Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

CHAPTER 7 - Prepare and verifies input data for

processing
COMPUTER INFORMATION SYSTEM (CIS)
LIBRARIAN
- Become feasible, perhaps essential, for use
even in small scale business operations. - Maintains custody of systems
- This widespread use of computers has documentation programs and files.
offered new opportunities for professional
accountant. CONTROL GROUP

GENERAL CONTROL - Reviews all input procedures, monitors


computer processing, follows-up data
- Are those control policies and procedures processing errors, reviews the
that relate to overall computer information reasonableness of output, and distributes
system. output to authorized personnel.
1. ORGANIZATIONAL CONTROLS 2. SYSTEMS DEVELOPMENT AND
DOCUMENTATION CONTROLS
- There should be a written plan of the
organization, with clear assignment of - software development as well as changes
authority and responsibility. thereof must be approved by the appropriate
- a. Segregation between the CIS department level of management and the user
and user department department.
CIS department must be independent
of all department within the entity 3. ACCESS CONTROLS
- b. Segregation of duties within the CIS - every computer system should have
department adequate security controls to protect
CIS department should be properly equipment, files and programs.
segregated for good organizational - Access to the computer should be limited
controls. only to operators and other authorized
CIS DIRECTOR employees.

- Exercise control over the CIS operation. 4. DATA RECOVERY CONTROLS

SYSTEMS ANALYST - One of characteristics of the CIS is the


vulnerability of files and programs,
- Design new systems, evaluates and - Provides for the maintenance of back-up
improves existing system, and prepares files and off-site storage procedures.
specification for programmers. Computer files should be copied daily to
tape or disks and secured off-site.
PROGRAMMER - Grand-father, father, son practice requires
- Guided by the specification of the systems an entity to keep the two most recent
analyst, the programmer writes a program, generation of master files and transaction
test and debugs such program, and prepares files in order to permit reconstruction of
the computer operating instructions. master files if needed.

COMPUTER OPERATOR 5. MONITORING CONTROLS

- Using the program and detailed operating - Are designed to ensure that CIS control are
instruction prepared by the programmer, working effectively as planned.
computer operator operates the computer to - These include periodic evaluation of the
process transactions. adequacy and effectiveness of the overall
CIS operation conducted by person within or
DATA ENTRY OPERATOR outside the entity.
APPLICATION CONTOLS
- Are those policies and procedures that relate - These are totals computed based on the
to specific use of the system. data submitted for processing.
- These are designed to provide reasonable - Ensure the completeness of data before
assurance that all transaction are authorized, and after the are processed.
and that they are processed. - These Includes Financial totals, hash
- Processing of transaction involves three total and record count.
stages: the input, processing, and output
stage. PROCESSING CONTROLS

THE INPUT STAGE - Are designed to provide reasonable


assurance that input data are processed
- Involves capturing of a mass of data accurately, and that data are not lost, added,
excluded, duplicated or improperly changed.
THE PROCESSING STAGE
OUTPUT CONTROLS
- Involves converting the mass of raw data
into useful information. - Are designed to provide reasonable
assurance that the results of processing are
OUTPUT STAGE complete, accurate and that these outputs are
- Involves preparation of information in a distributed only to authorized personnel.
form useful to those who wish to use it. AUDITING AROUND THE COMPUTER
INPUT CONTROLS - Auditing around the computer is similar to
- are designed to provide reasonable testing control in a manual control structure
assurance that data submitted for processing in that it involves examination of documents
are complete, properly authorized and and reports to determine that reliability of
accurately translated into machine readable the system.
form. - Using this, auditor ignores the client’s data
 KEY VERIFICATION processing procedures, focusing solely on
Requires data to be entered twice the input documents and the CIS output
(usually by different operators) to - Is based on the assumption that if the input
provide assurance that there are no key reconciles with output, then the computer
entry errors committed. program must have processed the
 FIELD CHECK transaction accurately.
This ensure that the input data agree - Auditing around the computer can be used
with the required field format. only if there are visible input documents and
 VALIDITY CHECK detailed output that will enable the auditors
Information entered are compared with to trace individual transaction back and
valid information in the master files to forth.
determine the authenticity of the input. - Also known as “black box approach”
 SELF-CHECKING DIGIT COMPUTERR ASSISTED AUDIT
Is a mathematically calculated digit TECHNIQUES (CAATs)
which is usually added to a document
number to detect common - When computerized accounting system
transpositional errors in data submitted perform tasks for which no visible evidence
for processing. is available, it may be impracticable for the
 LIMIT CHECK auditor to test manually.
Or reasonable check is designed to - Also called “white box approach”
ensure that data submitted for processing
do not exceed a pre-determined limit or 1. TEST DATA
a reasonable amount.  Is primarily designed to test the
 CONTROL TOTALS effectiveness of the internal control
procedures which are incorporated in the SUBSTANTIVE TEST
client’s computer program.
 To accomplish this objective the auditor - Are audit procedures designed to
prepares test data (fictitious transaction) substantiate the account balance or to
that consist of valid and invalid detect material misstatement in the
conditions. financial statements.

