ŠĻą”±į>ž’ ÜŽž’’’ŚŪ’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’ģ„Į[ šæōˆbjbjāā ‡Ī€j€jpƒƒ’’’’’’l4:Ō+Ō+Ō+h<,$`,ä:Ō¾2P-P-Lœ-œ-œ-w.B¹.Õ.UøWøWøWø^µøŠ…»ŠU¾$Ą &Āˆy¾å.w.w.å.å.y¾S0œ-œ-ŪŽ¾S0S0S0å.Žœ-œ-UøS0å.UøS0S0a5–ŧl·œ-D- p [YiĘĆ:š&Ō+s/^1Æl·D¤¾0Ō¾Æt®ĀŃ/‚®Ā·S0::Ł I. Audit Approach As an element of the University’s core business functions, Financial Aid will be audited approximately every three years using a risk-based approach. The minimum requirements set forth in Section II, “General Overview and Risk Assessment,” must be completed for the audit to qualify for core audit coverage. Following completion of the general overview and risk assessment, the auditor will use professional judgment to select specific areas for additional focus and audit testing. Specifically this audit will include consideration of financial aid for undergraduate and graduate students, including: Financial Aid Eligibility and Verification Awarding of Financial Aid Disbursing Financial Aid Program Compliance Cash Management, including reconciliation, drawdown and cash controls Business Continuity Planning This audit will not cover the area of loan conversion and collections. II. General Overview and Risk Assessment (Estimated time to complete – 140 hours) At a minimum, general overview procedures will include interviews of department management and key personnel; a review of available financial reports; evaluation of policies and procedures associated with business processes; inventory of compliance requirements; consideration of key operational aspects; and an assessment of the information systems environment. During the general overview, a detailed understanding of the management structure, significant financial and operational processes, compliance requirements, and information systems will be obtained (or updated). As needed, the general overview will incorporate the use of internal control questionnaires (an example is provided as Attachment A), process flowcharts, and the examination of how documents are handled for key processes. A. The following table summarizes audit objectives and corresponding high-level risks to be considered during the general overview. Audit ObjectiveAreas of RiskObtain a detailed understanding of significant processes and practices employed in administering the financial aid function for graduate and undergraduate students, specifically addressing the following components: Management philosophy, and operating style, and risk assessment practices; Organizational structure, and delegations of authority and responsibility; Positions of accountability for financial and programmatic results; Process strengths (best practices), weaknesses, and mitigating controls; Information systems, applications, databases, and electronic interfaces.Poor management communication regarding expectations may result in inappropriate behavior. The financial aid units' risk assessment processes may not identify and address key areas of risk. Inadequate separation of responsibilities for activities may create opportunities for fraud, misuse and errors or omissions. Inadequate accountability for the achievement of financial or programmatic results may decrease the likelihood of achieving results. Processes and/or information systems may not be well designed or implemented, and may not yield desired results, i.e., accuracy of financial information, operational efficiency and effectiveness, and compliance with relevant regulations, policies and procedures.  B. The following procedures will be completed as part of the general overview whenever the core audit is conducted. General Control Environment Interview the department director and key managers to identify and assess their philosophy and operating style, regular channels of communication, and all internal risk assessment processes. Obtain the department's organizational chart, delegations of authority, and management reports. Interview select staff members to obtain the staff perspective. During all interviews, solicit input on concerns or areas of perceived risk. Determine the frequency and content of employee training programs, and that employees have been appropriately trained for their responsibilities. Evaluate the adequacy of the organizational structure and various reporting processes to provide reasonable assurance that accountability for programmatic and financial results is clearly demonstrated. If the organizational structure and various reporting processes do not appear adequate, consider alternative structures or reporting processes to enhance assurance. Comparison to similar local departments, or corresponding departments on other campuses may provide value by demonstrating better accountability. Business Processes Identify all key department activities, gain an understanding of the corresponding business processes, and positions with process responsibilities. Include identifying all types of financial aid available to students and annual disbursements per type. For financial processes, document positions with responsibility for initiating, reviewing, approving and reconciling financial transaction types. Document processes via flowcharts or narratives identifying process strengths, weaknesses, and mitigating controls. Conduct walk-throughs of various processes for a small sample of transactions by reviewing ledger entries, and corresponding documents noting approval signatures (manual or electronic) versus processes as described by department. Evaluate processes for adequate separation of responsibilities. Evaluate the adequacy of the processes to provide reasonable assurance that University and other agency resources are properly safeguarded. If processes do not appear adequate, develop detailed test objectives and procedures, and conduct detailed transaction testing with specific test criteria. Consider whether statistical (versus judgmental) sampling would be appropriate for purposes of providing a confidence interval and projecting on the population as a whole. Information Systems 12. Interview department information systems personnel to identify all department information systems, applications, databases and interfaces (manual or electronic) with other systems, including systems in other departments (e.g., Accounting, Billing). Obtain and review systems documentation to the extent available. Otherwise, document information flow via flowcharts or narratives, including all interfaces with other systems, noting the following: Is this an electronic or manual information system? Does the system interface with core administrative information systems? If yes, is the interface manual or electronic? Does the system interface with outside vendor information systems? If yes, is the interface manual or electronic? What type(s) of source documents are used to input the data? What types of access and edit/processing controls are in place within the automated system? How are system transactions reviewed and approved? What are the application user roles or security levels; what transactions are allowed for each user role or security level? Who has change access to master data? Who reconciles the system's output to ensure correct and accurate information? Is a disaster/back-up recovery system in place for this system? What is the retention period for source documents and system data? 13. Consider two-way test of data through systems from source document to final reports, and from reports to original source documents. 14. Evaluate the adequacy of the information systems to provide for availability, integrity and confidentiality of University information resources. 15. If system controls do not appear adequate, develop detailed test objectives and procedures, and conduct detailed testing with specific test criteria. C. Following completion of the general overview steps outlined above, a high-level risk assessment should be performed and documented. To the extent necessary, as determined by the auditor, this risk assessment may address aspects of other areas outlined below (financial reporting, compliance, operational efficiency and effectiveness; and information systems). In addition to the evaluations conducted in the general objectives section, the risk assessment should consider the following: annual expenditures; time since last review; recent audit findings; organizational change; regulatory requirements, and any other significant process specific risks. III. Financial (Estimated time to complete – 40 hours) A. The following table summarizes audit objectives and corresponding high-level risks regarding financial reporting processes. Audit ObjectiveAreas of RiskEvaluate the accuracy and integrity of financial reporting, specifically addressing the following components: Department budget processes; Monitoring of budget variances; Management of funds designated for student financial aid, including Federal, State, UC, campus, endowments and gifts, and outside sources (outside scholarships, agency loans, student entitlement programs such as veterans and disabled students); Preparation of annual FISAP (Fiscal Operations Report and Application to Participate) and other required reports and their reconciliation to the campus general ledger. Reconciliation of general ledger accounts Budgeting processes may not adequately align resources with key business objectives. Budget variances not adequately monitored and evaluated may result in department budget overdrafts. All funds which should be available for financial aid disbursements may not be available. Funds available for financial aid may be overspent. Incomplete or inaccurate reporting to agencies could result in a loss of funding. B. The following procedures should be considered whenever the core audit is conducted. 1. Identify all financial reporting methods in use by the department for both departmental activities, and student financial aid activities. Obtain and review copies of recent financial reports. Identify all budgetary reporting methods in use by the department for both departmental activities and student financial aid activities. Obtain and review copies of recent budgetary reports. Document the aid planning process. Determine how the department determines anticipated results and compares them to actual results. Document through spreadsheets, narratives or flowcharts financial aid budget processes and reconciliation procedures. Include financial aid funds. Gain an understanding of the different methods implemented to monitor department and fund budget and reconciliation variances. Validate on a test basis. On a test basis, evaluate the accuracy and reliability of financial reporting. If certain reporting practices do not appear accurate and reliable, develop detailed test objectives, procedures, and criteria. Conduct detailed testing as needed to determine the impact of financial reporting issues. IV. Compliance (Estimated time to complete – 80 hours) The following table summarizes audit objectives and corresponding high-level risks regarding compliance with policies and procedures, and regulatory requirements. Audit ObjectiveAreas of RiskEvaluate local compliance with the following requirements: UCOP Policies, e.g., Delegations and limitations of authority; Accounting Manual E-525, Endowments and Similar Funds Accounting Manual S-772, S-772-12, S-772-18, S-772-85 relating to Student Aid Accounting Manual A-115-62, Accounting Procedures for Recording Federal Financial Aid Administrative Allowance Applicable Federal statutes and regulations relative to the receipt of Federal Student Aid funds (include FERPA (Family Educational Rights and Privacy Act) and Title IV requirements); Applicable State statutes and regulations relative to the receipt of State funds for financial aid purposes, including Proposition 209; Other University and local policies and procedures; and Donor restrictions on endowments and gifts. Determine whether department has in-house monitoring procedures that review for compliance with regulations. Delegations of authority may be improperly exceeded. Non-compliance of local processes with University requirements. Non-compliance with laws and regulations may result in a loss of funds for financial aid. Non-compliance with laws and regulations may put the University at risk with regulatory agencies. Donor restrictions may not be accurately communicated to units awarding aid. Donor restrictions may be interpreted or applied incorrectly by individuals in the Financial Aid Office or other units in making award determinations. Fund restrictions may not be observed. Aid may be given to an unqualified student. Funds may not be used for student aid.  