Audit Objectives Relating to EDI
The auditor’s objectives are to determine that (1) all EDI transactions are authorized, validated, and in compliance with the trading partner agreement; (2) no unauthorized organizations gain access to database records; (3) authorized trading partners have access only to approved data; and (4) adequate controls are in place to ensure a complete audit trail of all EDI transactions.
Audit Procedures Relating to EDI
To achieve these control objectives, the auditor may perform the following tests of controls.
Tests of Authorization and Validation controls. The auditor should establish that trading partner identification codes are verified before transactions are processed. To accomplish this, the auditor should (1) review agreements with the VAN facility to validate transactions and ensure that information regarding valid trading partners is complete and correct, and (2) examine the organization’s valid trading partner file for accuracy and completeness.
Tests of Access Controls. Security over the valid trading partner file and database is central to the EDI control framework. The auditor can verify control adequacy in the following ways:
1.The auditor should determine that access to the valid vendor or customer file is limited to authorized employees only. The auditor should verify that passwords and authority tables control access to this file and that data are encrypted.
2. The trading agreement will determine the degree of access a trading partner should have to the firm’s database records (such as inventory levels and price lists). The auditor should reconcile the terms of the trading agreement against the trading partner’s access privileges stated in the database authority table.
3. The auditor should simulate access by a sample of trading partners and attempt to violate access privileges.
Tests of Audit Trail Controls. The auditor should verify that the EDI system produces transaction log that tracks transaction through all stages of processing. By selecting a sample of transactions and tracing these through the process, the auditor can verify that key data values were recorded correctly at each point.
AUDITING PC-BASE ACCOUNTING SYSTEMS
The software market offers hundreds of PC-base accounting systems. In contrast to mainframe and client-server systems that are frequently custom-designed to meet specific user requirements, PC applications tend to be general-purpose systems that server a wide range of needs. This strategy allows software vendors to mass-produce low-cost and error-free standard products. Not surprisingly, PC accounting systems are popular with smaller firms, which use them to automate and replace manual systems and thus become more efficient and competitive. PC systems have also made inroads with larger and thus companies that have decentralized operations.
Most PC systems are modular in design. Typical business modules include sales order processing and AR, purchases and accounts payable, cash receipts, cash disbursements, general ledger and financial reporting, inventory control, and payroll. Their modular design provides users with some degree of flexibility in tailoring systems to their specific needs. Many vendors target their product to the unique needs of specific industries, such as
วัตถุประสงค์การตรวจสอบที่เกี่ยวข้องกับ EDI วัตถุประสงค์ของผู้สอบบัญชีจะกำหนดว่า (1) ธุรกรรม EDI ทั้งหมดได้รับอนุญาต ตรวจ สอบ และเป็นไป ตามข้อ ตกลงหุ้นส่วนค้า (2) ไม่มีองค์กรไม่ได้รับอนุญาตเข้าถึงระเบียนฐานข้อมูล (3) คู่ค้าได้รับอนุญาตสามารถเข้าถึงข้อมูลอนุมัติ เท่านั้น และ (4) การควบคุมเพียงพอเป็นสิ่งสมบูรณ์ตรวจสอบธุรกรรม EDI ทั้งหมดวิธีการตรวจสอบที่เกี่ยวข้องกับ EDIเพื่อให้บรรลุวัตถุประสงค์เหล่านี้ควบคุม ผู้สอบบัญชีอาจทำการทดสอบต่อไปนี้ของตัวควบคุมการทดสอบการควบคุมตรวจสอบและตรวจสอบ ผู้สอบบัญชีควรกำหนดว่า รหัสของคู่ค้าจะตรวจสอบก่อนที่ธุรกรรมการประมวลผล ดังนี้ ควร (1) ทบทวนข้อตกลงกับโรงรถเพื่อตรวจสอบธุรกรรม และข้อมูลเกี่ยวกับคู่ค้าที่ถูกต้องถูกต้อง และสมบูรณ์ และ (2) ตรวจสอบแฟ้มคู่ซื้อขายถูกต้องขององค์กรความถูกต้องและครบถ้วนการทดสอบการควบคุมการเข้าถึง รักษาความปลอดภัยแฟ้มของคู่ค้าที่ถูกต้องและฐานข้อมูลเป็นการกรอบงานการควบคุม EDI ผู้สอบบัญชีสามารถตรวจสอบความเพียงพอของการควบคุมต่อไปนี้:1.ผู้สอบบัญชีควรพิจารณาว่าการเข้าถึงแฟ้มผู้ขายหรือลูกค้าถูกต้องจำกัดพนักงานที่ได้รับอนุญาตเท่านั้น ผู้สอบบัญชีควรตรวจสอบว่า รหัสผ่านและตารางผู้มีอำนาจควบคุมการเข้าถึงแฟ้มนี้ และว่า ข้อมูลเข้ารหัสลับ2. The trading agreement will determine the degree of access a trading partner should have to the firm’s database records (such as inventory levels and price lists). The auditor should reconcile the terms of the trading agreement against the trading partner’s access privileges stated in the database authority table.3. The auditor should simulate access by a sample of trading partners and attempt to violate access privileges.Tests of Audit Trail Controls. The auditor should verify that the EDI system produces transaction log that tracks transaction through all stages of processing. By selecting a sample of transactions and tracing these through the process, the auditor can verify that key data values were recorded correctly at each point.AUDITING PC-BASE ACCOUNTING SYSTEMSThe software market offers hundreds of PC-base accounting systems. In contrast to mainframe and client-server systems that are frequently custom-designed to meet specific user requirements, PC applications tend to be general-purpose systems that server a wide range of needs. This strategy allows software vendors to mass-produce low-cost and error-free standard products. Not surprisingly, PC accounting systems are popular with smaller firms, which use them to automate and replace manual systems and thus become more efficient and competitive. PC systems have also made inroads with larger and thus companies that have decentralized operations.Most PC systems are modular in design. Typical business modules include sales order processing and AR, purchases and accounts payable, cash receipts, cash disbursements, general ledger and financial reporting, inventory control, and payroll. Their modular design provides users with some degree of flexibility in tailoring systems to their specific needs. Many vendors target their product to the unique needs of specific industries, such as
การแปล กรุณารอสักครู่..