Download as pdf or txt
Download as pdf or txt
You are on page 1of 34

Auditing and Assurance Services in

Australia Revised 6th Edition Gay


Solutions Manual
Go to download the full and correct content document:
https://testbankdeal.com/product/auditing-and-assurance-services-in-australia-revised
-6th-edition-gay-solutions-manual/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Auditing and Assurance Services In Australia 7th


Edition Gay Solutions Manual

https://testbankdeal.com/product/auditing-and-assurance-services-
in-australia-7th-edition-gay-solutions-manual/

Auditing and Assurance Services In Australia 7th


Edition Gay Test Bank

https://testbankdeal.com/product/auditing-and-assurance-services-
in-australia-7th-edition-gay-test-bank/

Auditing And Assurance Services In Australia 6th


Edition Louwers Solutions Manual

https://testbankdeal.com/product/auditing-and-assurance-services-
in-australia-6th-edition-louwers-solutions-manual/

Auditing And Assurance Services In Australia 6th


Edition Gay Test Bank

https://testbankdeal.com/product/auditing-and-assurance-services-
in-australia-6th-edition-louwers-test-bank/
Auditing and Assurance Services 6th Edition Gay Test
Bank

https://testbankdeal.com/product/auditing-and-assurance-
services-6th-edition-gay-test-bank/

Auditing Assurance Services and Ethics in Australia 9th


Edition Arens Solutions Manual

https://testbankdeal.com/product/auditing-assurance-services-and-
ethics-in-australia-9th-edition-arens-solutions-manual/

Auditing Assurance Services and Ethics in Australia


10th Edition Arens Solutions Manual

https://testbankdeal.com/product/auditing-assurance-services-and-
ethics-in-australia-10th-edition-arens-solutions-manual/

Auditing and Assurance Services In Australia 9th


Edition Arens Test Bank

https://testbankdeal.com/product/auditing-and-assurance-services-
in-australia-9th-edition-arens-test-bank/

Auditing and Assurance Services 5th Edition Gay Test


Bank

https://testbankdeal.com/product/auditing-and-assurance-
services-5th-edition-gay-test-bank/
Chapter 7
Understanding and assessing internal control

Learning objectives
7.1 Explain the concept of internal control, its inherent limitations and how it links to the audit
strategy.
7.2 Describe the general objectives of internal control and how the auditor uses them to develop
specific control objectives.
7.3 Identify and define each of the components of internal control.
7.4 Identify the steps in a financial report audit by which the auditor obtains an understanding of
internal control and assesses control risk, and the methods and procedures used by the auditor in
each step.
7.5 Distinguish between user controls and information technology (IT) controls, between general
controls and application controls and between automated controls and manual controls and
identify the general controls and application controls that affect the auditor’s assessment of
control risk in a computerised system.
7.6 Explain the role of the internal audit function in internal control and how it may affect the audit.

Major chapter sections


Internal control and audit strategy
Internal control objectives
Components of internal control
Considering internal control in a financial report audit
Computerised systems
Considering the work of an internal auditor

Lecture plan
It is important to link control risk assessment back to the audit risk model so that students understand
the importance of assessing control risk. Many students get confused about the two stages related to
control risk. Stage 1 is to gain an understanding of internal control and undertake a preliminary
assessment of control risk. At the end of this stage the auditor will prepare an audit program for each
major account balance/class of transactions/disclosure that will outline the degrees of tests of controls
and substantive testing. In stage 2 the auditor will undertake tests of controls for any control risk
assessment less than high to provide evidence for the preliminary assessment of control risk. We are
concentrating on stage 1 in this chapter.

You should outline the learning objectives for this chapter, and walk the students through how this
chapter fits into the flowchart of the planning and risk assessment stage of a financial report audit.

[Use slides 7-1 to 7-3]

LO 7.1: Internal control and audit strategy


In this introduction we define internal control, outline the key requirements for the auditor and briefly
recap on the different auditing approaches, which have been introduced in earlier lectures.

We also cover briefly the responsibility for internal control and the concepts of reasonable assurance
and inherent limitations.

[Use slides 7-4 to 7-11]

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 1
LO 7.2: Internal control objectives
This section introduces students to the objectives and characteristics of a satisfactory system of
internal control and distinguishes between preventative and detective controls, and management and
transaction controls.

[Use slides 7-12 to 7-16]

LO 7.3: Components of internal control


This section takes students through the five components of internal control: control environment;
entity’s risk assessment procedures; information systems; control activities; and monitoring of
controls. How much needs to be covered here will depend on how much students have done on
internal control in other subjects. Although the importance of the control environment has been
advocated for over 10 years, some students still have difficulties with the concept, which is less
tangible to them compared with the other elements. Examples help to illustrate these elements.

