Uploaded by abongile maqashalala

AUI 4863 Study Guide

advertisement
Internal Audit Practice
AUl4863
Year Module
Department of Auditing
Open Rubric
© 2019 University of South Africa
All rights reserved
Printed and published by the
University of South Africa
Muckleneuk, Pretoria
AUI4863/1/2019
70458758
Shutterstock.com images used
MNB_Style
ii
CONTENTS
PREFACE............................................................................................................................ iv
PART 1:
AUDIT ENGAGEMENT CONSIDERATIONS .................................................... 1
TOPIC 1: Planning and conducting audit engagements ................................................ 2
Learning unit 1: Planning the audit engagements ................................................ 4
Learning unit 2: Conducting the audit engagements .......................................... 23
Learning unit 3: Reporting and monitoring progress ...........................................37
PART 2:
Integrated applications in the internal audit process ...................................49
TOPIC 2: Financial systems auditing ............................................................................ 50
Learning unit 4: Financial systems audit planning .............................................. 52
Learning unit 5: Conducting financial systems audits ......................................... 59
Learning unit 6: Reporting on financial systems audits ....................................... 66
TOPIC 3: Compliance auditing ..................................................................................... 68
Learning unit 7: Compliance audit planning .......................................................71
Learning unit 8: Conducting compliance audits ................................................. 82
Learning unit 9: Reporting on compliance audits ............................................... 86
TOPIC 4: Operational auditing ............................................................................. 95
Learning unit 10: Operational audit plan ............................................................ 90
Learning unit 11: Conducting operational audits ................................................108
Learning unit 12: Reporting and follow-up on operational audits ......................... 117
TOPIC 5: Fraud investigations..................................................................................... 124
Learning unit 13: Planning fraud investigations ................................................. 126
Learning unit 14: Performing fraud investigations .............................................. 136
Learning unit 15: Reporting and follow-up on fraud investigations .......................142
Learning unit 16: Case Study ........................................................................... 149
TOPIC 6: Auditing of advanced IT system ........................................................... 160
Learning unit 17: General and application controls ............................................ 162
Learning unit 18: Auditing advanced and newly developed IT systems ................. 174
TOPIC 7: Performing information technology-based audits .....................................198
Learning unit 19: Auditing in an IT environment ................................................ 200
Learning unit 20: Computer-assisted audit tools and techniques (CAATTs) ........... 211
Learning unit 21: Factors to be considered in the choice and use of audit software 220
Learning unit 22: Corporate IT governance ........................................................223
iii
AUI4863/SG
PREFACE
STUDY OVERVIEW
Every human being has certain objectives in life. Being the manager of your life, you would have
set certain objectives for yourself. Being registered for this module indicates that one of your
objectives is to obtain a degree from Unisa. Since this is a third-level module, you should be
aware of the following risks that may keep you from reaching this objective:
● not having adequate time to study
● not being able to pay for your studies
● falling ill and not being able to study for and/or write the examination
Having reached this level of study also indicates that you have implemented adequate controls
to keep these risks from manifesting.
Let’s think of possible controls you may have implemented:
Risks
Not having adequate
time to study
Not being able to pay
for your studies
Falling ill and not being
able to study for and/or
write examinations
Controls
● Diarise deadlines of assignments and plan
your time to complete them.
● Arrange adequate study leave in advance
to prepare for examinations.
● Limit social activities to weekends only.
● Make sure you pass, so that your sponsors
will be willing to continue paying for your
studies.
● Be a diligent and reliable worker so that
you will continue to earn money to pay for
your own studies.
● Restrict yourself to a budget so that you will
have money to pay for your studies.
● Eat healthy food.
● Get enough sleep.
● Exercise frequently.
The ultimate proof to yourself that you have implemented adequate controls will be receiving
positive results at the end of the semester. However, if you are wise enough, you will perform
interim engagement procedures on the controls you have implemented to assure yourself that
the controls are working. By testing the controls, you will be able to assess whether the controls
you have implemented are working as intended or not, and whether additional controls or
adjustments to the existing controls may be necessary. How would you test the adequacy of these
controls?
This module is all about applying the fundamental internal auditing principles and techniques
which are normally considered and applied when establishing, managing and administrating the
internal audit activity.
iv
To be able to better understand this module you need to have passed the third-level modules,
AUI4863: Advanced Internal Audit Applications.
The module starts with a discussion of internal auditing and other guidance as well as best
practices regarding establishing, managing and administrating the internal audit activity. It then
continues discussing how these specific functions and quality assurance reviews on the internal
audit activity should be conducted.
Risks
Controls
● Diarise deadlines of
assignments and plan
your time to complete
them.
● Arrange adequate study
leave in advance to
prepare for
examinations.
● Limit social activities to
weekends only.
● Make sure you pass, so
that your sponsors will
be willing to continue
paying for your studies.
● Be a diligent and reliable
worker so that you will
continue to earn money
to pay for your own
studies.
● Restrict yourself to a
budget so that you will
have money to pay for
your studies.
● Eat healthy food.
● Get enough sleep.
● Exercise frequently.
Test of Controls
● Confirm with your employer and
friends that you have diarised all
commitments and that you still have
time to complete the assignments as
planned.
● Obtain written approval of your leave
arrangements from management.
● Page through your diary and reflect on
your time management for the past two
weeks and the two coming weeks to
ensure that you are not engaging in
social activities during the week.
● Check on myUnisa that the university
has received your assignments before
the cut-off date and that you have
admission to the examinations.
● Discuss your performance with your
supervisor/manager to find out if he or
she is satisfied or whether you should
improve and how.
● Check your expenses against your
budget and make sure you keep within the limits set for yourself.
From time to time, reflect on the following:
● when last you had a decent meal
● what time you have been going to
bed
● when last you exercised
THE ICONS FOR ACTIVITIES USED IN YOUR STUDY MATERIAL
Each learning unit contains various activities that you should perform. The study activities, for
example, refer you to the study material in the study guide and tutorial letters that you are
required to study; the doing and thinking activities require you to perform certain actions and to
answer certain questions.
The icons that will be used in this study guide and tutorial letters are listed below, together with a
description of what each of them means.
v
AUI4863/SG
Icon
Description
Key concepts. The key concepts icon draws your attention to certain keywords or
concepts that you will come across in the topic or learning unit.
Learning outcomes. The learning outcomes indicate what parts of the topic or
learning units you must master and demonstrate that you have mastered.
Mind map. Mind maps are provided to help you see the relationship between various
parts of the learning material.
Study. The study icon indicates which sections of the prescribed book or the study
guide you need to study and internalise.
Read. The read icon will direct you to read certain sections of the prescribed book
for background information.
Activity. The activity icon refers to activities that you must do to develop a deeper
understanding of the study material.
Reflection. The reflection icon requires you to reflect on the important issues or
problems dealt with in the learning unit.
Online assessment. When you see the online assessment icon, you will be required to
test your knowledge, understanding and application of the material you have just
studied.
Feedback. The feedback icon indicates that you will receive feedback on your
answers to the self-assessment activities.
Multimedia. The multimedia icon indicates that you must refer to any audio
material, screencasts, podcasts, videos or DVD material that may be included in your
study material as additional resources.
Time-out. The time-out icon indicates that you should take a rest because you have
reached the end of a learning unit or topic.
Discussion. Use the Discussion tool for this module on myUnisa to share valuable
information about assignments, topics that are related to this module, etc. Make sure
that you are using the correct Discussion tool.
Additional resources. Here you will find your assignments, additional documents,
resources, PowerPoint presentations and links to articles related to this module.
Internet source. You will receive a link to access web content from an external
website.
Frequently asked questions. Frequently asked questions on the topic will be posted
on myUnisa.
Blog. Join the discussion on the Blog provided on myUnisa.
vi
ABBREVIATIONS USED IN THIS STUDY GUIDE
CAATTS
CAE
Computer Assisted Audit Tools and Techniques
CEO
Chief executive officer
CFO
Chief financial officer
CIS
Computerised Information System
CPA
Certified Public Accountant
COBIT
Control Objectives for Information and Related Technology
CoCo
Criteria of Control
COSO
Committee of Sponsoring Organisations
CRSA
Control/Risk Self-Assessment
CSR
Corporate Social Responsibility
CSA
Control Self-Assessment
ERM
Enterprise risk management
GTAG
Global Technology Audit Guide
IAA
Internal audit activity
IASB
Internal Auditing Standards Board
IFRS
International financial reporting standards
IIA
Institute of Internal Auditors
IG
Implementation guides
IOD
Institute of Directors
IPPF
International Professional Practices Framework
ISO
International Organisation for Standardisation
IT
Information technology
JSE
Johannesburg Stock Exchange
King IV
King IV Report on Corporate Governance in South Africa
KPI
Key Performance Indicator
MFMA
Municipal Finance Management Act
PFMA
Public Finance Management Act
PCAOB
Public Company Accounting Oversight Board
PWC
PricewaterhouseCoopers
QAR
Quality assurance reviews
RBIA
Risk-based internal audit
SA
South Africa
SOX
Sarbanes Oxley Act
UNISA
University of South Africa
USA
United States of America
Chief audit executive
vii
AUI4863/SG
Level 1: Knowledge and comprehension
This calls for a knowledge and understanding of facts, methods, processes, patterns and structures
and an ability to list and explain them. It involves memorising as well as an awareness, immediate
discovery, recall or recognition of relevant information in various forms. A limited degree of
interpretation is required.
You are required to understand the meaning of certain words to enable you to interpret assessment
criteria, to understand what completing the various activities in the study guide require from you,
and to correctly interpret assignments and examination questions.
To indicate the length, scope and format of answers to study activities and questions, limits or
restrictions have been included in the questions through the use of specific action verbs. These
action verbs give you an indication of how to approach the problem and style of writing called for.
An analysis of the action verbs contained in a question will enable you to:
• plan the answer systematically and organise your thoughts systematically
• ensure that you comply with the lecturer's requirements
You will also save yourself time and trouble by eliminating irrelevant material in your answer that is
beyond the scope of the question.
For the purposes of internal auditing the following meanings will be attached to the most
commonly used action verbs:
Action verbs: Meaning
Complete
to finish something
Explain
make clear and intelligible, or account for
Interpret
explain the meaning of
Name
the word by which a something is known
Underline
emphasise
Define
state the exact meaning of
Extrapolate
infer something from known facts
Present
introduce and compare
Write
set down in words
Describe
give an account of something
Illustrate
explain by the use of examples
List
item-by-item record, written one below another
State
express in words
Draw
sketch with a pen or pencil
Interpolate
insert into a whole
Measure
determine the size, extent
viii
Level 2: Application
This calls for a knowledge and understanding of the background and of the facts, and the ability to
apply rules, principles, techniques and methods to a problem in order to find a solution based on the
information provided. There is normally only one ideal solution to the problem and the solution is
therefore logically determined by the information provided. This process is also sometimes called
the convergent application of knowledge.
For the purposes of internal auditing the following meanings will be attached to the most
commonly used action verbs:
Action verbs: Meaning
Allocate
assign to someone or for a specific purpose
Apply
to use theoretical knowledge in a practical situation
Calculate
solve by mathematical procedure or reasoning
Compile
collect and arrange
Construct
build or put together complex ideas or interpretations (noun)
Convert
change in form
Demonstrate
show or prove by reasoning or evidence
Determine
find out the facts, settle conclusively
Draw up
prepare and write out
Infer
work out from evidence
Manipulate
control cleverly or deviously
Organise
make arrangements; arrange systematically
Prepare
make or get ready
Qualify
provide or be provided with the abilities necessary for a task; restrict
Record
document/information
Transfer
move or send from one place to another
Use
put into service or action; take advantage of
MULTIMEDIA
Click on the hyperlinks below to view the following YouTube videos n “Study tips for
auditing” and “Concept mapping – linking the audit topics together”:
https://youtu.be/YPilGQIQkOw
NOTE: Apply these guidelines to your internal auditing studies.
ix
AUI4863/SG
STUDY SOURCES
The study material for this module comprises the discussions and explanations contained in this
study guide and tutorial letters, as well as those contained in the following prescribed books:
●
Coetzee, GP, Du Bruyn, R, Fourie H & Plant, K. 2017. 6th Edition. Internal Auditing an
introduction. Lexis Nexis, Johannesburg, South Africa.
●
Coetzee, GP, Du Bruyn, R, Fourie H & Plant, K. 2017. 6th Edition. Performing Internal Audit
Engagements. Lexis Nexis, Johannesburg, South Africa.
●
Coetzee, G.P., Du Bruyn, R., Fourie, H. & Plant, K. 2018. Assurance: An Audit Perspective.
1ST edition. LexisNexis
●
Legislation, Standards and Guidance – available for download at:
King IV Report, 2016:
http://www.iodsa.co.za/page/DownloadKingIVapp
Company’s
2008:
https://www.saica.co.za/Portals/0/Technical/LegalAndGovernance/Comp
anies%20Act%20consolidated.pdf
Act,
PFMA:
http://www.treasury.gov.za/legislation/PFMA/act.pdf
MFMA:
http://dkm.gov.za/wp-content/uploads/2015/03/Municipal-FinanceManagement-Act.pdf
IPPF:
https://na.theiia.org/standards-guidance/mandatoryguidance/Pages/Standards.aspx
Other source references:
•
Cascarino, R.E. 2012. Auditor’s guide to IT auditing. Wiley
•
Puttick, G. & van Esch, S. 2003. The Principles and Practice of Auditing. Juta
•
Reding, K.F. 2007. Internal Auditing: Assurance & Consulting Services. Institute of
Internal Auditors. Research Foundation
•
Sawyer et al, 2003. Sawyer’s Internal Auditing: The Practice of Modern Internal Auditing.
•
Pickett, K.H. Spencer. 2010. The internal audit handbook. Wiley
•
Watne, D.A. & Turney, P.B.B. 1984. Auditing EDP systems. Prentice-Hall
x
PART 1
AUDIT ENGAGEMENT CONSIDERATIONS
Contents
TOPIC 1: Planning and conducting audit engagements
1
2
AUI4863/SG
TOPIC 1
Planning and conducting audit engagements
Contents
LEARNING UNIT 1:
Planning the audit engagement
4
LEARNING UNIT 2:
Conducting the audit engagement
23
LEARNING UNIT 3:
Reporting and monitoring progress
37
INTRODUCTION TO AND PURPOSE OF THE TOPIC
The aim of this topic is to guide you as a postgraduate student in internal auditing to become
proficient in planning and conducting an audit engagement according to the internal auditing
standards and other applicable guidelines, and to effectively communicate the results to the
relevant parties. Through practical examples and activities, we aim to help you integrate and extend
your knowledge to an integrated level of professional skill in this area.
This topic aims to provide guidance to you as a postgraduate student in internal auditing on how to
communicate the results of an audit to the relevant parties. The audit report is the only way in
which the engagement client can evaluate the work that the auditors have performed. The
definition of internal auditing states that the aim of internal auditors is to add value to their
engagement clients. The output of all the work done by the auditors is a report. Therefore, the
quality and accuracy of this report is an important means to convince management that internal
auditing does indeed add value. The way in which the results are communicated will greatly
influence the weight that management attach to the recommendations made in the report.
In this topic the results of the engagement and the best way to communicate these results, will be
applied to practical examples. This will include writing audit reports and communicating the results
to the engagement clients
REFLECTION
As a postgraduate student you will also have to undertake an independent and in-depth
study of the topics covered in the sections that follows. You should, therefore, refer to a
variety of publications, books, journal and magazine articles that deal with the topics
discussed.
In your undergraduate studies you have studied the concepts of the internal audit
process and you should already be able to plan and conduct an audit engagement. It is
important that you revise the underlying technical knowledge and expertise you
obtained at undergraduate level before you continue with the rest of this learning unit.
You may also want to review your undergraduate study material on “conducting an
internal audit engagement”.
2
While revising your undergraduate study material, take note of the following steps in the
internal audit process and make sure that you will be able to answer integrated and
practical questions pertaining to these steps:
•
Planning: In this step the internal auditor decides what will be covered (scope), how
the engagement should be approached, when the audit engagement should be
executed and who will perform the audit. This stage includes the setting of the
engagement objectives that are to be met.
•
Execution: The applicable audit procedures are applied to achieve the engagement
objectives.
•
Reporting: A draft audit report is discussed with management to obtain
management comments and to determine an action plan. The final report (also
referred to as the final engagement communication in the standards), which
contains all the findings, comments and the action plan, is then issued.
•
Follow-up: After the agreed implementation date, an audit engagement is
scheduled to verify that the action plan has successfully been implemented.
REFLECTION
Refer to Internal Auditing: An Introduction, Chapter 6
In this topic we revisit the first two of the abovementioned steps and discuss the
implementation thereof in more detail. You should be able to apply the relevant audit
steps to each type of audit that will be covered in the postgraduate modules. The steps
will, however, not be discussed in detail again.
The successful planning and conducting of an audit engagement is essential to report
the correct and necessary information to management. Planning and conducting the
audit engagement is discussed in two learning units.
LEARNING OUTCOMES
After you have studied this topic, you should be able to
● plan the audit engagement
● determine applicable audit objectives
● formulate audit procedures to be executed
● compile an internal audit report
● communicate audit engagement results
3
AUI4863/SG
Learning unit 1
Planning the audit engagements
Contents
1.1
1.2
1.3
1.4
1.5
1.6
INTRODUCTION
ANNUAL AUDIT PLAN
THE PRELIMINARY SURVEY
ESTABLISHING THE OBJECTIVES, CRITERIA AND SCOPE OF AN AUDIT ENGAGEMENT
EVALUATION OF THE SYSTEM
RESOURCE ALLOCATION AND TIMING
1.1
INTRODUCTION
The purpose of an IAA is to add value to the organisation’s operations. This implies that the areas
that have been identified by management as being important must be taken into consideration
when planning the audit engagement.
The mission statement describes the core purpose and focus of internal audit.
To enhance and protect organisational value by
providing risk-based and objective assurance, advice
and insight.
Source: https://global.theiia.org
The mission statement consists of the following key components:
•
To enhance and protect organisational value.
•
To be objective in the performance of duties.
•
Follow a risk-based approach.
•
Provide assurance.
•
Provide advice and insight (consulting).
It is quite clear from the IA mission that the mandate of the internal audit function is no longer
limited to the traditional assurance function of predominantly performing internal audits in the
financial area of the organisation.
First and foremost, internal auditors need to have expert knowledge of internal controls, risk
management, and corporate governance (especially business ethics).
It is also expected of the internal auditor, especially the CAE, to have a good working knowledge in
areas such as business strategy and effective business operations.
4
4
5
10
13
16
21
The expanded role of the internal audit function may be illustrated as follows:
The Standards prescribe that a risk-based audit plan should be followed. Risk-based auditing is
driven by the way an organisation identifies and manages its risks. The internal audit plan should
use the strategic risks and plans of the organisation to inform the annual audit plan. As the wellknown adage states: "If you fail to plan, you plan to fail”. Therefore, the time spent on planning
and preparing for an audit is never wasted. The IIA’s International Standards for the Professional
Practice of Internal Auditing (Standards) provides comprehensive mandatory guidance on how an
audit engagement should be planned and lists the relevant documentation that should be saved
for future reference.
In the sections that follow, the following topics will be discussed:
• The annual audit plan
• Planning the audit engagement – the preliminary survey
• Establishing the engagement objectives and scope of an audit engagement
• Evaluation of the system
• Resource allocation and timing
REFLECTION
Review your third-year studies and make sure you recall and understand the
importance engagement planning as part of the internal audit process.
1.2 ANNUAL AUDIT PLAN
STUDY
Study the following:
5
AUI4863/SG
•
•
•
•
International Professional Practices Framework (IPPF), Standards 2010, 2050 and
2120 as well as Implementation Guides 2010, 2050 and 2120
IIA Practice Guide: Engagement Planning – Establishing Objectives and Scope
Internal Auditing: An Introduction (2017: Chapter 6)
All the sections in your undergraduate study material that relate to engagement
planning, risks and risk management concepts.
According to Implementation Guide 2050, the board of directors of an organisation is responsible
for gaining assurance that risks are mitigated to an acceptable level. The chief audit executive
(CAE) of the IAA can assist by taking the risk assessment of the organisation into consideration
when drafting the annual audit plan.
Risk is identified by the IIA as the possibility of an event occurring that will have an impact on the
achievement of objectives. In the context of an organisation this can be the strategic objectives of
an organisation or the operational objectives in one of the departments in an organisation. The risk
management process is the way that an organisation identifies, assess, manage and control
potential events or situations to provide reasonable assurance regarding the achievement of the
organisation’s objectives (strategic and operational). The theory of risk management is covered in
detail in AUI4862.
Various guidelines, including Standard 2010 and King IV (2016:70), require that the annual audit
plan and the audit engagement plan (engagement work plan) be risk-based and consistent with
the organisation’s goals.
King IV (paragraph 58) requires that the governing body, usually the board of directors, ensure
that
• the internal audit function follows an approved risk-based internal audit plan; and
• the internal audit function reviews the organisational risk profile regularly
It is essential that the complete environment of the organisation is evaluated before the annual
audit plan is approved. This evaluation should consider the organisation’s risk management
framework and risk appetite levels.
Risk is becoming more complex, requiring risk oversight to be strengthened. King IV recommends
that the risk committee comprises a majority of non-executive members. This recommendation
goes beyond what was required in King III. King IV introduces the term “risk and opportunity
governance” and provides a different perspective on risk. Risk governance should aim for what is
stated as follows in Principle 11, “The governing body should govern risk in a way that supports the
organisation in setting and achieving its strategic objectives”.
The implementation and ongoing operation of RBIA has three stages:
• Stage 1: Assessing and reporting to the audit committee and board on the adequacy
and effectiveness of risk management within the organisation
• Stage 2: Preparing the risk-based annual internal plan
• Stage3: Performing risk-based internal audit engagements
6
The following flowchart (as per the IIA) gives an overview of the three stages involved:
Source: Risk based internal auditing - Chartered Institute of Internal Auditors
STUDY
Study “How to identify a risk” under Additional Guidance on myUnisa.
The risk-based internal approach (RBIA) provides assurance on the risk management process to
identify, evaluate, monitor and report on risk and that these processes are operating effectively.
7
AUI4863/SG
Source: Risk based internal auditing - Chartered Institute of Internal Auditors
Figure: The risk management process and the role of internal audit
If the organisation does not have a risk assessment process in place, the CAE should consider
various factors as discussed in Standard 2120 and Implementation Guides 2120. These factors
include:
• achievement of the organisation’s strategic objectives
• reliability and integrity of financial and operational information
• effectiveness and efficiency of operations and programs
• safeguarding of assets
8
• compliance with laws, regulations, policies, procedures, and contracts
The King Report on Governance for South Africa 2016, (King IV) applies to all
organisations/entities in South Africa and its recommendations are compulsory for organisations
listed on the Johannesburg Stock Exchange (JSE). King IV includes supplements to assist various
types of organisation to implement King IV. These organisations are municipalities, SMEs, SOEs,
NPOs and retirement funds.
One of the most important recommendation in King IV that is applicable to this section, is that the
organisation is required to do a risk assessment, at least annually (King IV 2016:70). This
assessment should include input from the board of directors and senior management (Standard
2010.A1). The CAE is responsible for using this risk assessment to identify the most important
activities that must be included in the annual audit plan. The final annual audit plan must be
approved by the organisation’s risk governance committee as required in King IV (2016:70). “The
CAE must review and adjust the plan, as necessary, in response to changes in the organization’s
business, risks, operations, programs, systems, and controls.” (Standard 2010)
Best practices, according to Standard 2010, are as follows:
• Identify and consider stakeholder input into the internal audit risk assessment process.
• Don’t let major risks go uncovered; find a way to address them before they get too big.
• Educate key stakeholders on important areas of risk and on actions needed to address issues.
• Develop an ongoing communications process with management to keep current on changing
business and risk issues.
The figure below shows where the internal audit activity should focus their internal audit
resources.
Source: www.theiia.org
Once the annual audit plan has been completed and approved by the audit committee, the
individual audit engagements can be planned. The figure below is an example of an annual audit
schedule.
9
AUI4863/SG
Figure: Internal audit annual schedule
Individual plans are referred to as the “assignment plan”. As part of the planning process, an
evaluation of the applicable activity must be done. This is known as a preliminary survey. In the
next section the preliminary survey and its contribution to the planning process will be discussed.
1.3 THE PRELIMINARY SURVEY
REFLECTION
Think of some other reasons for performing a preliminary survey and make a note
thereof. Also search for articles or information on the internet that give you more
insight into why a preliminary survey should be conducted.
INTERNET SOURCE
Go to myUnisa, under Additional Resources to download relevant articles or guidance
on this topic.
View the PowerPoint presentation on “Effective Preliminary Surveys” at:
https://www.resourcenter.net/images/AHIA/Files/2012/AnnMtg/Handouts/F8.pdf
or go to myUnisa, under Additional Resources to download it.
READ
Read at least one article from the internet that give you more insight into why a
preliminary survey should be conducted.
10
STUDY
Study the following:
• Standards 2200, 2201 and 2210 as well as Implementation Guides 2200, 2201 and
2210
• Internal Auditing: An Introduction (2017: Chapter 6, par 6.6.3)
• Revise all the sections in your undergraduate study material that relate to
preliminary surveys.
The preliminary survey will be used to identify the audit objectives that must be
aligned with the strategic objectives of the organisation. The preliminary survey
provides a basis for the preparation of a risk-based audit programme. The survey will
also assist the CAE to determine how much work must be done (i.e. the scope of the
audit). Based on this assessment, the resources and timing for the audit engagement
can be identified.
REFLECTION
Refer to the Additional Resources on myUnisa on the topic of “How to formulate an
audit objective”.
The main reasons for performing a preliminary survey of an activity to be audited are:
• to collect information on the activity that will serve as a basis to determine the
scope for the audit engagement and identify the audit objectives that must be
aligned with the strategic objectives of the organisation
• to identify the specific risks that are related to this activity, since the activity has
probably already been highlighted as an area that concerns management in the
annual risk assessment
• to get an overview of processes and resources that are in place and to evaluate
which processes and resources might be lacking or which of these processes do
not work effectively
• to identify adequate criteria that will be used when evaluating the activity; if the
criteria are not adequate, management of the activity must be consulted to
determine adequate criteria
• to determine the extent of audit work required and to identify the timing and
resources required for the audit
Standard 2220 stipulates that all relevant systems, records, personnel and physical
property must be taken into consideration during the preliminary survey to establish the
scope of the audit engagement. This will be covered in the next section.
The manner in which a preliminary survey is undertaken depends on how much is already
known about the activity that will be reviewed. In some instances, it will be sufficient to
review previous audit files, while in other instances a number of interviews may be
conducted to get an understanding of the activity that will be reviewed. Do your own
research to make sure that you have a thorough knowledge of the different ways in
which a preliminary survey could be performed.
11
AUI4863/SG
Good interviewing skills are also essential during this phase, especially when a system
description must be prepared. A system description is a flowchart or narrative of the flow
of activities and documents within a business cycle such as sales. It is done to understand
all the main activities and key controls within the system. By conducting a preliminary
survey, the internal auditor will be able to understand the impact of the risks on the
organisational objectives, the risk assessment and the risk management processes as
well as the control system that facilitate a successful risk management process.
The results of this review may be summarised to reflect the risk assessment, significant
engagement issues, engagement objectives and procedures, methodologies to be used,
sampling techniques and a brief evaluation of controls. It might also, amongst others
(Implementation Guide 2200), include whether third parties will rely on the results of the
engagement, whether the work that will be done will be used in potential or current
litigation, the experience needed of internal auditors to perform the engagement and
level of supervision required. This report will rarely exceed two pages.
Standard 2200 requires the internal auditor to compile a plan, referred to as the
“assignment plan” in Spencer Pickett (2010:789). This plan should include engagement
objectives, scope, timing and resource allocation. Now that you know what the
municipality’s main functions, risks and controls are, you can establish the engagement
objectives and scope of the audit engagement.
ACTIVITY 1
You are conducting an audit of the accuracy and completeness of property values and
property rates for a municipality. Make a list of the aspects you will consider during your
preliminary survey.
FEEDBACK
The following information could be included in the preliminary survey of the audit of the
accuracy and completeness of property values and property rates at the municipality:
•
•
•
•
•
•
•
•
•
Identify the mission and strategic objectives of the municipality.
Identify the person with whom the initial meeting should be held and schedule
such a meeting.
Obtain relevant reports and newspaper articles regarding the performance of the
municipality in this area of audit.
Obtain policies and procedures and other relevant legislation that are applicable
to the municipality and identify a specific section that governs the activity under
review.
Obtain an organisational chart for the activity under review.
Determine the major expenditure and revenues for the activity under review.
Determine the nature of information systems relating to the activity under review.
Determine the basis on which property values and property rates are calculated.
Interview key personnel in the activity and document the processes followed in the
activity under review.
12
Note that you should be
able to apply your
knowledge to any given
scenario or question for
examination purposes.
1.4 ESTABLISHING THE OBJECTIVES, CRITERIA AND SCOPE OF AN
AUDIT ENGAGEMENT
STUDY
• IPPF, Standards 2210 and 2220 as well as Implementation Guides 2210 and 2220
• Internal Auditing: An Introduction (2017: Chapter 6 – 6.6.5)
• Revise all the sections in your undergraduate study material that relate to
establishing the engagement objectives and scope of an audit engagement.
Should you find it necessary to refresh your theoretical knowledge of this study, you
should refer to your undergraduate study material.
According to the internal auditing standards, engagement objectives are broad
statements developed by the internal auditor that define the intended engagement
accomplishments. These statements will not limit the scope of the investigation and
will ensure that the purpose of the engagement is still accomplished. Based on the
information and evidence obtained during the preliminary survey, the auditors will
determine the objectives of the audit engagement. The objectives must enable the
internal auditors to add value to and improve the operations of the engagement
activity, as well as those of the organisation as a whole.
Audit engagements that have clear, specific objectives require less audit resources and
are completed in less time because work does not need to be repeated or wasted on
activities that do not form part of the scope. Establishing clear objectives provides a
structure and discipline that helps the audit team to focus on the expected results and
avoid confusion. When developing the engagement objectives, internal auditors must
consider the possibility of significant errors, fraud, noncompliance and other exposures
of the activity under review.
The next step is to identify the criteria to determine what should be in place, i.e. a list
of what you see as acceptable.
13
AUI4863/SG
STUDY
Study Internal Auditing: An Introduction (2017: par - 6.6.5.2)
Before the engagement procedures can be conducted, it must be clear what the audit
must achieve and what must be verified or investigated.
This is referred to as the "scope of the audit". Implementation Guide 2220 states that
scope statements identify the audited activities; they may include supportive
information such as the time period reviewed, and related activities not reviewed to
delineate the boundaries of the engagement. The scope should include considerations
of the relevant systems, records, personnel and physical property according to
Standard 2220. Achieving the engagement objectives is greatly influenced by what is
included and excluded from the scope for the engagement.
The scope will include the nature, timing and extent of the testing that will be
performed.
STUDY
Internal Auditing: An Introduction (2017: par - 6.6.5.3)
ACTIVITY 2
The preliminary survey of a municipality indicated the following:
• The mission of the municipality is to provide efficient, effective and affordable
services.
• The municipality is subjected to the Municipal Finance Management Act.
• A new mayor has been appointed in the past financial year after the previous mayor
was dismissed due to his involvement in illegal activities. It is general knowledge that
the municipality does not always make reputable decisions.
• It was reported by a local newspaper recently that some areas’ taxes are higher than
those for other parts of the city. It is suggested that the calculation of taxes is not
done according to policy.
• In the period under review the system for the collection of property rates for
sectional title properties has changed. The individual owners of units in a complex
are now liable for the payment of their own property rates, and not the sectional title
properties as before.
• Due to major corruption and errors in the evaluation of the property values, an
external contractor has been appointed. However, he has only revalued 40% of the
properties to date. The contractor is not required to give regular feedback on the
progress of the project. Due to the uncertainty of the accuracy of the property rates,
many residents refused to pay their accounts. Writing-off of bad debt is approved by
the municipal manager without supporting documentation.
• For four months during the previous financial period the Finance Manager has not
been available to review financial decisions. No one has been appointed to act on his
behalf.
• The section of the municipality that reviews property values is staffed by one newly
14
appointed manager who is responsible for communication with the Council and the
supervision of the section. Two supervisors were also appointed. The one is
responsible for the valuation of the properties and the other for calculating property
rates and forwarding these calculations to the finance department. Each supervisor
has two clerks to assist them. Supervisors may stand in for each other when one of
them wants to go on leave.
• The value of properties is entered into a computer programme which was written
especially for use by the municipality. The property rate calculations are based on a
master file that contains the rates based on the classification of the property. The
calculations are verified and submitted electronically to the finance department.
• Submission of calculations to the finance department is usually late.
• Property rates are calculated on the applicable council report in which the bases for
classification and rate per classification are announced.
Based on the preliminary survey performed, determine the scope and engagement
objectives for the audit of the accuracy and completeness of property values and
property rates for a municipality.
FEEDBACK
The scope of the audit might include
•
•
•
•
the basis for determining property values
property values used in calculation of property rates
submission of calculations to the finance department
timely collection of debt
Engagement objectives might include the following actions:
• Determine how management is going to ensure that all properties are
independently valued to use as a basis for all calculations.
• Verify that all properties are taxed appropriately.
• Ensure that the process followed to implement changes take good internal control
into consideration.
• Ensure the accuracy of changes implemented in the financial systems.
• Ensure that the calculations of rates are accurate.
• Ensure that properties’ values are determined accurately.
• Ensure that the municipality abides by all relevant laws, policies and procedures.
• Determine that the computer package used is subjected to appropriate general and
application controls.
• Ensure that overdue accounts are appropriately managed.
15
AUI4863/SG
Use the following depiction to study the requirements of audit objectives:
SMART
Source: www.theiia.org
You should be able to integrate and apply your knowledge to any given scenario or question for
examination purposes.
1.5 EVALUATION OF THE SYSTEM
STUDY
• Internal Auditing: An Introduction (2017: Chapter 7 – 7.3 - 7.9)
• Revise all the sections in your undergraduate study material that relate to system
descriptions and evaluation of the system.
16
Should you find it necessary to refresh your theoretical knowledge of this study, you
should refer to your undergraduate study material.
The system and processes within the specific activity that will be reviewed must be
evaluated and understood. One way to evaluate the system that will be discussed is the
Internal Control Questionnaire (ICQ). Refer to your prescribed textbook, Internal
Auditing: An Introduction (par 7.5).
In short, an ICQ is a list of questions with a "Yes" or "No" answer. It is designed in such a
way that, by answering "No" to a question, it indicates a control weakness. As a
postgraduate student, you should be able to evaluate such an ICQ and make
recommendations where applicable.
ACTIVITY 3
One of the internal auditors in the team compiled the following ICQ:
Internal Control Questionnaire for the municipality
No
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Internal Control Questions
Does the municipality have a good reputation in the community
it serves?
Do management personnel seem to have a positive attitude
towards integrity, ethical values, and competence? (Clues might
include professional credentials such as involvement and support
for industry standards.)
Does the municipality appear to have adequate personnel to
achieve segregation of duties?
Does the mayoral committee appear interested and involved in
the financial affairs of the municipality?
Does the council delegate decision-making to the municipal
manager to an excessive degree?
Has management assessed the risk of material misstatement of
the property value and property rates?
Has a new computerised accounting system been implemented
or were significant changes made to the previous system (i.e.
new software package)?
Have there been changes in the accounting procedures, including
new types of transactions, reduced personnel, and changes in
segregation of duties?
Is there an action plan in place to ensure that all property values
are reviewed to take changes in the property market into
consideration?
Are invoices filed in a timely manner to enhance collectability of
overdue accounts?
Yes
No
N/A
Refer to the background information that was obtained during the preliminary survey in the
previous section. Review the ICQ and evaluate whether it is complete and accurate to provide a
comprehensive evaluation of the control environment. If you think changes are necessary, how
17
AUI4863/SG
would you change it? Based on the information provided, what would your answers to the
questions be, “Yes”, “No” or “N/A”?
FEEDBACK
The following is a typical example of what would be an appropriate or correct internal
control questionnaire. The questionnaire should be directed to the municipal manager
to ensure that the correct information is obtained. You should be able to apply your
knowledge to any given scenario or question.
Internal Control Questionnaire for the municipality
No
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Internal Control Questions
Does the mayoral committee appear interested and involved in
the financial affairs of the municipality?
Has the mayoral committee assessed the risk of material
misstatement of the property value and property rates?
Does the mayoral committee receive reports from the contractor
to review and authorise the newly established property values?
Have there been any significant changes in operations since the
prior year, e.g. changes in management, changes in the
accounting system or type of transactions or the composition of
the mayoral committee and its subcommittees, etc?
Does the mayoral committee receive reports for the calculation
of the property rates based on the property values?
Does management seem to have a positive attitude towards
integrity, ethical values, and competence? (Clues might include
professional credentials such as involvement and support for
industry standards.)
Does the section responsible for property rates appear to have
adequate personnel to achieve segregation of duties?
Has the computerised accounting system been consistent for the
past financial year?
Will the established property values be reviewed to take into
consideration changes in the property market?
Are all owners of a complex billed for property rates instead of
the sectional title body?
Is the classification of properties reviewed before submission to
Finance?
Are property rates calculations submitted timely to be included in
the invoices?
Are accounts receivable listings aged to identify overdue
accounts?
Are overdue accounts pursued for collection in a timely manner?
Are bad debt write-offs reviewed and approved by the mayoral
committee?
18
Yes
No
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
N/A
From the above you have now established how dependable the control environment is.
This can give you an indication of the work that must be done. The next step is to
establish how long it will take to conduct the audit and what resources must be
allocated to this audit, taking the level of proficiency of the internal auditors into
consideration.
Another method of evaluation is analytical analysis and control self-assessment.
Standard 1220.A2 states that “in exercising due professional care internal auditors
must consider the use of technology-based audit and other data analysis techniques”.
STUDY
•
•
•
The IPPF, Standards 1220.A2, 2130 and 2310 as well as the related Implementation
Guides.
Assurance: An Audit Perspective (2018: Chapter 8 & 9 - 9.10)
myUnisa - Additional Resources: Additional Guidance - Analytical analysis
Data
analytics
Data analytics is very important to gather information and will form an integral part of
any audit where the velocity, volume and variety of data is a challenge. Also note the
difference between data analysis and data analytics.
STUDY
•
•
Assurance: An Audit Perspective (2018: Chapter 7 – 7.7 & Chapter 8 - 8.4)
GTAG 16 – Data Analysis Technologies
MULTIMEDIA
Click on the hyperlinks below to view the following YouTube videos:
https://youtu.be/aeHqYLgZP84
https://youtu.be/RAw55JEcnEs
https://youtu.be/mm2A5tKVIpg
https://youtu.be/2i8ZqL99Vz0
https://youtu.be/TzxmjbL-i4Y
https://youtu.be/7D1CQ_LOizA
19
AUI4863/SG
Data analytics used effectively will add value in the audit process and ensure the
efficient use of audit resources.
Source: http://www.byteorigin.com/services/cloud-application-development/big-data-analytics/
Source: https://www.xenonstack.com/blog/big-data-engineering/ingestion-processing-big-dataiot-stream/
20
1.6 RESOURCE ALLOCATION AND TIMING
STUDY
•
•
Study the IPPF, Standards 2020 and 2030 as well as Implementation Guides 2020
and 2030.
Internal Auditing: An Introduction (2017: Chapter 6 - 6.6.6)
Should you find it necessary to refresh your theoretical knowledge of this topic, you
should refer to your undergraduate study material.
The CAE must communicate the IAA's plans and resources to senior management and
the board of directors, including any resource limitations. It is the responsibility of the
CAE to ensure that resources are appropriate, sufficient and effectively deployed to
achieve the audit plan according to Standard 2030. Resources allocated to the
engagement should be sufficient to ensure that the engagement objectives are
achieved. Appropriateness and sufficiency of resources is determined by the number,
experience level and knowledge, skills and other competencies of the internal audit staff.
While supervising the engagement, the internal audit manager should ensure that the
staff members assigned to the engagement have the knowledge, skills and other
competencies required to conduct the engagement effectively. (There is a direct link
here with the competency requirement of the Code of Ethics and due professional care
requirements in Standard 1220.)
The internal audit manager who is supervising the audit must provide appropriate
instructions to the internal audit team. It is the responsibility of the internal audit
manager to initiate or request training of the internal audit team members to develop
their knowledge and skills as internal auditors. This will ensure that they perform the
engagement effectively.
He or she must ensure that the approved plan is carried out as was agreed, unless
changes are justified, and that the working papers adequately support the conclusions
and recommendations of the internal audit team.
The time that must be budgeted to complete the audit depends on the skill and
experience of the available auditors. The appropriate timing of the audit should also be
considered, e.g. the financial year-end of the engagement client might not be a suitable
time to schedule an audit.
READ
Go to myUnisa, under Additional Resources to download relevant articles or guidance on
this topic.
REFLECTION
Look for further articles that will give you insight into the engagement planning process,
the role of the CAE and audit team and any new developments or guidance in this
regard.
