Philippine Auditing Practices Statements (PAPS) 1009 Computer Assisted Audit Techniques
Philippine Auditing Practices Statements (PAPS) 1009 Computer Assisted Audit Techniques
Philippine Auditing Practices Statements (PAPS) 1009 Computer Assisted Audit Techniques
Mc Joshua De Lima
Bsa 4 BCOMP 5
Introduction
In Computer information system, the objective of the Auditor do not primarily change, as
well as its scope. Regardless of the information system used by the entity, it can be manual or
computerized. However, the methods implemented by the Auditor in testing the control may also
be affected by the use of computer. The processing and storage of financial information may
affect the organization and procedures used by the entity to achieve adequate internal control.
In testing the reliability of general controls includes observing the clients personnel in
performing their assign task, checking the program documentation and testing the security
measures. in testing Application controls, the Auditor may either audit around the computer or
use the Computer Assisted Audit Techniques or (CAATs).
The Computer Assisted Audit Techniques or (CAATs) are computer programs and data
which the used as part of the audit procedures in able to process data on audit significance
contained in an entity’s information system. In computerized accounting systems, if there is no
visible evidence that is available that can be perform, it may be impracticable for the auditor to
test it manually. Also when the entity used advance computer information system. The auditor
will have to audit directly the clients computer program using CAATs. This is also called White
Box Approach. Compute assisted audit techniques are computer programs and data that the
auditor may use in performing various audit procedure. It can be tests of details of transactions
and balances, analytical review procedures, test o general and application controls, sampling
programs to extract data for audit testing and reperforming of calculation performed by the
entity’s accounting system. One of the common type of CAAT is the use of audit software to
process data of audit significance from the entity’s information system. An audit software that
has widespread popularity because it is easy to use and require little computer background on the
part of the auditor. CAATs includes the following in performing auditing procedures.
Test Details
Analytical procedure
Sampling programs
Test of controls
Recalculations
Reperformance
In determining whether to use CAATs, the auditor must consider the following:
Availability of sufficient IT knowledge, skills and expertise and experience of the members
of the audit team to execute, plan and use the result of the particular CAAT.
Impact on effectiveness and efficiency for example it may be more efficient to extract data
from the entity’s record using a software than do it manually
Time constraints must also be consider because of the availability of data when the auditor
need those data. If certain data are kept only for a short period of time, the auditor may
need to alter the timing of the performance of CAAT that requires such time.
Using CAATs
understand the relation between the data tables where a database is to to be examined
defined the specific tests or procedures and related transactions and balances affected
arrange with the user and IT departments, if appropriate, for example, for copies of the
relevant files or database tables to be made at appropriate cut off date and time
identify the personnel who may participate in the design and application of the CAAT
ensure that the use of the CAAT is properly controlled and documented
arrange the administrative activities, including the necessary skills and computer facilities
reconcile data to be used for the CAAT with the accounting reccords
The effectiveness of certain CAATS particularly the audit software may increase due to the
result of greater emphasis in test detail of transactions and balances to analytical
procedure. Thus, the level of general controls may be less reliance on the system of
internal control.
Manual methods can be more effective when smaller volume of data are to be process.
Smaller entity may not be able to provide enough technical assistance to the auditor, making
the use of CAATs not practicable.
Restricting the auditor choice of CAATs because certain audit package or audit software may
not operate on small computer. Some of the data file may be copied and process on
another suitable computer.
One of the common type of CAAT is the use of audit software to process data of audit
significance from the entity’s information system. An audit software that has widespread
popularity because it is easy to use and require little computer background on the part of the
auditor. it can be used on both mainframes and PC systems, it allows the auditor to perform
his/her test independent of the entity’s computer processing personnel. This audit software is
designed to perform common audit tasks such as reading data files, selecting and analyzing
information, summarizing and totaling files, performing or verifying calculation, creating data
files, providing totals of unusual items and reporting in an auditor specified format.
. These test follow two general approaches: The Black Box: Testing around the computer -
auditors performing black box testing do not rely on a detailed knowledge of the application’s
internal logic. They seek to understand the functional characteristics of the application by
analyzing flowcharts and interviewing knowledgeable personnel in the client’s organization. The
auditor tests the application by reconciling production input transactions processed by the
application with output results. The advantage of the black box approach is that the application
need not be removed from service and tested directly. And The White Box. Testing through the
computer - relies on an in-depth understanding of the internal logic of the application being
tested. Several techniques for testing application logic directly are included. This approach uses
small numbers of specially created test transactions to verify specific aspects of an application’s
logic and controls. Auditors are able to conduct precise tests, with known variables, and obtain
results that they can compare against objectively calculated results.
Computerized assisted audit techniques or computer assisted audit tools and techniques is a
increasing field within the environment of the IT profession. CAATs is the method of using
computer to automate the IT audit process. Computer assisted audit techniques also includes the
use of basic office productivity software such as spreadsheet, word processors and text editing
programs and many more advance software packages using statistical analysis and business
intelligence tools but also more dedicated specialized software are available CAATs are computer
programs and data which the auditor uses as part of the audit procedures to process data of audit
significance contained in an entity information system. some of the commonly used CAATs
include Test data, Integrated test facility and Parallel Stimulation.
