General vs Application Controls

advertisement
Today’s Lecture
• application controls
• audit methodology
General vs Application
Controls
• general implemented consist. across all appl.
• application are built into specific programs
• distinction often arbitrary - general are
usually reviewed once for audit as a whole
• application must be considered for each
significant application
• if general are uniformly strong and operate
effectively obtain such assur. wrt each app.
• if not, does not mean each appl. affected...
need to consider app by app.
Application Controls
• hardware – parity checks, character checks
• input and output controls
– at source dep’t and data control
• programmed controls (software)
Effective Design
• designed with regard to business
requirements
• designed with regard to business risk
analysis
• only rely upon after taking general
controls into consideration
• use structured programming techniques
• use training
Types of Transactions
• each have different sensitivity and risk of
errors
• master file changes - updated only
periodically
• normal business applications
• error correction transactions
Master File Changes
• completeness, accuracy, currency and data
authorization
• error would occur every time
• make sure using current masters
• important to guard against fraud
Normal Transactions
• second largest concern
• necessary to control effectively
• need to include controls over regular
transactions and reports
Error Correction Transactions
• watch bypass potential
• errors often put aside and ignored
• all should be logged with clear responsibility
for correction
• ideally put back through regular processing
Preventive Controls over
Processing
• data entry as close to source of transact as
possible to ensure familiarity
• structure operating procedures so that
business activity not complete until
transaction processing
• eliminate human component as much as
possible
• authorize transactions before data entry
• use access control software
Preventive Controls over
Processing (cont’d)
• use 3 levels of access
• physical access to terminal,
access control over use of terminal and
authorization in software
• scrutinize manually prepared input
• use computer to edit transactions
• use edit progs to check for missing data, format,
self checking digit, limits & logical relation checks
• use key verification & interactive systems
• use formatted input screens
Preventive Controls over
Processing (cont’d)
• use appropriately designed input forms
• single source transaction data - input once
• document application control procedures manuals, etc.
• training and supervision
• adequate working conditions
Detective Controls
• use suspense records for impending
transactions
• monitor & investigate lack of regular
activity (see if transactions omitted)
• verify records by examining assets etc.
• prepare budgets/investigate variances
• number transactions - check sequence
• group and count source documents and
count # transactions processed
Detective Controls (cont’d)
• use control totals to check completeness
• reconcile changes in recorded assets and
liabilities to transactions processed
• If practical, establish procedures for
verification by users
• design programmed reasonableness tests
• match processing results to source
documents in detail
• check computations
Detective Controls (cont’d)
• use summary and exception reports
• use double entry recording to balance
transactions
• agree summary records to detailed records
• require user approval of results
• require error tracking and analysis - develop
stats
Master File Controls
• authorize all changes before input
• record changes to semi-permanent listings,
reconcile changes
• print out for review by knowledgeable users
for errors
• use control totals
• application progs should internally label
master files
Errors and Exception Controls
• use error and exception reports - ensure
follow- up
• user error logs and define correction
procedures and responsibilities
• resubmit errors into NORMAL processing
cycle - do not bypass
Management & Audit Trails
• file each record in planned sequence to
facilitate retrieval
• provide unique id for each record
• retain source copy for transactions
• provide methods of tracing data backwards
and forwards through IS
• document retention procedures
Management & Audit Trails
(cont’d)
• use logs
• periodically copy and save permanent
records that are overwritten by changes
• provide software capability to scrutinize &
analyse data
Advanced System
Characteristics
•
•
•
•
•
•
•
absence independent evidence
no visible audit trails
lack of auth evidence
heavy I/C reliance
need to understand transaction flow
test controls to be relied upon
audit hardware/software
Download