auditing in computer environment presentation 1224128964994975 8

90
APT FINANCIAL CONSULTANTS Mwakalobo@apt financial consultants AUDITING IN COMPUTER ENVIRONMENT What is audit in a computer environmen t?

Upload: fahad-ali

Post on 18-Sep-2015

224 views

Category:

Documents


2 download

DESCRIPTION

free to use

TRANSCRIPT

  • AUDITING IN COMPUTER ENVIRONMENT

  • AUDITING IN COMPUTER ENVIRONMENTApproachesAuditing around the computer

    Auditing through the Computer

    Auditing with the computer

  • AUDITING IN COMPUTER ENVIRONMENTUse of computer of audit automationWorking PapersStatistical sampling and analytical procedures Decision Support System;

  • AUDITING IN COMPUTR ENVIRONMENTTypes of software on PC in order to aid his audit workStandard software for word processing , spreadsheets Expert systems.Generally, an auditor can use his PC to assist for Production of time budget and budgetary control . Analytical procedures. The maintenance of permanent file information

  • AUDITING IN COMPUTER ENVIROMENTThe computer systems challengeslack of visible evidence and systematic errors. What to do?techniques available to him,The internal controls, the availability of the data the length of time it is retained in a readily usable form.

  • AUDITING IN COMPUTER ENVIRONMENTControls over audit computersSecurity, and Accuracy (of input, processing and output). The auditor should exercise controls when PCs are used by auditor in their work are as follows:Access controls for users by means of passwords

  • AUDITING IN COMPUTER ENVIRONMENTControls over audit computersBack up of data contained on files, regular production of hard copy; back-up disks held off the premises. Viral protection for programs and Training users.Evaluation and testing of programs use 6.Proper recording of input data , to ensure reasonableness of output.

  • INTERNAL CONTROLS IN CISThe internal control over computer based accounting system

    Application controls

    General controls

  • INTERNAL CONTROLS IN CISThe internal control over computer based accounting system Application controls: The objective of application controls (manual or programmed) are toEnsure completeness and accuracy of accounting records validity of entries made resulting from both manual and programmed processing.

  • INTERNAL CONTROLS IN CISThe internal control over computer based accounting system General controls; relates to the environment CIS are developed, maintained and operated, and which are therefore applicable to all the applications.The objectives of general controls are .

    The application controls and general controls are inter-related. Strong general controls contribute to assurance, which may be obtained by an auditor in relation

  • INTERNAL CONTROLS IN CISThe specific requirements in order to achieve the overall objectives of application controls are:-Control over the completeness and authorization of inputControl over the completeness and accuracy of processingControl over the maintenance of master files and the standing data contained therein

  • INTERNAL CONTROLS IN CISIn order to achieve the overall objective of general controls, the controls required are:-Control over applications developmentTo prevent or detect unauthorized changes to programs To ensure that all programs changes are adequately tested and documentedControl to prevent and detect errors during program execution To prevent unauthorized amendments to data filesTo ensure that system software is properly installed and maintainedTo ensure that proper documentation is kept To ensure continuity of operations.

  • COMPUTER ASSISTED AUDIT TECHNIQUES (CAATs)DefinitionTechniques in that the auditors are afforded opportunities to use either the enterprises or another computer to assist them in performance of audit work.CAATs, are ways in which the auditor may use the computer in a computerized information system to gather, or assist in gathering, audit evidence.

  • CATEGORIES OF CAATAudit softwareTest dataOther techniques

  • CATEGORIES OF CAATAudit software: generalized audit softwarespecialized audit software or Interrogation softwaresutility programs and existing entity programs. Regardless of the source of the programs, the auditor should substantiate their validity for audit purposes prior to use.

  • CATEGORIES OF CAATAudit software some usesStratify accounting population and select monetary unit statistical samples.Carry out an aging /usage analysis of stocksPerform detailed analytical reviews of financial statements

  • TYPES OF CAATsTest data Is a CAAT in which test data prepared by the auditor is processed on the current production version of the client's software, but separately from the client's normal input data.

  • TYPES OF CAATsOther techniquesembedded audit facilitiesIntegrated test facilitySystem Review and control file ( SCARF)Application program examination Internal control evaluation via; Flowchart verification (Logical Path analysis ) ,Program code verification (Code Comparison Programs), Printout examination.

  • CAATs and Sustentative testing

    During substantive testing some, CAATs are used frequently.Audit software is used extensively to examine accounting records maintained on computer filesCAATs assists in carrying out analytical review procedures

  • Limits of CAATs

    Limits of CAATsEvaluation of general controlsUse ICQ or the ICE approach.

  • PROGRAM AUTHENTICITYSource Program authenticityguarantee that the correct application program is being tested.Live test data, integrated test facilities and embedded audit facilities as described above are audit techniques, which help in this respect. General controlsCopy must be identical to orignal

  • KNOWLEDGE BASED SYSTEMKnowledge based systemsDecision Support Systems and Expert systems can be used to assist with the auditors own judgment and decisions.

  • MANUAL Vs CAATsFactors to consider in choosing between CAATs and manual Techniques:-Practicability of carrying out audit tests manuallyCost effectiveness of the procedures under considerations.Availability of audit timeThe availability of appropriate computer facilities and independence issueThe level of audit experience and expertise.The extent of possible reliance upon internal audit work

  • PLANNING AN AUDIT IN A COMPUTER ENVIRONMENTPlanning an audit in a Computer environmentPossibilities of attending during system development stageConsideration of use of CAATsPracticability of manual auditExpertise

  • PLANNING AN AUDIT IN A COMPUTER ENVIRONMENT Use of CAATSThe pattern cost associated with CAATs, The extent of tests of controls or substantive procedures achieved by both alternatives, Ability to incorporate within the use of CAAT a number of different audit tests.Time of reporting

  • PLANNING AN AUDIT IN A COMPUTER ENVIRONMENTIn using CAAT, computer facilities, computer files and programs are available; the auditors should plan the use of CAAT in good time so that these copies are retained for their use.Internal auditor CAATs , consider ISA Availability of computer facilities

  • INTERNAL CONTROL EVALUATIONInternal control evaluationICQ .Weak controls = extensive substantive proceduresIn determining whether they wish to place reliance on application controls or general controls ,the auditors will be influenced by the cost effectiveness and ease of testing by the following mattersGeneral controls and application controls

  • INTERNAL CONTROL EVALUATIONCheck systematic errors and program intergrityManual examination may be useful in small computer applicationObservation, examination of documentary evidence or reperforming the procedures may be useful.CAATs can also be useful

  • Review of financial statements

    Review of financial statementsCAATs (audit software) e.g analytical review.The working papers should indicate the work performed by CAAT, the auditors conclusion, the manner in which any technical problems were resolved and may include any recommendations about modification of CAAT for future audits.

  • AUDIT TRAIL.Audit trail.As the complexity of computer systems has increased there has been a corresponding loss of audit trail. Most systems have searching facilities that are much quicker to use than searching through print outs by hand. This offsets the so- called loss of audit trail to a significant extent. The trail is still there, although it may have to be followed through in electronic form.

  • COMPUTER SERVICE BUREAUXThese are third part service organization who provide EDP facilities to their clientsFactor to considermake or buy decisionsConsider and Analyze the cost benefit; Level of managements own computing knowledge and their willingness to take risk to unknown third party;

  • COMPUTER SERVICE BUREAUXFactors to considerThe volume and frequency of processing requirements ; The complexity of the program package required ;The simpler the program the easier it would be to process in house on Micro; The importance of timelines in processing of data check the efficiency and economy of DP The confidentiality of the data being processed.

  • Types of Bureaux

    Independent companies formed to provide specialist computer servicesComputer manufacturers with bureauComputer users (e.g. universities)

  • PLANNING AND CONTROL EXERCISED BY THE USERWhen the system using bureaux is set up it is essential that a full feasibility study and system design should be carried out.In practice the bureau may provide assistance in performing these tasks.

  • PLANNING AND CONTROL EXERCISED BY THE USERThe control should include : Prior vetting of bureau standards ; Input controls at preparers end; bunching and providing or authorizing in the same way as usual; Transit controls ;Physical transfer of documents ;batch controls ,physical security and authorized personnel;

  • PLANNING AND CONTROL EXERCISED BY THE USERThe control should include : Electronic transmission of data ;batch totals, passwords and possibly encryption coding for very sensitive data;Control over and action on rejection; there must be strong control over the level of rejections; whose fault, the bureaus or ours?;

  • COMPUTER SERVICE BUREAUXOutput controls :logging /registering receipt of output material and original documentation ,distribution and filing; Master file amendment controls; suggested control include the usual use of pre-numbered properly authorized forms. Special control of periodic print out of all master file amendments; Adequate insurance covering loss of data or documents and computer breakdown at the bureau itself ;The external auditor review of bureau controls ;

  • COMPUTER SERVICE BUREAUXA third party review an independent firm to carry out review of internal controls, both the general and application based. The report is then made available to the auditors of clients of the bureaus. This saves the bureau having to make provision for many different sets of auditors all asking to run CAATs on the bureaux system and complete roughly similar ICQ/ICE forms.Direct evaluation of the bureau by the auditor using the CAATs , ICQ and ICE.; Standby /back up /emergency arrangement ;

  • COMPUTER SERVICE BUREAUXThe compliance and substantive testing of programmed procedures, the CAATs such as discussed above are appropriate where the client has the data and files on the premises. They may not be possible in context of the computer service bureau. The client may have to arrange to have files copied by the bureau or supplied to the auditor for testing.

  • CONTROLS IN ON-LINE AND REAL TIME SYSTEMSControls in real time systemsThe main control problem is that primarily the concern is on large, multiuser systems with terminals (dumb terminals or networked PCs) ;The same person is often responsible for producing and processing the same information. Internal check ,supervisory controls should be strengthened (segregation of duties) ;The ability of a person using remote terminal to gain access to databases at will results in the need for special controls to ensure that files are neither read nor written to (nor destroyed).

  • CONTROLS IN ON-LINE AND REAL TIME SYSTEMSPhysical controls; Operating system; Use passwords( or lockwords) or special badges or key; Restriction by the operating system of a certain users to certain files .eg wages dept can be given access to only wages file; Logging of all attempted violation of the above controls .eg Automatic shut down of the PC or terminal used; All violations should be speedily and thoroughly investigatedApplication controls; Validity checks on input; Reporting of unusual transactions; Passwords

  • DATABASE MANAGEMENT SYSTEMS (DBMS)Main controls; Control to prevent or detect unauthorized changes to programs; No access to live program file by any personnel except for the operation personnel at the central computer; Password protection on programs;Restricted access to the central computer and terminal ;Maintenance of console; Periodic comparison of live production programs to control copies and supporting documentation.

  • DATABASE MANAGEMENT SYSTEMS (DBMS)Main controls; Controls to prevent or detect error during operation;Restriction of access to terminals by use of password; Satisfactory application control over input , processing and master file ;Use of operation manuals and training all users;Maintenance of logs showing unauthorized attempts to access; Physical protection over data files ;Training in emergency proceduresControls to ensure integrity of the database system; Restriction of access to data dictionary

  • DATABASE MANAGEMENT SYSTEMS (DBMS)Controls to ensure integrity of the database system; Restriction of access to data dictionary( point of definition and interrelationship of data); Segregation of duties between data processing manager and data base administration personnel; Liaison between database administration function and systems development personnel ;Preparation and update as necessary of user manual in conjunction with data dictionary

  • DATA BASE MANAGEMENT SYSTEMThe audit of DBMS creates particular problems as the two principal CAATs , test data and audit software, tend to work unsatisfactorily on programs and files contained within such system. The auditor may, however, be able to use embedded audit facilities. Close liaison with the internal auditor may provide audit comfort. The auditors should if possible be involved at the evaluation, design and development stages, so that they are able to determine their audit requirements and identify control problems before implementation.

  • SMALL COMPUTER SYSTEMControl problems in small computer systemsThe problems surrounding PCs can be grouped as ;Lack of planning over the acquisition and use of PCs; Lack of documentary evidence ;Lack of security and confidentiality.

  • COMPUTER FRAUD Input fraud : Processing fraud; Fraudulent use of computer system; Output fraud;

  • FACTORS- RISK TO COMPUTER FRAUD

    Increase in computer literacy Communications e.g. telephone and PCs and hackersReduction of internal Improvements in quality of software and increase in implementation of good software has not kept pace with improvements in hard ware

  • COUNTERACT COMPUTER FRAUDPlanned approach to counteract computer fraud.All staff should be properly trained and should fully appreciate their role in computer functionManagement policy on fraud should be clear and firmA study should be carried to examine where the company is exposed to possible fraudA company should map out an approach or plan in each area of the business to tackle and prevent fraud.

