US20120078761A1 - Single Audit Tool - Google Patents

Single Audit Tool Download PDF

Info

Publication number
US20120078761A1
US20120078761A1 US12/949,176 US94917610A US2012078761A1 US 20120078761 A1 US20120078761 A1 US 20120078761A1 US 94917610 A US94917610 A US 94917610A US 2012078761 A1 US2012078761 A1 US 2012078761A1
Authority
US
United States
Prior art keywords
program
entity
audit
compliance
funding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/949,176
Inventor
Stephen Edward Holland
Lee Scott Spradling
Stephen W. Lindsey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thomson Reuters Global Resources ULC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US12/949,176 priority Critical patent/US20120078761A1/en
Priority to US12/971,921 priority patent/US20120078801A1/en
Publication of US20120078761A1 publication Critical patent/US20120078761A1/en
Assigned to THOMSON REUTERS (TAX AND ACCOUNTING) INC. reassignment THOMSON REUTERS (TAX AND ACCOUNTING) INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HOLLAND, STEPHEN EDWARD, LINDSEY, STEPHEN W., SPRANDLING, LEE SCOTT
Assigned to THOMSON REUTERS GLOBAL RESOURCES reassignment THOMSON REUTERS GLOBAL RESOURCES ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: THOMSON REUTERS (TAX AND ACCOUNTING) INC.
Priority to US14/792,652 priority patent/US10762578B2/en
Assigned to THOMSON REUTERS GLOBAL RESOURCES UNLIMITED COMPANY reassignment THOMSON REUTERS GLOBAL RESOURCES UNLIMITED COMPANY CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: THOMSON REUTERS GLOBAL RESOURCES
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Definitions

