preview

Kudler - Information System Audit

Better Essays

Kudler Fine Foods - Information System Audit
Information technology (IT) has become increasingly sophisticated and complex, escalating the ongoing change within Kudler Fine Foods. As IT information is adopted within the organization, automation controls many processes within the Kudler’s environment. As Kudler has become more virtualized, a need for increased trust and assurance in the relationships with consumers, partners and suppliers. The swell of e-commerce business has created new ways of conducting an audit. Statement on Auditing Standard 94 (SAS 94) requires that the auditor understands the technological aspect of the organization in order to grasp the internal controls and the assessment of control risks for a proper audit …show more content…

The outsourcing of payroll to the third party would be audited using the SAS 70 approach. SAS 70 audit “has become a virtual business requirement for service and outsourcing providers” (Gallun, 2008, p. 13). To have obtained a SAS 70 report the outsourced payroll provider would have gone through a rigorous review of their internal controls structures and once completed the compliance report can be shared to other users. The two main SAS 70 reports, which describe a company’s internal controls, are Type I which and Type II. Type I report does not perform a detailed testing of controls but only performs a “walkthrough” of controls (Hunton, 2004). Type II report is more involved than a Type I report because the controls are extensively reviewed (tested beyond a “walkthrough”) and tested over a minimum of six months.
Purchasing and Inventory
Kudler Fine Foods has significantly increased the amount of data processed electronically in purchasing and inventory. The two processes are virtually “hands off” due to electronic data transfer (EDI) and barcode based receiving. The EDI process should be audited using an attestation audit, also known as a SysTrust engagement, to verify the EDI system is available, security, has integrity and is maintainable. Due to the nature of

Get Access