Auditing in A Computerised System
Auditing in A Computerised System
iii. Programs and data are held together increasing the potential for unauthorized access
and alteration.
iv. Computer information systems are designed to limit paper work. This results in less
visible evidence. Data may be entered directly into the computer system without
supporting documents e.g. in some online systems a sales transaction may be initiated
through the computer without a sales order being raised, the amount is then directly
charged to the customer’s account without a physical invoice being raised.
v. Lack of visible transaction trail/ loss of audit trail
An audit trail refers to the ability to trace transactions through the system by examining
source documents, books of accounts and the financial statements. This is possible in a
manual system where various stages of a transaction are evidenced by physical
documents. In computerized information system data and information is maintained in
magnetic files, which are overwritten over time. This results in loss of visible audit trail.
vi. Lack of visible output
In some CIS systems the results of transaction processing are not printed out, only the
summary data may be printed. This data can only be accessed through the computer.
vii. Ease of access of data and computer programs
Where there are no proper controls over access to computers at remote terminals there is
increased danger for unauthorized access to and alteration of data and programs. This
could result in fraud or manipulation of accounting records.
viii. Programmed controls
In CIS environment controls are programmed together with data processing instructions
e.g. protection of data against unauthorized access maybe by way of passwords or
computer programs containing limit checks.
1|Page
DAN OWINO
ix. A single input to the accounting system may automatically update all records associated
with the transaction e.g. when a credit sale is made on line the system will credit the sales
account, reduce the stock levels and debit the debtors account simultaneously. Thus an
erroneous entry in a system creates errors in the various affected ledgers.
x. Data and programs are usually stored in portable magnetic disks and tapes, which are
vulnerable to theft, loss, and international and accidental destruction.
xi. Systems generated transactions: Many systems are capable of generating transactions
automatically without manual intervention e.g. calculation of interest on customers’
accounts may be done and charged to income automatically. This lack of authorization
and documentation can result in significant misstatement or errors in financial
statements, if appropriate controls are not in place.
1. General controls
These are controls, which relate to the environment within which computer-based accounting
systems are developed, maintained and operated aimed at providing reasonable assurance that
the overall objectives of internal controls are achieved. These controls could either be manual of
programmed. The objectives of general controls are to ensure proper development and
implementation of applications and the integrity of program and data files and of computer
operations. General controls can be classified into:
a) Systems development controls
b) The plant of organization and operation of the computer activity.
c) Access controls
d) Backup and recovery procedures and other controls.
2|Page
DAN OWINO
Controls that should be exercised during system development can be divided into the
following categories:
Review, testing and approval of new systems;
Controls over program changes;
Parallel running of the new and old system;
Documentation procedures.
Changes in the computer system should be subject to strict controls. For example, a
written request for an application program change should be made by a user
department and authorized by a designated manager or committee. Once the program
has been redesigned the documentation must be revised. The changes in the program
should be tested by the user and a systems employee who was not involved in
designing the change. Approval of the documented change and the results of testing
should be given by a Systems Manager.
Proposed program changes should be tested with incorrect or incomplete data as well
as actual data to determine if controls have been properly implemented in the
program.
3|Page
DAN OWINO
example of documentation that assists the users in understanding the functions of the
software and how one can use it.
4|Page
DAN OWINO
The organization should have proper segregation of functions and policies and procedures
relating to control functions within which the computerized system is operated.
Segregation of Functions
There should be proper segregation of duties in the operation of a computerized information
system.
Those who process the data should have no responsibilities for initiating or altering the data.
The following functions should be segregated:
The computer department manager should report to an executive who is not regularly
involved for authorizing transactions for computer processing. This will ensure
independence of the function.
IT staff should not correct errors in input data. This should be referred to the department
where the data originated for correction and resubmitted to the IT department for
processing:
Computer staff should not initiate transactions or have custody of resulting assets.
Within the computer department there should be segregation of duties.
Programmers and systems analysts should not be allowed to operate the computer except
for testing purposes.
Operator’s duties should be rotated so that the same operator is not responsible for the
same procedure.
The computers operating system should be set up and keep a record of programs and files
operated on. This record should be checked regularly by the computer department
manager and the internal audit. There should also be procedures ensuring the
completeness and validity of all input and output. In a centralized system, the data control
group may be established for this function.
c) Access controls
Computer systems are often dependent on accuracy and validity of data held on file. Access
controls to the computer hardware, software and data files are therefore vital.
Access controls provide assurance that only authorized individuals use the system and that
usage is for authorized purposes only. Access may be restricted to specific persons, files,
functions or devices.
Access controls are both physical and programmed. Physical controls apply to both hardware
and data files stored in form of magnetic disks or diskettes. Example of access controls:
Only authorized personnel should be permitted access to the computer facilities, which
should be in a secure room.
5|Page
DAN OWINO
Control over computers located in the user department should be improved by making
sure that vital data or programs are not left running when the computer is left unattended.
Passwords should be issued to all staff, for access to the computer facilities. This is
supported by requirement that each user can only log into the computer by keying-in their
passwords, the computer then knows the identity of the user and it is programmed so as
to only accept instructions only from authorized users. System of passwords makes it
possible for each user to have limited access to files and that access may further be
designated as Read Only or Read and Write. In this way employees are given access to
information contained in files only. Computers should also be programmed to record
names of all those accessing the computer for purpose of adding, altering or deleting data.
Passwords should be changed regularly and access to password data held in the computer
should be subject to stringent controls.
The computer has no way of knowing whether the user is the authorized user of a
particular password. Hence user should be issued with machine- readable evidence e.g.
magnetic striped cards. For access then the user will have to use the card and the
password.
Programs and data files which need not be on-line should be stored in a secure location
with a computer department librarian. Systems programs and documentation should be
locked away with limited access.
A systems access log to record all attempts to use the system should be maintained. This
will record the date, time, codes used, mode of access and data involved. Logs of
computer and programmer usage should be maintained and periodically reviewed;
Logs of operator over-rides of programs. This will show instances where the users have
overridden systems controls.
Encrypting the data before transmission over communication lines makes it more difficult
for someone with access to the transmission to understand or modify the contents.
Automatic log off i.e. disconnection of inactive data terminals may prevent the viewing
of sensitive data on an unattended data terminal.
The recovery plan should create back up or duplicate copies of data files, databases,
programs, and documentation, store backup copies off-sire and plan auxiliary processing at
another site. Such a recovery plan should be tested on a regular basis to ensure that it indeed
works.
For example, even after the unfortunate bomb attack on the US Embassy in 1998,
organizations such as co-operative Bank that were affected were able to reconstruct their data
due to the fact that there was adequate back-up of the information on remote sites. This
emphasis that a disaster recovery and reconstruction plan is a critical control that
management must implement.
6|Page
DAN OWINO
There should be adequate protection against natural disasters such as situating computer
rooms in rooms protected against floods and room fitted with smoke detectors.
There should be maximum possible physical security where computers are installed.
Important files should always be stored in duplicate.
Standby procedures should be put in place in the event of computer breakdown.
File retention procedures e.g. retaining copies of essential data on separate and secured
location.
There should be adequate virus protection. A computer virus is a software program that
infects another program or a system’s primary storage memory by altering its logic.
Infection often results in destruction of data or processing errors. Once infected, a
software program can spread the virus to other software programs. Viruses can be spread
through the use of unauthorized software, use of diskettes from outside, propagation of
viruses through e-mail attachments among other means. To protect viruses the following
controls can be exercised:
- Preventive controls include establishing a formal security policy, using only clean and
certified copies of software, checking new software with anti-virus software,
restricting access and educating users not to introduce unauthorized software or other
data
- Detective controls will include making the file size and date/time stamp comparisons;
- Corrective controls include ensuring that clean back up is maintained and having a
documented plan for recovery from a virus.
These controls will minimize the risks associated with the loss or corruption of data.
2. Application controls
The objectives of application controls which may be manual or programmed are to ensure the
completeness and accuracy of the accounting records and the validity of the entries made therein
resulting from both manual and programmed processing. Application controls therefore provide
assurance that all transactions are authorized, recorded and processed, completely, accurately and
on a timely basis. These controls relate to the transactions and standing data pertaining to each
computer based accounting system and are therefore specific to each such application. With the
increasing sophistication of computer operating systems it is becoming more common for
controls to be programmed as part of each application. Application controls are generally divided
into:
a) Input controls
b) Processing controls.
c) Output controls.
d) Controls over master files and standing data.
e) Controls over standing data and master files.
Controls that ensure the completeness of recording and processing, often also ensure accuracy,
so one control procedure may have several objectives.
a) Input controls
7|Page
DAN OWINO
Most errors in computer accounting systems can be traced to faulty input. Controls over the
completeness, validity, data conversion and controls over rejection of input are therefore
vital.
Completeness
These controls ensure that all transactions are recorded. For example, that all sales are
recorded in the cash register or all purchase invoices are posted to the accounting records.
Validity
Controls over validity ensure that only actual transactions that have been properly authorized
are recorded. These controls are most important over the recording of liabilities such as
wages, creditors etc. it is important that there is adequate separation of duties such that those
who initiate a transaction or who have access to cash, cheques or goods as a result of the
transaction being entered should not have the responsibility for posting the transaction.
Access controls as discussed earlier play an important role in validity in that the computer is
programmed to accept input only from authorized users. The computer can also be
programmed to verify authority limits as well.
Data Conversion
There must be controls to ensure that all data on source documents is properly entered into
the computer.
Missing field check Checks that all essential data fields are Ensures accuracy of the
present and are of the right length processed data. Transactions
during data input. cannot be properly processed
if necessary data is missing.
Valid character check Checks that data fields appear to be of Ensures correctness of input
the right type e.g. all alphabetic, all data
8|Page
DAN OWINO
Type of edit control Description of control Objective
numeric or mixed.
Limit / reasonableness Checks that data falls within Ensures accuracy and validity
checks predetermined reasonability limits e.g. in input data.
hours worked do not exceed a certain
limit, may be 8 hours a day.
Master file checks Checks that all codes match those on Ensures that data is processed
master files e.g. employee’s number against the correct master file.
matches an employee number of the
personnel file.
Document count Agrees the number of input records in Ensures that all documents are
a batch with the total on the batch input.
control form.
Sign check Assure that data in a field have the To verify validity and
appropriate arithmetic sign. For accuracy of data.
example, that discount awarded should
always have a negative sign.
Validity checks Are tests of identification numbers or To test for validity of input
transaction codes for validity by data.
comparison with items already known
to be correct or authorized.
9|Page
DAN OWINO
i. Processing controls
Processing controls ensures that transactions are:
- Processed by the right programs.
- Processed to the right master files.
- Data is not lost, duplicated or otherwise improperly altered during processing.
- Processing errors are identified and corrected.
Some input controls are also processing controls e.g. limit, reasonableness and sign checks.
b) Output controls
Are necessary to ensure that:
- Output is received from input;
- Results of processing are accurate;
- Output is distributed to appropriate personnel promptly.
DAN OWINO
- Error listings should be received directly from the system by the control group, which
should make any necessary inquiries and send the errors to users for correction and
resubmission.
- The console log should be reviewed for unusual interruptions, interventions or other
activity.
- User review of the output. Users should be able to determine when output is
incomplete or not reasonable.
Examples of controls
Periodic printouts of standing data for checking with manually held information.
Establishment of independent control totals for periodic verification with computer
generated totals.
Limiting persons who can make amendments to standing data.
11 | P a g e
DAN OWINO
iv. The allocation of suitably skilled staff to the audit. Thus audit firms now use the
computer audit department on some parts of the audit and allowing general audit staff to
have some parts of the audit and allowing general audit staff to have some computer
experience.
v. The extent to which computer assisted audit techniques can be used. These techniques
often require considerable planning in advance.
12 | P a g e
DAN OWINO
There are basically two techniques available to the auditor for auditing through the computer.
These are a use of test data and the use of computer audit programs. These methods are
ordinarily referred to as computer assisted audit techniques (CAATs).
Computer Assisted Audit Techniques (CAATs)
Relevant standard IAPS 1009: Computer – Assisted Audit Techniques
We have already mentioned that the most appropriate method to audit computerized information
systems is through the use of CAATs. Let us examine CAATs in details.
Definition
This refers to any automated audit technique such as audit software and test data. CAATs, are
ways in which the computer may be used by the auditor in a computerized information system to
gather, or assist in gathering, audit evidence, CAATs are mainly of two types:-
a) Audit software
b) Test data
Audit Software
This refers to software that has the capability to directly read and access data from various
database platforms. The software is able to carry out mathematical computations, statistical
analysis, sequence checks and re-computations. Using this software, the auditor can directly
access the data stored in a computer and perform various types of mathematical computations
and statistical analysis.
b) Utility programs. These are programs, which are generally not designed for audit purposes
but can be used by the auditor to perform common data processing functions such as sorting,
creating and printing files.
13 | P a g e
DAN OWINO
c) Purpose written programs. These are programs specifically written either by the auditor or by
a programmer to suit the auditor’s specific circumstances.
d) Commercial software, such as Microsoft Excel, WordPerfect, etc., may be used by the
auditor for analyzing data imported from client files, writing audit programs, etc.
e) Embedded audit module is a CAAT in which code prepared by the auditor is embedded in
the client’s software. The code may be designed, for example, to replicate a specific aspect of
a control procedure, or to record details of certain transactions in a file accessible only to the
auditor. Thus, it may be used as both a test of control or as a substantive procedure.
f) Integrated test facility is a facility forming part of the client’s software that enables the
auditor’s test data to be integrated and processed with the client’s live input data. The facility
ensures that the test data updates special dummy files, rather than actual operating files. The
dummy files are examined to ensure that the test data has been processed in the manner
expected. This procedure provides evidence of the effectiveness of design of programmed
control procedures as well as aspects of the effectiveness of operation.
g) Parallel simulation, in which actual client data is processed using a copy of the client’s
software that has undergone program code analysis by the auditor and is under the control of
the auditor. The data processed on the auditor’s copy of the software is compared to the data
previously processed by the client to ensure that the processing is identical. This procedure
provides evidence as to the effectiveness of design of programmed control procedures as well
as aspects of the effectiveness of operation.
h) Program code analysis is the analysis of the client’s program code to ensure that the
instructions given to the computer are the same instructions that the auditor has previously
identified when reviewing the systems documentation. The analysis may be performed using
specialized audit software owned by the auditor. The procedure provides evidence as to the
effectiveness of the design of programmed control procedures.
DAN OWINO
Printing reports or letters in a format specified by the auditor.
Detecting of violation of systems limits e.g. a sales ledger can be checked to ensure no
customer has a balance above the authorized credit limit;
Testing reasonableness checks e.g. ensuring the value of purchases is not greater than the
value of stocks received.
Test data
Test data is CAAT in which test data prepared by the auditor is processed on the current
production version of the client’s software, but separately from the client’s normal input data.
The test data that is processed updates the auditor’s copies of the client’s data files. The updated
files are examined to ensure that the transactions were processed in the manner expected. This
procedure is typically used to gather evidence as to the effectiveness of design of programmed
control procedures, as well as aspects of the effectiveness of operation.
15 | P a g e
DAN OWINO
d) Use of CAATs and especially audit software enables the auditor to test the accounting
system directly rather than relying on printouts which could be doctored by the client.
Disadvantages of CAATS
a) High cost of installation.
b) Requires detailed knowledge in computers.
c) Requires a lot of computer time
d) May be incompatible with client’s software.
e) Requires a lot of staff training
f) High rate of obsolescence means constant replacing.
16 | P a g e
DAN OWINO
Controlling the use of CAATs
The auditor should control the use of CAATs to provide reasonable assurance that the audit
objectives have been met. In controlling the use the auditor should:
Carry out a technical review of the work involving the use of the CAAT;
Review the entity’s general controls which may have an effect on the integrity of the CAAT.
E.g. when controls over changes and access to computer files cannot be relied upon then the
client’s computer programs cannot be used to carry out testing by the auditor;
The auditor should test the software on small test files before running on the main data to
ensure that the CAAT is performing the required tests effectively.
CAATs documentation
The step-by-step CAATs process should be sufficiently documented to provide adequate audit
evidence. The audit work papers should contain sufficient documentation to describe the CAATs
application, including the following details:
The objective of using the CAAT.
Specific CAAT to be used.
Controls to be exercised.
Details of tests performed.
Details of input, processing and output.
Results obtained.
Description of the audit analysis work performed on the output.
Audit recommendations.
17 | P a g e
DAN OWINO