Page 139 - DCOM204_AUDITING_THEORY
P. 139

Unit 8: Auditing in an EDP Environment



            Objectives                                                                            Notes


            After studying this unit, you will be able to:
                 State audit process in an EDP environment;
                 Evaluate problems in an EDP environment;
                 Know about control in an EDP environment;
                 Discuss planning an Internal Audit in an Electronic Data Processing Environment;
                 Know about problems encountered in an Electronic Data Processing Environment;
                 Discuss about internal audit practices in relation to computerized system;
                 Know about different Computer Assisted Audit Techniques (CAATs).

            Introduction

            Now-a-days, the corporate world is getting more and more inclined towards the use of
            Information Technology (IT) and Computer Information System (CIS) in their daily operations.
            This has changed the manner in which the organizations’ carry out their operations and various
            business processes. This has further led to change in the nature of audit evidences generated by
            each financial transaction. The method of collection and evaluation of audit evidences has also
            changed. This requires auditors to possess reasonable knowledge about EDI, SDLC, CASE tools
            and various hardware & software used in the organization.

            8.1 Scope of Audit in CIS Environment/Impact of CIS on Auditing


            The use of CIS in various organizations has caused drastic impact on audit approaches, techniques,
            risk involved and internal control methods. Following factors (risks) must be given due
            consideration while framing an audit plan for an organization:
            1.   High speed and automatic initiation/execution of transactions: In CIS environment,
                 transactions are processed instantly. Once the transaction is fed into the system, it might
                 get executed automatically without requiring for authorization of the same. Similarly,
                 reports (even complex one’s also) can be generated at a very high speed and can be viewed
                 by multiple users at a time. Thus giving rise to many security issues.

            2.   Uniform processing of transaction, hence low clerical error: While feeding input, processing
                 transactions and generating outputs, computer system performs multiple checks on data
                 at each at each point of time. Moreover, the processing of transaction is in a uniform
                 manner. Hence the clerical errors generated are minimized. However, there is a shift of
                 errors from human generated errors towards system generated errors.
            3.   Unintentional or system generated errors: As discussed earlier, there is a shift in nature of
                 errors from human generated to system generated. Errors occur due to lack of experienced
                 personnel. And errors are mainly related to development, maintenance and execution of
                 CIS.

            4.   Inexperienced personnel: Now-a-days, the technological advancement is occurring at a
                 very fast pace. It has created a deficit of expertise staff to understand the current technology,
                 both at client end as well as auditor end.
            5.   Concentration of duties: Under CIS environment, more than one kind of task/function
                 can be performed by an individual. This leads to difficulty in segregation of duties among
                 individual. Consequently, it gives rise to a number of security issues also.



                                             LOVELY PROFESSIONAL UNIVERSITY                                  133
   134   135   136   137   138   139   140   141   142   143   144