Module AUDITING IN CIS ENVT.
Module AUDITING IN CIS ENVT.
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
COURSE DESCRIPTION
The advent of advanced information technology and communication affects the way
auditors exercise his engagement. Planning and performing audit procedures and
techniques take into consideration the accounting information system employed by the
audit client in a computerized business environment. This course exposes the students to
computer controls such as the general and application controls. It discusses information
technology related risks, security and control mechanisms and techniques that may be
employed to address the risks and the impact of the use of information and
communication technology in the audit of the entity’s transactions cycles. Likewise, the
use of various Computer-aided audit techniques (CAATs) are considered in understanding
and applying auditing approach through the computers and with the computers.
Relatedly, E-Commerce, Data Privacy Law, Cyber-Crime Law are discussed in so far as they
are relevant in the auditing circumstances. Students should be able to describe and apply
concepts pertaining to audit of a computerized environment, address audit risks and
apply appropriate audit tools, audit techniques and audit procedures.
LEARNING OUTCOMES
1. Describe an overview of an auditing concepts.
2. Distinguish attestation and assurance services.
3. Identify the IT audit as a significant component of financial audits.
4. Understand the management assertions on the presentation of financial
statements.
5. Enumerate the audit objectives and procedures based on management
assertions.
6. Explain the structure of an IT audit.
7. Explain the components of audit risks.
8. Understand the key features of Sections 302 and 404 of the Sarbanes-Oxley Act.
(AIS)
HECTOR E. JULIANO 1
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
TOPIC OUTLINE
HECTOR E. JULIANO 2
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
HECTOR E. JULIANO 3
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
REFERENCES:
1. Davis, et. al., (2011). IT Auditing: Using Control to Protect Information Assets
PRELIM
FIRST WEEK
INTRODUCTION
Orientation of the subject matter, its coverage and what everyone should expect from
the course are some of the salient points that will be taken during the first week of the
class. Students shall be introduced on the basics of auditing and its application when
auditing financial reports and the entity’s operating systems prepared on a computerized
environment. This is a must for the students to learn not only because of its inclusion in
the CPA licensure examination but also for them to acquire relatively significant
understanding and knowledge in auditing every business structure and activities in
consonance to their pursuance of becoming a full pledge certified public accountant.
IDEATION
HECTOR E. JULIANO 4
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
goal and purpose of an audit, it is imperative that auditors should be fully aware on the
effects of information technology on the audit of client’s financial statements both in the
context of how these financial statements were produced, and how the auditor can use
the technology in the process of auditing the financial statements.
TOPIC/LESSON
Definition of Terms
Assurance services
- Professional services, including the attest function, designed to improve
the quality of information, both financial and nonfinancial, used by
decision makers.
Attest function
- Independent auditor’s responsibility to opine as to the fair presentation
of a client firm’s financial statement.
HECTOR E. JULIANO 5
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
Application controls
- Controls that ensure the integrity of specific systems.
Audit objectives
- Task of creating meaningful test data.
Audit procedures
- Combination of tests of application controls and substantive tests of
transaction details and account balances.
Audit risk
- Probability that the auditor will render unqualified opinions on financial
statements that are, in fact, materially misstated.
Audit trail
- Accounting records that trace transactions from their source documents
to the financial statements.
HECTOR E. JULIANO 6
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
continuity of operations.
General controls
- Controls that pertain to entity-wide concerns such as controls over the
data center, organization databases, systems development, and program
maintenance.
HECTOR E. JULIANO 7
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
Management assertion
- Combination of tests of application controls and substantive tests of
transaction details and account balances.
Operating systems
- Computer’s control program.
Parallel simulation
- Technique that requires the auditor to write a program that simulates key
features of processes of the application under review.
Risk
- Possibility of loss or injury that can reduce or eliminate an organization’s
ability to achieve its objectives.
HECTOR E. JULIANO 8
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
Risk assessment
- Identification, analysis, and management of risks relevant to financial
reporting.
Schema
- Description of the entire database.
Substantive tests
- Tests that determine whether database contents fairly reflect the
organization’s transactions.
Tracing
- Test data technique that performs an electronic walkthrough of the
application’s internal logic.
Transaction authorization
- Procedure to ensure that employees process only valid transactions
within the scope of their authority.
HECTOR E. JULIANO 9
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
PRELIM
Financial statements reflect the management’s assertions about the financial health of an
entity. Auditor is tasked to determine the truthfulness of this assertion. And to
accomplish this, he must establish objectives, design procedures, and gathers evidence
that would either corroborate or refute management’s assertions on financial
statements. Since auditors develop their objectives and design procedures, based on
these assertions, it is a must to determine first these assertions.
Management’s assertions on the financial statements fall into the following categories:
1. Assets and equities contained in the balance sheet exist and transactions in
the income statement occurred.
