CA FINAL | ISCA | Information Systems Audit & Control | Random Mnemonics | On request Post

Welcome to Random Mnemonics post

(please comment down below for On request Mnemonics)

Chapter 3 

Protection of Information Systems

#3.11 Financial Controls

Heading points:

  • Authorization: This entails obtaining the authority to perform some act typically accessing to such assets as accounting or application entries. 
  • Budgets: These estimates of the amount of time or money expected to be spent during a particular period, project, or event. The budget alone is not an effective control. Budgets must be compared with the actual performance, Including isolating differences and researching them for a cause and possible resolution. 
  • Cancellation of documents: This marks a document in such a way to prevent its reuse. This is a typical control over invoices marking them with a "paid" or "processed" stamp or punching a hole in the document. 
  • Dual control: This entails having two people simultaneously access an asset. For example, the depositories of banks' 24-hour teller machines should be accessed and emptied with two people present, many people confuse dual control with dual access, but these are distinct and different. Dual access divides the access function between two people: once access IS achieved, only one person handles the asset. With teller- machines, for example, two tellers would open the depository vault door together, but only one would retrieve the deposit envelopes. 
  • Input/ output verification: This entails comparing the information provided by a computer system to the input documents. This is an expensive control that tends to be over-recommended by auditors. It is usually aimed at such non-monetary by dollar totals and item counts. 
  • Safekeeping: This entails physically securing assets, such as computer disks, under lock and key, in a desk drawer, file cabinet storeroom, or vault. 
  • Sequentially numbered documents: These are working documents with preprinted sequential numbers, which enables the detection of missing documents 


Chanda Kochhar vala: Chanda Kochhar ICICI bank ki MD, CEO hai उनका Financial Control बहुत अच्छा है।  

Background: Bank मे जैसे काम होता है Cash deposit/withdrawal, counting etc

Chanda kochhar Authorize करती है: AUTHORIZATION
हर आने जाने वाली transaction को : INPUT/OUTPUT VERIFICATION
Slip (pay-in, withdrawal) को safely रखने के लिए बोलै हुआ है सबको : SAFEKEEPING
जो slips cancel भी होती है उनको भी safe रखने को बोलै हुआ है : CANCELLATION OF DOCS
जब Month end होता है तो Sequentially Number डालते है slips पे: SEQUENTIALLY NO. DOCS
सारे CASH का Budget बनाते है फिर: BUDGETS
जिससे DUAL Control लग सके।: DUAL CONTROL   

Mnemonic Video:



  1. Fundazone offers the best solutions to overcome the difficulties in clearing the ca exams and thus making a quality Chartered Accountants
    CA Academy In Chennai
    CA Coaching Institute In Chennai
    CA Institute In Chennai
    Best CA Academy In Chennai

  2. I generally want quality content and I found that in your post. The information you have shared about security audit is beneficial and significant for us. Keep sharing these kinds of articles here. Types of information security audits

  3. How to Make Money from Betting on Sports Betting - Work
    (don't worry งานออนไลน์ if you get it wrong, though) The process involves 출장안마 placing bets on different events, but it can also be done by using communitykhabar the