Free Essay

Controls for Information Technology and Reporting and Evaluation

In:

Submitted By JValek09
Words 507
Pages 3
Controls for Information Technology (IT) and Reporting and Evaluation
Jami L. Valek
ACC-544
January 28, 2013
Christine Errico

Controls for Information Technology (IT) and Reporting and Evaluation
Information Technology (IT) controls are activities that are specifically performed to ensure that business objectives are met through the use of people and systems. IT control objectives are related to the business enterprise’s confidentiality, integrity, availability of data, and the overall management of the IT functions. There are two types of IT controls: IT general controls, which are controls over the IT environment, computer operations, access to programs and data, program development and program changes; and IT application controls, which refer to transaction processing controls (“Information Technology Controls”, 2013).
IT General Controls are the foundation of a company’s IT control structure. With IT General Controls, data that is generated can be deemed more reliable and assertion that systems are operating as intended is supported. IT General Controls usually include controls that are designed to: * Shape the corporate environment through control environment; * Ensure that changes are authorized and meet business requirements through changes in management procedures; * Protect the integrity of program controls through source code/document version controls procedures; * Ensure effective management of IT projects through software development life cycle standards; * Manage access based upon business needs through logical access policies, standards and processes; * Address operational processing errors through incident management policies and procedures; * Identify and address operational processing errors through problem management policies and procedures; * Policies that help users to perform more efficiently and report issues through technical support policies and procedures; * Hardware/software configuration, installation, testing, management standards, policies and procedures; * Enable continued processing through disaster recovery/backup and recovery procedures; and * Ensure the physical security from individuals and environmental risks through physical security (“Information Technology Controls”, 2013).
IT Application Controls are designed to ensure that the fully automated systems are complete and accurate when they are processing the data stages from input to output. The controls will vary based upon the purpose of the specified applications determined by the business. IT Application Controls usually include controls that ensure: * All records were processed from initiation to completion through a completeness check; * Only valid data is input or processed through validity checks; * All users are uniquely and irrefutably identified through identification; * Provide an authentication mechanism in the application system through authentication; * Only approved business users have access to the application system through authorization; * Data integrity fed from upstream sources into the application system through the input controls; and * Data is scientifically correct and mathematically correct based on the inputs and outputs through forensic controls (“Information Technology Controls”, 2013).
Through Information Technology (IT) Controls, the company can maintain that their records are reliable and relevant through assessing the personnel and systems that are in place. When the appropriate controls are in place, a company can make sure that the systems are supplying the correct information to the appropriate parties that can be used to influence management’s decisions.

References

Information Technology Controls. (2013). Retrieved from http://en.wikipedia.org/wiki/ Information_technology_controls

Similar Documents

Premium Essay

Controls for Information Technology and Reporting and Evaluation

...Controls for Information Technology and Reporting and Evaluation April Keller ACC/544 Instructor: September 11th, 2009 Controls for Information Technology The success of a business is determined by how effective its managers are in managing risk. Therefore, acquiring effective risk management helps to protect the company from losses because of poor accounting practices as well as fraudulent activities. Using good controls protect managers from liabilities that may arise when certifying financial statements used in annual reports because when these reports are issued, they are also a reflection of the company’s internal controls. The internal control process begins with management and the attitude that management portrays through the company. Manager duties include implementing the policies and procedures used within the company, these policies and procedures are also used to build the structure which is found within the internal control environment. Internal Control Reporting Options An audit report has three general functions used to report a company’s financial statements. These reports indicate whether the financial statements are presented in conformity with generally accepted accounting principles. Auditors use their reports to highlight any unusual aspects of the audit examination, and the reports can be used to communicate useful information to decision makers that may not appear on the face of the financial statements. Internal reporting...

Words: 730 - Pages: 3

Premium Essay

Controls for Information Technology and Reporting and Evaluation

...Controls for Information Technology The success of a business is determined by how effective its managers are in managing risk. Therefore, acquiring effective risk management helps to protect the company from losses because of poor accounting practices as well as fraudulent activities. Using good controls protect managers from liabilities that may arise when certifying financial statements used in annual reports because when these reports are issued, they are also a reflection of the company’s internal controls. The internal control process begins with management and the attitude that management portrays through the company. Manager duties include implementing the policies and procedures used within the company, these policies and procedures are also used to build the structure which is found within the internal control environment. Internal Control Reporting Options An audit report has three general functions used to report a company’s financial statements. These reports indicate whether the financial statements are presented in conformity with generally accepted accounting principles. Auditors use their reports to highlight any unusual aspects of the audit examination, and the reports can be used to communicate useful information to decision makers that may not appear on the face of the financial statements. Internal reporting options are important in keeping regulators, investors, and employees informed, and the format should be understandable for managers...