B. The following procedures should be considered whenever the audit is conducted. Independent Appraisals Determine all recent audits or appraisals made by outside agencies involving the Financial Aid Office and its operations, such as the annual Federal OMB Circular A-133 compliance audit, California Student Aid Commission (CSAC) reviews, and other audits or appraisals by independent public accountants, government auditors or consultants. Review reports to determine the extent of audit coverage to avoid a duplication of effort. Compliance Issues Determine whether the Financial Aid Office has utilized the NASFAA (National Association of Student Financial Aid Administrators) Self-Evaluation Guide and review the results. Select a sample of financial aid award packages and evaluate compliance with relevant federal and state requirements, UC, and campus policies and procedures. Include compliance with donor restrictions on financial aid funds. Based on the limited review, evaluate whether processes provide a reasonable assurance that operations are in compliance with policies and procedures, and regulatory requirements. If it does not appear that processes provide reasonable assurance of compliance, develop detailed test procedures, and criteria to evaluate extent of non-compliance and impact. Conduct additional detailed testing as needed to assess the overall impact of compliance concerns. V. Operational Effectiveness and Efficiency (Estimated time to complete – 100 hours) A. The following table summarizes audit objectives and corresponding high-level risks regarding operational effectiveness and efficiency. Audit ObjectiveAreas of RiskEvaluate control over the financial aid award and administrative process, specifically addressing the following areas: Evaluation of financial need / eligibility and verification; Packaging / awarding of financial aid; Disbursing financial aid to awardees; Cash management, including drawdowns; Communication between units awarding financial aid; Levels of authority for determining eligibility and awarding financial aid; Controls in place over changes to awards (including separation of duties and review process); Separation of duties in the handling of cash, and the disbursement of aid. Cash controls; and Other processes, as needed.Improper awards could be made without accurate student financial information. Failure to comply with program requirements could result in loss of funding. Ineligible students could receive aid. Students could receive over- or under-awards. Awards may not be recorded to the billing system. Problems with cash management could lead to loss of funding or a loss of STIP (Short Term Investment Pool) income to campus. Inadequate controls could result in financial aid awards being distributed to other than the awardee. Awards made by the separate divisions, if not coordinated, may result in students receiving financial aid greater than they qualify for or packaged incorrectly. Inadequate cash controls could result in errors or irregularities. Late or delayed awards could lead to a student being unable to attend. Based on the information obtained during the general, financial, and compliance overview, evaluate whether any operations should be evaluated further via detailed testing. For example, the following testing should be considered (preferably in context of the same samples selected during previous testing): Evaluation of Eligibility and Verification Determine eligibility requirements for the specific types of aid awarded, and verify that students met those requirements and continued to meet the requirements if the award was for more than one academic quarter/semester. Requirements could include student status, including GPA (Grade Point Average) and course load requirements (“satisfactory academic progress”); financial need; or donor restrictions. Determine controls in place to ensure that recipient is eligible and enrolled. If there was a change in eligibility, determine whether there was a corresponding change in award and evaluate. Determine that data was accurately downloaded from the federal system to the campus system by two-way testing. Document the process for changes to the data after the download, and determine whether changes are reviewed. Review the verification process and determine whether it meets federal and state regulations. From a sample of students who were selected for verification, determine that the verification criteria were used properly. For students who did not complete the verification process, verify that they did not receive financial aid. Financial Aid Award Process Determine that the packaging process is done in accordance with regulations and campus packaging policy. Determine the responsibilities of the Financial Aid Office (FAO), Graduate Division and other units on campus relating to disbursing financial aid, and the communication between the units. Verify that departmental awards are being reported to the FAO for coordination with need-based aid. Identify campus loan or endowment funds that are designated for or restricted to financial aid. Determine if the financial activity appears to be in accordance with any restrictions. Determine whether awards by departments were being reported to the FAO. Determine controls in place to ensure that financial aid advisors work only on files within their area. Determine whether there are documented procedures related to awarding aid involving relatives, co-workers, or student workers within the office. Disbursement of Financial Aid Awards Trace a sample of financial aid awards from the application file to the financial aid computer system to the billing or disbursement system. The application: FAFSA (Free Application for Federal Student Aid); Transfer to campus: ISIR (Institutional Student Information Record – processed student information records transmitted electronically to campus); (SAR - Student Aid Report is the same information, sent by hard copy to student in a different format); Verification: Performed if required (up to 30% of applications for federal aid); Packaging: Performed according to predetermined packaging parameters. UC aid should comply with Higher Education model; Disbursement: Only when verification is complete, necessary documents (loan, citizenship, tax information) have been received, and timing is within limits. Determine that funds were disbursed within Federal and University guidelines. Determine whether any checks or funds are routed back through the FAO or distributing office if not disbursed and evaluate. Verify that disbursement amount matched the award. Determine controls in place to prevent duplicate payments. If the aid was in the form of a loan, verify that there are properly executed loan documents that outline the terms of the loan and the repayment requirements. If possible, use ACL or similar program to compare students who received financial aid to enrolled students. Follow up on exceptions. Determine whether financial aid is properly handled for students who withdraw from the university. Determine that correct procedures for the return to Title IV (R2T4) are followed. Determine controls are in place to check on financial aid packages that have been revised from initial need-based calculations. Review over-awards to determine that they were allowable, and include permanent over awards in the review. On a test basis, determine whether departments are notified by the Development Office in a timely manner of new gifts, endowment income or other funds available for disbursement as financial aid. Determine whether all fund income eligible for disbursement has been disbursed in a timely manner. Determine that adequate controls are in place to prevent the individual evaluating eligibility from also authorizing the payment of financial aid. Review the controls in place over cash receipts of financial aid to disburse to students (from outside agencies). Determine the levels of authority for evaluating eligibility, awarding aid and making changes to financial aid, and the controls in place to ensure that only authorized individuals perform these functions. Document instances in which an individual is able to perform more than one of these functions without supervisory review. Cash Management / Fund Reconciliation Review drawdown procedures with each department that is involved. Determine whether drawdowns are performed according to regulations. Determine whether drawdowns are appropriately requested in a timely manner and that supporting documentation is complete. If drawdowns are not required, review procedures for obtaining aid funds for disbursement, e.g. for California Student Aid Commission (CSAC), and some federal funds (Perkins loans, work study, direct loans). Determine whether reports of aid disbursed are performed accurately and according to regulations. Determine the role of all departments in the reconciliation process. Determine whether reconciliation is appropriately performed in a timely manner. Determine the procedures followed when discrepancies are found during reconciliation. On a test basis, determine that donors have been notified or given permission for any fees assessed on gifts or endowments. VI. Information Systems (Estimated time to complete – 40 hours) A. The following table summarizes audit objectives and corresponding high-level risks regarding information systems. Audit ObjectiveAreas of RiskEvaluate the following information systems, applications, databases, system interfaces and records practices. Financial aid packaging and awarding applications; Electronic or manual interfaces between Financial Aid systems, applications, and/or databases; Electronic or manual interfaces with core campus administrative information systems; Electronic or manual interfaces with federal, state and outside agency systems, applications, and/or databases; Records management policies and practices for both hardcopy and electronic records; System access; System documentation; Business continuity planning.Security management practices may not adequately address information assets, data security policy, or risk assessment. Application and systems development processes may result in poor design or implementation. The confidentiality, integrity and availability of data may be compromised by ineffective controls (physical, logical, operational). Disaster recovery and business continuity planning may be inadequate to ensure prompt and appropriate crisis response. Records management policy and practice may not adequately ensure availability. Financial aid awards processed through more than one system could lead to over- or under-awards.  The following procedures should be considered whenever the core audit is conducted. 1. Identify any significant changes to information systems, and corresponding business processes. 2. Evaluate the impact of any significant changes to the overall system of internal controls. C. Consider two-way test of data through systems from source document to final reports, and from reports to original source documents. Evaluate the adequacy of the information systems to provide for availability, integrity, and confidentiality of University information resources. D. Based on the information obtained during the information systems overview, evaluate whether any information resources should be evaluated further via detailed testing using specific test criteria and procedures. GENERAL OBJECTIVES: 1. Provide the following: a. Mission statement or vision statement b. Organizational chart c. Current delegations of authority or responsibility d. Most recent job descriptions for key management positions e. Strategic planning documents Chart of financial accounts Training records for selected employees and listing of training programs h. List of regularly prepared management reports (financial and/or programmatic) i. List of key departmental contacts for major departmental activities 2. Describe any significant changes to departmental operations in the last three years. For example, list any turnover in key positions; changes to policies, processes or procedures; new information systems; new or revised compliance requirements; etc. 3. Describe department management's processes or approaches for evaluating the status of current operations. If the various approaches include any formal risk assessment process, describe the process in detail and corresponding reporting, if any. 4. Does management have any concerns with regard to the current state of departmental activities? If so, what are they? If not, what departmental operations should be considered for selection as the focus or scope of the current review in your opinion? 5. Have any departmental operations been the subject of review by any outside party (e.g., Office of the President, peer review, independent consultants, regulatory agencies, external auditors, governmental agencies, etc.)? If so, provide the results of the review(s). FINANCIAL OBJECTIVES: 1. Describe departmental budget processes, including departmental funds and financial aid funds. Also describe departmental processes and responsibilities for monitoring budget variances (actual financial results versus financial budgets). 2. What financial reports are prepared regularly and with what frequency? Who prepares the financial reports, and to whom are they distributed? Include reports for all types of financial aid, including Federal, State, UC, local, endowments and gifts. Provide copies of all reports issued for the previous year. 3. Describe the process used to determine that all aid available for disbursement from Federal, State, University and local sources is disbursed according to plan and within the legal parameters of the programs. If not all aid is disbursed, describe the circumstances in which aid would not be disbursed. 4. Describe the procedures used in reconciling general ledger accounts with internal and external documentation. COMPLIANCE OBJECTIVES: 1. Explain your processes for promoting and ensuring compliance with various requirements, e.g., University and local policies and procedures, and State and Federal statutes and regulations. 2. Are there any prescribed processes for monitoring the level of compliance with specific requirements, and reporting internally discovered instances of non-compliance? If so, describe the processes. 3. In your opinion, are there any specific policies, procedures, rules or regulations that are not consistently observed? If so, explain the requirement, and estimate the level of compliance (or non-compliance) and its impact. 4. Are there currently any out-of-compliance determinations made by any agency that relate to any of the financial aid programs? OPERATIONAL OBJECTIVES: 1. Describe your core business processes for the following: a. Evaluation of eligibility for financial aid b. Verification of eligibility for financial aid c. Disbursing financial aid to awardees d. Cash management, including drawdown e. Coordination with other units awarding financial aid f. Levels of authority for determining eligibility, making changes and awarding financial aid g. Cash receipts controls 2. Describe your management reporting processes regarding the status of operational activities. Include both written and verbal reporting channels. For example, include documented status reports, as well as project status meetings. Also, indicate which are used on a recurring basis and the frequency, and which are used on a more ad hoc basis. 3. Regarding evaluation of eligibility for financial aid, answer the following questions (repeat this series of questions for each program, e.g. Federal aid, State aid, Institutional aid, and outside resources): a. Describe the process of ensuring that financial aid was awarded in accordance with the terms and conditions of the funding source. b. How is it determined that all financial aid advisors follow needs analysis and packaging procedures? If the financial aid is not awarded through the FAO, are the correct procedures followed so that there are not over awards? Describe the procedures. c. How is it determined that financial aid advisors work only on assigned students? What procedures are in place to provide for supervisory approval for any exceptions to procedures or changes of award packages? How is it ensured that FAFSA (Free Application for Federal Student Aid) data from EDExpress (US Department of Education software) is accurately transferred to the campus student aid management system? If the data is later changed, what controls are in place to provide for review? 4. Regarding verification of eligibility for financial aid, answer the following: a. How is it determined that financial aid eligibility is verified in accordance with policies and regulations? b. How are changes in eligibility managed if they result in a change in award? 5. Regarding disbursing financial aid to awardees, answer the following: a. Describe the process of disbursing financial aid to awardees, for any financial systems used by all units. Are any checks or funds routed back through the FAO if not disbursed through the billing system or otherwise disbursed to the recipient? Describe. How are over awards discovered and corrected? How is the FAO notified of students who have withdrawn? 6. Regarding cash management, including drawdown, answer the following: a. Describe the drawdown process, and the controls in place to ensure that it is performed in accordance with regulations. Describe the controls in place for the receipt of cash. What procedures are in place to provide for the return to Title IV (R2T4) for students who have withdrawn? 7. Regarding coordination with other units awarding financial aid, answer the following: a. Describe the communication between the student financial aid office, the graduate division and all other units as it relates to the awarding and disbursing of financial aid. b. How does the FAO / Graduate Division receive notice of awards given at the department level? 8. Regarding levels of authority for determining eligibility, awarding and making changes to financial aid, answer the following: a. Describe the levels of authority required for the above functions, and the controls in place to ensure that only authorized individuals perform these functions. b. Describe any instances in which an individual is able to perform more than one of these functions without supervisory review. 9. Describe any improvements you have instigated in the past year to the operational activities of the department. What plans are made for future improvements? INFORMATION SYSTEMS OBJECTIVES: 1. Provide the name of the information system used for the following. Also note whether systems are manual or electronic. Evaluating student need for financial aid Financial aid packaging Sending financial aid awarded to the billing system, or otherwise disbursing it Cash management, including drawdowns Reconciliation to general ledger Other systems, if applicable 2. Who is responsible for systems administration and security? How is physical security maintained for departmental information resources? How is logical security (access) provided or restricted? Who decides? Who is responsible for ensuring compliance with IS3 and IS10? 3. Have any department information systems been developed internally? If so, describe the development process and the current status of the system(s). 4. Do any departmental information systems interface with systems owned by other central administrative departments? If so, describe. 5. Does the department have a written disaster recovery plan for emergencies? If so, is that plan periodically tested? When was the last test, and what were the results? 6. Are records retention schedules observed? 7. Have there been any indications of problems with information, i.e., availability, accuracy, completeness, timeliness, security, etc.? 8. Have all the required software licenses been acquired? Are maintenance agreements current? 9. Do you have any concerns about departmental information systems or interfaces with other systems? NASFAA (National Association of Student Financial Aid Administrators) Self-Evaluation Guide for Institutional Participation in Title IV and Other Federal Programs, updated approximately annually. Audits of Federal Student Financial Aid Programs, Chapter 600 of Federal Auditing Information Service for Higher Education, NACUBO (National Association of College and University Business Officers) Publications, updated December 2002. Program Review Guide, Student Financial Assistance Programs, U.S. Department of Education, updated August 2001. Audits of Federal Student Financial Assistance Programs at Participating Institutions and Institution Servicers, US Department of Education, updated January 2000. Federal Student Aid Handbook, US Department of Education, Information for Financial Aid Professionals (IFAP) Library, updated annually. Core Audit Program -- Student Financial Aid - PAGE 1- March 17, 2003 Proposed Core Audit Program -- Student Financial Aid D-R-A-F-T March 18, 2003 Attachment A Proposed Internal Control Questionnaire (ICQ) - PAGE 5- Attachment A Proposed Internal Control Questionnaire (ICQ) - PAGE 1- March 18, 2003 Attachment B Resources for the Auditor - PAGE 1- B‹µŽß„ … ” • £ “EFŽ”¦ŗ~™!*$+$:$b$c$ā$ć$å$ō$õ$%Į&Ä&Ž&ß&ķ&ī&)i)Ļ-Ž-.­.¼.½.Ė.Ž1K2ß42535K5ś6 7l:˜:Į:Ā:L;M;\;];k;A}BłFłšłšłęšłš×š×šłŹšłšłšĄšłøłęšłš×š×š¬š¬š¬šłšłęł×š×šłšłšłšłšłęšłš×š×šłš5CJOJQJ\^JOJQJ^Jh>*CJOJQJ^J5>*CJOJQJ\^J56CJOJQJ\]^J5OJQJ\^JCJOJQJ^J OJQJ^JDn™³Ģß%BCŠ‹Žß ’ „ … ņčęįĻĻĻĻĻĻÉÉÉčęįįįĒĀµ $„¼„"ü^„¼`„"üa$$a$„Š^„Š & F, Ę 8„Š„^„Š`„$a$ „Š„0ż^„Š`„0ż $„Š„0ż^„Š`„0ża$p‡óˆżż… • £ ¤ { Ę  V Ÿ č C§ņįv<pfffffff & F$If$Ifk$$If–lÖÖ0Š°ü$ąLÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö<$„”’¤<¤<$If^„”’a$ $¤<¤<$Ifa$ §$Ŗ²³“()EFõõõŠ€{vm`X$ & F"a$ $„ „`ś^„ `„`śa$$„Š`„Ša$$a$$a$ „¼„"ü^„¼`„"ük$$If–lÖÖ0Š°ü$ąLÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö< & F$If ghö÷‰ŠUVŽ”¢žŸ¦§Ž[\„¦ŗöīéīéīéīéīéąÓīéīéīéīéīéą $„Š„0ż^„Š`„0ża$$„Š`„Ša$$a$$ & F"a$$„ ^„ a$ŗ»³*œŁ5hä Y™ÜŻf g ż ž ˜!™!*$+$śķÜÜÜÜÜÜÜÜÜÜÜśķķķķķś×Ē & F„ „0ż1$@& ^„ `„0ż$a$$ & F Ęp„p^„pa$ $„„˜ž^„`„˜ža$$a$+$b$c$ā$ć$å$õ$%%õėęÜŚĶ¼Q4k$$If–lÖÖ0Š°ü$ąLÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö<$„”’¤<¤<$If^„”’a$ $¤<¤<$Ifa$ „¼„"ü^„¼`„"ü$a$ „Ž„"ü^„Ž`„"ü „Š„0ż^„Š`„0ż%r%%Æ%¤&L'v'Ģ'0(Š(¾())łļļļļļąļļļļuk$$If–lÖÖ0Š°ü$ąLÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö< & F ĘH¾$If & F$If$If ))i)j).*/*ī*ļ*s+t+, ,£,¤,Ī-Ļ-..«.õšėŽŽŹŽŹŽŹŽŹŽŹĮ“ė $ & F- Ę8„ „0ż^„ `„0ża$ $„Š„0ż^„Š`„0ża$$„ ^„ a$$ & F/ Ę„p„0ż^„p`„0ża$ $„p„0ż^„p`„0ża$$a$$a$ „¼„"ü^„¼`„"ü«.¬.½.Ė.Ģ.//G/}/Ė/:0żšßtHndZZZZ & F$If & F$If$Ifk$$If–lÖÖ0Šü$HäÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö<$„”’¤<¤<$If^„”’a$ $¤<¤<$Ifa$ :0ņ0z1²1Ž1K2L22Į23~3Ė3b4‰4µ4Ü4Ż4õõõõļéõõõõõõõõõß „h$If^„h$If$If & F$IfŻ4Ž4ß42535J5K56ž6ł6ś6’ˆƒvmd\d\v$ & F$a$$„ ^„ a$$„Š`„Ša$ $„ „0ż^„ `„0ża$$a$ „¼„"ü^„¼`„"üm$$If–lÖ”XÖ0Šü$HäÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö< ś6 7 7½7¾7Ÿ8 8U9V9k:l:Į:Ā:L;M;];öķåķåŲåŲåĒŗ­Ø›Ž $¤<¤<$Ifa$ $„¼„"ü^„¼`„"üa$$a$ $„Ž„"ü^„Ž`„"üa$ $„Š„0ż^„Š`„0ża$$ Ę „p„÷^„p`„÷a$ $ Ę „ ^„ a$$ & F*a$$„ ^„ a$$„Š`„Ša$];k;l;ć; <G<m<“<Ē<=q=¼=Ļ=ė=īƒÄ}ssssssssss & F$If$Ifk$$If–lÖÖ0Š°ü$ąLÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö<$„”’¤<¤<$If^„”’a$ ė=9>†>­>Ū> ?Š?š?’@Õ@AAAQBõõõõõõõõõõˆ†r$ & F) Ę8„ „0ż^„ `„0ża$m$$If–lÖ”ŅÖ0Š°ü$ąLÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö< & F$If QBRB}B~BDDdDeDÕDÖD²E³EųFłFGGG€G”H¢H¢I£IœJJĀJśńäܜܜܜܜܜńÓÜÓÜśÜÓÜÓń$„ ^„ a$$ & F+a$ $„ „0ż^„ `„0ża$$„Š`„Ša$$a$łFGJĀJPK_K”K¦KŽLšLßLźLWMeMqU˜U7YOYwYxYķYīYżYžY Zė^ģ^A_`a a#aõaūa bbhhēkżklælńno3uLv©xy‹}+~-~K~„„p‡q‡œ‡łšłšäšäšäšäšäšłšłŚäłšĖšĖšĆłšłšł»łš±š±šĆš±šĆšĆšĆš±šłĆ؜5CJOJQJ\^JCJOJQJ^J>*CJOJQJ^J>*OJQJ^JOJQJ^Jh56CJOJQJ\]^J5OJQJ\^J5CJOJQJ\^JCJOJQJ^J OJQJ^J8ĀJĆJPK”KŽLßLWMšNńN,O-OĶOĪOTPUP Q Q÷QųQ S!S“SµSöīÜÜÜÜÜ×ī×īĪīæī×ī×ī×ī×$„p„˜ž¤<^„p`„˜ža$$„ ^„ a$$a$$ & F2 Ę2 „p¤<^„pa$$ & F+a$$„8^„8a$µS'T(TpUqU—U˜U˜V™ViWjWĢWĶWøX¹X5Y7YwYxYķYīY÷ņ÷ņéä÷Ū÷Ū÷ņ÷ņ÷ŪĪ½ø® „ „0ż^„ `„0ż$a$$ ĘŠ„Š„0ż^„Š`„0ża$ $„Š„0ż^„Š`„0ża$$„ ^„ a$$a$$„Š`„Ša$$a$$ & F+a$īYžY Z Z{ZÆZ[c[Ó['\6\L\ņįvxpfffffff & F$If$Ifk$$If–lÖÖ0Š°ü$ąLÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö<$„”’¤<¤<$If^„”’a$ $¤<¤<$Ifa$ L\j\į\<]Ā]9^ˆ^é^ź^ė^ģ^õõõõõõõļ‚r & F„ „0ż1$@& ^„ `„0żm$$If–lÖ”¢Ö0Š°ü$ąLÖ0’’’’’’ö6Ö’’Ö’’Ö’’Ö’’4Ö laö<$If & F$If ģ^@_A_¤_„_``a aųałaśaūabb*bTbźįŌŌŌĒĀµĀĀ³³Ŗ„˜$„Š`„Ša$ $„Š„0ż^„Š`„0ża$$a$$„Š^„Ša$ $„p„0ż^„p`„0ża$$a$ $„„˜ž^„`„˜ža$ $ Ę„ ^„ a$$„`„a$$ & F) Ę „ „0ż^„ `„0ża$Tblb¢bßb’bcdcµcžc’cüdżdõeöeófōfhhhh i iCjDjukööööīīįÜÜĻĻĻĻĻĻĻÜÜÜĻÜĻĻĻ $„Š„0ż^„Š`„0ża$$a$ $„ „0ż^„ `„0ża$$ & F3a$$„Š`„Ša$ukvkēkčk’klælĄl‰mŠmnnonšnńn o oFovoØoŃoło2pśķśśśŚśķķķķķķśśķÉÉÉÉÉ$ Ę „Š„0ż^„Š`„0ża$$ & F„Š„0ż1$@& ^„Š`„0ża$ $„Š„0ż^„Š`„0ża$$a$2p‘p¬p­prrÜrbs_t³t3uLvMvŸvw^wķÜ׏ŹŹ½½½©’½Ź½½$ & F$ Ę\ „ „0ż1$@& ^„ `„0ża$$ & F$ Ę\ „ „0ż^„ `„0ża$ $„ „0ż^„ `„0ża$ $„Š„0ż^„Š`„0ża$$a$$ Ę „Š„0ż^„Š`„0ża$$ ĘŠ „ „`ś^„ `„`śa$^w_wØwx©x×xyyXyÓy zvzwzŠz‚{ā{ć{e| }öéÜĒÆÆÜéܟŸÜéÜÜöéÜ$ & F/ Ę@ „ ^„ a$$ & F* ĘŲ  „ „0ż1$@& ^„ `„0ża$$ & F* ĘŲ  „ „0ż^„ `„0ża$ $„ „0ż^„ `„0ża$ $„Š„0ż^„Š`„0ża$$„h^„ha$ }Š}‹}+~,~-~M~N~É~ó~ \¢ĄĮŠ€Ń€ijńņ‚ņåŅĶĶĶĶåÅÅÅÅÅÅĶåĶååååå$ & F4a$$a$$ & F„Š„0ż1$@& ^„Š`„0ża$ $„Š„0ż^„Š`„0ża$ $„ „0ż^„ `„0ża$‚ž‚Ģ‚Ķ‚WƒXƒ·ƒøƒ„„ „!