CAATs Design, Implementation and Documentation

Slides:



Advertisements
Similar presentations
CONFIDENTIAL 1 Preparing for & Maintaining PCI Compliance.
Advertisements

P3, P4, P5, P6.
 I would like to thank my dear teachers who have taken all the trouble to come to this remote place in upper Egypt.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-1 Chapter 7 CHAPTER 7 THE EFFECT OF INFORMATION TECHNOLOGY ON THE AUDIT.
REDCap at UVM Presented by Diantha Howard, CCTS Biomedical Informatics
Enhanced Access Control for Collaborative Documents Jeffrey D. Campbell Interactive Systems Research Center Information Systems Department.
Program Flow Charting How to tackle the beginning stage a program design.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Lecture Notes 1/21/04 Program Design & Intro to Algorithms.
Geographic Presentation Eric Zmyslowski-Manager Manan Shah-Programmer Shankar Ramachandran-Architect Jing Chen-Quality Assurance Steve Abraham-Technical.
Information Access Douglas W. Oard College of Information Studies and Institute for Advanced Computer Studies Design Understanding.
1 Performance Auditing  In IT Environment  Evidence Gathering & Analysis Techniques  Computer Assisted Techniques  Use of IDEA.
What Exactly are the Techniques of Software Verification and Validation A Storehouse of Vast Knowledge on Software Testing.
PHASE 4 SYSTEMS IMPLEMENTATION Application Development SYSTEMS ANALYSIS & DESIGN.
Unit 3 – Information Systems
ITEC 3220M Using and Designing Database Systems
Introduction to Algorithm Design and Documentation CSIS 1595: Fundamentals of Programming and Problem Solving 1.
Session 11 Managing your SAIG Mailbox with EDconnect & TDCM Lydia Morales Sue Rager/Judy Rohrer Session 1.
computer
System Integrity and Validity 1 Running Head: System Integrity and Validity System Integrity and Validity University of Phoenix Date:
 Enhance the capacity of the Department of Family Medicine to train Residents to design, implement, and evaluate an EB/QI plan  Focus on:  Rural practice.
1. REGISTRATION  Student to submit the Registration Form to the office at level 7 on the 2 nd week of a semester (use form FCE.UiTM.FYP 1&2.REGISTERFORM.2010)
Adaptive Processes Consulting Pvt. Ltd. An ISO 9001:2000 Certified Company This document is the property of and proprietary to.
Software Development Life Cycle by A.Surasit Samaisut Copyrights : All Rights Reserved.
Using Computer Assisted Audit Tools and Techniques (CAATTs)
1 VoIP Supplementary Services S.P Document Status May 2007 & AD/SC/VN Discussion.
AUDIT IN COMPUTERIZED ENVIRONMENT
1 The United Nations Demographic Yearbook and the Work Programme for Social Statistics Expert Group Meeting to Review the United Nations Demographic Yearbook.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Panel Discussion for the DTC Verification System 23 Feb 2007.
Query Health Technical WG 1/12/2011. Agenda TopicTime Slot Administrative stuff and reminders2:00 – 2:05 pm Specifications Query Envelope Discussion 2:05.
Data Integrity # Best Practices & Lessons Learned. Does It Fit Your Organization?
Session 1: Arabic Translation of SNA 2008 Seminar on the implementation of SNA 2008 in ESCWA Region Muscat, 23 – 26 May 2010.
Day Three – Race to the Top Career and Technical Education Fall 2011.
Audit Evidence Process
Oncology Patient Enrollment Network OPEN Quality Assurance Lucille Patrichuk OPEN Implementation Manager OPEN Conference September 18, 2008.
1 VoIP Supplementary Services S.P Document Status May 2007 & AD/SC/VN Discussion.
1 Enforcing SAI and PAC Recommendations Parliamentary Oversight Strengthening the powers and Practices of Public Accounts Committee Kampala Uganda 6 th.
Microsoft Visual Basic 2012: Reloaded Fifth Edition Chapter One An Introduction to Visual Basic 2012.
Visual Basic.NET Comprehensive Concepts and Techniques Chapter 1 An Introduction to Visual Basic.NET and Program Design.
ACC 542 Entire Course FOR MORE CLASSES VISIT ACC 542 Week 1 Individual Assignment Computer Information System Brief ACC 542 Week.
ACC 542 Week 6 Individual Assignment System Integrity and Validation To purchase this material click below link
STEP Systematic Tracking of Exchanges in Procurement.
SQA project process standards IEEE software engineering standards
‘Supporting and Developing the Tool’ Amanda Norris Julian Fox
Citrus Savings & Loan Version
SQA project process standards IEEE software engineering standards
Standard Operating Procedure (SOP) Management Software
Programming Problem steps must be able to be fully & unambiguously described Problem types; Can be clearly described Cannot be clearly described (e.g.
An Introduction to Visual Basic .NET and Program Design
Language is a medium of communication.
Session Objectives Outline the objectives of the CAATs module Outline the sessions in this module Introduce the lecturer and the trainees Inform the trainees.
برنامه‌ريزي منابع انساني
Enterprise Strategy CIMA Paper E3.
Types of CAATs Session 3.
Instrument PDR Summary of Objectives
Data Access Session 7.
Software Verification and Validation
Pacman.
Software Verification and Validation
SYSTEMS ANALYSIS & DESIGN
DATA DOWNLOADING Introduction and Course Content
The session website can be reached at wmo
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
COMPLETESOFT GLOBAL SOLUTIONS LIMITED
Data Selection Session 9.
The session website can be reached at wmo
Software Verification and Validation
Role of CAATs Session 2.
INTOSAI IT AUDIT TRAINING
Presentation transcript:

CAATs Design, Implementation and Documentation Session 12

Systematic, structured approach to writing CAATs recommended Designing CAATs Systematic, structured approach to writing CAATs recommended Audit plan translated into specific audit queries Audit queries formulated in “pseudocode” Pseudocode translated into computer syntax

Documentation Requirements Planning Stage Business case for CAATs Audit Plan System/ Data Documentation CAATs and Data Downloading Plans

Documentation Requirements (Contd.) Implementation Stage Audit Trail of Data Downloading and Data Integrity Verification Trail of Audit Queries and Results Analysis of Results Supplementary tests for corroboration Management comments/ responses Electronic archiving of data, queries and results