1. How are off-balance-sheet transactions and commitments tracked and reported?

2. How are forecasting and budgeting done? How many tools are used?

3. How are reports generated? What tools are used?

4. What parts of the process are manual and what parts are automated?

5. How are key measures (drivers of financial results) delivered to operational managers’ desktops?

6. What types of financial transactions are flagged and how?

7. How often is documentation updated for changes to internal processes controlling financial transactions?

8. What procedures are in place by the company to detect and prevent fraud?

9. How often are documents backed up to ensure reports and information are maintained? What is the retention policy for electronic information?

10. What controls are in place over record retention to avoid tampering with the data?

QuickLink 068713

Related article:

Avoid the SOX documentation nightmare with these 5 tips



Related Download
The State of Endpoint Protection & Management: Why Self-Healing is the New Mandate Sponsor: Absolute Software
The State of Endpoint Protection & Management: Why Self-Healing is the New Mandate
Lost and stolen devices. Employees off grid. Repairs or firmware upgrades. Endpoint device visibility frequently goes dark, leaving them vulnerable and open to attack. IT and security teams need a better way than traditional approaches to strengthen the security, visibility and management of endpoint devices.
Register Now