In: Accounting
27. Distinguish between ‘General controls’ and ‘Application controls’ in a computerized environment.
Difference Between General Controls and Application Controls | ||||||||||||
General Controls | ||||||||||||
These are the policies and procedures that relate to many applications and support the effective functioning of application controls by helping to ensure the continued proper | ||||||||||||
operation of information systems. These controls apply to mainframe, server, and end-user environments. | ||||||||||||
General IT controls commonly include: | ||||||||||||
# System software acquisition, change and maintenance | ||||||||||||
# Controls over data center and network operations | ||||||||||||
# Application system acquisition, development, and maintenance | ||||||||||||
# Access security | ||||||||||||
# Physical security of assets, including adequate safeguards such as secured facilities over access to assets and records | ||||||||||||
1) | General controls apply to a wide range of exposures that systematically threaten the integrity of all applications processed within the CBIS environment. | |||||||||||
Some examples of general controls are controls against viruses and controls to protect the hardware from vandalism. | ||||||||||||
Application Controls | ||||||||||||
These are the controls that relate to specific computer software applications and the individual transactions. | ||||||||||||
For example, a company would usually place restrictions on which personnel have authorization to access its general ledger so as to revise its chart of accounts, | ||||||||||||
posting / approving journal entries etc. | ||||||||||||
In order to enact this policy and restrict access, the general ledger software package would require the necessary functionality. | ||||||||||||
The literature and regulations pertaining to the review and testing of IT Application controls by auditors and management, addresses 3 types of application controls :- | ||||||||||||
1) Input Controls | ||||||||||||
transactions captured, accurately recorded, and properly authorized | ||||||||||||
2) Processing Controls | ||||||||||||
transaction processing has been performed as intended | ||||||||||||
2) Output Controls | ||||||||||||
accuracy of processing result | ||||||||||||
These control tests are typically performed when a new system has been implemented. | ||||||||||||
Application controls are narrowly focused on exposures within specific systems. | ||||||||||||
Some examples of application controls are controls to make sure that each employee onlyreceives one paycheck per pay period and controls to ensure that each invoice gets paid only once | ||||||||||||