Chapter 7 Auditing in A Computerized Environment
Chapter 7 Auditing in A Computerized Environment
With the rapid development in technology n recent years, computer information systems
(CIS) have become feasible, perhaps essential, for use even in small scale business
operations. Almost all entities now use computers to some extent in their accounting
systems. This widespread use of computers has offered new opportunities for
professional accountants and has also created some challenging problems to auditors.
Regardless of the extent of computerization or the methods of data processing being used,
the establishment and implementation of appropriate internal control systems rests with
management and those charged with governance. The auditor’s responsibility is to obtain
an understanding of the entity’s internal control system to be able to assess control risk
and determine the nature, timing and extent of tests to be performed.
Consistency of Performance
In a CIS environment, data and computer programs may be accessed and altered
by unauthorized persons leaving no visible evidence. It is important, therefore,
that appropriate controls are incorporated to the system to limit the access to data
files and programs only to authorized personnel.
Concentration of duties
Certain transactions may be initiated by the CIS itself without the need for an
input document. For example, interest may be calculated and charged
automatically to customer’s account balances on the basis of pre-authorized terms
contained in a computer program.
In a manual system, the records are written in ink on substantial paper. The only
way to lose the information is to lose or to destroy physical records. The situation
is completely different in a CIS environment. The information on the computer
can be easily changed, leaving no trace of the original content. This change could
happen inadvertently and huge amount of information can be quickly lost.
Many of the control procedures used in manual processing also apply in a CIS
environment. Examples of such control procedures include authorization of
transactions, proper segregation of duties, and independent checking. The
elements of internal control are the same; the computer just changes the methods
by which these elements are implemented.
General Controls
General controls are those controls policies and procedures that relate to the
overall computer information system. These controls include:
1. Organizational controls
Systems Other
Operation
Development Functions
Computer
System Librarian
Operator
Analyst
Data Entry Operator Prepares and verifies input data for processing.
3. Access Controls
One of the characteristics of the CIS is the vulnerability of files and programs.
Computer files can be easily lost and the lost of these files can be disastrous to an
entity. The survival of an entity affected by such disaster depends on its ability to
recover the files on a timely basis.
A data recovery control provides for the maintenance of back up files and off site
storage procedures. Computer files should be copied daily to tape or disks and
secured off-site. In the event of disruption, reconstruction of files is achieved by
updating the most recent back-up with subsequent transaction data. When
magnetic tapes are used, a common practice in file retention called Grand-father,
father, son practice requires entity to keep the two most recent generations of
master files and transaction files in order to permit reconstruction of master files
if needed.
5. Monitoring controls
Monitoring controls are designed to ensure that CIS controls are working
effectively as planned. These include periodic evaluation of the adequacy and
effectiveness of the overall CIS operations conducted by persons within or outside
the entity.
Application Controls
The processing of transaction involves three stages: the input, processing and
output stage. The input stage involves capturing of a mass of data; the processing
stage involves converting the mass of raw data into useful information; and output
stage involves preparation of information in a form useful to those who wish to
use it. To ensure that all relevant data are captured as input to the system, and to
ensure that the data are accurately processed during their conversion into
meaningful financial information, controls or other mechanisms must be
incorporated into the system.
Application controls are those policies and procedures that relate to specific use of
the system. These are designed to provide reasonable assurance that all
transactions are authorized, and that they are processed completely, accurately
and on a timely basis. These include
Key verification
This requires data to be entered twice (usually by different operators) to provide
assurance that there are no key entry errors committed.
Field check
This ensures that the input data agree with the required field format. For example,
all SSS number must contain ten digits. An input of an employee’s SSS number
with more or less than ten digits will be rejected by the computer.
Validity check
Information entered is compared with valid information in the master file to
determine the authenticity of the input. For example, the employees’ master file
may contain two valid codes to indicate the employee’s gender “1” for male and
“2” for female. A code of “3” is considered invalid and will be rejected by the
computer.
Self-checking digit
This is a mathematically calculated digit which is usually added to a document
number to detect common transpositional errors in data submitted for processing.
Limit check
Limit check or reasonable check is designed to ensure that data submitted for
processing do not exceed a pre-determined limit or a reasonable amount.
