techniques for risk-based auditing

50
21/1/2011 European Court of Auditors Chamber IV Techniques for risk-based auditing DG INFSO-02 Freddy Dezeure - Charles Macmillan

Upload: bonita

Post on 12-Jan-2016

38 views

Category:

Documents


2 download

DESCRIPTION

Techniques for risk-based auditing. DG INFSO-02 Freddy Dezeure - Charles Macmillan. 21/1/2011 European Court of Auditors Chamber IV. Background DG INFSO. European Commission department European Digital Agenda Co-funding of cost of research projects: 1,5 bio€ per year - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Techniques for risk-based auditing

21/1/2011 European Court of Auditors Chamber IV

Techniques for risk-based auditingDG INFSO-02 Freddy Dezeure - Charles Macmillan

Page 2: Techniques for risk-based auditing

Background DG INFSO

European Commission department

European Digital Agenda

Co-funding of cost of research projects: 1,5 bio€ per year

FP6, FP7, eTEN, CIP: > 7000 beneficiaries, >2000 projects

Financial audits - 200 per year

Page 3: Techniques for risk-based auditing

Selection of auditees

Page 4: Techniques for risk-based auditing

Assurance audits -> error 4%

Page 5: Techniques for risk-based auditing

P1

P1

Major sources of errors

Excessive overheads

Claimed salary cost not actual

Page 6: Techniques for risk-based auditing

Representative error rate

Page 7: Techniques for risk-based auditing

Risk-based auditing

Risk of intentional inflation of cost

Assessment of the organisation as a whole

Data mining – new tools and methods

Audit programme specific to the risk (ISA240 - ISA315)

Page 8: Techniques for risk-based auditing

CM

Page 9: Techniques for risk-based auditing

Data gathering

Risk assessment

Define approach

Field work

Assess next steps

Finalise

Page 10: Techniques for risk-based auditing

Data gatheringRisk

assessment

Page 11: Techniques for risk-based auditing

Data Gathering phase

Scope from risk assessment – continually reassessed

Collect available information from internal and external sources

Check for indicators and inconsistencies

Outcomes define specific audit procedures

Use and find new Indicators

Feed into control systems

Page 12: Techniques for risk-based auditing

Internal Sources

Project documents: proposal, description of work, deliverables, reports, reviews, emails, cost claims

Experts Database

Organisations Database

Page 13: Techniques for risk-based auditing

Open Sources

People Companies Communications

Google, BingGoogle Scholar, Microsoft AcademicMicrosoft EntityCubeLinkedIn, Zoominfo123People, Yasni, PIPLGoogle Magic Wheel, Timeline

Google, BingCompany registriesGoogle Maps Google Streetview

Google, BingInfobelIxquickUKPhonebookDomaintoolsDomaincrawlerRobtexWayback Machine

Page 14: Techniques for risk-based auditing

Find the right person

Find all the relevant information about the person

Avoid noise

Finding people

Page 15: Techniques for risk-based auditing
Page 16: Techniques for risk-based auditing
Page 17: Techniques for risk-based auditing
Page 18: Techniques for risk-based auditing
Page 19: Techniques for risk-based auditing

“Fake” People - Examples

Non-existent people

Existing, but

not relevant

not employed

not aware of project

People in multiple roles / companies / projects

Page 20: Techniques for risk-based auditing

Neuron – partner in BRAIN

Page 21: Techniques for risk-based auditing

Neuron: Key staff

• DoW Description

• Computer Science degree

• Experienced ICT researcher

• etc

Page 22: Techniques for risk-based auditing

Neuron – Key staff

Page 23: Techniques for risk-based auditing

Neuron – Key staff

Page 24: Techniques for risk-based auditing

Indicators

Not found on internet

Top management of company

Always the same names

Listed for different companies in different projects

Listed in a different country from the company

CV on LinkedIn contradicts submission

Anonymous email address (gmail, ...)

GSM phone only

Page 25: Techniques for risk-based auditing

Finding companies

Find the right company

Find all the relevant information about the company

Avoid noise

Page 26: Techniques for risk-based auditing

Even simple tools can help

Page 27: Techniques for risk-based auditing

34

Earth Match – partner in SOLARSYS

Page 28: Techniques for risk-based auditing

www.emsoft.com

Page 29: Techniques for risk-based auditing

34

Earth Match – partner in SOLARSYS

Page 30: Techniques for risk-based auditing

www.earthmatch.com.mt

Page 31: Techniques for risk-based auditing
Page 32: Techniques for risk-based auditing

www.cabbage.com

Page 33: Techniques for risk-based auditing

ONION – partner in VEGETABLE

Page 34: Techniques for risk-based auditing

32

• Does the website exist?

• Does the project fit the company’s core activities?

• Does the website give contact information - and does it match the official transmission documents?

• Is the website registered by the partner?

32

Company website

Page 35: Techniques for risk-based auditing

33

• Company registration websites

http://www.rba.co.uk/sources/registers.htm

• http://www.infobel.com/, http://www.ixquick.com/

– Cross-check the phone number with yellow/white pages

– Reverse search on the phone number

33

Company registry, phone/fax

Page 36: Techniques for risk-based auditing

33

• Website registration

http://www.domaintools.com/

http://www.robtex.com/dns/

• Archive

http://www.waybackmachine.org/

http://www.archive.org/web/web.php

33

Company website, history

Page 37: Techniques for risk-based auditing

44

• Search for company in Google

– Not reassuring if nothing found

• Translation tools

– http://translate.google.com

– http://babelfish.yahoo.com/

44

Tools - internet search

Page 38: Techniques for risk-based auditing

45

Page 39: Techniques for risk-based auditing

HOUR – partner in TIME

Page 40: Techniques for risk-based auditing

• Email address not <-> company domain

• Phone number = fax number

• Phone number = gsm number

• Website registered by another company

• Website or phone numbers in another country

• Corporate website without contact coordinates, “under construction”

Indicators

Page 41: Techniques for risk-based auditing

FD

Page 42: Techniques for risk-based auditing

Data Gathering Outcomes

Organisation

Cannot (financially)

Cannot (operationally)

Can do / have not

Staff

Have not done

Have done, cost inflated

Have done, cost ineligible

Page 43: Techniques for risk-based auditing

Outcome - Audit Procedures

Cannot (financial)

Find other income source

Check commercial agreements with others...

Cannot (operational)

Find who could have done the work

Verify working agreements / CVs / job descriptions...

Page 44: Techniques for risk-based auditing

Risk-based audits -> error 30%

Page 45: Techniques for risk-based auditing

Impact on DG INFSO

Huge effort in administrative follow-up

Litigation (EDPS, Ombudsman, TPI, ECJ)

Impossibility to recover funds

Waste of budget - impact on genuine participants

Reputation damage

Page 46: Techniques for risk-based auditing

Perception

Page 47: Techniques for risk-based auditing

Challenge

Detect problems early in the project life-cycle (PO)

Link data gathering/risk-assessment/audit programme

Manage exceptions well

Page 48: Techniques for risk-based auditing

Implementation of audits

Page 49: Techniques for risk-based auditing

Residual error

AuditedError = 0

ExtrapolatedError = non-systematic

UntouchedError = representative

Page 50: Techniques for risk-based auditing

Selectiveness

FacilitateSimplify

Trust

DetectCorrectPrevent