Professional Documents
Culture Documents
AIS Reviewer 5
AIS Reviewer 5
AIS Reviewer 5
errors:
i. Transcription Errors.
Occurs when (1) extra
digits are added to the
code, (2) a digit is
omitted from a code, or
(3) a digit is recorded
incorrectly
3. Supervision. A compensating control in ii. Transposition Errors.
small organizations for sufficient Occur when digits are
segregation o duties; a control activity reversed.
involving the critical oversight of b. Missing Data Check. Identifies
employees blank or incomplete input fields.
4. Accounting Records. Consist of source c. Numeric-Alphabetic.
documents, journals, and ledgers which Check/identify data in the
capture economic essence and provide wrong form. (E.g. Password
an audit trail making)
5. Access Control. Ensure that only d. Range Checks. Verify that all
authorized personnel have access to the amounts fall within an
firm’s assets. acceptable range. (E.g.
6. Independent Verification Procedures. Authorized limit/range)
Independent checks of the accounting e. Reasonableness Check Verify
system to identify eros and that amounts that have based
misinterpretations. limit and range checks are
a. Management can assess reasonable.
indiidual performance f. Validity Checks. Compare
b. System Integirity actual fields against acceptable
c. Data correctness which values.
includes: 2. Processing. Programmed procedures to
i. Reconciling batch totals ensure an application’s logic is
during transaction functioning properly.
processing. a. Batch Controls. Manage the
ii. Comparing physical flow of high volume
assets with accounting transactions and reconcile
records. system output with original
iii. Reconciling subsidiary input.
accounts with control
accounts.
iv. Reviewing management
reports that summarize
business activities. Control total = Running balance/Amount nung
pinrocess
IT Application Controls b. Run-to-Run Controls. Controls
1. Input. Programmed procedures, often that use batch figures to
called edits, that perform tests on monitor the batch as it moves
transaction data to ensure that they from one programmed
are free from errors. procedure to another. (E.g.
a. Check Digit. Method for Processing usually takes 3
detecting data coding errors in minutes, but now it suddenly
which a control digit is added became 3.5 minutes, dapat
to the code when it is originally ma-monitor ito ng IT and
designed to allow the integrity investigate why so)
of the code to be established c. Hash Total. Summation of
during subsequent processing nonfinancial data field to keep
track of the records in a batch.
DocumenTorr 💙
(E..g. Pag-add niya ng data, File. Each record in a direct
transaction code, etc.) access file is assigned a unique
d. Audit Trail Controls. Ensures disk location or address that is
every transaction can be traced determined by its primary key
through each stage to value.
processing from its economic
sources to its presentation in
the financial statements. (E.g.
Validation of Balance Sheet
amounts in the checking
accounts/GL)
i. Transaction Log
h. Destructive Update Approach.
Leaves no backup copy and
requires a special recovery
program if data is destroyed or
corrupted.
DocumenTorr 💙