Access controls—Procedures designed to restrict access to on-line terminal devices, programs and data. Access controls consist of “user authentication” and “user authorization.” “User authentication” typically attempts to identify a user through unique logon identifications, passwords, access cards or biometric data. “User authorization” consists of access rules to determine the computer resources each user may access. Specifically, such procedures are designed to prevent or detect:
•
Unauthorized access to on-line terminal devices, programs and data;
•
Entry of unauthorized transactions;
•
Unauthorized changes to data files;
•
The use of computer programs by unauthorized personnel; and
•
The use of computer programs that have not been authorized.
*Accounting estimate—An approximation of a monetary amount in the absence of a precise means of measurement. This term is used for an amount measured at fair value where there is estimation uncertainty, as well as for other amounts that require estimation. Where ISA 540 2 addresses only accounting estimates involving measurement at fair value, the term “fair value accounting estimates” is used.
*Accounting records—The records of initial accounting entries and supporting records, such as checks and records of electronic fund transfers; invoices; contracts; the general and subsidiary ledgers, journal entries and other adjustments to the financial statements that are not reflected in formal journal entries; and records such as work sheets and spreadsheets supporting cost allocations, computations, reconciliations and disclosures.
Agreed-upon procedures engagement—An engagement in which an auditor is engaged to carry out those procedures of an audit nature to which the auditor and the entity and any appropriate third parties have agreed and to report on factual findings. The recipients of the report form their own conclusions from the report by the auditor. The