  • the present invention relates to the provision of and tools to assist in the provision of professional services, and more particularly, to computer-implemented tools, resources, and processes for planning and executing a Single Audit.
  • Single Audit is an organization-wide examination of an entity that receives funds (typically federal funds) over a period of time.
  • the Single Audit provides assurance to a granting institution that funds awarded to entities, such as states, cities, universities, and non-profit organizations, are being managed and used according to applicable laws, regulations, contracts, and grant agreements.
  • the Single Audit is performed by an independent certified public accountant (CPA) and includes two main parts: an audit of the financial statements and a compliance audit of the entity's funding programs.
  • the compliance audit of the funding programs includes (a) gaining an understanding of and testing internal controls over compliance and (b) testing compliance with applicable compliance requirements for major programs, and includes a planning stage and an examining stage.
  • the compliance audit of award programs is integrated with the audit of the entity's financial statements.
  • a planning stage of the compliance audit of funding programs requires an auditor to familiarize himself/herself with the management and operation of the entity.
  • the auditor identifies any funding awards received by the entity and determines whether there is a high or low risk that the entity does not comply with laws and regulations.
  • the structure of Single Audits tends to differ from one entity to another entity.
  • Systems and techniques are disclosed for planning and performing a compliance audit of funding programs.
  • the systems and techniques determine whether a Single Audit or a program-specific audit is to be performed for an entity, and automatically select or enable selection of one or more compliance procedures that are to be used during the auditing process.
  • a computer-implemented method for planning an audit includes determining whether a Single Audit or a program-specific audit is to be performed for an entity based at least in part on a received financial award associated with a funding program and entity-specific information.
  • the method includes determining whether the funding program is to be evaluated as a major program by assessing risk and coverage information associated with the financial award, and selecting automatically or enabling selection of at least one compliance procedure to be used during the Single Audit or the program-specific audit.
  • the method also includes providing the at least one compliance procedure to conduct the Single Audit or the program-specific audit.
  • the method further includes conducting the Single Audit or the program-specific audit.
  • entity-specific information can include information describing the type of entity.
  • the type of entity is one of a “Local Government”, “Local Education Agency”, “Indian Tribal Government”, “State Government”, “State Education Agency”, “Nonprofit Organization”, or combination thereof.
  • the method includes aggregating a plurality of funding programs into a grouping based on a similarity characteristic associated with each of the plurality of funding programs, and selecting automatically or enabling selection of at least one compliance procedure based at least in part on the grouping.
  • the method includes customizing the at least one compliance procedure.
  • Customizing the compliance procedure can includes adding, deleting, and/or modifying a procedure automatically selected by the system or user.
  • a system as well as articles that include a machine-readable medium storing machine-readable instructions for implementing the various techniques, are disclosed. Details of various implementations are discussed in greater detail below.
  • FIG. 1 is a schematic of an exemplary computer-based Single Audit system
  • FIG. 2 is an exemplary method of planning and conducting a Single Audit
  • FIGS. 3-6 illustrate an exemplary graphical user interface for establishing a Single Audit for an entity
  • FIGS. 7-15 illustrate an exemplary graphical user interface for determining whether a Single Audit is required for an entity
  • FIGS. 16-21 illustrate an exemplary graphical user interface for assessing risk and coverage information associated with a funding program
  • FIGS. 22-23 illustrate an exemplary graphical user interface for displaying a compliance program
  • FIG. 24 illustrates an exemplary graphical user interface for displaying a diagnostic report associated with a Single Audit.
  • FIG. 25 illustrates an exemplary graphical user interface for assessing Type B programs.
  • FIG. 1 shows an exemplary computer-based system 10 for planning and performing a Single Audit.
  • a ‘Single Audit’ refers to an organization-wide examination of an entity, such as a local government, local education agency, Indian tribal government, state government, state education agency, or non-profit organization, to ensure that funds received by the entity are expended, managed and controlled according to specific rules and regulations.
  • the system 10 is configured to provide assurances to the U.S. Federal Government that funds expended by an entity are managed and used in accordance with the Single Audit Act of 1997, and regulations described in the Office of Management and Budget's (OMB) Circular A-133, Audits of State and Local Governments and Non-Profit Organizations.
  • OOB Office of Management and Budget's
  • the system 10 is configured to include an access device 12 that is in communication with a server 14 over a network 16 .
  • the access device 12 can include a personal computer, laptop computer, or other type of electronic device, such as a cellular phone or Personal Digital Assistant (PDA).
  • PDA Personal Digital Assistant
  • the access device 12 is coupled to I/O devices (not shown) and includes a keyboard in combination with a pointing device such as a mouse for sending web page requests to the server 14 .
  • memory of the access device 12 is configured to include a browser 12 A that is used to request and receive information from the server 14 .
  • the system 10 can support multiple access devices.
  • the network 16 can include various devices such as routers, servers, and switching elements connected in an Intranet, Extranet or Internet configuration.
  • the network 16 uses wired communications to transfer information between the access device 12 and the server 14 .
  • the network 16 employs wireless communication protocols.
  • the network 16 employs a combination of wired and wireless technologies.
  • the server device 14 includes a processor 18 , such as a central processing unit (CRP), random access memory (‘RAM’) 20 , input-output devices 22 , such as a display device (not shown) and keyboard (not shown), and non-volatile memory 24 , all of which are interconnected via a common bus 26 and controlled by the processor 18 .
  • the non-volatile memory 24 is configured to include a web server 28 for processing requests from the access device 12 .
  • the web server 28 is configured to send requested web pages to the browser 12 A of the access device 12 .
  • the web server 28 communicates with the web browser 12 A using one or more communication protocols, such as HTTP (Hyper Text Markup Language).
  • HTTP Hyper Text Markup Language
  • the web server 28 is configured to include the Java 2 Platform, Enterprise Edition (‘J2EE’) for providing a plurality of displays on the browser 12 A.
  • J2EE Java 2 Platform, Enterprise Edition
  • the web server 28 provides a run-time environment that includes software modules that guide a user (e.g., an auditor) through a planning and examining stage of the Single Audit.
  • the software modules determine whether a Single Audit is required for an entity and whether one or more programs associated with received funds of the entity are to be considered a “major program,” which would require specific testing during the Single Audit.
  • the phrase “major program” refers to a federal award program that receives more focused audit procedures during the Single Audit based on completion of a risk assessment process.
  • one or more software modules are configured to automatically select or enable selection of compliance procedures that are to be used during performance of the Single Audit, and to generate compliance checklists and worksheets for groups or clusters of funding programs to enable more efficient auditing.
  • the run-time environment includes the following software modules: an engagement module 30 to establish an audit engagement, a program module 32 to determine whether a Single Audit or program-specific audit is to be performed and to assess risk and coverage information associated with a funding program, a compliance module 34 to automatically select or enable selection of compliance procedures to be used during the audit, and a diagnostic module 36 to detect errors and/or inconsistencies during planning of the audit. Details of the software modules 30 , 32 , 34 , 36 configured in the run-time environment are discussed in further detail below.
  • a data store 40 is provided that is utilized by software modules 30 , 32 , 34 , 36 to access and store information relating to the Single Audit.
  • the data store 40 is a relational database.
  • the data store 40 is a directory server, such as a Lightweight Directory Access Protocol (‘LDAP’) server.
  • the data store 40 is a configured area in the non-volatile memory 24 of the device server 14 .
  • the data store 40 can be distributed across various servers and be accessible to the server 14 over the network 16 , or alternatively, coupled directly to the server 14 , or be configured in an area of non-volatile memory 24 of the server 14 , or be functionally provided by other physical arrangements.
  • system 10 shown in FIG. 1 is only one embodiment of the disclosure.
  • Other system embodiments of the disclosure may include additional structures that are not shown, such as secondary storage and additional computational devices.
  • various other embodiments of the disclosure include fewer structures than those shown in FIG. 1 .
  • the disclosure is implemented on a single computing device in a non-networked standalone configuration. Data input is communicated to the computing device via an input device, such as a keyboard and/or mouse. Data output of the system is communicated from the computing device to a display device, such as a computer monitor.
  • the engagement module 30 determines whether an entity is to be considered a low risk or a high risk entity 42 .
  • the engagement module 30 determines a risk level for an entity by evaluating user responses to a set of provided questions with a set of predefined rules and regulations associated with funding programs.
  • An example set of questions provided by the engagement module 30 are shown in connection with FIGS. 4-6 .
  • the program module 32 determines which of any funding programs associated with received funds are to be audited 44 .
  • this step includes identifying any federal assistance expended by the entity during one year by federal program name, federal agency and Catalog of Federal Domestic Assistance (CFDA) number.
  • the program module 32 then combines these expenditures to determine the total amount expended during the year. For example, in one embodiment, the program module 32 determines that a Single Audit is required for an entity if total federal expenditures during a year equal or exceed five hundred thousand dollars ($500,000). If the entity does not meet this threshold, the program module 32 determines that a Single Audit is not required.
  • the program module 32 may elect to perform a program-specific audit, which is generally allowed when an entity expends Federal awards under only one federal program and the federal program's laws, regulations, or grant agreements do not require a financial statement audit, without auditing the entire entity.
  • a ‘Type A’ program is determined by the program module 32 to be any funding program in which an entity expends either: (1) $300,000 or more of federal assistance for recipients with $10 million or less of expended federal assistance during the audit period, or (2) 3% of the total federal assistance expended during the year for those who exceed $10 million, whichever is greater.
  • a ‘Type A’ program is a large federal award program as determined by an amount of annual expenditures that exceed a minimum of $300,000 or a maximum of 0.15% of expenditures according to a graduated scale based on total expenditures. In certain instances, ‘Type A’ programs are assessed as being low risk or not low risk
  • a ‘Type B’ program is determined by the program module 32 to be any single program which does not meet the Type A requirements.
  • a ‘Type B’ program is a small federal award program as determined by an amount of annual expenditures that do not exceed a minimum of $300,000 or a maximum of 0.15% of expenditures according to a graduated scale based on total expenditures.
  • Type B programs are assessed as being high risk or not high risk. Details of determining and categorizing funding programs are discussed in connection with FIGS. 7-15 .
  • the program module 32 assesses risk and coverage information associated with funds received and expended by the entity 48 .
  • the program module 32 is based on OMB Circular A-133 which requires the user to study and understand the operations and internal controls of programs within the entity, and perform and document a risk assessment based on such study to determine whether each program has either a high or low risk of not complying with laws and regulations.
  • OMB Circular A-133 used by the system 10 allows the user to consider numerous factors including current and prior audit experience, good or poor internal controls over federal programs, many or no prior audit findings, continuous or lack of oversight exercised by the federal government over the recipient, evidence or knowledge of fraud, as well as inherent risk of the federal program.
  • the program module 32 requires the user to perform a compliance audit on that program.
  • the program module 32 does not require the user to perform a compliance audit, but rather allows the user to indicate whether an audit is to be performed on the funding program to meet other requirements such as the percentage of coverage requirement.
  • the program module 32 enforces at least two requirements for a funding program to be considered low risk. First, the funding program needs to have been audited at least once in the last two years, and second, the funding program needs to have no audit findings when it was last audited. If the funding program does not comply with either of these two requirements, the program module 32 automatically considers the program not low risk.
  • the program module 32 For Type B programs which have been identified as high-risk, the program module 32 provides the user with two options: either audit half of all high-risk Type B programs, or audit one Type B high-risk program for every low-risk Type A program. Type B programs which do not have a high risk of not complying are not required to be audited. Details of assessing risk and coverage associated with funding programs are discussed in connection with FIGS. 16-21 .
  • the compliance module 34 automatically selects (if the award is specifically included in the Compliance Supplement) or automatically enables selection (if the award is not specifically in the Compliance Supplement) of one or more compliance procedures to be used during the Single Audit or program-specific audit 50 and provides the same to the user in response to a request 52 .
  • Exemplary compliance procedures generated by the compliance module 34 are shown in connection with FIGS. 22-23 .
  • FIG. 24 illustrates additional information provided by functionality of the diagnostic module 36 .
  • the engagement setup screen 60 includes a database-selection area 62 to select a data store for storing audit information, and an entity-details area 64 .
  • the entity-details area 64 allows the user to specify an entity-name 72 , entity-type information 74 , and whether the entity qualifies as an institution of higher education 76 .
  • Entity-type information can include, but is not limited to, a ‘Local Government’, ‘Local Education Agency’, ‘Indian Tribal Government’, ‘State Government’, ‘State Education Agency’, ‘Nonprofit Organization’, or combinations thereof. In one embodiment, as shown in FIG.
  • the engagement setup screen 60 includes an engagement-name area 66 for identifying a name for the audit, an audit-date field 68 for entering a fiscal year-end for the period under audit, and a compliance-supplement section 70 for selecting a Compliance Supplement to be used during a Single Audit.
  • the Compliance Supplement includes information regarding laws and regulations (e.g., compliance requirements) for selected funding programs provided by the U.S. Federal Government.
  • OMB Circular A-133 specifies a set of requirements that an entity must meet to be considered a low-risk entity which have been coded into the system. These requirements can include determining whether a Single Audit has been performed for the entity on an annual basis in prior years, determining whether there are any unqualified auditor opinions on financial statements and/or Schedule of Federal Expenditures, whether there are significant deficiencies or material weaknesses identified in prior audits, as well as whether federal programs previously audited had audit findings (e.g., one or more deficiencies identified during an audit) in the last two years.
  • a user-selectable hyperlink 78 A is provided that allows the user to select a Compliance Supplement to use during the audit.
  • the engagement module 30 displays a user selectable list of Compliance Supplements (not shown) that can be used during the examining stage of a Single Audit.
  • the engagement module 30 is configured to recommend which one of a plurality of user-selectable Compliance Supplements should be selected for the audit.
  • the selection is based on the beginning of the fiscal year corresponding to the fiscal year and date entered by the user. In various embodiments, however, the engagement module 30 allows the user to override this selection and select a different Compliance Supplement, if desired.
  • the engagement module 30 Upon the user selecting the finish button 78 A, the engagement module 30 creates the engagement and stores the same in the data store specified in the database selection area 62 . User selection of the cancel button 78 B terminates execution of the engagement setup screen 60 .
  • the engagement module 30 provides the user with a set of questions, the responses to which determine whether the entity is a low risk entity or not a low risk entity.
  • the user is presented with a question as to whether the user has the option to waive use of risk criteria for determining major programs. If the user responds ‘Yes’, the engagement module 30 displays the first bulleted question 80 shown in FIG. 4 . Succeeding questions are then displayed only if relevant. That is, if the response to the first bulleted question 80 is ‘No’, the engagement module 30 displays the second bulleted question 82 shown in FIG. 4 .
  • the engagement module 30 displays the third bulleted question 84 .
  • the engagement module 32 determines whether the entity is eligible to waive use of the risk criteria for major program determination and, based on the determination, queries the user as to whether the user wishes to waive use of the risk criteria.
  • the engagement module 32 Upon selection of the next button 86 , the engagement module 32 provides an additional set of questions to the user, as shown in FIGS. 5 and 6 .
  • the engagement module 30 is configured to prompt the user with a set of questions 88 associated with different time intervals, the responses to which and are used by the engagement module 30 to determine whether the entity is to be considered a a low risk entity or not a low risk entity.
  • the questions presented by the engagement module 30 include, but are not limited to, whether a Single Audit was performed in accordance with provisions of the OMB Circular A-133, whether the auditor's opinion on the financial statements and the schedule of expenditures of federal awards were unqualified, etc.
  • User responses to the set of questions 88 are stored by the engagement module 30 in the data store 40 upon selection of the finish button 90 .
  • the financial awards summary screen 92 displays information regarding financial awards received and expended by an entity.
  • the financial awards summary screen 92 includes an add program button 94 that allows the user to specify information regarding a funding program.
  • FIG. 8 illustrates an exemplary add program screen 96 provided by the program module 32 to enter information regarding a funding program.
  • the user can either enter a CFDA (Catalog of Federal Domestic Assistance) identifier or other number associated with the funding program 96 A, or select a drop-down menu option 96 B of CFDA identifiers from a pre-populated list.
  • CFDA Catalog of Federal Domestic Assistance
  • FIG. 9 An example of pre-populated list of CFDA identifiers 98 is shown in FIG. 9 .
  • agency/department name 100 and program name 102 data entry fields are automatically populated by the program module 32 .
  • Other data entry fields include, but are not limited to, name of grant 104 , award amount 106 and total awards expended 108 .
  • the add program screen 96 includes checkboxes 110 , 112 to indicate whether the entity is a subrecipient (e.g., a non-Federal entity that expends Federal awards received from a pass-through entity to carry out a Federal program), or a pass-through entity (e.g., a non-Federal entity that provides a Federal award to a subrecipient to carry out a Federal program) for the added program. If the entity is not a subrecipient, grantor name 114 and program ID 116 data entry fields are disabled by the program module 32 .
  • a subrecipient e.g., a non-Federal entity that expends Federal awards received from a pass-through entity to carry out a Federal program
  • a pass-through entity e.g., a non-Federal entity that provides a Federal award to a subrecipient to carry out a Federal program
  • FIG. 12 illustrates an example financial awards summary screen for the ‘Conservation Reserve Program’ funding program.
  • FIG. 13 a financial awards summary screen having a plurality of funding programs identified is shown.
  • the program module 32 maintains user entered program information concerning various funding programs.
  • the program module 32 clusters funding programs together.
  • a cluster of programs is a grouping of closely related programs sharing common compliance requirements.
  • a cluster of programs is processed as a single program when determining and testing major programs.
  • the program module 32 automatically clustered the ‘Rural Rental Housing Loans’ 120 and ‘Rural Rental Assistance Payments’ 122 programs together.
  • one set of compliance requirements can be applied by the program module 32 to the cluster without requiring the user to determine which funding programs are closely related.
  • FIG. 14 illustrates an example conclusion screen 124 provided by the program module 32 to the user based on a determination that a Single Audit is to be performed.
  • rules relating to whether a Single Audit or program-specific audit is to be performed are defined in the before mentioned OMB Circular A- 133 and are coded in the program module 32 . If the program module 32 determines that a Single Audit is to be performed for the entity, the program module 32 displays a message indicating the same to the user. For example, as shown in FIG. 14 , in one embodiment, if federal awards expended equal or exceed five hundred thousand dollars ($500,000), the program module 32 determines that an audit in accordance with OMB Circular A-133 (e.g., Single Audit) is required for the entity.
  • OMB Circular A-133 e.g., Single Audit
  • FIG. 15 illustrates an example conclusion screen 126 provided by the program module 32 to indicate that a program-specific audit is a possibility.
  • a program-specific audit is an audit of a single funding program, without auditing the entire entity.
  • the conclusion screen 126 presented to the user by the program module 132 includes a set of questions as to whether a program-specific audit is to be performed.
  • the questions are based on whether federal program laws, regulations, contracts or grant agreements require a financial statement audit, whether the federal agency or a pass-through entity approved in advance a program-specific audit, and whether the entity elected to have a program-specific audit.
  • the program module 32 determines whether a program-specific audit is to be performed and, as shown in FIG. 15 , indicates the same 128 on the conclusion screen 126 .
  • the program module 32 if the user elects to use risk criteria during the engagement process, the program module 32 provides an assess risk screen 130 to the user. As shown in the FIG. 16 example, the program module 32 automatically classifies identified programs as either Type A programs 132 or Type B programs 134 . In one embodiment, for each Type A program identified, the program module 32 provides an associated assess button 136 . Upon a user selecting the assess button 136 associated with a Type A program, the program module 32 retrieves and displays a set of questions relating to the particular Type A program to the user (see FIG. 17 ). Upon entering one or more responses to the set of questions, the program module 32 determines whether the funding program is to be considered low or not low risk.
  • the program module 32 upon selection of the assess button 136 , the program module 32 displays a Type A Dialog Box 138 to the user that includes questions that are displayed one at a time.
  • the program module 32 ceases to display any further questions regarding the same and provides a conclusion to the user. If the program module 32 is unable to determine whether the funding program is to be considered a low or not low risk, the program module 32 prompts the user to assess the program as being low or not low risk.
  • the program module 32 provides the user with two selectable options for determining the number of Type B programs to assess. As shown in FIG. 18 , in one embodiment, upon the user selecting ‘Option 1’ 140 , the user is instructed by the program module 32 to assess risk for all Type B programs that exceed a pre-defined small program amount (e.g., $100,000 dollars). As shown in the FIG. 18 example, all Type B programs are displayed by the program module 32 , including those for which risk need not be assessed (e.g., those funding programs that do not exceed the pre-defined small program amount).
  • a pre-defined small program amount e.g. $100,000 dollars
  • the program module 32 instructs the user as to how many Type B programs are to be assessed.
  • the programming logic for determining the required number of programs to be assessed is coded into the program module 32 and defined in OMB Circular A-133.
  • FIG. 20 illustrates an example Type B Dialog Box 150 that is displayed to the user by the program module 32 upon selection of an assess button 136 associated with a Type B program.
  • the program module 32 provides a set of questions relating to assessing Type B programs that are high or not hight risk. These questions are different than the set of questions provided by the program module 32 to the user for Type A programs.
  • the program module 32 automatically selects the Type B programs to audit as major programs (if possible) or displays a selection screen, as shown in FIG. 25 , for the user to select which Type B programs are to be audited as major programs. Once the required number of programs has been assessed, the program module 32 determines whether coverage requirements defined for funding programs have been met.
  • Coverage requirements relate to government rules that require a specified percentage of received funds to be tested during the Single Audit.
  • a coverage rule may specify that if an entity receives one million dollars ($1,000,000) in federal funds, then at least fifty percent (50%) of the one million dollars ($1,000,000) is to be tested by the user during the Single Audit.
  • coverage requirements for funding programs are defined in OMB Circular A-133.
  • FIG. 21 illustrates an example assess coverage screen 151 provided by the coverage module 32 .
  • the program module 32 displays for each program or cluster previously identified an agency/department identifier 152 , a CFDA or other number 154 , a program/cluster name 156 , total awards expended 158 , an amount of awards selected for audit 160 , risk level for the program/cluster 162 , program type 164 , date of last year audited as a major program 166 , and checkboxes 168 indicating whether each program is considered a Type A or Type B program.
  • FIG. 21 illustrates an example assess coverage screen 151 provided by the coverage module 32 .
  • the program module 32 displays for each program or cluster previously identified an agency/department identifier 152 , a CFDA or other number 154 , a program/cluster name 156 , total awards expended 158 , an amount of awards selected for audit 160 , risk level for the program/cluster 162 , program type 164 , date
  • funding programs identified as major programs based on previous user data entry are automatically checked and disabled 168 A by the program module 32 on the assess coverage screen 151 .
  • the program module 32 assesses coverage regardless of whether the user elected to waive use of risk criteria during the engagement setup.
  • the program module 32 displays a warning message (not shown) to the user if the coverage required for a program is not met.
  • the coverage percentage used is based on the low risk/not low risk entity questions prompted during the engagement setup by the engagement module 30 .
  • the program module 32 generates a warning message including a calculation of the additional amount of award expenditures that needs to be tested in order to be in compliance with funding program rules and regulations.
  • the computed amount is updated by the program module 32 as the major program checkboxes 168 are selected and deselected.
  • the user is allowed to select additional programs to be audited as major programs until the coverage requirement is met. Referring now to FIG. 22 , a compliance screen 170 provided by the compliance module 34 is shown.
  • the compliance screen 170 displays a compliance program 172 determined by the compliance module 34 for one or more identified funding programs.
  • the compliance program 172 includes one or more compliance requirements 174 that are automatically selected by the compliance module 34 from a Compliance Supplement based on funding programs selected and assessed by the user.
  • each section of the compliance requirements 174 collapses and expands to help users navigate to various parts of the compliance program efficiently.
  • the compliance module 34 provides users with the ability to add and delete compliance requirements.
  • the right hand pane 172 A of the compliance program screen 170 includes a list of all compliance requirements determined automatically by the compliance module 34 .
  • the compliance module 34 automatically selects the compliance requirements applicable to one or more major programs and adds the same in the compliance program 172 . Compliance requirements not included in the compliance program 172 are automatically deselected from the right pane 172 A.
  • the compliance module 34 provides users with the ability to add and delete compliance requirements by selecting and unselecting the checkboxes in the right pane 172 A. As shown in FIG. 22 , in one embodiment, the compliance module 34 also provides the user with a reset button 178 that allows the user to restore the compliance program 172 to original selections generated by the compliance module 34 . In another embodiment, the compliance module 34 allows the user to comment on rationale used in their selections of compliance requirements, which are then stored by the compliance module 34 in the data store 40 . If the award is not in the Compliance Supplement, the application guides the user in selecting and deselecting compliance requirements as described above by providing the user with tailoring procedures. The user may customize the compliance procedures in the middle pane by adding, deleting, and/or modifying a procedure automatically selected by the system or selected by the user.
  • FIG. 23 illustrates a compliance checklist screen 180 that is provided by the compliance module 134 .
  • the compliance module 34 is configured to compute a schedule of expenditures of federal awards and a series of user selectable worksheets to guide the user through the examination stage. For example, as shown in FIG. 23 , in one embodiment, upon selecting one or more compliance procedure guidelines 180 A and checklists 180 B, the compliance module 34 generates a a single document containing textual guidance (e.g., guidance that is unique to the program and guidance that is common to all programs), and another document containing only procedural checklists that can be used during the examination stage. Background guidance and procedure checklists can be generated in MS Word® format or a plurality of other standard document formats specified by the user.
  • textual guidance e.g., guidance that is unique to the program and guidance that is common to all programs
  • checklists are generated, the user conducts the audit by examining files, documents, contracts, checks, etc. of the entity. The user may investigate, to some degree, transactions between the funding program and other parties. Results are then compared with items identified in one or more checklists to determine if the entity is in compliance or not with funding program rules and procedures.
  • FIG. 24 a display screen comprising a diagnostic report 182 generated by the diagnostic module 36 for a Single Audit is shown.
  • the diagnostic module 36 is configured to provide guidance to the user as well as determine whether there are any possible errors and/or inconsistencies with user-entered responses to questions that could and/or would affect the quality of the audit.
  • the diagnostic report 182 relates to, but is not limited to, entered federal award information, major program determination, as well as the transfer of engagements between users.
  • the diagnostic module 36 performs tests of transactions and account balances to ensure that information presented in financial statements and notes thereof are accurate.
  • Various features of the system may be implemented in hardware, software, or a combination of hardware and software.
  • some features of the system may be implemented in one or more computer programs executing on programmable computers.
  • Each program may be implemented in a high level procedural or object-oriented programming language to communicate with a computer system or other machine.
  • each such computer program may be stored on a storage medium such as read-only-memory (ROM) readable by a general or special purpose programmable computer or processor, for configuring and operating the computer to perform the functions described above.
  • ROM read-only-memory

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Educational Administration (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Systems and techniques are disclosed for planning and performing an audit. The systems and techniques determine whether a Single Audit or a program-specific audit is to be performed for an entity, and automatically select one or more compliance procedures that are to be used during the auditing process.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims priority to U.S. Provisional Application 61/387,166 filed on Sep. 28, 2010, the contents of which are incorporated herein in its entirety.
  • COPYRIGHT NOTIFICATION
  • Portions of this patent application include materials that are subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document itself, or of the patent application as it appears in the files of the United States Patent and Trademark Office, but otherwise reserves all copyright rights whatsoever in such included copyrighted materials.
  • TECHNICAL FIELD
  • The present invention relates to the provision of and tools to assist in the provision of professional services, and more particularly, to computer-implemented tools, resources, and processes for planning and executing a Single Audit.
  • BACKGROUND
  • Single Audit is an organization-wide examination of an entity that receives funds (typically federal funds) over a period of time. The Single Audit provides assurance to a granting institution that funds awarded to entities, such as states, cities, universities, and non-profit organizations, are being managed and used according to applicable laws, regulations, contracts, and grant agreements.
  • Typically, the Single Audit is performed by an independent certified public accountant (CPA) and includes two main parts: an audit of the financial statements and a compliance audit of the entity's funding programs. The compliance audit of the funding programs includes (a) gaining an understanding of and testing internal controls over compliance and (b) testing compliance with applicable compliance requirements for major programs, and includes a planning stage and an examining stage. The compliance audit of award programs is integrated with the audit of the entity's financial statements.
  • A planning stage of the compliance audit of funding programs requires an auditor to familiarize himself/herself with the management and operation of the entity. Typically, the auditor identifies any funding awards received by the entity and determines whether there is a high or low risk that the entity does not comply with laws and regulations. As various funds are provided each year to different entities, each with their own style of management and operation, and as each awarded fund can include different laws and regulations relating to fund use by the entity, the structure of Single Audits tends to differ from one entity to another entity.
  • Accordingly, improved systems and techniques are needed to plan and perform audits that are based on qualities and characteristics of an entity in addition to rules and procedures associated with granted funds.
  • SUMMARY
  • Systems and techniques are disclosed for planning and performing a compliance audit of funding programs. The systems and techniques determine whether a Single Audit or a program-specific audit is to be performed for an entity, and automatically select or enable selection of one or more compliance procedures that are to be used during the auditing process.
  • For example, according to one aspect, a computer-implemented method for planning an audit includes determining whether a Single Audit or a program-specific audit is to be performed for an entity based at least in part on a received financial award associated with a funding program and entity-specific information. The method includes determining whether the funding program is to be evaluated as a major program by assessing risk and coverage information associated with the financial award, and selecting automatically or enabling selection of at least one compliance procedure to be used during the Single Audit or the program-specific audit. The method also includes providing the at least one compliance procedure to conduct the Single Audit or the program-specific audit.
  • In one embodiment, the method further includes conducting the Single Audit or the program-specific audit. The entity-specific information can include information describing the type of entity. For example, in one embodiment, the type of entity is one of a “Local Government”, “Local Education Agency”, “Indian Tribal Government”, “State Government”, “State Education Agency”, “Nonprofit Organization”, or combination thereof.
  • In another embodiment, the method includes aggregating a plurality of funding programs into a grouping based on a similarity characteristic associated with each of the plurality of funding programs, and selecting automatically or enabling selection of at least one compliance procedure based at least in part on the grouping.
  • In yet another embodiment, the method includes customizing the at least one compliance procedure. Customizing the compliance procedure can includes adding, deleting, and/or modifying a procedure automatically selected by the system or user.
  • A system, as well as articles that include a machine-readable medium storing machine-readable instructions for implementing the various techniques, are disclosed. Details of various implementations are discussed in greater detail below.
  • Additional features and advantages will be readily apparent from the following detailed description, the accompanying drawings and the claims.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic of an exemplary computer-based Single Audit system;
  • FIG. 2 is an exemplary method of planning and conducting a Single Audit;
  • FIGS. 3-6 illustrate an exemplary graphical user interface for establishing a Single Audit for an entity;
  • FIGS. 7-15 illustrate an exemplary graphical user interface for determining whether a Single Audit is required for an entity;
  • FIGS. 16-21 illustrate an exemplary graphical user interface for assessing risk and coverage information associated with a funding program;
  • FIGS. 22-23 illustrate an exemplary graphical user interface for displaying a compliance program; and
  • FIG. 24 illustrates an exemplary graphical user interface for displaying a diagnostic report associated with a Single Audit.
  • FIG. 25 illustrates an exemplary graphical user interface for assessing Type B programs.
  • Like reference symbols in the various drawings indicate like elements.
  • DETAILED DESCRIPTION
  • FIG. 1 shows an exemplary computer-based system 10 for planning and performing a Single Audit. A ‘Single Audit’ refers to an organization-wide examination of an entity, such as a local government, local education agency, Indian tribal government, state government, state education agency, or non-profit organization, to ensure that funds received by the entity are expended, managed and controlled according to specific rules and regulations. For example, in one embodiment, the system 10 is configured to provide assurances to the U.S. Federal Government that funds expended by an entity are managed and used in accordance with the Single Audit Act of 1997, and regulations described in the Office of Management and Budget's (OMB) Circular A-133, Audits of State and Local Governments and Non-Profit Organizations.
  • As shown in FIG. 1, in one embodiment, the system 10 is configured to include an access device 12 that is in communication with a server 14 over a network 16. The access device 12 can include a personal computer, laptop computer, or other type of electronic device, such as a cellular phone or Personal Digital Assistant (PDA). The access device 12 is coupled to I/O devices (not shown) and includes a keyboard in combination with a pointing device such as a mouse for sending web page requests to the server 14. Preferably, memory of the access device 12 is configured to include a browser 12A that is used to request and receive information from the server 14. Although only one access device 12 is shown in FIG. 1, the system 10 can support multiple access devices.
  • The network 16 can include various devices such as routers, servers, and switching elements connected in an Intranet, Extranet or Internet configuration. In some implementations, the network 16 uses wired communications to transfer information between the access device 12 and the server 14. In another embodiment, the network 16 employs wireless communication protocols. In yet other embodiments, the network 16 employs a combination of wired and wireless technologies.
  • As shown in FIG. 1, in one embodiment, the server device 14 includes a processor 18, such as a central processing unit (CRP), random access memory (‘RAM’) 20, input-output devices 22, such as a display device (not shown) and keyboard (not shown), and non-volatile memory 24, all of which are interconnected via a common bus 26 and controlled by the processor 18. As shown in the FIG. 1 example, the non-volatile memory 24 is configured to include a web server 28 for processing requests from the access device 12.
  • The web server 28 is configured to send requested web pages to the browser 12A of the access device 12. The web server 28 communicates with the web browser 12A using one or more communication protocols, such as HTTP (Hyper Text Markup Language). In one embodiment, the web server 28 is configured to include the Java 2 Platform, Enterprise Edition (‘J2EE’) for providing a plurality of displays on the browser 12A.
  • The web server 28 provides a run-time environment that includes software modules that guide a user (e.g., an auditor) through a planning and examining stage of the Single Audit. The software modules determine whether a Single Audit is required for an entity and whether one or more programs associated with received funds of the entity are to be considered a “major program,” which would require specific testing during the Single Audit. As used herein, the phrase “major program” refers to a federal award program that receives more focused audit procedures during the Single Audit based on completion of a risk assessment process. Further, one or more software modules are configured to automatically select or enable selection of compliance procedures that are to be used during performance of the Single Audit, and to generate compliance checklists and worksheets for groups or clusters of funding programs to enable more efficient auditing.
  • For example, in one embodiment, as shown in FIG. 1, the run-time environment includes the following software modules: an engagement module 30 to establish an audit engagement, a program module 32 to determine whether a Single Audit or program-specific audit is to be performed and to assess risk and coverage information associated with a funding program, a compliance module 34 to automatically select or enable selection of compliance procedures to be used during the audit, and a diagnostic module 36 to detect errors and/or inconsistencies during planning of the audit. Details of the software modules 30, 32, 34, 36 configured in the run-time environment are discussed in further detail below.
  • A data store 40 is provided that is utilized by software modules 30, 32, 34, 36 to access and store information relating to the Single Audit. In one embodiment, the data store 40 is a relational database. In another embodiment, the data store 40 is a directory server, such as a Lightweight Directory Access Protocol (‘LDAP’) server. In yet other embodiments, the data store 40 is a configured area in the non-volatile memory 24 of the device server 14. Although the data store 40 shown in FIG. 1 is connected to the network 16, it will be appreciated by one skilled in the art that the data store 40 can be distributed across various servers and be accessible to the server 14 over the network 16, or alternatively, coupled directly to the server 14, or be configured in an area of non-volatile memory 24 of the server 14, or be functionally provided by other physical arrangements.
  • It should be noted that the system 10 shown in FIG. 1 is only one embodiment of the disclosure. Other system embodiments of the disclosure may include additional structures that are not shown, such as secondary storage and additional computational devices. In addition, various other embodiments of the disclosure include fewer structures than those shown in FIG. 1. For example, in one embodiment, the disclosure is implemented on a single computing device in a non-networked standalone configuration. Data input is communicated to the computing device via an input device, such as a keyboard and/or mouse. Data output of the system is communicated from the computing device to a display device, such as a computer monitor.
  • Turning now to FIG. 2, an exemplary method of planning an audit according to one embodiment of the invention is disclosed. As shown in the FIG. 2 example, first, the engagement module 30 determines whether an entity is to be considered a low risk or a high risk entity 42. The engagement module 30 determines a risk level for an entity by evaluating user responses to a set of provided questions with a set of predefined rules and regulations associated with funding programs. An example set of questions provided by the engagement module 30 are shown in connection with FIGS. 4-6.
  • Next, the program module 32 determines which of any funding programs associated with received funds are to be audited 44. In one embodiment, this step includes identifying any federal assistance expended by the entity during one year by federal program name, federal agency and Catalog of Federal Domestic Assistance (CFDA) number. The program module 32 then combines these expenditures to determine the total amount expended during the year. For example, in one embodiment, the program module 32 determines that a Single Audit is required for an entity if total federal expenditures during a year equal or exceed five hundred thousand dollars ($500,000). If the entity does not meet this threshold, the program module 32 determines that a Single Audit is not required. In one embodiment, if the program module 32 determines that a Single Audit is not required, the user may elect to perform a program-specific audit, which is generally allowed when an entity expends Federal awards under only one federal program and the federal program's laws, regulations, or grant agreements do not require a financial statement audit, without auditing the entire entity.
  • As shown in FIG. 2, once the program module 32 determines which funding programs are to be audited, the program module 32 then categorizes identified funding programs into either ‘Type A’ programs or ‘Type B’ programs 46. In one embodiment, a ‘Type A’ program is determined by the program module 32 to be any funding program in which an entity expends either: (1) $300,000 or more of federal assistance for recipients with $10 million or less of expended federal assistance during the audit period, or (2) 3% of the total federal assistance expended during the year for those who exceed $10 million, whichever is greater. In one embodiment, for example, a ‘Type A’ program is a large federal award program as determined by an amount of annual expenditures that exceed a minimum of $300,000 or a maximum of 0.15% of expenditures according to a graduated scale based on total expenditures. In certain instances, ‘Type A’ programs are assessed as being low risk or not low risk
  • A ‘Type B’ program is determined by the program module 32 to be any single program which does not meet the Type A requirements. In particular, in one embodiment, a ‘Type B’ program is a small federal award program as determined by an amount of annual expenditures that do not exceed a minimum of $300,000 or a maximum of 0.15% of expenditures according to a graduated scale based on total expenditures. In certain instances, Type B programs are assessed as being high risk or not high risk. Details of determining and categorizing funding programs are discussed in connection with FIGS. 7-15.
  • Once funding programs are categorized, the program module 32 then assesses risk and coverage information associated with funds received and expended by the entity 48. In one embodiment, the program module 32 is based on OMB Circular A-133 which requires the user to study and understand the operations and internal controls of programs within the entity, and perform and document a risk assessment based on such study to determine whether each program has either a high or low risk of not complying with laws and regulations. OMB Circular A-133 used by the system 10 allows the user to consider numerous factors including current and prior audit experience, good or poor internal controls over federal programs, many or no prior audit findings, continuous or lack of oversight exercised by the federal government over the recipient, evidence or knowledge of fraud, as well as inherent risk of the federal program.
  • In one embodiment, for any Type A program considered to have a risk of not complying that is not low, the program module 32 requires the user to perform a compliance audit on that program. For a Type A program that is considered to be of low risk, the program module 32 does not require the user to perform a compliance audit, but rather allows the user to indicate whether an audit is to be performed on the funding program to meet other requirements such as the percentage of coverage requirement. In one embodiment, the program module 32 enforces at least two requirements for a funding program to be considered low risk. First, the funding program needs to have been audited at least once in the last two years, and second, the funding program needs to have no audit findings when it was last audited. If the funding program does not comply with either of these two requirements, the program module 32 automatically considers the program not low risk.
  • For Type B programs which have been identified as high-risk, the program module 32 provides the user with two options: either audit half of all high-risk Type B programs, or audit one Type B high-risk program for every low-risk Type A program. Type B programs which do not have a high risk of not complying are not required to be audited. Details of assessing risk and coverage associated with funding programs are discussed in connection with FIGS. 16-21.
  • Referring to FIG. 2, once risk and coverage information associated with funding programs is determined, the compliance module 34 automatically selects (if the award is specifically included in the Compliance Supplement) or automatically enables selection (if the award is not specifically in the Compliance Supplement) of one or more compliance procedures to be used during the Single Audit or program-specific audit 50 and provides the same to the user in response to a request 52. Exemplary compliance procedures generated by the compliance module 34 are shown in connection with FIGS. 22-23. FIG. 24 illustrates additional information provided by functionality of the diagnostic module 36.
  • Turning now to FIG. 3, an example engagement setup screen 60 provided by the engagement module 30 is shown. The engagement setup screen 60 includes a database-selection area 62 to select a data store for storing audit information, and an entity-details area 64. The entity-details area 64 allows the user to specify an entity-name 72, entity-type information 74, and whether the entity qualifies as an institution of higher education 76. Entity-type information can include, but is not limited to, a ‘Local Government’, ‘Local Education Agency’, ‘Indian Tribal Government’, ‘State Government’, ‘State Education Agency’, ‘Nonprofit Organization’, or combinations thereof. In one embodiment, as shown in FIG. 3, the engagement setup screen 60 includes an engagement-name area 66 for identifying a name for the audit, an audit-date field 68 for entering a fiscal year-end for the period under audit, and a compliance-supplement section 70 for selecting a Compliance Supplement to be used during a Single Audit.
  • The Compliance Supplement includes information regarding laws and regulations (e.g., compliance requirements) for selected funding programs provided by the U.S. Federal Government. OMB Circular A-133 specifies a set of requirements that an entity must meet to be considered a low-risk entity which have been coded into the system. These requirements can include determining whether a Single Audit has been performed for the entity on an annual basis in prior years, determining whether there are any unqualified auditor opinions on financial statements and/or Schedule of Federal Expenditures, whether there are significant deficiencies or material weaknesses identified in prior audits, as well as whether federal programs previously audited had audit findings (e.g., one or more deficiencies identified during an audit) in the last two years.
  • As shown in the FIG. 3 example, in one embodiment, a user-selectable hyperlink 78A is provided that allows the user to select a Compliance Supplement to use during the audit. Upon the user selecting the hyperlink 78A, the engagement module 30 displays a user selectable list of Compliance Supplements (not shown) that can be used during the examining stage of a Single Audit.
  • Advantageously, the engagement module 30 is configured to recommend which one of a plurality of user-selectable Compliance Supplements should be selected for the audit. In one embodiment, the selection is based on the beginning of the fiscal year corresponding to the fiscal year and date entered by the user. In various embodiments, however, the engagement module 30 allows the user to override this selection and select a different Compliance Supplement, if desired.
  • Upon the user selecting the finish button 78A, the engagement module 30 creates the engagement and stores the same in the data store specified in the database selection area 62. User selection of the cancel button 78B terminates execution of the engagement setup screen 60.
  • Turning now to FIG. 4, in one embodiment, the engagement module 30 provides the user with a set of questions, the responses to which determine whether the entity is a low risk entity or not a low risk entity. As shown in the FIG. 4 example, the user is presented with a question as to whether the user has the option to waive use of risk criteria for determining major programs. If the user responds ‘Yes’, the engagement module 30 displays the first bulleted question 80 shown in FIG. 4. Succeeding questions are then displayed only if relevant. That is, if the response to the first bulleted question 80 is ‘No’, the engagement module 30 displays the second bulleted question 82 shown in FIG. 4. Otherwise, if the response to the first bulleted question 80 is ‘Yes’, the second bulleted question 82 is not displayed and the engagement module 30 displays the third bulleted question 84. Based on a response to the above-questions 80, 82, 84, the engagement module 32 determines whether the entity is eligible to waive use of the risk criteria for major program determination and, based on the determination, queries the user as to whether the user wishes to waive use of the risk criteria. Upon selection of the next button 86, the engagement module 32 provides an additional set of questions to the user, as shown in FIGS. 5 and 6.
  • Turning now to FIGS. 5 and 6, in one embodiment, the engagement module 30 is configured to prompt the user with a set of questions 88 associated with different time intervals, the responses to which and are used by the engagement module 30 to determine whether the entity is to be considered a a low risk entity or not a low risk entity. As shown in the FIGS. 5 and 6 examples, in one embodiment, the questions presented by the engagement module 30 include, but are not limited to, whether a Single Audit was performed in accordance with provisions of the OMB Circular A-133, whether the auditor's opinion on the financial statements and the schedule of expenditures of federal awards were unqualified, etc. User responses to the set of questions 88 are stored by the engagement module 30 in the data store 40 upon selection of the finish button 90.
  • Referring now to FIG. 7, a financial awards summary screen 92 provided by the program module 32 is shown. The financial awards summary screen 92 displays information regarding financial awards received and expended by an entity. As shown in FIG. 7, in one embodiment, the financial awards summary screen 92 includes an add program button 94 that allows the user to specify information regarding a funding program.
  • FIG. 8 illustrates an exemplary add program screen 96 provided by the program module 32 to enter information regarding a funding program. As shown in the FIG. 8 example, in one embodiment, the user can either enter a CFDA (Catalog of Federal Domestic Assistance) identifier or other number associated with the funding program 96A, or select a drop-down menu option 96B of CFDA identifiers from a pre-populated list. An example of pre-populated list of CFDA identifiers 98 is shown in FIG. 9.
  • Turning now to FIGS. 10 and 11, if a CFDA identifier from the pre-populated list is selected, agency/department name 100 and program name 102 data entry fields are automatically populated by the program module 32. Other data entry fields include, but are not limited to, name of grant 104, award amount 106 and total awards expended 108. In one embodiment, the add program screen 96 includes checkboxes 110, 112 to indicate whether the entity is a subrecipient (e.g., a non-Federal entity that expends Federal awards received from a pass-through entity to carry out a Federal program), or a pass-through entity (e.g., a non-Federal entity that provides a Federal award to a subrecipient to carry out a Federal program) for the added program. If the entity is not a subrecipient, grantor name 114 and program ID 116 data entry fields are disabled by the program module 32. Upon the user selecting the ‘OK’ button 118, information entered by the user is stored in the data store 40 and displayed in the financial awards summary screen 92 by the program module 32. FIG. 12 illustrates an example financial awards summary screen for the ‘Conservation Reserve Program’ funding program.
  • Turning now to FIG. 13, a financial awards summary screen having a plurality of funding programs identified is shown. As shown in the FIG. 13 example, the program module 32 maintains user entered program information concerning various funding programs. In one embodiment, as shown in FIG. 13, the program module 32 clusters funding programs together. A cluster of programs is a grouping of closely related programs sharing common compliance requirements. There are three types of clusters of programs: research and development, student financial aid, and other clusters, as defined in the OMB Circular A-133 Compliance Supplement or as designated by a state. In the system, a cluster of programs is processed as a single program when determining and testing major programs.
  • For example, in the example shown in FIG. 13, the program module 32 automatically clustered the ‘Rural Rental Housing Loans’ 120 and ‘Rural Rental Assistance Payments’ 122 programs together. Advantageously, by automatically clustering programs together, one set of compliance requirements can be applied by the program module 32 to the cluster without requiring the user to determine which funding programs are closely related.
  • FIG. 14 illustrates an example conclusion screen 124 provided by the program module 32 to the user based on a determination that a Single Audit is to be performed. In one embodiment, rules relating to whether a Single Audit or program-specific audit is to be performed are defined in the before mentioned OMB Circular A-133 and are coded in the program module 32. If the program module 32 determines that a Single Audit is to be performed for the entity, the program module 32 displays a message indicating the same to the user. For example, as shown in FIG. 14, in one embodiment, if federal awards expended equal or exceed five hundred thousand dollars ($500,000), the program module 32 determines that an audit in accordance with OMB Circular A-133 (e.g., Single Audit) is required for the entity.
  • FIG. 15 illustrates an example conclusion screen 126 provided by the program module 32 to indicate that a program-specific audit is a possibility. As described previously, a program-specific audit is an audit of a single funding program, without auditing the entire entity. For example, as shown in FIG. 15, in one embodiment, the conclusion screen 126 presented to the user by the program module 132 includes a set of questions as to whether a program-specific audit is to be performed. In one embodiment, the questions are based on whether federal program laws, regulations, contracts or grant agreements require a financial statement audit, whether the federal agency or a pass-through entity approved in advance a program-specific audit, and whether the entity elected to have a program-specific audit. Based on responses to these additional questions, the program module 32 determines whether a program-specific audit is to be performed and, as shown in FIG. 15, indicates the same 128 on the conclusion screen 126.
  • Turning now to FIG. 16, in one embodiment, if the user elects to use risk criteria during the engagement process, the program module 32 provides an assess risk screen 130 to the user. As shown in the FIG. 16 example, the program module 32 automatically classifies identified programs as either Type A programs 132 or Type B programs 134. In one embodiment, for each Type A program identified, the program module 32 provides an associated assess button 136. Upon a user selecting the assess button 136 associated with a Type A program, the program module 32 retrieves and displays a set of questions relating to the particular Type A program to the user (see FIG. 17). Upon entering one or more responses to the set of questions, the program module 32 determines whether the funding program is to be considered low or not low risk.
  • For example, referring to FIG. 17, in one embodiment, upon selection of the assess button 136, the program module 32 displays a Type A Dialog Box 138 to the user that includes questions that are displayed one at a time. When a conclusion can be determined by the program module 32 as to whether the funding program should be considered a low or not low risk, the program module 32 ceases to display any further questions regarding the same and provides a conclusion to the user. If the program module 32 is unable to determine whether the funding program is to be considered a low or not low risk, the program module 32 prompts the user to assess the program as being low or not low risk.
  • Referring now to FIG. 18, for Type B programs, the program module 32 provides the user with two selectable options for determining the number of Type B programs to assess. As shown in FIG. 18, in one embodiment, upon the user selecting ‘Option 1’ 140, the user is instructed by the program module 32 to assess risk for all Type B programs that exceed a pre-defined small program amount (e.g., $100,000 dollars). As shown in the FIG. 18 example, all Type B programs are displayed by the program module 32, including those for which risk need not be assessed (e.g., those funding programs that do not exceed the pre-defined small program amount).
  • Turning now to FIG. 19, in one embodiment, if the user selects ‘Option 2’ 142, the program module 32 instructs the user as to how many Type B programs are to be assessed. In one embodiment, the programming logic for determining the required number of programs to be assessed is coded into the program module 32 and defined in OMB Circular A-133.
  • FIG. 20 illustrates an example Type B Dialog Box 150 that is displayed to the user by the program module 32 upon selection of an assess button 136 associated with a Type B program. As shown in the FIG. 20 example, in one embodiment, the program module 32 provides a set of questions relating to assessing Type B programs that are high or not hight risk. These questions are different than the set of questions provided by the program module 32 to the user for Type A programs.
  • In one embodiment, the program module 32 automatically selects the Type B programs to audit as major programs (if possible) or displays a selection screen, as shown in FIG. 25, for the user to select which Type B programs are to be audited as major programs. Once the required number of programs has been assessed, the program module 32 determines whether coverage requirements defined for funding programs have been met.
  • Coverage requirements relate to government rules that require a specified percentage of received funds to be tested during the Single Audit. For example, a coverage rule may specify that if an entity receives one million dollars ($1,000,000) in federal funds, then at least fifty percent (50%) of the one million dollars ($1,000,000) is to be tested by the user during the Single Audit. In one embodiment, coverage requirements for funding programs are defined in OMB Circular A-133.
  • FIG. 21 illustrates an example assess coverage screen 151 provided by the coverage module 32. As shown in FIG. 21, in one embodiment, the program module 32 displays for each program or cluster previously identified an agency/department identifier 152, a CFDA or other number 154, a program/cluster name 156, total awards expended 158, an amount of awards selected for audit 160, risk level for the program/cluster 162, program type 164, date of last year audited as a major program 166, and checkboxes 168 indicating whether each program is considered a Type A or Type B program. As shown in FIG. 21, in one embodiment, funding programs identified as major programs based on previous user data entry are automatically checked and disabled 168A by the program module 32 on the assess coverage screen 151. The program module 32 assesses coverage regardless of whether the user elected to waive use of risk criteria during the engagement setup.
  • In one embodiment, the program module 32 displays a warning message (not shown) to the user if the coverage required for a program is not met. The coverage percentage used is based on the low risk/not low risk entity questions prompted during the engagement setup by the engagement module 30. For example, in one embodiment, the program module 32 generates a warning message including a calculation of the additional amount of award expenditures that needs to be tested in order to be in compliance with funding program rules and regulations. The computed amount is updated by the program module 32 as the major program checkboxes 168 are selected and deselected. In one embodiment, the user is allowed to select additional programs to be audited as major programs until the coverage requirement is met. Referring now to FIG. 22, a compliance screen 170 provided by the compliance module 34 is shown. The compliance screen 170 displays a compliance program 172 determined by the compliance module 34 for one or more identified funding programs. In one embodiment, as shown in FIG. 22, the compliance program 172 includes one or more compliance requirements 174 that are automatically selected by the compliance module 34 from a Compliance Supplement based on funding programs selected and assessed by the user.
  • As shown in FIG. 22, in one embodiment, each section of the compliance requirements 174 collapses and expands to help users navigate to various parts of the compliance program efficiently. In addition, the compliance module 34 provides users with the ability to add and delete compliance requirements.
  • For example, as shown in the FIG. 22 example, in one embodiment, the right hand pane 172A of the compliance program screen 170 includes a list of all compliance requirements determined automatically by the compliance module 34. The compliance module 34 automatically selects the compliance requirements applicable to one or more major programs and adds the same in the compliance program 172. Compliance requirements not included in the compliance program 172 are automatically deselected from the right pane 172A.
  • The compliance module 34 provides users with the ability to add and delete compliance requirements by selecting and unselecting the checkboxes in the right pane 172A. As shown in FIG. 22, in one embodiment, the compliance module 34 also provides the user with a reset button 178 that allows the user to restore the compliance program 172 to original selections generated by the compliance module 34. In another embodiment, the compliance module 34 allows the user to comment on rationale used in their selections of compliance requirements, which are then stored by the compliance module 34 in the data store 40. If the award is not in the Compliance Supplement, the application guides the user in selecting and deselecting compliance requirements as described above by providing the user with tailoring procedures. The user may customize the compliance procedures in the middle pane by adding, deleting, and/or modifying a procedure automatically selected by the system or selected by the user.
  • FIG. 23 illustrates a compliance checklist screen 180 that is provided by the compliance module 134. In one embodiment, the compliance module 34 is configured to compute a schedule of expenditures of federal awards and a series of user selectable worksheets to guide the user through the examination stage. For example, as shown in FIG. 23, in one embodiment, upon selecting one or more compliance procedure guidelines 180A and checklists 180B, the compliance module 34 generates a a single document containing textual guidance (e.g., guidance that is unique to the program and guidance that is common to all programs), and another document containing only procedural checklists that can be used during the examination stage. Background guidance and procedure checklists can be generated in MS Word® format or a plurality of other standard document formats specified by the user.
  • Once checklists are generated, the user conducts the audit by examining files, documents, contracts, checks, etc. of the entity. The user may investigate, to some degree, transactions between the funding program and other parties. Results are then compared with items identified in one or more checklists to determine if the entity is in compliance or not with funding program rules and procedures.
  • Turning now to FIG. 24, a display screen comprising a diagnostic report 182 generated by the diagnostic module 36 for a Single Audit is shown. The diagnostic module 36 is configured to provide guidance to the user as well as determine whether there are any possible errors and/or inconsistencies with user-entered responses to questions that could and/or would affect the quality of the audit. As shown in the FIG. 24 example, in one embodiment, the diagnostic report 182 relates to, but is not limited to, entered federal award information, major program determination, as well as the transfer of engagements between users. In another embodiment, the diagnostic module 36 performs tests of transactions and account balances to ensure that information presented in financial statements and notes thereof are accurate.
  • Various features of the system may be implemented in hardware, software, or a combination of hardware and software. For example, some features of the system may be implemented in one or more computer programs executing on programmable computers. Each program may be implemented in a high level procedural or object-oriented programming language to communicate with a computer system or other machine. Furthermore, each such computer program may be stored on a storage medium such as read-only-memory (ROM) readable by a general or special purpose programmable computer or processor, for configuring and operating the computer to perform the functions described above.

Claims (29)

1. A computer-implemented method for planning an audit comprising:
determining whether a Single Audit or a program-specific audit is to be performed for an entity based at least in part on a financial award received by the entity and entity-related information, the financial award associated with a funding program;
determining whether the funding program is to be evaluated as a major program by assessing risk and coverage information associated with the financial award;
determining whether the entity is low risk or not low risk;
selecting automatically or enabling selection of at least one compliance procedure to be used during the Single Audit or the program-specific audit from a plurality of compliance procedures; and
providing the at least one compliance procedure to conduct the Single Audit or the program-specific audit.
2. The method of claim 1, further comprising conducting the Single Audit or the program-specific audit using the at least one compliance procedure.
3. The method of claim 1, wherein conducting the Single Audit or the program-specific audit comprises documenting the Single Audit or the program-specific audit.
4. The method of claim 1, wherein the entity-related information comprises information describing a type of entity, the type of entity selected from the group consisting of “Local Government”, “Local Education Agency”, “Indian Tribal Government”, “State Government”, “State Education Agency”, “Nonprofit Organization”, or combinations thereof.
5. The method of claim 1, further comprising:
clustering a plurality of funding programs into a grouping based on a similarity characteristic associated with each of the plurality of funding programs; and
selecting automatically or automatically guiding the user in selecting the at least one compliance procedure based at least in part on the clustering.
6. The method of claim 1, further comprising customizing the at least one compliance procedure.
7. The method of claim 6, wherein customizing the at least one compliance procedure includes adding, deleting, and modifying the at least one compliance procedure.
8. The method of claim 1, wherein selecting automatically or enabling selection of the at least one compliance procedure is based on a Compliance Supplement.
9. The method of claim 1, wherein selecting automatically or enabling selection of the at least one compliance procedure is based on the financial award and the funding program.
10. The method of claim 1, wherein selecting automatically or enabling selection of the at least one compliance procedure is based on the financial award, the funding program, and the entity-related information.
11. The method of claim 1, wherein selecting automatically or enabling selection of the at least one compliance procedure is based on the financial award, the funding program, the entity-related information, and risk and coverage information.
12. The method of claim 1, wherein determining whether the funding program is to be evaluated as a major program comprises analyzing whether the funding program qualifies as a ‘Type A’ program or a ‘Type B’ program.
13. The method of claim 1, further comprising providing a first set of questions through a graphical user interface to obtain the entity-related information.
14. The method of claim 13, further comprising providing a second set of questions through the graphical user interface to obtain the risk and coverage information associated with the financial award;
15. A system for planning an audit comprising:
a data store comprising a plurality of compliance procedures;
a server operatively coupled to the data store, the server including a processor and memory storing instructions that, in response to receiving a first request for access to a service, cause the processor to:
provide a first set of questions and a second set of questions to an entity;
determine whether a Single Audit or a program-specific audit is to be performed for the entity based on a response to the first set of questions;
determine whether a funding program associated with a financial award received by the entity is to be evaluated as a major program based on a response to the second set of questions;
determine whether the entity is low risk or not low risk;
select automatically or enable selection of at least one compliance procedure from the plurality of compliance procedures to be used during the Single Audit or the program-specific audit;
generate a signal associated with the at least one compliance procedure; and
transmit the signal.
16. The system of claim 15, wherein the memory stores instructions that, in response to receiving the first request, cause the processor to display the first set of questions, the second set of questions, or combinations thereof, on a display device.
17. The system of claim 15, wherein the at least one compliance procedure is based on a Compliance Supplement.
18. The system of claim 15, wherein the first set of questions are entity-related questions.
19. The system of claim 15, wherein the second set of questions relates to risk and coverage information associated with the funding program.
20. The system of claim 15 wherein the memory stores instructions that, in response to receiving the first request, cause the processor to:
cluster a plurality of funding programs into a grouping based on a similarity characteristic associated with each of the plurality of funding programs; and
select automatically or enable selection of the at least one compliance procedure based at least in part on the grouping.
21. The system of claim 15, wherein the memory stores instructions that, in response to receiving a second request, cause the processor to customize the at least one compliance procedure.
22. The system of claim 21, wherein customization of the at least one compliance procedure includes adding, deleting or modifying the at least one compliance procedure.
23. The system of claim 15, wherein the at least one compliance procedure is based on at least the financial award.
24. The system of claim 15, wherein the at least one compliance procedure is based on the financial award and the funding program.
25. The system of claim 15, wherein the at least one compliance procedure is based on the financial award, the funding program, and the entity-related information.
26. The system of claim 15, wherein the at least one compliance procedure is based on the financial award, the funding program, the entity-related information, and risk and coverage information.
27. The system of claim 15, wherein the memory stores instructions that, in response to receiving the first request, cause the processor to analyze whether the funding program qualifies as a ‘Type A’ program or a ‘Type B’ program.
28. An article comprising a machine-readable medium storing machine-readable instructions that, when applied to the machine, cause the machine to:
determine whether a Single Audit or a program-specific audit is to be performed for an entity based at least in part on a financial award received by the entity and entity-related information, the financial award associated with a funding program;
determine whether the funding program is to be evaluated as a major program by assessing risk and coverage information associated with the financial award;
select automatically or enable selection of at least one compliance procedure to be used during the Single Audit or the program-specific audit from a plurality of compliance procedures; and
provide the at least one compliance procedure to conduct the Single Audit or the program-specific audit.
29. The article of claim 33 including instructions that, when applied to the machine, cause the machine to:
cluster a plurality of funding programs into a grouping based on a similarity characteristic associated with each of the plurality of funding programs; and
select automatically or enable selection of the at least one compliance procedure based at least in part on the cluster.
US12/949,176 2010-09-28 2010-11-18 Single Audit Tool Abandoned US20120078761A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US12/949,176 US20120078761A1 (en) 2010-09-28 2010-11-18 Single Audit Tool
US12/971,921 US20120078801A1 (en) 2010-09-28 2010-12-17 Single audit tool
US14/792,652 US10762578B2 (en) 2010-09-28 2015-07-07 Single audit tool

