Strengthening the MIS in Social Protection Programs: A Toolkit. Maria Arribas, LCR Cesar Baldeon, ISG May 17, 2007

Size: px
Start display at page:

Download "Strengthening the MIS in Social Protection Programs: A Toolkit. Maria Arribas, LCR Cesar Baldeon, ISG May 17, 2007"

Transcription

1 Strengthening the MIS in Social Protection Programs: A Toolkit Maria Arribas, LCR Cesar Baldeon, ISG May 17, 2007

2 Purpose, Audience, Methodology A Mitigation tool for Control and Accountability Risks & A framework for the Implementation of an MIS in CCTs/SP Programs A practical tool for TTLs an WBG clients working on SP Programs (with a focus on CCTs) Based on the MIS assessment of Ecuador s CCT; LCR s 2 day CCT review workshop; Visits to Colombia, Chile, and Argentina; Literature Review; and Conversations with several TTLs 2

3 Two Dimensions A look at Control and Accountability Processes in CCTs: An MIS Perspective A framework for the Implementation of an MIS in SP/CCTs Beyond having a Unique Identifier and Cross-checks A more systematic and strategic approach to systems management Useful for both paper-based and automated programs/processes 3

4 Toolkit Components Control & Accountability: MIS Perspective MIS Framework & Operational Risk Framework Case Studies MIS Implementation and Monitoring Checklist Considerations/Recommendations Not an ICT Project Implementation Toolkit! 4

5 MIS for Safety Net Programs Information Providers and Consumers Potential Beneficiaries Government Institutions (Ministries) Service Providers Financial Institutions Civil Society Information flows Program Process Beneficiary Id. Targeting Registry Database Conditions Data Collect Payment Eligible P Control Grievances Registration Validation Verification Payment Processes Graduation Updates Penalization Reconciliation Impact MIS Components IT Expertise & Organization Structure Information Application Quality Information & Communication Technology Infrastructure 5

6 Control & Accountability: An MIS Perspective (1) Information Providers and Consumers Potential Beneficiaries Government Institutions (Ministries) Service Providers Financial Institutions Civil Society Information flows Program Process Beneficiary Id. Targeting Registry Database Conditions Data Collect Payment Eligible P Control Grievances Registration Validation Verification Payment Processes Graduation Updates Penalization Reconciliation Impact MIS Components Functions IT Expertise & Organization Structure Information Application Quality Information & Communication Technology Infrastructure 6

7 Control & Accountability: An MIS Perspective (2) Processes Risks Causes MIS Functions Tools (examples) Beneficiary Identification Inclusion Errors Exclusion Errors Ineffective eligibility criteria Imperfect targeting tool Incoherent Registration Processes Human Errors Fraud Data Quality Data Security Records Separation of Functions Cross-checks Access Control Audit Trails Security Classifications Archiving Strategy Beneficiary Registry Service Interruption Unauthorized access to info Unauthorized changes Creation of false info/transactions Environmental events System breakdown Malicious Acts Human Errors Disaster Recovery Availability Capacity Planning Security Data Warehouse Back ups and redundant systems Downtime management Access Control (logical and physical) Unique identifiers Cross-checks Monitoring of Coresponsibilities Unwarranted penalization Unreliable data Misleading Impact Evaluations Dishonesty Inconsistent collection/recording Human Errors Complex Data Integration Data Governance Database Data Quality Data Architecture Spot checks Audits Error/inconsiste ncies alerts 7

8 Control & Accountability: An MIS Perspective (3) Processes Risks Causes MIS Functions Tools (examples) Payment of Benefits Irregular Payments Inaccurate Payments Interruption of Payments Insufficient Funds Human Errors System Availability Bribery/Dishonesty Service Disruption Data Quality Master Data Systems Availability Mgt Error/inconsiste ncies alerts Service Level Agreements Monitoring & Evaluation Uninformed decision making Reputation Risks Political Risks Lack of Reporting Lack of Transparency Data Quality/Integrity Records Data Availability Data Usability Data warehouse Reporting Tool History Tracking Reports Transparency Case 8

