Chap 1 & 2
Chap 1 & 2
Chap 1 & 2
Penalties for Late Assignments/ The score for an assessment item submitted after the
Assessments designated time on the due date, without an approved
extension of time, will be reduced by 5% of the
possible maximum score for that assessment item for
each day or part day that the assessment item is late.
Contact Details of the Name, number and email address of GSTC Head and
Program Head GSTC Facilitator in the college)
Students with Special Students with special needs shall communicate with the
Needs Course Facilitator about the nature of his or her special
needs. Depending on the nature of the need, the Course
Facilitator, with the approval of the Program Head, may
provide alternative assessment tasks or extension of the
deadline of submission of assessment tasks. However,
the alternative assessment tasks should still be in the
service of achieving the desired course learning
outcomes.
Online Tutorial You are required to enroll in a specific tutorial time for
Registration (if this course via the www.cte.edu.ph portal. Please note
available and that there is a deadline for enrollment to the tutorial.
necessary)
Instructional Help Desk (Name, number and email addresses of Dean and
Contact Details College LMS Administrator)
Library Contact Details (Name, number and email address of LIC Head)
Well-being Welfare (Name, number and email address of GSTC Head and
Support Held Desk GSTC Facilitator in the college)
Contact Details
Let us begin!
Big Picture
Week 1-3: Unit Learning Outcomes (ULO): At the end of the unit, you are expected to
a. Understand the relationship between auditing and internal controls, and
the information technology (IT) governance controls;
b. Explain the process of auditing operating systems and networks;
c. Understand the process of auditing the database systems;
Metalanguage
In this section, we will discuss the relationship between auditing and internal
controls. The concept of IT governance controls are also introduced in this section.
Essential Knowledge
Auditing
• Information technology (IT) developments have had tremendous impact on
auditing.
• Business organizations undergo different types of audits for different
purposes. Most common are (1) external (financial) audits, (2) internal
audits and (3) fraud audits.
Internal Audits
• Internal auditing is an independent appraisal function to examine and
evaluate activities within, and as a service to, an organization.
• Internal auditors perform a wide variety of activities including financial,
operational, compliance and fraud audits.
ACC 311 *Property of UMDC
Page 6 of 12
UM Digos College
Department of Accounting Education
Roxas Extension, Digos City
Fraud Audits
• Recent increase in popularity as a corporate governance tool.
• Objective to investigate anomalies and gather evidence of fraud that may
lead to criminal convictions.
• May be initiated by management who suspect employee fraud or the board
of directors who suspect executive fraud.
Audit Risk
• Probability that auditor will render unqualified (clean) opinion on financial
statements that are, in fact, materially misstated.
• Inherent risk (IR) is associated with unique characteristics of client’s
business or industry.
• Control risk (CR) is the likelihood the control structure is flawed because
controls are either absent or inadequate to prevent or detect errors.
ACC 311 *Property of UMDC
Page 7 of 12
UM Digos College
Department of Accounting Education
Roxas Extension, Digos City
• Detection risk (DR) is the risk auditors are willing to take that errors not
detected or prevented by the control structure will not be detected by the
auditor.
• Audit risk components in a model used to determine the scope, nature and
timing of substantive tests:
• Audit risk model: AR = IR x CR x DR
o If acceptable audit risk is 5%, the planned detection risk will depend
upon the control structure.
• The stronger the internal control structure, the lower the control risk and the
less substantive testing the auditor must do.
• Substantive tests are labor intensive and time consuming, which drives up
audit costs and cause disruption.
• Management’s best interests are served by a strong internal control
structure.
The IT Audit
• First step is audit planning which includes the analysis of audit risk.
o Techniques for gathering evidence include questionnaires,
management interviews, reviewing system documentation and
observing activities.
• Objective of tests of controls is to determine if adequate controls are in place
and functioning.
• Third phase focuses on financial data and a detailed investigation of specific
account balances and transactions through substantive tests.
o Files may be extracted using Computer-Assisted-Audit Tools and
Techniques (CAATTs) software. 16
Internal Control
• Management required by law to establish and maintain adequate system of
internal controls.
• Section 404 requires management of public companies to access the
effectiveness of their internal controls in an annual report.
IT Controls
• Application controls ensure validity, completeness, and accuracy of
financial transactions.
o Includes check digits, batch balancing and payroll limits.
• General controls apply to all systems and include:
o IT governance, IT infrastructure, security and access to operating
systems and databases, application acquisition and development
and program change procedures.
o General controls needed to support functioning of application
controls. Both needed to ensure accurate financial reporting. 28
IT Governance
• Subset of corporate governance that focuses on the management and
assessment of strategic IT resources.
• Key objects are to reduce risk and ensure investments in IT resources add
value to the corporation.
• All corporate stakeholders must be active participants in key IT decisions.
• Three IT governance issues addressed by SOX and the COSO internal
control framework:
o Organizational structure of the IT function.
o Computer center operations.
o Disaster recovery planning.
Self-Help: You can also refer to the source below to help you further
understand the lesson:
-End-