UNIVERSITY OF WATERLOO – SCHOOL OF ACCOUNTING AND FINANCE ACC 626 Term Paper Information technology impact on assurance engagement; Impact of Sarbanes Oxley; Internal Controls and Outsourcing Kieng Iv 20233702 6/30/2011 Abstract: Information technology has created risks for businesses and auditors such as segregation of duties, complex revenue streams and computer crimes. C-suite executives should understand the impact that information technology can have on their businesses. The profession and businesses manage these risks through experts, frameworks, information technology tools and access management. There are new information technology tools, such as cloud computing, that need to be addressed by auditors because they create implications for internal controls and security of the business. This is something that is not currently addressed by the profession but must be addressed in order to meet the needs of their clients. Table of Contents Introduction.................................................................................................................................................... 1 Information Technology Risk......................................................................................................................... 1 Managing Information Technology Risk ........................................................................................................ 4 Sarbanes Oxley Impact ................................................................................................................................. 6 Outsourcing Information Technology ............................................................................................................ 8 Conclusion................................................................................................................................................... 10 Work Cited................................................................................................................................................... 11 Annotated Bibliography ............................................................................................................................... 13 Introduction Information technology has revolutionized the business world through how it operates and innovates; however, the same technology has also created many risks within the business world and should be a main concern for C-suite executives. “Information systems permeate all areas of organizations, differentiate them in the marketplace, and consume increasing amounts of human and financial capital.” 1 The same information technology has had a pervasive impact on audit risk for internal and external auditors. Auditors and the profession manage this relatively new risk in various ways such as use of frame works, assistance from specialists and information technology tools. This risk has increased significantly due to the Sarbanes Oxley Act 2002. Sarbanes Oxley has had significant impact on internal controls and internal control reporting, and it has increased the risk of outsourcing information technology processes. This paper will also identify areas of risk with outsourcing information technology, show how the business community manages that risk, and will identify any gaps not currently addressed that will need to be addressed by the accounting profession. Information Technology Risk A survey done by Computer Crime and Security has showed that 45% of unauthorized access was performed by insiders within a company.2 Insiders have access to and knowledge of the system that is not as readily available to outsiders. Employees can also damage the organization through unintentional means such as deleting important files, opening emails with viruses, and other such accidental acts. To mitigate the risk of intentional and unintentional damage, organizations need effective access management. Segregation of duties built into non-information technology processes need to be implemented in the information technology environment. With the use of information technology, capital has replaced human capital in many traditional functions within the workplace; however, the same segregation of duties requirements is still needed. An example of this is the posting of journal entries. Prior to information technology, there may have been the need to have many accounting clerks to manage all the journal entries of the organization; nonetheless, with automated functions, the need for accounting clerks is reduced. This is only an issue when functions need to be segregated. With fewer 1 Boritz, Efrim J. "Introduction to Internal Control and the Role of Information Technology."Computer Control & Audit Guide. 15th ed. Waterloo: Centre for Information Integrity and Information Systems Assurance, 2011. 3-24. Print. 2 Silltow, John. "Shedding Light on Information Technology Risks." Internal Auditor December (2005): 32-39. Web. 1 June 2011. <http://web.ebscohost.com.proxy.lib.uwaterloo.ca/ehost/pdfviewer/pdfviewer?sid=2fe1fd03-3a43-4b3da36f-406db34e405c%40sessionmgr4&vid=7&hid=17>. 1 employees, organizations have to ensure that no employee has too much access and this is easy to overlook since functions are performed virtually instead of physically. This makes segregation of duties more challenging when information technology is introduced. The potential damage caused by internal and external attacks includes direct costs but also loss of reputation. 3 Information technology has increased audit risk by having a pervasive impact on the financial statement reporting and auditing, especially on the occurrence and completeness of transactions and the testing of controls. In today’s standard audit, auditors must develop an understanding of the control environment of the entity. “An unreliable system can cause a succession of events that negatively affect a company and its customers, suppliers, and business partners.”4 Controls have increased in complexity with information technology. One example, prior to information technology, is in order to test the controls for cash disbursements, an auditor would just need to obtain a list of approved signatures and manually sample a list of cheques and compare it against the list of approved signatures. However, information technology has allowed electronic transfers in addition to preexisting physical cheques. In addition to the previous manual testing, auditors will have to develop an understanding of the underlying accounting information system. Who has authority to create vendors? Does authority exist for electronic transfers? If so, who has authority and can anyone override that authority? Many of the same implications that exist for manual cash disbursements exist for information technology, but verifying the controls is much more complicated and requires an understanding of the information system. Cash disbursement is not the only component of the audit that requires more attention, CAS 315.3 requires auditors to test controls if the entity’s environment is highly automated with little or no manual intervention.5 Substantive procedures alone are insufficient to obtain sufficient appropriate audit evidence. Prior to information technology, auditors evaluated whether to use a combined approach or purely substantive approach based on the strength of the control environment, the volume of transactions, and the cost-benefit analysis; however, the Canadian Auditing Standards are mandating the compulsory testing of controls if the environment uses information technology and highly automated processes. The standard setters have identified that it is improbable to obtain sufficient appropriate audit evidence and thus, cannot express an opinion on the financial statements solely through substantive testing. Information technology has allowed companies to increase its revenue streams especially in the field of ecommerce and online advertising. These opportunities have also increased complications in the occurrence and completeness of these revenues. Revenue can generally be recognized when risk and 3 Ibid Boritz, Efrim J. "Introduction to Internal Control and the Role of Information Technology."Computer Control & Audit Guide. 15th ed. Waterloo: Centre for Information Integrity and Information Systems Assurance, 2011. 3-24. Print. 5 CAS 315.13 4 2 rewards are transferred to the buyer, performance is complete, collection is reasonably assured and expenses and revenue are measurable. When it comes to online sales, the occurrence of sales is the assertion that auditors need to test. One of the major differences between brick and mortar and online sales is the collectability of the economic benefits. If an entity does not validate the method of payment for online sales then fictitious transactions could be processed and revenue could potentially be overstated; however, without understanding the information technology environment, auditors and the company would not know that the revenue cannot be recorded due to collectability issues until much later. It is difficult to assess completeness and occurrence without thorough understanding of controls for online advertising and other purely electronic revenue streams such as video games. For example, if revenue is recognized when advertisements are clicked on a website, then in order to capture when revenue is earned, the underlying information system has to capture the instances when advertisements are clicked. It is not enough to assess revenue earned by the information captured by the system. Another example is if the batch transfer or the real-time transfer is corrupted or never reaches the internal systems when advertisements are clicked, then the internal system will be inaccurate and the revenues will be misstated. This increases the risk of material misstatements to a greater extent than if there were no online revenue streams. Not only does information technology increase the risk of material misstatement through complex revenue streams, accounting errors occur more often when there is information technology control deficiencies. 6 Companies with more information technology control deficiencies pay a higher audit fee and generally employ smaller accounting firms.7 Lastly, auditors could issue the incorrect opinion if they do not understand how the information technology impacts the business and this could lead to loss of reputation and legal issues. One of the top risks listed in the 2010 Internal Audit Capabilities and Needs Survey was ability to assess information technology risk, which also topped the list in 2009. Also high on the list is certification standards for COBIT. “Managing director of Protiviti, Scott Graham, stated that auditing information technology processes and activities should be one of the highest priorities in internal audit departments given that information technology enables virtually all business functions”.8 The Institute of Internal 6 Grant, Gerry H., Karen C. Miller, and Fatima Alali. "The Effect of IT Controls on Financial Reporting." Managerial Auditing Journal 23.8 (2008): 803-23. Web. 29 May 2011. <http://www.emeraldinsight.com/journals.htm?articleid=1746755&show=pdf>. 7 Ibid 8 Jaeger, Jaclyn. "Survey: IT Risk, IFRS Top Internal Auditors’ Worries." Survey: IT Risk, IFRS Top Internal Auditors’ Worries 7.77 (2010): 38. Web. 31 May 2011. <http://web.ebscohost.com.proxy.lib.uwaterloo.ca/ehost/detail?vid=12&hid=17&sid=ca14f94e-d82f-4e7cb475a5f41240f864%40sessionmgr15&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=bth&AN=52 682551>. 3 Auditing has responded with this risk by introducing six standards covering topics including assessing information technology governance. Overall, there are many implications that information technology has created for the audit and the businesses that utilize information technology. Managing Information Technology Risk Information technology has increased audit risk and auditors had to address this risk by using information technology specialists and information technology tools. The IIA has provided lots of material and training to address the information technology issues within internal audit. As well, frameworks such as COBIT, COSO and ITCG have provided guidance for auditors to use in order to assess client’s information technology controls. Lastly, AICPA has clearly established that auditors are responsible for understanding the role of information technology in the client’s business.9 AICPA has advised auditors to consider using “computer-related audit procedures, including information technology specialists, when they obtain an understanding of client internal controls during audit planning”.10 In a study done in the Journal of Information Systems, it was found that 45% of sampled engagements information technology specialist were used. 11 Information technology specialists are generally involved in the planning and performance of information technology controls testing to reduce audit risk. The more complex the computer environment, the more important it is to get an information technology specialist involved when performing an audit. At Deloitte, it is now required to have an IT specialist in the audit planning at least every three years because of the growing importance of information technology with the clients’ environment produces the need to reduce the information technology risk.12 The use of information technology specialist allows auditors to test sophisticated information technology processes. Referring back to the example with electronic transfers, if an information technology specialist is used, then the underlying system controls can be verified whether or not there is segregation of duties issues and if there are unauthorized disbursements. As well, online revenue streams can be tested more 9 Bedard, Jean C., Cynthia Jackson, and Lynford Graham. "Information Systems Risk Factors, Risk Assessments, and Audit Planning Decisions." Web. 28 Mar. 2011. <http://aaahq.org/audit/midyear/03midyear/papers/Systems%20Risk%20Factors%20and%20Audit%20Pl anning%2009-18.pdf>. 10 Jarvin, Diane, James Bierstaker, and Jordan Lowe. "An Investigation of Factors Influencing the Use of Computer-Related Audit Procedure." Journal of Information Systems 23 (2009): 1-22. Web. 23 June 2011. <http://www.bus.iastate.edu/djanvrin/acct484584/readings/05%201_22-3.pdf>. 11 Jarvin, Diane, James Bierstaker, and Jordan Lowe. "An Examination of Audit Information Technology Use and Perceived Importance." Accounting Horizons 22.1 (2008): 1-21. Web. 28 May 2011. <http://web.ebscohost.com.proxy.lib.uwaterloo.ca/ehost/pdfviewer/pdfviewer?sid=ca14f94e-d82f-4e7cb475-a5f41240f864%40sessionmgr15&vid=6&hid=17>. 12 Pryce, Jim. "ACC 626 Deloitte Partner Interview." 03 May 2011. E-mail. 4 effectively if the controls of the system are tested by information technology professors to verify the completeness and occurrence of those revenue streams. Testing controls is not only necessary for these complicated transactions, but also reduces the amount of substantive testing needed and creates audit efficiencies. In the past, 80% of data files were processed using flat files and only 20% using databases. However, those percentages have changed and now 80% of data files are processed using databases. The implication is that record retention is not as clear, and as a result, audit trails are more complex or do not exist in physical form.13 In order to obtain sufficient appropriate audit evidence, computer assisted audit techniques may be needed in situations such as the absence of input documents (i.e. order entry in online systems), the lack of a visible audit trail, visible output, visible control totals, or varying quantities of audit information may make manual techniques impractical. 14 In order to address the risk that information technology has created, it is necessary for auditors to turn to computer-assisted auditing techniques. “Computer-assisted auditing techniques (CAATs) can be used for assessing inherent risk, evaluating internal control and assessing control risk, analytical review, and tests of detail applied to transactions and/or balances.”15 A more specific example is illustrated by the Information Systems Audit and Control Association (ISACA). This example entails that payroll controls have not been properly implemented and the system has existed for two years. Instead of manually testing two years of payroll data, the system can be tested in completeness using CAATs and not only provides assurance on payroll but also “increases the credibility and value provided by the audit function.” 16 This is an example of where CAATs are necessary because of the large amount of transactions. 17 ACL and IDEA are two common CAATs used in practice. “The use of ACL and IDEA has increased audit efficiency and effectiveness.”18 Beyond, CAATs and information technology specialist, frameworks are often used for assessing internal controls. Committee of Sponsoring Organizations (COSO) is the most common information technology governing framework but does not explicitly address information technology control objectives. COSO has been used as the basis for SAS 78, ISA 315 and Canadian standards, which all address information 14 Ibid Ibid 16 Sayana, Anantha. "Using CAATs to Support IS Audit." Information Systems Control 1 (2003): 12. Web. 23 June 2011. <http://www.isaca.org/Journal/Past-Issues/2003/Volume-1/Documents/jpdf031UsingCAATstoSupportISAu.pdf>. 17 Pryce, Jim. "ACC 626 Deloitte Partner Interview." 03 May 2011. E-mail. 15 5 technology either implicitly or explicitly. 