9 Control & Accountability: An MIS Perspective (4) Processes Risks Causes MIS Functions Tools (examples) Institutional Arrangements Lack of interministerial coordination Lack of Enforcement Political Manipulation Enforcement of decentralization arrangements Lack of funding Confusing Roles and Responsibilities Political Volatility Weak Institutions Lack of Political Will Data Governance Org. Structure Service Level Agreements Publication & Transparency Information Agreements Publication on Website Complaint Resolution and Appeals Program Abuse Ping-Ponging between offices Program credibility Misleading Impact Evaluations Missed Opportunity for demand driven improvements Inexistent feedback systems Feedback black-box Broken processes Culture (resignation) Records Process Monitoring Case System Service level monitoring Alerts for systemic appeals (category, geographic, etc.) 9

10 Integrated Framework MIS Components Information Providers and Consumers Potential Beneficiaries Government Institutions (Ministries) Service Providers Financial Institutions Civil Society Information flows Program Process Beneficiary Id. Targeting Registry Database Conditions Data Collect Payment Eligible P Control Grievances Registration Validation Verification Payment Processes Graduation Updates Penalization Reconciliation Impact MIS Components IT Expertise & Organization Structure Information Application Quality Information & Communication Technology Infrastructure 10

11 Why a Framework? Logical Structure Systematic Approach to Risk MIS Framework & Operational Risk Framework Integration among building blocks (and how they constrain one another) Prioritization Cost/Benefit Analysis 11

12 Integrated Framework MIS Components IT expertise and Org. Structure: Organizational Structure Staff Development External Expertise Separation of Duties Information : Data Governance Data Architecture, Analysis & Design Database Data Quality Data Security Master Data Data Warehousing Records Meta Data Application Quality : Quality Planning Quality Control Configuration Change Version Control Release Infrastructure: Capacity Planning Availability Disaster Recovery Security 12

13 IT Expertise and Organization Structure Functions Organizational Structure Staff Development External Expertise Separation of Duties Outputs Inclusion of the IT team in the design of the program Definition of roles & responsibilities in the operation manual Inclusion of the IT team in the operational assessment of the program Assessment of in-house skills and gaps Outsourcing strategy: Identify skill to retain internally Staff Training Plan Outsourcing strategy: identify external expertise required Procurement Plan for external expertise Assessment Process for external parties performance Identification of functions that require separation of duties Definition of roles & responsibilities Evaluation of roles & responsibilities 13

14 Information Quality Functions Data Governance Data Architecture Database Data Quality Data Security Master Data Data Warehousing Records Metadata Outputs Identification of authoritative sources Formalization of institutional arrangements with data custodians Formalization of data governance processes Data Governance Control Business data model: entities, attributes, relationships Logical data model Physical database model Data inventory: data inputs and outputs for each process Data dictionary Beneficiary database Monitoring Plan for database performance Data validation processes Definition/Implementation of data validation rules Data quality evaluation Information security policies Implementation of user profiles (logical security) Implementation Plan of data flows and schedules with data custodians Identification of monitoring & evaluation indicators Definition of reporting requirements (managerial, detailed, ) Training & roll out strategy Definition of Record processes (procedures and standards) Definition of Metadata Requirements Metadata Dictionary 14

15 Application Functions Quality Planning Quality Control Configuration management Change Version Control Release Outputs Definition of Quality processes including: Quality control Change management Version control Configuration management Release management Definition of roles & responsibilities for processes Assessment of Quality processes Definition of functional and acceptance test processes Assessment of quality control processes Systems Change Policy Documentation - List of MIS components included in the final release List of modified and new components after final release Definition of change management processes (change planning, impact, feasibility, cost analysis, documentation, release) Assessment of Change Process Version all components and final release (baseline) Version all components and up-to-date release after final version Monitoring Plan for version control Definition of user and technical documentation requirements Documentation for final release and subsequent changes Training Plan 15

16 Infrastructure Functions Capacity Planning Availability Disaster Recovery Security Outputs Needs Assessment (hardware, software and network requirements) Procurement Plan for Hardware, software and network Monitoring capacity, availability and security Assessment of performance and capacity Re-evaluation of hardware, software and network sizes Definition of availability required (tolerance levels) Definition of Systems architecture Maintenance/Renewal Strategy of hardware, software and network Availability Testing Plan and Schedule Recovery Testing Plan and Schedule Assessment of system s availability Definition of failure and recovery plans Back-ups and disaster recovery strategies Testing Plan for failure and disaster recovery Assessment of disaster recovery plans Definition of physical security for hardware and network Implementation of security monitors and controls Assessment of access monitors and controls 16

17 MIS Operational Risks Framework Risk Info. Software Quality IT Infrastructure Human Capital Interruption: lost, unavailable, unusable Data Governance Data Architecture Database Data Warehouse Quality Control Version Control Change Capacity planning Availability management Disaster Recovery Security Organizational Structure Staff Development External expertise Interception: unauthorized access Data quality Records Quality Control Security Separation of duties Modification: unauthorized changes Data quality Records Quality Control Security Separation of duties Fabrication: false transactions Data quality Records Quality Control Security Separation of duties 17

18 Country Experience (1) Colombia Program Name: Familias en Acción Age: 7 years, since 2000 as part of the RAS (Red de Apoyo Social) Type: Conditional Cash Transfer Counterpart: The Presidency Criteria: provides cash to poor households in rural areas conditional on school attendance of school-aged children and visits to health facilities and participation in nutritional programs for younger children and their mothers Size: as of January 2007 the program has 600,000 beneficiaries, it is expected to grow to 1.5 million beneficiaries within the next 9 months. Program Design and Implementation: Decentralized Program with liaisons on each of the participating municipalities. Most of the decentralized work is paper based The program has not separated functions to avoid conflict of interest Little validation of information with external systems SISBEN, the targeting database, is updated as new municipalities are added to the program SIFA leverages the Presidency's investments for the four MIS components Potential Scalability Problems results of the growth of the program Complaints is a paper based decentralized process. Very difficult to produce process indicators 18

19 Country Experience (2) Argentina Program Name: Jefes y Jefas Age: 6 years, as part of the RAS (Red de Apoyo Social) Type: Workfare Criteria: transferred AR$50 per month to participants. The beneficiaries were to: (i) be unemployed, (ii) be head of a household, (iii) live in a household with at least one minor below the age of 18, or pregnant woman, or handicapped of any age; (iv) work or participate in a training/education activities for 4-6 hours a day. Size: in May 2003: ~2 million reduced January 2006: 1.42 million Program Design & Implementation: Decentralized program where municipalities have access to web base beneficiary registry. Some information continues to be exchanged via excel sheets. The program has separated functions. It includes a production team Beneficiary database is validation with social security (participation in other programs and taxes paid.) Jefes y Jefas MIS leverages the investments of the Ministry's investments for the four MIS components Scalability Program leverages the ministry s central call center for complaints. 19

20 Country Experience (3) Colombia Strengths IT team Skills Systematic Approach to Data Records Defined (?) Robust Infrastructure Economies of Scale Weakness Large Amount of Paper Trail Prompt to Error and lack of traceability Scaling Capacity Not Tested IT Staff Involvement (Structure) Long Payment Cycle (in part due to Manual Processes 60 days) Interoperability/Information Quality Argentina Strengths Scaling Capacity Separation of Functions and Environments Web-based Application Robust Infrastructure Data Warehousing Case System Weakness Application Version Control Real Time Validation with Authoritative Sources Decentralization Challenges 20

21 Considerations/Recommendations Country Context Program Maturity and feedback Paper and Pencil vs. Electronic Automation where it increases efficiency Complementary Systems Procurement Economies of Scale Knowledge Sharing/Collaboration for IT teams Systematic System Reviews (supervision) 21

22 Q & A 22

Management Information Systems in Social Safety Net Programs: A Look at Accountability and Control Mechanisms

Management Information Systems in Social Safety Net Programs: A Look at Accountability and Control Mechanisms SP DISCUSSION PAPER NO. 0819 Management Information Systems in Social Safety Net Programs: A Look at Accountability and Control Mechanisms Cesar Baldeon Maria D. Arribas-Baños August 2008 Management Information

More information

1. Introduction. October, 2010. By Verónica Silva Villalobos with Gastón Blanco and Lucy Bassett

1. Introduction. October, 2010. By Verónica Silva Villalobos with Gastón Blanco and Lucy Bassett October, 2010 Management Information Systems for CCTs and Social Protection Systems in Latin America: A Tool for Improved Program Management and Evidence-Based Decision-Making By Verónica Silva Villalobos

