ELEVANT TO CAT QUALIFICATION PAPER 8 AND ACCA QUALIFICATION
PAPERS F8 AND P7
SPECIFIC ASPECTS OF AUDITING IN A
COMPUTER-BASED ENVIRONMENT
Information technology (IT) is integral to modern accounting and management
information systems. It is, therefore, imperative that auditors should be fully
aware of the impact of IT on the audit of a client’s financial statements, both in
the context of how it is used by a client to gather, process and report financial
information in its financial statements, and how the auditor can use IT in the
process of auditing the financial statements.
The purpose of this article is to provide guidance on following aspects of
auditing in a computer-based accounting environment:
? Application controls, comprising input, processing, output and master
file controls established by an audit client, over its computer-based
accounting system and
? Computer-assisted audit techniques (CAATs) that may be employed by
auditors to test and conclude on the integrity of a client’s
computer-based accounting system.
Exam questions on each of the aspects identified above are often answered to
an inadequate standard by a significant number of students – hence the reason
for this article.
Dealing with application controls and CAATs in turn:
APPLICATION CONTROLS
Application controls are those controls (manual and computerised) that relate
to the transaction and standing data pertaining to a computer-based
accounting system. They are specific to a given application and their objectives
are to ensure the completeness and accuracy of the accounting records and
the validity of entries made in those records. An effective computer-based
system will ensure that there are adequate controls existing at the point of
input, processing and output stages of the computer processing cycle and over
standing data contained in master files. Application controls need to be
ascertained, recorded and *uated by the auditor as part of the process of
determining the risk of material misstatement in the audit client’s financial
statements.
Input controls
Control activities designed to ensure that input is authorised, complete,
accurate and timely are referred to as input controls. Dependent on the
complexity of the application program in question, such controls will vary in
terms of quantity and sophistication. Factors to be considered in determining
these variables include cost considerations, and confidentiality requirements
with regard to the data input. Input controls common to most effective
application programs include on-screen prompt facilities (for example, a
request for an authorised user to ‘log-in’) and a facility to produce an audit
2
SPECIFIC ASPECTS OF AUDITING IN A COMPUTER-BASED
ENVIRONMENT
JANUARY 2011
trail allowing a user to trace a transaction from its origin to disposition in the
system.
Specific input validation checks may include:
Format checks
These ensure that information is input in the correct form. For example, the
requirement that the date of a sales invoice be input in numeric format only –
not numeric and alphanumeric.
Range checks
These ensure that information input is reasonable in line with expe
ctations. For
example, where an entity rarely, if ever, makes bulk-buy purchases with a value
in excess of $50,000, a purchase invoice with an input value in excess of
$50,000 is rejected for review and follow-up.
Compatibility checks
These ensure that data input from two or more fields is compatible. For
example, a sales invoice value should be compatible with the amount of sales
tax charged on the invoice.
Validity checks
These ensure that the data input is valid. For example, where an entity
operates a job costing system – costs input to a previously completed job
should be rejected as invalid.
Exception checks
These ensure that an exception report is produced highlighting unusual
situations that have arisen following the input of a specific item. For example,
the carry forward of a negative value for inventory held.
Sequence checks
These facilitate completeness of processing by ensuring that documents
processed out of sequence are rejected. For example, where pre-numbered
goods received notes are issued to acknowledge the receipt of goods into
physical inventory, any input of notes out of sequence should be rejected.
Control totals
These also facilitate completeness of processing by ensure that pre-input,
manually prepared control totals are compared to control totals input. For
example, non-matching totals of a ‘batch’ of purchase invoices should result in
an on-screen user prompt, or the production of an exception report for
follow-up. The use of control totals in this way are also commonly referred to
as output controls (see below)
Check digit verification
This process uses algorithms to ensure that data input is accurate. For
example, internally generated valid supplier numerical reference codes, should 3
SPECIFIC ASPECTS OF AUDITING IN A COMPUTER-BASED
ENVIRONMENT
JANUARY 2011
be formatted in such a way that any purchase invoices input with an incorrect
code will be automatically rejected.
