Professional Documents
Culture Documents
D
COVERAGE GUIDE
TABLE OF CONTENTS
Unit Extended
Quantity Warehouse Part Description Quantity
Cost Cost
Part 1 XX XX XX XX XXX
Number Client
Application
1 XX XX XX XX XXX
Program
Unit Cost 4 XX XX XX XX XXX
4 XX XX XX XX XXX
Warehouse
Number 10 XX XX XX XX XXX
10 XX XX XX XX XXX
4
WHAT IS DATA?
Data is any piece of information stored on a computer. That information may be a customer number, part number, unit cost, street name, zip code or
invoice date. If it is information stored on a computer, it is data.
Employee ID 4. 8. Price
Username 6.
5
REPORTS WITH DATA ANALYSIS ARE DESIGNED
With data analysis techniques, you are now free from having to use whatever the client produces. You can generate reports specific to the audit needs
focusing on the items of interest or risk.
Quantity
Unit Cost
Excess Inventory
Warehouse
Number
Unusual Items
Customer Name Customer ID
6
DEFINING DATA ANALYSIS
Data analysis systematically applies statistical and logical techniques to describe, summarize and compare data to identify
business issues in historical data (e.g., AP file – look at how quickly a client is paying invoices).
Data mining is different. At the same time, data analysis is generally analyzing historical information to find anomalies. Data
mining omits the anomalies to search for trends and patterns that predict future behavior. Data mining is more statistical and
is used to predict the characteristics of a credit card applicant who is unlikely to pay their bills.
Data mining can be described as identifying patterns and relationships in data and deciphering that information to make
useful business decisions.
The extraction of data from a company’s information system to perform data selection, classification, ordering, filtering,
translation and other functions to provide meaningful information about business processes.
7
GETTING YOUR DATA
How is the data What system changes What are the field’s
How is the data collected?
consolidated? have happened recently? restrictions?
8
WHERE THE DATA CAME FROM
9
DATA OUTPUTS
Delimiters
10
CHOOSING THE RIGHT DATA ANALYSIS SOFTWARE
With so many options (Excel, Access, IDEA, ACL, SAS, etc.), how do I choose?
11
INTERNAL AUDITING STRATEGIC OBJECTIVES
12
PROVIDER AND IMPLEMENTER SUPPORT
13
TECHNICAL FEATURES AND FUNCTIONALITY
2 Data analysis functions are common (sorts, appends, summarization, gap detection and aging).
5 Data analysis functions are advanced (correlation, trend analysis, time series and statistical analysis).
14
COST
15
READILY ACCESSIBLE TOOLS
• Advantages • Advantages
− Incremental costs are easy to learn but do not exist. − Import capability/interfaces with other databases are
• Disadvantages improved.
− Import and data processing capabilities are limited. − Analyses relate to one another.
16
AUDIT SOFTWARE
• Advantages • Advantages
− Data handling and processing speeds are efficient. − Graphical user interface/visual scripts are efficient.
− Data analysis functionalities are built in. − Audit procedures and output reporting are effective.
• Disadvantages • Disadvantages
− Learning curve/script writing is hard. − Advanced statistical analysis is limited.
17
DATA ANALYSIS METHODOLOGY
Example:
Analysis Statement 1: Verify that group purchase/requisitions orders have an associated invoice in the accounts payable system.
Step 1: Extract line items with the desired cost/group codes from all data sets.
Step 2: Group POs in access using a select query and include the PO number.
Step 3: Group ROs in access using a select query and include the RO number.
Step 4: Compare the AP data table to the PO select query (we want to capture POs that don’t have an invoice number).
Step 5: Compare the AP data table to the RO select query (we want to capture ROs that don’t have an invoice number).
Step 6: Review the results (noting POs and ROs that have no invoices attributed to them).
18
WHAT CAN I DO WITH THIS STUFF?
Establish templates that can aggregate your line-item data to dashboards for quick review.
Review past information to detect issues, correct them and establish means to prevent it from occurring again.
Raw historical data forecasting should involve a level of statistics for more meaningful results.
19
WHERE ARE WE HEADING?
20
DATA ANALYTICS AND AUDIT COVERAGE
GUIDE: SAMPLE 2
SETTING THE STAGE: DATA ANALYSIS DEFINED
Data analysis systematically applies statistical and logical techniques to describe, summarize and compare data to identify business issues
in historical data (e.g., AP file – look at how quickly a client is paying invoices). Data mining is different. While data analysis generally
analyzes historical information to find anomalies, data mining omits the anomalies to search for trends and patterns that predict future
behavior. Data mining is more statistical and is used to predict the characteristics of a credit card applicant who is unlikely to pay their bills.
Data mining can be described as identifying patterns and relationships in data and deciphering that information to make useful business
decisions.
Data Analysis
1 2 3
Data analysis is the extraction of data
from a client’s information system to
Computer- perform data selection, classification,
Data Analysis Aided Audit Data Mining ordering, filtering, translation and other
Tools (CAATS) functions to provide the client with
information about their business
processes.
22
WHAT IS DATA?
Employee ID 4. 8. Price
Username 6.
23
DATA BECOMES REPORTS
Unit Extended
Quantity Warehouse Part Description Quantity
Cost Cost
Part 1 XX XX XX XX XXX
Number Client
Application
1 XX XX XX XX XXX
Program
Unit Cost 4 XX XX XX XX XXX
4 XX XX XX XX XXX
Warehouse
Number 10 XX XX XX XX XXX
10 XX XX XX XX XXX
24
YOU DESIGN REPORTS WITH DATA ANALYSIS
Quantity
Unit Cost
Excess Inventory
Warehouse
Number
Unusual Items
25
THE SIX ELEMENTS OF INFRASTRUCTURE
26
CRITICAL SUCCESS FACTORS AND COMMON PITFALLS (1/6)
27
CRITICAL SUCCESS FACTORS AND COMMON PITFALLS (2/6)
Pitfalls Success
• The process doesn’t coordinate with IT from the • Easy success is obtainable with a limited scope
beginning. Strategies and goals are designed without (duplicate payments on a quarterly basis to gauge
the proper data assessment. outsourcing to India).
• A scope is defined that is too large (too many results • Work is rolled out to all divisions (limited feelings of
and too many tests). being picked on).
• The right data isn’t being used. A validation process for • IT is involved from the beginning, giving them input not
data received does not exist. just relying on output.
• Individuals with the right skill set to design and • This is made part of an individual’s role (not a one-time
continuously monitor are not identified. project, and ownership is given).
28
CRITICAL SUCCESS FACTORS AND COMMON PITFALLS (3/6)
Pitfalls Success
• Identified issues may be obsolete. • CFOs attended initial kickoff meetings and quarterly
• Results may never be analyzed, and process owners results review meetings and treated the project as
may be too busy. “mission-critical.” Each process owner knew that they
would have to present in front of their peers and
• An IA initiative may be used instead of a business management team. CFOs had the power to “urge” IT to
initiative. provide more assistance, assign temporary
responsibility during employee turnover times and keep
the project organized with one common goal.
29
CRITICAL SUCCESS FACTORS AND COMMON PITFALLS (4/6)
Pitfalls Success
• Reporting doesn’t facilitate the process but rather • An organization on SAP knew that the data
hinders. Reporting is cumbersome and is a greater task requirements might stand in the way of project success.
than the actual testing. To facilitate the process, they laid out a specific data
• A noncommon reporting template may be used for all requirement document along with a schedule for the
processes. dates that they would require the data throughout the
year. They then submitted their request through the
• Data requirements and final reports may require more proper channels and waited for an ABAP programming
than is necessary. resource to become available. The individual had the
proper skill set to write the extraction program along
with a script that would extract the data repeatedly. By
waiting for the proper resources, they established a
repeatable program instead of a one-time project.
30
CRITICAL SUCCESS FACTORS AND COMMON PITFALLS (5/6)
Pitfalls Success
• Individuals changing positions and the program having • A manufacturing organization built the process into
to be transferable may not be recognized. standard roles in the organization and included it as
• The process may not be not simple. part of the individual's training for the overall job.
Backups were identified and trained not only on the
• Technology, such as ACL and Access, is very powerful, testing procedures but on the use of the software and
but you must be able to use it. throughout the process behind the testing.
31
CRITICAL SUCCESS FACTORS AND COMMON PITFALLS (6/6)
Pitfalls
32
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (1/12)
Data Analysis: Suggested Approach
• Identify opportunities. • Acquire data. • Perform a basic analysis.
• Research possible • Produce a final report.
• Load data. • Present findings through a
opportunities. • Close the project.
• Perform validation and proofing. presentation.
• Design an assessment.
Acquisition Analysis
and and
Validation Testing
Planning
and Data Wrap-Up
Request
33
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (2/12)
Possible Examples for Consideration
GL and Journal Entry Examples Travel and Entertainment Examples
34
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (3/12)
Case Study 1
• Global management consulting, technology services, and • Implement routines (e.g., scripts) in ACL to automate the existing
companies with offices and operations in more than 50 countries limited JE and T&E analytics.
and annual revenues in excess of $21 billion are outsourced. • Create additional automated testing routines to be executed as
• Internal audit (IA) personnel used ACL to perform limited analyses quarterly continuous controls monitoring (CCM) procedures.
as part of quarterly companywide journal entry (JE) reviews of
more than 13 million journal entry lines. All analyses were
performed manually through the ACL graphical user interface.
• IA personnel were using Excel to perform limited analyses for
employee time and expense (T&E) testing.
35
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (4/12)
JE Testing Overview
36
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (5/12)
T&E Testing Overview
37
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (6/12)
Summary of Value
JE Testing: Sample Results From One T&E Testing: Sample Results From
Quarter One Quarter
• The amount of time to perform quarterly JE review procedures, • More than XXX expense transactions with the word “wine,” XX
including manual analyses through the ACL GUI, was reduced from containing the word “laundry,” more than XXX with the word “golf,” XX
approximately XX-XX hours to XX-XX hours. with the words “doctor” or “surgery,” XX with the word “clothes” and XX
• Additional CCM test results include: with the word “iPod” were identified.
− XXX journal entries (more than XXX journal entry lines) where the • Nearly XXX transactions with round dollar amounts that are multiples of
same individual entered and posted the JE occurred. $XXX were identified.
− Nearly XXX JE lines were just under the $XX approval threshold. • All transactions requiring separate approvals per policy, including XXX
transactions exceeding the business meal threshold, XXX above the
− XXX JE lines with the word “plug” were entered, XXX JE lines with training/publications threshold and more than XXX exceeding the
the word “miscellaneous” were entered and nearly XXX JE lines with “other expense” threshold were identified for additional testing.
the word “temporary” were entered.
• More than XXX potential duplicate transactions with the same
− XXX JEs where the posting date was more than XX days before the personnel number, expense date, charge code, expense type and
entry date occurred. amount were identified.
− More than XXX journal entries were posted in countries in the top 10
of the corruption perceptions index, including nearly XX journal
entries with line amounts greater than $XXX.
38
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (7/12)
More Examples for Consideration
• Vendor Master File Analysis • Cash Receipts and Timely Posting Analysis • Access Rights Analysis
• Number of Inactive Vendors With Activity • Customer Credit Ranking Analysis • Multisystem Segregation of Duties Analysis
• Payments to Inactive Vendors (Amounts and Authorization) and Customer • Last User Sign-On Analysis
• Duplicate Vendors, Invoices and Payments Activity Analysis (Payments and Credits) • Employee Master Records Analysis
• Vendor to Employee Match • Write-Off Transactions Analysis • Duplicate Employee IDs Analysis
(Authorization and Timeliness)
• Benford’s Law Analysis: Invoice, • Change Management Authorization
Payments, PO and/or Credit Analysis • DSO Analysis by Order Date, Bill Date and
• New Hires/Terminations
Payment Received Date
• Missed Discounts: Late Payments • Problem Management Analysis
• Unfulfilled Customer Purchase Orders
• Authorization and Analysis of PR, PO, • System Logic Analysis (Write-Offs and
Analysis
Invoice and Payment Refunds)
• User Analysis
• Aging AP and Credit Processing Analysis • Benchmarking Reports (Determine the
• Customer Account Aging Analysis
• Holiday Activity accuracy of system reports by utilizing
• Holiday Activity actual transactional and master data [i.e.,
• Void/Reissue Payment Analysis
• Payment Gap Analysis compute what the values should be based
on business rules and then compare them
• User Analysis Between Vendor Setup,
to actual monthly reports].)
Voucher and Payment Processing
• Debit Memos/Adjustments Analysis
• Overpayments/Refunds Analysis (Unused
Credits)
39
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (8/12)
Sample Results: Supplier Statement Audits
Supplier statement reviews can be a significant driver for identifying unused credits or outstanding checks, which result in near-term cash recovery.
40
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (9/12)
Sample Results: Payment Terms
Nonstandard or “unfavorable” payment terms should be analyzed to determine opportunities for either payment discounts or extending to more favorable
terms.
Payment Demographics
xx, x%
Invoice Spend Totals by Payment Term
140 XX Invoices,
XX Invoices,
$XXM
$XXM
120
Number of Invoices (000's)
Discounted
100 Unfavorable Terms Discounted Terms
Terms
xxx Invoices (xx%) 17%
80 17%
Less than
30 Days No
Net 30+ Discount
60
No
xx, xx% Discount Less than
xx, x% xx, x% xx, x%
40 40%
30 Days No
xx, x% xx, x% Discount
Net 30+
xx, x% xx, x%
xx, x% No 43%
20 Discount
40%
0
Net 0 Net 7 Net Net Net Net 1/10 2/15 2/10 All
10 15 20 30 Net Net Net Other XX Invoices,
10 15 10
Invoice Team $XX M
Observations
• XX% of all nondiscount invoice terms required payment in less than the standard 30-day payment terms.
• $XXX in invoice spend (XX%) had immediate payment terms.
41
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (10/12)
Fixed Assets
42
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (11/12)
Inventory
43
HOW DO WE USE THIS AND WHAT ARE SOME GOOD
EXAMPLES? (12/12)
Lessons Learned
44