19 “Financial auditors are required to gain an understanding of the "entity and its environment" to ascertain the risk of material misstatement associated with that aspect of the financial statements, and the COSO model is extremely valuable as a tool to comply with this standard.”20 COSO provides guidance on general, application, and physical controls. “General controls are controls that in general affect the computer systems (information systems) and information technologies employed by the entity in performing functions (business processes) associated with financial reporting activities. Application controls are computer controls embedded within technologies and systems that are intended to ensure that policies and procedures are carried out in the business processes.”21 COSO also provides guidance for auditors on the levels that controls can be tested: design effectiveness, implementation and operational effectiveness which are helping with being compliant with SAS 109. Another framework that can be used, that is arguably more relevant than COSO for information technology controls, is Control Objectives for Information and related Technology (COBIT). COBIT is “Authoritative, up-to-date, international set of generally accepted IT control objectives and control practices for day-to-day use by business managers and auditors.”22 It was created because of the growing importance of technology and the need to hold senior management more accountable. “COBIT focuses on information having integrity and being secure and available.” 23 COBIT’s objectives are to ensure the integrity of information systems and by creating a framework to provide assurance by giving excellent criteria for review and audit work. COBIT supplies a working control model for information technology control objectives, helps auditors identify key risk areas when observing systems, and provides a model for evaluating controls. Overall, auditors have addressed many of the past risks that information technology has created through use of specialists, frameworks, and information technology tools such as CAATs. Sarbanes Oxley Impact Sarbanes Oxley has made information technology governance and internal controls mission critical in financial reporting and performing the audit. Sarbanes Oxley has also made the reporting of internal 19 Boritz, Efrim J. "Introduction to Internal Control and the Role of Information Technology."Computer Control & Audit Guide. 15th ed. Waterloo: Centre for Information Integrity and Information Systems Assurance, 2011. 3-24. Print. 20 Singleton, Tommie. "The COSO Model: How IT Auditors Can Use It to Evaluate the Effectiveness of Internal Controls." ISACA. ISACA. Web. 24 June 2011. <http://www.isaca.org/Journal/Past-Issues/2007/Volume-6/Pages/The-COSO-Model-How-IT-AuditorsCan-Use-It-to-Evaluate-the-Effectiveness-of-Internal-Controls1.aspx>. 21 Ibid 22 Beveridge, John. COBIT IMPLEMENTATION WORKSHOP. PPT. 23 Ibid 6 controls mandatory for public companies and the attesting of those controls a compulsory component of financial statement audit.24 IT assurance is more relevant in the business world than ever before because of Sarbanes Oxley. The penalties for not being compliant to Sarbanes Oxley legislation can be severe with fines of up to $5 million dollars and 20 years in prison. This makes information technology important to senior executives within the company. Before discussing how Sarbanes Oxley impacts internal controls, it is first important to define and understand internal controls. The AICPA defines the role of internal controls as one that “compromises the plan of organization and all the coordinate methods and measures adopted within a business to safeguard its assets, check the accuracy and reliability of its accounting data, promote operating efficiency, and encourage adherence to prescribed managerial policies”. 25 Controls entail two main views, namely the cybernetic view and socio-cultural view. The cybernetic view is based on the principles of a self-monitoring system. It compromises of setting goals then following up if there are any deviations. The socio-cultural view focuses on hiring good people, training, and socializing employees into the culture of the organization. When behavioural processes are readily observable and goals, tasks and outcomes are well specified then cybernetic is better to use since control can be better monitored over the process. If the reverse is true, then socio-cultural is superior to use. However, most organizations use a combination of socio-cultural and cybernetic. In addition to the views, there are five components of an internal control system and they are control environment, risk assessment process, information system, control activities, and monitoring of controls.26 Sarbanes Oxley makes executives accountable for evaluating and monitoring the effectiveness of internal control over financial reporting and disclosures. 27 Auditors must also attest to management’s internal control assessment and effectiveness of controls. An important component of internal controls is the information technology controls, especially in entities that use computer systems extensively. Given the importance of complying with Sarbanes Oxley and the harsh criticism of auditors from scandals in the early 2000’s, information technology controls have increased the audit business risk and have made 24 Grant, Gerry H., Karen C. Miller, and Fatima Alali. "The Effect of IT Controls on Financial Reporting." Managerial Auditing Journal 23.8 (2008): 803-23. Web. 29 May 2011. <http://www.emeraldinsight.com/journals.htm?articleid=1746755&show=pdf>. 25 Jarvin, Diane, James Bierstaker, and Jordan Lowe. "An Investigation of Factors Influencing the Use of Computer-Related Audit Procedure." Journal of Information Systems 23 (2009): 1-22. Web. 23 June 2011. <http://www.bus.iastate.edu/djanvrin/acct484584/readings/05%201_22-3.pdf>. 26 CICIA CAS 315 Appendix 1:6 27 Damianides, Marios. "SOX and IT Governance New Guidance on IT Controls and Compliance." Information Systems Management (2005): 77-85. Web. 29 May 2011. <http://web.ebscohost.com.proxy.lib.uwaterloo.ca/ehost/detail?vid=3&hid=17&sid=ca14f94e-d82f-4e7cb475a5f41240f864%40sessionmgr15&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=bth&AN=15 304579>. 7 information technology risk even more important to manage. The cost of complying is high – audit fees are higher and one of the biggest reasons is because of IT controls.28 An information system audit is assessing whether the information systems and related resources in safeguard assets maintain system and data integrity and availability, provide relevant and reliable information, achieve organizational goals effectively, and consume resources efficiently. It also assesses whether internal controls that provide assurance that business, operational, and control objectives have been met and whether undesired events will be prevented or detected and corrected in a timely manner. Non-financial audit fees have increased from 19% in 1992 to 79% in 2001 which indicates the continual importance of IS auditing.29 Since 1990, the evolution of the IS audit professional has changed from a secondary function to professionals that provide value-added work with auditors who do not understanding the work performed to finally, a key component of the risk assessment process. “Sarbanes-Oxley experts agreed that IT control was a specific area likely to produce significant deficiencies by many companies. As the majority of internal controls are embedded in automated systems, information system auditors have become a vital part of complying with the standards, guidelines, and regulations”30 Outsourcing Information Technology Information technology and recent regulations, such as Sarbanes Oxley, have uncovered new risks for organizations that outsource information technology. These same new risks for businesses have also provided new assurance opportunities for public accounting firms to try and manage these risks for their clients. Sarbanes Oxley impacts outsourcing since management must report on controls of the organization and auditors must consider the risks of having mission critical applications outside of the organization. It was found that Sarbanes Oxley increases pre-existing risks of large-scale information technology outsourcing on compliance.31 One of the roles of management within Sarbanes Oxley is to oversee of the internal controls. Internal controls must be effective or management will suffer consequences, since information technology outsourcing distances the information technology operations from management both 28 Holmes, Monica C., and Darian Neubecker. "The Impact Of The Sarbanes-Oxley Act 2002 On The Information Systems Of Public Companies." Information System 7.2 (2006): 24-48. Web. 29 May 2011. <http://www.iacis.org/iis/2006_iis/PDFs/Holmes_Neubecker.pdf>. 30 Ibid 8 intellectually and physically. The management’s inability to communicate with vendors’ leadership, who are generally offsite, makes it more difficult to assess business strategy and information technology issues, and will result in a higher likelihood that internal control failures will go undetected. In order to audit these risks and outsourced controls, auditors must audit the outsourced organizations themselves or receive SAS 70 reports. This information could be more difficult to obtain if they are offshore companies. There is an increased number of legislations, such as the passing of the following legislations; the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Gramm-LeachBliley Act of 1999, SarbanesOxley Act of 2002, Sections 404 and 302. The three rulings enforce protection of privacy, corporate accountability, and establishment of internal controls throughout businesses. “Thus, a need was created in many industries for a due diligence process that can aggregate many of the principles found within these three acts and provide companies with a high level of assurance and confidence when using service organizations for outsourcing critical business functions.” 32 This has created the need for SAS 70 and other equivalent reporting. The importance of information technology assurance has increased with new regulations and this has created many new opportunities for auditors. Auditors and businesses are exploring and investigating the real and regulation risks associated with cloud computing and how to address these risks. National Institute of Standards and Technology, Cloud Security Alliance and Information System Audit and Control Association define cloud as a “model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., network, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”33 Currently, there are no standards in place for cloud certification.34 Business critical is defined as data or applications determined to be confidential, proprietary or subject to regulation. This includes data and application under Sarbanes-Oxley regulation. It is known in the information technology world that “black hat” software gurus want to steal data, especially on the cloud. Information technology departments and information technology risk managers should assess the cloud service providers’ security as well as their disaster recovery and business continuity policies, and compare against internal standards. 35 32 Denyer, Charles, and Christopher Nickell. "An Introduction to SAS 70 Audits." Benefits Law Journal. Web. 23 June 2011. <http://www.csb.uncw.edu/people/IvancevichD/classes/MSA%20516/Extra%20Readings%20on%20Topic s/SAS%2070/Intro%20to%20SAS%2070%20Audits.pdf>. 33 Rapp, Peet. "Auditing the Cloud." Financial Executive May (2010): 62-63. Web. 1 June 2011. <http://proquest.umi.com.proxy.lib.uwaterloo.ca/pqdweb?index=12&sid=1&srchmode=2&vinst=PROD&fm t=6&startpage=1&clientid=16746&vname=PQD&RQT=309&did=2046898071&scaling=FULL&ts=1306972929&vtype=PQ D&rqt=309&TS=1306973354&clientId=16746>. 34 Ibid 35 Ibid 9 Outsourcing information technology has created benefits, such as reduced costs and better technology for organizations, but has also created new business risks such as uncertainty of the quality of controls. Many traditional outsourcing risks have been appropriately mitigated by auditors through information technology assurance on service organizations; however, cloud computing is one area of information technology that has not been explicitly addressed. This has left open the door on how the profession will address this risk, an issue that the profession will answer in the future. As information technology continues to evolve, both in form and functionality, the audit profession will need to continue to similarly evolve in order to address the risks that information technology creates. Conclusion It is clear that information technology has had a significant impact on how businesses operate and how they do business with their suppliers and customers. However, this same innovation has allowed for weaknesses in the business that has an unparalleled magnitude of damage. Businesses are not the only ones that have been impacted by information technology; auditors have new risks that they must address. To even the importance of addressing this risk, Sarbanes Oxley has made auditors more accountable for the work performed. Auditors have managed these risks with the use of information technology specialists, frameworks, and information technology itself. As information technology continues to evolve, new standards will be created to reduce the risk for businesses. The latest information technology risk that has already been raised but has yet to be explicitly addressed by auditors is cloud computing. Will auditors provide assurance on this growing field of information technology? If so, how will auditors provide assurance on cloud computing for its clients? As information technology has gone from transactional to necessary for the business to function to transformational, auditors must change and adapt at the same pace or be at risk of falling behind the needs of clients. 10 Work Cited Bedard, Jean C., Cynthia Jackson, and Lynford Graham. "Information Systems Risk Factors, Risk Assessments, and Audit Planning Decisions." Web. 28 Mar. 2011. <http://aaahq.org/audit/midyear/03midyear/papers/Systems%20Risk%20Factors%20and%20Audit% 20Planning%2009-18.pdf>. Beveridge, John. COBIT IMPLEMENTATION WORKSHOP. PPT. Boritz, Efrim J. "Introduction to Internal Control and the Role of Information Technology."Computer Control & Audit Guide. 15th ed. Waterloo: Centre for Information Integrity and Information Systems Assurance, 2011. 3-24. Print. CAS 315.13 CICIA CAS 315 Appendix 1:6 Damianides, Marios. "SOX and IT Governance New Guidance on IT Controls and Compliance." Information Systems Management (2005): 77-85. Web. 29 May 2011. <http://web.ebscohost.com.proxy.lib.uwaterloo.ca/ehost/detail?vid=3&hid=17&sid=ca14f94e-d82f4e7c-b475a5f41240f864%40sessionmgr15&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=bth&A N=15304579>. Denyer, Charles, and Christopher Nickell. "An Introduction to SAS 70 Audits." Benefits Law Journal. Web. 23 June 2011. <http://www.csb.uncw.edu/people/IvancevichD/classes/MSA%20516/Extra%20Readings%20on%20 Topics/SAS%2070/Intro%20to%20SAS%2070%20Audits.pdf>. Grant, Gerry H., Karen C. Miller, and Fatima Alali. "The Effect of IT Controls on Financial Reporting." Managerial Auditing Journal 23.8 (2008): 803-23. Web. 29 May 2011. <http://www.emeraldinsight.com/journals.htm?articleid=1746755&show=pdf>. Holmes, Monica C., and Darian Neubecker. "The Impact Of The Sarbanes-Oxley Act 2002 On The Information Systems Of Public Companies." Information System 7.2 (2006): 24-48. Web. 29 May 2011. <http://www.iacis.org/iis/2006_iis/PDFs/Holmes_Neubecker.pdf>. 11 Jaeger, Jaclyn. "Survey: IT Risk, IFRS Top Internal Auditors’ Worries." Survey: IT Risk, IFRS Top Internal Auditors’ Worries 7.77 (2010): 38. Web. 31 May 2011. <http://web.ebscohost.com.proxy.lib.uwaterloo.ca/ehost/detail?vid=12&hid=17&sid=ca14f94e-d82f4e7c-b475a5f41240f864%40sessionmgr15&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=bth&A N=52682551>. Jarvin, Diane, James Bierstaker, and Jordan Lowe. "An Examination of Audit Information Technology Use and Perceived Importance." Accounting Horizons 22.1 (2008): 1-21. Web. 28 May 2011. <http://web.ebscohost.com.proxy.lib.uwaterloo.ca/ehost/pdfviewer/pdfviewer?sid=ca14f94e-d82f4e7c-b475-a5f41240f864%40sessionmgr15&vid=6&hid=17>. Jarvin, Diane, James Bierstaker, and Jordan Lowe. "An Investigation of Factors Influencing the Use of Computer-Related Audit Procedure." Journal of Information Systems 23 (2009): 1-22. Web. 23 June 2011. <http://www.bus.iastate.edu/djanvrin/acct484584/readings/05%201_22-3.pdf>. Pryce, Jim. "ACC 626 Deloitte Partner Interview." 03 May 2011. E-mail. Rapp, Peet. "Auditing the Cloud." Financial Executive May (2010): 62-63. Web. 1 June 2011. <http://proquest.umi.com.proxy.lib.uwaterloo.ca/pqdweb?index=12&sid=1&srchmode=2&vinst=PRO D&fmt=6&startpage=1&clientid=16746&vname=PQD&RQT=309&did=2046898071&scaling=FULL&ts=1306972929&vtyp e=PQD&rqt=309&TS=1306973354&clientId=16746>. Sayana, Anantha. "Using CAATs to Support IS Audit." Information Systems Control 1 (2003): 1-2. Web. 23 June 2011. <http://www.isaca.org/Journal/Past-Issues/2003/Volume-1/Documents/jpdf031UsingCAATstoSupportISAu.pdf>. Singleton, Tommie. "The COSO Model: How IT Auditors Can Use It to Evaluate the Effectiveness of Internal Controls." ISACA. ISACA. Web. 24 June 2011. <http://www.isaca.org/Journal/PastIssues/2007/Volume-6/Pages/The-COSO-Model-How-IT-Auditors-Can-Use-It-to-Evaluate-theEffectiveness-of-Internal-Controls1.aspx>. 