39
Accounting Information Systems, 6 th edition James A. Hall COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western are trademarks used herein under license

James hall ch 15

Embed Size (px)

Citation preview

Page 1: James hall ch 15

Accounting Information Systems, 6th editionJames A. Hall

COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western are trademarks used herein under license

Page 2: James hall ch 15

Objectives for Chapter 15Key features of Sections 302 and 404 of the Sarbanes-

Oxley Act Management and auditor responsibilities under

Sections 302 and 404Risks of incompatible functions and how to structure

the IT functionControls and security of an organization’s computer

facilities Key elements of a disaster recovery plan

Page 3: James hall ch 15

Sarbanes-Oxley ActThe 2002 Sarbanes-Oxley (SOX) Act established

new corporate governance rulesCreated company accounting oversight boardIncreased accountability for company officers and

board of directorsIncreased white collar crime penaltiesProhibits a company’s external audit firms from

providing financial information systems

Page 4: James hall ch 15

SOX Section 302 Section 302—in quarterly and annual financial

statements, management must:certify the internal controls (IC) over financial

reportingstate responsibility for IC design provide reasonable assurance as to the reliability of

the financial reporting processdisclose any recent material changes in IC

Page 5: James hall ch 15

SOX Section 404Section 404—in the annual report on IC

effectiveness, management must:state responsibility for establishing and maintaining

adequate financial reporting ICassess IC effectivenessreference the external auditors’ attestation report on

management’s IC assessmentprovide explicit conclusions on the effectiveness of

financial reporting IC identify the framework management used to conduct

their IC assessment, e.g., COBIT

Page 6: James hall ch 15

IT Controls & Financial Reporting

Modern financial reporting is driven by information technology (IT)

IT initiates, authorizes, records, and reports the effects of financial transactions. Financial reporting IC are

inextricably integrated to IT.

Page 7: James hall ch 15

COSO identifies two groups of IT controls:application controls – apply to specific

applications and programs, and ensure data validity, completeness and accuracy

general controls – apply to all systems and address IT governance and infrastructure, security of operating systems and databases, and application and program acquisition and development

IT Controls & Financial Reporting

Page 8: James hall ch 15

Sales CGS AP CashInventorySignificant Financial Accounts

Order Entry Application Controls

Cash DisbursementsApplication Controls

Purchases Application Controls

Related Application Controls

Systems Development and Program Change Control

Database Access Controls

Operating System Controls

Supporting General Controls

Controls for Review

IT Controls & Financial Reporting

Page 9: James hall ch 15

SOX Audit ImplicationsPre-SOX, audits did not require IC tests.

Only required to be familiar with client’s ICAudit consisted primarily of substantive tests

SOX – radically expanded scope of auditIssue new audit opinion on management’s IC

assessmentRequired to test IC affecting financial information,

especially IC to prevent fraudCollect documentation of management’s IC tests

and interview management on IC changes

Page 10: James hall ch 15

Types of Audit TestsTests of controls – tests to determine

if appropriate IC are in place and functioning effectively

Substantive testing – detailed examination of account balances and transactions

Page 11: James hall ch 15

Organizational Structure ICAudit objective – verify that individuals in

incompatible areas are segregated to minimize risk while promoting operational efficiency

IC, especially segregation of duties, affected by which of two organizational structures applies:Centralized modelDistributed model

Page 12: James hall ch 15

President

VPMarketing

VP ComputerServices

VPOperations

VPFinance

SystemsDevelopment

DatabaseAdministration

DataProcessing

New SystemsDevelopment

SystemsMaintenance

DataControl

DataPreparation

ComputerOperations

DataLibrary

President

VPMarketing

VPFinance

VPOperations

IPU IPU IPU IPU IPU IPU

VPAdministration

Treasurer ControllerManagerPlant X

ManagerPlant Y

CENTRALIZED COMPUTER SERVICES FUNCTION

DISTRIBUTED ORGANIZATIONALSTRUCTURE

Page 13: James hall ch 15

Segregation of DutiesTransaction authorization is separate from

transaction processing.Asset custody is separate from record-

keeping responsibilities.The tasks needed to process the

transactions are subdivided so that fraud requires collusion.

Page 14: James hall ch 15

Segregation of Duties

Authorization

Authorization

Authorization

Processing

Custody Recording

Task 1 Task 2 Task 3 Task 4

Custody Recording

Control Objective 1

Control Objective 3

Control Objective 2

TRANSACTION

Page 15: James hall ch 15

Centralized IT StructureCritical to segregate:

systems development from computer operations

database administrator (DBA) from other computer service functionsDBA’s authorizing and systems development’s

processingDBA authorizes access

maintenance from new systems developmentdata library from operations

Page 16: James hall ch 15

Distributed IT StructureDespite its many advantages, important

IC implications are present:incompatible software among the various

work centers data redundancy may resultconsolidation of incompatible tasksdifficulty hiring qualified professionalslack of standards