More information

Control and Accountability Tools - Spot Checks

Control and Accountability Tools - Spot Checks Control and Accountability Tools - Spot Checks Spot Check or Sample-Based Site Monitoring: Application in Colombia Familias en Accion By Maria Claudia Vasquez (18 pages) Definition of Spot Check Mechanism

More information

TERMS OF REFERENCE TO DEVELOP THE MANAGEMENT INFORMATION SYSTEM AND PROVIDE TECHNICAL SUPPORT FOR THE CONDITIONAL CASH TRANSFER PROGRAM IN BANGLADESH

TERMS OF REFERENCE TO DEVELOP THE MANAGEMENT INFORMATION SYSTEM AND PROVIDE TECHNICAL SUPPORT FOR THE CONDITIONAL CASH TRANSFER PROGRAM IN BANGLADESH TERMS OF REFERENCE TO DEVELOP THE MANAGEMENT INFORMATION SYSTEM AND PROVIDE TECHNICAL SUPPORT FOR THE CONDITIONAL CASH TRANSFER PROGRAM IN BANGLADESH I. INTRODUCTION International Firm Bangladesh spent

More information

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Integrated data and information management in social protection

Integrated data and information management in social protection BRIEFING Integrated data and information management in social protection Key messages > Integrating data and information management of social protection programs through a Single Registry and associated

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Technology Service Manager Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

Introduction. What is ITIL? Automation Centre. Tracker Suite and ITIL

Introduction. What is ITIL? Automation Centre. Tracker Suite and ITIL 1 Introduction The Information Technology Infrastructure Library (ITIL) aims to improve the management of IT services within the organization, for lowered costs, improved efficiency and productivity. But

More information

IIA Super Conference

IIA Super Conference www.pwc.com IIA Super Conference Software Asset Management (SAM) Internal Audits Agenda Introduction Software Asset Management (SAM) overview Potential Internal Audit Approach Example Risk Areas Summary

More information

OPERATIONAL RISK RISK ASSESSMENT

OPERATIONAL RISK RISK ASSESSMENT OPERATIONAL RISK RISK ASSESSMENT 1 OVERVIEW Inherent Risk Risk Management Composite or Net Residual Risk Trend 2 INHERENT RISK Definition Sources Identification Quantification 3 Definition OPERATIONAL

More information

The CMDB at the Center of the Universe

The CMDB at the Center of the Universe The CMDB at the Center of the Universe Reg Harbeck CA Wednesday, February 27 Session 5331 Purpose Clarify origin of CMDB concept and what it is Understand difference and equivalence between CMDB and Asset

More information

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

Request for Proposal for Application Development and Maintenance Services for XML Store platforms Request for Proposal for Application Development and Maintenance s for ML Store platforms Annex 4: Application Development & Maintenance Requirements Description TABLE OF CONTENTS Page 1 1.0 s Overview...

More information

e Governance ULB Level Reform

e Governance ULB Level Reform ULB Level Reform 1. The Reform e-governance is a form of public administration making use of information and communication technologies (ICT) to enhance the access and delivery of government services to

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

Sound Practices for the Management of Operational Risk

Sound Practices for the Management of Operational Risk 1 Sound Practices for the Management of Operational Risk Authority 1.1 Section 316 (4) of the International Business Corporations Act (IBC Act) requires the Commission to take any necessary action required

More information

Relevant COSO Principles. Policies and procedures are maintained. Policies and Procedures. Roles and responsibilities are identified

Relevant COSO Principles. Policies and procedures are maintained. Policies and Procedures. Roles and responsibilities are identified Accountability is unable to govern service processes No consistent or communicated policies procedures structure is inadequate Policies procedures are maintained Roles responsibilities are identified Policies

More information

Information Management Advice 39 Developing an Information Asset Register

Information Management Advice 39 Developing an Information Asset Register Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if

More information

Service Asset & Configuration Management PinkVERIFY

Service Asset & Configuration Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management

Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

ISSA Guidelines on Master Data Management in Social Security

ISSA Guidelines on Master Data Management in Social Security ISSA GUIDELINES ON INFORMATION AND COMMUNICATION TECHNOLOGY ISSA Guidelines on Master Data Management in Social Security Dr af t ve rsi on v1 Draft version v1 The ISSA Guidelines for Social Security Administration

More information

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS

GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS SUPERVISORY AND REGULATORY GUIDELINES Guidelines Issued: 22 December 2015 GUIDELINES FOR THE MANAGEMENT OF OPERATIONAL RISK FOR CREDIT UNIONS 1. INTRODUCTION 1.1 The Central Bank of The Bahamas ( the Central

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of

More information

TERMS OF REFERENCE (ToR)

TERMS OF REFERENCE (ToR) TERMS OF REFERENCE (ToR) Consultancy services for Monitoring the Implementation of Computerized Integrated Financial Management Information System (IFMIS) of BREB & PBSs for Institutional Strengthening

More information

April 2005 Report No. 05-031

April 2005 Report No. 05-031 A Review of Construction Project Management at the Texas Building and Procurement Commission Report No. 05-031 John Keel, CPA State Auditor A Review of Construction Project Management at the Texas Building

More information

LEHMAN COLLEGE: DEPARTMENTAL RETENTION SCHEDULE 8/7/2014 INFORMATION TECHNOLOGY (IT)

LEHMAN COLLEGE: DEPARTMENTAL RETENTION SCHEDULE 8/7/2014 INFORMATION TECHNOLOGY (IT) IT-1 Contracts/ Software Licenses/ Use Agreements Legal agreements, including contracts, legal releases, software licenses, and use agreements involving the College or the University 6 years after expiration

More information

Template K Implementation Requirements Instructions for RFP Response RFP #

Template K Implementation Requirements Instructions for RFP Response RFP # Template K Implementation Requirements Instructions for RFP Response Table of Contents 1.0 Project Management Approach... 3 1.1 Program and Project Management... 3 1.2 Change Management Plan... 3 1.3 Relationship

More information

ICT Competency Profiles framework Job Stream Descriptions

ICT Competency Profiles framework Job Stream Descriptions ICT Competency Profiles framework Job Stream Descriptions Cluster: Software Products Analysis Design: In the field of analysis, you apply investigative skills to business, technical or organizational problems

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Explore the Possibilities

Explore the Possibilities Explore the Possibilities 2013 HR Service Delivery Forum Best Practices in Data Management: Creating a Sustainable and Robust Repository for Reporting and Insights 2013 Towers Watson. All rights reserved.

More information

Information Security Managing The Risk

Information Security Managing The Risk Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the

More information

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES... Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation

More information

Data Center Audit April 2015

Data Center Audit April 2015 Data Center Audit April 2015 Table of Contents Executive Summary 2 5 Highlights and Accomplishments 6 7 Summary Observations 8 This report provides management with information about the condition of risks

More information

Designing the Information System

Designing the Information System Pension System Management Designing the Information System Oleksiy Sluchynsky MENA Regional Workshop in Pension Administration May 2005 osluchynskyy@worldbank.org Company LOGO 1 Topics of Presentation

More information

SAS 70 Exams Of EBT Controls And Processors

SAS 70 Exams Of EBT Controls And Processors Appendix VIII SAS 70 Examinations of EBT Service Organizations Background States must obtain an examination by an independent auditor of the State electronic benefits transfer (EBT) service providers (service

More information

Development, Acquisition, Implementation, and Maintenance of Application Systems

Development, Acquisition, Implementation, and Maintenance of Application Systems Development, Acquisition, Implementation, and Maintenance of Application Systems Part of a series of notes to help Centers review their own Center internal management processes from the point of view of

More information

Transaction Processing and Enterprise Resource Planning Systems. Goal of Transaction Processing. Characteristics of Transaction Processing

Transaction Processing and Enterprise Resource Planning Systems. Goal of Transaction Processing. Characteristics of Transaction Processing C H A P T E R 9 Transaction Processing and Enterprise Resource Planning Systems Goal of Transaction Processing Provide all the information needed to keep the business running properly and efficiently.