12 Annotated Bibliography Annotation #1 Author Title of Article Periodical/ website Vol. / No. / Edition Year Pages publis hed Pryce, Jim Date Location, accessed data base, website, link 05/17/201 Interview 1 Annotation The use of information technology within a client’s environment has increased the complexity of an audit. Revenue recognition has become more complicated. How do you ensure the existence of many online revenue streams such as advertising? Having strong controls is more important now with the use of information technology than ever before. In order to address the assertion of occurrence on revenue, there is a need to bring IT experts and having appropriate training to understand how transaction flow throughout the accounting information system. Sarbanes Oxley has required management to attest to controls including IT controls. Annotation #2 Author Title of Article Periodical/ website Bedard, Jean Information C. Systems Risk Factors, Jackson, Risk Cynthia Assessments , and Audit Graham, Planning Lynford Decisions Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link May 28, 2011 http://aaahq.or g/audit/midyea r/03midyear/p apers/System s%20Risk%20 Factors%20an d%20Audit%2 0Planning%20 09-18.pdf Annotation “The purpose of this study is to examine external auditors’ perspectives on information systems risk in their actual audit client” 13 The paper found IT system risks can be categorized in one of two categories: Management information quality and EDP security o The system does not output suitable or accurate data to help management with decision making and makes it difficult to identify when problems occur o A lack of EDP security undermines the value of effective design of controls do to security breaches AICPA has become more clear on auditor’s responsibility to understand the role of IT in the client’s business High correlation between management information quality and risk assessment taken by the firm Low correlation was found because between EDP security and risk assessments and this is attributed “to the frequent practice of calling on EDP specialists to assist with engagements in which system security risks have been identified” Annotation #3 Author Title of Article Holmes, Monica C. The Impact Information Of The System SarbanesOxley Act 2002 On The Neubecker, Darian Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link Vol. VII 2006 May 29, 2011 24-28 No. 2 http://www.iaci s.org/iis/2006_ iis/PDFs/Holm es_Neubecker .pdf Information Systems Of Public Companies Annotation This paper discusses the impact of Sarbanes-Oxley Act and Information Technology. CIO are very critical in helping a company to be complying with Sarbanes-Oxley because how transactions are automated and paperless (no audit trail) Scalability of storage systems is very important in high transaction industries with automation There have been a lot of IT solutions developed to make systems and businesses SOX compliant Lots of IT companies and consulting companies are offering compliance solutions o BWise, a software leader in internal control software, claims the platform is “auditable, web-based with extensive security measures built-in, and can achieve compliance in as little as 3-4 weeks” The cost complying is high – audit fees are higher and one of the biggest reasons is because of IT controls Annotation #4 Author Title of Article Periodical/ website Hall, James A. The Sarbanes Oxley Act: The COMMUNIC Vol. 50 ATIONS OF No. 3 THE ACM Liedtka, Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link 2007 May 29, 2011 95-100 http://proquest .umi.com.prox y.lib.uwaterloo .ca/pqdweb?in 14 Stephen L. implications for largescale IT outsourcing dex=0&did=12 24854971&Sr chMode=2&si d=2&Fmt=2& VInst=PROD& VType=PQD& RQT=309&VN ame=PQD&T S=130697707 1&clientId=16 746 Annotation This paper discusses the implication of SOX on large scale IT outsourcing. The response from corporate decision makers varied in response to SOX and their thoughts on the impact to IT outsourcing. 21% responded that they would outsource more, 19% indicated that they would outsource less, 25% said no one of knowing the impact and the remainder did not expect a change at all It was found that SOX increases pre-existing risks of large-scale IT outsourcing on SOX compliance. The purpose of SOX is to increase public confident in capital markets through improved corporate governance, financial reporting, internal controls and external audit quality SOX has increased the demand for employees with computer skills and business training especially in the areas of forensic accounting, risk management, computer auditing and ITcontrols The benefits of IT outsourcing include reduced IT costs and improved IT performance. Large scale IT sourcing actually increases the risk of failing to comply with both the detail and the spirit of SOX. One of the roles of management within SOX is oversight of the internal controls are effective but since IT outsourcing distances the IT operations from management both intellectually and physically Due to management’s inability to communicate with vendors leadership, who are generally offsite, makes it more difficult to assess business strategy and IT issues and will result in a higher likelihood that internal control failures will go undetected In order to audit these risks and outsourced controls, auditors must audit them themselves or receive SAS 70 reports. This information could be more difficult to obtain if they are offshore companies. IT outsourcing is sometimes described as off balance sheet financing since no investment in IT assets will need to be made IT outsourcing may result in deceptive short-term increases in profitability since IT vendors often charge lower amounts in the first couple years then increase prices later Annotation #5 Author Title of Article Periodical/ website Damianides, Marios SOX and IT Information Governance Systems New Management Guidance on IT Controls Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link 2005 May 29, 2011 77-85 http://web.ebs cohost.com.pr oxy.lib.uwaterl oo.ca/ehost/d etail?vid=3&hi 15 and Compliance d=17&sid=ca1 4f94e-d82f4e7c-b475a5f41240f864 %40sessionm gr15&bdata=J nNpdGU9ZW hvc3QtbGl2Z SZzY29wZT1 zaXRl#db=bth &AN=153045 79 Annotation This article discusses how SOX has focused companies to improve their internal controls and maintain an effective IT environment in order to be compliant. This article further discusses how SOX has impacted executives and IS professionals. With SOX regulation, IT professionals have higher expectations to give timely, accurate and visible information while still maintaining high level security of these information assets 88 percent of senior business executives view security as a top priority and 71 percent view security as a positive investment due to more continuity and efficiency SOX makes executives accountable for evaluating and monitoring the effectiveness of internal control over financial reporting and disclosures SOX has increased the need for companies to have strong IT controls in place One of the main criteria of IT governance is to align IT with the overall business strategy Fortune 500 companies board members hardly discuss IT during board meetings – one out of ten boards ask IT questions, two out of three approval IT strategy and six out of seven directors are regularly informed about IT Annotation #6 Author Janvin, Diane Title of Article An Examination of Audit Bierstaker, Information James Technology Use and Lowe, Jordan Perceived Importance Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link Accounting Horizons Vol. 22 2008 May 28, 2011 No. 1 1-21 http://web.ebs cohost.com.pr oxy.lib.uwaterl oo.ca/ehost/p dfviewer/pdfvi ewer?sid=ca1 4f94e-d82f4e7c-b475a5f41240f864 %40sessionm gr15&vid=6&h id=17 16 Annotation The article is a study about how IT is perceived and how it is used in various size firms from local to Big 4 firms. “Standards now encourage audit firms to adopt IT and use IT specialists when necessary” Auditors view the use of applications as important but don’t fully utilize them IT specialists are not used in a large extent In general, larger firms tend to use more specific IT to perform their audits and more likely to use IT specialist than smaller firms IT has created a barriers to entry to run a public practice IT is used for helping identify risks in client acceptance, going concern and analytical procedures Annotation #7 Author Title of Article Grant, Gerry H The effect of IT controls on Financial Miller, Karen Reporting C Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link Managerial Auditing Journal Vol. 23 2008 May 29, 2011 803-823 No. 8 Alai, Fatima http://www.em eraldinsight.co m/journals.ht m?articleid=1 746755&show =pdf