representation from management
o (SP) Relating to the existence, valuation and presentation of property, plant and equipment
Evaluating all disclosures in terms of accounting standards, IFRS and other relevant legislation
o (SP) Reviewing accounting policies in order to verify appropriateness, in accordance with
IFRS and legislation as well as consistent with prior year
Depreciation
x
x
x
x
x
Agreeing opening balances with the prior year s audited financial statements and audit working
papers
o (SP) From the statement of comprehensive income, therefore there is no opening balance
Agreeing closing balances of general ledger accounts with the trial balance and then with the
financial statements
o (SP) Agree the depreciation per class asset with the general ledger, trial balance and
financial statements
Examining general ledger accounts for unusual or suspicious transactions
o (SP) Investigate deprecation account for any unusual entries and follow up with
management
Obtaining a written representation from management
o (SP) Acquire a management representation regarding the accuracy and reasonability of the
depreciation expense
Evaluating all disclosures in terms of accounting standards, IFRS and other relevant legislation
o (SP) Reviewing accounting policies in order to verify appropriateness, in accordance with
IFRS and legislation as well as consistent with prior year
Substantive analytical procedures
x
x
Develop expectations regarding fixed assets and depreciation based on knowledge of the client s
business, experience of previous audits, etcetera.
Compare the data used to calculate the ratio below with the financial information system.
WWW.TAKINGNOTES.CO.ZA
x
x
Calculate each of ratios below and investigated ANY significant variances/fluctuations to obtain
acceptable representations
o Calculate the ratio of each class asset s depreciation expense as % of the total expense
o Calculate the ratio of the depreciation expense, per class asset, as % of the class asset's
total cost price.
Inspect/evaluate the results of the ratio analysis as set out above and acquire reasons and
corresponding explanatory documentation to confirm any unusual variances.
Test of details to be performed on each class of transactions
x
Depreciation
o Confirm, through enquiry, that the depreciation policy applied is consistent with prior years
o Investigate the reasonability of any residual values used in the calculation of depreciation by
comparing it with recent sale prices
o Establish if the depreciation rates used are reasonable through
ƒ Discussions with management
ƒ Considering the useful life of equipment
ƒ Comparing it to industry norms
o Examine the previous year s working papers and financial statement to confirm the
depreciation policy
o Examine the client s fixed assets register and confirm that this policy was applied during the
current year
o Select a sample of individual assets, recalculate the current year s depreciation expenses
and agree it with the fixed assets register
ƒ Follow any differences up through enquiry with management
o Obtain a sample of depreciation from the fixed assets register and re-calculate such an
amount to determine the accuracy thereof
x
Improvements
o Follow the improvements from the fixed asset register through to the capital budget, minutes
of board of directors for audit evidence of authorisation of the purchase
o Physically inspect the improvements and cross reference to the descriptions in the contacts
or purchase documentation
o Inspect the purchase documentation (invoice, contract) to confirm that it has been made out
to the client for the selected improvements and has been signed
o Inspect bank statement and confirm that payment has been made for the improvements
o For the improvements, inspect the cost schedules or correspondence and recalculate cost
calculations to ensure correct treatment of
ƒ Accurate cost price of material
ƒ Accurate transport cost and insurance
o Discuss the reasonableness of any other expenses included with the financial director
o Inspect the dates on all documentation e.g. invoice to confirm that the transaction has been
recorded in the correct accounting period (cut-off)
o Follow the entries through from the source documents to the general ledger and fixed-asset
register to confirm that the transaction has been recorded in the correct accounts and is
complete
o Inspect the ledger or the fixed asset register and confirm that no depreciation was written off
on improvements
o Inspect the fixed asset register to confirm that the improvements were divided in
components according to IAS 16
o By inspection of the purchase documentation and the general ledger account, ensure that
the VAT has not been included in the cost
o Acquire a schedule e.g. the fixed asset register containing all the assets, improvements,
acquisitions and disposals, and recalculate the register and confirm with the general ledger
(general)
o Acquire a management representation letter that confirms that the improvements are not
overstated and therefore have been accurately measured and valuated (general)
o Inspect the asset account or improvements for unusual entries and examine these items
(general)
WWW.TAKINGNOTES.CO.ZA
o
Scrutinise the repair work account for any items which may need to be capitalised
Test of details to be performed on account balances at year-end
x
x
x
x
x
x
Select balances from the accounting records and agree them to source documents or physical
inspection
o Select a sample of assets from the fixed asset register and vouch it to the physical asset
Review documents (title deeds, contracts) and confirm all details
Obtain external confirmation of assets from banks (if used as a security)
Review minutes of meetings to confirm that the entity is the legal owner of the asset (perhaps the
entity is no longer the legal owner)
Select items from the floor and trace them to the fixed asset register
Test management s valuations of the assets or valuation methods and evaluate the calculation for
reasonableness
o Consider the use of an expert to review the valuation
o During inspection of assets, confirm that the value according to the register is reasonable
ƒ Inspect for any indications of damages
WWW.TAKINGNOTES.CO.ZA
Creditors
Payments
Returns
Discounts
Closing balance
Creditors
Opening balance
Purchases
General substantive procedures
x
x
x
x
x
x
Obtain a creditors schedule and recalculate the schedule
Agreeing opening balances with the prior year s audited financial statements and audit working
papers
o (SP) Agree the opening balance with the previous year s financial statements or working
papers
Agreeing closing balances of general ledger accounts with the trial balance and then with the
financial statements
o (SP) Compare the following
ƒ Total of the list of creditors' balances
ƒ Balance of the creditors' control account
ƒ Creditors amount taken up in the financial statements and accompanying schedules
Examining general ledger accounts for unusual or suspicious transactions
o (SP) Scrutinise the creditors' ledger and creditors' control account for strange entries and
test them against valid documentation
Obtaining a written representation from management
o (SP) Obtain a management representation with regard to the completeness of creditors and
that the disclosure of creditors in the financial statements is appropriate
Evaluating all disclosures in terms of accounting standards, IFRS and other relevant legislation
o (SP) Reviewing accounting policies in order to verify appropriateness, in accordance with
IFRS and legislation as well as consistent with prior year
o (SP) Review the disclosure of creditors in the financial statements and ensure that
ƒ It is disclosed as a current liability
ƒ A note is made of all contingent liabilities
ƒ Debit balances under creditors have been carried forward to current assets
Substantive analytical procedures
Sub analytical procedures for creditors in One Note
Accrued expenses
x
x
x
x
Develop an expectation regarding the expenses with reference to the prior year, budgeted figures,
industry norm as well as knowledge obtained from the operations during the financial year under
review
Compare the following with the prior years figures, expectations (budgets)
o Accrued expenses balance (per annum or per month);
o Accrued expenses as % of creditors;
o Accrued expenses against actual expenses in the following financial year;
Obtain explanations and supporting documentation for any significant fluctuations
Compare the expenses figures with the budget where the actual amount is significantly lower than
the budgeted figures
Tests of details on transactions
Accrued expenses
x
Perform the following procedures to identify any possible omitted expenses for which provisions
are still to be made:
o Inspect the list of accrued expenses and enquire from management and staff about any
other expenses for which provision should be made
WWW.TAKINGNOTES.CO.ZA
o
o
o
o
o
o
o
Compare and inspect the schedule with that of the previous years for any items appearing
on the previous year s list but not on the current year s
Select a sample of accrued expenses from supporting documentation and trace to ledger
Inspect the expense account for any missing expenses to confirm that 12 entries have been
made for monthly expenses
Inspect all long-term contracts to ensure that a provision has been made where appropriate
Inspect the YE reconciliations from the creditors ledger to the monthly statements for any
reconciling items that indicate invoices for which provision has yet to be made
Inspect the suspense file for expenses incurred for which the invoice has not been received
and for which provision has not been made
Confirm the reasonableness of provisions by inspecting the cash book or bank statement for
payments made during the first two weeks of the month following and trace these to the
supporting documentation
Test of details on balances at year end
Creditors
x
x
Verify that the entity is legally obliged to settle liabilities by:
o External confirmation
o Review of minutes of directors meetings (perhaps something was disclosed about the entity
not being liable)
o Review of contracts
Test for understatement:
o Select a sample of creditors accounts in the GL and compare to monthly statement
o Compare current year s creditor list with prior years to detect if any are missing
o Draw a sample of order forms/goods received notes and test as follows:
ƒ Follow through and compare details with goods received notes, delivery notes and
invoices
ƒ Verify the transaction has been accurately recorded in the purchase journal and
creditors ledger
ƒ Verify that the transaction has been accurately transferred from the purchase journal
to the creditors GL account
o Draw a sample of payments and follow through to the cash payments journal, creditor s
ledger and creditors GL account
o Check the number sequence of entries in the purchase journal to test for
omissions/duplications
o Check the following suspense files for long-awaiting items:
ƒ Order form awaiting a goods received note
ƒ Goods received note awaiting an invoice
Obtain explanations for long-outstanding items
o Inspect the cash book and bank statement after year end and test any large items, could be
relevant to transactions before year end and maybe should be included in creditors
o Inspect the debtor s ledger for debtors with credit balances, ensure they are included in
creditors
o Select a sample of delivery notes and inspect validity
WWW.TAKINGNOTES.CO.ZA
Income
General substantive procedures
x
x
x
x
x
Agreeing opening balances with the prior year s audited financial statements and audit working
papers
o (SP) From the statement of comprehensive income, therefore there is no opening balance
Agreeing closing balances of general ledger accounts with the trial balance and then with the
financial statements
o (SP) From the statement of comprehensive income, therefore there is no closing balance,
however, agree closing total of general ledger to the trial balance and then to the financial
statements
Examining general ledger accounts for unusual or suspicious transactions
Obtaining a written representation from management
o (SP) In respect of al assertions applicable to income, mainly completeness and accuracy
Evaluating all disclosures in terms of accounting standards, IFRS and other relevant legislation
o (SP) Reviewing accounting policies in order to verify appropriateness, in accordance with
IFRS and legislation as well as consistent with prior year, of income
Substantive analytical procedures
x
x
x
x
Develop an expectation for the income received based on your current knowledge of business,
industry, etc.
Compare the sales data used to calculate the ratio with the financial information system.
Calculate the following ratios and compare with the previous year's bonuses (previous year s working
papers), budgeted income figure, month-to-month income:
o Income as % of total income;
o Total income;
Inspect/evaluate the results of the ratio analysis as set out above and acquire reasons and
corresponding documentation to confirm any unusual variances
Test of details to be performed on each class of transactions
x
x
Select a sample of transactions on the schedule for income received and:
o Follow the transactions to the contract (if applicable) and confirm details
o Recalculate the income in terms of the contract/approved selling price list and agree with the
schedule
o Confirm the income is correctly classified as income
o Inspect the date of the invoice to see whether the transaction was accounted for in the
correct period
o Inspect the bank statement for receipt of the total income amount
Select a sample of invoices before and after year end and follow through to the general ledger to
ensure that the transaction is recorded in the correct period
Occurrence
Completeness
Accuracy
Cut-off
Ÿ Verified by selecting from accounting records to source
documents, and when inspecting these source documents,
verifying they relate to the entity
Ÿ Verified by selecting from source documents (such as invoices,
sales contracts) to the accounting records
Ÿ Verified by verifying that correct data (such as quantities, prices)
has been used and that calculations have been performed correctly
Ÿ Verified by selecting transactions around year-end (just before and
after) from the accounting records and tracing them to the
source documents
Ÿ And also, from source documents to the accounting records,
verifying that the transactions are recorded in the correct period
based on the dates of the documentation inspected
o (SP) Inspect documentation for dates
tee
WWW.TAKINGNOTES.CO.ZA
Expenses
General substantive procedures
x
x
x
x
x
Agreeing opening balances with the prior year s audited financial statements and audit working
papers
o (SP) From the statement of comprehensive income, therefore there is no opening balance
Agreeing closing balances of general ledger accounts with the trial balance and then with the
financial statements
o (SP) From the statement of comprehensive income, therefore there is no closing balance,
however, agree closing total of general ledger to the trial balance and then to the financial
statements
Examining general ledger accounts for unusual or suspicious transactions
Obtaining a written representation from management
o (SP) In respect of al assertions applicable to expenses, mainly completeness and accuracy
Evaluating all disclosures in terms of accounting standards, IFRS and other relevant legislation
o (SP) Reviewing accounting policies in order to verify appropriateness, in accordance with
IFRS and legislation as well as consistent with prior year, of expenses
Substantive analytical procedures
x
x
x
x
Develop an expectation for the expense based on your current knowledge of the business, sales
contract etc.
Compare the sales data used to calculate the ratios with the financial information system.
Calculate the following ratios and compare it with the prior year s expenses (prior years workpapers),
budgeted expenses figure, month-on-month expenses:
o Gross and net profit percentage;
o Total expenses;
Inspect/evaluate the results of the ratio analysis above and obtain reasons and underlying
documentation which corroborate any unusual fluctuations.
Test of details to be performed on each class of transactions
Wages
x
x
x
Select a number of employees from the salary journal and perform the following:
o Inspect that each employee has an appointment letter in their personnel file which is signed
o Inspect the personnel file and confirm that there are no letter of resignation or dismissal
o Physically inspect the employee and identity number to confirm existence
o Compare and inspect the gross salary per the salary journal with letter of appointment or
authorised salary increase letter
o Recalculate the income tax deducted according to the tables from SARS
o Compare and inspect amounts of medical aid contribution with tariffs
o Compare and inspect deductions – pensions and UIF – with personnel file and ensure they
meet the statutory requirements
o Recalculate the net salary payable and compare with the salary journal
o Compare and inspect the net amount on the salary journal per employee with the net
amount on the list sent to the bank
Select a number of personnel files for (1) new appointments, (2) dismissals or resignations and
(3) existing employees, and perform the following:
o Resignations/dismissals: ensure persons with these letters are removed from the salary
journal
o Appointments: ensure persons with these letters are added to the salary journal and that
they exist on the system
Select a fe months transactions from the salary journal and perform the following:
o Test casting and cross casting of the salary journal
o Follow a gross amount from the salary journal to the salary account in the GL
o Compare and inspect the total of net payment column in the salary journal with the signed
list of net payments set to the bank
WWW.TAKINGNOTES.CO.ZA
Inventory
Purchasing inventory
Opening balance
Purchases (creditors)
Costs
Manufacturing inventory
Inventory
Sales (debtors)
Provision for obsolete inventory
Closing balance
General substantive procedures
Inventory
x
x
x
x
x
Agreeing opening balances with the prior year s audited annual financial statements and audit
working papers
o (SP) Confirm, through investigation, that the opening balance of the inventory general ledger
account agrees with prior year s audited annual financial statements and audit working
papers
o (SP) Compare and inspect the provision for obsolete inventory with that of the previous year
Agreeing closing balances of the underlying records with the general ledger accounts and figures
with the trial balance and then with the financial statements
o (SP) Compare and inspect the total of the inventory listing with
ƒ The inventory balance per the general ledger account, and
ƒ Figures per the trial balance and the financial statements
Examining general ledger accounts for unusual or suspicious transactions
o (SP) Scrutinise the inventory general ledger account for any unusual or suspicious
transactions that may affect the existence or valuation of inventory
Obtaining a written representation from management
o (SP) On the valuation of the inventory
Evaluating all disclosures in terms of accounting standards, IFRS and other relevant legislation
o (SP) Reviewing accounting policies in order to verify appropriateness, in accordance with
IFRS and legislation as well as consistent with prior year
ƒ Confirm that inventory is disclosed as a current asset
Substantive analytical procedures
x
x
x
x
Develop expectations regarding inventory based on knowledge of the client s business, experience
of previous audits, etcetera.
Compare the data used to calculate the ratio below with the financial information system.
Calculate each of ratios below and investigated ANY significant variances/fluctuations to obtain
acceptable representations
o Calculate the ratio of inventory to total assets
o Total inventory on hand
Inspect/evaluate the results of the ratio analysis as set out above and acquire reasons and
corresponding explanatory documentation to confirm any unusual variances.
Test of details to be performed on account balances at year-end
x
x
x
Select items from the inventory list and physically inspect the inventory
Confirm ownership of inventory by referring to purchase invoices of inventory as per the inventory
listing
Test valuation methods and evaluate calculations for reasonableness:
o Reperform calculations of the value of inventory (quantity x price) and test summations and
cross summations on the inventory list
o Select a sample of inventory listing and perform the following:
ƒ Compare the cost price to the invoice
ƒ Confirm cost price as per the supplier price list
ƒ Imported inventory – confirm cost price to bank exchange rate slip
WWW.TAKINGNOTES.CO.ZA
o
o
o
o
o
Enquire at management and inspect previous year s annual financial statements and
working papers to confirm that the inventory valuation methods have been applied
consistently
Consider use of expert to review methods
Inspect minutes of meetings to ensure there is no change in valuation methods
Investigate, through enquiries, and physical inspection of damaged/obsolete inventory that
proper provisions
Obtain a sample of inventory from the inventory listing and ensure that the cost price is
greater than the net realisable value, and if not, ensure that adjustments have been made
WWW.TAKINGNOTES.CO.ZA
Loans
Bank (repayment of loan)
Closing balance
Loans
Opening balance
Interest
General substantive procedures
x
x
x
x
x
Agreeing opening balances with the prior year s audited financial statements and audit working
papers
o (SP) Confirm, through investigation, that the opening balance of the loan general ledger
account agrees with prior year s audited annual financial statements and audit working
papers
Agreeing closing balances of general ledger accounts with the trial balance and then with the
financial statements
o (SP) Compare the closing balance of the loan in the general ledger, with the balance on the
trial balance and the financial statements
Examining general ledger accounts for unusual or suspicious transactions
o (SP) Inspect the general ledger to identify any unusual or suspicious transactions, and
enquire to management or inspect supporting documents to substantiate the transactions
Obtaining a written representation from management
o (SP) Obtain a management representation that loans are shown completely and at the
correct value in the financial statements
Evaluating all disclosures
o (SP) Inspect the financial statements and confirm in respect of the loan
ƒ That the long-term potion of the loan has been classified as non-current liability and
that the short-term portion is classified as a current liability
ƒ That all securities offered for the loan facility have been disclosed adequately
ƒ Other disclosures regarding financial instruments
Substantive analytical procedures
x
x
x
x
Develop expectations regarding the long-term loan based on knowledge of the client s business,
experience of previous audits, etcetera.
Compare the data used to calculate the ratio below with the financial information system.
Calculate each of ratios below and investigated ANY significant variances/fluctuations to obtain
acceptable representations
o Calculate the ratio of long-term loan to total non-current liabilities
o Ratio of short-term portion of loan to current liabilities
Inspect/evaluate the results of the ratio analysis as set out above and acquire reasons and
corresponding explanatory documentation to confirm any unusual variances
Test of details to be performed on each class of transactions
x
x
x
x
x
x
Obtain a bank confirmation letter of the loan with client s approval
o Compare and inspect the balance outstanding on the letter with the GL loan balance
o Ensure that the letter agrees to the loan agreement
Inspect minutes of meetings to confirm that adequate authorisation was given for the loan
Inspect the memorandum of association to confirm that adequate authorisation is given
Inspect the bank statement or cash book to confirm that the loan amount has been received
Recalculate the interest expense and confirm that this has been provided for
Recalculate the short-term portion of the loan, and inspect the annual financial statements and
confirm that:
o Long-term portion of the loan is disclosed as a non-current liability and the short-term portion
of the loan is classified as a current liability
o Securities have been disclosed adequately
WWW.TAKINGNOTES.CO.ZA
COMPUTER INFORMATION SYSTEMS
Introduction
x
x
x
x
Two or more computers are connected to form a network
o One location – local area network (LAN)
o Different geographical locations – wide area network (WAN)
o Virtual private network uses telecommunication infrastructure
Software: programme that gives the computer the infrastructure to perform tasks
o System software: runs in the background of computers and gives hardware instructions on
how to run a specific application. E.g.: Microsoft Windows 7
o Application software: performs specific functions required by users. E.g.: Pastel
Accounting and Microsoft Office
Database can consist of transaction details or cumulative balances stored in a master file
o Master files are used to store permanent information (such as client information) as well as
cumulative totals or balances of transactions from transaction files
o Transaction files record the transaction details of each transaction in real time and batch
processing systems
ƒ Real-time processing system: Masterfile is updated with the cumulative totals or
balances when the transactions occur
ƒ Batch processing system: details of transactions are stored in a transaction file
until the system processes the data, then the information is used to update the
master file
Each file is made up of rows and columns of data
o When data is captured, it is stored in a field
o Multiple fields that relate to a particular transaction are stored in a record
o The records of all transactions are saved in a file
o A collection of files that relate to a similar class of transactions or balance make up a
database
WWW.TAKINGNOTES.CO.ZA
How has information technology evolved?
mainframe
computer
standalone
personal
computer
networked
computers
online networks
and virtual or
extended
enterprises
convergent
systems
TRENDS THAT ARE CHANGING THE MODERN IT LANDSCAPE
Explanation
x Shift away from centralised computer centres towards decentralised end-user
computing over a network Æ processing and storage of information is done on the
user s device.
x Decentralised networks make it more difficult to restrict access and implement proper
segregation of duties
Mobility
x Mobility combined with the concentration of information that can be stored on a
mobile device increases risk of theft of hardware and any confidential information
stored thereon
Open source x Open source software: software that can be changed and amended by any user,
because the underlying computer programming code (source code) is available to
anyone to review, change and redistribute
x Software distributed under an open source license has reduced costs of software and
improved functionality
x Increased risk of hackers however as the code is available to anyone, as soon as a
weakness is identified, there are many programmers who work simultaneously to find
a solution
Image
x Most devices are image code input devices, have fingerprint scanners etc therefore
processing
reducing data input errors
Convergence x Hardware devices are more integrated and have a lot of functionalities (hardware and
software functionalities – e.g.: computer + camera + communication device + data
storage device + digital scanner = iPad)
x This blends numerous risks into one device and increases risk of hacking and viruses
Cloud
x Store data online and run application using internet browser or application
computing
x User s device contains only the user interface, all processing and storage takes place
on internet
x Disruption of business processes if data is not available due to slow connections and
increase of risk of interception or loss of data
Trends
Distributed
networks
How and why do companies have to govern their computer information systems?
x
The IT governance framework includes the human, financial, physical and informational aspects of
IT
Advantages when good IT governance
practices are implemented
Reputation of company is improved, trust of
internal and external parties enhanced
Align IT with business goals and processes Æ
makes business operations more efficient and
creates competitive advantage
Non-IT executives gain a better understanding of
IT and better decision-making processes are
possibly (information is timely and is of quality)
Greater level of compliance with laws and
regulations
Risk management procedures are maximised
Risks when good IT governance practices are
not implemented
Problems in running operations
Loss of confidentiality
Systems become less available, less reliable and
function less effectively
Unauthorised use, access to and changes to IT
systems
WWW.TAKINGNOTES.CO.ZA
t
What is the impact of upgrading a manual accounting system to an electronic accounting system?
Benefits of using a computerised system
Apply predefined business rules and perform
complex calculations
x Improve the timeliness, availability and
accuracy of information
x Extensive analysis of large volumes of
information
x Enhance the ability to monitor the
performance of an entity
x Reduce the risk that controls will be
circumvented by people
x Enhance the ability to achieve effective
segregation of duties
x
x
x
x
x
x
x
x
x
x
Risks of using a computerised system
Unwarranted reliance on systems that could be
incorrectly processing data or processing incorrect
data
Unauthorised access to data that could result in
the manipulation of data
IT personnel can gain access beyond what is
allowed
Unintentional amendments to data and systems
Errors during input and the processing of
transactions
Inappropriate manual intervention
Potential loss of data whilst it is being processed
Output may contain duplicate or incomplete
information
Overreliance on IT
What are the key components of a computer information system
x
Computer Information System (CIS) exists when any IT equipment plays a part in or impacts on the
processing of financial information
Hardware
Software
People
Data
All the physical electronic equipment and parts that make up a CIS
All programmes that reside on any or all components of hardware
Those who interact with the processing of transactions are part of a CIS
Includes all forms of data stored on the hardware
How does a computerised accounting system operate?
WWW.TAKINGNOTES.CO.ZA
Input and processing environments
x Individual hard-copy source documents are collected for a period of time (a day) into
bundles (batches)
x Manual checks are performed on the batches
x Bundles are then captured onto the computer system and converted into a format
that the computer can read, checked and stored in a transaction file
Batch entry
x Master file is updated with the data in the transaction file at a later stage when
and batch
convenient
processing
Advantages:
x All transactions in the batch are subject to the same activity, tasks
x Transactions are processed accurately
x Only valid transactions are processed
x All transactions are processed
x Transaction data is entered directly onto the system from a terminal as the
transaction occurs (create source documents)
Online
entry, batch x Checks are performed, and data is authorised and processed to a transaction file
processing x At a later stage (when convenient), the master file is updated with the transaction file
data
x Transaction data is entered directly onto the system which is linked to the accounting
system
Online
entry, real- x The accounting system immediately performs checks, creates source documents and
time
processes the transaction to the master file
processing Advantages:
x Master file is always up to date (unlike above two)
x A copy of the master file is used during the day and is updated continuously as
transaction data is captured
x System also simultaneously creates a batch file of the day s transactions and this file
is used to update the original master file at the end of the day
Shadow
Advantages:
processing
x If the system crashes during the day, the original file is not corrupted and also acts as
a backup
x The shadow copy of the master file allows users to have real-time information
available at any point in time
How are computer controls classified?
Controls in an IT environment
General controls
Application controls
Policies and procedures that relate to
Manual or automated procedures that typically operate at a
many applications and that support the
business process or application level
effective functioning of information
systems
Relate to the overall information
They focus on the processing of a specific computer
processing environment
application, programme or system as opposed to general
controls that focus on the computer processing environment
Implemented before transactions can be Application controls relating to the computer programs used
processed and implemented
in the various business cycles may be different for each
independently of transaction
different application
If general controls do not work, application controls do not
service much purpose as they are overridden
Have a direct effect on specific assertions
WWW.TAKINGNOTES.CO.ZA
How are general controls classified?
(1) ORGANISATIONAL CONTROLS AND PERSONNEL PRACTICES
Controls about how the CIS department is structured (policies, procedures and operations) and staff
practices
(a) Introduction:
x
x
x
Company must establish organizational framework that delegates responsibility Æ achieve
SOD, clear structure and reporting lines
o Work of EEs supervised and reviewed, and qualified staff must be hired
o Staff must be kept up to date with new trends
Organizational structure not in place:
o Unauthorised transactions
o Collusion Æ theft or fraud
o Lack of SOD Æ unauthorised transactions
o Misstatement going undetected
o Incompetent persons being employed
When implementing new organisational controls Æ Create ethical culture and control
environment
(b) Answering a question:
x
Examples of Organisational Controls which should be implemented
o Computer steering committee and CIS director:
ƒ There should be a computer steering committee (CSC) (CIS manager and
representatives of all user departments) for communication between the CIS
department and users
ƒ The CSC should be responsible for:
x Long-term planning of the CIS department
x Setting system development and operational standards
x The approval of system development requests
ƒ The CIS department should report directly to top management and the CSC
ƒ The CIS director must be appointed who is solely responsible for the CIS, with no
other responsibilities
o
Personnel practices:
ƒ The CIS should draft personnel practices and user manuals which should be freely
available and reviewed regularly
ƒ The enterprise should have a formal recruitment policy to ensure only honest
and competent staff are appointed
x Conducting interviews
x Obtaining proof of qualifications
x Contacting references
ƒ User manuals should include detailed guidelines which include:
x Job descriptions for all CIS staff
x Organisational structures and reporting guidelines
x Leave:
o Special procedures to be followed when a CIS member is on leave
o CIS staff should be encouraged to take leave regularly
ƒ There should be personnel scheduling – staff should be assigned to specific jobs
ƒ Continuous monitoring of compliance to procedures and scheduling by the CIS
staff (performed by independent individuals)
ƒ Duties and tasks should be rotated to prevent boredom and to allow for crosstraining (SOD and knowledge must be considered)
ƒ Continuous training must be offered to staff members
ƒ Continuous evaluation of work performed by personnel
WWW.TAKINGNOTES.CO.ZA
e
o
CIS department:
ƒ The CIS department must be segregated
x Development
x Operational
x Data Control
x Security
ƒ Each CIS area should only perform the functions allocated to them
ƒ There must be a segregation between the user-department and CIS department
(c) Delegation of responsibility
x
x
x
x
x
King III Æ ethical IT governance environment be created
o NB to communicate corporate culture
The board of directors must take responsibility for IT and IT governance in a company by its
actions, leadership, management philosophy and style, as well as by the strategic objectives that
are set.
Responsibility of IT governance can be delegated to computer steering committee Æ
responsible for managing IT and acts as communication channel between users and IT
department
o Consist of knowledgeable executive management with a business and IT background
Day-to-day management of IT delegated to IT manager
In delegating responsibility, it is NB to establish clear reporting lines and levels of authority
through which appropriate IT personnel can communicate with and report to the board of
directors on a regular basis, if necessary.
(d) Segregation of duties
x
SOD between IT and user departments:
o IT department organizationally separate from user departments
o IT department should report directly to executive management
o IT personnel should not be able to initiate or authorize transactions or change the
transaction or master file data unless this has been requested and authorised by a user
department
o IT personnel should be able to gain access to a company s resources
o Once IT personnel have performed work, the user department should be responsible for
reviewing the work and underlying data, records and files
x
SOD in IT department:
o Between development function, operation function and security function
o Initiation, authorization, processing, executing, custody of assets and reporting
Disadvantages of computerising with regards to SOD:
o Concentration of knowledge – risk that someone can make unauthorised changes to a
system
o Concentration of processing:
ƒ Many functions which could be separated in a manual system are concentrated on
a computerised system
ƒ Computers now used for authorisation and initiation of transactions
o Fewer staff members are required (less SOD)
o Management and employees may have limited knowledge of a computerised system
x
(e) Reporting, supervision and review
x
x
x
x
All work performed by IT staff must be initiated by staff in a user department
o Only initiated by IT staff under exceptional circumstances and with special authorization
While work is performed, it should be supervised
Once work is performed, it must be reviewed by the manager and user
IT manager should perform frequent reviews of the CIS
WWW.TAKINGNOTES.CO.ZA
(2) SYSTEM DEVELOPMENT AND CHANGE CONTROLS
(a) System development
General controls
System development and acquisition:
x System development: process followed
when new system developed in house
x System acquisition: process followed
when a new system is acquired from a
vendor
Programme changes:
x More frequent, lower cost and shorter
period of time
x May be required by users in order to
obtain new features
Application controls
Processing:
x CIS processes information in the computer
package or system
Masterfile changes:
x Masterfile contains standing data that is
frequently used by the accounting
package but need not be changed
frequently
x A master file change occurs when the
master file or standing data needs to be
updated, say, for a new record or the
details of a record are updated
i.
Request submission, needs assessment and selection
x
Project should originate from either a written user request or genuine business need identified
by management
o All requests documented and presented to BOD or computer steering committee (CSC)
to investigate and approve
Depending on the size of the project and risks involved, a feasibility study should be conducted
including:
o A comprehensive user needs assessment;
o An investigation into the resources required for the project;
o An investigation into various alternative solutions, considering the option to purchase an
established package or system, make changes to the existing package or system, or
develop a new package or system in-house;
o Cost-benefit analysis, detailing all the costs, as well as all financial and other benefits of
each option; and
o A time planner showing all the deadlines. .
x
ii.
x
x
x
x
Planning and design
A system analyst should perform the following tasks during the planning phase:
o Define and record the users needs
o Control the requirements from the internal/external report
o Draw up a preliminary system design
ƒ The needs assessment and/or the system specification must be reviewed and
signed off by the heads of all user departments before programming can
commence
CSC appoint project team to manage project
o Include IT personnel and personnel from user departments affected and should include
financial, operational and controls knowledge.
o IT personnel are responsible for the system development, user departments personnel
advise
ƒ All work performed according to predefined standards and control frameworks
Project team prepares project plan containing timeline, and tasks and highlights the milestones
and tasks to be completed by certain deadlines
o Tasks are allocated to appropriate IT staff members
o Plan used to monitor and evaluate progress which is reported back to CSC on regular
basis
Multilevel approval is now required before programming can commence
WWW.TAKINGNOTES.CO.ZA
iii.