Processing controls
Processing controls exist to ensure that all data input is processed correctly
and that data files are appropriately updated accurately in a timely manner.
The processing controls for a specified application program should be
designed and then tested prior to ‘live’ running with real data. These may
typically include the use of run-to-run controls, which ensure the integrity of
cumulative totals contained in the accounting records is maintained from one
data processing run to the next. For example, the balance carried forward on
the bank account in a company’s general (nominal) ledger. Other processing
controls should include the subsequent processing of data rejected at the point
of input, for example:
A computer produced print-out of rejected items.
Formal written instructions notifying data processing personnel of the
procedures to follow with regard to rejected items.
Appropriate investigation/follow up with regard to rejected items.
Evidence that rejected errors have been corrected and re-input.
Output controls
Output controls exist to ensure that all data is processed and that output is
distributed only to prescribed authorised users. While the degree of output
controls will vary from one organisation to another (dependent on the
confidentiality of the information and size of the organisation), common
controls comprise:
? Use of batch control totals, as described above (see ‘input controls’).
Appropriate review and follow up of exception report information to
ensure that there are no permanently outstanding exception items.
Careful scheduling of the processing of data to help facilitate the
distribution of information to end users on a timely basis.
Formal written instructions notifying data processing personnel of
prescribed distribution procedures.
Ongoing monitoring by a responsible official, of the distribution of output,
to ensure it is distributed in accordance with authorised policy.
Master file controls
The purpose of master file controls is to ensure the ongoing integrity of the
standing data contained in the master files. It is vitally important that stringent
‘security’ controls should be exercised over all master files.
These include:
appropriate use of passwords, to restrict access to master file data
the establishment of adequate procedures over the amendment of data,
comprising appropriate segregation of duties, and authority to amend
being restricted to appropriate responsible individuals
? regular checking of master file data to authorised data, by an
independent responsible official
4
SPECIFIC ASPECTS OF AUDITING IN A COMPUTER-BASED
ENVIRONMENT
JANUARY 2011
? processing controls over the updating of master files, including the use of
record counts and control totals.
COMPUTER ASSISTED AUDIT TECHNIQUES (CAATs)
The nature of computer-based accounting systems is such that auditors may
use the audit client company’s computer, or their own, as an audit tool, to
assist them in their audit procedures. The extent to which an auditor may
choose between using CAATs and manual techniques on a specific audit
engagement depends on the following factors:
the practicality of carrying out manual testing
the cost effectiveness of using CAATs
the availability of audit time
the availability of the audit client’s computer facility
the level of audit experience and expertise in using a specified CAAT
the level of CAATs carried out by the audit client’s internal audit function
and the extent to which the external auditor can rely on this work
There are three classifications of CAATs – namely:
Audit software
Test data
Other techniques
Dealing with each of the above in turn:
Audit software
Audit software is a generic term used to describe computer programs designed
to carry out tests of control and/or substantive procedures. Such programs
may be classified as:
Packaged programs
These consist of pre-prepared generalised programs used by auditors and are
not ‘client specific’. They may be used to carry out numerous audit tasks, for
example, to select a sample, either statistically or judgementally, during
arithmetic calculations and checking for gaps in the processing of sequences.
Purpose written programs
These programs are usually ‘client specific’ and may be used to carry out tests
of control or substantive procedures. Audit software may be bought or
developed, but in any event the audit firm’s audit plan should ensure that
provision is made to ensure that specified programs are appropriate for a
client’s system and the needs of the audit. Typically, they may be used to
re-perform computerised control procedures (for example, cost of sales
calculations) or perhaps to carry out an aged analysis of trade receivable
(debtor) balances.
Enquiry programs
These programs are integral to the client’s accounting system; however they
may be adapted for audit purposes. For example, where a system provides for
the routine reporting on a ‘monthly’ basis of employee starters and leavers