[Use slides 7-17 to 7-25]

LO 7.4: Considering internal control in a financial report audit


It is important that students understand how the assessment of internal control impacts on the financial
report audit. These slides provide a flowchart of the steps in the auditor’s consideration of internal
control, how the auditor gains that understanding and the procedures by which the auditor documents
that understanding. We do not provide detailed slides on the methods of documentation (for example,
flowcharts), which we consider is best handled in supporting tutorials (depending on how much detail
the instructor wishes to go into). It is also important to discuss how the auditor assesses control risk.

[Use slides 7-26 to 7-43]

LO 7.5: Computerised systems


In these slides we outline the types of controls contained in an IT environment and categorisations of
these controls. In most other auditing texts these controls are taught in a separate chapter; however,
with students’ high level of computer knowledge these days, most instructors consider this to be
unnecessary. We have included the detail on IT controls in the control risk assessment chapter.

There are a large number of slides for this section, which is a result of the different categorisation
schemes of controls used for IT environments.

[Use slides 7-44 to 7-67]

LO 7.6: Considering the work of an internal auditor


Planning the use of experts and other auditors was considered in Chapter 4 on gathering audit
evidence. We have included a consideration of the work of the internal auditor at the internal control
assessment stage here because, for the financial report audit, even though the approach to financial
report auditing has changed, as has the work of the internal auditor, the internal audit function is still
viewed by the external auditor primarily as part of internal control.

[Use slides 7-68 to 7-72]

Summary
We provide a summary slide of the main learning takeaways in this chapter.

[Use slide 7-73]

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 2
SOLUTIONS
REVIEW QUESTIONS

7.1 Achieving satisfactory internal control is initially a management responsibility. To


maintain control over operations and accounting data, management needs to adopt,
maintain and supervise an appropriate internal control system.
However, the directors of a company are ultimately responsible for the overall control
of that company. Effective internal control is central to efficient risk management and
is therefore an important part of the corporate governance process.
While auditors are not responsible for internal control, the auditor still needs to obtain
an understanding of internal control relevant to the audit. The risk of material
misstatement at the financial report level is affected by the auditor’s understanding of
the control environment (ASA 315/ISA 315).
At the assertion level, the auditor needs to consider whether their assessment of the
risk of material misstatement takes account of the entity’s controls, that is, control
risk.
7.2 Where the auditor believes that controls are not likely to be reliable or that it would
not be cost effective to rely on such controls, the auditor may adopt a predominantly
substantive approach strategy and reach a conclusion on the accuracy and reliability
of underlying accounting data by testing the accounting data itself, to reduce detection
risk.
Alternatively, where the auditor believes that controls are good and it would be cost
effective to be able to rely on those controls, the auditor may adopt a lower assessed
level of control risk approach strategy. If control risk is assessed as being less than
high, tests of control could be undertaken to confirm this assessment. These controls
could then be relied upon, reducing the need for routine substantive checking of large
volumes of transactions. In addition, limited substantive testing would need to be
undertaken due to the inherent limitations of internal control.
7.3 Preventative controls are internal controls that are used to prevent undesirable events
or errors, such as a check to ensure that sales are not made to customers where it
would exceed their credit limit. Detective controls are internal controls that are used
to identify events or errors if they have occurred, to enable their correction, such as a
sequence check to identify missing invoices.
7.4 Segregation of duties means that employees’ duties should be arranged so that
employees do not perform incompatible functions. This means that different
individuals should be responsible for authorising a transaction; recording a
transaction; maintaining custody of the assets that result from a transaction; and
comparing assets with the related amounts recorded in the accounting records. As a
result, no single person is in a position to be able to perpetrate and conceal fraud in
the normal course of duties.
7.5 According to ASA 315.A76 (ISA 315.A76) the internal control environment includes
governance and management’s overall attitude, awareness and actions regarding

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 3
internal control and its importance in the entity. The internal control environment is
important because it sets the tone of an entity. It influences the control consciousness
of all personnel and is the foundation for the other components.
7.6 Management may monitor controls through ongoing activities such as supervisory
activities and/or separate evaluations. Internal audit may also contribute to the
monitoring process by making special inquiries at management’s direction or
generally reviewing operating practices. In addition, communications from external
parties, such as customer complaints and related follow-ups, may indicate problems
with internal control.
7.7 The auditor obtains an understanding of internal control to assess control risk and:
• identify the types of potential misstatements that could occur and the factors that
contribute to the risk that they will occur
• understand the accounting system sufficiently to identify the client documents and
so on that may be available and ascertain what data will be used in audit tests
• determine an efficient and effective approach to the audit.
7.8 Auditors confirm their assessment of internal control by conducting tests of controls,
if control risk has been assessed at less than high. Tests of controls provide evidence
that the controls exist and operate effectively throughout the period. An auditor
requires stronger evidence of the effectiveness of a procedure if the assessed level of
control risk is low than if it is medium, as the auditor will be placing greater reliance
on the control.
7.9 General controls in a computerised system are those controls that relate to all or many
computerised accounting applications to provide a reasonable level of assurance that
the overall objectives of internal control are achieved. Examples include segregation
of duties between operators and programmers, approval of changes to a program and
restricted access to the system.
Application controls apply to the processing of specific types of transactions related to
a computerised accounting application such as invoicing and payroll. Examples
include user controls such as control totals, input controls such as key verification,
and automated control activities such as check digits, limit checks and validity checks.
7.10 In an IT environment the auditor should commence by reviewing general controls. If
general controls are unreliable, the auditor will have little confidence in automated
application controls and confidence in manual application controls may be reduced. In
this situation, there is limited benefit in continuing to review, document and perform
tests of automated controls. The auditor must take a more substantive approach to the
audit.
If the general controls are reliable, the auditor may then make a preliminary review of
application controls and, if appropriate, a more detailed evaluation and testing of
application controls.
7.11 The work of internal audit may be used in an external audit where it is viewed as part
of an audit client’s internal control. ASA 610.15 (ISA 610.15) requires that when
determining whether the work of the internal audit is likely to be adequate for external
audit purposes, the external auditor must evaluate the internal audit’s:

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 4
• objectivity
• technical competence
• systematic and disciplined approach.
Further, in determining the effect of the internal audit’s work on the nature, timing
and extent of the external audit procedures, the external auditor also needs to
consider:
• the amount of judgment involved
• the assessed risks of material misstatement.
In addition, if the external auditor intends to use the work of the internal audit, the
external auditor needs to review the internal audit working papers and re-perform
some of the internal audit work. Further, the external auditor must discuss the planned
use of its work with internal audit so they can coordinate their activities, and read the
relevant reports of internal audit. In addition, external audit must communicate the
proposed use of internal audit to those charged with governance, as part of their
understanding of the proposed audit approach.
Direct assistance by internal audit to perform audit procedures under the direction,
supervision and review of external audit is prohibited by ASA 610.Aus 1.2 and ASA
610.Aus 25.1.

DISCUSSION PROBLEMS AND CASE STUDIES


7.12 a) As indicated by ASA 315.A53–55 (ISA 315.A53–55), internal control on its own
cannot assure a reliable financial report, because it has inherent limitations including:
• control breakdowns can occur as a result of the actions of careless, fatigued or
deviant staff
• the possibility of management override
• the existence of non-routine transactions for which internal controls were not
devised
• the concept of reasonable assurance, whereby management subjectively evaluates
the cost–benefit trade-off and adopts control methods and measures that are
prudent for the assets at risk.
Thus, the reliability of financial information is not assured, even if internal controls
are effective. Therefore, the auditor can never rely solely on internal control and must
undertake some substantive tests.
b) A more appropriate audit strategy would be for the auditor to adopt a lower
assessed level of control risk approach. AGL’s internal controls over sales appear to
be excellent and there is a large volume of routine sales transactions. Therefore,
control risk for sales may be assessed as low and tests of control undertaken to
confirm this assessment. If the tests of controls confirm this assessment, these controls
could be relied upon, reducing the need for routine checking of large volumes of sales
transactions, which would be a cost-effective strategy. In addition, limited substantive

