- Computer Aided Audit Tools
Computer Assisted Audit Techniques or Computer Aided Audit Tools (CAATS), also known as Computer Assisted Audit Tools and Techniques (CAATTs), is a growing field within the Financial audit profession. CAATTs is the practice of using computers to automate or simplify the audit process. In the broadest sense of the term, CAATTs can refer to any use of a computer during the audit. This would include utilizing basic software packages such as SAS, Excel, Access,
Crystal Reports, Business Objects, and also word processors. In practice, however, CAATTs has become synonymous with incorporating Data analyticsinto the audit process. This is one of the emerging fields within the audit profession.
Traditional Auditing vs CAATTs
Traditional Audit Example
Traditionally auditors have been criticized because they reach conclusions based upon limited samples. It is not uncommon for an auditor to sample 30-50 transactions and declare a problem or conclude that "controls appear to be effective." Management upon hearing the verdict of the auditors will question the validity of the audit. Management realizes that they conduct thousands or perhaps millions of transactions a year and the auditor only sampled a handful. The auditor will then state that the conducted the sample based upon Generally Accepted Audit Standards (GAAS) and that their sample was statistically valid. The auditor is then forced to defend their methodology.
Another common criticism of the audit profession occurs after a problem emerges. Whenever a problem emerges within a department, management might ask, "Where were the auditors?" If the audit department had reviewed the area recently it becomes a sticky situation as the Audit Manager attempts to explain that the reason the problem wasn't identified was because the problem was outside of the scope of the audit. The Audit manager might also try to explain that the sample was "a statistically valid sample with a 95% confidence level." The Audit Committee doesn't care that the audit was conducted according to GAAS, they only care that a problem went unnoted by the audit department.
CAATTs addresses these problems. CAATTs, as it is commonly used, is the practice of analyzing large volumes of data looking for anomalies. A well designed CAATTs audit will not be a sample, but rather a complete review of all transactions. Using CAATTs the auditor will extract every transaction the business unit performed during the period reviewed. The auditor will then test that data to determine if there are any problems in the data. For example, using CAATTs the auditor can find invalid Social Security Numbers (SSN) by comparing the SSN to the issuing criteria of the Social Security Administration. The CAATTs auditor could also easily look for duplicate vendors or transactions. When such a duplicate is identified, they can approach management with the knowledge that they tested 100% of the transactions and that they identified 100% of the exceptions.
Traditional Audit vs CAATTs on Specific Risks
Another advantage of CAATTs is that it allows auditors to test for specific risks. For example, an insurance company may want to ensure that it doesn't pay any claims after a policy is terminated. Using traditional audit techniques this risk would be very difficult to test. The auditor would "randomly select" a "statistically valid" sample of claims (usually 30-50.) They would then check to see if any of those claims were processed after a policy was terminated. Since the insurance company might process millions of claims the odds that any of those 30-50 "randomly selected" claims occurred after the policy was terminated is extremely unlikely. Even if one or two of those claims was for a date of service after the policy termination date, what does that tell the auditor?
Using CAATTs the auditor can select every claim that had a date of service after the policy termination date. The auditor then can determine if any claims were inappropriately paid. If they were, the auditor can then figure out why the controls to prevent this failed. In a real life audit, the CAATTs auditor noted that a number of claims had been paid after policies were terminated. Using CAATTs the auditor was able to identify every claim that was paid and the exact dollar amount incorrectly paid by the insurance company. Furthermore, the auditor was able to identify the reason why these claims were paid. The reason why they were paid was because the participant paid their premium. The insurance company, having received a payment, paid the claims. Then after paying the claim the participant's check bounced. When the check bounced, the participant's policy was retroactively terminated, but the claim was still paid costing the company hundreds of thousands of dollars per year.
Which looks better in an audit report:
"Audit reviewed 50 transactions and noted one transaction that was processed incorrectly"
"Audit utilized CAATTS and tested every transaction over the past year. We noted XXX exceptions wherein the company paid YYY dollars on terminated policies."
However, the CAATTs driven review is limited only to the data saved on files in accordance with a systematic pattern. Much data is never documented this way. In addition saved data often contains deficiencies, is poorly classified, is not easy to get, and it might be hard to become convinced about its integrity. So, for the present CAATTs is complement to an auditor's tools and techniques. In certain audits CAATTs can't be used at all. But there are also audits which simply can't be made with due care and efficiently without CAATTs.
In the most general terms, CAATTs can refer to any computer program utilized to improve the audit process. Generally, however, it is used to refer to any data extraction and analysis software. This would include programs such as SAS, Excel, Access,
Crystal Reports, Business Objects, etc. There are, however, two main companies that have developed specialized data analytic software specifically for auditors. They are Audit Command Language(ACL) and Interactive Data Extraction and Analysis (IDEA). InformationActive's ActiveData For Excel, sold under CCH's ProSystem fx and CorpSystem brands implements data analytics for auditors in the Excel environment. Other players include Monarch and the newly released (Q4 2008) TopCAATs.
Benefits of audit software include:
*They are independent of the system being audited and will use a read-only copy of the file to avoid any corruption of an organization’s data.
*Many audit-specific routines are used such as
*Provides documentation of each test performed in the software that can be used as documentation in the auditor’s work papers.
Audit specialized software can easily perform the following functions:
Missing sequence identification.
Other uses of CAATTS
In addition to using
data analysissoftware, the auditor utilizes CAATS throughout the audit for the following activities while performing data analysis:
Creation of Electronic Work Papers
Keeping electronic work papers on a centralized audit file or database will allow the auditor to navigate through current and archived working papers with ease. The database will make it easier for auditors to coordinate current audits and ensure they consider findings from prior or related projects. Additionally, the auditor will be able to electronically standardize audit forms and formats, which can improve both the quality and consistency of the audit working papers.
CAATTs provides auditors with tools that can identify unexpected or unexplained patterns in data that may indicate fraud. Whether the CAATS is simple or complex, data analysis provides many benefits in the prevention and detection of fraud.
CAATTs can assist the auditor in detecting fraud by performing and creating the following, respectively:
Evaluations of financial information made by studying plausible relationships among both financial and non-financial data to assess whether account balances appear reasonable (AU 329). Examples include ratio, trend, and
Data Analysis Reports
Reports produced using specific audit commands such as filtering records and joining data files.
[http://www.theiia.org/itaudit/index.cfm?fuseaction=print&fid=5404 Continuous Monitoring] is an ongoing process for acquiring, analyzing, and reporting on business data to identify and respond to operational business risks. For auditors to ensure a comprehensive approach to acquire, analyze, and report on business data, they must make certain the organization continuously monitors user activity on all computer systems, business transactions and processes, and application controls. The Institute of Internal Auditors recently published a GTAG on Continuous Monitoring.
Curb stoning in surveys
Curb stoning is the term for instances where a surveyor completes a survey form by making up data. Because some of the data should conform with Benford's law, this practice can be detected using CAATTs which provide the capability of performing such tests. An example case study is provided at [http://www.ezrstats.com/CS/Case_Studies.htm] to illustrate.
Note on the Acronyms CAATTs vs CAATs
CAATTs and CAATs are used interchangeably. While CAATs has emerged as the more common spelling, CAATTs is the more precise acronymn. The acronymn CAATTs solves one of the two problems with defining the acronym. CAATs means:
"C"omputer "A"ided (or "A"ssisted) "A"udit "T"ools (or "T"echniques)
The first "A" and the "T" can have two different meanings depending on who uses the term. By using the term CAATTs, one is clearly incorporating both "Tools" AND "Techniques."
CAATTs and Other BEASTs for Auditors by
CAATTs and Other BEASTs for Auditors by
David Coderreis the seminal work on CAATTs. David Coderre argues that the term CAATTs is much more appropriate because there is no purpose in having techniques if you don't have the tools, or the tools without the techniques. Coderre attempts to differentiate the use of CAATTs for any computer program used to improve the audit with the acronym "BEASTs." BEASTs stands for, "Beneficial Electronic Audit Support Tools." While CAATTs has become a household term in audit units, BEASTs remains relatively unused. BEASTs includes electronic work papers, Microsoft suite of products, and non-analytical programs/applications.
Information technology audit
Separation of duties
* [http://www.informationactive.com/data/attachments/fraudsoftware.PDF Comparing fraud detection software]
*Information Technology Control and Audit; Frederick Gallegos, Sandra Senft, et. al; "2nd Edition" ISBN 0-8493-2032-1
*Audit Tools [http://www.theiia.org/ITAudit/index.cfm?act=itaudit.archive&fid=59 Use of Computer-Assisted Audit Tools and Techniques (CAATTs), Part 1]
*Audit Tools [http://www.theiia.org/ITAudit/index.cfm?act=itaudit.archive&fid=60 Use of Computer-Assisted Audit Tools and Techniques (CAATTs), Part 2]
* [http://www.theiia.org/index.cfm?doc_id=5365 The IIA's GTAG 3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment]
Wikimedia Foundation. 2010.