Premium Essay

Client Memo

In:

Submitted By eahweekly
Words 521
Pages 3
SAS 115 Changes and Benefits

COM/530
April 23, 2012

SAS 115 Changes and Benefits
MEMORANDUM
TO: Valued Clients
FROM:
DATE: April 23, 2012 SUBJECT: SAS 115 Changes and Benefits CC: Supervisor Dear Valued Client,
In a recent move toward improving company communications pertaining to internal control matters it has been brought to our attention in this effort to provide the best service for clients Statement on Auditing Standards (SAS) No. 112 has been removed and replaced with SAS 115, which is in effect for audits being performed on or after December 15, 2009.
Definitions
Internal control is the method put into place by a company to be sure the integrity of financial and accounting information, meets operational, profitability targets, and transmit management policies throughout the organization (Investopedia).
Control deficiency is the result of the design or operation of the control not allowing management, employees to prevent, or correct financial misstatements (Ken Plessner CPA).
Material weakness occurs with the possibility of the material misstatement not being prevented, detected, and corrected on a timely basis (Ken Plessner CPA).
Significant deficiency requires attention by those in charge but is not as severe as material weakness (Ken Plessner CPA).
SAS 115 allows the practitioners to more effectively use their judgment when they become aware of and determine the severity of the deficiency found. If it is determined the deficiency is severe enough, they will report it in writing, to management, and administration (Ken Plessner CPA).
Benefits of the changes
As with SAS 112, SAS 115 promotes clients understanding of their organization’s internal control weaknesses, which can benefit them in several ways, including (Thomas J. Ryan): * Written communication clarifies identified deficiencies determined to be

Similar Documents

Premium Essay

Client Memo

...Client Memo To: Bob Supervisor From: CC: Joe Schmoe, Schmoe Trucking Date: 8/26/2013 Re: Leasing Options Schmoe Trucking has been presented with an opportunity that will require adding an additional 20 trailers to the ones they currently own. While there is an uncertainty to the length of the potential relationship, there is considerable potential for growth. As requested, I have spent the past few days examining the current FASB standards on leases to determine what the best course of action for Schmoe Trucking would be. There are a number of options when it comes to leasing, and it is vital that each option is examines in order to determine the proper course of action. There are a few things about leases that must be looked at before determining how to proceed. Leases are broken down into two categories; operating leases and capital leases. A capital lease is one that meets certain criteria and capital leases can be broken into subcategories; sales type leases and direct financing leases. We will be looking at the differences between sales type leases, operating leases, and direct financing leases in relation to the proposed acquisition of additional trailers. The first step is to determine if a lease is an operating lease or a capital lease. A capital lease will meet at least one of the following criteria. SAFS No. 13 outlines the capital lease criteria to be as follows; transfer of ownership of the leased item upon completion of the lease period...

Words: 718 - Pages: 3

Premium Essay

Memo to Clients

...Memorandum To: All Clients From: Jennifer Lopez – Junior Accountant Date: September 03, 2012 Subject: SAS 115 - Statement on Accounting Standards CC: Learning Team B As your accounting firm, we will continue to provide you with professional, accurate, financial information. As your auditor of choice, know that we follow the rules and guidelines set forth under the Statement of Accounting Standards (SAS) to ensure your financial auditing needs are met. We appreciate your continued business and will forever strive to ensure our relationship is strong. Whether or not you have an accounting background, our reports are designed to thorough and easy to understand. Recently the SAS has added a rule, SAS 115, which requires that auditors practice and states that our communication with you is our priority, and we must disclose certain information. This amendment is important as its intention is to reduce communication and expectation issues. Please note that there are now four categories for the expanded disclosure (Turner, Mock, Coram, & Gray, 2010): 1. The actual Audit; 2. The quality of the financial statements; 3. The quality of the financial reporting system; and 4. The sustainability of your business. Each of the categories above will provide detailed information including our level of assurance, research, and reasons for the audit. Additionally, we will openly and constructively communicate our accounting practices, express in writing the details...

