Preview

Asa240

Powerful Essays
Open Document
Open Document
19373 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Asa240
ASA 240
(April 2006)

Auditing Standard ASA 240
The Auditor's Responsibility to
Consider Fraud in an Audit of a Financial Report
Issued by the Auditing and Assurance Standards Board

Obtaining a Copy of this Auditing Standard
This Auditing Standard is available on the AUASB website: www.auasb.gov.au. Alternatively, printed copies of this Auditing Standard are available b y contacting: Auditing and Assurance Standards Board
Level 4
530 Collins Street
Melbourne Victoria 3000
AUSTRALIA

Phone: (03) 8080 7400
Fax:
(03) 8080 7450
E-mail: enquiries@auasb.gov.au
Postal Address:
PO Box 204
Collins Street West
Melbourne Victoria 8007
AUSTRALIA

COPYRIGHT
© Commonwealth of Australia 2006. The text, graphics and layout of this
Auditing Standard are protected by Australian copyright law and the comparable law of other countries. Reproduction within Australia in unaltered form (retaining this notice) is permitted for personal and non commercial use subject to the inclusion of an acknowledgment of the source.
Requests and enquiries concerning reproduction and rights for commercial purposes within Australia should be addressed to the Principal Executive,
Auditing and Assurance Standards Board, PO Box 204, Collins Street West,
Melbourne Victoria 8007. Otherwise, no part of the Auditing Standard may be reproduced, stored or transmitted in any form or by any means without the prior written permission of the AUASB except as permitted by law.
ISSN 1833-4393

ASA 240

-2-

AUDITING STANDARD

Auditing Standard ASA 240 The Auditor's Responsibility to Consider
Fraud in an Audit of a Financial Report

CONTENTS
PREFACE
AUTHORITY STATEMENT
Paragraphs
Application...............................................................................

1-2

Operative Date .........................................................................

3

Introduction ..............................................................................

You May Also Find These Documents Helpful

  • Powerful Essays

    Accg326

    • 3574 Words
    • 15 Pages

    Transfer prices affect the reported profit of both parties to an intercompany transaction; revenue for the seller and an expense for the buyer. To fairly evaluate performance, transfer prices should be acceptable to both the buyer and the seller, otherwise dysfunctional behavior can occur.…

    • 3574 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2460

    • 271 Words
    • 2 Pages

    Answer: The /W switch specifies the warning level of the MIDL compiler. The warning level indicates the severity of the warning. /W Specifies the warning level, an integer in the range 0 through 4. There is no space between the /W switch and the digit indicating the warning-level value. Warning levels range from 1 to 4, with a value of zero meaning to display no warning information. The highest-severity warning is level 1. The following table describes the warnings for each warning level…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch to the rest of the servers and to client computers. The work could take a couple of days, but with the leadership and right deligations, this matter should get resolved smoothly.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3120 Ass 1

    • 330 Words
    • 2 Pages

    The Johnson Company will be able to reach out to its customers by basically creating a good “Web Page” where customers will be able to find all of their products and also pay online and order online. In addition orders will not be taken by hand anymore but online orders will be the main method used to order networking products.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ASN201

    • 4379 Words
    • 31 Pages

    Students in this unit should read this unit guide carefully at the start of semester. It…

    • 4379 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    It250

    • 272 Words
    • 2 Pages

    Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file?…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Bsa310

    • 332 Words
    • 2 Pages

    I don’t think that it makes sense to look at an organization as a whole in terms of these levels, as all businesses will always be partially in each of these states.…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    NT2580 Introduction to Information Security Unit 1 Information Systems Security Fundamentals © ITT Educational Services, Inc. All rights reserved. Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. NT2580…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ac551

    • 286 Words
    • 2 Pages

    According to the Codification, “all direct and indirect costs of growing crops shall be accumulated until the time of harvest. Some crop costs, such as soil preparation, are incurred before planting and shall be deferred and allocated to the growing crop.” This is found in section 905-330-25 (1).…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Afras 170b

    • 747 Words
    • 3 Pages

    Q. How did congress react to repeated Southern attempts to stop blacks from exercising political power?…

    • 747 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Apus Anth100

    • 313 Words
    • 2 Pages

    Cultural Relativity- Studying another culture from its point of view without imposing our own cultural values.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Soc 120

    • 958 Words
    • 4 Pages

    Do you think people’s perceptions of others play a role in the success of students with disabilities? Why or why not? Choose one law covered in Chapter 1. These include IDEA, NCLB, Section 504 and ADA. How does your chosen law protect students with disabilities from negative perceptions and beliefs?…

    • 958 Words
    • 4 Pages
    Better Essays