Fraud Detection & Data Analytics
|
|
- Karin Walker
- 8 years ago
- Views:
Transcription
1 September 2008 Fraud Detection & Data Analytics How to Utilize CAATs to detect fraud AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE
2 Course Topics Overview of Data Analytics Accounts Receivable Overtime Audit Inventory / Obsolescence Commissions Payroll Sales Purchasing Telephone Charges Regression Analysis Credit Card Purchases No Vacancy p 4-8 p 9-11 p p p p p 24 p 25 p p 34 p p
3 Course Topics Digital Analysis Benford s Law Signing Authority Ratio Analysis Contracting Kickbacks Doctored Bills Time and Expenses Reference Material Appendix p 40 p p 43 p p p p 51 p 52 p
4 Importance of Data Requirements Request Incorrect statement of audit data requirements can result in information received not being what was needed Failure to identify important fields requiring the auditors to ask for a second and third data extraction Obtaining the information in a format that is not conducive to further electronic use (Monarch) Failing to tell the client the file format for the requested data file (ASCII flat file,.csv delimited, dbase, fixed record length) 4
5 Incorrect Identification of Audit Population Important to pull all necessary accounts ACL reference (pg 151) 5
6 Data Analytics. Risk of Making an Error When extracting data it is critical to ensure the decimal place is in the correct place Risk: potential incorrect definition of the format file The incorrect use of the join function when combining two or more files Auditors have used duplicate files thereby double counting all transactions 6
7 Fraud Application Analyze the control framework to identify areas of greatest risk Examine possible risks including those in Consideration of Fraud in a Financial Statement, SAS#82 and Deterrence, Detection, Investigation and Reporting of Fraud, SAS #3 Identify the symptoms related to these risks How would possible fraud be reflected in the data? 7
8 Proactive Analysis Batch jobs Develop batch jobs to test for symptoms of fraud Proactively looking for fraud symptoms means auditors can detect and even prevent the fraud i.e. payroll batch test example It is possible to perform 100% examination of data Determine a frequency for running the jobs Run the jobs and review the results 8
9 Accounts Receivable To compensate for her meager salary, an A/R clerk started cashing customer payments When customers paid by check, she used one of two methods: 1) Take the customer check, cash it, and don t record the payment. In this case, she would create a new customer monthly statement to make it look like the payment had been credited to the account. The account balance would still show an account balance higher than the balance on the statement, but the customer would not know that 9
10 Accounts Receivable (Cont d) 2) Cash the customer s check and hide the theft by crediting the customer account, meanwhile debiting a fictitious account she had set-up. This meant that her receipts balanced, and the valid customer accounts were correct. Later, she would write-off the fictitious account as bad debt The company had established a voice system that customers could call to get their balances, and the customers were reporting discrepancies 10
11 Accounts Receivable An auditor had looked at trends in the A/R department and determined that the amount written off as bad debt had increased significantly in the last year An aging on the accounts that had been written off was performed The results showed that some accounts had been written off even though the balance had only been outstanding for 3 months The usual period was one year and only after three reminders had been sent out Not one reminder letter had been sent out 11
12 Overtime Audit Identify Managers with overtime expenditures greater than 1.5 times last year s overtime totals Highlight all managers with overtime expenditures greater than or equal to 10% of their regular pay budget Identify all employees with total overtime payments equal to more than 25% of their salary 12
13 Overtime Audit The overtime can be analyzed by type: Regular overtime, 1 st day of rest -Saturday 2 nd day of rest Sunday By matching the overtime records to the attendance system, audit can determine if individuals are consistently taking the next 2 days off with or without pay Total overtime paid by type of overtime was calculated to determine instances where individuals were working more overtime on the second day of rest at double time rates vs. regular overtime (at time and a half) This highlights where management controls over the use of OT might not be working as intended or effective ACL reference (pg 167) 13
14 Using ACL to Identify Obsolete Inventory Items Reducing inventory carrying costs Raw materials / sub-components should be deemed obsolete when the parent finished good product is declared obsolete (in some cases) Where used reports can be utilized to determine where a raw material is used within finished good products Items used to maintain the obsolete item should be declared obsolete; unless items supported another piece of equipment 14
15 Obsolete Identification Example: Auditors obtained a file of obsolete items for the past three years; compared those items to an active inventory listing and subsequently. Flagged those items that supported obsolete pieces of equipment Secondarily, they flagged those items marked obsolete to see if they supported other non-obsolete pieces of equipment ACL reference (pg. 118) 15
16 Inventory Levels Identify inventory items with stock levels greater than maximum stock levels Stock levels on hand that would satisfy several years worth of use Low turnover rates Check for shelf life flags extract items which have been stored for periods longer than stated shelf life Compare turnover rates with reorder levels (Example: Does it make sense to set reorder qty at 100 if it took five years to order 25 items) 16
17 Inventory Levels (cont d) Compare turnover rate by item by location Run statistics to determine negative inventory reporting Timing Shipping reports product shipped before manufacturing floor reports product as produced Partial shipments risk of backflushing full order Trend analysis on inventory shrinkage (avg. price, yearly loss, etc.) Search for inventory at zero standard cost Search for finished goods standard cost that does not equal sum of components 17
18 Commissions / Bonus Review policies and procedures to understand commission schedules and conditions for bonuses. Extract data from commission system for past five years to determine commission and bonus payment pattern Reviewing the total of these payments for the past five years by region allow auditors to identify trends and determine regions with largest total payments for commissions / payments ACL reference (pg 108 B) 18
19 Commissions Identify all employees by geographical area who had received commissions amounting to 20% or more of their regular salary figures Identify all locations with significant increases over last year s budgets for commissions / bonuses Totals by location, sales area, and other criteria can be reviewed These results are used to select a sample 19
20 Commissions Select the job title, work location, supervisor and rate of pay from the personnel system The compensation system is used to determine total commissions and bonuses paid to each employee in the sample (for current year and past three years) The sales system was used to identify the annual sales volume for these employees for the past three years Note: An analysis of returns after quarter-end by responsible salesperson could be performed as well 20
21 Payroll Fraud Symptoms Risk of continuing to pay ex-employees Risk of paying new employees prior to their actual start date Risk increases with rapid growth, high turnover Compare the personnel system to the payroll system This batch job can be run before checks are released Thereby, erroneous checks can be identified ACL reference Pg
22 Payroll Test for Duplicate Direct Deposit Numbers Test for Duplicate Employee Addresses Example: Developer responsible for the benefits system was able to create three ghost employees and direct their pay to his bank account Compare payroll disbursements to employee master file to identify discrepancies 22
23 Payroll Analytics Direct deposit number duplicate No medical deductions No tax deductions Employee name duplicate Employee address duplicate Employee / vendor addresses match Overtime pay greater than X amount SSN blank SSN duplicate Check sequence Duplicate payments 23
24 Sales Numerous transactions at multiple store locations requires data analytics to track Discover improper discount or promotional applications Detect trends in pricing, inventory by store or region Trace sales to valid vendors Ensure validity of vendors through approval tracking and duplicate testing on vendor master file this can prevent duplicate, fraudulent, and miscoded transactions ACL Reference(pg. 15)
25 Purchasing Fraud and Detection Fictitious vendors Filtering P.O accounts, blank fields Join function to search matches in vendor and employee addresses, phone numbers Duplicate, similar and generic vendor searches Identifying knock off vendors through sounds-like function Sequential invoices Gap analysis Test for duplicates on date and invoice number
26 Telephone Charges Telecommunication charges were increasing steadily The data received from the phone company included: the originating phone number phone number called date and time of call length of call in minutes cost ACL was used to run several reports, including: All long distance calls longer than three hours The results showed a number of calls that were exactly 999 minutes (over 16 hours) in length 26
27 Telephone Charges (Cont d) By performing a detailed review of the activity on these lines the auditors found that other calls had been made during this time period on phones that did not enable multiple calls The root cause after checking with the phone company was a faulty communication switch that remained open after the phone had been hung up Failing to register the completion of the call, thereby resulting in an erroneous long distance charge 27
28 Telephone Charges (Cont d) The phone company had a maximum call length of 999 minutes or the charges would have been even higher All charges were reversed by the company Overall result was 17% reduction in the total telecommunications bill 28
29 Telephone Charges (Cont d) In some cases, where calls were longer than 180 minutes, large data transfers were being performed between two sites. The auditors summarized the detailed billing information and determined that usage was high enough to justify leasing a dedicated line Reducing the overall cost and improving the transmission speeds and reliability of file transfers. 29
30 Telephone Charges (Cont d) Another test centered on possible abuse of long distance privileges Auditors identified calls after working hours or during holiday periods Recommendations: Restrict the ability to call long distance after 6pm and on weekends and holidays A simple change to the company s telecommunication switch software to block all access to pay-per-minute exchanges (search data for 1-900, calls) 30
31 Telephone Charges (Cont d) The audit reviewed the accuracy of the telephone bill and the efficiency and effectiveness of leased lines The auditors selected a sample of dedicated leased long distance lines from a number of branch offices Automatically generated confirm letters to be sent to the branch offices The letter asked the branch managers to verify the accuracy of the charges by ensuring the lines were still connected Managers were asked to justify the lines 31
32 Telephone Charges (Cont d) In 10% of the cases, the lines were no longer required but the service had never been canceled In a further 5% of the cases, the lines were not even physically connected to a phone. Because of office redesigns, telephone lines terminated in closets, etc. 32
33 Telephone Charges (Cont d) The use of audit software to analyze thousands of lines of detailed calling information, and to highlight anomalies or potential abuses, greatly improved the effectiveness of the audit Overall result was 17% reduction in the total telecommunications bill 33
34 Regression Analysis Regression Analysis is a statistical method for examining a series of records to determine if the values are appropriate A mathematical relationship is established between the driver and the dependent variable For example, the amount of heating fuel used is dependent on the temperature Using regression analysis you can estimate how much heating fuel will be used given a certain temperature Auditors and fraud investigators can compare predicted values with actual values 34
35 Credit Card Purchases The bank was losing millions of dollars due to fraudulent purchases made using stolen credit cards The audit director was asked to identify a way to identify inappropriate purchases as early as possible Regression analysis was used to compare each transaction per cardholder to their normal purchasing pattern Anomalies were identified and cardholders called to determine if they had made the purchase 35
36 Credit Card Purchases A second analysis was to review vendors A third analysis was a comparison of the dates and locations of purchases Two purchases made on the same day, but in widely separated zip codes would cause a flag to be set 36
37 No Vacancy The manager of a large apartment complex in the city claimed he had a 5% to 10% vacancy rate The rate was not significantly higher than any of the other buildings owned by the company The manager was renting out apartments to friends and relatives, without having them sign a lease They paid him a nominal sum each month and he kept the cash Since they did not sign the lease, the owners of the complex thought the apartments were empty 37
38 No Vacancy The auditors were reviewing the leases for all the buildings owned by the company They had enough data to use regression analysis to predict the number of people living in a building Based on electricity, water, and heat usage The predicted number of tenants was then compared with the actual number of people listed on the leases Everything checked out within acceptable limits until they came to this complex 38
39 No Vacancy The analysis estimated that there should be 1,203 tenants, but the leases only accounted for 1,147 A careful review of all apartments found 58 people living in 14 apartments that the manager had rented to his friends and relatives, without a signed lease 39
40 Digital Analysis A growing area of fraud prevention and detection involves the examination of patterns in the actual data The rationale is that unexpected patterns can be symptoms of possible fraud A simple example of the application of this technique is the search for duplicate transactions, such as the same invoice number and vendor number 40
41 Benford s Law More advanced techniques take data analysis to another level, examining the actual frequency of digits in the data Benford s Law developed by Frank Benford in the 1920 s makes predictions on the occurrence of digits in the data Benford s Law predicts that the first digit in a large number of transactions (10,000 plus) will be a 1 more often than a 2 ; and a 2 more often than a 3
42 Benford s Law Digit Frequency (first digit) Frequency (second digit)
43 Signing Authority Analysis of contracts showed the digits 49 were in the data more often than expected Classifying on the Contracting Officer for all contracts with 49 determined that a contracting manager was raising contracts for $49,999 Contracts under $50,000 could be sole sourced; Contracts $50,000 or higher had to be submitted to a bidding process He was raising contracts just under the financial limit and directing them to a company owned by his wife
44 Ratio Analysis A useful fraud detection technique is the calculation of ratios for key numeric fields Data analysis ratios point to possible symptoms of fraud Commonly used ratios are: The ratio of highest value to the lowest value (maximum / minimum) The ratio of the highest value to the next highest (maximum / 2 nd highest) The ratio of the previous year to the current year 44
45 Ratio Analysis For example, auditors concerned about prices charged for a particular product Calculate the ratio of the maximum sales price to the minimum sales price If the ratio is close to one, they can be sure that there is not much variation between the highest and lowest prices charged to customers If the ratio is large, this could be an indication that a customer is being charged too much or too little 45
46 Contracting Kickbacks A contract officer had devised a scheme The auditors used digital analysis as part of their review One analysis calculated the total contract amount by vendor for each of the two past years A ratio of current year to previous year was calculated and the STATISTICS command was used to look at the following: Minimum Maximum Average Highest five ratios Lowest five ratios
47 Contracting Kickbacks (Cont d) The highest 5 ratios and the lowest 5 ratios showed that some companies had significant decreases in business, while others had significant increases The auditors reviewed the details for all companies with last year to current year ratio of less than 0.7 or greater than 1.3; The detailed records were extracted to a file Totals were calculated by contracting officer
48 Contracting Kickbacks (Cont d) One contracting officer was responsible for many of the companies that had seen an increase in business; However, the same contracting officer had raised no contracts with the companies that had seen a decrease in business; By talking to the salespeople at these companies, the scheme was uncovered
49 Doctored Bills The auditors reviewed the patient billing system to determine if the appropriate charges were being assessed to the patient s healthcare providers An initial analysis of the data was performed to calculate the ratio of the highest and lowest charges for each procedure The auditing standards required that procedures with a ratio of highest to lowest greater than 1.3 be noted and additional review performed Three procedures had ratios greater than 1.30
50 Doctored Bills (Cont d) A filter was set to identify the records related to the three procedures in question and additional analysis was performed This quickly determined that one doctor was charging significantly more than the other doctors for the same procedures A comparison of the charges from the billing system with the payments recorded in the accounts receivable system, revealed that the doctor was skimming a portion of the payment received
51 Doctored Bills (Cont d) The amount recorded in the receivable system was in line with the usual billing amount for the procedures The doctor was unable to justify the higher prices or explain the difference in the billing and the receivable systems
52 Time and Expenses In ACL auditors use the MOD function to identify transactions that are multiples of $10 or multiples of $100 Utilized for standard journal entry testing procedures Maximums for meals / hotels can be charged, however actual receipts do not match the maximum 52
53 Reference Material Fraud Detection Using Data Analysis Techniques to Detect Fraud By David G. Coderre David G. Coderre has over 18 yrs of experience in the informatics field in both the public and private sector. He is a recognized expert on CAATTs development and usage and has written numerous articles for leading international journals. He has also taught the use of CAATTS to auditors in various governments, including Canada, Indonesia and Mexico. Mr. Coderre holds an MBA from the University of Toronto and is a member of the Institute of Internal Auditors CAATTs & other BEASTs for Auditors Computer Assisted Audit Tools and Techniques (CAATTs) & Beneficial Electronic Audit Support Tools (BEASTs) By David G. Coderre 53
