Page 143 - DCOM204_AUDITING_THEORY
P. 143

Unit 8: Auditing in an EDP Environment



            Modified internal control base: In CIS environment since most of the processes are automated,  Notes
            the probability of occurrence of error substantially increases. Moreover, the risk of fraud is
            higher in CIS environment, as it is less-easily identifiable. Thus, there is a shift in internal
            control base in CIS environment as compared to traditional manual system. Following are two
            main categories of internal control required in CIS environment:

                                        Table 8.3 : EDP Structure
                       A. General EDP Controls:          B. EDP Application Controls:
                 Overall controls over EDP environment.   Specific controls over specific applications
               1.  Organizational & Management Controls:   1.  Control Over Inputs: These controls are
                  These controls are designed to establish an   drawn to assure that:
                  organization wide frame-work for CIS      a.  Transactions are properly authorized
                  activities. It includes:               before being processed by the
                  a.  Designing appropriate control policies   computer.
                     & procedure;                      b.  There are adequate checks installed in
                  b.  Properly segregating duties among   the input form to assure the
                     various individuals.                correctness of data entered by the
               2.  System Software Controls: These controls   users.
                  are meant to provide assurance that system      c.  Incorrect transactions are rejected,
                  software is acquired or developed in an   corrected and if necessary,
                  authorized manner. It includes:        resubmitted on a timely basis.
                  a.  Authorization, approval, testing,   2.  Control Over Processing & data files:
                     implementation and documentation of   These controls ensure that:
                     new system software and system      a.  Transactions are properly processed
                     software modification;              by the computer.
                  b.  Restriction of access to system software      b.  Transactions are not lost, added
                     and documentation to authorized     duplicated or improperly changed.
                     personnel.                       c.  Processing errors are identified and
               3.  Application System Development &      corrected on a timely basis.
                  Maintenance Controls: These control are   3.  Control Over Output: They assure that:
                  designed to provide assurance that systems      a.  Results of processing are complete,
                  are developed and maintained in an     accurate and through ride media.
                  authorized and efficient manner and also to
                                                      b.  Outputs so generated, satisfy the
                  establish control over:
                                                         requirement of the user.
                  a.  testing, conversion, implementation     c.  Access to output is restricted to
                     and documentation of new revised    authorized personnel
                     system;
                  b.  changes made to application system;
                  c.  access to system documentation;
                  d.  Acquisition of application system from
                     third parties.
               4.  Computer Operation Controls: These help
                  in controlling the operations of the
                  computer system. They assure that:
                  a.  The systems are used for authorized
                     purposes only.
                  b.  Access to computer operation is
                     restricted to authorized personnel.
                  c.  Only authorized programs are to be
                     used.
                  d.  Processing errors are detected and
                     corrected on timely basis.
               5.  Data Entry & Program Controls: These
                  assures that:
                  a.  Access to data and program is restricted
                     to authorized personnel.
                  b.  An authorization structure is
                     established over transaction being
                     entered into the system




                                             LOVELY PROFESSIONAL UNIVERSITY                                  137
   138   139   140   141   142   143   144   145   146   147   148