1001 It Environments - Stand-Alone Personal Computers
1001 It Environments - Stand-Alone Personal Computers
1001 It Environments - Stand-Alone Personal Computers
PRACTICE NOTE
1001
IT ENVIRONMENTS - STAND-ALONE PERSONAL COMPUTERS
(Issued December 2003)
Contents Paragraphs
Introduction 1
The Effect of Stand-Alone PCs on the Accounting System and Related Internal Controls 21 - 26
PRACTICE NOTE
1001
IT ENVIRONMENTS - STAND-ALONE PERSONAL COMPUTERS
The purpose of Practice Notes issued by the Hong Kong Institute of Certified Public Accountants is to assist auditors in applying Statements of
Auditing Standards (SASs) and Standards on Assurance Engagements (SAEs) of general application to particular circumstances and industries.
They are persuasive rather than prescriptive. However they are indicative of good practice and have similar status to the explanatory material in
SASs and SAEs, even though they may be developed without the full process of consultation and exposure used for SASs and SAEs. Auditors
should be prepared to explain departures when called upon to do so.
Introduction
1. This Practice Note (PN) describes the effects of stand-alone PCs on the accounting system and related internal controls and on audit
procedures.
Stand-Alone PCs
2. PCs can be used to process accounting transactions and produce reports that are essential to the preparation of financial statements.
The PC may constitute the entire computer-based accounting system or merely a part of it.
3. Generally, information technology (IT) environments in which stand-alone PCs are used are somewhat different from other IT
environments. Certain controls and security measures that are used for large computer systems may not be practicable for PCs. In
contrast, certain types of internal controls become more important because of the characteristics of stand-alone PCs and the
environments in which they are used.
4. Stand-alone PCs can be operated by a single user or many users at different times accessing the same or different programs on the
same computer. The user of a stand-alone PC that processes accounting applications performs many functions (for example, entering
data and operating application programs). While typically not knowledgeable about programming, users may often use third-party or off-
the-shelf software packages such as electronic spreadsheets or database applications.
5. The organizational structure within which a stand-alone PC is used is important in assessing risks and the extent of the controls required
to mitigate those risks. For example monitoring controls employed by management may be the only effective controls for a purchased
software package used by a small business on a stand-alone PC apart from whatever controls are incorporated in the package itself. In
contrast, the effectiveness of controls relating to a stand-alone PC used within a larger organization may depend on an organizational
structure that clearly segregates responsibilities and restricts the use of the stand-alone PC to specific functions.
6. The control considerations and the characteristics of the hardware and software are different when a PC is linked to other computers.
Such situations often lead to increased risks. This PN does not address the auditors' consideration of network security and controls.
This PN is however relevant for PCs that are linked to another computer, but can also be used as stand-alone workstations. Many PCs
may be used interchangeably as part of a network or in stand-alone mode. When dealing with such PCs, the auditors consider the
additional risks encountered by access through a network as well as the guidance in this PN.
7. PCs are oriented to individual end-users. The degree of accuracy and reliability of financial information they produce will depend, in part,
on the internal controls that the user adopts either voluntarily or because management has prescribed them. The control procedures
implemented relate to the complexity of the business environment in which the PC operates. Ordinarily, the stand-alone PC environment
is less structured than a centrally controlled IT environment. In the former, users with only basic data processing skills can implement
application programs relatively quickly, triggering issues such as the adequacy of systems' documentation or access control procedures.
Such users may not regard controls over the application implementation process (for example, adequate documentation) and operations
(for example, access control procedures) as important or cost-effective. In such circumstances, because the financial information is
processed on a computer, users may tend to place unwarranted reliance on it.
8. In a typical stand-alone PC environment, the level of general controls is lower than what would be found in a large-scale computing
environment. Nevertheless, selected security and control procedures can help improve the overall level of internal control.
b. user training;
c. security, back-up and storage guidelines;
d. password management;
e. personal usage policies;
f. software acquisition and usage standards;
g. data protection standards;
h. program maintenance and technical support;
i. an appropriate level of segregation of duties and responsibilities; and
j. virus protection.
16. In some instances an access control package can provide effective control over the access to and use of operating systems, programs
and data. For example, only a specific user may have access to the password file or be allowed to install programs. Such packages can
also regularly examine programs on the PC to detect whether unauthorized programs or versions of programs are being used.
17. The use of removable storage media for critical and sensitive programs and data can provide enhanced protection by being kept off-line
and under independent control until required. For example, salary data in a payroll system may be kept off-line and used only when
required for payroll processing.
18. Removing programs and data from PCs with removable storage media (for example, diskettes, CDs and cartridges) is one effective way
to keep them secure. The media are then placed in the custody of the file librarians or the users responsible for the data or programs.
19. Encryption is a technique that is generally used when sensitive data are transmitted over communication lines, but it can also be used
on data stored on a stand-alone PC.
Continuity of Operations
20. In a PC environment, management typically relies on the user to ensure the continued availability of the systems in the event of a
failure, loss or destruction of the equipment, operating system, programs or data. This will entail:
a. the user retaining copies of the operating systems, programs and data, with at least one copy stored at a secure location away
from the PC; and
b. access being available to alternative equipment within a reasonable time given the use and importance of the underlying
system.
The Effect of Stand-Alone PCs on the Accounting System and Related Internal Controls
21. The effect of PCs on the accounting system and the associated risks will generally depend on:
a. the extent to which the PC is being used to process accounting applications;
b. the type and significance of financial transactions being processed; and
c. the nature of programs and data used in the applications.
22. Below is a summary of some of the key considerations and their effects on both general and application controls.
Application Controls
25. The existence and use of appropriate access controls over programs and data, combined with controls over input, processing and
output of data may, in coordination with management policies, compensate for some of the weaknesses in general controls in PC
environments. Effective controls include the following:
a. programmed control procedures, such as limit checks;
b. a system of transaction logs and batch balancing, including follow up and resolution of any exceptions;
c. direct supervision, for example, a review of reports; and
d. a reconciliation of record counts or hash totals.
26. Control may be established by an independent function that generally:
a. receives all data for processing;
b. ensures that all data are authorized and recorded;
c. follows up all errors detected during processing;
d. verifies the proper distribution of output; and
e. restricts physical access to application programs and data.
Separate controls are ordinarily required over master file and transaction data.
27. In a stand-alone PC environment, it may not be practicable or cost-effective for management to implement sufficient controls to reduce
the risks of undetected errors to a minimum level. In this situation, after obtaining the understanding of the accounting system and
control environment required by SAS 300 "Audit risk assessments and accounting and internal control systems", the auditors may find it
more cost-effective not to make a further review of general controls or application controls, but to concentrate audit efforts on
substantive procedures. This may entail more extensive physical examination and confirmation of assets, more tests of transactions,
larger sample sizes and greater use of computer-assisted audit techniques (see PN 1009 "Computer-assisted audit techniques").
28. Where the level of general controls appears adequate, the auditors may decide to adopt a different approach. For example, an entity
processing a large number of sales transactions on a stand-alone PC may establish control procedures that reduce control risk.
29. Stand-alone PCs are frequently encountered in small entities. Based on a preliminary review of controls, the audit plan might include
testing the controls the auditors intend to rely on.
30. This Practice Note is, in all material respects, in accordance with International Auditing Practice Statement 1001 "IT Environments -
Stand-Alone Personal Computers".