54 APPENDIX Common Automated Auditing Techniques Payables Employees Receivables & Sales Inventory & Purchasing Cash Fraud Vendors Fraud A/R & Sales Fraud - Purchasing 54
55 Payables Tab Area Audit Test Purpose of Test Data Extracts Required Payables & Disb. A/P Aging Verify Aging Test Accuracy of Client Aging Payables & Disb. A/P Activity Duplicate Payments Payables & Disb. Vendors Common vendor names Payables & Disb. Vendors Purchases fluctuation Identify Duplicate Payments Verify existence of vendors with common names Identify large fluctuations as compared to PY Invoice #, invoice date, invoice amount, due date Check# / wire #, amount, date, vendor/payee #, vendor invoice #, amount Vendor master data: name, address, phone, contact name Purchases by vendor PY and FY ACL function Age Classify/summariz e/sort Index Comparison sort Data Extract Source A/P subledger Check register / payment data A/P / Purchases master data Purchases / A/P payments 55
56 Employees Tab Area Audit Test Purpose of Test Data Extracts Required Employees Human Resources Payroll validity Identify duplicate addresses, ss#, bank accts Employees Human Resources Timely assoc. disposition Employees Human Resources Match payroll with employee master Verify exemployees no longer on payroll Verify only employees get paid HR data: employee name, ss#, address, chk acct#, accrued vacation, vacation taken, overtime billed, phone # List of terminated employees: employee name, ss#, address, chk acct#, accrued vacation, vacation taken, overtime billed, phone # HR data as above; Payroll run ACL function Duplicates search Join / match Data Extract Source Payroll records Payroll records; HR terminations Join / match Payroll records / HR master 56
57 Receivables & Sales Tab Area Audit Test Purpose of Test Data Extracts Required Receivable & Sales Receivable & Sales Receivable & Sales Receivable & Sales A/R Aging Verify Aging Test Accuracy of Client Aging A/R Aging Customer Balances Identify sig. cust. in AR aging; test accuracy of cust. balances per client; identify cust. with net credit balances A/R Sampling CMA Sampling Perform CMA sampling of receivables A/R Controls Customers who are employees Identify any customers who are employees Invoice #, invoice date, open invoice amount Customer #, customer name, item#, item date, open amount Customer #, customer name, item#, item date, open amount Customer #, customer name, item#, item date, open amount ACL function Age Classify/ summarize/ sort Sample Join / match / merge Data Extract Source A/R Subledger A/R Subledger A/R Subledger Customer A/R master data; HR master 57
58 Inventory & Purchasing Tab Area Audit Test Purpose of Test Data Extracts Required Invty & Purch Inventory Aging Verify Aging Test Accuracy of Client Aging Invty & Purch Invty & Purch Invty & Purch Invty & Purch Invty & Purch Inventory Subledger Inventory Subledger Inventory Subledger Inventory Sampling Purchasing Controls Negative / $0 Cost Items Negative Qty Items Duplicate Sku's, Costs CMA Sampling Purchases under review limit Identify items with negative or zero cost Identify items with negative qty Identify Duplicate Sku #, description or cost Perform CMA sampling of inventory Identify purchases just under the $ limit that requires more approval sku #, description, qty, unit cost, last purch date, last sale date sku #, description, qty, unit cost sku #, description, qty, unit cost sku #, description, qty, unit cost sku #, description, qty, unit cost ACL function Age Sort Sort Sort/sequence Sample Data Extract Source Inventory subledger Inventory subledger Inventory subledger Inventory subledger Inventory subledger Purchases detail Index Purchases g/l 58
59 Cash Tab Area Audit Test Purpose of Test Data Extracts Required Cash Bank Reconciliations Cutoff Identify reconciling items after reconciliation cutoff date Reconciling items: date, item#, description, amount ACL function Sort, filter Data Extract Source Reconciling items detail 59
60 Fraud - Vendors Tab Area Audit Test Purpose of Test Data Extracts Required Fraud Vendors Vendors who are employees Identify any vendors that are employees Fraud Vendors Check sequence Identify any checks out of sequence Fraud Vendors Duplicate payments Identify any duplicate payments Fraud Vendors Duplicate POs Extract invoices posted with duplicate PO's Vendor master and HR master ACL function Join / match / merge FY A/P Payments Sequence analysis Data Extract Source Vendor and HR Masters A/P check runs FY A/P Payments Extract A/P check runs FY A/P Payments with invoice #, PO #, amount, payee, check# Extract; statistics A/P check runs 60
61 Fraud A/R & Sales Tab Area Audit Test Purpose of Test Data Extracts Required Fraud A/R Employee associate purchases Review associate purchases for large amounts Fraud A/R Write-offs Determine validity of write-offs Fraud A/R Customers with no contact phone number Identify any customers with no phone number FY Employee purchases; name, date, amount, item, qty, pymt history FY A/R system write-offs; legal Fraud A/R / Sales Sales / A/R match Identify all A/R customer customers in sales data; Sales master that are not in A/R data Fraud A/R Duplicate Identify any A/R customer data accounts within duplicates in A/R / Sales master the portfolio portfolio data Fraud Sales/A/R Refunds Identify high volume refund customers ACL function Statistics, index Data Extract Source Employee purchases detail Statistics, index All FY write-offs for specific A/R w/offs accounts data A/R customer data Index, filter A/R master data Customer name; refund amount, date Merge / join Extract Statistics A/R and Sales master A/R and Sales master A/R transaction data 61
62 Fraud - Purchasing Tab Area Audit Test Purpose of Test Data Extracts Required Fraud Purchasing Purchases under review limit Identify purchases just under the $ limit that requires additional approval ACL function Data Extract Source Purchases detail Index Purchases g/l 62
63 80 City Square Boston, MA P F AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE
Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71
Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns
More informationAccounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
More informationUsing Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
More informationAudit of Cash Balances
Audit of Cash Balances Chapter 23 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 23-1 Learning Objective 1 Show the relationship of cash in the bank to the various transaction
More informationChapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
More informationTHE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
More information10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process
10-1 Auditing Business Process Auditing Business Process Objectives Understand the Auditing of the Enteties Business Process Identify the types of transactions in different Business Process Asses Control
More informationUse of Data Extraction & Analysis Software In a Financial Statement Audit
Use of Data Extraction & Analysis Software In a Financial Statement Audit A Message from The Audit Wizard April 2008 Making Auditors Proficient, Inc. Phone: 352-750-9636 www.billallen.com E-mail: ballen@billallen.com
More informationIntroductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal
More informationChapter 15: Accounts Payable and Purchases
Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:
More informationACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
More informationGENERAL PAYROLL CONTROLS Dates in scope:
GENERAL PAYROLL CONTROLS Risk # Risk Expected Control Step # Testing Documents/Info Needed 1 Unauthorized initial pay rate 2 Unauthorized/unsupported deductions (statutory deductions and benefits). Initial
More informationCity of Berkeley. Accounts Payable Audit
City of Berkeley Accounts Payable Audit Prepared by: Ann-Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit Manager, CIA, CGAP Frank Marietti, Senior Auditor, CIA, CGAP Presented to Council
More informationCash in bank checking account $22,500 U.S. treasury bills 5,000 Cash on hand 1,350 Undeposited customer checks 1,840 Total $30,690 Requirement 2
Chapter 7 Solutions EXERCISES Exercise 7 2 Cash and cash equivalents includes: Cash in bank checking account $22,500 U.S. treasury bills 5,000 Cash on hand 1,350 Undeposited customer checks 1,840 Total
More informationJD Edwards EnterpriseOne One View Reporting Functional Content Overview
JD Edwards EnterpriseOne One View Reporting Functional Content Overview October 2012 2 Agenda ERP Reporting Business Issues Benefits of One View Reporting One View Reporting Across The Enterprise Functional
More informationTIPS AND TRICKS for the CORE ACCOUNTING MODULES REMINDER:
REMINDER: Please remember that this document is meant to be a guideline with some ideas of ways you can use MAS 90 / 200 core accounting modules more fully. However, your settings or process may not work
More informationU S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
More information204 Reports Included with Version 7.0!
204 Reports Included with Version 7.0! Accounts Payable Aged A/P summary by name Aged A/P summary by number Detailed A/P activity by name Detailed A/P activity by number Detailed aged A/P by name Detailed
More informationPortfolio Based Enterprise Property Management System allows you to manage hundreds of properties from your virtual desktop.
AP Cash GL Portfolio Based Enterprise Property Management System allows you to manage hundreds of properties from your virtual desktop. User friendly interface allows most actions to be completed in one
More informationB Resource Guide: Implementing Financial Controls
What s in this Guide: I. Definition: What are Financial Controls? II. Why Do You Need Financial Controls? III. Best Practices: Financial Controls to Consider I. Definition: What are Financial Controls?
More informationAccounts Payable. Reference Guide
Accounts Payable Reference Guide Last Updated: January 19, 2009 About this Guide This Guide is for use by SedonaOffice customers only. This guide is not meant to serve as an operating or training manual,
More informationBDO Consulting. Segregation of Duties Checklist
BDO Consulting Segregation of Duties Checklist August 2009 BDO Consulting s Fraud Prevention practice is pleased to present the 2009 Segregation of Duties Checklist. We have developed this tool to assist
More informationContents. xiii xv. Case Studies Preface
Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes
More informationSolar Eclipse Accounts Payable. Release 8.7.2
Solar Eclipse Accounts Payable Release 8.7.2 Legal Notices 2011 Epicor Software Corporation. All rights reserved. Unauthorized reproduction is a violation of applicable laws. Epicor and the Epicor logo
More informationHow To Setup & Use Insight Salon & Spa Software Payroll - Australia
How To Setup & Use Insight Salon & Spa Software Payroll - Australia Introduction The Insight Salon & Spa Software Payroll system is one of the most powerful sections of Insight. It can save you a lot of
More informationAudit Program for Accounts Payable and Purchases
Form AP 50 Index Audit Program for Accounts Payable and Purchases Legal Company Name Client: Balance Sheet Date: Instructions: The auditor should refer to the audit planning documentation to gain an understanding
More informationWe now examine the documents and procedures used to perform each step. Step 1: Capture Transaction Data on Source Documents
Journals and Ledgers TRANSACTION PROCESSING: DOCUMENTS AND PROCEDURES IN A MANUAL AIS One basic function of the AIS is the efficient and effective processing of data about a company s transactions. Transaction
More informationFraud and internal controls, Part 3: Internal fraud schemes
Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.
More informationInternal Control Guidelines
Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth
More informationAccounts Payable User Manual
Accounts Payable User Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia Notice of Authorship
More informationAccounts Payable. Cash Projections Reports - 3-tiered Pay on Dates show what is due in the next 30/60/90 days.
The Accounts Payable module can process multiple Companies and Locations and is fully integrated to the General Ledger module. With the Reporting and Query capabilities of the AP module, you can increase
More informationWe recommend that you create seven binders: one each for each SAGE PRO module you own:
We recommend that you create seven binders: one each for each SAGE PRO module you own: General Ledger Inventory Control Accounts Receivable Accounts Payable Order Entry Purchase Orders Payroll If you have
More informationInternal Controls Best Practices
Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most
More informationOracle ERP Cloud Period Close Procedures O R A C L E W H I T E P A P E R J U N E 2 0 1 5
Oracle ERP Cloud Period Close Procedures O R A C L E W H I T E P A P E R J U N E 2 0 1 5 Table of Contents Introduction 7 Chapter 1 Period Close Dependencies 8 Chapter 2 Subledger Accounting Overview 9
More informationSuccessWare 21 Online Class Curriculum
SuccessWare 21 Online Class Curriculum The following is a list of the classes that we currently offer our users in an online format. Each of the class consists of the stated number of 90 minute sessions.
More informationAccounts Payable and Inventory Management
Accounts Payable and Inventory Management 2013 SedonaOffice Users Conference Presented by: Lisa Gambatese & Laurie Goodrich Table of Contents Accounts Payable G/L Account Defaults (AP) 4 A/P Setup Processing
More informationThese are some labor burden test queries that auditors can make if they have the contractor s or vendor s labor burden breakdown:
Applying Data Mining and Analytics to Efficiently Audit Vendors and Contractors By Paul Pettit, Protiviti Inc. Each year, companies spend billions of dollars to start up, operate and maintain their businesses
More informationAudit Program for Accounts Receivable and Sales
Form AP 15 Index Reference Audit Program for Accounts Receivable and Sales Legal Company Name Client: Balance Sheet Date: Instructions: The auditor should refer to the audit planning documentation to gain
More informationHow To Find Out If A Company Misstatement Is True
A U D I T I N G A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT 9 th Edition Karla M. Johnstone Audrey A. Gramling Larry E. Rittenberg CHAPTER 11 AUDITING INVENTORY, GOODS AND SERVICES, AND ACCOUNTS
More informationThe University of Arizona Financial Services Office INFORMATION & INSTRUCTIONS
The University of Arizona Financial Services Office Special Fiscal Year End Reporting: Inventory, Accounts Receivable, Unearned Revenues, Prepaid Expenses & Deposits INFORMATION & INSTRUCTIONS May 19,
More informationby: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
More informationAgencyPro. Cash Accounting Workflow
AgencyPro Cash Accounting Workflow This document is a supplemental accounting guide to reiterate the general processes outlined during the first accounting training. Some of the outlined processes differ
More informationHow To Manage A Corporation
Western Climate Initiative, Inc. Accounting Policies and Procedures Adopted May 8, 2013 WESTERN CLIMATE INITIATIVE, INC ACCOUNTING POLICIES AND PROCEDURES Adopted May 8, 2013 Table of Contents I. Introduction...
More informationChapter 18 Auditing Investments and Cash Balances
Chapter 18 Auditing Investments and Cash Balances General Considerations Cash balances include undeposited receipts on hand, cash in bank in unrestricted accounts, and imprest accounts such as petty cash
More informationSTUDIO DESIGNER. Accounting 4 Participant
Accounting 4 Participant Thank you for enrolling in Accounting 4 for Studio Designer and Studio Showroom. Please feel free to ask questions as they arise. If we start running short on time, we may hold
More informationFlorida A & M University
Florida A & M University AP PROCEDURES 3-8-2013 TABLE OF CONTENTS 1.0 OVERVIEW... 1 2.0 DEFINITIONS... 1 3.0 RESPONSIBILITIES... 2 4.0 GENERAL PROCEDURES... 3 4.1 DEPARTMENTAL FISCAL REPRESENTATIVES...
More informationAdvanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
More informationA/R Journal Entries GAAP. Add Invoice Line. Cancel Line from Invoice Maintenance. Cancel Balance via Write-Off Invoice Balances Routine
CHAPTER 6 A/R Journal Entries This chapter will review the automated journal entries made by the module. The entries are separated into a GAAP and Non-GAAP section. GAAP Add Invoice Line An accrual entry
More informationChapter 13. The Expenditure Cycle. Because this cycle involves the outflow of cash, it is the counterpoint to the revenue cycle
Chapter 13 The Expenditure Cycle Introduction Because this cycle involves the outflow of cash, it is the counterpoint to the revenue cycle Two subsystems include: The purchases processing system The cash
More informationAn Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
More informationAccounts Payable 6.4 User Manual
Accounts Payable 6.4 User Manual Accounts Payable TABLE OF CONTENTS Accounts Payable User Manual Introduction... 3 Purpose... 3 Accounts Payable Overview... 3 Enter Payable... 4 General Info... 6 Remit
More informationCommercial and Industrial Lending
Commercial and Industrial Lending A CPA Perspective April 2014 Overview Introductions and Goals of Presentation Commercial and Industrial Lending: Brief Background Covenants, Advance Rates, and Borrowing
More informationChapter 8. Internal Control. Chapter 8-1
8 Internal Control and Cash 8-1 Internal Control and Cash Internal Control Cash Controls Use of a Bank Reporting Cash The Sarbanes- Oxley Act Principles Limitations Control over cash receipts Control over
More informationAccounts Receivable User Manual
Accounts Receivable User Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia Notice of Authorship
More informationAuditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009
Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter October 1, 2009 Supply Chain Risk Overview * Today s Focus * Includes Working Capital benefits 1 2009 Protiviti Inc. An Equal Opportunity
More informationAGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
More informationINTERNAL CONTROL OVER PURCHASE INTERNAL CONTROL OVER INVENTORY INTERNAL CONTROL OVER CASH PAYMENTS INTERNAL CONTROL OVER CASH RECEIPTS
Internal Control over the followings is included in the syllabus: INTERNAL CONTROL OVER SALES INTERNAL CONTROL OVER PURCHASE INTERNAL CONTROL OVER INVENTORY INTERNAL CONTROL OVER CASH PAYMENTS INTERNAL
More informationPresented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
More informationFinance process. Taking advantage of R6 Accounts Receivable and Collection Management to maximize revenue and cash flow. R6 Functional Overview
R6 Functional Overview products customers orders billing finance Finance process Taking advantage of R6 Accounts Receivable and Collection Management to maximize revenue and cash flow Table of Contents
More informationM O N T H E N D / Q U A R T E R L Y / Y E A R E N D C H E C K L I S T S & P R O C E D U R E S ACCOUNTS RECEIVABLE ACCOUNTS PAYABLE
M O N T H E N D / Q U A R T E R L Y / Y E A R E N D C H E C K L I S T S & P R O C E D U R E S ACCOUNTS RECEIVABLE ACCOUNTS PAYABLE PAYROLL GENERAL LEDGER PROCOM SOLUTIONS, INC. OAKLAND CENTER 8980-A ROUTE
More informationStep 3. Clear Withdrawals, Data Entry Errors, and Bank Errors
Reconciling Bank Statements If this is the first time you have reconciled a bank statement for this company, you must prepare your bank accounts. See Chapter 4, Setting Up Bank Services, for the procedure.
More informationCopyright 2011 Business Management Systems. Web Based ERP/CRM Software
Web Based ERP/CRM Software INTRODUCTION... 7 Features... 8 Services... 9 INSTALLATION... 10 CUSTOMER FILE... 11 Add Customer... 11 Modify Customer... 13 Add Ship To... 14 Modify Ship To... 15 Reports...
More informationAccounts Payable. Best Practices: Existing Control: Control Gap: Controls Evaluation and Gap Analysis. Purchasing
Accounts Payable Gap Analysis: POS identifies the following Best Practices as efficient and effective control processes for the above risk. Listed for comparison are the controls currently in place, if
More informationCity of Berkeley. Prepared by:
City of Berkeley Berkeley Public Library Purchasing and Accounts Payable Audit Prepared by: Ann-Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit Manager, CIA, CGAP Frank Marietti, Senior
More informationAccounts Receivable User s Guide
Accounts Receivable User s Guide Last Update: July 2015 Contents Accounts Receivable User s Guide... 1 ACCOUNTS RECEIVABLE INTRODUCTION... 2 How AMS works with Other Applications... 3 YEAR START-END AND
More informationWVU FOUNDATION & UNIVERSITY PURCHASING CARD PROGRAM POLICIES & PROCEDURES. Updated October 2012
WVU FOUNDATION & UNIVERSITY PURCHASING CARD PROGRAM POLICIES & PROCEDURES Updated October 2012 Introduction This document contains the guidelines applicable to the WVU Foundation, Inc. Purchasing Card
More information8.0.0.0.0 Accounts Receivable. I. Overview Definitions and Abbreviations. Equipment and Supplies Required
8.0.0.0.0 Accounts Receivable I. Overview Definitions and Abbreviations Equipment and Supplies Required Page 1 of 36 Revised October 2015 Version 4 II. Job Position(s) Accounts Receivable Clerk Page 2
More informationHierarchy of a Standard PEO. Company
Client Maintenance This section details the procedures necessary to create a PEO client and describes the fields and options that appear on the Client Maintenance window. For details on setting up an ASO
More informationModule #9 Payroll Schemes
Module #9 Payroll Schemes Payroll Schemes include: Ghost employee schemes, which occur when a person not employed by the company is on the payroll Overpayment schemes, which occur when a company pays an
More informationInternal Control Systems
D. INTERNAL CONTROL 1. Internal Control Systems 2. The Use of Internal Control Systems by Auditors 3. Transaction Cycles 4. Tests of Control 5. The Evaluation of Internal Control Component 6. Communication
More informationACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
More informationUS BANK VOYAGER FLEET CARDHOLDER AND ADMINISTRATION POLICIES AND PROCEDURES FOR PACE UNIVERSITY-OWNED AND -ASSIGNED VEHICLES
US BANK VOYAGER FLEET CARDHOLDER AND ADMINISTRATION POLICIES AND PROCEDURES FOR PACE UNIVERSITY-OWNED AND -ASSIGNED VEHICLES Table of contents.1 Introduction... 2.2 Use of the Fleet Card... 3.3 User Record-Keeping
More informationMANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE
MANAGEMENT AUDIT REPORT OF ACCOUNTS PAYABLE REPORT NO. 04-108 CITY OF ALBUQUERQUE OFFICE OF INTERNAL AUDIT AND INVESTIGATIONS of Accounts Payable Report No. 04-108 Executive Summary Background The Department
More informationCALCASIEU PARISH SCHOOL BOARD SCHOOL ACTIVITY FUNDS EPES ACCOUNTING PROCEDURES MANUAL
CALCASIEU PARISH SCHOOL BOARD SCHOOL ACTIVITY FUNDS EPES ACCOUNTING PROCEDURES MANUAL TABLE OF CONTENTS CPSB SAF EPES Procedures Manual START UP 4 Log in 4 Main Screen 5 Exit 5 UTILITIES 5 Preferences
More informationA-21 Appendix: Comprehensive Cases CASE A.4: THE WOODEN NICKEL 1
A-21 Appendix: Comprehensive Cases CASE A.4: THE WOODEN NICKEL 1 Background The Wooden Nickel is a small retail clothing store located in Stillwater, Oklahoma, across the street from Oklahoma State University.
