Bca 450
Bca 450
Bca 450
Questions
1. Explain what post balance sheet events and post audit client review are
Post balance sheet events review
A post balance sheet event is something that occurs after a reporting period, but before the
financial statements for that period have been issued or are available to be issued. The two types
of post balance sheet events are:
2. State and explain the specific issues which are involved in post balance sheet events
and post audit client review.
Due professional care. Auditors failing to exercise due professional care in the enforcement
cases and to maintain an attitude of professional skepticism in the cases. In general, this failure on
the auditors’ part can be found throughout the sanctioned audit engagements.
Applying GAAP. Auditors failing to apply or incorrectly applied GAAP pronouncements. Many
of the GAAP violations related to unusual assets with unique accounting valuation issues (often
described in the lower levels of the GAAP hierarchy).
Audit program design. Planning the audit engagement is crucial to its success. Deficiencies in
audit planning are due to failing to:
Properly assess inherent risk and adjust the audit program accordingly.
Prepare an audit program (or inappropriately reused one from prior years).
Audit evidence. Due to overreliance on inquiry as a form of audit evidence. Auditors failing to
corroborate management’s explanations or to challenge explanations that were inconsistent or
refuted by other evidence the auditor had already gathered.
Accounts receivable. Deficiencies in confirming accounts. These deficiencies included
Failure to perform alternative procedures when confirmations were not returned or were
returned with material exceptions.
Problems with sending and receiving confirmation requests (for example, failing to corroborate
confirmations received via fax or allowing the client to mail confirmation requests).
Related parties. The auditor’s failure to recognize or disclose transactions with related parties.
The auditor being either unaware of the related party or appeared to cooperate in the client’s
decision to conceal a transaction with this party. Such transactions often resulted in inflated asset
values.
3. Describe the advanced aspects of computer auditing
When data is input via a keyboard, the software will often display a screen message if any of the
above checks reveal an anomaly, eg ‘Supplier account number does not exist’.
(ii) Processing controls
An example of a programmed control over processing is a run-to-run control. The totals from one
processing run, plus the input totals from the second processing, should equal the result from the
second processing run. For instance, the beginning balances on the receivables ledger plus the
sales invoices (processing run 1) less the cheques received (processing run 2) should equal the
closing balances on the receivable ledger.
(iii) Output controls
Batch processing matches input to output, and is therefore also a control over processing and
output. Other examples of output controls include the controlled resubmission of rejected
transactions, or the review of exception reports
‘End-user environment’ refers to the situation in which the users of the computer systems are
involved in all stages of the development of the system.
prevent or detect errors during program execution, eg procedure manuals, job scheduling,
training and supervision; all these prevent errors such as using wrong data files or wrong
versions of production programs
prevent unauthorised amendments to data files, eg authorisation of jobs prior to
processing, back up and physical protection of files and access controls such as passwords
ensure the continuity of operations, eg testing of back - up procedures, protection against
fire and floods.
(ii) System development controls
The other general controls referred to in ISA 315 cover the areas of system software
acquisition development and maintenance; program change; and application system
acquisition, development and maintenance.
‘System software’ refers to the operating system, database management systems and other
software that increases the efficiency of processing. Application software refers to particular
applications such as sales or wages. The controls over the development and maintenance of
both types of software are similar and include:
Controls over application development, such as good standards over the system design and
program writing, good documentation, testing procedures (eg use of test data to identify
program code errors, pilot running and parallel running of old and new systems), as well
as segregation of duties so that operators are not involved in program development
Controls over program changes – to ensure no unauthorised amendments and that changes
are adequately tested, eg password protection of programs, comparison of production
programs to controlled copies and approval of changes by users
Controls over installation and maintenance of system software – many of the controls
mentioned above are relevant, eg authorisation of changes, good documentation, access
controls and segregation of duties.
Computer-assisted audit techniques
Computer-assisted audit techniques (CAATs) are those featuring the ‘application of auditing
procedures using the computer as an audit tool’ ( Glossary of Terms ). CAATs are normally
placed in three main categories:
Package programs (generalised audit software) – pre-prepared programs for which the
auditor will specify detailed requirements; written to be used on different types of
computer systems
Purpose-written programs – perform specific functions of the auditor’s choosing; the
auditor may have no option but to have this software developed, since package programs
cannot be adapted to the client’s system (however, this can be costly)
Enquiry programs – those that are part of the client’s system, often used to sort and print
data, and which can be adapted for audit purposes, eg accounting software may have
search facilities on some modules, that could be used for audit purposes to search for all
customers with credit balances (on the customers’ module) or all inventory items
exceeding a specified value (on the inventory module).
Using audit software, the auditor can scrutinise large volumes of data and present results that can
then be investigated further. The software consists of program logic needed to perform most of
the functions required by the auditor, such as:
select a sample
report exceptional items
compare files
analyse, summarise and stratify data.
The auditor needs to determine which of these functions they wish to use, and the selection
criteria.
Data without errors will also be included to ensure ‘correct’ transactions are processed properly.