Page 17: James hall ch 15

Organizational Structure ICA corporate IT function alleviates

potential problems associated with distributed IT organizations by providing:central testing of commercial hardware and

softwarea user services staffa standard-setting body reviewing technical credentials of

prospective systems professionals

Page 18: James hall ch 15

Audit ProceduresReview the corporate policy on computer

securityVerify that the security policy is communicated

to employeesReview documentation to determine if

individuals or groups are performing incompatible functions

Review systems documentation and maintenance recordsVerify that maintenance programmers are not

also design programmers

Page 19: James hall ch 15

Audit ProceduresObserve if segregation policies are followed in

practice. E.g., check operations room access logs to

determine if programmers enter for reasons other than system failures

Review user rights and privileges Verify that programmers have access privileges

consistent with their job descriptions

Page 20: James hall ch 15

Audit objectives:physical security IC protects the computer

center from physical exposuresinsurance coverage compensates the

organization for damage to the computer center

operator documentation addresses routine operations as well as system failures

Computer Center IC

Page 21: James hall ch 15

Computer Center ICConsiderations:man-made threats and natural hazardsunderground utility and communications linesair conditioning and air filtration systems access limited to operators and computer center

workers; others required to sign in and outfire suppressions systems installedfault tolerance

redundant disks and other system componentsbackup power supplies

Page 22: James hall ch 15

Audit ProceduresReview insurance coverage on hardware,

software, and physical facilityReview operator documentation, run

manuals, for completeness and accuracyVerify that operational details of a

system’s internal logic are not in the operator’s documentation

Page 23: James hall ch 15

Disaster Recovery PlanningDisaster recovery plans (DRP) identify:

actions before, during, and after the disasterdisaster recovery teampriorities for restoring critical applications

Audit objective – verify that DRP is adequate and feasible for dealing with disasters

Page 24: James hall ch 15

Disaster Recovery PlanningMajor IC concerns:

second-site backupscritical applications and databases

including supplies and documentation back-up and off-site storage proceduresdisaster recovery teamtesting the DRP regularly

Page 25: James hall ch 15

Second-Site BackupsEmpty shell - involves two or more user

organizations that buy or lease a building and remodel it into a computer site, but without computer equipment

Recovery operations center - a completely equipped site; very costly and typically shared among many companies

Internally provided backup - companies with multiple data processing centers may create internal excess capacity

Page 26: James hall ch 15

DRP Audit ProceduresEvaluate adequacy of second-site backup

arrangementsReview list of critical applications for

completeness and currencyVerify that procedures are in place for

storing off-site copies of applications and dataCheck currency back-ups and copies

Page 27: James hall ch 15

DRP Audit ProceduresVerify that documentation, supplies, etc.,

are stored off-siteVerify that the disaster recovery team

knows its responsibilitiesCheck frequency of testing the DRP

Page 28: James hall ch 15

From Appendix

Page 29: James hall ch 15

Attestation versus AssuranceAttestation:

practitioner is engaged to issue a written communication that expresses a conclusion about the reliability of a written assertion that is the responsibility of another party.

Assurance:professional services that are designed to

improve the quality of information, both financial and non-financial, used by decision-makers

includes, but is not limited to attestation

Page 30: James hall ch 15

Attest and Assurance Services

Page 31: James hall ch 15

What is an External Financial Audit?

An independent attestation by a professional (CPA) regarding the faithful representation of the financial statements

Three phases of a financial audit:familiarization with client firmevaluation and testing of internal controlsassessment of reliability of financial data

Page 32: James hall ch 15

Generally Accepted Auditing Standards (GAAS)

Page 33: James hall ch 15

Auditing Management’s Assertions

Page 34: James hall ch 15

External versus Internal AuditingExternal auditors – represent the interests

of third party stakeholdersInternal auditors – serve an independent

appraisal function within the organizationOften perform tasks which can reduce

external audit fees and help to achieve audit efficiency and reduce audit fees

Page 35: James hall ch 15

What is an IT Audit? Since most information systems employ IT, the IT

audit is a critical component of all external and internal audits.

IT audits: focus on the computer-based aspects of an

organization’s information system assess the proper implementation, operation,

and control of computer resources

Page 36: James hall ch 15

Elements of an IT AuditSystematic procedures are usedEvidence is obtained

tests of internal controlssubstantive tests

Determination of materiality for weaknesses found

Prepare audit report & audit opinion

Page 37: James hall ch 15

Phases of an IT Audit

Page 38: James hall ch 15

Audit Risk is... the probability the auditor will issue an

unqualified (clean) opinion when in fact the financial statements are materially misstated.

Page 39: James hall ch 15

Three Components of Audit RiskInherent risk – associated with the unique

characteristics of the business or industry of the clientControl risk – the likelihood that the control

structure is flawed because controls are either absent or inadequate to prevent or detect errors in the accounts

Detection risk – the risk that errors not detected or prevented by the control structure will also not be detected by the auditor