Page 624 - ITGC_Audit Guides
P. 624

GTAG — Elaboration on Key Technology Concepts




            or deficiencies. When using data analysis, auditors should   the auditor needs to have a data analysis tool that allows
            always check the data for validity errors. Getting the correct   them to visually present these data files in relationship to
            and complete data is a prerequisite of effective data analysis.   one another.
            For instance, do the numeric fields in the source data contain   When using data analysis, auditors need to compare and
            valid numbers — or are characters present in this field or   contrast diverse sources of information, validate data integ-
            are there blank entries? Do key fields, such as social security   rity and accuracy, and look for patterns and anomalies
            or social insurance numbers, contain valid entries? Does the   in data. The audit process may need to support assertions
            data contain records within the expected date range or is it   inherent in published financial statements such as complete-
            under- or overrepresented in the data set? When source data   ness, accuracy, occurrence, valuation, and presentation. Data
            errors are identified, data extracts should be repeated to get   analysis software may have algorithms designed to perform
            the expected data range, data cleansing activities should be   these  tests  without  having  to  program  custom  queries  or
            conducted to correct faulty data fields, or “bad data” should   macros to reduce the audit risk in user developed applica-
            be isolated from the main analysis and subsequently investi-  tions (UDAs). For additional guidance related to UDAs, see
            gated to see if it substantially impacts the overall assessment   GTAG 14: Auditing User-developed Applications.
            of the audit.                                         Purpose-built data analysis software will have commands
                                                                and functions that look for duplicates; detect gaps in numeric
            5.1.2 Audit-specific Capabilities                   sequences; and group transactions by type, numeric range,
                                                                and age. The ability to filter vast amounts of data quickly
            Data analysis technology for internal audit’s use needs to   and efficiently also is a key requirement. Advanced pattern
            have the features  and functionality  that auditors require   detection techniques, such as digital analysis, are extremely
            to do their job effectively. Not only should it deal with the   helpful when seeking anomalies in data.
            data access challenges, but it also needs to support the way   When comparative analysis is required, the technology
            in which auditors work and the types of analytics that are   needs the ability to merge data files (often from different
            appropriate to the audit task.                      sources and in different formats) and look for matched or
              Some aspects of data analysis involve assessing the integ-  unmatched  records.  For  tasks  requiring  the  comparison  of
            rity of organizational processes and practices, evaluating the   data from numerous sources, the ability to relate diverse data
            efficacy of controls, conducting risk assessments, and, in   sets together also may be necessary. Because the audit process
            some cases, fraud detection. Invariably this means that data   often involves retrospective analysis of vast amounts of data,
            must be analyzed from a diversity of sources to seek patterns   an effective data analysis technology needs highly efficient
            and relationships. Auditors need to organize their view of the   read algorithms to process millions of records rapidly. These
            company data in a way that suits the audit objectives.   algorithms must be powerful and reliable to perform tasks
              This view gives users the ability to set an appropriate   either  quickly  in  interactive  data  analysis  or  for  sustained
            context from which to compare and contrast data  from   periods of time in lengthy and complex automated analysis.
            diverse sources. For example, if part of an audit process is   Depending on the nature of the audit work being done, this
            fraud detection, data analysis may be used to great effec-  interactive work can be ad hoc for planning, initial scoping,
            tiveness. One might compare an employee master file with   or investigative work. It also can be scripted for repetitive
            an approved vendor database. If there is a match between   analysis of organizational processes from period to period,
            an employee’s address and the address of a vendor, it might   such  as  quarterly  reviews  of  key  controls.  In  organizations
            indicate the presence of a “phantom vendor” and that an   that want to implement a continuous auditing methodology,
            employee is attempting to perpetrate fraud. In such a case,



                                  Data analysis tasks can be grouped into three types:

                      Ad Hoc                         Repetitive                          Continuous
              Explorative and investigative in   Periodic analysis of processes from multiple data   “Always on” — scripted auditing and monitoring
              nature.                    sources.                              of key processes.
              Seeking documented conclusions   Seeking to improve the efficiency, consistency, and   Seeking timely notification of trends, patterns
              and recommendations.       quality of audits.                    and exceptions.
                                                                               Supporting risk assessment and enabling audit
                                                                               efficiency.
              Specific analytic queries — per-  Managed analytics — created by specialists —  and   Continual execution of automated audit tests to
              formed at a point in time — for the   deployed from a centralized, secure environment,   identify errors, anomalies, patterns and excep-
              purpose of generating audit report   accessible to all appropriate staff.  tions as they occur.
              findings.

                                                             10
   619   620   621   622   623   624   625   626   627   628   629