Page 152 - DCOM204_AUDITING_THEORY
P. 152

Auditing Theory




                      Notes                   expose whether the processing done by the enterprise is correct. However, employees
                                              operating the electronic data processing system in the enterprise should know nothing
                                              about this exercise.

                                         (c)  Audit software: The auditor may use audit software specially developed for a particular
                                              audit or, more often, Generalized Audit Software (GAS) Design of audit program
                                              created for a particular audit will serve the needs of testing the audit programs of
                                              the client. On the other hand, generalized audit software will perform certain common
                                              data processing functions, like checking calculations, examining the correctness of
                                              records, comparing client records with the data obtained through other procedures,
                                              summarize or rearrange data, selecting samples, etc.

                                    Documentation

                                    As evidence of proper planning and organization of his examination, the auditor should document
                                    the following:
                                    1.   His audit plan;
                                    2.   Nature, timing and extent of audit procedures performed by him;

                                    3.   Conclusion drawn from the evidence obtained; and
                                    4.   Safe storage of the evidence in electronic form.

                                    8.4.6  Audit Planning

                                    Planning the audit for an electronic data processing environment client is not expected to be the
                                    same as planning the audit for the manual data processing client. The auditor is required to
                                    measure the usefulness and existence of reliable controls in the system before he or she start
                                    auditing. In electronic data processing environment an IT environment check list will have to be
                                    used together with interrogating the client main IT executives.
                                    Important issues to be assessed regarding the whole of information technology field which
                                    comprises data processing systems are listed and elaborated in the schedule below:
                                    1.   Procedure: Find out the process to register new users to the system.
                                         Inherent risk: Illegal access to components.

                                    2    Procedure: Examine the reliability of the procedures taken when a previous user is required
                                         to leave or stop using the machine.
                                         Inherent risk: Previous user still has access to the system.

                                    3.   Procedure: Find out whether access to the computer room is free to any person.
                                         Inherent risk: Unauthorized personnel and visitors may enter the computer room for
                                         malicious motives.

                                    4.   Procedure: Investigate whether there is any rotation of staff (segregation of duties) in
                                         system operations.
                                         Inherent risk: There may be fraud attempts by non changed staff.

                                    5.   Procedure: Using the organizational chart verify the existence of job description in IT
                                         positions in the entity.
                                         Inherent risk: Staff may be performing other people’s duties involuntarily.






            146                              LOVELY PROFESSIONAL UNIVERSITY
   147   148   149   150   151   152   153   154   155   156   157