Certify Reports Are Complete

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Overview of Sarbanes-Oxley Act – sec 302 & 404  SOX places responsibility on auditors to detect fraudulent

 SOX of 2002 established corporate governance regulation activity and emphasizes the importance of controls
and standards for public companies with the SEC designed to prevent or detect fraud that could lead to
 Sec 302: material misstatement of the financial statements
- requires corporate management, including the CEO, Section 404:
to certify financial and other information contained in  Requires management to provide the external auditors with
the organization’s quarterly and annual reports (certify documented evidence of functioning controls related to
reports are complete) selected material accounts in its report on control
- Requires to certify internal controls over financial effectiveness.
reporting. Section 302:
- Certifying officers are required to design internal  Auditors have responsibility regarding mgt’s quarterly
controls or cause such internal controls to be certifications of internal controls.
designed and provide reasonably assurance as to the  Auditors must perform the following procedures quarterly to
reliability of financial reporting process. identify any material modifications in controls over financial
- Must disclose any material changes in company’s reporting:
internal control. - Interview mgt regarding any significant changes in the
 Section 404 design or operation of internal control that occurred
- Requires the management of public companies to subsequent to the preceding annual audit or prior
assess the effectiveness of their organization’s review of interim financial information.
internal controls over financial reporting - Evaluate the implications of misstatements identified
- Management is required to provide an annual report by the auditor as part of the interim review that relate
addressing the ff: to effective internal controls.
 Flow transactions (including IT aspects) - to identify - Determine whether changes in internal controls are
points at which misstatement could arise likely to materially affect internal control over financial
 Assess both Design and operating effectiveness of reporting.
selected internal control (using risk-based Computer Fraud
approach)  Data Collection – first operational stage in the information
 Assess potential for fraud in the system & evaluate system. Control objective is ensure that event data entering
controls designed to prevent or detect fraud the system are valid, complete, and free from material
 Evaluate and conclude adequacy of controls over misstatement
FS reporting process  Fraudulent act involves:
 Evaluate entity-wide controls that corresponds to - Entering falsified data into the system
SAS 78/COSO framework - Deleting, altering, or creating a transaction
Relationship between IT controls and financial reporting - Disburse cash in payment of a false account payable
 Application controls – ensure the integrity of specific  Network systems expose organizations to transaction
systems frauds from remote locations:
- Are to ensure validity, completeness, and accuracy of - Masquerading - a perpetrator gaining access to the
financial transactions system from a remote site by pretending to be an
- Designed to be Application specific authorized user
 General controls (AKA general computer controls/ - Piggybacking- technique in which the perpetrator at a
information technology controls) – controls that pertain to remote site taps in to the telecommunications lines
entity-wide concerns such as controls over the data center, and latches on to an authorized user who is logging in
organization databases, systems development, and to the system
program maintenance. - Hacking - may involve piggybacking or masquerading
 General computer controls – are specific activities techniques
performed by persons or systems designed to ensure that  Data Processing - Tasks include mathematical algorithms
business objectives are met. used for production scheduling applications, statistical
 Information technology controls – includes controls over IT techniques for sales forecasting, and posting and
governance, IT infrastructure, security, and access to summarizing procedures used for accounting applications.
operating systems and databases, application acquisition  Program Fraud includes techniques such as
and development, and program changes. - Creating illegal programs that can access data
Audit Implications of Sections 302 and 404 files to alter, delete, or insert values into
 Prior to SOX, External auditors are not required to test accounting records;
internal controls. - Destroying or corrupting a program’s logic using
 Auditors are permitted to simultaneously render a qualified a computer virus;
opinion on management’s assessment of internal controls - Altering program logic to cause the application to
and an unqualified opinion on FS process data incorrectly
 PCAOB Standard No. 5 specifically requires auditors to  Operation Fraud – misuse or theft of the firm’s
understand transaction flows, including the controls computer resources.
pertaining to how transactions are initiated, authorized,  Database management - The organization’s database is its
recorded, and reported. physical repository for financial and nonfinancial data
 Database management fraud includes: altering,  Access controls – controls that ensure that
corrupting, destroying or stealing an organization’s only authorized personnel have access to
data the firm’s asset.
 A common fraud technique is to access the database  Separating New Systems Development from Maintenance
from a remote site and browse the files for useful  Inadequate Documentation:
information that can be copied and sold to competitors - Poor quality systems documentation (chronic IT
 Information Generation - is the process of compiling, Problem)
arranging, formatting, and presenting information to users. Reasons:
 Steal, misdirect, or misuse computer output - Documenting systems is not as interesting,
 Scavenging – involves searching through the trash of professional prefer to move to an exciting new
the computer center for discarded output. project
 Eavesdropping – involves listening to output - Job security: when system is poorly documented,
transmissions over telecommunication lines. it is difficult to interpret and debug. Thus,
IT Governance Controls programmer who understands (coded it)
 IT governance – a broad concept relating to the decision maintains bargaining power.
rights and accountability for encouraging desirable
behavior in the use of IT  Program Fraud
 Not all elements of IT Governance relate specifically to - Original programmer of a system is also
control issues that SOX addresses and that are outlined in assigned maintenance responsibility, the
the COSO framework potential for fraud is increased.
Organizational structure controls - Involves making unauthorized changes to
 Operational tasks should be separated program modules for the purpose of committing
1. Segregate the task of transaction authorization from an illegal act.
transaction processing  A superior Structure for systems development
2. Segregate record keeping from asset custody - Systems development function is separated into
3. Divide transaction-processing tasks among individuals two independent groups: new systems
so that fraud will require collusion between 2 or more development and systems maintenance
individuals This structure helps resolve the two control problems:
Segregation of duties within the centralized firm 1. Improved documentation standards because maintenance
group will require adequate documentation to perform their
maintenance duties.
2. denying the original programmer future access to the
application code deters program fraud

