.

Monday, January 28, 2019

Acct 542 Audit Proposal

canvas Proposal Audit Proposal Kudler each(prenominal) right Foods has many another(prenominal) contrasting types of take stock to consider that could be apply for from each one pieceal areas of AP, AR, inventory management and payroll. This brief has the purpose to distinguish among the types of come acrosss that could be used for each summons to recommend the scrutinise most impound for each process to explain how the scrutinises leaveing be conducted and to identify cases that could sustain reliance on take stocking through the computer. Types of AuditDue to increasing economic and monetary growth, many types of audit affirm been incorporated throughout the development process of inborn activities. Audits can be performed manually or they can incorporate technology. concord to Hunton and Bagranoff (2004), there are four main types of audit 1) At hearation 2) Findings and Recommendations 3) SAS 70 and 4) SAS 94. Each type brings something unique to the table and can be used in different situations. Attestation. The Attestation audit present reports on examinations check overs or agreed-upon procedures.The auditor provides assurance on something for which the client is responsible. Findings and Recommendations. Findings and Recommendations is an audit that summarizes the audit civilise for each of the organisations, which does not include an opinion. It could be considered consulting services. SAS 70 Audit. The SAS 70 is an auditing step created by the AICPA and has two report types Type I, which the auditor reports an opinion intimately the operating controls and Type II, that meets the objectives of the Type I additionally includes a dilate test of the effectiveness of the controls.SAS 94 Audit. SAS 94 audit deals with electronic records and have the purpose to guide and extend the auditor responsibilities in reference to internal controls knowledge as a part of a regular financial audit. Appropriate Audit Recommendations and S teps for each Process Accounts Payable. The appropriate IT audit for accounts payable (A/P) is the SAS 94 Audit. The travel that are taken for the SAS 94 Audit and ones that Kudler will use is the application computer software brush up. The steps are to do a limit, range, validity and completeness check. Accounts Receivable.The appropriate IT audit for accounts receivable (A/R) is in like manner the SAS 94 Audit. This is for the same reasons. Kudler will check different areas to let on how to handle different errors as they arise and to be sure that the system is checking for the errors within a timely manner by using software review. Inventory. The appropriate IT audit for inventory is in like manner SAS 94 audit. SAS 94 audit uses administration review to position how accurate the inventory is and how accurate the actions for inventory are. The steps that are taken for this is to identify any areas that may have dishonorable information.According to COSO (2010), Inventory is the most misstated asset in an IT audit, pg 18. Para 14. Payroll. The appropriate IT audit for payroll is also SAS 94 audit. SAS 94 audit software review uses the steps to test payroll in the same ways that it will test A/R and A/P. Kudler will have the office to test payroll, A/R, and A/P in the same audit test and possibly at the same time. Events that could Pr import Reliance on Auditing through the Computer Since we have discussed what types of audits we recommended for each accounting process.We would now care to focus on certain events that can assist Kudlers fair Foods on the events that could prevent the reliance on auditing through a computer. The events that must happen involve testing the info, validate computer programs, review the system software, validate user accounts and access privileges, and embed modules to achieve continuous auditing. examen the data. The first event that has to happen is gathering data that can be tested and see how the data is process ed . In more abstruse systems the data have to be put through an integrated test facility in order to audit the operational settings.Data sometimes will go through a parallel simulation which is time devour nevertheless will audit the processes to see if they are functioning fit to company policies. Validate Computer Programs. The Next event deals with using audit techniques to validate new computer programs that upgrade or enhance the software by installing the internal controls to protect against unauthorized changes and it will also booster develop better company software. This event also equality the new or enhanced program with the old software to see what processes or improved or useless. Review of System parcel.The third event actually reviews the systems software controls of the operating system and its utility programs that perform the housekeeping. It also reviews the program library controls, monitors storage programs, and accesses control software. The event is do in order make sure all the controls are in rig and functioning and to ensure all controls we approved the documentation or by using the software tools. Validate User Accounts and Access Privileges. The fourth event that is validating user accounts and access privileges that will ensure who has access to what data and what account have to be set up to ensure certificate and accuracy.The auditor needs to verify that the software parameters are there but make sure that the IT staff is using them correctly in or for this event to happen. Continuous Auditing. The last event is continuous auditing in which all the data will be audited as it is processed to ensure authorized time assurance and to provide faster financial reporting that is accurate. This process is done by embedded audit modules which capture the audit data, expulsion reporting that reject data that fall outside the predetermined specifications, transaction logging tag certain transaction so they can be reviewed to see f the controls in place are working, snapshot techniques examine the way special transactions are processed, and continuous simulation is winding in collecting data and comparing it to data in a database management system to look for discrepancies. These tools are designed to audit controls and procedures when no auditor is present. Conclusion In conclusion we feel that this audit marriage proposal will effectively help the Kudlers o.k. Foods arrangement determine what type of audit to use for each accounting process. The recommendations will help this organization achieve the structural controls needed in order to function in the modern world.We will be pleased the help this organization in achieve continuous auditing which will help with getting past from auditing through a computer. By going through the various processes of auditing Kudlers Fine Foods will have success and continues to gain market share in its industry. References Bagranoff, N. A. , Simkin, M. G. , &038 Stran d Norman (2008). Core Concepts of Accounting Information Systems (10th ed. ). New York NY washstand Wiley &038 Sons, Inc. Galvenston (2012). How to Create Flowcharts for an Accounting Information System, eHow, Demand Media, Inc. , retrieved online July 8, 2012 from http//www. how. com/how_6827920_create-flowcharts-accounting-information-system. html. Grocery Store POS Software Solutions. (2010). Retrieved online July 8, 2012 from http//comcash. com/grocery. php Hunton, J. A. , Bryant, S. M. , &038 Bagranoff, N. A. (2004). Core Concepts of Information Technology Auditing. New York, New York Wiley &038 Sons. OBrien, J. A. , &038 Marakas, G. M. (2008). watchfulness Information Systems (8th ed. ). Boston, MA McGraw-Hill. COSO. (2010). Fraudulent Financial Reporting. Retrieved from http//www. coso. org/documents/COSOFRAUDSTUDY2010_001. pdf

No comments:

Post a Comment