Laserfiche WebLink
and results for the year. These expectations will assist in identifying anomalies and significant audit areas in <br />order to appropriately assess risk. <br />3. Data Acquisition <br />Sufficient planning, a strong initial risk assessment, and an adequate understanding of your systems will serve as <br />the foundation necessary to prepare our draft data request list. We will initially request information in written <br />format and conduct follow-up conversations helping CLA practitioners our staff share a mutual understanding of <br />the type of data requested and the format required. If there are going to be any challenges/obstacles related to <br />obtaining data, or obtaining data in the preferred format, they will generally be discovered at this point. <br />4. Technical Data Analysis <br />Technical analysis of the data requires the skillful blend of knowledge and technical <br />capability. Meaningful technical analysis provides the engagement team with a <br />better understanding of the organization. The additional clarity assists the <br />engagement team to better assess what is "normal" and, in turn, be better suited to <br />spot anomalies, red -flags and other indications of risk. Analytics generally fall into <br />five categories, each looking into the data set in a different way and deployed with a <br />different purpose. <br />S. Interpret Results and Subsequent Risk Assessment <br />Trends and anomalies will be identified through the performance of the above referenced analytics. Comments <br />regarding the interpretation of those trends and anomalies will be captured. When trends are identified they are <br />reconciled against expectations. For anomalies identified, the approach to further audit procedures will be <br />considered. <br />6. Response and Document <br />The last process is to capture responses and determine that our procedures are properly documented. <br />Abstracts, charts or summaries of both trends and anomalies are retained in the audit documentation to <br />support our identification of risks. Our analysis can be tailored and customized to help analyze an array of <br />information, including client specific and proprietary data. Key benefits of data analytics include: <br />• Built-in audit functionality including powerful, audit specific commands and a self -documenting audit <br />trail <br />• 100 percent data coverage, which means that certain audit procedures can be performed on entire <br />populations, and notjust samples <br />• Unlimited data access allows us to access and analyze data from virtually any computing environment <br />• Eliminates the need to extrapolate information from errors (a common effort when manually auditing <br />data) and allows for more precise conclusions <br />The below figure illustrates typical data analytics scenarios. <br />