More information

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland Audit Report Effectiveness of IT Controls at the Global Fund Follow-up report GF-OIG-15-20b Geneva, Switzerland Table of Contents I. Background and scope... 3 II. Executive Summary... 4 III. Status of

More information

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister Using COBiT For Sarbanes Oxley Japan November 18 th 2006 Gary A Bannister Who Am I? Who am I & What I Do? I am an accountant with 28 years experience working in various International Control & IT roles.

More information

Section 7. Terms of Reference

Section 7. Terms of Reference APPENDIX-A TERMS OF REFERENCE UNION-LEVEL TECHNICAL ASSISTANCE TO PROVIDE INSTITUTIONAL SUPPORT TO THE MYANMAR NATIONAL COMMUNITY DRIVEN DEVELOPMENT PROJECT I. INTRODUCTION IDA GRANT H814MM FY 2013-16

More information

RESERVE BANK OF VANUATU OPERATIONAL RISK MANAGEMENT

RESERVE BANK OF VANUATU OPERATIONAL RISK MANAGEMENT RESERVE BANK OF VANUATU DOMESTIC BANK PRUDENTIAL GUIDELINE NO 12 OPERATIONAL RISK MANAGEMENT 1. This Guideline outlines a set of principles that provide a framework for the effective management of operational

More information

CTR System Report - 2008 FISMA

CTR System Report - 2008 FISMA CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control

More information

REQUEST FOR INFORMATION (RFI) Health Interface Engine Solution

REQUEST FOR INFORMATION (RFI) Health Interface Engine Solution City of Philadelphia Department of Public Health 1401 JFK Blvd Suite 600 Philadelphia, PA 19102 REQUEST FOR INFORMATION (RFI) This document contains a Request for Information (RFI) for an interface engine

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)

Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC) Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC) 1 Introduction 1.1 Section 316 (4) of the International Business

More information

TECHNICAL COOPERATION PROFILE (EC-T1198)

TECHNICAL COOPERATION PROFILE (EC-T1198) ECUADOR TECHNICAL COOPERATION PROFILE (EC-T1198) I. BASIC PROJECT DATA Country: Republic of Ecuador Program Name/Number: Team Leader/Members: Beneficiary: Executing Agency: Amount and source of funding:

More information

UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2)

UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2) Additional Financing of Food and Nutrition Social Welfare Project (RRP MON 42322) UPGRADING SOCIAL PROTECTION INFORMATION TECHNOLOGY PROCESSES AND SYSTEMS: IMPLEMENTATION PLAN (OUTPUT 3.2) 1. This document

More information

BARRAMUNDI L IMITED RISK MANAGEMENT POLICY

BARRAMUNDI L IMITED RISK MANAGEMENT POLICY BARRAMUNDI L IMITED RISK MANAGEMENT POLICY Last updated: 25 August 2014 THE OBJECTIVES OF RISK MANAGEMENT Risk management is the systematic process of managing an organisation's risk exposures to achieve

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

CMS Policy for Configuration Management

CMS Policy for Configuration Management Chief Information Officer Centers for Medicare & Medicaid Services CMS Policy for Configuration April 2012 Document Number: CMS-CIO-POL-MGT01-01 TABLE OF CONTENTS 1. PURPOSE...1 2. BACKGROUND...1 3. CONFIGURATION

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations HIPAA 203: Security An Introduction to the Draft HIPAA Security Regulations Presentation Agenda Security Introduction Security Component Requirements and Impacts Administrative Procedures Physical Safeguards

More information

INFORMATION SYSTEMS SPECIALIST 8 1488

INFORMATION SYSTEMS SPECIALIST 8 1488 INFORMATION SYSTEMS SPECIALIST 8 1488 SERIES DESCRIPTION The INFORMATION SYSTEMS SPECIALIST (ISS) classification series has eight levels that describe technical and professional non-supervisory positions

More information

EXPLORING THE CAVERN OF DATA GOVERNANCE

EXPLORING THE CAVERN OF DATA GOVERNANCE EXPLORING THE CAVERN OF DATA GOVERNANCE AUGUST 2013 Darren Dadley Business Intelligence, Program Director Planning and Information Office SIBI Overview SIBI Program Methodology 2 Definitions: & Governance

