Connecting the dots: IT to Business
|
|
|
- Stella Bridges
- 9 years ago
- Views:
Transcription
1 Connecting the dots: IT to Business Jason Wood, CPA, CISA, CIA, CITP, CFF April
2 Speaker Bio Jason Wood Over 18 years of international business experience in planning, conducting, and quality reviewing complex information technology audits (inclusive of new business development, leading diverse teams, developing people and managing projects). In-depth understanding of financial, operational and information technology risks, controls, and processes; and the implementation of cost-effective internal controls to minimize risk and maximize value. Authored a book titled IT Auditing and Application Controls for Small and Mid-Sized Enterprises: Revenue, Expenditure, Inventory, Payroll, and More published by Wiley Publishing in December 2013.
3 Agenda Who s in the audience? Connecting IT Audit to the Financial/Operational Processes Financial Cycle Risks from an IT Perspective (Revenue, Expenditure, Inventory, Payroll) Management Assertions and the IT Audit IT Control Objectives (CIA) Illustrative IT Control Deficiencies and Potential Financial Audit Impact
4 Who s in the Audience Today? What companies are represented in the audience today? What role do you play within your company (IT Auditor, Business Auditor, Management, etc.)? What is your experience level with IT and Business Auditing?
5 Connecting IT Audit to the Financial / Operational Processes
6 Protect the data! RISK IS INEVITABLE AS AUDITORS, we help our clients/companies manage their risk by performing audits and other assessments. Our work helps the client/company understand the nature and extent of risks that exist in the control environment. Information technology (IT) controls are a key aspect of that control environment albeit one that may be less familiar to the auditor than the purely accounting and financial dimensions. Protect the financial and operational data stored within information systems!
7 IT Controls Are Critical Enabler of transactions, processes, and preparation of information for financial statements Affect the reliability of financial data (e.g., system reports) and electronic audit evidence Foundation for application controls including segregation of duties 7
8 Linking Business and IT Processes IT Process Business Processes IT Environment Flows of Transactions Routine Transactions Estimation Transactions Non-Routine Transactions General Ledger Financial Statement Close Process Financial Statements 8
9 Financial Cycle Risks from an IT Perspective
10 Revenue Cycle IT Risks
11 Revenue Risk Exposures Sales: Is the order from a valid customer? Does the system contain correct and up to date information about the customer? Are there holds or credit limits on the customer s account? Has the transaction been properly authorized? Are recorded transactions valid? Have all valid transactions been recorded accurately? Credit approval: Does the credit approval process protect the organization against excessive credit losses? Warehouse: How are assets protected against loss or theft? Does the accounting system provide good detective controls that would bring shrinkage to the attention of management? How often are inventory counts reconciled to accounting records? Are ordered goods available in sufficient quantity to satisfy customer demand? Are backorder processes in place to protect against customer dissatisfaction from stockouts?.
12 Revenue Risk Exposures Shipping: What controls are in place to ensure the accuracy and timeliness of shipped orders? Are processes in place to manage multiple ship to addresses? Billing: What controls are in place to ensure the accuracy and timeliness of billings? Are backorders, partial fills, returns, and other nonroutine transactions processed in such a way as to ensure accurate and complete records? Cash receipts: Does the organization use lockboxes? Do cash receipt processes provide independent audit trails? What segregation of duties (SOD) controls are there to prevent one person from exercising incompatible functions?
13 Expenditure Cycle IT Risks
14 Expenditure Risk Exposures Purchases: Is the order made to a valid vendor? Does the system contain correct and up to date information about that vendor? Credit limit issues: Do credit limit issues occur at both the purchasing agent level (does the agent have authorization to initiate the PO) and the vendor level (does the contemplated purchase exceed the available credit on the account)? Receiving: Risks include receipt (does the entity receive the goods that it ordered?), variances of type and/or quantity, and pricing.
15 Expenditure Risk Exposures Invoicing: Risks include the possibility of invoices for goods and services that were not received, and the possibility that invoiced prices exceed previously quoted prices beyond some specified tolerance level. Cash disbursements: Risk exposures include all possible concerns relating to unauthorized or inappropriate distribution of corporate cash.
16 Inventory Cycle IT Risks
17 Inventory Risk Exposures Warehouse: Are item cards set up appropriately? Are processes in place to ensure that the company can accurately process orders for replacement inventory? Are logical access controls to inventory records set up appropriately? Are the inventory records appropriately updated when raw material is received? Do the perpetual inventory records represent the actual amount on hand? Will the system support possible expansion in the number of types of inventory items? Does the shipping information from the inventory cycle accurately transfer to the revenue cycle for revenue recognition purposes? Manufacturing: If there are multiple stages of manufacturing processes, are items of work in process correctly classified, insofar as this information is needed for accounting and operational purposes? Are all costs required for external reporting processes captured (e.g., in addition to direct material, other full absorption costs such as direct labor and overhead)?
18 Inventory Risk Exposures Repair: Does the system require return authorization prior to acceptance of an item for return, repair, or replacement? Are items transferred to a repair process accurately classified and tracked? Does the system alert administrators to potential business exposures such as fraudulent or defalcatory misclassification of inventory items? Are the inventory records appropriately updated to reflect the goods received as part of the return, repair, or replacement process?
19 Payroll Cycle IT Risks
20 Payroll Risk Exposures Setup and maintenance: Are employees set up in the system consistent with their pay status, pay rates, and other vital information? Who has access to add, change, or delete payroll master fi le information? What prevents ghost employees from being set up and subsequently paid? Calculations: Are tax tables updated appropriately to ensure tax calculations reflect the current tax rates based on jurisdiction? What ensures the time was captured and entered into the system appropriately? Was the time extended to the pay rate so the appropriate pay was calculated? Was the third party payroll processor provided with correct payroll information for calculations?
21 Payroll Risk Exposures Processing: Are there variance tolerance levels set up in the system? What ensures that the amounts scheduled to be paid are paid? Does segregation of duties exist in the payroll processing process? Are signature approvals captured and are digital signatures protected? Is electronic check stock protected? Was the third party payroll processor provided with correct payroll information for processing? Disbursements: Are completed checks secured for disbursement? Do controls exist that ensure that direct deposits were made to the right account and complete? Reconciliations: Do reports appropriately reflect the payroll that was scheduled to be disbursed and that was actually disbursed? What reports exist in the system for review?
22 Payroll Risk Exposures Accruals and adjustments: Are accruals and adjustments to payroll, benefits, and taxes calculated so the financial records can be updated? Are payments made to the tax authorities for the tax liability? Are benefit accounts updated for the benefits liability?
23 MANAGEMENT S ASSERTIONS AND THE IT AUDIT
24 Existence Many account balances purport to describe quantities that actually exist (e.g., stocks of inventory or amounts owed to the company for past sales). Over or understatements of these balances may result in material errors, and audit procedures typically rely on a combination of process analysis and physical counts or sampling approaches to evaluate the plausibility of a reported balance. The financial auditor ties information in the system back to transaction (source) documents (which may be paper or another electronic file), and, accordingly, he or she needs to understand the system s overall design, the flow of information, and the nature and location of files.
25 Completeness The completeness assertion refers to the integrity of the recording process and the ability of the company s accounting system to ensure that the effects of all transactions, balances, accounts, estimates, and so on have been included in the financial statements. Traditional audit techniques such as cross footing and internal validity checks of totals and subtotals can help to ensure that financial information flows correctly (as missing values may cause the statements and supporting schedules not to tie). At the IT level, the auditor is concerned with how the system ensures completeness for instance, does the report writer pull all the items from the chart of accounts?
26 Rights and Obligations This assertion addresses the legal status of a company s assets and liabilities and it can create exposures and areas of interest from an IT perspective. As an example, consider a company that ships merchandise on both a free on board (FOB) destination and FOB shipping point basis. The accounting system should be configured so as to properly classify these transactions and support accurate reporting of inventory, receivables, and sales.
27 Valuation The area of valuation can range from the accuracy of original costs to complex and esoteric calculations relating to financial instruments. In order to ensure that account balances, transactions, fair value estimates, and other amounts are reported appropriately, the IT auditor may need to examine things such as links to pricing tables and lookup tables, the design and accuracy of spreadsheet models, and the integrity of proprietary data sources. The widespread use of spreadsheet models for a variety of valuation related activities creates many exposures related to data transfer and change management.
28 Accounting Procedures The realm of accounting procedures includes classification and aggregation procedures, proper cutoffs at the end of each accounting period, the preparation and posting of adjusting entries, the preparation of disclosure and supporting schedules, and the final presentation of the financial statements. In addition, the auditor should examine the configuration settings in the computer system to ensure that proper cutoff is achieved. For example, does the computer system configuration close the accounting period, or does the accounting period remain open indefinitely? Does the system have the correct days set for each month? When the financial statements are being produced, the IT auditor needs to ensure that all data within the accounting system are being pulled to the financial statements, confirming, for example, accurate tie backs between subledgers, the general ledger, and the financial statements.
29 IT Control Objectives
30 IT Control Objectives IT controls are designed to meet control objectives related to Information Security requirements. The core objectives, often referred to as C-I-A, can be depicted as follows: Confidentiality: Protects sensitive information from being viewed by unauthorized users. Examples include: - Financial Data - Credit Card Numbers - SSN Note: This objective directly relates to internal and external Privacy requirements. C I Availability: Ensures that critical IT resources (i.e., hardware, software, data) are available when needed. Integrity: Protects the integrity of critical IT resources like: - Hardware - Software - data repositories A
31 Confidentiality The confidentiality of data refers to both internal and external users. Internally, the system of rights and permissions to access and modify data is an essential building block in the design of properly segregated duties (or a key feature to analyze when insufficient personnel make it impossible to achieve an ideal level of segregation). Externally, the confidentiality of data rests on such IT constructs as firewalls, encryption, and access protocols.
32 Confidentiality Change management: Segregation refers to the well established principle that programmers should not have access to data, and that those entrusted with data should not have programming rights. We define programming broadly so as to encompass the many methods of altering how software functions and the results it produces. When an IT auditor tests change management, we would expect to see change control forms with the requested changes that are approved for each change that is captured in the system. Operations: Confidentiality concerns in the operations domain include issues such as the storage location of backup tapes. There s a difference between a sock drawer and a fireproof safe! It s important to remember that the data on the backup tape is confidential and may be readily converted to useful information without someone having access to the system. With respect to access control, IT auditor tests should expect the existence of signed forms with management approval, specifying the access needed. Security: This intersection includes topics such as passwords, permissions, log-on histories (detective control), and penetration testing. The auditor should determine whether company personnel have access only to the data they need or to more. It is important to understand and document the business reason for data access protocols.
33 Integrity In an accounting context, data integrity relates directly to the other management assertions, and to the Conceptual Framework s notion of representational faithfulness. Thus, accounting information should represent what it purports to represent quantities that actually exist, calculated from complete records, with due consideration to appropriate legal rights and obligations, and correctly valued in accordance with acceptable accounting procedures.
34 Integrity Change management : The IT audit should ensure that appropriate end user testing has occurred and that changes are working as intended and in a manner that can be relied upon. Operations: Concerns in this area include testing of backup tapes for system restorability. If data cannot be restored, the company may have incomplete records. Security: The auditor should understand whether she can rely on the system s security. Are there ways in which it could be bypassed or compromised? What are the overriding security controls? Are they soft or hard?
35 Availability Data that is not available to users is by definition useless to them. Relevant IT concerns include server reliability, access controls, protocols for distributing data, and concurrency issues.
36 Availability Change management: Is the source code in a location where it can be restored? Are there rollback procedures in case of a failed change? Is the backup tape available in case management needs to access data that is not currently in the system? Operations: The IT auditor should consider the ability of the server system to handle the day to day load. Does management have all the needed licenses and are they current? Are there any concerns about the computer system s availability? The location and availability of backup tapes is important. How, if it were necessary, would an employee access prior year information that is no longer kept in the system? Security: Whereas the primary security concern is unauthorized access, it s also important that the system not lock out users who have innocently lost or forgotten a password. The IT auditor should understand procedures that ensure, as well as restrict, availability.
37 Illustrative IT Control Deficiencies and Potential Financial Audit Impact
38 IT Entity Level
39 Logical Security
40 Logical Security
41 Logical Security
42 Logical Security
43 Logical Security
44 Change Management
45 Change Management
46 Change Management
47 Operations
48 Operations
49 Application Controls
50 Spreadsheets / Reports
51 SSAE 16 (SOC 1)
52 QUESTIONS? 52
10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process
10-1 Auditing Business Process Auditing Business Process Objectives Understand the Auditing of the Enteties Business Process Identify the types of transactions in different Business Process Asses Control
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER Material Weaknesses (0) No material weaknesses were reported for FY 2013. Significant Deficiencies (1) Grant Receivable Accounting
Internal Control Guide & Resources
Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
Internal Controls, Fraud Detection and ERP
Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility
Accounts Payable. Best Practices: Existing Control: Control Gap: Controls Evaluation and Gap Analysis. Purchasing
Accounts Payable Gap Analysis: POS identifies the following Best Practices as efficient and effective control processes for the above risk. Listed for comparison are the controls currently in place, if
PART 10 COMPUTER SYSTEMS
PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board
INTERNAL CONTROL OVER PURCHASE INTERNAL CONTROL OVER INVENTORY INTERNAL CONTROL OVER CASH PAYMENTS INTERNAL CONTROL OVER CASH RECEIPTS
Internal Control over the followings is included in the syllabus: INTERNAL CONTROL OVER SALES INTERNAL CONTROL OVER PURCHASE INTERNAL CONTROL OVER INVENTORY INTERNAL CONTROL OVER CASH PAYMENTS INTERNAL
JOB READY ASSESSMENT BLUEPRINT ACCOUNTING-BASIC - PILOT. Test Code: 4100 Version: 01
JOB READY ASSESSMENT BLUEPRINT ACCOUNTING-BASIC - PILOT Test Code: 4100 Version: 01 Specific Competencies and Skills Tested in this Assessment: Journalizing Apply the accounting equation to journalize
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
THE EXPENDITURE CYCLE Part I
CHAPTER THE EXPENDITURE CYCLE Part I Businesses need resources in order to conduct their business to produce and sell a product or to provide a service. The expenditure cycle is concerned with the acquisition
Microsoft Dynamics GP 2013. Packaging of Functionality & Product Capabilities in Microsoft Dynamics GP 2013
Microsoft Dynamics GP 2013 Packaging of Functionality & Product Capabilities in Microsoft Dynamics GP 2013 Date: November, 2012 Contents Become a Dynamic Business with Microsoft Dynamics GP 3 How to Buy
GAO. Inventory System Checklist Systems Reviewed Under the Federal Financial Management Improvement Act of 1996. Financial Management Series
GAO United States General Accounting Office Financial Management Series May 1998 Inventory System Checklist Systems Reviewed Under the Federal Financial Management Improvement Act of 1996 GAO/AIMD-98-21.2.4
Guidelines for Congregations Internal Control Best Practices
Guidelines for Congregations Internal Control Best Practices A resource provided by the Office of the Treasurer of the Evangelical Lutheran Church in America In order to exercise good stewardship and care
INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
Chapter 13. The Expenditure Cycle. Because this cycle involves the outflow of cash, it is the counterpoint to the revenue cycle
Chapter 13 The Expenditure Cycle Introduction Because this cycle involves the outflow of cash, it is the counterpoint to the revenue cycle Two subsystems include: The purchases processing system The cash
RELEVANT TO FOUNDATION LEVEL PAPER FAU / ACCA QUALIFICATION PAPER F8
RELEVANT TO FOUNDATION LEVEL PAPER FAU / ACCA QUALIFICATION PAPER F8 Audit procedures Audit procedures are an important area of the syllabus, though candidates often use inappropriate audit procedures
Chapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
BDO Consulting. Segregation of Duties Checklist
BDO Consulting Segregation of Duties Checklist August 2009 BDO Consulting s Fraud Prevention practice is pleased to present the 2009 Segregation of Duties Checklist. We have developed this tool to assist
Control Matters. Computer Auditing. (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising)
Computer Auditing Control Matters (Relevant to ATE Paper 8 Auditing) David Chow, FCCA, FCPA, CPA (Practising) The introduction of a computerized or electronic data processing (EDP) accounting system has
Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014
Electronic Audit Evidence (EAE) and Application Controls Tulsa ISACA Chapter December 11, 2014 Agenda Recent IT-related PCAOB inspection themes: Internal control over financial reporting Multi-location
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
Internal Control Systems
D. INTERNAL CONTROL 1. Internal Control Systems 2. The Use of Internal Control Systems by Auditors 3. Transaction Cycles 4. Tests of Control 5. The Evaluation of Internal Control Component 6. Communication
Inventory Control System Administration Manual
Inventory Control System Administration Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
INTUIT PROFESSIONAL EDUCATION. QuickBooks Files: Sharing, Managing, and Maintaining Data Integrity
INTUIT PROFESSIONAL EDUCATION QuickBooks Files: Sharing, Managing, and Maintaining Data Integrity Copyright Copyright 2008 Intuit Inc. All rights reserved. Intuit Inc. 5601 Headquarters Drive Plano, TX
Audit Evidence. AU Section 326. Introduction. Concept of Audit Evidence AU 326.03
Audit Evidence 1859 AU Section 326 Audit Evidence (Supersedes SAS No. 31.) Source: SAS No. 106. See section 9326 for interpretations of this section. Effective for audits of financial statements for periods
Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016
Understanding SOC Reports for Effective Vendor Management Jason T. Clinton January 26, 2016 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2012 Wolf & Company, P.C. Before we
5:31-7 Appendix B LOCAL AUTHORITIES - ACCOUNTING AND AUDITING IF ANY ARE NOT APPLICABLE, INSERT N/A AS YOUR ANSWER. FIRE DISTRICT YEAR UNDER AUDIT
5:31-7 Appendix B LOCAL AUTHORITIES - ACCOUNTING AND AUDITING AUDIT QUESTIONNAIRE FOR FIRE DISTRICT AUDITS EACH QUESTION MUST BE ANSWERED. PLEASE CIRCLE YES OR NO. IF ANY ARE NOT APPLICABLE, INSERT N/A
Performance Element: Compare stocks, bonds, and commodities to determine advantages.
PATHWAY: Financial & Investment Planning Pathway Topic: Product Knowledge Pathway KS Statement: Examine characteristics to distinguish between stocks, bonds, and commodities. Performance Element: Compare
Studio Designer 80 Guide
Table Of Contents Introduction... 1 Installation... 3 Installation... 3 Getting started... 5 Enter your company information... 5 Enter employees... 6 Enter clients... 7 Enter vendors... 8 Customize the
Commission Accounting User Manual
Commission Accounting User Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia Notice of Authorship
Internal Control Guidelines
Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth
How to Survive a DCAA Audit
How to Survive a DCAA Audit www.paulgunn.com 1 How to Survive a DCAA Audit - Overview Areas of interest and expectations of a typical audit: 1. Introduction o 2. The DCAA and Types of audits 3. Preparing
Article: Control Systems and Controls Testing: General Review
Article: Control Systems and Controls Testing: General Review By: Paul Lydon, BA, CPA, MBS (Hons), PGCLTHE, FHEA Current Examiner in P1 Auditing The main duty of auditors is to report to the members on
Inventories: Cost Measurement and Flow Assumptions
CHAPTER Inventories: Cost Measurement and Flow Assumptions OBJECTIVES After careful study of this chapter, you will be able to: 1. Describe how inventory accounts are classified. 2. Explain the uses of
The policy and procedural guidelines contained in this handbook are designed to:
BASIC POLICY STATEMENT The Mikva Challenge is committed to responsible financial management. The entire organization including the board of directors, administrators, and staff will work together to make
Chapter 15: Accounts Payable and Purchases
Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:
Accounting Policies and Procedures Guide 2013 Edition
Accounting Policies and Procedures Guide 2013 Edition Copyright 2012 Bybee & Company, CPAs, PLLC This book or parts thereof may not be reproduced in another document or manuscript in any form without the
Manual of Accounting Policies and Procedures Bridgewater State College Foundation Bridgewater Alumni Association
Manual of Accounting Policies and Procedures Bridgewater State College Foundation Bridgewater Alumni Association Table of Contents MANUAL OF 1 ACCOUNTING 1 POLICIES AND PROCEDURES 1 BRIDGEWATER STATE COLLEGE
ACCOUNTING FOR AND AUDIT OF INVENTORIES
ACCOUNTING FOR AND AUDIT OF INVENTORIES PRESENTED BY MICHEAL AGHWANA MANAGER: PEAK PROFESSIONAL SERVICES IN HOUSE SEMINAR SERIES NO 3 PEAK PROFESSIONAL SERVICES (CHARTERED ACCOUNTANTS) NIGERIA A member
SUA - Payroll and Inventory Payroll System
1 SUA - Payroll and Payroll System SUA Chapter 5 Characteristics of the Payroll System Accountant s Objectives Similar to the purchases and cash disbursements system however employees are retained long-term
three TESTS OF CONTROLS AND TESTS OF DETAILS
TESTS OF CONTROLS AND TESTS OF DETAILS P A R T three Part 3 covers the major evidence-gathering procedures of the assurance services engagements. Chapter 9 covers tests of controls for the control risk
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Loyal Order of Moose Fraternal Education
Loyal Order of Moose Fraternal Education This booklet presents accounting and tax information that may or may not be right for your specific Fraternal Unit. In view of the complex, individual, and specific
Customer Credit and Accounts Receivable
Customer Credit and Accounts Receivable Gap Analysis: POS identifies the following Best Practices as efficient and effective control processes for the above risk. Listed for comparison are the controls
Guidelines for Congregations Internal Control Best Practices
Guidelines for Congregations Internal Control Best Practices A resource provided by the Office of the Treasurer of the Evangelical Lutheran Church in America Congregations should establish and maintain
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
NRP Training Series 2001 Financial Record Keeping
NRP Training Series 2001 Financial Record Keeping Copyright 2001 Minneapolis NRP - All Rights Reserved What is the role of the Treasurer? Generally, the treasurer is responsible for compiling and keeping
MICROSOFT DYNAMICS GP YEAR-END CLOSING PROCEDURES USERS GROUP MEETING
MICROSOFT DYNAMICS GP YEAR-END CLOSING PROCEDURES MICROSOFT DYNAMICS GP USERS GROUP MEETING December 2012 Contents TIPS FOR A SUCCESSFUL YEAR-END... 4 INVENTORY... 6 What the Inventory Year-End Close Process
Chapter 14 Auditing the Revenue Cycle. Ics in sales are designed to achieve these seven objectives:
Chapter 14 Auditing the Revenue Cycle Ics in sales are designed to achieve these seven objectives: 1 recorded transactions are valid 2 transactions are properly authorized 3 existing transactions are recorded
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
Cutover Considerations & ERP Migration Best Practices. General Ledger & Inventory
Cutover Considerations & ERP Migration Best Practices 2525 South Lamar Blvd. Suite 10 Austin, TX 78704 512.299.9170 www.cetecerp.com General Ledger & Inventory 1. Cease transactional activity in legacy
HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015
HKSA 500 Issued July 2009; revised July 2010, May 2013, February 2015 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard on Auditing 500
General Ledger Auditing. Presented By: Jim Lee
General Ledger Auditing Presented By: Jim Lee Table of Contents Overview... 3 Month-End Accounting Binder... 3 Month-End Accounting Checklist... 4 Trial Balance... 5 Journal Entries... 6 Account Reconciliations...
Oracle ERP Cloud Period Close Procedures O R A C L E W H I T E P A P E R J U N E 2 0 1 5
Oracle ERP Cloud Period Close Procedures O R A C L E W H I T E P A P E R J U N E 2 0 1 5 Table of Contents Introduction 7 Chapter 1 Period Close Dependencies 8 Chapter 2 Subledger Accounting Overview 9
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL I. Financial Planning/Budget Systems 1. Organization has a comprehensive annual budget which includes all sources and uses of funds for all aspects of
TRAVERSE version 11 Point of Sale
TRAVERSE version 11 Point of Sale Information contained in this document refers to planned enhancements to TRAVERSE version 11 Point of Sale. The product design and functionality are subject to change,
SUMMARY OF CORRECTIVE ACTION FOR SEGREGATION OF DUTIES AUDIT ISSUES
SUMMARY OF CORRECTIVE ACTION FOR SEGREGATION OF DUTIES AUDIT ISSUES CASH MANAGEMENT I. Checks a. All checks are restrictively endorsed, using the endorsement stamp maintained by the building secretary.
M O N T H E N D / Q U A R T E R L Y / Y E A R E N D C H E C K L I S T S & P R O C E D U R E S ACCOUNTS RECEIVABLE ACCOUNTS PAYABLE
M O N T H E N D / Q U A R T E R L Y / Y E A R E N D C H E C K L I S T S & P R O C E D U R E S ACCOUNTS RECEIVABLE ACCOUNTS PAYABLE PAYROLL GENERAL LEDGER PROCOM SOLUTIONS, INC. OAKLAND CENTER 8980-A ROUTE
Certified Administrator of School Finance and Operations (SFO )
ASBO International Certified Administrator of School Finance and Operations (SFO ) Practice Questions for Preparation of the SFO Certification Exam Part 1: Accounting www.asbointl.org/certification Practice
FINANCIAL MANAGEMENT POLICIES AND PROCEDURES
FINANCIAL MANAGEMENT POLICIES AND PROCEDURES SAMPLE 1. GENERAL PURPOSE The purpose of these policies is to establish guidelines for developing financial goals and objectives, making financial decisions,
Checks and Balances Internal Controls. West Virginia State Auditor s Office Chief Inspector Division
Checks and Balances Internal Controls West Virginia State Auditor s Office Chief Inspector Division POP QUIZ Internal Controls Internal Controls The auditor will test the effectiveness of your internal
MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS
DIVISION OF CHILD CARE AND EARLY CHILDHOOD EDUCATION HEALTH AND NUTRITION UNIT P O BOX 1437, SLOT S 155 501-320-8982 FAX: 501-682-2334 TDD: 501-682-1550 TO: NON-PROFIT INSTITUTIONS FROM: HEALTH AND NUTRITION
Best Practices for Inventory Control Using Dynamics GP
Best Practices for Inventory Control Using Dynamics GP Inventory Humor Agenda Sales Inventory Valuation Methods Reason Code Troubleshooting Cost Issues Taking Physical Inventory Counts Landed Cost Review
Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions
Effective Monitoring of Outsourced Plan Recordkeeping and Reporting Functions Plan Advisory The AICPA EBPAQC is a firm-based, volunteer membership center created with the goal of promoting quality employee
ACC207 Computerized Accounting Administration Outline
ACC207 Computerized Accounting Administration Outline Course Information Organization Mercer County Community College Course Number ACC 207 Credits 3 Description Introduction to general ledger accounting
Auditing Derivative Instruments, Hedging Activities, and Investments in Securities 1
Auditing Derivative Instruments 1915 AU Section 332 Auditing Derivative Instruments, Hedging Activities, and Investments in Securities 1 (Supersedes SAS No. 81.) Source: SAS No. 92. See section 9332 for
AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT PAYROLL AUDIT PROGRAM
PAYROLL GENERAL: The Payroll Department is responsible for processing all District payrolls and compliance with all rules and regulations pertaining to and/or resulting from payroll operations which includes
Department of Human Services Client Trust Fund 7290 Trust Accounting System Procedures
Human Services Client Trust Fund 7290 Trust Accounting System Procedures 03.004.00 Effective Date: September 12, 1997 Revised: December 28, 2015 Department of Human Services Client Trust Fund 7290 Trust
Or download and view an electronic copy by visiting: www.sarasotagov.com
You can obtain copies of this report by contacting us at: Office of the City Auditor and Clerk 1565 1 st Street Sarasota, FL 34236 (941) 954-4135 Or download and view an electronic copy by visiting: www.sarasotagov.com
Table of Contents: Chapter 2 Internal Control
Table of Contents: Chapter 2 Chapter 2... 2 2.1 Establishing an Effective System... 2 2.1.1 Sample Plan Elements... 5 2.1.2 Limitations of... 7 2.2 Approvals... 7 2.3 PCard... 7 2.4 Payroll... 7 2.5 Reconciliation
B Resource Guide: Implementing Financial Controls
What s in this Guide: I. Definition: What are Financial Controls? II. Why Do You Need Financial Controls? III. Best Practices: Financial Controls to Consider I. Definition: What are Financial Controls?
CRG Academy Course Descriptions. Corporate Renaissance Group 6 Antares Drive, Phase 1, Suite 200 Ottawa, ON K2E 8A9 www.crgroup.
CRG Academy s Corporate Renaissance Group 6 Antares Drive, Phase 1, Suite 200 Ottawa, ON K2E 8A9 www.crgroup.com Updated February 2013 CRG Academy Courses Microsoft Dynamics GP... 3 Foundational Overview
; ; ; ; MICROSOFT BUSINESS SOLUTIONS NAVISION STANDARD
; ; ; ; MICROSOFT BUSINESS SOLUTIONS NAVISION STANDARD MICROSOFT BUSINESS SOLUTIONS NAVISION STANDARD Microsoft Navision Standard is an integrated business management solution designed for organizations
Microsoft Dynamics GP. Inventory Control
Microsoft Dynamics GP Inventory Control Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views expressed in this document,
Peachtree Premium Accounting for Construction. Peachtree Premium Accounting for Distribution. Peachtree Premium Accounting for Manufacturing
Accuracy. Control. Results. 2009 Peachtree First Accounting Peachtree Pro Accounting Peachtree Complete Accounting Peachtree Premium Accounting Peachtree Premium Accounting for Construction Peachtree Premium
Product Brief. Intacct Financials & Accounting. Intacct General Ledger
Product Brief Intacct Financials & Accounting Intacct Financials and Accounting includes Intacct General Ledger, Intacct Accounts Receivable, Intacct Accounts Payable, Intacct Cash Management and Intacct
Accounting for stocked items on product receipts and vendor invoices
Microsoft Dynamics AX 2012 Accounting for stocked items on product receipts and vendor invoices White Paper This white paper describes the concepts of the two types of accounting that take place when an
How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant 281-351-2688
How to set up a people based accounting system that makes your small business work for you. By Thomas G. Post Certified Public Accountant 281-351-2688 www.texastaxman.com 1 Title How to set up a people
MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center
MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948
SAMPLE NPO Fiscal Policies & Procedures
SAMPLE NPO NOTE: The most important part of developing policies and procedures is that they are discussed and agreed upon within the organization. This template is designed to be used in conjunction with
Internal Controls Best Practices
Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most
The Accounting Cycle. Cycle. The Accounting Cycle SUA Reference p.10. Overview. The Accounting Cycle. 6 Major Subcycles. Subcycle (transaction cycle):
Everything you ever wanted to know about... The Accounting Overview Review of the manual Accounting 6 Major Subcycles Begin the SUA Transactions Occur Prepare Closing Entries The Accounting SUA Reference
Glossary of Accounting Terms
Glossary of Accounting Terms Account - Something to which transactions are assigned. Accounts in MYOB are in one of eight categories: Asset Liability Equity Income Cost of sales Expense Other income Other
MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE
MANAGEMENT AUDIT REPORT OF ACCOUNTS PAYABLE REPORT NO. 04-108 CITY OF ALBUQUERQUE OFFICE OF INTERNAL AUDIT AND INVESTIGATIONS of Accounts Payable Report No. 04-108 Executive Summary Background The Department
Welcome to the financial reports topic. 5-1-1
Welcome to the financial reports topic. 5-1-1 We will explore the effect of standard processes in SAP Business One on Financial Reports: such as the Balance Sheet, the Trial Balance, and the Profit and
Chapter 9 The Study of Internal Control and Assessment of Control Risk
Review Questions Chapter 9 The Study of Internal Control and Assessment of Control Risk 9-1 There are seven parts of the planning phase of audits: preplan, obtain background information, obtain information
for Sage 100 ERP General Ledger Overview Document
for Sage 100 ERP General Ledger Document 2012 Sage Software, Inc. All rights reserved. Sage Software, Sage Software logos, and the Sage Software product and service names mentioned herein are registered
How To Find Out If A Company Misstatement Is True
A U D I T I N G A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT 9 th Edition Karla M. Johnstone Audrey A. Gramling Larry E. Rittenberg CHAPTER 11 AUDITING INVENTORY, GOODS AND SERVICES, AND ACCOUNTS
Checklist - Monthly Close Process
Checklist - Monthly Close Process Introductuion: This document should be used as a general guide to creating a monthly financial close process checklist, however, it does not address all activities that
APLUS R-SERIES SOFTWARE PRODUCT INFORMATION
APLUS R-SERIES SOFTWARE PRODUCT INFORMATION http://aplus.com.my Email: [email protected] 1 APLUS SOFTWARE FOR R-SERIES Module WAE-R Aplus Accounting software is designed and developed by International
Copyright 2006 Business Management Systems. Web Based ERP/CRM Software
Web Based ERP/CRM Software INTRODUCTION...8 Features... 9 Services... 10 INSTALLATION...11 CUSTOMER FILE...12 Add Customer... 12 Modify Customer... 14 Add Ship To... 15 Modify Ship To... 16 Reports...