2. INTEGRATED TEST FACILITY (ITF)


 Using ITF, the auditor creates dummy or ANALYTICAL PROCEDURES
fictitious employee or other appropriate - Applied as substantive test enable the
unit for testing within the entity’s auditor to obtain corroborative evidence
computer system. about a particular account.
 ITF integrates the processing of test - involves comparison of financial
data with the actual processing of information with auditor’s expectations to
ordinary transactions without determine the reasonableness of an account
management being aware of the testing balance reported in a financial statement.
process.
TEST OF DETAILS
3. PARALLEL SIMULATION
- involves examining the actual details
making up the various account balances.
 Requires the auditor write a program that TEST OF DETAILS OF BALANCE
simulates key features or processes of
the program under review. - Involves direct testing of the ending balance
 Can be accomplish by using generalized of an account.
audit software or purpose written TEST OF BALANCES
programs.
- Will used account balance are affected by
GENERALIZED AUDIT SOFTWARE large volume of relatively immaterial
- Consists of generally available computer transactions.
package which have been designed to TEST OF DETAILS OF TRANSACTION
perform common audit tasks.
- Involves testing the transactions which give
PURPOSE-WRITTEN PROGRAMS rise to the ending balance of an account.
- Are designed to perform audit tasks in TEST OF TRANSACTION
specific circumstances.
- Is useful if account balances are comprised
OTHER CAATs of a smaller volume of transactions
SNAPSHOT representing relatively material amounts.

- This technique involves taking a picture of a EFFECTIVENESS OF SUBSTANTIVE TEST


transaction as it flows through the computer - The potential effectiveness of the auditor’s
systems. substantive test is affected by its nature,
SYSTEM CONTROL AUDIT REVIEW FILES timing, and extent.
(SCARF) NATURE OF SUBSTANTIVE TEST
- This involves embedding audit software - Relates to the quality of evidence. The
modules within an application system to auditor should determine the appropriate
provide continuous monitoring of the system quality of evidence needed to support the
transaction desired level of detection risk.
CHAPTER 8 TIMING OF SUBSTANTIVE TEST
- Substantive test may be performed at interim
date or at year end.
APPROPRIATENESS
EXTENT OF SUBSTANTIVE TEST
- Is the measure of the quality of audit
- Relates to the amount of evidence needed to evidence and its relevance to a particular
satisfy a particular objective. assertion and its reliability
- Is base on the auditor’s judgment after
considering the materiality, the assessed RELEVANCE
risk, and the degree of assurance the auditor - Relates the timeliness of evidence and its
plans to obtain. ability to satisfy the audit objective.
TEST CONTROL RELIABILITY
- Provide evidence that indicates a - Relates to the objectivity of evidence and is
misstatement is likely to occur. influenced by its source and by its nature.
SUBSTANTIVE TEST WORKING PAPERS
- On the other hand, provide evidence about - Are records kept by the auditor that
the existence of misstatement in an account documents the audit procedures applied,
balance. information obtained and conclusions
AUDIT EVIDENCE reached.

- Consists of underlying accounting data and PERMANENT FILE


corroborating information. - Contains information of continuing
- Auditor should obtain SAE to draw significance to the auditor in performing
reasonable conclusion recurring audits.
- Is typically obtained as a result of
performing test of control and substantive CURRENT FILE
test - Contains evidence gathered and conclusions
EVIDENCE reached relevant to the audit of a particular
year.
- Refers to the information obtained by the
auditor in arriving at the conclusion on RELATED PARTIES
which the audit opinion is based. - Refers to person or entities that may have
UNDERLYING ACCOUNTING DATA dealings with one another in which one
party has the ability to exercise significant
- Refers to the accounting records underlying influence or control over the other party in
the financial statement. making financial and operating decision.
CORROBORATING INFORMATION EXPERT
- Supporting the underlying accounting data - Is a person or firm possessing special skill,
obtained from client and other sources. knowledge and experience in a particular
QUALITIES OF EVIDENCE field other than accounting and auditing.

