Karl E. Dahlberg
New Jersey, ISACA
The Fourth Continuous Reporting and Auditing Conference
April 118th/19th, 2002
SalfordUniversity
Salford, England
Statement of Auditing Standard No. 94 The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement Audit
SAS 94 The Effect of Information Technology on the Auditor’s Consideration of Internal Control in a Financial Statement Audit
This amendment to SAS 55 provides guidance to auditors relative to information technology. Prior to this amendment, the SAS did not contain any IT guidance. Although the SAS makes no reference to continuous auditing, several of the requirements of SAS 94 appear to be best satisfied by use of continuous auditing techniques.
SAS 94 says an organization’s IT use may effect and of the five internal control components as well as how businesses initiate, record, process and report transactions. The SAS offers auditors some direction by pointing out these key aspects of the systems and controls on which organizations rely.
The purpose of this paper is to suggest specific points of SAS 94 where continuous auditing techniques can be applied. The CPA would then be able to perform a more efficient audit and satisfy the requirements of SAS 94. Generally, the “specific risks” identified by SAS 94 are areas that many CPAs have little familiarity. Continuous auditing techniques could be linked to these specific risks thereby creating a benefit to the CPA for employing continuous auditing.
Summary of Audit Process
Phase IPlan and design an audit approach
Preplan
Obtain background information
Obtain information about contractor’s legal obligations
Perform preliminary analytical procedures
Set materiality, and assess acceptable risk and inherent risk
Understand internal control and assess control risk
Develop overall audit plan and audit program
Phase IIPerform tests of controls and substantive tests of transactions
Plan to reduce assessed level of control risk? Yes/No
Perform tests of controls
Perform substantive tests of transactions
Assess likelihood of misstatements in financial statements
Phase IIIPerform analytical procedures and tests of details of balances
Perform analytical procedures
Perform tests of key items
Perform additional tests of details of balances
Phase IVComplete the audit and issue an audit report
- Review for contingent liabilities
- Review for subsequent events
- Accumulate final evidence
- Evaluate results
- Issue audit report
- Communicate with interested parties
SAS 94 Guidance
Obtaining an understanding of internal control
A sufficient understanding is obtained by performing procedures to understand the design of controls relevant to an audit of financial statement and determining whether they have been placed in operation. In planning the audit, such knowledge should be used to:
Identify types of potential misstatement.
Consider factors that affect the risk of material misstatement.
Design tests of controls, when applicable.
Design substantive tests.
Definition of “Information Technology”
Information technology (IT) encompasses automated means of originating, processing, storing, and communicating information, and includes recording devices, communication systems, computer systems (including hardware and software components and data), and other electronic devices.
Five interrelated components
Control environment
Risk assessment
Control activities
Information and communication systems support
Monitoring
Potential benefits
Consistently apply predefined business rules and perform complex calculations in processing large volumes of transactions and data.
Enhance the timeliness, availability, and accuracy of information.
Facilitate the additional analysis of information
Enhance the ability to monitor the performance of the entity’s activities and its policies and procedures.
Reduce the risk that controls will be circumvented.
Specific risks
- Reliance on systems or programs that are inaccurately processing data, processing inaccurate data, or both.
- Unauthorized access to data that may result in destruction of data or improper changes to data, including the recording of unauthorized or nonexistent transactions or inaccurate recording of transactions.
- Unauthorized changes to data in master files.
- Unauthorized changes to systems or programs.
- Failure to make necessary changes to systems or programs.
- Inappropriate manual intervention.
- Potential loss of data.
Page 1 of 4