Annotation “The purpose of this study is to examine IT control deficiencies and their affect on financial reporting” Accounting errors occur more often when there are IT control deficiencies IT deficient companies pay a higher audit fee and employ smaller accounting firms Many major scandals were not prevented or detected because the company had poor internal controls SOX was created because of the above point to force companies’ auditors to assess and attest to the effectiveness of controls Pre-sox and post-sox studies have come to the same conclusion. The more IC deficiencies the more accounting errors Prior to SOX minimal IT controls were tested since it was not explicit in the standards. However, post SOX, companies are required to report any significant IT deficiencies The most commonly used IT governance framework is COSO but COSO provides minimal guidance for designing and implementing IT controls The use of COBIT has been used to evaluate IT controls for SOX compliance There is a “a direct relationship between the increased quality of IT controls and external factors such as longer tenured CIOs, more IT-experienced managers, higher percentages of independent directors, and more IT-experienced audit committee Members” Annotation #8 Author Title of Article Bierstaker The impact of Periodical Vol. / No. / / website Edition Year Pages publishe d Date Location, accesse data base, d website, link Managerial 16/3 2001 May 29, 159-164 http://www.em 17 , James L. information Auditing technology on the Journal Burnaby, audit Priscilla process: an Thibodea assessment of the u, Jay`` state of the art and 2011 eraldinsight.co m/journals.ht m?articleid=8 68500 implications for the future Annotation “The purpose of this paper is to assess the current impact of technology on the audit process, and to discuss the future implications of technological trends for the auditing profession.” This paper discusses how auditors obtain information client’s current systems, how information technology has affected planning, documentation and testing of internal controls, and how advancements in technology will improve audit efficiency and effectiveness. Audits are becoming more about process audits rather than audits of each department. For example, an auditor may audit the flow of raw inventory to the end of the cycle where receivables are collected. Beginning to end audits are becoming more of a requirement The use of audit software has already helped audit planning where a software is used to identify key risk areas instead of relying solely on the audit team expertise The use of new technology has also freed up professional service time through the creation of documents, proposals and memo templates that gather the expertise of members of the firm If evidence is transmitted, processed and assessed through only electronic means then need to assess reliability of the system to ensure evidence was not manipulated. Since there some processes do not have paper trails, it is useless to use the traditional methods of testing controls since significant risk will go unnoticed It is now a requirement to test sophisticated controls including firewalls, encryption and passwords The use of ACL and IDEA has increased audit efficiency and effectiveness Audit software can also be used to test fraud. One example, is comparing all employee addresses with vendor addresses Annotation #9 Author Title of Article Vilsanoiu, Daniel Changing Informatica Methodologie Economica s in Financial Audit and Their Impact Serban, Michaela on Information Systems Audit Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link Vol. 14 2010 Monday, http://web.ebs May 30, cohost.com.pr 2011 oxy.lib.uwaterl oo.ca/ehost/d etail?vid=8&hi d=17&sid=ca1 4f94e-d82f4e7c-b475a5f41240f864 %40sessionm gr15&bdata=J nNpdGU9ZW hvc3QtbGl2Z Issue 1 57-65 18 SZzY29wZT1 zaXRl#db=bth &AN=489243 78 Annotation “The objective of this article is to provide a better understanding of the relation between financial audit and information systems audit and to assess the influence the change in financial audit methodologies had on IS audit.” A financial audit is a degree of confidence on a set of financial statement if they are prepared without material misstatements An information system audit is the assessing whether the information systems and related resources safe guard assets, maintain system and data integrity and availability, provide relevant and reliable information, achieve organizational goals effectively, consume resources efficiently, and have, internal controls that provide assurance that business, operational and control objectives will be met and that undesired events will be prevented or detected and corrected in a timely manner. In the mid 1990’s, auditors changed from transaction cycle auditing to business process oriented auditing Transaction cycle auditing focuses on account level risk and the goal is audit to reduce the risk that auditors make judgmental errors and provide an opinion that can withstand the review of peer auditors and regulators. It does not take into consideration business risk and does not require a deep understanding of the business strategy of the company getting audited “business risk is defined as the risk resulting from significant conditions, events, circumstances, actions or inactions that could adversely affect an entity’s ability to achieve its objectives and execute its strategies, or from the setting of inappropriate objectives and strategies In the mid 1990’s it was believed that business risk increased audit risk. Business Risk Auditing (BRA) allowed auditors to help clients identify non-financial statement risks or areas of improvement. “Sarbanes-Oxley experts agreed that IT control was a specific area likely to produce significant deficiencies by many companies. As the majority of internal controls are embedded in automated systems, IS auditors have become a vital part of complying with the standards, guidelines and regulations” Since 1990, the evolution of the IS audit professional has changed from a secondary function to professionals that provided value added work but auditors not understanding the work performed to finally, a key component of the risk assessment process. Non-financial audit fees have increased from 19% in 1992 to 79% in 2001 which indicates the continuance importance of IS auditing Annotation #10 Author Title of Article Bedard, Jean Information C. Systems Risk and Graham, Audit Lynford Planning Jackson, Cynthia Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link International Journal of Auditing Vol. 9 2005 May 30, 2011 Issue 2 147-163 http://web.ebs cohost.com.pr oxy.lib.uwaterl oo.ca/ehost/d etail?vid=10& hid=17&sid=c a14f94e-d82f4e7c-b475- 19 a5f41240f864 %40sessionm gr15&bdata=J nNpdGU9ZW hvc3QtbGl2Z SZzY29wZT1 zaXRl#db=bth &AN=180084 89 Annotation “In this study, we examine client characteristics identified by external auditors for actual audit clients, which are relevant to two important areas of systems risk: system security and management information quality” It was found that management information quality increased with the number of identified risk factors but not the same result was found for EDP security EDP security risks are associated with control activities Management information quality is associated with the control environment SOX Act of 2002 emphasizes internal control which information systems play a key role Managers must assess the effectiveness of control design and the operating effectiveness of controls in the annual report Auditors must also attest to management’s internal control assessment and effectiveness of controls The common EDP security risk factors included system security controls, outdated systems and management style/attitude The common management information risk factors included management style/attitude and management competence It was found that only control activities risk factors are significantly associated with audit planning for EDP security Control environment affects audit planning in management information quality but not EDP security Annotation #11 Author Title of Article Chan, Sally SarbanesOxley: the IT dimension: information technology can represent a key factor in auditors' assessment of financial reporting controls Periodical/ website Vol. / No. / Edition Year Pages publishe d 2004 Date Location, accesse data base, d website, link http://findarticl es.com/p/articl es/mi_m4153/i s_1_61/ai_n6 152500/ Annotation 20 Sarbanes-Oxley Act 2002 presented both immediate and far-reaching compliance issues for companies, especially in the areas of internal-control provisions of 302 and 404. Guidance by the Public Company Accounting Oversight Board states that “the nature and characteristics of a company's use of information