Preview

IT General Controls Risk Assessment Report

Good Essays
Open Document
Open Document
1520 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IT General Controls Risk Assessment Report
IT General Controls Risk Assessment Report
Foods Fantastic Company

Background:
In accordance with our IT audit plan, the Foods Fantastic Company (FFC) Audit Team has performed an ITGC review of the 5 critical ITGC areas and in-scope applications so as to enable the audit team to follow a controls-based audit approach and be able to rely on the IT controls in place at FFC. FFC is a publicly traded, regional grocery store located in the mid-Atlantic region which relies on many state-of-the-art IT systems and software and which are all managed in-house.

Purpose:
We hope to gain comfort that FFC’s systems, IT practices, and risk management procedures are working properly and are operationally effective within a well-controlled IT environment and to meet the requirements that are outlined in SAS 109 and SOX Section 404 Management Assessment of Internal Controls. Considering that the FFC IT environment has a direct impact on the account balances and financial statements, it is imperative that we provide assurance over IT controls prior to the financial statement audit and assess the risk of material misstatement in the different areas of the IT environment.

Scope:
Our team initially reviewed key provisions included in SAS 109, SOX Section 404, PCAOB Auditing Standard No.5, and FFC policies. To provide the financial auditors with a complete and accurate review of the critical ITGC areas, we reviewed FFC’s IT and security procedures, interviewed relevant FFC client personnel, and observed FFC operations and procedures related to its ITGCs. Upon review of all relevant evidence and data collected through our walkthrough of FFC, we developed our risk assessment of each ITGC area and an associated assessment of the strengths and weaknesses of each ITGC area documented in Exhibit 3, parts A &B.

Findings:
After reviewing the evidence collected during our walkthrough of FFC’s IT environment, we have assessed IT Management as a lower risk

You May Also Find These Documents Helpful

  • Powerful Essays

    The following provides high-level information about auditing a fictional entity, called Sofitec Computers, created for this case study. This case does not include a complete description of the entity or the industry, nor does it provide comprehensive information on auditing; it is only intended to provide the information that will be necessary and helpful in completing this case study and answering discussion questions.…

    • 5390 Words
    • 36 Pages
    Powerful Essays
  • Good Essays

    Information technology and financial audits primary objectives are to ensure data integrity, safety, secure and operational effectiveness for Kudler’s business processes. Internal audit will provide an opinion on the accuracy and fairness of the financial statements. “This fairness evaluation is conducted in the context of generally accepted accounting principles (GAAP) and requires application of generalized auditing standards” (Bargranoff, 2008).…

    • 986 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Isqc 36 Study Guide

    • 4177 Words
    • 17 Pages

    A32−A63 Monitoring .............................................................................................. A64−A72 Documentation of the System of Quality Control .................................. A73−A75 International Standard on Quality Control (ISQC) 1, “Quality Control for Firms that Perform Audits and Reviews of Financial Statements, and Other Assurance and Related Services Engagements” should be read in conjunction with ISA 200, “Overall Objectives of the Independent Auditor and the Conduct of an Audit in Accordance with International Standards on Auditing.” QUALITY CONTROL FOR FIRMS THAT PERFORM AUDITS AND REVIEWS OF FINANCIAL STATEMENTS, AND OTHER ASSURANCE AND RELATED SERVICES ENGAGEMENTS ISQC 1 38 Introduction Scope of this ISQC 1.…

    • 4177 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Student

    • 373 Words
    • 2 Pages

    This research assignment is being submitted on July 22, 2012, for Jay Wright’s Advanced Auditing Concepts and Standards A340/ACG3085section II course.…

    • 373 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Just as with other countries, Canada experiences natural disasters that are disruptive to both individual and corporate life. With the establishment of a call-center presence in the country, this naturally occurring phenomenon must be considered.…

    • 2452 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    The Premier Collegiate School summary on risk analysis for the IT asset’s below. The chart below covers Asset Identification & Asset Classification…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    ACC 300 Final Exam

    • 1412 Words
    • 7 Pages

    11. A good system of internal control will safeguard its assets and enhance the accuracy and reliability of its accounting records.…

    • 1412 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Riordan Manufacturing conducts an information systems security review over IT security issues that exist in different plants to prepare for an upcoming audit in accordance to the Sarbanes-Oxley Act. Several elements of the organization 's information systems require revisions and updates to optimize physical and network security, data security, and Web security.…

    • 2582 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Audit Checklist

    • 2781 Words
    • 12 Pages

    This Appendix includes guidance for reviewing the Office of Inspector General’s (OIG’s) attestation engagements conducted in accordance with Government Auditing Standards (GAS), Chapter 6, and the American Institute of Certified Public Accountants’ (AICPA’s) Statements on Standards for Attestation Engagements (SSAE). When an auditor conducts an attestation engagement under generally accepted government auditing standards (GAGAS), the engagement must be conducted in accordance with the SSAEs and additional GAGAS standards. This appendix is not intended to replace auditor judgment, and while comprehensive, the peer review team may also wish to consult with other guidance as warranted. That guidance includes the SSAE and the AICPA’s peer review checklists for attestation engagements (aicpa.org/members/div/practmon/systemreview.asp). In this regard, there are three AICPA checklists covering AICPA requirements and GAGAS: (1) Agreed-Upon Procedures Engagement Checklist – PRP §20,900; (2) Other Attestation Engagement Checklist – PRP §21,000; and (3) Supplemental Checklist for Review of Agreed Upon Procedures and Other Attestation Engagements Performed in Accordance With Government Auditing Standards (Yellow Book) July 2007 Revision – PRP §21,120A.…

    • 2781 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Course Project Part Iii

    • 767 Words
    • 4 Pages

    This research paper is being submitted on March 10, 2013, for Tiffany Krogman, A340/ACG3085 Section 03, Advanced Auditing Concepts & Standards.…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    I had my hearing; they told me I had a 15,000 dollar bond. The judge asked me if I wanted to be appointed a lawyer or wanted to hire one. I told the judge I have no money, my mom barely gets buy and I would like to have a free one. He told me in my current situation that if I get bonded out that I could still get a free lawyer to help me with my case. Hope my mom can get me out today.…

    • 1071 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Risk Assessment Paper

    • 907 Words
    • 3 Pages

    Leukemia is the malignant disorder of white blood cells in which the cells become abnormal and divide without control or order. Hematopoietic stem cells, also known as hemacytoblasts, are found in bone marrow and are the precursor to erythrocytes (red blood cells), leukocytes (white blood cells) and thrombocytes (platelets). Leukemia is caused by the mutation of the bone marrow pluripotent or most primitive hematopoietic stem cells (Caldwell, 2007). The mutations during hematopoiesis causes uncontrolled proliferation of stem cells resulting in overcrowding of bone marrow and decreased production and function of normal hematopoietic cells (Huether, 2012). The leukemic stem cells will then enter the blood stream affecting other organs such as the liver, spleen, lymphnodes, and under certain circumstances the central nervous system. The mutant clone may demonstrate unique morphologic, cytogenic, and immunophenotypic features that can be used to classify the particular type of leukemia (Caldwell, 2007). Leukemia can be fatal if left untreated because of the inhibited ability to produce and provide normal red blood cells, white blood cells, and plates to maintain homeostatic mechanisms.…

    • 907 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sociologists explained the process of socialisation in many different ways – they have looked at all factors which could occur in such process.…

    • 863 Words
    • 4 Pages
    Good Essays