SlideShare a Scribd company logo
1 of 69
Privileged and Confidential 1
Audit of Bank Under CBS Environment
Presented By :- CA ANAND PRAKASH JANGID
On :- 22th March, 2014
© 2014 This document contains information that is confidential and proprietary to
Quadrisk Advisors. No part of it may be circulated, quoted, or reproduced for
distribution without prior approval from Quadrisk Advisors.
Privileged and Confidential 2
Agenda
• Check in
• Bank and Risk
• Key Provision applicable to Auditors
• Understanding the CBS banking environment
Privileged and Confidential 3
Check In …. Lesson learned from Barings Bank
The key questions are:
• How were the massive losses incurred at a small branch?
• Why was the true position not noticed earlier?
Conclusion: The losses were incurred by reason of unauthorised and concealed activities
within BFS.
The true position was not noticed earlier by reason of a serious failure of controls and
managerial confusion within Barings.
The true position had not been detected prior to the collapse by the external auditors,
supervisors or regulators of Barings.
------ AND NOW UBI……..
Privileged and Confidential 4
The January 2008 Société
Générale lost
approximately €4.9 billion
The bank was founded in
1984
The Socgen example
Privileged and Confidential 5
The Man behind it
Jérôme Kerviel (born
January 11, 1977) is a
French trader who has
been charged in the
January 2008 Société
Générale trading loss
incident, resulting in
losses valued at
approximately €4.9
billion
Privileged and Confidential 6
Trader used his experience of working in middle office roles to circumvent control processes
Used other individuals passwords to cancel certain transactions
Cause/contributory factor
Privileged and Confidential 7
He got a new employment
Kerviel is now two weeks into a new job at information technology consulting
firm LCA, which is based just outside Paris.
What is Mr. Jerome doing now ?
Privileged and Confidential 8
• Stiff market competition
• Innovative Products to meet customer needs
• Increasing level of automation
• Centralisation of many back office functions
• Process changes
• Pressure on margins / bottom line
Lead to controls becoming potential first casualty!
Risk Management , Internal Controls / Audit help Management to „manage‟ its risks better.
In the current Banking scenario….
Privileged and Confidential 9
Importance of Risk Awareness
No Business without Elements of Risks!
Most Managers understand the relationship between risk and reward.
But a second relationship is very important :
The relationship between risk and awareness.
Taking risk is not in itself a problem but the ignorance of the potential consequences is an
entirely different matter.
Professor Robert Simons
Privileged and Confidential 10
Risk mitigation
Risk due to accident mitigated
by wearing a head gear (helmet)
Risk due to accident was not
mitigated by wearing a head
gear (helmet) – lead to fatal
injury
Privileged and Confidential 11
Three Lines of Defense
Third Line
Audit
Second Line
Risk Management / Internal Control
First Line
Business owners (Branches, Support functions)
Privileged and Confidential 12
Risk Across the Bank
•Fraud
•Human error
•Training gaps
•Negligence
•Audit compliance Risk
•Booking error
•Business process design
•Confidentiality risk
•Documentation Risk
•Execution Risk
•Information Security Risk
•Methodology error
•Model error
•Money laundering
•Product complexity
•Settlement error
•Security risks
•Volume risks
•Connectivity failure
•System customisation
risk
•Telecom failure
•Third party/vendor failure
for non-IT outsourcing
•Counter party risk
•Credit appraisal
•Exposure risk
•Settlement – pre / maturity date
•Recovery / Security realisation risk
•Sector downturns
•Country ( Sovereign) risk
•Regulatory compliance
•Reputation risk
•Capital inadequacy risk
•Disaster risk/Force majeure
•External credit rating
•Human Resources Management risk
•Event risk, Group risk, Legal risk
•Management risk, Organisation risk
Other Risks
Credit Risks
Bank Wide
Risk
Liquidity Risk
•Funding Risk
•Market Conditions
•Time Risk
Forex Risk
•FX rate volatility
•Gap Risk
Interest Rate Risk
•Basis Risk
•Prepayment Risk
•Re-pricing Risk
•Yield curve Risk
Other Market Risks
•Commodity Risk
•Country Risk
•Equity position Risk
•Limits Risk
•Price volatility
Market
Risks
Operational
&ITRisks
Privileged and Confidential 13
PROVISIONS APPLICABLE TO
AUDITOR
Privileged and Confidential 14
KEY PROVISIONS – BANKING REGULATION ACT, 1949
Act Reference Description
Banking Regulation Act,
1949
Section 30 (1) Audit of financial statements by a person duly qualified to be
an auditor of companies.
Section 30 (3) Auditor is required to state in report
• Information provided is satisfactory or not.
• Transactions made within the power or not.
• Profit and loss account showing true balance or not., etc.
Circular No.
DBS.FGV.(F).No.
BC/ 23.08.001/
2001-02
dated May 3, 2002
Auditor is required to refer the matter to the regulator in case
he finds any fraudulent activity or act of excess power or
smell foul play in any transaction.
Privileged and Confidential 15
KEY PROVISIONS – COMPANIES ACT, 2013
Act Reference Description
Companies Act, 2013 Section 143 (3) To report on Compliance of financial statement with
accounting standards, adequacy and operating effectiveness
of internal financial controls, etc.
Section 143 (4) To state reasons for negative remarks or qualifications.
Section 143 (8) Audit of branches of banking companies.
Section 143 (9) Auditor shall comply with auditing standards.
Section 143 (12) To report fraudulent activities to the Central Government
within such time and in such manner as may be prescribed.
Privileged and Confidential 16
Other Regulations
Act Description
PCI DSS (Payment Card Industry Data
Security Standards )
Information security for Cardholder
information Intellectual Property
Audit and Assurance Standards •SA300
•SA315
•SA330
IT ACT, 2000 Revised 2008 Collection and disclosure of customers‟
personal financial information by financial
institutions
Privileged and Confidential 17
Overview of Bank Audit
Audit Inside System
Bank Audit comprises of “Audit Inside the System” and “Audit Outside the System”
Audit Outside System
• Application Controls
• Segregation of duties, etc.
• Physical Verification
• Documentation, etc.
Privileged and Confidential 18
CORE BANKING SOLUTION
Privileged and Confidential 19
Why need to understand CBS ?
To provide full assurance as a part
of their work, an auditor needs to
conduct audit inside system and
outside the system as well.
To conduct an audit inside the
system, understanding of system
i.e. CBS (Core Banking Solution) in
case of banking industry is quite
essential.
Privileged and Confidential 20
What is CBS ?
CBS is the process which is completed in centralized environment i.e. under which the
information is stored in the Central Server of the bank and available to all networked branches
instead of branch server.
The word CORE in CBS stands for Centralised Online Real-time Environment.
Depending upon the size and needs of the bank, it could be for all or limited operations. The
task is carried through an advance software by making use of services provided by specialized
agents.
“Finacle by Infosys” is most commonly used as CBS application in India.
Privileged and Confidential 21
How CBS Branch looks like ?
Privileged and Confidential 22
Core Banking Architecture
Pure Core
Architecture
Core with Branch
Servers
Cluster Banking
Architecture
Heterogeneous
Architecture
Privileged and Confidential 23
The Pillars of CBS
“The Principal of CIA” which is compliant with all the rules & regulations are the pillars
on which the CBS Platform is erected.
Confidentiality :- Information is Shared amongst Authorised Personnel ONLY.
Integrity :- Information is authentic, untampered and complete.
Availability :- Information is accessible when it is needed.
Privileged and Confidential 24
Risks associated with CBS environment
Locational Risks Outsourcing Risks IT Operational Risks
Risk based on the
geographical locations of the
Branch & Server is located.
Risk based on the services
and operations outsourced
by the bank.
Using IT has its inherent risk
as IT follows GIGO
(Garbage In Garbage Out)
Example :- Server located in
earthquake prone area is big
risk.
Example :- Credit Card
operations, Signature
verification etc.
Example :- Error Risk,
Computer Fraud Risk,
Interruption Risk etc.
Privileged and Confidential 25
Privileged and Confidential 26
Determine where Information resides/ where processing occurs? Where is it transmitted? Who
owns it ? Who Controls it? Who has access to it?
Distributed
Distributed Processing/Databases
DBA at every decentralised point -Branch level
Ex. ISBS, FNS
Centralised
Centralised Database – Single point of presence – usually running Data Centres
Centralised DBA Functions
Users at Branch level
Ex. Quartz, Finacle, Flex Cube,Temenos
Automated Environment
Privileged and Confidential 27
Determining Right source of information
Tracing audit trail
Hardcopies of outputs
Complexity – Co-operative Processing
Tracking changes in parameter files
Look out for the Balance Suspense Accounts !
Reconciliations still a critical issue
Migration Issues
Some audit Challenges
Privileged and Confidential 28
Planning your Audit
Privileged and Confidential 29
• Profile the Branch business and materiality
• Financial Assertions and relevant automation levels
• Gain Understanding of Automation levels and maturity – Extent of Automation
• Compare growth/reduction in volumes under various heads
• Insights into current Banking trends
• Evaluate IT Risks and Controls
• Understand the Control Environment
• Design Audit Procedures and Assess the Reporting and Regulatory risk
• Discuss, Form Opinions and Conclude
Audit Approach
Privileged and Confidential 30
• Critical Business Processes
• Transaction Authorisation Controls
• Segregation of duties
• Internal Controls
o Governance Controls
o Application Controls
o IT General Controls
• Monitoring & Internal Audit Controls
Basic Principles
Privileged and Confidential 31
• Opening Meeting with Branch Mangement
• Meeting with Key Officers including „Data Officer‟
• Tour of Branch – Accent on IT!
• Internal Circulars and Directives
• RBI Circulars and Directives
• IS Audit Reports
• Inspection and Concurrent Audit Reports
Audit Risk Assessment - the Key!
Privileged and Confidential 32
• Interviews & Observation
• Sampling
• Advance Portfolio Sampling
• Income Leakage
• Major GL Heads
• Manual Debits in Interest/Income Accounts
• Standard Reports
• Adhoc/Supplementary Reports
• Excel or CAATs
• Using PRN/TXT report files
• Caution on Use of Audit Tools!
• SQLs
Audit Methods and Techniques
Privileged and Confidential 33
• Use of Regular Reports, Exception Reports and
• Analytical Reviews
Look for Systems Generated as well as Manual Records
Transaction Review on terminal – Read/View only.
Request Letter. Request for Exception Reports.
Review History of Impacts due to IT on Business/IT
Risks without impact
Review of Logs, Trails and Reports
 Daily Reports
 Transaction/Operational Logs
Internal Exception Reports
Audit Trails
Specific Audit Procedures
Privileged and Confidential 34
• Risk and Controls Assessment
 Minutes of Meetings
 Walkthrough Observations
• Audit Plan
• Audit Program and Procedures
• Audit Environment Scope Restrictions
• Evidence - Electronic
• Key Submissions and certifications from Branch Management
• How Opinion Formed
• Call and Invite Attention of Central Stat. Auditor on
• Key Issues
Documentation
Privileged and Confidential 35
Audit Procedures
Privileged and Confidential 36
Audit Procedures
• Procedures to testing general and IS controls
• Evaluation of Risk Management Framework
• Compliance Testing
Transaction Audit
– Procedures to test transaction controls – Application Controls & Other internal controls
– Procedures to test transactions
Audit Procedures
Privileged and Confidential 37
General Audit Procedure
Privileged and Confidential 38
A Gold Mine for the auditor
Exception and AD-HOC reports
Privileged and Confidential 39
• Daily Transactions
• Daily supplementaries
• Balancing and progressive reports
• New Account Transaction Report
• DDs printed report
• Cheques Issued Report
• Inter Branch/Bank debit reports
• Other Reports
• Master data status reports
• Dead Stock
• FCNR Operations Report
• Minors date Report
Transaction Control Reports
Privileged and Confidential 40
• Deposits:
• Value date Reports – FD Renewal etc
• Duplicate FD Printing
• List of deposit accounts exceeding limit with wrong interest
• parameters
• Wrongly linked FD accounts
• NRE
• Flagged Deposit accounts for safe custody
• Lien Marked Deposits
• Other Reports:
• Late cash report
• Account validation report
Exception Reports – a Goldmine !
Privileged and Confidential 41
• Clearing
• Clearing Exceptions – Returns, Errors
• Clearing
– Exception and Cheque Returned reports
– Cases in which Schedule modifications allowed
– IBD Cheque Numbers
• ECS
• Outstanding entries follow up
• CRA - Reconciliation of Cash covers and Audit Rolls
• Short/Excess Claims in Office Claims – O/s Entries
• Bank Reconciliations
• OCC Dishonour
• TOD Report
Clearing and Deposits
Privileged and Confidential 42
• Authorization and limit reports
• In-operative/dormant account transaction reports
• Transactions entered & authorised by same person
• Change in GL Link Parameter Codes
• GL Codes List with codes other than those in Reporting
• Statement – Pointing Parameters for Nominal Accounts
• Manual debits to interest paid account
• Direct GL entry exception reports
• Exceptional SL txns.
• Exceptional Parameter Changes
• EOD (End of Day) Exception Reports
Exception Reports- a goldmine!
Privileged and Confidential 43
• Subsidiary-GL Balancing?
• RTGS/SWIFT
• ATM Switch Suspense/ATM Cash
• Suspense
• Clearing Suspense
• All suspense and Parking Accounts
• Inter Branch- Unmatched SOL Ids
• ECS Batch
Reconciliations
Privileged and Confidential 44
• Parameter Rate Variations – Customer/Account Level
• Value Dating in Deposits
• Interest Collection Flag
• Anywhere banking charges
• Credit Card Operations Charges
• Ch. Ret., Stop Payment, SI, PO/DD/OCC Return
• NRE/NRO Txns.
• Penal Interest Application
• Submission of Stock Statements
• EMI Interest Application
• Commitment Charges Application
Tracking Income Leakage
Privileged and Confidential 45
Parameter File Updates
1. Reconciliations
2. Back End Entries
3. Unclaimed Deposits
4. ATM Cash Verification
5. Card & Pin Handling
6. Migration Controls
7. Outsourcing Risks
8. Controlling Returns
9. IT General Controls
10. Frauds – Indicators and
11. Reporting System
IS Risk Assurance
Privileged and Confidential 46
1. IT General Controls
2. Version Control
3. Patch Releases – Systems
4. Software and Applications
a) Anti Virus Updates
b) Backups
c) BCP & DRP
d) Physical and Environmental
e) Controls
IS Risk Assurance
Privileged and Confidential 47
A. Access & Authorization controls
B. Process level controls
i. Input
ii. Processing
iii. Output
C. Change Management
D. Incident Management
E. Disaster recovery planning
F. Back up and Recovery
G. Configuration control
Area to concentrate on …
Privileged and Confidential 48
Bank audits are not the same and going forward will be much more different
• Good Audit Planning is key to successful bank audit
• Move from transaction audit to Risk based audit approach
• Golden chance for converting challenges to opportunities
• Gear up for the future…NOW!
Ultimately
Privileged and Confidential 49
UNDERSTANDING OF
PROCESS, RISK & CONTROL
Privileged and Confidential 50
Segregation and Rotation of Duties
One of the fundamental features of an effective internal control system is the segregation and
rotation of duties in a manner conducive to prevention and timely detection of occurrence of
frauds and errors.
In the case of banks, the following measures are usually adopted:
Work of one staff member is invariably supervised / checked by another staff member,
irrespective of the nature of work.
Banks have a system of rotation of job amongst staff members, which reduces the possibility of
frauds and is also useful in detection of frauds and errors. Also, most banks usually have a
process of giving “block” leave to its staff members wherein the employee stays away from work
for at least a continuous period of 2 weeks.
Privileged and Confidential 51
Authorisation of Transactions
Authorisation may be general or it may be specific with reference to a single transaction. It is
necessary to establish procedures which provide assurance that authorisations are issued by
persons acting within the scope of their authority, and that the transactions conform fully to the
terms of the authorisations. The following procedures are usually established in banks for this
purpose:
 The financial and administrative powers of each official/each position are fixed and communicated to all
persons concerned.
 All financial decisions at any level are required to be reported to the next higher level for confirmation.
 Any deviation from the laid down procedures requires confirmation from/intimation to higher authorities.
 Branch managers have to send periodic confirmation to their controlling authority on compliance of the laid
down systems and procedures.
Privileged and Confidential 52
Maintenance of Adequate Records and Documents
Accounting controls should ensure that the transactions are recorded at correct amount and in
the accounting periods in which they are executed, and that they are classified in appropriate
accounts.
The procedures established in banks to achieve these objectives usually include the following:
 All records are maintained in the prescribed books and registers only.
 All branches of a bank have a unique code number which is circulated amongst all offices of the bank. This
code number is required to be put on all important instruments.
 All books are to be balanced periodically and it is to be confirmed by an official.
 All inter-office transactions are to be reconciled within a specified time frame.
Privileged and Confidential 53
Accountability for and Safeguarding of Assets
The accountability for assets starts at the time of their acquisition and continues till their
disposal. To safeguard the assets, it is also necessary that access to assets is limited to
authorised personnel.
The following are some of the important controls implemented by banks in this regard:
 The specimen signatures of all officers are maintained in a book which is available in all branches.
 The instruments which are evidence of remittances of funds above a cut-off level are to be signed by more
than one official.
 Important financial messages, when transmitted electronically, are generally encrypted.
 Sensitive items like currency, valuables, draft forms, term deposit receipts, traveller‟s cheques and other
such security forms are in the custody of at least two officials of the branch.
 All assets of the bank/charged to the bank are physically verified at specified intervals.
Privileged and Confidential 54
Independent Checks
Independent checks involve a periodic or regular review of functioning of the system by
independent persons to ascertain whether the control procedures are being performed
properly. Banks have an elaborate system of various forms of internal audit covering virtually
every aspect of their functioning.
Privileged and Confidential 55
TOOLS & TECHNIQUES TO
AUDIT UNDER CBS
Privileged and Confidential 56
Few Techniques for Auditing under CBS Environment….Contd.
Suppose the auditor want to test the KYC norms on current account customer master data. For testing the same the
auditor need to request the IT Team to extract you the following data:-
• Data Required :- Current account customer master information.
• Period:- As of the date of audit.
• Fields of reference :- Branch ID, Customer ID, Account ID, First Holder & Joint Holder‟s name, Address, PAN,
Mobiles no. Residence No., Office No., Mode of Operation and Clear Balance.
• Format of Data :- Text Form
The IT department runs a SQL Query on the database and generates a text dump file which is saved in a secure
folder with special access only to the auditors. The audit team imported the text file using the text report import option
within GAS. Post import, the team used the „duplicate key‟ test within GAS to identify fictitious accounts opened with
similar PAN or Mobile No. or Address or Office No. or Residence No. , but different Customer ID.
Privileged and Confidential 57
Few Techniques for Auditing under CBS Environment….Contd.
The auditor then decided to check the integrity of loan data migrated from the Legacy application to the CBS. To test this
objective, the auditor issued a data request to IT in the following format :-
• Data required :- Cash Credit master information for large-scale branch X.
• Period :- Data immediately post migration.
• Fields of reference :- Customer ID, Sanction Limit, Drawing Power, and Rate of Interest.
• Format of Data :- Text form.
IT Team ran an SQL query on the production database and generated a text file dump which was saved in a secure folder with
special access to the Audit Team only. The corresponding data from the legacy system immediately pre-migration was available
with the Migration Team.
The Auditor imported both the text files using the Text Report import option within the GAS.
Post import, the Auditor linked the pre-migration and post-migration data through the Join function in the GAS. The two data files
were linked, based on the Customer ID available in both the files. Post Join, three new fields were created by the Auditor
containing differences in the Sanction Limit, Drawing Power and Rate of Interest in each field.
Accounts where there was a difference in the masters migrated (non-zero data), were identified through the above approach.
Privileged and Confidential 58
UNDERSTANDING OF
PROCESS, RISK & CONTROL
Privileged and Confidential 59
LONG FORM AUDIT REPORT
Long Form Audit Report (LFAR) is a detailed questionnaire formulated by the RBI and auditors
are liable to answer. It is not a substitute for the statutory report and should not deemed to be a
part of the said report.
Things to remember :
1. Study the LFAR questionnaire thoroughly.
2. Complete & submit the Auditor‟s report and LFAR simultaneously.
3. Comments in LFAR should be specific and not vague.
4. It should be sufficiently detailed and quantified.
Privileged and Confidential 60
CERTIFICATE ON JILANI COMMITTEE RECOMMENDATIONS
The Recommendations are related to internal control and inspection/audit system in banks
which are to be compulsorily implemented by banks.
Things to remember :
1. Reply to made either „implemented‟ or „not-implemented‟
2. The form broadly indicates the set up within banks where actions lie in respect of each of
the 25 recommendations of the Jilani Committee. Banks can however modify it depending
upon their organisation of the inspection/audit setup in their banks and the demarcation of
responsibilities.
Illustrative Checklist
Privileged and Confidential 61
CERTIFICATE ON GHOSH COMMITTEE RECOMMENDATIONS
The Recommendations are related to frauds and malpractices in banks.
RBI has divided all the recommendations into four groups as under :
i. Group A – Recommendations to be implemented immediately by the banks.
ii. Group B – Recommendations requiring RBI‟s approval.
iii. Group C – Recommendations requiring approval of Government of India.
iv. Group D – Recommendations requiring further examination.
Answers to be given either in „yes‟ or „no‟.
Illustrative Checklist
Privileged and Confidential 62
CASE STUDIES
Privileged and Confidential 63
Case Study - III
Weakness in Internal Controls
An employee of Yes Bank, who allegedly forged the signature of one of its
clients, prepared a duplicate company seal, changed bank mandates with
forged signatures and the seal, and redeemed money invested in mutual
funds worth about $137,500, leading to a loss of about 34 lakh to the client.
The employee worked as a Relationship Manager in the bank's wealth
management division.
A ICICI bank executive has been arrested for stealing almost Rs 50 lakh from
the inactive account of an NRI who had died by breaking every rule of
professional ethics, ferreting out customer information and manipulating
safety procedures. Two of his accomplices were also held.
Privileged and Confidential 64
FACTS & FIGURES
Privileged and Confidential 65
Few Statistics
Privileged and Confidential 66
Average Time Taken to Detect Fraud
6 months
30%
6-12
months
30%
12-24
months
20%
>24
months
3%
Not
disclosed
17%
Privileged and Confidential 67
Average Loss per fraud incident
Indian banks lost as much as Rs 17,284 crore during 2012-13 due to fraud, in a near four-fold
jump over the previous fiscal, ET has found out from information obtained through Right to
Information Act.
Privileged and Confidential 68
Questions
Privileged and Confidential 69
Thank You
Contact:
CA Anand Prakash Jangid
anand@quadrisk.com
www.quadrisk.com
T: +91 96202 33516

More Related Content

What's hot

Audit planning for Bank Statutory audit in India
Audit planning for Bank Statutory audit in IndiaAudit planning for Bank Statutory audit in India
Audit planning for Bank Statutory audit in Indianitanttrilokekar
 
BCBS 223-The internal audit function in banks
BCBS 223-The internal audit function in banksBCBS 223-The internal audit function in banks
BCBS 223-The internal audit function in banksIndrajit Roy Choudhury
 
Bank audit slideshare
Bank audit   slideshareBank audit   slideshare
Bank audit slidesharePriti Parab
 
Audit of bank existing in whole banking sector based on enactments & on t...
Audit of bank existing in whole banking sector based on enactments & on t...Audit of bank existing in whole banking sector based on enactments & on t...
Audit of bank existing in whole banking sector based on enactments & on t...Vivek Mahajan
 
Bank audit manual_2016
Bank audit manual_2016Bank audit manual_2016
Bank audit manual_2016VinodParakh
 
Long form audit report
Long form audit reportLong form audit report
Long form audit reportDhruv Seth
 
vijaya bank audit procedure
vijaya bank audit procedurevijaya bank audit procedure
vijaya bank audit procedurekeerthiredddy
 
Bank concurrent audit
Bank concurrent auditBank concurrent audit
Bank concurrent audityudhistra
 
Bank audit by ca gopal rathi
Bank audit by ca gopal rathiBank audit by ca gopal rathi
Bank audit by ca gopal rathiCA Gopal Rathi
 
Stock Audit of Banks
Stock Audit of BanksStock Audit of Banks
Stock Audit of BanksSudheer Paidi
 
Unit inspection
Unit inspectionUnit inspection
Unit inspectionspandane
 
Stock audit in banks
Stock audit in banksStock audit in banks
Stock audit in banksBabasab Patil
 
STANDARDS ON AUDITING
STANDARDS ON AUDITINGSTANDARDS ON AUDITING
STANDARDS ON AUDITINGANMOL GULATI
 

What's hot (20)

Audit planning for Bank Statutory audit in India
Audit planning for Bank Statutory audit in IndiaAudit planning for Bank Statutory audit in India
Audit planning for Bank Statutory audit in India
 
Audit of bank
Audit of bankAudit of bank
Audit of bank
 
BCBS 223-The internal audit function in banks
BCBS 223-The internal audit function in banksBCBS 223-The internal audit function in banks
BCBS 223-The internal audit function in banks
 
Bank audit slideshare
Bank audit   slideshareBank audit   slideshare
Bank audit slideshare
 
Audit of bank existing in whole banking sector based on enactments & on t...
Audit of bank existing in whole banking sector based on enactments & on t...Audit of bank existing in whole banking sector based on enactments & on t...
Audit of bank existing in whole banking sector based on enactments & on t...
 
Bank audit manual_2016
Bank audit manual_2016Bank audit manual_2016
Bank audit manual_2016
 
Long form audit report
Long form audit reportLong form audit report
Long form audit report
 
vijaya bank audit procedure
vijaya bank audit procedurevijaya bank audit procedure
vijaya bank audit procedure
 
Presentation - Overview of Bank Audit
Presentation - Overview of Bank AuditPresentation - Overview of Bank Audit
Presentation - Overview of Bank Audit
 
Bank concurrent audit
Bank concurrent auditBank concurrent audit
Bank concurrent audit
 
Audit
AuditAudit
Audit
 
Bank audit
Bank auditBank audit
Bank audit
 
Concurrent audit
Concurrent auditConcurrent audit
Concurrent audit
 
Bank audit by ca gopal rathi
Bank audit by ca gopal rathiBank audit by ca gopal rathi
Bank audit by ca gopal rathi
 
Bank audit ppt 1
Bank audit ppt 1Bank audit ppt 1
Bank audit ppt 1
 
Stock Audit of Banks
Stock Audit of BanksStock Audit of Banks
Stock Audit of Banks
 
Bank audit
Bank auditBank audit
Bank audit
 
Unit inspection
Unit inspectionUnit inspection
Unit inspection
 
Stock audit in banks
Stock audit in banksStock audit in banks
Stock audit in banks
 
STANDARDS ON AUDITING
STANDARDS ON AUDITINGSTANDARDS ON AUDITING
STANDARDS ON AUDITING
 

Viewers also liked

Regulatory reporting by banks to rbi
Regulatory reporting by banks to rbiRegulatory reporting by banks to rbi
Regulatory reporting by banks to rbiPartho Chakraborty
 
Statutory Bank Branch Audit
Statutory Bank Branch Audit Statutory Bank Branch Audit
Statutory Bank Branch Audit khemkavivek
 
C3 Internal Control Checklist External
C3 Internal Control Checklist ExternalC3 Internal Control Checklist External
C3 Internal Control Checklist ExternalMABSIV
 
Internal Audit & Risk Management Software
Internal Audit & Risk Management SoftwareInternal Audit & Risk Management Software
Internal Audit & Risk Management Softwarefernandofernandes
 
Apresentação facilities
Apresentação facilitiesApresentação facilities
Apresentação facilitiesDouglas Silva
 
Bank and office interiors case studies
Bank and office interiors case studiesBank and office interiors case studies
Bank and office interiors case studiesJake Weaver
 
13 information system audit of banks
13 information system audit of banks13 information system audit of banks
13 information system audit of banksspandane
 
Bank audit under computerised environment
Bank audit under computerised environmentBank audit under computerised environment
Bank audit under computerised environmentsandesh mundra
 
Regulatory Reporting Dashboard
Regulatory Reporting DashboardRegulatory Reporting Dashboard
Regulatory Reporting Dashboardaccenture
 
Generation of accounting reports
Generation of accounting reportsGeneration of accounting reports
Generation of accounting reportsChhitiz Shrestha
 
Open Innovation: Smart Solutions for R&D Pipelines
Open Innovation: Smart Solutions for R&D PipelinesOpen Innovation: Smart Solutions for R&D Pipelines
Open Innovation: Smart Solutions for R&D Pipelinesaccenture
 
Check list para auditoria interna
Check list para auditoria internaCheck list para auditoria interna
Check list para auditoria internaMiguel
 
HSBC Case Study
HSBC Case StudyHSBC Case Study
HSBC Case StudyLinkedIn
 
Banking System Presentation
Banking  System  PresentationBanking  System  Presentation
Banking System PresentationACCENT Trading
 

Viewers also liked (18)

Regulatory Reporting - Best Practices
Regulatory Reporting - Best Practices Regulatory Reporting - Best Practices
Regulatory Reporting - Best Practices
 
Regulatory reporting by banks to rbi
Regulatory reporting by banks to rbiRegulatory reporting by banks to rbi
Regulatory reporting by banks to rbi
 
Statutory Bank Branch Audit
Statutory Bank Branch Audit Statutory Bank Branch Audit
Statutory Bank Branch Audit
 
Qualidade
QualidadeQualidade
Qualidade
 
C3 Internal Control Checklist External
C3 Internal Control Checklist ExternalC3 Internal Control Checklist External
C3 Internal Control Checklist External
 
