THE ABC S OF DATA ANALYTICS
|
|
|
- Violet Marsh
- 10 years ago
- Views:
Transcription
1 THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA)
2 AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable Grades and Registration Payroll Information Technology Academics Tuition Continuous Monitoring Questions? 2
3 DATA ANALYTICS OVERVIEW 3
4 WHY DO YOU NEED DATA ANALYTICS? Do you find yourself burning the midnight oil at your desk, just trying to get coverage of key risk areas? 4 Are areas that you need to review piling up?
5 WHAT ARE DATA ANALYTICS? Data analytics can best be described as examining raw data for the purpose of formulating an opinion about the data and drawing conclusions based upon the results. Used in all industries if you have data, you can perform data analytics. Gives auditors and management the tools they need to make better decisionsand maximize resources 5
6 WHAT IS DATA ANALYTICS? Data Analytics are First used to identify patterns and establish hidden relationships. Then focuses on what is already known by the researcher while preexisting conclusions are proven true or false. Data analysis is used to determine whether the organization is operating in line with its overall goals and objectives. 6
7 WHAT IS DATA ANALYTICS? Do all of your systems talk to each other? Data analytics helps you compare data from multiple systems. 7
8 DATA ANALYTICS EXAMPLES 8
9 EXAMPLE: COMPLIANCE 9
10 COMPLIANCE Monitor the retention of various records and documents to ensure compliance with Federal, State, and/or local regulations. Extract transactions by funding code, fiscal year, and obligation control level, and compare to encumbrances. Analyze rates and license fees on licenses to determine bylaw compliance. Match vendor address file with employee address file to ensure compliance with vendor restrictions. Extract purchase orders below dollar amount requiring compliance with sealed bids. Extract transactions of assets funded by grants to ensure compliance with grant requirements. 10
11 COMPLIANCE (CONT.) Sort contracts database by contract or cost types to test compliance with government contract terms. Identify invalid cost transfers. Identify high-risk transactions (e.g. high dollar equipment, subcontracts, etc.). Identify individuals (scholarship recipients, athletes, etc.) not meeting minimum academic requirements. Analyze grading patterns which may indicate preferential treatment for specific students. 11
12 COMPLIANCE What compliance risks does your institution face? 12
13 EXAMPLE: PURCHASING AND ACCOUNTS PAYABLE 13
14 PURCHASING AND ACCOUNTS PAYABLE Reconcile order received to purchase order to identify shipments not ordered. Extract pricing and receipt quantity variations by vendor and purchase order. Track scheduled receipt dates versus actual receipt dates. Compare vendor performance by summarizing item delivery and quality. Compare accrued payable to received items to reconcile to general ledger. Identify duplicate invoice numbers. Identify duplicate payments (e.g., same amounts, common dates, etc.). 14
15 PURCHASING AND ACCOUNTS PAYABLE (CONT.) Identify unreleased encumbrances to clear excess funds. Review sequential invoice numbers for evidence of invoice splitting or sole customer. Find invoices without purchase orders. Look for distributions to suppliers not in suppliers master file. Compare recurring monthly expenses to paid invoices. Identify invoices posted with duplicate purchase order numbers. Calculate cash requirements by bank, period, product, vendor, etc. Look for lost discounts not taken. 15
16 EXAMPLE: GRADES AND REGISTRATION 16
17 GRADES AND REGISTRATION Identify admitted students with grades or test scores that do not meet entrance requirements. Identify excessive course loads (by faculty or students). Identify frequent or unusual grade changes. Calculate the number of days past tuition due date for course withdrawals with non-payment (as applicable). 17
18 EXAMPLE: PAYROLL 18
19 PAYROLL Identify incompatible or deactivated social security numbers Analyze for excessive hours/overtime. Analyze salary rates against approved rates. Identify duplicate names and social security numbers. Identify employees with no benefit payments. Extract multiple paychecks to same bank account. Identify excessive overtime in a department or by employee. Look for changes in key payroll data, such as gross pay, hourly rates, salary amounts, exemptions, etc. 19
20 PAYROLL (CONT.) Identify employees with increases greater than a specified percent. List employees with no vacation or no more than two consecutive days vacation in the last two years. 20
21 EXAMPLE: INFORMATION TECHNOLOGY 21
22 INFORMATION TECHNOLOGY Compare authentication/authorization files to employee files to verify that terminated employees have been removed from the system. Identify inactive user accounts (no activity in a set period of time). Identify large numbers of invalid access errors or log on attempts by users. Review access granted to temporary employees and students. Identify system access to key IDs occurring at odd times or from suspicious locations. Review for segregation of duties issues. 22
23 EXAMPLE: TUITION 23
24 TUITION Compare refund check addresses to employee addresses or drop boxes. Compare refund payments to refund policy. Identify refunds made outside of established refund dates. Identify multiple refunds to the same payee and/or irregular refund amounts. 24
25 EXAMPLE: UNCOVERING FRAUD 25
26 UNCOVERING FRAUD Is your organization falling victim to fraud? 26
27 UNCOVERING FRAUD Data Analytics can be used to identify fraud across the organization. Perform red flag testing to identify potential fraudulent vendors; look for vendors with multiple hits on the following examples: Address match to employee or customer address Telephone number match to employee or customer number Multiple vendors at the same address Duplicate telephone number Area code inconsistent with address Duplicate payments across 100% of AP transactions Monitor AFE spending limits. Identify multiple purchases designed to circumvent Delegation of Authority limits. Analyze AR write offs/adjustments. 27
28 UNCOVERING FRAUD Data Analytics can be used to identify fraud across the organization. (cont.) Review for excessive overtime. Review time card data for anomalies. Paid Time Off not taken. Identify negative deductions. Identify excessive numbers of exemptions. Analyze hours worked compared to hours paid. Determine individuals with no benefits (potential ghost employees). Identify multiple checks in a pay period. Identify duplicate payments (name, social security number, address, etc.). Determine segregation of duties conflicts. Identify transactions made by persons with segregation of duties conflicts. 28
29 CONTINUOUS MONITORING 29
30 CONTINUOUS MONITORING What is Continuous Monitoring? Monitors 100% of transactions Automated testing across one or more systems on a predefined frequency Provides reporting on a customized series of queries designed around an organization s individual business rules 30
31 IMPLEMENTING CONTINUOUS MONITORING Understand your environment Step 1 Map your data between tables and systems Step 2 Confirm the integrity of data imports and joins Step 3 Tailor queries to match your environment Step 4 Identify and adjust for false positives Step 5 Determine frequency and distribution Step 6 Step 7 Respond to monitoring results 31
32 IMPLEMENTING CONTINUOUS MONITORING Step 1 Understand your environment Preliminary set up and planning is critical Consider the specific organization Control Environment/Tone at the top Process Controls People Establish objectives What are your goals? Start simple and go for the win 32
33 IMPLEMENTING CONTINUOUS MONITORING Step 2 Map your data between tables and systems Analyze the Data What systems are involved? How is the data stored? What is the relationship between the different types of data? What fields do I need? Is the information I am interested in captured? 33
34 IMPLEMENTING CONTINUOUS MONITORING Step 3 Confirm the integrity of data imports and joins Verify control totals Confirm the accuracy of date, formatting, etc. 34
35 IMPLEMENTING CONTINUOUS MONITORING Step 4 Tailor queries to match your environment Design queries -what is it you want to know? Comparing actual rates to contract rates Reviewing payroll data for excessive overtime hours booked Reviewing transactions to determine if multiple purchases are being used to skirt delegation thresholds Determine organizational specific thresholds for review: Delegation of authority limits Payroll rate increases Budget numbers Segregation of duties rules 35
36 IMPLEMENTING CONTINUOUS MONITORING Step 5 Identify and adjust for false positives What items are showing up as exceptions that are reasonable: Annual bonus payments New hires New vendors Discounts for timely payment of an invoice etc. 36
37 IMPLEMENTING CONTINUOUS MONITORING Step 6 Determine frequency and distribution What is the best frequency to run each query? Who should receive the results? What are the expectations on resolving exceptions? Who should monitor the process? 37
38 IMPLEMENTING CONTINUOUS MONITORING Step 7 Respond to monitoring results Clear reported exception Consider the potential for additional false positives Validate the existing queries and design/change as appropriate How has your risk changed? Consider other processes for inclusion in the continuous monitoring process 38
39 QUESTIONS? 39
40 THANK YOU! Angel Butler Senior Manager UHY Advisors TX, LLC
