Page 74 - Internal Auditing Standards
P. 74

Guide to Using International Standards on Auditing in the Audits of Small- and Medium-Sized Entities Volume 1—Core Concepts




        5.10  Manual versus Automated Controls

        For most entities, the system of internal control will consist of a mixture of manual and automated controls.


        The risks and benefits associated with the different types of control are outlined below.
        Exhibit 5.10-1

                                                          Benefi ts

                            Manual Controls                                     Automated Controls
         •     Used to monitor the effectiveness of automated   •    Consistently apply predefined business rules and


               controls.                                             perform complex calculations in processing large
         •     Suited to areas where judgment and discretion         volumes of transactions or data.
               are required over large, unusual, or non-recurring   •   Enhance the timeliness, availability, and accuracy
               transactions.                                         of information.

         •     Beneficial when errors are diffi  cult to defi ne,   •   Facilitate the additional analysis of information.
               anticipate, or predict.                         •     Enhance the ability to monitor the performance
         •     Changing circumstances may require a control          of the entity’s activities and its policies and
               response outside the scope of an existing             procedures.
               automated control.                              •     Reduce the risk that internal control will be
                                                                     circumvented.
                                                               •     Enhance the ability to achieve eff ective segregation
                                                                     of duties by implementing appropriate system
                                                                     access restrictions in applications, databases, and
                                                                     operating systems.


                                                            Risks
                            Manual Controls                                     Automated Controls
         •     Less reliable than automated controls, as       •     Reliance can be placed on systems or programs
               performed by people.                                  that are inaccurately processing data, processing
         •     More easily bypassed, ignored, or overridden.         inaccurate data, or both.
         •     Prone to simple errors and mistakes.            •     Unauthorized access to data may result in destruction
                                                                     of data or improper changes to data, including
         •     Consistency of application cannot be assumed.
                                                                     the recording of unauthorized or non-existent
         •     Less suitable for high volume or recurring
               transactions where automated controls would be        transactions, or inaccurate recording of transactions
                                                                     (particular risks may arise where multiple users access
               more effi  cient.
                                                                     a common database).
         •     Less suitable for activities where specific ways to

               perform the control can be adequately designed   •    The possibility of IT personnel gaining access
               and automated.                                        privileges beyond those necessary to perform
                                                                     their assigned duties, thereby breaking down the
                                                                     segregation of duties.
                                                               •     Unauthorized changes to data in master fi les.
                                                               •     Unauthorized changes to systems or programs.
                                                               •     Failure to make necessary changes to systems or
                                                                     programs.
                                                               •     Inappropriate manual intervention.
                                                               •     Potential loss of data or inability to access data as
                                                                     required.



     72
   69   70   71   72   73   74   75   76   77   78   79