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US38716610P 2010-09-28 2010-09-28
US12/949,176 US20120078761A1 (en) 2010-09-28 2010-11-18 Single Audit Tool

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US38716610P Continuation 2010-09-28 2010-09-28

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US12/971,921 Continuation-In-Part US20120078801A1 (en) 2010-09-28 2010-12-17 Single audit tool
US14/792,652 Continuation US10762578B2 (en) 2010-09-28 2015-07-07 Single audit tool

Publications (1)

Publication Number Publication Date
US20120078761A1 true US20120078761A1 (en) 2012-03-29

Family

ID=45871606

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/949,176 Abandoned US20120078761A1 (en) 2010-09-28 2010-11-18 Single Audit Tool
US14/792,652 Active 2031-09-25 US10762578B2 (en) 2010-09-28 2015-07-07 Single audit tool

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/792,652 Active 2031-09-25 US10762578B2 (en) 2010-09-28 2015-07-07 Single audit tool

Country Status (1)

Country Link
US (2) US20120078761A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130054431A1 (en) * 2011-08-25 2013-02-28 Government Transaction Services, Inc. System and Method for Integrated Use of Shared Hardware, Software and Storage Resources Communicating Through a Network to Standardize and Simplify Transactions Between an Organization and Entities That Do Business With The Organization
US20140095270A1 (en) * 2012-09-28 2014-04-03 StreamLink LLC Method and system for managing grants
US20140358746A1 (en) * 2011-12-09 2014-12-04 Discovery Limited Method of Implementing a Financial Wellness Programme and a System Therefor
US10157267B2 (en) 2012-12-21 2018-12-18 Vitality Group International, Inc. Method of determining the attendance of an individual at a location and a system therefor
CN111274227A (en) * 2020-01-20 2020-06-12 上海市大数据中心 Database auditing system and method based on cluster analysis and association rule

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140222655A1 (en) * 2012-11-13 2014-08-07 AML Partners, LLC Method and System for Automatic Regulatory Compliance

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090112741A1 (en) * 2007-10-24 2009-04-30 Kershner Marriette L Method and system of generating audit procedures and forms
US20090240606A1 (en) * 2008-03-24 2009-09-24 Honeywell International, Inc Internal Process Audit Surveillance System

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090112741A1 (en) * 2007-10-24 2009-04-30 Kershner Marriette L Method and system of generating audit procedures and forms
US20090240606A1 (en) * 2008-03-24 2009-09-24 Honeywell International, Inc Internal Process Audit Surveillance System

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
NPL_Audit, OMB A-133 Compliance Supplement, March 2006, downloaded from http://georgewbush-whitehouse.archives.gov/omb/circulars/a133_compliance/06/06toc.html on 02 March 2013, 116 pages. *
NPL_Clusters_of_Programs_pt5.pdf, downloaded from http://georgewbush-whitehouse.archives.gov/omb/circulars/a133_compliance/06/pt5.pdf, 47 pages on 07 November 2014. *
Wiki_Single_Audit, Definition of Single Audit, downloaded 22 April 2013 from http://en.wikipedia.org/wiki/Single_Audit, 9 pages. *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130054431A1 (en) * 2011-08-25 2013-02-28 Government Transaction Services, Inc. System and Method for Integrated Use of Shared Hardware, Software and Storage Resources Communicating Through a Network to Standardize and Simplify Transactions Between an Organization and Entities That Do Business With The Organization
US20140358746A1 (en) * 2011-12-09 2014-12-04 Discovery Limited Method of Implementing a Financial Wellness Programme and a System Therefor
US20140095270A1 (en) * 2012-09-28 2014-04-03 StreamLink LLC Method and system for managing grants
US10157267B2 (en) 2012-12-21 2018-12-18 Vitality Group International, Inc. Method of determining the attendance of an individual at a location and a system therefor
CN111274227A (en) * 2020-01-20 2020-06-12 上海市大数据中心 Database auditing system and method based on cluster analysis and association rule

Also Published As

Publication number Publication date
US10762578B2 (en) 2020-09-01
US20150310563A1 (en) 2015-10-29

Similar Documents

Publication Publication Date Title
US10762578B2 (en) Single audit tool
Shi et al. The relationship between the standardized root mean square residual and model misspecification in factor analysis models
US10699349B2 (en) Computerized system and method for data field pre-filling and pre-filling prevention
Hyndman et al. Transparency in reporting on charities’ efficiency: A framework for analysis
Hodge et al. The effects of financial statement information proximity and feedback on cash flow forecasts
US20160350885A1 (en) System and methods for generating modularized and taxonomy-based classification of regulatory obligations
Elder et al. Audit sampling research: A synthesis and implications for future research
US8725629B2 (en) System and method for managing credit risk for investment portfolios
Oktal et al. Measurement of internal user satisfaction and acceptance of the e-justice system in Turkey
Hatemi-J et al. Exchange rates and stock prices interaction during good and bad times: evidence from the ASEAN4 countries
Shear et al. False positives in multiple regression: Unanticipated consequences of measurement error in the predictor variables
US20090327000A1 (en) Managing Change Requests in an Enterprise
CN112016788A (en) Risk control strategy generation and risk control method and device and electronic equipment
US20120078801A1 (en) Single audit tool
AU2011282806B2 (en) Computer-implemented system and methods for distributing content pursuant to audit-based processes
US20130212474A1 (en) Computer-implemented system and method for facilitating creation of business plans and reports
De Villiers et al. Are shareholders willing to pay for financial, social and environmental disclosure? A choice-based experiment
US20140143132A1 (en) Versatile user interface system for loan processing
Bujar et al. A process for evaluating quality decision-making practices during the development, review and reimbursement of medicines
Su et al. Risk contagion in financial markets: A systematic review using bibliometric methods
Angerschmid et al. Effects of fairness and explanation on Trust in Ethical AI
Prorokowski Validation of the backtesting process under the targeted review of internal models: practical recommendations for probability of default models
Cropper et al. Financial scenario modelling: a study of UK universities
Lawson-Body et al. Data visualization: Developing and validating dashboard measurement instruments
US10546278B2 (en) System and method for matching a contributor and a recipient entity

Legal Events

Date Code Title Description
AS Assignment

Owner name: THOMSON REUTERS (TAX AND ACCOUNTING) INC., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HOLLAND, STEPHEN EDWARD;SPRANDLING, LEE SCOTT;LINDSEY, STEPHEN W.;REEL/FRAME:030121/0713

Effective date: 20130326

AS Assignment

Owner name: THOMSON REUTERS GLOBAL RESOURCES, SWITZERLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:THOMSON REUTERS (TAX AND ACCOUNTING) INC.;REEL/FRAME:035857/0801

Effective date: 20150617

AS Assignment

Owner name: THOMSON REUTERS GLOBAL RESOURCES UNLIMITED COMPANY

Free format text: CHANGE OF NAME;ASSIGNOR:THOMSON REUTERS GLOBAL RESOURCES;REEL/FRAME:044301/0589

Effective date: 20161121

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION