Sunteți pe pagina 1din 5

GROUP 3 SUGGESTIONS AND RECOMMENDATIONS - The auditor

should make suggestions for prevention or correction of


TYPES OF DEFICIENCY IN INTERNAL CONTROL
the deficiencies or gaps identified.
1. CONTROL DEFICIENCY – A control is designed,
TYPES OF INTERNAL AUDIT REPORT
implemented or operated in such a way that it is unable
to prevent, or detect and correct misstatements in the  ORAL REPORT
financial report on a timely basis.  INTERIM (INFORMAL) REPORT
 DESCRIPTIVE AUDIT REPORT
– A control necessary to prevent, or detect and correct,
 DESCRIPTIVE AUDIT REPORT
misstatements in the financial report on a timely basis is
missing.
COMPONENTS OF AN INTERNAL AUDIT REPORT
2. SIGNIFICANT DEFICIENCY – is a deficiency, or a
Background - A very brief explanation as to the rationale
combination of deficiencies, in internal control over
for the audit is provided in this section.
financial reporting, that is less severe than a material
weakness yet important enough to merit attention by Inherent Risk: A risk that an event will occur which may
those responsible for oversight of the company’s negatively affect the achievement of organization's
financial reporting. objectives, assuming there are no controls in place.
3. MATERIAL WEAKNESS – is a deficiency, or Residual Risk: The risk remains after controls are taken
combination of significant deficiencies, that result in into account
more than a remote likelihood that a material
misstatement of the financial statements will not be Objective of audit - The objective of the audit should
prevented or detected. answer the question “Why was this department/area
audited?
GROUP 4
Nature and scope of audit - This section should answer
AUDIT PROCESS the question “What was audited?
 Planning – Define audit objectives and methodology Methodology/ Audit Approach
 Fieldwork – Gather evidence to accomplish audit
objectives This section describes the audit program that was
developed to conduct the fieldwork.
 Reporting – Communicate audit results
 Follow-up – Review corrective action plan and result  Substantive Procedures Audit Approach
INTERNAL AUDIT REPORT – Is a formal document This approach generally uses where the financial
where internal audit summarizes its work on an audit reporting system or internal controls over financial
and report its findings and recommendations based on reporting are not reliable.
that work.
 Balance Sheet Audit Approach
DISCLOSE FINDINGS - Present findings both favorable
and unfavorable in a concise manner so that the This approach, the auditor will focus their testing on high
management is aware of the situation in an values balance sheet items, and transaction in the
operation/segment. income statements will be less focused on.

DESCRIPTION OF FINDINGS  System Based Approach

 Risk Based Audit Approach


 ADVERSE FINDINGS should be described in detail.
 Each Finding must be provable. The most use of approach.
 Auditor beliefs, without proper documentation,
will not be carried to the report. Attributes tested - This section of the audit report will
discuss the individual issues or areas that we decided to
test.
Conclusion - The final section of the audit report is the effectively, and if not, provide recommendations for
conclusion where the audit opinion is expressed. improvement.

Appendices - This section is a compilation of all the Management is responsible for design and
recommendations made in the audit report, and includes implementation of internal controls.
all of the management responses, who the responsible
Executive Management - all appointed officers of the
person is for implementing each recommendation and
Corporation above the level of Vice-President.
the time frame.
- consists of high ranking employees that work
AUDIT FOLLOW UP PROCESS together to manage a company or corporation.