More informationFiscal Procedure Sequence page number
Table of Contents Fiscal Procedure Sequence page number Treasurer Responsibilities Maintenance of General Ledger Financial Statements Financial Signature/Review Policy Insurance Protection Payroll Procedures
More informationAccounts Payable System Administration Manual
Accounts Payable System Administration Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia
More informationLeveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
More informationPurchasing Card Program
Purchasing Card Program User Guidelines University of North Alabama Procurement Department Created: March 2008 / Updated 7/16/2015 University of North Alabama Purchasing Card Program 1 Table of Contents
More informationFraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
More informationEpicor 9 Accounts Receivable Course 9.05.600
Epicor 9 Accounts Receivable Course 9.05.600 Disclaimer Copyright 2010 by Epicor Software Corporation. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced
More informationUNIVERSITY OF NEVADA, RENO PARKING AND TRANSPORTATION SERVICES Internal Audit Report July 1, 2011 through June 30, 2013
UNIVERSITY OF NEVADA, RENO PARKING AND TRANSPORTATION SERVICES Internal Audit Report July 1, 2011 through June 30, 2013 GENERAL OVERVIEW The University of Nevada, Reno (UNR) Parking and Transportation
More informationSegregation of Duties
Segregation of Duties Scott Mitchell, Senior Manager (503) 478-2193 John Earl, Manager (503) 478-2188 January 5, 2010 Our Objectives Clarify the role of Segregation of Duties (SOD) Identify alternatives
More informationWelcome to the topic on purchasing items.
Welcome to the topic on purchasing items. In this topic, we will perform the basic steps for purchasing items. As we go through the process, we will explain the consequences of each process step on inventory
More informationBEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL
BEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL Revised 3-27-2014 TABLE OF CONTENTS Section 1: Section 2: Section 3: Section 4: Section 5: Section 6: Section 7: Section 8: Section 9: Cash Management
More informationINTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
More informationGetting Started Using CC Merchant for Trams Back Office
Getting Started Using CC Merchant for Trams Back Office System Requirements Trams Back Office - Version 3.01 or higher Microsoft Internet Explorer 6.0 or higher Internet Connection The CC Merchant feature
More informationComputer Helper Publishing, Inc. 800-533-5227 www.churchwindows.com
Training 2010 Financial to Accounting Transition Book 3: Transactions & Corrections Computer Helper Publishing, Inc. 800-533-5227 www.churchwindows.com Book 3 Transactions & Corrections Basic Transactions...
More informationContinuous Auditing with Data Analytics
Continuous Auditing with Data Analytics Brooke Miller, CPA, CIA, CPCU brooke.miller@rlicorp.com Sean Scranton, CPCU, CISSP, CISM, CISA sean.scranton@rlicorp.com Overview Understand embedding data analytics
More informationUnderstanding Financial Statements: What do they say about your business?
Understanding Financial Statements: What do they say about your business? This workbook is not designed to be your only guide to understanding financial statements. A much wider range of resources is available
More information1. SEGREGATION OF DUTIES IS ESSENTIAL
The way a church handles money can present a positive or negative witness. Churches need to be diligent in handling money to encourage integrity and positive Biblical stewardship. Every step should be
More informationEnterpriseOne Xe Property Management PeopleBook
EnterpriseOne Xe Property Management PeopleBook September 2000 J.D. Edwards World Source Company 7601 Technology Way Denver, CO 80237 Portions of this document were reproduced from material prepared by
More informationThe Accounting Cycle. Cycle. The Accounting Cycle SUA Reference p.10. Overview. The Accounting Cycle. 6 Major Subcycles. Subcycle (transaction cycle):
Everything you ever wanted to know about... The Accounting Overview Review of the manual Accounting 6 Major Subcycles Begin the SUA Transactions Occur Prepare Closing Entries The Accounting SUA Reference
More informationDynamics GP Year End Closing Processes
Dynamics GP Year End Closing Processes FOLLOWING ARE THE COMBINED STEPS FROM THE MICROSOFT DYNAMICS GP YEAR END CLOSING PROCEDURES. WHEN TO CLOSE AND THE ORDER FOR CLOSING MODULES (1) Inventory Fiscal
More informationDecember 2004 2303 Camino Ramon, Suite 210 San Ramon, CA 94583-1389 Voice: 925.244.5930 Fax: 925.867.1580 Website: www.miscorp.com
December 2004 2303 Camino Ramon, Suite 210 San Ramon, CA 94583-1389 Voice: 925.244.5930 Fax: 925.867.1580 Website: www.miscorp.com Copyright 2004 All rights protected and reserved TABLE OF CONTENTS I.
More informationACCOUNTING POLICIES AND PROCEDURES SAMPLE MANUAL
(Name of Organization & logo) ACCOUNTING POLICIES AND PROCEDURES SAMPLE MANUAL (Date) Note: this sample manual is designed for nonprofit organizations with the following staff involved with accounting
More informationACCRUAL ACCOUNTING WORKFLOW
ACCRUAL ACCOUNTING WORKFLOW TABLE OF CONTENTS COMPANY ACCOUNT NUMBERS... 2 POLICY ENTRY... 2 Agency Bill... 2 Direct Bill... 3 Transaction Detail... 3 CLIENT PAYMENTS... 4 Agency Billed Payment... 4 Direct
More informationTTC AUDIT COMMITTEE REPORT NO.
Form Revised: February 2005 TTC AUDIT COMMITTEE REPORT NO. MEETING DATE: July 14, 2009 SUBJECT: INTERNAL AUDIT REPORT MATERIALS & PROCUREMENT INVENTORY PLANNING INFORMATION ITEM RECOMMENDATION It is recommended
More informationTORONTO PUBLIC LIBRARY Payroll Processing Review Report to Audit Committee Summary of Findings
TORONTO PUBLIC LIBRARY Payroll Processing Review Report to Audit Committee Summary of Findings Documentation supporting the initial recording of payroll information (such as time sheets) is reviewed and
More information