  • CONTROLS TO PREVENT COMPUTER FRAUDS

    As with a control system, three areas to examine are; prevention, detection and correctionAccess to the computer terminals and other parts of the computer should be restrictedAccess to sensitive areas of the system should be logged and monitoredErrors logs and reports should be monitored and investigated on regular basisStaff recruitment should include careful vetting ,include taking up all referencesExpert systems software may be used to monitor unusual transactions

  • DEVELOPMENTS IN COMPUTERIZED ENVIRONMENT

    Many auditors are now finding their clients conducting business through the internet. As always, the principle audit concern , will be controls over the use of the internet and the strength of audit evidence obtained through the internet

  • INTERNETControls over the InternetUnauthorized use of the internetStaffs may use internet for unauthorized purchasesStaff may use internet for accessing data which have a costs (call)People may be able to access business internal systems via the internet and obtain confidential information or launch virus which disrupts internal systems

  • CONTROLS IN INTERNETControls from these risks includeUse of passwords, Disabling certain terminals Firewalls Authorization the technique make sure that a message has come from an authorized senderVirus control software regular updatingPhysical controls ;against fire, damage etc

  • AUDIT EVIDENCE IN THE INTERNET

    Audit evidence in the InternetCertain general observations can be made about audit evidence obtained through the Internet Internet evidence generated by the auditor will be stronger than evidence generated by client. Comfort may be obtained if the auditor can access the internet and test what the client has postedInternet evidence can be obtained in written form and thus stronger than oral evidence If the internal controls mentioned above are strong ,the auditors will have more confidence in the quality of evidence

  • WHAT ABOUT E-MAIL?Email may have numerous advantages in reducing office paperwork and speeding up communication, but it also has dangers from an audit point of view. e.g. unscrupulous employee in a large organization might find it quite easy to send and e-mail from his or her bosss computer authorizing a substantial bonus /payrise

    H/W; what controls could you put to prevent this from happening

  • CONTROL IN INTERNET SYSTEMControl of network system is of uttermost importance .the auditors must be able to analyse the risk of unauthorized access such as line tapping or interception and to evaluate preventive measuresAuthentication programs and encryption are used for security .the auditor must understand those matter and should be able to make recommendations on implementation. Password security is extremely important, and the auditors may be called upon to recommend complex password procedures for sophisticated systems.

  • ELECTRONIC DATA INTERCHANGEElectronic data interchange (EDI) is now used very widely because it cuts the task of re-inputting data that has already been input into a system in electronic form, saving time and improving accuracyEDI is authentic? What authorization measures are in place to ensure that transactions above certain value are properly authorized before being transmitted or accepted?What is the legal position of the two parties if the transaction is disputed? Encryption and authentication offer some help, as do transaction logs that identify the originator or any transactions generated and transmitted.

  • WHAT IS EDIIs the automated computer-to-computer exchange of structured business transactions between an enterprise and its vendors, customers, or other trading partners in a standard format, with a minimum of human intervention

  • CONSIDERATION OF AUDIT STANDARDS ISA 315, Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement and ISA 330, The Auditors Procedures in Response to Assessed Risks became effective.

  • CONSIDERATION OF AUDIT STANDARDS Major issues to be considered by an auditor as per ISAAn auditor should consider new CIS environment affects the auditThe overall objective of audit in CIS audit never changes.The design and performance of appropriate tests of Controls and Substantive procedures to achieve the audit objective are likely to change.

  • CONSIDERATION OF AUDIT STANDARDS Major issues to be considered by an auditor as per ISAThe existence of computer is likely to have an impact on the clients inherent risk and control risk.The auditor should have sufficient knowledge of CIS to plan, direct supervise and review the work performed. The auditor should consider whether specialized CIS skills are needed in an audit.

  • ISAThe ISA makes it clear that auditors should have sufficient knowledge of the CIS to perform such audit effectively.I t is not necessary for overly member of audit team to be a computer expert auditors must consider need for specialized CIS skills.ISA 620 using the work of expert is relevant.In planning the portions of audit which may be affected by the clients environment the auditor should obtain an understanding of significance and complexity of CIS activities and the availability of data for use in the audit.

  • ISAAuditor must obtain understanding of accounting and IC sufficient to plan an effective approach.Where CIS is significant, the auditor must assess the effect of the CIS on in hereunto control risk.Complexity normally increases risk and pensive deficiencies in program development, mtc, physical security and access controls would have an effect on all applications that the system served.

  • ELECTRONIC COMMERCEIAPS 1013Is any Commercial activity that takes place by means of connected computers. E.g. offering goods for sale directly from office computer; the purchasers computer and office computer is connected over Internet.How do we audit ex-commerce?

