james a. hall - accounting information system chapter 15

39
Accounting Information Systems, 6 th edition James A. Hall COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western are trademarks used herein under license

Upload: joe-vata

Post on 08-Nov-2014

339 views

Category:

Documents


9 download

DESCRIPTION

JAMES A. HALL - Accounting Information System Chapter 15

TRANSCRIPT

Page 1: JAMES A. HALL - Accounting Information System Chapter 15

Accounting Information Systems, 6th edition

James A. Hall

COPYRIGHT © 2009 South-Western, a division of Cengage Learning. Cengage Learning and South-Western

are trademarks used herein under license

Page 2: JAMES A. HALL - Accounting Information System Chapter 15

Objectives for Chapter 15Key features of Sections 302 and 404 of the

Sarbanes-Oxley Act Management and auditor responsibilities

under Sections 302 and 404Risks of incompatible functions and how to

structure the IT functionControls and security of an organization’s

computer facilities Key elements of a disaster recovery plan

Page 3: JAMES A. HALL - Accounting Information System Chapter 15

Sarbanes-Oxley ActThe 2002 Sarbanes-Oxley (SOX) Act

established new corporate governance rulesCreated company accounting oversight boardIncreased accountability for company officers

and board of directorsIncreased white collar crime penaltiesProhibits a company’s external audit firms

from providing financial information systems

Page 4: JAMES A. HALL - Accounting Information System Chapter 15

SOX Section 302 Section 302—in quarterly and annual

financial statements, management must:certify the internal controls (IC) over

financial reportingstate responsibility for IC design provide reasonable assurance as to the

reliability of the financial reporting processdisclose any recent material changes in IC

Page 5: JAMES A. HALL - Accounting Information System Chapter 15

SOX Section 404Section 404—in the annual report on IC

effectiveness, management must:state responsibility for establishing and

maintaining adequate financial reporting ICassess IC effectivenessreference the external auditors’ attestation

report on management’s IC assessmentprovide explicit conclusions on the effectiveness

of financial reporting IC identify the framework management used to

conduct their IC assessment, e.g., COBIT

Page 6: JAMES A. HALL - Accounting Information System Chapter 15

IT Controls & Financial Reporting

Modern financial reporting is driven by information technology (IT)

IT initiates, authorizes, records, and reports the effects of financial transactions. Financial reporting IC are inextricably integrated to IT.

Page 7: JAMES A. HALL - Accounting Information System Chapter 15

COSO identifies two groups of IT controls:application controls – apply to

specific applications and programs, and ensure data validity, completeness and accuracy

general controls – apply to all systems and address IT governance and infrastructure, security of operating systems and databases, and application and program acquisition and development

IT Controls & Financial Reporting

Page 8: JAMES A. HALL - Accounting Information System Chapter 15

Sales CGS AP CashInventorySignificant Financial Accounts

Order Entry Application Controls

Cash DisbursementsApplication Controls

Purchases Application Controls

Related Application Controls

Systems Development and Program Change Control

Database Access Controls

Operating System Controls

Supporting General Controls

Controls for Review

IT Controls & Financial Reporting

Page 9: JAMES A. HALL - Accounting Information System Chapter 15

SOX Audit ImplicationsPre-SOX, audits did not require IC tests.

Only required to be familiar with client’s ICAudit consisted primarily of substantive tests

SOX – radically expanded scope of auditIssue new audit opinion on management’s IC

assessmentRequired to test IC affecting financial

information, especially IC to prevent fraudCollect documentation of management’s IC

tests and interview management on IC changes

Page 10: JAMES A. HALL - Accounting Information System Chapter 15

Types of Audit TestsTests of controls – tests to determine if appropriate IC are in place and functioning effectively

Substantive testing – detailed examination of account balances and transactions

Page 11: JAMES A. HALL - Accounting Information System Chapter 15

Organizational Structure ICAudit objective – verify that

individuals in incompatible areas are segregated to minimize risk while promoting operational efficiency

IC, especially segregation of duties, affected by which of two organizational structures applies:Centralized modelDistributed model

Page 12: JAMES A. HALL - Accounting Information System Chapter 15

President

VPMarketing

VP ComputerServices

VPOperations

VPFinance

SystemsDevelopment

DatabaseAdministration

DataProcessing

New SystemsDevelopment

SystemsMaintenance

DataControl

DataPreparation

ComputerOperations

DataLibrary

President

VPMarketing

VPFinance

VPOperations

IPU IPU IPU IPU IPU IPU

VPAdministration

Treasurer ControllerManagerPlant X

ManagerPlant Y

CENTRALIZED COMPUTER SERVICES FUNCTION

DISTRIBUTED ORGANIZATIONALSTRUCTURE

Page 13: JAMES A. HALL - Accounting Information System Chapter 15

Segregation of DutiesTransaction authorization is separate

from transaction processing.Asset custody is separate from

record-keeping responsibilities.The tasks needed to process the

transactions are subdivided so that fraud requires collusion.

Page 14: JAMES A. HALL - Accounting Information System Chapter 15

Segregation of Duties

Authorization

Authorization

Authorization

Processing

Custody Recording

Task 1 Task 2 Task 3 Task 4

Custody Recording

Control Objective 1

Control Objective 3

Control Objective 2

TRANSACTION

Page 15: JAMES A. HALL - Accounting Information System Chapter 15

Centralized IT StructureCritical to segregate:

systems development from computer operations

database administrator (DBA) from other computer service functionsDBA’s authorizing and systems

development’s processingDBA authorizes access

maintenance from new systems development

data library from operations

Page 16: JAMES A. HALL - Accounting Information System Chapter 15

Distributed IT StructureDespite its many advantages,

important IC implications are present:incompatible software among the

various work centers data redundancy may resultconsolidation of incompatible tasksdifficulty hiring qualified

professionalslack of standards

Page 17: JAMES A. HALL - Accounting Information System Chapter 15

Organizational Structure ICA corporate IT function alleviates

potential problems associated with distributed IT organizations by providing:central testing of commercial

hardware and softwarea user services staffa standard-setting body reviewing technical credentials of

prospective systems professionals

Page 18: JAMES A. HALL - Accounting Information System Chapter 15

Audit ProceduresReview the corporate policy on computer

securityVerify that the security policy is

communicated to employeesReview documentation to determine if

individuals or groups are performing incompatible functions

Review systems documentation and maintenance recordsVerify that maintenance programmers are

not also design programmers

Page 19: JAMES A. HALL - Accounting Information System Chapter 15

Audit ProceduresObserve if segregation policies are

followed in practice. E.g., check operations room access logs

to determine if programmers enter for reasons other than system failures

Review user rights and privileges Verify that programmers have access

privileges consistent with their job descriptions

Page 20: JAMES A. HALL - Accounting Information System Chapter 15

Audit objectives:physical security IC protects the

computer center from physical exposures

insurance coverage compensates the organization for damage to the computer center

operator documentation addresses routine operations as well as system failures

Computer Center IC

Page 21: JAMES A. HALL - Accounting Information System Chapter 15

Computer Center ICConsiderations:man-made threats and natural hazardsunderground utility and communications lines

air conditioning and air filtration systems access limited to operators and computer

center workers; others required to sign in and out

fire suppressions systems installedfault tolerance

redundant disks and other system componentsbackup power supplies

Page 22: JAMES A. HALL - Accounting Information System Chapter 15

Audit ProceduresReview insurance coverage on hardware, software, and physical facility

Review operator documentation, run manuals, for completeness and accuracy

Verify that operational details of a system’s internal logic are not in the operator’s documentation

Page 23: JAMES A. HALL - Accounting Information System Chapter 15

Disaster Recovery PlanningDisaster recovery plans (DRP)

identify:actions before, during, and after the

disasterdisaster recovery teampriorities for restoring critical

applicationsAudit objective – verify that DRP is

adequate and feasible for dealing with disasters

Page 24: JAMES A. HALL - Accounting Information System Chapter 15

Disaster Recovery PlanningMajor IC concerns:

second-site backupscritical applications and databases

including supplies and documentation back-up and off-site storage procedures

disaster recovery teamtesting the DRP regularly

Page 25: JAMES A. HALL - Accounting Information System Chapter 15

Second-Site BackupsEmpty shell - involves two or more user

organizations that buy or lease a building and remodel it into a computer site, but without computer equipment

Recovery operations center - a completely equipped site; very costly and typically shared among many companies

Internally provided backup - companies with multiple data processing centers may create internal excess capacity

Page 26: JAMES A. HALL - Accounting Information System Chapter 15

DRP Audit ProceduresEvaluate adequacy of second-site

backup arrangementsReview list of critical applications

for completeness and currencyVerify that procedures are in place

for storing off-site copies of applications and dataCheck currency back-ups and

copies

Page 27: JAMES A. HALL - Accounting Information System Chapter 15

DRP Audit ProceduresVerify that documentation,

supplies, etc., are stored off-siteVerify that the disaster recovery

team knows its responsibilitiesCheck frequency of testing the DRP

Page 28: JAMES A. HALL - Accounting Information System Chapter 15

From Appendix

Page 29: JAMES A. HALL - Accounting Information System Chapter 15

Attestation versus AssuranceAttestation:

practitioner is engaged to issue a written communication that expresses a conclusion about the reliability of a written assertion that is the responsibility of another party.

Assurance:professional services that are designed

to improve the quality of information, both financial and non-financial, used by decision-makers

includes, but is not limited to attestation

Page 30: JAMES A. HALL - Accounting Information System Chapter 15

Attest and Assurance Services

Page 31: JAMES A. HALL - Accounting Information System Chapter 15

What is an External Financial Audit?

An independent attestation by a professional (CPA) regarding the faithful representation of the financial statements

Three phases of a financial audit:familiarization with client firmevaluation and testing of internal

controlsassessment of reliability of financial data

Page 32: JAMES A. HALL - Accounting Information System Chapter 15

Generally Accepted Auditing Standards (GAAS)

Page 33: JAMES A. HALL - Accounting Information System Chapter 15

Auditing Management’s Assertions

Page 34: JAMES A. HALL - Accounting Information System Chapter 15

External versus Internal AuditingExternal auditors – represent the

interests of third party stakeholdersInternal auditors – serve an

independent appraisal function within the organizationOften perform tasks which can reduce

external audit fees and help to achieve audit efficiency and reduce audit fees

Page 35: JAMES A. HALL - Accounting Information System Chapter 15

What is an IT Audit? Since most information systems employ

IT, the IT audit is a critical component of all external and internal audits.

IT audits: focus on the computer-based aspects of

an organization’s information system assess the proper implementation,

operation, and control of computer resources

Page 36: JAMES A. HALL - Accounting Information System Chapter 15

Elements of an IT AuditSystematic procedures are usedEvidence is obtained

tests of internal controlssubstantive tests

Determination of materiality for weaknesses found

Prepare audit report & audit opinion

Page 37: JAMES A. HALL - Accounting Information System Chapter 15

Phases of an IT Audit

Page 38: JAMES A. HALL - Accounting Information System Chapter 15

Audit Risk is... the probability the auditor will

issue an unqualified (clean) opinion when in fact the financial statements are materially misstated.

Page 39: JAMES A. HALL - Accounting Information System Chapter 15

Three Components of Audit RiskInherent risk – associated with the unique

characteristics of the business or industry of the client

Control risk – the likelihood that the control structure is flawed because controls are either absent or inadequate to prevent or detect errors in the accounts

Detection risk – the risk that errors not detected or prevented by the control structure will also not be detected by the auditor