Words: 663 - Pages: 3

Premium Essay

Pa2 Blueprint

............................................................................................................. 2 Prerequisite Courses for the PA2 Examination .................................................................................................. 3 Competency Weightings ....................................................................................................................................... 3 Structure of the Examination ................................................................................................................................ 5 Examination Competency Coverage ..................................................................................................................... 6 Scoring Model and Evaluation of Candidate Performance ................................................................................... 6 ©CGA-Canada, 2011 1 CGA-Canada PA2 Examination Blueprint 2011/2012 PA2: Strategic Financial Management Examination Blueprint 2010/2011 About the Examination Blueprint The PA2: Strategic Financial Management examination has been constructed using an examination blueprint — a widely accepted tool used...

Words: 4762 - Pages: 20

Premium Essay

Pa1 Blueprint

........................................................................................................ 2 Prerequisite Courses for the PA1 Examination .................................................................................................. 3 Competency Weightings ....................................................................................................................................... 3 Structure of the Examination ................................................................................................................................ 5 Examination Competency Coverage ..................................................................................................................... 6 Scoring Model and Evaluation of Candidate Performance ................................................................................... 6 ©CGA-Canada, 2014 1 CGA-Canada PA1 Examination Blueprint 2014/2015 PA1: Issues in Professional Practice Examination Blueprint About the Examination Blueprint The PA1: Issues in Professional Practice examination has been constructed using an examination blueprint — a widely...

Words: 4745 - Pages: 19

Premium Essay

Controls Tech

...Controls for InformationTechnology and Reporting and Evaluation Julie Strange University of Phoenix ACC/544 Internal Control Systems Christina Yang October 24, 2011 Controls for Information Technology The success of a business is determined by how effective its managers are in managing risk.   Therefore, acquiring effective risk management helps to protect the company from losses because of poor accounting practices as well as fraudulent activities.   Using good controls protect managers from liabilities that may arise when certifying financial statements used in annual reports because when these reports are issued, they are also a reflection of the company’s internal controls.   The internal control process begins with management and the attitude that management portrays through the company.   Manager duties include implementing the policies and procedures used within the company, these policies and procedures are also used to build the structure which is found within the internal control environment.   Internal Control Reporting Options An audit report has three general functions used to report a company’s financial statements.   These reports indicate whether the financial statements are presented in conformity with generally accepted accounting principles.   Auditors use their reports to highlight any unusual aspects of the audit examination, and the reports can be used to communicate useful information to decision makers that may...

Words: 747 - Pages: 3

Premium Essay

Au2 Blueprint

...Advanced External Auditing [AU2] Examination Blueprint 2013/2014 Purpose The Advanced External Auditing [AU2] examination has been constructed using an examination blueprint. The blueprint, also referred to as the test specifications, outlines the content areas covered on the examination and the weighting allotted to each content area. This document also lists the topics, the level of competence for each topic, and the related learning objectives and competencies. The learning objectives have been designed to ensure that the competencies are met. In addition, information is provided on the proportion of each question type presented in the examination (that is, multiple choice, quantitative problems, and so on). Use Candidates should use the examination blueprint to prepare for the course examination. The blueprint may not include all the topics listed in the course materials; however, candidates are still responsible for acquiring a broad-based knowledge of all topics not listed in the blueprint since these topics will be tested in assignment and review questions. The topics not listed in the blueprint will also provide candidates with a greater depth of understanding of auditing concepts. Examination Objectives The objective of the 4-hour comprehensive examination is to test CGA candidates on the prerequisite knowledge required for advancement into PA1 and PA2, so as to ensure that the candidates have the broad-based knowledge in assurance needed to function properly in the association’s...

Words: 7165 - Pages: 29

Premium Essay

Enterprise Risk Management

...involved in global bribery and required all companies to implement internal control systems. In 1985, in response to these reforms 5 major private sector accounting associations together created The Committee Of Sponsoring Organizations, also referred to as COSO, to help sponsor the National Commission on Fraudulent Financial Reporting (Treadway Commission). The 5 associations included the American Institute of Certified Public Accountants, American Accounting Association, Financial Executives International, Institute of Internal Auditors and the Institute of Management Accountants. The original chairman of COSO was James Treadway, which led to it being referred to as the Treadway Commission. This association was formed to inspect, analyze and make recommendations of fraudulent corporate financial reporting. Today this association is dedicated to providing thought leadership through the development of frameworks and guidance on enterprise risk management, internal control and fraud deterrence. COSO offers 5 key components to the Internal Control Framework: Control Environment, Risk Assessment, Control Activities, Information and Communication, and Monitoring. Control Environment basically sets the groundwork for an organization by directly influencing the employees directly. This also is the foundation for all the other factors of Internal Control by providing discipline and structure. The control environment factors include delegation of authority systems, ethical...