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 5
testing of sales would need to be undertaken due to the inherent limitations of internal
control.
7.13 There is a lack of segregation of duties for:
• the accounts receivable clerk: the cheques received from debtors are forwarded to
the accounts receivable clerk, who also has a recording function and could
manipulate the accounts receivable balance to cover up a misappropriated cheque
• the accounts payable clerk: the accounts payable clerk has cash payments duties
and performs the bank reconciliation, so they may be able to misappropriate funds
without being discovered. The bank reconciliation should be performed by
someone independent of the payments and receipts functions to provide a cross-
check on these functions.
7.14 Internal control activities that the auditor might rely on include the following.
• Purchasing is centralised rather than left to each office.
• Levels of approval are implemented for asset purchases over $5000 and over
$20 000.
• When an asset is received, details are matched to the original purchase order.
• Payment is made on receipt of order and invoice—supporting documentation is
needed for payment.
• Segregation of duties: the divisional manager, the purchasing officer, the higher
levels of authorisation (if required), the receiving clerk in the warehouse and the
accounts payable staff are all separate.
• Assets are all bar coded as soon as they arrive and are entered into an asset
register.
7.15 Control activities include:
• Having pre-numbered internal documents. This enables the sequence to be
accounted for to help ensure completeness and occurrence and assists in matching
documents.
• Purchase requisitions require approval from an appropriate officer before a
purchase order is raised. This ensures that purchases are bona fide and for the
benefit of the entity.
• The receiving department checks goods received against the authorised purchase
order and supplier delivery dockets to ensure that all goods listed have been
delivered.
• The accounts payable clerk checks supplier invoices against the purchase order
and the receiving report before processing to ensure that only goods ordered and
received are paid for.
• Receiving reports and purchase orders are reviewed at month end and any items
received for which an invoice has not been received are accrued for to ensure that
all purchases for the period are recorded.
• The accounts payable clerk codes purchase invoices from a standard general
ledger code file and the coding is reviewed by the financial accountant prior to
Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 6
processing the invoices to ensure that purchases are classified to the correct
general ledger account.
7.16
Impact on control risk Account Key assertion
affected
(a) Increase in control risk, as simply Inventory or Existence
making a notation that the order was accounts
received is not an adequate check on the payable
quantity and condition of goods
received. The receiving department
should count and inspect the goods
received. Failure to check the quantity
may result in failing to pick up short
deliveries.
Also, some goods received may be Valuation and
damaged. allocation
(b) Increase in control risk, as an important Cash at bank Existence
control over bank receipts and
payments—that is, monthly bank
reconciliations—does not exist.
(c) Increase in control risk, as there is no Inventory or Existence
control to ensure goods are actually accounts
received before inventory and accounts payable
payable are recorded.
(d) Increase in control risk, due to the Accounts Valuation and
absence of the previous control, receivable allocation
increasing the risk of bad debts.

7.17
(a) Internal control weakness (b) Internal control improvements
Other departments can raise Pre-numbered requisitions orders should
requisitions for goods and services be raised and signed by authorised
without proper authorisation. personnel. Requisitioning authority should
be related to authority and function. A
signed requisition order should be required
before raising purchase orders.

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 7
Purchase orders are unnumbered Pre-numbered purchase orders should be
and unaccounted for. signed by an authorised purchasing
department staff member and a copy
forwarded to the requisitioner, goods
receiving and accounts departments. Pre-
numbered purchase orders should ensure
completeness.
Purchasing department obtains Orders should be placed with approved
goods and services as soon as the suppliers on the best terms and quality.
requisition is received, without
checking for the best deal.
Blank purchase orders are Blank purchase orders should be kept in a
accessible to all purchasing staff secure place to avoid misuse and should be
and open to theft and accounted for; that is, checked for
misappropriation. sequential continuity.

7.18 (a) Strengths


• Orders are subject to various edit checks on the terminal. Only those orders
satisfying all edit criteria except the credit limit test are accepted.
• Credit limits on orders are reviewed by the credit control clerk for approval. Data
failing any other edit criteria is not accepted by the system.
• Rejected orders are noted by the data entry clerk and passed to the department’s
supervisor for investigation.
• Segregation of duties in receiving, entering, checking and picking orders.
• The storeperson initials the picking slip prior to forwarding it together with the
goods to dispatch.
• The dispatch clerk agrees the picking slip to physical goods picked.
• The accounts receivable master file is updated daily.
(b) Weaknesses and consequences
• Sales orders via telephone are accepted without documentary evidence—
possibility of fictitious orders.
• The dispatch clerk agrees the picking slip with quantities noted to physical goods
picked—possibility of misappropriating any extra goods picked or ticking
quantities on the picking slip as correct without counting goods picked physically.
• The dispatch clerk makes adjustments for stock-outs without verifying the
details—possibility of theft by the stockperson or someone else.
• Lack of segregation of duties—the dispatch clerk prints the invoice, not someone
in the accounts payable department, after verifying approved sales order with
goods dispatched. Delivery docket (invoice) endorsed by the customer is given
back to the dispatch department. Goods may be sold to a related party of dispatch

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 8
supervisor/clerk, who may then destroy the picking slip and the returned delivery
docket (invoice).
(c) The control risk relating to Acid’s sales system will be assessed as medium, as
there are some controls that may be able to be relied upon, but also major weaknesses
around the dispatch clerk.

7.19 (a) Strengths


• Payments are received by cheques and not cash.
• Cash receipts report is printed daily.
• All cheques are agreed to the cash receipts report.
• Cheques are deposited daily.
• Accounts receivable master file is updated daily.
(b) Weaknesses and consequences
• Sales representatives may obtain cheques directly from customers. Sales
representatives may pocket the cheques.
• Whoever opens the mail does not prepare a list of cheques received—cheques
may be misappropriated.
• If inadequate details are provided, the credit control clerk allocates the receipts to
the oldest balance first—oldest balance may be disputed.
• Lack of segregation of duties—the credit control clerk performs several
incompatible tasks, such as approving/reviewing the customer credit; receiving
and crossing cheques; recording; printing cash receipts report; preparing bank
deposit slip; and banking the cheques—high possibility of misappropriation.
(c) The control risk relating to Cannon’s cash receipts system will be assessed as high,
due to the weaknesses in internal control.

7.20 a)
(i) Control activity (ii) Explanation (iii) Key
assertion
Segregation of duties in The segregation of duties Completeness of
recording and handling cash makes the theft of cash cash
receipts (one employee difficult (unless there is
compares the cheque with collusion). Comparing the
the remittance advice and cheque received with the
forwards the cheque, a remittance advice ensures that
different employee prepares payments are complete.
a list of cash receipts).
Monthly bank Prompt attention to Completeness of
reconciliations by an reconciliation of cash records
Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 9
employee who is not makes detection of errors or cash
responsible for receiving frauds easier.
cash.
Authorisation of sales All sales returns and Occurrence of
returns and allowances allowances must be sales
authorised by a person who
has an appropriate level of
authority (i.e. the financial
controller).
Authorisation of bad debt Bad debts can be written off Valuation and
write-off only by the financial allocation of
controller after discussion accounts
with the credit manager. receivable and
occurrence of bad
debt expense

b)
(i) Internal (ii) Account (iii) Assertion (iv) Justification
control balance at risk
weakness at risk
Sales orders Sales Occurrence There is no externally
may be received generated
orally. documentary evidence
Accounts Existence
of a customer order.
receivable
Hence fictitious sales
may be generated.
There is no Accounts Valuation and Sales staff can increase
credit approval receivable allocation sales by selling to
required for customers who may
customers prior not be able to pay their
Provision for Completeness
to sales being debts.
doubtful debts
processed.
Although sales Sales Completeness Accounting for a
orders are pre- sequence of sales
numbered, there orders can ensure that
is no sequence records are complete.
check Without this control,
completed. all sales may not be
recorded in the
accounts.

7.21 (a) 6 Check-digit verification


(b) 2 Validity code check

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 10
(c) 9 Hash total
(d) 1 Limit test
(e) 8 Financial total

7.22 (a) There are a number of application input controls that could prevent, or detect this
situation, including the following.
• Control totals: A batch total of the sum of customer payments could be used to
test the accuracy of data input.
• Key verification: Duplicate keying of data to detect errors of entry.
• Multiple data entry: The computer could require a number of data items to be
entered by the keypunch operator. For example, the keypunch operator could be
required to enter the customer code, the invoice code and the payment amount.
The computer would then check whether the invoice whose invoice code was
entered was made out to the customer whose customer code was entered, and
whether the invoice amount of the invoice whose invoice code was entered is
equal to the payment amount entered.
Note: Neither reasonableness tests, range tests, nor limit tests will prevent nor detect
this error, because customer payments could be of any amount.

(b) Controls that could prevent or detect this situation include the following.
• The staff hiring policy of the entity should be reviewed. Computer operators
should not have knowledge of computer programming.
• There should be electronic access controls, such as staff ID numbers, passwords
and dedicated terminals, which restrict access to the computer software and data
files. There should be different levels of access controls (authorisation tables),
which allow particular computer users to access only the software and data files
required to perform their job, and prevent access to other software and data files
that are not required.
• An activity log that records each access to every software program and data file
should be maintained. The activity log should be regularly reviewed in order to
identify any unauthorised access.

7.23
Control Type of Explanation
control
(a) IT The restriction on processing transactions is performed
application automatically by the new accounting system. It
control ensures the complete and accurate processing of data.
(b) IT The restriction on changing any of the data fields
application relates to specific accounting applications and is
control performed automatically by the new accounting
system. It ensures the complete and accurate

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 11
processing of data.

