1 / 47

Business Process and Application Controls

IS 630 : Accounting Information Systems http://www.csun.edu/~dn58412/IS630/IS630_F14.htm. Business Process and Application Controls. Lecture 5. Learning Objectives. Control Framework and Control Matrix. Preparing Control Matrix Review Control Plans. 2. Elements of Control Framework.

Download Presentation

Business Process and Application Controls

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IS 630 : Accounting Information Systems http://www.csun.edu/~dn58412/IS630/IS630_F14.htm Business Process and Application Controls Lecture 5

  2. Learning Objectives Control Framework and Control Matrix. Preparing Control Matrix Review Control Plans 2 IS 630 : Lecture 5

  3. Elements of Control Framework • Control matrix: tool designed to assist in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant control plans. • Establishes the criteria to be used in evaluating the controls in a particular business process. • Control goals: business process objectives that an internal control system is designed to achieve. • Control plans: reflect information-processing policies and procedures that assist in accomplishing control goals. IS 630 : Lecture 5

  4. Control Plans • Business process control plans are applied to a particular business process, such as billing or cash receipts. • Application controls are automated business process controls contained within IT application systems (i.e., computer programs). IS 630 : Lecture 5

  5. SuprinaAnnotated Systems Flowchart IS 630 : Lecture 5

  6. SuprinaControl Matrix • Cf. (Fig 9-1) • Four elements of the control matrix • control goals • recommend control plans • cell entries • explanation of cell entries IS 630 : Lecture 5 6

  7. Control Matrix Explanations IS 630 : Lecture 5

  8. Control Matrix for Suprina Order Entry Process Control Goals IS 630 : Lecture 5

  9. Control Matrix for SuprinaOrder Entry Process Control Plans IS 630 : Lecture 5

  10. Business Process Control Goals • Control goals of the operations processes • Ensure effectiveness of operations • Ensure efficient employment of resources • Ensure security of resources • Control goals of the information processes • For business event inputs, ensure • Input validity, input completeness, input accuracy • For master data, ensure • Update completeness, update accuracy IS 630 : Lecture 5

  11. Steps in Preparing a Control Matrix - 1 STEP I: SPECIFY CONTROL GOALS. • Identify the Operations Process Control Goals • Effectiveness goals • Efficiency goals • Security goals • Identify Information Process Control Goals • Input Goals • Update Goals IS 630 : Lecture 5

  12. Control Goals of Operations Processes IS 630 : Lecture 5

  13. Operations Process Control Goals: Effectiveness Goals Describe measures of success for the operations process that are developed during an enterprise’s risk-management process. Different processes have different effectiveness goals. For the Suprina order entry process two examples are: A: Provide timely acknowledgement of customer orders. B: Provide assurance of customer’s creditworthiness. IS 630 : Lecture 5

  14. Operations Process Control Goals: Efficiency Goals Ensure that all resources used throughout the business process are being employed in the most productive manner. For the Suprina order entry process, and for all accounting information systems, people and computers should always be included in the efficiency assessment. For other business processes, such as receiving goods and supplies, efficiency goals include the productive use of equipment. IS 630 : Lecture 5

  15. Operations Process Control Goals: Security Goals Protect entity resources from loss, destruction, disclosure, copying, sale, or other misuse. Two resources of the order entry process over which security must be ensured are inventory and information (customer master data). With any business process, we are concerned with information that is added, changed, or deleted as a result of executing the process, and assets that are brought into or taken out of the organization as a result of the process. IS 630 : Lecture 5

  16. Control Goals of Information Processes IS 630 : Lecture 5

  17. Information Process Control Goals: Input Goals With respect to all business process data (e.g., customer orders) entering the system, ensure: input validity (IV) input completeness (IC) input accuracy (IA) The input data is specifically named. With respect to other business processes, such as hiring employees, concern would be with other inputs, such as employee, payroll, and benefit plan data. IS 630 : Lecture 5

  18. Information Process Control Goals: Update Goals For the business process input data ensure: Update completeness (UC) Update accuracy (UA) Update goals apply only when there is a periodic process. Applicable master data are listed on the control matrix. Other business processes would involve different master data, such as vendor, payroll, or accounts payable master data. IS 630 : Lecture 5

  19. Steps in Preparing a Control Matrix - 2 STEP 2 : IDENTIFY RECOMMENDED CONTROL PLANS • Identify “Present” control plans and annotate on the systems flowchart • Evaluate “Present” Control Plans • Identify and Evaluate “Missing” Control Plans IS 630 : Lecture 5

  20. Identify Present Control Plans Start in the upper left-hand column of the systems flowchart and identify controls that seem to accomplish one or more control goals. Each process symbol should be associated with one or more controls. Some controls, such as document design, are not directly associated with process symbols. Follow the sequential logic of the systems flowchart and identify all present controls. IS 630 : Lecture 5

  21. Annotate Present Control Plans When a control appears on a flowchart, the control plan is present as opposed to missing. Place a P- beside the control, indicating that is it present, and a 1 beside the P- reflecting the first present control plan on the flowchart. Continue reviewing the systems flowchart by following its sequential logic, annotating the flowchart with P-2, P-3, and so on until all present control plans have been accounted for. IS 630 : Lecture 5

  22. Evaluate “Present” Control Plans Write numbers (P-1, P-2, P-3 through P-n) and name of each control plan in the left-hand column of the control matrix. For each present control plan, look across the row and determine which control goals the plan addresses. Place a P-n (e.g., P-1) in each cell of the matrix for which the control is applicable. Simultaneously, in the section below the matrix, describe how the control plan addresses each noted control goal. IS 630 : Lecture 5

  23. Identify and Evaluate “Missing” Control Plans Determine if additional controls are needed to address missing control goal areas, strengthen present control plans, or both. In the left-hand column of the matrix, number the first missing control plan as M-1 and label the plan. Place M-1 in each cell in the matrix row for which the missing control is designed. In the section below the matrix, explain how the missing control will address each noted control goal. Annotate M-1 on the systems flowchart where the control should be inserted. IS 630 : Lecture 5

  24. Identify and Evaluate “Missing” Control Plans . . . Examine the control matrix: If there are still control goals for which there is no control plan, develop plan (e.g., M-2) and repeat the steps. Continue until each control goal on the matrix is addressed by at least one control plan. Analyze the systems flowchart for further risk exposures Look for areas where further controls are needed. Control plans might need to be added or existing plans might need to be strengthened to reduce residual risk to an acceptable level. Training and experience are required to identify these risks and weaknesses. IS 630 : Lecture 5

  25. Systems Flowchart: Manual And Automated Data Entry IS 630 : Lecture 5 25

  26. Control Matrix for Manual and Automated Data Entry IS 630 : Lecture 5 26

  27. Control Plans for Manual and Automated Data Input P-1: Document design: source document is designed to make it easier to prepare the document initially and later to input data from the document into a computer or other input device. P-2: Written approvals: signature or initials on a document to indicate that someone has authorized the event. Ensures that the data input arises from a valid business event and that appropriate authorizations have been obtained. Electronic approvals: business events are routed, using a computer system’s workflow facility, to persons authorized to approve the event. IS 630 : Lecture 5

  28. Control Plans for Manual and Automated Data Input . . . P-3: Preformatted screens: define acceptable format of each data field; provide drop-down lists of data that are acceptable for a given field; cursor may automatically move to the next field on the screen; require that certain fields be completed; automatically populate certain fields with data. P-4: Online prompting: request user input or ask questions that the user must answer; also context-sensitive help. P-5: Populate input screens with master data: clerk enters identification code for an entity and system retrieves data about that entity from the master data. IS 630 : Lecture 5

  29. Control Plans for Manual and Automated Data Input . . . P-6: Compare input data with master data: comparisons performed manually or by the computer to determine the accuracy and validity of input data. Includes: Input/master data match. Input/master data dependency check. Input/master data validity and accuracy check. P-7: Procedures for rejected Inputs: ensure that erroneous data (i.e., data not accepted for processing) are corrected and resubmitted for processing. IS 630 : Lecture 5

  30. Control Plans for Manual and Automated Data Input . . . P-8: Programmed edit checks: automatically performed by data entry programs upon entry of the input data to highlight actual or potential input errors and allow them to be corrected quickly and efficiently. Includes: Limit checks: test whether the contents (e.g., values) of the data entered fall within predetermined limits. Reasonableness checks: compares entered data with a calculated amount (not a predetermined amount) to discover inputs that may be incorrect. IS 630 : Lecture 5

  31. Control Plans for Manual and Automated Data Input . . . P-8: Programmed edit checks (cont’d): Document/record hash totals: summarization of any numeric data field within the input document or record. Calculated before and then again after entry of the document or record, this total can be used to determine that the applicable fields were entered accurately. Mathematical accuracy checks: compare calculations performed manually to those performed by the computer to determine whether a document has been entered correctly. Check digit: an extra digit added to the identification number of entities such as customers and vendors to detect those numbers that have been input incorrectly. IS 630 : Lecture 5

  32. Control Plans for Manual and Automated Data Input . . . P-9: Confirm input acceptance: data entry program informs the user that the input has been accepted for processing. P-10: Automated data entry: strategy for the capture and entry of event-related data using technology such as OCR, bar codes, RFID, and EDI. IS 630 : Lecture 5

