Week 5 - System Work Flashcards
Walkthrough tests
Cradle to grave
Walkthroughs arw audits of accounting systems that gauge reliability
Cradle to grave - start to finish
Controls are designed to
Prevent
Detect or
Correct
Prevention
Locks, access controls, training
Detection
Incorrect debtor number
Correction
Back ups
Internal controls
Financial reporting
Effectiveness and efficiency of operations
Compliance with laws and regs
5 components of Internal controls (IC)
Control environment Risk assessment process Information system Control activities Monitoring
Control environment
Enforcement to integrity and ethical values Commitment to competence = right skils Active governors/NEDs Management approach to risks/style HR policies and practices
Risk assessment process
All about reducing risks to acceptable level Health of employees Privacy of personal info Losses from computer abuse - hacking Management of change
Info system
Relevant and timely info
Financial and non-financial
Communication
Control activities
Authorisation
General and application controls
Segregation of duties
Monitoring
Assess current perfromance of controls
Relevance over time
Who is responsible?
Accounting control systems
Major classes of transactions
How transactions are initiated
Significant accounting records
The accounting and financial reporting process
2 broad control classifications
General controls over the environment in which the company operates
Application controls - ensure an individual application runs smoothly and accurately
General controls
Systems development/maintenance controls
Organisational controls
Security
Quality assurance
Systems development
If systems develop/maintenance controls are strong, it is easier to control individual applications
The info should be maintained, allowing transactions to be traced forward&backward through the system
Organisational control
Organisation charts
Segregation of duties
Authorisation and approval
Supervision controls
Segregation of duties
Authorisation of transactions
Execution of transactions
Custody of assets
Recording of transactions and assets
Security - physical
Fire damage/water damage
Power failure
Pollution
Intrusion by unathorised personnel
Security - info/data
Restriction of access to data
Information/audit trails
File and program libraries
Holding data and program in secure places outside of the computer complex
Use if three generations of backups or file dumping systems
Quality assurance
Independent of other functions
Existence provides some reassurance
E.g. internal audit department
More and more towards software
Application controls
Data collected is genuine, accurate and complete
Data accepted is processed so it remains ^
Data stored temp/permanently is ^
Ouput data/info is ^
Data controls incl:
Data capture/input contros Processing controls Output controls Database controls E-commerce controls
Data capture controls - boundary
Cryptographic control Plastic cards Personal identificatiin numbers - pins Digital signatures - encrypted Firewalls