Internal Audit & Risk Management Software
Internal Audit & Risk Management SoftwareInternal Audit & Risk Management Software
Internal Audit & Risk Management Software
 
Apresentação facilities
Apresentação facilitiesApresentação facilities
Apresentação facilities
 
Bank and office interiors case studies
Bank and office interiors case studiesBank and office interiors case studies
Bank and office interiors case studies
 
Micheal Dell & Henry Ford
Micheal Dell & Henry FordMicheal Dell & Henry Ford
Micheal Dell & Henry Ford
 
Fraud risk management
Fraud risk managementFraud risk management
Fraud risk management
 
13 information system audit of banks
13 information system audit of banks13 information system audit of banks
13 information system audit of banks
 
Bank audit under computerised environment
Bank audit under computerised environmentBank audit under computerised environment
Bank audit under computerised environment
 
Regulatory Reporting Dashboard
Regulatory Reporting DashboardRegulatory Reporting Dashboard
Regulatory Reporting Dashboard
 
Generation of accounting reports
Generation of accounting reportsGeneration of accounting reports
Generation of accounting reports
 
Open Innovation: Smart Solutions for R&D Pipelines
Open Innovation: Smart Solutions for R&D PipelinesOpen Innovation: Smart Solutions for R&D Pipelines
Open Innovation: Smart Solutions for R&D Pipelines
 
Check list para auditoria interna
Check list para auditoria internaCheck list para auditoria interna
Check list para auditoria interna
 
HSBC Case Study
HSBC Case StudyHSBC Case Study
HSBC Case Study
 
Banking System Presentation
Banking  System  PresentationBanking  System  Presentation
Banking System Presentation
 

Similar to Bank Branch Statutory Audit

Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Citrin Cooperman
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceJTLeekley
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Saras Singh
 
Operational Risk Governance: 5 Core Regulatory Expectations
Operational Risk Governance: 5 Core Regulatory ExpectationsOperational Risk Governance: 5 Core Regulatory Expectations
Operational Risk Governance: 5 Core Regulatory ExpectationsColleen Beck-Domanico
 
BCBS 239 Compliance: A Comprehensive Approach
BCBS 239 Compliance: A Comprehensive ApproachBCBS 239 Compliance: A Comprehensive Approach
BCBS 239 Compliance: A Comprehensive ApproachCognizant
 
BCSCI Rosenblatt 2017 - Mike Pinedo slides
BCSCI Rosenblatt 2017 - Mike Pinedo slidesBCSCI Rosenblatt 2017 - Mike Pinedo slides
BCSCI Rosenblatt 2017 - Mike Pinedo slidesThe Boeing Center
 
Implementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in BankingImplementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in BankingTriVersa
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Emily2014
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningDell EMC World
 
BCBS239 - A Roadmap for Data Governance - 04202016.pdf
BCBS239 - A Roadmap for Data Governance - 04202016.pdfBCBS239 - A Roadmap for Data Governance - 04202016.pdf
BCBS239 - A Roadmap for Data Governance - 04202016.pdfssusere0e4e8
 
Beat liver c-aise-2013_v1-0(final)
Beat liver c-aise-2013_v1-0(final)Beat liver c-aise-2013_v1-0(final)
Beat liver c-aise-2013_v1-0(final)caise2013vlc
 
FINANCIAL & CORPORATE COLLATERAL > portfolio // Linda C. Modica
FINANCIAL & CORPORATE COLLATERAL > portfolio // Linda C. ModicaFINANCIAL & CORPORATE COLLATERAL > portfolio // Linda C. Modica
FINANCIAL & CORPORATE COLLATERAL > portfolio // Linda C. ModicaLinda Modica
 
Performing Audits Efficiently and Expanding Service Offerings: Global and Loc...
Performing Audits Efficientlyand Expanding Service Offerings: Global and Loc...Performing Audits Efficientlyand Expanding Service Offerings: Global and Loc...
Performing Audits Efficiently and Expanding Service Offerings: Global and Loc...International Federation of Accountants
 

Similar to Bank Branch Statutory Audit (20)

Risk Management Premier
Risk Management PremierRisk Management Premier
Risk Management Premier
 
Risk management premier
Risk management premierRisk management premier
Risk management premier
 
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Gestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector PúblicoGestión de Riesgos y Control Interno en el Sector Público
Gestión de Riesgos y Control Interno en el Sector Público
 
Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)Operational risk (by ms.sweta vijuraj)
Operational risk (by ms.sweta vijuraj)
 
Winning Tactics for Data Governance
Winning Tactics for Data GovernanceWinning Tactics for Data Governance
Winning Tactics for Data Governance
 
Operational Risk Governance: 5 Core Regulatory Expectations
Operational Risk Governance: 5 Core Regulatory ExpectationsOperational Risk Governance: 5 Core Regulatory Expectations
Operational Risk Governance: 5 Core Regulatory Expectations
 
BCBS 239 Compliance: A Comprehensive Approach
BCBS 239 Compliance: A Comprehensive ApproachBCBS 239 Compliance: A Comprehensive Approach
BCBS 239 Compliance: A Comprehensive Approach
 
Solvency II Offering
Solvency II Offering Solvency II Offering
Solvency II Offering
 
Risk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public SectorRisk Management and Internal Control in the Public Sector
Risk Management and Internal Control in the Public Sector
 
BCSCI Rosenblatt 2017 - Mike Pinedo slides
BCSCI Rosenblatt 2017 - Mike Pinedo slidesBCSCI Rosenblatt 2017 - Mike Pinedo slides
BCSCI Rosenblatt 2017 - Mike Pinedo slides
 
Implementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in BankingImplementing Anti Money Laundering and Fraud Rules in Banking
Implementing Anti Money Laundering and Fraud Rules in Banking
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
BCBS239 - A Roadmap for Data Governance - 04202016.pdf
BCBS239 - A Roadmap for Data Governance - 04202016.pdfBCBS239 - A Roadmap for Data Governance - 04202016.pdf
BCBS239 - A Roadmap for Data Governance - 04202016.pdf
 
Beat liver c-aise-2013_v1-0(final)
Beat liver c-aise-2013_v1-0(final)Beat liver c-aise-2013_v1-0(final)
Beat liver c-aise-2013_v1-0(final)
 
FINANCIAL & CORPORATE COLLATERAL > portfolio // Linda C. Modica
FINANCIAL & CORPORATE COLLATERAL > portfolio // Linda C. ModicaFINANCIAL & CORPORATE COLLATERAL > portfolio // Linda C. Modica
FINANCIAL & CORPORATE COLLATERAL > portfolio // Linda C. Modica
 
Performing Audits Efficiently and Expanding Service Offerings: Global and Loc...
Performing Audits Efficientlyand Expanding Service Offerings: Global and Loc...Performing Audits Efficientlyand Expanding Service Offerings: Global and Loc...
Performing Audits Efficiently and Expanding Service Offerings: Global and Loc...
 
D Fielding OSP Aviva
D Fielding OSP AvivaD Fielding OSP Aviva
D Fielding OSP Aviva
 

Recently uploaded

Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration TrainingCalvinarnold843
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...PRnews2
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextP&CO
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfShashank Mehta
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIBGregory DeShields
 

Recently uploaded (20)

Customizable Contents Restoration Training
Customizable Contents Restoration TrainingCustomizable Contents Restoration Training
Customizable Contents Restoration Training
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate Professional
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Entrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider contextEntrepreneurial ecosystem- Wider context
Entrepreneurial ecosystem- Wider context
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIB
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 

Bank Branch Statutory Audit

  • 1. Privileged and Confidential 1 Audit of Bank Under CBS Environment Presented By :- CA ANAND PRAKASH JANGID On :- 22th March, 2014 © 2014 This document contains information that is confidential and proprietary to Quadrisk Advisors. No part of it may be circulated, quoted, or reproduced for distribution without prior approval from Quadrisk Advisors.
  • 2. Privileged and Confidential 2 Agenda • Check in • Bank and Risk • Key Provision applicable to Auditors • Understanding the CBS banking environment
  • 3. Privileged and Confidential 3 Check In …. Lesson learned from Barings Bank The key questions are: • How were the massive losses incurred at a small branch? • Why was the true position not noticed earlier? Conclusion: The losses were incurred by reason of unauthorised and concealed activities within BFS. The true position was not noticed earlier by reason of a serious failure of controls and managerial confusion within Barings. The true position had not been detected prior to the collapse by the external auditors, supervisors or regulators of Barings. ------ AND NOW UBI……..
  • 4. Privileged and Confidential 4 The January 2008 Société Générale lost approximately €4.9 billion The bank was founded in 1984 The Socgen example
  • 5. Privileged and Confidential 5 The Man behind it Jérôme Kerviel (born January 11, 1977) is a French trader who has been charged in the January 2008 Société Générale trading loss incident, resulting in losses valued at approximately €4.9 billion
  • 6. Privileged and Confidential 6 Trader used his experience of working in middle office roles to circumvent control processes Used other individuals passwords to cancel certain transactions Cause/contributory factor
  • 7. Privileged and Confidential 7 He got a new employment Kerviel is now two weeks into a new job at information technology consulting firm LCA, which is based just outside Paris. What is Mr. Jerome doing now ?
  • 8. Privileged and Confidential 8 • Stiff market competition • Innovative Products to meet customer needs • Increasing level of automation • Centralisation of many back office functions • Process changes • Pressure on margins / bottom line Lead to controls becoming potential first casualty! Risk Management , Internal Controls / Audit help Management to „manage‟ its risks better. In the current Banking scenario….
  • 9. Privileged and Confidential 9 Importance of Risk Awareness No Business without Elements of Risks! Most Managers understand the relationship between risk and reward. But a second relationship is very important : The relationship between risk and awareness. Taking risk is not in itself a problem but the ignorance of the potential consequences is an entirely different matter. Professor Robert Simons
  • 10. Privileged and Confidential 10 Risk mitigation Risk due to accident mitigated by wearing a head gear (helmet) Risk due to accident was not mitigated by wearing a head gear (helmet) – lead to fatal injury
  • 11. Privileged and Confidential 11 Three Lines of Defense Third Line Audit Second Line Risk Management / Internal Control First Line Business owners (Branches, Support functions)
  • 12. Privileged and Confidential 12 Risk Across the Bank •Fraud •Human error •Training gaps •Negligence •Audit compliance Risk •Booking error •Business process design •Confidentiality risk •Documentation Risk •Execution Risk •Information Security Risk •Methodology error •Model error •Money laundering •Product complexity •Settlement error •Security risks •Volume risks •Connectivity failure •System customisation risk •Telecom failure •Third party/vendor failure for non-IT outsourcing •Counter party risk •Credit appraisal •Exposure risk •Settlement – pre / maturity date •Recovery / Security realisation risk •Sector downturns •Country ( Sovereign) risk •Regulatory compliance •Reputation risk •Capital inadequacy risk •Disaster risk/Force majeure •External credit rating •Human Resources Management risk •Event risk, Group risk, Legal risk •Management risk, Organisation risk Other Risks Credit Risks Bank Wide Risk Liquidity Risk •Funding Risk •Market Conditions •Time Risk Forex Risk •FX rate volatility •Gap Risk Interest Rate Risk •Basis Risk •Prepayment Risk •Re-pricing Risk •Yield curve Risk Other Market Risks •Commodity Risk •Country Risk •Equity position Risk •Limits Risk •Price volatility Market Risks Operational &ITRisks
  • 13. Privileged and Confidential 13 PROVISIONS APPLICABLE TO AUDITOR
  • 14. Privileged and Confidential 14 KEY PROVISIONS – BANKING REGULATION ACT, 1949 Act Reference Description Banking Regulation Act, 1949 Section 30 (1) Audit of financial statements by a person duly qualified to be an auditor of companies. Section 30 (3) Auditor is required to state in report • Information provided is satisfactory or not. • Transactions made within the power or not. • Profit and loss account showing true balance or not., etc. Circular No. DBS.FGV.(F).No. BC/ 23.08.001/ 2001-02 dated May 3, 2002 Auditor is required to refer the matter to the regulator in case he finds any fraudulent activity or act of excess power or smell foul play in any transaction.
  • 15. Privileged and Confidential 15 KEY PROVISIONS – COMPANIES ACT, 2013 Act Reference Description Companies Act, 2013 Section 143 (3) To report on Compliance of financial statement with accounting standards, adequacy and operating effectiveness of internal financial controls, etc. Section 143 (4) To state reasons for negative remarks or qualifications. Section 143 (8) Audit of branches of banking companies. Section 143 (9) Auditor shall comply with auditing standards. Section 143 (12) To report fraudulent activities to the Central Government within such time and in such manner as may be prescribed.
  • 16. Privileged and Confidential 16 Other Regulations Act Description PCI DSS (Payment Card Industry Data Security Standards ) Information security for Cardholder information Intellectual Property Audit and Assurance Standards •SA300 •SA315 •SA330 IT ACT, 2000 Revised 2008 Collection and disclosure of customers‟ personal financial information by financial institutions
  • 17. Privileged and Confidential 17 Overview of Bank Audit Audit Inside System Bank Audit comprises of “Audit Inside the System” and “Audit Outside the System” Audit Outside System • Application Controls • Segregation of duties, etc. • Physical Verification • Documentation, etc.
  • 18. Privileged and Confidential 18 CORE BANKING SOLUTION
  • 19. Privileged and Confidential 19 Why need to understand CBS ? To provide full assurance as a part of their work, an auditor needs to conduct audit inside system and outside the system as well. To conduct an audit inside the system, understanding of system i.e. CBS (Core Banking Solution) in case of banking industry is quite essential.
  • 20. Privileged and Confidential 20 What is CBS ? CBS is the process which is completed in centralized environment i.e. under which the information is stored in the Central Server of the bank and available to all networked branches instead of branch server. The word CORE in CBS stands for Centralised Online Real-time Environment. Depending upon the size and needs of the bank, it could be for all or limited operations. The task is carried through an advance software by making use of services provided by specialized agents. “Finacle by Infosys” is most commonly used as CBS application in India.
  • 21. Privileged and Confidential 21 How CBS Branch looks like ?
  • 22. Privileged and Confidential 22 Core Banking Architecture Pure Core Architecture Core with Branch Servers Cluster Banking Architecture Heterogeneous Architecture