System development and testing
a. Development area
x
x
x
x
x
x
The development area is used to program and develop the system.
Programmers code/write software independently of live system and data
Work on various versions of programme
Programmer must make changes to copy in development area
Sufficient documentation should be kept
There should be a distinction between application of the system and programming of the system
b. Test area
x
x
x
Once programming is completed, the programme is tested using test data
Testing should take place independently of live system and data, and results reviewed and
approved by the relevant manager
Various tests can be performed on the operations and performance of the hardware and
software, including:
Programme test
String/series test
System test
Stress/tension
test
Tests processing logic to verify whether all situations are treated correctly
Tests linking to related programme, e.g. correctness of data transfer from one
program to another
Tests all programmes when used together as a single system Æ testing
integration
Tests performance and capacity of the system when high volume of data used
c. Production area
x
x
x
Once testing is complete, programme moved to live system
Before system goes live, should be reviewed again by all affected personnel for final approval
Test results should be presented to CSC for review
d. Implementation
x
x
x
Controls need to be implemented relating to the conversion to new programme and transfer of
data from old program to the new program
The process must be placed under supervision of senior experienced staff
Once system has gone live, ensure that the entire development process is documented and
stored in safe location for further use
o Furthermore, documentation about the system and its operations, including training
material, should be updated.
System close off and data
clean up
x A changeover date must be
set (e.g. year end, interim
stock take date)
x All financial transactions in
the old system have to be
closed off (e.g. record cost of
sales entry in a periodic
inventory system)
x All data in the old system
must be cleaned up and
corrected and tests
performed to ensure that all
System conversion
x
One of three methods of
implementing the new
system can be used:
o Parallel processing:
The old and new
systems run
concurrently for a
limited period of time.
Most resource
intensive and staff find
it difficult to maintain
two systems at the
same time, as it
Post-conversion review
x
x
x
WWW.TAKINGNOTES.CO.ZA
The old and new data and files
should be compared (e.g.
reconcile the inventory codes
between the two systems)
All necessary control totals
(e.g. has total of inventory
codes), financial balances (e.g.
total value of inventory per
type) and record counts on the
new system should be
calculated.
The calculated control totals,
financial balances and record
data is complete (e.g.
perform inventory count)
All necessary control totals
and financial balances
should be calculated (e.g.
total inventory on hand, hash
totals of inventory codes)
Record counts should be
performed (e.g. count
number of inventory codes)
Where possible, all data
should be externally verified
(e.g. perform inventory
counts)
Backup should be made of
the old system
Data on the old system must
be signed off by all affected
parties as accurate and
complete.
Any discrepancies identified
in performing the abovementioned steps and
unusual items must be
investigated and resolved.
x
x
x
x
x
x
iv.
o
o
increases the risk of
misstatement.
Direct shut down:
The entire old system
is shut down at once
and the new system
launched immediately
thereafter.
Modular (phased)
implementation: The
old system is phased
out in sections and the
new system takes its
place according to a
set time frame.
Least risky, and most
cost effective.
x
x
x
x
counts on the old system
should be reconciled to the
control totals, financial
balances and record counts on
the new system.
The data on the new system
should be compared to the
results of the external
confirmation (e.g. inventory
count) (where applicable)
Exception reports should be
extracted from the new system
on all files, noting unusual data
fields (e.g. damaged inventory
identified, incorrect control
totals, negative quantities,
alphabetic characters in
quantity field).
Any discrepancies must be
investigated and resolved.
A register or exception report of
all discrepancies or unusual
items identified should be
maintained and approved by
the user, once resolved.
Post-implementation review
x
x
Any errors that occur after the new system has become operational should be corrected and a
register of these maintained by IT
A couple of months after the system has become operational, a post-implementation review of
the system should be conducted by the user department, IT personnel, internal (and external)
auditors and members of management to determine whether:
o The system meets the respective users needs in terms of performance and functionality;
o The necessary controls have been implemented;
o Misstatements that were detected have been resolved;
o The system development process was effective; and
o The system documentation and training material is sufficient.
(b) Change controls
x
x
Needs of users change, it is therefore necessary to make amendments to functionality of
programmes or to update the program to meet the user s needs.
These are known as program changes
o Controlling the way program changes are made NB, as a small error when making
program changes could have the same severe adverse consequences as making an error
during system development.
o The process is similar in principle to that of system development:
ƒ The 5 stages of the system development life cycle should be followed.
Answering a question:
x
Because of the frequent nature of program change requests, users should be required to
complete written requests on pre-numbered, pre-printed standard forms.
o Each request should be logged in a request register for later review and investigation.
ƒ If feasible and justifiable, the program change request must be approved by the
relevant line manager
WWW.TAKINGNOTES.CO.ZA
x
Once a program change has been affected, it must be recorded in the
register.
x Periodically, management must follow up any requests not completed
within a reasonable period.
The same steps should be followed (i ± iv) as per the system development process ±
outlined in summary below:
o A conversion must be planned with timetables for instructions of when different tasks
should be completed
o Data Conversion: the standing data of the previous manual system must be prepared in
electronic files
ƒ The data control group from the information system division must be made
responsible
ƒ A senior member of management should supervise the data-conversion project
o Training Users:
ƒ Sufficient training must be provided to ensure everyone is familiar with the new
system
ƒ User manuals must also be prepared
o System Documentation:
ƒ E.g. flow charts, descriptions, operator manuals etc must be provided
o Implementation
ƒ Take place under supervision of management
ƒ Approval of management required first
o When data-conversion is finished, tests should be run to identify any errors
x
x
Risks involved when developing a new system
o Cost of the development may be too large
o The new design may not meet the requirements of users
o There may be errors in the new system
o Important accounting principles and calculations may be wrongly implemented
o The new system may ot have adequate controls to ensure integrity of data
o The risk exists that it will be difficult to understand the new system and may not be user
friendly
(3) ACCESS CONTROL
Controls, physical or computerized, that are implemented to prevent unauthorised access, and also limit
the activities of authorised people to authorised areas.
x
x
Focus shifted from physically securing access to securing information in system
Management uses least privilege principle Æ personnel given access only to data and systems
that are necessary for them to perform their duties properly
Company should develop security management policy Æ documents process used to identify
security risks and allocates responsibility to employees
x
x
x
Physical access controls
Developed to control access from the
outside into the company using a walkthrough methodology
Physical security measures implemented
around computers, files and hardware
x
x
x
Logical access controls
If an authorised person gains access to a
computer, access should be limited using
these
Username, password, firewalls etc
Logs and audit trails used
WWW.TAKINGNOTES.CO.ZA
a. Preventative controls
x
Security management policy
o
x
Physical access controls
o
o
o
o
o
o
o
o
x
A formal, written policy that only authorised persons may use terminals and that strict
action will be taken against unauthorised users of terminals should be made
ƒ Policy acknowledged by employees
High electrified fences should restrict physical access and movement
Access to the computer venue should be restricted through keys/magnetic card
readers/security guard with a register
A security guard must be present at all entrances to the building to accompany visitors
through the building
Doors to the venue must always be locked if the computer is not in use, as well as when
staff leave the venue
The venue should be visible so that unauthorised persons gaining access thereto can be
easily identified
Additional security gates must be installed at the computer venue s entrance and an alarm
with motion sensors should be installed
Access to the CIS venue should be limited to business hours
ƒ Access after-hours should be restricted as follows:
x A security guard should be present
x Security cameras should be installed
x An alarm with motion sensors should be installed
Important hardware should be locked away in a library
Logical access controls
o
o
Authorisation tables should be used to ensure that:
ƒ Computers are given terminal codes
ƒ Restricts the access each user has to data according to that required for their
respective function to be performed
x Allows some users access to edit data whilst others may only read
Each user should have a unique username and password/biometric access should be
installed
ƒ Password control:
x Unique and not obvious
x Combination of letters, figures and symbols and contain both uppercase
and lowercase letters
x Changed frequently
x Not be displayed on the screen (ie. blocked by ******)
x Electronic files in which passwords are stored should be encrypted to
prevent unauthorised access
x If a password is incorrectly entered three times, access should be blocked
and only reinstated by management
x If the system is inactive for a certain length of time, it should log the user
out and thereafter only grant access by a re-entering of the password
x If the system detects a breach in security, it should automatically shit down
and only be reactivated once the IT managers have investigated the breach
WWW.TAKINGNOTES.CO.ZA
b. Detective and corrective controls
x
Logs, activity registers and security violation reports
o
o
o
x
Data librarian whose job is to do the following:
o
o
o
o
o
o
x
The computers must keep a record of unsuccessful attempts to gain access to the
terminal
ƒ This should be printed daily and carefully investigated
Every computer should have a list/log of daily activities
ƒ This should be checked by an independent person for any unauthorised use or
changes which should be investigated
x Detection of unauthorised changes:
o Backup copy of the system should be recovered and information
with the updated system should be reconciled
o The input documents should be reconciled with the system
o Balance control totals with recovered control totals
A log of changes to passwords should be printed and reviewed
Ensure safe custody and maintenance of data files and documentation
Limit access to programmes and documentation to authorised staff
Monitor and control programme changes
Ensure correct versions of programmes are being used
Ensure regular backups are made
Internal control considerations:
ƒ Independent from system development and programmers
ƒ Access to the library of masterfiles, documents and programmes restricted to
authorised staff
ƒ Procedures to control transfer of programmes from test status to production status
ƒ Periodic review of library activities
Data communication
o
Electronic security measures such as the following should take place:
Encryption
Firewalls
A call-back
facility
Antivirus and
antimalware
programmes
Assurance
logos
Software converts or encodes data
x Software that restricts the inflow and outflow of information into and out of a
computer system
x Monitors content of data transmitted Æ suspicious data may be rejected
x Equipped with antivirus and antimalware programme
Once a valid device has been connected to the system, the system disconnects the
device and reconnects the device using an identification number stored on the
computer system
Blocks viruses and malware from entering a system
Certification logos are displayed on a website showing that the computer uses an
encryption or security system
WWW.TAKINGNOTES.CO.ZA
(4) BUSINESS CONTINUITY CONTROLS
Ensure the continuity of processing by preventing system interruptions or limiting the impact of
interruptions.
(1)
Preventative controls
x
Non-physical dangers
o
x
Unauthorised access Æ use physical and logical access controls
Physical dangers
The following controls can be implemented to protect the company against the elements:
o Fire: fire alarms, extinguishers and smoke detectors
o Construction and location: before a computer facility is planned, it should be located away
from obvious hazards (rivers, high-traffic areas and production facilities). The construction
should be solid and elevated if possible
o Electricity: protect against power failures, use renewable energy suppliers
o Water: cables must be protected against water damage (taps and pipes) and special cable
protectors should be implemented
o Environment: climate control, neat, dust-free
o Time: regular maintenance to reduce chance of failure
(2)
x
Detective and corrective controls
Back-ups
o
x
Emergency recovery plan consisting of:
o
o
o
o
x
Made frequently using formalised policy including:
ƒ When and how backups must be made
ƒ Which files, including all operating and financial information necessary for a
business to recommence operations should a disaster occur
ƒ Regular backups should be scheduled and made
ƒ Backups should be stored in a secure location, offsite and fireproof
ƒ Backups should be tested frequently
A written emergency recovery plan containing set procedures relating to the duties and
responsibilities of each employee during a disaster
ƒ This should be widely distributed
A list of data and programme files that are key to the operations of the business and that
have to be recovered first in case of a disaster and which should be removed from the
premises
An alternative processing facility should be in place at which the company s core
operations can continue to operation
Provisions should be made for testing the emergency recovery plan
Mitigating impact
o
Insurance cover should be in place that covers pertinent risks
WWW.TAKINGNOTES.CO.ZA
Application controls
Overview of the key components of application controls
x
x
x
x
x
Input could be point-of-sale input, through an interface of another application (electronic data
interchange)
o Input of a transaction = raw data
Processing converts raw data into information
Independent manual controls: user controls that are performed independently of the operations of
the computer system
IT-dependent manual controls: user controls that are dependent on output produced by the
computer system
Programmed controls: solely dependent on, and performed by the computer system
WWW.TAKINGNOTES.CO.ZA
INPUT CONTROLS
x
x
Ensure that data entered, and Masterfile amendments are valid, accurate and complete
If objectives not addressed:
o Unauthorised transactions
o Data amended without authorisation
o Errors occurring during creation of source documents
o Errors going unnoticed
o Not all data captured
Comparison between control activities in manual and computerised environment:
Manual environment
Computerised environment
Multiple copies of pre-printed,
Documents replaced with screen containing
prenumbered documents
same data
Manual comparison performed to
Programme makes comparisons between
Record
confirm the correctness of the data data captured and the information already
procedures
Manual checks (such as number
stored in the computer s memory
sequence checks on invoice
Automated checks (such as computer
numbers)
generating a report of missing invoice
numbers)
Approval of transactions granted by Application programmed not to proceed with
senior staff member signing a
task:
document after reviewing
x Conditions not met (algorithms and
supporting documentation (such as
parameters – implied authorisation)
the financial manager signing a
(such as a credit sale cannot be made
Authorisation creditor invoice for processing after
if a customer does not have a sufficient
reviewing the underlying GRN)
and approval
credit balance)
x Approval not granted (explicit
authorisation)
If authorisation is dependent on documents
from another part of the transaction – the
programme can perform matching
Incompatible functions assigned to Access rights controlled Æ lease privilege
different employees
basis
Segregation of Employees only have access to
Responsibility assigned with usernames
Duties
documents necessary for duties
Logs, records or audit trails used to track
Responsibility assigned with
unauthorised access
signatures
Physical barriers
Electronic access rights
Access control
Logs provide additional security
Staff members perform
Computer automatically performs Æ
comparisons between multiple sets exceptions recorded in log which is reviewed
of data
by management
Reconciliations
Reconciliations easier in this environment
and
because of availability and accessibility of
independent
data
review
Reports of balances per the computerised
system are compared with the physical
assets
x
Recording of data – inputting controls applied to:
o Person capturing document and the hard copy document
o Computer screen
o Validity, accuracy and completeness of information
o Management review of data
WWW.TAKINGNOTES.CO.ZA
x
Users receive training on functionalities of programme to reduce the number
of errors
Users
x Dedicated employees should act as capturing specialists
x Employees should be held accountable for data capturing using access
profiles
Comply with document standards:
x Well designed and easy to understand
Documentation
x Controls over custody of documents
x After input is entered, comparison to hard-copy document should be done
Review,
Senior member of staff should extract logs, audit trails and registers to review
reporting and activities and identify unusual transactions
exception
monitoring
Features and procedures that are built into a programme and are reflected on the
screen to assist the user to capture data with the least amount of effort and lowest
probability of error.
x Screen layout should require minimum data to be captured
o Using drop-down menus and look-up functions
x User should confirm details already displayed on screen to underlying
documents
x Highlight errors, prompt users to enter missing data or confirm data is
Screen aids
correct
x Use compulsory fields – field must be completed before the program allows
the user to continue capturing further data
o Either: error messages displayed when compulsory fields are not
completed/the function to complete the transaction is disabled until
the fields are completed
Ideal situation – majority of data obtained from underlying master files, and the input
of data restricted to the data that would trigger the application to recall the
underlying data
Application controls that test the input of data against predetermined rules that are
programmed into the computer package with the purpose of validating the input
1. Validity test Æ confirms data against database or Masterfile (V)
2. Limit/range test Æ tests data against a threshold or predetermined
benchmark (prompts an error message that requires further authorisation or
override to proceed if the data does not meet the benchmark) (A)
3. Related data test/matching Æ matches to related data (such as matching an
invoice number to a GRN number) (V) and (A)
4. Field length test/size check Æ limit on number of characters entered (A)
Logical
5. Completeness test/mandatory field test/missing data test Æ field must be
programmed
completed before the transaction can be continued (C)
controls
6. Alphabetic/alphanumeric/numeric character test Æ types of characters
restricted (A)
7. Reasonableness test Æ tests input against a number of logical tests
(example: a programme can be set up to keep record of all price discounts
granted to clients that exceed 5% of the norm) (V) and (A)
8. Sign test Æ field must be either positive or negative (A)
x As soon as the programme detects errors/missing data, the transaction
should be rejected by the computer and an error message should appear
On a periodic basis, a senior member of staff should extract logs, audit trails and
registers to review activities and unusual transactions. Various reports can be
extracted:
Review,
x Logs and registers of computer activity
reporting and
x Exception reports of activities that are outside the norm or exceed a
exception
predetermined benchmark
monitoring
x An audit trail, which shows the flow of financial information and controls
x Control reports reflecting, for eg, total amount invoiced for a particular period
x Error reports
WWW.TAKINGNOTES.CO.ZA
x
Additional controls for the input of information:
o Computer should be programmed to check the sequential numbering and identify missing
numbers
o Descriptive data-echo tests: information entered is used by the system to retrieve
descriptive information from the master file and to echo it back to the operator (display on
the screen) so that the accuracy of input field can be confirmed
x
If batch system used, additional controls
x
Input controls
Control totals
Batch-control
sheets
Batch register
Clerk should first review the sequential numbering of documents and
then should place the documents into manageable batches or bundles
(ie. daily)
x Each batch receives unique bundle number (staff member must review
sequential numbers and calculate various control totals)
x Financial totals (total value of all sales transactions for example), hash
totals (total number of document numbers added together), record
counts (number of documents included in batch)
x The programme should only authorise the transaction file for processing
if the control totals agree
x Contains: batch number, all calculated totals and details of transaction
x Second staff member should review the batch, recalculate totals and sign
as proof
o Should also ensure that the batch contains transactions for only
the period specified
x Print batch control report as proof totals have been compared which
should be filed with batch control sheet
o If totals do not agree, entries should be reviewed for accuracy
o Report with rejected transactions/errors should be generated and
reviewed
Contains information on batch and tracks movement of batch documents to be
processed (initialled by staff)
Error correction process:
x
x
x
Error made while capturing data:
o Detected by logical programmed controls, transaction must be rejected by computer and
error message displayed on screen
o No further inputting must be allowed until error corrected
ƒ If not possible, a register of errors must be maintained
Error identified on original source document:
o System must delete the rejected transaction and transfer it to an error suspense file
ƒ Error-suspense file is reviewed by management on a regular basis
o Report of rejected transactions must be generated
o Person who captures entries must investigate rejected transactions, send source
document back to person who prepared it to correct it, record returned documents in error
register and take the rejected transactions into consideration for reconciliation of control
totals
o After the source document is corrected, it is returned to the person who captures entries
ƒ The capturer makes the necessary corrections and then re-enters the corrected
document (must be subjected to relevant input and validation controls)
Control total on batch control sheet differs from control total calculated by the computer
o System should not process the transaction file
o Once transactions have been corrected, a new batch control report is printed
WWW.TAKINGNOTES.CO.ZA
PROCESSING CONTROLS
x
Risk of errors during processing increased as a result of the following:
o Repetition of errors in processing as a result of incorrect programming
o Duplication of errors
o Loss of audit trail in computerised environment – audit trail less visible
o Loss of SOD – increases the risk that irreconcilable functions will not be separated and Æ
errors remain undetected
o Errors during the conversion of data from the manual Æ computerised system
o Data input errors due to inexperienced staff
o Human judgement is lost Æ illogical processing can occur
o Risk of unauthorised access and changes to the system
User-related
controls
Those mentioned earlier particularly relating to access and isolation of
responsibility
x Backup should be made of data before processing
x Data librarian should ensure correct version being used
x Mitigate risk of incorrect or old data by having clear internal naming of files
Correct
and external labels of files
programme
x Processing schedule or register linking each production run with a specific
and file
data and time
o Librarian can then record file names next to the appropriate date in
the register
x Financial fields, hash totals and record counts should be generated and
should be compared before and after processing
x Control totals of Masterfile, which must be updated with transaction data,
must be compared with updated total of actual Masterfile
o Differences must be investigated
Computer
o This is file/shadow balancing
control totals
o Alternative is run-to-run totals which can be reviewed and
and reports
calculated by system
x The console log of processing (automatically updated by the system) and
other control reports
o Checked by data control group to identify processing disruptions and
investigated
x Computer should detect any missing transactions or data by performing:
o File sequence investigation (programme investigates whether the
Controls during
first transaction s reference number follows on the last transaction s
processing
reference number)
o Completeness test
x Validation tests to detect data errors and processing errors
Review,
Refer to that above
reporting and
exception
monitoring
Error
Refer to that above
correction
process
WWW.TAKINGNOTES.CO.ZA
A
OUTPUT CONTROLS
Output – distribution of data from where it is stored in one location to where it is viewed or restored in an
electronic format.
Userrelated
controls
Refer to those above
Access controls over users and output itself
x
Controls
over the
distribution
of output
Controls
when
receiving
output
Should be written policy on how each type of output should be treated:
o Distributed to all departments and each department should be made
responsible for developing a procedure for output (where, when how and
which format the data must be transferred)
o Policy should address how output should be treated at the following
stages: generation, during distribution, on receipt and after use
x Dedicated person appointed to accepted responsibility of distribution of output
x Names of persons authorised to receive the output documented in a register
(manual or electronic)
o If the output is paper based, a manual distribution register
maintained/output is electronic, access to the output can be restricted
using authorisation matrices
o If the person reviews the output, proof of this should be provided
o A senior person should review the distribution register to detect any
unauthorised distribution
Recipient should:
x Reconcile input to output and control totals
x Perform output count and review number sequence
x Check page numbers
x Match content of report with table contents
x Check blank pages contain words such as “empty page”
There should be fixed procedures to prevent unauthorised persons obtaining outputs
after their intended use (ie. locked away or shredded after use)
MASTERFILE CHANGE CONTROLS
x
x
x
x
Where standing data is changed or added to the system
Distinct from processing, where the computer updates the data form transaction files to a master
file – which is subject to processing controls
Data error in Masterfile could have a significant impact on an accounting system because the
data is often captured once and then re-used by different programmes
Controls over Masterfile amendments rely heavily on input controls
x Same as those mentioned earlier relating to level of authorisation
x The person making the changes to the masterfile should be independent
of users of the particular information in the masterfile
User-related
x Approval granted by management Æ designated members should be
controls
given access rights
x Any changes that could have a fundamental impact on the financial
records should only be allowed to be made on a designated computer
x Backups of Masterfile made before changes occur
x All Masterfile amendment requests should be documented on a
Request forms
Masterfile change request form (meets acceptable document standards)
Æ reviewed by senior member of staff
Input controls
Same as those mentioned above
Review, reporting
x Each request logged should be recorded in a Masterfile amendment
and exception
request register
monitoring of logs
o Regularly be reconciled with automated register of completed
and registers, and
requests
financial data
o Read-only rights should be granted to specific staff members
WWW.TAKINGNOTES.CO.ZA
x Both registers must be reviewed by a responsible senior staff member to
ensure that:
o All changes are supported by an authorised request form
o Changes inputted agree with the request form
o Only authorised staff members capture the Masterfile changes
o There are no long-outstanding requests not dealt with to date
x Senior member should on a regular basis:
o Review the master file, and compare to master file amendment
form
o Reconcile the total on the relevant master file to the balance of
the relevant control account in the GL
Other controls
x Data communication: transmission of data from a sender to a receiver in electronic form
o Control achieved by:
ƒ Using controls like processing controls (check validity, accuracy and completeness)
ƒ Implementing specialized software (encryption, firewalls and antimalware
programmes)
ƒ Implementing specialized communication management software (manages
communication between sender and receiver, limits access and manages the
communication network)
ƒ Physical cable protection
x All the controls mentioned above that are implemented over the various stages of the transaction
flows are relevant to advanced technologies
x Process to follow when implementing or evaluation controls over any forms of technology:
1. Obtain an understanding of the technologies
2. Identify relevant risks
3. Identify and evaluate adequacy of existing controls
4. Break technology down into components
5. Match actual components against theoretical controls that should exist
6. Evaluate impact of controls and risk on business
7. Select controls to mitigate the remaining risk to an acceptable level
x Controls implemented over the following for electronic commerce, EFT and other data
communication:
o Capturing data
o Restricting and authenticating the user
o Transfer of data over the internet
o Policies and procedures
o Continuity
o Logs and reviews
Service organizations, outsourcing and data warehousing
x Outsourcing: function normally performed by the company is outsourced to another company
x Data warehousing: a c m a
da a i
ed
a he c m a
e e f a m hl fee
o Newest form: software as a service
x Controls that service organizations need to implement:
o Restricted and authenticating the user
o Transfer of data
o Protecting company against losses (controls ensure continuity of operations)
o Policies and procedures (regarding legal issues relating to ownership and privacy)
o Continuity
o Logs and reviews
WWW.TAKINGNOTES.CO.ZA
THE AUDIT PROCESS IN A COMPUTER INFORMATION SYSTEM
ENVIRONMENT (CIS)
Introduction
•
•
•
Computer assisted audit techniques (CAATs) are computerised tools and functions
that an auditor uses to assist in performing audit procedures, used for the purpose of
gathering audit evidence
CAATs may be applied when a client makes use of computers to record and process
its data or manage aspects of its operations
Characteristics of CIS:
o Absence of input documents
o No clear segregation of duties
o Lack of a visible audit trail
o Consistent processing
§ Advantage: programmed internal controls
§ Disadvantages: programming errors
o High speed processing
o Interdependence of controls
§ Programmed application controls – dependent on integrity of
programme (general controls)
§ User control – dependent on programmed controls
Approaches to auditing in a CIS
Auditing around the computer
•
•
•
•
•
•
An auditor does not consider the automated controls present in a computer application
o Input to the system (hardcopy supporting documents) is compared to the system’s
output
o Example: auditor selects a sample of credit notes from the sales return journal
(output) for inspection of the physical credit note and underlying goods returned
voucher (input documents)
Used in a combined or substantive audit approach
Focus on substantive procedures
Advantages:
o Cost-effective where the client operates a single computer system with a strong audit
trail (simplistic computer system)
o Minimal risk of corrupting client’s computer data, as the auditor does not make use of
hardware input or data extraction in relation to the client’s computer system
Disadvantages:
o Audit may be ineffective or become overly expensive where the client makes
reasonable use of computer systems, as the auditor does not take full advantage of
the efficiency of the computer
o There is limited ability to isolate exact causes or risks of financial misstatements, if
these are as a result of control failure of the computer
Does not constitute CAATs as computer technology is not used to test internal controls or
verify financial data
WWW.TAKINGNOTES.CO.ZA
Auditing through the computer
•
•
•
•
•
•
The auditor tests the operating effectiveness of automated controls present in the computer
application to be able to rely on internal controls for audit purposes
o Example: entering data (test data) into the system and comparing the results of the
rest (actual output) with expected output
o If the automated control did not operate as expected, the auditor notes a deficiency in
internal controls
Forms part of system-oriented CAATs where the internal controls relating to input of
information into the computer and the processing of information by the computer are tested
Used in a combined audit approach
o Relates specifically to TOC therefore not applicable when a purely substantive audit
approach is applied
Test (1) general (2) application controls and (3) user controls
Advantages:
o Highly effective where a large volume of homogenous transactions are subject to the
same controls – complex computer system
o It can pinpoint causes or risks of financial misstatements where these are due to
computer-related control weaknesses
Disadvantages:
o It may be expensive as it requires specific computer technology (hardware and
software) as well as expertise
o There is a risk of corrupting data on the client’s system or disrupting the client’s
computer operations
Auditing with the computer
•
•
•
•
•
Can be used in addition to each of the above two
The data stored on a client’s computer system is made available to the auditor in electronic
form, and analysed for risks and exceptions
o Auditor does not have to work through large volumes of output data manually
Commonly used in a substantive audit approach but may be used in a combined audit
approach
Advantages:
o Greater control over the auditing of the client’s system data as the auditor has direct
access to it on his or her own computer
o Potentially enables larger sample sizes to be drawn and the computer’s processing
power can be put to use
o Normally less expensive and more efficient than manually auditing client data
Disadvantages:
o Requires computer knowledge and expertise
o Risk of corrupting data on the client’s system or disrupting the client’s computer
operations
o Expensive where advanced data manipulation by means of specialised audit software
or CAAT experts is required
o Risk of breach of confidentiality where the client’s data has been transferred into the
auditor’s possession and computer system
WWW.TAKINGNOTES.CO.ZA
•
A combination of the above approaches is most likely to be applied on a particular audit
o However, an around the computer approach is distinct and mutually exclusive
from a through the computer approach
WWW.TAKINGNOTES.CO.ZA
Relationship between CAATs and audit procedures
• Sometimes, the application of CAATs will lead to the acquisition of direct audit evidence,
but other times it does not lead to acquiring audit evidence itself but enables further audit
procedures to be performed to gather audit evidence
o ie: CAATs cannot physically inspect details on an invoice/bank statement for
the auditor, but it can help to select a sample which then allows the auditor to
manually check these underlying documents
Who performs CAATs?