Continuous audit or a detailed audit is an audit which involves a detailed examination of books of
account at regular intervals i.e. one month or three months. The auditor visits clients at regular
intervals during the financial year and checks each and every transaction. At the end of the year
auditor checks the profit and loss account and the balance sheet. A continuous audit is not of much
use to small firm as its accounts can be audited at the end of the financial year without much loss
of time.
Introduction
The continued evolution of technology, the economics of the internet, and the growth of e-
commerce are significantly affecting the traditional business environment. E-commerce is
changing the competitive market and making international trading viable for a much larger
number of businesses. The electronic commerce (E-Commerce) represents one of the challenges,
which faces both accountants and auditors, since many organizations have changed to adapt E-
commerce. Some popular companies have engaged in e-commerce such as Amazon and eBay. E-
commerce, or e-business, via the internet is now bringing fundamental changes to the way
business is conducted. However, in the midst of these changes in the business environment, the
auditor's responsibility to provide an opinion on the financial report has remained unchanged.
Usually, management will identify e-commerce business risks, and address those risks with
appropriate security and control measures. In contrast, the auditor will consider e-commerce
business risks only in so far as they affect audit risk. Audit risk relates to the risk that the entity's
financial report (on which the auditor provides an audit report) is materially misstated. Although
communication and transactions over networks and through computers are not new features of
the business environment, the increasing use of the internet for e-commerce introduces new
variables of risk and control requiring audit consideration. When transactions are initiated by
unknown parties on the internet, there are risks relating to the authenticity and integrity of
trading partners and e-commerce transactions.
The complexity of the entity’s e-commerce activities will be different depends on the the level
of skills and knowledge required to understand the effect of e-commerce. When e-commerce has
a significant effect on the entity’s business, appropriate levels of both information technology
(IT) and Internet business knowledge may be required to
A. Understand, so far as they may affect the financial statements: The entity’s e-commerce
strategy and activities; The technology used to facilitate such activities; and The risks involved in
the entity’s use of e-commerce and entity’s approach to managing those risks.
B. Determine the nature, timing and extent of audit procedures and evaluate audit evidence; and
C. Consider the effect of the entity’s dependence on e-commerce activities on its ability to continue
as a going concern.
The knowledge of the auditor of the business is important when it comes to assessing the
significance of e-commerce to the business activities of the entity and its effects of the audit risk.
This new development carries risks, which may not be identified in their early stages. Therefore,
as the auditor reconsiders the impact of e-commerce in each new reporting period, the audit
profession must remain aware of the potential impact of evolving internet technology and
emerging standards of industry practice on audit procedures.
Risk Identification
We all know that E-commerce provides many benefits to consumers, such as convenience,
greater choice, lower prices, and more information, but there are also a number of barriers
restricting its potential to grow. These are the following
Being involve in internet based electronic commercial process makes the entity prone to
different illegal activities that can harm our system. it also make us vulnerable to international or
non international attacks. the implementation of internal controls system is very important for the
management to have and inherent risk to inter organizational systems that support electronic
transaction.
PSA 315 states that internal control is designed and implemented to achieve the entity’s
objectives with regard to: Reliability of financial reporting; Effectiveness and efficiency of
operations; and Compliance with applicable laws and regulations.
Electronic records may be more easily altered than paper records without leaving evidence of
such alteration when security controls are inadequate to prevent unauthorized changes to the
accounting system or records. Auditors should consider the need to perform procedures
depending on the assessment of the controls.
1.Inquiries of management and of others within the entity who, in the auditor’s judgment, may
have information that is likely to assist in identifying risks of material misstatement due to fraud
or error.
1. Identifying IT Risks
The Application may not run due to wrong implications run, incorrect version use or wrong
configuration entered by the employee of staff.
An authorized use of the the system of the entity may result to corruption od data or loss of
important files such as financial documents.
Wrong priorities may be given to jobs because of disruption and delay in processing.
Lack of back ups and contingency planning increases the risks of being unable to processing.
2. Identifying IT Controls
IT Controls in a computer system are all the manual and programmed methods, policies and
procedures that ensure the protection of the entity’s assets, the accuracy and reliability of its
records, and the operational adherence to the management standards. Presence of controls in a
computerized system is significant from the audit point of view as these systems may allow
duplication of input or processing, conceal or make invisible some of the processes, and in some
of the auditee organizations where the computer systems are operated by third party service
providers employing their own standards and controls, making these systems vulnerable to
remote and unauthorized access.
3. Documenting IT Controls
The auditors must identify the IT controls before documenting them, as well as considering the
relevant objectives and risk of it to the entity and process level. The control must reduce the risk
to an acceptable level but must not have excessive cost. Controls may be identified at any level
of the organization. Here are the 5 COSO components.
Control environment
Risk assessment
Control activities
Monitoring