3. The entity owns the assets and the liabilities are equally their own obligations.
HECTOR E. JULIANO 10
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
4. Assets and equities are valued following the generally accepted accounting
principles and that depreciation expense are calculated on a systematic and
rational basis.
5. That items in the financial statements are properly classified (i.e. long-term
liabilities will not mature within one year) and that disclosures on the notes to
financial statements are adequate so that users of financial statements shall
not be misled.
HECTOR E. JULIANO 11
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
accounts.
Whereas,
Before the passage of the Sarbanes Oxley Act of 2002, accounting firms are allowed to
provide assurance services to clients that they audit. Today, it is now unlawful for a
HECTOR E. JULIANO 12
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
registered public accounting firm who are currently providing attest services to provide
the following services:
Auditing information technology structure are made through the following stages:
HECTOR E. JULIANO 13
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
customer, the veracity of the balance of accounts receivable balance and the
confirmation that a bona fide client really owes the amount stated.
In every audit engagement, there is always a probability that an auditor may render an
unqualified opinion on a financial statement that is materially misstated, or erroneous
due to material misstatements. This occurrence in auditing is called audit risk. Thus,
through substantive testing and test control, auditor’s objective of minimizing audit risk
is attained.
C. Detection risk – Errors not detected or prevented by the control structure are
likewise cannot be detected by the auditor which the auditor readily accepts. In
situation such as this, the auditor sets an acceptable level of detection risk which
HECTOR E. JULIANO 14
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
REVIEW QUESTIONS:
1. What are the conceptual phases of an audit? How do they differ between general
auditing and IT auditing?
2. Distinguish between internal and external auditors.
3. What are the four primary elements described in the definition of auditing?
4. Explain the concept of materiality.
5. What tasks do auditors perform during audit planning, and what techniques are used?
_____________________________________________________________
MIDTERM
The SOX Act of 2002 was enacted and signed into law on July 30, 2002 by US President
George W. Bush to improve the reliability of public companies’ financial reporting as well
as restore investor’s confidence in the wake of high profile cases of corporate crime.
The abbreviation “SOX” was coined from the authors of the law that established sweeping
auditing and financial regulations for public companies - Senator Paul Sarbanes
(Republican) and Senator Michael Oxley. (Democrat) The enactment of the SOX law in
large part is due to corporate scandals brought by big companies in the U.S. such as Enron
Corporation, Worldcom, and Tyco International.
HECTOR E. JULIANO 15
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
The two sections of particular note of SOX from 11 sections are Section 302 and Section
404.
Section 404 deals with "Management Assessment of Internal Controls" and requires
companies to publish details about their internal accounting controls and their
procedures for financial reporting as part of their annual financial reports. Section 404
requires corporate executives to personally certify the accuracy of their company's
financial statements and makes them individually liable if the SEC finds violations.
HECTOR E. JULIANO 16
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
General controls not application specific, they do not control specific transactions but
have an effect to transaction integrity such as poor data based security control. When
data based security is at risk, an individual may steal, corrupt transaction data
The security of computer center can create a potential impact for application controls to
function specially when it is about financial reporting processes. The following control
features shall contribute directly to computer center security:
A. Physical location - The computer center should be located away from human
made and natural hazards such as processing plants, gas and water mains,
airports and high crime areas.
HECTOR E. JULIANO 17
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
C. Access – should be limited to the operators and employees who are working
there such as programmers and analysts. These persons should be required
to sign in and out for verification purposes. A single door should be
maintaining for main entrance notwithstanding the fire alarm exits. And close-
circuit cameras with video recording system must be installed for higher level
of security.
a) Second site back-up – provides for duplicate data processing facilities following a
disaster.
HECTOR E. JULIANO 18
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
b) Identifying critical applications - Critical applications and data files of the firms
must be identify and restored during a DRP. Immediate recovery efforts must
focus on restoring data critical to the organization’s survival such as functions that
involve cash flow position of a particular firm.
c) Performing backup and offsite storage – Critical files and supplies needed in
performing critical functions should be specified in DRP. Personnel should routine
perform backup and storage procedures to safeguard resources that are critical.
d) Testing the plans – DRP test must be performed periodically for it provide
measurement on the preparedness of personnel and identify omissions or
bottlenecks in the plan.
DISCUSSION QUESTIONS:
HECTOR E. JULIANO 19
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
PREFINAL
The computer’s control program is called the operating system wherein it allows the user
and their applications to share and access common computer resources. (processors,
main memory, databases, printers) Never the integrity of an operating system be
compromised, control within individual accounting applications may also be
circumvented or worst, neutralized. Being common to all users, the larger the computer
facility of an entity, the greater of potential damage could occur.