• If CAATs entail basic computer functions, any auditor can perform them without requiring
advanced computer skills
o However, if complicated data analysis techniques are required, dedicated
audit software and the skills of an information systems auditor (IS auditor)
may be necessary
§ IS auditors are qualified in the auditing of computerised financial
systems, including automated controls
§ On larger audits, a qualified IS auditor would be required to test the
client’s general and application controls (using a through the
computer approach) and the analysis of a client’s financial data
(using a with the computer approach)
• The IS auditor will submit a report about the IT controls as well
as reports about the analysis of client’s data
§ The audit team sends the following to the IS auditor:
• Risks of material misstatement
• Purpose of the audit procedure (eg: detect duplicated bank
account numbers on the payroll system)
• Population to which CAATs should be applied
• Financial period to which the tests relate
• Date by which the team requires the CAAT’s results
• Format in which the results should be supplied
• Specifications of the data required
•
SYSTEM
CAATs
Testing of operating effectiveness of automated controls using data input
techniques and computer software
• Requires auditor to audit through the computer in a combined audit approach
• Different methods that can be used:
• Auditor inputs dummy/fictitious data into an entity’s system to
evaluate the output against predetermined expectations in order
to assess whether particular controls are operating effectively
• Example: if the auditor expects the application to have an
automated control that prevents a user from entering a negative
inventory quantity, the auditor can attempt to process a quantity
of -5 for example
o If the test data is accepted by the system, the auditor
Test data
knows that the automated control is not operating
effectively
• Example: if a dummy credit note is simply accepted by the
computer and processed to the GL without any automated
control requiring initial approval of the transaction, auditor will
note a deficiency in internal control
• Test data is effective for testing an application’s input and
processing controls
WWW.TAKINGNOTES.CO.ZA
•
•
•
•
•
Integrated
test
facility
(ITF)
•
•
•
•
Parallel
simulation
•
System
control
audit
review file
(SCARF)
•
•
When designing the information, the auditor has to test all
transactions that could possibly be affected by the control in
order to test the operating effectiveness in all instances
Risk of using test data:
o Same programme/version of the programme must be used
throughout the year
o Element of surprise must not be lost
o Corruption of live data (and risk of viruses) must be limited
o System may crash
o Unauthorised changes/overrides of system identified
o All possible situations and programmed controls need to be
tested
o May be difficult to remove data from the system
Should normally include: valid and invalid account
numbers/codes (creditors, debtors, inventory), positive,
negative and zero values, exceptionally high or low values
Creation, with the client’s permission, of dummy accounts in the
live financial system of a client which becomes a test facility for
audit purposes
o This can be incorporated into an application during the
design and programming phase of a system, or during setup of financial information
A human operator does not necessarily know of the existence
of the dummy account
Example: a dummy creditor account is included in the system
o Whenever actual transactions are recorded to the creditor’s
ledger, simulated transactions would be created at the
same time and posted to the dummy account
o The auditor then has this account at their disposal to test
the effectiveness of automated controls that impact the test
and corresponding live data concurrently, without having to
interrogate the entity’s system to the extent of possibly
corrupting live data
An ITF can automatically identify deficiencies in a live computer
system
Audit resources must allow for the use of an ITF
Auditor processes the same set of data on the client’s computer
system and on their own which mirrors that of the client
o The auditor has the assurance that their own system
operates effectively and contains the necessary preprogrammed controls
o If the results of the processing differ between the systems,
the auditor can conclude that the client’s system is
functioning ineffectively
Objective: test the operating effectiveness of automated
controls (TOC) and not the correctness of amounts (SP)
Embedding an audit module into a client’s computer application
to become part of the software itself
Reports of errors, exceptions or deviations from expectations
are written to the SCAR file which can be reviewed and followed
up by the auditor
WWW.TAKINGNOTES.CO.ZA
•
•
•
Code
analysis
•
Suitable in large client computer systems with numerous
automated controls
o Can focus audit attention on important transactions and
events where risks of material misstatement are most likely
o Suitable in certain areas of systems which are particularly
prone to inappropriate activity by users
Auditor analyses the coding of the client’s software application
to determine the effectiveness of the programmed automated
controls
Requires specific knowledge of computer coding language by
the auditor
Auditor will be concerned with the effectiveness of general
controls that were in place during the design phase of the
application
o Therefore suitable when an audit client makes use of
customised software
•
There is a risk that the client’s system may be corrupted during system CAATs
or the test data may become incorporated with live data, distorting the actual
financial information
•
•
Performance of data analysis in a substantive audit approach
Data is analysed by the auditor directly without consideration of automated
controls which may have affected the data
Data analysis: examination of electronic information previously generated by
and stored on a client’s system
o Auditor first has to extract data from client’s system and import it to the
auditor’s own data analysis software (auditing with the computer)
o The auditor then can manipulate the data using procedures:
1. Selection: organise data by discarding irrelevant data
fields
2. Sorting and stratifying: sorting data in alphabetical or
numerical order and stratifying (separating, grouping and
listing) it by nature, category and type
3. Interrogating: audit software can examine the data to
identify potential misstatements by searching for unusual
items or anomalies
a. Selecting and generating samples
b. Reperforming calculations on amounts
Instructions to carry out the above functions include having the audit software:
o Recalculate and cast data for mathematical accuracy
o Identify all items exceeding specified limit
o Isolate items in terms of the criteria set by the auditor
o Scan for missing fields or gaps in sequential numbering
o Compare sets of data to identify inconsistencies
o Perform statistical or ratio analysis
•
DATA
CAATs
•
WWW.TAKINGNOTES.CO.ZA
•
•
•
Tests of controls
THROUGH
General controls must be tested before
internal controls
SYSTEM CAATs to test computerised
controls
•
•
•
Substantive procedures
AROUND
Analytical procedures, detail tests
DATA CAATs to download data from a
CIS to perform substantive procedures
Reasons for the use of CAATs in the audit process
Necessity
Volume of electronic data:
significant quantity is
electronic, might have no
choice but to perform CAATs
as manual approach would
be too time consuming
Nature of audit trail:
transactions may only be
evidenced in electronic form
without a supporting paper
trail
Extent of computerisation:
client is dependent on
computer system, might
have no other choice
Complexity of
computerised system:
Very complex, more
necessary to use CAATs –
complexity affected by
complexity of applications
and whether there are
complicated interactions
between financial
subsystems
Possibility
Desirability
Cost implications
Could be too expensive
Availability of IS skills
and resources
Time considerations
CAATs can offer time
savings
Availability of client data:
Client and auditor’s system
may be incompatible
Electronic data could be
lost or deleted
Security implications and
attitude of client towards
CAATs:
Clients may not be in favour
of CAATs due to confidential
information being in
possession of auditor
or
potential data corruption and
concerns of integrity
Steps in planning and performing CAATs
(1) Planning steps:
(a) Formulate objective of CAATs and
the control or detection risks to be
addressed
(b) Define population to be tested
(c) Specify CAATs procedures that
have to be performed (sort, stratify
and recalculate)
(d) Define format of data required
(2) Performance steps:
(a) Obtain data from client
(b) Agree CAATs data with information
subject to audit - ensure data
received agrees with client’s data
(c) Organize data
(d) Execute CAATs demands
according to programmatic
instructions
(e) Reporting
WWW.TAKINGNOTES.CO.ZA
a
Answering questions:
Test data: Steps to take during the development and utilisation of test data:
•
•
•
•
•
•
•
•
•
(1) Define the objective of the test that would be performed and (1.2) specify the
controls which are to be tested
o (1) For example: All sales are recorded and calculated accurately. All sales
are made to authorised customers and the account details submitted are valid
o (2) For example: Validation controls: Alphanumeric test, field length test etc
(2) Develop the test data, containing the following:
o The test data should include valid and invalid data using for example the
following fields: customer number, inventory numbers et cetera
o The test data should include all types of data and possible transactions for
example an order should be entered twice
o The test data should be processed independently of the clients’ system, as to
obtain a pre-determined correct processing result, which will be used to
evaluate the results of the test data against
(3) Process the test data on the client’s system
(4) Compare the results from the test data ran on the client’s system with that of the
pre-determined results.
o For example, control totals of invoices, calculated totals on invoices
(5) Remove the test data from the clients system
Note that the test data would either be processed correctly or either rejected or be
reflected on exception reports (i.o.w. evaluate the outcome of the tests)
o For example, transaction logs of every sales order entry, breakdowns of
backorders, order suspense accounts
(6) Conclude on whether the controls within the client’s system operated effectively
(7) Evaluate the general controls to ensure that the system you have tested functioned
within a controlled environment and functioned without unauthorised amendment
throughout the period under review
(8) Report on the effective operations of the controls
Data CAATs
• Data CAATs are used to assist in the performance of substantive procedures
o For almost every substantive procedure there is an equivalent data CAAT
o Example where this does not apply: excel cannot inspect invoices but can
be used to select a sample of invoices which must be manually checked by
the auditor
§ Excel cannot physically inspect inventory but can make a sample of
items for the auditor to inspect
• When formulating data CAATs, do not write “use vlookup and…”, use layman’s terms
rather and say “compare (using vlookup)…”
Manual substantive procedures
General procedures
Data CAATs
Extract standard reports
Recalculate, compare, exception reports
Analytical procedures
Prepare graphs and ratios on excel
Specific tests
Recalculate totals
Driven by the substantive procedures you
would have performed
Analytical procedures
Tests of details
WWW.TAKINGNOTES.CO.ZA
so
(1) Determine input fields on screen/variables in calculations from various sources
(2) Identify nature of field: transaction/Masterfile
(3) Prepare accounting entries and assertions
(4) Plan audit/substantive procedures (normal)
(5) Formulate equivalent CAATs for each procedure:
a. List CAATs techniques
b. List fields available
c. Document procedures: GP, SAP, ToD
d. Add detail
• Techniques which can be used: S C O R E
Technique
Excel
Example
Select sample (S)
Filter
Summarization/stratification/sorting Data table
Per category (ie. age
of information
analysis), stratification of
balances
• Summarise within the criteria in
the data set
• Stratify- make the data set
Compare information (incl. analytical If, vlookup
Transaction date with
procedures) (C)
current date, data in
various files (CP vs NRV)
Calculations
Formula and
Depreciation, analytical
graphs
procedure
Recalculation of totals (R)
Formula
Totals or cross
calculations
Exception report (E)
Filter, conditional
Look for unusual items:
format
negative, zero values,
duplicate values,
unusually high and low,
blank fields, round
amounts
•
Formulate the data CAATs as follows (example of TOD on inventory):
Assistance to the audit
procedure
Recalculate the addition of
the inventory schedule
Test the cut-off of
purchases
Test the cut-off of sales
Test the valuation of
inventory costs
Technique
Have to include this – 1
mark
Recalculate the total
inventory value
and compare (reconcile) it
with
Extract a report of selected
inventory items according
to the following criteria
Select a sample of items
with
Select a sample of
WWW.TAKINGNOTES.CO.ZA
Field (excel column)
Have to include this – 1
mark
By multiplying the costs
per unit and amount on
hand
The total value per item
GRN number after the cutoff point (last GRN per year)
Last date of purchases
around year end (before
and after)
High value items or costs
per items in order to test
the purchase price by
comparing the price to the
underlying documentation
with the price list
and after doing the above, state what the auditor has to do thereafter (manually)
• Example for creditors:
o By using audit software, inspect the creditor master file for any entries with
GRN numbers or cheque numbers after the cut-off numbers
o Purchase transactions: Select by using audit software, a sample of GRNs
that have been recorded in the inventory master file 3 or 4 days before and
after year-end
§ Then, inspect the related delivery note (from supplier) and GRN
documents to verify when the goods have been received
§ Trace this through to the creditor master file to check that it has
been recorded in the correct financial period
o Payment transactions: Select, using audit software, a sample of cheque
payments that have been recorded in the cash book 3 or 4 days before and
after year-end
§ Then, inspect the related cheque returned from bank and all its
supporting documentation (for example cheque requisition) and
§ trace it to the creditor master file to check that it has been recorded
in the correct financial period
o Inspect using of audit software, the different suspense files for longoutstanding items that might indicate unrecorded transactions
§ Orders awaiting GRNs
§ GRNs awaiting an invoice
Considerations and process prior to making use of CAATS:
1.
2.
3.
4.
Determine if it is necessary possible and desirable
Address a request to computer audit team to explain objectives
Agreement reached regarding method of reporting
Computer audit team will do the following:
a. Define objectives, transactions and necessary audit procedures
b. Prepare budget of time and costs and have it approved by auditor
c. Obtain clients approval to use data for CAATS
d. Determine availability of client’s data needed for CAATS
e. Contact client and arrange for download of data
f. Reconcile data received with live production environment and information of
financial statements
g. Execute CAATS
h. Report accordingly to audit team
Information to appear on working papers:
• GENERAL INFORMATION:
o Name of client
o Year-end of client
o Working paper reference
o Explanation of audit marks
o Name and date of preparer and reviewer
• OBJECTIVE OF PROCEDURES PERFORMED (CAATS) AND TECHNICAL
PROCEDURES TO USE CAATS
• LAYOUT OF INVENTORY MASTERFILE OF CLIENT
WWW.TAKINGNOTES.CO.ZA
•
•
RESULTS OF CAATS (eg: number of exceptions identified and further procedures which
were executed)
CONCLUSION IN RESPECT OF PROCEDURES
Tips to answer data CAATS questions:
• General procedures, analytical procedures and test of details
• Extract report of invalid items (specify) and investigate
• Inventory:
o High low value items – confirm price to price list
o CP > SP – consider write down
o Recalculate total value per item
o Stratify according to locations – use in count
o Report of sample items to confirm in count
§ Repost of inventory items according to ‘last date of sales” to identify slow
moving/ obsolete inventory for write off
o Compare current year and prior year
o Check cut-off of transactions
o Recalculate totals and compare
o Compare to underlying documents
o Debtors:
§ Recreate age analysis (used in evaluating appropriateness of provision for
doubtful debt)
§ Sequence check on debtor number or names (investigate errors which
indicate incomplete recording)
e
WWW.TAKINGNOTES.CO.ZA
INTRODUCTION TO COMPUTER CONTROLS
Computer Information System Environment (CIS)/(IS)
-
Exists where there is a computer – no matter what type or size
Plays a part in or impacts processing of financial information of the entity
Irrespective of whether computer is operated by entity or third party
-
Uses of a computer have an impact on
o
Generation of transactions
o
Processing thereof
o
Storage and/or
o
Communication of information
Impacts on accounting and system of internal control – factors specific to CIS
-
Electronic accounting systems = can increase/decrease company’s risk profile
Management implements controls to address/mitigate risks
Computerised systems introduce risks:
Input:
-
Lack of input documentation – contributes to lack of visual audit trail
Lack of visual proof of authorisation
Processing:
- Multiple functions = performed by single program: lack of segregation of duty
- Where systems are integrated – individual errors might affect different systems
- Uniform processing decreases risk of clerical errors – but where error exists within program à risk exists of creating a constant error
- As a result of high speed of processing – errors and volume of transactions might not get detected in time
- System generated transactions (less control & controls)
- Data may be wasted during processing and completeness of data is affected
-
Unauthorised changes to transaction/master files
Unauthorised access = result in input of unauthorised/fictitious transactions
Uncontrolled access to programs might result in unauthorised changes to programs (affects processing)
Wrong programs/reproductions are used during processing which might resuly in errors
Other risks
-
Concentration of functions & information – risk of errors and irregularities
Initiation & processing of transactions with/without CIS
Internal controls are dependent on CIS
Potential for increased management supervision
Key components of CIS
ISA 315 describes an information system as consisting of à infrastructure (physical & hardware), software, people, procedures, data
Hardware
Software
People
Procedures
Data
-
All physical electronic equipment & parts that make up a CIS – from input devices to output & storage
devices
Eg. Keyboards, printers, hard drives, flash discs, network infrastructure, ATM
All programs that reside on any or all components of hardware
Eg. Android software, programming of ATM
Those who interact with processing of transactions = considered part of CIS
Includes procedures that govern behaviour of people
Eg. Customer who uses ATM
Instructions used to collect, process and store data about the organisation’s activities throughout the four
stages of the accounting system à initiate, record, process & report
Eg. Strategies, policies & methods & rules to use the CIS
Includes all forms of data stored on the hardware
Eg. Log of recent calls, transactions of an ATM
Underlying principles in ISA 315
n
n
n
n
n
n
n
n
System of internal control (IC) - system designed, & implemented by those charged with governance to provide reasonable assurance about the
achievement of an entity’s objectives iro (i) reliability of financial reporting, (ii) effectiveness and efficiency of operations, and (iii) compliance with
Laws & Reg.
Control activity - policies and procedures established to achieve the control objectives of those charged with government.
IT environment - IT applications and supporting infrastructure, + processes and personnel, that support operations and strategies.
•
IT processes - processes to manage access, manage program or other changes and manage operations.
•
IT infrastructure - comprises the network, operating systems, databases and related hardware and software.
•
IT application - set of programs that is used in initiation, processing, recording and reporting (incl data WH & report writers).
General Information Technology Controls (GITC) - controls over IT processes that support the continued operations, including the effective
functioning of information processing controls and ensuring the integrity (i.e. VAC) of information
Information processing controls – controls relating to the processing of information in IT applications or manual information processes that ensures
integrity (i.e. VAC) of information
Direct controls - controls that can address risks of material misstatement at the assertion level (Control activities + Information system). Indirect
controls - controls that support direct controls (Control environment, Risks assessment process & Monitoring controls).
General controls – provides a framework of overriding control of IS-activities
§
Control environment, security policy & organisational controls
§
System development- and program change controls
§
Access controls
§
Business continuity
§
Operating and System maintenance controls
Application controls – Manual controls & automated controls over transactions
§
To initiate, record à input
§
To process and à processing
§
To report à output
§
As well as to change information à master file changes
How does a computerised system operate
The flow of transactions can be divided into 4 stages:
Input:
–
–
Flow commences with data of a transaction being recorded onto source documents designed with a specific business cycle
Source documents can the ne input – manually or by means of a computerised reading device (eg. Barcode scanner)
Processing:
– Transaction data is processed into a computer readable format
– Computer system ensures integrity of data – performs checks, calculations and comparisons
– Data is stored until requested
Master File changes:
– Standing data in a master file can be changed by means of a master file amendment
Output
–
When data is distributed (eg. Can be viewed on a screen, emailed, stored on a memory stick (electronic output) or printed and
distributed (manual output).
Controls in computer information system
Accounting
system
Computerised
Environment
Manual
environment
General
Controls
Application
controls
GENERAL CONTROLS
•
Policies and procedures that relate to many applications
•
Framework for overall control
•
To ensure that CIS is developed, implemented, maintained and operated adequately.
•
Control environment, security policy & organised controls
•
System development and program change controls
•
Access controls
•
Business continuity
•
Operating & system maintenance controls
APPLICATION CONTROLS
•
Control over a specific transaction/cycle
•
Can be preventative, detective or corrective
•
To ensure the validity, accuracy and completeness of transactions and data, incl. the maintenance of MF data
- Initiate, record à input
- Process à processing
- Report à output
- Change information à master file changes
QUESTION
Factors that Increase the risk for errors & irregularities in a computerised information system as opposed to a manual system.
§
§
§
§
§
§
§
There is a lack of a decent audit trail or significant limitation thereon
It is more difficult to ensure there is a segregation of duties, seeing that tasks that previously performed by more than one person
is now performed by on person computer environment
The personnel that is available might not have the necessary skills that is required in a computer environment and mistakes can in
this type of environment have far more serious consequences than in a hand system
Persons may gain unauthorised access and make changes without there being evidence showing it
A decrease in human involvement decreases the possibility that errors and irregularities be located/identified
Errors in design of system may go undetected for a long period because users do not understand the system and it can be misused
by people that know the system well.
As a result of the standard design of the computer system it will cause errors that exists the system will be repeated in all
transactions.
QUESTION
Explain in your own words how computer controls fit into the general framework of internal control and what the difference is between
general controls and application controls
§
§
§
§
§
§
Computer controls form part of the overall framework of internal controls and serve as an addition to the controls of the manual
system
The controls of a manual system and a computer system all work together to achieve the same control objectives (validation,
completeness and accuracy).
General controls are controls that are applicable to the overall computer environment.
Application controls are applicable to specific transactions.
Application controls are only sufficient if good general controls are also in place.
IT GENERAL CONTROLS
FRAMEWORK OF GENERAL CONTROLS
Organisational controls and personnel
practices
1. Responsibility levels, corporate
structure and reporting lines
2. Segregation of duties
a. Between departments
b. Within IT department
3. Staff practices
4. Supervision & review
System development controls/change
controls
1. Request needs assessment and
authorisation
2. Project management
3. Planning and design
4. Developing and testing
5. Implementation
6. Post-implementation
Controls around how the CIS department is
structured.
How changes are made to CIS & the
acquisition/development of a new CIS
Business continuity
Preventative controls:
1. Operating controls
- Physical dangers, eg. Water, fire,
power interruptions, wear and tear.
- Non-physical dangers, eg.
Unauthorised access/changes.
Detective and corrective controls
2. Repair after disaster using
- Backups
- Disaster recovery plan
Should something happen to the system, a
process needs to be in place to ensure that
the company can resume operations in the
shortest possible time.
Access Control
Preventative controls
1. Security management and policy
2. Physical access controls
§
Facilities
§
System
§
Data
§
Terminal/computer
3. Logical access controls
§
Username and password
§
Firewalls
4. Library controls
Detective and corrective controls
5. Logs and reviews (monitoring)
6. Library controls (data communication)
To prevent/detect unauthorised access to
an organisation’s data or performing
unauthorised actives.
1.
2.
3.
4.
5.
Operating Controls
Scheduling and production
runs/processing
Operating activities and use of
assets
Library controls
Logs and registers
Business continuity controls
Controls that must be implemented
around the day-to-day running of the
system/maintenance
This is the base of the perfect IT general
controls – refer to the framework when
doing questions.
GENERAL CONTROLS – WEAKNESSES
These frequently come up!!
SWITCHBOARDS MUSICAL PARK
S
Lack of segregation of duties: programming and systems analysis:
the programmer is responsible for systems analysis functions, namely the preparation of system specifications, writing and updating
manuals and program documentation.
Lack of segregation of duties: Control of data and documentation and programming: The librarian also acts as assistant
programmer.
W
I
T
C
H
B
O
A
Must be written authorisation for requests for program changes (cannot occur over whatsapp or telephone)
Independent investigation into necessity, impact and cost of the changes before conversion commenced
Adequate testing of the new system where all parties are involved, must take place before the implementation of the new system.
Changes are made directly on the live system (no test copy) and there is no control over the conversion process from the old to the
new system to ensure proper conversion.
Insufficient housekeeping controls in the computer room.
Regular back-up copies are made and kept safe.
Sustained segregation between the programming function and operation of the computer.
Admission to the EDP section is not appropriately controlled.
The controls which are in place are not functioning effectively.
R
The control clerk is not running procedures / tests / controls on the data received for import, processing process itself and the
results of processing (export documentation).
D
S
No clear distinction between system and application programming.
M
Multi-level involvement in the system development and change process where all parties can give inputs or submit needs or
specifications.
Detail specifications must prepared.
The program amendment or system development is performed by unqualified programmers.
U
S
System specifications must be formally approved before development of the new system takes place.
Lack of a formal system development methodology with separated duties and responsibilities.
The programmer cannot both design and test new systems and perform programming changes
I
C
A
L
The company does not use internal file labels.
P
Project management including a project team who prepare the project plan of duties and responsibilities, deadlines & budgets to
monitor the project process
A
It appears that the library function occurs informally the librarian walked through the entire section and collect all discs. There is a
lack of formal authority and control over the issuing and receiving back of data files.
There is no formal recovery plan and procedures.
R
K
No control exist over the magnetic tapes for example by keeping them safe in a library.
No formal approval takes place before implementation of the system/changes.
Lack of formal and proper appointment procedures.
It seems that keep the librarian only keeps data files and not the other software (application and system software) and system
documentation
1 ORGANISATIONAL CONTROLS & PERSONNEL PRACTICES
RESPONSIBILITY LEVELS
CSC (Computer Steering Committee)
â—¦
Consists of IS manager and representatives of all user groups
Librarian (independent person)
â—¦
Safe custody of data files / documents
â—¦
Limit access to authorised personnel
â—¦
Monitor & control programme changes
â—¦
Version control
â—¦
Back-ups & recovery
SEGREGATION OF DUTIES
Separation between IS & user department:
–
–
–
–
–
IS department may not authorise transactions
IS department may not authorise master file’s
IS department may not correct users’ errors
Users’ department checks and reviews MF’s
Financial manager must not be involved in the user department
Separate IS department
–
Organisationally independent of users
–
Report directly to top management
Separation within computer environment
–
Segregation between initiation, authorisation, custody and the reporting functions
–
The operating and development functions must be segregated
Separation within CIS department
Minimum segregation of duties required
- development/programming AND
- operations
Within: Initiation, authorisation, custody and reporting functions
Ideal:
Systems development
- Systems analyst
- Programmers
Operations
- Librarian
- Data control
- Data control clerk
- Databasea dministrator
Minimum segregation:
–
Development/programming; and
–
Operations
SUPERVISION & REVIEW
–
Regularly done
- by IS manager
- after all changes have been made
–
NB Review every activity // change = compare it to document
GOOD STAFF PRACTICES
T–
staff training - continuously
A–
appointment:
â—¦
CV à interview à appointment
D–
duties: rotation & segregation
â—¦
avoid fraud, collusion / boredom
P–
employment policy in place & documented
O–
policy outline:
â—¦
Interviews, aptitude, education, experience & references
L–
forced leave at least once per year
E–
evaluation of performance
S–
schedule specific tasks
â—¦
which employee does what
2 SYSTEM DEVELOPMENT / CHANGE CONTROLS
Example: implementing new accounting/sales/debtors’ management software
Note that the users of the systems need drive the whole process and is NB: should be considered at every phase. If not = weakness in system
NEW SYSTEM DEVELOPMENT
request
•
Request must be made on a pre-printed, pre-numbered written request form
•
Feasibility study must be conducted
â—¦
the impact, cost and necessity of the proposed change
â—¦
timeline
â—¦
budget
â—¦
cost vs benefit analysis
â—¦
available hardware / software
•
Multi-level approval from all users
•
•
•
There is no pre-numbered, pre-printed and written request of program changes.
And therefore no sequence check is performed and no documented approval can be made by management
No register or log is maintained for all request forms. Therefore no follow up on program changes or investigations of unusual requests.
•
Approval by ALL users: Program change requests are only evaluated and approved by the accountant and not also by (e.g.) the users department, IS manager
and internal audit or CSC
There is no formal approval from the users or management for the programme change
No formal initialling (or signing) as proof of authorisation and approval of program changes (by users, IS staff etc).
IMPORTANT RISKS
•
•
•
•
•
•
•
•
No optimal segregation of duties if estimated costs >R10,000 – since the financial director submits and approves the request
The segregation of duties in this process is insufficient and there is no multi-level involvement in each stage of purchasing. Only the accountant is involved in
each step of the implementation.
The accountant is responsible for the decision and there is no strategic involvement of management
The cost of program change requests plays an important role in the authorisation process while no investigation into the necessity and impact of the changes
are done /is the most important consideration), while no need-assessment is performed
There is no feasibility study performed for material changes to assess the user requirements, necessity, the costs, implications of the change etc.
The competence of the service provider was not evaluated at all
planning
Project management
•
Project teams:
â—¦
consisting of IS manager, representatives of all user departments & auditors
â—¦
must be a project plan with time and cost budgets
•
Project plan:
â—¦
time and cost budgets
â—¦
tasks to be performed clearly defined
â—¦
tasks assigned to those responsible
â—¦
deadlines & time schedules for each task
â—¦
regular monitoring of progress to identify delay as early as possible
User needs:
–
Must be documented and defined
–
determined by systems analyst
–
consider any ISA standards requirements
•
Multi-level approval before conversion commences
â—¦
Preliminary system design –
•
Preliminary system design:
â—¦
System specifications
â—¦
Multilevel involvement
â—¦
Compliance with set procedures
â—¦
must be reviewed and approved by the heads of all user departments before programming can commence
IMPORTANT RISKS
•
•
•
•
•
•
•
No program change standards are in place.
No procedures to monitor the compliance thereof.
The conversion was not planned beforehand and there is no timetable for when which departments will do the conversion. It was done on a weekend
Only the accountant drafts the requirement specifications (possibly may not have all the necessary technical knowledge)
There is no multiple-level approval of the provisional design of the system/program change (in other words, before the development thereof).
No project plan, which sets out the process of how and when the new package will be implemented, was compiled and approved
There is no investigation made to obtain the needs of all the users relating to the program changes
Development & testing
Programming
Development Area
•
Programmers à write the software
â—¦
No access to live data
â—¦
Users not involved in programming
•
Review & system testing
â—¦
Use test data / simulated data
â—¦
Test entire system
•
Types of tests
Test area
Program test
Test the processing logic of a single program to verify whether all situations/scenarios are treated correctly
String/series test
Test related program e.g. transfer data correctly from one program to another
System test
Test all programs if used together as a single system
Tension Test
Test performance and capacity when subjected high pressure and demand on resources
•
Acceptance testing:
â—¦
Controls: internal / external audit
â—¦
Functionality: users
•
Make adjustments – as required before implementation
•
Final Approval
â—¦
Requirements: testing and correction of errors
â—¦
All results should be reviewed to ensure that errors and production problems are identified and sorted out area
â—¦
By management, users, IS personnel
Production Area
IMPORTANT RISKS
•
•
•
No testing is done on a test version of the program to ensure that the program changes can be implemented.
Proper system testing does not take place, only the processing logic of the program is tested after the program changes.
There is no reconciliation between program changes authorised and program changes made.
•
•
Insufficient documentation of program changes is maintained. No copies of test data, data definitions, specifications, etc are kept. It is necessary for the
operation of the system and any future changes.
There is no back-up made before implementation of the updated program.
•
•
There is no written approval of the program after changes before implementation.
There is no multi-level formal approval of changes before implementation
•
•
There is no independent person which supervises as librarian and no-one keeps record of the issue of programs and the copying thereof.
Testing of the program changes are not performed by all parties involved / concerned, but only by the accountant and the programmer. (Increases risk that not
all errors will be identified before implementation.)
•
•
There are no pre-determined standards when performing program changes.
By using the accountant’s password, the programmer gains access to all files on the server. (risk of unauthorised access to confidential information and changes
to files high).
•
•
There are no access controls to ensure that program changes are made to a copy of the program and do not affect the live data or live program.
The programmer makes the changes to a copy of the relevant program placed in the production area – thus not to a copy of the program stored in the test area
(or development area) of the library. (risks: wrong version of program is changed / changes are not made to the ‘current’ version)
Programmer also works after-hours (with full access) without supervision..
•
implementation
o
Planning
–
Implementation must be scheduled
–
Conversion must be planned with timetables for when the tasks must be completed
–
Must not take place after-hours / on weekends
–
Must be communicated to all users
o
Before commences
–
Controls must be implemented to ensure the data on the old system remains complete, accurate & valid
à this can be done by performing reconciliations & re-calculations
–
Staff training of the new system
User manuals created and widely available
Control over data conversion
–
Data control group is made responsible
–
Supervision by: senior competent person
o
different methods of conversion
o
direct
shut down of old system and start up new system
parallel
run 2 systems simultaneously for period of time
modular
phase in new system while phase out old system
according to a time frame
DO NOT USE
à most risky as data is easily lost
Risky, time consuming and expensive
BEST METHOD TO USE
o
Post conversion (data):
Reconcile
–
Old & new file balance
–
Number of records
–
Control totals
–
Examine exception reports
–
Followed with approval by the users
o
Training
–
Train user and IT staff how to use the new system
–
Compile user manuals: guide users with new system à communicate to all users
o
Update system documentation
–
With the librarian
–
Flowcharts, operator manuals, etc.
o
Review
–
Review by users, auditors, IS personnel
–
Assess performance
o
Consider if system achieves its aims
–
–
Review documentation and ensure everything is up to date
Staff are notified of changes, and trained to fully utilise improvements
IMPORTANT RISKS
Risks if controls are not in place (Consequences)
–
Excessive costs
–
Insufficient controls and non-compliance with standards
–
Errors occur during the transfer of information
–
System not understandable, unhappy users
•
•
Users did not approve the package before implementation thereof.
No formalised procedures to ensure back-up copies of the different versions of software are filed in the program library.
•
There are no procedures according to which the program changes that are made – according to the version control list – are reviewed with the
program request forms.
No formal procedures to ensure all system and users documentation are properly updated.
The system documentation is not updated to include the changes made to the existing program and no documentation is prepared to document the changes
made.
•
•
•
•
•
•
A unique password was not allocated to each programmer. By the use of CIS’s password the programmers gain access to all the files
Changes are not put into effect by programmers or the IT division but by the users of the system who have access to be able to make changes to the system.
There is no training of system users after program changes have been implemented.
No testing was done on Pastel after the conversion to ensure that the package: functions correctly, as expected and meets the needs of the users.
•
•
Only direct implementation is carried out (because previous version of program is stopped immediately) which may not in all situations be the best
implementation choice.
Implementation is not planned and coordinated with the user departments.
•
The program changes are implemented at a time when normal operations of the business could be disrupted.
•
There are no controls in place to ensure that the manual balances were closed off properly. No controls were performed on the data of the manual
system to ensure that the data is complete, accurate and valid before the conversion was done
There is no proper control over the conversion of data from a manual system to Pastel. The accountant simply transferred the balances from the
manual system to Pastel with no supervision during the conversion.
•
Recommend additional controls or procedures that to follow during the conversion to the new computerised cost management system
SYSTEM CONVERSION
The conversion must be planned, with time tables for dates and times by which different task must be performed.
Data conversion: the standing data of the previous manual system must be prepared in electronic files for the computerised costing system.
The data control group from the information system division must take control of the conversion.
A senior member of management must also be appointed to supervise the data conversion project.
Before data conversion starts, controls must be performed to ensure that the data on the old system is complete, accurate and valid, e.g. by reconciliations
and recalculations.
Training users:
â—¦
Sufficient training must be provided to all users in order to ensure that everyone is familiar with the use of the new system.
â—¦
User manuals must also be prepared.
Documentation: System documentation, e.g. flow charts, descriptions, operator manuals, must be prepared or updated.
Implementation:
â—¦
Implementation must take place under the supervision of a senior responsible person.