    International Audit Practice Standard ISPS 1013 (IAPs) in intended to assist auditors in identifying and assessing the new risk to which the business in exposed when it undertakes e-commerce transactions.

  • MAJOR AREAS OF FOCUS BY THE IAPS 1013

    The skill and knowledge required to understand the implications of e-commerce on auditThe extent of knowledge an auditor should have about the clients business environment and activities.

  • MAJOR AREAS OF FOCUS BY THE IAPS 1013

    The business, legal, regulatory and other risk faced by entries engaged in e-commerce transactions. The effect of electronic records on audit evidence.The statement may be also helpful to the auditor of any business engaged in e-commerce.

  • What is an IT audit?Like operational, financial and compliance auditors, Information Technology (IT) auditors work to: Understand the existing internal control environment Identify high risk areas through a formal methodology Ensure that adequate internal controls are in place and operate effectively (through the testing of said controls) Recommend control implementation where risk exists

  • Why IT AUDIT?Because of Information Technology RISK!!Risk: The probability that a particular threat exploits a particular vulnerability (i.e. an issue which may impact ability to meet objective).Threat: Event or entity with the potential to cause unauthorized access, modification, disclosure, or destruction of info resources.Vulnerability: Weakness in a system control, or a design flaw, that can be exploited to violate system, network, or data integrity.

  • What Reduces IT Risk and What about any Remaining Risk? Internal Controls (i.e. safeguards)Control: Protective measure implemented to ensure company assets (IT or otherwise) are both available and accurate in order to meet the business requirements of that asset. Residual Risk: The risk that is left over after reasonable internal controls have been both evaluated and implemented.Internal Controls do not eliminate all risk!!

  • INTERNAL CONTROLS OTHER MATTERSThe are two major types of controls:Application ControlsGeneral Controls.

  • What about OTHER types of audits that may impact Security Administration functionsTraditional Audit Types:Financial opinion audits (CPAs)Operational process audits now includes environmental & constructionCompliance laws/regulations and policies, standards, and proceduresIT usually considered operational unless performed so opinion auditors may rely on financial info providedHybrid - Integrated Audit today almost all audits are actually hybrid

  • Operational AuditsReview operating policies/proceduresDocumented policies/procedures?Informal policies/procedures?Work flow examined (thru flowchart or description requested/developed)Controls identified and documentedExamine the business process and recommend improvements control related or efficiency/effectiveness

  • INTERNAL CONTROLS OTHER MATTERSGeneral Controls:The purpose of General controls is to establish a framework of overall control over the CIS activities and to provide a reasonable level of assurance that the overall objectives of IC are achieved.

  • INTERNAL CONTROLS OTHER MATTERSCategories of General Controls:Organizational and Management control-Helps to provide a proper organizational framework including regression of incompatible functions.Application development and Mtc controls -To ensure that applications are properly developed, tested and maintained.

  • INTERNAL CONTROLS OTHER MATTERSCategories of General Controls:Operational controls To ensure properly authorized access to system and the detection of errors.Systems software controls to ensure the integrity of the development and usage of systems software.Data entry & program controls to ensure the integrity of data and program files.

  • CIS APPLICATION CONTROLSCIS application controls.The purpose of this control is to establish specific control procedures over the acting applications to provide reasonable assurances that all transactions are authorized, recorded and processed, completely, accurately and on a timely bases.

  • CIS APPLICATION CONTROLSThe Controls Include:Controls over input designed to provide reasonable assurance that:-Transactions are properly authorized before being processed by the computer transactions are accurately converted into machined readable form and recorded in the compute data files.Transactions are not lost, duplicated or improperly changed.Processing errors are identified and corrected on timely basis

  • CIS APPLICATION CONTROLSThe Controls Include:Controls over output designed to provide reasonable assurance that:-Results of processing are accounts; Access to output is restricted to authorized personnel; Output is provided to appropriate authorized personnel on timely basis ;Normally the technique which control the accuracy of input and processing while help to control master file date; Since master file standing data items are used many times over in processing, they take on greaten importance than transaction date and more costly controls such as one - for one checks may be justified.

  • MANUAL AND PROGRAMMED CONTROLSMany controls over computers are manual controls, and prodding that the manual controls exercised by users are sufficient to provide reasonable assurance of the completeness, accuracy and authorization of output, test of control may be limited to those manual controls. In a payroll system, for example, if users test check gross pay, deductions net pay and authorization at the output stage, and if they compare net pay with approved bank transfer documentation and perform regular bank reconciliations; there may be no need to test programmed controls.

  • MANUAL CONTROLSOther Controls:Manual ControlsPhysical Controls:-Is a matter of common sense. -Limit access to a computer room, -Locks and keys, only to specified people-Prevention of smooking.Back-up of disks:-Create and update an identical back up disk for every disk in the system; Data files&Program files; The disk should be stored in separate place.

  • MANUAL CONTROLSOther Controls:Manual ControlsData filing:-Each disk should be labeled clearly and filed securely.The labeled disks should be filed in special disk boxes to provide a degree of protection against liquid being spoilt on the disks or their being bent or plied.Documentation: It is vital, as it provides both a support system for work already stored on disk and filed, and progress report on data currently being processed or updated.Staff Training:Proofing:There is always room for manual checking or proofing, to control data on disk.

  • PROGRAMMED CONTROLSProgrammed Controls:

    Passwords; Date/time stamps for compass on of two revisions of data; Prompts Asking the user to continue with an action or not.Check Digit: A means of control on that they ascertain whether or not a number, such as ISBN is valid. E.g. customer account No. The computer will detect of the number is ever input incorrectly.Batch totals and hash totals:

  • PROGRAMMED CONTROLSProgrammed Controls:Reasonable checks: Checks to ensure that data input is reasonable given the type of input it is e.g. A payroll system would check that his recorded for a falls within a range of 30 to 50.Existence checks: Checks to ensure that the data input is valid by checking that the entity already exists in the system. E.g. employee number.Dependency checks: Data input fields can be compared with other fields for reasonableness.

  • SMALL STAND ALONE MICRO-COMPUTERMain problems.Internal Controls.Major controls appropriate in this environment are:-Authorization:Physical securityAUDIT PROCEDURESSubstantive tests

  • Internal controlsInherent limitations of the system of IC in elimination of frauds & errors.The need to balance the cost of control with its benefits; The fact that IC are applied to systematic transaction, not one-off year-end adjustments, which are often larger and subject to error; The potential human error; Possibility of circumvention of IC through coolness in of managers or employees with other parts inside /outside the entity; Abuse of controls or override of controls e.g. ordering of personal goods; Obsolescent of controls

  • FURTHER CONSIDERATION OF CAATsFurther considerations of CAATsISA requires auditors to obtain appropriate audit evidence to be able to allow reasonable conditions on which to base their opinion.

    Advantages of CAATS:Helps to test larger number of data hence increase confidence in their opinion; Helps to test Accounting Systems its records (Tables & Disk files) rather than relying on testing printout; Are cost effective once set up for obtaining audit evidence; Comparison can easily be made from clerical audit work hence increase confidence.

  • OTHER DETAIL MATTERSDifficulties of using computer programs cost.Cost; Changes to clients system; Small installations PC; Over elaboration; Larger quantities of output; Version of file used for lest.Test Data:Is a data submitted by the auditor for processing the clients computer-based accounting system.

  • OTHER DETAIL MATTERSMajor approached to the use of test dataUsing live dataUsing dummy data in a normal production nun.Using dummy data in special nun.Difficulties of test data:CostLimited objectiveDangers of live testingDifficult in recording audit evidence

  • Please get with Laura Cossey to sign up and take the FOCUS program training. This training is comprehensive and will provide you with all the information you need to successfully complete FOCUS audits.

    CHANs goal for FY03 (the first year of implementation) is to complete 100 FOCUS audits (of either type) and have 100 auditors conduct at least one FOCUS audit. This is ambitious, but we hope to have at least 80 completed by year end. As of January 2003, 70 audits were completed, in process, or planned for the 3rd quarter.

    Feedback from associates on the FOCUS Program has been favorable, indicating that clients find the recommendations to be value-added. Associates who have conducted these audits have added more to their audits in future quarters.There are many sources of information about IT audit and controls within CHANs AAS and our HAN IT Audit track provides technical IT audit training as well as some higher-level sessions on IT. You should review the HAN IT audit track sessions and consider whether you would like to take a course to refresh your current IT audit skills or develop further knowledge about IT auditing.

    For those of you who are CISAs, this is a good opportunity to add to your expertise and obtain CPE credits. HAN 2003 includes several internationally known speakers who you may not want to miss.