Words: 333 - Pages: 2

Premium Essay

Client Memo

...M E M O R A N D U M To: Clients From: Team B, University of Phoenix Date: July 23, 2012 Re: Changes in Statement of Accounting Standards No. 115 (SAS No. 115) As key clients to Team B, we would like to take this opportunity to inform you of the current changes in the Statement of Accounting Standards. On October 2008, the AICPA Standards Board issued a new standard called Communicating Internal Control Related Matters Identified in an Audit (SAS No. 115). This policy was created to guide external auditors on how they should communicate with internal controls on deficiencies of their financial reporting of the financial statements. SAS No. 115 provides the following definitions of deficiencies in internal control, material weaknesses, and significant deficiencies: Deficiencies in Internal Control. A deficiency in internal control exists when the design or operation of a control does not allow management or employees, in the normal course of performing their assigned functions, to prevent, or detect, and correct misstatements on a timely basis (AICPA, 2006-2012). Material Weaknesses. A material weakness is a deficiency, or combination of deficiencies, in internal control, such that there is a reasonable possibility that a material misstatement of the entity’s financial statements will not be prevented, or detected, and corrected on a timely basis (AICPA, 2006-2012). Significant Deficiencies. A significant deficiency is a deficiency, or a combination of...

Words: 310 - Pages: 2

Free Essay

Client Memo to Monitor Company

...MEMORANDUM Date To: Monitor Company Directors From: Consultant Subject: Coordination of diversity efforts at Monitor Company BACKGROUND Recently you informed me that Monitor Company does not have a single vision for diversity and you have asked if this would be either damaging or helpful in the firm’s task of increasing diversity efforts. A few incidents or events triggered Monitor to begin thinking about diversity and inclusion programs. Currently there are three separate initiatives: the Advisor Network, Harassment Training and a series of seminars for women, and the Diversity Network. The purpose of the Advisors Network is to provide an outlet and resource for employees who need advice on issues such as succeeding at Monitor as either a woman, a person of color, or a GLBT employee. That initiative was created after the “Definition of Purpose” exercise done in 1993 surfaced issues related to the homogenous culture of the firm. Sexual Harassment and Sensitivity Training was deemed necessary after a 1991 director’s meeting. In that meeting, CFO David Kaplan stressed the need for “professional courtesy” training, and then the two female directors, Liz Martineau and Caroline Firstbrook disclosed that they had experienced “gender-related insensitivity”. Another thought of Martineau and Firstbrook was that female consultants were in need of role models to help guide them through the barriers of being a female in the consulting industry, which led to a seminar in 1994 geared...

Words: 1094 - Pages: 5

Free Essay

What Is the Difference Between Web-Based Email Architecture and Simple Mail Transfer Protocol-Based Two-Tier Client-Server Architecture

...text. Based on the scenario, create the deliverables listed below. Fred Jones, a distant relative of yours and president of Deals-R-Us Brokers (DRUB), has come to you for advice. DRUB is a small brokerage house that enables its clients to buy and sell stocks over the Internet, as well as place traditional orders by phone or fax. DRUB has just decided to install a new email package. One vendor is offering an SMTP(Simple Mail Transfer Protocol).-based two-tier client-server architecture. The second vendor is offering a Web-based email architecture. Fred doesn’t understand either one but thinks the Web-based one should be better because, in his words, “The Web is the future.” a. Briefly explain to Fred, in layperson’s terms, the differences between the two. b. Outline the pros and cons of the two alternatives and make a recommendation to Fred about which is better. Part A - Assignment Deliverables: Client-server architectures attempt to balance the processing between the client and the server by having both do some of the logic. a) Write a memo to Fred that explains the differences between the two options. Be sure to explain the difference in terms Fred will understand, since he does not know much about technology or networks. b) In the memo outline the pros and cons of the two alternatives and make a recommendation to Fred. Part B: Part B - Assignment Scenario: Read the ‘Accurate Accounting’ scenario on page 67. One day, Diego sends you an email with the...

Words: 539 - Pages: 3

Premium Essay

Issc340 Week 1 Assignment

...the transmission media (wired or wireless) 5: the use of specific protocols (the language used to communicate between computers) 6: the LAN's inter-connectivity (how the LAN shares with other networks) 2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100) A network operating system (NOS) manages the resources used within the network and enebles select services to select nodes. A NOS consists of two main components: a server component and a client component. The server component is the most complex component that runs on the server. The server component can do many things, to include; manage multiple users, provide access to files and printers, provide internet access, and enforce network security protocols. The client component runs on the client machine and enables the client to participate on the network. A NOS client component enables client systems to “see” and access network storage locations as if they were on the client machine. 3. Match each term below with the correct definition. Answer: 1 - _C_ 2 - _E_ 3 - _D_ 4 - _A_ 5 -...

Words: 270 - Pages: 2

Premium Essay

Nt1330 Unit 6

...1.Describe the purpose of an RPC. A) Remote Procedure Call (RPC) provides a different pattern for accessing network services.It provides Instead of accessing remote services by sending and receiving messages, a client invokes services by making a local procedure call. The local procedure hides the details of the network communication. The main purpose of RPC is to hide the existence of the network from a program.RPC is especially well suited for client-server (e.g., query-response) interaction in which the flow of control alternates between the client and server. Conceptually, the client and server do not both execute at the same time. Instead, the thread of execution jumps from the caller to the callee and then back again. 2. When two computers request a connection, what are the four primary actions that the Session Layer takes? A)the two...

Words: 506 - Pages: 3

Premium Essay

Client Technology Tracking System Milestone2

...PROBLEMS, OPPORTUNITIES, OBJECTIVES AND CONSTRAINTS MATRIX |Project: Client Technology Tracking System |Project Manager: Peter Charles | |Created by: Anna Kelly |Last Updated by: Anna Kelly | |Date Created: 09/22/2011 |Date Last Updated: 09/22/2011 | |CAUSE AND EFFECT ANALYSIS |SYSTEM IMPROVEMENT OBJECTIVES | |Problem or Opportunity |Causes and Effects |System Objective |System Constraint | |The current system dose not accurately track |The papers placed in the three-ring binder are |A searchable database with configuration |Nixed the idea of having configuration and | |configuration information, leading to wasted time |disorganized so the information is never really |information is needed. |component information...

Words: 638 - Pages: 3

Premium Essay

Booger

...Result Therapeutic Result: Correct Rationale Displaying a caring attitude supports the establishment of a therapeutic relationship by conveying genuine concern and a feeling of emotional closeness, which results in the nurse’s ability to achieve a greater level of communication and understanding with the client. Technique 3 Selected Option/ Result Therapeutic Result: Correct Rationale Clarifying is a therapeutic communication technique because it allows the nurse to validate the message received to ensure that both the nurse and client have a mutual interpretation of the message. Page 1 of 3 Report Created on: 10/19/2015 06:47 PM EDT REP_NTIndv_CommModuleReport_1_0 Technique 4 Selected Option/ Result Therapeutic Result: Correct Rationale Focused questions are a therapeutic communication technique because they allow the nurse to clarify a message, collect data, encourage feedback, and confirm the client’s ideas and beliefs. Technique 5 Selected Option/ Result Nontherapeutic Result: Correct Rationale Shaming is an ineffective style of interpersonal communication because the nurse mistreats a client or health team member with communication that belittles the other person,...

Words: 530 - Pages: 3

Premium Essay

Pos 355

...Network The way to begin developing the system architecture is to decide how the new system will spread information in different locations. Riordan Manufacturing's operational network allows each of their locations to transmit information for communication. Their corporate headquarters's new human resource system (HRIS) will be installed by NAS Iomega network storage. Riordan's three locations will be connected to San Jose by the wide area network connection (WAN), which communicates at T1 connection speeds. The network server relays its information to the human client computers each location uses. Each location's human resources department can then have access to important information, accessed via their local client server computers. Process All of the files that the human resources department needs for their procedures will be saved to the HR system on the main server at corporate headquarters. The HRIS system will store this information on its employees via Riordan's intranet: • Employee files – includes resumes, performance reviews, and other important information. • Job descriptions – explains a job's functions and the education it requires. • Electronic job posting – lists job openings in multiple locations. • Employee handbook – employees can access the handbook electronically. • Policies and procedures – a place to find the company's policies and operating standards. • Employee file updates – Lets...

Words: 435 - Pages: 2

Premium Essay

Checkpoint

...• How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization? E-mails benefit an organization by giving the opportunity to send out information instantly rather than mailing it to client your potential customers. Emails offer a way to save cost on printing information it is paperless so not only is it cost effective but it is also eco friendly. Emailing can increase productivity because it will cut down on waiting for information to get to one place. Emails can also be sent to multiple people at once. An organization may want to limit the time employees use emails during work hour to cut down on loss of productivity. If it is work related then I think organization will not have a problem as long as you are not using emails for personal communications. Employers may also want to limit the time employees on emailing because it is security issue sensitive information can be leaked if the wrong person receives a email with companies information that is not intended for the general public. The path of a email can be insecure, the email path can be broken, it can get delayed, or it may even disappear all together, When an email paths is directed to a person or persons it can also be miss directed to the wrong person by accident and can be leaked out and spread through the...

Words: 255 - Pages: 2

Free Essay

Asdf

... 2006-08-10. Valparaiso, Chile. Each night I’ve been working until the cold winter morning in order to discover a method of communicating via clouds. As of yet, I am unsuccessful. 2006-08-15. Valparaiso, Chile. One project is almost done and I can put it online soon. It’s a theorem database and automated proof thingy for topological spaces. I made it so that I could learn Ruby on Rails - which is hot. 2006-12-09. Buenos Aires. I just got a contract to do a big website. $ + work = travels to tierra del fuego in January. 2006-12-18. Buenos Aires. HTTP upload progress bars are rather obfuscated- they typically involve a process running on the server keeping track of the size of the tempfile that the HTTP server is writing to, then on the client side an AJAX call is made every couple seconds to the server during the upload to ask for the progress of the upload. This is pretty ridiculous. http://four.livejournal.com/730831.html Ebb web server. Like Thin but using libev instead of EventMachine http://ebb.rubyforge.org/ http://squeezebox.rubyforge.org/ Precursor to libuv–the just the C parts of Ebb. Unix only. http://tinyclouds.org/libebb 2007-12-06. Cologne. I’m working on a new HTML templating language using javascript. The language uses indention white space to build a XML hierarchy, the Haml syntax. In and...

Words: 1058 - Pages: 5

Premium Essay

Networks 621

...FACULTY OF MEDIA, INFORMATION & COMMUNICATION TECHNOLOGY DIPLOMA IN INFORMATION TECHNOLOGY (2 YEAR) NETWORKS 621 1ST SEMESTER ASSIGNMENT Name & Surname: ____________________________________________ ICAS No: _________________ Qualification: ______________________ Semester: _____ Module Name: __________________________ Date Submitted: ___________ ASSESSMENT CRITERIA QUESTION ONE QUESTION TWO GENERIC TO BOTH QUESTIONS LAYOUT AND SPELLING Font – Calibri 12 Line Spacing – 1.0 Margin should be justified. REFERENCE According to the Harvard Method TOTAL MARK ALLOCATION 35 30 15 5 EXAMINER MARKS MODERATOR MARKS 10 80 Examiner’s Comments: Moderator’s Comments: Signature of Examiner: Signature of Moderator: The purpose of an assignment is to ensure that the Learner is able to:      Use methods of enquiry and research in a disciplined field. Interpret and evaluate text. Have a sound understanding of key principles and theories, rules and awareness. Solve unfamiliar problems using correct procedures as well as investigate and critically analyse information and report thereof. Present and communicate information reliably and coherently. Page 1 of 4 Instructions and guidelines for writing assignments 1. Use the correct cover page provided by the institution. 2. All essay type assignments must include the following: 2.1 Table of contents 2.2 Introduction 2.3 Main body with subheadings 2.4 Conclusions and recommendations 2.5 Bibliography 3. The length of the entire assignment must...

Words: 777 - Pages: 4

Free Essay

Big Man

...Keep the first copy in the office the other two is given to the contractor. 2. Call API & Toronto Fire Dept. / Log the operators # into the Fire Panel Log 3. Email Kathy, Shane, Ray, Brad & Dispatch. When putting the system back online please follow steps 2 and 3. (It is very important that emails get sent out in order for the client to be up to date!) Requesting Service: When requesting for Elevator/ Escalator Service: 1. Email (Kathy, Shane, Ray, Brad, Dispatch & Tony) explaining details of what’s not working, please incl. the reference number of the service that has been requested. 2. When the technician arrives on site please be sure, they are signed in, and given a badge. Do not forget to sign them out, once finished. 3. Email everyone that is mentioned at point #1 informing whether the elevator/ escalator is back to service and any other details in regards to the incident. Remember to send emails about everything that is happening in the premises so there’s no reason to have complains!! * Please be advised that in order to send Reports to the iPhone email to forward it to the client and dispatch; from now on you will be using vpstockyards@gmail.com; password: TheStockyards!23. DO NOT use your personal email to get any incident report forward to the iPhone...

Words: 256 - Pages: 2

Free Essay

Week 5 Case Study

...Week 5 Case Study Risk Management Policy By Jovan Kirby SEC 280 Professor T. Campbell DeVry University Risk management is the process of making and carrying out decisions that will minimize the adverse effect of accidental losses upon our company. The risk management process is vital to the personal health and safety of employees and the safety of the public. In financial terms, it is vital to our ability to pursue our goals, commence and operate programs, and to perform duties in an efficient and professional manner. We will implement a plan to cover credit card theft and as well as internal breach of personal company information. Some ways to protect against credit card information being compromised is this. We have implemented some ways such as firewalls, restricted policies, and proxy servers. We will go through each one and explain why and how they will make this company stronger and better. First firewalls using a firewall will help build a strong defense. A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. For example, if a firewall is configured with a rule to block Telnet access, then the firewall will drop packets destined for TCP port number 23, the port where a Telnet server application would be listening. The role of a firewall is to prevent malicious traffic reaching the resources that it is protecting. Some security experts feel this is an outdated...

Words: 765 - Pages: 4