Implementation of the new system must be executed in an appropriate manner- for example, parallel testing where the old and new systems run
simultaneously and comparing the results
reconciliation and review
§
Post implementation review performed by users, auditors, IS personnel
o Assess performance of system
o Consider if the system compiles with needs
§
Review documentation – system documentation and training material
Controls to ensure appropriate system development process
CONTROLS TO ENSURE AN APPROPRIATE SYSTEM DEVELOPMENT PROCESS
•
There must be written standard procedures set out within the system development methodology to cover the procedures concerning the planning, development
and implementation of the systems.
•
Project management must be implemented. A project team must be appointed to prepare a project plan. The project plan must inter alia contain the size of the
project, the jobs and responsibilities of specific persons and a time budget. The project team is responsible to control and manage the project and to monitor the
progress of the project
•
Agreement must be reached regarding the standards of programming, for example the terminology, abbreviations, symbols etc that will be utilised during the
system development process.
•
Multi-level involvement of the users of the system, the CIS staff, management and the auditor in the system development process is necessary. Each of these
parties has different and unique needs concerning the system and must draft the specifications for the system.
•
The specifications for the system as mentioned above must before development be reviewed and approved by all parties concerned.
•
After the development of the system but before implementation, the system must be properly tested in a test environment. It should be determined whether the
system contains sufficient controls and complies with all the pre-determined specifications.
There are 5 levels of testing, namely:
program test:
string/series test:
system test/joint
existence tests:
pilot test:
parallel test:
where the processing logic of each program is tested separately and is tested whether the program will handle all situations correctly;
where the series related programs are tested to ensure whether data is correctly transferred from the one program to next
test whether all the programs in the system are working jointly together by using simulated data
where the actual transactions are processed through the new system and the results compared with those of the present system
where the old and the new computer system are used for a period in parallel and when the results after this period are compared with one
anothe
After testing the system properly but before implementing it, all parties involved with the development process, must approve the system finally in writing.
Proper documentation concerning the proper operation of the system must be maintained.
Risks to consider with the development of a new system
•
•
•
•
•
•
•
•
•
The cost of the development may become out of control.
The new design of the system might not meet the needs & requirements of the users of the system.
There may be errors (not compatible) in the new system that could make the day to day use of the system very difficult.
Important accounting principles and calculations may be wrongly integrated into the new computer system.
The new system could possibly not have enough controls in place to ensure the integrity of the data at all times
Risk exists that the new system could be difficult to understand and not user friendly and can lead to errors.
Problems can arise with the integration between the new and the existing system.
The risk exist that transfer of information between systems may result in data being lost, incorrectly transferred or duplicated.
The risk exists that it will be difficult to understand for its users and not user friendly.
Advantages to purchasing software off the shelf compared to one developed in house
•
•
•
•
•
•
•
•
When a package is purchased and installed the process normally progresses more quickly, since the system itself needs not be written (which could be a
time- consuming process).
Packages normally have predetermined prices and costs, which means that the process can be less expensive.
A company can consider different packages and decide which one would suit the company's needs best.
Packages are normally properly tested and probably error free in respect of functioning.
The supplier of the package normally builds all the necessary controls into to package.
System documentation normally forms part of the package and the company therefore does not need to write it themselves.
The supplier of the package usually provides the necessary training and support services in respect of the package.
The supplier of the package generally provides updates and new versions of the package, as it becomes available.
SYSTEM CHANGE / MAINTENANCE
Change in an existing system: Example: Change in interest rate for debtors, changing salary payment scale.
request
o Written request is required
–
Pre-numbered, pre-printed, standard form
–
Record in request register (log) in order to ensure all requests are followed up on
o
Inspect request and approve
–
Run the idea past users, auditors, IS personnel: sign as initial proof of authorisation of program chances
–
Only written authorised changes are implemented (programmers receive instructions from CSC only)
o
Perform feasibility study for material changes
–
Investigate necessity, cost and impact
–
Maintain register (log) of program changes
planning / design
o Provisional system is approved
–
Follow coding standards
o
Segregation of duties:
–
define programmers, system analysts: independent person determines program specifications for requested program and another
person makes changes
o
Programmers
–
Give programmer a project plan, costing budget and a time budget
–
Design a test version
–
Library: no access to live data (the risk is that the wrong Version of the program is changed).
–
Obtain all the users’ approval
–
Change test version
–
Must only work during operational hours so that supervision of his work takes place
–
Independent person must supervise as librarian and keep record of the use of programs and copying thereof
–
Program change documentation must be maintained: copies of data/ test data etc
Development & testing
–
–
–
Appropriate testing by
Information System personnel
Users
Auditors
–
–
–
–
Final written approval by
Information System personnel
Users
Auditors
management
o
o
Implementation
–
–
o
Librarian responsible for version change, and implementation of live data.
Program changes must be implemented during operational hours in order to be properly supervised
Register of changes
–
Record
–
Review
–
Reconcile with request forms
•
Back up old versions (formalised procedures must exist to ensure that back- up copies of the different versions of software
are filed in the program library). These must be stored off-site (away from the company’s premises)
•
Update system documentation with changes made
Post – Implementation & Training
–
–
o
–
System is reviewed by users, auditors, IS personnel
Assess performance
Consider if system achieves its aims
Review documentation and ensure everything is up to date
Staff are notified of changes, and trained to fully utilise improvements
3 BUSINESS CONTINUITY
PREVENTATIVE
PHYSICAL DANGERS
o
Fire
•
Fire extinguishers
•
Safe located close to fire extinguishers
•
Smoke detectors
•
Fire alarms
o
Water
•
Cable protection implemented to protect equipment from water damage
•
Do not use water fire extinguishers – use C02
o
Electricty
•
Un-interrupted power supply (UPS)
•
Back-up generators for emergencies
o
Construction
•
Building should be well-built and solid
•
Long-lasting fireproof walls
o
Alternative facility
•
•
An alternative processing facility should be considered in the event of a disaster so that operations can continue (an agreement
could be entered into with a service provider.)
Provide alternative processing facilities (back-up facilities), for example service organizations, trade partners etc.
NON-PHYSICAL DANGERS
o
Wear & tear
–
Machinery maintenance
–
Replacement policy
–
Regular inspection
–
Continues to meet needs of users
o
Unauthorised access
à Physical access controls
–
Anti-virus software/white hat hacker team
o
Unauthorised changes by personnel
–
Avoid over-reliance on personnel
–
Training of backup staff
–
Documentation of duties
–
Rotation of staff
Security policy (which employees must sign)
–
Specify use of hardware
–
Ban on illegal software
–
Internet usage policy
o
•
•
Insurance
Contact insurer to revise and update insurance coverage and to update so it covers the following risks: fire, water, loss of production, et
cetera.
Have insurance to mitigate the impact of the loss – profits and physical and logical assets
DETECTIVE
o
Emergency Plan & Recovery Procedures
Must be a written business continuity plan communicated to all users
Must state
Which documents need to be recovered in any emergency
•
•
•
PLAN
DISASTER
PLAN
ALTERNATIVE
FACILITY
o
•
Plan and document an emergency recovery plan, with set procedures relating to the functions and responsibilities in case of
disasters, including break-ins.
•
•
Test the emergency recovery plan to identify weaknesses and to set out responsibilities of persons involved (or to set).
Provision should be made to test the plan on a regular basis to identify weaknesses and ensure employees are aware of their
responsibilities.
•
•
A written business continuity/disaster recovery plan needs to be developed
Widely spread between employees which specifically sets out:
List of data and program files that are key to operations that must be recovered.
A list of documents to be removed from the premises in the event of a disaster.
•
An alternative processing facility should be considered in the event of a disaster so that operations can continue (an
agreement could be entered into with a service provider.)
•
Provide alternative processing facilities (back-up facilities), for example service organizations, trade partners etc.
Backups
Regular back-ups must be made and stored safely on a different site
•
•
•
A formalised backup program must be in place place to state how and when backups are to be made
Regular backups must be made frequently (daily)
At least three generations of backups should be maintained
•
•
The backup copies must be tested frequently
The back-up copies should be regularly tested to identify any weaknesses and to ensure that the back-up responsibilities are
allocated to the correct people.
•
A manual back-up register must be maintained. This register must clearly state who needs to make back-up copies and where it
must be saved. (Or an automated backup register must be maintained that links to the timing of the cloud back-ups)
Regular back-up copies must be scheduled (i.e. a fixed schedule should be setup) and made OR backups should be automatically
done.
•
4 ACCESS CONTROLS
Risks that access controls address: (Consequences if not in place)
o Damage or theft of hardware
o Unauthorised viewing or editing of files and data o Unauthorised transactions
o Users that are not security conscious
PREVENTATIVE
Security management & policy
â–ª Identify risks
â–ª Allocate responsibilities
o
Written policy (NB)
–
Preparation and distribution of security policy
–
Confidentiality clause
–
Repercussions for breach of policy
Physical
Logical
Premises and facilities
•
Security guards after hours, alarms
•
Controlled arrangements for visitors
•
CCTV
•
Access card doors
•
Maintain registers, logs, review
* security of a computer
User’s Terminal /computer
•
Control access to office
•
Lockable terminal room or very open area
•
Supervision over CCTV
•
Activity register
•
Computer must be safeguarded
Usernames
•
unique to each employee
•
allocated by the employer
•
de-authorised on termination of employment
Other assets (physical documents)
•
Store in a safe
•
File protection:
â—¦
Internal and external file labels
â—¦
Read-only permissions
•
•
Register for insurance
Logs and registers
Identify users
•
ID number / name
•
Physical à access card / fingerprint / facial recognition
Firewall
Passwords:
•
not shown on screen
•
activity register of log-ins
•
policy à keep it confidential
•
sign out after inactivity
•
lock-out after 3 failed attempts
•
changed regularly
•
at least 5 characters
•
not a previously used password
•
contain uppercase letters and numbers
Authorisation matrix
•
user à username and passwords
•
function rights à permissions eg: read-only
QUESTION:
Explain how ‘authorisation matrixes’ could have been used to ensure that only valid and authorised change could be made to the information
on the main frame computer and consequently could have prevented Ms Possible from removing and changing information.
An access control matrix (programmed authorisation) can contribute in the following manners to ensure only valid changes to the information in the system
are made:
•
By way of a terminal code, only a specific terminal is permitted access to the program’s module that makes information changes possible. Thereby
restricting changes to a specific terminal.
•
by means of log-in with user ID, authenticated by password, restricts
•
the access rights each user has to change information on the system (e.g. display, write);
•
possibility that an unauthorised person can make changes to the information on any computers, because they do not have the necessary rights to make
the changes;
•
in accordance with the allocated authorisation level, changes should only be allowed to be made on a predetermined day of the month;
QUESTION:
Controls to ensure authorised use of salary master file on the mainframe computer only
PHYSICAL CONTROLS
A formal, written security policy should be distributed to all users stipulating:
that only authorised persons may use the mainframe computer and That strong action will be taken against its unauthorised usage.
Physical access control that should be active at mainframe room:
â—¦
Access to room should be restricted by keys/magnetic card readers
â—¦
Only authorised users must have access to keys for room and/or should have proper control over registration of magnetic cards
â—¦
Doors should be closed at all times when computer is not in use,
â—¦
Also when IS personnel leave the room;
•
•
Daily run schedules should be prepared for the use of the mainframe computer.
The mainframe computer should also provide a daily activity register of the activities performed, which should be compared by a senior person with the
run schedule to identify any unauthorised activities.
•
•
Registration on the mainframe computer should only take place within fixed hours (or office hours) and
Access outside these hours should be managed by the use of alarms, closed-circuit TV cameras and/or security guards supervising the use of this
computer
LOGICAL CONTROLS
Authorisation tables must be used which ensure that:
â—¦
Access and right (writing, reading, changing, deleting etc) to certain files and programs should be restricted by linkage to usernames (and in doing
so to the user’s job description);
â—¦
Access to certain programs and files may only be acquired from the mainframe computer and not from terminals as well.
Password control must be adjusted by requiring correct passwords to acquire access to the mainframe computer and the master file:
â—¦
Passwords should be unique.
â—¦
Persons should have passwords that are alphanumerical containing at least five characters.
â—¦
Persons should change passwords regularly.
â—¦
Password should not appear on the screen.
â—¦
The choice of passwords is important – it should not be obvious and linked to the user.
â—¦
The password of persons who resign should be removed from the file.
â—¦
Secrecy of passwords is essential.
•
•
•
The terminal should disconnect after three unsuccessful attempts to access. (input of wrong password)
In the case of a security break the system should disconnect automatically.
When the system has not been in use for quite a time user should be deregistered and access to the system should require the re-enter of the
password.
DETECTIVE
•
Exception reports must be generated for all unauthorised users logging on / failed attempts
Logs & reviews
–
Monitor audit trail and activity register and processing
–
Sensitive transactions/activity
–
Reviewed by senior personnel
o
Mention a log:
There must be a log
Give example of data that should be in the log
Must be reviewed
Unusual entries must be followed up on
QUESTION:
Describe the controls with which unauthorised changes to information on the main frame computer can be detected
•
•
•
•
•
The back-up copy must be recovered and the information must be reconciled with the information on the system. Any difference could highlight
missing information.
The input documents must be reconciled with the system.
Balance the control totals (e.g. hash totals, record counts) with the recovered control totals.
Obtain exception reports/audit trails/registers form the system to indentify any information which was omitted or changed. The reports could, for
example, contain the following:
â—¦
Audit trial of any changes;
â—¦
Empty fields in the information data basis;
â—¦
keep record of all attempts to gain access to the main frame computer system (successful and unsuccessful); and
â—¦
keep activity registers.
Exception reports/audit trails/registers must be reviewed by a senior staff member to identify any unauthorised access or attempt to gain access, which
must be investigated immediately.
CONTROLS TO PREVENT AND DETECT UNAUTHORISED ACCESS
PREVENTATIVE
•
A formal, written policy that only authorized persons may use terminals and that strict action will be taken against unauthorized users of terminals. This
policy should be given to all staff.
•
•
•
There must be special security measures in place at the EDP department , and specifically Mr Westwood 's office:
â—¦
the doors should always be closed when the computer is not in use and when Mr. Westwood leaves his office;
â—¦
only authorized users have access to keys to the offices;
â—¦
computer terminal itself must be closed when not in use (physical terminal locks);
the terminal should be placed in a visible, conspicuous places where it is not hidden, so that an unauthorized person working on a computer can be
easily spotted.
There may only access to the system within business hours. After-hours access must be limited by the use of alarms and/or security guards.
•
Authorisation tables should be used to ensure that:
â—¦
data can only be imported from certain terminal;
â—¦
certain files can only be read, while others may be edited;
â—¦
no access to certain programs and files may be obtained from certain terminal
•
Password Control should be applied when access to a terminal and the system is obtained :
â—¦
the terminal should only be used if the correct password is used;
â—¦
there should be proper control over passwords: staff must be informed of the importance of secrecy of passwords;
â—¦
passwords should be chosen with care and not for the ease with which it can be remembered: for example, dates of birth and identity
numbers may not be used;
â—¦
passwords may not be printed, written or pasted where unauthorized users can see;
â—¦
passwords should be changed regularly, especially after a change in personnel.
DETECTIVE
•
•
•
•
The computers must keep a record of unsuccessful attempts to gain access to the terminal. Such lists should be printed daily and very carefully
investigated by Mr. West Word and followed up.
The system must automatically sign out if a user has not been at a terminal for a while.
When the system used for a certain time, have gained access to the system by the reinsertion of the password.
At the end of every day, every computer should have a list / log / register pressure of daily activities. This should be checked by an independent person
for any unauthorized use or changes. Any evidence of unauthorized activities must be investigated and followed up immediately.
5 OPERATING CONTROLS
Objective:
to control the operations of the system; and
ensure that programmed procedures are applied correctly and consistently; set up standards for hardware/software so that communication
and cooperation is possible
–
–
–
o
Scheduling of jobs & processing tasks that should take place
Validation tests (refer to processing notes)
Error handling (refer to input notes)
Operating activities, maintenance & use of assets
–
–
Maintenance of hardware: proper maintenance program must exist whereby hardware components are replaced timeously
Librarian controls (Refers to the data library as a place and the librarian as a person)
o
Procedure manual
–
Data,file and program protection
–
Person has to supervise and keep record of programs issued in order to ensure they are issued to authorised personnel and the
correct versions are issued.
o
Logs & registers
–
Activity registers are reviewed and investigated on a day to day or weekly basis
–
Policy relating to personnel habits and neatness
o
Disaster recovery plan & backup
–
Perform tests/ procedures concerning the processing and output by the system, in order to ensure that it is complete and accurate
IT APPLICATION CONTROLS
Relate to input controls
For a specific transaction
-
To prevent, detect and correct errors arising in a transaction, throughout the various stages of the application control
Control objectives do not change, the basic principles and methods (SCRAMM) are still applicable
Application controls consist of:
1.
Independent user controls à no dependence on a CIS eg. Authorising a hardcopy purchase order
2.
IT dependent manual controls à user controls dependent on computerised information (eg. Review of access log)
3.
Programmed controls (automated controls) à dependent on CIS output and can operate without human interaction (eg. Validation
controls)
Applications can be subdivided into
o User controls
â—¦
Independent of computer, or
â—¦
Dependent on computer
o Programmed controls
o Computer only Capturing & documentation (Prevention)
MENTION:
•
General controls (training, access controls, SOD) specific to capture
•
Users should be trained to ensure they understand the importance of the data they must enter and how it should be inputted
•
Manuals should be freely available to all persons responsible for data input.
Source document controls (Prevention)
Pre-numbering (with sequence check)
Efficient design
TYPES OF DATA ENTRY & PROCESSING
§
Batch entry and batch processing
o Transactions (source doc) are collected into bundles,
o Entered and processed in bundles
o Masterfile is updated at a later stage
§
On-line entry, batch processing
o Data is entered directly onto the system via a terminal
o Authorise and process to transaction file
o Master file is updated later
§
On-line entry, real-time processing
o Data is entered directly, linked to accounting system
o Immediate processing to the Masterfile
o (MF always up to date)
INPUT CONTROLS:
Review:
Documentation and general
controls
Screen
- Identification
Computer or logical
controls
- Investigation
- Correction of errors
PREVENTION
General controls (training, access
controls, SoD) that is specific to the
system
Source documents: efficient design,
pre-numbered
Check sequential numbering
•
•
•
•
•
DETECTION
Computer of logical controls
Validation tests (VAC)
CORRECTION
•
Identification
•
Investigation
•
Correction
(Immediate/delayed)
ANSWERING AN INPUT CONTROL QUESTION:
Start with anything that isn’t a validation test
Mention the validation tests according to accuracy / validity / completeness
PREVENTION:
Screen:
•
•
•
•
•
•
•
Standard, user-friendly
Looks like source document
Minimum data entered by user (use drop-down lists) to prevent human error
Prompting
Compulsory fields
à Prompt the user to complete all the fields: shouldn’t be able to proceed if all the fields are not completed
Descriptive data echo tests (“Are you sure?”)
Visual verification
GENERAL (USER RELATED CONTROLS)
Trustworthy employees must be trained as capturing specialists
All employees must be properly trained on the functionality
Keep track of who is capturing the data by allocating responsibility
Access profiles
Each employee must have a username, password and profile indicating the user’s access rights and
functionalities they are capable to perform
Segregation of duties
Allocate override rights to senior manager or using an approval matrix which requires specific users to
approve the transaction before it is processed
SOURCE DOCUMENTS
The validity, accuracy and completeness of data on hard-copy documents is a prerequisite for the validity, accuracy and completeness of the
computer input
Document standards
To reduce errors, manual documentation must comply with the required standards and easy to understand
Check sequential numbering
There must be controls over the custody of assets
Training
-
SCREEN AIDS
Features and procedures built into the program in order to assist the user to capture data with minimal effort and error
Screen Design
Must resemble the source document or hard-copy layout
Must be standard and user friendly (only enough space for required information)
Capturing of
Done by data control group (from source document) for user to view on-line (on the system)
transactions (use of
Ensure minimum data entered – if possible extract information from other sources
Masterfile)
Computer
-
To ensure minimum data is physically captured, use drop-down menus or lookup functions
Must ensure that no data can be left out by using compulsory fields
The information recalled by the system must then be confirmed by the user known as data echo test or
closed-loop verification
Visual verification
DETECTION:
Data input: Validation tests: (Detection)
Which test to use?
–
–
–
–
–
–
ACCURACY
ALPHA-NUMERIC CHECKS
FIELD LENGTH TEST
SIGN TEST
REASONABILITY TEST
DATA-ECHO TEST
RELATED DATA TEST
–
–
–
COMPLETENESS
COMPLETENESS TEST
COMPULSORY FIELDS
CONTROL TOTALS
–
–
–
VALIDITY
VALIDITY TEST
LIMIT TEST
DROP DOWN MENU TEST
Explanation of different tests
When answering a question, must provide: 1. name of the test. 2. what the test does; and 3. an example from scenario
NB VALIDATION TESTS included in program code –in other words performed by computer (if in an exam question, they don’t exclude
validation tests in the required parts, leave space open under each test and complete it by applying it to the scenario given in the question)
Validity and authorisation
Validity tests:
Test that the information entered is valid
e.g. debtor account number vs. master-file data
Limit test:
If pre-determined maximum and minimum limits are
exceeded, then additional authorisation is required
Eg: limit on the number of items you can order /
limit on the price range
Alphabetic/ alphanumeric/
numeric character tests:
Accuracy
Alphabetic test – only alphabetic letters should be accepted
Alpha-numeric test – only a mix of numerical and alphanumeric characters should be accepted.
Numeric test – only numerical characters should be accepted.
Sign test (+ or -):
Related data / matching tests
All amounts
The system automatically generates related data
e.g., won’t allow negative inventory to be entered
e.g. enter an employee number and the
employee’s id number
is generated by the system
Field length test / field size tests
The correct number of characters in the field
e.g. cell phone number only has 10 characters
Reasonability test
The entry is reasonable in the context
i.e. email address has @ or reasonable number of
items
ordered.
Field length test / field size tests
Completeness
The correct number of characters in the field
Completeness test
All input fields are completed and filled in.
User not allowed to proceed unless all the required fields are
filled in.
e.g. ID no
Review, investigate (Correction)
Identify and isolate errors:
o Error messages
o Register of rejected transactions o Error register/log
Audit trail
Computer generated
o List of (1) accepted transactions and (2) rejected transactions (and relevant control/s)
o Transaction files and suspense files(rejected)
Manual (by hand)
o Control register
o Error “log” of rejected transactions sent back
o Review, investigate errors â–ª Input error
Immediate rejection: and correction:
As soon as programmed validation tests detect errors/missing data the transaction should be rejected by the computer and an error message
should immediately appear on the screen. These should immediately be corrected – in other words further inputs will not be allowed until the
error has been corrected (accuracy).
A register should be kept of errors not corrected and followed up by management.
Delayed correction, transfer to suspense file, keep record of errors
Source document error
o Rejected to/ transfer to suspense file
o (i) error report/ register/ log and (ii) documentation is sent to user for correction and authorisation
o Investigate the cause and management follows up on the error
o Correct error
o Perform validation tests
o Return to transaction file for processing
Risks if input controls don’t work: Consequences
o Unauthoriseddataentry.
o Data may be added or amended.
o Errors during the creation of data.
o Errors during capturing/entering of data.
o Errors during correction or re-entry of previously rejected data. o Data can be lost during capturing
INPUT CONTROLS IN RESPECT OF ACCURACY
M
A
P
P
E
R
Manuals must be available in order to provide users with the necessary information, which can specifically be consulted by the
users when they experience problems or have made errors.
The computer screen should contain required fields without accurate completion of which further processing cannot take place
(i.e. force the user to fill in certain fields).
As much as possible information on the screen should be echoed in order for the user to confirm the information.
Appropriate error handling procedures must exist, for example the system must not allow the input or processing to continue
until the error has been corrected
The computer system must display an error message as soon as the system detects an input error, and
After input the input should be displayed on the screen and the user must review the information captured by means of visual
verification
D
The staff must be guided through the input process by means of a computer dialog (prompting).
U
The screen layout of the input screens must be user-friendly, properly designed and similar to that of the contract from which
information is captured
The minimum information must be entered by for example using relevant selection lists, selection boxes etc
I
T
Staff must receive proper training for the tasks they will perform
CORRECTION:
Error messages,
extract logs, audit
trails and registers
Investigate causes of
errors
Input error
-
IDENTIFICATION
A senior member must extract these documents from the system and unusual items must be
investigated
Identify error messages and registers of rejected transactions and suspense files
NB: compare details of items vs invoice
Can also be detective: exception reports, registers & logs
Error register (log)
There must be an audit trail to show the flow of transactions
Computer generated:
•
Logs and registers of all rejected and accepted transactions
•
Exception reports of unusual transaction
•
Transaction and suspense files
Manually generated
•
Control reports show total amount invoiced in period
•
Error reports or logs of rejected transactions sent back
INVESTIGATION
Input errors
Errors on source documents
CORRECTION OF ERRORS
Management must determine whether the error exceeds the job authorisation of the employee to
determine whether it was unethical beahviour
An error correction must require a high-level password level
Adding new information
Immediate rejection:
The transaction and related data must be rejected
An error message must appear
No further inputting must be allowed until the error is corrected
Error on the original
source document
(return to source)
Delayed Correction:
If immediate correction is not possible, the transaction must be transferred to the suspense file
A register of unattended to errors must be made
The register must be investigated by management
Correction during input of during later processing:
The system must delete the rejected transaction and send it to an error suspense file
An electronic report/register/log of the rejected transactions and all documentation must be
generated
The data capturer must then:
Investigate the transactions and send the source document back to the preparer for correction and
authorisation
Ensure the documents are recorded in the error register
Consider rejected transaction for reconciliations of control totals
Once the documents are corrected by the preparer and returned, the data capturer must:
Correct the transactions in the error suspense file
Re-enter the data (correct error)
Perform validation tests during correction
Error suspense file must be revied on a regular basis by management
ERROR HANDLING PROCEDURES:
CAPTURE ERRORS
1.
2.
3.
4.
As soon as a capture error has been made during capturing, the transaction must be rejected by the computer by immediately showing an error message
on the screen.
Immediate correction of enter errors must be required- in other words, no further entries are allow until the error is corrected.
A register of errors that was not immediately been corrected must be maintained and discussed with management.
Certain errors relating to the exceeding of limits or job level should require a high-level password before any correction can take place.
INCORRECT SOURCE DATA
If a capture error cannot be corrected as a result of incorrect source data (e.g. the product code on the order form is incorrect):
1.
The system must delete the rejected transaction and transfer it to a error suspense file.
2.
An electronic report of all rejected transactions (together with the control report) must be generated by the computer.
3.
After investigation of computer generated reports, the person who capturers the entries:
Must investigate all rejected transactions and the send the order form back to the individual who prepared it for correction of the error.
Ensure that the returned documents are recorded in the error register, and
Take the rejected transactions into consideration for reconciliation of control totals.
4.
After the source document is corrected by the user, it is returned to the person who captures the entries. The capturer makes the necessary corrections
on the order present on the error-suspense file.
5.
The corrected document is then re-entered.
and must again be subjected to relevant input and validation controls.
6.
The error-suspense file must be reviewed by management on a regular basis, to ensure that errors are investigated and corrected on a timely basis.
THE PERFECT SYSTEM – INPUT CONTROLS
-
Before input the responsible input official should check each input form for approval by the head of the salary department who signed the form
The input official needs to be trained properly
Input forms need to be properly developed and pre-numbered
Screen format
Standard format – and layout, the screen format should agree with the format of the input form
The screen must be user-friendly to simplify the input process and to reduce the risk of errors
When a personnel number is entered it should appear on the screen together with the information already in the master file so that the input
official can compare the existing information and changes entered (descriptive echo test/visual verification)
Minimum data must be captured and drop down menus are used
Compulsory fields to be completed before capturing can continue
Computer dialog (prompting)
Computer guides user through the input process
Sequential numbers
Programme computer to check sequential numbering and identify missing numbers and record it on error log
Data control group must also frequently review the numerical sequence of order form numbers as part of their review of transaction lists
Programmed validation tests:
Sign test: some fields may only be positive and not contain negative values (eg. Quantity entered must be positive)
Alpha numeric/alphabetic: to determine whether input field contain the correct combination of alphabetic and/or numeric characters eg. The
supplier code may only contain alphabetical characters and the inventory code, only numeric characters
Field size text (field length): To test whether each field consist of the correct number of characters
Limit test: Eg. A general/specific upper limit can be placed on the quality field and therefore order size is only allowed between predetermined
limits
Related data/matching test: Eg. When a product code is entered the system compares it with the reorder report to confirm that it did appear
on it
Validity test: eg. The inventory code entered, is compared with a pre-programmed list of inventory codes and approved suppliers
Reasonableness test: eg the reasonability of the quantity inventory order should be confirmed by the computer doing a calculation based on
the sales in the past and comparing it with the quantity that was entered. Only a predetermined percentage variance is allowed
Completeness test (compulsory fields): Eg. A test must be performed to ensure that all characters and fields are entered
Descriptive data-echo tests (visual verification)
The information that is entered by the input operator is used by the system to retrieve descriptive information from the master file and to echo
it back to the operator (display on screen) so that the accuracy of input field can be confirmed
Eg. When a supplier – and inventory code is entered the details of the supplier and description of inventory appears on the screen
An exception report of inventory items less than reorder level with no orders in a pending file must be pulled to identify any orders not entered
PROCESSING CONTROLS:
General controls
–
Access controls: authorisation through passwords and usernames
–
Segregation of Duties
–
Backup copies prior to processing
Correct versions of program & file
–
Librarian: program (authority and responsibility)
–
File labelling: internal & external
–
Job scheduling
â—¦
Run-to-run checks: i.e. the closing of one column is opening balance of the next column
Control total reconciliation
–
Control reports: computer: these are totals calculated after processing a range of data to ensure the total before processing took place
agrees with the total after processing took place.
–
The control totals calculated within the preparation of xxx register/ document, should be reconciled to control totals calculated after
the processing thereof inter alia:
Batch processing [NB!] [completeness]:
–
–
–
•
Financial fields: the total of the financial field summed (give example based on scenario e.g., gross salaries)
Hash totals: this is the total of (give example based on scenario e.g. bank account number)
Record counts (give example based on scenario e.g. number of employees)
Calculate the input and compare with processed totals
File balancing (shadow balances) [completeness]
–
Balance (number of items) on captured, amended and stored in an independent file
–
A control total of the master file should be maintained on an independent file and updated with the transaction data. After the
processing cycle, it should be compared to the master file total.
Controls during processing
Identification of data errors
â–ª Sequence test: sequential numbering of documents
â–ª Comparisons: invoice will not be processed until a goods received note is received
Identification of processing errors
–
Validation tests: refer to validation tests above: use one or two examples: ensure they are relevant to the scenario
–
Mathematical accuracy tests
–
Duplicate calculation
–
Reversed multiplication and division
–
Cross casting
–
Reasonability tests (i.e. the limit test for items on hand)
–
Log, review, investigate
Control reports
Error and exception reports
–
Possible errors (incl. unusual items) â–ª Data controls – review of reports
–
Batch processing controls: (Controls to process a batch of documents i.e. Invoices)
APPLICATION CONTROLS RELATING TO THE PROCESSING WHEN THE PDF INVOICES ARE GENERATED
The control totals (batch register totals) calculated while preparation of the batch register should be reconciled to control totals calculated after processing
thereof, inter alia:
â—¦
Financial fields, such total amount invoiced;
â—¦
‘Hash totals’, such as debtors account numbers, reference numbers, cellphone numbers; and
â—¦
Record counts, such as number of debtors.
File balancing (shadow balances): A control total of the debtors’ master file should be maintained on an independent file and updated with the transaction data.
After the processing cycle it should be compared to the debtors’ master file’s total.
Run-to-run totals must be calculated and reviewed by the system.
Programmed edit/validation tests must be recorded by the system to:
detect data errors (e.g. sequence tests, paring tests or record comparison tests).
detect processing errors (e.g. any valid examples of validation tests, mathematical accuracy tests or reasonableness test).
The software should detect any missing invoices by:
A file sequence investigation: where they investigate whether the invoice reference numbers of one transaction file follows on the previous file; and
perform a completeness tests during the processing of information to identify missing invoice reference numbers.
The console log should regularly be checked by the data control group (e.g. after each run) to identify any processing disruptions and should investigate it.
The reports and logs listed below, should timeously be reviewed and followed up by data control (e.g. for unusual or duplicated items).
Control reports (e.g. control register, total amount invoiced).
Exception reports (e.g. large fluctuations or declines in debtors balances, payments in excess of a predetermined amount) and
Error reports (e.g. debtors’ with credit balances, missing cellphone numbers, unusually cellphone numbers) generated by the system to identify any possible
errors.
BATCH INPUT CONTROLS TABLE
The batch relates to a specified period (I.e. one week)
Fixed batch size
Unique batch number (For each period)
Control totals (see explanation above) à Financial total, Hash totals, Record count
Batch transmittal ticket (pre- printed, pre-numbered document, signed x2 – requesting that the batch be processed)
Batch register (Relevant details: Batch number; time period batch relates to ; person who processed batch→Fill in every batch processed on
the register = Audit trail)
Batch header record
Different methods of Batch processing
Batch entry and batch processing
â–ª Transactions (source doc) are collected into bundles, â–ª Entered and processed in bundles
â–ª Master-file is updated at a later stage
On-line entry,batch processing
â–ª Data is entered directly onto the system via a terminal â–ª Authorise and process to transaction file
â–ª Master file is updated later
On-line entry, real-time processing
â–ª Data is entered directly, linked to accounting system
ADDITIONAL BATCH INPUT CONTROLS
If a batch system is used while capturing data, the input controls discussed above apply but must be supplemented with additional
controls over the batching process
Input controls
After a period (eg. A day) all the transactions recorded on hardcopy must be placed into manageable
batches
Each batch must have a unique number
The sequential numbers must be reviewed and control total must be calculated
The batch can then be captured (input controls apply)
Control tables
-
Once grouped into batches, specific control tables must be calculated
Financial totals: Eg. Total value of all sales
Hash totals: Eg. Total of all documents included in batch
Record counts: Eg. Number of documents in the batch
These calculated totals will be compared to the totals generated by the system
The transaction will only be authorised if totals agree
Batch control sheets
-
-
After preparing a batch and control tables a batch control sheet is prepared
This contains a unique batch number, control totals and descriptions of all transactions
A second staff member must:
•
Review the batch
•
Recalculate the control total
•
Ensure all transactions occur in the period
•
Sign as proof
After capturing the batch, a batch control report is printed as proof that all totals were compared
-
Contains information on the batch and tracks the movement of batch documents being processed
The preparer then gives the batches to the data capturer
A batch register is kept and initialled by person taking responsibility for the batch
A batch error report generated must be reviewed and corrected
Batch register
THE PERFECT SYSTEM – BATCH CONTROLS
The debtor’s clerk should review the sequential numbers (unique batch numbers) of the delivery notes before creating a batch.
The batch should be reviewed to ensure that it only contains the two days’ transactions and no other days.
The debtor’s clerk should perform the following procedure with preparation of the batch:
›
Calculate control totals, e.g. the total of all sales.
›
Calculate hash totals, e.g. total of all the document numbers added.
›
Calculate the amount of documents which are included in the batch.
There should be a batch control sheet attached to the batch, which contains all the above mentioned information as well as a batch name/number.
A batch register should be kept up to date which contains all the information of the batch, as shown on the control sheet.
The debtors clerk should sign the batch control sheet and register as proof that the reconciliation has been done.
An independent person should often review and recalculate the totals and sign the as proof that the control was indeed performed.
The control totals should be entered, in order for the computer to compare the totals that was entered with the totals it calculated.
The computer should then print out a batch control report as proof that the totals were compared; this is then filed with the batch control sheet.
If the totals do not agree, the entries should be reviewed for accuracy.
The system may only authorise the transaction file for processing if the control totals agree.
A report with rejected transactions / errors should be generated and reviewed in order to correct errors.
Test data to test application controls in “sales order system”
TEST DATA USED IN THE AUDIT OF THE SALES SYSTEM
STEPS TO TAKE DURING THE DEVELOPMENT AND UTILISATION OF TEST DATA
Define the objective of the test that would be performed.
and specify the controls which are to be tested.
For example: All sales are recorded and calculated
accurately. All sales are made to authorised
customers and the account details submitted are
valid
Alternatively, a understanding of the system must be obtained or the system must be
documented
For example: Validation controls: Alphanumeric test,
field length test et cetera
1
Develop the test data, containing the following:
•
The test data should include valid and invalid data using
2
•
•
The test data should include all types of data and possible transactions
The test data should be processed independently of the clients’ system, as to
obtain a pre-determined correct processing result, which will be used to evaluate
the results of the test data against.
Process the test data on the client’s system.
3
for example the following fields: customer number,
inventory numbers et cetera.
for example an order should be entered twice.
For example, control totals of invoices, calculated
totals on invoices.
Compare the results from the test data ran on the client’s system with that of the predetermined results.
Remove the test data from the clients system.
4
For example, transaction logs of every sales order
entry, breakdowns of back-orders, order suspense
accounts
à Note that the test data would either be processed correctly or either rejected or be
reflected on exception reports (i.o.w. evaluate the outcome of the tests).
Conclude on whether the controls within the client’s system operated effectively.
5
6
Evaluate the general controls to ensure that the system you have tested functioned within
a controlled environment and functioned without unauthorised amendment throughout the
period under review
7
Report on the effective operations of the controls.
Risks associated with using test data
RISKS
•
•
•
•
•
•
•
The same program or version of the program must be used throughout the year.
The element of surprise must not be lost.
Corruption of live data (and risk of viruses) must be limited.
System may “crash”.
Unauthorised changes to or overrides of the system must be identified.
As so far possible, all possible situations and programmed controls need to be tested.
It may be difficult to remove the data from the system.
Examples of specific types of test data to run on the client’s system.
Include orders
for the
following
customer
account
numbers:
Include orders
with the
following
quantities:
alpha and numeric characters
numeric data < 6 digits
numeric data > 6 digits
blank
valid (correct and incorrect) account numbers
Include orders with
the following
inventory codes:
alpha and numeric characters
negative quantities
excessive quantities exceeding a predetermined
amount
quantities where there is no inventory on hand
Include orders
where:
alpha and numeric characters
numeric data < 5 digits
numeric data > 5 digits
numeric data of 5 digits > 69999 and < 10000
blank inventory numbers
valid inventory numbers
the extension = R 10 000
the extension is < R 10 000
the extension is > R 10 000 and the release code is valid,
negative, contains too few or too many digits, is inside
and outside of the valid range.
Masterfile Changes
–
–
–
–
Stores standing information and balance totals
With master file amendments ensure only valid changes are mad and that processing is complete and accurate
Additional controls are required for validity, accuracy and completeness as these changes are outside the normal process
The balancing of the master file must agree to the general ledger (file balancing)
NB The difference between Masterfile Changes and Program Changes:
- A program change falls under general controls and Masterfile changes fall under application controls
- Program change: a change within a specific program
- Master File change: a change to standing information that is part of the transaction cycle i.e. inventory prices, credit limits
Master File change: has NO effect on the IT system or the program.
Example:
Interest is levied on debtors outstanding for longer than 30 days
à The Program must change to automatically levy interest on any debtor outstanding for longer than 30 days: Program Change
Early settlement discount for debtors who pay early
àYou would only know a debtor qualifies for early settlement discount once they pay early: therefore, the debtor’s master file must change once they paid.
Masterfile Change
TRANSACTION FILE vs MASTERFILE
Transaction file
•
A transaction file is used to store data in a batch processing system
•
until such time that the system processes the data and then the information is used to update the masterfile.
Masterfile
•
Is used to store permanent information (e.g. Name and address, codes, etc.)
•
Masterfile also stores the information and cumulative totals of all transactions as it was entered and processed by the system from
the transaction file.
TRANSACTION FILE
Information on individual transactions
Used to update master file
MASTERFILE
Store: standing information and balance totals
Eg. Inventory list – code, supplier, cost price, quantities…
UPDATING (ADDITION)
Updating transaction data from transaction files
(sales, payments, bad debts, credit notes)
Updating controls under processing
CHANGES (AMENDMENT)
Changes to existing data (new inventory items, addresses, telephone
numbers)
Mostly changes to non-financial data but can also include financial date
(cedit limit)
Recommendations of controls to address the weakness regarding the updating of the creditors master file of Jambo (Pty) Ltd
UPDATING MASTER FILE
To detect errors during the update of the master file we recommend the following controls:
The control totals calculated after the update of the transaction data must be reconciled with control totals recalculated (by hand or by computer).
The control total of the master file, which must be updated with the transaction data on an independent file, must be compared with the updated total of the
(actual) master file. Differences must be investigated (file balancing).
The console log of processing (automatically updated by system) must be reviewed on a regular basis to identify any errors.
The user or operator must inspect the output and control reports for any errors or duplicated items.
Errors must be reported on an automatically generated exception report.
All the above-mentioned computer generated reports must be reviewed and investigated by a responsible person.
General controls
•
•
•
•
•
•
•
Access controls: NB logical (username and password) and physical (only one person can access terminal to make changes)
Levels of authorisation: only authorised person can make changes
SOD: the person requesting the change is not the same person making the change
Backup before processing (Relevant back-up controls)
Written request by users
List of requests must be kept
Written authorisation by senior staff
•
NB A Master File Amendment (MFA) form should be filled:
Details on the document:
–
Pre-printed, pre-numbered
–
User must clearly request the Masterfile change and sign
–
Once Masterfile has been amended: the person who processed the change should indicate it has been performed on the MFA form
Input controls
•
Validation tests: Refer to validation tests under input
- Important that validation tests relate to the scenario: name test; explain and give an example Log, review, investigate
•
Clear audit trail
Register of changes
Sequential numbers (sequence check)
Limited access to amend (read-only rights)
Review regularly
–
Control report: summary of changes
–
Exception report: unusual changes (NB the same rules that apply to a log applies to an exception report
Management controls
–
MF changes reconcile with MFA forms
–
MF regularly reviewed
–
Reconciliations: MF and general ledger balances
–
Independent confirmation Corrections
Always mention these for a Masterfile change:
REQUESTS
P
Any amendment to the master file information must be requested in writing on a pre-numbered form.
A
Any amendment (existing or additions) to the master file information must first be approved in writing by a manager
N
The number sequence of the scan’s must be checked
A manual register of all changes should be maintained
I
The amendments may only be made by a designated responsible person (who is independent of daily transactions such as for
example the manager)
The amendments may only be made by an independent responsible person such as for example the shift manager
C
The input of amendments must be restricted to one/ a specific computer that is safeguarded on a designated PC with a unique
IP address
ACCESS
S
P
A
REVIEW
R
The one/specific computer used for the changes should be stored securely at the home of the individual concerned.
A password/PIN must be required before master file information may be amended.
Otherwise an authorisation matrix may be used to restrict access to the module
Control reports (or a summary of changes to the master file) must be reviewed regularly by the manager or owner in order to
identify any unusual or unauthorised adjustments which must be investigated
The report must be reviewed by the manager or owner in order to identify any unauthorised adjustments. Any unusual or
unauthorised changes must be investigated
E
Exception reports of any unusual changes (e.g. changes to products in categories of inventory that are not considered essential)
must be reviewed by the manager and investigated if necessary
P
The manager should print a report of all amendments on a regular basis (or automatically by computer).
RECONCILIATION
C
The report of changes to the master file (above) should also be compared with the authorised supporting amendments’
documentation (prenumbered form or manual register).
DEBTORS MASTER FILE CHANGES QUESTION FORMAT
•
FORM: Master file change request forms must be used for all changes (new debtors, deletion of debtors, changes to debtor data
Be pre-numbered
Must be approved and initialled by senior person (for example credit checker)
•
SOD: Person inputting master file changes must be independent of the debtor department (users).
•
ACCESS: Logical access controls must be used to restrict input of master file changes to authorised staff.
ú
To combine authorising matrixes restricting rights by usernames, passwords and terminal IDs
•
INPUT: Input controls, such as programmed validation tests and user-friendly screen format must be in use to prevent input errors.
•
SYSTEM LOGS: System must automatically keep up a pre-numbered register of amendments made, including:
Details of changes
Username of person inputted data
Date and time
•
SYSTEM LOGS: Read only rights must be granted to the master file changes register and the rights must be restricted to management and senior staff
•
SYSTEM LOGS: The register of changes must be reviewed on a regular basis by a senior responsible person,
to ensure that:
All changes are supported by an authorised request form;
Changes entered agree with the request form
Authorised individuals only entered the master file changes.
•
MANAGEMENT REVIEW: To identify any obvious errors made during capturing, or any unauthorised changes made, the following must be performed
on a regular basis:
Senior staff (eg. Credit manager) should review the debtor master file
The debtor master file total should (monthly) be reconciled to the balance of the debtor control account in general ledger
•
Exception reports: (for example unusual changes or exceeding limits) should be generated and reviewed by senior staff member timely
•
Backup copies of master files must be made before updating the change requests
OUTPUT CONTROLS:
•
•
Output refers to the distribution of data from where it is stored to where it is viewed or restored into an electronic format to be
viewed
Output must be prepared accurately and completely, in a appropriate format and only be distributed to specific individuals
General controls
•
•
•
Allocate responsibility
Access controls à On-screen viewing rights
Policies must be written
–
Distribution schedule: which outputs must be printed, when, how often?
–
Distribution list: who is authorised to receive reports?
–
Receipt/distribution
•
Data control group
–
Sign distribution ledger for receipt
–
User reviews output on receipt
•
Log, review, investigate
–
Brief review before distribution
–
Reconcile output controls totals with input
–
Sequential report numbers
–
Series test of page numbers
–
Messages such as “end of report”, “not applicable”
–
There should be no blank pages
–
Reconcile: distribution list and schedule
–
Allocate responsibility to someone in data control group
•
Corrections
–
Error registers maintained
Risks:
•
•
•
Distribution to unauthorised persons
output incomplete or inaccurate
does not agree with resulting processing
Relevant to all application controls
Input controls
o Manual controls (e.g., stationary), access controls
o V – Access ctrl, authorisation, SOD & staffing matters
o A – Validation, key checks & edit checks
o A – Screen & document design
o A – automatic processing & generated transactions
o C – Recons, sequence checks, audit trials, hash totals & error correction
Processing controls
o V – Access ctrl, file labels, version control
o A – Validation & edit checks, ctrl totals, audit trials & break points o C – Breakpoints, run-to-run totals, limited process runs & recons
Master file controls
o Input (above), librarian (NB) & conversion ctrl
Output controls
o VAC – Distribution, stationary & review
THE PERFECT SYSTEM – OUTPUT CONTROLS
Controls to ensure that printouts do not end up with unauthorised persons
} There should be clear written procedures within the entity on how all printouts should be handled, for example which may be printed and how
often.
} A person should be appointed by head office to accept responsibility for the distribution of printouts.
} A written distribution list must be prepared to outline clearly who is authorised to receive printouts.
} The data control group must responsible for the distribution of the reports and printouts.
} A distribution/dispatch register, outlining each person who receives a printout must be maintained and must be signed as evidence of receipt.
} A senior person should regularly review and compare the signed distribution register and distribution list to detect any unauthorised distribution
of printouts.
} Restricted or controlled access must be implemented over printers where the printouts are produced.
} There should be fixed procedures to prevent unauthorised persons obtaining the reports and other printouts after use.
} Management should for example lock it away in a cupboard or shred it after use.
THEORY QUESTIONS
Explain in your own words how computer controls fit into the general framework of internal control and what the difference is between
general controls and application controls
â—¦
â—¦
â—¦
â—¦
â—¦
Computer controls form part of the overall framework of internal controls and serve as an addition to the controls of the manual system
The controls of a manual system and a computer system all work together to achieve the same control objectives (validation,
completeness and accuracy).
General controls are controls that are applicable to the overall computer environment.
Application controls are applicable to specific transactions.
Application controls are only sufficient if good general controls are also in place.
additional organisational controls, as well as good staff practices that Tannie Rosi Ltd should implement within the CIS-department.
ORGANISATIONAL CONTROLS TO BE IMPLEMENTED
•
There should be a Computer Steering Committee (CSC) that, amongst others, consists of CIS-manager and representatives of all user
divisions (managers). The CSC must serve as communication channel between the CIS- department and users.
•
The CSC is responsible for
â—¦
long-term planning of CIS-department;
â—¦
setting system development and operating standards; and approval of requests.
•
•
•
•
The CIS-department (management) should directly report to top management and the CSC.
A CIS-director must be appointed who is solely responsible for the CIS, with no other responsibilities.
The CIS-manager (in conjunction with the CSC) should compile written personnel practices and manuals.
Manuals should be freely available and practices should be reviewed regularly.
•
Manuals must provide detailed guidelines, including:
â—¦
formal job description for all IS staff; and
â—¦
clear organisational structure and reporting guidelines.
•
The CIS-department must be divided into 'areas and functions’, with clear differentiation between the two, e.g. Development, Operation,
Data control, Security.
Each subsection ('area) must only perform the function assigned to them.
•
•
•
•
•
•
•
There must be clear segregation between the user-department and CIS-department.
Duties must be rotated frequently in order to allow for cross training and to prevent boredom, but segregation of duties and knowledge
must however be kept in mind when rotation of duties take place.
Scheduling of personnel must take place. Persons must be allocated to specific tasks/projects.
Continuous monitoring of compliance with prescribed procedures and scheduling by CIS personnel must be performed frequently and
performed by persons independent from the CIS-department (e.g. internal audit).
Continuous evaluation of work performed by personnel, must take place, e.g. the volume and quality of work performed, etc.
Ongoing training should be provided to personnel. They must attend appropriate courses, seminars, etc.
RISKS ARISING FROM LACK OF ORGANISATIONAL CONTROLS
•
•
•
•
•
There is an increased risk of unauthorised transactions being initiated by unauthorised employees.
Lack of segregation of duties may lead to unauthorised transactions be initiated and executed.
Collusion between employees could lead to possible fraud and theft.
Errors may go undetected due lack of sufficient independent review.
Incompetent employees may be employed or as a result of lack of training employees may be unequipped to do their job leading to
fraud or errors.
FACTORS: increase the risk for errors & irregularities in a computer information system compared to manual system
•
There is a lack of a decent audit trail or a significant limitation thereon.
•
It is more difficult to ensure that there is segregation of duties, seeing that tasks that was previously performed by more than one
person is now performed by only one person in a computer environment.
•
The personnel that is available might not have the necessary skills that is required in a computer environment and mistakes can in
this type of environment have far more serious consequences than in a hand system.
•
Persons may gain unauthorised access and make changes, without there being any evidence showing it.
•
A decrease in human involvement decreases the possibility that errors and irregularities can be located/ identified.
•
Errors in the design of the system may go undetected for a long period because users does not understand the system and it can
also be misused by people that know the system well.
•
As a result of the standard design of the computer system it will cause errors that exists in the system will be repeated in all
transactions.
Difference between transaction file vs Masterfile
Transaction file
•
A transaction file is used to store data in a batch processing system
•
until such time that the system processes the data and then the information is used to update the masterfile.
Masterfile
•
Is used to store permanent information (e.g. Name and address, codes, etc.)
•
Masterfile also stores the information and cumulative totals of all transactions as it was entered and processed by the system from
the transaction file.
GENERAL CONTROLS
GENERAL CONTROLS – WEAKNESSES
WEAKNESSES
MOTIVATION
ACCESS TO EDP SECTION
Admission to the EDP section is not appropriately controlled. The controls
which are in place are not functioning effectively.
•
•
•
The tea lady is free enter and leave the EDP section. She also
allows other persons (myself) to enter; or
During a weekend David and friends are allowed entrance into
the EDP section and the system without Maxwell’s knowledge;
and
Maxwell makes his password available to others by means of a
note on his door.
In addition to conducting interviews by the EDP manager, it would appear
that there is a lack of formal and proper appointment procedures.
CHANGES TO SYSTEM
The necessity, impact and cost of the changes to the current system have
not been investigated before the conversion commenced.
The program amendment or system development is performed by
unqualified programmers.
It appears that no project managing which includes a project team
preparing the project plan of duties and responsibilities, deadlines and
budgets, etc takes place. Project progress is neither monitored.
•
Charles decides on his own that a new system must be
implemented and commences with the process.
•
David who is currently busy studying is responsible for the
development of the new system.
•
David is solely responsible for the development of the new
system and Maxwell is not allowed to interfere and to let
David to do his thing.
Requests for program changes occur telephonically - there is no written
authorization or an independent investigation into the need, cost, etc. of
such changes.
•
SYSTEM DEVELOPMENT
No multi-level involvement in the system development and change process
where all parties can give inputs or submit needs or specifications. Detail
specifications are not prepared.
•
•
•
Charles decided on his own that a new inventory system must
be designed and
David only consults with Charles and a couple of members of
the data-processing staff before he proceeds with the
development of the new system, and
David only makes short notes of the system requirements
following his discussions.
The programmer design and test new systems and programming changes.
There is clearly a lack of a formal system development methodology which
pinned separated duties and responsibilities.
System specifications are not formally approved before development of the
new system takes place.
•
David prepares the specifications and immediately commences
with the design of the system.
There is no sustained segregation between the programming function and
operation of the computer.
•
David is involved in both programming and the operation of
the computer, during the holidays.
It appears that adequate testing of the new system where all parties have
been involved, did not take place before the implementation of the new
system.
The control clerk is not running procedures / tests / controls on the data
received for import, processing process itself and the results of processing
(export documentation).
No formal approval takes place before implementation of the
system/changes.
•
David designs and implements a system that clearly does not
work – information is lost and staff has no access to
information.
•
David decides, on his own, that the system is ready for
implementation and implements the new system over a
weekend without Maxwell’s knowledge.
Changes are made directly on the live system (no test copy) and there is no
control over the conversion process from the old to the new system to
ensure proper conversion.
•
A large amount of data on the inventory files are lost during
the conversion process and will have to be reconstructed and
users can not obtain access to the inventory information.
•
PHYSICAL CONTROLS
No control exist over the magnetic tapes for example by keeping them safe
in a library.
•
•
During a weekend, David and friends unknowingly obtained
admission to it; or
Magnetic tapes lie around in the computer room.
It appears that the library function occurs informally the librarian walked
through the entire section and collect all discs. There is a lack of formal
authority and control over the issuing and receiving back of data files
Insufficient housekeeping controls in the computer room.
•
Magnetic tapes, tomato sauce, chips and bottles lie around in
the computer room.
The company does not use internal file labels.
•
There is no formal recovery plan and procedures.
•
External file labels have been taken away and problems arise
when tapes have to be identified – a long and slow process is
expected.
System problems are experienced and staff members “have no
idea what to do”.
BACK-UPS
It does not appear that regular back-up copies are made and kept safe.
•
Maxwell feels that the reconstruction of lost data might take
months and might even be impossible.
SEPARATION OF FUNCTIONS
Programming and systems analysis: Bud Spender, the programmer is
responsible for systems analysis functions, namely the preparation of
system specifications, writing and updating manuals and program
documentation.
There seems to be no clear distinction between system and application
programming.
Control of data and documentation and programming: The librarian also
acts as assistant programmer.
It seems that keep the librarian only keeps data files and not the other
software (application and system software) and system documentation of
Cowboys and Crooks.
It appears that the library function occurs informally the librarian walked
through the entire section and collect all discs. There is a lack of formal
authority and control over the issuing and receiving back of data files.
weakness
Program and data file
security
No controls to ensure
that only tested and
approved versions of
programs are executed
against ‘live’ data files
Backup and Recovery
controls
Lack of formalised backup
procedures
•
•
•
•
•
•
•
•
•
•
•
recommendation
An independent staff member must play the role of librarian and manage version control, e.g. numbering
different versions.
A register / logbook should be maintained by the librarian and all programs issued should also be
recorded (with details) in it. (manual control)
The librarian should be responsible to monitor the correct issuance and use of programs versions.
External and internal file labels should be made use of.
The internal file label should be checked by the program (or the program should force operator to check
it visually) to ensure that the correct version is running.
Backup procedures should be formalised and clearly documented;
including a schedule of backups to be made, by whom and how often etc..
Overall responsibility should be assigned to a responsible and competent individual (e.g. the librarian).
The backup copies should be kept in safe custody, preferably off site.
Recovery from backup copy of data to be subjected to regular testing.
Company should have access to alternative / backup processing facilities (hardware, power, etc) in the
event of emergency.
PROGRAMME CHANGE
WEAKNESSES IN THE GENERAL CONTROLS SURROUNDING CHANGES TO APPLICATION SOFTWARE / PROGRAMME CHANGES
•
Requests for program changes are not documented on pre-numbered, pre-printed change request forms.
•
•
•
WhatsApp program change requests are received. There is no pre-numbered written request of program changes.
And therefore no sequence check is performed and no documented approval can be made by management
There is no written request from the users of the departments or accountant for the computer package.
Furthermore, there is no written evidence reviewed by management regarding the investigation.
•
No register or log is maintained for all request forms. Therefore no follow up on program changes or investigations of
unusual requests. (therefore it is not possible to monitor that all requests are followed-up)
•
There is no feasibility study performed for material changes to assess the user requirements, necessity, the costs,
implications of the change etc.
•
The cost of program change requests plays an important role in the authorisation process while no investigation
into the necessity and impact of the changes are done /is the most important consideration), while no needassessment is performed
•
Program change requests are only evaluated and approved by the accountant and not also by (e.g.) the users
department, IS manager and internal audit or CSC
•
•
•
The accountant is responsible for the decision and there is no strategic involvement of management
There is no formal approval from the users or management for the purchasing of the new computer package.
No formal initialling (or signing) as proof of authorisation and approval of program changes (by users, IS staff etc).
•
No optimal segregation of duties if estimated costs >R10,000 – since the financial director submits and approves
the request
•
The segregation of duties in this process is insufficient and there is no multi-level involvement in each stage of
purchasing. Only the accountant is involved in each step of the implementation.
•
The competence of the service provider was not evaluated at all
–
No project plan, which sets out the process of how and when the new package will be implemented, was compiled
and approved
The conversion was not planned beforehand and there is no timetable for when which departments will do the
conversion. It was done on a weekend
No program change standards are in place.
Request for
authorisation
•
Planning
•
•
•
•
•
No procedures to monitor the compliance thereof.
Only the accountant drafts the requirement specifications (possibly may not have all the necessary technical
knowledge) and there is no investigation made to obtain the needs of all the users relating to the program changes
There is no multiple-level approval of the provisional design of the system/program change (in other words, before
the development thereof).
•
•
There is no written approval of the program after changes before implementation.
•
There are no access controls to ensure that program changes are made to a copy of the program and do not affect the
live data or live program.
•
The programmer makes the changes to a copy of the relevant program placed in the production area – thus not to
a copy of the program stored in the test (or development) area of the library. (risks: wrong version of program is
changed / changes are not made to the ‘current’ version)
•
There is no independent person which supervises as librarian and no-one keeps record of the issue of programs
and the copying thereof.
•
By using the accountant’s password, the programmer gains access to all files on the server. (risk of unauthorised
access to confidential information and changes to files high).
•
Programmer also works after-hours (with full access) without supervision.
Development
•
Insufficient program change documentation is maintained. No copies of test data, data definitions, specifications,
etc are kept. It is necessary for the operation of the system and any future changes.
•
Proper system testing does not take place, only the processing logic of the program is tested after the program
changes.
•
No testing is done on a test version of the program to ensure that the program changes can be implemented.
•
Testing of the program changes are not performed by all parties involved / concerned, but only by the accountant
and the programmer. (Increases risk that not all errors will be identified before implementation.)
•
There is no multi-level formal approval of changes before implementation thereof.(users, independent IS staff and
internal audit also do not give approval)
•
There is no multi-level involvement or formal approval of the program changes.
Before development, based on feasibility study.
After testing, but before implementing the changes.
There is no reconciliation between program changes authorised and program changes made.
There are no pre-determined standards when performing program changes.
There is no back-up made before implementation of the updated program.
•
Only direct implementation is carried out (because previous version of program is stopped immediately) which may
not in all situations be the best implementation choice.
•
Implementation is not planned and coordinated with the user departments.
•
The program changes are implemented at a time when normal operations of the business could be disrupted.
•
There is no training of system users after program changes have been implemented.
•
The system documentation is not updated to include the changes made to the existing program and no documentation
is prepared to document the changes made.
•
No formalised procedures to ensure back-up copies of the different versions of software are filed in the program
library.
No formal procedures to ensure all system and users documentation are properly updated.
•
Implementation
•
There are no procedures according to which the program changes that are made – according to the version control
list – are reviewed with the program request forms.
•
A unique password was not allocated to each programmer. By the use of CIS’s password the programmers gain
access to all the files
There are no formalised procedures to ensure that copy of the different versions of software is kept in the program
library.
Changes are not put into effect by programmers or the IT division but by the users of the system who have access to be
able to make changes to the system.
•
•
There is no proper control over the conversion of data from a manual system to Pastel. The accountant simply
transferred the balances from the manual system to Pastel with no supervision during the conversion.
There are no controls in place to ensure that the manual balances were closed off properly. No controls were performed
on the data of the manual system to ensure that the data is complete, accurate and valid before the conversion was
done:
â—¦
Financial transactions were not closed off, e.g. the recording of cost of sales in a periodic inventory system
â—¦
A stock take was not done to ensure that the value of the inventory according to the manual system was
correct
â—¦
The number of records in the manual system (accounts, inventory and debtors’ codes, etc.) was not counted
â—¦
Data of various departments in the manual system was not signed off as accurate and complete
•
•
•
•
The package was implemented directly (the manual system was stopped immediately) which was possibly not the
correct method of conversion
No testing was done on Pastel after the conversion to ensure that the package:
â—¦
functions correctly, as expected and
â—¦
meets the needs of the users.
Users did not approve the package before implementation thereof.
Reconciliation
after
conversion
After the conversion the processing continued on Pastel, without performing any of the following reconciliations
between the manual system and the accounts on Pastel:
â—¦
Reconciliation of balances were not done to ensure that they correspond
â—¦
Reconciliation of number of records (accounts, inventory and debtors’ codes, etc.) was not done to ensure
that all the balances was brought forward from the manual system to Pastel
•
Reconciliation of balances and data on Pastel was not compared with external sources, e.g. the bank balance or the
stock take
•
Exception reports (e.g. incorrect balances, number of records, negative amounts) were not reviewed to solve and
resolve problems picked up during reconciliation and testing.
Postimplementation
reviews
•
No post-implementation review is performed e.g. over the processing of the changed system to ensure that, all
users requirements and needs are met and the program is operating as required.
Training
•
Staff were not trained to use Pastel
Recommend additional controls or procedures that to follow during the conversion to the new computerised cost management system
SYSTEM CONVERSION
The conversion must be planned, with time tables for dates and times by which different task must be performed.
Data conversion: the standing data of the previous manual system must be prepared in electronic files for the computerised costing system.
The data control group from the information system division must take control of the conversion.
A senior member of management must also be appointed to supervise the data conversion project.
Before data conversion starts, controls must be performed to ensure that the data on the old system is complete, accurate and valid, e.g. by
reconciliations and recalculations.
Training users:
â—¦
Sufficient training must be provided to all users in order to ensure that everyone is familiar with the use of the new system.
â—¦
User manuals must also be prepared.
Documentation: System documentation, e.g. flow charts, descriptions, operator manuals, must be prepared or updated.
Implementation:
â—¦
Implementation must take place under the supervision of a senior responsible person.