1.Internal Auditors determine whether the management External Auditors - performs an audit, in accordance
has taken action or implemented recommendations. with specific laws or rules, of the financial statements of
a company, government entity, other legal entity,
2. Follow up is a process by which internal auditors
or organization, and is independent of the entity being
evaluate adequacy, effectiveness, and timeliness of
audited.
actions taken by management on reported observations
and recommendations. GROUP 5

3. The Chief Audit Executive is responsible for scheduling SOFTWARE


follow-up activities.
• set of instructions, data or programs used to
4.Follow up activity should be appropriately operate computers and execute specific tasks
documented.
• generic term used to refer to applications &
TYPES OF EXTERNAL AUDIT REPORT programs that run on a device

 UNQUALIFIED AUDIT OPINION – is an OPERATING, APPLICATION, SYSTEM


independent auditor’s judgment that a
APPLICATION SOFTWARE - software designed to
company’s financial statements are fairly and
perform a group of coordinated functions, tasks, or
appropriately presented, without any
activities for the benefit of the user.
exceptions, and in compliance with accounting
standards. ACCOUNTING SOFTWARE - describes a type of
 QUALIFIED AUDIT OPINION – Is a statement application software that records and processes
issued after an audit. Is completed by accounting transactions within function modules.
professional auditor, suggesting that the
DATABASE MANAGEMENT SYSTEM (DBMS)
information provided is limited in scope and/or
the company being audited has not maintained • It manages the data efficiently and allow users to
GAAP accounting principles. perform multiple tasks on it with ease.
 ADVERSE AUDIT OPINION –Financial statements
are misrepresented, misstated and do not • It is a software for creating and managing
accurately reflect its financial performance and databases.
health. • It provides users with a systematic way to create,
 Gross misstatement and possibly fraud. retrieve, update and manage data.
 DISCLAIMER AUDIT OPINION - No opinion is
being given. • was designed to solve the fundamental problems
associated with storing, managing, accessing,
Internal Auditors are not responsible for the securing and auditing data in traditional file
execution of company activities; they advise systems.
Management and the Board of Directors regarding
how to better execute their responsibilities.

Internal Auditors perform audit to evaluate whether the


control components are present and operating
IT CONTROLS OUTPUT CONTROLS

TWO CATEGORIES OF IT SYSTEMS  Focus on detecting errors after processing is


completed.
 GENERAL CONTROL
 APPLICATION CONTROL Common control for detecting errors in output.

GENERAL CONTROL apply to all aspects of IT function  Reconcile computer produce to manual control
before transactions are processed. total.
 compare the numbers of unit process to the
BACK UP AND CONTINGENCY - Power failures, fire
numbers of units submitted for processing.
excessive heat or humidity, water damage or even
sabotage consequence to business using IT. SNAPSHOTS - This technique involves taking a picture of
a transaction as a flows through the computer systems.
 Battery backups or on-site generators
SYSTEMS CONTROL AUDIT REVIEW FILES (SCARF) - This
HARDWARE CONTROLS - Built into computer by
involves embedding audit software modules within an
manufacturers to detect and report equipment failures.
application system to provide continuous monitoring of
APPLICATION CONTROL - Designed for each software the systems transaction.
application.
IT GOVERNANCE - Provides the framework to ensure
CONTROLS MAY BE MANUAL OR AUTOMATED AND that IT can support the organization’s overall business
INCLUDE THE FOLLOWING. needs.

 INPUT CONTROL TYPES OF RISKS


 PROCESSING CONTROL
• Business Risk – The possibility that a company
 OUTPUT CONTROLS
will have lower than anticipated profits, or that
INPUT CONTROL - Designed to that the information will experience a loss rather than profit.
entered is authorized, accurate and complete.
• Continuity Risk – The possibility that a company
Garbage in = Garbage out.
will not be able to continue its operations due to
CONTROL SPECIFIC TO IT. weakness in control.

• Management authorization IT RISKS - The potential that a given threat will exploit
vulnerabilities of an assets and thereby cause harm to
• Check digit- purpose of the check digit is to verify the organization.
that the information of the barcode has been
entered correctly. (1359) Categories:
• IT service delivery risk – associated with the
 Edit check- Automated controls programmed performance and availability of IT services.
into an application to help prevent invalid or
unreasonable data from, being entered. • IT solution delivery/realization risk – associated
(Numbers or text files only). with the contribution of IT to new or improved
business solutions, usually in the form of projects
PROCESSING CONTROL and programs.
 Prevent and detect errors while transaction data • IT benefit realization risk – associated with
are processed opportunities to use technology to improve
 Specific application processing controls are often efficiency and effectiveness to business
programmed into software to prevent, detect, processes.
and correct processing errors. RISK MANAGEMENT – The process which aims to help
organizations to understand, evaluate, and take action
on all their risks with a view to increasing the probability
of success and reducing the failure.
COMPUTER ASSISTED AUDITING TOOLS AND • Discovery Agreement - agreement between
TECHNIQUES employer and employee which allows the
transfer of ownership of discovery to the
• It is the practice of using computers to automate
employer.
the IT processes.
• It is a fundamental tool used by the auditors to • Non-compete Agreement - also known as
make search of the irregularities from given data. covenant not compete, it is an agreement from
• Refer to any computer program utilized to the employee about not to enter into or start
improve the audit process. similar business in competition against employer

• Trading Partner Contracts -written agreement


TEST DATA – Used to confirm the expected results, when
between companies and their trading partners,
a test data is entered, the expected result should come.
e.g. customers and suppliers
- It also verifies the software behavior to invalid
input data. • Computer Crime - also known as cybercrime,
refers to direct or indirect use of computer and
INTEGRATED TEST FACILITY (ITF) – techniques place a
communication technologies to perpetrate a
small set of fictitious records in the master files, and then
criminal act
the auditor compares processing with expected results
to verify that the system and its controls are operating KINDS OF COMPUTER CRIME
correctly.
• Hacking - refers to the practice of modifying or
PARALLEL SIMULATION – is a process of simulating data altering computer software and hardware to
(from a client) to compare the results of simulation with accomplish a goal that differs from the original
that of client’s system results. purpose of the system
COMMON TYPES OF REGULATORY AND LEGAL ISSUES
• Keylogger - a technology that tracks and records
Legal Contract -an agreement between or among two or consecutive key strokes on keyboard. Because
more persons or entities to do, or abstain from doing consecutive information such as username and
something in return for an exchange of consideration. passwords are often entered on a keyboard, a
keylogger can be a very dangerous technology
Elements in Contract
• Phising - is the fraudulent act of acquiring private
 Offer-nature or subject of agreement
and sensitive information such as credit card
 Consideration-states what the offeror
numbers, personal identification, and account
expects in return from the offeree
usernames and passwords
 Acceptance – clearly identify the offeror and
offeree, and both must sign and date the • Spoofing - A technique used to gain
contract unauthorized access to computers, whereby the
intruder sends messages to a computer with an
TYPES OF LEGAL CONTRACT
IP address indicating that the message is coming
• Employee Contract - Special type of contract from a trusted host
between employer and employee.
• Skimming -the illegal copying of information
• Confidentiality Agreement - a legal contract that from the magnetic strips found on credit and
outlines confidential material, knowledge or debit cards. Card skimming is considered a more
information that the parties wish to share with direct version of a phishing scam
one another for a certain purpose but wish to
• Intellectual Property - refers to the valuable
restrict access to third parties
creations of the human mind.
• Trade Secret Agreements - a contract that
GROUP 6
protects secret, such as formula, pattern,
CODES OF ETHICS
compilation, method, technique or process that
derives independent economic value
1. INTEGRITY - the principle of integrity imposes an
obligation on all professional accountants to be
straightforward and honest in all professional
and business relationships.
2. CONFIDENTIALITY - the principle of
confidentiality is not only to keep information
confidential, but also to take all reasonable steps
to preserve confidentiality.
3. OBJECTIVITY - the principle of objectivity
imposes an obligation on all professional
accountants not to compromise their
professional or business judgement because of
bias, conflict of interest or undue influence of
others
4. PROFESSIONAL BEHAVIOR – Must comply in
accordance to applicable laws and regulations,
and avoid any action that discredits the
profession.
5. PROFESSIONAL COMPETENCE AND DUE CARE -
You must have necessary skills, knowledge and
expertise about the profession.

S-ar putea să vă placă și