  33. Control Plans for Manual and Automated Data Input . . . P-11: Enter data close to the originating source: strategy for the capture and entry of event-related data close to the place and time that an event occurs. P-12: Digital signatures: validates the identity of the sender and the integrity of an electronic message to reduce the risk that a communication was sent by an unauthorized system or user or was intercepted or modified in transit. IS 630 : Lecture 5

  34. Data Entry With Batches Collecting inputs into “batches”; batched inputs are then entered into system as a group. Results in some delay between the business event and its reflection in the system. Allows for controls for the batch, e.g., batch control totals. Exception and summary report: report of the events—either in detail, summary, or both—that were accepted or rejected by the system. Batch control plans: regulate processing by calculating control totals at various points in a processing run and subsequently comparing these totals. IS 630 : Lecture 5

  35. Batch Control Plans To be effective, batch control plans should ensure that: All documents are included in the batch. All batches are submitted for processing. All batches are accepted by the computer. All differences are disclosed, investigated and corrected on a timely basis. Batch control procedures start by grouping event data and calculating totals for the group. IS 630 : Lecture 5

  36. Batch Control Plans . . . Document/record counts: Simple count of the number of documents entered in a batch. Minimum level required to control input completeness (i.e., input the document once). Item or line counts: counts of number of items or lines entered, such as a count of the number of different items on a sales document. Improves input validity, completeness, and accuracy by reducing the possibility that line items or entire documents could be added to the batch or not be input. IS 630 : Lecture 5

  37. Batch Control Plans . . . Dollar totals: sum of dollar value of items in batch. By reducing the possibility that entire documents could be added to or lost from the batch or that dollar amounts were incorrectly input, this control improves input validity, completeness, and accuracy. Hash totals: sum of any numeric data existing for all documents in the batch, such as a total of customer numbers or purchase order numbers in the case of sales documents. Can determine if inputs have been altered, added, or deleted. IS 630 : Lecture 5

  38. Other Data Entry Control Plans Turnaround documents: document output by the computer used to capture and input a subsequent event. Key verification: input documents are keyed by one individual and then rekeyed by a second individual to detect keying errors. Sequence checks: applied to sequentially numbered and prenumbered documents to determine that all documents have been processed (completeness) and that no extra documents have been processed (completeness, if a duplicated document, or validity, if a bogus document). IS 630 : Lecture 5

  39. Other Data Entry Control Plans . . . Batch sequence check: event data within a batch are checked as follows: The range of serial numbers constituting the documents in the batch is entered. Each individual serially prenumbered document is entered. The computer program sorts the input documents into numerical order; checks the documents against the sequence number range; and reports missing, duplicate, and out-of-range data. IS 630 : Lecture 5

  40. Other Data Entry Control Plans . . . Cumulative sequence check: provides input control in those situations in which the serial numbers are assigned within the organization but are not entered in perfect serial number sequence. In this case, the matching of individual event data (picking ticket) numbers is made to a file that contains all document numbers (all sales order numbers). Periodically, reports of missing numbers are produced for manual follow-up. IS 630 : Lecture 5

  41. Other Data Entry Control Plans . . . Manual reconciliation of batch totals: One or more batch totals are established manually. As individual event descriptions are entered the data entry program accumulates independent batch totals. The computer produces reports (or displays) at the end of either the input process or the update process, or both. The report (or display) includes the relevant control totals that must be manually reconciled with the totals established prior to the particular process. The person who reconciles the batch total must determine why the totals do not agree and make corrections as necessary to ensure the integrity of the input data. IS 630 : Lecture 5

  42. Other Data Entry Control Plans . . . Computer agreement of batch totals: First, one or more of the batch totals are established Then the manually prepared total is entered into the computer and is written to the computer batch control totals data. As individual source documents are entered, a computer program accumulates independent batch totals and compares these totals to the ones prepared manually and entered at the start of the processing. The computer prepares a report, which usually contains details of each batch, together with an indication of whether the totals agreed or disagreed. IS 630 : Lecture 5

  43. Other Data Entry Control Plans . . . Agree run-to-run totals: reconciling totals prepared before a computer process has begun to totals prepared at the completion of the computer process. Tickler file: manual file of documents, or a computer file, that contains business event data that is pending further action. One-for-one checking: detailed comparison of the individual elements of two or more data sources to determine that they agree. IS 630 : Lecture 5

  44. System Flowchart :Data Entry with Batches IS 630 : Lecture 5

  45. Control Matrix for Data Entry with Batches IS 630 : Lecture 5

  46. Computer Agreement of Batch Totals IS 630 : Lecture 5

  47. Level of Assurance Provided by Internal Controls IS 630 : Lecture 5

More Related