technology in its information system affect the company's internal control over financial reporting”. However, this vague guidance has audits have had to pay special attention to the information technology component of Sarbanes-Oxley. The IT environment must be reviewed as part of the reviewing of the larger control environment Some auditors have found guidance through the use of COBIT. Other guidance such as AICPA’s SAS 70, Systrust and Webtrust can be used for Sarbanes Oxley in a broader context A key IT component of Sarbanes Oxley is mapping financial reporting control objectives to IT control objectives. An example is that authorization and safeguarding of assets relates to IT control objective – ensuring information security, confidentiality and privacy There are several assertions related to IT controls including existence, occurrence, measurement, completeness, accuracy, presentation and disclosure Through the examination of the IT control environment, controls that don’t mitigate risks and control weaknesses will likely no longer exist after the examination There are the indirect benefit from Sarbanes Oxley of elimination of control redundancies, service improvements or the identification of value-added projects beyond compliance requirements Annotation #12 Author Title of Article Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link Jaeger, Jaclyn Survey: IT Risk, IFRS Top Internal Auditors’ Worries Compliance Week Vol. 7 2010 May 31, 2011 Issue 77 38 http://web.ebs cohost.com.pr oxy.lib.uwaterl oo.ca/ehost/d etail?vid=12& hid=17&sid=c a14f94e-d82f4e7c-b475a5f41240f864 %40sessionm gr15&bdata=J nNpdGU9ZW hvc3QtbGl2Z SZzY29wZT1 zaXRl#db=bth &AN=526825 51 Annotation This article discusses how IT has become even more important and has received more attention from Internal Auditors. One of the top risk listed in the 2010 Internal audit Capabilities and Needs Survey was ability to assess IT risk, which also topped 2010. XBLR, ISO 27000 certification standard for information security and COBIT were high on the list of concerns for internal auditors Managing director of Protiviti, Scott Graham, stated that auditing IT processes and activities should be one of the highest priorities in internal audit departments given that IT enables virtually all business functions Institute of Internal Auditing has responded with this risk by introducing six standards covering 21 topics including assessing IT governance Annotation #13 Author Title of Article Periodical/ website Baker, Neil Diagnosis for Internal IT Risk Auditor Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link August 2010 June 1, 2011 38-42 http://content. ebscohost.co m.proxy.lib.uw aterloo.ca/pdf 23_24/pdf/201 0/IAU/01Aug1 0/53770601.p df?T=P&P=A N&K=537706 01&S=R&D=b th&EbscoCont ent=dGJyMN Xb4kSepq84y OvsOLCmr0m eqK5Srq64Sr eWxWXS&Co ntentCustome r=dGJyMPGvt k6uqbJRuePf geyx44Dt6fIA Annotation This article discusses a guide written by the Institute of Internal Auditors on how to identify IT risks. The guide is a top down and risk-based approach. A risk based approach is where the identification starts with understanding the business process and then looks for IT risks that could lead to failure or error in that process. The approach was meant to reduce the number of controls that weren’t significant out of Sarbanes-Oxley testing The approach is more focused on IT general controls rather than detailed application controls and is easier to learn for non-technical internal auditors At Intel, with the use of the IIIA approach, the number of controls tested reduced from 1300 to a couple hundred and 65% reduction in company testing efforts IT specialist may not be needed during the risk identification process but in terms of testing the controls IT specialist may need to be used Annotation #14 Author Title of Article Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link Rapp, Peet H. Auditing the Cloud Financial Executive May 2010 June 1, 2011 62-63 http://proquest .umi.com.prox y.lib.uwaterloo .ca/pqdweb?in 22 dex=12&sid=1 &srchmode=2 &vinst=PROD &fmt=6&startp age=1&clientid=16 746&vname= PQD&RQT=3 09&did=20468 98071&scalin g=FULL&ts=1 306972929&vt ype=PQD&rqt =309&TS=130 6973354&clie ntId=16746 Annotation This article discusses the risk and audit considerations when businesses start storing and using business critical applications on the cloud. Cloud computing does not require the traditional IT capital investment or skilled technical support National Institute of Standards and Technology, Cloud Security alliance and Information System Audit and Control Association define cloud as “model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., network, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” Three types: Infrastructure as a Service,(IaaS) Platform as a Service (Paas) and Software as a Service (SaaS) SasS clients share the use of one application on one or several servers sharing the same data memory. This is called multi-tenancy. It is known in the IT world that “black hat” software gurus want to steal data especially on the cloud Business critical is defined as data or applications determined to be confidential, proprietary or subject to regulation. This includes data and application under Sarbanes-Oxley regulation. Businesses should identify applications that are considered business critical IT departments and IT risk managers should assess the cloud service providers security and disaster recovery and business continuity policies and compare against internal standards The article suggests that the service level agreement have a right to audit clause Currently, there are no standards in place for cloud certification Annotation #15 Author Title of Article Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link Huang, ShiMing Building the evaluation model of the IT general control for CPAs under enterprise Decision Support Systems Vol. 50 2011 June 1, 2011 Hung WeiHis Yen, David Issue 50 692-701 http://web.ebs cohost.com.pr oxy.lib.uwaterl oo.ca/ehost/d etail?vid=14& hid=17&sid=c a14f94e-d82f- 23 C. Chang, ICheng risk management 4e7c-b475a5f41240f864 %40sessionm gr15&bdata=J nNpdGU9ZW hvc3QtbGl2Z SZzY29wZT1 zaXRl#db=bth &AN=575147 79 Jiang, Dino Annotation This paper evaluates the Information Technology General Control (ITGC) for CPAs under an Enterprise Risk Management (ERM) framework. SAS No. 94 stated that auditors must take into consideration the importance of IT processes and relevant controls to prepare the financial statements Auditors have responsibility to provide assertion to the effectiveness of IT controls within a company To reduce audit risk, auditors must have a clear and thorough understanding of IT controls COSO is currently used as a way to assess internal controls but does not explicitly address the IT control objectives IT can establish and maintain a new governance processes but can also increase organizational risk IT controls can be classified as general and application controls General controls include security management, software acquisition, development and maintenance that can support reliable application controls and ensure continued operation of the system SAS No. 55 requires auditors to understand the internal control and it indicates that it may be more cost effective and reliable to use rotational test of controls More and more companies rely on IT heavily to ensure the reliable and trustable operation COBIT can help firms reduce IT risks The study found that Activity level IT control is more important than Entity-level IT control in ITGC The study found that Deliver and Support is the most important objective and that the auditor should spend more time in this area Annotation #16 Author Title of Article Silltow, John Shedding Light on Information Technology Risks Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link Internal Auditor December 2005 June 1, 2011 32-39 http://web.ebs cohost.com.pr oxy.lib.uwaterl oo.ca/ehost/p dfviewer/pdfvi ewer?sid=2fe 1fd03-3a434b3d-a36f406db34e405 c%40session mgr4&vid=7& 24 hid=17 Annotation This article discusses the various IT risk that a company can be exposed to. A survey by Computer Crime and Security shows that 45% of unauthorized access by insiders Financial fraud and theft of information is the most costly crime and requires insider knowledge Employees can also damage the organization through unintentional means such as deleting important files, opening emails with viruses, etc To mitigate the risk of intentional and unintentional damage, organizations need effective access management This risk is increased if there are a large databases with sensitive information Segregation of duties built into non-IT processes need to be implemented into the IT environment When evaluating access control determine whether or not systems allows common passwords such as usernames, spouses’ or pets’ names, etc and other password security settings Authorization of access should be examined as well. Security admin should not authorize access. Access should be authorized by information owners. External attacks have increased. Spam, worms and viruses are the most common type. The potential damage caused by external attacks include direct costs but also lost of reputation Social engineering takes advantage of holes in people’s common sense To protect against the threat of social engineering organizations need to educate employees about what kind of information they disclose Organizations need to ensure that the right information is available to the right people at the right time at the right place One of the main ways to ensure data accuracy is valid is through field validation and input controls Annotation #17 Author Title of Article Hermanson, Dana R. Disaster Management December Recovery Consulting Planning: What Section 404 Audits Reveal Ivancevich, Daniel M. Ivancevish, Susan H. Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link 2007 June 1, 2011 60-62 http://content. ebscohost.co m.proxy.lib.uw aterloo.ca/pdf 19_22/pdf/200 7/CPA/01Dec 07/28099606. pdf?T=P&P=A N&K=280996 06&S=R&D=b th&EbscoCont ent=dGJyMN Xb4kSepq84y OvsOLCmr0m eqK9Srqy4Sb eWxWXS&Co ntentCustome r=dGJyMPGvt 25 k6uqbJRuePf geyx44Dt6fIA Annotation This article discusses how SOX 404 reveals material weaknesses in disaster recovery planning (DRP). It was reported from November 2004 to August 29th, 2006 there were 16 public companies with material weaknesses in internal control over financial reporting that were DRP related Out of the 10 companies there were 10 cases where the deficiency involved a lack of DRP or backup and recovery plan There were 5 companies that had issues with storage of backups where backups were onsite rather than offsite CPAs are also encouraged to help companies implement and build effective DRPs Companies that outsource IT should be aware that DRP may fall outside of SAS 70 Updated since First Submission Annotation #18 Author Title of Article Jarvin, Diane An Investigation Bierstaker, of Factors James Influencing Lowe, Jordan the Use of ComputerRelated Periodical/ website Vol. / No. / Edition JOURNAL 23 OF INFORMATI ON SYSTEM Year Pages publishe d Date Location, accesse data base, d website, link 2009 June 23, http://www.bu 2011 s.iastate.edu/d janvrin/acct48 4584/readings /05%201_223.pdf 1-22 Audit Procedure Annotation In this article, discusses how computer-related audit procedures are used and how control risk and audit firm size influence those procedures. SAS 94 informs auditors that assessing control risk as maximum and relying only on substantive is not effective Auditors should rely on computer-related audit procedures including the use of IT specialists when planning the audit Audit firm size impacts whether or not computer-related audit procedures are used because generally larger firms have clients with more complex computer systems 43% of participants in this study assessed control risk below maximum when examining clients with complex IT environments 55% of the sampled engagements used IT specialists Less than half of the participants used CAATs for substantive testing Annotation #19 26 Author Title of Article Periodical/ website Sayana, Anantha S. Using CAATs Information to Support IS Systems Audit Control Journal Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link 1 2003 June 23, http://www.isa 2011 ca.org/Journal /PastIssues/2003/V olume1/Documents/j pdf031UsingCAATst oSupportISAu. pdf 1-3 Annotation This article describes the why there is a need for audit software, how audit software benefits the assurance engagement and how to use CAATs. There is a need for audit software when the task is far too difficult to perform manually and it is more efficient and/or more effective to perform using audit software The auditor must design the procedures and tests. This includes understanding the business rules of the function and how the application functions. Audit software can perform 100% audit which gives more validity to the conclusion given When first implementing an audit software there can be many issues Annotation #20 Author Title of Article Beveridge, John COBIT IMPLEMENT ATION WORKSHOP . PPT. Periodical/ website Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link PowerPoint Presentation Annotation These slides describe what COBIT is, who should use COBIT, how COBIT can help auditors and how to use it effectively. “Authoritative, up-to-date, international set of generally accepted IT control objectives and control practices for day-to-day use by business managers and auditors” IT governance is “A structure of relationships and processes to direct and control the enterprise in order to achieve the enterprise’s goals by adding value while balancing risk versus return over IT and its processes” If you use computer generated information, need to assess reliability “COBIT focuses on information having integrity and being secure and available” 27 COBIT provides auditors an excellent way to structure review and audit work The goals of internal controls are “The design, implementation, and proper exercise of a system of internal controls should provide "reasonable assurance" that management's goals are attained, control objectives are addressed, legal obligations are met, and undesired events do not occur” COBIT is aligned with COSO, COCO, Cadbury and King Annotation #21 Author Title of Article Periodical/ website Denyer, Charles An Introduction to SAS 70 Audits Benefits Law Vol. 20 Journal No. 1 Nickell, Christopher G. Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link 2007 June 23, http://www.csb 2011 .uncw.edu/peo ple/Ivancevich D/classes/MS A%20516/Extr a%20Reading s%20on%20T opics/SAS%2 070/Intro%20t o%20SAS%2 070%20Audits .pdf 58-68 Annotation “This article offers an overview of the SAS 70 audit used to report on the “processing of transactions by service organizations,” which can be done by completing either a SAS 70 Type I or Type II audit. A SAS 70 Type I is known as “reporting on controls placed in operation,” while a SAS 70 Type II is known as “reporting on controls placed in operation” and “tests of operating effectiveness” Recent legal legislation such as HIPAA, Gramm-Leach-Bililey Act and Sarbanes-Oxley Act have increased corporate accountability and the creation of internal controls throughout organizations Type I SAS 70 report would issue an unqualified opinion for a point in time and Type II report would be over a time period The benefits an unqualified opinion from a SAS 70 service report solidifies that the service organization has effective controls in place “Auditors have implemented an exhaustive list of policies, procedures, and related controls that must be examined for this type of engagement.” SAS 70 reports incorporate general and application controls but also expand into operational and human resource issues which makes the report more useful if the scope of the engagement is larger Type II report requires a minimum six month testing period and is tested through testing of controls while Type I consists of inquiry and observation of controls SAS 70 reports uses a combination of many different standards such as COBIT, COSO, ISO 17799, and many others. Annotation #22 28 Author Title of Article Periodical/ website Singleton, Tommie The COSO ISACA Model: How Website IT Auditors Can Use It to Evaluate the Effectiveness of Internal Controls Vol. / No. / Edition Year Pages publishe d Date Location, accesse data base, d website, link 1 2006 June 23, http://www.isa 2011 ca.org/Journal /PastIssues/2003/V olume1/Documents/j pdf031UsingCAATst oSupportISAu. pdf Annotation In this article, ISACA describes how auditors can apply COSO model in performing auditors. It breaks the COSO model into five categorizes – Control Environment, Risk Assessment, Information and Communication, Control Activities and Monitoring Control Environment: This part of the COSO model allows auditors to help comply with SAS 109. SAS 109 requires auditors to understand the entities environment and to assess the risk of material misstatement Risk Assessment: This part of the COSO model helps auditors assess risk within the entity’s system of controls by identifying factors that increase risk such as changes in the operating environment. Information and Communication: This part of the model addresses that financial reporting information should not only be relevant but also timely. Control Activities: This part breaks control activities into three categories – general, application and physical. Monitoring: This part discusses how controls should be monitored, assessed and reviewed. 29