Académique Documents
Professionnel Documents
Culture Documents
Question 1)
(I)
(II)
Removal regarding any company auditors is only permitted to be done and carried out
in the United Kingdom as per guidelines and regulations given in “Companies Act 2006”
(Lubo, 2013). The key principle being that since only the shareholders of a given
enterprise are authorized to engage in appointment of the company’s shareholders
therefore it will only be the shareholders who are permitted to take up the activity of
removing or replacement of the persons appointed as the auditors. Therefore, the
procedure to be initiated on part of Navratilova Enterprises for the removal of the auditor
are as follows:
Navratilova would necessarily require to ensure that an ordinary resolution that they
are seeking the replacement of Wade Austin will require to be given out and also at
the same time Navratilova needs to ensure special notice is also accompanied along
with the resolution which specifically should mention the point about replacement of
Wade Austin (Lubo, 2013).
Only the shareholders of Navratilova will be permitted to exercise the decision on a
collective basis whether or not they wish to remove Wade Austin.
However, Wade Austin being the current legal auditor of Navratilova will be given a
specific chance and opportunity to make their own representations about being
removed to the existing shareholders of Navratilova.
Navratilova will have to ensure all of the payments due to Wade Austin in terms of
compensation or damages are fully cleared before they are terminated.
Finally, if the judgement is to remove the current auditors who are Wade Austin then
it is also mandatory for Navratilova to give specific instruction to registrar in the
United Kingdom about removal of the auditors and possible new appointment.
Regarding appointment of the new set of auditors for Navratilova as per the new
conditions then the procedure includes;
Therefore, in the given case the statement made by Mr. Nastase that since he has
allowed appointment of the company they should give 50% of the fee as a discount is
not valid or correct because Mr. Nastase does not have any power or authority to
perform such an action on behalf of Navratilova.
(III)
Wade Austin, is the current auditor who is working and handling the external audit of
Navratilova. Since they are officially appointed by the shareholders of Navratilova, they
should not worry or be concerned about what Mr. Nastase is planning to do because he
does not have the authority or power to perform the action of removal of Wade Austin.
He may only have the authority to recommend that Wade Austin be replaced but he
cannot actually perform this activity (Lubo, 2013).
Therefore, Wade Austin should not bow down and resign from the appointment until and
unless the shareholders of Navratilova approved the termination of current auditors and
their replacement. Importantly, the audit company of Wade Austin will be provided with
an opportunity to even make certain representations to shareholders of Borg Co and
therefore taking the route of resignation is not recommended since there is no lapse or
issue on part of Wade Austin but rather it is only Mr. Nastase who is requesting for their
replacement (Finley, 2015).
Question 2)
A)
(I)
For example, auditors may prepare financial ratios for two or more years and use these
to examine any unusual variations in computed ratios for the enterprise. Secondly,
auditors may enforce physical presence at important events such as the enterprise’s
aggregation of stock count.
(II)
Under circumstances where auditors procure “third party” sources of evidence to aid in
the audit processes the case of the audit quality will depend on intrinsic characteristics
of third party involved, although the general view is that this category of externally
generated audit information is much more reliable when contrasted with information
gained from internal sources (Pittman, 2013). In particular, certain set of third parties
such as banking institutions may be considered to be largely valid and reliable as
compared to 3rd parties such as a large debtor or a large credit are associated with the
given corporation which may be considered to be to a certain extent unreliable because
large potential for influence clearly exists.
For example, a third party of a “bank” may be approached to obtain documentation of
loan and interest payments or otherwise even the bank balances of the given enterprise
and as such the third party involved would be the bank. The quality however while
dealing with bank would be quite high and reliable from evidence point of view to serve
audit. Secondly, “professional valuation reports” may also be procured, however it is
essential that the auditor should necessarily measure experience and independence of
such professional valuation agent (Beasley, 2010).
(III)
For example, the enterprises own monthly accounting records for statements that are
being used for internal company circulation having appropriate endorsement from its top
managers may be considered as one such important source. Secondly, evidence of a
verbal form gained through queries made directly to the given entity’s management on
certain audit points that necessitate clarification (Pittman, 2013).
(B)
All auditors as part of their compliance with SAS 400 as a mandatory component to be
applied across all auditing activities need to ensure three distinct characteristics are
evident across any collated evidence. These three elements comprise the requirement
of being sufficient, that of being relevant or appropriate and similarly that of possessing
reliability. Cosserat (2009) contends that evidence will have the quality of being
“relevant” under circumstances wherein there is a clear logical straightforward
interrelationship with the element of the audit being measured. On the other hand, the
characteristic of “reliability” which is considered to be crucial considering the nature of
audit given that it needs to itself provide some degree of reliability assurance (Trotman
& Wright, 2010). This characteristic trait of reliability means the same outcome from
computed audit evidence can be created or generated when a given test or measure is
being repeated. Likewise, “sufficiency” is intrinsically connected to the amount and
quantity of the audit evidence being able to substantiate that all the data will exhibit the
same characteristic or quality. For example, the amount of credit transactions that are
checked by the auditor need to be of such quantity that the general viewpoint about the
credit transactions can be gained. For example, it will not be sufficient for auditor to only
consider two or three transactions out of 500 transactions it needs to be at least 30 or
40% (Beasley, 2010).
Question 3)
Dear Sir,
Our audit company, XYZ auditors, conducted an inspection and detailed evaluation of
procedures being used for the stock and digital components. We have noted two crucial
deficiencies at your company and we present our recommendations to assist in
correcting the flaws in stocking and digital components.
Weakness 1;
Although, the storage room is currently locked and secure, its key is merely kept in the
drawer system of Miss Florence which in itself is not adequately secured. Moreover, the
room itself is being shared by 10 other staff members of your company meaning that it
is highly probable that a possible chance does exist whereby in the absence of miss
Florence from the room that the key may be accessed by an unauthorized person who
may then be able to gain access to the valuable digital items. This augments possibility
that digital components may be stolen or used for unauthorized practices and therefore
it will cause a loss to your company (Paterson, 2015).
Recommendation: the key to the stockroom is highly valuable and so it should specially
secure at all times wherein even the drawer system of Miss Florence should be
specifically locked up at all times irrespective of whether she is present at a location or
not. Moreover, it may be important to improve storage in a simple drawer system and
what may be required may be some fireproof container or compartment. Any duplication
of stockroom key should be carefully controlled and noted by senior management.
Weakness 2;
Currently, Miss Florence permits access to the stockroom on a verbal basis, wherein
any of the company staff may get an approval verbally from a supervisor or member
from the production department of your organization. This practice causes to challenges
at your enterprise, first unauthorized use of valuable digital components may occur
which in itself may cause damage and other financial losses. Secondly, there is no proof
or a trail of who had access to the stockroom and by whom it was approved. This
therefore negates any vital paper trail at your enterprise (Paterson, 2015).
We trust that our findings on stock and digital components based access procedures
will be honestly considered by your entity. Please feel free to discuss internal control
procedures or rational as suggested by us by calling the undersigned
Mr Abdullah Al Hooti
Senior Auditor
KPMG Oman
Question 4)
Moving on, the statement regarding auditor independence can further be bifurcated into
two separate and differentiable elements. First, there is the independence to be shown
in actual performance of audit work or rather independence associated with auditor
mindset in terms of objectivity. Secondly, arguably there is also the element of auditor
behavior and action in terms of showing some form of independence. Both of these
elements of independence are extremely important and should be present “together” in
order to fully validate independence (Schmidt, 2012). In other words, it is becoming
increasingly necessary that auditors should show both forms of independence the first
being actual form of independence connected to their mindset and second being that of
actually appearing to be doing their audit work and tasks in an independent manner.
Commonly, there are certain safeguards to promote auditor mindset and appearance to
be independent and these comprise actions of not being beneficial owner of any
company shares, not taking or accepting gifts whether in kind or weather in cash from
any of the audit-related clients, not having personal family relationships with any
members from the given enterprise or even not accepting any form of excessive gifts or
excessive positive treatments from the clients (Tepalagul & Lin, 2015). In short, every
auditor to protect sanctity of the audit profession as well as their own reputation needs
to show independence from mindset and also in actual appearance and dealings.
(2600 Words)
References
Books
Beasley, S. 2010. Auditing and assurance services. Fourth Edition. London: Prentice.
Cosserat, G. 2009. Modern Auditing Practices. Fifth Edition. New York: Wiley.
Paterson, J.2015. Internal Audit Practices and Principles. Fifth edition. Ohio: New York
Journal
Blay, D., & Geiger, A. 2013. Auditor Fees and Auditor Independence: Evidence from
Going Concern Reporting Decisions*. Contemporary Accounting Research, 30(2), 579-
606.
Schmidt, J. 2012. Perceived auditor independence and audit litigation: The role of
nonaudit services fees. The Accounting Review, 87(3), 1033-1065.
Trotman, T., & Wright, F. 2012. Triangulation of audit evidence in fraud risk
assessments. Accounting, Organizations and Society, 37(1), 41-53.
Yoon, K., Hoogduin, L., & Zhang, L. 2015. Big Data as complementary audit evidence.
Accounting Horizons, 29(2), 431-438.
Tepalagul, N., & Lin, L. 2015. Auditor Independence and Audit Quality A Literature
Review. Journal of Accounting, Auditing & Finance, 30(1), 101-121.
Websites