Automating
the Confirmation Process
How
to Enhance Audit Effectiveness and Efficiency
By
George R. Aldhizer and James D. Cashell
APRIL
2006 - High-profile audit failures at Parmalat and CF Foods
point to a need to improve current audit confirmation practices.
In both audits, the manual confirmation process failed to
provide reliable evidence concerning the existence assertion
for cash and accounts-receivable balances. This failure was
caused by the inability of the manual confirmation process
to authenticate who completed the confirmation request.
In
the current manual confirmation environment, the auditor
controls the initial mailing of confirmation requests to
the client’s banks, accounts receivable customers,
and others. The identity and addresses of these parties,
however, is supplied by the auditee. An auditor cannot be
absolutely sure that the confirmation request is actually
received and completed by an objective and competent third-party
respondent.
Automating
the confirmation process should enhance a confirmation’s
effectiveness by improving respondent authentication, which
itself reduces the opportunity for confirmation fraud. As
with other automated applications, it also substantially
increases the efficiency of the confirmation process.
Limitations
of the Manual Confirmation Process
The
main limitations of the current manual confirmation practice
are a lack of respondent authentication, and process inefficiencies.
Specifically, Statement on Auditing Standards (SAS) 67,
The Confirmation Process, does not require the
auditor to validate the client-provided mailing addresses
or to verify the confirmation respondents’ competence
and objectivity. In addition, the current confirmation process
can be quite time-consuming and expensive. Administrative
tasks normally include preparing and mailing the initial
confirmation requests, sending out second requests, and
performing alternative procedures for nonresponses.
Difficulties
of authentication. In 1991, Doug Carmichael,
a professor at CUNY Baruch College, and chief auditor of
the PCAOB from 2004 to 2006, warned of weaknesses within
SAS 67 several months before its issuance. In “Pitfalls
in the Confirmation Process” (The CPA Journal,
June 1991), he suggested a requirement to authenticate,
rather than merely obtain an awareness of: the validity
of client-provided mailing addresses; the respondent’s
competence, knowledge, motivation, ability, or willingness
to respond; and the respondent’s objectivity and freedom
from bias. The final standard, however, did not address
these weaknesses, in part because the cost of compliance
would have been prohibitive. Unfortunately, the reduced
perception of detection resulting from the fact that SAS
67 does not require the above authentication appears to
have emboldened unethical management at companies like Parmalat
and CF Foods to engage in massive confirmation fraud schemes.
[According to many sources, including the Association of
Certified Fraud Examiners’ (ACFE) Fraud Examination
Manual (Criminology Section, 4.621), 2003, increasing
the perception of detection may be the most effective fraud-prevention
technique.]
Parmalat
overstated its cash assets by $4.9 billion—the equivalent
balance purportedly held in a Bank of America account in
a Parmalat Cayman Islands subsidiary, Bonlat Financing Corp.
This represented about 40% of Parmalat’s previously
reported total assets. During its audit in 2003, the then–Italian
arm of Grant Thornton received a signed cash confirmation
that included no exceptions related to the December 31,
2002, Bank of America cash-account balance. Had the above
weaknesses within a paper-based confirmation process been
investigated, the auditors would have discovered that the
client-provided mailing address, a Bank of America New York
branch, was not an authorized confirmation center; also
that the cash confirmation signature was a forgery of the
signature of a bank employee who was not authorized to process
confirmation requests. Such problems occur because auditors
normally do not verify signature authenticity or ascertain
the confirmation respondent’s competence and objectivity.
Forged signatures are difficult to detect unless firms invest
substantial resources in hiring signature experts.
Another
recent example of the authentication problem is provided
by the audit failure at CF Foods, a wholesale candy distribution
company that was found to have engaged in a massive Ponzi-type
investment scheme whereby returns paid to early investors
were generated from funds provided by later investors. To
hide this scheme, the general partner of CF Foods recorded
fictitious credits to sales and offset them with debits
to existing legitimate accounts-receivable accounts from
1994 to 1999. (According to Joseph T. Wells, “So That’s
Why It’s Called a Pyramid Scheme,” Journal
of Accountancy, October 2000, this is the most common
fictitious revenue accounting transaction.) While
this caused accounts-receivable balances to be overstated,
the auditor’s confirmation process failed to detect
the fraud. Shortly after the confirmations were sent out
by the auditor, the general partner of CF Foods intercepted
them by contacting the customers and telling them that the
confirmation requests had been sent out by mistake and should
be returned to him. The general partner then essentially
forged the customer’s signature by using an illegible
signature, and returned the confirmation request to the
auditor. [According to ACFE president and CEO (from 2002–2006)
Toby Bishop, fraudsters are highly consistent in returning
audit confirmation letters and signing them without noting
any exceptions.] The fraud was eventually detected, and
a subsequent investigation concluded that 97% of the previously
recorded sales and offsetting accounts receivable were bogus.
The
massive Parmalat and CF Foods confirmation frauds appear
to have gotten the AICPA’s and the PCAOB’s attention.
In response to a 2003 AICPA Practice Alert, the Auditing
Standards Board (ASB) recommended that the PCAOB consider
revisions to SAS 67, and reviewing this SAS has been one
of the PCAOB’s top 10 priorities.
In
2004, the PCAOB expressed concerns with existing cash confirmation
guidance. It noted, for example, that under SAS 67, if the
combined assessed level of inherent and control risk over
the existence of cash is perceived to be low, the auditor
may limit substantive procedures to inspecting client-provided
bank statements rather than confirming cash balances. Parmalat
and other companies have taken advantage of this exception
by scanning legitimate, year-end bank statements into their
information systems, inflating the account balances, and
then reprinting the documents for auditor use without detection
because the scanned documents look virtually identical to
the original documents. (See Floyd Norris, “Technology
to Fool Auditors: From Colored Pens to Computer Scanners,”
The New York Times, December 26, 2003.)
The
PCAOB also expressed concern about directing the confirmation
request to the appropriate individual who has knowledge
of the balance to be confirmed, and the increasing unwillingness
on the part of third parties to respond to confirmation
requests. According to the AICPA’s January 2004 CPA
Letter, third parties may be less willing to respond
to confirmations because, under Sarbanes-Oxley Act section
303, they may be held liable for not detecting fraud. The
PCAOB has yet to issue guidance addressing these concerns.
The
existing paper-based confirmation process has exposed auditors
to substantial legal liability over the past two decades.
[Besides Parmalat and CF Foods, confirmation fraud schemes
have been perpetrated by HealthSouth (1996 to 2001), Bio
Clinic (1994 to 1995), Sunrise Medical (1994 to 1995), BCCI
Bank (1988 to 1990), and ZZZZ Best (1985 to 1987).] Confirmation
respondents, such as financial institutions, have also experienced
increased legal liability as a result of not detecting confirmation
fraud schemes. For example, two accounting firms, Grant
Thornton and Deloitte Touche, have been sued for $10 billion,
and Bank of America has been sued for $10 billion for not
detecting the Parmalat confirmation fraud scheme. Citigroup
and Credit Suisse First Boston also have been sued for allegedly
worsening Parmalat’s financial condition by arranging
additional debt financing in 2003. These same entities are
likely to sue the accounting firms because they relied on
the audited financial statements, in part, as a basis for
deciding whether to provide additional debt financing.
As
a result of increased litigation risks, more organizations
are less willing to respond to not only cash confirmation
requests, but also accounts-receivable confirmation requests.
If this trend continues, it will significantly erode the
effectiveness of the audit confirmation process, in part
because auditors may have to rely on alternative procedures
that use potentially less reliable, internally generated
documents. (The ASB’s “Recommendations for the
Revision of SAS 67, The Confirmation Process,” issued
in November 2003, retains two SAS 67 conditions that, if
met, allow auditors to dispense with performing any alternative
procedures for nonresponses.)
Audit
efficiency limitations. In addition to audit
effectiveness concerns, the current manual confirmation
process is time-consuming and expensive. For example, preparing
the initial confirmation requests, analyzing the returned
confirmations, sending out second requests, and performing
alternative procedures when second requests are unanswered
requires several hours. Paper and postage also must be paid
for. It may also take three to four weeks for an auditor
to receive confirmations from respondents. This slow response
time is due in part to the numerous middlemen involved in
a manual confirmation process (e.g., the U.S. Postal Service,
the entity’s mailroom, completion by the applicable
staff, and return through a similar route). Using information
technology to automate the confirmation process can substantially
reduce the time required to send out and receive confirmation
requests, as well as help alleviate the previously discussed
authentication concerns.
Automating
the Confirmation Process
Two
key elements are necessary to ensure an effective automated
confirmation process:
-
Ensuring the privacy and security of the confirmation
communication, and
-
Establishing a way to authenticate the parties involved
in the confirmation process.
One
reason that automated confirmations have not been used earlier
is the lack of an appropriate infrastructure to bring the
auditor, the client, and the respondent together within
a secure network. At least one such infrastructure has been
developed by Capital Confirmation Inc. (CCI), and accounting
firms of all sizes have begun using it, and have reported
promising results. The authors are not aware of other software
vendors that provide a comparable service; however, larger
auditing software vendors are considering integrating CCI’s
service into their existing software packages. (Neither
author has any business or other financial relationship
with CCI.)
Ensuring
information privacy and security. An automated
confirmation process should have controls in place to enhance
the privacy and security of the communication between the
auditor, the client, and the confirmation respondent. Unprotected
communication could result in a loss of confidential information
or in potentially fraudulent confirmation evidence. Key
elements for ensuring the privacy and security of electronic
communications include the use of encryption and a secure
value-added network (VAN). [General Electric’s Internet
VAN, Global eXchange Services (www.gxs.com), presents a
useful template because it currently handles more than 30
million transactions a month to more than 35,000 trading
partners.]
A confidential
link can be established between the auditor and the confirming
party by using state-of-the-art encryption. This can be
accomplished, for example, by using 128-bit secure socket
layers (SSL) encryption, administered by Verisign (128-bit
SSL encryption is required to obtain the AICPA’s WebTrust
and SysTrust seals). In addition, sensitive confirmation
data should be stored in encrypted form within the VAN.
An
effective way to protect the VAN from unauthorized intrusion
is through firewalls, intrusion detection and prevention
systems (IDS and IPS), and daily vulnerability scans. Firewalls
should be capable of blocking suspicious incoming data packets,
and IDSs should use data-mining techniques to identify traffic
patterns associated with potential security breaches. Daily
vulnerability scans, such as those provided by hackersafe.com,
can be used to help ensure that the firewalls and IDS/IPSs
are effectively deterring external and internal attacks.
Authenticating
confirmation participants. For an automated
confirmation process to be effective, the auditor should
have some assurance that the confirmation request is received
by the intended recipient. Additionally, the responding
organization needs assurance that the auditor is who he
claims to be and has the client’s permission to request
the confirmation.
All
this can be accomplished by performing authentication checks
on all parties involved in the confirmation process (e.g.,
the accounting firm, the client, and the financial institution).
This should include verifying that the confirming entity
is a legitimate enterprise (not a “front company”
trying to steal sensitive information) by validating its
primary mailing address, telephone number, and business
license. Next, the authorized individual within the confirming
entity who will be directly involved in the confirmation
process should be identified. Appropriate questions should
be asked to ensure that the individual is qualified and
has access to the data necessary to respond. (Because ensuring
appropriate respondent qualifications may be time-consuming,
some individuals and businesses may not agree to participate
in this portion of the authentication program.)
When
an accounting firm is ready to send out an electronic confirmation
to a financial institution, the auditor responsible for
controlling the process should be required to enter a unique
user ID and password to access the secure VAN. State-of-the-art
password technology and procedures should be used to ensure
that the password is not compromised (e.g., long passwords
with a combination of letters, numerals, and symbols). Next,
the auditor should obtain and enter the client’s unique
ID and randomly generated password. This ensures that the
company has authorized the issuance of electronic confirmation
requests.
An
authentic and high-quality link can be established between
the auditor, the client, and the individual respondent by
using digital signatures that bind these three parties to
the exact contents of the electronic message. As of June
2000, digital signatures carry the same legal weight as
handwritten signatures. [The Electronic Signatures in Global
and National Commerce Act was signed by President Clinton
in June 2000 (15 USC 7001).] If access to a digital signature’s
private key is adequately safeguarded, a digital signature
may provide more assurance about an individual’s identity
than a handwritten signature. This is partly because most
auditors are not trained to detect fraudulent handwritten
signatures (e.g., tracing; illegible signatures).
Advantages
of Automating the Confirmation Process
The
benefits of automating the confirmation process include
a reduced risk of confirmation fraud, enhanced audit efficiency,
and enhanced compliance with recent audit standards.
Reduced
risk of confirmation fraud. A secure and authentic
link between the auditor and the confirmation respondent
provides assurance that: 1) the auditor’s and financial
institution’s or other respondent’s mailing
addresses are legitimate; 2) the individual auditor has
approval from the audit firm and the client to send the
confirmation request; 3) the individual respondent has appropriate
authority to reply to the confirmation request; and 4) the
confirmation “signature” is legitimate and can
be traced back to the individual respondent. This significantly
reduces the risk of confirmation fraud, such as having the
confirmation request intercepted by an unethical manager
and returned with a forged signature. It should also reduce
both the auditor’s and respondent’s legal liability
over the confirmation process.
Enhanced
audit efficiency. SAS 67 requires auditors
to control the initial mailing and the subsequent receipt
of confirmation responses. The time spent doing this can
be substantial. With electronic confirmations, however,
the Internet is used to send the initial confirmations,
and auditors receive real-time updates as confirmations
are returned directly by respondents.
Furthermore,
in response to the AICPA’s 2003 Practice Alert, the
ASB recommended that SAS 67 require auditors to control
the initial preparation of confirmation requests. This should
enhance the reliability of the confirmation process because
companies will not know in advance which accounts are being
confirmed. It is, however, another time-consuming task in
a manual confirmation environment. In an electronic environment,
this task can be completed more efficiently by using drop-down
menu options for adding and selecting accounts to be confirmed.
In
addition to initial confirmation requests, auditors are
also required to control the mailing of second requests.
In a paper-based environment, a large number of initial
confirmation requests are either not returned or are returned
too late for the auditor to adequately investigate any discrepancies.
This is partly because auditors may take several weeks to
prepare the confirmations for mailing after the “as
of” date, and the confirmations may be subsequently
held up or misplaced in the delivery process. By this time,
some enterprise resource planning (ERP) systems may have
already overwritten prior-period transaction records, making
it extremely difficult for potential respondents to provide
the requested data. Electronic confirmations should significantly
reduce the time required to prepare the confirmation requests,
thus increasing the rate of return from the initial mailing
and reducing the number of second requests. The intermediaries
in a manual confirmation process are eliminated, reducing
the likelihood of delayed or misplaced confirmation requests.
The enhanced electronic authentication should reduce the
respondents’ legal liability concerns, making them
more willing to respond.
The
need for second requests can be further reduced by instituting
controls within the automated process to ensure that initial
requests are properly completed. For example, embedded edit
checks can require all key electronic fields to be completed
before the request is sent. If a key field is not completed,
the respondent will immediately receive an error message
highlighting the missing fields. This may be especially
important when dealing with critical revenue transaction
issues such as side agreements. [The ASB’s November
2003 recommendations and the PCAOB’s September 2004
“discussion questions” address the possibility
of requiring auditors to confirm the terms of revenue transactions
(for example, in accordance with SAB 101); they also address
the risk that side agreements (e.g., liberal return and
refund policies) may significantly jeopardize the fair presentation
of revenue account balances.]
Generating
a higher rate of completed confirmations means that auditors
will spend less time on alternative procedures that are
often less reliable because they rely on documents the auditee
has internally generated (e.g., invoices) or has had in
its possession (e.g., scanned bank statements). In the absence
of strong information-security controls, such documents
can be easily manipulated and therefore have low reliability
for the auditor.
Other
advantages of electronic confirmations include quicker response
times and more efficiently prepared summaries. For example,
because the confirmation requests appear immediately on
the computer desktops, electronic responses are likely to
be received by the auditor within a few days, while paper-based
responses may not be received for three to four weeks. Faster
response times give auditors more time to investigate discrepancies.
In addition, electronic systems can easily be programmed
to summarize all returned confirmations in a report that
can be automatically updated and downloaded directly into
the audit workpapers.
Enhanced
compliance with audit standards. Using electronic
confirmations may become necessary to respond to the current
audit environment. SAS 99 (Fraud Detection in a GAAS
Audit) states that auditors should assume that the
revenue cycle is high-risk for fraud on every engagement.
This is supported by a recent study of SEC accounting and
auditing enforcement releases (AAER) from 1992 to 2000 (Dale
Martin, George Aldhizer, John Campbell, and Terry Baker,
“When Earnings Management Becomes Fraud: Implications
for Internal Auditors,” Internal Auditing,
July/August 2002). This study found that 74% of all AAERs
involved overstating revenue (e.g., through premature revenue
recognition or the recognition of fictitious revenue) or,
to a lesser extent, understating revenue (e.g., through
improperly shifting revenue to a subsequent period).
SAS
99 also requires auditors to adjust the nature, timing,
and extent of their audit procedures in response to identified
fraud risks. With a heightened risk of fictitious revenues,
this may include issuing accounts receivable and cash confirmations
at multiple times during the year and increasing sample
sizes, with substantial administrative costs and three-to-four-week
turn-around times using paper-based confirmations.
Although
the initial costs of getting into electronic confirmations
are fairly high, these costs should decline significantly
over time as accounting firms build their own infrastructure
or an external service provider expands its capabilities.
CCI has claimed that its service is often less costly than
using a paper-based confirmation process.
Expanding
the Scope of SAS 67
The
authors agree with the PCAOB that SAS 67 should be expanded
to require not only accounts-receivable confirmations but
also cash confirmations on every audit. Third-party confirmations
obtained through a secure VAN are more persuasive than internally
generated documentation for supporting the existence of
accounts receivable and cash balances. With more than $17
billion of outstanding debt at the height of the Parmalat
fraud, another benefit of requiring cash confirmations is
the ability to confirm client lines of credit, for example,
with various financial institutions.
The
authors also concur with the ASB and the PCAOB that SAS
67 should provide guidance about how auditors can increase
their use of accounts-payable confirmations. Accounts-payable
confirmations appear justified, in part, by the results
of the ACFE’s recent report and a recent study of
the SEC’s AAERs. Both studies found improper expense
recognition (e.g., understated expenses and corresponding
current liabilities) to be the second-most common fraudulent
financial reporting scheme. [Recent examples include CKE
Restaurants (2002 to 2005), Aurora Foods (late 1990s), and
Leslie Fay (1988 to 1991).] A secure, automated accounts-payable
confirmation process might have detected these schemes on
a more timely basis.
The
authors also agree with the PCAOB that other accounts, such
as marketable securities and investments, especially derivative
instruments, should be considered for inclusion in SAS 67.
This is partly because of the phenomenal growth of high-risk
derivative and hedging instruments over the past decade.
Recent derivative investment debacles at Fannie Mae, CAO
Singapore, and the National Australian Bank appear to justify
this expanded focus.
George
R. Aldhizer III, PhD, CPA, CIA, CFE, is an associate
professor and the PricewaterhouseCoopers Faculty Fellow in
Auditing at the Calloway School of Business and Accountancy
of Wake Forest University, Winston-Salem, N.C.
James D. Cashell, PhD, CPA, is the C. Rollin
Niswonger Professor of Accountancy at the R.T. Farmer School
of Business Administration of Miami University, Oxford, Ohio. |