More information

Polish Financial Supervision Authority. Guidelines

Polish Financial Supervision Authority. Guidelines Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents

More information

SACRAMENTO CITY UNIFIED SCHOOL DISTRICT Position Description. DEPARTMENT: Technology Services SALARY: Range 13 Salary Schedule A

SACRAMENTO CITY UNIFIED SCHOOL DISTRICT Position Description. DEPARTMENT: Technology Services SALARY: Range 13 Salary Schedule A SACRAMENTO CITY UNIFIED SCHOOL DISTRICT Position Description TITLE: Database Administrator CLASSIFICATION: Non-Represented Management, Classified SERIES: Coordinator III FLSA: Exempt JOB CLASS CODE: 1972

More information

Software Supply Chains: Another Bug Bites the Dust.

Software Supply Chains: Another Bug Bites the Dust. SESSION ID: STR-T08 Software Supply Chains: Another Bug Bites the Dust. Todd Inskeep 1 Global Security Assessments VP Samsung Business Services @Todd_Inskeep Series of Recent, Large, Long-term Security

More information

Internal Control Evaluation Progress Report for Frisco Independent School District. March 7, 2011

Internal Control Evaluation Progress Report for Frisco Independent School District. March 7, 2011 Internal Control Evaluation Progress Report for Frisco Independent School District March 7, 2011 Topics 2010 Internal Control Evaluation Activities - Phases III and IV 2010 Actual Hours and Fees Phases

More information

Enabling Data Quality

Enabling Data Quality Enabling Data Quality Establishing Master Data Management (MDM) using Business Architecture supported by Information Architecture & Application Architecture (SOA) to enable Data Quality. 1 Background &

More information

Guideline on risk management and other aspects of internal control in central securities depository

Guideline on risk management and other aspects of internal control in central securities depository until further notice 1 (11) Applicable to central securities depositories Guideline on risk management and other aspects of internal control in central securities depository By virtue of section 4, paragraph

More information

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY

NEEDS BASED PLANNING FOR IT DISASTER RECOVERY The Define/Align/Approve Reference Series NEEDS BASED PLANNING FOR IT DISASTER RECOVERY Disaster recovery planning is essential it s also expensive. That s why every step taken and dollar spent must be

More information

Reliable Business Data Implementing A Successful Data Governance Strategy with Enterprise Modeling Standards

Reliable Business Data Implementing A Successful Data Governance Strategy with Enterprise Modeling Standards Reliable Business Data Implementing A Successful Data Governance Strategy with Enterprise Modeling Standards All Rights Reserved Welcome! Let Me Introduce Myself Marcie Barkin Goodwin President & CEO Axis

More information

CORL Dodging Breaches from Dodgy Vendors

CORL Dodging Breaches from Dodgy Vendors CORL Dodging Breaches from Dodgy Vendors Tackling Vendor Security Risk Management in Healthcare Introductions Cliff Baker 20 Years of Healthcare Security experience PricewaterhouseCoopers, HITRUST, Meditology

More information

Business Continuity Position Description

Business Continuity Position Description Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary

More information

ORDINANCE 16-22 AN ORDINANCE ESTABLISHING INTERNAL CONTROL STANDARDS AND ESTABLISHING A MATERIALITY THRESHOLD

ORDINANCE 16-22 AN ORDINANCE ESTABLISHING INTERNAL CONTROL STANDARDS AND ESTABLISHING A MATERIALITY THRESHOLD ORDINANCE 16-22 ] AN ORDINANCE ESTABLISHING INTERNAL CONTROL STANDARDS AND ESTABLISHING A MATERIALITY THRESHOLD WHEREAS, The City ofwestfield, ("City") is a duly formed municipal corporation within the

More information

Business Continuity Plan

Business Continuity Plan Business Continuity Plan October 2007 Agenda Business continuity plan definition Evolution of the business continuity plan Business continuity plan life cycle FFIEC & Business continuity plan Questions

More information

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES

More information

The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements.

