ExternalCriteriaCertificationFormTMSEntityProfileMitigateriskC &AKFSInternalCriteria“Generallyadequate”ODSTravelreimbursementMonitoringControlPCardsPre-exitClosedauditmemoTravelauthorizationDataAnalyticsPoliciesandproceduresIndependenceTimesheetsLogicalsecurityEvidenceSupplyorderOverduerecommendationFPIIPPFDetectiveControlFraudRiskTimeClockPlusNew auditinprogressmemoPriorAuditReviewManagementLetterPhysicalsecurityOracleRecommendationInherentRiskPreventativeControlExternalCriteriaCertificationFormTMSEntityProfileMitigateriskC &AKFSInternalCriteria“Generallyadequate”ODSTravelreimbursementMonitoringControlPCardsPre-exitClosedauditmemoTravelauthorizationDataAnalyticsPoliciesandproceduresIndependenceTimesheetsLogicalsecurityEvidenceSupplyorderOverduerecommendationFPIIPPFDetectiveControlFraudRiskTimeClockPlusNew auditinprogressmemoPriorAuditReviewManagementLetterPhysicalsecurityOracleRecommendationInherentRiskPreventativeControl

Internal Audit Bingo - Set 2 - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
  1. External Criteria
  2. Certification Form
  3. TMS
  4. Entity Profile
  5. Mitigate risk
  6. C & A
  7. KFS
  8. Internal Criteria
  9. “Generally adequate”
  10. ODS
  11. Travel reimbursement
  12. Monitoring Control
  13. PCards
  14. Pre-exit
  15. Closed audit memo
  16. Travel authorization
  17. Data Analytics
  18. Policies and procedures
  19. Independence
  20. Timesheets
  21. Logical security
  22. Evidence
  23. Supply order
  24. Overdue recommendation
  25. FPI
  26. IPPF
  27. Detective Control
  28. Fraud Risk
  29. TimeClock Plus
  30. New audit in progress memo
  31. Prior Audit Review
  32. Management Letter
  33. Physical security
  34. Oracle
  35. Recommendation
  36. Inherent Risk
  37. Preventative Control