Implementation of the new system must be executed in an appropriate manner- for example, parallel testing where the old and new systems
run simultaneously and comparing the results
Controls to ensure appropriate system development process
CONTROLS TO ENSURE AN APPROPRIATE SYSTEM DEVELOPMENT PROCESS
•
There must be written standard procedures set out within the system development methodology to cover the procedures concerning the
planning, development and implementation of the systems.
•
Project management must be implemented. A project team must be appointed to prepare a project plan. The project plan must inter alia
contain the size of the project, the jobs and responsibilities of specific persons and a time budget. The project team is responsible to control and
manage the project and to monitor the progress of the project
•
Agreement must be reached regarding the standards of programming, for example the terminology, abbreviations, symbols etc that will be
utilised during the system development process.
•
Multi-level involvement of the users of the system, the CIS staff, management and the auditor in the system development process is necessary.
Each of these parties has different and unique needs concerning the system and must draft the specifications for the system.
•
The specifications for the system as mentioned above must before development be reviewed and approved by all parties concerned.
•
After the development of the system but before implementation, the system must be properly tested in a test environment. It should be
determined whether the system contains sufficient controls and complies with all the pre-determined specifications.
There are 5 levels of testing, namely:
program test:
string/series test:
system test/joint
existence tests:
pilot test:
parallel test:
where the processing logic of each program is tested separately and is tested whether the program will handle all situations
correctly;
where the series related programs are tested to ensure whether data is correctly transferred from the one program to next
test whether all the programs in the system are working jointly together by using simulated data
where the actual transactions are processed through the new system and the results compared with those of the present
system
where the old and the new computer system are used for a period in parallel and when the results after this period are
compared with one anothe
After testing the system properly but before implementing it, all parties involved with the development process, must approve the system finally in
writing.
Proper documentation concerning the proper operation of the system must be maintained.
Risks to consider with the development of a new system
•
•
•
•
•
•
•
•
•
The cost of the development may become out of control.
The new design of the system might not meet the needs & requirements of the users of the system.
There may be errors (not compatible) in the new system that could make the day to day use of the system very difficult.
Important accounting principles and calculations may be wrongly integrated into the new computer system.
The new system could possibly not have enough controls in place to ensure the integrity of the data at all times
Risk exists that the new system could be difficult to understand and not user friendly and can lead to errors.
Problems can arise with the integration between the new and the existing system.
The risk exist that transfer of information between systems may result in data being lost, incorrectly transferred or duplicated.
The risk exists that it will be difficult to understand for its users and not user friendly.
Advantages to purchasing software off the shelf compared to one developed in house
•
•
•
•
•
•
•
•
When a package is purchased and installed the process normally progresses more quickly, since the system itself needs not be written
(which could be a time- consuming process).
Packages normally have predetermined prices and costs, which means that the process can be less expensive.
A company can consider different packages and decide which one would suit the company's needs best.
Packages are normally properly tested and probably error free in respect of functioning.
The supplier of the package normally builds all the necessary controls into to package.
System documentation normally forms part of the package and the company therefore does not need to write it themselves.
The supplier of the package usually provides the necessary training and support services in respect of the package.
The supplier of the package generally provides updates and new versions of the package, as it becomes available.
Additional access controls that should have been implemented to prevent the break-in and to ensure that the main frame computer of ISpy can only be used for authorised purposes. Your answer must not address personnel matters, nor logical and monitoring controls.
ACCESS CONTROLS (EXCLUDING LOGICAL CONTROLS)
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
There must be a formal documented security policy, distributed to all users, which determines that only authorised staff may have access
and utilise the main frame computer; and
that actions will be take against unauthorised use or access.
This policy should be communicated to all staff members.
Physical access controls that should be in place at the building and the mainframe computer room:
access to room must be restricted through keys/ magnetic card readers/ security guard with a register;
a security guard must be present at the entrance of the building to accompany visitors (iow unauthorised people) through the building.
doors to the venue must always be locked if the computer is not in use, as well as when staff leaves the computer room;
only authorised users must have access to keys for the room and/or should have proper control over registration of magnetic cards;
additional security gates must be installed at the computer room’s entrance;
an alarm with motion sensors must be installed; and
the hardware must be locked when it is not in use (in, for example, a server case) and
there must be no place to insert media devices (such as memory sticks or DVD’s).
The terminal should be located in a highly visible area, where it can not hidden so that unauthorised people, who come close to the
servers, are seen.
All staff should have uniforms and identification cards in order to be clearly identifiable when entering non-public areas (such as the
server room).
Staff should only be allowed to use the computer during operating hours and sign into the main frame computer; otherwise the area
must be locked. Alternatively, a daily work schedule must be prepared.
Every computer must have a terminal code.
Access to the computer room must only be possible during business hours. Access outside of business hours must be managed by the use
of:
â—¦
alarms;
â—¦
security cameras and/or
â—¦
security guards who supervise the use of computers; and
â—¦
received consent beforehand.
ADDITIONAL PREVENTATIVE AND DETECTIVE BUSINESS CONTINUITY CONTROLS TO ENSURE CONTINUITY OF THE IT OPERATION
BUSINESS CONTINUITY FIRE, WATER, ELECTRICITY AND LOSS OF PRODUCTIVITY
Physical environments: Protection against elements:
Fire:
•
•
Construction:
•
Electricity:
•
•
Water:
•
Fire alarms, fire extinguishers, smoke detectors, etc.
Fire alarms, extinguishes (CO2 - not water) and smoke detectors should be installed in the office and close to the
safe
Building’s construction must be solid and it must have long-lasting fireproof walls and floors (limit fires from
spreading).
continuous power supply and emergency generators (stand-by battery).
There should be an uninterrupted power supply (UPS) installed
Cable protection must be implemented, so that cable and equipment can be protected from water damage. CO2
fire extinguishers must be used.
Emergency plan and emergency recovery procedures
PLAN
•
Plan and document an emergency recovery plan, with set procedures relating to the functions and responsibilities in
case of disasters, including break-ins.
•
Test the emergency recovery plan to identify weaknesses and to set out responsibilities of persons involved (or to
set).
Provision should be made to test the plan on a regular basis to identify weaknesses and ensure employees are aware
of their responsibilities.
•
DISASTER
PLAN
•
•
A written business continuity/disaster recovery plan needs to be developed
Widely spread between employees which specifically sets out:
List of data and program files that are key to operations that must be recovered.
A list of documents to be removed from the premises in the event of a disaster.
ALTERNATIVE
FACILITY
•
An alternative processing facility should be considered in the event of a disaster so that operations can continue (an
agreement could be entered into with a service provider.)
•
Provide alternative processing facilities (back-up facilities), for example service organizations, trade partners etc.
Backup copies
â—¦
A formalised backup program must be in place place to state how and when backups are to be made
â—¦
â—¦
The backup copies must be tested frequently
The back-up copies should be regularly tested to identify any weaknesses and to ensure that the back-up responsibilities are allocated
to the correct people.
â—¦
â—¦
â—¦
â—¦
â—¦
â—¦
Regular backups must be made.
A manual back-up register must be maintained. This register must clearly state who needs to make back-up copies and where it must
be saved. (Or an automated backup register must be maintained that links to the timing of the cloud back-ups)
Regular back-up copies must be scheduled (i.e. a fixed schedule should be setup) and made OR backups should be automatically done.
At least three generations of backups should be maintained
Back-ups in this online business should be made more frequently that every 8 weeks, rather daily
Other controls
Sufficient
insurance:
•
Wear & Tear
•
•
Monitoring
•
Contact insurer to revise and update insurance coverage and to update so it covers the following risks: fire, water,
loss of production, et cetera.
Have insurance to mitigate the impact of the loss – profits and physical and logical assets
Regular inspections and maintenance should take place on the computer system to reduce the risk of failure over
time due to wear and tear
Remote monitoring should be implemented.
APPLICATION CONTROLS
Validation tests
Input of goods received
VALIDITY & AUTHORISATION
Validity test
Limit test
Check digit
ACCURACY
Alphabetic/ alphanumeric
test
Numeric character tests
the Purchase order number must be validated with reference to the approved orders in the system
the order form number must be validated with reference to the suspense life
Quantities received (as recorded) may only differ within predetermined limits, for example 0% or 5% with
ordered amounts (to ensure majority of the approved order has been delivered)
on the order form number to check validity
(on the Purchase order number and inventory code field) – only a combination of numerical and alphanumeric characters should be accepted
only a mix of numerical and alpha-numeric characters should be accepted (on the order-form field)
test (on the quantity received field) - only numerical characters should be accepted
Sign test
COMPLETENESS
Field length test / field size
tests (eg. ID no)
negative amounts should not be accepted
Completeness test (all input
fields are completed)
computer should require that the Purchase order number, Inventory code and counted amount be
inputted each time when goods received are recorded.
computer should require that the order-form number and counted amount be inputted each time when
goods received are recorded
on purchase order number and the inventory item (code), certain numbers of characters must be inputted
on order form number, certain numbers of characters must be inputted
Input of inventory orders
VALIDITY & AUTHORISATION
Validity test
Limit test
ACCURACY
Alphabetic/ alphanumeric
test
Numeric character tests
Sign test
Related data / matching tests
(e.g. GRN no)
Field length test / field size
tests
(# characters, e.g. date)
Reasonability test
Descriptive data echo tests:
COMPLETENESS
Completeness test (all input
fields are completed)
Expectation tests
the inventory code entered, is compared with a pre-programmed list of inventory codes and approved
suppliers
validity tests:
â—¦
valid code test: by testing whether the code of the book ordered and captured is valid;
valid character test: by testing whether the membership number captured consists of valid characters.
Eg: a general/specific upper limit can be placed on the quantity-field and therefore order size is only
allowed between predetermined limits.
to determine whether input fields contain the correct combination of alphabetic and/or numeric characters
,e.g. the supplier code may only contain alphabetical characters and the inventory code, only numeric
characters.
on the quantity of books ordered to ensure that a numerical number is inputted;
on the membership number to test whether the number consists only of numerical figures
some fields may only be positive and not contain negative values, e.g. quantity entered must have positive
values
This test must be performed on the quantity of books to ensure that the quantity is not negative
when the product code is entered, the system compares it with the reorder report to confirm that it
did appear on it.
to test whether each field consist of the correct number of character, e.g. the supplier code must consist of
six characters and inventory of only five on the membership number and THE code of the book ordered
to ensure both consist of the correct number of characters;
g. the reasonability of the quantity inventory order should be confirmed by the computer doing a
calculation based on the sales in the past and comparing it with the quantity that was entered. Only a
predetermined percentage variance is allowed.
a member’s details is displayed on the screen as soon as a membership number is inputted;
the name of a book is displayed on the screen as soon as the code of the book is inputted
a test must be performed to ensure that all characters and fields are entered, e.g. Inventory codes, etc
if the system expects the inputting of a quantity of books or a specific code after the code of the book
was inputted.
Input of bookings
VALIDITY & AUTHORISATION
Validity test
All inputs, for example video codes must be compared with the master file by the computer
Limit test
ACCURACY
Alphabetic/ alphanumeric
test
Numeric character tests
Sign test
Related data / matching
tests (e.g. GRN no)
The computer should place a limit on certain fields, for example on the number of videos a member is allowed to
take out per day;
or the number of videos booked
on the number of videos booked to ensure that a numerical number is captured;
on a membership number to ensure that it is made up of numbers and letters;
on video code.
the number of videos booked should not be a negative number
Field length test / field
size tests
(# characters, e.g. date)
on the membership number;
on other personal information such as ID number telephone etc.;
the code of the video must both include the correct number of characters.
Reasonability test
The reasonableness of the person’s age, by determining the member’s age from the id number and to compare it
with the age restriction on an captured video;
input of the person’s id number, address etc;
on the membership number, video code etc.
a member’s details appear on the screen the moment when a membership number is entered;
the name of the video appears on the screen when a video’s code is inputted.
Descriptive data echo
tests:
COMPLETENESS
Field length test / field
size tests (eg. ID no)
Completeness test (all
input fields are
completed)
A test must be performed to ensure that all fields have been entered for example the member’s address,
id number, contact information etc
Expectation tests
Input into salary masterfile
VALIDITY & AUTHORISATION
Validity test
Valid code test - all codes, e.g. post level code (or personnel number) must agree with a list of valid codes for
the salary application
Limit test
pre-defined bottom and top limits can be specified for the value fields in general (gross salary and over-time
tariff) in order to support validity. If limits are exceeded, a personnel manager needs to authorise it.
ACCURACY
Alphabetic/ alphanumeric certain fields must consist of only a certain combination of alphabetical and numerical characters, e.g. all
test
deduction codes consist of numerical characters only.
Sign test
Field length test / field
size tests
(# characters, e.g. date)
COMPLETENESS
Completeness test (all
input fields are
completed)
value fields must either be positive or negative. In this case both gross salary and over-time tariff must be
positive
certain input fields must consist of a certain number of characters, e.g. all deduction codes must include 3
characters
All input fields needs to be captured, this all fields on the master file needs to be captured
OTHER INPUT CONTROLS:
Screen format
Standard design and –layout for all inventory orders (and other transactions).
Design must be user-friendly to simplify the input of information relating to the orders in order to reduce
the risk of errors.
Limit the amount of information that is entered to a minimum by making use of ‘drop-down menu’s’,
‘look-up’ functions.
Computer dialog (prompting):
Computer guides user through input process of orders.
The responsible input officer must review each input form/order for approval before inputting.
After the order is entered, captured information is shown on the screen for the user to review to confirm
the accuracy against the hard copy order form (visual verification).
Programme computer to check sequential numbering and identify missing numbers and record it on
error log.
Data control group must also frequently review the numerical sequnce of order form-numbers, as part of
their review of the transaction lists.
Sequential numbers
Descriptive data-echo tests:
The information that is entered by the input operator, is used by the system to retrieve descriptive
information from the master file and to echo it back to the operator (display on the screen), so that the
accuracy of input field can be confirmed,
E.g. when the supplier- and inventory code is entered, the details of the supplier and description of
inventory appears on the screen.
There are certain fields that must be entered as compulsory fields.
A exception report of inventory items less than reorder level with no orders in a pending file, must be
pulled to identify any orders that have not been entered.
INPUT CONTROLS: Accuracy
Always include these ones
M
A
P
P
E
R
Manuals must be available in order to provide users with the necessary information, which can specifically be consulted by the
users when they experience problems or have made errors.
The computer screen should contain required fields without accurate completion of which further processing cannot take place
(i.e. force the user to fill in certain fields).
As much as possible information on the screen should be echoed in order for the user to confirm the information.
Appropriate error handling procedures must exist, for example the system must not allow the input or processing to continue
until the error has been corrected
The computer system must display an error message as soon as the system detects an input error, and
After input the input should be displayed on the screen and the user must review the information captured by means of visual
verification
D
The staff must be guided through the input process by means of a computer dialog (prompting).
U
The screen layout of the input screens must be user-friendly, properly designed and similar to that of the contract from which
information is captured
The minimum information must be entered by for example using relevant selection lists, selection boxes etc
Staff must receive proper training for the tasks they will perform
I
T
PART 1: INPUT CONTROLS IRO ACCURACY
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Partial orders or orders without a ‘purchase order number’ should automatically be rejected by the system and not be accepted.
A policy should be implemented that the supplier documentation must contain the companies ‘purchase order number’ and “Inventory
code”.
Where the supplier does not use the company ‘purchase order number’ and “Inventory code”, the receiving staff member should compare
the details on the supplier documentation to that of the order information before the information can be captured.
Manuals must be available in order to provide users with the necessary information, which can specifically be consulted by the users when they experience problems
or have made errors.
Staff must receive proper training for the tasks they will perform.
The staff must be guided through the input process by means of a computer dialog (prompting), for example when moving to the next inventory item.
The screen layout should be standardised and user friendly, and in this case the colours and text colour need to be more distinguishable to read the inputs.
The computer screen should contain required/compulsory fields without accurate completion of which further processing cannot take place (i.e. force the user to fill
in certain fields).
The minimum information must be entered by for example using relevant selection lists, selection boxes etc.
As much as possible information on the screen should be echoed in order for the user to confirm the information (in a different more legible colour). The receiving
person must also be required to tick a box that he compared the details on the screen to the physical inventory in the receiving area.
The computer system must display an error message as soon as the system detects an input error (e.g. unmatched items), and
appropriate error handling procedures must exist, for example the system must not allow the input or processing to continue until the error has been corrected
After input, all the data captured should be displayed on the screen and the user must review the information captured by means of visual verification.
A photo of the supplier documentation could be taken and saved for later review.
Debtors captured onto system after contract signed
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Manuals must be available in order to provide users with the necessary information, which can specifically be consulted by the users when they experience problems
or have made errors. (1)
Staff must receive proper training for the tasks they will perform. (1)
A designated person should be made responsible for the input of information. (1)
The screen layout of the input screens must be user-friendly, properly designed and similar to that of the contract from which information is captured. (1)
The staff must be guided through the input process by means of a computer dialog (prompting).
The computer screen should contain required fields without accurate completion of which further processing cannot take place (i.e. force the user to fill in certain
fields).
The minimum information must be entered by for example using relevant selection lists, selection boxes etc.
As much as possible information on the screen should be echoed in order for the user to confirm the information.
The computer system must display an error message as soon as the system detects an input error, and
Appropriate error handling procedures must exist, for example the system must not allow the input or processing to continue until the error has been corrected. (1)
After input the input should be displayed on the screen and the user must review the information captured by means of visual verification. (1)
Reports or registers of the specific input must be printed on a regular basis and reviewed by an independent person. (1)
Any exceptions must be investigated and followed-up on immediately. (1)
Increased management supervision and review must be applied. (1)
internal controls should be in place to ensure the validity, completeness and accuracy of the input on the salary master file
Input on the salary master file
Before input the responsible input official should check each input form for approval by the head of the salary department who signed the
form.
The input official needs to be trained properly.
Input forms need to be properly developed and pre-numbered.
Screen format
Standard format – and layout, the screen format should agree with the format of the input form.
The screen must be user-friendly to simplify the input process and to reduce the risk of errors.
When a personnel number is entered it should appear on the screen together with information already in the master file, so that the input
official can compare the existing information and changes entered (descriptive echo test/Visual verification).
Minimum data must be captured and drop down menu’s can be used for this.
Compulsory fields need to be completed before capturing can continue.
The following logical tests must be performed on all input fields as applicable:
Valid-code test
Alphanumerical test
Sign test
Field size test
Completeness test
Limit test
all codes, e.g. post level code (or personnel number) must agree with a list of valid codes for the salary
application
certain fields must consist of only a certain combination of alphabetical and numerical characters, e.g. all
deduction codes consist of numerical characters only
value fields must either be positive or negative. In this case both gross salary and over-time tariff must be
positive
certain input fields must consist of a certain number of characters, e.g. all deduction codes must include 3
characters
All input fields needs to be captured, this all fields on the master file needs to be captured
pre-defined bottom and top limits can be specified for the value fields in general (gross salary and over-time
tariff) in order to support validity. If limits are exceeded, a personnel manager needs to authorise it.
Any other valid test
A control figure must be attached to each input field at point of input, which, at its receipt at the salary master file, is recalculated and
compared with the control figure originally attached to each field.
Programmed data combination tests and data approval tests that should be present:
•
The number of the input field must logically follow on the number of the previous input form entered within the relevant series and
should not be repeated
Fields actually entered (that change) should not precisely agree with those that initially were in the master file record;
•
Changes to the post level code may not indicate a lower post level than the previous one (or an employee can’t receive a lower gross
salary);
•
The changed gross salary must, within definite limits, be in accordance with the employee’s post level code and also in the limits of the
previous gross salary;
•
The over-time tariff must be valid in accordance with the employee’s post level code;
•
Deduction codes should also be logically related to defined post level codes, e.g. union codes for certain post level employees.
Any error identified by above tests must immediately be indicated by means of an error message. Handling errors:
•
Errors must immediately be corrected or the relevant input must be cancelled. The system should not allow any further input until it’s
been corrected.
•
A register should be kept of errors not corrected and followed up by management.
•
Certain errors relating to the exceeding of limits or post level should require a high-level password, before any correction can take place.
PREVENTATIVE & DETECTIVE LOGICAL ACCESS CONTROLS
ADDITIONAL PREVENTATIVE AND DETECTIVE LOGICAL ACCESS CONTROLS
LOGICAL CONTROLS – PREVENTATIVE
Employees can only gain access to the server by using dedicated communication lines set up physically or via the Virtual Private Network
or other encrypted method of communication (such as SSL; Trust services).
In order to authenticate the users access, JoCo can rely on authentication dongles. Or limited access so that only computers with IP
addresses issued and registered by J-Co can gain access to the server.
Antivirus and Malware should be updated.
Firewalls should be implemented and tested.
A staff member who is allowed to access the server should have his/her own username, linked to their password or pin. Alternatively, a
user is required to enter both the password and the username.
To authenticate the user that logs onto the PC, they could rely on thumb prints or two factor authentication via a log on SMS.
Authorisation tables should be used to ensure that:
â—¦
data can only be imported of accessed from company issued computers;
â—¦
certain files can only be read, while others may be edited based on the bi-weekly rotation level responsibilities;
â—¦
no access to certain programs and files may be obtained from certain company computers based on the bi-weekly rotation level
responsibilities
Passwords should confirm with the following criteria.
â—¦
Persons should have alphanumeric passwords with a minimum amount of characters
â—¦
Persons should regularly change their passwords
â—¦
The password should not be shown on the screen
â—¦
Secrecy of the password is imperative.
The access to the server should lock the user out after three unsuccessful attempts to access the server. This may only be reactivated by
the IT manager after an investigation.
The server should log the user out after a period of inactivity and require that the password be resubmitted.
The server should only allow specific processes between 8am and 8pm as set up in the bi-weekly rotation schedule
If a user wishes to run an unusual process additional authorisation is required by the IT manager (based on his username and profile in the
authorisation matrix.)
Registers and logs – Detective
The registers, logs and report listed below should be reviewed by the IT manager and he should investigate and obtain reasons for
unusual items.
–
The system should keep an activity log as a record of who logged on, when and for how long (giving particular consideration to
after hour activity linked to the bi-weely rotation schedule).
–
The server should keep an activity log of who did what activity, as particular staff members are only authorised to perform
specific functions per the bi-weekly rotation schedule.
–
The server should keep an activity log of all authorised abnormal processes approved by the IT manager (giving particular
attention to the type of activity that required additional authorisation).
–
An exception report should be created of all unsuccessful attempts to log on to the server or attempts to access non-permitted
functions (Failed access attempts).
Discuss the controls which could be introduced to prevent and detect unauthorised access to the computers, software and data
CONTROLS TO PREVENT AND DETECT UNAUTHORISED ACCESS
PREVENTATIVE
•
A formal, written policy that only authorized persons may use terminals and that strict action will be taken against unauthorized users
of terminals. This policy should be given to all staff.
•
•
There must be special security measures in place at the EDP department , and specifically Mr Westwood 's office:
â—¦
the doors should always be closed when the computer is not in use and when Mr. Westwood leaves his office;
â—¦
only authorized users have access to keys to the offices;
â—¦
computer terminal itself must be closed when not in use (physical terminal locks);
the terminal should be placed in a visible, conspicuous places where it is not hidden, so that an unauthorized person working on a
computer can be easily spotted.
•
There may only access to the system within business hours. After-hours access must be limited by the use of alarms and/or security
guards.
•
Authorisation tables should be used to ensure that:
â—¦
data can only be imported from certain terminal;
â—¦
certain files can only be read, while others may be edited;
â—¦
no access to certain programs and files may be obtained from certain terminal
•
Password Control should be applied when access to a terminal and the system is obtained :
â—¦
the terminal should only be used if the correct password is used;
â—¦
there should be proper control over passwords: staff must be informed of the importance of secrecy of passwords;
â—¦
passwords should be chosen with care and not for the ease with which it can be remembered: for example, dates of birth
and identity numbers may not be used;
â—¦
passwords may not be printed, written or pasted where unauthorized users can see;
â—¦
passwords should be changed regularly, especially after a change in personnel.
DETECTIVE
•
The computers must keep a record of unsuccessful attempts to gain access to the terminal. Such lists should be printed daily and very
carefully investigated by Mr. West Word and followed up.
•
The system must automatically sign out if a user has not been at a terminal for a while.
•
When the system used for a certain time, have gained access to the system by the reinsertion of the password.
•
At the end of every day, every computer should have a list / log / register pressure of daily activities. This should be checked by an
independent person for any unauthorized use or changes. Any evidence of unauthorized activities must be investigated and followed
up immediately.
Controls to ensure authorised use of salary master file on the mainframe computer only
PHYSICAL CONTROLS
A formal, written security policy should be distributed to all users stipulating:
that only authorised persons may use the mainframe computer and That strong action will be taken against its unauthorised
usage.
Physical access control that should be active at mainframe room:
â—¦
Access to room should be restricted by keys/magnetic card readers
â—¦
Only authorised users must have access to keys for room and/or should have proper control over registration of magnetic cards
â—¦
Doors should be closed at all times when computer is not in use,
â—¦
Also when IS personnel leave the room;
•
•
Daily run schedules should be prepared for the use of the mainframe computer.
The mainframe computer should also provide a daily activity register of the activities performed, which should be compared by a
senior person with the run schedule to identify any unauthorised activities.
•
•
Registration on the mainframe computer should only take place within fixed hours (or office hours) and
Access outside these hours should be managed by the use of alarms, closed-circuit TV cameras and/or security guards supervising the
use of this computer
LOGICAL CONTROLS
Authorisation tables must be used which ensure that:
â—¦
Access and right (writing, reading, changing, deleting etc) to certain files and programs should be restricted by linkage to
usernames (and in doing so to the user’s job description);
â—¦
Access to certain programs and files may only be acquired from the mainframe computer and not from terminals as well.
Password control must be adjusted by requiring correct passwords to acquire access to the mainframe computer and the master file:
â—¦
Passwords should be unique.
â—¦
Persons should have passwords that are alphanumerical containing at least five characters.
â—¦
Persons should change passwords regularly.
â—¦
Password should not appear on the screen.
â—¦
The choice of passwords is important – it should not be obvious and linked to the user.
â—¦
The password of persons who resign should be removed from the file.
â—¦
Secrecy of passwords is essential.
•
•
•
The terminal should disconnect after three unsuccessful attempts to access. (input of wrong password)
In the case of a security break the system should disconnect automatically.
When the system has not been in use for quite a time user should be deregistered and access to the system should require the reenter of the password.
Preventative & detective controls: inputting of bookings of video’s or DVD’s
The membership number quoted by the member when a booking is made, must be confirmed:
â—¦
the shop assistant must confirm the client’s personal information (for example, name, address, telephone number etc) on the basis
of computer dialogue particularly when booked via telephone.
â—¦
by inspecting the video card.
â—¦
a computer password must be used.
The shop assistant enters the answers and the computer compares the answers automatically with the appropriate master file information.
If not, the system should reject the booking – an error message should be displayed on the screen and the system should not allow any further
input on the particular order.
The assistant must confirm the video information (e.g. name etc.) on the screen with the client or against the video.
The system should automatically check the following:
whether any amounts or videos/DVD’s or fines are outstanding;
â—¦
whether the video is available.
â—¦
whether the person has sufficient prepaid credit (or units) available.
If not, the system should display an error message on the screen.
The screen format must be standard and contain all necessary fields in order to simplify the input process and
must have a simplify design for input. (Alternatively the screen must be user-friendly).
Where possible, the computer must lookup the information from the masterfile, for example person’s address, video’s name etc. (Alternatively
“drop down” menu’s).
The computer must guide the assistant by computer dialogue (“prompting”).
The data, for example video name, client’s address should be echoed back to the user
Sign check:
the number of videos booked should not be a negative number.
Alpha-numeric tests:
on the number of videos booked to ensure that a numerical number is captured;
on a membership number to ensure that it is made up of numbers and letters;
on video code.
Field length tests:
on the membership number;
on other personal information such as ID number telephone etc.;
the code of the video must both include the correct number of characters.
Descriptive data echo
tests:
a member’s details appear on the screen the moment when a membership number is entered;
the name of the video appears on the screen when a video’s code is inputted.
Limit test:
The computer should place a limit on certain fields, for example on the number of videos a member is allowed to take
out per day;
or the number of videos booked
Reasonableness test:
The reasonableness of the person’s age, by determining the member’s age from the id number and to compare it with
the age restriction on an captured video;
input of the person’s id number, address etc;
on the membership number, video code etc.
Completeness test
(required fields):
A test must be performed to ensure that all fields have been entered for example the member’s address,
id number, contact information etc
Validation test
All inputs, for example video codes must be compared with the master file by the computer
•
•
•
•
•
•
•
•
The system should only allow the input of the fields once the previous field or transaction has been entered in full and has been
accepted by the system (Alternatively compulsory fields).
Exception report, register, logs relating to, for example,
persons that attempts to hire videos with fines outstanding,
customer passwords that have been entered incorrectly must be generated daily.
Audit trail of accounting information
Any examples of valid inputs.
and reviewed and investigated by a shop manager.
The details of the videos can be compared with the invoices as prepared by the computer.
Describe the controls with which unauthorised changes to information on the main frame computer by Ms Possible can be detected.
DETECTIVE MEASURES
•
•
•
•
•
The back-up copy must be recovered and the information must be reconciled with the information on the system. Any difference could
highlight missing information.
The input documents must be reconciled with the system.
Balance the control totals (e.g. hash totals, record counts) with the recovered control totals.
Obtain exception reports/audit trails/registers form the system to indentify any information which was omitted or changed. The reports
could, for example, contain the following:
â—¦
Audit trial of any changes;
â—¦
Empty fields in the information data basis;
â—¦
keep record of all attempts to gain access to the main frame computer system (successful and unsuccessful); and
â—¦
keep activity registers.
Exception reports/audit trails/registers must be reviewed by a senior staff member to identify any unauthorised access or attempt to gain
access, which must be investigated immediately.
Explain how ‘authorisation matrixes’ could have been used to ensure that only valid and authorised change could be made to the information
on the main frame computer and consequently could have prevented Ms Possible from removing and changing information.
An access control matrix (programmed authorisation) can contribute in the following manners to ensure only valid changes to the information
in the system are made:
•
By way of a terminal code, only a specific terminal is permitted access to the program’s module that makes information changes possible.
Thereby restricting changes to a specific terminal.
•
by means of log-in with user ID, authenticated by password, restricts
•
the access rights each user has to change information on the system (e.g. display, write);
•
possibility that an unauthorised person can make changes to the information on any computers, because they do not have the necessary
rights to make the changes;
•
in accordance with the allocated authorisation level, changes should only be allowed to be made on a predetermined day of the month;
•
Ad hoc changes require two authorising passwords.
preventative and detective application controls that will ensure completeness regarding the processing of salaries.
APPLICATION CONTROLS to ensure COMPLETENESS of PROCESSING
The control totals calculated with preparation of the payroll register, should be reconciled to control totals calculated after processing thereof,
inter alia:
Financial totals, such as gross salaries, medical fund deductions, etc;
Hash totals, such as bank account numbers, reference numbers; and
Record counts, such as number of employees.
File balancing (shadow balances):
A control total of the payroll master file should be maintained on a independent file and updated with the transaction data. After the
processing cycle it should be compared to the payroll master file’s total.
The software should detect any missing salaries by:
Follow-up testing, whereby it checks whether the salary reference numbers of one transaction file continues from the previous; and
A number order test during processing of information to identify any missing salary reference numbers.
The console log should regularly be checked by the data control group (e.g. after each run) to identify any processing disruptions and should
investigate it.
Control reports, exception reports (e.g. large fluctuations in salaries) and error reports (e.g. negative salary amounts, lack of bank account
number) should be generated by the system to notify of any possible errors.
The reports should timeously be reviewed and followed up by data control (e.g. for strange or duplicated items).
preventative and detective application controls that you would implement to ensure the completeness, validity and accuracy of the
processing of credit notes
PART 1: PROCESSING CONTROLS OF CREDIT NOTES
•
There should be segregation of duties between the initiation, execution and authorisation of the processing of the credit notes OR logical
access controls must be implemented to restrict access to the functions on the accounting system for input of credit notes by the
receiving clerk and authorisation of the processing of the credit note to a senior person such as the store manager.
(1)
•
This can be done by means of unique user names and passwords, or a unique employee card or biometric access and an authorisation
matrix.
•
The internal file label should be checked by the program (or the program should force operator to check it visually) to ensure that the
latest version of the transaction files are being accessed to process the credit notes and to ensure that correct program version is running.
(1)
•
Run-to-run totals of inventory masterfile and sales ledger must be calculated and reviewed by the system.
(1)
•
Shadow/file balancing should be performed where an independent file is used to update the masterfile balances with the transaction
data and the balances compared to the balance of the masterfiles after processing. (1)
•
Programmed mathematical, reasonability and validation tests must be performed by the system:
•
To detect data errors (e.g. invoice number validity tests, related data test between the invoice and the credit note or a matching test).
(1)
•
To detect mathematical accuracy tests (e.g. any negative values, incorrectly calculated return values, credit note amount exceeds invoice
amount).
(1)
•
To detect reasonability errors (e.g. the amount of returns for any one customer exceeds a set limit).
(1)
•
The software should detect any missing credit notes by:
•
A file sequence test: where the system ensures that the credit note number of transaction file being processed follows on from the
previous file; and
(1)
•
A completeness test: during the processing of information to identify missing credit note numbers.
(1)
•
The system should generate the following reports to be reviewed and followed up by store management.
•
A control report indicating the total amount sales returns and list of all credit notes processed.
•
An error report indicating any missing fields which would have effected correct calculation of the sales returns OR any credit notes not
linked to a sales invoice etc.
•
An exception report indicating any sessions which expired, any large fluctuations of returns or number of returns for a specific customer.
•
•
A console log of processing including any disruptions to processing of the returns. (max 3)
(For completeness, the following manual control): The customer should sign a copy of the credit note to be filed together with a copy of
the invoice by the returns counter as evidence of the return which can be compared to the control report.
BATCH CONTROLS
The debtors clerk should review the sequential numbering of the delivery notes.
The batch should be reviewed to ensure that it only contains two days’ transactions and not transaction from other days.
The debtors clerk should perform the following procedure when preparing the batch:
Calculate financial control totals, e.g. the total of all sales.
Calculate hash totals, e.g. total of all the document numbers added together.
Calculate the number of documents which are included in the batch.
There should be a batch control sheet attached to the batch, which contains all the relevant information,
such as a unique batch number.
A batch register should be maintained up to date, which contains all the information of the batch as shown on the control sheet, as well as the
signature of the relevant person.
The debtors clerk should sign the batch control sheet and register as proof that the reconciliation has been performed.
An independent person should review and recalculate the totals (on a frequent basis) and sign it as proof that it has been reviewed.
The control totals should be entered, in order for the computer to compare the totals that were captured with the totals calculated by the
system.
The computer should then print out a batch control report as proof that the totals were compared. This must then filed with the batch control
sheet.
If the totals do not agree, the entries should be reviewed for accuracy.
The system may only authorise the transaction file for processing if the control totals agree.
A report with rejected transactions / errors should be generated and reviewed in order to correct the errors.
Good staff practice
The staff practices must be in writing and be included in a formal manual, which is freely available.
A formal employment policy must exist (and related implementation process) in order to ensure that only honest and competent staff are
appointed.
Proper dismissal procedures must be in place, such as for example, access to computer system must be cancelled when employee leaves the
service of the company.
Proper scheduling of staff must take place. Staff must be allocated to specific tasks/projects.
Staff must take leave on a regular basis. If staff take leave (irrespective of the nature) special arrangements should be made to ensure that the
staff member’s work can continue.
Duties should regularly be rotated to allow for cross-training and to prevent boredom.
Segregation of duties and knowledge must however be kept in mind when rotation of duties takes place.
There should be career planning for staff. Recognition must be given for good work. Staff must always feel motivated and successful. Staff
should be promoted based on their performance.
Continuous evaluation of work performed by staff should be performed, e.g. the volume and quality of work done, et cetera.
Continuous training should be provided to staff.
Management must cultivate a positive attitude towards internal control and governance, by:
implementing controls and training staff;
implementing management policies consistently; and
monitoring the functioning of controls.
Rules on private use of computer facilities and use of private programs and equipment must be a part of the staff’s employment contract.
MASTERFILE CHANGE CONTROLS
Always mention these
REQUESTS
Any amendment to the master file information must be requested in writing on a prenumbered form. (The responsible person
will have to compete the manual form and scan and send it to the appropriate person).
The number sequence of the scan’s must be checked. Alternatively, a manual register of all changes should be maintained
Any amendment (existing or additions) to the master file information must first be approved in writing by a manager
The amendments may only be made by a designated responsible person (who is independent of daily transactions such as for
example the manager)
The amendments may only be made by an independent responsible person such as for example the shift manager
The input of amendments must be restricted to one/ a specific computer that is safeguarded on a designated PC with a unique
IP address
ACCESS
The one/specific computer used for the changes should be stored securely at the home of the individual concerned.
A password/PIN must be required before master file information may be amended.
Otherwise an authorisation matrix may be used to restrict access to the module
REVIEW
Control reports (or a summary of changes to the master file) must be reviewed regularly by the manager or owner in order to
identify any unusual or unauthorised adjustments which must be investigated
The report must be reviewed by the manager or owner in order to identify any unauthorised adjustments. Any unusual or
unauthorised changes must be investigated
Exception reports of any unusual changes (e.g. changes to products in categories of inventory that are not considered essential)
must be reviewed by the manager and investigated if necessary
The manager should print a report of all amendments on a regular basis (or automatically by computer).
RECONCILIATION
The report of changes to the master file (above) should also be compared with the authorised supporting amendments’
documentation (prenumbered form or manual register).
MASTERFILE CHANGE CONTROLS FOR THE INVENTORY MASTER FILE FIELD
ADDITIONAL COMPUTER CONTROLS à VALIDITY, ACCURACY & COMPLETENESS
Any requests for amendments to the master file information have to be done in writing on a pre-printed, pre-numbered
master file amendment form. (The responsible person will have to compete the manual form and scan and send it to the
appropriate person).
The number sequence of the scan’s must be checked. Alternatively, a manual register of all changes should be
maintained
Request
Any amendment (changes to existing data or additions to the list of inventory items) to the master file information must
first be approved in writing by a manager after having compared the inventory item to that all the list of acceptable
products issued by the government
Any amendments to the “delivery allowed” field of an inventory item must be extracted from the Masterfile and agreed
to the list approved by the inventory manager. (Or the system can generate an email of any changes that are made to
the inventory Masterfile that are emailed directly to the responsible person to perform this review)
The amendments may only be made by a designated responsible person (who is independent of daily transactions such
as for example the manager)
The input of amendments must be restricted to one/ a specific computer on a designated PC with a unique IP address
Access
The one/specific computer used for the changes should be stored securely at the home of the individual concerned.
A password/PIN must be required before master file information may be amended.
Otherwise an authorisation matrix may be used to restrict access to the module
Back-up
The inventory master file must be backed up before any changes are made to the master file
Review
Control reports (or a summary of changes to the master file) must be reviewed by the manager or owner in order to
identify any unusual or unauthorised adjustments which must be investigated
Exception reports of any unusual changes (e.g. changes to products in categories of inventory that are not considered
essential) must be reviewed by the manager and investigated if necessary
The inventory master file (including the description and “delivery allowed”) should be reviewed by the manger
(responsible person) and unusual items should be investigated
Reconciliation
The report of changes to the master file (above) should also be compared with the authorised supporting amendments’
documentation that were scanned and sent to the responsible manager (pre-numbered forms).
INTERNAL CONTROLS FOR THE CHANGES TO SUPPLIER & PRODUCT INFORMATION
MASTER FILE AMENDMENT CONTROLS
Any amendment to the master file information must be requested in writing on a prenumbered form. (The responsible
person will have to compete the manual form and scan and send it to the appropriate person).
The number sequence of the scan’s must be checked. Alternatively, a manual register of all changes should be
maintained
Any amendment (existing or additions) to the master file information must first be approved in writing by a manager
Before a supplier can be added to the system, the quality of the supplier’s equipment and prices must be evaluated
Request
The amendments may only be made by a designated responsible person (who is independent of daily transactions such
as for example the manager)
The amendments may only be made by an independent responsible person such as for example the shift manager
The input of amendments must be restricted to one/ a specific computer that is safeguarded on a designated PC with a
unique IP address
Suppliers’ information may not be removed from the system if the supplier has an outstanding balance irrespective of
whether approval has been given
If a supplier has not been used for a long period of time (e.g. six months) the system should indicate it as inactive
Supplier information may not be removed from the system without the authorisation of the manager, possibly by using a
password
Access
The one/specific computer used for the changes should be stored securely at the home of the individual concerned.
A password/PIN must be required before master file information may be amended.
Otherwise an authorisation matrix may be used to restrict access to the module
Back-up
The inventory master file must be backed up before any changes are made to the master file
The following logs, exception reports or activity registers must be maintained or generated
Control reports (or a summary of changes to the master file) must be reviewed regularly by the manager or owner in
order to identify any unusual or unauthorised adjustments which must be investigated
The report must be reviewed by the manager or owner in order to identify any unauthorised adjustments. Any unusual
or unauthorised changes must be investigated.
A report must be printed of, for example, all price adjustments of more than 5%.
Review
The person responsible for the changes to the master file must have a personal identification code. The code must be
added to a register (log) by the computer
The manager should print a report of all amendments on a regular basis (or automatically by computer).
Exception reports of any unusual changes (e.g. changes to products in categories of inventory that are not considered
essential) must be reviewed by the manager and investigated if necessary
The report of changes to the master file (above) should also be compared with the authorised supporting amendments’
documentation (prenumbered form or manual register).
Reconciliation
The price and product list must be reconciled with the published price list and menu above the counter.
Recommendations of controls to address the weakness regarding the updating of the creditors master file of Jambo (Pty) Ltd
UPDATING MASTER FILE
To detect errors during the update of the master file we recommend the following controls:
The control totals calculated after the update of the transaction data must be reconciled with control totals recalculated (by hand or by
computer).
The control total of the master file, which must be updated with the transaction data on an independent file, must be compared with the
updated total of the (actual) master file. Differences must be investigated (file balancing).
The console log of processing (automatically updated by system) must be reviewed on a regular basis to identify any errors.
The user or operator must inspect the output and control reports for any errors or duplicated items.
Errors must be reported on an automatically generated exception report.
All the above-mentioned computer generated reports must be reviewed and investigated by a responsible person.
APPLICATION CONTROLS: completeness, accuracy and validity
For amendments to DEBTORS MASTERFILE
DEBTOR MASTER FILE CHANGES: APPLICATION CONTROLS
Prenumbered master file changes forms must be used for all changes (new debtors, removal of debtors, changes to
debtor data)
The request form must be approved by senior person (for example credit controller) by initialling.
Person making the master file changes input should be independent of the debtor department (users).
Any amendment (existing or additions) to the master file information must first be approved in writing by a manager
Request
Input controls must be used to prevent input errors, such as for example:
â—¦
programmed validation tests; and
user-friendly screen format, computer dialogue (prompting), data-echo tests etc.
System should automatically maintain a prenumbered register of changes made, including:
â—¦
Details of changes
â—¦
User name of person who did the input
â—¦
Date and time
Access
Logical access controls must be implemented to restrict the input of master file changes to authorised personnel
Authorisation matrix, restricting rights by combining user names, passwords and terminal IDs
Read-only rights must be granted to the master file changes register and the rights must be restricted to management
and senior staff.
Back-up
Back-up copies of master files must be made BEFORE updating the change requests
Exception reports (for example unusual changes or exceeding limits) should be generated and reviewed by senior staff
member timely.
The register of changes must be reviewed by a responsible senior person on a regular basis to ensure that:
â—¦
All changes are supported by an authorised request form;
â—¦
Changes inputted agree with the request form
â—¦
Only authorised individuals capture the master file changes.
â—¦
There are no long-outstanding requests not dealt with to date.
To identify any obvious errors made during the capturing, or any unauthorised changes made, the following must be
performed on a regular basis:
â—¦
senior staff (for example credit manager) should review the debtor master file;
â—¦
the debtor master file total should (for example monthly) be reconciled to the balance of the debtor control
account in general ledger.
ANOTHER EXAMPLE FOR DEBTORS MASTERFILE:
Prenumbered master file changes forms must be used for all changes (new debtors, removal of debtors, changes to
debtor data)
The request form must be approved by senior person (for example credit controller) by initialling.
Person making the master file changes input should be independent of the debtor department (users).
Request
Any amendment (existing or additions) to the master file information must first be approved in writing by a manager
Input controls must be used to prevent input errors, such as for example:
â—¦
programmed validation tests; and
user-friendly screen format, computer dialogue (prompting), data-echo tests etc.
System should automatically maintain a prenumbered register of changes made, including:
â—¦
Details of changes
â—¦
User name of person who did the input
â—¦
Date and time
Access
Logical access controls must be implemented to restrict the input of master file changes to authorised personnel
Authorisation matrix, restricting rights by combining user names, passwords and terminal IDs
Read-only rights must be granted to the master file changes register and the rights must be restricted to management
and senior staff.
Back-up
Back-up copies of master files must be made BEFORE updating the change requests
Review
Reconciliation
Exception reports (for example unusual changes or exceeding limits) should be generated and reviewed by senior staff
member timely.
The register of changes must be reviewed by a responsible senior person on a regular basis to ensure that:
â—¦
All changes are supported by an authorised request form;
â—¦
Changes inputted agree with the request form
â—¦
Only authorised individuals capture the master file changes.
â—¦
There are no long-outstanding requests not dealt with to date.
To identify any obvious errors made during the capturing, or any unauthorised changes made, the following must be
performed on a regular basis:
â—¦
senior staff (for example credit manager) should review the debtor master file;
â—¦
the debtor master file total should (for example monthly) be reconciled to the balance of the debtor control
account in general ledger.
Controls for the ordering system of to ensure the validity, accuracy and completeness of the orders that are captured
VALIDITY
When placing an order, the member states the membership number that must be confirmed in the following manner:
â—¦
â—¦
the order clerk confirms certain personal questions to the member based on computer dialogue for example. name, address,
telephone number etc.
the order clerk inputs the answers on the abovementioned questions in on the terminal and the computer compares the answers
automatically with the appropriate masterfile information.
If the abovementioned information agrees, the order is accepted and processed further.
If not, system must reject the order – an error message must appear on the screen and system must not allow any further input for this
specific order.
The system must validate the validity of data input by performing the following validity tests:
valid code test:
valid character test
by testing whether the code of the book ordered and captured is valid
by testing whether the membership number captured consists of valid characters
When an order is placed, the system must conduct data approval tests by controlling the following:
â—¦
if the previous invoice has been paid;
â—¦
if the specific book is in stock; and
â—¦
if the date of the order compares with the term’s date of deadline.
If the previous invoice has not yet been paid or the date of the order is after the deadline, the order must be rejected.
If the specific book is not in stock, the order must be placed on waiting list.
If the deadline has passed, the system must automatically reconcile the orders placed with the list of members and the particular term’s
prime book send to all members whom have not yet placed orders and their accounts must be invoiced.
ACCURACY
The screen format must be standardized for all orders and designed to facilitate the inputting of information and decrease the possibility of
errors. The computer must prompt the operator by means of prompting through every step of the input process.
As the orders are inputted, the system must echo the details of the order back to the ordering clerk to control the accuracy of the inputted
information.
After the order has been fully completed, all information must be read back to the member to verify the accuracy of the information.
When capturing, the system must execute the following validation and logical tests to ensure the accuracy of the input
sign test:
alpha numerical tests:
field size check
descriptive data echo tests
This test must be performed on the quantity of books to ensure that the quantity is
not negative;
â—¦
on the quantity of books ordered to ensure that a numerical number is inputted;
â—¦
on the membership number to test whether the number consists only of numerical
figures;
on the membership number and THE code of the book ordered to ensure both consist
of the correct number of characters
â—¦
a member’s details is displayed on the screen as soon as a membership number is
inputted;
â—¦
the name of a book is displayed on the screen as soon as the code of the book is
inputted
COMPLETENESS
The screen format must be standard for all orders. All fields which are inputted, must appear on the screen.
The system must only allow the inputting of a next field (or a new transaction) if the previous field or transaction is completely inputted and
accepted by the system.
The system must not allow the further inputting of order transactions to proceed if invalid data is captured in a field.
During the inputting process, the following validation tests must be performed to ensure that the clerks input the orders completely.
expectation tests:
the system expects the inputting of a quantity of books or a specific code after the
code of the book was inputted.
APPLICATION CONTROLS RELATING TO THE PROCESSING WHEN THE PDF INVOICES ARE GENERATED
The control totals (batch register totals) calculated while preparation of the batch register should be reconciled to control totals calculated
after processing thereof, inter alia:
â—¦
Financial fields, such total amount invoiced;
â—¦
‘Hash totals’, such as debtors account numbers, reference numbers, cellphone numbers; and
â—¦
Record counts, such as number of debtors.
File balancing (shadow balances): A control total of the debtors’ master file should be maintained on an independent file and updated with the
transaction data. After the processing cycle it should be compared to the debtors’ master file’s total.
Run-to-run totals must be calculated and reviewed by the system.
Programmed edit/validation tests must be recorded by the system to:
detect data errors (e.g. sequence tests, paring tests or record comparison tests).
detect processing errors (e.g. any valid examples of validation tests, mathematical accuracy tests or reasonableness test).
The software should detect any missing invoices by:
A file sequence investigation: where they investigate whether the invoice reference numbers of one transaction file follows on the previous
file; and
perform a completeness tests during the processing of information to identify missing invoice reference numbers.
The console log should regularly be checked by the data control group (e.g. after each run) to identify any processing disruptions and should
investigate it.
The reports and logs listed below, should timeously be reviewed and followed up by data control (e.g. for unusual or duplicated items).
Control reports (e.g. control register, total amount invoiced).
Exception reports (e.g. large fluctuations or declines in debtors balances, payments in excess of a predetermined amount) and
Error reports (e.g. debtors’ with credit balances, missing cellphone numbers, unusually cellphone numbers) generated by the system to
identify any possible errors.
TEST DATA
Test data to test application controls in sales order system
The steps taken when developing and using the test data to test the controls.
TEST DATA USED IN THE AUDIT OF THE SALES SYSTEM
STEPS TO TAKE DURING THE DEVELOPMENT AND UTILISATION OF TEST DATA
Define the objective of the test that would be performed.
and specify the controls which are to be tested.
For example: All sales are recorded and
calculated accurately. All sales are made to
authorised customers and the account details
submitted are valid
Alternatively, a understanding of the system must be obtained or the system
must be documented
For example: Validation controls: Alphanumeric
test, field length test et cetera
1
Develop the test data, containing the following:
•
The test data should include valid and invalid data using
2
•
•
The test data should include all types of data and possible transactions
The test data should be processed independently of the clients’ system,
as to obtain a pre-determined correct processing result, which will be
used to evaluate the results of the test data against.
Process the test data on the client’s system.
3
For example, control totals of invoices,
calculated totals on invoices.
Compare the results from the test data ran on the client’s system with that of the
pre-determined results.
Remove the test data from the clients system.
4
à Note that the test data would either be processed correctly or either rejected
or be reflected on exception reports (i.o.w. evaluate the outcome of the tests).
Conclude on whether the controls within the client’s system operated effectively.
5
6
Evaluate the general controls to ensure that the system you have tested
functioned within a controlled environment and functioned without unauthorised
amendment throughout the period under review
7
Report on the effective operations of the controls.
Risks associated with using test data
RISKS
•
•
•
•
•
•
•
for example the following fields: customer
number, inventory numbers et cetera.
for example an order should be entered twice.
The same program or version of the program must be used throughout the year.
The element of surprise must not be lost.
Corruption of live data (and risk of viruses) must be limited.
System may “crash”.
Unauthorised changes to or overrides of the system must be identified.
As so far possible, all possible situations and programmed controls need to be tested.
It may be difficult to remove the data from the system.
For example, transaction logs of every sales
order entry, breakdowns of back-orders, order
suspense accounts
Examples of specific types of test data to run on the client’s system.
EXAMPLES OF TEST DATA
Note: Marks are allocated for giving the criteria which would be used to set the test data. Marks are also given for providing an example.
Criteria, which should be used, in creating the test data.
Include orders for the following
customer account numbers:
Include orders with the following
inventory codes:
Include orders with the following
quantities:
Include orders where:
alpha and numeric characters
numeric data < 6 digits
numeric data > 6 digits
blank
valid (correct and incorrect) account numbers
alpha and numeric characters
numeric data < 5 digits
numeric data > 5 digits
numeric data of 5 digits > 69999 and < 10000
blank inventory numbers
valid inventory numbers
alpha and numeric characters
negative quantities
excessive quantities exceeding a predetermined amount
quantities where there is no inventory on hand
the extension = R 10 000
the extension is < R 10 000
the extension is > R 10 000 and the release code is valid, negative, contains too few
or too many digits, is inside and outside of the valid range.
USING CAATS
SYSTEM VS DATA COMPUTER ASSISTED AUDIT TECHNIQUES
System CAATs
Data-CAATs
are used to test computerised controls.
are therefore used for perform tests of control.
are used to withdraw data from a computerised
information system and the performance of substantive
procedures.
CONSIDERATIONS AND PROCESS OF USING CAATS
Consider the following factors:
â—¦
â—¦
â—¦
â—¦
â—¦
â—¦
availability of computer knowledge
weighing the cost of CAATS against the benefit derived by its use
the availability of the necessary facilities (hardware, software, time) in order to use CAATS
the availability of client’s data
compatibility / adaptability of the auditor’s system with that of the client
whether there are any suitable CAATS that will satisfy the objectives of the auditor
The auditor considers the following factors:
•
availability of the necessary computer skills;
•
weight the cost of the CAATs against the benefit derived from using it and prepare a cost budget that the client must approve;
•
the availability of the necessary facilities (hardware, software) in order to use CAATs;
•
Also obtain the clients permission to use their data in the CAATS and arrange to download the data;
•
the compatibility of the auditors software with the clients system;
If there is any appropriate CAAT that can be used to achieve the objectives of the auditor.
Address a request to the computer audit team to clearly explain the objectives of the process
Agreement must be reached regarding the method of reporting
The computer audit team will then do the following:
â—¦
â—¦
â—¦
â—¦
â—¦
â—¦
â—¦
â—¦
Define the objectives, transactions and the necessary audit procedures required
Prepare a budget of the time and costs and have it approved by the auditor
Obtain the clients approval to use their data for the CAATS
Determine the availability of the client’s data necessary for CAATS;
Contact the client and arrange for a download of the data
Reconcile the data received with the live production environment and the information of the financial statement
Execute CAATS
Report accordingly to the audit team
general information that should be present on the audit working papers, with reference to the CAAT you have performed
WORK PAPER
The following general information must appear on the work paper:
â–«
Name of the client;
â–«
Year-end of the client;
â–«
Work paper reference;
â–«
Explanation of audit marks
â–«
Name of the person who prepared the work paper and the date on which it was prepared;
â–«
Name of the reviewer of the work paper and the date on which is was reviewed.
•
•
•
The objective of the procedures performed (CAATS) and the technical procedures written to use CAATS;
The layout of the inventory masterfile of the client;
The results of CAATS for example the number of exceptions identified as well as which further procedures thereof were executed.
•
The conclusion that was made because of the procedures that were performed.
DATA CAATS: income received in advance
Print the following exception reports from the system for revenue received in advance accounts:
•
Empty fields – containing for example no period, zero balance, missing fields
•
Duplicate membership numbers or identity numbers.
•
Identity numbers of people over the age of 100 or invalid identity numbers (unborn persons).
•
Expiry dates prior to year-end.
•
Date of payment exceeding 12 months prior to year-end.
•
Unusually high outstanding balances (more than 12 months fees) or unusually high amounts of sessions.
•
Period of membership not equal to 12 or 1 months.
•
All amount (outstanding/still in advance) fields which are debit/negative balances (classification).
Recalculate the casting and cross casting of the revenue received in advance general ledger account and compare it to the balance in the
trail balance and financial statements
Select a statistical sample of any membership numbers (on a random basis) from the income received in advanced account.
Use CAATs to extract the information of date of payment and amount received to be traced to the bank statement for receipt of payment.
(occurrence and accuracy)
Use CAATs to extract the details of the terms of the revenue such as membership type, period of membership or number of sessions to be
traced to the contract with the client. (occurrence and accuracy)
Stratify the account by membership type and date of payment and for each membership type
For monthly and annual members: Use the date of payment, the outstanding balance and the year-end date, recalculate the income
received in advance balance at year-end. (accuracy)
For type 3 members: Use the date of payment, expiry date and number of sessions available to recalculate the income received in advance
at year end. (accuracy)
Select a sample of members based on date of payment surrounding year end to be traced to the bank statement to ensure that the income
received in advance was recorded in the correct period. (cut-off)
DATA CAATS: valuation, accuracy & allocation of inventory
The following can be performed by using CAATS:
â—¦
Recalculate the total value per inventory item by multiplying the quantities with the cost per item and compare it with the total
value per item on the inventory masterfile and print a report of any differences existing between the two values.
â—¦
Extract a report from the system which recalculates the total value of inventory per category.
â—¦
Compare the total value of inventory according to the inventory masterfile with that shown in the trial balance and financial
statements.
Recalculate the following ratios to identify any unusual deviations which may indicate errors in valuation, accuracy and allocation:
â—¦
Inventory turnover days
â—¦
Current ratio
â—¦
Total asset turnover ratio
â—¦
Return on assets ratio
Selecting a sample of inventory purchases on a random basis for price testing to be agreed to supporting documentation such as purchase
invoices.
Select a sample of inventory items on a random basis using the available quantity field and branch field for each of the branches for:
inspection of the inventory items at the stock count to test the quantity (existence) and condition of a sample of inventory items.
Compare cost price per item with sales price per item and print a report of all cases where the costs exceed the sales price (for net
realisable value testing).
Stratify the inventory items according to the last date of sale and select the items which have not been sold recently (for inventory aging
testing) OR recalculate the aging of inventory based on date of purchase in order to identify slow moving stock
Recalculate slow moving inventory provision according to company policy and compare to the slow moving inventory provision.
DATA CAATS: confirmation of inventory balance
The following can be performed by using CAATS and any exceptions on the reports must be further investigated:
Exception reports for example:
â—¦
on missing field on the inventory masterfile
â—¦
report on items with negative quantities
â—¦
report on items with negative costs per unit
â—¦
report on items with negative total values
â—¦
compare costs per unit with sales price and print a report of all cases where the costs exceed the sales price
â—¦
recalculate the total value per item by multiplying the quantities with the cost per item and compare it with the total value per
item on the inventory masterfile and print a report of any differences existing between the two values
Compare the total value according to the inventory masterfile with that shown in the financial statements
Sort the items in order of total values to determine which items make up the largest value of the inventory – these items may be
specifically confirmed in the inventory count
Print a list of items according to the latest sales date and review the quantity at hand for which there has not recently been a sales
transaction - It could indicate outdated inventory that might have to be written-off.
Select a sample of items for test count during inventory count – the report could specify the inventory code, description of item, quantity at
hand, store room and position indicated therein.
DATA CAATS: debtor’s master file
PERFORM CAATs ON THE DEBTOR MASTER FILE AND USE THE RESULTS AS FOLLOWS
Analyse the master data for exceptions such as debtors with:
â—¦
nil balances
â—¦
negative balances
â—¦
equal monthly payments;
â—¦
duplicate debtor numbers/and/or names
â—¦
no credit terms; or
â—¦
exceeding credit terms etc.
Analyse for numbers of debtors or invoices not found while performing the sequence test OR
any empty name/debtor number field where an amount is due in the total column
recreating age analysis of debtors
Stratification of debtor balances according to monetary value of age of unpaid invoices
Re-perform the additions and cross-casting of debtor master file and debtor control
Use CAATs to perform analytical review procedures:
â—¦
Compare total debtors with previous periods;
â—¦
compare the number of debtor accounts with previous periods
â—¦
compare the debtor payment period with previous periods.
SAMPLING
•
When designing audit procedures, the auditor should determine appropriate
means for selecting items for testing so as to gather sufficient appropriate
audit evidence to meet the objectives of the audit procedures
•
Audit sampling
•
•
Error
•
Anomalous error
Tolerable error
Population
Sampling unit
•
•
•
•
Sampling risk
•
Non-sampling risk
(Sampling) involves the application of audit procedures to less
than 100% of items within a class of transactions or account
balance such that all sampling units have a chance of selection
This will enable the auditor to obtain and evaluate audit
evidence about some characteristic of the items selected in
order to form or assist in forming a conclusion concerning the
population from which the sample is drawn
Means either control deviations, when performing tests of
controls, or misstatements, when performing tests of details
Means an error that arises from an isolated event that has not
recurred other than on specifically identifiable occasions and is
therefore not representative of errors in the population
Means the maximum error in a population that the auditor is
willing to accept
Means the entire set of data from which a sample is selected
and about which the auditor wishes to draw conclusions
Means the individual items constituting a population
Arises from the possibility that the auditor’s conclusion, based
on a sample may be different from the conclusion reached if
the entire population were subjected to the same audit
procedure
Arises from factors that cause the auditor to reach an
erroneous conclusion for any reason not related to the size of
the sample
BENEFITS OF SAMPLING:
• More cost-effective audit
• Time saving when performing audit
• More representative being performed
• More focused test being performed
STEP 1) DESIGN OF THE SAMPLE
•
(1) When designing an audit sample, the auditor should consider the
objectives of the audit procedure and the attributes of the population
from which the sample will be drawn
o For example, in a test of details relating to the existence of accounts
receivable, such as confirmation, payments made by the customer
before the confirmation date but received shortly after that date by the
client are not considered an error
o When performing tests of controls, the auditor generally makes an
assessment of the rate of error the auditor expects to find in the
population to be tested
so
WWW.TAKINGNOTES.CO.ZA
§
Similarly, for tests of details, the auditor generally makes an
assessment of the expected amount of error in the population
o Judgement used:
§ Determine sampling unit method
§ Acceptable error percentage
§ Expected error
§ Definition of the error
§ Confidence level
§ Systematic sampling: first selection + interval;
•
(2) POPULATION
o It is important for the auditor to ensure that the population is
§ Appropriate to the objective of the audit procedure, which will
include consideration of the direction of testing
• For example, if the auditor’s objective is to test for
overstatement of accounts payable, the population could
be defined as the accounts payable listing
§ Complete
• For example, if the auditor intends to select payment
vouchers from a file, conclusions cannot be drawn
about all vouchers for the period unless the auditor is
satisfied that all vouchers have in fact been filed
•
(3) SAMPLING UNIT
o Means the individual items constituting a population
•
(4) ERROR
o “Error” means either control deviations, when performing tests of
controls, or misstatements, when performing tests of details
•
(5) STRATIFICATION
o Audit efficiency may be improved if the auditor stratifies a population by
dividing it into discrete sub-populations which have an identifying
characteristic
•
(6) VALUE WEIGHTED SELECTION
o It will often be efficient in performing tests of details, particularly when
testing for overstatements, to identify the sampling unit as the
individual monetary units (for example, dollars) that make up a class
of transactions or account balance
§ All items in the population have a chance of selection
see
WWW.TAKINGNOTES.CO.ZA
CLASS QUESTION
•
Use monetary unit sampling to calculate the sample size for the debtors
circularisation if the maximum tolerable error is R73 600
Debtor
Balance
Cumulative balance
A
50 000
50 000
B
85 000
135 000
C
35 000
170 000
D
11 000
181 000
E
17 000
198 000
F
35 000
233 000
G
25 000
258 000
H
25000
283 000
I
60000
343 000
J
25000
368 000
Total
368 000
§
§
§
§
§
(1) Need a population
• That is divided into monetary units
(2) Sampling unit “R”
(3) Audit procedure
(4) Cumulative balance
(5) Sample size, is 5
= Total population / Maximum tolerable error
= 368 000 / 73 600
Monetary unit sampling:
• Population divided into monetary units (rand units the total account balance
consists of)
• A sample unit is identified as an individual monetary unit (a rand)
• After the rand value has been selected, it is traced to the physical item (invoice/
account) that contains the particular monetary unit.
