preview

Kudler Fine Foods Audit Processes

Decent Essays

Kudler Fine Foods Audit Processes

ACC 542

September 18, 2012

Kudler’s Audit Processes Kudler Fine Food has expanded business and updated their computer systems to meet demands. As IT information is adopted within the organization, automation control processes has become more virtualized. To ensure that Kudler’s computerize systems function properly an audit must be performed on an annual basis. Management at Kudler Fine Foods wants to see the proposed audit schedules for all systems. Management wants to know the types of audit and how they will be conducted. In addition, management would like to know about events that might prevent reliance on auditing through the computer.
Types of Audit Information technology and …show more content…

Although the finding and recommendations report will not produce an opinion, it will summarize work performed and offer an advisory review. The REMS has imbedded security features…passwords, dollar limits, limited access features…however, there are no formal company policies or audits regarding same (Kudler Fine Foods, 2010).

Performing the Audit Kudler policies and procedures will be reviewed using a risk-base audit approach. Attribute sampling technique will test internal controls of the POS System Observed sales transaction made at each store. Using the variable sampling technique, financial report from REMS system and bank statements obtained from the bank will be compared to Kudler 's bank reconciliation reports. After the evidence is gathered and reviewed an overall audit opinion will be given to determine if objectives were met and whether procedures were sufficient.
Lastly any reportable conditions or deficiencies uncovered during the course of the audit will be identified and deem a follow-up. The request for additional documentation, another audit, or a phone call would be considered a follow-up.

Non-Computer Auditing Auditing around the computer is not generally an effective approach to auditing a computerized environment. However, some events might prevent reliance on auditing through the computer. For example,

Get Access