(c) IT The restriction on overriding the user name is


application performed automatically by the accounting system. It
control ensures the complete and accurate processing of data.
(d) Manual The reconciliation of the sales report is designed to
application ensure the complete and accurate processing of data,
control making this control an application control. As the
control is performed manually by the head of
accounting, it is a manual application control.
(e) IT general The backing up of data is not an intrinsic function of
control the new accounting system and is not designed to
ensure the complete and accurate processing of data
(that is, inaccurate data can be backed up). Rather, the
back-up of data is a control around the environment in
which the accounting system operates.
(f) IT The restriction on posting transactions is performed
application automatically by the new accounting systems. It
control ensures the complete and accurate processing of data.
(g) IT The restriction on entering negative values is
application performed automatically by the new accounting
control system. It ensures the complete and accurate
processing of data.
(h) IT general The training and helpdesk functions are not intrinsic
control functions of the new accounting system and are not
specifically designed to ensure the complete and
accurate processing of data for any specific
application.
(i) IT general The password access is not an intrinsic function of the
control new accounting system and is not designed to ensure
the complete and accurate processing of data.
Password access protects the environment in which the
accounting system operates.
7.24
(a) (i) Audit risk (ii) Control activity
Functionality from the old system Users involved in the testing, or who have
may not be provided in the new signed off on test results, need to prove the
system (i.e. the new system does new system meets their requirements.
not meet business requirements).

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 12
All IT systems are different and Staff not provided login access until they
staff have not been trained to use have completed appropriate training.
the new system and so may make
errors.
Data from the old system may not Data migration reconciliation completed
have been transferred properly to and signed off by user (to show all data
the new system (e.g. customer from the old system was correctly migrated
codes, rates, and history). to the new system).

b) Each time there is a version upgrade, the software changes of the previous
upgrades may be reversed, which means that the system will not operate correctly,
resulting in potential accounting (postings) errors and billing (customer accounts
receivable) errors.
7.25 (a)
Reasons why IT control risk assessment is Business risk
important
Many of the systems that are not integrated. Critical information may not be
IT control risk assessment is important to available to the business in order to
determine the likelihood of data being make decisions about performance,
incorrectly recorded when transferred to cash flow, etc.
GLI—especially as they are relying on an
interface routine (e.g. general ledger).
There is a variety of home-grown systems The operational requirements of the
and databases. An IT control risk assessment business may not be met. This could
is important in determining whether all the potentially lead to the loss of
systems are properly maintained or customers and suppliers, with a
supported. consequent impact on cash flow and
profit.
Smaller information transfers are done Individual fraud and the incorrect
manually, including payroll transactions. An transcription of information may lead
IT control risk assessment is important in to a loss of profit and impact on
determining the potential for fraud and the business performance as well as
incorrect transcription of the relevant reputational damage.
information.
Responsibility for fixing errors in large- Errors may remain in GLI or new
volume transactions lies with the respective errors created, which may lead to the
business process owners rather than the IT operational requirements of the
department. An IT control risk assessment is business not being met. This could
important to determine the likelihood of potentially lead to the loss of
errors remaining in the system as well as the customers and suppliers, with a
likelihood of new errors being introduced. consequent impact on cash flow and
profit.

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 13
Several sensitive applications such as Non-functioning general and IT
inventory, payroll and purchasing have application controls may lead to
potential control weaknesses—they are used critical information not being
by business users who may not adhere to the available to the business, individual
IT general controls in place. As such, an IT fraud and the incorrect transcription
control risk assessment becomes important in of information, all of which may lead
order to determine whether general controls to the loss of customers and
are being adhered to and to assess the impact suppliers.
on the IT general controls.
There is no formal process for periodically A non-functioning backup system
testing the backup media in order to test the leads to the risk that business critical
recovery of information from backups. An IT files (i.e. customer records, etc.) will
control risk assessment is important in be lost in the event of an IT system
determining whether backup information is, problem.
in fact, recoverable.

(b)
Control that should be in place How the control functions
Password access to the IT area If the user does not have the correct password,
they will be unable to gain access to the IT area.
Password access to the software If the user does not have the correct password,
they will be unable to log onto the software.
Off-site storage of data/backup Backup data is saved at an off-site location so
tapes that power surges, data corruption etc. does not
permanently destroy information.
Firewall A firewall will prevent hacker access to IT
systems.
Anti-virus software Anti-virus software should prevent malicious
software from being installed on GLI and detect
and fix any viruses.
Segregation of duties between Independent review of work performed will
business process owners and IT prevent fraudulent manipulation of the IT
staff (e.g. access to systems, data system.
etc.)
There is a quality assurance Correct allocation of staff ensures that the IT
process to ensure that software is application controls of GLI work effectively.
supported by those who are expert
in the workings of GLI.
There is a quality assurance User driven sign-off procedures ensure that
process to ensure that user-driven users can use the system in a manner that is
sign-off procedures are in place. unlikely to lead to control breaches or
inadvertent errors.
There is a quality assurance Correctly trained users (with support) ensure

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 14
process to ensure that users of the that inadvertent control breaches will not occur
system have been correctly trained and that the system is used correctly.
and have access to support.
There is a quality assurance Employment of the correct software version
process to ensure that software ensures that the IT application controls function
development and production as intended and that there are no inadvertent
versions are controlled and system errors.
correctly managed.

7.26 The internal audit department is a part of internal control, as one of its key
responsibilities is to review the internal control policies and procedures to ensure they
are operating as intended. It is therefore part of the monitoring part of the internal
control system.
Where controls, such as an effective internal audit department, are in place and
working satisfactorily, the auditor can usually assess control risk as less than high, as
it is more likely that the client will have picked up and corrected any errors in the
accounting system before the financial report is prepared. This enables the auditor to
reduce the level of substantive testing and should result in a more cost-effective audit.
However, before the auditor can rely on internal audit, similar to any other control,
the auditor needs to evaluate it and test it.
7.27 Your review of internal audit should cover the following matters;
Objectivity
• IAD reports to the CEO, who is also the chairman, via a monthly report that is
presented to the board. It would have been preferable for objectivity if the report
to the board had been through an independent director or the audit committee if
they had one.
• Although the work program is based on internal requests, it appears that it is still
under Samantha’s control and the objectivity of IAD has not been affected.
• Although some resources were switched from the audit of Sydney office to a
suspected travel fraud in Perth, this seems reasonable under the circumstances.
Ninety per cent of the current year’s work program has been achieved and the
objectivity of IAD has not been affected.
• The CEO’s request of Samantha to set aside 20% of IAD time to carry out a
performance audit on administrative procedures to save costs, rather than focusing
on compliance matters, indicates that there is pressure for IAD to be cost-effective
and pay its way. While spending this amount of time on performance audits is not
unreasonable, any further reductions in time available for compliance matters may
hamper IAD in achieving its compliance goal objectively and effectively.
• The fact that the board has paid little attention to IAD in the past does not affect
the objectivity of IAD.

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 15
Technical competence
• Although Samantha is not a member of IIA and does not have internal audit
experience, she has ‘Big 4’ audit experience. She is also aware of IIA standards
and so technical competence is not a problem.
• Graduate and assistant have little practical experience and are still completing
their studies. They will require close supervision.
• The ex-public sector auditors are not familiar with the industry or the company’s
systems and will require greater direction and supervision.
Systematic and disciplined approach
• Audit programs are being developed as each program is completed. It would be
more effective if the programs were written before the projects were undertake;,
however, this will be remedied over time.
Overall assessment
While the objectivity of the internal audit is not ideal, it appears that the work of IAD
could be used to reduce the auditor’s assessment of control risk. However, any
reliance would need to be supported by testing the work performed by IAD and
reviewing their working files.

CONTINUOUS CASE STUDY


7.28 a) Controls include:
• the digital library is backed up daily, with the backup tapes kept off site (IT
general control)
• the accounting system automatically stops the order for any publishers who have
exceeded their credit terms and limits (IT application control)
• when an order exceeds the credit limit, an authorisation from both the heads of
publishing and accounts is required for the transaction to proceed (manual control)
• the accounts receivable clerk checks the prices and arithmetic accuracy of the
invoices and signs the invoice as evidence of her check (manual control)
• the cashier then reconciles the total of the batch postings to accounts receivable to
the amount banked for the day (manual control)
• the assistant accountant prepares a bank reconciliation each month (manual
control)
• segregation of duties between accounts receivable and cash handling functions
(manual control).

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 16
(b) Control weakness (c) Account Why account balance is (d)
balances at at risk Assertion
risk at risk
An accounts payable Inventory Clerks are manually Valuation
clerk does all the entering their calculations and
Accounts
calculations for of purchases of inventory allocation
payable
inventory stock and stock with multiple
accounts payable and currencies. Without an
their work is not independent party
confirmed or checked checking their
by an independent calculations, inventory
party. stock and accounts payable
may be recorded at
incorrect values.
General and accounts Accounts This may lead to Existence
receivables ledgers are receivable inaccurate general and
updated prior to the receivables ledgers, as Occurrence
Sales
dispatch of books to sales are recorded before
customers, with no the sales order is Cut-off
check that the order is dispatched. If print orders
correct. are incorrect, this may lead
to sales being recorded in
the incorrect period, as the
customer does not accept
liability until the goods are
received and are accepted
as being in accordance
with the purchase order.

7.29
(a) Audit risk Justification (b) Control activity
New system may not IT manager claims Running the two systems in
integrate properly that there was parallel until the new system can
with other existing insufficient time to be adequately tested.
systems or may do proper testing
contain bugs that need before going live.
to be worked out, Since installation IT
resulting in errors. manager has
identified cut-off
errors resulting from
problems interfacing
with an existing
software system.

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 17
Data from the old IT manager claims Data migration reconciliation
system may not have that there was completed and signed off by
been transferred insufficient time to users to confirm that all data
accurately to the new do proper from the old system was
system. reconciliations. transferred correctly to the new
system.

Instructor Resource Manual t/a Auditing and Assurance Services in Australia 6e by Gay & Simnett
© McGraw-Hill Education (Australia) 2015
Chapter 7 18
Another random document with
no related content on Scribd:
128—Squatter Dick. By Jos. E. Badger.
129—The Child Spy. By George Gleason.
130—Mink Coat. By Jos. E. Badger.
131—Red Plume. By J. Stanley Henderson.
132—Clyde, the Trailer. By Maro O. Rolfe.
133—The Lost Cache. J. Stanley Henderson.
134—The Cannibal Chief. Paul J. Prescott.
135—Karaibo. By J. Stanley Henderson.
136—Scarlet Moccasin. By Paul Bibbs.
137—Kidnapped. By J. Stanley Henderson.
138—Maid of the Mountain. By Hamilton.
139—The Scioto Scouts. By Ed. Willett.
140—The Border Renegade. By Badger.
141—The Mute Chief. By C.D. Clark.
142—Boone, the Hunter. By Whittaker.
143—Mountain Kate. By Jos. E. Badger, Jr.
144—The Red Scalper. By W.J. Hamilton.
145—The Lone Chief. By Jos. E. Badger, Jr.
146—The Silver Bugle. Lieut. Col. Hazleton.
147—Chinga, the Cheyenne. By Edward S. Ellis. Ready
148—The Tangled Trail. By Major Max Martine. Ready
149—The Unseen Hand. By J. Stanley Henderson. Ready
150—The Lone Indian. By Capt. Chas. Howard. Ready
151—The Branded Brave. By Paul Bibbs. Ready
152—Billy Bowlegs, the Seminole Chief. Ready April 20th.
153—The Valley Scout. By Seelin Robins. Ready May 4.
154—Red Jacket, the Huron. By Paul Bibbs. Ready May 18th.
BEADLE AND ADAMS, Publishers, 98 William Street, New York
*** END OF THE PROJECT GUTENBERG EBOOK MAD
ANTHONY'S SCOUTS; OR, THE RANGERS OF KENTUCKY ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying copyright
royalties. Special rules, set forth in the General Terms of Use part of
this license, apply to copying and distributing Project Gutenberg™
electronic works to protect the PROJECT GUTENBERG™ concept
and trademark. Project Gutenberg is a registered trademark, and
may not be used if you charge for an eBook, except by following the
terms of the trademark license, including paying royalties for use of
the Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is very
easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund from
the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law in
the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms of
this agreement by keeping this work in the same format with its
attached full Project Gutenberg™ License when you share it without
charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears, or
with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning of
this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1 with
active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or expense
to the user, provide a copy, a means of exporting a copy, or a means
of obtaining a copy upon request, of the work in its original “Plain
Vanilla ASCII” or other form. Any alternate format must include the
full Project Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in paragraph
1.F.3, the Project Gutenberg Literary Archive Foundation, the owner
of the Project Gutenberg™ trademark, and any other party
distributing a Project Gutenberg™ electronic work under this
agreement, disclaim all liability to you for damages, costs and
expenses, including legal fees. YOU AGREE THAT YOU HAVE NO
REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF
WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE
PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE
FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving it,
you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or entity
that provided you with the defective work may elect to provide a
replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the
Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and distribution
of Project Gutenberg™ electronic works, harmless from all liability,
costs and expenses, including legal fees, that arise directly or
indirectly from any of the following which you do or cause to occur:
(a) distribution of this or any Project Gutenberg™ work, (b)
alteration, modification, or additions or deletions to any Project
Gutenberg™ work, and (c) any Defect you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many small
donations ($1 to $5,000) are particularly important to maintaining tax
exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.

Project Gutenberg™ eBooks are often created from several printed


editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.

You might also like