08.10.2018 Views

My Reading on ASQ CQA HB Part I-IA~IE-s

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Part</strong> IE1<br />

Techniques<br />

Several techniques are available to the auditor to ensure that proprietary informati<strong>on</strong> remains proprietary.<br />

• No Note, Only Memory<br />

When auditing in an undisclosed area (The area could be intellectual or physical area?) , the auditor can rely<br />

<strong>on</strong> memory and not write audit notes. Any notes could become accessible to the public and would be<br />

discoverable in litigati<strong>on</strong>. An auditor can ―audit around‖ an undisclosed area. The auditor needs to be very<br />

flexible to be able to accomplish audit objectives when the auditee erects barriers.<br />

• Check Input<br />

A company may be in the process of getting a patent <strong>on</strong> a new method, for example, and may flatly refuse to<br />

allow the auditor to view a certain porti<strong>on</strong> of that system. In these instances, the auditor must respect the<br />

auditee’s wishes and audit around the undisclosed area. If the inputs going into the undisclosed area appear to<br />

be correct and the outputs are likewise acceptable, then the auditor may assume that the undisclosed process<br />

is doing its job correctly.<br />

• Interview Pers<strong>on</strong>nel Away From Undisclosed Area (physical area?)<br />

Another technique is to remove pers<strong>on</strong>nel from the undisclosed area for interviews.<br />

• <strong>Part</strong>ial Review of Document or Auditee Certify Relevant Document in Place<br />

The auditor can view parts of a document or have the auditee certify it. A company sometimes will refuse to<br />

allow an auditor to look at the procedure for a certain process even though a written procedure is required. To<br />

verify that the procedure exists, the auditor can ask the auditee to certify that the procedure does exist and that<br />

it covers the relevant process. The auditee may allow the auditor to view n<strong>on</strong>-c<strong>on</strong>fidential secti<strong>on</strong>s of the<br />

document. The auditor may never actually view all the details but should do as much as practical to ensure that<br />

a procedure does exist and is approved for use.<br />

Such situati<strong>on</strong>s often resolve themselves <strong>on</strong> subsequent audits involving the same parties. As an auditee<br />

becomes more comfortable with the audit team and places greater trust in the ethics of the team members, the<br />

need to limit access to certain areas often becomes n<strong>on</strong>existent.<br />

Charlie Ch<strong>on</strong>g/ Fi<strong>on</strong> Zhang

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!