Chapter 8: Internal control: ISA 315
© EWP Go to www.emilewoolfpublishing.com for Q/As, Notes & Study Guides 189
Program checks (data validation checks) can be carried out on the input data.
These include check digit checks, range checks, existence checks and
completeness checks. These programmed checks help to ensure the
completeness and accuracy of processing (for example, the correct number of
digits in product codes).
‘Balancing’. This is the immediate checking of control totals of data submitted
from a remote terminal, before and after processing.
6.3 Electronic data interchange (EDI) systems
EDI systems are systems that allow the electronic transmission of business
documents, such as purchase orders, invoices or payroll information.
EDI systems may operate:
within the organisation (for example, the sales department may use an EDI
system to send copies of customer orders to the accounting department), or
externally (for example, a company may submit payroll data to an external
agency or ‘bureau’ for processing, and a company may send a purchase order
electronically to a supplier).
In an EDI system, the transmitted ‘documents’ are automatically entered into the
(different) computer system of the receiver of the message. For example, a purchase
order sent to a supplier by EDI is read automatically into the sales order computer
system of the supplier, and so can be processed without the need for manual
intervention.
Once again, although EDI systems may improve the operational efficiency of the
organisation, they may create the following additional problems for the auditor:
There is a lack of a paper audit trail. (A ‘paper’ audit trail is one where a
transaction can be followed through the stages of its processing, by going from
one paper document to another. With EDI, the system needs an electronic audit
trail for transactions, and the computer system should be able to provide one.)
There is an increased level of dependency on the computer systems of the
organisation and possibly on outsiders. Any computer failure may therefore
have an increased impact on the client’s organisation. General controls for IT
will therefore be extremely important.
There is a risk of possible loss or corruption of data in the process of
transmission.
There are also security risks in the transmission of data. Unauthorised
individuals may be able to read transmitted data.
Auditors should expect to see controls in place to minimise the risks inherent in EDI
systems. Typically, controls will cover such matters as:
controls over transmission of data (encryption, acknowledgement systems,
authentication codes)
monitoring and checking of output