AUDITING (PART-18) (UNIT-III) INTERNAL CONTROL (PART 4)

Size: px
Start display at page:

Download "AUDITING (PART-18) (UNIT-III) INTERNAL CONTROL (PART 4)"

Transcription

1 1. INTRODUCTION AUDITING (PART-18) (UNIT-III) INTERNAL CONTROL (PART 4) Hello students welcome to the lecture series of auditing. Today we shall be taking up unit 3 rd and under unit 3 rd we shall continue our discussion on internal control in our previous three lectures we have already learned in length about the internal controls and also about the computer information system that how under CIS involvement internal controls are being taking care of. Today we shall continue our discussion on the EDP environment and we shall learn about audit trial and miscellaneous topics in relation to internal control. Among it the first one is the meaning of audit trial then we will learn about the advantages and disadvantages of using CAAT, CAAT means Computer Assisted Audit Techniques. They are being used in a controlled environment where computerized systems are there. Then organized structure in CIS Environment that how the organizational structure would be there, how the data will flow, what s the flow of the information in a CIS environment that means how internal control are being in place under such environment. We shall also learn about the nature of Processing under a controlled environment where everything is computerized and we will learn about the meaning of internal check and we shall try to differentiate between internal check and internal audit. We shall also learn in detail about the requirement of internal control system at service Bureau. So first of all let us take up the meaning of audit trial and how it is being useful. 2. AUDIT TRIAL It refers to a situation where it is possible to relate one-to-one basis. the original input along with the final output. That means in relation to the output we should have the trail of the input there

2 should be one to one co relation among input and output. Thus, audit trial can be defined as those documents, records, journals, ledgers, master files etc that enables an auditor to trace the transaction from the source document to the summarized total in accounting reports or vice versa. So in a way audit trail is a documentation of data entry which has been passed and it s a detail transaction record we will record it in journal we will have the ledgers of it so overall one to one basis can be established for any transaction which is been recorded in a computerized system take for example Sequentially numbered sales invoice copies would normally be listed in register for day book and subsequently filed either in numerical or chronological sequence. So where ever we have a summary obviously they would be some where being posted or they being generalized so the serial number can be cross referred with the original input data so the chronological data which we have in hand is the output and its one to one relation can be established with the input by the reference number which we have in the summarized sheet If it would be possible to trace a particular invoice from the daybook to the original file or vice-versa, by reference to the number or the date of invoice as we already discussed. By date of invoice also we can trace out the transaction or by the cross reference which is being written over both the documents that is input and the output summarized form so that s what we call the audit trail which is useful for auditor while conducting the audit. 3. ROLE OF COMPUTER ASSISTED AUDIT TECHNIQUES Now we understand a very important concept in relation to CIS environment that how Computer Assisted Audit Techniques would we useful for conducting audit where audit is done through the computer that means there is complete computerized process and what auditor is required to do is that he has to use certain techniques to do the audit so CAATs which is commonly know as Computer Assisted Audit

3 Techniques refers to those auditing techniques that takes assistance of a computer for being applied to an audit in a computer environment. So they are auditing techniques only and certain programs are being drafted in such a manner that audit techniques can be applied to conduct audit on a particular procedure The use of computer-assisted audit techniques may be required because there is complete absence of input documents because every thing is being computerized and lack of a visible audit trail and lack of visible output so where there is no visible input or output there are all entries which are being present in computerized system only the backups are again taken up in computerized format the hardware and software s are so prepared that its not possible to trace out the audit trials under that scenario what happens that certain audit programs are being drafted in such a manner that they can be used as auditing techniques to carry out the audit under CIS environment CAATs enable the auditor to save time by examination of data stored on computer media so here media has changed rather than manual medias what happens that computer media are there so on such medias what happens that with the use of CAATs techniques their can be better examination of data s being stored and it will save the time of auditor that s why we say that CAATs enable auditor to save time by examination of data s stored on computer media rather than on print-outs or other documents and in some cases, to conduct tests which cannot be done manually because there is no visible evidence or audit trial. CAATs can be used for both compliance and substantive testing. So a question comes to mind of students that are CAATs techniques useful for only the substantive test? No they are being useful under compliance test also so where ever we have to put reliance on the internal control system CAATs techniques can be used where ever the testing of documentation and transaction is to be done again we go for CAATs techniques substantive test here means that the testing of transaction and data s we will go for

4 vouching and verification these aspects can also be covered by CAATs techniques and internal control testing can possible with the help of CAATs techniques So overall it is such a technique which is being used by the auditor where he can go for complete audit with the help of CAATs techniques being assigned to carry on the audit work CAATs may be used in performing various auditing procedures including (a) tests of details of transactions which is commonly known as substantive test and balances for example the use of audit software to test all ( or a sample) of the transactions in a computer file. So under test of details of transaction we can go for CAATs techniques and (b) Analytical review procedure Analytical review procedure as we have already discussed in or lecture one on basis concepts of audit where we said that analytical review procedure are those procedure where trends and ratios are being checked and they are being audited by the auditor so using CAATs techniques again we can go for analytical review procedures and the use of such software would be useful to indentify the unusual fluctuation in items so again under CAATs different features or a peculiar feature of analytical review procedure is that unusual transaction can be identified. CAATs may be used in performing various auditing procedures including these two also c. Compliance test of general EDP controls general EDP controls we have already learnt in our previous lecture they are overall control of internal control which are being placed under CIS system so Compliance test can be conducted under general EDP controls using CAATs techniques for example, the use of data to test access procedures to the program libraries. d. Compliance tests of EDP application controls EDP application controls means that how accounting procedures are being applied in a CIS environment or computerized environment so compliance tests

5 under EDP application controls can be conducted using audit techniques which are knows as CAATs under it how we will go for the CATTS techniques the use of test data to test the functioning of a program procedure can be there so all these would be forming the part of the use of the computer assisted audit techniques to carry out the audit in computerized environment. 4. CAATs used in Audit Now let us understand certain CAATs which are being used in audits:- Audit Software: Audit software consists of computer program used by the auditor as a part of his audit procedure to process data of audit significance. Now under audit software again there can be different types of audit software s when we are talking about audit software s it is one of the type of the CAATs which is being used so under audit software s again we have different sort of programs there can be utility programs, package programs so first a fall let us understand what do we mean by the package programs which are being used while conducting audit of business entity a. Package programs: These are computer programs designed to perform data processing which includes reading computer files, selecting information, performing calculation, creating data files and printing reports in a format as specified by the auditor. So under package software every thing would be designed so as to perform the audit in the manner it is being useful for the auditor that means from the selection of the information till the generation of report and being used as a printout so under package program everything would be design as per the need of the auditor b. Purpose written Programs, these are computer programs designed to perform audit tasks in specific circumstances. The previous one i.e. the package program one of the general use while Purpose written Programs are used for specific circumstances these programs may be

6 prepared by the auditor, by the organization or by an outside programmer engaged by the auditor. In some cases, the programs existing in the organization may be used by the auditor in their original or in a modified state because it may be more economical and effective than developing independent program. c. Utility Programs, these are used by the organization to perform common data processing functions, such as sorting, creating and printing files. These programs are generally not designed for audit purpose and therefore may not contain such features as automatic record or control totals. So in all there are lot many audit software s which can be used by the auditor depending upon its need and the necessity for doing the audit in the computer aided techniques or in a computerized information system. Now let us understand one more feature that is known as Test Data; Test data techniques is also being used for conducting audit under a computerized environment under it what happens that they are used in conducting audit procedures by entering data into the computer system of the organization and comparing the results obtained with pre-determined results there are certain predetermine results of the organization and when the data is being put in a test data technique we will compare results of both the data s one which is pre generated or which are already being generated and one which are being generated with the use of test data techniques. For example- Test data used to test specific controls in computer programs, such as, on line password and data access control. Test transactions selected from previously processed transactions preferably historical data or data treated by the auditor to test specific processing characteristics of the organization s computer system. Such transactions are generally processed separately from the entity s normal processing.

7 Test transactions used in an integrated test facility where a dummy unit is established and to which test transactions are posted during the normal processing. So either we can take up a historical data or a data which is being specifically used for the test purpose or we can go for a dummy unit to do the test transactions of the data s. 5. DISADVANTAGES OF USING CAATS Now what s the benefit of using CAAT techniques; Increase in the effectiveness and efficiency of auditing procedures because we are having computer assessed audit techniques so obviously there is saving of time and the procedure would be procedural, there will be lesser chances of any error as the system is prewritten and is being modulated with the help of the auditor only. Saving in time the auditor can save time by reviewing the CIS control through CAAT than through other audit procedure. So again there is saving in conducting of the compliance procedures and in turn it will help us to conduct the substantive test in a much faster manner. Effective test checking can be there. A sample can be taken up which will represent the population and such sample would be a sample which will be effective to test the entire mechanism and it will be useful for the auditor to carry out the test on such samples. Now what s the disadvantage of using CAAT? Wherever there are advantages there are again chances that every technique would be having there own disadvantages so with the CAAT techniques Lack of Audit Trial and documentation. So this problem we need to face while conducting the audit using CAAT so let s highlight certain important disadvantages associated with the CAAT techniques Audit Trial disappears-we have already discussed that input and output would be in computerized format so it s not possible to do documentation in physical form.

8 Lack of visual observation because everything is automated and backups would also be there in computer media, so again it will be a problem where auditing is done around the computer, audit techniques would fail and wherever there is lack of knowledge of computers by the auditors again it will not be possible to use CAAT techniques. Internal storage: it is difficult to determine procedure followed. However with the passage of time there are chances that the entities would define there backups programs and they would take up the storage in a much better fashion and data storage would be given equal importance as that of data security. Change in programs could be there which will result in the stake of security of data and the CAAT techniques would not be so useful to trace out any modification which would be made up and any change which is being done if proper internal control and security checks are not present in the computer programmes System Jargon: that s the major problem which is being faced by the CAAT techniques; there are certain source codes which are being assigned while doing the input of the data so it is very difficult to decipher what s the code and how it is being given as an input into the system. So let us understand what do we mean by System Jargon. The source code listed to the auditor may not agree with the object code used by system. So wherever there is discrepancy or there is disagreement between the source code or the object code of the auditor and the system then these techniques will be utter failure Now let us understand one more concept that is organized structure in CIS environment. In a CIS environment an entity will establish an organizational structure and procedure to manage the CIS activities. So overall the structure would be same however with the change in environment wherever the computers are being used as a source of the information system there will be a change in organizational

9 structure so let us understand the characteristics of a CIS organizational structure, what does they include, they include: Concentration of functions and knowledge, Concentration of programs and data usually in machine readable form either in one computer installation located centrally or in a number of distributed locations. Now what s the nature of processing under a CIS environment? 1. Absence of input documents that is order entry in on-line systems is there so there is lack of input documents or the generation of the accounting transactions by computer programs that is automatic calculation of discounts can be there so again they will create the absence of input documents. 2. Lack of visible audit trail which we have already discussed in length which preclude the auditor from visually following transactions through the computerized accounting system. Lack of feasible output may necessitate access to data retained on files readable only by the computer because output is again is stored in computer media so there is lack of visible output. Hence it becomes a problem under such processing and ease of access to data and computer programs may increase the potential for unauthorized access. so data security is again a question to be dealt with precisely and in a very secure manner 6. INTERNAL CHECK Now students we will deal with another topic which is known as internal check. It is very much related to internal control so rather than getting confused with internal check internal control and internal audit we shall go with the meaning of internal check and learn it in detail. Internal check is a method of organizing the system of book-keeping and arrangement of staff duties in such a way that the work of one person automatically checked by another and the possibility of error is minimized unless there is a collision between the clerks. So here we can say that internal checks is quite lesser in its

10 scope than an internal control where internal control is a involvement where the control are being in place, internal check is again a method where by we check or organize the system of book keeping, that how internal control in relation to bookkeeping and the segregation of duties of this chapter is being managed. So what are the essential elements of a good system of internal check? Let us understand them. Existence of check on the day to day transaction, Which operate continuously as a part of the routine system that means the internal check would be there continuously as a part of routine system everyday such check are to be there into the system and Whereby the work of each person is either proved independently or is made complementary to the work of another. Let us understand the general considerations which are to be kept in mind in framing a system of internal check Important aspects of the business controlled by employee come under the review of another Duties of staff should be changed from time to time without previous notice so that there are lesser chances of committing fraud or any misappropriation of the data. Every member should be encouraged to go on leave once in a year so that there will be a satisfied employee and there should not be any chaos or collision in the employees and better internal check can be performed. The custody and accounting function of the assets must be the responsibility of two separate persons so that there is internal control check over both of the persons who are responsible for the custody and accounting function of the asset of the organization. Then there is need to prevent the misappropriation of cash, some mechanical instrument must be used in the business organization where by the misappropriation of the cash can be controlled and the triggering position will be there which will show us that certain chances are there or a misappropriation has taken place and it could be very easily detected out. There must be physical verification of

11 assets at regular intervals so there should be a internal check system that with the regular interval the assets would be physically verify, there should not be a chances of damage of the assets or the loss of the assets. The budgetary control and standard costing should be used in the business organization where by the cost can be under control and proper standards of the cost can be determined and variances can be analysed. Procedure should be laid down for periodical verification and testing of different sections of the accounting records and lastly the established accounting procedures should be reviewed periodically. 7. SUMMARY Now students we are summing us the lecture of today under today s lecture we have learned the importance of audit trial and how it is useful then we have learned about the CIS environment where there are certain computer assisted audit techniques are being used by the auditor to conduct the audit in a computerized environment. Under it we have learned in detail about the audit programs which are being used by the auditor as well as the test data. Again under the audit programs we have discussed abut the package programs and the prewritten programs as well as the utility programs and test data are being used either with the historical data or the business entity or with the use of the dummy units. We have also learned the importance of the internal check and general considerations to be kept in mind while applying any internal check. With this we are ending up our lecture of today. Thank you!

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS CONTENTS Paragraphs Introduction... 1 Organizational Structure... 2 Nature of Processing... 3 Design and Procedural Aspects... 4 Internal Controls in a CIS Environment... 5 General CIS Controls... 6-7

More information

Consideration of Internal Control in an Information Technology Environment

Consideration of Internal Control in an Information Technology Environment CHAPTER 8 Consideration of Internal Control in an Information Technology Environment Review Questions 8 1 System software monitors and controls hardware and provides other support to application programs.

More information

Chapter 08. Consideration of Internal Control in an Information Technology Environment. McGraw-Hill/Irwin

Chapter 08. Consideration of Internal Control in an Information Technology Environment. McGraw-Hill/Irwin Chapter 08 Consideration of Internal Control in an Information Technology Environment McGraw-Hill/Irwin Copyright 2012 by The McGraw-Hill Companies, Inc. All rights reserved. Nature of IT Based Systems

More information

TESTING General & Automated Control

TESTING General & Automated Control TESTING General & Automated Control Testin g Testing is a process of executing a program with the objective of finding an error. A good test case is one that has a high possibility of finding an undiscovered

More information

Chapter 8: General Controls and Application Controls

Chapter 8: General Controls and Application Controls Accounting Information Systems: Essential Concepts and Applications Fourth Edition by Wilkinson, Cerullo, Raval, and Wong-On-Wing Chapter 8: General Controls and Application Controls Slides Authored by

More information

IT Auditing, Hall, 3e

IT Auditing, Hall, 3e IT Auditing, an economic event that affects the assets and equities of the firm, is reflected in its accounts, and is measured in monetary terms. similar types of transactions are grouped together into

More information

Full file at https://fratstock.eu INTRODUCTION TO TRANSACTION PROCESSING

Full file at https://fratstock.eu INTRODUCTION TO TRANSACTION PROCESSING CHAPTER 2 2-1 OUTLINE OF CHAPTER 2 Learning Objectives An Overview of Transaction Processing Transaction Cycles The Expenditure Cycle The Conversion Cycle The Revenue Cycle Accounting Records Manual Systems

More information

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance

Auditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance Accountability Modules Auditing in an Automated Environment: Agency Prepared By Initials Date Reviewed By Audit Program - System Design, Development, and Maintenance W/P Ref Page 1 of 1 Procedures Initials

More information

Definition of Internal Control

Definition of Internal Control Definition of Internal Control - To address and limit potential risks - designed, implemented and maintained by those charged with governance to provide reasonable assurance about the achievement of the

More information

Chapter 2 Introduction to Transaction Processing

Chapter 2 Introduction to Transaction Processing Chapter 2 Introduction to Transaction Processing TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing more efficient than real-time systems. T 2. The process of acquiring

More information

INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS

INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction Scope of

More information

CITADEL INFORMATION GROUP, INC.

CITADEL INFORMATION GROUP, INC. CITADEL INFORMATION GROUP, INC. The Role of the Information Security Assessment in a SAS 99 Audit Stan Stahl, Ph.D. President Citadel Information Group, Inc. The auditor has a responsibility to plan and

More information

EXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS

EXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS SRI LANKA STANDARD 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after 01 January 2014) CONTENTS Paragraph Introduction Scope of this SLAuS... 1 External

More information

LIST OF SUBSTANTIVE CHANGES AND ADDITIONS. PPC's Guide to Audits of Local Governments. Thirty first Edition (February 2016)

LIST OF SUBSTANTIVE CHANGES AND ADDITIONS. PPC's Guide to Audits of Local Governments. Thirty first Edition (February 2016) Route To: Partners Managers Staff File LIST OF SUBSTANTIVE CHANGES AND ADDITIONS PPC's Guide to Audits of Local Governments Thirty first Edition (February 2016) Highlights of This Edition The following

More information

4. The portion of the monthly bill from a credit card company is an example of a turn-around document.

4. The portion of the monthly bill from a credit card company is an example of a turn-around document. Chapter 2 Introduction to Transaction Processing Introduction to Accounting Information Systems, 8e Test Bank, Chapter 2 TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing

More information

Audit Considerations Relating to an Entity Using a Service Organization

Audit Considerations Relating to an Entity Using a Service Organization An Entity Using a Service Organization 355 AU-C Section 402 Audit Considerations Relating to an Entity Using a Service Organization Source: SAS No. 122; SAS No. 128; SAS No. 130. Effective for audits of

More information

International Standard on Auditing (Ireland) 505 External Confirmations

International Standard on Auditing (Ireland) 505 External Confirmations International Standard on Auditing (Ireland) 505 External Confirmations MISSION To contribute to Ireland having a strong regulatory environment in which to do business by supervising and promoting high

More information

Auditing in an Automated Environment: Appendix B: Application Controls

Auditing in an Automated Environment: Appendix B: Application Controls Accountability Modules Auditing in an Automated Environment: Initials Date Agency Prepared By Reviewed By Audit Program - Application W/P Ref Page 1 of 1 The SAO follows control objectives established

More information

Test bank for accounting information systems 1st edition by richardson chang and smith

Test bank for accounting information systems 1st edition by richardson chang and smith Test bank for accounting information systems 1st edition by richardson chang and smith Chapter 04 Relational Databases and Enterprise Systems True / False Questions 1. Three types of data models used today

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

1. The narratives, diagrams, charts, and other written materials that explain how a system works are collectively called

1. The narratives, diagrams, charts, and other written materials that explain how a system works are collectively called CH 3 MULTIPLE CHOICE 1. The narratives, diagrams, charts, and other written materials that explain how a system works are collectively called a) documentation. b) data flows. c) flowcharts. d) schema.

More information

Processing Techniques. Chapter 7: Design and Development and Evaluation of Systems. Online Processing. Real-time Processing

Processing Techniques. Chapter 7: Design and Development and Evaluation of Systems. Online Processing. Real-time Processing Processing Techniques Chapter 7: Design and Development and Evaluation of Systems The Processing Methods for a system can be divided into: Online Processing Real-time Processing Batch Processing B2001

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

Making trust evident Reporting on controls at Service Organizations

Making trust evident Reporting on controls at Service Organizations www.pwc.com Making trust evident Reporting on controls at Service Organizations 1 Does this picture look familiar to you? User Entity A User Entity B User Entity C Introduction and background Many entities

More information

PeopleSoft Finance Access and Security Audit

PeopleSoft Finance Access and Security Audit PeopleSoft Finance Access and Security Audit City of Minneapolis Internal Audit Department September 20, 2016 1 Contents Page Background... 3 Objective, Scope and Approach... 3 Audit Results and Recommendations...

More information

International Standard on Auditing (UK) 505

International Standard on Auditing (UK) 505 Standard Audit and Assurance Financial Reporting Council July 2017 International Standard on Auditing (UK) 505 External Confi rmations The FRC s mission is to promote transparency and integrity in business.

More information

SUBJECT HANDLED BY Mrs.D.Bhuvaneswari, Assistant Professor COMMERCE

SUBJECT HANDLED BY Mrs.D.Bhuvaneswari, Assistant Professor COMMERCE SRM UNIVERSITY FACULTY OF SCIENCE AND HUMANITIES DEPARTMENT OF COMMERCE LESSON PLAN ODD SEMESTER SUBJECT HANDLED BY Mrs.D.Bhuvaneswari, Assistant Professor COMMERCE III YEAR VI SEMESTER CORE PAPER - XIV

More information

User's Guide. Alpha Five Accounting. Accounting Made Easy. Version 3.0. Copyright BetaSoft LLC - All Rights Reserved

User's Guide. Alpha Five Accounting. Accounting Made Easy. Version 3.0. Copyright BetaSoft LLC - All Rights Reserved User's Guide Alpha Five Accounting Copyright 1995-2002 BetaSoft LLC - All Rights Reserved Accounting Made Easy Version 3.0 Alpha Five is a trademark of Alpha Software Corp. i ii Table of Contents INTRODUCTION...1

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 27001 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 27001 Lead Auditor examination is to ensure that the candidate

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO/IEC 20000 Lead Auditor www.pecb.com The objective of the Certified ISO/IEC 20000 Lead Auditor examination is to ensure that the candidate

More information

Regulatory Notice 09-64

Regulatory Notice 09-64 Regulatory Notice 09-64 Customer Assets Verification of Instructions to Transmit or Withdraw Assets from Customer Accounts Executive Summary As part of their duty to safeguard customer assets and to meet

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Chapter 2 Introduction to Transaction Processing

Chapter 2 Introduction to Transaction Processing Chapter 2 Introduction to Transaction Processing TRUE/FALSE 1. Processing more transactions at a lower unit cost makes batch processing more efficient than real-time systems. T 2. The process of acquiring

More information

SUBJECT HANDLED BY DR.S.CHITRA, HOD - COMMERCE

SUBJECT HANDLED BY DR.S.CHITRA, HOD - COMMERCE SRM UNIVERSITY FACULTY OF SCIENCE AND HUMANITIES DEPARTMENT OF COMMERCE LESSON PLAN ODD SEMESTER SUBJECT HANDLED BY DR.S.CHITRA, HOD - COMMERCE III YEAR VI SEMESTER CORE PAPER - XIV L T P TOTAL CREDIT

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 9001 Lead Auditor www.pecb.com The objective of the PECB Certified ISO 9001 Lead Auditor examination is to ensure that the candidate possesses

More information

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS

A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS A SERVICE ORGANIZATION S GUIDE SOC 1, 2, & 3 REPORTS Introduction If you re a growing service organization, whether a technology provider, financial services corporation, healthcare company, or professional

More information

Sage Pastel Accounting. Year End Procedures Sage Pastel Partner V

Sage Pastel Accounting. Year End Procedures Sage Pastel Partner V Sage Pastel Accounting Year End Procedures Sage Pastel Partner V14 2015 Contents Welcome to your Pastel Partner Year End Guide 3 Website and online support 3 Support operating hours 3 Contacting Chips

More information

Office of Internal Audit and Compliance

Office of Internal Audit and Compliance Internal Audit Contract Postal Unit Plaster Student Union June 10, 2016 Office of Internal Audit and Compliance DATE: June 10, 2016 TO: Mr. Matthew Morris, Vice President for Administrative Services Mr.

More information

ISACA CISA Review Course CHAPTER 1 THE IS AUDIT PROCESS

ISACA CISA Review Course CHAPTER 1 THE IS AUDIT PROCESS ISACA The recognized global leaders in IT governance, control and assurance 1 2007 CISA Review Course CHAPTER 1 THE IS AUDIT PROCESS 2 1 Chapter Overview 1. Introduction Organization of the IS audit function

More information

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018 Lahore University of Management Sciences ACCT 250 Auditing Spring Semester 2018 Instructor Syed Zain ul Abideen / Waqar Ali Room No. SDSB room no. 442, 422 Office Hours TBA Email syed.zain@lums.edu.pk;

More information

Learning Objectives. External confirmations procedures as per SA330 and SA 500 requirements

Learning Objectives. External confirmations procedures as per SA330 and SA 500 requirements CA. Sudhir Sharma 1 Learning Objectives 1 2 3 4 External confirmations procedures as per SA330 and SA 500 requirements Management s refusal to allow auditor to send confirmation requests Results of the

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 22000 Lead Auditor www.pecb.com The objective of the Certified ISO 22000 Lead Auditor examination is to ensure that the candidate has

More information

INFORMATION TECHNOLOGY AUDITING GAO AND THE FISCAM AUDIT FRAMEWORK. Ronald E. Franke, CISA, CIA, CFE, CICA. April 30, 2010

INFORMATION TECHNOLOGY AUDITING GAO AND THE FISCAM AUDIT FRAMEWORK. Ronald E. Franke, CISA, CIA, CFE, CICA. April 30, 2010 INFORMATION TECHNOLOGY AUDITING GAO AND THE FISCAM AUDIT FRAMEWORK Presented by Ronald E. Franke, CISA, CIA, CFE, CICA April 30, 2010 1 Agenda General Accountability Office (GAO) and IT Auditing Federal

More information

Transaction Processing Systems

Transaction Processing Systems Chapter 5: Computer-Based Transaction Processing Transaction Processing Systems A fundamental task in any AIS is to process transactions affecting the organization Transaction processing systems(ss) involve

More information

Cyber Security Reliability Standards CIP V5 Transition Guidance:

Cyber Security Reliability Standards CIP V5 Transition Guidance: Cyber Security Reliability Standards CIP V5 Transition Guidance: ERO Compliance and Enforcement Activities during the Transition to the CIP Version 5 Reliability Standards To: Regional Entities and Responsible

More information

Introduction To IS Auditing

Introduction To IS Auditing Introduction To IS Auditing Instructor: Bryan McAtee, ASA, CISA Bryan McAtee & Associates - Brisbane, Australia * Course, Presenter and Delegate Introductions * Definition of Information Technology (IT)

More information

In this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs.