  • 23. Privileged and Confidential 23 The Pillars of CBS “The Principal of CIA” which is compliant with all the rules & regulations are the pillars on which the CBS Platform is erected. Confidentiality :- Information is Shared amongst Authorised Personnel ONLY. Integrity :- Information is authentic, untampered and complete. Availability :- Information is accessible when it is needed.
  • 24. Privileged and Confidential 24 Risks associated with CBS environment Locational Risks Outsourcing Risks IT Operational Risks Risk based on the geographical locations of the Branch & Server is located. Risk based on the services and operations outsourced by the bank. Using IT has its inherent risk as IT follows GIGO (Garbage In Garbage Out) Example :- Server located in earthquake prone area is big risk. Example :- Credit Card operations, Signature verification etc. Example :- Error Risk, Computer Fraud Risk, Interruption Risk etc.
  • 26. Privileged and Confidential 26 Determine where Information resides/ where processing occurs? Where is it transmitted? Who owns it ? Who Controls it? Who has access to it? Distributed Distributed Processing/Databases DBA at every decentralised point -Branch level Ex. ISBS, FNS Centralised Centralised Database – Single point of presence – usually running Data Centres Centralised DBA Functions Users at Branch level Ex. Quartz, Finacle, Flex Cube,Temenos Automated Environment
  • 27. Privileged and Confidential 27 Determining Right source of information Tracing audit trail Hardcopies of outputs Complexity – Co-operative Processing Tracking changes in parameter files Look out for the Balance Suspense Accounts ! Reconciliations still a critical issue Migration Issues Some audit Challenges
  • 28. Privileged and Confidential 28 Planning your Audit
  • 29. Privileged and Confidential 29 • Profile the Branch business and materiality • Financial Assertions and relevant automation levels • Gain Understanding of Automation levels and maturity – Extent of Automation • Compare growth/reduction in volumes under various heads • Insights into current Banking trends • Evaluate IT Risks and Controls • Understand the Control Environment • Design Audit Procedures and Assess the Reporting and Regulatory risk • Discuss, Form Opinions and Conclude Audit Approach
  • 30. Privileged and Confidential 30 • Critical Business Processes • Transaction Authorisation Controls • Segregation of duties • Internal Controls o Governance Controls o Application Controls o IT General Controls • Monitoring & Internal Audit Controls Basic Principles
  • 31. Privileged and Confidential 31 • Opening Meeting with Branch Mangement • Meeting with Key Officers including „Data Officer‟ • Tour of Branch – Accent on IT! • Internal Circulars and Directives • RBI Circulars and Directives • IS Audit Reports • Inspection and Concurrent Audit Reports Audit Risk Assessment - the Key!
  • 32. Privileged and Confidential 32 • Interviews & Observation • Sampling • Advance Portfolio Sampling • Income Leakage • Major GL Heads • Manual Debits in Interest/Income Accounts • Standard Reports • Adhoc/Supplementary Reports • Excel or CAATs • Using PRN/TXT report files • Caution on Use of Audit Tools! • SQLs Audit Methods and Techniques
  • 33. Privileged and Confidential 33 • Use of Regular Reports, Exception Reports and • Analytical Reviews Look for Systems Generated as well as Manual Records Transaction Review on terminal – Read/View only. Request Letter. Request for Exception Reports. Review History of Impacts due to IT on Business/IT Risks without impact Review of Logs, Trails and Reports  Daily Reports  Transaction/Operational Logs Internal Exception Reports Audit Trails Specific Audit Procedures
  • 34. Privileged and Confidential 34 • Risk and Controls Assessment  Minutes of Meetings  Walkthrough Observations • Audit Plan • Audit Program and Procedures • Audit Environment Scope Restrictions • Evidence - Electronic • Key Submissions and certifications from Branch Management • How Opinion Formed • Call and Invite Attention of Central Stat. Auditor on • Key Issues Documentation
  • 35. Privileged and Confidential 35 Audit Procedures
  • 36. Privileged and Confidential 36 Audit Procedures • Procedures to testing general and IS controls • Evaluation of Risk Management Framework • Compliance Testing Transaction Audit – Procedures to test transaction controls – Application Controls & Other internal controls – Procedures to test transactions Audit Procedures
  • 37. Privileged and Confidential 37 General Audit Procedure
  • 38. Privileged and Confidential 38 A Gold Mine for the auditor Exception and AD-HOC reports
  • 39. Privileged and Confidential 39 • Daily Transactions • Daily supplementaries • Balancing and progressive reports • New Account Transaction Report • DDs printed report • Cheques Issued Report • Inter Branch/Bank debit reports • Other Reports • Master data status reports • Dead Stock • FCNR Operations Report • Minors date Report Transaction Control Reports
  • 40. Privileged and Confidential 40 • Deposits: • Value date Reports – FD Renewal etc • Duplicate FD Printing • List of deposit accounts exceeding limit with wrong interest • parameters • Wrongly linked FD accounts • NRE • Flagged Deposit accounts for safe custody • Lien Marked Deposits • Other Reports: • Late cash report • Account validation report Exception Reports – a Goldmine !
  • 41. Privileged and Confidential 41 • Clearing • Clearing Exceptions – Returns, Errors • Clearing – Exception and Cheque Returned reports – Cases in which Schedule modifications allowed – IBD Cheque Numbers • ECS • Outstanding entries follow up • CRA - Reconciliation of Cash covers and Audit Rolls • Short/Excess Claims in Office Claims – O/s Entries • Bank Reconciliations • OCC Dishonour • TOD Report Clearing and Deposits
  • 42. Privileged and Confidential 42 • Authorization and limit reports • In-operative/dormant account transaction reports • Transactions entered & authorised by same person • Change in GL Link Parameter Codes • GL Codes List with codes other than those in Reporting • Statement – Pointing Parameters for Nominal Accounts • Manual debits to interest paid account • Direct GL entry exception reports • Exceptional SL txns. • Exceptional Parameter Changes • EOD (End of Day) Exception Reports Exception Reports- a goldmine!
  • 43. Privileged and Confidential 43 • Subsidiary-GL Balancing? • RTGS/SWIFT • ATM Switch Suspense/ATM Cash • Suspense • Clearing Suspense • All suspense and Parking Accounts • Inter Branch- Unmatched SOL Ids • ECS Batch Reconciliations
  • 44. Privileged and Confidential 44 • Parameter Rate Variations – Customer/Account Level • Value Dating in Deposits • Interest Collection Flag • Anywhere banking charges • Credit Card Operations Charges • Ch. Ret., Stop Payment, SI, PO/DD/OCC Return • NRE/NRO Txns. • Penal Interest Application • Submission of Stock Statements • EMI Interest Application • Commitment Charges Application Tracking Income Leakage
  • 45. Privileged and Confidential 45 Parameter File Updates 1. Reconciliations 2. Back End Entries 3. Unclaimed Deposits 4. ATM Cash Verification 5. Card & Pin Handling 6. Migration Controls 7. Outsourcing Risks 8. Controlling Returns 9. IT General Controls 10. Frauds – Indicators and 11. Reporting System IS Risk Assurance
  • 46. Privileged and Confidential 46 1. IT General Controls 2. Version Control 3. Patch Releases – Systems 4. Software and Applications a) Anti Virus Updates b) Backups c) BCP & DRP d) Physical and Environmental e) Controls IS Risk Assurance
  • 47. Privileged and Confidential 47 A. Access & Authorization controls B. Process level controls i. Input ii. Processing iii. Output C. Change Management D. Incident Management E. Disaster recovery planning F. Back up and Recovery G. Configuration control Area to concentrate on …
  • 48. Privileged and Confidential 48 Bank audits are not the same and going forward will be much more different • Good Audit Planning is key to successful bank audit • Move from transaction audit to Risk based audit approach • Golden chance for converting challenges to opportunities • Gear up for the future…NOW! Ultimately
  • 49. Privileged and Confidential 49 UNDERSTANDING OF PROCESS, RISK & CONTROL
  • 50. Privileged and Confidential 50 Segregation and Rotation of Duties One of the fundamental features of an effective internal control system is the segregation and rotation of duties in a manner conducive to prevention and timely detection of occurrence of frauds and errors. In the case of banks, the following measures are usually adopted: Work of one staff member is invariably supervised / checked by another staff member, irrespective of the nature of work. Banks have a system of rotation of job amongst staff members, which reduces the possibility of frauds and is also useful in detection of frauds and errors. Also, most banks usually have a process of giving “block” leave to its staff members wherein the employee stays away from work for at least a continuous period of 2 weeks.
  • 51. Privileged and Confidential 51 Authorisation of Transactions Authorisation may be general or it may be specific with reference to a single transaction. It is necessary to establish procedures which provide assurance that authorisations are issued by persons acting within the scope of their authority, and that the transactions conform fully to the terms of the authorisations. The following procedures are usually established in banks for this purpose:  The financial and administrative powers of each official/each position are fixed and communicated to all persons concerned.  All financial decisions at any level are required to be reported to the next higher level for confirmation.  Any deviation from the laid down procedures requires confirmation from/intimation to higher authorities.  Branch managers have to send periodic confirmation to their controlling authority on compliance of the laid down systems and procedures.
  • 52. Privileged and Confidential 52 Maintenance of Adequate Records and Documents Accounting controls should ensure that the transactions are recorded at correct amount and in the accounting periods in which they are executed, and that they are classified in appropriate accounts. The procedures established in banks to achieve these objectives usually include the following:  All records are maintained in the prescribed books and registers only.  All branches of a bank have a unique code number which is circulated amongst all offices of the bank. This code number is required to be put on all important instruments.  All books are to be balanced periodically and it is to be confirmed by an official.  All inter-office transactions are to be reconciled within a specified time frame.
  • 53. Privileged and Confidential 53 Accountability for and Safeguarding of Assets The accountability for assets starts at the time of their acquisition and continues till their disposal. To safeguard the assets, it is also necessary that access to assets is limited to authorised personnel. The following are some of the important controls implemented by banks in this regard:  The specimen signatures of all officers are maintained in a book which is available in all branches.  The instruments which are evidence of remittances of funds above a cut-off level are to be signed by more than one official.  Important financial messages, when transmitted electronically, are generally encrypted.  Sensitive items like currency, valuables, draft forms, term deposit receipts, traveller‟s cheques and other such security forms are in the custody of at least two officials of the branch.  All assets of the bank/charged to the bank are physically verified at specified intervals.
  • 54. Privileged and Confidential 54 Independent Checks Independent checks involve a periodic or regular review of functioning of the system by independent persons to ascertain whether the control procedures are being performed properly. Banks have an elaborate system of various forms of internal audit covering virtually every aspect of their functioning.
  • 55. Privileged and Confidential 55 TOOLS & TECHNIQUES TO AUDIT UNDER CBS
  • 56. Privileged and Confidential 56 Few Techniques for Auditing under CBS Environment….Contd. Suppose the auditor want to test the KYC norms on current account customer master data. For testing the same the auditor need to request the IT Team to extract you the following data:- • Data Required :- Current account customer master information. • Period:- As of the date of audit. • Fields of reference :- Branch ID, Customer ID, Account ID, First Holder & Joint Holder‟s name, Address, PAN, Mobiles no. Residence No., Office No., Mode of Operation and Clear Balance. • Format of Data :- Text Form The IT department runs a SQL Query on the database and generates a text dump file which is saved in a secure folder with special access only to the auditors. The audit team imported the text file using the text report import option within GAS. Post import, the team used the „duplicate key‟ test within GAS to identify fictitious accounts opened with similar PAN or Mobile No. or Address or Office No. or Residence No. , but different Customer ID.
  • 57. Privileged and Confidential 57 Few Techniques for Auditing under CBS Environment….Contd. The auditor then decided to check the integrity of loan data migrated from the Legacy application to the CBS. To test this objective, the auditor issued a data request to IT in the following format :- • Data required :- Cash Credit master information for large-scale branch X. • Period :- Data immediately post migration. • Fields of reference :- Customer ID, Sanction Limit, Drawing Power, and Rate of Interest. • Format of Data :- Text form. IT Team ran an SQL query on the production database and generated a text file dump which was saved in a secure folder with special access to the Audit Team only. The corresponding data from the legacy system immediately pre-migration was available with the Migration Team. The Auditor imported both the text files using the Text Report import option within the GAS. Post import, the Auditor linked the pre-migration and post-migration data through the Join function in the GAS. The two data files were linked, based on the Customer ID available in both the files. Post Join, three new fields were created by the Auditor containing differences in the Sanction Limit, Drawing Power and Rate of Interest in each field. Accounts where there was a difference in the masters migrated (non-zero data), were identified through the above approach.
  • 58. Privileged and Confidential 58 UNDERSTANDING OF PROCESS, RISK & CONTROL
  • 59. Privileged and Confidential 59 LONG FORM AUDIT REPORT Long Form Audit Report (LFAR) is a detailed questionnaire formulated by the RBI and auditors are liable to answer. It is not a substitute for the statutory report and should not deemed to be a part of the said report. Things to remember : 1. Study the LFAR questionnaire thoroughly. 2. Complete & submit the Auditor‟s report and LFAR simultaneously. 3. Comments in LFAR should be specific and not vague. 4. It should be sufficiently detailed and quantified.
  • 60. Privileged and Confidential 60 CERTIFICATE ON JILANI COMMITTEE RECOMMENDATIONS The Recommendations are related to internal control and inspection/audit system in banks which are to be compulsorily implemented by banks. Things to remember : 1. Reply to made either „implemented‟ or „not-implemented‟ 2. The form broadly indicates the set up within banks where actions lie in respect of each of the 25 recommendations of the Jilani Committee. Banks can however modify it depending upon their organisation of the inspection/audit setup in their banks and the demarcation of responsibilities. Illustrative Checklist
  • 61. Privileged and Confidential 61 CERTIFICATE ON GHOSH COMMITTEE RECOMMENDATIONS The Recommendations are related to frauds and malpractices in banks. RBI has divided all the recommendations into four groups as under : i. Group A – Recommendations to be implemented immediately by the banks. ii. Group B – Recommendations requiring RBI‟s approval. iii. Group C – Recommendations requiring approval of Government of India. iv. Group D – Recommendations requiring further examination. Answers to be given either in „yes‟ or „no‟. Illustrative Checklist
  • 62. Privileged and Confidential 62 CASE STUDIES
  • 63. Privileged and Confidential 63 Case Study - III Weakness in Internal Controls An employee of Yes Bank, who allegedly forged the signature of one of its clients, prepared a duplicate company seal, changed bank mandates with forged signatures and the seal, and redeemed money invested in mutual funds worth about $137,500, leading to a loss of about 34 lakh to the client. The employee worked as a Relationship Manager in the bank's wealth management division. A ICICI bank executive has been arrested for stealing almost Rs 50 lakh from the inactive account of an NRI who had died by breaking every rule of professional ethics, ferreting out customer information and manipulating safety procedures. Two of his accomplices were also held.
  • 64. Privileged and Confidential 64 FACTS & FIGURES
  • 65. Privileged and Confidential 65 Few Statistics
  • 66. Privileged and Confidential 66 Average Time Taken to Detect Fraud 6 months 30% 6-12 months 30% 12-24 months 20% >24 months 3% Not disclosed 17%
  • 67. Privileged and Confidential 67 Average Loss per fraud incident Indian banks lost as much as Rs 17,284 crore during 2012-13 due to fraud, in a near four-fold jump over the previous fiscal, ET has found out from information obtained through Right to Information Act.
  • 69. Privileged and Confidential 69 Thank You Contact: CA Anand Prakash Jangid anand@quadrisk.com www.quadrisk.com T: +91 96202 33516