Question: Two years ago, an external auditing firm supervised the programming of embedded audit modules for Prevites Office Equipment Company. During the audit process this year,

Two years ago, an external auditing firm supervised the programming of embedded audit modules for Prevites Office Equipment Company. During the audit process this year, the external auditors requested that a transaction log of all transactions be copied to the audit file. The external auditors noticed large gaps in dates and times for transactions being copied to the audit file. When they inquired about this, they were informed that increased processing of transactions had been burdening the mainframe system and that operators frequently had to turn off the EAM to allow the processing of important transactions in a timely fashion. In addition, much maintenance had been performed during the past year on the application programs.


Required

Outline any potential exposures and determine the courses of action the external auditors should use to proceed.


Step by Step Solution

3.49 Rating (162 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Potential exposure unauthorized changes to the application program... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

210-B-A-I-S (2652).docx

120 KBs Word File

Students Have Also Explored These Related Accounting Questions!