Question

In: Accounting

What is Forensic Auditing? Show how you would utilize ACL in a forensic audit.

  • What is Forensic Auditing? Show how you would utilize ACL in a forensic audit.

Solutions

Expert Solution

Forensic Audit :-

A forensic audit is an examination and evaluation of a firm’s or individual’s financial information for use as evidence

in the court of law. A forensic audit can be conducted in order to prosecute a party for fraud, embezzlement or

other financial claims. In order to understand the legal consequences that a person attracts on being caught in

a forensic audit, it is necessary to know about the various statutes that talk about the implementation of forensic

audits in India. Therefore, this lesson aims at providing the basic understanding as to the laws, regulations and

statues, nationally as well as internationally, dealing will corporate laws and empowering forensic auditors in

performing their duties in its true letter and spirit.

Utilisation of Audit Command Language (ACL) in forensic Audit :-

ACL as a tool to read and analyse type of files scattered across numerous database on different platforms. ACL provides immediate visibility into transactional data critical to your organization enabling you to: analyse entire data populations for complete assurance; identify trends, pinpoint exceptions and highlight potential areas of concern; locate errors and potential fraud; identify control issues and ensure compliance with organizational and regulatory standards; age and analyse financial or any other time sensitive transactions; and cleanse and normalize data to ensure consistency and accurate result . In generic term ACL is a Generalized Audit Software (GAS).

ACL maintains data integrity by read only access to all data that they accessed, that is why the source data is never changed, altered or deleted. Mason (2007) explains that rule 901 of the US Federal Rules of Evidence requires that evidence submitted in the court have to be authentic. Further Mason (2007) states that data integrity is one factor out of six that proving the authenticity of evidence.

ACL features built in analysis command so there is no programming language needed. In addition for automate analytical procedures, ACL provides script for auditors who want more customized programmable commands.


Related Solutions

9) Describe the ACL analysis? How can ACL tools and techniques be used in an audit?...
9) Describe the ACL analysis? How can ACL tools and techniques be used in an audit? Be specific and use examples to support your answer. What did you learn about ACL that you found to be most useful with respect to IT Audit?
Module 9 Prompt: What is forensic Auditing? What is Internal auditing? Module 10 Prompt: Compare and...
Module 9 Prompt: What is forensic Auditing? What is Internal auditing? Module 10 Prompt: Compare and contrast a horizontal analysis and vertical analysis Identify and Explain factors that affect quality of earnings Identify what each type of ratio measures liquidity ratios Solvency ratios Profitability ratios
Forensic Audits. Present arguments that you believe a forensic audit will never become an accepted fraud...
Forensic Audits. Present arguments that you believe a forensic audit will never become an accepted fraud detection practice.
The audit documentation is another of the International Standards for Auditing and Auditing Evidence. What do...
The audit documentation is another of the International Standards for Auditing and Auditing Evidence. What do you know about the standards? Explain the details.
(Corporate governance) How audit committee is related to external auditing, internal auditing and to management?
(Corporate governance) How audit committee is related to external auditing, internal auditing and to management?
As the internal audit team lead for IT Audit, you have been asked to utilize COBIT...
As the internal audit team lead for IT Audit, you have been asked to utilize COBIT as a framework to a Case where a dental wholesale distributor lost in revenue when the IT department use Pear P-Phone as a platform to build a new order entry system. Use COBIT framework to justify your responses.
if you were completing a waste audit, discuss what it is and how you would go...
if you were completing a waste audit, discuss what it is and how you would go about it? During waste audit, you become aware that many of the bins are contaminated with wrong types of waste, suggest some alternative solutions. list 3 external stakeholders for channel/method list 3 internal stakeholders
What information would you expect to be collected in an auditing tool? What purpose would that...
What information would you expect to be collected in an auditing tool? What purpose would that information serve? What would that information tell you about your network health?
You are auditing and testing the audit-related objective of Completeness. Which of the following audit procedures...
You are auditing and testing the audit-related objective of Completeness. Which of the following audit procedures is most likely to achieve your objective: A.Inspection of supporting vendor invoices. B. Physical examination of assets from the fixed asset ledger. C.Inspection of vendor invoices for closely related accounts such as repairs and maintenance. D. Independent confirmation of current year additions.
What skills do you possess that would make you a good forensic accounting expert?
What skills do you possess that would make you a good forensic accounting expert?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT