Auditing The Expenditure Cycle: IT Auditing & Assurance, 2e, Hall & Singleton
Auditing The Expenditure Cycle: IT Auditing & Assurance, 2e, Hall & Singleton
Auditing The Expenditure Cycle: IT Auditing & Assurance, 2e, Hall & Singleton
Auditing the
Expenditure Cycle
PURCHASES: BATCH
PROCESSING
Receiving Department
Purchasing Department
Accounts Payable
CASH DISBURSEMENT:
BATCH PROCESSING
CASH DISBURSEMENT:
REENGINEEREDFULLY AUTOMATED
Data processing steps performed
automatically:
1.
2.
3.
4.
5.
6.
7.
CASH DISBURSEMENT:
REENGINEERED FULLY
AUTOMATED
CASH DISBURSEMENT:
REENGINEEREDFULLY AUTOMATED
Data processing steps performed
automatically:
1.
2.
3.
4.
5.
CASH DISBURSEMENT:
REENGINEEREDFULLY AUTOMATED
CASH DISBURSEMENT:
REENGINEEREDFULLY AUTOMATED
Data processing steps performed
automatically:
1.
2.
3.
4.
5.
CASH DISBURSEMENT:
REENGINEEREDFULLY AUTOMATED
Control implications
General in nature
Similar to those of Chapter 9
Improved
inventory
control
REENGINEERED SYSTEM
VS.
BATCH AUTOMATED
SYSTEM
Segregation of duties
PAYROLL PROCEDURES
Drawbacks to using regular A.P. and cash
disbursements systems to do payroll
REENGINEERED PAYROLL
SYSTEM
Often integrated with H.R.
Differs from previous automate system
REENGINEERED PAYROLL
SYSTEM
Personnel
Cost accounting
Timekeeping
Data processing
1.
2.
3.
4.
5.
6.
7.
Process controls
File update controls
Access controls
Warehouse security
Moving assets promptly when received
Paying employees by check vs. cash
Risks
EXPENDITURE CYCLE
AUDIT OBJECTIVES
Process controls
Physical controls
Purchase system controls
Inspection of assets
Theft of assets
Reconciliation of supporting documents: P.O., receiving
report, suppliers invoice
Verification of timecards
Supervision
Paymaster
Payroll imprest account
Output controls
EXPENDITURE CYCLE
SUBSTANTIVE TESTS
Risks and audit concerns
Understanding data
Inventory file
Purchase order file
Purchase order line item file
Receiving report file
Disbursement voucher file
File preparation procedures
EXPENDITURE CYCLE
SUBSTANTIVE TESTS
Incident Response
Requirements
ISO 17799 is international
standard for IS best
ISO 17799
practices
Security framework must contain an effective
incident response approach
In 2002, 22% companies with sales over $500
million had implemented ISO 17799
Must collect information for three purposes
Incident Response
Requirements
ISO 17799
Response procedures
should cover
Analysis and identification of cause of
incident
Planning and implementation of remedies
Collection of audit trails and similar evidence
Communication with those affected or
involved with recovery
Reporting the action to the appropriate
authority
Best Practices
Chapter 10:
Auditing the Expenditure
Cycle