audit proposal
Audit Proposal
Brenda Pina, Rachel Foster, Maria Kight, Christine Twiford, and Clorissa Willie
ACC/542
July 14, 2014
Professor Thomas Cappels
Audit Proposal
There are many different types of audits including internal, external, and information technology.
Companies should be familiar with the types of audits that may possibly be used on an Accounting
Information System (AIS). Knowing the different types of audits and where they are used will help a
company be ready for an audit and make the process much smoother. There are some circumstances
where auditing through a computer is not always beneficial. Auditors want to make sure they are
completing their audits fully and appropriately to the best of their abilities. ... Show more content on
Helpwriting.net ...
Access controls protect data from being released to non–authorized users, hackers, and other
intruders.
How the audits are conducted
Kudler will conduct an information system audit by examining and evaluating their present
hardware and software. They will also examine their IT controls, systems security, risk management,
and the adequacy of their current systems. They can carry out their marketing audit by evaluating
the effectiveness of their marketing program and examining its capabilities. It will evaluate their
functions in respect to their goals, mission, vision, and their values of Kudler, which is done
externally. Kudler will examine their faculty, and their deficiencies will be identified. Another
suggestion is equipment be audited, the maintenance, and an examination to determine if it's being
operated at the designed levels, safety set–up, security, and access issues. Their audit will be done
by an external auditor who will examine their accounts, vouchers to support, financial information
tests, evaluation of their financial statements, and also examine the internal control and make
comments for improvements.
Events that prevent reliance on auditing through the computer
Using computer–based accounting systems does have its disadvantages, such as certain laws
pertaining to confidentiality, the requirement to protect against the loss of data through power
failures, the
... Get more on HelpWriting.net ...