- The auditor should consider the sufficiency AUDITOR’S EXPERT


and appropriateness of audit evidence - An expert, whose work in his/her field of
obtained. specialization, is used by the auditor to
SUFFICIENCY assist the auditor in obtaining sufficient
appropriate audit evidence.
- Refers to the amount of evidence that the
auditor should accumulate. MANAGEMENT’S EXPERT
- An expert, whose work in his/her field of ALPHA RISK
expertise, is used by the entity to assist the
entity in preparing the financial - Risk results in an auditor performing audit
statements. procedures more than what is necessary,
thus affecting audit efficiency.
- Risk of underreliance
- Risk of incorrect rejection

INTERNAL AUDITING
BETA RISK
- Is an appraisal activity established within an
entity as a service to the entity, the external - Risk result in an auditor performing audit
auditor should obtain a sufficient procedures less than what is necessary
understanding of the internal audit activities thereby affecting the auditor’s ability to
to assist in planning the audit and detect material misstatement in FS
developing an effective audit approach.
NON-SAMPLING RISK
COMPETENCE
- Refers to the risk that the auditor may draw
- Consider the professional qualifications and incorrect conclusion about the account
experience of the internal auditors. balance or class of transaction because of
human error
OBJECTIVITY - All aspects of audit risk that are not due to
- Consider the organizational level to which sampling
the internal auditors report the results to ATTRIBUTE SAMPLING
their work.
- A sampling plan used to estimate the
DUE PROFESSIONAL CARE frequency of occurrence of a certain
- Consider proper planning, supervision and characteristic in a population
documentation of internal auditor’s work - Generally used when performing test of
controls to estimate the rate of deviation
SCOPE OF FUNCATION
VARIABLE SAMPLING
- Consider the nature and extent of the
internal auditor’s assignment. - A sampling plan used to estimate a
numerical measurement of a population such
CHAPTER 9 as peso value.
AUDIT SAMPING - Generally used in performing substantive
test to estimate the amount of
- PSA; as the application of audit procedures misstatement
to less than 100% of the items within an
account balance or class of transaction such SAMPLING FOR TEST OF CONTROLS
that all sampling units have a chance of ACCEPTABLE SAMPLING RISK
selection
- Is performed on the assumption that the - Inverse relationship sample size
sample selected for testing is - The smaller sampling risk, larger the
representative of the population. sample size

SAMPLING RISK TOLERABLE DEVIATION RATE

- Refers to the possibility that the auditor’s - Is the maximum rate of deviations the
conclusion, based on a sample may be auditor willing to accept
different from the conclusion reached if the - Inversely related to sample size
entire population were subjected to the same - Decrease in tolerable deviation rate,
audit procedures. increase sample size
EXPECTED DIVIATION RATE (EDR) test, the auditor should consider the
components of audit risk – inherent,
- Is the rate of deviation the auditor expects to control and detection risk.
find the population before testing begins.
- Has a direct effect on sample size TOLERABLE MISSTATEMENT
- The larger expected population deviation
rate, larger sample size. - Is the maximum amount of
- EDR Should not exceed the tolerable misstatement that the auditor will
deviation rate. permit in the population and still be
willing to conclude that the account
SAMPLE SELECTION METHOD FOR TEST balance is fairly stated.
OF CONTROLS
EXPECTED MISSTATEMENT
RANDOM NUMBER SELECTION
- Is the amount of misstatement that
- The auditor selects the sample by the auditor believes exists in the
matching random numbers, population like the expected
generated by a random number table deviation rate in test of control.
or a computer software generator.
VARIATION IN THE POPULATION
SYSTEMATIC SELECTION
- When using statistical sampling, this
- This method involves determining a variability is measured by the
constant sampling interval and then standard deviation
selects the sample based on the size
of the interval SAMPLE SELECTION METHOD FOR
SUBSTANTIVE TEST
HAPHAZARD SELECTION
STRATIFIED SAMPLING
- the sample is selected without
following an organized or structured - The sample size should be
technique. determined for each stratum and
- Is useful for non-statistical sampling selected from that stratum.

OTHER SAMPLING APPLICATION FOR VALUE WEIGHTED SELECTION


TEST OF CONTROLS - Value weighted selection also given
SEQUENTIAL SAMPLING each item in the population an
opportunity to be selected
- Under this method, the auditor does - Sometimes called probability
not use fixed sampling size it is proportional to size sampling
sometimes called stop-or-go
sampling
DISCOVERY SAMPLING
- This form of attribute sampling is
most appropriate when no deviations
are expected in the population and
therefore even one deviation would
cause concern.
SAMPLING FOR SUBSTANTIVE TEST
ACCEPTABLE SAMPLING RISK
- When determining the acceptable
level of sampling risk for substantive

You might also like