• By means of a column with accumulated values of the relevant individual account
balances/ transactions
o Focuses on high value items: bigger probability of material misstatements
à smaller sample sizes and increased effectiveness.
WWW.TAKINGNOTES.CO.ZA
CLASS QUESTION
•
Want to select 5 debtors
o USING, for example, systematic selection
§ In which the number of sampling units in the population is
divided by the sample size to give a sampling interval, for
example 50, and having determined a starting point within the
first 50, each 50th sampling unit thereafter is selected
Debtor
Balance
Cumulative balance
A
50 000
50 000
B
85 000
135 000
C
35 000
170 000
D
11 000
181 000
E
17 000
198 000
F
35 000
233 000
G
25 000
258 000
H
25000
283 000
I
60000
343 000
J
25000
368 000
Total
368 000
o (1) Determine interval
§ Total population / 5
• = 368 000 / 5
• = 73 600
o (2) Make use of professional judgement to determine a starting
point
§ Start at 0
• But the auditor does not have to start at 0, but if the
auditor chooses not to start at 0
o The auditor needs to explain why they are not
starting at 0
o (3) Select a debtor
§ (1) Starting point is 0 + 73 600 (interval) = 73 600
• Therefore, select B
o As the cumulative balance of A is 50 000 which is
less than the interval of 73 600
§ (2) For the next interval, the starting point is 73 600 + 73 600 =
147 200
to
WWW.TAKINGNOTES.CO.ZA
§
§
§
• Therefore, select C
(3) For the next interval, the starting point is 147 200 + 73 600 =
220 800
• Therefore, select F
(4) For the next interval, the starting point is 220 800 + 73 600 =
294 400
• Therefore, select I
(5) For the next interval, the starting point is 294 400 + 73 600 =
368 000
• Therefore, select J
WWW.TAKINGNOTES.CO.ZA
as
•
(7) SAMPLE SIZE
Examples of Factors Influencing Sample Size for Tests of Controls
(Appendix 2)
EFFECT ON
FACTOR
SAMPLE SIZE
Increase
• An increase in the extent to which the risk of material
misstatement is reduced by the operating effectiveness of
controls
o The more assurance the auditor intends to obtain
from the operating effectiveness of controls,
o The lower the auditor’s assessment of the risk of
material misstatement will be,
§ And the larger the sample size will need to be
Decrease
• An increase in the rate of deviation from the prescribed
control activity that the auditor is willing to accept
Tolerable
(tolerable error)
error
should
o The lower the rate of deviation that the auditor is
be more than
willing to accept,
the rate of
§ The larger the sample size needs to be
deviation the
Increase
• An increase in the rate of deviation from the prescribed
auditor
expects
control activity that the auditor expects to find in the
population
o The higher the rate of deviation that the auditor
expects,
§ The larger the sample size needs to be
Increase
• An increase in the auditor’s required confidence level (or
conversely, a decrease in the risk that the auditor will
conclude that the risk of material misstatement is lower than
the actual risk of material misstatement in the population)
o The greater the degree of confidence that the auditor
requires that the results of the sample are in fact
indicative of the actual incidence of error in the
population,
§ The larger the sample size needs to be
Negligible effect
• An increase in the number of sampling units in the
population
o For large populations, the actual size of the
population has little, if any, effect on sample size
o For small populations however, audit sampling is
often not as efficient as alternative means of obtaining
sufficient appropriate audit evidence
Decrease
• Decrease in control risk
o Place more reliance on internal control à higher
detection risk or there can place less reliance on
substantive procedures and can a smaller sample.
WWW.TAKINGNOTES.CO.ZA
Examples of Factors Influencing Sample Size for Tests of Details
(Appendix 2)
EFFECT ON
FACTOR
SAMPLE SIZE
•
•
•
•
•
•
An increase in the auditor’s assessment of the risk of
material misstatement
o The higher the auditor’s assessment of the risk of
material misstatement
§ The larger the sample size needs to be
An increase in the use of other substantive procedures
directed at the same assertion
o The more the auditor is relying on other
substantive procedures (tests of details or
substantive analytical procedures) to reduce to an
acceptable level the detection risk regarding a
particular class of transactions or account balance
§ The less assurance the auditor will require
from sampling and,
• Therefore, the smaller the sample size
can be
An increase in the auditor’s required confidence level (or
conversely, a decrease in the risk that the auditor will
conclude that a material error does not exist, when in fact it
does exist)
o The greater the degree of confidence that the
auditor requires
§ The larger the sample size needs to be
An increase in the total error that the auditor is willing to
accept (tolerable error)
o The lower the total error that the auditor is willing to
accept,
§ The larger the sample size needs to be
An increase in the amount of error the auditor expects to
find in the population
§ The greater the amount of error the auditor
expects to find in the population,
• The larger the sample size needs to be
in order to make a reasonable estimate
of the actual amount of error in the
population
Stratification of the population when appropriate
o When there is a wide range (variability) in the
monetary size of items in the population
o Useful to group items of similar size into separate
sub-populations or strata
WWW.TAKINGNOTES.CO.ZA
Increase
Decrease
Increase
Decrease
Increase
Decrease
§
•
The aggregate of the sample sizes from the
strata generally will be less than the sample
size
The number of sampling units in the population
o For large populations, the actual size of the
population has little, if any, effect on sample size
o For small populations however, audit sampling is
often not as efficient as alternative means of obtaining
sufficient appropriate audit evidence
Negligible effect
STEP 2) SAMPLE SELECTION METHODS
The principal methods of selecting samples are as follows:
• (a) Use of a computerised random number generator (through CAATs) or
random number tables
• (b) Systematic selection,
o In which the number of sampling units in the population is divided by
the sample size to give a sampling interval, for example 50, and having
determined a starting point within the first 50, each 50th sampling unit
thereafter is selected
o Although the starting point may be determined haphazardly, the
sample is more likely to be truly random if it is determined by use of a
computerised random number generator or random number tables
o When using systematic selection, the auditor would need to determine
that sampling units within the population are not structured in such a
way that the sampling interval corresponds with a particular pattern in
the population
• (c) Haphazard selection,
o In which the auditor selects the sample without following a structured
technique
o Auditor would nonetheless avoid any conscious bias or predictability
(for example, avoiding difficult to locate items, or always choosing or
avoiding the first or last entries on a page) and thus attempt to ensure
that all items in the population have a chance of selection
o Haphazard selection is not appropriate when using statistical sampling
STEP 3) EVALUATING THE SAMPLE RESULTS
• In the case of TESTS OF CONTROLS,
o an unexpectedly high sample error rate may lead to an increase in the
assessed risk of material misstatement, unless further audit evidence
substantiating the initial assessment is obtained
• In the case of TESTS OF DETAILS,
o an unexpectedly high error amount in a sample may cause the auditor
to believe that a class of transactions or account balance is materially
misstated, in the absence of further audit evidence that no material
misstatement exists
so
WWW.TAKINGNOTES.CO.ZA
CLASS QUESTION: TOC
• Debtors
o You can assume that final materiality was set as R 450 000 and
performance materiality for debtors was R 60 000
o You have already substantiated the debtors of Suzelle with inter alia a
positive debtors' circularisation
o Debtors are divided into two strata, namely South Africa and Tanzania
South Africa
Debtors’ balance (before
deducting any allowance R980 000
for credit losses)
% Circulated
80%
Understatement found
R30 200
Tanzania
TOTAL
R310 000
1 290 000
70%
R20 510
REQUIRED
• Formulate a conclusion for the debtors' balance of Suzelle Proprietary Limited
based on the sample debtors circulated
• Assume a 95% confidence level and a precision interval of
R1 234
• Assume performance materiality is R60 000
CONCLUSION FOR DEBTORS’ BALANCE
Calculation:
= (30 200 / 80%) + (20 510 / 70%)
= 67 050
EXTRAPOLATE
Link to
CONFIDENCE PRECISION
CONFIDENCE
We as auditors are 95%
certain that the debtors
balance of R1 290 000
PRECISION
Was shown with
R67 050 +/- R1234
short (understated)
Link to acceptable error
The projected error (R67 050) is larger than the
maximum acceptable error (R60 000) and
therefore the population cannot be accepted
Assertions
The assertions relating to the existence, accuracy,
valuation and allocation of debtors are, in material
respects, incorrect
WWW.TAKINGNOTES.CO.ZA
COMPLETION OF THE AUDIT
FRAMEWORK
•
(1) Sufficiency of audit evidence (ISA 500)
o The auditor shall design and perform audit procedures that are appropriate in the
circumstances for the purpose of obtaining sufficient appropriate audit evidence
o When designing and performing audit procedures, the auditor shall consider the
relevance and reliability of the information to be used as audit evidence
•
(2) Evaluating audit differences (ISA 320)
o Basic example,
§ Amount in financial statements (for example PPE) = R100
§ Auditor performs procedures and concludes the correct valuation = R80
• Therefore, there is an audit difference = R20 (100 – 80)
o DR Impairment (P/L) 20
CR PPE (SFP) 20
o
Step 1) Determine final materiality
§ Misstatements, including omissions, are considered to be material if they
could reasonably be expected to influence the economic decisions
of users taken on the basis of the financial statements;
§ If during the audit it appears as though actual financial results are likely to
be substantially different from the anticipated period-end financial results
that were used initially to determine materiality for the financial statements
as a whole, the auditor revises that materiality (same calculation)
o
Step 2) Consider audit differences
§ The audit difference is R20 (from the above basic example)
§ To assist the auditor in evaluating the effect of misstatements
accumulated during the audit, it may be useful to distinguish between
factual misstatements, judgmental misstatements and projected
misstatements
• Factual misstatements are misstatements about which there is no
doubt
• Judgmental misstatements are differences arising from the
judgments of management concerning accounting estimates that
the auditor considers unreasonable, or the selection or application
of accounting policies that the auditor considers inappropriate
• Projected misstatements are the auditor’s best estimate of
misstatements in populations, involving the projection of
misstatements identified in audit samples to the entire populations
from which the samples were drawn
o
Step 3) Consider materiality of differences
§ Refer to the following class example (3)
§ (1) Quantitative
• (2) Qualitative
o There is no reason to regard it as qualitatively material, if it
is quantitatively material
WWW.TAKINGNOTES.CO.ZA
(3) CLASS EXAMPLE
•
•
•
•
•
•
•
Briefly discuss whether the audit differences as in item (a) to (c), in your opinion,
individually, or cumulatively, would have a material effect on the fair presentation of
the financial statements
Show your workings clearly
Assume final materiality is R 50 000 (quantitative)
You are busy with the completion of the audit for your audit client, Alexandri
(Proprietary) Limited
The company has experienced a strong growth tendency for the past 5 years
For the audit concerned you evaluated inherent risk as high and control risk as
medium
The notes below refer to notes that you have already made on your working papers
for audit purposes
o
o
o
o
•
Net PBT
Turnover
PPE
Current assets
§ Inventory
§ Debtors
§ Cash and cash equivalents
4 450
444 511
280 000
561 921
303 174
226 396
32 351
LIST OF AUDIT DIFFERENCES DETECTED DURING THE AUDIT
o
(a) The tax calculation of the company is incorrect, due to the fact that an
inadmissible deduction of R140,534 was claimed.
§
o
Incorrect tax calculation
• The impact was R39 350 (28% x 140 534)
o DR Income tax expense 39 350
CR SARS 39 350
• Which is less than R50 000
o The error is therefore not quantitatively material
(b) The inventory in one of the inventory warehouses was not included in
the stock take. The value of this inventory amounted to R56,223. Annual
problems are experienced during the audit of the company’s inventory figure
and stock take. As a result the previous year’s audit report was modified.
§
Inventory is not complete
• The impact was R56 223
o DR Inventory 56 223 (SFP)
CR COS 56 223 (P/L)
• This exceeds R50 000
o The error is therefore quantitatively material
§ However, the error is qualitatively material
WWW.TAKINGNOTES.CO.ZA
o
(c) No provision for credit losses was made for the current year. The
accounting policy of Alexandri (Proprietary) Limited is to provide for 7,5% of
the outstanding debtors as provision for credit losses every year
§
No provision for credit losses was made for the current year
• Breaching IFRS
• The impact was R16 980 (226 396 x 7.5%)
o DR Allowance for credit losses movement 16 980 (P/L)
CR Allowance for credit losses 16 980 (SFP)
• Which is less than R50 000
o The error is therefore quantitatively material
WWW.TAKINGNOTES.CO.ZA
•
(4) Going concern considerations (ISA 570)
o
Under the going concern assumption, an entity is viewed as continuing in
business for the foreseeable future
o
Responsibilities of management
§ The preparation of the financial statements requires management to
assess the entity’s ability to continue as a going concern even if the
financial reporting framework does not include an explicit requirement to
do so
o
Responsibilities of the auditor
§ The auditor’s responsibility is to obtain sufficient appropriate audit
evidence about the appropriateness of management’s use of the going
concern assumption in the preparation of the financial statements
§ To conclude whether there is a MATERIAL UNCERTAINTY about the
entity’s ability to continue as a going concern
o
Refer to the following class example (4)
Influence of going concern issue on audit report:
1. Material uncertainty regarding going concern, the auditor must consider whether the
financial statement properly described this matter and also mention that material
uncertainty regarding going concern exists
2. If company disclosed going concern problem, and the company’s future plans are
sufficient, and auditors deem plans as reasonable, audit report
3. Since no evidence exists that the financial statements are reasonably presented as a
whole
4. The auditor will state the details of the matter in the going concern paragraph in new
audit report
5. If the company did not properly disclose the going concern problem, audit report
qualified
6. Adverse opion expressed if the problem has a material impact on the reasonable
presentation of the financial statement and the financial statement are misleading as
a result
7. If the auditor came to the conclusion that the going concern basis is not appropriate
then, the financial statement must be prepared according to the liquidity basis rather
than going concern. If the financial statements were prepared on going concern
basis, adverse opinion must be expressed as the financial statement cannot be used
and are meaningless
8. If there is a constraint the audit of the going concern problem, the auditor will refrain
from giving an opinion
WWW.TAKINGNOTES.CO.ZA
(4) CLASS EXAMPLE
•
Evaluate the appropriateness of the going concern assumption underlying the
financial information of Voertuig Limited as at 31 October 2015
•
The abridged balance sheet of Voertuig Limited as at 31 December 2015 is below:
•
•
Fixed assets
Debtors
Creditors
Bank overdraft
50 000
40 000
(70 000)
(24 000)
(4 000)
Share capital
Accumulated loss
Shareholders loan
300
(10 000)
5 970
(4 000)
Take a look at quantitative factors
o Accumulated loss
§ Negative impact on going concern
o Assets < Liabilities
§ Difference is actually R9 970 (4 000 +
5 970)
• As there is a SHs loan
o Negative impact on going
concern
o Current assets < Current liabilities
§ Cannot meet short-term liabilities
• Negative impact on going concern
“From the actual figures for
year ended, it appears as if
the company’s liabilities will
exceed its assets at year-end
(technical insolvency)”
Take a look at qualitative factors
o During the current year, Mr Zet, the engineer involved in the design of alloy
wheels resigned because of differences of opinion with the rest of
management. Efforts to get hold of a replacement for Mr Zet on short notice,
was unsuccessful. Management was compelled to make a decision to sell the
alloy-wheel segment. At year-end a plan was already in place to sell the
segment as well as an active programme to find a purchaser for the segment.
§ Loss of key personnel that cannot be replaced
• Negative impact on going concern
o
The alloy-wheel segment’s assets were revalued (excluding the bank
account) and marketed at R20 million.
§ Selling a major part of my business
• Negative impact on going concern
o Indicate
• Positive impact on going concern
o Will receive R20 million
§ BUT, if you compare the R20 million to the bank
overdraft (R24 million), it will not cover the bank
overdraft
WWW.TAKINGNOTES.CO.ZA
o
From 31 August 2015 to 31 October 2015 no new orders for airbags were
received. WBM, a well-known motor manufacturer cancelled its orders for the
year. WBM’s business with Voertuig Limited comprises 40% of Voertuig
Limited’s annual sales. Management is concerned about the matter and
marketing agents were approached to assist with the marketing of airbags
§ No new orders
• Negative impact on going concern
§ Loss of key customers
• Negative impact on going concern
§ Marketing of to assist with sales in the future
• Positive impact on going concern
o
•
THEREFORE, IN CONCLUSION!!!
§ BASED ON THE FOLLOWING, THERE IS A
MATERIAL UNCERTAINTY OF THE
COMPANY’S ABILITY TO CONTINUE AS A
GOING CONCERN
(5) Consider subsequent events (ISA 560)
o
Financial statements may be affected by certain events that occur after the date
of the financial statements
o
The auditor shall perform the PROCEDURES required by paragraph 6
§ (Ref: Para. 6) Audit procedures designed to obtain sufficient
appropriate audit evidence that all events occurring between the date
of the financial statements and the date of the auditor’s report that
require adjustment of, or disclosure in, the financial statements have
been identified
so that they cover the period from the date of the financial statements to the date
of the auditor’s report, or as near as practicable thereto
The auditor shall take into account the auditor’s risk assessment in determining
the nature and extent of such audit procedures, which shall include the following:
(Ref: Para. A7–A8)
§ (a) Obtaining an understanding of any procedures management has
established to ensure that subsequent events are identified.
o
o
§
(b) Inquiring of management and, where appropriate, those charged
with governance as to whether any subsequent events have occurred
which might affect the financial statements. (Ref: Para. A9)
§
(c) Reading minutes, if any, of the meetings of the entity’s owners,
management and those charged with governance that have been held
after the date of the financial statements and inquiring about matters
discussed at any such meetings for which minutes are not yet available.
(Ref: Para. A10) (d) Reading the entity’s latest subsequent interim
financial statements,
WWW.TAKINGNOTES.CO.ZA
a
(5.1) CLASS EXAMPLE
Year end
31 July 2018
•
•
•
•
•
•
After year end
23 August 2018
A fire destroyed inventory in one of the
warehouses
The fire has occurred after the year ended
Therefore, does not refer to a situation that existed at the reporting date
Therefore, the AFS need not be adjusted
As the fire would have a material effect on the business, it should have been brought
to the attention of the users by means of a note to the financial statements
It will therefore qualify as a material audit difference and the audit report will have
to be qualified accordingly (‘except for’)
Step 1) IAS 10
o
o
Adjusting
§ An event after the reporting period that provides further evidence of
conditions that existed at the end of the reporting period, including an
event that indicates that the going concern assumption in relation to
the whole or part of the enterprise is not appropriate
• Adjust financial statements
Non-adjusting
§ An event after the reporting period that is indicative of a condition that
arose after the end of the reporting period
• Material event?
o Therefore, disclose in a note to the financial
statements
•
Step 2) What is the timing?
•
Step 3) Do we have to inform the users?
o
•
If the event would have a material effect on the business, it should have
been brought to the attention of the users
Step 4) Effect on audit report
o
Qualified accordingly (‘except for’)
WWW.TAKINGNOTES.CO.ZA
(5.2) CLASS EXAMPLE
•
The following important dates in the year-end conclusion process of the audit:
Financial year-end:
September 2014
Date of the audit report:
2014
Handing over of the audit report to client:
2014
Auditor receives report from financial director to read:
November 2014
Posting annual reports to shareholders:
November 2014
30
31 October
31 October
5
15
•
Final materiality is R 2 500 000
•
Management has already indicated that they are not willing not adjust the financial
statements for the legal claim
•
Legal claims
o You read the following in the paper during the weekend of 26 October 2014:
§ Legal claim made against Jimmy Shoe Limited
• Mrs. Wondershoe made a legal claim, amounting to R3
million, against Jimmy Shoe Limited after she was seriously
injured when she fell down a flight of stairs on 27 September
2014. She was wearing her 15cm high-heel Jimmy Shoes and
one of the heels broke
Before year
end
27
September
2014
Þ Legal
claim
made
Year
end
31
September
2014
After year
end
26 October
2014
After year
end
31 October
2014
Þ You
Þ Audit
read the
article in
the
paper
report
After year
end
5
November
2014
Þ Auditor
receives
report
from
financial
director
After year
end
15 November
2014
Þ Posting
annual
reports to
shareholders
•
Take a look at quantitative factors
o The event is quantitative material since the provision of R3 000 000
exceeds the materiality figure of R2 500 000
•
Take a look at qualitative factors
o There is no reason to regard it as qualitatively material, if it is quantitatively
material
WWW.TAKINGNOTES.CO.ZA
•
Step 1) IAS 10
o
•
Step 2) What is the timing?
o
•
The legal claim (events after reporting date), occurred between the date of
the financial statements and the date of the issuing of the audit report and we
must consider whether the event has an effect on our audit report
Step 3) Do we have to inform the users?
o
o
•
Adjusting
§ The event provides information regarding a condition which existed on
the reporting date and therefore an adjustment must be considered in
the financial statements
If it is probable that the claim will succeed, a provision must be created in the
financial statements, otherwise it must be disclosed as a contingent liability in
the financial statements. Management already indicated that they will make
no changes
Discuss the probability that the claim will succeed with management and the
company’s legal advisors
Step 4) Effect on audit report
o
o
o
o
o
It is a matter that affects the audit opinion
It is a disagreement with management
It can be explained briefly and easily to users in the auditors’ report (or not
misleading users)
It is therefore not pervasive to the financial statements
The audit report must therefore contain a qualified audit opinion regarding
contingent liability
WWW.TAKINGNOTES.CO.ZA
•
(6) Conclusion and reporting
o
OVERALL OBJECTIVES OF THE INDEPENDENT AUDITOR (ISA 200)
§ In conducting an audit of financial statements, the overall objectives of the
auditor are:
• (a) To obtain reasonable assurance about whether the financial
statements as a whole are free from material misstatement,
whether due to fraud or error, thereby enabling the auditor to
express an opinion on whether the financial statements are
prepared, in all material respects, in accordance with an applicable
financial reporting framework; and
• (b) To report on the financial statements, and communicate as
required by the ISAs, in accordance with the auditor’s findings
o
Illustrated audit reports pg 758
o
Title
o
Address the users
o
Opinion
§
(1) Unmodified opinion
• The opinion expressed by the auditor when the auditor concludes
that the financial statements are prepared, in all material respects,
in accordance with the applicable financial reporting framework
• In our opinion, the financial statements give a true and fair view in
all material respects
§
(2) Modified opinion (ISA 705)
• The auditor shall modify the opinion in the auditor’s report when:
o (Q1) The auditor concludes that, based on the audit
evidence obtained, the financial statements as a whole are
not free from material misstatement; or
o (And then Q2) The auditor is unable to obtain sufficient
appropriate audit evidence to conclude that the financial
statements as
Determining the Type of Modification to the Auditor’s Opinion
•
(1) Qualified opinion (‘except for’)
o The auditor shall express a qualified opinion when:
§ (1) The auditor, having obtained sufficient
appropriate audit evidence, concludes that
misstatements, individually or in the aggregate, are
material, but not pervasive, to the financial
statements; or
• Pervasive
o A term used, in the context of
misstatements, to describe the
effects on the financial statements of
misstatements or the possible effects
WWW.TAKINGNOTES.CO.ZA
§
on the financial statements of
misstatements, if any that are
undetected due to an inability to
obtain sufficient appropriate audit
evidence
(2) The auditor is unable to obtain sufficient
appropriate audit evidence on which to base the
opinion, but the auditor concludes that the possible
effects on the financial statements of undetected
misstatements, if any, could be material but not
pervasive
•
(2) Adverse opinion
o The auditor shall express an adverse opinion when the
auditor, having obtained sufficient appropriate audit
evidence, concludes that misstatements, individually or in
the aggregate, are both material and pervasive to the
financial statements
•
(3) Disclaimer opinion
o The auditor shall disclaim an opinion when the auditor is
unable to obtain sufficient appropriate audit evidence on
which to base the opinion, and the auditor concludes that
the possible effects on the financial statements of
undetected misstatements, if any, could be both material
and pervasive
LIMITATION OF SCOPE AND DIFFERENCE OF OPINION
Q1) Is the matter material?
• Qualified opinion (‘except for’)
LIMITATION OF SCOPE
Q2) Is the effect on the financial statements also pervasive?
• Disclaimer opinion
DIFFERENCE OF OPINION
Q2) Is the effect on the financial statements also pervasive?
• Adverse opinion
o Effect is so material that a qualified opinion will not be enough to disclose the
misstatement
a
WWW.TAKINGNOTES.CO.ZA
Matter
Opinion
Provision for bad debt
insufficient
•
Modified
o Except for Qualified opinion
Do not comply with IFRS but
disclose it
•
Matter of emphasis
o Unqualified opinion
Do not comply with IFRS
and didn’t disclose it
•
Modified opiniono ”Except for”
No Inventory count: current
year
•
Modified opinion
o Except for qualification (if not that material&
fundamental, otherwise-disclaimer of opinion
Accounting system failure
•
Modified opinion
o Disclaimer of opinion
Going concern inappropriate
& no disclosure of the facts
•
Modified opinion
o Adverse opinion
so
WWW.TAKINGNOTES.CO.ZA
Statements preparation on going concern assumption
No uncertainty going concern assumption
Material uncertainty, property disclosed
Material uncertainty, not properly disclosed
Management limits investigating
Disagreement
Unqualified
Separate paragraph in
report
Qualify
Disclaimer
Adverse
Financial statements prepared on liquidation basis
No uncertainty about appropriateness of liquidation basis
Difference of opinion
Unmodified EoM
Adverse
Unqualified with emphasis of matter paragraph:
• Opinion not influenced by the errors but there is a significant item that should be
noted in the audit report.
Qualified opinion:
• Financial statement as a whole still a fair presentation “except for” certain material
misrepresentations that are not pervasive/ fundamental.
Disclaimer of opinion:
• Not able to gather sufficient audit evidence to give an opinion about the fairness of
the financial statement, because limitation on scope of work of audit procedures.
Adverse opinion:
• Certain that financial statement not a fair presentation of company’s results
o Pervasive/ fundamental difference gives rise to such an opinion.
WWW.TAKINGNOTES.CO.ZA
o
Basis of opinion
§ Simply states the auditor's opinion on the financial statements and
whether they are in accordance with generally accepted accounting
principles
§ Emphasis of matter (Page 847)
• A paragraph included in the auditor’s report that refers to a
matter appropriately presented or disclosed in the financial
statements that, in the auditor’s judgment, is of such importance
that it is fundamental to users’ understanding of the financial
statements
o
Key audit matters (ISA 701)
§ Those matters that, in the auditor’s professional judgment, were of most
significance in the audit of the financial statements of the current
period
§ Key audit matters are selected from matters communicated with those
charged with governance
o
Other matters
o
Other information (ISA 720)
§ Financial and non-financial information (other than the financial
statements and the auditor’s report thereon) which is included, either by
law, regulation or custom, in a document containing audited financial
statements and the auditor’s report thereon
o
Management’s Responsibility for the Financial Statements (ISA 700)
§ Management is responsible for the preparation and fair presentation of
these financial statements in accordance with International Financial
Reporting Standards, and for such internal control as management
determines is necessary to enable the preparation of financial statements
that are free from material misstatement, whether due to fraud or error
o
Auditor’s Responsibility (ISA 700)
§ Our responsibility is to express an opinion on these financial statements
based on our audit
(6.1) CLASS EXAMPLE
•
Give the impact on the audit report separately in each case
•
Steps
o (1) Disagreement with management or limitation of scope?
o (2) Material or pervasive?
o (2) Impact on audit report and audit opinion
WWW.TAKINGNOTES.CO.ZA
CASE
•
•
•
•
•
•
•
•
•
•
•
•
A register of the interests of directors and officials in
contracts with the company, as required by section 240 of
the Companies Act in South Africa has not been
maintained
During the year the company granted long term credit of
R15 000 to one of its clients
Ezron Proprietary Limited shows the amount as a current
asset and refuses to rectify it
The materiality figure is R100 000
The company has not performed the physical stock count
of its export raw material stock that is shown in the
financial statements at R500 000
Materiality R100 000
Ezron Proprietary Limited has not recognised a liability for
deferred tax
In accordance with the South African Statements on
Income Tax a deferred tax liability should be recognised
for all taxable temporary differences, unless that
Statement indicates otherwise
The company is a defendant in litigation on an alleged
contravention of certain patent rights and the claim for
royalties and punitive damages. The company has
brought a counterclaim and preliminary hearings and
discovery proceedings with regard to both actions are in
progress
Currently the outcome of the case cannot be determined
and therefore no provision for any liability that may result
from the case has been made in the financial statements
Note disclosure has been made of the contingent liability
in the financial statements
WWW.TAKINGNOTES.CO.ZA
•
•
•
•
•
•
•
OPINION
No disagreement with
management or
limitation of scope
Unmodified opinion
o Legal &
regulatory
paragraph
No disagreement with
management or
limitation of scope
Not material
Unmodified opinion
Limitation of scope
Material
Modified opinion
o Qualified
opinion (‘except
for’)
•
Modified opinion
o Qualified
opinion (‘except
for’)
•
No disagreement with
management or
limitation of scope
Unmodified opinion
o With emphasis
of matter
paragraph
•
(6.2) CLASS EXAMPLE (Consider subsequent events, and then conclude and report)
• The following important dates in the year-end conclusion process of the audit:
Financial year-end:
September 2014
Date of the audit report:
2014
Handing over of the audit report to client:
2014
Auditor receives report from financial director to read:
November 2014
Posting annual reports to shareholders:
November 2014
•
•
30
31 October
31 October
5
15
Final materiality is R 2 500 000
Management has already indicated that they are not willing not adjust the financial
statements for the legal claim
• Legal claims
o You read the following in the paper during the weekend of 26 October 2014:
§ Legal claim made against Jimmy Shoe Limited
• Mrs. Wondershoe made a legal claim, amounting to R3
million, against Jimmy Shoe Limited after she was seriously
injured when she fell down a flight of stairs on 27 September
2014. She was wearing her 15cm high-heel Jimmy Shoes and
one of the heels broke
• Take a look at quantitative factors
o The event is quantitative material since the provision of R3 000 000
exceeds the materiality figure of R2 500 000
• Take a look at qualitative factors
o There is no reason to regard it as qualitatively material, if it is quantitatively
material
• Effect on audit report (Consider subsequent events)
o It is a matter that affects the audit opinion
o It is a disagreement with management
o It can be explained briefly and easily to users in the auditors’ report (or not
misleading users)
o It is therefore not pervasive to the financial statements
o The audit report must therefore contain a qualified audit opinion regarding
contingent liability
• DISCUSS THE IMPACT ON AUDIT OPINION (Conclude and report)
Affects the audit opinion?
It is a matter that affects the audit opinion
Why?
Disagreement with
Limitation It is a disagreement with management
management
of scope
The event is quantitative material since the provision of
Material?
R3 000 000 exceeds the materiality figure of R2 500 000
Pervasive?
It can be explained briefly and easily to users in the
Affects
auditor’s report (or not misleading)
Easy to explain to users
multiple
It is therefore not pervasive to the financial statements
accounts
The audit report must therefore contain a qualified audit
Report
opinion regarding contingent liability
WWW.TAKINGNOTES.CO.ZA
0
Download