Computer Assisted Audit Tools

Slides:



Advertisements
Similar presentations
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Advertisements

1 The Antecedents of Internal Auditors Adoption of Continuous Auditing Technology: Exploring UTAUT in an Organizational Context Ray Henrickson CAIT, CACISA.
Chapter 14 Fraud Risk Assessment.
ITAuditing Using GAS & CAATs
CFIT Presentation Presented By: Sumit Nijhawan
Technology Applications in the Age of Integrity Integrity Forum 2006 Tony Murphy Vice President, Worldwide Sales ACL Services Ltd.
Auditing Computer-Based Information Systems
Auditing Computer-Based Information Systems
The Islamic University of Gaza
Chapter 10: Auditing the Expenditure Cycle
Continuous Auditing Technology Adoption in Leading Internal Audit Organizations Miklos A. Vasarhelyi Siripan Kuenkaikaew.
S17: Field work. Session Objectives  To explain the manner in which field audit is carried out.  To explain the nature of evidence and the different.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
4-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Materiality and Risk.
Principles of Information Systems, Seventh Edition2 An organization’s TPS must support the routine, day-to- day activities that occur in the normal course.
Pertemuan 7-8 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
AUDITING INFORMATION TECHNOLOGY USING COMPUTER ASSISTED AUDIT TOOLS AND TECHNIQUES.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Advanced Accounting Information Systems
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
The Information Systems Audit Process
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Auditing & Assurance Services, 6e
Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
How Will Continuous Auditing and XBRL-GL Work Together to Provide Improved Business Value? Nigel J. R. Matthews, BASc, CA ACL Services Ltd.
The need for financial information. Characteristics of useful financial information Credible - The credibility assumes that the accounting information.
A337 File Design Computerized and Manual Systems 4/4/2012.
AICPA Audit Data Standards ASEC Emerging Assurance Technologies Task Force.
Principles of Information Systems, Sixth Edition Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Transaction Processing & Enterprise Resource Planning Systems Chapter 9.
(SIA) 14 Internal Audit in an Information Technology Environment Standard should be read in the conjunction with the “Preface to the Standards on Internal.
Introduction to Internal Control Systems
Chapter 5 Internal Control over Financial Reporting
A337 File Design Computerized and Manual Systems 11/10/2009.
Beyond Call Recording: Speech Improves Quality Assurance Larry Mark Chief Technology Officer SER Solutions, Inc.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
S4: Understanding the IT environment of the entity.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Global Technology Auditing Guide 3 Presented by Melanie Cloran.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
AUDIT IN COMPUTERIZED ENVIRONMENT
APA – Fundamentals of Payroll Chapter 2 – Payroll Systems March 10, 2012.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
A337 File Design Computerized and Manual Systems 3/27/08.
Kathy Corbiere Service Delivery and Performance Commission
Designed for the Telecom Industry and built on a Mobile Computing Platform Asset Tracking & Network Lifecycle Management.
Audit Evidence Process
Financial Management & Internal Control for Utility Companies Julia Barber, CPA and Sherman, Barber & Mullikin, CPAs Madison, IN
Impact Research 1 Enabling Decision Making Through Business Intelligence: Preview of Report.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Chapter 3-Auditing Computer-based Information Systems.
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Internal and external control in an automated environment
Internal Control Principles
Auditing & Investigations I
Computerized and Manual Systems
Week Thirteen – Continuous Auditing/CAATs and QA/QC
Week Thirteen – CAATs & Continuous Auditing
AUDIT TESTS.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Computer Assisted Audit Tools Selection and Application of CAATs Presented By: Dana Dugas, Amedisys, Inc. Presented By: Dana Dugas, Amedisys, Inc.

Today’s Environment Internal Auditors are advising organizations on internal control attributes and ways to gain assurance from information. SOX compliance efforts have led companies to delve more deeply into their financial statement reporting elements and into the data that feeds and supports the financial data.