Control totals
These are totals computed based on the data submitted for processing. Control
totals ensure the completeness of data before and after they are processed. These
controls include financial totals, hash totals and record counts. As an example,
assume the following data regarding the entity’s disbursements for the day.
Voucher No. 142
P 20, 000
Voucher No. 143
P 5,000
Processing controls are designed to provide reasonable assurance that input data
are processed accurately and that data are not lost, added, excluded, duplicated or
improperly changed. Almost all of the input controls that were mentioned earlier
are also part of the processing controls because such controls are usually
incorporated in the client’s computer program to detect errors in processing of
transactions.
3. Control over output
Output controls are designed to provide reasonable assurance that the results of
processing are complete, accurate and that these output are distributed only to
authorize personnel.
A person who knows what an output should look like must review the CIS output
for reasonableness. Control totals are compared with those computed prior to
processing to ensure completeness of information. Finally, CIS outputs must be
restricted only to authorize employees who will be using such output.
The effectiveness of the general CIS controls is essential to the effectiveness of CIS
application controls. Thus, it may be more efficient to review the design of the general
controls first before reviewing the application controls.
The auditor’s objective and scope of the audit do not change in a CIS
environment. However, the use of the computer changes the processing and
storage of financial information and may affect the organization and procedures
employed by the entity to achieve adequate internal control. Accordingly, the
methods employed by the auditor in testing the control may also be affected.
When computer accounting systems perform tasks for which no visible evidence
is available, it may be impracticable for the auditor to test manually.
Consequently, auditor will have to audit directly the client’s computer program
using CAATs. This is also called “white box approach”
CAATs are computer programs and data which the auditor uses as part of the
audit procedures to process data of audit significance contained in an entity’s
information systems. Some of the commonly used CAATs include test data,
integrated test facility and parallel simulation.
1) Test data
The test data technique is primarily designed to test the effectiveness of the
internal control procedures which are incorporated in the client’s computer
program. The objective of the test data technique is to determine whether the
client’s computer programs can correctly handle valid and invalid conditions as
they arise.
To accomplish this objective the auditor prepares test data (fictitious transactions)
that consist of valid and invalid conditions. The auditor enters the test data into
the system and have the data processed by the entity’s computer program.
Since the auditor is the one who creates the test data, the auditor knows what the
output should look like assuming the client’s computer program is functioning
effectively. The auditor then compares the processing results with his
predetermined output. If the output generated by the client’s program is the same
as the auditor’s expected output, the auditor may conclude that the client’s
program is reliable.
TEST DATA
Auditor’s
Test Data
A disadvantage of the test of data technique is that the auditor does not have
an assurance that the program tested is the same program used by the client
throughout the accounting period. In order to overcome this advantage, the test
data technique can be extended to an integrated test facility (ITF).
When using this technique, the auditor creates dummy or fictitious employee or
other appropriate unit for testing within the entity’s computer system. Unlike test
data, which is run independent of the client’s data and ITF integrates the
processing of test data with the actual processing of ordinary transactions without
management being aware of the testing process. The resultant output, relating to
the dummy unit, is then compared with the predetermined results to evaluate the
reliability of the client’s program.
By processing test data simultaneously with client’s data, ITF provides assurance
that the program tested by the auditor is the same program used by the client in
processing transactions.
3) Parallel simulation
In contrast to the test and ITF techniques, which require the auditor to create test
inputs to be processed using the client’s computer program that simulates key
features or processes of the program under review. The simulated program is then
used to reprocess transactions that were previously processed by the client’s
program.
The auditor compares the results obtained from the simulation with the client’s
output to be able to make inference about the reliability of the client’s program.
PARALLEL SIMULATION
Client’s Client’s
Data Data
Processed Processed
Using Client’s Using Auditor’s
Program Program
Compar
Output e Output
Manuall
y
Advanced computer systems sometimes do not retain permanent audit trails, thus
requiring capture of audit data as transactions are processed. Such systems may
require audit procedures that are able to identify and capture audit data as
transactions occur. Some of the commonly used CAATs include:
1) Snapshots
8. Some CIS control procedures relate to all CIS activities (general controls) and
some relate to specific tasks (application controls). General controls include
a) Controls design to ascertain that all data submitted to CIS for processing have
been properly authorized
b) Controls that relate to the correction and resubmission of data that were
initially incorrect
c) Controls for documenting and approving programs and changes to programs.
d) Controls designed to assure the accuracy of the processing results.
9. An auditor assessing control risk at a low level in a CIS environment. Under these
circumstances, on which of the following procedures would the auditor initially
focus?
a) Programmed control procedures
b) Application control procedures
c) Output control procedures
d) General control procedures
11. Which of the following activities would most likely be performed in the CIS
department?
a) Initiation of changes to master records
b) Conversion of information to machine-readable from.
c) Correction of transactional errors.
d) Initiation of changes to existing applications.
13. Where computers are used, the effectiveness of internal control depends, in part,
upon whether the organizational structure includes any incompatible
combinations. Such a combination would exist when there is no separation of the
duties between
a) Documentation librarian and manager of programming
b) Programming and computer operator
c) Systems analyst and programmer
d) Processing control clerk and keypunch supervisor
14. Which of the following is a general control that would most likely assist an entity
whose system analyst left the entity in the middle of a major project?
a) Grandfather-father-son record retention
b) Data encryption
c) Systems documentation
d) Check digit verification
16. Access control on an on-line CIS can best be provided in most circumstances by
a) An adequate librarianship function controlling access to files.
b) A label affixed to the outside of a file medium holder that identifies the
contents
c) Batch processing of all input through a centralized, well guarded facility
d) User and terminal identification controls such passwords
19. The possibility of losing a large amount of information stored in computer files
most likely would be reduced by the use of
a) Back up files
b) Check digits
c) Completeness tests
d) Conversion verification
20. Which of the following controls most likely would assure that an entity can
reconstruct its financial records?
a) Hardware controls are built into the computer by the computer manufacturer.
b) Backup diskettes or tapes of files are stored away from originals
c) Personnel who are independent of data input perform parallel simulations
a) System flowcharts provide accurate descriptions of input and output
operations.
22. A Co. updates its accounts receivable master file weekly and retains the master
files and corresponding update transactions for the most recent 2-week period.
The purpose of this practice is to
a) Verify run-to-run control totals for receivables.
b) Match internal labels to avoid writing on the wrong volume.
c) Permit reconstruction of the master file if needed.
d) Validate groups of update transactions for each
25. When CIS programs or files can be accessed from terminals, users should be
required to enter a (n)
a) Parity check
b) Personal identification code
c) Self diagnosis test
d) Echo check
27. The completeness of computer generated sales figures can be tested by comparing
the number of items listed on the daily sales report with the number of items
billed on the actual invoices. This process uses
a) Check digits
b) Control totals
c) Validity tests
d) Process tracing data
29. A clerk inadvertently entered an account number 12368 rather than account
number 12638. In processing this transaction, the error would be detected with
which of the following controls?
a) Batch total
b) Key verifying
c) Self-checking digit
d) An internal consistency check
30. Totals of amount in computer record data fields, which are not usually added but
are used only for data processing control purposes, are called
a) Record totals
b) Hash totals
c) Processing data totals
d) Field totals
31. If a control total were to be computed on each of the following data items, which
would best be identified as a hash total for a payroll CIS application?
a) Net pay
b) Hours worked
c) Department numbers
d) Total debits and total credits
32. In updating a computerized accounts receivable file, which one of the following
would be used as a batch control to verify the accuracy of the posting of cash
receipts remittances?
a) The sum of the cash deposits plus the discounts less the sales returns.
b) The sum of the cash deposits
c) The sum of the cash deposits less the discounts taken by customers.
d) The sum of the cash deposits plus the discounts taken by customers.
33. Which statement in NOT correct? The goal of batch controls is to ensure that
during processing
a) Transaction are not omitted
b) Transactions are not added to create.
c) Transaction are process more than once
d) An audit trial is created
35. The employee entered “40” in the “hours worked per day” field. Which check
would detect this unintentional error?
a) Numeric/alphabetical check
b) Sign check
c) Limit check
d) Missing data check
36. An unauthorized employee took computer printouts from output bins accessible to
all employees. A control which would have prevented this occurrence is
a) A storage/retention control
b) An output review control
c) A spooler file control
d) A report distribution control
37. It involves application of auditing procedures using the computer as an audit tool.
This includes computer program and data the auditor uses as part of the audit
procedures to process data of audit significance contained in an entity’s
information systems.
a) Test data approach
b) Computer assisted audit techniques
c) Generalized audit software
d) Auditing around the computer
38. When auditing “around” the computer, the independent auditor focuses solely
upon the source documents and
a) Test data
b) CIS processing
c) Compliance techniques
d) CIS output
39. Which of the following CIS generally can be audited without examining or
directly testing the computer programs of the system?
a) A system that performs relatively uncomplicated process and produces detail
output
b) A system that affects a number of essential master files and produces n a
limited output
c) A system that updates a few essential master files and produces no printed
output other than final balances
d) A system that uses an on-line real-time processing feature.
43. Which of the following is NOT a common type of white box approach?
a) Test data
b) Integrated test facility
c) Auditing around the computer
d) Parallel simulation
45. Creating simulated transaction that are processed though a system to generate
results that are compared with predetermined results, is an auditing procedure
referred to as
a) Program checking
b) Use of test data
c) Completing outstanding jobs
d) Parallel simulation
46. An auditor estimates that 10,000 checks were issued during the accounting period.
If a computer application control which performs a limit check for each check
request is to be subjected to the auditor’s test data approach, the sample should
include
a) Approximately 1,000 test items
b) A number of test items determined by the auditor to be sufficient under the
circumstances
c) A number of test items determined by the auditor’s reference to the
appropriate sampling tables
d) One transaction
47. An integrated test facility (ITF) would be appropriate when the auditor needs to
a) Trace a complex logic path through an application system.
b) Verify processing accuracy concurrently with processing
c) Monitor transactions in an application system continuously.
d) Verify load module integrity for production programs
48. The auditor’s objective to determine whether the client’s computer programs can
correctly handle valid and invalid transactions as they arise is accomplished
through the
a) Test data approach
b) Generalized audit software approach
c) Microcomputer-aided auditing approach
d) Generally accepted auditing standards.
49. When an auditor tests a computerized accounting system, which of the following
is true of the test data approach?
a) Several transactions of each type must be tested
b) Test data must consist of all possible valid and invalid conditions
c) The program tested is different from the program used throughout the year by
the client
d) Test data are processed by the client’s computer programs under the auditor’s
control.
50. Which of the following statements is not true to the test data approach when
testing a computerized accounting system?
a) The test needs to consist of only those valid and invalid conditions which
interest the auditor.
b) Only one transaction of each type need be tested
c) The test data must consist of all possible valid and invalid conditions.
d) Test data processed by the client’s computed programs under the auditor’s
control.
51. In auditing through a computer, the test data method is used by auditors to test the
a) Accuracy of input data
b) Validity of the output
c) Procedures contained within the program
d) Normalcy of distribution of test data
53. A primary reason auditors are reluctant to use an ITF is that it requires them to
a) Reserve specific master file records and process them at regular intervals
b) Collect transaction and master file records in a separate file
c) Notify user personnel so they can make manual adjustments to output
d) Identify and reverse the fictitious entries to avoid contamination of the master
file.
54. Which of the following is a disadvantage of the integrated test facility approach?
a) In establishing fictitious entities, the auditor may be compromising audit
independence
b) Removing the fictitious transactions from the system is somewhat difficult
and if not done carefully, may contaminate the client’s files.
c) ITF is simply an automated version of auditing “around” the computer
d) The auditor may not always have a current copy of the authorized version of
the client’s program
55. The audit approach in which the auditor runs his/her own program on a controlled
basis in order to verify the client’s data recorded in a machine language is
a) The test data approach
b) The generalized audit software approach
c) The microcomputer aided auditing approach
d) Called auditing around the computer
.Tran
sactio
n
File
Client’s Auditor’s
Program Program
.Tran
sactio
n
File
Exceptions
Report