Test data can be used ‘live’, ie during the client’s normal production run. The obvious
disadvantage with this choice is the danger of corrupting the client’s master files. To avoid this,
an integrated test facility will be used (see other techniques below). The alternative (dead test
data) is to perform a special run outside normal processing, using copies of the client’s master
files. In this case, the danger of corrupting the client’s files is avoided – but there is less assurance
that the normal production programs have been used.
Integrated test facility – used when test data is run live; involves the establishment of
dummy records, such as departments or customer accounts to which the dummy data can
be processed. They can then be ignored when client records are printed out, and reversed
out later.
Embedded audit facilities (embedded audit monitor) – also known as resident audit
software; requires the auditor’s own program code to be embedded into the client’s
application software. The embedded code is designed to perform audit functions and can
be switched on at selected times or activated each time the application program is used.
Embedded facilities can be used to:
– Gather and store information relating to transactions at the time of processing for
subsequent audit review; the selected transactions are written to audit files for subsequent
examination, often called system control and review file (SCARF)
– Spot and record (for subsequent audit attention) any items that are unusual; the
transactions are marked by the audit code when selection conditions (specified by the
auditor) are satisfied. This technique is also referred to as tagging.
(iii) Testing
‘The auditor shall design and perform further audit procedures whose nature, timing and
extent are based on and are responsive to the assessed risks of material misstatement at the
assertion level.’ (ISA 330 (Redrafted))
This statement holds true irrespective of the accounting system, and the auditor will
design compliance and substantive tests that reflect the strengths and weaknesses of the
system. When testing a computer information system, the auditor is likely to use a mix of
manual and computer-assisted audit tests.
4. How has computer auditing made auditors effective and efficient?
a) Helps through the speed of proof in the output of financial and non-financial information,
and this detect errors quickly and enables instant correction compared to manual
operation.
b) E-operation helps the auditor to use analysis techniques in comparisons and ratios and
produces indicators and parameters that help in monitoring and evaluating performance
quickly.
c) Electronic data operation helps the auditor in the application of the internal information
network system and the external information network in the control of the internal and
external branches of the enterprise.
d) The auditor can use the methods of advanced operations research in analysis and
evaluation and in the presentation of reports such as statistical analysis, means of control,
self-control, statistical sampling method and system analysis method.
e) Electronic operation helps in the speed of retrieval of data and information stored in the
memory of the computer or on memory modules and storage, and this can review some of
the observations.
f) The auditor assists in the use of the computer's capabilities in carrying out the audits by
establishing auditing and auditing programs that may be programs that are ready or
prepared for a particular purpose or programs
b) Role clarity
Accountability, role clarity and reporting lines are not always clear in the public sector (with
regard to the shareholder, the “directors” and management as applicable in the private sector).
The manner in which some public sector entities are structured makes this a specific challenge.
For example, in the case of public entities, the accounting authority is seen as the board; however,
the minister is involved in the appointment of the audit committee with the board. This
appointment process may create some uncertainty as to direct reporting lines; however, there
should be reporting to both parties.
The roles of the audit committees and other committees, such as the finance committee, risk
committee (where separate), municipal public
accounts committee and performance committee, should be clarified to minimize overlap and
promote the effective use of these structures.
c) Independence
The independence of the audit committee may be impaired due to previous/current relationships
of audit committee members or the audit committee as a whole and political standing, among
other factors.
d) Knowledge, skills and experience
The requirements of the legislative environment for public sector audit committees makes the
composition of audit committees an essential consideration. Members need to have sufficient
knowledge, skills and experience in a number of fields. The audit committee should collectively
have an understanding of integrated reporting (including financial reporting), internal financial
controls, the external and internal audit process, corporate law, risk management, sustainability
issues, information technology governance and the governance processes in the organization.
Added to that is the public sector specific knowledge required about matters such as performance
management, risk management and compliance with laws and regulations.
The difficulty in attracting a pool of suitable persons to serve on the public sector audit
committees is another challenge in the public sector.
Other matters that require attention are the remuneration of committee members and political
influence in the appointment process.
e) Commitment
Adequate dedication and commitment on the part of members and proper preparation for
meetings, reading documents prior to meetings, follow-up procedures and attendance of and
participation in meetings are not receiving sufficient attention.
f) Lack of support from management
The audit committee is sometimes unable to evaluate situations due to the absence of quality
information which should be made available by management. The audit committee therefore
cannot fulfill all its responsibilities.
7. What is the rationale of having an audit committee
a) Oversee the hiring of the auditors, including communicating with the auditors regarding
the audit process, timing, issues, etc.
b) Assess business and fraud risk for the organization and determine plans to address these
risks;
c) Monitor accounting policies;
d) Monitor the internal control process;
e) Establish policies to prevent fraud, including developing a whistleblower policy.
References
• Audit Committee Institute – Global Audit Committee Survey
• KPMG’s Global Audit Committee Survey.
• Ahmed, ManhalMajid, Re-engineering of the Audit Profession in the Information
Technology Context
• Hassoun and al-Qaisi, 1991, p. 156
• Alngide and al-naiem, 2002, p. 42