Today’s Environment Internal Audit groups faced with growing workloads and heightened accountability Discovering that Computer Assisted Auditing Tools (CAATs) offer much needed help Audit technology tools facilitate more granular analysis of data and help to determine the accuracy of the information

CAATs- Review 100% of data Comprehensive approach of testing contrasts with traditional audit sampling methods (extracting small data sets and extrapolating conclusions about the population of transactions) Sampling techniques require audit judgment and confidence levels; whereas CAATs deliver more definitive results because the entire population of data can be tested

CAATs- Review 100% of data Filtering large volumes of data is much more practical and effective Work with greater quantities of data Work with data that is more complex Ability to identify financial leakage, policy noncompliance, and mistakes or errors in data processing For example: duplicate vendor payments; fraudulent transactions, circumvention of invoice approval limits

Tool selection The challenge Make sure you are looking at the right tools to deliver the benefits your company needs It is the user’s responsibility to become familiar with the tools available in order to pick the right one Have a solid knowledge of your business, your data, and the accounting practices in your industry

Tool selection The IIA conducted an audit software analysis and reported several key recommendations for internal auditors to consider in the selection of CAATs: Determine the enterprise’s audit mission, objectives and priorities Determine the types and scope of audits Consider the enterprise’s technology environment Be aware of the risks

1. Determine the enterprise’s audit mission, objectives and priorities Auditors must consult with management regarding what audit functions are of the highest priority and where computer audit tools may be applied to help meet those priorities.

2. Determine the types and scope of audits What is the stated objective of the audits? What kinds of questions will auditors be asking and what will be the boundaries? Arriving at answers to these questions will be critical in making an appropriate software decision.

3. Consider the enterprise’s technology environment Any audit tools selected will have to mesh with the other software, hardware and network systems already in place. In some cases, the existing IT infrastructure may incorporate tools that auditors can use in concert with automated software tools for improved effect.

4. Be aware of the risks Applying software to any mission-critical function carries some risks, and auditing software is no different. Automated software tools can prompt auditors to jump to faulty conclusions or make assumptions that run counter to enterprise operations.

Tool Selection Consider: Characteristics to look for in CAATs: How many data sources you have Volume of transactions Characteristics to look for in CAATs: Ease of use Ease of data extraction Ability to access a wide variety of data files from different platforms Ability to integrate data with different format Ability to define fields and select from standard formats Menu-driven functionality for processing analysis commands Simplified query building and adjustments Logging features

Audit data analysis techniques Execute tests for virtually all industries and almost all types of data: Accounts Receivable Payroll Cash Disbursements Purchasing Sales General Ledger Work in Progress Loss Prevention Asset Management Limiting factors: Access to data Understanding of the data fields Creativity of the auditor

ACL (Generalized Audit Software) Data is locked down as read-only No chance of inadvertently changing the data Much higher risk when using spreadsheets Commands are auditor-friendly Fairly easy to grasp what the commands will do once explained Reasonably short learning curve

ACL Automatically records all of the commands that are run and the results of the procedures in its log LOG feature enables automation of workpapers Export the log to a word processor or other file type

ACL Batch feature (Writing Scripts) Develop audit procedures to run in ACL Auditor puts together the various routines in a batch (similar to a macro) Next time the auditor can run one command (push a button), and all of those procedures will run on autopilot with ACL dumping the results into the log Become much more efficient over time by running same tests periodically, adding new procedures to the batch

Additional Keys to Success Identify a Champion- person with ability to motivate, supervise, and generally make sure the technology is employed and becomes successful General Training- for the users of the software (www.acl.com) Identify power users- given more specific training and become leaders of implementing the chosen software; assist other auditors; conduct in-house training.

Audit data analysis techniques CAATs especially valuable in environments that have: High volumes of transactions Complex processes Distributed operations Unrelated applications and systems

Advantage of CAATs Organizations gain assurance about the accuracy of transactional data, and the extent to which business transactions adhere to controls and comply with policies Consistent use of automated transaction analysis and continuous monitoring, CAATs enable real-time independent testing and validation of critical enterprise data.

Advantage to Management Management can use such information to proactively identify exceptions to controls and compliance policies and take immediate action. Implementing these programs can lead to increased confidence in the corporate data underlying financial reporting.

The End References: Presenter Information: Selection and application of computer assisted audit tools; Mark M. Stephenson Generalized Audit Software: Effective and Efficient Tool for Today's IT Audits; Tommie Singleton Presenter Information: Dana Dugas, Amedisys, Inc. ddugas@amedisys.com 225-368-2770