Question

In: Accounting

course : Accounting information system GITC/Application Controls 1. GITC, general information technology controls is control activities...

course : Accounting information system

GITC/Application Controls

1. GITC, general information technology controls is control activities performed by management to ensure the ongoing effectiveness of the organization's automated application controls and related systems. Where as application controls help ensure that transactions occured are recorded completely and accurately. Application controls also are automated in nature and often apply to the processing of individual transactions. Also, GITC includes execution of policies and procedures that relate to financially relevant applications and support the effective functioning of application controls and manual controls with an IT component by helping to ensure the continued proper operation of information systems. Another major difference is that application controls have specific controls to each unique computerized application but GITC can be applied to all computerized applications. Some examples of GITC is management approval and granting of logical access to the system to users and management approval of program changes. Some examples of application controls are key reports, configuration and authorization access.

2. The company cannot rely on the confidence that the application controls are working effectively if the GITC isn't working properly. Companies can’t just rely on the application controls because both the GITC and the application controls work together to function properly. Therefore, if one control isn't working properly, that means they all aren't working properly.


What is the difference between general information technology controls (GITC) and application controls?


If GITC's are not working properly, would the organization be able to have confidence that the application controls are working effectively?

Solutions

Expert Solution

GITC - General Information Technology Controls

GITC are the controls apply to system, processes, data, components of organizations information technology system.

Importance information technology controls increased due to increased use of technology, internet in every where. Reliable financial information is dependent upon General IT controls. GITCs are the components of business operation and financial information control. GITC are used for reliable data communication, reports, data processing, integrity. It is important for access control, change management, operational control, cyber security.

Application Control-

Application control are the controls that restricts unauthorized access to the system. Application controls may vary from organization to organization. Main purpose of application control is ensure privacy and security of data. Application controls include completeness, validity check. Main components are identification, authentication, authorisation.

Application controls type are input control, output control, process control, boundary controls.

Application control objects is confidentiality, integrity of application and data.

Main difference between them is

1.General IT controls are for whole computer whereas application control is only for particular application

2.Types GITC are control over data, control over program and types of Application control are input, output, process control.

3.General controls ensure proper development and implimentations of application, data, program.Application control is access control mechanism for restricting unauthorized access.

4.General controls apply to all areas of organization and IT support. Application control is specific to each application.

(2) Answer

If GITC controls are not properly working then organization application control can not work properly. Application control and general IT controls are work together therefore GITC not working then organization can not depend upon application control.

GITC related to change management, access control, data processing , operational control wheras application control is relating to only specific application.

Therefore organisation is not having confidence to work without General IT control. Application control not working effectiveliy without GITC.


Related Solutions

Briefly define general controls and application controls.
Briefly define general controls and application controls.
A well-designed accounting information system should provide adequate controls in the general ledger and reporting system...
A well-designed accounting information system should provide adequate controls in the general ledger and reporting system (or any cycle) to ensure that control objectives are met. Discuss those control objectives.
Research project: The impact of information technology on the revenue cycle activities, threats, and controls Search...
Research project: The impact of information technology on the revenue cycle activities, threats, and controls Search popular business and technology magazines (BusinessWeek, Forbes, Fortune, CIO, etc.) to find an article about innovative use of IT that can be used to improve one or more activities in the revenue cycle. Write a report that: A. Explains how IT can be used to change revenue cycle activities. B. Discusses the control implications. Refer to table 12.1(page 357) and explain how the new...
27. Distinguish between ‘General controls’ and ‘Application controls’ in a computerized environment.
27. Distinguish between ‘General controls’ and ‘Application controls’ in a computerized environment.
With respect to the Xero accounting information system, select three (3) controls in the system. With...
With respect to the Xero accounting information system, select three (3) controls in the system. With respect to each of these controls: a. Identify the control and the type of control. b. Explain what the control aims to prevent, detect or correct. Page | 2 c. Explain the operation of the control (i.e. how the control works). d. Evaluate the effectiveness of the control (i.e. whether, in your opinion, the control achieves its aims and why)
Who develops the technology? Who controls the technology (or does it control us)? Should there be...
Who develops the technology? Who controls the technology (or does it control us)? Should there be “human intervention” in the technology development and use (e.g. are “robots” building “robots”)? How does “surveillance” and “oversight” of the technology blur the lines of the impact of invasion of privacy versus security?
One function of the accounting information system (AIS) is to provide adequate controls to ensure the...
One function of the accounting information system (AIS) is to provide adequate controls to ensure the safety of organizational assets, including data. Many people, however, often view control procedures as red tape. Discuss how controls can improve the overall efficiency and effectiveness. Why are we concerned with controls in the AIS department?
Discuss general management’s responsibilities for the accounting system and internal control structure of the organization.
Discuss general management’s responsibilities for the accounting system and internal control structure of the organization.
1. Explain the difference between a General Support System, Major Application, and a Minor Application and...
1. Explain the difference between a General Support System, Major Application, and a Minor Application and explain how you determine the accreditation boundary? 2. Explain each of the three different ways to assess a security control and give an example of how each one is used. 3. Explain the 4 phases of assessing security controls.   Please I need an answer to this..... Thanks!!!
Please answer the following questions: a) What is confidentiality and privacy controls in accounting information system?...
Please answer the following questions: a) What is confidentiality and privacy controls in accounting information system? b) How to identify and classify information that to be protected and how to protect confidentiality using encryption? c) What is privacy regulations and generally accepted privacy principles?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT