Internal Control (Computerised Systems)
Internal Control (Computerised Systems)
Mobility
Computers & related telecommunication devices have become smaller, lighter & more flexible
Devices have advanced communication technology
Wifi
Bluetooth
LTE
Mobility + concentration of info that can be stored on mobile device resulted in risk of theft of
hardware
Risk of confidential info being transmitted electronically to unauthorised persons has increased
Open Source
Software that can be changed & amended by any user
Underlying programming code (source code) is available to anyone to review, change & distribute
This has reduced the cost of software
Improved functionality for companies that use open-source software
Increased risk of hackers identifying areas to exploit
Decreased risk as weakness on source code easily identifiable
Image Processing
Barcodes have become a universal tool to capture info
Limitation of needing barcode scanners to read them
Advancement in image processing technology and availability of devices with cameras
Any device can become an image code input device, finger print scanner etc
Potential to reduce data input errors
Convergence
Hardware devices have become more integrated & contain various wide ranging functionalities
Eg. iPad that can integrate a mobile device and a computer
Cloud Computing
Trend where companies store their data online/ operate applications are situated on the internet
Involves number of risks:
Disruption to operations if data is not available due to slow internet connection
Increases the chances of data being intercepted/lost during communication
Blockchain Technology
Incorruptible digital ledger of economic transactions
Can be programmed to record anything of value
Continuously growing list of records (blocks)
Linked & secured using cryptography
Each block contains:
cryptographic hash of previous block
A timestamp
Transaction data
Each new block of data is linked to previous block
Once recorded, data in block cannot be changed without changing previous blocks
Forms distributed ledger that can record transactions between 2 parties in a permanent manner
Good for recording:
Identity management
Transaction processing
Documenting origin
IT Governance
One of the principals in King IV
The governing body of an entity should set the direction for how technology & info
should be approached
by approving a policy which forms the foundation for the development of an IT
governance framework
that should support the effective & efficient management of IT
resources
Including implementation of a risk management system &
internal controls
To ensure that a company achieves its strategic objectives
The policy should include technological (human, finance, physical) & informational aspects of it
This represents a change from previous versions of King reports
The policy should integrate into the entire organisation & must be designed to improve
business processes
Advantages of implementation of good IT governance:
Company’s reputation is improved
Strategically aligned IT with business goals
Components
Hardware:
Consists of all physical electronic equipment & parts that make up a CIS (computer
information system)
Ranges from input devices to output & storage devices
Eg. Keyboards, scanners, printers etc.
Software
Includes all programmes that reside on any/all components of hardware
People
Interact with processing of transactions
Includes customers
Includes procedures that govern their behaviour
Procedures
Manual & automated
Instructions used to collect, process & store data about the organisation’s activities
Done through 4 stages of accounting system
Include strategies, policies, methods & rules for how, when & by whom the CIS is to
be used
Data
Includes all forms of data stored on hardware
General Controls
Defined as policies & procedures that relate to many applications & that support the
effective functioning of application controls
By helping ensure the continued proper operation of info systems
By ensuring that the control environment is stable & well managed
General IT controls commonly include controls over:
Data centre & network operations
System software acquisition, change & maintenance
Access security
Form the framework of overall control around the CIS
Relate to overall info processing environment
They impact all areas of operations & systems in the computer system
Support the appropriate functioning of application controls
Implemented before transactions can be processed
Implemented independently of the processing of transactions
Application Controls
Defined as manual/automated procedures that typically operate @.a business process/
application level
Can be preventative, detective & corrective
Designed to ensure integrity of the accounting records
Ensure data in the system is free from fraud/errors
ss
ss
General Controls:
Organisational controls
1. Responsibility delegation
• Computer Generating Committee (CGC) – manage IT , communication channel
between IT users and departments
• Chief Info Officer (CIO) – responsible for IT direction and communication with CGC
• IT manager – day to-day IT
2. Segmentation of duties
By segregation entity could mitigate risk of:
• Unauthorised or inaccurate transactions
• Staff adjusting records to cover up falsified entries
• Staff falsifying records to conceal theft
NB! IT should only be able to work on the computers and not have ability to
influence or change any transaction or statements
Should segregate between departments operations and security function
3. Staff Practices
• Policies
• Process and employing staff
• Staff scheduling and rotation of duties
• Ongoing training of staff
• Continuous evaluation of staff
• Staff dismissals and resignation
4. Supervision and Review
• High level review : management review financial performance periodically
compared to expectations
• Analytical reviews and ratios : relationships between data sets analysed for
deviations
• Recon of data on system with data from external source: info confirmed with another
set of info
• Independent review: unusual transactions identified for investigation
(d) Implementation
➡ Conversion to new system and transfer of all data from old one to new
one
➡ Conversion methods
➡ Parallel processing - both old and new run
➡ Direct shut down – old one shut down new one are
implemented
➡ Modular (phased) implementation – Old one phased out section
by section
Operational Controls
✤ Scheduling production runs and when processing takes place
✤ Setting standards for operating activities, maintenance and use of assets
✤ Maintaining logs and activity registers for use of software and hardware
✤ Ensuring library controls are in place to keep track of secure data, files, programs
and documentation.