Words: 1831 - Pages: 8

Premium Essay

Acc544 Syllabus

...[pic] |Course Syllabus School of Business ACC/544 Internal Control Systems | |Copyright © 2010, 2009, 2008 by University of Phoenix. All rights reserved. Course Description In this course, students gain a broad perspective of accounting and control that considers attainment of all goals of the organization, including those concerned with financial objectives. Topics include an overview of control, risk management, internal control systems, controls for current asset functions, controls for other accounting classifications, controls for information technology systems, and reporting on controls. Policies Students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Louwers, T. J., Ramsay, R., Sinason, D., & Strawser, J. (2007). Auditing and assurance services: A look beneath the surface (2nd ed.). New York, NY: McGraw-Hill. McCarthy, M. P. & Flynn, T. P. (2004). Risk from the CEO and board perspective: What all managers...

Words: 1676 - Pages: 7

Premium Essay

Dvanced External Auditing [Au2] Examination Blueprint 2013/2014

...Advanced External Auditing [AU2] Examination Blueprint 2013/2014 Purpose The Advanced External Auditing [AU2] examination has been constructed using an examination blueprint. The blueprint, also referred to as the test specifications, outlines the content areas covered on the examination and the weighting allotted to each content area. This document also lists the topics, the level of competence for each topic, and the related learning objectives and competencies. The learning objectives have been designed to ensure that the competencies are met. In addition, information is provided on the proportion of each question type presented in the examination (that is, multiple choice, quantitative problems, and so on). Use Candidates should use the examination blueprint to prepare for the course examination. The blueprint may not include all the topics listed in the course materials; however, candidates are still responsible for acquiring a broad-based knowledge of all topics not listed in the blueprint since these topics will be tested in assignment and review questions. The topics not listed in the blueprint will also provide candidates with a greater depth of understanding of auditing concepts. Examination Objectives The objective of the 4-hour comprehensive examination is to test CGA candidates on the prerequisite knowledge required for advancement into PA1 and PA2, so as to ensure that the candidates have the broad-based knowledge in assurance needed to function properly in the association’s...

Words: 7165 - Pages: 29

Premium Essay

Zou's Fencing Controls

...always evaluate the design and test the operating effectiveness of a company’s internal control. The key procedures of the evaluation of design are fulfilled by inquires, observations, and inspections. The same procedures can be used to test the operating effectiveness as well. Re-performance of controls is another method to test the operating effectiveness depending on different situations. Some of the key considerations related to the evaluation of design and the testing of operating effectiveness are summarized as follows: Information technology considerations Auditors should understand a company’s information technology (IT), including the system-generated data and reports, which are required by PCAOB. When assessing a company’s risk of material misstatement, auditors should pay great attention towards both manual and automated controls equipped by the company. Auditors should identify the control activities from the internal IT system performed by management. Just like the case stated, when testing the risk #1 and #2, auditors use the company’s manual or automated IT controls. This obviously requires auditors to obtain enough understandings over ZOU’s IT system. Auditors use the knowledge to identify the preventive and detective controls, which helps to evaluate the design. Information technology general controls (ITGC) are important aspects of a company’s manual or automated controls. The effectiveness of a...

Words: 1930 - Pages: 8

Premium Essay

Accounting Information Systems Research Paper

...Accounting Information Systems Research Paper Abstract The Sarbanes-Oxley Act of 2002 (SOX) was enacted into law in 2002 in the wake of corporation financial reporting scandals involving large publicly held companies. SOX instituted new strict financial regulations with the intent of improving accounting practices and protecting investors from corporate misconduct. SOX requires corporate executives to vouch for the accuracy of financial statements, and to institute and monitor effective internal controls over financial reporting. The cost of implementing an effective internal control structure are onerous, and SOX inflicts opportunity costs upon an enterprise as executives have become more risk adverse due to fears of incrimination. The Public Company Accounting Oversight Board (PCAOB) was created by SOX to oversee the accounting process and dictate independence requirements for auditors and auditing committees. The PCAOB proposed regulations must be approved by the SEC before they are enacted. Since the passage of SOX, the IT department has become critical in designing and implementing the internal controls in company accounting information systems. The Information Technology Governance Institute (ITGI) created a framework called Control Objectives for Information and Related Technology (COBIT) to provide guidance for companies to implement and monitor IT governance. Accounting Information Systems Research Paper The Sarbanes-Oxley Act of 2002 changed the...

Words: 3250 - Pages: 13

Premium Essay

Mini

...Auditing – is the accumulation and evaluation of evidence about information to determine and report on the degree of correspondence between the information and established criteria. Auditing should be done by a competent, independent person. * Information and established criteria * To do an audit, there must be information in a verifiable form and some standards by which the auditor can evaluate the information * Canada Revenue agency auditor – an auditor who works for the Canada Revenue Agency and conducts examinations of taxpayers’ returns * Accumulating and evaluating evidence * Evidence is defined as any information used by the auditor to determine whether the information being audited is stated in accordance with the established criteria * It is important to obtain sufficient quality and volume of evidence to satisfy the audit objectives * Competent, independent person * The auditor must be qualified to understand the criteria used and competent to know the types and amount of evidence to accumulate to reach the proper conclusion after the evidence has been examined * Independent auditors – a public accountant or accounting firm that performs audits of commercial and non-commercial entities * Internal auditors – an auditor employed by a company to audit for the company’s board of directors and management * Reporting * Auditor’s reporting – the communication of audit findings...

Words: 844 - Pages: 4

Premium Essay

Control Self Assessment

...Control Self-assessment for Information and Related Technology To ensure smooth functioning of an enterprise striving to achieve predetermined objectives, business processes are identified and defined. To ensure the proper completion of process work, procedures are defined, documented and established. Business procedures need to be properly controlled to ensure smooth completion. Out-of-control procedures are expensive; therefore, controls need to be in place. These controls can be preventive, detective and/or corrective in nature. However, the adequacy of controls over procedures depends on various factors, including a balance between costs incurred for implementing controls and the resulting benefits derived. Many controls are essential overheads for the business, and therefore, their effectiveness must be reviewed periodically. Internal audit of controls, an essential overhead, helps avoid relaxation on controls. Ultimately, the control overheads constitute a major expenditure item. Assurance that the controls are in place and effective is essential. This assurance can be given through control self-assessment (CSA), also referred to as control self-assurance. Systems and procedures for many business organizations within various sectors have evolved over time. For example, banking is the oldest service sector and the controls over banking procedures are essential not only for the bank, but also for society in general. Controls in banking procedures have also evolved over...

Words: 5755 - Pages: 24

Premium Essay

Accounting Information Systems Research Paper

...Accounting Information Systems Research Paper Abstract The Sarbanes-Oxley Act of 2002 (SOX) was enacted into law in 2002 in the wake of corporation financial reporting scandals involving large publicly held companies. SOX instituted new strict financial regulations with the intent of improving accounting practices and protecting investors from corporate misconduct. SOX requires corporate executives to vouch for the accuracy of financial statements, and to institute and monitor effective internal controls over financial reporting. The cost of implementing an effective internal control structure are onerous, and SOX inflicts opportunity costs upon an enterprise as executives have become more risk adverse due to fears of incrimination. The Public Company Accounting Oversight Board (PCAOB) was created by SOX to oversee the accounting process and dictate independence requirements for auditors and auditing committees. The PCAOB proposed regulations must be approved by the SEC before they are enacted. Since the passage of SOX, the IT department has become critical in designing and implementing the internal controls in company accounting information systems. The Information Technology Governance Institute (ITGI) created a framework called Control Objectives for Information and Related Technology (COBIT) to provide guidance for companies to implement and monitor IT governance. Accounting Information Systems Research Paper The Sarbanes-Oxley Act of 2002 changed the...

Words: 3250 - Pages: 13

Premium Essay

Internal Control Checklist

...for Evaluating Internal Controls ACC/544: Internal Control Systems Comprehensive Checklist for Evaluating Internal Controls As defined by the COSO framework, there are five elements that are used to explain an internal control system applied in an organization. These elements include: 1. Control Environment – The control environment is the foundation for the other four components of internal control. It outlines discipline and structure for the internal control method and consists of philosophy, ethical values, operating style, risk appetite, functioning of the board, and organizational structure (Louwers, Ramsay, Sinason, & Strawser, 2007). 2. Risk Assessment - This component evaluates the way in which an organization decides to handle the number of always-evolving external and internal risks. 3. Control Activities - This component seeks to ensure that the directives of management are carried out. These are computerized and manual and serve the purpose of preventing, detecting, and correcting errors (Louwers, Ramsay, Sinason, & Strawser, 2007). 4. Information and Communication – The information and communication component provide managers with the critical information necessary for achieving objectives. This component seeks to provide information that is timely, reliable, and relevant. 5. Monitoring – Assessing the quality of the established controls is essential to motivate continuous progress of the internal control method. |Yes...

Words: 866 - Pages: 4