MANAGEMENT’S, AUDITORS’ RESPONSIBILITIES Flashcards
Mandatory Independent Audit Committee (Treadway)
The board of directors oversees the conduct of management. The Treadway Commission
recommended that each board of directors have an audit committee composed of outside directors.
Written Charter (Treadway)
The Treadway Commission also suggested that companies develop a written charter setting forth the duties and responsibilities of the audit committee. The board of directors should periodically review, modify, and approve this written charter.
Resources and Authority (Treadway)
According to the Treadway Commission, the existence of an audit committee and a written charter is not enough. The committee also must have adequate resources and authority to carry out its responsibilities.
Informed, Vigilant, and Effective Audit Committees (Treadway)
The audit committee should be composed of members who are informed, vigilant, and
effective.
In addition, in 1987, the Treadway Commission recommended that management of publicly held companies include with their management reports ___
an acknowledgement of responsibility for internal controls and an assessment of its effectiveness in meeting those controls
Enterprise risk management is
a process, effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.
According to the COSO report, enterprise risk management encompasses:
- Aligning risk appetite and strategy.
- Enhancing risk response decisions
- Reducing operational surprises and losses
- Identifying and managing multiple and cross-enterprise risks.
- Seizing opportunities.
- Improving deployment of capital.
_____ of an organisation should ensure that the organisation has a proper and effective document retention policy (DRP) in place.
Management
An effective document retention policy requires that a company
(1) establish retention
protocols before it foresees litigation or official investigation;
(2) develop, review, and/or amend a policy for compliance with applicable state and federal laws and regulations;
(3) ensure the reasonableness of the policy according to the company’s business practices;
(4) provide a concise explanation of what is to be destroyed and when;
(5) provide adequate protocols for management of electronic documents; and
(6) clearly set forth when the policy should be immobilised due to a pending investigation or foreseeable litigation.
The purpose of ISA 240 is
o establish standards and provide guidance on the auditor’s responsibility to consider fraud in an audit of financial statements
The distinguishing factor between error and fraud is
whether the underlying action that results in the misstatement of the financial statements is intentional or unintentional
Fraudulent financial reporting may be accomplished by the following:
• Manipulation, falsification (including forgery), or alteration of accounting records or supporting documentation from which the financial statements are prepared.
• Misrepresentation in, or intentional omission from, the financial statements of events, transactions, or other significant information.
• Intentional misapplication of accounting principles relating to amounts, lassification,
manner of presentation, or disclosure.
Fraud can be committed by management overriding controls using such techniques as:
• Recording fictitious journal entries, particularly close to the end of an accounting period to manipulate operating results or achieve other objectives.
• Inappropriately adjusting assumptions and changing judgments used to estimate account balances.
• Omitting, advancing, or delaying recognition in the financial statements of events and transactions that have occurred during the reporting period.
• Concealing, or not disclosing, facts that could affect the amounts recorded in the
financial statements.
• Engaging in complex transactions that are structured to misrepresent the financial
position or financial performance of the entity.
• Altering records and terms related to significant and unusual transactions.
Misappropriation of assets can be accomplished in a variety of ways,
including:
• Embezzling receipts (for example, misappropriating collections on accounts receivable or diverting receipts in respect of written-off accounts to personal bank accounts).
• Stealing physical assets or intellectual property (for example, stealing inventory for
personal use or for sale, stealing scrap for resale, colluding with a competitor by
disclosing technological data in return for payment).
• Causing an entity to pay for goods and services not received (for example, payments to fictitious vendors, kickbacks paid by vendors to the entity’s purchasing agents in return for inflating prices, payments to fictitious employees).
• Using an entity’s assets for personal use (for example, using the entity’s assets as
collateral for a personal loan or a loan to a related party).
The primary responsibility for the prevention and detection of fraud rests with
both those charged with governance of the entity and management