The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements. CAPACITY AND AVAILABILITY MANAGEMENT A Project Management Process Area at Maturity Level 3 Purpose The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision

More information

How Do I know If I Need RCx HOW TO CHOOSE A MANAGED SERVICES PROVIDER. www.netsolus.com

How Do I know If I Need RCx HOW TO CHOOSE A MANAGED SERVICES PROVIDER. www.netsolus.com How Do I know If I Need RCx HOW TO CHOOSE A MANAGED SERVICES PROVIDER www.netsolus.com Shifting your IT operations to a managed services provider (MSP) offers a multitude of benefits. Collaborating with

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine

More information

Growing Vendor Management

Growing Vendor Management V E N D O R M A N A G E M E N T P R O F I L E S E R I E S A Wh it e Pap e r by Ve n d or I NS I G HT an d C MPG, L L C Growing Vendor Management as a Sustainable Business Process with Automated Vendor

More information

Control and Accountability in Conditional Cash Transfer Programs in Latin America and the Caribbean: Key Topics and Areas for Further Improvement

Control and Accountability in Conditional Cash Transfer Programs in Latin America and the Caribbean: Key Topics and Areas for Further Improvement Control and Accountability in Conditional Cash Transfer Programs in Latin America and the Caribbean: Key Topics and Areas for Further Improvement World Bank Latin America and the Caribbean Region Social

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:

More information

DISASTER RECOVERY PLANNING GUIDE

DISASTER RECOVERY PLANNING GUIDE DISASTER RECOVERY PLANNING GUIDE AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING FOR JD EDWARDS SOFTWARE CUSTOMERS www.wts.com WTS Disaster Recovery Planning Guide Page 1 Introduction This guide will provide

More information

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper Protecting Business Information With A SharePoint Data Governance Model TITUS White Paper Information in this document is subject to change without notice. Complying with all applicable copyright laws

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Guideline on risk management and other aspects of internal control in stock exchange

Guideline on risk management and other aspects of internal control in stock exchange until further notice 1 (11) Applicable to stock exchanges Guideline on risk management and other aspects of internal control in stock exchange By virtue of section 4, paragraph 2, of the Act on the Financial

More information

Company Management System. Business Continuity in SIA

Company Management System. Business Continuity in SIA Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE MASTER IT PROFESSIONAL II 43 B 7.909 SERIES CONCEPT Master Information Technology

More information

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* July 2004 *connectedthinking The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act Introduction

More information

Data Quality Assessment. Approach

Data Quality Assessment. Approach Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source

More information

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries

More information

Tailored Technologies LLC

Tailored Technologies LLC 685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

CISM ITEM DEVELOPMENT GUIDE

CISM ITEM DEVELOPMENT GUIDE CISM ITEM DEVELOPMENT GUIDE TABLE OF CONTENTS CISM ITEM DEVELOPMENT GUIDE Content Page Purpose of the CISM Item Development Guide 2 CISM Exam Structure 2 Item Writing Campaigns 2 Why Participate as a CISM

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On SOS The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On: The Critical Questions Every Company Needs to Ask 1 Table of Contents Introduction 2 Application

More information

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation

More information

CITY OF SALEM DATA CENTER INFORMATION SYSTEMS SPECIALIST SERIES

CITY OF SALEM DATA CENTER INFORMATION SYSTEMS SPECIALIST SERIES CITY OF SALEM DATA CENTER INFORMATION SYSTEMS SPECIALIST SERIES 0854 INFORMATION SYSTEMS SPECIALIST 1 0858 INFORMATION SYSTEMS SPECIALIST 5 0855 INFORMATION SYSTEMS SPECIALIST 2 0859 INFORMATION SYSTEMS

More information

Knowledge Base Data Warehouse Methodology

Knowledge Base Data Warehouse Methodology Knowledge Base Data Warehouse Methodology Knowledge Base's data warehousing services can help the client with all phases of understanding, designing, implementing, and maintaining a data warehouse. This

More information

OCC 98-3 OCC BULLETIN

OCC 98-3 OCC BULLETIN To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel

More information

ECLAC Economic Commission for Latin America and the Caribbean

ECLAC Economic Commission for Latin America and the Caribbean 1 FOR PARTICIPANTS ONLY REFERENCE DOCUMENT DDR/2 22 June 2012 ENGLISH ORIGINAL: SPANISH ECLAC Economic Commission for Latin America and the Caribbean Eleventh meeting of the Executive Committee of the

More information