1 / 29

Internal Control III Computer related issues

Internal Control III Computer related issues. March 4, 2010. Today we will…. Review some of the control exposures that relate to computerized environments. Comparison of computerized and non-computerized control issues. Discuss some controls that are specific to computerized environments.

lindajlewis
Download Presentation

Internal Control III Computer related issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internal Control IIIComputer related issues March 4, 2010

  2. Today we will… • Review some of the control exposures that relate to computerized environments. • Comparison of computerized and non-computerized control issues. • Discuss some controls that are specific to computerized environments. • Discuss ERP systems and the control issues they present.

  3. Exposures in a computerized environment • Errors in data entry. • Natural catastrophes. • Theft or fraud using a computer. • Theft of equipment and unauthorized use. • Theft of data. • Viruses.

  4. Errors in data entry • Any time we have a human and a computer interact, there is a possibility of miscommunication because we don’t speak the same language. • Data entry personnel do not understand interface. • Data entry personnel make “typing” mistakes. • Data entry personnel enter incomplete information. What can be done about these problems?

  5. Reducing data entry errors • Use encoded turnaround documents when possible. (preventive control) • Make manual entry as intuitive as possible. (preventive control) • Use UPC or RFID codes when possible. (preventive control) • Include data checks and feedback - such as showing full customer name and address when a customer’s “number” is input. (detective control)

  6. Natural catastrophes • I include in this category all technical breakdowns that are not attributable to operator error or fraud. Power outages or network failure are examples. • We need corrective plans here - since these are unintentional and unforseeable in a specific sense (you can forsee the possibility, but not the specific occurrence). • We look for either backup and recovery plans or an alternative system. Many vendors offer downtimes of an hour or less (such as Oracle). • How often do you save your files and how many “past” generations do you keep?

  7. Theft or fraud using a computer • The first two exposures related to unintentional errors or problems in a computerized environment. Now we will discuss theft and fraud in a computerized environment. • Computerized environments are especially vulnerable to theft and fraud because you cannot “see” the data. With complex data structures, it is sometimes difficult to put the data back together (one of the tasks of the A523 project) in the desired way - because different components of a transaction are, perhaps, stored in different files - even different servers. • In addition, access to the records may occur from another location.

  8. How is theft perpetrated? • A programmer might include code that diverts money to them directly or that allows them re-entry (a trojan horse). • A hacker might, from a remote location, break into the system using stolen or guessed passcodes and steal company resources. • A user might steal cash or other assets and then find a way to alter the accounting database records to hide the theft.

  9. How can theft be prevented? • Programs should be ‘tested’ and the original programs should be kept in a secure place for comparison. In other words, you can’t just audit around the computer. The programs themselves need to be periodically reviewed. This ensures the integrity of the programming and keeps programmers from successfully stealing from the company. • Sophisticated network security is essential for the protection of computerized systems. Have you noticed that your computer has to be registered in order to use it on campus? If you can control access to certain areas by requiring the access be obtained only by recognized computers, then you have created a responsibility chain. In addition, encrypted information transmission is essential for sensitive data. • Access to recording should be restricted to authorized personnel. Entries should never be able to be deleted without an audit trail. Each user should only see the “areas” for which they are authorized in menu-driven systems.

  10. Theft of equipment and unauthorized use • Computer assets (the physical assets) are valuable and typically contain important information. • We used to be concerned about people using our hardware without being authorized - computer “time” was unbelievably expensive. An hour of CPU time used to cost many thousands of dollars. That has changed with the change in computer architecture. • Laptops are easy to steal, as are palm pilots and other equipment. It is independent now (stand alone equipment).

  11. Preventing unauthorized access and equipment theft • Equipment should be locked up if possible (physical access should be restricted). In the case of laptops, responsibility for security should be assigned to an individual. • Access to files should be restricted by password and physical access requirements and limited to activities that leave a trail. • Many companies have “computer logs” generated to see if employees are misusing their computers (for pornography or playing games).

  12. Theft of data • Theft of sensitive data is an important problem in the computerized environment - partially because it is not always evident that it was taken. • Hackers broke into a bank computer and stole customer credit information and used it to steal customer identities. • A company engaged in industrial espionage by stealing another company’s proprietary data.

  13. Viruses • Viruses can shut down the availability of a computer (causing a business interruption). They can also destroy important files.

  14. Comparison of computerized and non-computerized control issues

  15. Comparison of computerized and non-computerized control issues

  16. Comparison of computerized and non-computerized control issues

  17. Comparison of computerized and non-computerized control issues

  18. Comparison of computerized and non-computerized control issues

  19. Comparison of computerized and non-computerized control issues

  20. Comparison of computerized and non-computerized control issues

  21. Comparison of computerized and non-computerized control issues

  22. Controls in computerized environments • Data entry using prerecorded data • Edit checks (data checks) • Batch processing controls • Access controls • Computer generated (and numbered) forms

  23. Data entry using prerecorded data • Data entry of turnaround documents, particularly if they are machine readable, is less prone to error. UPC codes at the grocery store are an example, as is a magnetically encoded remittance advice. • In addition, when an item (a remittance advice or an item at the grocery store) are scanned in, some display containing reconcilable information is typically provided. Further minimizing the potential for erroneous data entry.

  24. Edit checks • When data are entered, the data codes frequently contain a check digit that makes sure that the data were entered (and stored) correctly. • When the number 42306 is stored in a database, an additional digit might be added to the end - 6. 4+2+3+0+6=15, and 1+5=6, so the number would be stored as 432066 (this is an intuitive analogy to what is actually happening). • This can be used for any data, since any data can be converted to a numeric value (we call the code ASCII). • Also, we do “reasonableness” checks on the data - amount sizes, formats, etc.

  25. Batch processing controls • Batch totals • Record counts and line counts • Document counts • Dollar totals (the total of Cash Receipts) • Hash totals (like an edit check) • Sequence checks • Written approvals

  26. Access controls • We need to limit access to our access data. We do this 3 ways: • Limit physical access: only networked computers can access the system. • Limit individual’s access using passwords • Prohibit direct access to the files (require that all file access be through software that leaves an audit trail). • You should never be able to delete journal entries!

  27. Computer generated forms • Whenever documents such as purchase orders or sales orders or invoices are computerized… • The numbering system is protected. Individuals cannot manipulate the numbering system. • Whatever information is on the document is in the database (by construction). • Reconciliation is easier. • Copies can be printed out for a permanent record.

  28. ERPs • Enterprise Resource Planning systems (ERPs) are the current technological frontier. They are basically a database that encompasses most or all of the organization’s information storage and processing. • Indiana University uses such a system from a vendor called PeopleSoft. Other notable vendors are SAP and Oracle. OneStart is the student and faculty interface for this system. Your grades and my paycheck are both generated from this software package. • ERPs are quite powerful tools, but they have their own control issues.

  29. ERPs • Employee buy-in and training are essential. • There is only one system and it is BIG. • Since everything is in this one system, if someone were to find a way to compromise the system (get in where they are unauthorized), they would have unbelievable power to steal or do damage. • The system is so big that it is impossible for most managers (or auditors) to really understand how it works.

More Related