preview

audit proposal

Good Essays

Audit Proposal
Brenda Pina, Rachel Foster, Maria Kight, Christine Twiford, and Clorissa Willie
ACC/542
July 14, 2014
Professor Thomas Cappels

Audit Proposal
There are many different types of audits including internal, external, and information technology. Companies should be familiar with the types of audits that may possibly be used on an Accounting Information System (AIS). Knowing the different types of audits and where they are used will help a company be ready for an audit and make the process much smoother. There are some circumstances where auditing through a computer is not always beneficial. Auditors want to make sure they are completing their audits fully and appropriately to the best of their abilities. …show more content…

Access controls protect data from being released to non-authorized users, hackers, and other intruders.
How the audits are conducted
Kudler will conduct an information system audit by examining and evaluating their present hardware and software. They will also examine their IT controls, systems security, risk management, and the adequacy of their current systems. They can carry out their marketing audit by evaluating the effectiveness of their marketing program and examining its capabilities. It will evaluate their functions in respect to their goals, mission, vision, and their values of Kudler, which is done externally. Kudler will examine their faculty, and their deficiencies will be identified. Another suggestion is equipment be audited, the maintenance, and an examination to determine if it’s being operated at the designed levels, safety set-up, security, and access issues. Their audit will be done by an external auditor who will examine their accounts, vouchers to support, financial information tests, evaluation of their financial statements, and also examine the internal control and make comments for improvements.
Events that prevent reliance on auditing through the computer
Using computer-based accounting systems does have its disadvantages, such as certain laws pertaining to confidentiality, the requirement to protect against the loss of data through power failures, the

Get Access