41 ABOUT UHY ADVISORS, INC. In July, 2000, six leading regional tax and business advisory firms, with tenures dating back to the mid- 1960s, merged to form a national professional services entity known today as UHY Advisors, Inc. They came together in the pursuit of a shared vision: to deliver the service of a local/regional firm and the services of a national firm to the dynamic middle market. UHY Advisors provides tax and business consulting services to a variety of sectors. UHY LLP, a licensed certified public accounting firm, provides audit and other attest services to public and private companies through an alternative practice structure. Across the board, our professionals are as optimistic, confident, and as capable as the leadership of the companies we serve. To this end, we endeavor to hire and train professionals empowered to meet these high standards. UHY ADVISORS 2929 Allen Parkway, 20 th Floor Houston, TX Phone Fax Web UHY Advisors, Inc. provides tax and business consulting services through wholly owned subsidiary entities that operate under the name of UHY Advisors. UHY Advisors, Inc. and its subsidiary entities are not licensed CPA firms. UHY LLP is a licensed independent CPA firm that performs attest services in an alternative practice structure with UHY Advisors, Inc. and its subsidiary entities. UHY Advisors, Inc. and UHY LLP are U.S. members of Urbach Hacker Young International Limited, a UK company, and form part of the international UHY network of legally independent accounting and consulting firms. UHY is the brand name for the UHY international network. Any services described herein are provided by UHY Advisors and/or UHY LLP (as the case may be) and not by UHY or any other member firm of UHY. Neither UHY nor any member of UHY has any liability for services provided by other members UHY Advisors, Inc.. All rights reserved
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
BEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL
BEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL Revised 3-27-2014 TABLE OF CONTENTS Section 1: Section 2: Section 3: Section 4: Section 5: Section 6: Section 7: Section 8: Section 9: Cash Management
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,
B Resource Guide: Implementing Financial Controls
What s in this Guide: I. Definition: What are Financial Controls? II. Why Do You Need Financial Controls? III. Best Practices: Financial Controls to Consider I. Definition: What are Financial Controls?
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL I. Financial Planning/Budget Systems 1. Organization has a comprehensive annual budget which includes all sources and uses of funds for all aspects of
P-Card Fraud Controls. Introduction
Introduction According to 2013 Association of Financial Professionals (AFP) Payments Fraud and Survey, the second most targeted payment type for fraud was corporate/commercial purchasing cards. 29% of
Module #9 Payroll Schemes
Module #9 Payroll Schemes Payroll Schemes include: Ghost employee schemes, which occur when a person not employed by the company is on the payroll Overpayment schemes, which occur when a company pays an
Internal Controls, Fraud Detection and ERP
Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility
Table of Contents. Transmittal Letter... 1. Executive Summary... 2-3. Background... 4-5. Objectives and Approach... 6. Issues Matrix...
Internal Audit Committee of Brevard County, Florida Internal Audit Review of Accounts Payable Prepared By: Internal Auditors of Brevard County September 22, 2010 Table of Contents Transmittal Letter...
Controls should be appropriate to the scale of the assets at risk and the potential loss to the University.
POLICY SUPPORT PAPER MANAGING THE RISK OF FRAUD Risk and Controls in Specific Systems Purpose of the Paper The purpose of this paper is to provide guidance to managers and supervisors on controls that
Audit of Cash Balances
Audit of Cash Balances Chapter 23 2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder 23-1 Learning Objective 1 Show the relationship of cash in the bank to the various transaction
Accounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
Fraud Detection & Data Analytics
September 2008 Fraud Detection & Data Analytics How to Utilize CAATs to detect fraud AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE Course Topics Overview of Data Analytics
Internal Controls Best Practices
Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most
Internal Controls over Cash for Small Nonprofits
Internal Controls over Cash for Small Nonprofits Internal controls may be a sensitive issue in small nonprofit organizations. These organizations are built on the concepts of honesty, truthfulness, and
Accounts Payable. Best Practices: Existing Control: Control Gap: Controls Evaluation and Gap Analysis. Purchasing
Accounts Payable Gap Analysis: POS identifies the following Best Practices as efficient and effective control processes for the above risk. Listed for comparison are the controls currently in place, if
ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
Florida A & M University
Florida A & M University AP PROCEDURES 3-8-2013 TABLE OF CONTENTS 1.0 OVERVIEW... 1 2.0 DEFINITIONS... 1 3.0 RESPONSIBILITIES... 2 4.0 GENERAL PROCEDURES... 3 4.1 DEPARTMENTAL FISCAL REPRESENTATIVES...
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER Material Weaknesses (0) No material weaknesses were reported for FY 2013. Significant Deficiencies (1) Grant Receivable Accounting
GENERAL PAYROLL CONTROLS Dates in scope:
GENERAL PAYROLL CONTROLS Risk # Risk Expected Control Step # Testing Documents/Info Needed 1 Unauthorized initial pay rate 2 Unauthorized/unsupported deductions (statutory deductions and benefits). Initial
An Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
The policy and procedural guidelines contained in this handbook are designed to:
BASIC POLICY STATEMENT The Mikva Challenge is committed to responsible financial management. The entire organization including the board of directors, administrators, and staff will work together to make
TheFinancialEdge. Converting to Payroll 7
TheFinancialEdge Converting to Payroll 7 101811 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,
Audit Program for Accounts Payable and Purchases
Form AP 50 Index Audit Program for Accounts Payable and Purchases Legal Company Name Client: Balance Sheet Date: Instructions: The auditor should refer to the audit planning documentation to gain an understanding
Fighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: [email protected] Copyright 2008 Leonard Vona and Fraud
TheFinancialEdge. Subsidiary Ledger Reconciliation Guide
TheFinancialEdge Subsidiary Ledger Reconciliation Guide 101811 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic,
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
Use of Data Extraction & Analysis Software In a Financial Statement Audit
Use of Data Extraction & Analysis Software In a Financial Statement Audit A Message from The Audit Wizard April 2008 Making Auditors Proficient, Inc. Phone: 352-750-9636 www.billallen.com E-mail: [email protected]
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
Fiscal Policies and Procedures Handbook. Crown Preparatory Academy
Fiscal Policies and Procedures Handbook Crown Preparatory Academy TABLE OF CONTENTS Cover Page...i Table of Contents.ii Overview... 1 Annual Financial Audit... 1 Purchasing... 2 Petty Cash... 2 Contracts...
How To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Fraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
Case Study Top-Down, Risk-Based Approach Purchase to Pay Process
Top-Down, Risk-Based Approach Purchase to Pay Process Overview This case study describes the flow of a Top-Down Risk, Based Approach for an example Purchase to Pay process. This case study is not all-inclusive
Executive - Salary Guide
Salary Guide Executive - Salary Guide Chief Financial Officer $138,000 to $250,000+ Highest ranking financially-oriented position within a company. Responsibilities include overall financial control and
Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
BUSINESS PROCESS (SAS 112 Compliance)
Functional Area: Accounts Payable Name of Process: Payment of PO Invoices Purpose of Process: To liquidate encumbrances for purchase orders issued for goods and services on behalf Of the University. Primary
Expenditures Internal Audit Report
Expenditures Internal Audit Report Report #2014-1 June 9, 2014 Table of Contents Table of Contents... 2 Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives... 4 Scope...
FINANCIAL MANAGEMENT POLICIES AND PROCEDURES
FINANCIAL MANAGEMENT POLICIES AND PROCEDURES SAMPLE 1. GENERAL PURPOSE The purpose of these policies is to establish guidelines for developing financial goals and objectives, making financial decisions,
Report of independent certified public accountants in accordance with Government Auditing Standards and Circular A-133 State of Hawaii, Department of
Report of independent certified public accountants in accordance with Government Auditing Standards and Circular A-133 State of Hawaii,, June 30, 2004 2 C O N T E N T S REPORT OF INDEPENDENT CERTIFIED
QuickBooks. Reports List 2013. Enterprise Solutions 14.0
QuickBooks Reports List 2013 Enterprise Solutions 14.0 Table of Contents Complete List of Reports... 5 Company & Financial Reports... 6 Profit & Loss... 6 Income & Expenses... 7 Balance Sheet & Net Worth...
Investigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
INTERNAL CONTROL OVER PURCHASE INTERNAL CONTROL OVER INVENTORY INTERNAL CONTROL OVER CASH PAYMENTS INTERNAL CONTROL OVER CASH RECEIPTS
Internal Control over the followings is included in the syllabus: INTERNAL CONTROL OVER SALES INTERNAL CONTROL OVER PURCHASE INTERNAL CONTROL OVER INVENTORY INTERNAL CONTROL OVER CASH PAYMENTS INTERNAL
10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process
10-1 Auditing Business Process Auditing Business Process Objectives Understand the Auditing of the Enteties Business Process Identify the types of transactions in different Business Process Asses Control
Fiscal Procedure Sequence page number
Table of Contents Fiscal Procedure Sequence page number Treasurer Responsibilities Maintenance of General Ledger Financial Statements Financial Signature/Review Policy Insurance Protection Payroll Procedures
These are some labor burden test queries that auditors can make if they have the contractor s or vendor s labor burden breakdown:
Applying Data Mining and Analytics to Efficiently Audit Vendors and Contractors By Paul Pettit, Protiviti Inc. Each year, companies spend billions of dollars to start up, operate and maintain their businesses
Office of the State Controller. Self-Assessment of Internal Controls. Purchasing/Accounts Payable Cycle. Objectives and Risks
Office of the State Controller Self-Assessment of Internal Controls Purchasing/Accounts Payable Cycle Objectives and Risks Agency Year-End Objectives All requests for goods and services are initiated and
PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
Chapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center
MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948
for Sage 100 ERP Accounts Payable Overview Document
for Sage 100 ERP Accounts Payable Document 2012 Sage Software, Inc. All rights reserved. Sage Software, Sage Software logos, and the Sage Software product and service names mentioned herein are registered
SCOPE OF WORK FOR PERFORMING INTERNAL CONTROL AND STATUTORY/REGULATORY COMPLIANCE AUDITS FOR RECIPIENTS OF SPECIAL MUNICIPAL AID
SCOPE OF WORK FOR PERFORMING INTERNAL CONTROL AND STATUTORY/REGULATORY COMPLIANCE AUDITS FOR RECIPIENTS OF SPECIAL MUNICIPAL AID State of New Jersey Department of Community Affairs Division of Local Government
DIXON MONTESSORI CHARTER SCHOOL FISCAL CONTROL POLICY
DIXON MONTESSORI CHARTER SCHOOL FISCAL CONTROL POLICY 1. Purpose The Dixon Montessori Charter School Board of Directors ( Board ) has reviewed and adopted the following policies and procedures to ensure
How To Pay A Bank Transfer At The University Of Central Florida
ELECTRONIC FUNDS TRANSFER PROCEDURE MANUAL Effective Date: 7/1/2012 Updated: July 25, 2012 Contents Introduction... 1 Incoming EFTs:... 3 ACH/Wire Transfers received... 3 Outgoing EFTs... 3 Student Direct
How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant 281-351-2688
How to set up a people based accounting system that makes your small business work for you. By Thomas G. Post Certified Public Accountant 281-351-2688 www.texastaxman.com 1 Title How to set up a people
M O N T H E N D / Q U A R T E R L Y / Y E A R E N D C H E C K L I S T S & P R O C E D U R E S ACCOUNTS RECEIVABLE ACCOUNTS PAYABLE
M O N T H E N D / Q U A R T E R L Y / Y E A R E N D C H E C K L I S T S & P R O C E D U R E S ACCOUNTS RECEIVABLE ACCOUNTS PAYABLE PAYROLL GENERAL LEDGER PROCOM SOLUTIONS, INC. OAKLAND CENTER 8980-A ROUTE
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
Audits of Automobile Body and Repair Shops
Audits of Automobile Body and Repair Shops If you are in certain retail businesses, industry specific audit procedures may be performed by the IRS in addition to the standard procedures performed during
OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia,
Contents. Chapter 1 QuickBooks Payroll - Getting Started. Chapter 2 QuickBooks Payroll Setup
i Contents Chapter 1 QuickBooks Payroll - Getting Started QuickBooks payroll services... 2 Basic payroll (Do-it-yourself)... 2 Standard payroll (Do-it-yourself)... 2 Enhanced payroll (Do-it-yourself)...
SAMPLE FINANCIAL PROCEDURES MANUAL
SAMPLE FINANCIAL PROCEDURES MANUAL Approved by (organization s) Board of Directors on (date) I. GENERAL 1. The Board of Directors formulates financial policies, delegates administration of the financial
ACCOUNTING POLICIES AND PROCEDURES SAMPLE MANUAL
(Name of Organization & logo) ACCOUNTING POLICIES AND PROCEDURES SAMPLE MANUAL (Date) Note: this sample manual is designed for nonprofit organizations with the following staff involved with accounting
Employer Health Tax MINISTRY OF FINANCE
MINISTRY OF FINANCE Employer Health Tax The Employer Health Tax Act requires all employers who have a permanent establishment in Ontario to remit employer health tax (EHT) on total Ontario remuneration
SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS EXAMINATION PROGRAM
7/30/07 SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS Instructions: EXAMINATION PROGRAM This Model Program lists the major procedures and steps that should be
BDO Consulting. Segregation of Duties Checklist
BDO Consulting Segregation of Duties Checklist August 2009 BDO Consulting s Fraud Prevention practice is pleased to present the 2009 Segregation of Duties Checklist. We have developed this tool to assist
FIVE MANAGEMENT SYSTEM Policies and Procedures Checklist
FIVE MANAGEMENT SYSTEM Procedures Checklist Provided by: Navajo Nation Office of the Auditor General TABLE OF CONTENTS Introduction.........................................1 General Administrative Procedures...............................1
KAREN E. RUSHING. Audit of Purchasing Card Program
KAREN E. RUSHING Clerk of the Circuit Court and County Comptroller Audit of Purchasing Card Program Audit Services Jeanette L. Phillips, CPA, CGFO, CIG Director of Internal Audit and Inspector General
September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control
September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value
Internal Control Guide & Resources
Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed
Certified Administrator of School Finance and Operations (SFO )
ASBO International Certified Administrator of School Finance and Operations (SFO ) Practice Questions for Preparation of the SFO Certification Exam Part 1: Accounting www.asbointl.org/certification Practice
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM
PAYROLL GENERAL: The Payroll Department is responsible for processing all District payrolls and compliance with all rules and regulations pertaining to and/or resulting from payroll operations which includes
Assertion Control objectives Controls Tests of controls Occurrence and existence
Internal Control over Payroll Assertion Control objectives Controls Tests of controls Occurrence and existence Payment is made only to bona fide employees of the entity. Segregation of duties between HR
Herscher Community Unit School District #2. PURCHASE ORDER POLICIES and PROCEDURES
Herscher Community Unit School District #2 PURCHASE ORDER POLICIES and PROCEDURES PURCHASING POLICY AND PROCEDURES POLICY STATEMENT Herscher School District 2 supports sustaining and promoting a procurement
ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada
Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing
Xavier University. Policy and Procedure Purchasing Card Program. Purchasing Card Program Policy and Procedure
Xavier University Policy and Procedure Purchasing Card Program Table of Contents 1.0 Introduction 1.1 Purpose of this Policy and Procedure 1.2 Program Vision 1.3 University Credit Card Partner 1.4 Constituents
Internal Control Systems
D. INTERNAL CONTROL 1. Internal Control Systems 2. The Use of Internal Control Systems by Auditors 3. Transaction Cycles 4. Tests of Control 5. The Evaluation of Internal Control Component 6. Communication
ACCOUNTING RECORDS AND SOURCE DOCUMENTATION
ACCOUNTING RECORDS AND SOURCE DOCUMENTATION May 1994 Introduction Criteria for Accounting Documents and Records Accounting Procedures Manual Chart of Accounts Nine Principles Governing Accounting Records
NOT-FOR-PROFIT INSIDER
NOT-FOR-PROFIT INSIDER VOLUME 8 :: ISSUE 4 In This Issue: Nonprofits Excluded from FASBs Proposed Definition of a Public Business Entity Proposed Regulatory Changes For Nonprofits Receiving Federal Funding
We recommend that you create seven binders: one each for each SAGE PRO module you own:
We recommend that you create seven binders: one each for each SAGE PRO module you own: General Ledger Inventory Control Accounts Receivable Accounts Payable Order Entry Purchase Orders Payroll If you have
Internal Control Guidelines
Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth
HOWARD UNIVERSITY POLICY
HOWARD UNIVERSITY POLICY Policy Number: 300-001 Policy Title: ACCOUNTS PAYABLE: PAYMENTS TO VENDORS Responsible Officer: Chief Financial Officer Responsible Office: Office of the Chief Financial Officer
Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions
PLAN ADVISORY Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions PLAN ADVISORY Table of Contents Introduction 3 Selecting and Monitoring Third-Party Service Providers 4 Quality
Process Control Optimisation with SAP
Process Control Optimisation with SAP The procure-to-pay cycle, which includes all activities from the procurement of goods and services to receiving invoices and paying vendors, is a basic business process.
The Informatica Solution for Improper Payments
The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade
