Vous êtes sur la page 1sur 10

20

a.
Assessing management integrity should be considered before accepting the audit
engagement. Some considerations are:
check references from other professionals
does the client deal ethically with outside parties
b.
If during the assessment of management it is suspected that integrity is lacking the
auditor would not put much reliance on managements assertions but would increase the amount
of evidence and collect more from external sources.
c.
The normal responsibility is to carry out the audit with professional skepticism. It is not
the auditors job to find criminal activity. The auditor will carry out procedures necessary to
support his work and at the same time if anything comes to his attention that needs further
investigation, will pursue it to its conclusion.
d.
When management or directors are involved in criminal activity, their credibility is
minimal at best. This indicates a larger risk of material misstatement of the financial statements.
Where there is evidence of criminal activity, the auditor should consult a lawyer and consider
resigning from the audit engagement.
e.
If it were found that a prudent person (other auditors) would have gathered more
evidence that would have led to the discovery of the fictitious sales, then it would be considered
negligence.

10-24
Risk of error or fraud
Inaccurate data could be entered for a sale,
resulting in incorrect or unauthorized prices or
quantities.

Payment type or amount could be incorrect,


resulting in incorrect payments being
processed, or the wrong type of payment being
tracked, resulting in inability to reconcile cash,
and the potential for cash theft.
Sales might not be recorded, staff could take
the cash.

Sales could be processed and goods given for


fictitious or stole credit cards, and the store
would have to return the funds.
Unauthorized individuals could change prices,
or access systems and introduce viruses or
unauthorized program changes.

Potential control (type of control)


- automated comparison of shoe code number
to number in master file to see if it is on file
(application control)
- retrieval of price for that shoe code from
price in master file (application control)
- reasonableness check on quantity (e.g.
requiring re-entry if greater than 1)
(application control)
- display back of data entered for visual
check/warning message if there is an error
(application control)
- all fields must be entered before a sale is
processed (application control)
- valid code for type of payment (must be one
of the valid types, cash, debit or credit card)
(application control)
- compare Debit card, credit card and cash
totals to POS total, i.e. cash drawer
reconciliation (application control)
- sequentially numbered sales receipts
(automatic, by the information system)
(application control)
- sign requesting all customers to ask for a
receipt/gift certificate if not given (application
control)
- if credit card payment code is entered, sale is
not processed until authorization code from the
credit card terminal is received (application
control)
Proper control over passwords, i.e.
* new user/passwords approved in writing by
the store manager or assistant manager or
implemented by same (application control)
* passwords not available to others (by
displaying or talking about them, etc.)
(application control)
* passwords for terminated employees deleted
immediately (application control)
* password should clear after each transaction
(or timeout) (application control)
- exception report of price overrides kept
electronically or printed for review by head
office (application control)
- shoe code master file numbers should be

entered by supervisor (or downloaded from


head office) (application control)
Systems might be unavailable and sales
Alternative procedures should be available for
processed, for example in the event of a power all systems in the event of unavailability,
failure or other disruption.
adequately tested, and employees trained in
these procedures (general control)
Information systems may not meet the needs of All new systems should be approved by the
the business.
information systems steering committee, after
appropriate analysis and involvement by users
(corporate governance and general controls)

11-31 a.
There are many fraud risk factors indicated in the dialogue. Among the fraud risk
factors are the following:
A significant portion of Mints compensation is represented by bonuses and stock options.
Although this arrangement has been approved by SCSs Board of Directors, this may be a
motivation for Mint, the new CEO, to engage in fraudulent financial reporting.
Mints statement to the stock analysts that SCSs earnings would increase by 30% next year
may be both an unduly aggressive and unrealistic forecast. That forecast may tempt Mint to
intentionally misstate certain ending balances this year that would increase the profitability of
the next year.
SCSs audit committee may not be sufficiently objective because Green, the chair of the audit
committee, hired Mint, the new CEO, and they have been best friends for years.
One individual, Mint, appears to dominate management without any compensating controls.
Mint seems to be making all the important decisions without any apparent input from other
members of management or resistance from the Board of Directors.
There were frequent disputes between Brown, the prior CEO, who like Mint apparently
dominated management, and the Board of Directors, and Jones, the predecessor auditor. This
fact may indicate that an environment exists in which management will be reluctant to make
any changes that the current PA firm suggests.
Management seems satisfied with an understaffed and ineffective internal audit department.
This situation displays an inappropriate attitude regarding the control environment.
Management has failed to properly monitor and correct a significant deficiency in its internal
control the lack of segregation of duties in cash disbursements. This disregard for the
control environment is also a risk factor.
Information about anticipated future layoffs has spread among the employees. This
information may cause an increase in the risk of material misstatement arising from the
misappropriation of assets by dissatisfied employees.
b.
To help detect the potential for financial statements misstatement, the auditor would do
additional cut-off testing, particularly for revenues, and carefully review journal entries to ensure
that there is adequate support. Also, accounts that are susceptible to judgment, such as accounts
receivable allowances, should be carefully audited.
If the auditor intends to rely upon the work of the internal audit department, the auditor
may need to reperform audit procedures, particularly if there is inadequate independence.
c.
Kent has many misconceptions regarding the consideration of fraud in the audit of SCSs
financial statements that are contained in the dialogue. Among Kents misconceptions are the
following:
Kent states that the auditor does not have specific duties regarding fraud. In fact, an auditor
has a responsibility to specifically assess the risk of material misstatement due to fraud and to
consider that assessment in designing the audit procedures to be performed.
Kent is not concerned about Mints employment contract. Kent should be concerned about a
CEOs contract that is based primarily on bonuses and stock options because such an
arrangement may indicate a motivation for management to engage in fraudulent financial
reporting.

Kent does not think that Mints forecast for fiscal 2010 has an effect on the financial
statement audit for 2009. However, Kent should consider the possibility that Mint may
intentionally misstate the 2009 ending balances to increase the reported profits in 2010.
Kent believes the audit programs are fine as is. However, the audit programs should be
modified because of the many risk factors that are present in the SCS audit.
Kent is not concerned that the internal audit department is ineffective and understaffed. In
fact, Kent should be concerned that SCS has permitted this situation to continue because it
represents a risk factor relating to misstatements arising from fraudulent financial reporting
and/or the misappropriation of assets.
Kent states that an auditor provides no assurances about fraud because that is managements
job. In fact, an auditor has a responsibility to plan and perform an audit to obtain reasonable
assurance about whether the financial statements are free of material misstatement, whether
caused by error or fraud.
Kent is not concerned that the prior years material weakness in internal control has not been
corrected. However, Kent should be concerned that the lack of segregation of duties in the
cash disbursements department represents a risk factor relating to misstatements arising from
the misappropriation of assets.
Kent does not believe the rumours about big layoffs in the next month have an effect on audit
planning. In planning the audit, this risk factor should be considered, because it may cause an
increase in the risk of material misstatement arising from misappropriation of assets by
dissatisfied employees.

d.
Auditing standards require that auditors document the following matters related to the
auditors consideration of material misstatements due to fraud:
The discussion among engagement team personnel in planning the audit about the
susceptibility of the entitys financial statements to material fraud.
Procedures performed to obtain information necessary to identify and assess the risks of
material fraud.
Specific risks of material fraud that were identified, and a description of the auditors
response to those risks.
Reasons supporting a conclusion that there is not a significant risk of material improper
revenue recognition.
Results of the procedures performed to address the risk of management override of controls.
Other conditions and analytical relationships that indicated that additional auditing
procedures or other responses were required, and the actions taken by the auditor.
The nature of communications about fraud made to management, the audit committee, or
others.
After fraud risks are identified and documented, the auditor should evaluate factors that reduce
fraud risk. The auditor should then develop appropriate responses to the risk of fraud.

14-22
a.
1.
Occurrence
Accuracy
2.
Occurrence
Accuracy

3.
Occurrence

4.
Occurrence

b. Misstatement or Error
Prevented
Sales may be recorded for
invalid or non-existent
products.
Sales may be processed on
inaccurate price information.
Sales may be recorded for
invalid or non-existent
products.
Sales may be processed for
existing products using
quantities ordered, even when
ordered quantities are not on
hand.
Sales may be processed for
customers who are unable to
pay.

Shipments may be made to


persons making an
unauthorized credit card
purchase (e.g., with a stolen
credit card).

5. Accuracy Sales may be processed


inaccurately (e.g., wrong
product, wrong price, wrong
quantity).

6.
Occurrence
Timing

Sales may be recorded even


though shipment has not
occurred.
Sales may be recorded in the
wrong time period.

c. General Control
Needed
Access controls: only
authorized individuals
may access master files
(e.g., use passwords).

d. Audit Test

Program change
controls: only
authorized changes
should be made to
programs that perform
calculations (e.g.,
reducing inventory for
shipped orders).
Access controls: only
secure information
should be sent/received
to or from credit card
companies.

Use computer-assisted
audit techniques to scan
inventory files for
inventory quantities that
are less than zero.

Review password access


tables to ensure that only
authorized individuals
can access master files.

Computer-assisted audit
techniques should be
used to list any accounts
receivable amounts for
internet sales that have
been outstanding for
more than 30 days.
Segregation of duties:
Use computer-assisted
only authorized
audit techniques to list
personnel should have
any customers where the
access to physical media credit card billing
(e.g., hard drives) on
address is different from
which data is stored.
the shipping address.
Program change
Complete a test order on
controls: only
the internet to ensure
authorized changes
that the accept and reject
should be made to
buttons are functioning
programs that perform
correctly.
calculations, e.g.,
calculating invoice
totals.
Access controls: only
Use computer-assisted
authorized individuals
audit techniques to list
should be allowed to
the pending file as of the
enter shipping
year end date. Trace to
information.
subsequent sales
documents.

18-27
a. Type of
Exception

b.
Transactionrelated Audit
Objective Not
Met
1.
Acquisition
Monetary
transactions are
error or
properly
irregularity classified
(classification).

c. Audit
Importance

d. Follow-up

e. Effect on
Audit

f.
Preventive
Controls

Indicates that
no one is
effectively
reviewing the
accounting
distribution.
Auditor must
consider the
effect of the
errors in
determining
the amount of
reliance
which he or
she may
place on the
system.

Determine the
significance of
the
misclassification
s and plan any
required
additional steps
that are deemed
appropriate.

Have a
second
person
review the
account
distribution
of invoices
that enter the
system.

2. Control
deviation

Recorded
acquisitions are
for goods and
services
received,
consistent with
the best
interests of the
client
(existence).
Acquisition
transactions are
authorized
(authorization).

Determine
whether or not
the controller is
effectively
reviewing
invoices and
other supporting
documents.

3.
Monetary
error or
irregularity

Acquisition
transactions are
recorded on a
timely basis
(timeliness).

Indicates that
the controller
is not
following the
procedure of
initialling
invoices. This
may indicate
that he is not
effectively
reviewing
invoices and
other
supporting
documents
prior to
payment.
At the date of
the physical
inventory,
this situation
will prove

If considered
significant,
the errors
could prevent
reliance on
the system of
internal
controls and
require the
auditor to
perform
additional
tests of the
classification
of items
within the
financial
statements.
If
determinatio
n is made
that
controller
does not
review
supporting
documents,
the audit tests
will require
extension to
determine the
significance
of the
weakness.
Require
expansion of
purchase
cutoff work
at physical

Require that
copies of all
receiving
reports be
routed

Determine
whether or not
this situation
persists
throughout the

Internal
audit
department
could review
supporting
documents
for approval
of controller
and test
items to
determine
effectiveness
of
controllers
review.

4.
Monetary
error or
irregularity

Recorded cash
disbursements
are for goods
and services
actually
received
(existence).

5.
Monetary
error or
irregularity

Recorded
acquisition
transactions are
correctly
valued
(existence).

critical in that
any items
counted in
physical
inventory and
not recorded
in the
purchase
journal will
cause an
inventory
overage and
understated
cost of sales.
It could be a
fraudulent
payment or it
could result
in an
overstatemen
t of perpetual
inventory
records. The
situation is
wasteful of
company
assets and
must be
brought to
the clients
attention.

year or whether it inventory


is rectified at
date and
physical
year-end.
inventory date
and year-end.

directly to
accounting
for
numerical
sequencing
of receiving
reports on a
regular
basis.

Investigate the
frequency of
occurrence of
duplicate
payments to
determine their
significance.

All duplicate
invoices are
marked
duplicate
upon receipt.
Invoices
must be
matched
with an
original
receiving
report and
purchase
order prior
to approval
for payment.

Results in
$100 liability
that may or
may not be
recorded on
the books.

Investigate the
occurrence rate
of the error to
determine the
possible effect of
unrecorded
liabilities on the
financial
statements.

The duplicate
payments
result in
recording of
nonexistent
inventory. If
the company
performs an
interim
physical
inventory, the
auditor could
experience a
problem
relying on
internal
control
between the
physical
inventory
date and
year-end.
Probably
none, since
occurrence
rate is low. If
amount is
significant,
then
expansion of
reconciliation
of vendor
statements

Compare
cheques to
invoice
amount prior
to signing
cheques.

may be
appropriate.
6. Control Existing cash
The cheque
Have the
Auditor
deviation
disbursement
may not
company issue a should
transactions are actually have stop payment for scrutinize the
recorded
been voided, the missing
bank cutoff
(completeness). it could
cheque to
statement for
represent
prevent its
the
disbursement cashing.
possibility
of cash if the
that cheque
cheques were
may have
completed.
been issued
and cashed.
7. Control Recorded
Absence of
Obtain bill of
If either of
deviation
acquisitions are receiving
lading copy from the problems
and
for goods and
reports
vendor to
is considered
Monetary
services
prevents the
determine
significant to
error or
received,
auditor from whether or not
the auditor,
irregularity consistent with determining
the merchandise he should
the best
whether or
was received.
expand the
interests of the not the goods Determine if the scope of his
client
were received absence of
or her tests of
(existence).
and
receiver indicates transactions
Recorded
processed on that they are not
to determine
acquisition
a timely
compared to the
the effect on
transactions are basis. The
invoice.
the financial
correctly
extension
Determine the
statements.
valued
error
error rate by
(accuracy).
indicates that expanding the
the clerical
tests if the error
accuracy of
noted is
invoice tests
considered
is ineffective. significant.

Require all
voided
cheques be
properly
voided and
saved.

Require that
copies of
receiving
reports must
be present
before
invoices are
approved for
payment.
Have
internal
auditors test
extensions to
determine
that the
clerical tests
are effective.

19-25 a.
Supplier master file changes (such as supplier address, email contact and banking
information) should only be changed based upon authorized information provided by the
supplier. This could be an email, fax, or letter that is clearly from the supplier. In particular,
information such as banking information (used for electronic payments) or mailing address used
for payments should be independently verified by a second person.
b.
Potential risk of misstatements could arise because of incorrectly recorded vendor
volume bonuses or variable pricing. These risks could be mitigated by having clear
documentation explaining how these pricing methods are used and which suppliers they apply to.
Calculations should also be independently checked. The company should also consider
estimating these amounts and applying to inventory as estimated amounts.
c.
[Note that these calculations would vary based upon the assumptions made.]
Tangible costs and benefits:
[Note, this analysis does not consider the time value of money. Net present value calculations
could be used.]
Tangible costs:
(1) Initial outlay. $200,000
(2) Additional tangible costs would include maintenance costs associated with the
hardware/software and hardware/software licensing costs.
Tangible benefits [per year]:
(1) One employee, time saving, minimum of 50% of time [Say, $40,000 per year plus benefits],
estimated at $25,000.
(2)
Other employees dealing with queries, say 30 minutes per query. Reduced from 7,250 to
3,300 = 3,950. 3,950 x 0.5 hours = 1,975 hours or 56.4 person-weeks per year (based upon 35
hours per week); or 1.13 person-years, based upon 50 work weeks per year. Salary levels of
individuals answering these queries would vary, estimated at $50,000 per year x 1.13 =
$56,500.
Annual tangible savings:
The sum of the benefits listed above, $25,000 plus $56,500 = $81,500.
These figures would indicate that the payback of this system is less than three years,
($200,000/$81,500 = 2.45) and that CC has already recovered the system costs in increased
efficiency.
Intangible costs and benefits:
Intangible costs include:
Ongoing training costs
Set-up costs of suppliers/vendors in the new systems
Intangible benefits include:
Fewer interruptions for employees who normally deal with these questions
Improved employee morale; not having to deal with repetitive questions
Faster response time to queries for suppliers who use iSupplier
Increased supplier satisfaction for those suppliers who use iSupplier
Marketing tool to attract new suppliers
Ability to handle larger numbers of transactions with the same employees

Vous aimerez peut-être aussi