The Distributed Model (Distributed data processing)


 consolidates some computer functions that are
traditionally separated and distributes some activities
that are consolidated under the centralized model
 carries the following implications:
 Incompatibility: Ex. Distributing responsibility
for the purchases of software and hardware
 Separating systems development from computer can result in uncoordinated and poorly
operations conceived decisions.
 Systems development and maintenance professionals  Redundancy
acquire (by in-house development and purchase) and  Consolidating incompatible activities
maintain systems for users.  Acquiring qualified professionals
 Operations staff should run these systems and have  Lack of standards
no involvement in their design and implementation. Creating a Corporate IT function it unit
 Separating the database administrator from other functions  Corporate IT Function: is a coordinating IT unit that
 DBA: responsible for number of critical tasks attempts to establish corporate-wide standards among
pertaining to database security including: Distributed IT units
- creating the database schema  Central Testing of Commercial software and Hardware
- creating user views (subschemas) - A central, technically astute group such as this
- assigning access authority to users can evaluate systems features, controls, and
- monitoring database usage compatibility with industry and organizational
- planning for future expansion standards most efficiently.
 User views – are sets of data that a particular user  User Services
needs to achieve his/her assigned tasks. - Provides technical help to users during the
 Separating the DBA from system development: installation of new software and in
- To achieve database access, therefore, both the troubleshooting hardware and software
programmer and the DBA need to agree problems.
 Standard-Setting Body
- Central guidance can improve the relatively poor  Construction
control environment common to the distributed  Access - should be limited to the operators and other
model. employees who work there
 Personnel Review  Air conditioning
- corporate group is better equipped than users to  Fire suppression
evaluate the technical credentials of prospective Fault Tolerance Controls
systems professionals  Fault Tolerance – the ability of the system to continue
when part of the system fails because of hardware failure,
application program error or operation error
- Redundant arrays of independent disks (RAID): involves
using parallel disks that contain redundant elements of
data and applications. If one disk fails, the lost data are
automatically reconstructed from the redundant
components stored on the other disks.
- Uninterruptible power supplies: help prevent data loss
and system corruption. In the event of a power supply
failure, short-term backup power is provided to allow the
system to shut down in a controlled manner.
Implementing fault tolerance control ensures that there is
no single point of potential system failure. Total failure
can occur only in the event of the failure of multiple
components.
Audit objectives relating to computer center security
Must verify that:
1. physical security controls are adequate to reasonably
Audit objectives and Procedures for organizational Structure protect the organization from physical exposures;
Audit Objectives: 2. insurance coverage on equipment is adequate to
 Author’s objective is to ascertain whether individuals compensate the organization for the destruction of, or
serving in incompatible areas are segregated in damage to, its computer center;
accordance with an acceptable level of risk and in a 3. Operator documentation is adequate to deal with routine
manner that promotes an effective working environment operations as well as system failures.
Audit Procedures:  Audit procedures for assessing physical security controls
 The following audit tests provide evidence in achieving the - Tests of physical construction
audit objective: - Tests of the fire detection system
- Obtain and review the corporate policy on computer - Tests of access control: auditor must establish that
security. routine access to the computer center is restricted to
- Review relevant documentation, including the current authorized employees
organizational chart, mission statement, and job  Test of fault tolerance control
descriptions for key functions to determine if individuals - Raid: auditor should review with the system
or groups are performing incompatible functions administrator alternative procedures for recovering
- Review systems documentation and maintenance from a disk failure
records for a sample application - Power supplies backup: auditor should verify from
- Through observation, determine that the segregation test records that computer center personnel perform
policy is being followed in practice. periodic tests of the backup power supply to ensure
- Review user roles to verify that programmers have that it has sufficient capacity to run the computer and
access to privileges consistent with their job air-conditioning
descriptions.  Audit procedure for verifying insurance coverage
Computer Center Security and controls  Auditor should annually review the organization’s
 Fires, floods, winds, sabotage, earthquakes. Or even insurance coverage on its computer hardware,
power outages can deprive an organization of its data software, and physical facility.
processing facilities and bring halt to those functions that  Check if new acquisitions are listed and obsolete
are performed or aided by computer equipment are deleted.
- What does a company do to prepare itself for  Audit procedures for verifying adequacy of operator
such an event documentation
- How will it recover?  Run manual
Computer center controls - Used to run certain aspects of the system
- Weaknesses in computer center security have a potential - must be sufficiently detailed to guide operators in
impact on the function of application controls related to the their tasks
financial reporting process. - auditor should review the run manual for
The following are some of the control features that contribute directly completeness and accuracy
to computer center security: - contents of a run manual include:
 Physical location  The name of the system,
 The run schedule (daily, weekly, time of day)
 Required hardware devices (tapes, disks,
printers, or special hardware)
 File requirements specifying all the transaction
(input) files, master files, and output files used
in the system
 Run-time instructions describing the error
messages that may appear, actions to be
taken, and the name and telephone number of
the programmer on call, should the system fail
 A list of users who receive the output from the
run

You might also like