In this Lecture you will Learn: Testing in Software Development Process. What is Software Testing. Static Testing vs. In this Lecture you will Learn: Testing in Software Development Process Examine the verification and validation activities in software development process stage by stage Introduce some basic concepts of

More information

ADVANCED AUDIT AND ASSURANCE

ADVANCED AUDIT AND ASSURANCE ADVANCED AUDIT AND ASSURANCE CPA PROGRAM SUBJECT OUTLINE The Advanced Audit and Assurance subject provides a body of knowledge for you to understand the nature and diversity of audit and assurance engagements.

More information

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS

GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS GUIDELINES FOR SUBMITTING CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS (ISC) 2 CISSP Recertification Guidelines (rev. 8-06) Page 1 of 16 CONTENTS Introduction... 3 CPE Record Keeping... 4 CPE Credit

More information

Training Manual for CB Area Good Inside Portal

Training Manual for CB Area Good Inside Portal Training Manual for CB Area Good Inside Portal www.utzcertified.org Table of Contents Module 0: Introduction to the CB Area... 2 Module 1: Introduction to the Requests area... 7 Module 2: Introduction

More information

CHAPTER 2 INTRODUCTION TO TRANSACTION PROCESSING

CHAPTER 2 INTRODUCTION TO TRANSACTION PROCESSING Chapter 2 Page 20 REVIEW QUESTIONS CHAPTER 2 INTRODUCTION TO TRANSACTION PROCESSING. The expenditure cycle, conversion cycle, and revenue cycle. 2. Purchases/accounts payable system, cash disbursements

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE EXAM PREPARATION GUIDE PECB Certified ISO 50001 Lead Auditor The objective of the PECB Certified ISO 50001 Lead Auditor examination is to ensure that the candidate has the knowledge and skills to plan

More information

C A R I B B E A N E X A M I N A T I O N S C O U N C I L REPORT ON CANDIDATES WORK IN THE SECONDARY EDUCATION CERTIFICATE EXAMINATIONS MAY/JUNE 2010

C A R I B B E A N E X A M I N A T I O N S C O U N C I L REPORT ON CANDIDATES WORK IN THE SECONDARY EDUCATION CERTIFICATE EXAMINATIONS MAY/JUNE 2010 C A R I B B E A N E X A M I N A T I O N S C O U N C I L REPORT ON CANDIDATES WORK IN THE SECONDARY EDUCATION CERTIFICATE EXAMINATIONS MAY/JUNE 2010 INFORMATION TECHNOLOGY GENERAL PROFICIENCY Copyright

More information

FRAUD-RELATED INTERNAL CONTROLS

FRAUD-RELATED INTERNAL CONTROLS GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA TABLE OF CONTENTS I. THE NEED FOR INTERNAL CONTROLS Example... 1 Threats to an Organization s Internal Control Environment...

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

IT Attestation in the Cloud Era

IT Attestation in the Cloud Era IT Attestation in the Cloud Era The need for increased assurance over outsourced operations/ controls April 2013 Symeon Kalamatianos M.Sc., CISA, CISM Senior Manager, IT Risk Consulting Contents Introduction

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Auditing and assurance

Auditing and assurance Auditing and assurance Higher School of Economics, ICEF Lecturer: Anna Pirozhkova Seminars: Tatiana Shurchkova Contacts +7 (916) 468 33 99 (Anna), ann.pirozhkova@gmail.com Target audience 4th Year students.

More information

Book2Tax Application - Microsoft C++ with ActiveX For E&Y National Tax Compliance Bethesda MD & Atlanta GA, 10/97-6/98

Book2Tax Application - Microsoft C++ with ActiveX For E&Y National Tax Compliance Bethesda MD & Atlanta GA, 10/97-6/98 Book2Tax Application - Microsoft C++ with ActiveX For E&Y National Tax Compliance Bethesda MD & Atlanta GA, 10/97-6/98 Ernst & Young tax compliance professionals requested automation of their consulting

More information

Unit 5 Computer Assisted Audit Techniques

Unit 5 Computer Assisted Audit Techniques Unit 5 Computer Assisted Audit Techniques Computer Assisted Audit Techniques C H A P T E R 1 INTRODUCTION TO CAAT LEARNING OBJECTIVES The learning objectives of the CAAT module are: Understand how to use

More information

Rich Powell Director, CIP Compliance JEA

Rich Powell Director, CIP Compliance JEA Rich Powell Director, CIP Compliance JEA Review access control requirements CIP-003 and CIP-007 Discuss compliance considerations Implementation Strategies Hints/Tips for audit presentation Account Control

More information

Lesson 1. Exploring QuickBooks INTRODUCTION OBJECTIVES

Lesson 1. Exploring QuickBooks INTRODUCTION OBJECTIVES Exploring QuickBooks INTRODUCTION This first lesson is an introduction to the QuickBooks software program and the chart of accounts, and it contains two reading assignments. Assignment 1 takes you on a

More information

Contents. Process flow diagrams and other documentation

Contents. Process flow diagrams and other documentation Process flow diagrams and other documentation Contents 1. Audit lessons 2. Process flows 3. Flowcharts 4. Information produced by entity (IPE) 5. Documentation Topic 1: Audit lessons Audit lessons Teams

More information

_isms_27001_fnd_en_sample_set01_v2, Group A

_isms_27001_fnd_en_sample_set01_v2, Group A 1) What is correct with respect to the PDCA cycle? a) PDCA describes the characteristics of information to be maintained in the context of information security. (0%) b) The structure of the ISO/IEC 27001

More information

IT Auditing and IT Fraud Detection

IT Auditing and IT Fraud Detection IT Auditing and IT Fraud Detection Page 1 of 7 Why Attend In today s world, IT fraud prevention and investigation have become an everyday part of corporate life and auditors must gain expertise in this

More information

SOC Reporting / SSAE 18 Update July, 2017

SOC Reporting / SSAE 18 Update July, 2017 SOC Reporting / SSAE 18 Update July, 2017 Agenda SOC Refresher Overview of SSAE 18 Changes to SOC 1 Changes to SOC 2 Quiz / Questions Various Types of SOC Reports SOC for Service Organizations (http://www.aicpa.org/soc4so)

More information

Brandon s Cabinet Shop

Brandon s Cabinet Shop Brandon s Cabinet Shop Module 1 Transactions For June 3-9 Page 1 Begin Brandon s Cabinet Shop Record the transactions When you have: (1) carefully read the Introduction, (2) a good understanding of the

More information

Inhalt. Description of Certification Procedure ISO 22000, HACCP and DIN 15593

Inhalt. Description of Certification Procedure ISO 22000, HACCP and DIN 15593 Inhalt 1. CERTIFICATION PROCEDURE... 2 1.1 Audit Preparation... 2 1.2 Audit Stage 1... 2 1.3 Audit Stage 2 Certification Audit... 3 1.4. Issue of Certificate... 3 2. SURVEILLANCE AUDIT... 3 3. RECERTIFICATION

More information

Petunia Patch. Module 1. Transactions for June 3-9. Level 1. 1 st Web-Based Edition

Petunia Patch. Module 1. Transactions for June 3-9. Level 1. 1 st Web-Based Edition Petunia Patch Level 1 1 st Web-Based Edition Module 1 Transactions for June 3-9 Page 1 BEGIN THE PROGRAM AND RECORD THE TRANSACTIONS When you have: (1) carefully read the Introduction, (2) a good understanding

More information

Chapter 1 introduced the transaction processing system

Chapter 1 introduced the transaction processing system Chapter 2 Introduction to Transaction Processing LEARNING OBJECTIVES After studying this chapter, you should: Understand the broad objectives of transaction cycles. Recognize the types of transactions

More information

Probe MMX Compilation

Probe MMX Compilation Probe MMX Compilation 2011.00 What s New Overview Probe MMX Compilations Probe MMX uses the latest CaseWare and Template Technology, creating a way to conduct Compilation engagements using the latest International

More information

Auditing and Monitoring in an Effective Institutional Compliance Program

Auditing and Monitoring in an Effective Institutional Compliance Program Auditing and Monitoring in an Effective Institutional Compliance Program 6 th Conference for Effective Compliance Systems in Higher Education Presented by David B. Crawford, Audit Manager Emeritus The

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Slides 11: Verification and Validation Models

Slides 11: Verification and Validation Models Slides 11: Verification and Validation Models Purpose and Overview The goal of the validation process is: To produce a model that represents true behaviour closely enough for decision making purposes.

More information

New Features... 4 Add-on Modules Cheat Sheet... 15

New Features... 4 Add-on Modules Cheat Sheet... 15 1 2 Table of Contents New Features... 4 Favourites option... 4 New Icons... 4 Windows theme integration... 5 Forms Assistant... 6 Forms designer enhancements... 7 User Access Report... 8 User Notifications

More information

CHAPTER 3: DAILY PROCEDURES

CHAPTER 3: DAILY PROCEDURES Chapter 3: Daily Procedures CHAPTER 3: DAILY PROCEDURES Training Objectives Actively participating during this chapter helps you to: Understand the different types of transactions and the procedures for

More information

Stopping Insider Threats Before They Start: Using Leading Techniques and Predictive Analysis to Presage Your Environment

Stopping Insider Threats Before They Start: Using Leading Techniques and Predictive Analysis to Presage Your Environment Stopping Insider Threats Before They Start: Using Leading Techniques and Predictive Analysis to Presage Your Environment 1 Attachmate Corporation. All rights reserved. Results show that it can take more

More information

SGTB Khalsa College, Department of Commerce B.Com Hons, Semester V Section-C Management Accounting Teacher Mrs. Parminder Kaur

SGTB Khalsa College, Department of Commerce B.Com Hons, Semester V Section-C Management Accounting Teacher Mrs. Parminder Kaur Course B.Com Hons, Semester V Section-C Paper Management Accounting Teacher Mrs. Parminder Kaur Statement Showing Teaching Plan Introduction to management accounting, Nature &scope of management accounting,

More information

SYLLABUS To test candidates appreciation of the nature and purpose of internal audit and internal review

SYLLABUS To test candidates appreciation of the nature and purpose of internal audit and internal review SYLLABUS 2017 DIPLOMA IN AUDITING AIMS To test candidates understanding of the audit of individual limited companies, in terms of the planning of audit work, the implementation of audit tests and the expression

More information

Frequently Asked Question Regarding 201 CMR 17.00

Frequently Asked Question Regarding 201 CMR 17.00 Frequently Asked Question Regarding 201 CMR 17.00 What are the differences between this version of 201 CMR 17.00 and the version issued in February of 2009? There are some important differences in the

More information

Information for your Certification

Information for your Certification Information for your Certification General: The access to the certification body is open to all companies and persons. The certification body is liable to impartiality, avoiding any conflicts of interests

More information

Evaluating SOC Reports and NEW Reporting Requirements

Evaluating SOC Reports and NEW Reporting Requirements Evaluating SOC Reports and NEW Reporting Requirements ISACA Kris Lonborg, EY Partner Maria Avedissian, EY Senior Manager September 12, 2013 Agenda Evaluating SOC reports Recent changes made to the SOC1

More information

Description of the certification procedure MS - ISO 9001, MS - ISO 14001, MS - ISO/TS and MS BS OHSAS 18001, MS - ISO 45001, MS - ISO 50001

Description of the certification procedure MS - ISO 9001, MS - ISO 14001, MS - ISO/TS and MS BS OHSAS 18001, MS - ISO 45001, MS - ISO 50001 The certification of a management system based on standard ISO 9001, ISO 14001, ISO/TS 29001, BS OHSAS 18001, ISO 45001 or ISO 50001, consists of the offer and contract phase, the audit preparation, performance

More information

Audit and Assurance Overview

Audit and Assurance Overview Chartered Professional Accountants of Canada, CPA Canada, CPA are trademarks and/or certification marks of the Chartered Professional Accountants of Canada. 2018, Chartered Professional Accountants of

More information

Introduction to Transaction Processing

Introduction to Transaction Processing Modul ke: Introduction to Transaction Processing Fakultas Fakultas Ekonomi & Bisnis Iwan Setiadi, SE., M.Si Program Studi Akuntansi www.mercubuana.ac.id A Financial Transaction is... an economic event

More information

CASH MANAGEMENT TRAINING FY2018

CASH MANAGEMENT TRAINING FY2018 CASH MANAGEMENT TRAINING FY2018 Katie Mahoney katherine.mahoney@maine.edu 780-4484 The Office of Finance & Administration University of Southern Maine University of Maine System - 1 - Cash Collection The

More information

WECC Internal Controls Evaluation Process WECC Compliance Oversight Effective date: October 15, 2017

WECC Internal Controls Evaluation Process WECC Compliance Oversight Effective date: October 15, 2017 WECC Internal Controls Evaluation Process WECC Compliance Oversight Effective date: October 15, 2017 155 North 400 West, Suite 200 Salt Lake City, Utah 84103-1114 WECC Internal Controls Evaluation Process

More information

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification

UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification University of California UCOP Guidelines for Protection of Electronic Personal Information Data and for Security Breach Notification UCOP Implementation Plan for Compliance with Business and Finance Bulletin

More information

THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR

THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION Video Supplement... 1 Course Objectives

More information

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose:

STAFF REPORT. January 26, Audit Committee. Information Security Framework. Purpose: STAFF REPORT January 26, 2001 To: From: Subject: Audit Committee City Auditor Information Security Framework Purpose: To review the adequacy of the Information Security Framework governing the security

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information

Set 2 MCQ

Set 2 MCQ 1. ETCS means A) Enable Tax Collected at Source B) Electronic Tax Collected at Source C) Electric Tax Collected at Source D) None of these 2. To get Payroll Reports choose A) Gateway of Tally > Display

More information

Data Privacy Statement for myportal to go

Data Privacy Statement for myportal to go Data Privacy Statement for myportal to go Contents 1. Scope... 2 2. Data Handled by Unify Through myportal to go... 2 3. Disclosure of Your Personal Data... 3 4. Accessing, Correcting and Deleting Your

More information

Introduction to Automated Controls. Jay Swaminathan Senior Manager, SOAProjects. San Francisco Chapter

Introduction to Automated Controls. Jay Swaminathan Senior Manager, SOAProjects. San Francisco Chapter Introduction to Automated Controls Jay Swaminathan Senior Manager, SOAProjects Agenda Defining Automated Controls The Value of Automated Controls Common Testing Approaches ITGC considerations The Concept

More information

Chapter 10. Administration

Chapter 10. Administration Chapter 10 Administration This Page Left Blank Intentionally CTAS User Manual 10-1 Administration: Introduction The Admin section is where you enter your local government s required and optional system

More information

APPENDIX B STATEMENT ON STANDARDS FOR CONTINUING PROFESSIONAL EDUCATION (CPE) PROGRAMS

APPENDIX B STATEMENT ON STANDARDS FOR CONTINUING PROFESSIONAL EDUCATION (CPE) PROGRAMS APPENDIX B STATEMENT ON STANDARDS FOR CONTINUING PROFESSIONAL EDUCATION (CPE) PROGRAMS Appendix B-1 STATEMENT ON STANDARDS FOR CONTINUING PROFESSIONAL EDUCATION (CPE) PROGRAMS The following standards are

More information

For our example, we will look at the following factors and factor levels.

For our example, we will look at the following factors and factor levels. In order to review the calculations that are used to generate the Analysis of Variance, we will use the statapult example. By adjusting various settings on the statapult, you are able to throw the ball

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information