„"„ę„ē„Ņ…Ó…C†D†ē†č†p‡q‡‡ž‡ņņņņņņņņ裣ŁŁŁŁŁŁŁŁŁŁŌŌĻ$a$$a$ & F„Š„0ż1$^„Š`„0ż „Š„0ż^„Š`„0ż $„Š„0ż^„Š`„0ża$œ‡‡ž‡ ‡”‡£‡¤‡Ŗ‡«‡¬‡­‡®‡Æ‡°‡æ‡ō‡ö‡ˆˆˆˆNˆOˆPˆQˆRˆSˆYˆZˆ[ˆ\ˆ]ˆ^ˆ_ˆšˆžˆŸˆ„ˆ¦ˆ§ˆØˆ©ˆ«ˆ¬ˆ»ˆįˆāˆćˆäˆåˆęˆōėąÜÕŅÕŹÕŅĮėøėąėø®”ܗÕŅÕŹÕŒĮˆÕŅÕŹÕŅˆ„®ˆÜ€ÕCJhCJ\5CJ0JCJOJQJ^JCJOJQJ^Jh5>*CJOJQJ\^J5CJOJQJ^JCJOJQJ^JCJOJQJ^J0JmHnHu0J j0JUCJh5>*OJQJ\^JCJOJQJ^J5CJOJQJ\^J2ž‡Ÿ‡ ‡”‡Æ‡°‡æ‡Ą‡õ‡ö‡ˆˆˆˆˆˆ ˆNˆOˆPˆ^ˆ_ˆlˆšˆ›ˆœˆŖˆ«ˆśśųńųģśśģśśźųģśśśśųčųśśźųčų$a$ ĘąH$a$«ˆ»ˆČˆāˆćˆńˆņˆóˆōˆśśśśųööē & F„Š„0ż1$^„Š`„0ż$a$ęˆģˆķˆīˆļˆšˆńˆóˆōˆżöīöżėćOJQJ^JhCJ0JmHnHu j0JU0J+0&PP°Š/ °ą=!° "° #š$`%°°š+0&PP°Š/ °ą=!° "° #š$`%°°š+0&PP°Š/ °ą=!° "° #š$`%°°š i0@ń’0 Normal_HmH sH tH D@D Heading 1$„Ž„"ü@&^„Ž`„"ü5CJ@@@ Heading 2$„ „0ż@&^„ `„0żCJNN Heading 3 $ ĘŠ„Š„0ż@&^„Š`„0ż 5CJ\8@8 Heading 4$„Š@&`„ŠCJHH Heading 5 $ ĘŠ„p„`ś@&^„p`„`śCJNN Heading 6 $ ĘŠ„p„÷@&^„p`„÷ 5CJ\88 Heading 7$„ @&^„ CJ88 Heading 8$„8@&^„8CJ@ @ Heading 9 $„ „˜ž@&^„ `„˜žCJ<A@ņ’”< Default Paragraph Font,@ņ, Header  ĘąĄ!, @, Footer  ĘąĄ!DCD Body Text Indent„Ž„"ü^„Ž`„"üHžO"H Level 1 & F„Š„0ż1$@&^„Š`„0żCJhHžO2H Level 2 & F„ „0ż1$@&^„ `„0żCJhDR@BD Body Text Indent 2 „Š^„ŠCJDSRD Body Text Indent 3 „p^„pCJ&)@¢a& Page Number*B@r* Body TextCJś]€ō„Ī’’’’-Ī’’’’ZĪ’’’’n™³Ģß%BCŠ‹Žß ’„…•£¤{Ę V Ÿ č C § $ Ŗ ² ³ “ ( ) E F ghö÷‰ŠUVŽ”¢žŸ¦§Ž[\„¦ŗ»³*œŁ5hä Y™ÜŻfgżž˜™* + b c ā ć å õ !!r!!Æ!¤"L#v#Ģ#0$Š$¾$%%%i%j%.&/&ī&ļ&s't'( (£(¤(Ī)Ļ)**«*¬*½*Ė*Ģ*++G+}+Ė+:,ņ,z-²-Ž-K.L..Į./~/Ė/b0‰0µ0Ü0Ż0Ž0ß02131J1K12ž2ł2ś2 3 3½3¾3Ÿ4 4U5V5k6l6Į6Ā6L7M7]7k7l7ć7 8G8m8“8Ē89q9¼9Ļ9ė99:†:­:Ū: ;Š;š;’<Õ<===Q>R>}>~>@@d@e@Õ@Ö@²A³AųBłBCCC€C”D¢D¢E£EœFFĀFĆFPG”GŽHßHWIšJńJ,K-KĶKĪKTLUL M M÷MųM O!O“OµO'P(PpQqQ—Q˜Q˜R™RiSjSĢSĶSøT¹T5U7UwUxUķUīUžU V V{VÆVWcWÓW'X6XLXjXįX0ė!’’’’’’’’’f.?~Ėą’’’’’’’’’ģ6?œōH.’’’’’’’’’+'AöRš’’’’’’’’’Æ{#Bü,–’’’’’’’’’°9ŸEŅNĘ’’’’’’’’’wT Hīź¼Y’’’’’’’’’„^Kr5č’’’’’’’’’ž OĄpx’’’’’’’’’z0æYxĀ_’’’’’’’’’_ZgZ8×Ly’’’’’’’’’É?e]²6–£’’’’’’’’’Ų7Œ_ģE'’’’’’’’’’ĪsŚc¦„’’’’’’’’’“…dŗtŅ_’’’’’’’’’V)¼eöRš’’’’’’’’’d!ƒiVĄG’’’’’’’’’e`‰j&1Īø’’’’’’’’’.pŌküQĀ’’’’’’’’’d;’lr%ŗ’’’’’’’’’Ž]en¾Ē@¬’’’’’’’’’¾*oŅ1„ē’’’’’’’’’hg7oČ颍’’’’’’’’’ė+pīƒ6ļ’’’’’’’’’CŽq08ōĻ’’’’’’’’’£h‡r¢ń¶’’’’’’’’’,t l ’’’’’’’’’(vuĄ}Bē’’’’’’’’’u-äwl“7’’’’’’’’’™HŒ}“AīĮ’’’’’’’’’„Š„0żĘŠ^„Š`„0ż.„ „0żĘ ^„ `„0ż.„„˜žĘ^„`„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.„„˜žĘ^„`„˜žo(.„Ų „˜žĘŲ ^„Ų `„˜žo(.‚„Ø „L’ĘØ ^„Ø `„L’.€„x„˜žĘx^„x`„˜ž.€„H„˜žĘH^„H`„˜ž.‚„„L’Ę^„`„L’.€„č„˜žĘč^„č`„˜ž.€„ø„˜žĘø^„ø`„˜ž.‚„ˆ„L’Ęˆ^„ˆ`„L’.„D„\žĘD^„D`„\žo(.h„Ų „˜žĘŲ ^„Ų `„˜ž.„\ „˜žĘ\ ^„\ `„˜žo(.€„x„˜žĘx^„x`„˜ž.€„H„˜žĘH^„H`„˜ž.‚„„L’Ę^„`„L’.€„č„˜žĘč^„č`„˜ž.€„ø„˜žĘø^„ø`„˜ž.‚„ˆ„L’Ęˆ^„ˆ`„L’.h „2 „˜žĘ2 ^„2 `„˜žOJQJo(·šh „ „˜žĘ ^„ `„˜žOJQJo(oh „Ņ„˜žĘŅ^„Ņ`„˜žOJQJo(§šh „¢„˜žĘ¢^„¢`„˜žOJQJo(·šh „r„˜žĘr^„r`„˜žOJQJo(oh „B„˜žĘB^„B`„˜žOJQJo(§šh „„˜žĘ^„`„˜žOJQJo(·šh „ā„˜žĘā^„ā`„˜žOJQJo(oh „² „˜žĘ² ^„² `„˜žOJQJo(§š„8„˜žĘ8^„8`„˜žo(.€„„˜žĘ^„`„˜ž.‚„Ų „L’ĘŲ ^„Ų `„L’.€„Ø „˜žĘØ ^„Ø `„˜ž.€„x„˜žĘx^„x`„˜ž.‚„H„L’ĘH^„H`„L’.€„„˜žĘ^„`„˜ž.€„č„˜žĘč^„č`„˜ž.‚„ø„L’Ęø^„ø`„L’.„„˜žĘ^„`„˜žo(.€„Ų „˜žĘŲ ^„Ų `„˜ž.‚„Ø „L’ĘØ ^„Ø `„L’.€„x„˜žĘx^„x`„˜ž.€„H„˜žĘH^„H`„˜ž.‚„„L’Ę^„`„L’.€„č„˜žĘč^„č`„˜ž.€„ø„˜žĘø^„ø`„˜ž.‚„ˆ„L’Ęˆ^„ˆ`„L’.h „Š„˜žĘŠ^„Š`„˜žOJQJo(·šh „ „˜žĘ ^„ `„˜žOJQJo(oh „p„˜žĘp^„p`„˜žOJQJo(§šh „@ „˜žĘ@ ^„@ `„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „ą„˜žĘą^„ą`„˜žOJQJo(§šh „°„˜žĘ°^„°`„˜žOJQJo(·šh „€„˜žĘ€^„€`„˜žOJQJo(oh „P„˜žĘP^„P`„˜žOJQJo(§šh „H„˜žĘH^„H`„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „č„˜žĘč^„č`„˜žOJQJo(§šh „ø „˜žĘø ^„ø `„˜žOJQJo(·šh „ˆ„˜žĘˆ^„ˆ`„˜žOJQJo(oh „X„˜žĘX^„X`„˜žOJQJo(§šh „(„˜žĘ(^„(`„˜žOJQJo(·šh „ų„˜žĘų^„ų`„˜žOJQJo(oh „Č„˜žĘČ^„Č`„˜žOJQJo(§šh„ „˜žĘ ^„ `„˜ž.h„ „˜žĘ ^„ `„˜ž.h „p„˜žĘp^„p`„˜žOJQJo(§š„@ „˜žĘ@ ^„@ `„˜žo(.h „„˜žĘ^„`„˜žOJQJo(oh „ą„˜žĘą^„ą`„˜žOJQJo(§šh „°„˜žĘ°^„°`„˜žOJQJo(·šh „€„˜žĘ€^„€`„˜žOJQJo(oh „P„˜žĘP^„P`„˜žOJQJo(§š„8„˜žĘ8^„8`„˜žo(.„„˜žĘ^„`„˜žo(.‚„Ų „L’ĘŲ ^„Ų `„L’.€„Ø „˜žĘØ ^„Ø `„˜ž.€„x„˜žĘx^„x`„˜ž.‚„H„L’ĘH^„H`„L’.€„„˜žĘ^„`„˜ž.€„č„˜žĘč^„č`„˜ž.‚„ø„L’Ęø^„ø`„L’. „Ų „˜žĘŲ ^„Ų `„˜žo(. „p„˜žĘp^„p`„˜ž.’ „@ „L’Ę@ ^„@ `„L’. „„˜žĘ^„`„˜ž. „ą„˜žĘą^„ą`„˜ž.’ „°„L’Ę°^„°`„L’. „€„˜žĘ€^„€`„˜ž. „P„˜žĘP^„P`„˜ž.’ „ „L’Ę ^„ `„L’.h„p„˜žĘp^„p`„˜ž)h„@ „˜žĘ@ ^„@ `„˜ž.’h„„L’Ę^„`„L’.h„ą„˜žĘą^„ą`„˜ž.h„°„˜žĘ°^„°`„˜ž.’h„€„L’Ę€^„€`„L’.h„P„˜žĘP^„P`„˜ž.h„ „˜žĘ ^„ `„˜ž.’h„š„L’Ęš^„š`„L’.h„Š„˜žĘŠ^„Š`„˜ž)h„ „˜žĘ ^„ `„˜ž.’h„p„L’Ęp^„p`„L’.h„@ „˜žĘ@ ^„@ `„˜ž.h„„˜žĘ^„`„˜ž.’h„ą„L’Ęą^„ą`„L’.h„°„˜žĘ°^„°`„˜ž.h„€„˜žĘ€^„€`„˜ž.’h„P„L’ĘP^„P`„L’.h „Š„˜žĘŠ^„Š`„˜žOJQJo(·šh „ „˜žĘ ^„ `„˜žOJQJo(oh „p„˜žĘp^„p`„˜žOJQJo(§šh „@ „˜žĘ@ ^„@ `„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „ą„˜žĘą^„ą`„˜žOJQJo(§šh „°„˜žĘ°^„°`„˜žOJQJo(·šh „€„˜žĘ€^„€`„˜žOJQJo(oh „P„˜žĘP^„P`„˜žOJQJo(§š„Š„˜žĘŠ^„Š`„˜žo(.„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.„ „˜žĘ ^„ `„˜žo(.h „ „˜žĘ ^„ `„˜žOJQJo(·š‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.h „Š„˜žĘŠ^„Š`„˜žOJQJo(·šh „ „˜žĘ ^„ `„˜žOJQJo(oh „p„˜žĘp^„p`„˜žOJQJo(§šh „@ „˜žĘ@ ^„@ `„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „ą„˜žĘą^„ą`„˜žOJQJo(§šh „°„˜žĘ°^„°`„˜žOJQJo(·šh „€„˜žĘ€^„€`„˜žOJQJo(oh „P„˜žĘP^„P`„˜žOJQJo(§š„Ø „˜žĘØ ^„Ø `„˜žo(.„ą„0żĘą^„ą`„0żo(.„d„0żĘd^„d`„0żo(.€„„˜žĘ^„`„˜ž.€„č„˜žĘč^„č`„˜ž.‚„ø„L’Ęø^„ø`„L’.€„ˆ„˜žĘˆ^„ˆ`„˜ž.€„X „˜žĘX ^„X `„˜ž.‚„(#„L’Ę(#^„(#`„L’. „Š„˜žĘŠ^„Š`„˜žOJQJo(·š€ „ „˜žĘ ^„ `„˜žOJQJo(o€ „p„˜žĘp^„p`„˜žOJQJo(§š€ „@ „˜žĘ@ ^„@ `„˜žOJQJo(·š€ „„˜žĘ^„`„˜žOJQJo(o€ „ą„˜žĘą^„ą`„˜žOJQJo(§š€ „°„˜žĘ°^„°`„˜žOJQJo(·š€ „€„˜žĘ€^„€`„˜žOJQJo(o€ „P„˜žĘP^„P`„˜žOJQJo(§šh „Š„˜žĘŠ^„Š`„˜žOJQJo(·šh „ „˜žĘ ^„ `„˜žOJQJo(oh „p„˜žĘp^„p`„˜žOJQJo(§šh „@ „˜žĘ@ ^„@ `„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „ą„˜žĘą^„ą`„˜žOJQJo(§šh „°„˜žĘ°^„°`„˜žOJQJo(·šh „€„˜žĘ€^„€`„˜žOJQJo(oh „P„˜žĘP^„P`„˜žOJQJo(§šh„Š„˜žĘŠ^„Š`„˜ž)h„ „˜žĘ ^„ `„˜ž.’h„p„L’Ęp^„p`„L’.h„@ „˜žĘ@ ^„@ `„˜ž.h„„˜žĘ^„`„˜ž.’h„ą„L’Ęą^„ą`„L’.h„°„˜žĘ°^„°`„˜ž.h„€„˜žĘ€^„€`„˜ž.’h„P„L’ĘP^„P`„L’.„ „0żĘ ^„ `„0żo(.€„„˜žĘ^„`„˜ž.‚„Ų „L’ĘŲ ^„Ų `„L’.€„Ø „˜žĘØ ^„Ø `„˜ž.€„x„˜žĘx^„x`„˜ž.‚„H„L’ĘH^„H`„L’.€„„˜žĘ^„`„˜ž.€„č„˜žĘč^„č`„˜ž.‚„ø„L’Ęø^„ø`„L’.h„Š„˜žĘŠ^„Š`„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.  „„˜žĘ^„`„˜žOJQJo(·š „ „˜žĘ ^„ `„˜ž.’ „p„L’Ęp^„p`„L’. „@ „˜žĘ@ ^„@ `„˜ž. „„˜žĘ^„`„˜ž.’ „ą„L’Ęą^„ą`„L’. „°„˜žĘ°^„°`„˜ž. „€„˜žĘ€^„€`„˜ž.’ „P„L’ĘP^„P`„L’.h„„˜žĘ^„`„˜žo(. „Ų „˜žĘŲ ^„Ų `„˜žo(.’h„Ø „L’ĘØ ^„Ø `„L’.h„x„˜žĘx^„x`„˜ž.h„H„˜žĘH^„H`„˜ž.’h„„L’Ę^„`„L’.h„č„˜žĘč^„č`„˜ž.h„ø„˜žĘø^„ø`„˜ž.’h„ˆ„L’Ęˆ^„ˆ`„L’.„Š„˜žĘŠ^„Š`„˜ž.„ „˜žĘ ^„ `„˜ž.„p„˜žĘp^„p`„˜ž.„@ „˜žĘ@ ^„@ `„˜ž.„„˜žĘ^„`„˜ž.„ą„˜žĘą^„ą`„˜ž.„°„˜žĘ°^„°`„˜ž.„€„˜žĘ€^„€`„˜ž.„P„˜žĘP^„P`„˜ž.h „2 „˜žĘ2 ^„2 `„˜žOJQJo(·šh „ „˜žĘ ^„ `„˜žOJQJo(oh „Ņ„˜žĘŅ^„Ņ`„˜žOJQJo(§šh „¢„˜žĘ¢^„¢`„˜žOJQJo(·šh „r„˜žĘr^„r`„˜žOJQJo(oh „B„˜žĘB^„B`„˜žOJQJo(§šh „„˜žĘ^„`„˜žOJQJo(·šh „ā„˜žĘā^„ā`„˜žOJQJo(oh „² „˜žĘ² ^„² `„˜žOJQJo(§š„„˜žĘ^„`„˜žo(.€„Ų „˜žĘŲ ^„Ų `„˜ž.‚„Ø „L’ĘØ ^„Ø `„L’.€„x„˜žĘx^„x`„˜ž.€„H„˜žĘH^„H`„˜ž.‚„„L’Ę^„`„L’.€„č„˜žĘč^„č`„˜ž.€„ø„˜žĘø^„ø`„˜ž.‚„ˆ„L’Ęˆ^„ˆ`„L’.„8„0żĘ8^„8`„0żo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.„Š„˜žĘŠ^„Š`„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.„„˜žĘ^„`„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.h „8„˜žĘ8^„8`„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „Ų „˜žĘŲ ^„Ų `„˜žOJQJo(§šh „Ø „˜žĘØ ^„Ø `„˜žOJQJo(·šh „x„˜žĘx^„x`„˜žOJQJo(oh „H„˜žĘH^„H`„˜žOJQJo(§šh „„˜žĘ^„`„˜žOJQJo(·šh „č„˜žĘč^„č`„˜žOJQJo(oh „ø„˜žĘø^„ø`„˜žOJQJo(§šh „Š„˜žĘŠ^„Š`„˜žOJQJo(·šh „ „˜žĘ ^„ `„˜žOJQJo(oh „p„˜žĘp^„p`„˜žOJQJo(§šh „@ „˜žĘ@ ^„@ `„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „ą„˜žĘą^„ą`„˜žOJQJo(§šh „°„˜žĘ°^„°`„˜žOJQJo(·šh „€„˜žĘ€^„€`„˜žOJQJo(oh „P„˜žĘP^„P`„˜žOJQJo(§šh „H„˜žĘH^„H`„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „č„˜žĘč^„č`„˜žOJQJo(§šh „ø „˜žĘø ^„ø `„˜žOJQJo(·šh „ˆ„˜žĘˆ^„ˆ`„˜žOJQJo(oh „X„˜žĘX^„X`„˜žOJQJo(§šh „(„˜žĘ(^„(`„˜žOJQJo(·šh „ų„˜žĘų^„ų`„˜žOJQJo(oh „Č„˜žĘČ^„Č`„˜žOJQJo(§šh„Š„˜žĘŠ^„Š`„˜ž.h„ „˜žĘ ^„ `„˜ž.h„p„L’Ęp^„p`„L’.h„@ „˜žĘ@ ^„@ `„˜ž.h„„˜žĘ^„`„˜ž.’h„ą„L’Ęą^„ą`„L’.h„°„˜žĘ°^„°`„˜ž.h„€„˜žĘ€^„€`„˜ž.’h„P„L’ĘP^„P`„L’. „D„\žĘD^„D`„\žo(.  „ „˜žĘ ^„ `„˜žOJQJo(·š’ „p„L’Ęp^„p`„L’. „@ „˜žĘ@ ^„@ `„˜ž. „„˜žĘ^„`„˜ž.’ „ą„L’Ęą^„ą`„L’. „°„˜žĘ°^„°`„˜ž. „€„˜žĘ€^„€`„˜ž.’ „P„L’ĘP^„P`„L’.„„˜žĘ^„`„˜žo(.„@ „0żĘ@ ^„@ `„0żo(.‚„Ø „L’ĘØ ^„Ø `„L’.€„x„˜žĘx^„x`„˜ž.€„H„˜žĘH^„H`„˜ž.‚„„L’Ę^„`„L’.€„č„˜žĘč^„č`„˜ž.€„ø„˜žĘø^„ø`„˜ž.‚„ˆ„L’Ęˆ^„ˆ`„L’.„Š„˜žĘŠ^„Š`„˜ž)€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.h „ „˜žĘ ^„ `„˜žOJQJo(·šh „Ü„˜žĘÜ^„Ü`„˜žOJQJo(oh „¬„˜žĘ¬^„¬`„˜žOJQJo(§šh „| „˜žĘ| ^„| `„˜žOJQJo(·šh „L„˜žĘL^„L`„˜žOJQJo(oh „„˜žĘ^„`„˜žOJQJo(§šh „ģ„˜žĘģ^„ģ`„˜žOJQJo(·šh „¼„˜žĘ¼^„¼`„˜žOJQJo(oh „Œ„˜žĘŒ^„Œ`„˜žOJQJo(§š8„ „˜žĘ ^„ `„˜žo(1.„Ų „0żĘŲ ^„Ų `„0żo(.‚„@ „L’Ę@ ^„@ `„L’.€„„˜žĘ^„`„˜ž.€„ą„˜žĘą^„ą`„˜ž.‚„°„L’Ę°^„°`„L’.€„€„˜žĘ€^„€`„˜ž.€„P„˜žĘP^„P`„˜ž.‚„ „L’Ę ^„ `„L’.h „t„˜žĘt^„t`„˜žOJQJo(·šh „D„˜žĘD^„D`„˜žOJQJo(oh „ „˜žĘ ^„ `„˜žOJQJo(§šh „ä „˜žĘä ^„ä `„˜žOJQJo(·šh „“„˜žĘ“^„“`„˜žOJQJo(oh „„„˜žĘ„^„„`„˜žOJQJo(§šh „T„˜žĘT^„T`„˜žOJQJo(·šh „$„˜žĘ$^„$`„˜žOJQJo(oh „ō„˜žĘō^„ō`„˜žOJQJo(§š„ „˜žĘ ^„ `„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’.h „Š„˜žĘŠ^„Š`„˜žOJQJo(·šh „ „˜žĘ ^„ `„˜žOJQJo(oh „p„˜žĘp^„p`„˜žOJQJo(§šh „@ „˜žĘ@ ^„@ `„˜žOJQJo(·šh „„˜žĘ^„`„˜žOJQJo(oh „ą„˜žĘą^„ą`„˜žOJQJo(§šh „°„˜žĘ°^„°`„˜žOJQJo(·šh „€„˜žĘ€^„€`„˜žOJQJo(oh „P„˜žĘP^„P`„˜žOJQJo(§š„„˜žĘ^„`„˜žo(.€„Ų „˜žĘŲ ^„Ų `„˜ž.‚„Ø „L’ĘØ ^„Ø `„L’.€„x„˜žĘx^„x`„˜ž.€„H„˜žĘH^„H`„˜ž.‚„„L’Ę^„`„L’.€„č„˜žĘč^„č`„˜ž.€„ø„˜žĘø^„ø`„˜ž.‚„ˆ„L’Ęˆ^„ˆ`„L’.„„˜žĘ^„`„˜žo(.„Ų „˜žĘŲ ^„Ų `„˜žo(.„Ø „L’ĘØ ^„Ø `„L’.€„x„˜žĘx^„x`„˜ž.€„H„˜žĘH^„H`„˜ž.‚„„L’Ę^„`„L’.€„č„˜žĘč^„č`„˜ž.€„ø„˜žĘø^„ø`„˜ž.‚„ˆ„L’Ęˆ^„ˆ`„L’.„„˜žĘ^„`„˜žo(.€„ „˜žĘ ^„ `„˜ž.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’. „„˜žĘ^„`„˜žo(.8„ „˜žĘ ^„ `„˜žo(.‚„p„L’Ęp^„p`„L’.€„@ „˜žĘ@ ^„@ `„˜ž.€„„˜žĘ^„`„˜ž.‚„ą„L’Ęą^„ą`„L’.€„°„˜žĘ°^„°`„˜ž.€„€„˜žĘ€^„€`„˜ž.‚„P„L’ĘP^„P`„L’. „„˜žĘ^„`„˜ž56o(.€„Ų „˜žĘŲ ^„Ų `„˜ž.‚„Ø „L’ĘØ ^„Ø `„L’.€„x„˜žĘx^„x`„˜ž.€„H„˜žĘH^„H`„˜ž.‚„„L’Ę^„`„L’.€„č„˜žĘč^„č`„˜ž.€„ø„˜žĘø^„ø`„˜ž.‚„ˆ„L’Ęˆ^„ˆ`„L’.„ „0żĘ ^„ `„0żo(.€„„˜žĘ^„`„˜ž.‚„Ų „L’ĘŲ ^„Ų `„L’.€„Ø „˜žĘØ ^„Ø `„˜ž.€„x„˜žĘx^„x`„˜ž.‚„H„L’ĘH^„H`„L’.€„„˜žĘ^„`„˜ž.€„č„˜žĘč^„č`„˜ž.‚„ø„L’Ęø^„ø`„L’.h „ „˜žĘ ^„ `„˜žOJQJo(·šh „p„˜žĘp^„p`„˜žOJQJo(oh „@ „˜žĘ@ ^„@ `„˜žOJQJo(§šh „„˜žĘ^„`„˜žOJQJo(·šh „ą„˜žĘą^„ą`„˜žOJQJo(oh „°„˜žĘ°^„°`„˜žOJQJo(§šh „€„˜žĘ€^„€`„˜žOJQJo(·šh „P„˜žĘP^„P`„˜žOJQJo(oh „ „˜žĘ ^„ `„˜žOJQJo(§š4hg7o”N '(K‹.pŌkĪsŚcŲ7Œ_É?e]Ž]enć3%;ƒP,_Mz1*p‰'®°!3j$˜P¾>MM&%ņ]Z:e`‰j“…dd;’lA@•+ģ6?Æ{#B_ZgZ©ń įo$šVf£h‡r,t¾*oÜXf ’°9ŸEp[f ’ė+p‹kŅ \£5ę#KCŽq„^Kž O(vu„(ę!9CdV)¼e™HŒ}ąZ€z0æYd!ƒi+'AwT H¾~õu-äwf.?’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’4Wf0.lWf1.¤Wf2ŲWf3 Xf4@Xf5tXf6ØXf7’’’’’’’’’’’’’’’’(Yf ’„„^„`„.tYf!’„„^„`„.ĄYf"’„„^„`„Zf#’„„^„`„PZf$’„„^„`„˜Zf%’„„^„`„ąZf&„„^„`„([f'„„^„`„@Ö0’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’3’’3A,5        F“\Ģ\Ä`Č       pØJ/ ¶afZ               ĀøÓ        ą–|                             (üd(     hfāö:,8       A,5                                            HnfG                 ŽĮtŸ4’DōÜ\R                                 ^L’        `…z.                 x¦¼÷r 3                         Čō”        P4×                 œ, ü                                            pØJ/        F“\ĢzņŠ                         ’—Sņ)’ę                \ȦŅ                 zōp        ¤ö˜Øyä’       ‰>U        >Ģ{HnfG       F“\Ģ        xŠ˜                 …•£¤č ² ³ å õ !!v#%%¬*½*Ė*Ģ*L.Ż0Ž0M7]7k7l7ė9==īUžU V VjXźZėZpƒ«„ā„ń„õ„ž–ž–ž–ž–ž–’@\\Finmgt-nts03\HP LaserJet 8100 Series PCL (Audit)Ne01:winspoolHP LaserJet 8100 Series PCL\\Finmgt-nts03\HP LaserJet 8100œ4C’€ź odXXLetter ’’’’DINU"4¦:§\\Finmgt-nts03\HP LaserJet 8100œ4C’€ź odXXLetter ’’’’DINU"4¦:§€¢¢Ā¢¢ō„P@’’Unknown’’’’’’’’’’’’G‡z €’Times New Roman5€Symbol3& ‡z €’Arial?5 ‡z €’Courier New;€Wingdings"AˆšŠh—Śq&ņš|¦\sFIal7ƒē!š„„Ą““€20d… 2ƒQš„ß’’Core Audit Financial AidStephanie BurkePCataldož’ą…ŸņłOh«‘+'³Ł0œ˜ ÄŠčō $0 L X d p|„Œ”äCore Audit Financial Aid0oreStephanie BurketeptepNormali PCataldo Bu143Microsoft Word 9.0l@öą°±@~B-čĀ@ZC1ĘĀ@¤JIiĘĆalž’ÕĶ՜.“—+,ł®0 px„Œ”œ¤ ¬“¼Ä Ģ ńäA,ē7…2 Core Audit Financial Aid Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefgž’’’ijklmnopqrstuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ”¢£¤„¦§Ø©Ŗ«¬­®Æ°±²³“µ¶·ø¹ŗ»¼½¾æĄĮĀĆÄÅĘĒČÉž’’’ĖĢĶĪĻŠŃž’’’ÓŌÕÖ×ŲŁž’’’ż’’’ż’’’Żž’’’ž’’’ž’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’Root Entry’’’’’’’’ ĄF€9˜YiĘĆ߀1Table’’’’’’’’’’’’h®ĀWordDocument’’’’’’’’‡ĪSummaryInformation(’’’’ŹDocumentSummaryInformation8’’’’’’’’’’’’ŅCompObj’’’’jObjectPool’’’’’’’’’’’’€9˜YiĘĆ€9˜YiĘĆ’’’’’’’’’’’’ž’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’’ž’ ’’’’ ĄFMicrosoft Word Document MSWordDocWord.Document.8ō9²q