OBJECTIVES
The following objectives of the operating system is attained when the above-mentioned
tasks are performed reliably and consistently by the operating system:
A. Protect itself from users. Users should not gain control of the system that could
cause damage to the data or stop running the system.
HECTOR E. JULIANO 20
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
B. Protect users from each other. Users must be independent among each other
and should not access among themselves to corrupt, destroy or access programs
of another user.
C. Protect users among themselves. Modules stored in very data must not corrupt
another module.
E. The operating system must be protected from its environment. During power
failure, the operating system should be able to achieve a controlled termination
of activities from it can later recover.
Control objectives of the operating system may not be achieved when the system is
exploited either accidentally, like hardware failures that could cause the system to crash,
or intentionally, like illegal access of data violation of privacy for personal gain.
Why do these situations occur? These exposures are occurring primarily due to the
following sources:
2. Individuals inside or even outside the organization who browse the system for
identifying and exploiting security flaws.
HECTOR E. JULIANO 21
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
Overall, the above disadvantage points to the entity occurred due to a common
occurrence – that is, the way access privileges are assigned to individuals influences
system security. That being the case, privileges should, therefore, be carefully
administered and closely monitored for compliance with organizational policy and
principles of internal control.
As auditor, all access and privileges granted to every individual should be verified. Policies
in separating incompatible functions must be consistent in accordance with the
organizations policy.
To attain the above objectives, the following audit procedures must be in place and
observed:
HECTOR E. JULIANO 22
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
In any transaction to be valid, both the customer and the supplier must establish that the
transaction between them are authorized. The following features must be present in
every EDI transaction:
1. EDI trading partners must permit access to private data files. As an example, prices
on the purchase order must be binding to both parties.
2. Control log must be maintained. Control log records the transaction flow through
each phase of the EDI system due to absence of source document.
HECTOR E. JULIANO 23
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
Relative to EDI trail, audit objectives should be the concern of an auditor. These objectives
are as follows:
(1) All EDI transactions are authorized, validated, and in compliance with the
trading partner agreement
(4) Adequate controls are in place to ensure a complete audit trail of all EDI
transactions.
HECTOR E. JULIANO 24
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
PROBLEM SOLVING:
_______________________________________________________________
FINAL
LABORATORY
CAATTs, or Computer-Assisted Audit Tool and Techniques refer to the use of technology
to help auditors evaluate controls by extracting and examining relevant data. The table
below serve as a guide to the auditor when implementing CAATTs:
1. 1. 1. 1.
Be forward thinking Ensure you have a Emphasize
Use audit plan to identify about timescales clear plan and conclusions are
where CAATs can be used. for data and understanding of the based on full
resource requests. tests you will population size,
perform. not just a sample
2. 2. 2. of data to add
Focus on recognizing Make sure you use Use the most weight to your
HECTOR E. JULIANO 25
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
CAATTs comes in many forms and each one of them will be discussed here thoroughly.
2. BASE CASE SYSTEM EVALUATION is a variant of the test data approach where set
of test transactions are processed through repeated iterations until valid results
are obtained. Effects are evaluated by comparing current vs. base case results.
4. THE INTEGRATED TEST FACILITY (ITF) - enables the auditor to test an application’s
logic and controls during its normal operation of one or more audit modules
designed into the application during the systems development process.
HECTOR E. JULIANO 26
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
Aside from the above-mentioned CAATTs utilize by the auditor in audit engagement,
substantive tests, which are termed as such, are used to substantiate every amounts
appearing in the account balances.
Before substantive tests can be performed, these data must first be extracted from their
host media and presented to the auditor in usable form.
HECTOR E. JULIANO 27
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
PROBLEM SOLVING:
A catalog company has hired you to computerize its sales order entry forms
approximately 60 percent of all orders are received over the telephone, with the
remainder received by either mail or fax. The company wants the phone orders to be
input as they are received. The mail and fax orders can be batched together in groups of
50 and submitted for keypunching as they become ready. The following information is
collected for each order:
✓ Customer number (if customer does not have one, one needs to be assigned)
✓ Customer name
✓ Address
✓ Payment method (credit card or money order)
✓ Credit card number and expiration date (if necessary)
✓ Items ordered and quantity
✓ Unit price
REQUIRED:
Determine control techniques to make sure that all orders are entered accurately into the
system. Also, discuss any differences in control measures between the batch and the real-
time processing.
HECTOR E. JULIANO 28
LYCEUM
O F A L A B A N G
Km.30, National Road., Tunasan, Muntinlupa City, Philippines
AUDITING IN CIS ENVIRONMENT
Tel. Nos. (02)856-93-23 / (02)856-9246 / (02)403-8248
REFERENCES:
HECTOR E. JULIANO 29