Class 3 - University of South Florida St. Petersburg

advertisement
Developing a
Forensic Continuous
Audit Model
Grover S. Kearns, PhD, CPA, CFE
University of South Florida St. Petersburg
1
Motivation
Organizations are under pressure to
proactively recognize and react to
potential fraud in a comprehensive and
cost-efficient manner.
2
Background





Excesses of past two decades and
increase in financial statement fraud.
Increased laws and regulation.
Need to improve ‘tone at the top.’
Inability to provide results using
traditional audit approaches.
Increasing costs of IT security and
forensic methods.
3
Corporate Fraud
4
Increased Laws & Regs

Sarbanes Oxley Act of 2002 (SOX)


Sec 404 – system of internal controls
Sec 409 – acceleration of SEC filings
PCAOB Statements
SAS 99
COSO & COBIT Frameworks

These have led to increased costs, increased
pressures on management and on auditors.
5
PCAOB Audit Standard 5
“An Audit of Internal Control over Financial Reporting that is
Integrated with an Audit of Financial Statements.”


Increases reliance on internal audit
departments as evidence external auditors
can use in order to reduce duplication of
efforts and lower audit costs.
Continuous auditing tools are capable of
monitoring internal controls for SOX
compliance reporting.
6
Technology and the Accountant



SOX and SAS 99 encourage management and
external auditors to employ technological
approaches and embedded audit modules to audit
financial transactions and internal controls.
SOX Section 409 accelerates the SEC filings for
Form 10-Q and annual report Form 10-K.
The FTC’s red flag rules, effective December 31,
2010 for financial institutions and certain other
firms under FTC jurisdiction including CPA firms,
require companies to check for and report specific
violations.
7
Tone at the Top





Executive management sets tone.
Organizational tone is most important
to internal control.
Committee of Sponsoring Organizations
(COSO)
Control Objectives for IT (COBIT)
Lack of ‘tone’ can imply lack of controls
8
Internal Controls

PCAOB Auditing Statement 2, An Audit of
Internal Control over Financial Reporting
Performed in Conjunction with an Audit of
Financial Statements, states that it is
management’s responsibility to design
and implement a program of controls to
prevent, detect and deter fraud.
9
Traditional Audit Approach


Tests of transactions when limited to
small sample sets may not be
representative and cannot be expected
to detect a large percent of errors or
fraudulent activities.
Given the increased transaction
processing for most firms and increased
regulatory pressures, the traditional
approaches appear inadequate and
require increased substantive testing.
10
Q. Why did the Auditor cross the road?
A. Because according to the Audit
File, that’s what he did 3 years ago!
11
Traditional Audit Approach
Ineffective for Fraud

Internal and external audits combined
only responsible for uncovering 19% of
fraud.



ACFE 2010 Report to the Nations
Audits are isolated events that examine
a small part of all transactions
Auditors lack technical skills
12
Solution
Use forensics in a proactive manner to
continuously and methodically examine
a significant number of transactions in a
cost-efficient manner in order to flag
incidents of error, misuse, and fraud.
To do so we use a modified continuous
forensics auditing approach.
13
Continuous Audit Defined
“A continuous audit is a methodology that
enables independent auditors to provide
written assurance on a subject matter, for
which an entity’s management is responsible,
using a series of auditors’ reports issued
virtually simultaneously with, or a short
period of time after, the occurrence of events
underlying the subject matter.”
CICA/AICPA Research Study on Continuous Auditing,
1999.
14
Forensic Accounting


Forensic accounting offers the highest level
of assurance, is suitable for legal review,
and arrives at conclusions in a scientific
fashion. (Crumbley)
As a result of new regulatory requirements
for compliance and emphasis on IT
governance, auditors with forensic IT skills
have been in increased demand. (Hoffman,
2004)
15
Forensic Continuous Audit Timing


Judicious application of the cost/benefit rule
based upon the likelihood and severity of the
risk.
Performing analytical procedures on a routine
basis reduces cost of external auditors and
time on-site.
16
Embedded Audit Modules



EAMs depends upon audit specific software that
resides in the targeted application (Alles, 2002).
EAM allows auditors to determine which
transactions are to be tested and at what
frequency. Results are collected and reported
real-time. (Groomer and Murthy, 1989).
Companies often do not activate the EAM
because of the significant resource requirements
which can slow overall processing dramatically
(Kuhn and Sutton, 2010; Debreceny et al., 2005).
17
Embedded Audit Module (Cont)


As the selected transaction is being processed
by the host application, a copy of the
transaction is stored in an audit file for
subsequent review.
The EAM approach allows selected
transactions to be captured throughout the
audit period, or at any time during the period,
thus significantly reducing the amount of
work the auditor must do to identify
significant transactions for substantive testing.
18
Continuous Fraud Auditing System
Production
Server
Audit Server
Target
Application
Ghosted
Application
Business
Transactions
Fraud
Audit
Tests
Refinements &
Modifications
Selected
Transactions
Exception
Handling
Fraud Audit
Application
(Embedded Audit
Module)
Control
Reports
Alarms
Management
Audit Committee
Internal Auditors
External Auditors
19
Exception Handling

CA performs a large number of tests over a much
higher percentage of transactions and can reduce
reliance upon analytical procedures (Alles et al.,
2008).


It will also result in a large number of selected
transactions that have failed the audit tests.
Exception handling of selected transactions is key
to the effectiveness of the fraud audit system.
20
Impact of a Continuous
Forensic Audit System
Continuous
Forensic
Auditing
Exception
Handling
Forensic
Evaluation
Refinement
of Rules
Decreased Governance Costs
Heightened Internal Controls
Decreased Risk of Fraudulent Transactions
21
Things that won’t stay in Vegas
22
Irrational Ratios




Ratios that signify an inconsistent
relationship or outlier that requires
investigation.
Can be based on relationships, trends,
deviations from standards.
Must be fine-tuned to prevent too many
false positives.
Should reflect audit objectives.
23
Irrational Ratios (cont.)




Days Sales in Receivables
Accounts Receivable t-1 / Sales t-1
Gross Margin Index
Sales t-1 – COGS t-1 / Sales t-1
Sales Growth Index
Sales t / Sales t-1
Accruals to Assets Index
Changes: (Working Capital – Cash – Current Taxes
Payable) – Depr. & Amortiz. / Total Assets
Adapted from Grove and Cook, 2004
24
Employee Expenses March 2010
3.5
Z-Statistic
3
2.5
2
1.5
1
0.5
0
1
2
3
4
5
6
First Digit
7
8
9
25
PCT Change in Revenues and Cost of Goods Sold
COGS ($000) 2010/2009
Revenues ($000) 2010/2009
0.5
0.4
0.3
0.2
0.1
0
-0.1
1
2
3
4
5 6
7
8
9 10 11 12 13 14 15 16 17 18 19 20
Week
-0.2
-0.3
26
Transaction Activity
Transactions (000)
PCT Errors (x000)
Outliers
25
20
15
10
5
0
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Week
27
Data Analysis using Forensic
Continuous Audit Model

Risk Assessment – examination of key
performance metrics and risk indicators to determine
if the risk profile of a particular function has changed.
For a finance function you might look at the
following.
 Cash balance compared to plan and prior period
 Cash transactions that exceed authority limit
 Significant differences identified between planned
and actual taxes
 Significant unexplained financial fluctuations
28
Data Analysis using Forensic
Continuous Audit Model

Fraud detection – examine data for
potential fraud indicators.






Vendor/Employee/Agent address comparison
Vendor SSN/EIN validation
Employee name/Payee comparison
Benford analysis (expected frequency)
Ratio analysis
Supplemental payments under authority
29
Data Analysis using Forensic
Continuous Audit Model


Control evaluation – tests of specific controls to
determine if they are working as intended.
 Access control to a particular system
 Payments exceeding authority limits
 Appropriate approvals of transactions
 Review of entries that may indicate a management
override of controls
Recovery opportunities
 Duplicate payments
 Travel expense irregularities
30
Where No Data Has Gone Before
31
Technology and the
Accountant




Traditional audit approaches and sampling methods cannot
be expected to uncover the majority of transactional errors
or occupational fraud (Wells, 2011; Oringel and Aldhizer,
2009).
Technology offers opportunities to perform detect and
deter fraud more efficiently and effectively.
SAS 99, Consideration of Fraud in a Financial Statement
Audit, codifies many fraud detection procedures and
encourages their use by auditors to detect client fraud risk
and identify transactions to be tested
Technological skills, however, often exceed the
competency of auditors causing them to resort to less
effective manual approaches .
32
PCAOB Audit Standard 2
“An Audit of Internal Control over Financial Reporting
Performed in Conjunction with an Audit of Financial
Statements.”

CPAs will have to become more
knowledgeable and competent
concerning IT controls and IT auditing


Auditing “around” the computer is dead
Auditing “through” the computer requires
technical skills
33
CAAT’S



Regulatory standards encourage the use of
computer assisted audit tools (CAATs) for
accessing and analyzing data files and
suggest that risk assessment reflect the client
IT standards (AICPA 2001, 2006).
Research indicates only a minority of firms
use CAATs for substantive testing because of
high level of complexity (Janvrin et al., 2009).
CA can provide much of this testing and
relieve auditors from the more complex tasks.
34
CAATs
 ACL and IDEA widely used.
 AKA Data Extraction Software – can import
data with various filetypes
 An important use is in performing substantive
tests.
 Most audit testing occurs in the substantivetesting phase of the audit.
 Used to substantiate dollar amounts in
account balances.
35
CAATs Functionality







Importing and cleansing data
Stratifying and classifying
Statistical analysis
Benford’s Law analysis
Duplicates and Gaps
Sampling
Graphical analysis
36
Substantive Tests
 Determining the correct value of inventory
 Determining the accuracy of prepayments
and accruals
 Confirming accounts receivable with
customers
 Searching for unrecorded liabilities
examples . . .
# shipments received = # P.O.s sent
inventoryt = (inventory - sales + purchases)t-1
37
Substantive Tests (Cont)
 In an IT environment, the records needed to
perform these tests are stored in various
databases
 Before substantive tests can be performed,
the data need to be extracted from the host
system and presented to the auditor in a
usable format
38
Refinement of Audit Tests
Based on results and back-testing,
 Reduce transaction sets
 Increased attention on areas of interest
 Change granularity of formulas
example …
# shipments received = # P.O.s sent to
# shipments receivedt = δ # P.O.s sentt + ε
# vouchers processedt = δ# shipments receivedt
39
Questions?
Thank you for your attention!
Grover S. Kearns, PhD, CPA, CFE
University of South Florida St. Petersburg
gkearns@mail.usf.edu
40
Download