21
AUI4863/SG
ACTIVITY 4
You have completed the preliminary survey and determined the engagement objectives
for the audit of the accuracy and completeness of property values and rates at the
municipality. Now determine the resources that you will need to complete this audit.
ONLINE ASSESSMENT QUESTION
Do the online assessment multiple-choice questions on myUnisa.
SUMMARY
This learning unit focused on the planning of an audit engagement, also referred to as
the assignment plan. The main considerations are the preliminary survey, the
engagement objectives and scope as well as the allocation of resources. Once the
planning of the audit is completed, the audit procedures that will satisfy the engagement
objectives can be developed and the testing can begin.
NOTES
Make your own notes here:
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
22
Learning unit 2
Conducting the audit engagements
Contents
2.1
2.2
2.3
2.4
2.5
2.1
INTRODUCTION
ENGAGEMENT WORK PROGRAMME
SAMPLING
PERFORMING THE AUDIT PROCEDURES
EVIDENCE AND WORKING PAPERS
23
23
30
31
34
INTRODUCTION
In the previous learning unit, the planning of individual audit engagements was
discussed. This learning unit focus on the activities involved in the conduct of an audit
engagement. When you conduct an audit, the engagement objectives and scope
established during the planning phase are used to compile the engagement work
programme. The procedures performed will aim to determine •
•
whether the controls implemented are sufficient to mitigate the risks involved
whether the controls are adhered to
2.2 ENGAGEMENT WORK PROGRAMME
STUDY
•
The IPPF, Standards 2200 and 2240 as well as Implementation Guides 2200 and
2240.
• Internal Auditing: An Introduction (2017: Chapter 6 – 6.6.7; Chapter 7 – 7.2)
• Revise all the sections in your undergraduate study material that relate to compiling
an engagement programme.
The engagement programme will contain all the information that is needed to evaluate
the controls in place.
23
AUI4863/SG
To be able to test controls, you should know what the different types of controls are,
which control mechanisms can be used to mitigate risks and you must be able to
evaluate the suitability of controls. The following schematic representation shows where
these different types of controls fit into risk management process.
Figure: Types of controls
The following illustration shows the timeline of the implementation of controls as well as
examples of these controls.
Figure: Timeline of the types of controls
24
The following schematic diagram shows where the preventive control fits into the
transaction process:
Figure: Preventive control
In the next diagram the position of the detective control is displayed.
Figure: Detective control
The assertions for balances and transactions should be taken into consideration when
writing the engagement procedures (test of controls). If you are uncertain what the
assertions are, refer to your undergraduate study material.
25
AUI4863/SG
The assertions embodied in the financial statements, as used by the auditor to consider
the different types of potential misstatements that may occur, may take the following
forms:
Transactions
and events
Occurrence
Completeness
Accuracy
Cutoff
Classification
Account balances
at the year-end
Existence
Rights and
obligations
Completeness
Presentation and
disclosure
Occurrence
Rights and
obligations
Completeness
Classification and
understandability
Accuracy and
valuation
Valuation and
allocation
The engagement programme should cover the engagement objectives as discussed in
learning unit 1.1.
At a minimum, the engagement programme should include the following according to
Implementation Guide 2200:
•
•
•
•
the objectives of the engagement
technical requirements, objectives, risks, processes and transactions that are to be
examined
the nature and extent of testing required
the internal auditor’s procedures for collecting, analysing, interpreting and
documenting information during the engagement
With the approval of the CAE, the programme may be modified, as appropriate, during
the engagement. You should be able to identify other aspects that should also be
included in the engagement programme for a specific audit engagement or scenario.
The CAE should approve the engagement programme before testing can begin. The
engagement programme should be sufficient to ensure that the engagement objectives
are achieved. This will prevent having to redo work or doing unnecessary work that will
waste resources.
The evaluation of the activity’s controls will determine how much testing must be done
and how extensive the engagement programme should be. Inherent, control and audit
risk should be taken into consideration when compiling the programme to ensure that
unnecessary procedures are not included, but essential procedures are.
26
IR = Inherent Risks
RR = Residual Risks (Raindrops outside the umbrella)
CR = Control Risk (possibly the umbrella leaks)
Risk Appetite = How big the umbrella is.
ADDITIONAL READING
Go to myUnisa, under Additional Resources to download relevant articles or guidance on
this topic.
In this article the importance of proper planning is discussed as well as the importance of
alignment with the business objectives of the organisation to be audited.
NOTE: It is important to correctly
formulate an audit procedure. An
audit procedure is the specific test
that an internal auditor performs
when gathering the audit evidence
required to evaluate or determine if
the audit objectives are met.
27
AUI4863/SG
REFLECTION
Refer to the additional resources on myUnisa on the topic of “audit procedures”.
To perform the engagement procedures (test of controls), you will need documentation
or other information that is necessary to conduct the procedures. It is nearly impossible
to evaluate every transaction of an organisation. The prescribed textbooks for this
module refer to test of controls as engagement procedures. Please do not be confused
by this, as test of controls and engagement procedures are the same thing. Therefore,
the internal auditor uses only a sample of the transactions. In the next section we
discuss how this is done.
MULTIMEDIA
Click on the hyperlinks below to view the following YouTube videos:
https://youtu.be/9fNz4WJ4uZc
ACTIVITY 5
Compile a complete engagement programme for the municipality that will evaluate all
the applicable assertions based on the engagement planning done in learning unit 1.1
28
FEEDBACK
Engagement
Objective
Risk
Identified Control
Engagement Procedure/test of control
(Audit Procedures)
Ensure that
sufficient
segregation of
duties is in place.
The municipality might be
exposed to fraud due to
functions that are
overlapping because of a
lack of staff.
A transaction or process
may not be initiated,
prepared and approved by
the same person.
Obtain
satisfaction that
all properties are
taxed
appropriately.
Residents may be over or
under charged for
property rates.
Classification of properties
is verified before rates are
calculated.
The master file that
contains the rates that is
used to calculate rates is
changed only after the
new rates have been
published.
Only one person has access
to make amendments,
which must be approved by
a supervisor.
ResultRand
Finding
e
Reference
f
Determine by enquiring whether the same person can enter
and approve property values. Obtain appropriate evidence.
Determine by enquiring whether the same person can
amend the master file which is used to calculate property
rates and approve the changes.
Obtain appropriate
evidence.
Select a judgmental sample of 5 properties with accounts in
arrears from different areas and perform the following:
a) Compare the rate that the properties are taxed at to
the rate stipulated in the council report and ascertain
that it is the same. Investigate anomalies.
b) Compare the classification of properties to the type of
property selected and ascertain that it is the correct
classification.
Ascertain when the date of the changes of the property
rates have been affected on the master file and ascertain
that it is after the date stipulated in the council report.
Investigate anomalies.
Investigate and enquire whether independent personnel
effected the changes to the master file.
NOTE: It is important to correctly formulate an audit procedure. An audit procedure is the specific test that an internal auditor performs when gathering the audit
evidence required to evaluate or determine if the audit objectives are met. To perform the engagement procedures (test of controls), you will need documentation or
other information that is necessary to conduct the procedures. It is nearly impossible to evaluate every transaction of an organisation. Therefore, the internal auditor
uses only a sample of the transactions. In the next section we discuss how this is done.
29
AUI4863/SG
2.3
SAMPLING
STUDY
•
•
•
Internal Auditing: An Introduction (2017: Chapter 7 – 7.11)
myUnisa – Additional Resources: Additional Guidance - Sampling
Revise all the sections in your undergraduate study material that relate to sampling.
The population can be determined based on the audit procedures that have been approved. A
representative sample of the transactions under review should be selected from the population to
test. The sampling technique that must be used to select the sample depends on characteristics of
the population and the objectives of the testing that must be done. Each of the sampling
techniques satisfies a specific need. This need should be identified to determine which would be
the most appropriate method to use.
Judgmental sampling will be used only when the auditor knows which transactions may be
misstated. This may be the case, for example, when an employee who is responsible for certain
transactions went on extended leave and the employee standing in did not have the necessary skill
or experience to perform the absent employee’s duties. The auditor may decide to test all the
transactions for the employee’s extended leave period. This method of sampling may not be
extrapolated to the population.
Statistical sampling techniques may be extrapolated to the population and the results may be
communicated as conclusive if the technique has been applied appropriately. The audit procedures
will be applied to the selected transactions to determine whether the controls have been adhered to
or not.
ACTIVITY 6
Karabo Molefe manages the inventory at a branch of a clothing company. The accuracy
of the value of the recorded inventory on hand must be tested. Karabo randomly
selected 100 inventory items from the inventory held at the branch, with the total
population consisting of 2 000 inventory items. The total value of the selected inventory
items was R10 000. The standard deviation of the sample is R10 and the precision is ± R4
000.
a) Describe the statistical sampling technique that Karabo Molefe should use to
accomplish his objective and motivate your choice.
b)
Calculate the minimum and maximum acceptable value levels of the population
and explain what Karabo must do if his results fall outside these limits, and what
such results would mean to him as a manager.
FEEDBACK
a) STATISTICAL SAMPLING TECHNIQUE
Karabo’s objective is to test the accuracy of the value of the recorded inventory held at
the branch. In order to estimate a value for the inventory population he must use
estimation sampling for variables, or monetary unit sampling. Both of these techniques
are used to estimate the value of a population.
30
In the case of monetary unit sampling the sample selection is based on the value of the
items as each rand has an equal chance of being selected. Karabo, however, selected any
100 stock items randomly and thus did not use monetary unit sampling.
b) THE MINIMUM AND MAXIMUM ACCEPTABLE LEVELS OF THE POPULATION
R10 000 ÷ 100 items = R100 average price per unit
R100 average price per unit × 2 000 total units = R200 000 expected average value of the
population
Calculate minimum and maximum levels by adjusting the average value of the
population with the precision. R200 000 – 4 000 = R196 000 (minimum level)
R200 000 + 4 000 = R204 000 (maximum level)
If the actual amount calculated by Karabo for inventory is outside the minimum and
maximum levels calculated, he must extend his sample to achieve a better result.
If the calculated results are outside the minimum and maximum levels, it means either
that the statistical sampling method was incorrectly applied, or that there is a serious
problem with the value of the recorded inventory.
In both cases Karabo should determine the cause and take the required steps to rectify
the problem.
Sampling was covered in detail in the undergraduate internal auditing modules. At this
stage of your studies, we expect you to be proficient in selecting and applying
appropriate sampling methods. We recommend, therefore, that you refresh your
knowledge of sampling by revising the theory of sampling.
After you have used the correct sampling technique and identified your sample, the
engagement procedures can be performed. In the next section we will conduct the
engagement using the selected sample.
REFLECTION
Revise this section in AUI3702 in detail and ensure that you have detailed knowledge of
the sampling techniques used in the performance of an audit
2.4 PERFORMING THE AUDIT PROCEDURES
ADDITIONAL READING
Search for relevant articles on the internet on the performance of audit procedures and
share your insights on the Discussion Forum.
31
AUI4863/SG
STUDY
•
•
•
•
Study the IPPF, Standard 2300 and Implementation Guide 2300.
Internal Auditing: An Introduction (2017: Chapter 6 - 6.7.3)
Revise all the sections in your undergraduate study material that relate to testing.
Performing internal audit engagements (2017: Chapter 1 – 1.3.2 – 1.4.3)
MULTIMEDIA
Click on the hyperlinks below to view the following YouTube video on engagement
procedures and substantive procedures:
https://youtu.be/WDCJU9nbol0
https://youtu.be/v6zRAUCntr8
https://youtu.be/uBQYIZukwO8
Source: Misconception in Financial Audit Practices by Yulias Sihombing, 23 February 2015
The figure above depicts the testing process. Once the testing is completed, it should be evident
whether controls have been adhered to or not. It might be necessary to extend the testing to more
transactions or other areas based on what was found. All the tests that have been performed must
be documented completely, as will be discussed below.
ACTIVITY 7
You are provided with the salary scales for an organisation. Determine whether the
salary each employee earns, is in accordance with the approved minimum salary scale
per salary level. Determine whether further testing should be done and explain your
conclusion. The amounts below indicate the minimum salary that should be earned for
a specific level for the period January to December 2010.
SALARY LEVEL SALARY
32
1
2
3
4
5
6
R 34 107.00
R 38 202.00
R 43 875.00
R 75 891.00
R 94 530.00
R 111 006.00
Your sample is presented in the table below:
NO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
INITIALS
PS
NR
A
GAP
ME
MS
F
N
JK
N
L
BP
KL
EA
K
P
MP
PT
M
WN
GW
C
DV
L
TZ
ND
HJW
MB
A
ML
S
SURNAME
KHESWA
SELEWANE
NESER
MHLONGO
MABELE
KHANYE
DON
RASHAMUSE
STIRLING
HAMMEL
LETHETSA
SIBEKO
ROODT
CAPPER
VAN RHYN
NKQAYI
PEETE
SEFOKA
MANAZI
BAUER
RAHLABA
RADEBE
GAMA
MBENSE
MASIKE
TSOSANE
REDMOND
BALOYI
KEKANA
RAMAEMA
MBOKAZI
33
SALARY
LEVEL
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
3
3
3
3
3
2
2
1
SALARY
EARNED
R 117 402.00
R 111 006.00
R 111 006.00
R 109 758.00
R 109 758.00
R 109 758.00
R 94 530.00
R 94 530.00
R 94 530.00
R 94 530.00
R 94 530.00
R 94 530.00
R 79 761.00
R 79 761.00
R 79 761.00
R 79 761.00
R 75 891.00
R 75 891.00
R 75 891.00
R 43 875.00
R 43 875.00
R 43 875.00
R 43 875.00
R 43 875.00
R 43 875.00
R 38 202.00
R 38 202.00
R 38 202.00
R 38 202.00
R 38 202.00
R 34 107.00
AUI4863/SG
FEEDBACK
If you compared the salary level and the salary earned to the approved salary scale, you
would have found that 11 out of 31 salaries do not match the salary scale relevant to the
employee. Further testing should be done to determine the reasons why so many
employees do not earn the approved minimum amount according to their salary scale.
It is extremely important that the results of the engagement procedures performed are
documented completely and accurately. Evidence to support the results should be
sufficient, reliable, relevant and useful as stipulated in Standard 2310. In the next
section we discuss this important issue.
2.5 EVIDENCE AND WORKING PAPERS
STUDY
• The IPPF, Standards 2310 and 2330 as well as Implementation Guides 2310 and
2330.
• Internal Auditing: An Introduction (2017: Chapter 6 - 6.7)
• Revise all the sections in your undergraduate study material that relate to audit
evidence and audit working papers.
The evidence gathered during the course of the audit and the working papers compiled must
support the conclusions reached. All evidence should comply with Standard 2310, which
stipulates that evidence should be sufficient, reliable, relevant and useful. As the audit manager
or CAE, you may not be that much involved in the gathering of evidence.
However, when you review audit work done by audit staff, your main focus will be to determine if
the evidence gathered and documented in the audit working paper file, adequately support the
audit findings. You should therefore have an in-depth understanding of these concepts and be
able to determine if the given evidence is sufficient, relevant, reliable and useful. This will enable
you to defend the conclusions when the engagement client does not agree with the findings and
conclusions reported on. The standards also require that the evidence complies with certain
criteria and that it be filed for future use.
The purpose of working papers is as follows:
• They aid in the planning, performance, and review of engagements.
• They provide the principal support for engagement results.
• They document whether engagement objectives were achieved.
• They provide a basis for the internal audit activity’s quality assurance and improvement
program.
• They facilitate third-party reviews.
ACTIVITY 8
Further research into the purpose of audit working papers should be done to broaden
your knowledge and assist you in compiling relevant and complete working papers.
ACTIVITY 9
34
Compile a working paper that will set out all the necessary information for the test done
in the previous activity.
FEEDBACK
Professional Audit Services
Period: January to December 2010
Working Paper Reference:
W 201
Prepared
WM
Reviewed
CP
DATE
22/05/2011
Objective
To determine whether employees receive salaries according to the minimum approved salary scale per
level.
Sample Source
List of employees
Procedures
Select a sample of employees and compare the salaries earned to the approved salary scale.
Results
NO
INITIALS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
PS
NR
A
GAP
ME
MS
F
N
JK
N
L
BP
KL
EA
K
P
MP
PT
M
WN
GW
C
DV
L
TZ
ND
HJW
MB
A
ML
S
Legend
SALARY
LEVEL
6
6
6
6
5
5
5
5
5
5
5
5
5
5
5
4
4
4
4
4
4
4
4
3
3
3
3
3
2
2
1
SURNAME
KHESWA
SELEWANE
NESER
MHLONGO
MABELE
KHANYE
DON
RASHAMUSE
STIRLING
HAMMEL
LETHETSA
SIBEKO
ROODT
CAPPER
VAN RHYN
NKQAYI
PEETE
SEFOKA
MANAZI
BAUER
RAHLABA
RADEBE
GAMA
MBENSE
MASIKE
TSOSANE
REDMOND
BALOYI
KEKANA
RAMAEMA
MBOKAZI
SALARY
RESULT
R 117 402.00
R 111 006.00
R 111 006.00
R 109 758.00
R 109 758.00
R 109 758.00
R 94 530.00
R 94 530.00
R 94 530.00
R 94 530.00
R 94 530.00
R 94 530.00
R 79 761.00
R 79 761.00
R 79 761.00
R 79 761.00
R 75 891.00
R 75 891.00
R 75 891.00
R 43 875.00
R 43 875.00
R 43 875.00
R 43 875.00
R 43 875.00
R 43 875.00
R 38 202.00
R 38 202.00
R 38 202.00
R 38 202.00
R 38 202.00
R 34 107.00
r
r
r
v
r
r
r
r
r
r
r
r
v
v
v
r
r
r
r
v
v
v
v
r
r
v
v
v
r
r
r
Incorrect minimum
v
salary is earned. Exception noted
Correct minimum
r
salary is earned. No exception noted
Conclusion
11 out of 31 employees do not earn the correct salary due to a system error.
ACTIVITY 10
35
AUI4863/SG
Look for further articles that will give you insight into audit working papers and the
preparation thereof as well as any new developments or guidance in this regard.
ACTIVITY 11
What kind of evidence can be used to substantiate the finding above?
FEEDBACK
•
•
A copy of the approved salary scale. The scale must be approved at a board meeting
or at least by the CEO and one other senior manager.
Copies of the salary slips of employees that were selected by the sample
ONLINE ASSESSMENT QUESTION
● Do the online assessment multiple-choice questions on myUnisa.
SUMMARY
This learning unit discussed how to conduct the audit engagement. The engagement
procedures should be established based on the engagement objectives as discussed in
learning unit 1.1. Once the engagement programme is finalised and approved, a sample
should be selected to test whether the controls are adhered to. Meticulous records
should be kept of all the fieldwork that is performed and evidence should be gathered to
support the conclusions drawn from the fieldwork. When you have completed all this,
the audit report can be written. This will be discussed in topic 2.
NOTES
Make your own notes here:
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
36
Learning unit 3
Reporting and monitoring progress
Report &
Monitor
Contents
3.1
INTRODUCTION
37
3.2
THE INTERNAL AUDIT REPORT
37
3.3
WRITING THE INTERNAL AUDIT REPORT
39
3.4
REPORTING RESULTS TO THE ENGAGEMENT CLIENT
42
3.5
FOLLOW-UP REPORTING
46
3.1
INTRODUCTION
The audit reporting process includes the writing of the audit report, reporting the results
to the engagement client and monitoring or following up on management’s progress at
the agreed time to ensure that the recommendations made have been implemented.
After the follow-up audit, a final report has to be issued to inform management of the
outcome.
In this learning unit the format of the audit report will be discussed as well as the internal
audit standards applicable to reporting. A range of reports will be evaluated to assess
whether or not they meet their specific requirements. For the different audit approaches
or applications, the applicable audit report will be described in more detail. The exact
format and content of the report depends on the organisation and the nature of the
engagement performed. Make sure that you are able to apply your knowledge with regard
to audit reporting to the different audit applications.
3.2
THE INTERNAL AUDIT REPORT
STUDY
•
The IPPF, Performance Standards 2400, 2410, 2420, 2421, 2430, 2431 and 2440 as
well as the relevant Implementation Guides (2400 - 2440).
37
AUI4863/SG
•
•
•
Performing Internal Audit Engagements, Par 9.1–9.4
Supplemental Guidance – Practice Guide: Audit Reports - Communicating Assurance
Engagement Results
Revise all the sections in your undergraduate study material that relate to the
reporting of the auditing results.
Standard 2400 requires engagement results to be communicated to the engagement
client. In most instances, a complete internal audit report will be used, but in other
instances a management letter or oral communication might be sufficient. This topic
focuses on the reporting of the results of the engagement, which includes interim
reports and engagement reports, or audit assignment reports.
An interim report is also issued when a matter that needs immediate attention is
discovered by the audit team. It also serves to:
•
force the internal auditor to build the report as the audit progresses
•
keep the audit manager up to date an allow interim review of work done
•
give to the client as a continuous report
The format of your report does not really matter, as long as it includes all the
requirements of the internal auditing standards. When an IAA has been subjected to an
external quality assessment and it was found to comply with all the internal auditing
standards, this fact may be indicated in the executive summary of the internal audit
report. If full conformance was not achieved, the rules of conduct of the Code of Ethics
or the internal auditing standard(s) which was not conformed with should be disclosed.
This disclosure should include all the necessary information as listed in Standard 2431.
The objectives or purpose for writing an audit report should be kept in mind while writing
it. The objectives appear on par 9.2 of the prescribed textbook, Performing Internal Audit
Engagements. Please note that this is not a comprehensive list of all possible objectives
and as a postgraduate student you should be able to draw up a more detailed list.
Structuring the internal audit report in such a way that it is easily understood by
management will make it easier to convince management to implement the
recommendations. Guidelines as to what to include in the report are given in Standard
2410, and are as follows:
•
•
•
the engagement objectives
scope
results
You should be able to apply these guidelines in preparing an engagement report.
STUDY
Study Performing Internal Audit Engagements, page 396 in terms of the logical
presentation or proposed framework for the report.
The basic structure should include an executive summary and detailed findings. The
executive summary will usually include the auditor’s opinion on the internal control
processes.
38
MULTIMEDIA
Click on the hyperlink below to view the following YouTube video:
https://youtu.be/GK6jZKqrjO8
In the next section we will demonstrate how to report the engagement results, taking all
the requirements from the Standards into consideration.
3.3
WRITING THE INTERNAL AUDIT REPORT
Standard 2420 requires that the report must be accurate, objective, clear, concise,
constructive, complete and timely. The accuracy of the report will depend mainly on the
quality of the fieldwork that was done. Through all the engagements that you will be
involved in, your relationship with the engagement client should stay objective, in order
to report objectively on the results of the audit.
Do not use unfamiliar and difficult words. Rather ensure that the report is concise, clear
and easy to understand. Before the report is presented to the engagement client, the
internal audit manager should ensure that all aspects of the report and all findings that
need to be raised are included. The pace of business cannot allow for delayed audit
reports. The results of the audit should be made available as soon as possible;
otherwise the report may become irrelevant. If errors or omissions are discovered after
the report was distributed, the corrections should be communicated to all parties to
whom the report had been distributed in the first place (Standard 2421).
STUDY
Study the guidelines for formulating effective recommendations in Performing Internal
Audit Engagements, Par 9.8–9.9.
Consider your recommendations carefully. It must be feasible and add more value to
the engagement client than the cost of implementing the proposed recommendations.
STUDY
Study Performing Internal Audit Engagements, Par 9.3 on the reporting process and
specifically the review process and how it should be approached.
The draft report should be reviewed by the audit supervisor or manager. Care should be
taken during the review process to ensure that the report is a true reflection of the audit
work that was performed.
39
AUI4863/SG
Once the report has been finalised by audit management, the action plan can be
discussed with the engagement client. This action plan must be added to the report
before it can be distributed to all the relevant parties. More about this follows below.
David A. Bates, CIA, based in Marietta, Georgia, gave the following ten tips to internal
auditors when writing an audit report:
•
•
•
•
•
•
•
•
•
•
Slow down. Think before you write. Precisely what is it you want to communicate?
Write for your least-informed reader. Simplify what you are trying to say.
If something doesn’t seem clear to you when you write it, it won’t be clear to your
reader.
Aim your writing to your audience.
Use a good style manual and refer to it often.
Set aside some quality time for writing or editing.
When editing go through each document at least three times.
As an editor ensure that you trust your judgment.
When editing someone’s writing, explain why you make changes.
Keep giving your best effort.
ACTIVITY 12
Great Farms is a partnership between various farmers in the Limpopo Province. The
farmers decided to build a cannery for their fresh farm produce and established Great
Farms for this purpose. The farmers requested you to audit the building project of the
cannery to ensure that everything went according to plan and that the actual cost of
the cannery was reflected fairly.
The fieldwork for this engagement was completed during December 2011. After the
review, the following engagement report was sent to the engagement client. The
internal audit activity has never been subjected to an external quality assessment.
Review the internal audit report below and evaluate whether it complies with the
internal auditing standards.
40
To:
The Farmer’s Co-operative
From: Internal Auditor
Date: 10 March 2012
AUDIT OF THE CANNERY PROJECT
Introduction
This internal audit was performed in response to a specific request received from the farmers. This audit
focussed on the cannery project.
Purpose and scope
The objectives of this internal audit were limited:
• to ensure that each project goal and its budget were approved by the farmers before the project
begins
• to ensure that the project goals and budget were reasonable
• to ensure that each project goal was achieved on time
• to ensure that the project goals were achieved within the budget and, if the goals were achieved
later, that the agreed penalty has been applied
• to ensure that the cannery would achieve the overall goals established for the project
Because of the critical nature of the project and the relatively small size of transactions, it was possible
to audit all the supporting documentation of the project.
Findings
• The audit procedures found that every project goal and its budget was approved by the farmers
before the project began.
• Discussions with the project coordinator, the building contractor, the project engineer and the
architect confirmed that the timing of the project as well as the initial project budget were
reasonable.
• The audit procedures indicated that only three of the five goals of the project were achieved on
time. The last goal is still outstanding but that is also the only project goal that did not have a
planned completion date. To date no information has been made available as to when the last
project goal would be completed. No penalty fees were paid.
• The engagement procedures revealed that two project goals were not signed off appropriately
when they were achieved. The project coordinator, the building contractor, the project engineer
and the architect must be in agreement that the project goal was satisfactorily achieved. In each
instance the Project Goal Sheet was signed off only by the building contractor and the project
engineer.
• The audit procedures performed highlighted the fact that some individual project goals exceeded
their budgets. This is not perceived to be a problem as the total actual cost of the first five project
goals were R3 966 800. This amount is well within the total project budget of R4 422 000. The
budgeted cost of the last project goal is R500 000 and the total budget still available is R455 200.
• After an inspection of the cannery on 1 December 2009, the consulting engineer concluded that the
cannery was built well within acceptable industry standards and he did not foresee any problems in
the production of canned produce.
The engagement has been performed in conformance with the IPPF.
Signed by Internal Auditor
FEEDBACK
41
AUI4863/SG
Please join the Discussion Forum and share with fellow students the violations of the
internal auditing standards that you found in the report provided. Feedback will be
provided subsequent to the discussion.
Also note:
All the above are shown in the draft internal audit report. The report is ready to be
discussed with the engagement client in order to obtain action plans and
management comments. In the next section, guidelines for reporting the results of
the audit will be discussed.
3.4
REPORTING RESULTS TO THE ENGAGEMENT CLIENT
STUDY
• Study the IPPF, Performance Standards 2400 and 2440 as well as Implementation
Guides 2400 and 2440.
• Performing Internal Audit Engagements, Par 9.7
• Revise all the sections in your undergraduate study material that relate to reporting
of results.
It is important to understand the process of communicating the engagement results to
the engagement client. Good communication already starts with the preparation for the
audit. Your relationship with the engagement client will either be improved or damaged
by the quality and frequency of the communication.
Source: https://elsmar.com/Forums/internal-auditing/7154-internal-audit-process-flow-chartplease-review-mine-comment.html
Best practice suggests that the audit findings should be discussed with the client as they
are discovered by the audit team. This might take the form of informal verbal
communication or interim written communications. Once again, you can see that
42
continuous communication should take place between the audit team and the
engagement client. In the closing conference the draft of the audit report is discussed.
The purpose of this meeting is to ensure that the engagement client commits to
implementing and enforcing the recommendations.
The audit manager may choose to do an oral presentation to present the findings.
Remember: it is not the audit team’s responsibility to enforce recommendations; that
responsibility lies with management. Depending on the relationship with the client the
auditor may need negotiation skills to finalise the action plan. All of this is done to
ensure that there are no surprises in the final report for the engagement client and to
assist in building a partnership approach to audit engagements.
Once you have agreed with the engagement client on an action plan, the report can be
finalised. The CAE is responsible to communicate the engagement results to the client
and to ensure that it is given due consideration.
If the report contains sensitive issues, then the CAE may remove these issues from the
final report and issue a separate report that will be distributed only to the relevant
parties (Standard 2440). A sensitive issue could, for example, be when fraud by
management was identified and this is brought to the attention of the audit committee
or other senior management at a level higher than the level where the fraud was
committed.
Figure: Elements of an audit finding (adapted form Waring & Morgan (2007))
43
AUI4863/SG
Standard 2440 – Disseminating Results
The chief audit executive must communicate results to the appropriate parties.
Interpretation:
The chief audit executive is responsible for reviewing and approving the final
engagement communication before issuance and for deciding to whom and
how it will be disseminated. When the chief audit executive delegates these
duties, he or she retains overall responsibility.
ACTIVITY 13
Use the internal audit report from the previous activity and rewrite the detailed findings
section to conform to the internal auditing standards. Also add information which is not
given that you find applicable, with appropriate action plans. The following information
was obtained from the engagement client:
Payment in terms of the project will only be approved by the project coordinator if it is
claimed in terms of a completed project goal and falls within the budget constraints of
that specific project goal. The penalty of late completion of any project goal is a 50%
reduction of the fees payable for that goal to all the parties involved.
FEEDBACK
Goals not achieved on time, yet no penalty fee has been deducted.
Criteria
The project goals should be completed before the planned completion date, otherwise
a 50% reduction of fees payable will apply.
Condition
The audit procedures indicated that only three of the five goals of the project were
achieved on time. The last goal is still outstanding but that is also the only project goal
that did not have a planned completion date. To date there is no information available
as to when the last project goal will be completed. No penalty fees have been deducted
from payment made towards the building project.
Cause
Building materials were not received on time to complete the goal and there was no
completion date set. The project manager deemed this as a reasonable excuse and did
not levy penalty fees.
Effect
The rest of the project is delayed because of these two deadlines that have not been
met. The farmers are losing revenue due to the delay. The full extent could not be
established due to too many variables.
Recommendation
The penalty fee should be affected. Management should not pay the full cost of the
project but take the reduction of 50% into consideration with the next payment that is
44
due. In future all goals should have a clear completion date set against which
performance and deliverables can be measured.
Action plan
Management will deduct the 50% penalty fee from the next payment that is due.
Implementation date
Immediately
Payment was approved for projects that have not been signed off appropriately
Criteria
Payment will be made by Great Farms only when the project coordinator, the building
contractor, the project engineer and the architect are in agreement that the project
goal was satisfactorily achieved. Their agreement is indicated by signing the Project
Goal Sheet.
Condition
The engagement procedures revealed that two project goals were not signed off
appropriately when they were achieved. In each instance the Project Goal Sheet was
signed off only by the building contractor and the project engineer.
Cause
The documentation was not forwarded to the project coordinator and payment was
made when he was on leave.
Effect
Great Farms may pay for an incomplete project, which would require extra time and
money to complete.
Recommendation
Proper segregation of duties and authorisation for payment should be in place.
Procedures should also be in place to ensure that proper authorisation for payment is
obtained even when the relevant person is on leave or otherwise not available. A
system of delegating authority should be established for cases where a signatory is
absent.
Action plan
Great Farms will compile appropriate policies and procedures that take these
requirements into consideration.
Implementation date
31 July 2012
This activity demonstrates what a final internal audit report may include. After the
implementation dates these recommendations should be investigated to determine
whether they mitigate the associated risk appropriately. This process is called follow-up
reporting and is discussed in the next section.
45
AUI4863/SG
3.5
FOLLOW-UP REPORTING
STUDY
•
•
•
•
IPPF, Performance Standards 2500 as well as Implementation Guide 2500
Performing Internal Audit Engagements, Par 9.10
Internal Auditing: An Introduction, Par 6.7.5
Revise all the sections in your undergraduate study material that relate to follow-up
reporting.
Follow-up engagements should be done to ensure that the work that has been done to date adds
value to the organisation. The main purpose of the audit will be to determine whether
management has implemented the recommendations as they committed to in the action plan of
the engagement report.
If management has implemented the recommendations, the audit team will be able to evaluate
whether the new processes or controls mitigate the risks that it intended to address. If the
implemented recommendations fail to mitigate the risk, other recommendations should be
developed in collaboration with management.
ADDITIONAL READING
Read the articles on writing an internal audit report available at:
• https://institutes.theiia.org/sites/ethiopia/resources/Documents/CommunicatingInternal-Audit-Results.pptx
• http://iia.org.au/sf_docs/default-source/technical-resources/iia-australia-whitepaper-good-practice-internal-audit-reports.pdf?sfvrsn=2
ACTIVITY 14
Look for further articles that will give you insight into report writing.
MULTIMEDIA
Click on the hyperlinks below to view the following YouTube video:
https://youtu.be/WbPx6jMgbYA
❖
View the screencast on internal audit report writing that are available on myUnisa.
ACTIVITY 15
Use the internal audit report from the previous two activities and determine what you
would include in the follow-up audit and when the best time for these engagements
would be.
46
FEEDBACK
The following issues should be included in the follow-up engagement:
• Levying of penalty fees because of missed deadlines. This can be done after the
next payment has been made.
• The programme of delegating authority in which proper segregation of duties is
stated.
• All goals should have agreed upon completion dates in future.
• The policies and procedures document that must be compiled will be included in the
follow-up engagement. This engagement should take place after 31 July 2012.
ONLINE ASSESSMENT QUESTION
Do the online assessment multiple-choice questions on myUnisa
SUMMARY
This learning unit focused on compiling the internal audit report and reporting to the
engagement client. The best way to communicate the findings of the engagement
report will be discussed in module AUI4861.
In the next part you will be studying the different types of audit performed, i.e. financial,
compliance audit, operational audit, forensic audit and IT audit.
The figure below is an explanation of the difference between financial, compliance and
operational audits, that will be discussed in the next topics to follow.
Source: www.theiia.org
NOTES
47
AUI4863/SG
Make your own notes here:
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
________________________________________________________
48
PART 2
Integrated applications in the internal audit
process
Contents
TOPIC 2: Financial system auditing
TOPIC 3: Compliance auditing
TOPIC 4: Operational auditing
TOPIC 5: Fraud investigations
TOPIC 6: Auditing of advanced IT systems
TOPIC 7: Performing information technology-based audits
49
50
73
95
133
169
209
AUI4863/SG
TOPIC 2
Financial systems auditing
Contents
LEARNING UNIT 4: Financial systems audit planning
52
LEARNING UNIT 5: Conducting financial systems audits
59
LEARNING UNIT 6: Reporting on financial systems audits
66
INTRODUCTION TO AND PURPOSE OF THE TOPIC
The drive for operational excellence requires from many financial executives to routinely reevaluate their company’s financial processes to see if there are areas where improvement is
needed.
The need for financial systems auditing arises from the importance of the financial systems to the
achievement of the organisations’ financial objectives.
The aim of this topic is to provide guidance as to how to perform a financial systems audit.
Financial systems auditing can be described as the analysis of the economic activity of an entity as
measured and reported by accounting methods. Financial systems auditing is the assurance
activity which is most closely related to external auditing.
Stated broadly, the objectives of a financial systems audit pertain to the presentation of reliable
published financial statements, including prevention of fraudulent public financial reporting. The
objectives are driven primarily by external requirements i.e. international accounting standards.
The different financial cycles to be discussed in this topic are:
• Revenue and receipts cycle
• Purchases and payments cycle
• Inventories, production and warehousing cycle
• Human resources and payroll cycle
• Bank and Cash
50
In your undergraduate studies you were exposed to the full process of financial systems auditing
and became skilled in applying the theoretical concepts and the appropriate internal auditing
approach when performing such audits.
In this topic the focus is on providing case studies and examples of financial systems auditing and
to provide you with the opportunity to research different approaches and applications of financial
systems auditing on the different financial cycles.
The practical performance of financial systems auditing is discussed in this topic, using three
learning units that deal comprehensively with each individual phase of the internal auditing
process.
MULTIMEDIA
Please access the podcast on myUnisa to assist you in your studies of topic 3.
LEARNING OUTCOMES
After you have studied this topic, you should be able to:
● plan the audit process according to applicable standards
● formulate audit procedures
● compile the audit report
● communicate the audit results
51
AUI4863/SG
Learning unit 4
Financial systems audit planning
Contents
4.1
4.2
4.3
4.1
INTRODUCTION
AUDIT ENGAGEMENT CONSIDERATIONS
THE PLANNING PHASE
52
53
57
INTRODUCTION
“In preparing for battle I have always found that plans are useless, but planning is
indispensable.” Dwight D Eisenhower, 34th American president truly knew the value of
proper planning.
This learning unit deals with the first and one of the most important steps in the auditing
process. As in the case of any other internal audit approach, the planning stage of a
financial systems audit is imperative to the success of the audit. Of all the elements of
planning, establishing the critical risks and problem areas is the most important.
REFLECTION
It is important that you revise the underlying technical knowledge and expertise you
obtained at undergraduate level before you continue with the rest of this learning unit.
This includes the IPPF
READ
https://www.iia.org.uk/resources/delivering-internal-audit/how-to-plan-an-auditengagement/?downloadPdf=true
52
4.2
AUDIT ENGAGEMENT CONSIDERATIONS
In this learning unit all the steps of the engagement process are described for each of the
cycles. This is done according to the risk-based approach.
STUDY
•
•
All the sections in your undergraduate study material that relate to financial audits.
Study the following in Performing Internal Audit Engagements (2017):
Chapter
3
Revenue and receipts cycle
Topic
Accounting system and control activities
• Introduction
• The internal audit approach
• Characteristics of the cycle
• System description
• Documents
• Flow charts
• Information and communication technology
• Internal controls
• Risk and typical control activities
4
Purchases and payments cycle Accounting system and control activities
• Introduction
• The internal audit approach
• Characteristics of the cycle
• System description
• Documents
• Flow charts
• Information and communication technology
• Internal controls
• Risk and typical control activities
5
Inventory, production
warehousing cycle
6
Human Resources and Payroll Accounting system and control activities
cycle
Introduction
•
and Accounting system and control activities
• Introduction
• The internal audit approach
• Characteristics of the cycle
• System description
• Documents
• Flow charts
• Information and communication technology
• Internal controls
• Risk and typical control activities
53
AUI4863/SG
Chapter
•
•
•
•
•
•
•
•
7
Bank and Cash
Topic
The internal audit approach
Characteristics of the cycle
System description
Documents
Flow charts
Information and communication technology
Internal controls
Risk and typical control activities
Accounting system and control activities
• Introduction
• The internal audit approach
• Characteristics of the cycle
• System description
• Documents
• Flow charts
• Information and communication technology
• Internal controls
• Risk and typical control activities
A proper understanding of a financial system and the different accounting cycles involved is
required before audit objectives can be determined and an audit can be performed on the financial
system.
It is very important to understand the following concepts for each of the cycles:
• the major activities in the cycle
• the documents used in the cycle
• a narrative description of the cycle
• the characteristics of a good internal control for the cycle
54
The following typical cycle flowchart could help you to understand all the above concepts:
55
AUI4863/SG
The functions above will differ depending on the cycle you are to audit. While
determining the objectives of the engagement, the internal auditor must take
cognisance of the main purpose of the relevant cycle as this will impact on the risk
assessment of the audit unit and ultimately on the audit procedures and the success of
the internal audit engagement.
Since this topic deals only with the financial aspects, the internal auditor will focus on
the:
• reliability and integrity of the financial information
• safeguarding of assets
• compliance with laws, regulations and contracts; that have a direct impact on specific
cycles
In the audit of financial statements, the external auditor’s aim would be to obtain
sufficient appropriate audit evidence by performing audit procedures to afford a
reasonable basis for an opinion regarding the financial statements under audit. The
external auditor should design and perform further audit procedures whose nature,
timing and extent are responsive to the assessed risks of material misstatement at the
relevant assertion level.
Implementation Guide 2130. A1-1 states: “The responsibility of the internal auditor is to
evaluate the adequacy and effectiveness of controls in responding to risks within the
organisation’s governance, operations and information systems regarding the:
• Achievement of the organization's strategic objectives;
• Reliability and integrity of financial and operational information;
• Effectiveness and efficiency of operations and programmes;
• Safeguarding of assets; and
• Compliance with laws, regulations, policies, procedures and contracts.”
During a financial systems audit, the evidence obtained relates to the reliability and
integrity of financial information. When an internal auditor conducts such audits, the
information is normally intended to be used by management for internal decisionmaking purposes. The audit may involve both operating and financial data. Financial
audits normally include a review of the accuracy and completeness of the numbers
themselves and an evaluation of the adequacy and effectiveness of the controls that
management have implemented to safeguard assets.
Auditing of financial statements is directed at assessing the accuracy of financial reports
relating to financial conditions and operating performance.
ACTIVITY 16
Discuss the following quote with reference to internal audit planning: “It pays to plan
ahead. It wasn’t raining when Noah built the ark.”
FEEDBACK
Join the Discussion Forum on myUnisa regarding internal audit planning.
56
4.3 THE PLANNING PHASE
READ
Read Risk rating; the audit universe - Bruce McCuaig. Internal Auditing. Jul/Aug 2008. Vol.
24, Iss. 4; p. 10
http://svn2.assembla.com/svn/GSIDEI/Bibliografia/RISK_RATING_THE_AUDIT_UNIVER
SE.pdf
STUDY
Study the following in Internal Auditing: An Introduction Engagements (2017): Par 6.6
Planning the engagement
Apply this knowledge to each of the cycles identified for purposes of this learning unit:
• Revenue and receipts cycle
• Purchases and payments cycle
• Inventory, production and warehousing cycle
• Human Resources and Payroll cycle
• Bank and Cash
The internal auditor must perform a preliminary survey to obtain the necessary
understanding of the engagement activity. The results of the preliminary survey should
enable the internal auditor to understand the specific financial system and the impact of
the associated risks on the organisational objectives.
ACTIVITY 17
Join the debate on myUnisa (Discussion Forum) on the need for the IAA to perform
financial system audits when external audit already focuses extensively on these cycles
FEEDBACK
Focus on the definition/value adding/purpose of internal auditing opposed to that of
external auditing.
ONLINE ASSESSMENT QUESTION
Do the online assessment multiple-choice questions on myUnisa.
SUMMARY
This learning unit focused on the aspects that an internal auditor should take into
consideration while planning a financial systems audit.
57
AUI4863/SG
NOTES
Make your own notes here:
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
________________________________________________________________________
58
Learning unit 5
Conducting financial systems audits
Contents
5.1
5.2
5.1
INTRODUCTION
FORMULATE AND CONDUCT AUDIT PROCEDURES
59
60
INTRODUCTION
This learning unit deals with the aspects necessary to formulate and perform the audit procedures
required during the execution of a financial systems audit
STUDY
Study the following in Performing Internal Audit Engagements (2017):
Chapter
3
Revenue and
receipts cycle
Topic
Auditing the cycle
• Control effectiveness testing / Engagement procedures
• Substantive procedures for the audit of debtors
4
Purchases and
payment cycle
Auditing the cycle
• Control effectiveness testing / Engagement procedures
• Substantive procedures for the audit of debtors
5
Inventory,
production and
warehousing cycle
Auditing the cycle
• Control effectiveness testing / Engagement procedures
• Substantive procedures for the audit of debtors
6
Human Resources Auditing the cycle
and Payroll cycle
• Control effectiveness testing / Engagement procedures
• Substantive procedures for the audit of debtors
59
AUI4863/SG
5.2 FORMULATE AND CONDUCT AUDIT PROCEDURES
STUDY
Study “Audit Procedures” and “Analytical procedures” under Additional Resources –
Additional Guidance on myUnisa.
NOTE:
Internal auditors apply engagement procedures to obtain sufficient, competent,
relevant and useful information that will achieve the engagement’s objectives.
REFLECTION
Refer to the Additional Resources on myUnisa on the topic of “Audit procedures –
financial audit”.
Engagement procedure/test of controls
Engagement procedures are performed to conclude as to the operating effectiveness of
controls over the different accounting cycles. The internal auditor’s identified control risk
refers to the adequacy and effectiveness of the system of internal control in respect of
the accounting system under scrutiny.
If the system of internal control is found to be adequate and effective, the internal
auditor knows that reliance can be placed on the system to function as intended.
Engagement procedures are performed only on those controls that the internal auditor
has determined to have been suitably designed to address the audit objective.
Substantive testing
Substantive testing is performed to detect material misstatements at the relevant
assertion level and includes test of details of classes of transactions, account balances
and analytical review procedures.
60
The importance of substantive testing is owing to the internal auditor's assessment of
risk being judgmental and it may not be sufficient to identify all risks (audit risk).
Furthermore, there are inherent limitations to internal control.
MULTIMEDIA
Click on the hyperlink below to view the following YouTube videos:
https://youtu.be/BIjyLY5uopo
https://youtu.be/g55oocoZiVY
https://youtu.be/4aAtPzamSGw
https://youtu.be/ncYYY5xU3Oo
https://youtu.be/ncYYY5xU3Oo
https://youtu.be/6XP8qnVNI5g
https://youtu.be/LAmK67FR-Oc
https://youtu.be/ZEXy6SbeFXU
NOTE:
The YouTube
videos relate
mostly to an
external audit of
financial
statements. Keep
that in mind when
watching these
videos.
61
AUI4863/SG
Substantive procedures include tests of detail and substantive analytical procedures.
Substantive analytical procedures are generally more applicable to large volumes of
transactions that tend to be predictable over time.
The internal auditor should plan substantive procedures to be responsive to the planned
detection risk.
ACTIVITY 18
You are reviewing the credit sales and debtor’s function at Adco Limited. Adco Limited
supplies chronic medication to people with chronic illnesses, who are members of
participating medical aid funds. In the past you found that sales matched budgeted sales
projections with an accuracy of 80%. You have planned to perform analytical review
procedures to fully substantiate sales recorded during the current financial year.
Deliveries are made on a monthly basis to all chronic patients registered for the chronic
programme through their medical aids and their accounts are settled on a monthly basis
by their respective medical aids. You have used computer-assisted audit techniques to
extract the following statistics from Adco’s database for further analysis:
Product sales
Budget per
month
March
Actual
April
Actual
May
Actual
Product A
3 500 units
2 600 units
3 000 units
2 800 units
Product B
4 500 units
5 800 units
4 900 units
5 600 units
Product C
2 300 units
1 100 units
3 200 units
4 100 units
Total monthly
debtors
R6 900 300
R5 400 200
R7 300 600
R8 500 400
Total monthly
sales
R6 300 200
R8 600 400
R7 400 300
R6 900 600
Patient
Last year’s
monthly sales on
average for that
patient
Actual sales for
the individual
patient March
Actual sales for
the individual
patient
April
Actual sales for
the individual
patient
May
Patient A
360 units
250 units
460 units
180 units
Patient B
125 units
125 units
125 units
125 units
Patient C
95 units
110 units
220 units
80 units
REQUIRED
1.
Indicate the analytical techniques you would use to review the information you have
extracted and describe the meaning of your results and their impact on your
substantive audit procedures
2.
Describe the additional substantive procedures you would use to verify sales.
62
FEEDBACK
1. Analytical review techniques
Percentage monthly purchases when compared with budgeted products
Budget
March
April
May
Average
A
3 500 units
74.29%
85.71%
80%
80.00%
B
4 500 units
128.89%
108.89%
124.44%
120.74%
C
2 300 units
47.83%
139.13%
178.26%
121.74%
Total average
107.49%
The actual sales recorded for products B and C do not follow the 80% budget projection.
The average deviation from budget is 107.5%, which is a significant deviation. This
indicates a change in the economic environment, a problem with the method used to
budget or problems with the recording of sales. Since all the accounts are settled on a
monthly basis by the medical aids, there should be high correlation between the debtors
and the sales of the previous month.
Actual monthly sales and debtors as a percentage of sales
Budget
March
April
May
Average
Debtors
6 500 300
83.08%
112.31%
130.77%
108.72%
Sales
6 300 200
136.51%
117.46%
109.53%
121.17%
With chronic medicine there should be a more stable sales pattern and debtors should
not be older than a month as the medical aids settle the outstanding amounts within a
month after the sales transaction.
Debtors as a percentage of the previous month’s sales
Debtors
April
May
84.89%
114.87%
None of the expected patterns were identified by the analytical review. This makes it
necessary to perform more extensive substantive audit procedures on both sales and
debtors.
Compare the monthly sales per patient with last year’s average.
Patient
Last year
March
April
May
Average
A
360
69.44%
127.78%
50.00%
0.82
B
125
100.00%
100.00%
100.00%
1.00
C
95
115.79%
84.21%
84.21%
1.44
The patients should have the same sales on a monthly basis after any price increases are
taken into account. This expected pattern is not supported by the information.
63
AUI4863/SG
2. Substantive audit procedures on sales
Select a statistical sample of debtors who are listed as chronic patients and perform the
following substantive procedures:
Extract the monthly chronic medicine required for each of the selected patients from
their permanent files and compare it to a doctor’s prescription.
Select the sales recorded for that patient for the year and compare the patient’s total
medicine received for the year with the prescription. Follow up on any differences.
For the selected sales:
• Agree the detail of the sale to a delivery note signed by the patient.
•
Agree the details of the medicine required by the patient to the medicine
received per the delivery note and sales invoice.
•
Compare the monthly sales of the selected patients with their chronic medicine
requirement and investigate any changes in volume on a month-to-month basis,
changes that deviate from the normal monthly prescription.
Compare the prices charged for the delivered medicines with the authorised prices as per
the approved price lists.
Use Computer-assisted Audit Tools (CAATS) to compare the list of chronic patients with
the sales in order to identify patients, for whom no sales were recorded. Follow up all
identified cases.
Use CAATS to compare the monthly sales with the list of chronic patients to identify any
patient who has not received any medicine in any given month. Follow up all identified
cases.
SUMMARY
This learning unit focused on the aspects that an internal auditor should take into
consideration when formulating and performing audit procedures for a financial
systems audit.
64
NOTES
Make your own notes here:
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
__
65
AUI4863/SG
Learning unit 6
Reporting on financial systems audits
Contents
6.1
6.2
6.1
INTRODUCTION
THE INTERNAL AUDIT REPORT
66
67
INTRODUCTION
In most organisations, reports are a standard management tool used to manage the
organisation effectively by getting timely and relevant information for decision-making.
Writing a good report can be the difference between achieving your objective or failing
to do so. An effective report can contribute to business success and assist greatly in the
process of planning and decision making.
Reporting is the final medium through which the result of the internal audit engagement
is communicated. These reports are communicated in a very well-defined and formal
manner throughout the organisation and to very high levels within the organisation. If
the report is not properly issued in a timely manner, some of the effectiveness of the
engagement can be lost.
The basic guidelines for report writing are the same, irrespective of the type of report
being written. Even internal auditors with good writing skills may sometimes find
themselves unable to write good reports. In this learning unit guidelines will be given to
assist internal auditors to write an internal audit report.
STUDY
Performing Internal Audit Engagements (2017),
•
•
•
Par 3.11 (p 139)
Par 4.11 (p 197)
Par 5.10 (p 254)
66
•
•
6.2
Par 6.11 (p 321)
Par 7.10 (p 357)
THE INTERNAL AUDIT REPORT
REFLECTION
Refer to topic 2 for a detail discussion on internal audit reporting.
Refer to Additional Resources on myUnisa on “A simple approach to developing an
audit finding”.
SUMMARY
This learning unit focused on writing an internal audit report for a financial systems
audit.
NOTES
Make your own notes here:
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
67
AUI4863/SG
TOPIC 3
Compliance auditing
Contents
LEARNING UNIT 7: Compliance audit planning
71
LEARNING UNIT 8: Conducting compliance audits
82
LEARNING UNIT 9: Reporting on compliance
86
INTRODUCTION TO AND PURPOSE OF THE TOPIC
The South African business environment is currently experiencing the impact of changes to
numerous regulatory requirements including the Companies Act and the issue of the King IV Report
on Corporate Governance in 2016. King IV strengthens the position in the Companies Act 2008,
namely that the governing body of an organisation is ultimately responsible for the organisation
and needs to be held accountable for its actions.
These amendments were deemed necessary in light of the continuous increase in organisations and
high-profile persons implicated in illegal transactions and activities. The changes in the regulatory
environment increase the risk of non-compliance experienced by organisations and likewise impact
on the internal audit plans compiled by CAE and audit committees.
The aim of this topic is to provide guidance to you as a postgraduate student in internal auditing on
how to plan a compliance audit, how to conduct the audit and how to communicate the results in
adherence to the applicable standards and guidance provided in the IPPF. You have already gained
knowledge on this in your undergraduate studies and the aim now is for us to provide you with
practical examples and activities to apply your knowledge and skill, so that you can become
proficient in conducting these types of audit.
68
Please be advised that compliance does not only refer to legislation but can also refer to company
procedures, codes of conduct and/or policies. We will highlight the different forms of legislation you
might encounter and attempt to provide you with a template on how to conduct a compliance audit
regardless of the legislation involved.
In this topic we focus on the following specific outcome: “conducting compliance audits”. After you
have completed your study of this topic you will have refreshed your theoretical knowledge of
compliance auditing and through participation in the activities provided to you, you will have
developed the practical skills required to become more proficient in compliance auditing.
The IPPF issued by the IIA, define internal auditing as an independent, objective assurance and
consulting activity designed to add value and improve an organisation’s operations. The IAA should
evaluate risk exposure and the adequacy and effectiveness of controls encompassing the
organisation’s governance, operations and information systems. This includes compliance with
laws, regulations and contract terms and conditions.
Compliance can be defined as conformity and adherence to applicable laws and regulations as well
as policies, plans, procedures, contracts or other requirements.
Laws and regulations are imposed externally and must be complied with. Inadequate information
systems may lead to the organisation inadvertently breaching the laws of the country, resulting in
losses in terms of fines and penalties. Compliance audits are carried out in order to determine
whether a business entity has complied with specific policies, plans, procedures, laws, regulations
or contracts that affect the organisation.
COSO described internal control as follows:
“A process effected by an entity’s board of directors, management and other personnel, designed
to provide reasonable assurance regarding the achievement of objectives in the following
categories:
•
•
•
Effectiveness and efficiency of operations;
Reliability of financial reporting; and
Compliance with applicable laws and regulations”
It is clear that compliance with laws and regulations (externally created) and policies and
procedures (internally developed by the organisation) is very important to the IAA.
REFLECTION
Refer to your prescribed textbook, Performing Internal Audit Engagements, page 3.
From an organisational and board of director’s perspective the possibility of fines and penalties,
even the imprisonment of directors due to non-compliance to laws and regulations, shut down of
operations, as well as the loss of reputation and/or customer goodwill will ensure that effort is
placed on ensuring compliance.
69
AUI4863/SG
A compliance audit is a comprehensive review of an organisation’s adherence to regulatory
guidelines, as well as internal policies and procedures developed by management to ensure
objectives are met. What precisely is examined in a compliance audit will vary depending upon the
nature of the organisation and the regulatory requirements applicable to it.
In this topic we discuss compliance auditing based upon different examples of regulatory
frameworks. Some of the South African regulatory frameworks you should take note of are:
•
Companies Act of 2008
•
King IV Report on Governance (though not legally enforceable)
•
Public Finance Management Act (PFMA)
•
Municipal Finance Management Act (MFMA)
•
Occupational Health and Safety Act of 1993
MULTIMEDIA
Please access the podcast on myUnisa to assist you in your studies of topic 4.
As an internal auditor you should be aware of all these frameworks, but you should have an in-depth
knowledge of the requirements applicable to the organisations you are involved with.
LEARNING OUTCOMES
After you have studied this topic, you should be able to
● plan the compliance audit according to applicable standards
● formulate the audit procedures
compile the audit report
70
Learning unit 7
Compliance audit planning
Contents
7.1
7.2
7.3
7.4
INTRODUCTION
AUDIT ENGAGEMENT CONSIDERATIONS
THE NATURE OF INTERNAL AUDIT ENGAGEMENTS
PLANNING THE COMPLIANCE AUDIT
71
71
73
74
7.1 INTRODUCTION
This learning unit deals with the aspects necessary to properly plan a compliance audit
engagement.
The planning of a compliance audit is not in any way different from planning any of the
other types of internal audit engagements. The same planning steps are followed
regardless of whether a compliance, financial or operational audit is conducted. In this
learning unit, the aim will be to introduce examples of different planning scenarios in
respect of different compliance audits.
STUDY
•
•
•
•
Assurance: An Audit Perspective, par 2.8.1 & 3.3.1
Internal Auditing: An Introduction, par 6.6
Performing Internal Audit Engagements, par 1.3
All the sections in your undergraduate study material that relate to compliance
audits
7.2 AUDIT ENGAGEMENT CONSIDERATIONS
STUDY
Study the IPPF, Attribute Standards 1200 to 1210.C1 as well as the Implementation
Guides 1200 and 1210.
71
AUI4863/SG
It is important for the internal auditor to identify the nature of an engagement as soon as
possible in order to assess whether or not the internal auditor is able to perform the
engagement with the required level of professional proficiency.
As indicated before, compliance requirements depend on the organisation’s legal
environment. It is not possible for an internal auditor to be versed in all the different
regulatory requirements. It is, however, imperative for the internal auditor to have
knowledge of legislation relevant to the organisation.
For example, where an organisation is a manufacturing concern it will most certainly
require compliance with the Occupational Health and Safety Act, 1993 as well as
environmental waste management regulations.
Public sector companies should comply with the PFMA of 1999 or the MFMA and any
other relevant incorporation act that gives the organisation legal standing.
The inherent nature of a compliance audit is that of an assurance engagement but in
some circumstances, it can be deemed to be a consulting engagement. To audit an
organisation’s compliance to regulations governing that organisation will form part of
the annual internal audit plan. Requests made by the audit committee to audit an
organisation’s compliance and/or the impact on operations due to changes in legislation
may be deemed to be more of a consulting engagement.
Once the type of compliance engagement has been identified the impact of the type of
engagement on the IAA's resources should be considered. In this you should consider
the role the internal auditor should play, the type of engagement, the availability of
resources and the responsibility of the IAA to add value and improve the operations of
the activity or organisation.
Where the IAA does not have the required knowledge and skills, in situations where the
regulatory requirements are very advanced and/or unique the services of a specialist
should be sourced.
ACTIVITY 19
Perform desktop research and identify all the legislative requirements (Acts) Eskom
Holdings Limited (Eskom) should adhere to. (Exclude those Acts relevant to human
resource issues.)
FEEDBACK
Join the Discussion Forum and place your comments. Feedback will be provided
afterwards.
72
7.3
THE NATURE OF INTERNAL AUDIT ENGAGEMENTS
STUDY
Study the IPPF, Attribute Standards: 1000.C1, 1130.C1 & C2, 1210.C1, 1220.C1, 2010.C1,
2120.C1 - C3, 2130.C1, 2201.C1, 2210.C1 & C2, 2220.C1 & C2, 2240.C1, 2330.C1, 2410.C1,
2440.C1 & C2, 2500.C1, as well as the glossary.
Study Performing Internal Audit Engagements, par 1.2.
An internal audit engagement can either be of an assurance or consulting nature. The
nature of the internal audit engagement is important as it determines the applicable
Standards to be used in the engagement. These two types of services are defined in the
Glossary to the International standards for Professional Practice of Internal Auditing
(Standards) in IPPF as follows:
Assurance services
An assurance engagement is an engagement involving an objective examination of
evidence for the purpose of providing an independent assessment on governance, risk
management and control processes for the organisation. Examples may include
financial, performance, compliance, system security and due diligence engagements.
Consulting services
Advisory and related service activities, the nature and scope of which are agreed with
the customer, are intended to add value and improve an organisation’s governance,
risk management and control processes without the internal audit activity assuming
management responsibility. Examples include counsel, advice, facilitation and training.
There are different types of assurance engagements and there may be different
reasons for conducting each of them. The type of engagement and reasons for
performing the engagement are significant in how the engagement is performed.
There are a number of reasons for performing assurance engagements:
•
The engagement was identified in the annual internal audit plan because of
the risk assessment process.
•
The engagement is part of an annual legislative requirement.
•
A recent event (natural disaster) has tested the process under unusual
circumstances and management requires a review to determine where the
process was effective and where improvement is required.
•
Changes in the business or industry require changes to processes, and
73
AUI4863/SG
management requires that the organisation’s processes be validated to
ensure that amendments to address these changes are adequate.
Whereas the nature and scope of an assurance engagement are determined by the IAA, the nature
and scope of a consulting engagement are subject to agreement with the engagement customer.
The consulting engagement process includes the same steps as the assurance process. However,
each step may not be necessary for every consulting engagement.
It is important to note that the nature of consulting services must be defined in the internal audit
charter. All standards applicable to consulting services are marked with a “C”.
7.4 THE NATURE OF INTERNAL AUDIT ENGAGEMENTS
STUDY
•
•
•
Internal Auditing: An Introduction, par 6.6.3
Performing Internal Audit Engagements, par 8.1 – 8.3
The IPPF, Attribute Standards 1210 to 2240.A1 as well as related Implementation
Guides.
In order to complete a compliance audit successfully, there must be established criteria
against which the compliance can be measured. Compliance objectives pertain to the
adherence to laws and regulations to which the entity is subject to. They are dependent
on external factors such as environmental regulations and tend to be similar across all
entities in some cases and across an industry in others.
Compliance testing seeks to establish the degree to which control mechanisms are being
applied as prescribed and the results should highlight non-compliance in pursuit of the
defined test objective.
Once the engagement objectives are clear, the internal auditor must perform a
preliminary survey to obtain the necessary understanding of the engagement activity. It
is imperative that the results of the preliminary survey enable the internal auditor to
understand the impact of the non-compliance risks on the organisational objectives, the
risk assessment and risk management processes and the control system that enable
successful risk management. It is therefore important for the internal auditor to identify
the sections in the relevant legislation which pose the biggest risk to the organisation
and focus on those areas.
The following is a schematic presentation of the compliance risk universe in an
organisation.
74
Figure: Compliance risk universe
At this point an internal control questionnaire can be compiled to determine the level of compliance
and whether any controls exist to ensure compliance. It is important to have a good knowledge of
the relevant regulation to allow the internal auditor to focus the questionnaire on the important and
relevant sections of the regulations. The internal control questionnaire should be completed by the
staff members responsible for ensuring that particular compliance and documentary evidence
should be provided for every affirmative answer given.
This is an example of such a questionnaire for the Occupational Health and Safety Act, 1993:
Nr
1.
1.1
1.2
1.3
1.4
2.
2.1
2.2
3.
3.1
3.2
3.3
Details
Health & Safety Policy
Has top management defined and documented a health and
safety policy?
Is the policy relevant to the activities and processes on site?
Is the policy documented and implemented?
Is it communicated to all staff members?
Planning
Is there a procedure for the identification of health and safety
hazards and risks?
Are the hazards evaluated to determine significance?
Legal and other requirements
Has a procedure been developed for compliance with legal and
other requirements?
Has a legal register for the site been developed and is the
applicable legislation accessible?
Are legal requirements communicated to relevant persons in the
organisation?
Yes
No
Comments
The above table is only an example of a possible internal control questionnaire. Similar
questionnaires can be compiled for any of the regulatory compliance audits.
75
AUI4863/SG
ACTIVITY 20
Compile a compliance audit questionnaire for Eskom Holdings Limited (Eskom) in terms
of the Public Finance Management Act (PFMA).
FEEDBACK
An example of an internal control questionnaire for Eskom Holdings Limited (Eskom) in
terms of the PFMA:
Number
1.
Section
56(1)
2.
51(1)(a)(i)
3.
51(1)(a)(ii)
4.
TR27.1.1
5.
77(a)
6.
77(b)
7.
TR27.1.6
8.
TR27.1.6
9.
27.1.8
Details
Yes
Have the powers entrusted or delegated
to the accounting authority been
delegated to other officials within the
public entity?
Does the public entity have:
An effective, efficient and transparent
system of financial and risk management
and internal control?
A system of internal audit under the
control and direction of an audit
committee
complying
with
and
operating in accordance with regulations
and instructions prescribed in terms of
sections 76 and 77?
Is the audit committee a sub-committee
of the accounting authority?
Does the audit committee consist of at
least 3 persons?
Does the audit committee meet at least
twice a year?
Does the audit committee operate in
terms of a written terms of reference?
Are the terms of reference reviewed at
least annually to ensure its relevance?
Does the audit committee review the
following:
• The effectiveness of the internal
control systems:
• The effectiveness of internal audit;
• The risk areas of the entity’s
operations to be covered in the
scope of internal and external audits;
• The adequacy, reliability and
accuracy of financial information
provided to management and other
users of such information;
• Any accounting and auditing
76
No
Comments
Number
Section
10.
TR27.1.10(a)
11.
TR27.1.13
12.
TR27.2.1
Details
Yes
concerns identified as a result of
internal and external audits;
• The entity’s compliance with legal
and regulatory provisions;
• The activities of the internal audit
function, including its annual work
programme, co-ordination with the
external auditors, the reports of
significant investigations and the
responses of management to specific
recommendations; and
• Where relevant, the independence
and objectivity of the external
auditors.
Does the audit committee report and
make
recommendations
to
the
accounting authority?
Does the audit committee meet annually
with the Auditor-General or external
auditors to ensure that there are no
unresolved issues of concern?
Are risk assessments conducted
regularly to identify the public entity’s
emerging risks?
No
Comments
Does the public entity have a risk
management strategy (including a fraud
prevention plan) to direct internal audit
effort and priority and to determine the
skills required of managers and staff to
improve controls and to manage these
risks?
13.
TR27.2.5
14.
TR27.2.6
15.
TR27.2.7
If there is a risk management strategy, is
it communicated to all employees?
Are the purpose, authority and
responsibility of the internal audit
function defined in an audit charter?
Are internal audits conducted in
accordance with standards set by the
IIA?
Has the internal audit function prepared
a three-year strategic internal audit plan
based on the risks facing the public
entity?
Does the internal audit function report
to the audit committee detailing its
77
AUI4863/SG
Number
Section
TR27.2.10
16.
51(e)
17.
86(2)
18.
52
19.
51(1)
Details
Yes
performance against the plan?
Does the internal audit function evaluate
the following:
• The information systems
environment;
• The reliability and integrity of
financial and operational information;
• The effectiveness of operations;
• Safeguarding of assets; and
• Compliance with laws, regulations and
controls.
Have
effective
and
appropriate
disciplinary steps been taken against any
employee of the public entity who has:
• Contravened or failed to comply with
a provision of the PFMA;
• Committed an act which undermined
the financial management and
internal control system of the public
entity; and
• Made or permitted irregular or
fruitless and wasteful expenditure.
Has the accounting authority been found
guilty of an offence or is there any
investigation pending relating to the
wilful negligent failure to comply with
the provisions of section 50, 51 or 55?
Did the accounting authority submit the
following to the relevant treasury and to
the accounting officer of the department
at least one month before the start of
the public entity’s financial year:
• A projection of revenue, expenditure
and borrowings for the financial year
in the prescribed format; and
• A corporate plan in the prescribed
format covering the affairs of the
public entity or business enterprise
for the following three financial
years, and if it has subsidiaries, also
the affairs of the subsidiaries.
Does the public entity:
• Have an appropriate procurement and
provisioning administration system,
which is fair, equitable, transparent,
competitive and cost-effective?
• Have a system for properly evaluating
78
No
Comments
Number
Section
20.
55
Details
Yes
all major capital projects prior to final
decision on the project?
• Collect all revenue due?
• Have mechanisms in place to prevent
irregular and fruitless and wasteful
expenditure?
• Manage available working capital
efficiently and economically?
Did the public entity submit the
following to the relevant treasury,
executive authority and Auditor-General
within 5 months from the end of the
financial year:
• An annual report on the activities of
the public entity during that financial
year;
• The financial statements for the
financial year after the statements
have been audited; and
• The report of the auditors on those
statements.
No
Comments
Do the public entity’s annual report and
financial statements present the state of
affairs of the public entity, its business,
its financial results, its performance
against predetermined objectives and its
financial position as at the end of the
financial year concerned?
Do the annual report and financial
statements include:
• Any material losses through criminal
conduct and any irregular expenditure
and fruitless and wasteful expenditure
that occurred during the financial
year;
• Any criminal or disciplinary steps
taken as a consequence of such losses
or irregular expenditure or fruitless
and wasteful expenditure;
• Any losses recovered or written off;
• Any financial assistance received from
the state and commitments made by
the state on its behalf; and
financial
statements
of
• The
subsidiaries.
79
AUI4863/SG
Number
21.
Section
65
Details
Yes
Did the executive authority table the
annual report and financial statements
within one month after the accounting
authority received the audit report?
No
Comments
If no, did the executive authority table an
explanation in the legislature setting out
the reasons why the annual report and
financial statements were not tabled?
Other sections of the Treasury Regulations that can also be included are:
•
•
•
•
•
•
•
•
•
•
TR33.1.1
TR33.1.2
TR33.2.1
TR33.3.1
TR30.1.3
TR29.1.6
TR29.3.1
TR27.1.7
TR28.1.1
TR28.1.3
•
•
•
•
•
•
•
•
•
•
TR29.1.1
TR29.2
TR30.1.1
TR30.1.2
TR29.1.3
TR32.1.1
TR30.2.1
TR27.1.10
TR28.1.2
TR28.2.1
Please note that the questionnaire given is not an exhaustive list. More sections can be added
depending on the status of the control environment.
ADDITIONAL READING
Search for relevant internal audit compliance checklists on the internet.
SUMMARY
This learning unit focused on the aspects that an internal auditor should take into
consideration while planning a compliance audit engagement. Take note that the
examples relate to legislation only, but that the same approach will be followed to
perform a compliance audit on policies and procedures that were internally generated by
the organisation.
NOTES
Make your own notes here:
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
80
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
________________________________________________________________________________
81
AUI4863/SG
Learning unit 8
Conducting compliance audits
Contents
8.1
8.2
8.3
INTRODUCTION
FORMULATE AND CONDUCT AUDIT PROCEDURES
COMPLIANCE AUDIT TESTING
82
82
83
8.1 INTRODUCTION
This learning unit deals with the actions and considerations necessary to formulate and
perform the audit procedures required during the execution of a compliance
engagement.
STUDY
8.2
•
Performance Standards 2300, 2310 and 2320 as well as Implementation Guides
2300, 2310 and 2320.
•
Performing Internal Audit Engagements:
• Par 3.7 (p 129)
• Par 4.7 (p 186)
• Par 5.7 (p 244)
• Par 6.8 (p 315)
• Par 7.7 (p 351)
• Par 8.4 (p 372)
FORMULATE AND CONDUCT AUDIT PROCEDURES
Internal auditors apply engagement procedures to obtain sufficient, competent, relevant
and useful information that will achieve the engagement’s objectives. An example of
such an audit objective may be to ensure that Eskom Holdings Limited complies with the
PFMA.
82
REFLECTION
In module AUI2601, the formulation of an audit objective is discussed in detail. Make
sure that you understand how to formulate an audit objective before continuing with the
study of this learning unit.
ACTIVITY 21
Indicate the process and/or procedures the internal auditor should follow to derive this
particular audit objective. Do you believe the audit objective to be relevant for Eskom
Holdings Limited? Discuss your view on myUnisa, under the Discussion Forum.
ADDITIONAL READING
Read the following article: Ethics and compliance programs. Available at:
https://na.theiia.org/aboutus/Public%20Documents/Esther%20R.%20Sawyer%20Research%20Manuscrip%20Dou
glas%20Secrest.pdf
8.3
COMPLIANCE AUDIT TESTING
When performing compliance tests, one is testing the existence or otherwise of a
particular control. The test is of a yes/no nature, to determine where an attribute is
either present or does not exist.
An example may be a test to determine the number of purchase invoices that have not
been authorised by a designated officer before being paid.
The focus of compliance auditing is on compliance with laws and regulations, statutes
and internal policies. A compliance audit therefore sets out to discover how well a unit or
organisation complies with an established set of “rules”.
The testing process in accordance with Implementation Guide 2310-1 can be illustrated
as follows:
Define the test objective
Perform the test
Interpret results
Determine the impact on audit
objectives
Determine the next step
83
AUI4863/SG
For compliance auditing, the internal control questionnaire can be adapted to present an audit
programme and used to perform the audit tests. Each requirement then becomes an audit
procedure that must be performed using relevant audit techniques.
For example:
Organisation:
Subject:
Nr
Sec
1.
56(1)
Compliance Audit Checklist/ Working paper
Department:
Auditor:
Details
Yes
No
Comments
Evidence
Examined
Page:
Date:
Audit ref:
Findings
&
Observations
Result
Have the powers
entrusted
or
delegated to the
accounting
authority
been
delegated
to
other
officials
within the public
entity?
KEY: COM = Complies
MAJ
=
compliance
Major
Non-
MIN = Minor Non-compliance
OBS = Observation
ACTIVITY 22
It is important to consider all the different engagement tools and techniques
available to the internal auditor during the performance of the audit procedures.
Make a list of different testing techniques available to the internal auditor
throughout the audit.
FEEDBACK
The testing techniques can consist of any one or any combination of the following:
• re-performance
• observation
• corroboration
• analytical review
• inspection
• reconciliation
• expert opinion
• interviews
• review of published reports/ research
• independent confirmation
• receiving the service as a client
• mathematical models
• questionnaires
• comparison
84
• user satisfaction surveys
Always remember that audit procedures are performed to enable the auditor to express
an opinion on the level of compliance, i.e. to what extent the audit objective is achieved.
ACTIVITY 23
Join the debate on myUnisa (Discussion Forum) on which position/person, within
Eskom Holdings Limited, you would interview to gather the most information about
the company’s compliance record?
SUMMARY
This learning unit focused on the aspects that an internal auditor should take into
consideration when formulating and performing audit procedures for a compliance
audit.
NOTES
Make your own notes here:
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
85
AUI4863/SG
Learning unit 9
Reporting on compliance audits
Contents
9.1
9.2
INTRODUCTION
THE INTERNAL AUDIT REPORT
86
87
9.1 INTRODUCTION
In most organisations, reports are a standard management tool. The quality of the
audit report can make the difference between achieving your objective or failing to do
so. An effective audit report can contribute to business success and assist greatly in the
process of planning and decision making.
The basic guidelines for report writing are the same, irrespective of the type of report
being written. Even internal auditors with good writing skills may sometimes find
themselves unable to write good reports. In this learning unit guidelines will be given to
assist internal auditors to write a compliance audit report.
STUDY
Performing Internal Audit Engagements:
• Par 8.4 (p 372)
• Par 8.7 (p 378)
Study Performance Standards 2400, 2410, 2410.A1, 2410.A2, 2420, 2421, 2430, 2431,
2440 and 2440.A1 as well as Implementation Guides 2400, 2410, 2420, 2440 and 2450.
9.2 THE INTERNAL AUDIT REPORT
REFLECTION
Refer to topic 2 for a detailed discussion on internal audit reporting.
86
READ
Go to myUnisa, under Additional Resources to download relevant articles or guidance
on this topic Report writing.
ACTIVITY 24
Join the debate on myUnisa (Discussion Forum) discussing the truth of the following
statement: “The executive summary is the most important section of the internal audit
report”.
SUMMARY
This learning unit focused on writing an internal audit report for a compliance audit.
NOTES
Make your own notes here:
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
87
AUI4863/SG
TOPIC 4
Operational auditing
Contents
LEARNING UNIT 10: Operational audit plan
90
LEARNING UNIT 11: Conducting operational audits
106
LEARNING UNIT 12: Reporting and follow-up on operational audits
117
INTRODUCTION TO AND PURPOSE OF THE TOPIC
In this topic the practice of operational auditing to the integrated level of professional skill is
presented. It provides an explanation of the full process of the performance of an operational audit.
MULTIMEDIA
Please access the podcast on myUnisa to assist you in your studies of topic 5.
REFLECTION
In your undergraduate studies of internal auditing you were exposed to the philosophy
and process of operational auditing. Before you continue with the study of this topic, you
should refer back to your undergraduate study material to refresh your knowledge of
operational auditing. After you have revised your undergraduate study material,
consider the following to evaluate the effectiveness of your revision:
●
●
The overall objective of operational auditing is to promote maximum managerial
efficiency. Operational auditing focuses mainly on individual areas such as a
particular system or section in the organisation so that, in this respect, operational
auditing is similar to micro-risk evaluation.
In practice it is difficult to differentiate between a financial audit and an operational
audit when any business process is exposed to an internal audit evaluation.
88
●
Depending on the specific objectives of the engagement, combining the two types
can be extremely effective.
The Standards that deal with the nature of audit work discourage the differentiation
between the various types of audit engagements. The Standards require internal
auditors to evaluate and contribute to the improvement of risk management,
control and governance systems as part of any engagement.
This includes an evaluation of the
●
●
●
●
reliability and integrity of the financial and operational information
effectiveness and efficiency of operations
safeguarding of assets
compliance with laws, regulations and contracts
Operational auditing is essentially more reactive because it is a process of determining
the economy, efficiency and effectiveness of completed actions and their consequences,
but it also includes a proactive component in that recommendations are made for the
improvement of the effectiveness and/or efficiency and the economy of activities
reviewed.
The practical performance of operational auditing is discussed in this topic, using three
learning units that deal with each individual phase of the operational auditing process
comprehensively.
LEARNING OUTCOMES
After you have studied this topic, you should be able to:
•
•
•
•
plan the operational audit according to applicable Standards
explain how to conduct the operational audit
perform the audit procedures
compile the audit report and communicate the audit results
89
AUI4863/SG
Learning unit 10
Operational audit plan
Contents
10.1
10.2
10.3
10.4
INTRODUCTION
IDENTIFYING THE AUDIT FIELD
FORMULATING THE ENGAGEMENT OBJECTIVES
ENSURE THAT THE PLANNING COMPLIES WITH THE INTERNAL
AUDITING STANDARDS
10.5 THE ENGAGEMENT PROGRAMME PHASE
10.6 EXAMPLES OF AN OPERATIONAL ENGAGEMENT PROGRAMME FOR THE
PURCHASING FUNCTION OF AN ORGANISATION
90
96
99
100
101
102
10.1 INTRODUCTION
This learning unit deals with the first and one of the most important phases in the
operational auditing process. An operational audit is also referred to as a value-formoney audit or a performance audit. As in the case of any other internal audit type, the
planning phase of an operational audit is of cardinal importance. The quality of the
planning determines the effectiveness of the audit. Of all the elements of planning,
establishing the critical risk and problem areas is the most important.
STUDY
• Assurance: An Audit Perspective, par 3.4
• All the sections in your undergraduate study material that relate to operational audits
REFLECTION
It is important that you revise the underlying technical knowledge and expertise you
obtained at undergraduate level before you continue with the rest of this learning unit.
You should already know what an operational audit is (an investigation into the
economy, efficiency and effectiveness of the activity in the organisation that is being
90
investigated). You should also know when an operational audit should be performed,
how to perform an operational audit efficiently and effectively, and how to effect the
necessary changes in the system or section concerned.
The planning phase of an operational audit comprises the following steps:
1. obtaining background information on the section/activity to be investigated
2. deciding on the scope of the engagement and the specific areas or aspects on
which to focus
3. formulating the engagement objectives
4. investigating audit criteria (performance standards) that can be applied in the
conduct of the audit
5. drawing up an engagement work programme
6. ensuring that the planning complies with the internal auditing standards
7. discussing the proposed audit engagement with the management of the section or
activity involved
As most of the above steps have been covered in your undergraduate studies, we will
only focus on certain aspects that we want to highlight in the following sections of this
learning unit:
• founding principles of operational auditing
• identifying the audit field
• formulating the engagement objectives
• ensure that the planning complies with the internal auditing standards
• the engagement programme phase
Founding principles of operational auditing
Based on your undergraduate studies, you should be able to formulate and discuss the
definition for operational auditing. Let’s revise the basic principles that form the
cornerstone of operational auditing.
The difference between an operational (performance) audit and internal audit:
Source: www.isaca.org/chapters10/Lusaka/.../Documents/Pefromance-Auditing.pdf
91
AUI4863/SG
The following are two definitions of operational auditing that you should be familiar
with.
In Operational auditing: an introduction, by Casler and Crockett, a publication of the
Institute of Internal Auditors Inc, operational auditing is defined as follows:
Operational auditing is a systematic process of evaluating an organisation’s
effectiveness, efficiency and economy of operations under management’s control and
reporting to appropriate persons the results of the evaluation along with
recommendations for improvement. Its objectives are to provide a means for
evaluating an organisation’s performance and to enhance performance by making
recommendations for improvements.
Reider, in his book The complete guide to operational auditing, defines operational
auditing as follows:
Operational auditing is an audit of operations performed from a management
viewpoint to evaluate the economy, efficiency and effectiveness of any and all
operations, limited only by management’s desires.
Visit the following website and read the article regarding operational auditing. Take
note of the definition of operational auditing as well as how to use operational auditing.
MULTIMEDIA
Click on the hyperlinks below to view the slides on operational auditing:
http://www.slideshare.net/ahmad1957/operational-auditing-presentation
The following diagram illustrate the interrelationship between economy, efficiency and
effectiveness:
Source: Chambers, A & Rand, G. 1997. The operational auditing handbook.
(1) Economy – the relationship between planned inputs and actual inputs in terms of unit costs
(2) Efficiency – the relationship between actual inputs and actual outputs
(2) Effectiveness – the relationship between actual outputs and planned outputs
92
The illustration below shows the mission and objectives and the planned outcomes of the
organisation in relation to the organisational processes. It shows where economy, efficiency and
effectiveness fits into these processes.
Examples of Economy, Efficiency and Effectiveness are illustrated below:
Source: Reider, HR. 1995. The complete guide to operational auditing
93
AUI4863/SG
REFLECTION
From your undergraduate studies you will remember that operational auditing has four
principal components, namely:
• financial
• compliance
• economy and efficiency
• effectiveness
Financial
This component is concerned with proper and adequate accounting and reporting
procedures. It closely resembles traditional financial auditing, the difference being that
in operational auditing it is only one element of an audit assignment and it is made
applicable to all the activities of an organisation.
Compliance
Compliance is usually dealt with in conjunction with the financial component. It
comprises compliance with legislation, regulations, internal policy and procedures. In
an operational audit assignment, the auditors assess compliance not only with financial
legislation, regulations, policy and procedures, but also with all the rules that regulate
the operations of an organisation.
Economy and efficiency
This component involves the achievement of the optimum balance between costs (i.e.
economy) and results (efficiency being the relationship between input and output, or
results achieved). Costs should be cut to the minimum, but not at the expense of
results, and at the same time productivity should be improved, but without incurring
excessive costs. In an investigation into economy and efficiency the auditors analyse
the way in which the organisation is applying its resources, namely human resources,
facilities, equipment, materials and funds.
The following aspects would be included in this example:
• the purchasing policy of the organisation
• material prices and service costs
• staffing in relation to the functions that have to be performed
• surplus stock on hand
• use of more expensive equipment than necessary
• prevention of losses and wastage of resources
• division of projects into logically manageable tasks
• efficiency and application of operating systems and procedures
• efficiency of documentation flow
• performance of unnecessary tasks or duplication of tasks
• allocation of responsibilities and authority within an organisation
• speed of production and completion time for projects
94
Effectiveness
This component is concerned with the achievement of results and the resultant
benefits. In an investigation of effectiveness internal auditors try to establish whether
an activity is achieving its purpose and whether the results of an undertaking or activity
correspond to the targets set, the objectives or any other criterion. An investigation of
effectiveness is concerned with quality rather than quantity.
The following procedures would, for example, form part of an investigation into
effectiveness:
• evaluation of the organisation's approach to the development of realistic targets,
objectives and
• procedures for attaining those targets and objectives
• evaluation of the adequacy of management's method of measuring effectiveness
• establishment of the extent to which results are being achieved
• identification of the factors that impede satisfactory performance or the
achievement of results
By referring back to your undergraduate studies, make a list of all the advantages and
disadvantages of operational auditing. Ensure that you can answer relevant questions
on the basic components of operational auditing.
You need to understand all these concepts and should be able to apply your theoretical
knowledge of the above components to practical scenarios.
MULTIMEDIA
Click on the hyperlink below to view the following YouTube video:
https://youtu.be/pre9V8XQVdI
❖
View the screencast on the Three E’s in operational auditing on myUnisa.
ACTIVITY 25
You are a senior internal auditor responsible for the operational audits in your
organisation, which happens to be a large manufacturing company. For purposes of
operational audits, summarise factors that could reveal critical conditions and could
also indicate possible risk areas in your organisation. Refer to the previous examples as
a guideline but also extend your discussion by referring to magazine articles and
literature.
This is a theoretical question where you are required to list the factors that could reveal
possible risk areas. Refer to your undergraduate work and the previous activity, and
then complete the answer to this activity. Because of the theoretical nature of this
question, answering it directly from your undergraduate study material is easy. Make
sure that you know the theoretical principles for the examination and that you are able
to apply these to practical situations.
95
AUI4863/SG
10.2
IDENTIFYING THE AUDIT FIELD
The most critical question the internal auditor has to answer before carrying out an
operational audit is which section, function or activity should be audited.
STUDY
• Revise all the sections in your undergraduate study material that relate to planning
considerations.
• Assurance: An Audit Perspective, par 3.4.3 – (Identifying the focus area)
Internal auditors usually operate on a limited budget as regards the funds and hours available for
operational auditing. Consequently, the available time and money must be used in those areas with
the greatest possibility for improved performance. Because the purpose of the internal audit
activity is to support management of the organisation in discharging their responsibilities, the
internal audit projects should focus on the aspects that are important to management in achieving
both their own goals and those of the organisation. The bigger the impact of a particular activity on
the attainment of the goals of the organisation, the more important the effective functioning of
that activity would be in the eyes of management.
The long-term planning of the IAA, which is approved by management and the audit committee,
should also make provision for operational audit engagements. When the CAE prepares the longterm planning of the IAA, he or she needs to evaluate the risks faced by the particular organisation
and identify the critical conditions within the organisation.
The following factors could reveal critical conditions for the purpose of operational auditing and
indicate possible risk areas:
• Income, expenses, concentration of fixed assets, sales, production volumes, staff numbers
and staff costs for one activity or department that appear to be high in comparison with the
figures for the other activities or departments within the organisation.
• Poor control, for example an inadequate manufacturing control system, poor management
reporting or poor planning and control system.
• Cases of abuse or carelessness. Examples would be a production and control system in
which transactions went unrecorded or an ineffective personnel evaluation process.
• Conditions that make it difficult to exercise control, such as inadequate storage facilities, or
delays in a shipping process.
• Activities that are not efficiently or economically carried out, such as ineffective procedures,
duplication of tasks, unnecessary work and surplus staff.
• Unexpected trends indicated by analytical reviews, such as major increases or decreases in
sales, cost per item, staff numbers, stock levels, etc.
• Areas in which management has identified specific weaknesses or the need for
improvement, such as personnel functions, manufacturing procedures, data processing
methods and management reporting.
96
This list is, however, not extensive and you should refer to your undergraduate studies for more
possible risk factors.
ACTIVITY 26
Being an internal auditor at a stationery manufacturer, you are currently compiling an
engagement programme for an operational audit of the pencil manufacturing plant.
Your objective is to evaluate the economy, efficiency and effectiveness of the plant.
During the preliminary survey, you acquired, among other things, the following
information regarding the activities of the pencil plant and the purchase and stock
keeping of materials for production purposes:
1.
2.
3.
Purchases of production material are done on behalf of the pencil plant by
personnel from the finance section.
Stock levels of production material are monitored by means of a computer. All
purchases, requisitions and write-offs are keyed into the computer by the assistant
to the storeroom foreman.
Purchases of production material are based on notices printed by the computer and
approved by the head of the plant as soon as the stock reaches certain minimum
levels.
REQUIRED
Based on the information given above, formulate 12 (twelve) audit procedures to
evaluate the economy, efficiency and effectiveness of the pencil plant. Structure your
answer under the following headings:
A Economy
B Efficiency
C Effectiveness
FEEDBACK
Audit procedures to evaluate the economy, efficiency and effectiveness of the pencil
plant
A
Economy
1.
Interview senior staff members to determine whether the purchasing department
gathers information regarding prices and suppliers on a frequent basis in order to
determine whether materials are purchased at the lowest prices.
2.
Evaluate the procedures followed to determine whether purchasing conditions are
agreed upon and followed in such a way that purchases fall within the budget, all
possible discounts are obtained and payments are made on terms that will be most
beneficial to the organisation.
97
AUI4863/SG
3.
Evaluate the policy of the purchasing department to determine whether it provides
for the frequent rotation of purchasing personnel in respect of suppliers and
whether such rotation in fact takes place.
4.
Reperform the calculation of minimum inventory levels and most economic
purchase quantities for accuracy.
5.
Evaluate whether the preparation of orders is based on information provided by
means of notices via computer that have been authorised by the head of the plant.
6.
Interview management and confirm the accuracy, reliability and relevance of
information used to determine minimum inventory levels and economic purchase
quantities.
7.
Visit the inventory warehouse and investigate the safeguarding of inventory against
theft and damage, the extent of obsolete inventory and the acceptability of the
inventory turnover rate.
8.
Evaluate inventory write-offs recorded on the computer for reasonableness and
determine whether all write-offs are properly authorised.
9.
Analyse the gross profit percentage and the factors influencing it.
10. Determine whether incorrect deliveries are returned in good time and whether
credit is received for them.
B
Efficiency
1.
Determine by way of observation and discussion whether the correct number of
people have been assigned to purchasing materials on behalf of the pencil plant to
avoid causing unacceptable backlogs or idle time.
2.
Evaluate whether it is efficient for the finance department to handle purchases on
behalf of the pencil plant.
3.
Determine whether a trained person is always available to handle purchases on
behalf of the pencil plant to avoid delays and backlogs which might lead to an
inventory shortage.
4.
Obtain evidence that the necessary backup of all information saved on computer is
done, and that the computer system is properly maintained in order to ensure that
the information upon which order requisitions are based is accurate, and that these
notices are processed on a regular basis.
5.
Determine whether someone with the necessary seniority, other than the head of
the pencil plant, also has the authority in the absence of the manager of the pencil
plant to authorise orders.
6.
Investigate the procedures followed as well as the time from the moment the notice
for an order is printed on computer until the order is placed and ensure that there
are no unnecessary delays.
98
7.
Confirm by observing that the particulars of inventory purchases, issues and writeoffs according to the original source documentation (such as delivery notes and
issuing requisitions) have been entered into the computer accurately and without
delay.
8.
Determine whether there have been any interruptions in production owing to
inventory shortages by way of discussion with the head of the pencil plant. If so,
investigate the cause of such shortages.
9.
Obtain or prepare a schedule of the purchasing and manufacturing process
concerning pencils, showing details of the machinery, equipment and labour that
are used, the idle time between processes, the duration of the process and the
stages at which quality control is exercised. Analyse the efficiency of the procedures
followed on the basis of this schedule, together with observation and discussions
with the head of the plant and the other personnel. Specifically take note of any
duplication of work and unnecessary steps in the manufacturing process.
C
Effectiveness
1.
Ensure that meaningful, realistic and measurable objectives have been set for the
pencil plant in respect of, for example, profit margins, output, manufacturing costs
and productivity.
Evaluate the planning of the plant to ensure that it is directed at achieving these
objectives.
2.
10.3
3.
Determine whether the criteria used to measure the achievement of the overall
objectives, for example quality of output, output quantities, spoilage levels,
application of materials, direct costs and throughput manufacturing rate, are
realistic and meaningful.
4.
Evaluate the effectiveness of the pencil plant by measuring the performance of the
plant in terms of the formulated objectives and criteria.
5.
If sufficient measuring criteria do not exist by means of which to evaluate the
effectiveness of the pencil plant, develop criteria in conjunction with the head of the
pencil plant that can be used in the interim for measuring purposes.
6.
Confirm the accuracy of the measurement of capacity utilisation and spoilage for
the pencil plant and also that the information forwarded to management is reliable
and timely.
FORMULATING THE ENGAGEMENT OBJECTIVES
Once a focus area has been identified, the engagement objectives for the focus area should be
defined. During the planning stage the auditors should specify what they intend to achieve by
performing an operational audit on the identified focus area and determine the boundaries of the
investigation (scope limitations). These audit objectives should be agreed to by the executive
management of the organisation, and the management of the department or division in question.
99
AUI4863/SG
The engagement objectives for the auditing of the operational audit of the tendering/quotation
process in terms of the procurement process could, for example, be the following:
(1)
Establish what procedures could be followed in obtaining quotations and tenders to optimise
the effectiveness of the purchasing function.
(2)
Develop procedures for the procurement of quotations and tenders that would contribute to
the most efficient and economic functioning of the purchasing function.
(3)
Identify opportunities for improving the existing procedures for obtaining quotations and
tenders.
(4)
Revise and analyse the existing data processing procedures for obtaining quotations and
tenders in the purchasing function with a view to possible improvement.
REFLECTION
Remember, in this learning unit we only highlight a few important aspects regarding
the planning phase. Revisit your undergraduate studies and ensure that you study all
the steps that relate to the planning phase of an audit engagement.
10.4
ENSURE THAT THE PLANNING COMPLIES WITH THE
INTERNAL AUDITING STANDARDS
As with any other audit engagement performed by the IAA, the planning of an operational audit
should also comply with the Standards. Internal Auditing Standards 2200 and 2201 lay down
guidelines for the planning of an audit engagement.
STUDY
Study Performance standards 2200, 2201, 2210, 2220, 2230 and 2240 as well as
Implementation Guides 2200, 2201, 2210, 2220, 2230 and 2240.
The engagement programme forms the link between the planning phase and the
fieldwork phase of an audit.
STUDY
•
•
•
Performing Internal Audit Engagements, par 1.3.1
Internal Auditing: An Introduction, par 6.5
Assurance: An Audit Perspective, par 3.4.4
100
10.5
THE ENGAGEMENT PROGRAMME PHASE
A well-structured operational engagement programme is a prerequisite for the effective and
efficient performance of an operational audit.
REFLECTION
Based on your undergraduate knowledge of operational auditing, you should be able to
compile an engagement programme for an operational audit. Work through the
following section just to refresh your memory.
In compiling operational engagement programmes the following steps should be
followed once focus areas have been identified:
(1) Identify existing controls and risk areas. In the purchasing function there is the risk
that unnecessary items could be ordered or that too much of a certain item could
be ordered.
(2) Determine the objectives that should be satisfied by specific audit steps. An
example of an objective for the auditing of the purchasing function might be to
establish whether only those items or services that are really needed are efficiently
and timeously ordered.
(3) The audit procedures required to satisfy these objectives are then formulated.
The following are examples of audit procedures that could satisfy the above objective:
•
•
•
•
•
•
Select a number of departments or sections where purchases are initiated and, in
cooperation with the management of the department or section, study the
procedures followed when placing orders.
Examine the need for selected material, equipment or services purchased for the
department or section.
Establish the authorisation requirements applicable in respect of purchases,
including the authorisation of orders, budgetary requirements, etc.
Establish the time lag between the placement of an order and the delivery of the
goods and find out how this influences the functioning of the department or
section.
Draw up a flow chart of the ordering procedure to determine whether the control
procedures are adequate to ensure accurate and full record-keeping of all orders.
Analyse specifications in terms of orders and quality control procedures to ensure
that the correct items are ordered at the best prices.
Although each operational audit programme is unique in the sense that it has been
developed for a specific audit area, this does not mean that the auditor cannot use audit
techniques that have already been used in previous operational audits. In deciding what
audit techniques to use, the auditor should identify the specific audit techniques that
best suit the situation he is dealing with. Although the use of tried and trusted audit
techniques is to be recommended because it can save time and money, the initiative and
101
AUI4863/SG
creativity of operational auditors should not be stifled, as it will often be necessary to
come up with unique audit techniques in order to audit certain activities or processes
effectively.
Some more general audit techniques that can be used in the development of
engagement programmes are the following:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
10.6
examination of existing documentation, such as policy and procedure manuals
compiling of organograms and accompanying job descriptions
analysis of policy and procedures with regard to personnel
analysis of policy and procedures surrounding the administrative and operating
systems of the organisation
interviews with management and operational personnel
drawing up of flow charts to analyse processes, or possibly the physical layout of a
working area
analysis of rates, changes and trends
questionnaires to management or operating personnel and questions in the audit
programme
telephonic or written inquiries to outside parties, such as suppliers or clients
reviewing of transactions
observation of specific activities
evaluation of the results of the focus area
compliance investigations, with regard to legislation, regulations, policies,
procedures, objectives, etc.
application of computer-assisted audit techniques (CAATS)
EXAMPLES OF AN OPERATIONAL ENGAGEMENT PROGRAMME
FOR THE PURCHASING FUNCTION OF AN ORGANISATION
Figure 10.1 is an example of an operational audit programme for the purchasing function of an
organisation. Because all operational audits are different, this audit programme merely serves as an
example and cannot be applied to any situation.
Figure 10.1: Engagement Programme for a purchasing function
I ORGANISATION
A Function and authority of the purchasing department
1
Obtain an organigram of the purchasing department and ascertain to whom the head of
the purchasing department reports.
2
Document the functions of the purchasing department and determine whether it is
appropriate for the purchasing department to handle all those functions.
B The function of and necessity for the various posts in the purchasing department
1
Document the duties and responsibilities of the following posts by obtaining existing job
descriptions and verifying their validity by means of interviews and observation:
102
•
•
•
•
•
Purchasing supervisor
Buyers I and II
Inventory control clerks
Clerical supervisor
Typist clerk
2
Evaluate the work done by the people in the above positions by means of physical
observation and consider whether those functions are necessary.
II
RESPONSIBILITIES OF THE PURCHASING DEPARTMENT
A
Processing general order forms
1
Obtain a copy of the purchasing department's systems and procedures.
2
Interview personnel from the purchasing department and physically observe the way
they perform their functions in order to confirm the accuracy of the systems
descriptions.
3
Compile a flow diagram of the activities within the purchasing department, and of related
activities, such as the initiation and placing of order requisitions, control over open
orders, etc.
4
Calculate the present cost of processing an order, taking the following into account:
• direct cost of running the purchasing department
• indirect costs attached to the purchasing department
• number of orders processed
5
Carry out the following analysis of orders placed by using management reports on
purchasing orders placed:
• orders per department
• orders per supplier
6
Analyse the number and amount of actual purchases in the following categories:
• under R50 000
• R50 000–R100 000
• R100 000–R200 000, etc.
Compare these statistics with those of previous years.
7
Calculate the actual cost of small purchases.
B
Decentralised purchases
1
Obtain copies of policy in respect of purchases generated outside the purchasing
department, such as emergency purchases, direct purchases and petty cash purchases.
103
AUI4863/SG
2
Select a number of decentralised operating units and examine the procedures they
follow in making such purchases; compare the procedures they follow with policy
directives.
Source: Based on Reider, HR. 1995. Complete guide to operational auditing.
ACTIVITY 27
During the planning phase of an operational audit the auditors noticed that there were
possibly too many purchasing staff in relation to the size of the purchasing department.
The auditors decided to investigate this problem in the next phase of the operational
audit and for this purpose audit procedures for inclusion in the operational auditing
programme will be formulated.
Although the office manager agreed that there might be a slight level of overstaffing,
she pointed out that the organisation's reported costs per order form processed were no
higher than those of similar organisations, including organisations functioning within
lower cost environments.
REQUIRED
Identify the audit procedures that you would include in the operational engagement
programme to support your preliminary finding that there might be too many staff in the
allocated area.
FEEDBACK
The following are some of the audit procedures that can be carried out:
(1) Extensive tests on the payroll of the purchasing department to make certain that all
the costs have been included and reported.
For example: Has the salary of the manager of the purchasing department by any
chance been included on the management payroll?
(2) Interviews with all employees to establish exactly what their functions are and the
nature of these functions.
(3) Preparing a layout flow chart of the office area with an indication of the most
important functions in order to analyse work flow.
(4) Preparing systems flow charts that analyse each procedure in order to establish
whether the procedures followed could be simplified, functions could be combined
or certain steps in the process could be eliminated.
(5) Consider possible improvements in the existing personnel allocation and procedures
that could lead to greater efficiency and a reduction in the personnel allocation.
Prepare layout flow charts and systems flow charts to reflect these
recommendations.
Source: Adapted from Reider, HR. 1995. Complete guide to operational auditing.
104
ACTIVITY 28
In the course of the preliminary survey carried out as part of the operational audit, the
internal auditors identified the following shortcomings with regard to the handling of
damaged or incorrect deliveries:
Returns by the organisation to suppliers (purchases returns):
(1) The organisation paid for the transport costs of almost 50 per cent of the items
returned. This happened because existing procedures were not complied with. In
terms of the established procedures freight on returns should not be paid directly by
the operating department where the items were delivered.
Returns received from the organisation's clients (sales returns):
(2) Some of the organisation's local clients sent the faulty deliveries back in the delivery
van --- in contradiction to the sales conditions and policy of the organisation which
provide that clients are not permitted to return faulty or damaged deliveries
directly.
(3) When faulty or damaged items were returned by clients, the cash discount was not
correctly handled. The client's account was credited with the amount invoiced plus
the cash discount.
REQUIRED
With regard to each of the problems listed above, develop one audit procedure the
auditors should include in their operational engagement programme to further
investigate the matter.
FEEDBACK
When you have to perform an operational audit, whether it is to formulate objectives, to
formulate audit procedures, to compile questionnaires or to gather information, you can
always use the aspects that the internal auditor should attend to when evaluating
economy, efficiency and effectiveness as a basis to work from and adjust these to suit
the applicable situation. You will also find these aspects handy in answering practical
questions on operational auditing. Through this question, we want to emphasise the
importance of knowing and understanding these aspects.
(1) Transport costs on purchase returns
(a) Analyse a sample of purchase returns and determine how regularly the
organisation has paid the transport costs and then calculate the amount
involved.
105
AUI4863/SG
(b) Examine the procedures followed in certain selected sections to determine to
what extent instructions are deviated from.
(2) Return of delivered goods in the organisation's delivery vans
(a) Analyse a sample of returns by customers and determine the degree of
deviation from prescribed procedures and agreements with regard to the
return of incorrect deliveries.
(b) Revise dispatch procedures to determine whether the procedures followed in
practice make provision for the recording of instances where items are brought
back by the delivery vehicles.
(c) Review the existing policy that the organisation's delivery vehicles may not be
used to transport faulty deliveries back to the organisation. Consider the
acceptability of the procedures followed at present and determine whether
they represent the most economic method of handling sales returns.
Note: This problem may merely be a symptom of larger underlying problems, such as a
considerable number of faulty deliveries or a lack of quality control in the manufacturing
department. The auditor should also carry out tests to investigate this possibility.
(3) Cash discounts
(a) Analyse accounting documents and records to determine what amount has
been paid to clients of the organisation in respect of cash discounts.
(b) Analyse the procedures, both computerised and manual, currently being
followed for sales returns and determine whether any controls could be
introduced to prevent similar errors in future.
Source: Based on Reider, HR. 1995. Complete guide to operational auditing.
ONLINE ASSESSMENT QUESTION
Do the online assessment multiple-choice questions on myUnisa.
DISCUSSION FORUM
Join the Discussion Forum to and give your views on the importance of proper planning
for an operational audit.
SUMMARY
This learning unit focused on the aspects that an internal auditor should take into
consideration while planning an operational audit engagement. We also looked at the
development of the engagement programme for an operational audit. The audit
team is now ready to start putting their plan of action into practice and the next
phase that we will be looking at is the performance of the fieldwork phase.
106
NOTES
Make your own notes here:
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
107
AUI4863/SG
Learning unit 11
Conducting operational audits
Contents
11.1 INTRODUCTION
11.2 THE FIELDWORK PHASE OF AN OPERATIONAL AUDIT
11.1
108
109
INTRODUCTION
In this learning unit we shall examine the purpose, nature and method of performing the fieldwork
phase of an operational audit. It is during this phase of the operational audit process that the steps
outlined in the engagement programme (plan of action) are physically put into practice. It is on the
grounds of the audit steps carried out in this phase that the operational audit team determines
whether the shortcomings identified during the planning phase require further attention, and if the
decision is taken to further investigate, that sufficient information is collected to submit a properly
structured audit report to management. This phase of the audit can also indicate problem areas
that were not previously identified and that require further investigation.
REFLECTION
Before you study this learning unit, please revise the following sections in your
undergraduate studies:
• Identifying the purpose and nature of the fieldwork phase in operational auditing
• Designing the execution of the fieldwork phase of an operational audit
STUDY
Performing Internal Audit Engagements:
• Par 1.2.1 (p 3)
• Par 1.3.1 (p 7)
108
11.2
THE FIELDWORK PHASE OF AN OPERATIONAL AUDIT
In the fieldwork phase of an operational audit the internal auditors, on the basis of the engagement
programme, investigate the following:
•
whether the procedures and practices followed by the organisation, section or activity are in
line with the basic authority, guidelines and legislation that is applicable
•
whether the operating systems and internal control within the organisation, section or activity
being investigated could contribute to the economic and efficient performance of operations
and the achievement of anticipated results, in line with management's requirements
In order to be able to carry out the fieldwork phase of an operational audit, the auditor requires a
thorough knowledge of the following:
•
•
•
performance measurement
basic audit procedures
collection of information and record keeping
Performance measurement
Because operational auditing focuses more specifically on the economy, efficiency and
effectiveness of the activities of an organisation, performance measurement is an important
element in conducting the operational audit process. Not only do internal auditors have to be skilled
in evaluating the results of an organisation's activities, they also have to have the necessary
knowledge to evaluate the criteria for performance measurement that are in place in an
organisation and, where the need arises, to help improve, develop and implement criteria in
cooperation with management.
Basic audit procedures
Procedures are the techniques employed to achieve one’s objectives.
Audit procedures are the means by which the auditor meets the audit objectives. They are steps in
the audit process that guide the auditor in carrying out the planned reviews, based on the
established audit objectives.
Audit procedures are the techniques the auditor employs to determine whether operating
objectives have been met.
Experience and logic will determine which audit procedures apply to which audit objectives.
Procedures should be relevant to the selected objectives. Irrelevant procedures, no matter how
applicable to the audit as a whole, will be useless if they do not produce evidence about the
operating objectives selected for review.
Although it is sometimes necessary to use unique auditing procedures in carrying out the fieldwork
phase of an operational audit, there are certain basic audit procedures that occur in any internal
audit project, namely:
109
AUI4863/SG
•
•
•
•
•
•
•
•
observation
questioning
analysis
verification
routine checking
vouching
investigation
evaluation
At this point a thorough revision of the discussion of these basic audit procedures in your
undergraduate modules is necessary.
REFLECTION
From your undergraduate studies you should have obtained a detailed knowledge of the
development of performance objectives as well as performance measurement. You
should study these concepts in the context of the fieldwork phase of an operational audit
as well.
ACTIVITY 29
You have completed the planning phase of the operational audit of an organisation's
purchasing department and have identified the organisation’s control over inventory as a
critical area. Your decision is based on the following problems that are evident:
•
•
•
•
There is an increase in raw material inventory.
Large quantities of raw materials were found in several locations of the factory
outside of the storage area.
The finished product inventory is increasing.
There are problems with the physical safeguarding of inventory.
REQUIRED
•
•
•
List the parties responsible for preparing an operational audit programme and also
those parties who can contribute to this task.
Formulate ten audit procedures for your operational audit of the organisation’s
inventory control.
List six general audit techniques that the auditor can use when conducting an
operational audit.
110
FEEDBACK
Parties who are responsible for or who can contribute to the development of an
operational engagement programme
1.
the audit manager
2.
all the members of the operational audit team – especially those involved in
planning the audit
3.
audit staff who are experts in the area being examined, or who were previously
involved in a similar audit
4.
personnel of the organisation who work in the department being audited, and who
can make a specific contribution
5.
consultants who have specific expertise in
6.
personnel from similar organisations or departments who might be able to give
another perspective to the audit approach
relation to the area being audited, or who
are experts in the area of operational auditing
Audit procedures for the operational audit of inventory control
1.
Review and analyse existing inventory control procedures and pay attention to any
areas where inefficiencies exist or where proper inventory control practices are not
followed.
2.
Interview management and determine the organisation’s objectives regarding
inventory control and evaluate the organisation’s success in achieving these
objectives.
3.
Investigate if any standards were set regarding material consumption and
production outputs and, if so, evaluate the application of such standards in
inventory control.
4.
Determine acceptable inventory levels for raw materials and finished products and
evaluate the current inventory levels in the light of this.
5.
Review the accuracy of the information used in determining minimum inventory
levels and economic ordering quantities.
6.
Evaluate the efficiency of the existing communication between the inventory
warehouse and the acquisition department regarding raw material inventory as well
as between the inventory warehouse and the despatch department, regarding
finished products inventory.
7.
Examine the procedures regarding the receipt and despatch of inventory and
evaluate the efficiency of these procedures.
111
AUI4863/SG
8.
Inspect the physical control over, and the storage procedures of, inventory and
evaluate their economy and effectiveness.
9.
Investigate the reasons why the raw material inventory is not properly stored.
10. Analyse the production process to determine whether there are any inefficiencies in
the process that may lead to the accumulation of work in process and, if so,
determine if the process can be altered to eliminate the accumulation.
11. Investigate the extent of any obsolete or unusable inventory and evaluate the
methods that are used to reduce this inventory.
12. Examine the handling of obsolete or unusable inventory in the inventory records
and consider its influence on the inventory figures.
13. Examine the adequacy of current inventory reporting systems and identify any
shortcomings.
Audit techniques that can be used in performing an operational audit
1.
Conducting interviews with management and operational staff.
2.
Drafting flow charts in order to analyse processes, or to analyse the physical layout
of work areas.
3.
Thorough analysis of rates, changes and trends.
4.
Questionnaires to management or operational staff and questions in the audit
programme.
5.
Telephone or written enquiries from outside parties, for example suppliers and
clients.
6.
Reviewing transactions.
7.
Observing specific activities.
8.
Evaluating the results of the focus area.
9.
Compliance reviews in respect of laws, regulations, policies, procedures, objectives,
etc.
10. Using computerised audit techniques.
112
REFLECTION
At this point thorough revision of the discussion of basic auditing procedures as
discussed in your undergraduate studies is necessary.
Collection of information and record keeping
In operational auditing, as in any other form of internal auditing, the collection and
recording of information is an important part of the audit process. It is especially
important in the execution of the fieldwork phase for appropriate, adequate, complete
and accurate information to be collected and that the information should be properly
documented in audit working papers to support audit findings. The requirements with
which information must comply, the collection of information and recording procedures
were dealt with in your undergraduate studies. Ensure that you revise these important
topics.
STUDY
Performing Internal Audit Engagements:
• Par 3.9 (p 135)
• Par 4.9 (p 192)
• Par 5.9 (p 252)
• Par 6.10 (p 320)
• Par 7.9 (p 357)
• Par 8.6 (p 374)
Study the IPPF, Performance standards 2300, 2310, 2320, 2330 and 2340 as well as the
related Implementation Guides.
ACTIVITY 30
In your capacity as the internal auditor at a manufacturing organisation you are
performing an operational audit to determine whether manufacturing equipment is
economically acquired, utilised and maintained.
During your preliminary review, you noted the following:
•
It is the organisation's policy to purchase only new manufacturing equipment, to
depreciate it over five years and to replace the item at the end of the five-year
period.
•
All manufacturing equipment is cash purchased and is the property of the
organisation.
•
The managing director of the organisation is very proud of the organisation’s
manufacturing department, as all equipment is based on leading-edge technology.
113
AUI4863/SG
•
Some of the equipment on the production line is continuously in use, while other
items are used only for a few hours per day.
•
A standard maintenance contract is entered into for each item of manufacturing
equipment, according to which the item is serviced on a monthly basis and the
maintenance firm provides 24-hour support in the event of an item breaking down.
REQUIRED
Formulate ten questions that you would put to the relevant staff members of the
organisation during interviews to determine whether manufacturing equipment is
acquired, utilised and maintained economically. In each instance, mention the purpose
of the question, or the information you would expect to obtain from the answer to the
question.
FEEDBACK
Note: The purpose of each question is shown in brackets.
1.
What is management’s motivation behind the policy to buy only new production
equipment, to depreciate it over five years and to replace it thereafter?
(To determine whether management has recently reflected on their policy and why they
implemented it in the first place.)
2.
What is the possibility of distinguishing between different categories of production
equipment and of stipulating specific policies regarding depreciation for each
category?
(To determine whether it is possible to distinguish between items with longer and shorter
lifespans and identify equipment that might have a longer production life span than five
years.)
3.
Has any cost benefit analysis been done in the past regarding the existing policy
and, if so, what was the result?
(To determine whether management are aware of the cost implications of their policies – for
example, to replace items after five-year, irrespective of their condition – and to obtain
information regarding the factors that influenced their decisions.)
4.
What procedures are followed with the acquisition of new manufacturing
equipment?
(To determine whether the acquisition procedures result in the acquisition of manufacturing
equipment that best complies with specifications, at the lowest price.)
5.
What happens to the manufacturing equipment that has been written off, after it
has been replaced?
(To determine whether the organisation obtains maximum recovery on its investments with
the write-off of manufacturing equipment.)
114
6.
Why is all manufacturing equipment purchased for cash, i.e. why is manufacturing
equipment not hired or the acquisitions not financed?
(To determine whether the organisation considered other possibilities of obtaining
manufacturing equipment and how they feel about it, and to determine whether there is a
possibility of obtaining manufacturing equipment more economically.)
7.
Why is it so important to the managing director that all the manufacturing
equipment be based on the leading-edge technology?
(To determine whether the advanced technology of manufacturing equipment contributes
to better quality products, higher productivity and production outputs that result in higher
income for the organisation or whether it serves only to satisfy the whims of the managing
director.)
8.
Is the capacity utilisation of manufacturing equipment monitored frequently and
what are the results?
(To determine whether all equipment is really needed.)
9.
Why is the manufacturing equipment, which is only used for a few hours each day,
not used for longer periods?
(To determine whether one policy for all manufacturing equipment is justified and whether
costs cannot be saved by using certain items for longer or leasing equipment based on usage
frequency instead of buying it – pay-per-use agreements.)
10. For what purpose is equipment that is used only for a few hours a day applied?
11. Can the need for these items of equipment not be eliminated by means of
alternative procedures?
12. Why can one item of the manufacturing equipment not take over the functions of
other items?
(The reason for questions 11, 12 and 13 is to determine whether all the items of
manufacturing equipment are really needed.)
13. What is management’s motivation for the strict service policy on manufacturing
equipment?
(To determine whether management has thoroughly considered the policy regarding the
maintenance on manufacturing equipment and that it is to the best economic advantage of
the organisation.)
14. How are guarantee stipulations utilised?
(To determine whether guarantee stipulations are utilised to reduce maintenance costs on
manufacturing equipment.)
15. Why are alternative ways of maintenance not used, for example appointing a
person who will take care of the maintenance of the organisation’s manufacturing
115
AUI4863/SG
equipment or training one operator for every item of manufacturing equipment, so
that he can take care of the basic maintenance of the items under his control?
(To determine whether any consideration has been given to other methods of maintenance
and whether the current method provides maximum advantage to the organisation.)
16. Why is the policy regarding maintenance the same for items used on a full-time
basis and items that are used only for a few hours a day?
(To determine whether there might be savings on maintenance by establishing specific
policies for different items of manufacturing equipment.)
SUMMARY
In this learning unit we studied the fieldwork phase of an operational audit. We noted
firstly that the engagement programme is carried out during the fieldwork phase and
that the auditors base their findings and recommendations on the fieldwork phase. We
looked at the important aspects in the execution of the fieldwork phase, namely
performance measurement, basic auditing procedures and the collection and recording
of information. In the next learning unit, we will pay attention to the formulation of
findings and recommendations on the basis of the results of the fieldwork phase.
NOTES
Make your own notes here:
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
116
Learning unit 12
Reporting and follow-up on operational
audits
Contents
12.1
12.2
12.3
12.4
12.1
INTRODUCTION
AIMS AND PRINCIPLES OF OPERATIONAL AUDIT REPORTING
DRAFTING AN OPERATIONAL AUDIT REPORT
FOLLOW-UP ON AUDIT RESULTS
117
118
119
120
INTRODUCTION
The results of an operational audit are communicated to all interested parties in the operational
audit report. The principal purpose of the operational audit report is to bring useful and timely
information on material operational deficiencies to the attention of management and recommend
improvements. In this learning unit we should simply like to acquaint you with the general reporting
principles.
REFLECTION
The complete internal audit reporting process and the follow-up of audit results were
discussed in your undergraduate studies. Ensure that you revise these very important
topics.
STUDY
•
•
•
Assurance: An Audit Perspective (2018), par 3.4.5
Performing Internal Audit Engagements (2017), Chapter 9
Learning Unit 3 and revise the following topics applicable to operational auditing:
• Aim and principles of operational audit reporting
• Drafting an operational audit report
• Following up audit results
Before you continue, ensure that you study all topics relating to the reporting phase of
an audit engagement.
117
AUI4863/SG
12.2
AIMS AND PRINCIPLES OF OPERATIONAL AUDIT REPORTING
In the reporting phase of an operational audit, the audit team communicates the results of the
audit to interested persons in management and on the staff. The basic objectives of operational
audit reports are:
• to supply useful and timely information on material operational deficiencies and other
aspects
• to suggest improvements in the way in which the department is run
The operational audit report is the operational audit team's opportunity to get management's
undivided attention; it also gives them a chance to point out the benefits of operational auditing.
The operational audit report therefore serves a twofold purpose, namely:
• to communicate the results of an operational audit
• to persuade, and sound a call for action
If the audit has been correctly carried out, the audit findings will already have been discussed with
interested members of staff and management by this time and efforts will already have been
made to rectify deficiencies in the system. The final operational audit report is basically merely a
summary of the operational audit, documenting the following:
(1)
what the operational audit team has achieved
(2) what was found in the course of the audit
(3) the extent of the operating deficiencies in the section reviewed
(4) the steps taken by the operating personnel to rectify the situation
Figure: Elements of an audit finding (adapted form Waring & Morgan (2007))
118
In cases where operational audit findings have not yet been communicated to interested members
of staff and management, verbal and written audit reports are used to persuade management to
take corrective action. This method is suitable for audit projects that cover a short time span or for
a general review type of audit, where there is not sufficient opportunity during the audit to convey
the findings. In other circumstances the auditors should announce their audit findings as they are
generated.
The presentation of operational audit reports creates an opportunity for the internal auditors to
market the IAA within the organisation. Sufficient attention should therefore be paid to the
presentation of audit reports.
12.3
DRAFTING AND OPERATIONAL AUDIT REPORT
Characteristics of good reporting
The basic characteristics of good operational audit reporting are the following:
•
Only important matters should be reported.
•
Operational audit reports should be useful and timely.
•
Operational audit reports should be accurate and should be adequately supported by
vouchers.
•
The findings should prompt the management and personnel involved to take action.
•
Audit reports should be objective and should contain sufficient information to give the
readers the necessary perspective.
•
Operational audit reports should be clearly and simply presented.
•
Operational audit reports should be concise.
•
Operational audit reports should have a constructive impact.
•
Operational audit reports should be logically arranged and positive.
The format of operational audit reports
There is no generally accepted or prescribed format for operational audit reports. Nevertheless,
standard formats for audit reports are used in internal audit departments.
A format that is flexible and comprehensive and can be used for any internal audit report that is not
longer than four typed pages is the following:
•
management summary (if applicable)
•
background
•
overview
•
opinion/general evaluation
•
findings, recommendations and conclusions
•
comments by the auditee
INTERNET SOURCE
Before you attempt the activity visit the website of the Auditor-General of South Africa
and study the examples of operational audit reports published on the following
website: http://www.agsa.co.za/
119
AUI4863/SG
ACTIVITY 31
You are seconded to the technical and training section of the internal audit activity. A
significant number of the technical queries you received deal with reports. To improve
the level of professional competence and quality of work produced, you designed a
training programme for good report writing. In this training programme you include the
format and characteristics of a good report on operational auditing.
REQUIRED
Design a questionnaire to be used by internal auditors to ensure that their reports
comply with the requirements for the format and characteristics of a good report.
FEEDBACK
Questionnaire to ensure proper reporting
QUESTION
Yes
No
Characteristics of a good report
• Are only important matters reported?
• Is the report useful and timely?
• Is the report accurate and supported by documents/evidence?
• Do the findings prompt the relevant management and staff to
take action?
• Is this report objective?
• Is there sufficient information in the report to give its readers
the required perspective?
• Is the report a clear and simple presentation?
• Is the report concise?
• Does the report have a constructive impact?
• Is the report logically arranged and positive?
Format of a good report
• Does the report have a management summary?
• Does the report cover the background?
• Is there an overview?
• Is there an opinion or a general evaluation?
• Are the findings and recommendations included?
• Is there a conclusion?
• Are the comments of the auditee included?
12.4
FOLLOW-UP ON AUDIT RESULTS
The operational auditing process is not complete before all the procedural modifications have
been introduced. Organisational policy should require that written commentary on every internal
audit report be submitted to the CAE by the persons to whom the audit report was addressed.
120
The following should be specified in a company's policy:
• the format in which feedback should be produced
• how much time should be allowed for a response to internal audit reports
• who is responsible for drawing up and signing comments on internal audit reports
The CAE should receive copies of all comments on audit reports and should pass on any
reservations on such feedback to top management.
Irrespective of the fact that the internal auditors reviewed the comments on their audit reports
and accepted them, they should still carry out the necessary follow-up action to determine
whether any corrective measures have been taken and whether they are satisfactory.
Management may decide to take steps to rectify a problem that are different from the steps
suggested by the auditors. The decision rests with management, but the results of the decision
should still be weighed up by the internal auditors. If management does implement the steps
proposed by the auditors, the auditors should still follow up in order to evaluate the results
achieved. If the audit findings showed up material problems, it may be necessary to schedule a full
follow-up audit to make certain that the desired results have been achieved by the
implementation of the audit recommendations.
STUDY
Study the IPPF, Performance Standards 2400, 2410, 2420, 2421, 2430, 2431, 2440, 2500
and 2600 as well as the related Implementation Guides.
MULTIMEDIA
Click on the hyperlink below to view the following YouTube videos:
https://youtu.be/pFr7iH7vYBc
https://youtu.be/1NA0Z_BhV1E
❖
View the screencast on operational audit reporting on myUnisa.
ACTIVITY 32
Work through the following case study:
http://www.metricstream.com/casestudy/Audit_Solution_Airline_Case.htm
In this learning unit the reporting stage of the operational auditing process was
discussed and we showed that the reporting stage is an extension of the other stages of
the operational auditing process. We briefly discussed the aims and functions of the
operational audit report, its characteristics, a proposed format for operational audit
reports and the follow-up of audit results.
SUMMARY
In this topic we discussed the practice of operational auditing. It provides an
explanation of the full process of the performance of an operational audit.
121
AUI4863/SG
In learning unit 10 we discussed the planning phase of an operational audit. We revised
all the founding principles of operational auditing.
We also identified the following steps that should be followed during the planning
phase of the operational audit:
1.
2.
3.
4.
5.
6.
7.
obtaining background information on the section/activity to be investigated
deciding on the scope of the engagement and the specific areas or aspects on
which to focus
formulating the engagement objectives
investigating audit criteria (performance standards) that can be applied in the
conduct of the audit
drawing up an engagement work programme
ensuring that the planning complies with the internal auditing standards
discussing the proposed audit engagement with the management of the section
or activity involved
Learning unit 10 focused on the aspects that an internal auditor should take into
consideration while planning an operational audit engagement. We also provided an
example of an engagement programme for an operational audit.
In learning unit 11 we examined the purpose, nature and method of performing the
fieldwork phase of an operational audit. We studied the fieldwork phase of an
operational audit. We noted firstly that the engagement programme is carried out
during the fieldwork phase and that the auditors base their findings and
recommendations on the fieldwork phase. We looked at the important aspects in the
execution of the fieldwork phase, namely performance measurement, basic
engagement procedures and the collection and recording of information.
In learning unit 12 the reporting stage of the operational auditing process was discussed
and we showed that the reporting stage is an extension of the other stages of the
operational auditing process. We briefly discussed the aim and functions of the
operational audit report, its characteristics, a proposed format for operational audit
reports and the follow-up of audit results.
Now that you have studied the learning units in this topic, are you able to do the
following?
•
•
•
•
Plan the operational audit according to applicable Standards.
Explain how to conduct the operational audit.
Perform the audit procedures.
Compile the audit report and communicate the audit results
NOTES
Make your own notes here:
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
122
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
123
AUI4863/SG
TOPIC 5
Fraud investigations
Contents
LEARNING UNIT 13: Planning fraud investigations
126
LEARNING UNIT 14: Performing fraud investigations
136
LEARNING UNIT 15: Reporting and follow-up on fraud investigations
142
LEARNING UNIT 16: Case study
148
INTRODUCTION TO AND PURPOSE OF THE TOPIC
Fraud has become an industry, and not just for the fraudsters. Academics, investigators, internal
and external auditors, lawyers, management on all levels of public and private organisations,
oversight bodies and the general public are all involved in this industry in some way or another.
In this topic the following aspects of fraud that concern the internal auditor, are discussed:
•
•
•
•
•
the nature of fraud
the kinds of fraud that occur frequently
fraud prevention
indicators of the possible presence of fraud, i.e fraud risk
the activities in an organisation where fraud is usually committed or can easily be
committed
• the behavioural characteristics of people who engage in fraud
• ways and techniques of establishing whether fraud has been committed
• the procedures that should be followed when conducting a fraud investigation
124
From the point of view of the internal auditor, fraud is an extremely complex matter because it
involves so many aspects. The internal auditor has to fully understand each of these aspects so
that he or she knows what part each aspect plays and what the internal auditor's responsibility is in
regard to each aspect when carrying out a fraud investigation.
Fraud has always been and will always be present in society, and there is increasing pressure on
both internal and external auditors, especially from the general public, to detect and assist in the
prevention of fraud. Thus, adequate competence in this field is a necessity. Your aim in studying
this topic should be to enhance your knowledge, understanding and competence with regard to
fraud investigations as part of your professional career.
Fraud investigations, like all other internal audit engagements, should be approached in a
structured manner in order to ensure objectives are met. In this topic we discuss the nature of the
internal auditor's responsibility once it has been decided to carry out a fraud investigation, as well as
the practical aspects of fraud investigations. The procedures that should be followed when
conducting a fraud investigation are discussed, as are different matters that internal auditors should
attend to when they have to participate in fraud investigations
MULTIMEDIA
Please access the podcast on myUnisa to assist you in your studies of topic 6.
LEARNING OUTCOMES
After you have studied this topic, you should be able to
• apply the internal auditing standards relating to fraud investigations to practical
situations
• demonstrate knowledge of the practical performance of fraud investigations
• demonstrate knowledge of important considerations in the performance of fraud
investigations
• compile professional internal audit reports relating to fraud
125
AUI4863/SG
Learning unit 13
Planning fraud investigations
Contents
13.1
13.2
13.3
13.4
13.5
13.1
INTRODUCTION
INTERNAL AUDITOR'S RESPONSIBILITY WITH REGARD TO FRAUD INVESTIGATIONS
FRAUD RISK ASSESSMENT
FRAUD INVESTIGATION PLAN
ESTABLISHING THE OBJECTIVES OF A FRAUD INVESTIGATION
126
127
128
132
132
INTRODUCTION
Fraud allegations or detection can arise from whistle-blowers’ complaints or are sometimes
accidentally discovered. Fraud can also be detected by the internal auditors as a result of them
recognising fraud risk factors during their daily work.
The IAA should plan to do a comprehensive engagement of any fraud investigation it undertakes.
When the internal audit function has been assigned an investigator’s role, an investigation plan
should be developed for each investigation.
REFLECTION
You were given comprehensive exposure to fraud investigation planning in your
undergraduate studies. It is important that you revise the underlying level of technical
knowledge and expertise you obtained at the undergraduate level before you continue
with the rest of this learning unit.
Test your knowledge, insights and competencies by answering all the undergraduate
questions and answers you have accumulated so far.
In this learning unit we will look at the planning phase of a fraud investigation as well as
the internal auditor’s responsibility with regard to fraud investigations. The fraud
investigation plan as well as the objectives of a fraud investigation will also be covered.
126
STUDY
Ensure that you study the following Internal Auditing Standards:
•
Attribute standard 1210 and 1220
•
Performance standard 2060, 2110, 2210 and 2600
•
Related Implementation Guides
13.2
INTERNAL AUDITOR’S RESPONSIBILITY WITH REGARD TO
FRAUD INVESTIGATIONS
As soon as the internal auditor has established the presence of fraud of such a nature that it
requires investigation, he or she should report this to the CAE and the most senior executive
manager of the organisation. The next step is to decide what kind of investigation will be carried
out, and in what depth, and also what resources will be used in the process. This decision should,
however, be taken by senior management in conjunction with the CAE. Fraud investigations are
time-consuming, intensive and demanding and they frequently require specific technical
knowledge or experience of the operating environment within which the fraud occurred.
Depending on what management decides, the internal auditor will be involved to a greater or
lesser degree in fraud investigations.
The internal auditor has five specific responsibilities to discharge during fraud investigations,
namely:
•
An estimation must be made of the probable level of seniority involved in the fraud and
the extent of complicity in the fraud within the organisation.
•
The internal auditor should then determine what knowledge, skills and disciplines are
required to carry out the investigation effectively.
•
The internal auditor will also need to identify the procedures to follow in the attempt to
identify the culprits, the extent of the fraud, the techniques used and the cause of the
fraud.
•
There should be suitable coordination of activities with management staff, the legal
advisers and other specialists for the full course of the investigation.
•
The rights of the suspected culprits and the staff who will be affected by the investigation,
as well as the reputation of the organisation, should be taken into account.
STUDY
•
•
Assurance: An Audit Perspective (2018), Chapter 6 – 6.4.1 (The internal audit
activity).
All the sections in your undergraduate study material that relate to fraud
127
AUI4863/SG
13.3
FRAUD RISK ASSESSMENT
Standard 2060 states that the chief audit executive must report periodically to senior
management and the board on the internal audit activity’s purpose, authority, responsibility, and
performance relative to its plan and on its conformance with the Code of Ethics and the
Standards. Reporting must also include significant risk and control issues, including fraud risks,
governance issues, and other matters that require the attention of senior management and/or the
board.
In Standard 2120.A2 it is required that the internal audit activity must evaluate the potential for
the occurrence of fraud and how the organisation manages fraud risk.
STUDY
Assurance: An Audit Perspective – Chapter 6 – 5.5
Figure: Fraud risk assessment process
Sourse: http://www.gao.gov/products/GAO-15-593SP
128
MULTIMEDIA
View the Powerpoint presentation on myUnisa – GTAG 13 Fraud Prevention and
Detection in an Automated World - to assist you in your studies.
ACTIVITY 33
When Tammy Darling began working for African Properties, she had no intention of
defrauding the company. It was her first job after university and she was excited about
the opportunity and eager to do good work and to progress with her career. In fact, that
is what she did. African Properties owned several business properties in the Gauteng
area and, not long after her appointment, Tammy was assigned to run one of the big
shopping centres as the on-site manager. She showed shopping space to prospective
tenants, collected rents, oversaw a maintenance crew and generally ran the day-to-day
operations of the shopping centre.
After her husband was injured in a motorbike accident, money became an issue in
Tammy’s life. Around the same time one of the employees on the centre maintenance
crew resigned. Under normal circumstances, Tammy would have filled out paperwork
showing that this employee had left the company and then sent it to head office. Only
then would she have started looking for a replacement. However, this time Tammy did
not tell anybody at head office that the employee had resigned but kept on submitting
time sheets on his behalf. According to the company’s system, pay cheques were mailed
to Tammy and she distributed them to the employees. When the pay cheques arrived,
she now took the cheque made out to this employee and cashed it at a liquor store.
Tammy kept on doing this for approximately six months until she was reported through
the company’s anonymous fraud line. An internal auditor was immediately sent out to
investigate the matter and Tammy, who immediately confessed everything, was asked
to resign. A criminal case was filed against her. The details of the crime committed, and
the actions taken against Tammy were reported in African Properties’ quarterly
newsletter.
REQUIRED
I. Briefly discuss the factors that motivate people to commit fraud and also indicate
which of these factors apparently motivated Tammy to commit fraud.
II.
Mention the factors that should be kept in mind by the internal auditor who was
sent to investigate the suspicion that fraud had been committed.
III. Suggest 5 (five) practical recommendations to improve the internal controls related
to the payment of wages in order to prevent similar frauds in future.
IV. Briefly explain how the actions taken against Tammy will aid in the prevention of
fraud within African Properties.
129
AUI4863/SG
FEEDBACK
You have to be able to apply your theoretical knowledge of the nature, prevention,
detection, investigation and reporting of fraud that you obtained during your
undergraduate studies, to practical scenarios.
I.
The factors that motivate people to commit fraud, and the factor that
apparently motivated Tammy to commit fraud:
Firstly, there may be pressure on the individual, either internal pressure in the form
of debt or a desire for riches, or external pressure in the form of pressure exerted by
the organisation on management to achieve projected profit figures and adhere to
budgets.
Secondly, uncontrolled access to organisational assets tempts employees to
appropriate them for their own profit.
Thirdly, personality disorders may exist. Most people generally prefer to be honest,
but unfortunately there are the exceptions where people prefer to be dishonest.
Tammy experienced financial pressure due to her husband’s motorcycle accident
and also had uncontrolled access to the wage cheques of the maintenance staff.
II.
Factors that the internal auditor has to keep in mind when investigating a
suspicion that fraud is taking place:
1.
The success of inquiries to confirm suspicions of irregularities is largely dependent
on good working relations.
2.
The moral climate of the organisation as a whole is important. The success of the
audit depends on good teamwork within a structure of trust.
3.
One should beware of paranoia. Although it is important to be fully aware of the
possibility of irregularities, it is also important to keep an open mind. The internal
auditor should not automatically mistrust everyone who gambles or drinks or who
clearly follows an unusual lifestyle.
4.
The rules of interrogation are very important when inquiries could lead to the
disclosure of irregularities.
5.
The identity of any sources of information must be protected. If unconfirmed
information is volunteered by an informant, it should not be accepted without
investigating, but it should also not be ignored either.
6.
It helps to concentrate on the weakest link in the suspected fraud chain.
7.
Most instances of fraud are simple and obvious. Conspicuous opportunities should
not be overlooked. Investigate the simplest possibilities first.
8.
The internal auditor should look out for irregular entries (especially entries that have
been altered), corrected documents, photostats and duplicate documents, and
especially for addresses with a box number only.
130
9.
Careful consideration must be given to the audit sampling techniques that are used.
It may be necessary to take a larger sample, if this is warranted by a fraud
investigation. Special attention is required when a population is chosen, so that the
population can be stratified, if necessary, to isolate a possible area of
embezzlement.
10. In some instances, it may be necessary for the internal auditors to report to higher
authorities within the organisation – and possibly outside the organisation –
regarding sensitive information that has come to their attention.
III. Practical recommendations to improve the internal controls related to the
payment of wages, in order to prevent similar frauds in future:
1.
The wages of permanent employees should preferably be paid directly into their
bank accounts. If this is not possible then the following procedure should be
followed:
2.
Cheques should be made out in the name of the employee and be properly crossed
so that the recipient of the cheque is forced to deposit the cheque into his/her bank
account.
3.
Control over the payment of wages should not be the responsibility of one person
only. At least two authorised people should be present when wages are paid.
4.
A wage register should be kept in which staff must sign for the receipt of their
wages, and this register should be signed by both persons attending the wage
payment.
5.
Any unclaimed wages should be recorded and reported to head office and the
cheque should be dealt with appropriately.
IV. How the actions taken against Tammy will aid in the prevention of fraud within
African Properties:
The company took prompt and appropriate actions against Tammy and reported
the incident in the company’s newsletter. The way an entity reacts to incidents of
alleged or suspected fraud will send a strong deterrent message throughout the
entity, helping to reduce the number of future occurrences. Seeing that other
people have been disciplined for wrongdoing can be an effective deterrent,
increasing the perceived likelihood of violators being caught and punished. It can
also demonstrate that the entity is committed to an environment of high ethical
standards and integrity.
131
AUI4863/SG
13.4
FRAUD INVESTIGATION PLAN
As with any internal audit engagement the investigation plan should consider methods to •
•
•
•
•
•
13.5
gather evidence, such as surveillance, interviews or written statements
document the evidence, considering legal rules of evidence and the business uses of the
evidence
determine the extent of the fraud
determine the scheme (techniques to perpetrate the fraud)
evaluate the cause
identify the perpetrators
FESTABLISHING THE OBJECTIVES OF A FRAUD INVESTIGATION
The objectives of a fraud investigation should be determined right at the start, in consultation
with professional advisers. Four important aspects should be considered when establishing the
objectives:
•
•
•
•
Should the people involved in the fraud be criminally prosecuted?
Should civil procedures be instituted to recover losses?
Should staff suspected of fraud and found guilty be suspended and/or dismissed?
What procedures can be followed to prevent similar incidents in future?
NOTE:
There is a substantial difference between the objectives of a fraud investigation and the
objectives of other internal auditing engagements. These are tabled below:
In a normal internal audit engagement, A fraud investigation is geared towards
the internal auditor's objectives consist of detection. In a fraud investigation, the
the following:
internal auditor's tasks involve the
following:
•
•
•
•
Looking for weaknesses in the system,
or susceptibility of the system to
problems.
Making recommendations for improving
efficiency, economy and effectiveness.
Reassuring management.
Emphasising compliance with developed
procedures and controls and improving
them.
•
•
•
•
Looking for evidence supporting an
identified irregularity.
Determining the particulars of the
irregularity.
Quantifying the loss or scope of the
problem and the period in which it took
place, the method used and the persons
involved.
Acting as a gatherer of information and
evidence.
132
STUDY
Performing Internal Audit Engagements:
•
•
•
•
•
Par 3.5 (p 120)
Par 4.5 (p 180)
Par 5.5 (p 238)
Par 6.6 (p 309)
Par 7.5 (p 349)
ACTIVITY 34
Page through the local newspapers for a week and see how many fraud-related reports
you can find. Think about the effect that these frauds might have had, or still have, on
•
•
•
•
•
the organisation(s) involved
other employees
shareholders
creditors
affected families and society in general
FEEDBACK
Please join the Discussion Forum and share with fellow students your understanding of
activity 29. Feedback will be provided subsequent to the discussion.
REFLECTION
The summary of the KPMG Africa Fraud and Misconduct Survey 2005 (2005:68–73)
performed in South Africa and 12 other African countries revealed the following
statistics:
•
68% of respondents believe that fraud will increase in the future.
•
Most respondents believe that the sophistication of criminals is one of the reasons
for an increase in fraud.
•
Economic pressure indicates the lack of adequate penalties and law enforcement as
well as inefficiencies of the justice system; these are the most sited reasons for the
increase in fraud.
•
76% of respondents indicated that employees, excluding management, were the
major source of fraud and also accounted for the largest financial losses.
•
Information whistle-blower processes were cited as being the most effective
preventative action in the fight against fraud with good internal controls rated
second.
133
AUI4863/SG
•
Collusion between employees and third parties was cited as the most common
practice utilised by perpetrators.
•
The inability of the police to apprehend criminals, no chance of recovering losses
and the desire not to be tied up for years in criminal procedures were indicated as
the main reasons why fraud was not reported to the authorities.
•
The four most common prevention methodologies were indicated as being
-
reviewed and improved controls
establishing a corporate code of conduct
establishing a fraud policy
improved screening of new employees
Did your encounters with fraud in practice reveal similar statistics? Do you think the
situation has improved or changed since 2005?
FEEDBACK
Give your comments in the Discussion Forum.
Fraud is a major concern among all types of organisations, encompassing the private and
public sectors. Internal auditors must have a good understanding of factors that predispose fraud, fraud risk indicators and how to respond when suspicious transactions or
activities are observed.
The IAA should do proper planning before executing a fraud investigation. When the
internal audit function has been assigned an investigator’s role, an investigation plan and
engagement objectives should be developed for each investigation.
DISCUSSION FORUM
Join the Discussion Forum to discuss the importance of the “Tone at the Top” to prevent
fraud.
NOTES
Make your own notes here:
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
134
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
135
AUI4863/SG
Learning unit 14
Performing fraud investigations
Contents
14.1 INTRODUCTION
14.2 IMPORTANT CONSIDERATIONS IN THE PERFORMANCE OF
FRAUD INVESTIGATIONS
14.1
136
139
INTRODUCTION
Some frauds are resolved simply by identifying inconsistencies and inquiring about them to a
potential suspect who immediately confesses. Others are complex, and extensive; these require
concerted effort to bring them to light and justice. Fraud investigations may be conducted by or
involve participation by internal auditors, investigators, security personnel and other specialists
from inside or outside the organisation.
REFLECTION
Before you study this learning unit, please revise your undergraduate work regarding
fraud and all related topics. Also ensure that you can formulate procedures and make
valid recommendations regarding a fraud investigation.
STUDY
▪
▪
Assurance: An Audit Perspective (2018), Chapter 5 – 5.5.3
Performing Internal Audit Engagements (2017):
• Par 3.5 (p 120)
• Par 4.5 (p 180)
• Par 5.5 (p 238)
• Par 6.6 (p 309)
• Par 7.5 (p 349)
136
In this learning unit we will look at important aspects that should be taken into account when
performing a fraud investigation.
The following considerations should be taken into account when performing a fraud investigation:
1.
2.
3.
4.
5.
Underlying risks in fraud investigations
Confidentiality
Immediate action
Management’s actions when management fraud has occurred
The use of external investigators in the fraud investigation
1.
Underlying risks in fraud investigations
Fraud investigations involve certain risks for organisations and the persons involved in the fraud
investigations. There is the possibility that the suspect in a fraud case could institute legal
proceedings or a claim against the organisation or the individuals involved in the fraud
investigation, and that it might not be possible to prove the organisation's case against the suspect.
Risks to bear in mind are the following:
•
•
•
•
accusations of slander.
complaints of unlawful restraint or false arrest.
complaints of malicious prosecution.
depositions, admissions of guilt and evidence that have been illegally acquired will not be
accepted in court
A court ruling that evidence is not acceptable could result in an organisation losing a case against an
accused person and suffering major losses as a consequence.
It is therefore extremely important that internal auditors and anyone else involved in a fraud
investigation should be aware, from the very first moment that fraud is suspected, of the
procedures that should be followed in collecting evidence and information so that the evidence will
be accepted in court.
2.
Confidentiality
When fraud is discovered, the facts should be kept confidential until an arrest can be carried out. All
knowledge of the case should be strictly confined to top management and the people directly
involved in the investigation. Suspicions should be treated with the utmost discretion to avoid the
risk of slander suits or the possibility that the suspect will cover his tracks.
3.
Immediate action
Any suspicion of fraud should be immediately followed up. Unless immediate action is taken, the
suspect may have the opportunity to cover his or her tracks by destroying or altering records, for
example. Money can be transferred between accounts in minutes – or even sent out of the country
– and the suspect can escape. Arrangements should be made immediately for the securing of
records and evidence, suspects should be suspended or relieved of their duties and it may even be
necessary to cancel or postpone transactions with clients.
137
AUI4863/SG
At the beginning of a fraud investigation it may be necessary to work instinctively so that the
investigation can take shape. It is important, however, not to be prejudiced and incriminate people
unreasonably in the process.
4.
Management's actions when management fraud has occurred
Specific actions are recommended that should be taken by executive management when
management fraud has occurred, such as:
•
•
•
•
•
•
5.
Establish standards based on budgets and statistics and investigate all material deviations.
Use quantitative and analytical methods to highlight unusual behaviour. Where possible,
management information systems should be developed to supply the data needed for this
analysis.
Compare organisation performance with industry norms as well as with comparable profit
centres within the organisation.
Identify critical process indicators, such as the percentage rework in manufacturing and gross
profit percentages.
Carefully analyse performance that looks too good as well as performance that does not
meet standards.
Establish a professional internal audit activity with the necessary independence and authority
to act independently and objectively, to review all the operations within the organisation on a
regular basis, and to require proper follow-up of all findings and recommendations.
The use of external investigators in the fraud investigation
It is frequently the case that the internal auditing department does not have the necessary
manpower or the necessary skills to carry out fraud investigations or parts of such investigations.
The internal audit activity may then recommend the appointment of an external investigative agent
to deal with the investigation, to assist with parts of the investigation or to act in an advisory
capacity.
It is often an advantage to use external investigative agents when information and evidence have to
be obtained from outside the organisation. The internal auditor is usually in the best position to
collect information and evidence from within the organisation. Where external agents are
appointed to deal with a complete investigation, they should also use internal auditors or work in
close cooperation with the internal auditors when they gather information and evidence from inside
the organisation.
When external investigative agents are used, the way they carry out the assignment and the
activities of the agency should be carefully monitored. When an investigative agent is appointed,
the agent is acting on behalf of the organisation and the organisation remains responsible for any
action by the agent. For this reason, external investigative agents require the permission of top
management for everything they do.
External investigative agents can be especially helpful with the following activities:
•
•
•
obtaining information and evidence from external sources
as a source of trained manpower, carrying out certain tasks that require specific training
as specialists in areas like fingerprinting, graphology, observation, security, the examination
of public records, interviewing and interrogation, photographic work and communication
The following are important to bear in mind when external investigative agents are used:
138
•
•
•
•
Ensure the reliability of the investigative agency before appointing them.
Discuss the investigative procedures with the investigative agency before the appointment is
ratified.
Make a clear decision on what tasks the investigative agent should carry out and what
remuneration should be paid to them.
Remain informed about the investigation and do not leave the investigation and the decisions
solely to the investigative agency. The internal auditors have a better knowledge of and feel
for the business than any external investigative agent; they should listen to the information
and advice of the investigative agent and then take the necessary decisions themselves.
At the end of the investigation a written report should be obtained from the investigative agent in
which a clear distinction is drawn between facts, suspicions and hearsay. Reports should indicate
whether information has been obtained from a public record or from individuals. If interviews have
been conducted, the particulars of the people with whom the interviews were conducted must be
disclosed.
14.2
IMPORTANT CONSIDERATIONS IN THE PERFORMANCE OF
FRAUD INVESTIGATIONS
To protect the professional status and recognition enjoyed by auditors it is necessary to
retain the confidence of the users of the professional service. The profession should be
organised in such a way that the desired standards are maintained, and the users should
be aware of this.
ACTIVITY 35
The internal auditors of a bank suspect that one of the officers in the bank has given
loans to fictitious businesses, then transferred the loan amounts to her own bank
account and never paid the instalments, on account of which the bank suffered material
losses. The bank official’s colleagues believe that her luxury house and vehicles,
irrespective of her average income, can be attributed to the fact that she is someone
who works wisely with her money by investing it carefully. The fact that she is in a
management position at a relatively young age is not strange to them because she gets
on well with everybody in the bank, does favours for management, works more overtime
than any other official and never takes any leave. The internal auditors, therefore, were
surprised at first by the bank official’s nervous appearance and her unwillingness to
answer their questions.
REQUIRED
1.
Mention the steps that the internal auditor should follow as a result of their
suspicion that fraud has been committed by the bank official.
2.
Identify the warning signals in the above case study that strengthen the suspicion
that the bank official probably committed fraud.
139
AUI4863/SG
FEEDBACK
1.
Steps the internal auditor should follow as a result of the suspicion that fraud
has been committed by the bank official
•
The factors that indicate fraud should be evaluated to determine if any further
actions are required and whether a fraud investigation should be initiated.
If the conclusion is that fraud might have taken place, then the relevant persons in
authority within the organisation must be notified and the internal auditor can then
recommend the investigation procedures that he/she deems necessary.
The origin of the possible fraud must be identified, and recommendations must be
made to correct it.
Lastly, the internal auditor must ensure that management either pays the necessary
attention to the problem or accepts the responsibility when they neglect to address
the problem.
•
•
•
2.
Warning signals reinforcing the suspicion that the bank official probably
committed fraud
•
The bank official owns a luxury house and motor cars, but she earns an average
income.
She gets on well with everybody in the bank and does favours for management.
She works more overtime than any other official at the bank.
She never takes any leave.
The bank official appears to be nervous during the audit and is unwilling to answer
questions, irrespective of the fact that she seems to get on well with everybody
•
•
•
•
SUMMARY
In this learning unit we covered the internal auditor’s responsibility regarding the
performance of fraud investigations. We explained certain aspects of the procedures
for investigating fraud and dealt with some of the considerations to bear in mind when
conducting a fraud investigation.
NOTES
Make your own notes here:
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
140
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
141
AUI4863/SG
Learning unit 15
Reporting and follow-up on fraud
investigations
Contents
15.1 INTRODUCTION
15.2 FRAUD REPORTING
15.3 FOLLOW-UP AND CORRECTIVE ACTION
15.1
142
143
146
INTRODUCTION
According to the internal auditing standards, on completion of a fraud investigation the internal
auditors should issue a formal, written report that contains all observations/findings, conclusions,
recommendations and corrective actions taken.
The reporting phase could be regarded as the most important phase of a fraud audit. Regardless of
how well the work was done, if the report is not written properly, the perception of the reader will
be that the audit was not a success. The report must clearly reflect the quality of the investigation.
REFLECTION
The complete internal audit reporting process and the follow-up of audit results were
discussed in your undergraduate studies. Ensure that you revise these very important
topics and that you can apply this knowledge to fraud investigations.
STUDY
Performing Internal Audit Engagements (2017), - Chapter 9
142
15.2
FRAUD REPORTING
A written report should be issued at the conclusion of the investigation phase. It should include all
findings, conclusions, recommendations and corrective action taken.
ACTIVITY 36
Do a search for the “Rules of the written internal audit report” on the internet.
REQUIRED
Some articles encourage the use of visual aids. Explain what visual aids you could use to
make a report more presentable (at least ten examples). How would you prepare and
present these visual aids?
FEEDBACK
Visual aids are very important to make a report more presentable and professional.
Examples of visual aids include:
• time flow diagram
• graphs
• annexures – spreadsheets
• diagrams
• photos
• sketches
• scanned extracts of documents
• flow diagrams
• tables
• matrices
• links (references) to other documents/sites
• organograph
• list of abbreviations
• appropriate and logical (easy to follow) numbering system
• emphasis – use of different size lettering, bold, italics, different colour text, etc
• maps
How to prepare and present the visual aids:
The visual aids might be computer-generated and inserted into the body of the
report. They may also be scanned (for electronic inclusion). The use of annexures and
exhibits is encouraged, which would typically be appended to the report and
supported by a proper index. The spreadsheet programmes are invaluable tools to
prepare graphs (use sensible colours) and these are easy to “copy” into a “Word
document”. Visual aids which are not computer-generated can be attached as
exhibits.
ADDITIONAL READING
Read the following article and keep this information in mind when writing a report.
143
AUI4863/SG
144
145
AUI4863/SG
15.3
FOLLOW-UP AND CORRECTIVE ACTION
It is very important that internal auditors follow up on fraudulent activities and take remedial action.
This is a process which will help limit the exposure, be seen to take decisive action, and to prevent
recurrence of the fraud.
The internal auditor is responsible for the follow-up of a fraud investigation. The follow- up and
remedial phase consists of the following:
1.
2.
3.
4.
5.
1.
analysis
publication
implementation of controls
testing and training and
proactive fraud auditing
Analysis
Analysis means that after every fraudulent loss, the internal auditor should analyse the entire
circumstances of the fraud, carefully considering which internal controls failed to either prevent the
fraud, or alternatively failed to detect the fraud earlier. All of the missed “red flags'' should be
considered.
The purpose of this analysis stage is to learn from the mistakes made to ensure that similar
mistakes are not repeated. This is a very good, albeit expensive, learning process, but vital if the
organisation wishes to protect itself from similar future frauds. If this stage is not undertaken, the
learning opportunity is missed, and the organisation fails to protect itself against similar fraudulent
attacks in future. To maximise the learning opportunity from the analysis stage, it is recommended
that after every fraud, the internal auditor should investigate the details and make
recommendations on how to prevent similar frauds.
2.
Publication of fraud investigations
The internal auditor should assist with the publication of all, or some, details of a fraud
investigation. Care should be exercised, however, not to name an alleged offender until such time
that the entire process (usually disciplinary process) has been finalised, up to and including final
appeal or final resolution (if applicable). This process has multiple advantages, including managing
the negative rumours that always arise, sending a clear message about zero tolerance towards
fraudulent activity, visible signs that decisive action is taken, as well as the deterrent effect it has if a
person has been “named and shamed''. Care should always be exercised, however, as stated above,
not to compromise anybody's reputation on the basis of allegations.
3.
Implement controls
Any controls found to be lacking during the analysis stage must be communicated by the internal
auditor and recommendations should be made to correct or improve processes to ensure that the
possibility of similar frauds occurring is minimised. This stage, referred to as “implement controls'' is
an active corrective measure, whereby the revised controls are enacted. Typically, such controls
may include better segregation of duties, greater supervisory controls or better custodial controls,
or a combination of the above.
146
4.
Testing and training
The internal auditor should ensure that controls are implemented. The newly implemented controls
should be tested by the internal auditor and the staff should be trained on their new responsibilities
or the amended processes. Testing and training is therefore vital to maximise the benefit of the new
controls.
5.
Proactive fraud auditing
The best protection against fraud, however, remains identifying it as soon as possible, when the
impact of the fraud is limited, as opposed to the devastating effect of a long-term fraud. Rather
than relying on accidental discovery, it is far better to actively seek it out. After every fraud, it is also
advisable for the internal auditor to test the entire organisation for similar frauds, based on the red
flags identified during the analysis stage.
ADDITIONAL READING
Do not forget to stay in touch with the new developments in fraud investigations. Read
the newspapers, look for relevant publications on the internet or in newsletters that you
can subscribe to.
You can find more information on fraud by visiting the website of the Certified Fraud
Examiners (CFEs) at www.cfe.org.
SUMMARY
Report writing is a skill which is developed over time. Few professionals are
automatically good report writers, whilst many never truly develop the skill. Report
writing takes many years of practice and is never perfected. It should, however, be
continuously practised at all levels of staff. This vital skill, when mastered, will be
invaluable, and in high demand in your career, regardless of your industry. May you
strive to become a good reports writer and let it be said that you write a good report.
NOTES
Make your own notes here:
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
147
AUI4863/SG
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
_________________________________________________________________________
______________________________________________________________
148
Learning unit 16
Case Study
Contents
16.1
16.2
16.3
16.4
INTRODUCTION
CASE STUDY INFORMATION
CASE STUDY QUESTIONS
CASE STUDY FEEDBACK
16.1
INTRODUCTION
149
149
154
154
The following case study was taken from Case studies in internal auditing, edited by Dittenhofer and
Ziegenfuss, and adapted to provide you with an example of how you can apply your theoretical
knowledge to a practical scenario.
16.2
CASE STUDY INFORMATION
THERE BE THIEVES IN TEXAS!
Gatesville, Texas, is a small community in central Texas, located in Coryell County, approximately
40 miles west of Waco. Gatesville is the largest municipality in Coryell County and functions as
county seat. It is typical of most Texas communities of its size. It still has a reasonably thriving
downtown area, a town square, one high school, and a strong sense of friendliness within the
community. Like many Texas towns, football is king and most of the social activities center around
the high school and local churches. In fact, very few things occur in Gatesville that everyone in the
community does not know about. It seems as if everyone who lives in Gatesville knows everyone
else who live in Gatesville. The largest employer in the Gatesville area is a branch facility of the
Texas Department of Corrections (state prison system) for housing convicted adult felons.
Therefore, people in Gatesville are not inexperienced in dealing with criminals. Yet, the community
was stunned in the fall of 2010 when a long-time employee of the Coryell County Tax AssessorCollector's (TAC) office was arrested by the county sheriff and charged with the embezzlement of
149
AUI4863/SG
tax receipts. Then, just as the news of the arrest was beginning to sink into residents, they were
shocked by what happened a week later. The accused employee committed suicide.
FACTS OF THE CASE
The Set-up
Joan Wilson had worked in the Coryell County TAC office for more than twenty years. During that
time, she had performed a number of accounting functions for the Coryell County TAC office. In
addition, she had worked closely with Joan Blanchard, who eventually was elected to be the
county's TAC Director. Owing to the years that Blanchard and Wilson had worked together and
known each other, Blanchard gained complete trust and confidence in Wilson and demonstrated
this trust and confidence by appointing Wilson to the Chief Deputy position shortly after Blanchard
took elected office. In fact, they became indirectly related in that Blanchard's son married Wilson's
daughter. Blanchard's trust and confidence in Wilson was so strong that she believed that Wilson
would carry out her duties on an ethical, honest and professional basis.
As a result of this trust and confidence, Wilson was allowed by Blanchard to carry out her function
as Chief Deputy with only minimum oversight. After all, if Blanchard could not trust Wilson in her
job, who could she trust? Blanchard would review reports as they were prepared by Wilson, but she
rarely, if ever, reconciled any of the accounting data in the reports to supporting detailed
documentation. Being a relatively small TAC office, budget constraints and turnover would occur
which would necessitate changes in job duties. When such changes occurred, Wilson was always
willing, if not eager, to take on the added responsibilities. Again, because of the trust Blanchard had
in Wilson, she would usually allow Wilson to take on the added duties and responsibilities; Wilson
appeared to be a willing, dedicated, hard-working employee who was not afraid to do whatever was
necessary to see that the job got done!
It was during one of these changes in job duties that Wilson was provided with the opportunity to
begin her embezzlement scheme. Sometime during 2004, a data entry clerk retired from the TAC
office. She had been responsible for the information from one of the tax receipt forms that usually
showed the amount of sales taxes collected from purchasers (Texas is one of the states that
depends heavily on its sales tax revenues as a primary source of tax revenues). The clerk would
enter the information from the tax form into the sales tax computer database. Prior to her
retirement, the data entry clerk often had been absent due to her husband's serious illness. As a
result of these frequent absences and the importance of the sales tax information to the state, the
data entry clerk taught Wilson how to input the tax receipt information. Therefore, when the clerk
retired, Wilson told Blanchard that she could take over the responsibilities without impairing her
current workload and thereby save the time and money that hiring and training a new clerk would
incur. Naturally, given the relationship between Wilson and Blanchard, it was not surprising that
Blanchard quickly agreed to Wilson's suggestion.
In taking over the duty of entering the sales tax information into the computer, Wilson now had sole
responsibility for reconciling the total daily receipts (incl. cash), preparing the daily cash sheet,
preparing the daily bank deposit, and reconciling the tax receipts to the computer summary report
(which was also prepared by her).
Shortly thereafter, Wilson took over the motor vehicle sales tax reconciliation function. When she
received Form 31, detailing the tax receipts – again, the side which showed the amount collected
150
from the motor vehicle purchaser – she began throwing away all of these tax receipts.
Subsequently, Blanchard discovered that Wilson was throwing these forms away and questioned
her as to why she did this. Wilson responded that she had been told by the State Controller's office
that the forms were not necessary if the county involved had a computer database. To her credit,
Blanchard told Wilson she was wrong and did indeed need these tax receipts forms. Therefore,
Wilson began filing them again in May, 2010.
Other unusual things began to happen in Wilson's performance of her tasks. Wilson appeared to be
very jealous and overly protective of the various tasks she performed. For example, none of the
other employees were ever allowed to input information from the motor vehicle sales tax receipts
forms (Form 31) into the motor vehicle sales tax computer database. Also, none of the other
employees were allowed free access to the tax side of the Form 31 receipts. Whenever an employee
needed to see one of these forms, Wilson would find the receipt, pull it out of the file, and then
hand it to the employee. When the employee was finished with the document, it was returned to
Wilson who then refiled the form. In addition, after the daily 3:00 PM reconciliation was completed
and cash receipts had been placed into the bank deposit bag, no one except Wilson was allowed to
make change for any taxpayers who had presented large bills.
Wilson would routinely get to the office very early in the mornings, usually before any of the other
employees had arrived. She also came into the office on Saturdays to enter the Form 31 information
into the sales tax database. One employee remarked that if another employee came in early, Wilson
would become very nervous and agitated and would not enter the tax information into the
computer whenever the employee was nearby.
Wilson, as chief deputy for the offices, was responsible for the handling of employee time sheets.
She took this duty very seriously as employees would write onto the time sheet the hours that they
had worked. If Wilson believed the employee had improperly recorded hours worked, she would
change the time sheet to the hours she felt should have been recorded. Naturally, these changes to
other employee time sheets caused numerous arguments between Wilson and the affected
employees. Eventually, these disgruntled employees wondered if Wilson was as strict with her own
time sheet. It was common knowledge in the office that Wilson would take numerous days off as
well as taking off every Thursday afternoon and all day Friday. When these employees managed to
obtain copies of Wilson's time sheet from her desk one day when she was gone, they noted she
never adapted her time sheet for the time she was away from her job. Employees also noted that
Wilson would routinely steal "little things" by using the postage meter for her personal mail, using
the business phone to make personal long-distance calls, etc.
In addition to the changes in Wilson's behavior in the performance of her duties, employees began
noting other changes in her personal life and behavior. For example, she always seemed to have
large amounts of cash in her purse. Whenever co-workers went shopping with her, she always paid
cash. Another time when the office personnel had to attend a seminar in Waco, Wilson pulled
several twenties out of her purse and said she was going to "let the county pay for our meals" yet
she never filed a voucher requesting reimbursement for the meals. Wilson and her husband, who
was a local chiropractor, took a lot of trips to different locations during the year and during the
summer, they would go to their beach-house nearly every weekend.
Suspicions Aroused
151
AUI4863/SG
In September 2010, Wilson's husband Charles became very ill which necessitated her being off work
for a week so she could be at home with him. During this time, Wilson's work was performed by
other employees within her department. Nothing unusual was noted with the cash sheets, deposits,
or reconciliations. However, on the Monday of the following week, employees began realising
something had occurred during the weekend. Upon arriving at work, employees noted the
computer had a strange message on it like it had been turned on during the weekend and not
turned off properly. Since Wilson was the only one who would come into the office on Saturdays to
enter the tax receipt information into the computer, they realised that Wilson had been in the office
on Saturday. Then, the clerk who had prepared the cash sheet on Friday noticed that changes had
been made on the cash sheet. It seems the clerk's original numbers had been "whited-out" and
changed to reflect lower balances. Although the clerk was curious about the changes, she had seen
similar changes before on previous cash sheets that she had prepared. Normally, when she
questioned Wilson about the changes (since it had been preached to her the cash sheet had to be
100% correct, with no changes showing), Wilson told the clerk that the clerk had made a mistake
which was changed by Wilson and she should not worry about it. However, this time she was certain
she had not made a mistake on Friday since her cash sheet and the cash receipts counted by
another clerk had balanced. She was also disturbed by the fact that whoever had made the changes
was trying very hard to make it appear that the handwriting in the changes looked just like the
handwriting on the unchanged numbers. The clerk decided to ask Blanchard, the director, why the
change was made. Blanchard indicated she had no idea why a change had been made over the
weekend. Wilson was subsequently approached as to why the change was made, and as before,
simply commented that a mistake had been made and she had changed the numbers. The second
clerk informed Blanchard that everything had balanced on Friday and still balanced on Monday,
except the numbers were different, showing the office had taken in less cash than had been shown
on Friday. Blanchard became suspicious. She began checking tax receipts taken on auto transfers
against the amounts shown on the computer printouts. On several of the tickets, Blanchard noted
the amount on the receipt was $500 or $1,000 greater than what had been recorded on the
printouts. Since Wilson was responsible for the data entries, Blanchard realised that her close friend
was responsible for stealing a great deal of money. Finally, she contacted the Coryell County
District Attorney (DA) who instructed her to tally as much of the losses as she could while the DA's
office initiated an investigation. When Blanchard discovered that for 2010 alone, Wilson had taken
over $100,000 from the Coryell County TAC office, she had no choice but to make a complaint
against Joan Wilson with the county sheriff’s office. Finally, on the afternoon of November 8, 2010,
before television cameras, Joan Wilson was arrested in her office. On November 15, 2010 she
committed suicide.
Results of the Investigation
Even though the accused was now dead, the district attorney's office and the state Comptroller's
office decided to conduct an investigation. The investigation turned up a great deal of evidence
against Joan Wilson. For example, when Wilson would make the deposits for the county with the
bank that handled both the county's account and her family's account, she would always make the
deposits inside the bank lobby. However, when she made personal deposits, she went through the
drive-in bank teller. The bank teller noted that when Wilson made these deposits, they were always
either into the joint account or into her son's account. These deposits were mostly in cash, with very
few cheques being deposited. Wilson made these deposits on almost a daily basis and was almost
always alone when she made the deposits.
152
In addition to the behavioral aspects noted, withdrawals from the bank accounts of Mr. and Mrs.
Wilson and their son as compared to total known sources of funds were as follows:
Year
2007
2008
2009
2010
Known Funds
$92,767
76,473
74,185
56,970
Withdrawals
$179,993
191,644
204,863
142,153
Other evidence came to light. The bank records did not show any transfers of funds between the
joint account and her husband’s chiropractor’s account. No funds generated by her husband’s
practice could be traced to the joint bank account, which was used to pay the monthly obligations
of the household. Yet, the only known source of funds being deposited into the joint account came
from Joan Wilson's salary from the TAC office.
Both Wilsons (Joan and Charles) committed themselves to various obligations during these same
periods. On the average, the recurring monthly payments for home mortgages, car payments,
insurance, credit cards, etc., were $5,976 per month. Again, as noted, these expenditures were
considered household obligations and were paid only from the joint account. In addition to the
recurring payments, it was known that a $15,000 investment was paid in lump sum in 2008, a
$4,000 lump sum loan made in 2008, and another large lump sum was paid in 2010. Interestingly,
the average net pay-check from the county for Joan Wilson was about $1,000.
Early in 2010, the Guaranty Bank and Trust, which was the principal bank used by the Wilsons,
asked Charles Wilson to prepare and file a personal financial statement showing personal income
and cash flows for the year ended 2009 and projected income and cash flows for the year ended
2010. The statements filed showed incomes of $36,158 and $42,564 for 2009 and 2010,
respectively. Personal expenses were reported at $23,964 and $26,163 for 2009 and 2010,
respectively. It should be noted that deposits in cash to the son's account for 2009 and 2010 were
more than the total personal expenses shown. Also, it is interesting to note Charles Wilson had
monthly debt service payments on personal loans from 2006 until April 2009 that averaged $1,473,
which was more than the monthly net pay available to pay all of the living expenses of the
household.
Epilogue
Based on the results of the investigation, the Coryell County District Attorney's office decided to
pursue the case since it appeared obvious that thefts over $100,000 had occurred, which is a firstdegree felony offense in the state of Texas. However, since Joan Wilson had committed suicide
shortly after her arrest, the district attorney had to decide on who to prosecute. Since Dr Wilson
seemingly benefited from the appropriations of funds by his wife, it was decided that he would be
prosecuted. Dr Wilson's defence was that he had no knowledge of his wife's embezzlement and
should not be held liable or as an accomplice to her scheme. This argument did not deter the district
attorney nor the jury as Dr Wilson was subsequently convicted and sentenced to a substantial
prison term. However, due to his age and poor state of health, he is not expected to complete his
term. In addition, the state of Texas has assessed the Wilson estate for the collection of funds in the
amount of $1,226,424.45, the amount that it has determined that Joan Wilson had stolen since
2004.
153
AUI4863/SG
16.3
CASE STUDY QUESTIONS
The following questions that are based on the case study were taken from Case studies in internal
auditing, edited by Dittenhofer and Ziegenfuss.
Assume that you are a state auditor for the State of Texas and you are assigned to deal with this
case. Complete the following:
I.
Identify the internal control weaknesses that appear to be present in the Tax AssessorCollector's office.
II.
What types of recommendations would you make to improve the identified weaknesses?
III. What "red flags" could you note, based on the above information that might have aroused
suspicions that some type of fraud or embezzlement could have been occurring?
IV. Why do you suppose that the employees within the county office failed to place much
emphasis on these "red flags"?
V.
What would you recommend to try to prevent future occurrences of this situation?
VI. Dr Charles Wilson, in his defence, argued that he was unaware of the embezzlement being
perpetrated by his wife.
VII. What information could you deduce from the case to refute his argument?
VIII. It appears that this county office did not have an internal auditor on its staff. In fact, the state
did not conduct any audit work until the embezzlement was discovered. Do you think that an
internal auditor might have been able to uncover this fraud?
16.4
CASE STUDY FEEDBACK
The following feedback was taken from Dittenhofer and Ziegenfuss (1997 adapted):
(i)
Internal control weaknesses in the Tax Controller's Office
• Segregation of duties
This weakness, along with the lack of access controls, was one of the most serious. There is little
doubt that there was no true segregation of duties in this case. Wilson clearly had far too many
responsibilities. Remember that we want to have specific responsibilities assigned to specific
individuals so problem areas can be easily identified and corrected. Wilson performed numerous
incompatible functions involving the custody and recording of cash receipts as well as the
authorisation function of approving transactions (i.e., she handled all employee time sheets
including her own).
154
• Personnel policies
The county office appeared to have done very little to ensure either honesty or the competency of
its employees. Since this county office acted primarily as a collection agency for state taxes,
perhaps the state should have had measures to ensure competency. However, the state does not
seem to have done anything either. None of the parties involved appeared to be accountants or
certified public accountants nor does it appear that there was any evidence that any training in
basic bookkeeping procedures occurred. Just because this office handled essentially cash basis
accounting, it does not relieve the state or county ensuring that its employees are competent and
adequately trained. Again, given that this office dealt predominantly with cash receipts, none of the
employees who had any custodial functions or were in a position of trust (such as Joan Wilson)
appear to have bonded. Clearly, there was little in-house training since Wilson would leap at the
opportunity to take on new duties. Also, there does not appear to have been any rotation of duties
or required vacations. Even when Wilson took time off, she would still come into the office on
Saturdays to ensure she handled the cash receipts records and entry into the computer files, so she
could continue her embezzlement scheme.
• Execution of transactions
Again, there appears to be little question that this county office was poorly organised. There
appears to be only a minimal organisation structure with very little formal structure. There were no
clear-cut or well-defined procedures for assigning responsibility and authority. Convenience or
willingness to take on additional duties seemed to be a predominant factor in the assignment of
duties and responsibilities. There were no written procedure manuals to explain how transactions
were to be recorded and executed. Otherwise, Wilson would not have been able to continually alter
and then destroy tax receipt forms.
• Recording of transactions
Several basic recording controls appear to have been ignored here as well. It appears that some of
the accounting documents were not prenumbered and controlled given that no one seemed to
realise that original tax receipts were missing until Wilson was actually caught throwing them away.
It is surprising that once it had been realised that Wilson had been throwing the receipts away and
destroying them that nobody really questioned her reasons for doing so (the State Comptroller's
office allegedly told her the receipts were not necessary if the data was kept on a computer
database). Evidently, if any questions as to amounts arose, the office must have relied on the
computer printouts prepared by Wilson. In addition, it is evident the recording of transaction on a
timely basis was not done consistently since only Wilson handled the computer entry of the tax
receipts.
• Access
As noted previously, this control, along with the lack of segregation of duties, was probably the
most violated control. Wilson not only had access to the cash receipts but also had access to the
accounting records. Therefore, she had the opportunity to steal the cash and then be able to cover
up her theft by altering the accounting records. Of course, it did not hurt her scheme any that she
was able to prepare the deposit documentation, jealously guard the deposit bag so that only she
could make change for any large bills paid by taxpayers, and then be able to make the deposit
herself.
155
AUI4863/SG
• Independent verification (accountability)
There appears to have been little, if any, type of independent verifications of any of the work that
was performed in this office, particularly Wilson's work. Of course, since she performed so many
custodial, recording, and authorisation duties, who was left other than Blanchard to verify her work.
Since Blanchard apparently had so much trust in Wilson, she obviously left Wilson alone. There was
no internal audit function within the county office, no independent reconciliation, surprise audits
and cash counts, or anything else that might have led to the earlier discovery of the embezzlement.
Even the state appears to have provided very little oversight since it did not become involved until
the theft was discovered.
(ii) Recommendations to improve the internal control structure
•
There should be proper segregation of duties wherever possible, especially with regard to
the custodial and recording duties. An organization chart should also be prepared. Since this
office was basically a small tax collection agency for the state and therefore dependent on
budget appropriations for its operating funds, it might be constrained as to the number of
employees that could be hired that would allow a better segregation of duties. Under no
circumstances, however, should any individual employee be allowed to handle the cash
receipts, record these receipts into the accounting records, and deposit these receipts into the
office's bank account.
•
Personnel policies should be clearly defined with job descriptions, required qualifications,
training, etc. Prospective employees should be tested to see if they have a rudimentary
understanding of basic accounting procedures. Duties between personnel should be
periodically rotated whenever possible. Temporary personnel should be used to perform the
duties of vacationing personnel rather than allowing employees to perform incompatible
functions. In addition, given the changing operating environment with more and more
computerisation, employees should be properly trained in the use of the computer and its
related software packages. If possible, the employees with computer duties should be certified
and periodically tested in the performance of their duties. Salaries need to be adequate enough
so that employees would be less tempted to try to steal funds. Vacations should be required
and strictly enforced. No employee on vacation should be allowed to come in at his/her
discretion to perform any assigned duties.
•
Policies and procedures for the handling and recording of the cash receipts need to be clearly
defined, established, and strictly followed, primarily through the use of a procedure manual. If
necessary, the steps involved with the handling and recording of the cash receipts might be
written in a "cookbook" format that would require the employee to document that each step
was properly done. Then, a supervisor would have to review the work performed and initial or
verify that no steps were omitted or improperly performed before any cash is placed into the
deposit bags and deposit slips are prepared. Clearly-defined lines of authority and
responsibility need to be established. A simplified organisation chart or something that can
define the organisation structure of the office needs to be prepared. Authorisation of
transactions should be performed by someone with no other custodial or recording duties,
particularly with the handling of the time reports. Deposits of the cash receipts should be made
on a daily basis, so no employee would be able to come into the office on weekends and
remove cash from the deposit bag.
156
•
All documentation should be pre-numbered, and accounted for, including tax receipts, tax
forms, cash count sheets, etc. A simplified chart of accounts could be established to control the
various types of tax receipts that are received. In any case, the documentation and procedures
followed in the recording process should be kept as simplified as possible to reduce the risk
that errors in the process will occur. Cash receipts should be entered into the computer records
as soon as possible, preferably by the end of the business day, rather than at the convenience
of the employee responsible for data entry.
•
Access controls should be established so that access to any documents or assets are limited so
that those employees who need access to perform their duties have the necessary access.
However, even this access should be limited only to the extent necessary to perform their
duties. Those employees with custodial duties should not have any access to the accounting
records or documents, and vice-versa for those employees with recording duties. Access to the
computer and computer records should be controlled.
•
There are a number of things that could be done to improve accountability through some type
of independent verification. First of all, there should be much stronger supervision of the work
by the director and other supervisory personnel. Of course, those employees charged with
supervision should have no other duties relating to what they are supervising. If possible, an
internal audit function should be added. Given that this office is a relatively small county office,
it may not be cost efficient to have a separate internal audit function. In such a case, the county
itself should establish an internal audit function to handle all county offices. If this would still
not be cost efficient, the county could approach neighbouring counties about the possibility of
an internal audit function to service several counties. Then, the related costs could be shared.
In addition, the state auditors should take a more active role in the accountability of these
smaller offices. While it may not be practical to audit such offices on a yearly basis, such offices
should be audited at least once every three years. The state auditor should routinely make
surprise cash counts and reconciliations on a periodic basis.
(iii) Red flags that could have aroused suspicions
There appear to be a number of "red flags" that should have aroused suspicions of employees and
the director that there was a possibility of something being wrong. Some of the obvious red flags in
this situation were as follows:
•
Wilson was too eager to take on new job responsibilities even when such responsibilities added
to her already heavy work load.
•
Wilson would get defensive, irritable, and argumentative when other employees would offer
to help her in her work.
•
The isolation she exhibited in her work in that only she was allowed to enter the tax receipt
data into the computer.
•
Wilson would not allow any employees to change large bills after the cash receipts were placed
into the bank deposit bag.
•
Wilson routinely had large amounts of cash in her purse.
•
The bank teller should have been suspicious that so many personal deposits were mainly in
cash to a drive-in teller where she would not be as easily seen as she would be when making
the office deposits in the bank lobby.
157
AUI4863/SG
•
The obvious changes in Wilson's lifestyle. She was noted taking numerous trips with her
husband. It was known they had a beach house, boat, investments, etc. that were clearly above
her annual gross income. Even her husband's chiropractic clinic was not producing enough
income to justify the extravagant lifestyle they were living.
•
Wilson often worked alone and worked late and on weekends. Usually when employees are
this dedicated, it is because they may be doing something they do not want other employees
to discover.
•
There were numerous instances of missing documents since Wilson would usually destroy the
tax receipts. In addition, she often made alterations of the cash sheets and deposit slips.
(iv) Reasons why employees failed to note many of the red flags
Some of the possible answers could be as follows:
•
Wilson was well-liked by a majority of the employees, although she did have some run-ins with
some employees regarding her handling of their time sheets.
•
Wilson could have used the time sheets as a type of "Damocles sword" over the head of the
employees who might have raised questions. In this manner, she could have circumvented any
controls, if they had been present, by virtue of her supervisory position.
•
It was well-known in the office that Wilson was a long-time employee and trusted by the
director. Given that the office was relatively small, and all employees knew each other and
were aware of office politics, any employee who might have had suspicions were afraid to
challenge or accuse Wilson by reporting her to the director. Also, the employees evidently
were able to discover that Wilson was routinely changing their time reports yet was not
adapting her time sheet for the times she took off from work.
(v) What could be done to improve the employee awareness
•
Certainly, one thing that should be done would be to educate employees on the various signs
of possible fraud through seminars, office meetings, etc.
•
In addition, better controls might have made employees more aware of the possibility of fraud
or embezzlement.
•
Finally, state and local government, as well as businesses in general, need to change attitudes
on the subject of whistle blowing. Instead of treating the whistle blower as a "stool pigeon"
motivated by self-interest, such individuals should be treated as heroes, particularly with
governmental entities who are accountable to the public for the proper handling of tax funds.
Had the whistle been blown on Wilson early, the state of Texas would not have been missing in
excess of $1 million in tax revenues.
(vi) Factors within the case that can be used to refute Dr Wilson's defence
There are a number of items within the case that can be used to refute Dr Wilson's defence.
As stated, there were two different bank accounts used by the Wilsons. One account was used
strictly for the chiropractor’s practice. None of the funds from this account were used to pay any of
158
the household expenses or any personal expenses. All household expenses and all other personal
expenses (boat, beach house, loans, investment, etc) came from the joint cheque account.
•
The source of the funds of the joint cheque account would normally be the paycheque of Joan
Wilson. It is obvious from the information in the case, the tables, etcetera that far more than
their income was spent for household and personal expenses.
•
It would be stretching the imagination of even the most gullible person to believe Dr Wilson did
not know what his wife's gross income was. Given that he wrote four cheques within a few
months for investments and a loan totalling more than his wife's yearly income, showed that
Dr Wilson had to be aware of the embezzling that his wife was doing. While he may not have
been directly involved in the planning and implementation of the embezzlement scheme, he
had to be aware something unusual was occurring for the joint account balance to be as high as
it was.
•
Even if he said nothing to encourage her scheme or to discourage her, his silence made him an
accomplice in that he used the funds for whatever reason he desired.
(vii) Would an internal auditor have uncovered this fraud?
There is no guarantee that had there been an internal auditor performing tests in this county office,
that the internal auditor would have been able to uncover the embezzlement scheme, however,
•
a good internal auditor should have readily recognised the obvious weaknesses in the internal
control structure of this office
•
the internal auditor would have questioned why the tax receipt forms were being destroyed or
why changes had been made by Wilson in the cash sheets when it was clearly emphasised to
other employees that changes were not to be made
•
the internal auditor would have been able to determine that the pay sheets were being
manipulated by Wilson and that could have cast doubts on her reliability and integrity and
would have caused more testing in the areas Wilson was heavily involved
•
an internal auditor might have been able to recognise enough of the red flags present in this
situation to have at least raised some questions and expressed the need for further
investigation
•
had there been an internal auditor present to periodically check and verify work performed in
the office, Wilson might not have been as likely to attempt her embezzlement scheme because
the risk that she might be caught would be substantially increased. Or she would have been
more careful and would not have tried to steal as much.
After working through this case study, you should have a better idea of how to apply your
theoretical knowledge to a practical scenario. Remember that for examination purposes you should
be able to apply your theoretical knowledge to practical scenarios.
159
AUI4863/SG
TOPIC 6
Auditing of advanced IT system
Contents
LEARNING UNIT 17: General and application controls
162
LEARNING UNIT 18: Auditing advanced and newly developed IT systems
174
INTRODUCTION TO AND PURPOSE OF THE TOPIC
Properly utilised information technology (IT) systems can play an extremely important role in the
strategic planning and management of an organisation, and they involve far more than mere
recordkeeping and processing of information for historical and legal purposes. Strategic and
timely information is vital for the achievement of the organisation's objectives in the most
efficient and effective manner.
Owing to its integrated
nature, IT auditing should
not be seen in isolation.
It can be combined and
integrated into almost
every internal audit
engagement.
160
The aim of this topic is to explain the
risks and controls that relate to advanced
IT systems and to formulate an audit
approach for auditing advanced IT
systems.
In this topic we focus on advanced
information technology (IT) concepts. It
is imperative that the internal auditor
understand the impact of advanced
information systems on the entire
organisation, as well as on the internal
audit activity specifically. In this module
we will discuss the risks and controls that
relate to advanced IT systems, as well as
the formulation of an audit approach for
new and advanced IT systems.
MULTIMEDIA
Please access the podcast on myUnisa to assist you in your studies of topic 7.
LEARNING OUTCOMES
After you have studied this topic, you should be able to
•
•
•
understand the risks related to advanced IT systems and be able to perform a risk
analysis in a given scenario
explain and evaluate the controls relating to advanced IT systems
develop an audit approach to evaluate advanced IT systems and applications
161
AUI4863/SG
Learning unit 17
General and application controls
Contents
17.1
17.2
17.3
17.4
17.1
INTRODUCTION
GENERAL CONTROLS IN AN IT ENVIRONMENT
EVALUATION OF APPLICATION CONTROLS
INTERNAL CONTROL SYSTEMS IN COMPUTER ENVIRONMENTS AND THE
EVALUATION OF SUCH SYSTEMS
162
165
168
172
INTRODUCTION
Information technology is not an isolated subject or topic. It should thus not be approached as a
highly specialised, separate section of the organisation. The information technologies deployed and
the systems supported by them form an integral part of the total infrastructure of an organisation
and, like other resources, they contribute to the achievement of the organisation's objectives.
REFLECTION
In your undergraduate studies you had extensive exposure to the theory and basic
principles of information systems and information systems auditing. Now that you are a
postgraduate student, we expect you to be proficient in the application and
interpretation of these basic principles and theories. Therefore, if you feel that your
knowledge is lacking in any way, you should revise all your undergraduate study material
on these topics thoroughly.
In this learning unit we will focus mainly on general and application controls in an IT
environment.
It is of utmost importance that you have the correct overall perspective on the role of
information technology (IT) in the management of an organisation. This includes the
timely and accurate preparation of authorised information, the timely and accurate input
of information into the system with the aid of applications software, the accurate
162
processing of the information, control of the processed information, timeous
distribution of the processed information and utilisation of the information for the
purposes for which it was intended. The golden rule, which applies to the whole system,
is the identification and management of all critical risks that are present in the system,
which could prevent an organisation from achieving not only its information technology
objectives, but possibly also its business objectives.
In the light of the sophistication and power of the computer programs in use today,
information systems can be regarded as the nerve network of organisations.
Because information systems play such an important part, they require managerial
efficiency of a high order. An information system consists of a number of very important
aspects, some of which are associated with a high degree of risk. The management of
such a system and the activities associated with it require a high degree of expertise,
which is why internal auditors require a thorough knowledge of each important aspect of
computerised systems if they are to make a significant contribution.
This overall perspective makes it easier for the internal auditor both to decide on his or
her focus and approach and to plan tasks with regard to the information technology
system itself and the processing of such information. The auditors must use the
information technology system and the information it generates to obtain the necessary
audit evidence to perform their responsibilities efficiently.
STUDY
• Performing Internal Audit Engagements (2017), Chapter 2
• Assurance: An Audit Perspective (2018), Chapter 8
• GTAG – 1 - IPPF- Practice Guide: Information Technology Risk and Controls
GOVERNANCE CONTROLS
According to GTAG (Global Technology Audit Guide) – Governance Controls, these are explained as
follows:
The primary responsibility for internal control resides with the board of directors in its role as keeper
of the governance framework. IT controls at the governance level involves ensuring that effective
information management and security principles, policies, and processes are in place and
performance and compliance metrics demonstrate ongoing support for that framework.
Governance controls are those mandated by, and controlled by, either the entire board of directors
or a board committee in conjunction with the organisation’s executive management. These controls
163
AUI4863/SG
are linked with the concepts of corporate governance, which are driven both by organisational goals
and strategies and by outside bodies such as regulators.
An important distinction between governance and management controls is the concept of “noses
in, fingers out”. The board’s responsibility involves oversight rather than actually performing
control activities. For example, the audit committee of the board does no auditing, but it does
oversee both the internal and external auditing of the organisation.
MANAGEMENT CONTROLS
According to GTAG (Global Technology Audit Guide) – Information Technology Controls,
management controls are explained as follows:
Management responsibility for internal controls typically involves reaching into all areas of the
organisation with special attention to critical assets, sensitive information, and operational
functions. Consequently, close collaboration among board members and executive managers is
essential. Management must make sure the IT controls needed to achieve the organisation’s
established objectives are applied and ensure reliable and continuous processing. These controls
are deployed as a result of deliberate actions by management to •
•
recognise risks to the organisation, its processes and assets
enact mechanisms and processes to mitigate and manage risks (protect, monitor, and
measure results)
TECHNICAL CONTROLS
According to GTAG (Global Technology Audit Guide) – Information Technology Controls, technical
controls are explained as follows:
Technical controls form the foundation that ensures the reliability of virtually every other control in
the organisation. For example, by protecting against unauthorised access and intrusion, they
provide the basis for reliance on the integrity of information — including evidence of all changes and
their authenticity. These controls are specific to the technologies in use within the organisation’s IT
infrastructures.
The ability to automate technical controls that implement and demonstrate compliance with
management’s intended information-based policies is a powerful resource to the organisation.
Below is a framework of the general and application controls also illustrated in figure 8.1 above.
These are the main categories of controls in an IT environment.
164
Figure 8.2 – General and application controls
Controls in an IT
environment
General controls:
•
System development and
implementation controls
•
System maintenance controls
•
Organisational and management
controls
•
Access controls to data and
programmes
•
Computer operating controls
•
System software controls
•
Business continuity controls
Application controls:
Controls over the:
•
input
•
processing
•
output
•
master file changes
Controls over transaction data to
ensure:
•
validity
•
accuracy
•
completeness
17.2 GENERAL CONTROLS IN AN IT ENVIRONMENTS
The management of an organisation is responsible for establishing the required control measures to
ensure that the IT system of the organisation is adequately protected and that the system meets
the required operational needs. The internal auditor should be able to identify these controls in any
IT environment and evaluate the impact of the general controls on the overall business of the
organisation.
General controls are controls that establish an overall framework of control for all IT systems
activities. They span all applications. A weakness in a general control could therefore affect
numerous applications. Ensure that you are able to identify applications that could be affected.
General controls comprise all the policies and procedures, both manual and computerised, which
govern the environment within which an organisation’s IT systems are developed, maintained and
operated, and within which the application controls operate.
165
AUI4863/SG
Programmed controls are those controls that the IT system will automatically perform. In contrast,
IT controls are both programmed and user controls.
Also note that IT controls
include both general and
application controls.
Programmed controls are controls enclosed in application programs and are therefore performed
by the system. They could include edit and validation checks.
User controls are controls that are manually performed by users. They include reviewing of reports,
performing certain reconciliations and the authorisation of documents and transactions, etc.
In the following table the difference between manual and programmed controls is explained.
Manual/programmed controls
Examples of general controls
Manual controls (can never be programmed)
Organisational and management controls:
staff practices (rotation of staff; enforced
annual leave, etc)
Programmed controls (can only be Access controls over programs: passwords to
programmed)
gain access to operating systems
Combination of manual and programmed System development and implementation
controls (can be either, depending on the controls: project authorisation
client’s system)
In order to rely on application controls, there have to be effective and efficient general controls.
General controls should thus be tested before the application controls can be tested.
REFLECTION
Revisit your undergraduate studies and ensure that you are very familiar with the nature,
purpose and application of general controls. Also ensure that you can discuss and apply
your knowledge regarding general controls to practical scenarios.
STUDY
• Performing Internal Audit Engagements (2017), par 2.3
• Assurance: An Audit Perspective (2018), par 8.2
166
Well-known models to use during the evaluation of general controls are the following:
COBIT (Control objectives for information and related technology) resources can be
used as a source of best practice guidance. COBIT is intended for use by business and IT
management, as well as IT auditors. Therefore, its usage facilitates and enables the
understanding of business objectives and communication of best practices and
recommendations, around a commonly understood and well-respected standard
reference (you can access this model at: www.isaca.org).
COBIT includes the following:
• Control objectives:
• Control practices:
• Audit guidelines:
• Management guidelines:
high-level and detailed generic statements of minimum
good control
practical rationales and how-to-implement guidance
for the control objectives
guidance for each control area on how to obtain an
understanding, evaluate each control, assess
compliance and substantiate the risk of controls not
being met
guidance on how to assess and improve IT process
performance, using maturity models, metrics and
critical success factors
Full details of the ISACA IS Auditing Standards, Guidelines and Procedures for Auditing
and Control Professionals can be found at www.isaca.org.
Other standards and frameworks relating to IT auditing, which you should be aware of,
are the following:
• Business continuity management –
http://www.continuitysa.co.za/news-room/articles/business-continuitymanagement.html
• ISO (International organisation for standardisation) standards related to IT auditing
(information security, governance, etc)–
http://www.iso.org/iso/products/standards/catalogue_ics_browse.htm?ICS1=37&ICS2=1
00&ICS3=99&
• King IV – corporate governance (with specific reference to chapter 5) –
http://www.corporategovernance.co.za/index.php?option=com_content&view=article&i
d=95&Itemid=92)
• ITIL (IT Infrastructure Library) – www.isaca.org
You need to study these frameworks thoroughly in order to deepen your knowledge of general
controls and the evaluation thereof. Visit the websites and make a short summary of the most
important aspects that relate to the frameworks. Also refer to your undergraduate studies, where
possible.
167
AUI4863/SG
17.3 EVALUATION OF APPLICATION CONTROLS
By this time, you should have a thorough understanding of the following terms and definitions:
Applications are programs that perform the business functions required of the system. They
operate under the direct control of the operating system but may contain many powerful control
elements themselves.
Application programmes are sets of procedures and programmes designed for performing specific
tasks and functions relating to inventory, salaries, sales, etc.
Application controls are controls over input, processing, output of information and master file
amendment controls relating to a specific application (e.g. payroll cycle), to ensure that such
information is valid, accurate and complete. Application controls relate to specific tasks performed
by computerised information systems. Their function is to provide reasonable assurance that the
initiation, recording, processing and reporting of data are properly performed.
Application controls are categorised as “input”, “processing”, “output” and “master file
maintenance” controls. Application controls relate primarily to the validity, accuracy and
completeness of data within a specific application in an organisation.
REFLECTION
If you have any uncertainty regarding the theory and principles of application controls,
you should revisit your undergraduate studies and ensure that you study application
controls in detail. Also ensure that you can discuss and apply your knowledge regarding
application controls to practical scenarios.
Application controls are normally divided into the following categories:
•
•
•
•
Input controls – These controls are used mainly to verify the integrity of data
entered into a business application, whether the data is entered directly by staff,
remotely by a business partner, or through a web- enabled application or interface.
Data input is checked to ensure that it remains within specified parameters.
Processing controls – These controls provide an automated means to ensure
processing is complete, accurate, and authorised.
Output controls – These controls address what is done with the data and should
compare output results with the intended result by comparing the output against
the input.
Master file maintenance controls – These are controls relating to changes made to
the master files where standing data is stored (e.g. client names, contact numbers,
addresses).
Common examples of application controls are the following:
▪ data edits
▪ separation of business functions (transaction initiation versus authorisation)
▪ balancing of processing totals
▪ input validation
▪ transaction logging
▪ error reporting/exception reports
168
STUDY
• Performing Internal Audit Engagements (2017), par 2.4
• Assurance: An Audit Perspective (2018), par 8.3
• GTAG 8 - Auditing Application Controls
ACTIVITY 37
You are in charge of the audit of Musicmix (Pty) Ltd, a company that wholesales CDs,
DVDs and related products from its premises in Johannesburg. Recently your firm’s IT
audit division completed a general control review at Musicmix (Pty) Ltd and submitted
its reports to you. The following points, inter alia, were raised in the report:
1.
The company has a centralised data processing department linked to terminals in
each of the other departments, e.g. warehouse, debtors, marketing, etc. The
“computer room” in which the central processing unit and related equipment are
located, is situated in a secure part of the head office. Earlier in the year some
damage was caused to equipment in the computer room when heavy rain came
through a window which had been left open overnight. The operator has opened
the window during the day to improve ventilation.
2.
Access to the computer room is restricted after working hours by a steel gate and
the activation of an electronic surveillance system by the last person leaving the
room at the end of the day.
3.
About six months ago an expensive data storage device was damaged when a
member of Musicmix (Pty) Ltd’s computer club spilled a soft drink on the device. As
a result, a fair amount of backed up data was lost and processing was disrupted for
some time. Nobody knew how to resolve the problem. Restructuring of the data
had to be carried out from source documentation kept in the user department. Wes
Hall, the IT manager, explained that the company’s computer club has access to the
computer room after hours to do “whatever computer fanatics do”.
REQUIRED
a) Distinguish between general and application controls in a computerised
environment.
b) State the recommendations you would make to improve the general controls at
Musicmix (Pty) Ltd, based on the information given above. Justify your
recommendation.
169
AUI4863/SG
FEEDBACK
a)
General and application controls
General controls are those that establish an overall framework of control for IT
system activities. They are controls that should be in place before any processing of
transactions gets under way.
Application controls are controls that are specific to a particular task within an IT
system, such as the wage (application) cycle or the purchases (application) cycle.
For example: controls over the physical security of the computer equipment would
be a general control, while the controls over the addition of an employee to the
wage master file would be an application control.
b)
Recommendations to improve the general controls at Musicmix (Pty) Ltd
1.
I would recommend that the physical security of the computer equipment
should be improved as follows:
All doors, other than the main access point, and windows should be sealed.
Justification – This will minimise the risk of unauthorised entry and protect
against natural and environmental hazards.
Justification – The operator’s having to open a window to improve ventilation
suggests that the air conditioning is ineffective. Effective air conditioning will
be even more essential if windows and doors, etc are sealed.
Access to the computer room should be restricted at all times, not only after
working hours. Justification – The intention of limiting access to the computer
facility is to protect the equipment and data from damage, destruction and
abuse at all times. Since damage can occur at any time, and very quickly,
physically restricting entry only after working hours is a totally inadequate
control.
Members of the computer club should not be granted access to the computer
room; access should be granted only to those employees who need to be in the
computer room to fulfil their functions. Justification – Restricting access
reduces the risk of damage to or destruction of computer equipment. In
particular, allowing “computer fanatics” uncontrolled access could lead to
breaches of confidentiality, the introduction of viruses, as well as
destruction/manipulation of data.
A standard operating control must be introduced, namely that no eating or
drinking is to take place in the computer room.
Justification – As has been illustrated, serious damage to expensive computer
equipment can be caused by spilt food or drink, resulting in expensive repairs
and loss of data.
170
2.
Controls over continuity of operations should be improved as follows:
A disaster recovery plan should be put in place, listing the procedures to be
carried out in the event of a disaster. This plan should be widely and readily
available.
Justification – Clearly there is no disaster recovery plan in place; nobody knew
“how to resolve the problem” and “processing was disrupted for some time”. A
proper disaster recovery plan minimises disruption.
Improved back-up strategies need to be put in place; three generations of
backups (grandfather, father and son) should be stored off-site/away from the
computer facility.
Justification – It is likely that back-ups are not made according to the threegeneration principle, as “restructuring had to be carried out from source
documentation held in the user departments”. Proper back-up strategies
facilitate the prompt and accurate reconstruction of data.
3.
Management should be informed of the importance of a strong control
environment and a management philosophy and operating style that
communicates and enforces the importance of internal control.
Justification – The evidence suggests that management (including the IT
manager) are not particularly concerned about potential breaches of security,
confidentiality issues or protection of the company’s assets, both physical and
non-physical.
ACTIVITY 38
List the programmed application controls for sales to ensure the completeness and
validity of processing and output.
FEEDBACK
Revenue and receipts cycle
Processing – programmed controls only
Output – programmed controls only
Validity
authorisation
√
√
Completeness
Accuracy
√
√
X
X
No manual input controls or output controls would have earned you marks, since they are
not programmed controls. Only if the question does not specify either programmed or
user controls could your solution contain both.
X – not relevant to this question
√ – should be addressed in this question
171
AUI4863/SG
17.4 INTERNAL CONTROL SYSTEMS IN COMPUTER ENVIRONMENTS
AND THE EVALUATION OF SUCH SYSTEMS
The evaluation of internal control systems, implemented to control the enormously complex
computerised information systems that support the creation, accumulation, processing,
management, communication and protection of information, is one of the first steps the auditor
needs to take towards rendering audit assurance. In order to evaluate these internal control
systems, the auditor needs to understand the complex and different environments that can be used
for computerised information systems. For this learning unit, you should research the different
computer information system (CIS) environments and the unique control needs of each
environment. Also take note of the way in which the auditor can evaluate such internal control
systems. The internal auditor must, however, obtain an understanding of the control measures in
operation in a CIS environment before he or she can evaluate these control measures.
STUDY
• Performing Internal Audit Engagements (2017), Chapter 2
• GTAG 1 - Information Technology Risk and Controls, 2nd Edition
ACTIVITY 39
What engagement procedures could be performed if an auditor plans to assess a low
level of control risk on the segregation of IT and user functions?
FEEDBACK
The following engagement procedures could be included in the audit programme to
assess a low level of control risk on the segregation of IT and user functions. There might
be more engagement procedures than those mentioned below and/or not all of the
factors mentioned below might be applicable to an entity.
1. Perform a review of the organisational charts for the position of the IT function
within the entity.
2. Perform a review of the job descriptions of the IT and user staff members who are
involved in the handling of exceptions. This review should be performed to ascertain
the proper segregation of duties.
3. Observe the actual operations, which might include preparation, inspection and
distribution of exception reports. It is important to take note of the degree to which
management is involved in the investigation of items on these exception reports.
4. Hold discussions with IT management and operating staff members in order to
determine the degree and value of management supervision.
5. Review management reports, studies or evaluations on the exception handling
process.
6. Review reconciliations of control totals maintained outside the IT department with
the totals that result from computer processing.
7. Test these reconciliations to ensure that they are performed accurately.
172
Controls in an IT environment are categorised as either general or application controls
and may be either manual or programmed. General controls are those that establish the
overall framework of control for IT activities, whereas application controls are controls
over the input, processing and output of data and master file changes.
In order to be able to evaluate internal controls, identify possible weaknesses and make
recommendations for improvements to internal control systems, internal auditors
require a thorough knowledge of and extensive insight into control activities.
NOTES
Make your own notes here:
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________
173
AUI4863/SG
Learning unit 18
Auditing advanced and newly developed IT
systems
Contents
18.1
18.2
18.3
18.4
18.5
18.6
18.7
18.8
18.9
18.1
INTRODUCTION
ADVANCED IT SYSTEMS
SYSTEM DEVELOPMENT
WHAT IS THE INTERNAL AUDITOR'S ROLE IN SYSTEM DEVELOPMENT?
CONTROLS RELATING TO SYSTEM DEVELOPMENT AND IMPLEMENTATION
CONTROLS OVER PURCHASED PACKAGES
CONTROL CONCERNS ASSOCIATED WITH ADVANCED IT ENVIRONMENTS
AUDITING ADVANCED IT ENVIRONENTS
CONTROLS OVER PURCHASED PACKAGES
174
175
176
177
177
182
184
184
186
INTRODUCTION
Given the fact that you are a postgraduate internal auditing student, you should have a good
understanding of the fundamental operational activities, transaction flows and controls that
constitute a transaction processing cycle as it pertains to manual and IT environments. This
learning unit will describe how transaction processing is affected by the utilisation of advanced or
complex computer technology and how internal auditors should go about conducting audits of
advanced and newly developed IT systems.
REFLECTION
The control concepts dealt with during your undergraduate studies will be expanded on
significantly here. It is therefore imperative that you update your general knowledge of
information technology auditing and control considerations to include the latest
174
available technology. In order to keep abreast of the latest developments in information
technology control aspects, you need to read extensively. You can access the most
recent information on the webpage of the Information Systems Audit and Control
Association (ISACA) by going to www.isaca.org.
In this learning unit we will cover the following aspects regarding IT systems:
•
•
•
•
•
advanced IT systems
systems development
the internal auditor’s role in systems development
controls relating to IT systems development
auditing systems development and implementation processes
18.2 ADVANCED IT SYSTEMS
www.webopedia.com defines Enterprise Resource Planning (ERP) as business process
management software that allows an organization to use a system of integrated applications to
manage the business and automate many back-office functions related to technology, services
and human resources.
ERP software typically integrates all facets of an operation — including product planning,
development, manufacturing, sales and marketing — in a single database, application and user
interface.
INTERNET SOURCE
Visit:https://www.wirc-icai.org/material/7-An-Overview-Enterprise-ResourcePlanning%20_ERP_.pdf for an overview of ERP.
Most IT departments manage their organisation’s enterprise resource planning (ERP)
systems in three primary areas of responsibility, namely • operations
• systems development
• technical support
Management and other stakeholders have specific requirements and expectations of the
information technology department in these areas.
The auditing of advanced IT systems and applications forms part of information
management and usage monitoring. In order to monitor the efficiency and effectiveness
of IT systems and applications, management has to set measurement criteria such as
evaluating service level performance against service level agreements, quality of service,
availability, response time, security and controls, processing integrity, and privacy. The
analysis, evaluation and design information, together with data and application
architecture, are used as tools by the auditor.
175
AUI4863/SG
Integrated systems such as SAP and Oracle are used for enterprise resource planning
(ERP). These systems span departmental and organisational boundaries and although
there are many benefits for the organisation from these integrated systems, there may
be resistance to the implementation and use of such systems if users fail to see the
benefits. It is therefore necessary to implement appropriate service level agreements
and system quality expectations after all stakeholders have been consulted.
STUDY
• Assurance: An Audit Perspective (2018), Chapter 7
• Performing Internal Audit Engagements (2017), par 2.5
18.3 SYSTEM DEVELOPMENTS
Systems development and implementation controls relate to both IT systems developed in-house
and IT packages purchased externally from vendors.
What is system development? System development refers to the development of a new computer
system for the entity and, therefore, it has to do with a significant change in the
IT system. Systems development is divided into systems developed in-house (for which external
consultants may be used) and packages purchased externally.
A system developed in-house is not available off-the-shelf and cannot be purchased from a vendor.
It is customised to enable the entity to meet its individual needs. In contrast, an example of a
purchased package is when a company goes to a vendor and buys an IT accounting system such as
SAP in order to accommodate its accounting functions.
When a new system is developed, the following aspects of the IT system will normally change
considerably:
•
•
•
•
•
hardware
software
personnel procedures
documentation relating to the system
controls
An example of this is a company that has a manual system for purchasing its inventory and plans to
computerise this function. Implementing a computerised IT system is a system development
exercise. The company will have to decide whether it is more feasible to develop a system in-house
or to purchase a package externally.
What are the risks (potential problems) associated with system development? When new IT
systems are developed, the process might be chaotic and haphazard. This could lead to
inadequate system development procedures and documentation and many problems for both the
auditor and the entity.
176
STUDY
• Performing Internal Audit Engagements (2017), par 2.3.4
18.4 WHAT IS THE
DEVELOPMENT?
INTERNAL
AUDITOR’S
ROLE
IN
SYSTEM
From the auditor’s point of view, the development, implementation and documentation of a
system are crucial stages at which to emphasise control. Application controls should preferably be
built into the system before it becomes operational. It should be reliable from the start.
Even though most entities do not involve their internal auditors in the system development
process, there is general agreement that such involvement would help to ensure that systems are
implemented appropriately and that the application controls built into the system operate
effectively.
18.5 CONTROLS RELATING TO SYSTEM DEVELOPMENT AND
IMPLEMENTATION
Systems developed in-house
A system developed in-house could be developed either by employees of the company (those with
the relevant knowledge and expertise) or it might involve the use of external consultants. Such a
system caters specifically for the needs of the company as it is custom-made for the entity and is
therefore not available as an off-the-shelf package.
The control objective would be to implement adequate controls, which are designed to ensure that
the new system is authorised, designed, developed and implemented effectively, in order to meet
the needs of the users.
The following table reflects the different stages of the system development process and the
controls that should exist in terms of systems developed in-house:
CONTROLS OVER SYSTEMS DEVELOPED IN-HOUSE
Systems development Systems development methodology requires that the development process be
methodology
broken down into various small tasks. The following are important aspects of
this methodology:
• A formalised, structured methodology should be followed.
• Roles and responsibilities should be clearly laid out and adhered to.
• The methodology should be kept up to date with current developments.
• Deviations from the methodology and standards should be strictly
monitored and followed up by management.
177
AUI4863/SG
Project authorisation/ The following are key controls over project authorisation/approval:
approval
• A system development plan should be developed in accordance with the
business’s strategic plan. System development might originate from users’
needs or as a result of strategic plans.
- The scope of each new project should be clearly defined before any
work is carried out.
- The user department should be actively involved in the requirements
and authorisation of any new systems.
- Team assignments must involve skilled and experienced staff
members.
- Each phase of the project should be appropriately authorised by the
relevant persons before commencement of the next phase.
• All system developments should be as a result of specific user or
management requests (these can result from user, technical, audit and
other specifications).
• A steering committee should be responsible for conducting a feasibility
study. This committee should also give its approval prior to the
commencement of the project.
• A feasibility study should be carried out and should generate conclusions
(proposals) on the following matters:
- whether the system should be developed in-house or purchased
externally, or whether the entire project should be rejected
- evaluation and consideration of any alternative courses of action in
order to arrive at the best solution
- consideration of technological feasibility
- the cost versus benefit of the required hardware, software, operating
costs, staff expertise, etc.
- the income or benefits that might arise from the implementation of
the system/s
- identification, evaluation and quantification of all relevant risks of the
recommended projects
- any other recommendations relating to the system development
• The project should be authorised only after the users’ needs have been
analysed (system analysis).
Project management
•
•
•
•
Establishing a project team (consisting of appropriate IT and user
personnel and management) is one of the responsibilities of the steering
committee. The project team’s main task is to manage the project.
Tasks should be aligned with planned development stages.
Responsibilities should be allocated for each task. These responsibilities
should be allocated to appropriate staff members and could include
defining the tasks of systems analysts and programmers:
- Analysts are responsible for designing a new system or changing the
existing system.
- Programmers are responsible for writing new programmes or execute
the actual changes made to existing ones.
Each specific task and stage of the project should have a predetermined
deadline and time schedule.
178
•
•
•
User requirements/
needs
•
•
•
Purchasing the
hardware and
software
•
•
•
Standards, system
specifications and
programming
•
•
•
Testing
•
•
•
•
Final approval
Progress should be monitored closely and regularly and any deviations
from the planned time schedule should be identified and investigated.
The project team should submit regular progress reports to the steering
committee.
A formal documented plan of action should also be submitted to the
steering committee (including the deadlines, time schedule, etc).
It is crucial that the user’s needs be assessed by the analyst. Their
requirements relating to the input, output, processing, procedures, etc
should be clearly identified and documented.
The requirements of the internal and external auditors should also be
considered (e.g. the auditors might expect certain documents, such as
audit trails, and might also expect certain controls).
The managers of the user departments should give their written approval
for the requirements.
Quotations should be obtained for the hardware that will be used in the
system. These quotes should be assessed for suitability of the hardware as
well as the costs thereof.
Should the software be developed or bought? Quotations in this regard
should also be obtained. Will the hardware be able to accommodate the
chosen software?
Will the purchase be a lease or purchase (cash/credit) agreement?
Consideration should also be given to the tax implications.
The system specifications and programming should be documented clearly
and concisely.
Predetermined programming standards should be applied in the
development of each phase and any non-compliance should be identified
and investigated.
Programmers should not develop in the live environment (they should not
have access to the live environment), but only in the development
environment.
Programs and systems should be tested meticulously before they are
installed or used.
Program coding should be tested by the programmers (e.g. using test
data).
The overall system should also be tested by system and program analysts.
Output by the system should also be tested by management, users and
auditors in order to ensure that it meets their requirements.
•
The results of the above-mentioned testing should be reviewed by all those
involved to establish whether all the required changes have been made.
• Management, users and IT staff should then give their final approval for the
implementation of the new system.
179
AUI4863/SG
Training of users
•
•
Staff members who will be using the new system should be adequately
trained in this respect. For this purpose, a detailed programme should be
set up, including training dates and times.
The user procedure manuals should be updated regularly and clear job
descriptions should be compiled/updated.
System
documentation
Clear system documents should be maintained (e.g. documentation with
regard to system descriptions).
Backups
All programs must be properly backed up and stored in an off-site location.
When transferring data and information from the old system to the new
system, it is imperative that the data and information be accurate, complete
and valid.
•
Conversion
•
•
•
•
•
•
Post-implementation
review
The conversion must be properly planned. This includes a detailed plan
with the dates, time frames and conversion methods (e.g. parallel
processing, immediate shutdown of old system, conversion of the entire
system at one time, or phasing one system out and the new system in).
The conversion process must be treated as an entire project on its own.
Data and files should be prepared for conversion. Files on the old system
should be balanced prior to conversion (e.g. control totals and other
controls used to ensure that data are valid, accurate and complete). Data
on the old system should be checked and discrepancies followed up
immediately. The data should be authorised by the appropriate senior staff
members before conversion. Staff should be thoroughly trained on the new
system and the premises should be prepared (e.g. there should not be
power interruptions).
The conversion process should be supervised (by relevant senior
personnel), and the internal and/or external auditors should preferably be
present.
The system should be tested after conversion. This can be done through
control totals (testing the balances on the old system against those on the
new system), performing file comparisons, using output (printouts) from
the new system and comparing it to source data on the old system,
following up on exception reports (through programmed checks),
obtaining approval from the users (giving it their “thumbs up”), confirming
data with third parties, if applicable, etc.
All system descriptions, flow charts, manuals, etc should be updated
immediately.
Backups should be made of the new system and files.
A post-implementation review should be conducted to determine whether
all the needs and requirements (of the users, auditors, management and IT
staff) are met by the new system, and whether the system is operating as
intended.
This review should be conducted in order to determine whether the
development and implementation has been a success, and to address any
problems.
180
Purchased packages
Another term for purchased packages is off-the-shelf packages. This simply means that the IT
system is available not only to you, but to anyone willing to buy it. This purchased IT system is
unfortunately not custom-made for the entity and it is often impossible to adapt it to individual
needs. The entity and the user have very limited control over the specifications, development,
testing and design of the system. It is therefore important to look for a package that suits most of
the needs so that it requires few, if any, changes.
The following table reflects the different stages of the process of purchasing a package and the
controls that should exist in this regard:
CONTROLS OVER PURCHASED PACKAGES
Performing a
feasibility study
•
Authorisation/
approval
Management, users, IT staff, etc have to approve the package before it is
purchased. This approval is based on the results obtained from the above
feasibility study.
Implementation
Refer to notes under “Conversion” in the previous table (Controls over systems
developed in-house) for the controls over implementation of the new system.
A feasibility study should be carried out, bearing the following in mind:
- The requirements of the users (employees, management, auditors and
IT staff) should be identified.
- Available packages’ specifications and requirements should be
identified.
- The costs relating to the purchase of the new system, as well as other
operating costs (e.g. maintenance costs), should be identified.
- The availability of maintenance and technical support for the supplier
should be considered.
Consideration must be given to the adaptability of the new system to
changes in the business, industry, etc.
The financial standing and reputation of the supplier: if the supplier is
experiencing financial difficulties, the entity should probably not do
business with him/her.
Enquiries should be made of other users of the package (who have
already purchased the same product and have been using it for some
time). Obtain general information from them, such as the frequency
of errors experienced, the speed of the system, its effectiveness and
ease of use.
An arrangement could be made with the supplier to test the system
before it is implemented.
181
AUI4863/SG
18.6 CONTROLS OVER PURCHASED PACKAGES
The following engagement procedures can be performed by the auditor in relation to the various
stages of the system development and implementation process (please note that these are only
examples and that any other valid procedures can also be considered, depending on the entity and
the IT system).
The following engagement procedures, as referred to in Watne and Turney, Auditing EDP systems
(1984), can be performed:
ENGAGEMENT PROCEDURES
If the auditors plan to assess control risk at a low level on the systems development process, their
audit program should include one or more of the following:
• Review the systems development standards manual to determine the existence of policy and
guidelines. Evaluate the thoroughness and comprehensiveness of the standards and be sure that
the standards are updated on a regular basis.
• Select applications from those under development and from those in operation. Review the
related systems development documentation to determine whether the standards are being met.
• Interview management, systems development and user personnel regarding the adequacy of
systems development standards.
If the auditors plan to assess control risk at a low level on programming conventions and procedures
as an internal control, procedures to obtain an understanding of the internal control structure and
engagement procedures should include the following:
•
•
Review the programming standards section of the systems and procedures manual to determine
whether standards are reasonably comprehensive.
Examine the selected flowcharts, decision tables and coding sheets to verify that standard
programming conventions and procedures are being followed.
If the auditors plan to assess control risk at a low level on participation by the user, accounting and
audit personnel, then procedures to obtain an understanding of the internal control structure and
engagement procedures should include one or more of the following:
•
•
Interview representatives of the user and accounting departments for evidence of the level of their
participation in the systems development process.
Review appropriate documents and related approvals for evidence that the user and accounting
departments have an adequate understanding of system inputs, processing procedures, controls
and system outputs.
If the auditors plan to assess control risk at a low level on technical, management, user and auditor
review and approval, they will perform procedures to obtain an understanding of the internal control
structure and engagement procedures using one or more of the following:
•
•
•
Review the section of the systems development standards manual that covers review and approval
requirements.
Interview technical staff, management and users to determine the process of review and approval.
For selected applications developed during the accounting period, review technical and output
documentation for written evidence of approval by technical supervisors, management and users.
182
If the auditors plan to assess risk at a low level on the control of system testing, they will need to
review new systems that were developed and implemented during the accounting period, as well as
the written standards for system testing. Procedures to obtain an understanding of the internal control
structure and engagement procedures of the standards and of one or more of the new systems should
include the following:
•
•
•
•
•
•
•
•
Review standards for system testing for comprehensiveness.
Interview internal audit and user staff to determine the extent of their involvement in testing.
Review test data and the resulting output for selected new systems to determine whether testing
is reasonably comprehensive.
Review the results of program and string tests (tests applied to programs, but instead of being
applied to a single program, they are applied to a string of logically related programs), including
flowcharts and logic analyses, to ensure that such tests are thorough and comprehensive.
Review the results of system tests of valid and invalid transactions to ensure that the system as a
whole is being tested adequately.
Review the procedures for reconciling output produced during the pilot (processing of an actual
period’s transactions on an after-the-fact basis) and parallel testing (where the old and new
systems are run in parallel, with subsequent comparison of the output from both systems).
Examine programs used to compare output files in pilot and parallel tests.
Examine reconciliations for selected tests to determine whether discrepancies were corrected by
systems personnel.
If the auditors plan to assess risk at a low level on final approval as a general control, they should
perform either or both of the following:
•
•
Review evidence of the approval of new applications by management, users and IT personnel.
Evidence may include signatures on system documentation, minutes of meetings, letters or
reports demonstrating approval.
Interview management, users and IT personnel involved in the final approval process, inquiring
about their understanding of the system and their satisfaction with its specifications.
If the auditors plan to assess risk at a low level on conversion control as a general control, they should
perform the following:
•
•
•
•
Review plans for controlling the conversion from one system to another to determine whether
they are sufficient to ensure that data on the new files are accurate and complete.
Examine documentation for evidence of file conversion approval.
Evaluate the procedures used to reconcile the original and new files.
Review or observe the use of record comparisons and confirmation requests.
If the auditors plan to assess risk at a low level on the general control of post-implementation review,
the procedures to obtain an understanding of the internal control structure and engagement
procedures should include the following:
•
•
•
•
•
Examine discrepancy reports for evidence of appropriate correction of errors.
Test the conversion by tracing record data from the original files to the new files and also from the
new files to the original files.
Review internal audit working papers for conclusions on the operation of system control and on
the effectiveness of the systems development process.
Interview systems development staff, users and management to determine their views on the
effectiveness of controls in the system.
Review the final report of the post-implementation review committee.
183
AUI4863/SG
18.7 CONTROL CONCERNS ASSOCIATED WITH ADVANCED IT
ENVIRONMENTS
Depending on the complexity of the system, control procedures and designs in an information
technology environment can vary from basic to very sophisticated. A less sophisticated computer
environment will generally provide complete audit trails which, together with exception reports,
allow for control to be exercised manually (i.e. checking or reconciling data generated by the
computer system with externally held data.) Advanced computer systems, on the other hand,
require more complex controls owing to the absence of audit trails. Advanced computer systems
could display some or all of the following characteristics:
•
•
•
•
•
•
•
•
•
•
•
absence of input source documents
authorisation of input controlled by the computer, e.g. passwords
online data input
real-time update
a single transaction updating multiple files
extensive use of automated controls to ensure completeness, accuracy and validity of input and
processing
application controls not evidenced by output from the computer
absence of management or audit trails
programs that automatically generate material transactions or entries directly to another
program
programs that perform complicated computations of financial information and/or automatically
generate material transactions or entries that may not be validated independently
transactions that are exchanged electronically between two or more organisations
computer systems with little or no manual review
18.8 AUDTING ADVANCED IT ENVIRONMENTS
Advanced IT environments are having a substantial impact on the work of the internal auditor.
Although the audits of advanced IT systems have to be performed in compliance with the IPPF, the
auditor has to adjust his or her audit approach for advanced IT environments. The auditor should
perform a preliminary evaluation of the system of internal control and then study and evaluate it.
The auditor also has to collect sufficient audit evidence to form a basis for an opinion. The results of
engagement procedure should be considered to determine the reliability of the internal controls.
Advanced auditing techniques are used to audit computer programs and data files. These auditing
techniques include the use of test data, for example by means of entering test transactions through
an online terminal device or by using audit software. During the audit of an advanced system, the
use of a computer as an audit aid becomes very prominent. It has therefore become common
practice for auditors to make use of computer-assisted auditing techniques (CAATs) in these
advanced computer environments. A broad discussion of this topic is included in the next learning
unit.
184
ACTIVITY 40
What are the risks that might occur if the systems development exercise is not
carefully planned and controlled?
1.
FEEDBACK
2.
It is crucial that the system development exercise be carefully planned and controlled.
If not, the following risks might occur:
•
System development is a costly exercise. If it is not carefully planned and
controlled, costs might get out of control. This could potentially put the company
under severe financial constraint.
•
The new system might be susceptible to inaccurate or incomplete recordkeeping,
for example the programs might contain errors.
•
Unacceptable or inaccurate accounting policies might be incorporated into the
system, or important accounting policies might not be incorporated at all. The
system developers (e.g. programmers) might not understand the accounting
policies and might implement them incorrectly.
•
The new system might not accommodate the needs of the users. The users might
require certain functions that the new system is not able to perform
•
When transferring information from the old system to the new system,
information might be lost, duplicated or transferred (with errors).
•
The new system might not have sufficient controls over access to information and
the integrity of data.
•
If the new system is very complex, users might find the system useless if no one
knows how to operate it.
•
In extreme cases, system deficiencies could result in temporary or even
permanent business interruption.
•
The ability to commit fraud might be deliberately or accidentally designed into
the system during the development thereof.
185
AUI4863/SG
18.9 CONTROLS OVER PURCHASED PACKAGES
Another term for purchased packages is off-the-shelf packages. This simply means that the IT
system is available not only to you, but to anyone willing to buy it. This purchased IT system is
unfortunately not custom-made for the entity and it is often impossible to adapt it to individual
needs. The entity and the user have very limited control over the specifications, development,
testing and design of the system. It is therefore important to look for a package that suits most of
the needs so that it requires few, if any, changes.
The following table reflects the different stages of the process of purchasing a package and the
controls that should exist in this regard:
ACTIVITY 41
You are a team member engaged on the external audit of Client Ltd, a manufacturer and
supplier of specialised equipment. You are completing interim audit work at the
company for the financial year ending 30 April 2011.
Information about the business
Client Ltd maintains a substantial inventory of the component parts that it uses for
product assembly. Some of these components have significant value. The products are
assembled on a just-in-time basis. Component inventory is kept in a secure centralised
warehouse and is distributed to manufacturing facilities to meet production
requirements as and when customer orders are received. You are satisfied that there are
sound physical security measures in place to prevent unauthorised personnel and
vehicles from gaining access to the warehouse. Management has established policies
and procedures for storing and handling of inventory, which have been communicated to
warehouse employees.
The purchasing, goods receiving, inventory custody, sales and accounting functions of
Client Ltd are segregated.
Client Ltd has outsourced its distribution services to a third-party supplier, Distribution
Ltd. This includes the shipping of component inventory from the warehouse to the
manufacturing facilities. The requirements for service delivery are specified in a written
service level agreement, which covers responsibilities, price and insurance.
Description of internal controls for inventories
Client Ltd makes use of a batch input batch processing inventory management system
and all data capturing from source documents takes place in the computer centre. You
are satisfied that the staff involved in the receiving, custody and delivery of inventory are
competent, adequately supervised and provide evidence that they have followed control
procedures (e.g. signing of documentation as evidence of their work).
186
The management of Client Ltd has confirmed that the following key controls are in
place over the inventory receiving, custody and delivery functions at the warehouse,
and that these have not changed since the previous year.
Goods receiving area (receipt of components from suppliers into the warehouse)
1. Copies of purchase orders are filed in delivery date order, which ensures that
receiving department personnel are made aware of all expected deliveries.
2. Staff in the receiving department prepare goods received notes on which they
record the supplier, date received, and the actual quantity and condition of each
item received.
3. Goods received notes are matched (specification and quantity) with purchase orders
by the staff in the receiving department. Differences identified between goods
received and goods ordered are reported to the purchasing department and
management.
Inventory custody area (storage of components in the warehouse)
4.
Inventory is subject to periodic physical counts and resultant adjustments
(quantities and amounts) are reviewed and approved by an appropriate official.
These inventory counts are undertaken in a systematic manner, using prenumbered count sheets which are completed in ink and signed by the counter on
completion.
Dispatch area (dispatch of components from the warehouse to the manufacturing
facility)
5.
6.
7.
Customer order documents are pre-numbered and missing documents are
investigated on a timely basis.
The specification and quantity of components transferred to the dispatch area are
compared with an authorised customer order and related delivery documents prior
to loading.
Delivery documents (including bills of lading) are signed by the delivery personnel of
Distribution Ltd to confirm acceptance of quantities shipped to production.
Maintenance of standing data
8.
Changes made to inventory master files are approved, prior to input, by an
appropriate official. Pre-printed sequence numbers are used on standing data input
forms and checks are performed to ensure that all numbers are accounted for.
Draft report on information technology (IT) general controls
The following is an extract from the draft report prepared by your firm’s IT audit
specialists following their review and testing of IT general controls of Client Ltd. The
extract summarises weaknesses identified during the review.
187
AUI4863/SG
Description of weakness
Recommendation
Management comment
1.
During our inspection of signed
authorisation forms supporting a
sample of transfers of program
changes from development into
production (drawn from the log of
program changes), we could not
locate five such forms. These
forms relate to program changes
implemented during the year to
the salaries and wages system.
Written authorisations
should be maintained on file
for all transfers of program
code from development into
production.
There is a documented
process requiring written
authorisation for the
implementation of all
program changes. These
forms have obviously
been misfiled and we will
endeavour to locate these
for audit inspection.
2.
The log of changes to access
rights on all application systems is
deleted after six weeks. No backup is maintained for future
reference.
A back-up copy of the log of
changes to access rights
should be maintained in
accordance with the standard
document retention policies
of the company.
3.
Some of the personnel working
on the IT support help desk do
not have adequate formal
qualifications or experience to be
effective in their role. The
purpose of the help desk is to
support users in resolving queries
about key applications.
Personnel working on the
help desk should undergo
additional training in new
applications.
This log is deleted on a
rolling basis once entries
are six weeks old in order
to free up server capacity.
Hard-copy user requests
for access changes are
maintained on file and are
available for inspection.
Recruitment of
appropriate support
personnel is the
responsibility of human
resources.
We will reassess the
competency
requirements and
determine whether
further training is
necessary.
REQUIRED
(a) Identify and state the internal controls listed above that address the existence of
inventory. For each such control, describe the control objective (i.e. how the control
supports the existence assertion) and additional information (if any) you would
require from Client Ltd management to enable you to assess whether the control
has been appropriately designed to prevent or detect and correct misstatements
relating to the existence of inventory.
• You should present your answer in table format.
• Ignore the possible effect of the weaknesses in the IT general controls
identified in the draft report.
(b) Describe the audit risks arising from the control weaknesses identified by your IT
audit specialists during the interim audit and state the appropriate audit response to
each risk. You are not required to formulate audit procedures.
188
3.
FEEDBACK
4.
Part (a)
Internal controls implemented over existence of inventory and additional information
required to assess whether the control has been appropriately designed:
Internal control
Implemented over
existence of
inventory
Control objective
(How the control
supports the existence
assertion)
Additional information required to assess
appropriateness of design
Component
inventory is kept in a
secure centralised
warehouse/ access to
the warehouse is
controlled.
Goods received notes
(GRNs) are prepared
by staff in the
receiving
department; these
notes identify the
supplier and the
actual quantity and
condition of each
item received.
Inventory is safeguarded
against unauthorised
removal.
•
•
Goods received notes are
prepared based on goods
actually received at the
warehouse.
•
•
•
•
•
Inventory is subject
to periodic physical
counts and such
counts are
undertaken in a
systematic manner.
Recorded inventory is
physically checked for
existence and/or to detect
differences be-tween
physical inventory and
recorded inventory.
•
•
•
•
•
•
•
189
What special precautions are taken to
safeguard small high-value component
inventory which can be easily concealed?
Are logs of physical access maintained
and reviewed in order to detect unusual
activity?
How diligently are the goods received
counted?
What controls ensure that only valid
goods received notes are recorded in the
inventory management system (i.e. are
there sound batch controls in place over
these GRNs)?
How is inventory physically safe-guarded
in transit between receiving and custody?
Does the warehouse staff compare the
quantities received with the details
recorded on the GRNs?
Are adequate controls in place over
unused stationery (i.e. GRNs/delivery
documents)?
Is the team performing the cyclical counts
independent of the custody function?
What is the extent of coverage of these
cyclical counts?
Are discrepancies identified during
inventory counts appropriately
investigated?
Is an appropriately documented inventory
count plan available prior to the count,
outlining the systematic procedures?
Is the movement of inventory controlled
during the count?
Is there additional focus on counting the
small high-value items?
Are count sheets properly controlled after
the count but before the input of
AUI4863/SG
Internal control
Implemented over
existence of
inventory
Control objective
(How the control
supports the existence
assertion)
Additional information required to assess
appropriateness of design
Adjustments
resulting from the
periodic physical
counts are reviewed
and approved by an
appropriate official.
Unauthorised adjustments
cannot be made to
conceal shortages.
•
The specification and
quantity of products
retrieved from
custody are
compared with an
authorised sales
order and related
delivery documents
prior to loading.
Delivery documents
(including bills of
lading) are signed by
carriers, indicating
acceptance of
quantities delivered.
Missing customer
order documents are
investigated on a
timely basis.
Management has
established policies
and procedures for
storing and handling
of inventory,
including segregation
of incompatible
duties, which have
been communicated
to warehouse
employees.
Data is input using a
batch input batch
update inventory
management system
Inventory is removed from
custody only in terms of
an approved sale
transaction (i.e. the theft
of inventory is prevented).
•
The quantities per the
delivery documents are
subject to an
external/independent
check.
•
Missing customer orders
may indicate an
unrecorded physical
movement in inventory.
A sound control
environment, including
the segregation of
incompatible duties,
reduces the risk of
inventory loss.
•
Quantities recorded in the
inventory management
system are accurate.
•
•
•
•
•
•
190
adjustments (if any) to the inventory
records?
Having reviewed the adjustments, is
appropriate remedial action taken?
What controls are in place to ensure that
the recording of valid adjustments is
complete and accurate?
Does the review of adjustments include a
full re-count of inventory items with
identified differences?
Is the person who performs this control
independent of the custody function, and
how is it evidenced?
Are the delivery documents used for the
comparison sequentially numbered (and
subsequently sequence checked) to
facilitate the completeness of recording?
What happens if the quantities on the
delivery documents differ from the
quantities accepted?
Are adequate controls in place over
unused stationery (i.e. GRNs and delivery
documents)?
Is there a pattern to the missing
documents (especially since the last
physical count)?
Are employees aware of the policies and
procedures?
Are there any close relationships between
employees performing incompatible
functions?
Are batch listings agreed and/or
reconciled with pre-prepared batch
totals?
Internal control
Implemented over
existence of
inventory
Control objective
(How the control
supports the existence
assertion)
and all data capturing
from source
documents takes
place in the
computer centre.
The internal audit
Internal audit visits will
function of Client Ltd assist in identifying fraud
conducts surprise
or theft of inventory.
visits to the
warehouse to
perform audit
testing.
Additional information required to assess
appropriateness of design
•
•
Is the internal audit function competent?
Is the internal audit function
independent?
Part (b)
Description of the audit risk arising from the control weaknesses identified during the
interim audit and related audit response:
Risk identified
Computer audit findings
• Unauthorised/invalid program changes
may be made to the salaries and wages
system, which
– modify key application controls on which
the external auditor intends to rely, or
– result in misstatements in salary and
wages expense due to errors in program
logic relating to the processing of
transactions with employees
• The missing forms may indicate that the
completeness of program changes is not
monitored.
Audit response
For those sampled program changes with
missing authorisation forms, inspect evidence
of identity of programmer who made changes
(and user acceptance testing prior to
implementation of the software).
• Use the services of your firm’s computer
audit specialists to review the program
logic of the five program changes lacking
authorisation.
• Consider the need to extend the scope of
year-end analytical procedures and tests of
detail which provide evidence about the
“occurrence” and “accuracy” of salary and
wages assertions.
• If the signed authorised forms are
subsequently found, inspect these forms
for the authorised signatories.
• Inappropriate logical access may have been
assigned to users, increasing the risk of
employees performing incompatible
functions, thereby weakening the control
environment.
• Invalid transactions and/or adjustments
may be processed.
• Test a sample throughout the year of
compensating controls (if any) which give
evidence that user requests are
appropriately authorised and completely
and accurately processed.
• Review a sample of hard-copy requests for
changes to user access during the year to
determine whether the requests were
191
AUI4863/SG
• Data integrity may be compromised.
•
•
• Users may not have been suitably trained to
operate the system, resulting in the
incomplete or erroneous input of
transactions and adjustments.
•
•
appropriate (i.e. they did not undermine
segregation of duties).
Review program change logs more
frequently throughout the year (i.e. before
deletion).
Consider the need to extend the scope of
analytical procedures and tests of detail
that provide evidence about the
“occurrence” and “existence” assertions.
Assess whether the edit/validation controls
are appropriately designed to detect and
prevent the erroneous input of transactions
and adjustments, and to test their
operating effectiveness throughout the
year.
Extend substantive testing of affected
financial statement items.
ACTIVITY 42
Indigenous Nursery (Pty) Ltd is a specialist nursery that sells only indigenous plants,
bulbs and seeds from their garden centre in Cape Town. Customers select the products
they want to buy from those available in the garden centre and pay at one of the pointof-sale (POS) terminals at the centre. These sales are recorded directly via POS
terminals onto AccSoft, the company’s off-the-shelf accounting package.
After numerous requests from the public, management has decided to acquire a website
to enable other nurseries and customers not based in Cape Town to purchase their bulbs
and seeds over the internet.
Indigenous Nursery (Pty) Ltd entered into a contract with NetService, a third-party
internet service provider, to design, implement and maintain the website
www.indigenous.co.za on its behalf. Indigenous Nursery will remain responsible for the
site content and specifications. It has been agreed that Indigenous Nursery will e-mail
the website administrator of NetService any new products and price details as and when
required. All prices are given in South African rand and payments from customers are
only accepted in this currency. The internet payment facility has been outsourced to
PayFriend.
NetService will automatically e-mail the details of each internet sales transaction to
sales@indigenous.co.za as soon as PayFriend informs NetService electronically that a
customer’s payment has been successful. Every Friday morning, Tracy, one of the
cashiers, will capture these e-mails as sales orders into AccSoft’s sales order processing
module. The system will generate picking slips from the sales orders that have been
captured. The picking slips will trigger any one of the five sales assistants to pick the
items ordered, to tick off the picked items on the picking slip and to pack them securely
for delivery to the internet customers. The ticked picking slips will be sent to the sales
manager, who will convert each picking slip to a sales invoice on AccSoft.
192
The printed sales invoice, clearly showing the delivery address, will be inserted into a
plastic folder and taped to the package. An administrative assistant will post the
packages to the internet customers at the local post office every Monday morning. The
administrative assistant will then file the post office slips for future reference in case any
delivery complaints are received from customers.
Required:
(a) Identify the risks associated with the new internet sales system introduced by
Indigenous Nursery (Pty) Ltd. Consider all aspects of the sales system. For each risk
you have identified, provide a brief reason why you consider it to be a risk.
(b) Identify the controls that should be in place to ensure that all changes to the
internet product details and prices on Indigenous Nursery’s website, as sent via email to the website administrator of NetService, are valid, accurate and complete.
FEEDBACK
(a)
Risks in proposed new internet sales of Indigenous Nursery:
Risk
Dependence on NetService, the internet
service provider, otherwise sales might be
lost.
Dependence on PayFriend and their
programmed controls, otherwise there will
be direct losses for payments not received.
Liability for losses suffered due to
insufficient payment security.
Reason/Weakness
Indigenous Nursery’s website has to be available
24 hours a day.
Indigenous Nursery has no control over the
collection of the payments.
This is a legal requirement, regardless of
outsourcing: see Electronic Communications
and Transactions Act.
Legal risk in terms of site content and This is a legal requirement, regardless of
confidentiality of information.
outsourcing, and Indigenous Nursery agreed to
remain responsible for site content and
specifications.
Dependence on technology.
They need access to their e-mail to execute the
internet sales.
Repudiation of transactions.
It is difficult to establish the identity of the
customers over the internet.
Unauthorised changes to the contents of Changes to the website are based on e-mails
the website.
only.
Risk of errors in the sales process.
Employees will be inexperienced in using the
new sales process.
International laws may be broken.
Plant material may not be exported to restricted
countries.
193
AUI4863/SG
Risk
Late delivery of products, leading to
cancellation of sales.
Not all internet orders received are
processed, leading to loss of reputation
and additional administration to return the
payments already received.
The cashier capturing the e-mails as sales
orders might not capture the information
accurately.
There is no proof of delivery document on
which the client must sign as proof of
acceptance.
Reason/Weakness
The internet orders are executed only once per
week, after an extended process.
There is no independent review to ensure
completeness and/or pre-numbered internet
sales orders.
This could lead to incorrect sales amounts
(incorrect price and quantities) being captured,
which might affect sales.
If a person receives goods incorrectly and does
not have to sign for them, they will probably not
send the goods back. This will lead to financial
losses for the company.
Indigenous Nursery is unable to fulfil the Availability of stock is not updated on the
internet orders received owing to a lack of website by e-mail and/or the website and
stock. (Again, this leads to a loss of accounting software is not integrated yet.
reputation and additional administration
to return the payments already received.)
Delivery of the products to the wrong The cashier will have to retype the customer
customer address.
details from the e-mails, without independent
review to ensure accuracy.
Delivery of the wrong product types and The product details and quantities will have to
quantities.
be retyped by the cashier from the e-mails,
without independent review to ensure accuracy;
in addition, nobody compares the contents of
the packages with the sales order before they
are sealed.
Theft of products by the sales assistants.
The sales orders are not signed by the sales
assistants to identify who is responsible, and the
packages are already sealed when handed to the
sales manager.
Sales recorded on the wrong date Sales are recognised when the invoice is
(timing).
prepared two days before postage.
The packages could be lost in the post.
The delivery address is only taped to the
package and no return to sender or contact
information is included on the package.
Dependence on the postal service The postal service provider(s) will have to deliver
provider(s).
goods promptly within agreed time frames to
ensure that the quality of bulbs and seeds is not
affected.
Theft of products by the administrative Insufficient segregation of duties, as the
assistant.
administrative assistant both posts the
packages and handles the customer complaints.
Payments are received by PayFriend, but There are no controls regarding reconciliation of
not paid over to Indigenous Nursery.
the payments received from PayFriend with the
internet sales made.
194
(b) Controls to ensure changes to website products and prices via e-mail are valid,
accurate and complete:
Preparing and sending of the e-mail – Indigenous Nursery
The change request to NetService should
• be prepared by someone other than the authoriser, such as the administrative
assistant (segregation of duties)
• be prepared on an official change request form (which must be attached to an
official letterhead of Indigenous Nursery)
• have a sequential number
• contain standard layout and wording, clearly indicating the nature of the change
required (e.g. new product, change of product description, price change or remove
product)
•
•
•
be signed by the sales manager as proof of authorisation
be sent via one authorised terminal only and be protected by username and
password
be in the form of an encrypted e-mail
If the change request was printed and signed, it should be scanned into a format such as
PDF, which does not allow changes to be made.
or
If the change request was signed electronically, it should be converted into an electronic
format that does not allow changes to be made (e.g. in PDF).
The change request (PDF file) should be e-mailed as an attachment by the sales manager
(it should not be returned to the preparer of the change request).
The e-mail should be sent to the e-mail address of the website administrator of
NetService, and the e-mail settings should require both a delivery and a read receipt.
The administrative assistant should be copied in all the e-mails between the sales
manager and the website administrator.
The original authorised change request (or a printout of the electronically signed change
request) should be filed in sequential order, together with a printout of the e-mail to the
website administrator.
Receiving the e-mail, updating the website details and general website security –
NetService
The website administrator should accept a change request only if it appears authentic,
which implies that
• it is on the official letterhead of Indigenous Nursery
• it follows in numerical sequence on the previous change request
• it contains the standard layout and wording
195
AUI4863/SG
•
it was signed by the sales manager of Indigenous Nursery
The website administrator should phone the sales manager of Indigenous Nursery if
anything seems suspicious, or if there are any missing sequential numbers for the change
requests.
The website administrator should make a screenshot of the details on the Indigenous
Nursery‘s website after the change and e-mail it back to the sales manager at Indigenous
Nursery.
Security controls at NetService should include the following:
• Strict access controls should prevent anyone other than the website administrator
from making changes to the website.
• A firewall should prevent unauthorised access to the web server of NetService.
• The system should regularly and automatically compare the actual website contents
with the stored images of the website to identify any possible unauthorised
changes.
• Available vulnerability assessment tools should be used to evaluate the security of
the web server of NetService.
Receiving confirmation of the change – Indigenous Nursery
• The sales manager should print the screenshot received from NetService, match it
with the filed change request and compare the details thereon.
•
The sales manager should date and sign the printed screenshot as proof of
comparing the details with the change request.
•
Unmatched change requests should be followed up by the sales manager.
•
There should be a register with all the change requests. This should be
inspected/reviewed at least once a week by an independent manager at Indigenous
Nursery.
•
There should be a reconciliation between change requests and actual changes
made.
•
The sales manager should print the product and price details from the website of
Indigenous Nursery regularly and compare them with the product and price details
on AccSoft.
The auditing of advanced IT systems and applications forms part of information
management and usage monitoring. The analysis, evaluation and design information,
together with data and application architecture, are evaluated as tools for the auditor.
When a new system is developed, the internal auditor should preferably be involved in
the process from the start, as he/she can give valuable input.
196
SUMMARY
This topic discussed the auditing of advanced IT systems and explained the risks and
controls that relate to advanced IT systems and the formulation of an audit approach for
auditing advanced IT systems.
Learning unit 7.1 discussed the concept of IT controls. The management of an
organisation is responsible for establishing the required control measures to ensure that
the IT system of the organisation is adequately protected and that the system meets the
required operational needs. You as the internal auditor should be able to identify these
controls in any IT environment and evaluate the impact of the general and application
controls on the overall business of the organisation.
In this learning unit the concepts of general and application controls were discussed in
detail.
Learning unit 7.2 discussed auditing advanced and newly developed IT systems.
This learning unit described how transaction processing is affected by the utilisation of
advanced or complex computer technology and how internal auditors should go about
conducting audits of advanced and newly developed IT systems.
In this learning unit the following aspects regarding IT systems were discussed:
• advanced IT systems
• systems development
• the internal auditor’s role in systems development
• controls relating to IT systems development
• auditing systems development and implementation processes
Now that you have studied the learning units in this topic, are you able to do the
following?
• Understand the risks related to advanced IT systems and perform a risk analysis in a
given scenario.
• Explain and evaluate the controls relating to advanced IT systems.
• Develop an audit approach to evaluate advanced IT systems and applications.
197
AUI4863/SG
TOPIC 7
Performing information technology-based
audits
Contents
LEARNING UNIT 19:
Auditing in an IT environment
200
LEARNING UNIT 20:
Computer assisted audit tools and techniques (CAATTs)
211
LEARNING UNIT 21:
Factors to be considered in the choice and use of audit software
LEARNING UNIT 22:
Corporate IT governance
220
223
INTRODUCTION TO AND PURPOSE OF THE TOPIC
The use of information technology (IT) forms part of everyday life for most internal auditors – they
carry out and document their work using laptops and they are required, at the early stages of the
audit engagement, to obtain an understanding of their clients’ accounting and information
systems, most of which are computerised. (Jackson & Stent 2007:8/3)
The overall objective and scope of an audit engagement do not change in an information
technology (IT) environment. The use of a computer does, however, change the method of
recording information, and the processing, storage and communication of operational and
financial information. An IT environment is any environment where a computer, of any type or
size, is used in the processing of financial and other management information.
198
In this topic we will look at auditing in an IT environment, computer-assisted audit tools and
techniques (CAATTS) and audit software.
Computer-assisted audit techniques are exactly what the name says, i.e.: making use of a
computer to assist the internal auditor in carrying out the audit engagement. Although there are
some extremely powerful and complex software packages available to assist in performing audits,
the concept is simple: wherever it is economical and efficient to do so, the power, speed and
versatility of the computer should be harnessed to assist with the audit engagement.
We will also provide a brief overview of corporate IT governance as good governance has become
very important in view of the global requirements for transparency and accountability in
organisational stewardship.
MULTIMEDIA
Please access the podcast on myUnisa to assist you in your studies of topic 8.
LEARNING OUTCOMES
After you have studied this topic, you should be able to
•
•
•
•
understand and be proficient in the application of theoretical concepts underlying
CAATTs in the context of an IT environment
consider and adapt to all the factors relating to the application of CAATTs in the
audit process
explain and apply all aspects concerning an audit in the IT environment on an
integrated level
consider all the factors that should be taken into account when deciding on audit
software
199
AUI4863/SG
Learning unit 19
Auditing in an IT environment
Contents
19.1 INTRODUCTION
200
19.2 THE EFFECT OF AN IT ENVIRONMENT OF THE AUDIT PROCESS
201
19.3 APPROACH TO AUDITING IN AN IT ENVIRONMENT
204
19.4 NATURE OF AUDIT EVIDENCE
204
19.5 PERFORMING
205
19.6 PERFORMING SUBSTATNTIVE TESTS IN AN IT ENVIRONMENT
205
19.7 TIMING OF AUDIT PROCEDURES
206
19.8 EXTENT OF AUDIT PROCEDURES
206
19.1 INTRODUCTION
In today's business environment most audit clients use information systems to process financial and
management information. The use of information systems to process financial and other
information has an effect on an entity's accounting system and internal controls.
In this learning unit we will look at the effect of an IT environment on the audit process, including
the following concepts:
•
•
•
•
Approach to auditing in an IT environment
The nature of audit evidence
Engagement procedures related to an IT environment
Engagement procedures
200
An Information Technology (IT) environment influences the procedures followed by an auditor in
the following respects:
•
•
•
It affects the engagement procedures that need to be carried out in order to obtain a sufficient
understanding of the accounting and internal control system of an organisation.
A computerised information system (CIS) environment influences the factors that should be
considered in respect of the inherent and control risk of an organisation in order to reach a
decision on the audit risk an auditor would be prepared to accept.
It affects the design and performance of engagement procedures and substantive procedures
in order to achieve the audit objectives.
REFLECTION
You were given a lot of exposure to IT auditing in your undergraduate studies. It is
important that you revise all the topics relating to the IT environment before you
continue with the rest of this learning unit.
STUDY
Performing Internal Audit Engagements (2017: par 2.1–2.5)
Ensure that you are familiar with all the concepts that relate to the IT environment.
19.2 THE EFFECT OF AN IT ENVIRONMENT OF THE AUDIT PROCESS
The main phases in the audit process are not different when auditing in an IT environment, but the
following activities will be affected:
•
•
•
planning
study and evaluation of information systems and internal controls
performing engagement procedures (engagement procedure and substantive)
In practice the auditor will encounter different computer environments, which may include
mainframe computers, mini-computers and micro-computers.
The processing method within such environments could include:
•
•
•
batch entry with batch processing/update
on-line entry with batch processing/update
on-line entry with real-time processing/update
The processing could involve distributed data processing or even the use of a computer service
bureau. Each of these processing methods affects the audit process in a different way. The
organisation's use of computer systems may offer the auditor the opportunity to improve the
efficiency and effectiveness of the audit through the use of appropriate computer-assisted audit
tools and techniques (CAATTs).
201
AUI4863/SG
STUDY
•
•
Internal Auditing: An Introduction (2017, par 7.10)
GTAG 11 – Developing the IT Audit Plan
Take note of the changing role of the IT auditor as well the role in terms of controls.
MULTIMEDIA
View the Powerpoint presentation on myUnisa – GTAG 11 Developing the IT Audit Plan to assist you in your studies.
ACTIVITY 43
Part A
A retail company wishing to computerise their credit sales system might adopt one of
the following three data processing methods:
1.1
1.2
1.3
Batch input / batch processing
Online input / batch processing
Online / real time processing
You are required to outline the steps in the above methods of data processing for a
credit sales system indicating the files which would be created in the process. You are
NOT required to discuss controls within the systems.
Part B
Members of the public are often exposed to online real time computer systems, for
example when booking a seat on an airline or a ticket for a cinema through a call
centre. As these systems very often do not have source documents, specific control
techniques are required.
You are required to indicate the controls that should be implemented to ensure that
the person making the booking enters the correct information.
(Source: Dynamic Auditing)
FEEDBACK
PART A
1. Batch system – sales
1.1
Invoices are collected into distinct batches in the user department – e.g. sales
invoices. (manual procedure)
202
1.2
Details from the invoices within the batch are keyed into the computer and
stored on a "batch file" at a specific time and date.
1.3
The batch file would be validated and sorted into debtors’ master file record
sequence (alphabetic debtors) to create a "sorted sales transaction file".
1.4
On a predetermined day (say, 25th each month) the existing debtors master file
would be updated from the "sorted sales transaction file" to produce the current
debtors master file.
2. Online capture/batch processing – sales
2.1
A sales order, for example taken over the telephone, would be keyed in via a
terminal directly onto the "unsorted sales transaction file" (validation takes place
at this time).
2.2
This file would be sorted into debtors’ master file record sequence to create the
sorted sales "transaction file".
2.3
On a predetermined date, (say, 25th each month) the existing debtors master
file would be updated from the sorted "sales transaction file" to produce the
"current debtors master file".
3.
Online/real time – sales
3.1
A sales order will be entered into the system via a terminal (validation takes
place).
3.1.1 As entry takes place, the debtors master file (which will be right up to date) is
immediately updated.
3.1.2 A transaction log indicating the time and date of each online entry should be
created, but simultaneously with the master file update.
PART B
1.
Online entry controls
1.1
Terminal operators should be adequately trained.
1.2
Terminal operators should confirm verbally with the customer each piece of
information to be keyed into the terminal.
1.3
There should be computer-assisted procedures:
1.3.1 Screen formats should guide the operator in supplying the proper data in the
proper location.
1.3.2 Computer dialogue. This permits the computer to instruct the terminal operator
at each step in the data entry process. Until the necessary inputs are made, the
process cannot continue. The computer will indicate what is required.
1.4
The application program should contain controls which prevent “impossible"
bookings, e.g. an invalid seat number is entered.
203
AUI4863/SG
19.3 APPROACH TO AUDITING IN AN IT ENVIRONMENT
The application of audit procedures in computerised environments will be influenced by the method
of data processing. The nature of the audit procedures, being engagement procedures and
substantive testing, does not change. However, the computer environment may affect the
following aspects of the audit process:
•
•
•
•
nature of audit evidence
procedures used to obtain the evidence
timing of the procedures
extent of the procedures
In performing these audit procedures, the auditor can use either manual auditing procedures,
CAATTs or a combination of both.
STUDY
•
•
•
Assurance: An Audit Perspective (2018), Chapter 8
Internal Auditing: An Introduction (2017), par 2.1.3 & 7.10
Performing Internal Audit Engagements (2017), par 2.1.3, 2.2
19.4 NATURRE OF AUDIT EVIDENCE
The principles relating to obtaining audit evidence do not change because the audit is being carried
out in an IT environment. In simple applications, the auditor may obtain sufficient audit evidence to
satisfy a particular objective relying solely on manual controls, for example reconciliation of input to
output. In advanced and more complex systems this may not be possible, e.g. due to the volume
and complexity of the information systems.
When auditing in an IT environment the auditor may be faced with one or a combination of the
following conditions
•
•
•
the absence of input documents
generation of accounting transactions by computer programs
the lack of visible audit trails
The above conditions may preclude the auditor from examining documentary evidence and
manually tracing information through the computerised system, and alternative procedures to
obtain audit evidence may need to be adopted. In these situations, the effectiveness and efficiency
of audit procedures may be improved through the use of CAATTs in obtaining and evaluating
audit evidence.
204
19.5 PERFORMING ENGAGEMENT
ENVIRONMENT
PROCEDURES
IN
AN
IT
The procedures involved in designing and performing the engagement procedure necessary to
ensure the effective operation of controls do not change in a computerised environment.
Having identified the nature of the control on which reliance is intended to be placed, the auditor
must design and perform appropriate an engagement procedure to ensure that the control has
been operating effectively.
Evidence must be obtained to support the effective operation of the control throughout the period
of intended reliance. The controls to be tested may be either manual controls or automated
controls. In the latter case the auditor may need to obtain evidence of the effective operation of
certain computer environment controls. In performing engagement procedures, the auditor will
align the audit tests to be performed with the following control objectives:
•
•
•
Completeness. All transactions are recorded and no transactions are omitted (e.g. sequential
numbering of source documents, where available, ensure that all transactions are recorded).
Accuracy. All transactions are recorded at the correct quantity and prices (e.g. the computer
matches delivery notes, order forms and master file information with the generated invoices to
ensure that the correct quantities and prices are used).
Validity. Recorded transactions have actually occurred and are supported by sufficient
documentation and audit evidence (e.g. specific manual authorisation is required for overriding
the system).
Please note that the control
objective of validity should be
formulated in terms of the
management assertion of
“occurrence”.
19.6 PERFORMING SUBSTANTIVE TESTS IN AN IT ENVIRONMENT
When records and information are maintained by a computer, the objectives of the substantive
procedures and the relationship between the system of internal control and the substantive
procedures remains the same as for a non-computerised system. The opportunity to make use of
audit software to examine the data held on computer files can result in a more efficient and
effective substantive approach, even if CAATTs have not been used in performing engagement
procedures.
Owing to the particular features of computer processing, certain substantive procedures either
need to be modified or become unnecessary. For example, it may be easier to carry out more
effective cut-off tests in computer systems, particularly in batch systems. The principal requirement
is to identify the last processing run for sales, purchases and inventory movements in the period
being audited and to confirm, by reference to batches of input around that time, that the data were
captured in the correct period and that rejections were properly dealt with.
205
AUI4863/SG
19.7 TIMING OF AUDIT PROCEDURES
The timing of audit procedures may be affected because data may not be retained in computer files
for a sufficient period of time to allow for auditing. The auditor may have to make specific
arrangements to have the data retained or copied.
Another consideration with respect to timing is that test data only provides evidence that the
automated control is operating at the time the check was performed. Additional evidence or
additional runs of the test data would be required to ensure the continued operation of the control
throughout the period under review.
19.8 EXTENT OF AUDIT PROCEDURES
As is the case when testing manual systems, it is not possible to prescribe hard and fast rules for
determining the extent of audit procedures. That remains a matter of judgement by the auditor in
the light of all relevant factors.
In computerised environments two general factors may justify a reduction in the extent of audit
procedures compared to manual systems:
•
•
the increased information that can usually be obtained from other audit procedures based on
improved account analysis for analytical review purposes
where substantive procedures are carried out on data generated by automated controls (e.g.
valuations of stock, depreciation calculations), considerable reductions can often be made in
comparison to the levels of procedures carried out in manual systems
STUDY
•
•
Performing Internal Audit Engagements (2017: par 2.1.3)
Internal Auditing: An Introduction (2017: 7.10)
Ensure that you are familiar with all the terminology and concepts explained regarding
the IT audit process.
ACTIVITY 44
You are a senior internal auditor at Go Cars (Pty) Ltd, a motor spares outlet, which is
situated in an industrial complex in Durban. The outlet is very busy and is getting busier.
Go Cars (Pty) Ltd sells to other companies on credit and to the public. Due to the
upsurge in business, the directors are considering ways in which they can improve their
outdated computerised information system. One of the methods under consideration is
as follows:
The industrial complex in which Go Cars (Pty) Ltd is located, consists of 20 businesses
physically situated in the same building. One of the other occupants of the building is
Protec Ltd, a holding company in the industrial sector. Protec Ltd is responsible for the
data processing function of its group but for various reasons has found that its IT
206
resources are under-utilised. To fill this gap, Protec Ltd proposed to a number of the
businesses in the industrial complex that they enter into a contract whereby Protec Ltd
will capture various applications for those businesses. Protec Ltd has indicated that each
business will be linked by terminals to Protec Ltd’s IT system. The directors of Go Cars
(Pty) Ltd have arranged a meeting with the IT manager of Protec Ltd, to discuss this
proposal and have requested that you attend the meeting as they are not confident that
they are sufficiently knowledgeable to cover all matters which should be dealt with.
REQUIRED
a)
Discuss in reasonable detail, the matters which should be covered in the meeting
with the IT manager of Protec Ltd.
b)
Discuss the procedure and/or controls which you would recommend being
instituted if you were requested to assist in the conversion of their existing
outdated systems to the new system to be run by Protec Ltd.
FEEDBACK
a) The following matters should be dealt with in the meeting with the IT manager of
Protec Ltd.
1.
Hardware
1.1
1.2
It should be established who will purchase, install and maintain the terminals (and
the link) which will be located at Go Cars (Pty) Ltd.
Who will bear the cost and responsibility of insurance?
2.
Staff training and support
2.1
Agreement must be reached on initial and ongoing training of Go Cars (Pty) Ltd
personnel.
A help-line/liaison function should be provided to Go Cars (Pty) Ltd by Protec (Pty)
Ltd.
2.2
3.
Security arrangements
3.1
The security arrangements at Protec Ltd with regard to –
3.1.1 back up of company data files, reports, programs
3.1.2 confidentiality and integrity of Go Cars (Pty) Ltd data stored at Protec
(Pty) Ltd must be discussed. In this regard, access controls are of major
significance as Protec (Pty) Ltd plans to link a number of businesses to its
computers using terminals (apart from links which it already has with the
rest of the Protec group)
4.
Applications and software
It must be established
4.1 which of Go Cars (Pty) Ltd's applications will be processed by Protec Ltd
207
AUI4863/SG
4.2
4.7
whether they will be standard software packages (unlikely) or custom designed for
Go Cars (Pty) Ltd
who will have ownership of the software
what procedures will be adopted for the maintenance (amending, updating) of
software
what reports will be produced for management purposes e.g. exception reports
what enquiry facilities management and staff at Go Cars (Pty) Ltd would have and
whether they will be able to prints logs, reports etc as required
the controls over important matters such as amendments to master files
5.
Fees and charges
4.3
4.4
4.5
4.6
The basis of charging must be agreed upon specifically in respect of5.1 start-up costs and conversion to the computerised system
5.2 systems development/maintenance
5.3 processing of applications
5.4 stationery, e.g. supply of invoices, statements etc
5.5 escalation charges
6.
Penalty clauses
6.1
6.2
Penalty clauses must be established for situations where Protec Ltd and Go Cars
(Pty) Ltd fail to reach their respective responsibilities, especially with respect to
deadlines and provision of accurate systems.
Turnaround times should be discussed.
7.
Division of duties
7.1
The respective duties of Go Cars (Pty) Ltd and Protec Ltd should be established in
respect of
• input, e.g. format
• transfer of output, e.g. payroll or debtors’ statements
• control over rejected data, and its resubmission procedures
8.
Right of access
8.1
The right of access which Go Cars (Pty) Ltd personnel and particularly the internal
auditors would have to Protec Ltd's computer installation, data files and records
pertaining to Go Cars (Pty) Ltd, which are kept by Protec Ltd.
9.
Methods of processing
9.1
Whilst it appears that input will be online it should be established how each
application should be processed, i.e. either batch or real time.
For example, being a retailer for spares, it will be critical for Go Cars (Pty) Ltd to
have real time processing of their inventory applications, (hundreds of inventory
items, customers cannot be kept waiting at the counter whilst the sales person
looks for the item and determines whether there is inventory). It must be available
on screen.
9.2
208
10.
The actual conversion
The following should be agreed upon:
10.1 the method of conversion e.g. run the old system in parallel with the new system,
for a period
10.2 the respective responsibilities of Go Cars (Pty) Ltd and Protec Ltd
10.3 the commencement date
11.
Back-up and recovery procedures
11.1 Go Cars (Pty) Ltd should be informed of the back-up and recovery procedures to
be adopted by Protec Ltd and the role that Go Cars (Pty) Ltd may be obliged to
play.
12.
The terms of the contract
The following must be agreed upon:
12.1 the notice period
12.2 grounds for giving notice
13.
The long-term future of the arrangement
13.1 This is very important. Protec Ltd has offered this service because they have
underutilised computer resources. The permanency of this arrangement should be
evaluated.
13.2 Protec Ltd should clarify what their intentions are when their business returns to
normal, in relation to Protec Ltd's own processing and processing for other
businesses, specifically that of Go Cars (Pty) Ltd.
13.3 Should Protec Ltd go insolvent, what warranties will come into play?
b) Conversion procedures/controls
I would:
1.1
1.2
1.3
Recommend forming a steering committee consisting of myself and suitable staff
from Protec Ltd and Go Cars (Pty) Ltd and recognising the conversion as a project
to which management principles must be applied.
With the help of the committee
1.2.1 decide upon the most efficient method of conversion. e.g. run systems in
parallel for a period
1.2.2 develop a detailed conversion plan
1.2.3 decide upon the order of converting the various applications
1.2.4 allocate responsibilities for different aspects of the conversion to specific
appropriate personnel ensuring adequate segregation of duties
1.2.5 set deadlines for completion of each stage and each task and monitor
progress in this regard
Recommend appointment of a data control group to promote control over
preparation and entry of data onto the new system. Their activities should include
209
AUI4863/SG
1.3.1
1.4
1.5
detailed checking procedures to ensure that data that is be converted is as
error free as possible PRIOR to conversion
1.3.2 file comparisons and reconciliations between old and new files and
resolution of discrepancies
1.3.3 extraction and follow-up of exception reports relating to information on
the new system, e.g. unusually large balances
1.3.4 obtaining user approval for data converted in respect of each user
department (e.g. debtors)
Recommend joint implementation of a training program for staff involved in the
conversion, by both Protec Ltd and Go Cars (Pty) Ltd.
Recommend that a post-implementation review be performed in order to
1.5.1 confirm with both Go Cars (Pty) Ltd and Protec (Pty) Ltd that the system is
operating as intended and that all bugs have been resolved
1.5.2 assess the adequacy of the conversion controls
1.5.3 confirm that all aspects of the new system have been properly
documented in line with pre- determined standards
The extent of an organisation’s use of IT systems will have an effect on the work of the
internal auditor. The auditor will need to gain an understanding of the entity's use of IT.
This is achieved by gathering information about the IT environment, determining the
risks related to this environment and assessing the controls in operation to reduce these
risks. This information will influence the selection of the audit approach and the
selection of engagement procedures.
The overall objective and scope of an audit do not change in an IT environment. The use
of a computer does, however, change the method of recording transactions, and the
processing, storage and communication of financial and other information. An IT
environment is any environment where a computer, of any type or size, is used in the
processing of financial and management information.
Auditing in an IT environment is a very comprehensive topic and it is therefore important
that you use all available resources to ensure that you have a good understanding of the
IT environment as well as auditing in the IT environment.
210
Learning unit 20
Computer-assisted audit tools and
techniques (CAATTs)
Contents
20.1 INTRODUCTION
211
20.2 CONSIDERATIONS WHEN USING CAATTS
212
20.3 AUDIT TEST DATA
213
20.4 CONTINUOUS AUDITING
214
20.5 FACTORS THAT COULD INFLUENCE THE AUDITOR’S DECISION TO USE CAATTS
214
20.6 CONSIDERATIONS IN THE IMPLEMENTATION OF CAATTS
215
20.7 PLANNING FOR THE USE OF CAATTS
215
20.8 THE CONSEQUENCES INADEQUATE PLANNING
218
20.9 CONTROL PROCEDURES WHEN USING CAATTS
218
20.10 THE APPLICATION OF CAATTS
218
20.1 INTRODUCTION
Computer-assisted audit tools and techniques (CAATTS) are exactly what the name says: making
use of a computer to assist in carrying out the audit. Although some extremely powerful and
complex software exists to assist in performing audits, the concept is simple: wherever it is
economical and efficient to do so, the power, speed and versatility of the computer should be
harnessed to assist with the audit.
Complex business environments, generating large volumes of data in multiple locations, created
the need for computer-assisted audit tools and techniques (CAATTs). System CAATTs are used to
211
AUI4863/SG
test computerised controls while data CAATTs are used for substantive audit procedures to access,
retrieve and manipulate data from a computerised information system (CIS).
The use of CAATTS involves the merging of software into an audit programme. Information
retrieval and analysis programs and procedures include programs that organise, combine, extract
and analyse information. The availability of microcomputer-based software, which provides
computing power without requiring technical expertise, makes direct data analysis part of the
toolkit of any auditor. The primary requirement is for the auditor to have an understanding of the
business application and of how data relates to it (Cascarino 2012:118).
In this learning unit we will look at the way CAATTs fit into the audit process by discussing the
following sections:
•
•
•
•
•
•
Considerations when using CAATTS
Audit test data
Continuous auditing
The implementation of CAATTS
Control procedures when using CAATTS
The application of CAATTS
REFLECTION
Before you study or attempt this learning unit, please revise your undergraduate work
regarding CAATTs and all related topics.
You should already know what the use of CAATTS entails, as well as the advantages and
disadvantages of the use of CAATTs.
20.2 CONSIDERATIONS WHEN USING CAATTS
CAATTs refer to an auditor’s use of the computer to assist in the acquisition of audit evidence and in
the performance of audit procedures. CAATTs can be divided into system-orientated CAATTs and
data-orientated CAATTs. System-orientated CAATs are used predominantly to perform
engagement procedures (although some substantive evidence may be produced), whilst-data
orientated CAATTs are concerned mainly with substantive testing.
Various CAATTs are available to the auditors of computer-based systems. In many instances these
techniques, performed by using computer audit software programs or test data, may be an efficient
and effective way to apply auditing procedures to computer-based systems.
An important difference between computer and manual systems is that in IT systems there is an
opportunity to read data at high speed by using CAATTs, thereby providing access to information
otherwise not easily reviewed. CAATTs can be used to assist audit procedures in various ways, for
example:
•
•
•
examination of records based on certain criteria to identify inconsistencies, missing data and
exceptions for investigation
testing calculations and making computations to evaluate the reasonableness of given
information
exception reporting
212
•
•
•
•
•
analytical review or data analytics
comparing data on separate files to identify differences or exceptions, or to confirm
information on one file with corroborating independent information on a second file
selecting and printing audit samples for verification with source documents or other evidence
(Selection can be for a number of criteria and involve varying degrees of sophistication.
Evaluation of results can also be done using CAATTs.)
summarising, re-sequencing or combining retrieved information for analysis by certain criteria,
or for financial information disclosure
simulation of the entity's data processing system to determine the degree of reliance to be
placed on the entity's processing of information
A major advantage of using powerful CAATTs packages, is that all relevant items can be reviewed,
whereas with manual tests only a sample is normally examined. The increased amount and variety
of data maintained on computer files and the power of computer processing result in the creation of
more detailed account analyses, (often in the form of exception reports) than is usually the case in
conventional systems. These reports could include simple analyses of items making up an account
balance (e.g. analyses of inventory or trade debtors by age) as well as more complex analyses
making use of data not forming part of the account balance (e.g. analyses of trade debtors in
relation to credit limits; stock balances in relation to maximum stock levels). Therefore, the use of
CAATTs in modern day auditing becomes increasingly important, but it does not always mean that
it is the most appropriate tool for every audit.
REFLECTION
Can you still recall the advantages and disadvantages of using CAATTs? If not, you need
to refer to your undergraduate studies that relate to the basic principles of the use of
CAATTs.
20.3 AUDIT TEST DATA
This is only one of many methods of system-orientated CAATTs. Audit test data involves the
creation of simulated or fictitious data for input to the application. It can test the correct functioning
of automated controls, for example:
•
•
•
•
edit or validation checks
totals
analysis
production of exception reports
It can also be valuable as the auditor can design information to test any control which the client
claims are in the system. The auditor would compare the system produced results with his/her own
manually predetermined results to ensure that the automated controls were operating as intended.
Unfortunately, the test data approach only gives assurance that the control was working when it
was tested and not that it worked throughout the whole period under review. There are two ways
of running test data: against the live data and programs or against a test system. Each of these has
advantages and disadvantages, which are fully documented in your undergraduate studies.
213
AUI4863/SG
STUDY
Assurance: An Audit Perspective (2018: Chapter 8)
Also study the following tools and techniques which are normally required when CAATTs
are used:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
test data generators
flowcharting packages
specialised audit software
generalised audit software
utility programs
source code review
confirmation of results
test data
analytical analysis / data analysis
integrated test facility
snapshot technique
controls self-assessment
sampling
parallel simulation
20.4 CONTINUOUS AUDITING
A continuous audit permits auditors to monitor an organisation’s systems using appropriate sensors
and digital agents.
STUDY
•
•
Assurance: An Audit Perspective (2018), par 8.4.3
GTAG 3 – Continuous Auditing: Coordinating Continuous Auditing and Monitoring
to Provide Continuous Assurance
20.5 FACTORS THAT COULD INFLUENCE THE AUDITOR'S DECISION TO
USE CAATTS
• Complexity of client’s system – the more complex and sophisticated the accounting system the
less appropriate it is to rely solely on manual audit procedures.
• The volume of transactions/output – as the volume of transactions increases, it becomes
impractical to perform manual extraction, sorting, analysing and summarising of data, because
of normal audit time constraints.
• Data stored in electronic form – the client may store data only in electronic form as opposed to
maintaining hard copy records.
• Availability of skills in the audit team – particular skills, sometimes of a high level, is required
when using CAATTs.
• Potential loss of independence – the use of CAATTs is going to require the cooperation of the
client.
214
• The attitude of the client – professionally managed companies may expect their auditors to be
up to date with and capable of using modern audit techniques.
• Compatibility of the auditor’s computer hardware and software with the client’s hardware and
software.
• The utilities available at the client’s office which could assist with the sorting of files, printing of a
part of a file, copying a database onto a disk etc. It is important to note that if the auditor wants
to utilise the tools already implemented at the client, they may have to review the code or
scripts used in the tools.
• Costs associated with obtaining the relevant data.
• Lack of audit trails to trace information to final records or to source documents.
• Situations where detection risk would be significantly decreased as a result of more extensive
testing capabilities.
20.6 CONSIDERATIONS IN THE IMPLEMENTATION OF CAATTS
If an internal auditor decides, after considering the factors mentioned in the previous section, to use
CAATTs, it is essential that the management of the audit firm (or the internal audit section) should
make a formal commitment to the implementation of CAATTs and offer the necessary support in
order to develop the required knowledge and competence for the application of CAATTs.
CAATTs can best be used for the following audit functions:
• Sorting and file reorganisation – data can be sorted by date, customer name, department name,
etc.
• Summarisation, stratification and frequency analysis - data can be summarised in account
number order, departmental order, and the frequency with which certain items are bought and
used.
• Extracting samples, exception reporting, file comparison, for example current master file to prior
year’s master file – these comparisons can be used to develop certain ratios to compare
exceptions and deviations.
• Analytical review, for example extraction of ratios.
• Casting and recalculation.
• Examining records for inconsistencies, inaccuracies and missing data and creating a report
thereon.
STUDY
Assurance: An Audit Perspective (2018), Chapter 8
Familiarise yourself with the following:
• advantages and disadvantages when using the different CAATTs
• audit procedures
• CAATTs use in non-computer areas
20.7 PLANNING FOR THE USE OF CAATTS
Proper planning for the use of CAATTs is just as important as the planning phase of the audit
process where the computer is not used. In addition to ordinary planning matters, attention should
215
AUI4863/SG
be given to the matters listed below, which are of exceptional importance in the application of
CAATTs.
The auditor should consider the following specific planning items:
• knowledge of the auditee’s business
• audit plan
• data file reconciliation
Knowledge of the auditee’s business. With respect to the possible audit software, the auditor
should consider accumulating the following information at the planning stage of the audit:
• the impact of the auditor’s access to an auditee’s data, hardware, software and networks
• the main systems of financial significance, and the data retention policies, related file layouts
and volumes of transactions
Audit plan. The audit plan should be reviewed to ensure that optimum use is made of the available
audit software. Appropriate resources should be available to support the audit plan. Attention
should be paid to the following aspects:
•
•
•
•
•
•
the need for continuity of staff on each audit to ensure that the use of audit software increases
over time
experience of scheduled audit staff in the use of audit software
training requirements for audit staff before the fieldwork begins
need for, and timing of, technical support
specialised hardware or software required to access an auditee’s data
need for auditees to retain data necessary for the audit and to ensure that the auditor is made
aware of changes in, for example, file structures and content
Data file reconciliation. It is important that the auditee’s data which are used for audit testing be
reconciled to the subject matter of the engagement, for example, financial statements or auditee’s
control totals. The auditor should request the auditee to provide the information, such as control
totals of the more important numerical fields, to verify that all transactions have been processed. It
is also important to reconcile the number of records back to the source population.
ACTIVITY
You are a senior internal auditor at Parts n Pieces (Pty) Ltd, a motor spares and
accessories company. Parts n Pieces (Pty) Ltd uses a computerised perpetual inventory
system and carries out regular physical inventory test checks (cycle counts) rather than
performing a count at the year-end. Internal audit does not attend these cycle counts.
Pre-numbered goods received notes are used to record receipts of inventory while prenumbered stores goods issue slips are used to record issues of goods from inventory. The
company makes use of on-line prepared source documents, which are captured
individually onto the system, via terminals located in the inventory section.
You have a range of audit software available for use on the inventory master file and you
are competent to use it.
216
REQUIRED
Briefly discuss the matters an auditor would consider in deciding whether or not to use
CAATTs given the above circumstances.
FEEDBACK
1. It may be impossible to obtain sufficient audit evidence without using CAATTs due
to:
1.1 the complexity of the clients’ system and the degree of reliance on computers and
related controls
1.2 the volume of transactions processed
2.
The manner in which data is stored by the client - CAATTs may be the best way to
retrieve data necessary for audit where minimal hard copies are kept.
3.
The length of time the client retains data - a concurrent auditing technique such as
SCARF may be necessary where detail (transaction files) supporting totals and
balances is not kept for long.
4.
The availability of suitable CAATT software to meet the particular audit objective.
·
If suitable CAATT software is not available it will take time and money to develop
suitable software.
·
Client may have certain software (e.g. report writers) which may be useful.
5.
The cost effectiveness and efficiency of adopting the technique.
6.
The availability of competent staff within the audit team and firm to support and
use the software.
7.
The degree of reliance on clients’ IT staff that will be necessary and the effect of
such reliance on the internal auditor's independence/objectivity.
8.
The willingness of the client to let you make use of CAATTs on client hardware and
the level of co-operation which can be expected. This will depend upon:
8.1 the extent to which use of CAATTs will disrupt the client’s normal processing
activities
8.2 how much risk there is of corrupting client files through use of CAATTs
9.
The compatibility of audit hardware (e.g. laptop) with client hardware and software.
10. Client expectations – the client may be concerned about internal audit’s
competence if you do not use CAATTs.
217
AUI4863/SG
20.8 THE CONSEQUENCES OF INADEQUATE PLANNING
The failure to plan adequately for the use of CAATTs can result in
•
•
•
•
cost and time overruns
arriving at the wrong audit conclusion
failure to achieve the desired objective of the test
significant frustration to both the auditor and the auditee
20.9 CONTROL PROCEDURES WHEN USING CAATTS
To use CAATTs successfully it is necessary to have sufficient controls in place while using CAATTs.
These controls will ensure that the client’s data is protected and that the auditor obtains reliable
audit evidence. The following control procedures should be in place:
•
•
•
•
•
Approve CAATTs specifications.
Review work to be performed by the CAATTs.
Review the client’s general control environment.
Consider whether client staff could improperly influence the results of the CAATTs.
Ensure integration of output into the audit process.
20.10 THE APPLICATION OF CAATTS
CAATTs can be used to perform engagement procedures. As mentioned earlier, system-oriented
CAATTs concentrate on the accounting system and related control procedures and data-oriented
CAATTs are mainly concerned with substantive testing.
Where the client has a computerised information system, it may be more effective and efficient to
use CAATTs in the performance of substantive audit procedures. Typical ways in which this can be
done are indicated below:
Audit working papers - The firm’s audit working papers and audit methodology may be available on
generalised audit software packages such as Caseware, ACL or IDEA. The working papers would
document the audit programme and schedules, analysing account balances and significant classes
of transactions in detail.
Substantive analytical procedures - CAATTs may be used to download information from the
computerised records and then, using spreadsheets and modelling programs, the full range of
analytical procedures may be performed. CAATTs may be used to analyse all journal entries
processed during the period in order to identify all large and unusual journal entries for substantive
testing. The auditor should be alert to the risk of management override of controls over nonstandard journal entries and to the fact that there may be little or no visible evidence of such
override.
Sample selection - Sampling software can facilitate the selection of random and other samples of
source documents or transactions recorded.
218
Data sorting and analysis and printing of exception reports - CAATTs may be used to sort data
within the computerised accounts according to the specifications of the auditor, for example:
•
•
•
•
revenue transactions
payroll transactions
inventory listings
recalculation
ADDITIONAL READING
Read the following interesting article regarding CAATTs on the following website, and
participate by trying to add some ideas to the various topics:
http://en.wikipedia.org/wiki/Computer_Aided_Audit_Tools
Visit the following website and familiarise yourself with the key terminologies explained:
http://www.docstoc.com/docs/21535006/Computer-Assisted-Audit-Techniques(CAATs)/
A computerised information system (CIS) environment influences the procedures followed by an
auditor in the following respects:
• It affects the audit procedures that need to be carried out in order to obtain a sufficient
understanding of the accounting and internal control system of an organisation.
• It influences the factors that should be considered in respect of the inherent and control risks of
an organisation.
• It affects the design and performance of engagement procedures and substantive procedures in
order to achieve the audit objectives.
Where the client has a computerised accounting system, it may be more effective and efficient to
use CAATTs in the performance of substantive audit procedures.
219
AUI4863/SG
Learning unit 21
Factors to be considered in the choice and
use of audit software
Contents
21.1 INTRODUCTION
220
21.2 AUDIT SOFTWARE: GENERAL CRITERIA THAT AUDIT SOFTWARE SHOULD
COMPLY WITH
220
21.3 DIFFERENCES BETWEEN OFF-THE-SHELF (GENERALISED) AND PURPOSE-WRITTEN
AUDIT SOFTWARE
221
21.1 INTRODUCTION
It was mentioned in the previous learning unit that one of the considerations with regard to the use
of CAATTs is the audit software that will be used. Audit software is of such importance, however,
that it will be dealt with in greater detail in this learning unit. The following aspects of audit
software are dealt with:
• general criteria that audit software should comply with
• differences between choosing off-the-shelf (generalised) and purpose-written audit software
• control procedures when using CAATTs
21.2 AUDIT SOFTWARE: GENERAL CRITERIA THAT AUDIT SOFTWARE
SHOULD COMPLY WITH
When choosing or designing audit software the following general characteristics of good audit
software should be taken into account:
220
• user-friendliness of the software in the application of CAATTs
• consistent use of audit software
• logical presentation of the auditor’s options when using the audit software, usually involving the
use of lists of options
• functionality in the sense that audit software should be capable of performing the specific
techniques or procedures that the auditor requires
• speed of execution of the techniques and procedures that the auditor requires
• linked editing of instructions
• handling of errors
• human interaction with the computer
• documentation prepared by the audit software as an essential element of the audit evidence
• the question whether the software is able to provide control over the storage of and access to
the audit specifications
21.3 DIFFERENCES BETWEEN OFF-THE-SHELF (GENERALISED) AND
PURPOSE-WRITTEN AUDIT SOFTWARE
CAATTs may be package programs, purpose-written programs, utility programs or system
management programs. The auditor needs to substantiate the appropriateness and validity for the
audit purpose before using any program and therefore needs to understand the purpose and
application of each of the various options to decide which one will be the most appropriate in the
circumstances.
• Package programs. These are generalised programs designed to perform data functions, such as
reading data, selecting and analysing information, performing calculations, creating data files
and reporting in a format specified by the auditor. Some of the software packages used by
internal auditors – IDEA, ACL, DIAL and SAS – can be used on a mainframe or microcomputer
platform.
• Purpose-written programs. These programs perform audit tasks in specific circumstances.
Written at the request of the auditor or management, they determine specific information such
as the number of sick leave days taken in a department.
• Utility programs. Used by an entity to perform common data processing functions, such as
sorting, creating and printing files. A utility program could be a program used on a daily basis to
determine stock issued from stores to the manufacturing plant.
System management programs. These enhanced productivity tools are typically part of a
sophisticated operating system environment, for example, data retrieval software or code
comparison software.
STUDY
Assurance: An Audit Perspective (2018), par 8.4
Study the information on generalised audit software (GAS) and make a summary of the
following aspects:
• definition of GAS
221
AUI4863/SG
• uses of GAS
• limitations of GAS
• benefits of GAS
ADDITIONAL READING
Read additional information regarding audit software on the following website:
http://en.wikipedia.org/wiki/Computer_Aided_Audit_Tools
The use of computer-assisted audit solutions involves the merging of software into an
audit program. Information retrieval and analysis programs and procedures include
programs that organise, combine, extract and analyse information. The availability of
micro-computer-based audit software, which provides computing power without
requiring technical expertise, makes direct data analysis part of the toolkit of any
auditor. The primary requirement is for the auditor to have an understanding of the
business application and how data relates to it.
NOTES
Make your own notes here:
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
222
Learning unit 22
Corporate IT governance
Contents
22.1 INTRODUCTION
223
22.2 IT GOVERNANCE
223
22.3 SUPPORT TOOLS AND FRAMEWORKS
224
22.4 IS INFRASTRUCTURES
225
22.1 INTRODUCTION
Control frameworks are needed by managers to ensure that their IT processes are contributing to
business objectives and creating a competitive advantage. The organisation needs assurance that
risks are mitigated. Stakeholders need assurance that the organisation can be trusted. The only way
to gain assurance is for management to increase their understanding of IT operations without
getting bogged down in the increasingly complex execution details.
REFLECTION
Before you study this learning unit, please revise all material relating to corporate
governance and refer to all relevant modules.
22.2 IT GOVERNANCE
Good governance has become very important in view of the global requirements for transparency
and accountability in organistional stewardship. IT Governance is a subset of Corporate
Governance.
223
AUI4863/SG
The IPPF define IT governance as follows: “Consists of the leadership, organizational structures, and
processes that ensure that the enterprise’s information technology supports the organization’s
strategies and objectives.”
STUDY
•
•
•
•
Performing Internal Audit Engagements, Par 2.6 (page 82)
Assurance: An Audit Perspective (2018: Chapter 2 – 2.11)
GTAG 17: Auditing IT Governance
King IV: Principle 12
22.3 SUPPORT TOOLS AND FRAMEWORKS
According to the Institute of Internal Auditors’ Global Technology Audit Guide (GTAG), a control
framework is an outline that identifies the need for controls but does not describe how they should
be applied.
IT control frameworks are internal control systems that help managers set IT control objectives, link
IT to business processes and overall control frameworks identifying key IT areas to leverage and
create a process model that logically groups IT processes.
A key control concept is that IT controls must provide continuous assurance for internal controls, as
covered in the Internal Control – Integrated Framework of the Committee of Sponsoring
Organisations of the Treadway Commission (COSO).
STUDY
•
•
•
IIA Standards relevant to IT Governance – Standards 2110, 2110.A2
GTAG – Information Security Governance
King IV Report – Technology and information governance (Principle 12)
ADDITIONAL READING
Other standards and frameworks that relate to IT auditing that you should be aware of,
are the following:
•
•
•
•
•
•
Business continuity management – http://www.continuitysa.co.za/newsroom/articles/business-continuity- management.html
ISO standards related to IT (information security, governance etc)
http://www.iso.org/iso/products/standards/catalogue_ics_browse.htm?ICS1=37&IC
S2=100&ICS3=99&
ITIL – www.isaca.org
COBIT – http://www.isaca.org/Knowledge-Center/COBIT/Pages/Overview.aspx
Refer you again to the IIA website, where the “G-tag” articles are published, refer
specifically to the one that relates to IT Governance: http://www.theiia.org
224
ACTIVITY
List and discuss the five components defined by COSO as components that would assist
management in achieving their objectives.
FEEDBACK
Refer to Internal Auditing: An Introduction (2017: par 5.4), and describe each of the
following components:
•
•
•
•
•
Sound control environment
Sound risk assessment process
Sound operational control activities
Sound information and communications systems
Effective monitoring
22.4 IS INFRASTRUCTURES
IT staff require specialist expertise and skills in order to develop a technology infrastructure plan.
The architecture itself will constantly change in order to ensure the best approach is taken to satisfy
user requirements as they change with increasing rapidity.
IS can be split broadly into three infrastructural areas:
•
•
•
project-based functions
operations and production
technical services
STUDY
Performing Internal Audit Engagements, (2017: par 2.3.1)
ADDITIONAL READING
I refer you again to the IIA website, where the “GTAG” articles are published, specifically
to the one that relates to IT Governance: http://www.theiia.org
SUMMARY
In this learning unit we briefly discussed IT governance. It is of the utmost importance
that you refer to your undergraduate studies as well as to the other modules where
governance is discussed. IT control frameworks are internal control systems that help
managers set IT control objectives, link IT to business processes and overall control
frameworks.
225
AUI4863/SG
In this topic we discussed auditing in an IT environment, computer-assisted audit tools
and techniques (CAATTS) and audit software. A brief overview was also provided of
corporate IT governance.
In learning unit 22.1 auditing in an IT environment was discussed. We looked at the
effect of an IT environment on the audit process, including the following concepts:
• Approach to auditing in an IT environment
• The nature of audit evidence
• Engagement procedures related to an IT environment
• Engagement procedures
The auditor will need to gain an understanding of the entity's use of IT. This is achieved
by gathering information about the IT environment, determining the risks related to this
environment and assessing the controls in operation to reduce these risks. This
information will influence the selection of the audit approach and the selection of audit
procedures.
In learning unit 22.2 we discussed computer-assisted audit tools and techniques
(CAATTS).
Complex business environments, generating large volumes of data in multiple locations,
created the need for computer-assisted audit tools and techniques (CAATTs).
In this learning unit we looked at the way CAATTs fit into the audit process by discussing
the following sections:
• Considerations when using CAATTS
• Audit test data
• Continuous auditing
• The implementation of CAATTS
• Control procedures when using CAATTS
• The application of CAATTS
In learning unit 22.3 we discussed the factors that should be considered in the choice and
use of audit software. Audit software is of such importance that it was discussed in detail
in this learning unit. The following aspects of audit software were dealt with:
• General criteria that audit software should comply with
• Differences between choosing off-the-shelf (generalised) and purpose-written audit
software
• Control procedures when using CAATTs
The primary requirement is for the auditor to have an understanding of the business
application and how data relates to it.
In learning unit 22.4 we briefly discussed corporate IT governance. Control frameworks
are needed by managers to ensure that their IT processes are contributing to business
objectives and creating a competitive advantage. The organisation needs assurance that
risks are mitigated. Stakeholders need assurance that the organisation can be trusted.
The only way to gain assurance is for management to increase their understanding of IT
operations without getting bogged down in the increasingly complex execution details.
226
IT control frameworks are internal control systems that help managers set IT control
objectives, link IT to business processes and overall control frameworks.
Now that you have studied the learning units in this topic, are you able to do the
following?
• Understand and be proficient in the application of theoretical concepts underlying
CAATTs in the context of an IT environment.
• Consider and adapt to all the factors relating to the application of CAATTs in the
audit process.
• Explain and apply all aspects concerning an audit in the IT environment on an
integrated level.
• Consider all the factors that should be taken into account when deciding on audit
software.
NOTES
Make your own notes here:
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
______________________________________________________________________
227
AUI4863/SG
Download