Draft Internal Audit Report Software Licensing Audit. December 2009

Size: px
Start display at page:

Download "Draft Internal Audit Report Software Licensing Audit. December 2009"

Transcription

1 Draft Internal Audit Report Software Licensing Audit December 2009

2 Contents Page Executive Summary 3 Observations and Recommendations 6 Appendix 1 Audit Framework 9 Appendix 2 - Staff Interviewed 10 Statement of Responsibility 11 Software Licensing Audit 2009/2010 Audit Ref: TBC

3 Executive Summary Introduction & Background 1. This audit forms part of the 2009/10 Internal Audit Plan, which has been approved by the Mayor and the Audit Panel. The audit entails evaluation of the control environment established and applied to the Authority s compliance to statutory software copyright requirements. 2. The two primary risk issues in this audit area are that: i. Non compliance to statutory copyright requirements may result in financial and reputational damages. ii. Note Poor software record management can result in extra costs and waste of assets. Copyright infringement of software (often referred to as software piracy) refers to several practices which involve the unauthorised copying of computer software. The Federation Against Software Theft (FAST) advised in 2009 that one unnamed public sector borough was a staggering 600,000 overlicensed, after it failed to record what software it had on old hardware that had simply been ditched. 3. The Audit framework, set out in Appendix 1, shows that the audit examined the two primary risk issues highlighted above by evaluation of the controls that have been established and applied by management in the following five key areas. a) Policies, roles and responsibilities b) Procurement arrangements c) Inventory records d) Security of primary copyright software records and source material e) Software disposal arrangements Following review of the control evaluation results for each of the five areas that were assessed in this audit, see below, two priority 2 recommendations, which are detailed in section 1 of this report, were agreed to be addressed by local management. Audit Opinion Substantial Assurance Evaluation Opinion: While there is a basically sound system there are weaknesses, which may put some of the system objectives at risk. Testing Opinion: There is evidence that the level of non-compliance with some of the controls may put some of the system objectives at risk. Page 3 of 11

4 a) Software Policies, Roles and Responsibilities 4. The GLA Code of Ethics and Standards for Staff covers the protocol on the Usage of ICT in the GLA. This includes the restrictions on duplicating software and also touches on the Computer Misuse and Data Protection Acts. The Technology Group have created a number of Assured Quality Action Procedures (AQAPs) for various IT processes and therefore these are used as a means of communicating approved protocol to staff. Staff are required to read and sign that they have read the Code of Ethics which covers all the IT processes that they are required adhere to. A presentation is also made during staff induction which covers the role of the Technology Group and the software procurement and asset management process. Senior management within the Technology Group are the prime authors of the AQAPs related to software licensing and therefore are aware of the importance of using licensed software. The procedures are required to be followed by all staff and as the desktops are locked, there is relatively low risk of staff installing unlicensed software on the GLA systems. Testing confirmed that users without appropriate administrator rights are unable to install software. Prime software licensing responsibility lies with the Assets and Procurement Officer who must approve all requests for software before being purchased/installed. b) Procurement Arrangements 5. Software purchase AQAPs have been created which provide staff with guidelines regarding the purchase of Microsoft, Acrobat, Apple and non standard software. As software can only be installed by users with administrator rights in the Technology Group, there is little risk of users purchasing their own software and installing it on the network as they will not be able to do so. The Technology Group budget includes a budget for IT Software Purchases, Licenses and Maintenance. Corporate IT software and standard software is purchased from the Technology Group Software Budget. Any specific departmental software is purchased from departmental budgets. All software purchases must be approved by the Assets and Procurement Officer and therefore relevant checks are undertaken to ensure the software is charged to the correct cost centre. An approved list of software is included in the technical standard which is used as a purchase guide for most software. The GLA are also part of the Government Select purchasing scheme which allows the GLA to obtain discount prices and buy software as and when business needs require. Software that is no longer required by individual officers or members is transferred to existing GLA users and licenses transferred across the GLA Group. All software upgrades are required to go through the Change Advisory Board. c) Inventory Records 6. A list of all software is maintained on the Track It database and records of the physical software media is recorded on a separate inventory. Software records were previously documented in a spreadsheet and some spreadsheets are still in use. However, all software is due to be transferred to the central database in the next few months. The software inventory is reviewed on a regular basis as software is evaluated by the Technical Design Board to determine if software is still required. Page 4 of 11

5 Reviews are also undertaken as software maintenance renewal periods occur and regular liaison with the business helps to establish whether software is still required. d) Security and Copyright of Software 7. Electronic software licenses are stored in folders accessed through the Microsoft Outlook file plan and access restricted to the IT management team. Physical licenses are kept in leaver arch files which are stored in a locked cupboard in the IT controlled area. Original software media is held in locked cupboards within the IT controlled area and the Assets and Procurement Officer is responsible for the keys. If members of staff require access to the software media they must obtain permission from the Assets and Procurement Officer and sign the keys and out. The Technology Group are also members of FAST (The Federation against Software Theft) and are working towards the FAST Standards for Software Compliance. A service desk call is raised for the software to be installed and the call will be assigned to a designated technician to install the software. Software installations procedures vary depending on the software, if procedures are included with the software then these are provided to the technician, however, some software specific procedures have also been documented. SMS reports are generated to identify all the software that has currently been installed on the GLA systems. The SMS report is then checked against the consumption reports that are provided from Adobe and Microsoft to ensure the software used matches the software installed. It was identified that software reconciliations are not documented. Discussion identified that consumption reports for other software are only obtained for software that is heavily used. Therefore software reconciliations are not undertaken for all software used by the GLA and a recommendation has been raised to address this. e) Software Disposal Arrangements 8. Software that is not required is removed from a users PC by an IT technician via a request from the service desk. Information regarding the software will be documented in the Track It database. If the whole PC is required to be wiped due to the PC being replaced by a new model, then the PC is sent to Maxitech who are the approved third party disposal provider for secure destruction. It was identified that software media held by the GLA has not yet been evaluated to determine whether it should be retained or destroyed. A Board meeting is to be arranged to discuss the matter in more detail before the software can be destroyed. Therefore potentially outdated software could be retained by the GLA. There are also no documented procedures regarding software disposal and a recommendation has been raised to address this. Page 5 of 11

6 Observations and Recommendations In order to assist management in using our reports: We categorise our opinions according to our assessment of the controls in place and the level of compliance with these controls Full Assurance Substantial Assurance Limited Assurance No Assurance There is a sound system of control designed to achieve the system objectives and the controls are being consistently applied. While there is a basically sound system, there are areas of weakness which put some of the system objectives at risk, and/or there is evidence that the level of non-compliance with some of the controls may put some of the system objectives at risk. Weaknesses in the system of controls are such as to put the system objectives at risk, and/or the level of non-compliance puts the system objectives at risk. Control is generally weak, leaving the system open to significant error or abuse, and/or significant non-compliance with basic controls leaves the system open to error or abuse. b) We categorise our recommendations according to their level of priority. Priority 1 Priority 2 Priority 3 Major issues for the attention of senior management. Other recommendations for local management action. Minor matters. Page 6 of 11

7 Security and Copyright of Software 1. Software Audits (Priority 2) Recommendation Management should ensure regular software audits are undertaken to match all software installed on the GLA systems against all the licences that have been purchased. Evidence and sign off of the reconciliations should be retained for future reference. Rationale Performing regular software audits helps to ensure the software that has been installed on the GLA systems has been licensed. Audit was informed that Microsoft Systems Management Server (SMS) reports are generated to identify all the software that has currently been installed on the GLA systems. The SMS report is checked against the consumption reports that are provided from Adobe and Microsoft to ensure the software used matches the software that has been installed. Consumption reports are also obtained for heavily used software and necessary checks are carried out. However, this is not performed for all software installed on GLA systems and evidence of the checks/reconciliation is not documented. Unless comprehensive software audits are carried out, there is an increased risk of legislative action where the instances of software installed exceed the number of licenses held. There is also an increased risk of unauthorised or illegal software remaining undetected on the GLA network. Management response with the responsibility and due date. Agreed: regular software audits will be undertaken and documented. Different categories of software may be checked at different times of the year. Responsible Officer: Sylvia Glenn (Assets and Procurement Officer ) Deadline : Nov 2010 Page 7 of 11

8 Software Disposal Arrangements 2. Software Disposal (Priority 2) Recommendation Management should ensure software disposal procedures are documented and disseminated to staff. In addition, an exercise to identify software media that is no longer required should be undertaken and identified redundant software should be securely transferred or disposed of. Rationale Documenting software disposal procedures helps to ensure software is disposed of securely. Evaluating software for disposal purposes helps to ensure old or unlicensed software is identified and disposed off securely. It was identified that software media has not been evaluated to determine whether it is required for business purposes or whether it can be destroyed securely. Software disposal procedures have also not been created. Where software disposal procedures are not created, there is an increased risk that software is disposed of in an ad hoc manner leading to unauthorised users accessing the software. Where software is not identified for disposal, there is an increased risk that old software is re used without a valid license or expired versions of software are installed on the network causing compatibility issues with the current IT environment. Management response with the responsibility and due date. Agreed : all software media will be reviewed and redundant software will be disposed Responsible Officer : Sylvia Glenn (Assets and Procurement Officer ) Deadline: March 2010 Page 8 of 11

9 Appendix 1 Audit Framework Audit Objectives The primary objective of the audit is to provide an independent assurance assessment on the adequacy of the control environment established for software licensing. Audit Approach and Methodology The audit approach was developed with reference to an assessment of risks and management controls operating within each area of the scope. The following procedures were adopted: identification of the role and objectives of each area; identification of risks within the systems, and controls in existence to allow the control objectives to be achieved; and evaluation and testing of controls within the systems. From these procedures we have identified weaknesses in the systems of control, produced specific proposals to improve the control environment. Areas Covered Audit work was undertaken to cover controls in the following areas: a) Policies, roles and responsibilities b) Procurement arrangements c) Inventory records d) Security of primary copy write software records and source material e) Software disposal arrangements. Page 9 of 11

10 Appendix 2 - Staff Interviewed We would like to thank all staff that provided assistance during the course of this audit, and in particular the following: Graham Lane IT Licensing Manager (definitive software licence system manager) Sylvia Glenn Assets and Procurement Officer Chris IImthurn Business Manager. Page 10 of 11

11 Statement of Responsibility We take responsibility for this report which is prepared on the basis of the limitations set out below. The matters raised in this report are only those which came to our attention during the course of our internal audit work and are not necessarily a comprehensive statement of all the weaknesses that exist or all improvements that might be made. Recommendations for improvements should be assessed by you for their full impact before they are implemented. The performance of internal audit work is not and should not be taken as a substitute for management s responsibilities for the application of sound management practices. We emphasise that the responsibility for a sound system of internal controls and the prevention and detection of fraud and other irregularities rests with management and work performed by internal audit should not be relied upon to identify all strengths and weaknesses in internal controls, nor relied upon to identify all circumstances of fraud or irregularity. Auditors, in conducting their work, are required to have regards to the possibility of fraud or irregularities. Even sound systems of internal control can only provide reasonable and not absolute assurance and may not be proof against collusive fraud. Internal audit procedures are designed to focus on areas as identified by management as being of greatest risk and significance and as such we rely on management to provide us full access to their accounting records and transactions for the purposes of our audit work and to ensure the authenticity of these documents. Effective and timely implementation of our recommendations by management is important for the maintenance of a reliable internal control system. The assurance level awarded in our internal audit report is not comparable with the International Standard on Assurance Engagements (ISAE 3000) issued by the International Audit and Assurance Standards Board. Deloitte & Touche Public Sector Internal Audit Limited St Albans December 2009 In this document references to Deloitte are references to Deloitte & Touche Public Sector Internal Audit Limited. Deloitte & Touche Public Sector Internal Audit Limited is a subsidiary of Deloitte LLP, which is the United Kingdom member firm of Deloitte Touche Tohmatsu. Deloitte Touche Tohmatsu is a Swiss Verein (association), and, as such, neither Deloitte Touche Tohmatsu nor any of it member firms has any liability for each other s acts or omissions. Each of the member firms is a separate and independent legal entity operating under the names Deloitte, Deloitte & Touche, Deloitte Touche Tohmatsu, or other related names. Services are provided by the member firms or their subsidiaries or affiliates and not by the Deloitte Touche Tohmatsu Verein Deloitte & Touche Public Sector Internal Audit Limited. All rights reserved. Deloitte & Touche Public Sector Internal Audit Limited is registered in England and Wales with registered number Registered office: Hill House, 1 Little New Street, London, EC4A 3TR, United Kingdom. Page 11 of 11

Dacorum Borough Council Final Internal Audit Report

Dacorum Borough Council Final Internal Audit Report Dacorum Borough Council Final Internal Audit Report ICT Change Management Distribution list: Chris Gordon Group Manager Neil Telkman - Information, Security and Standards Officer Gary Osler ICT Service

More information

Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010

Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 This report has been prepared on the basis of the limitations set

More information

Report 6c. Final Internal Audit Report Network and Communications. April 2008

Report 6c. Final Internal Audit Report Network and Communications. April 2008 Report 6c Final Internal Audit Report Network and Communications April 2008 Contents Page Executive Summary 3 Observations and Recommendations 4 Appendix 2 - Staff Interviewed 14 Appendix 3 Benchmark Results

More information

Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010

Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010 Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010 This report has been prepared on the basis of the limitations set out on page 16. Contents Page

More information

Appendix 6c. Final Internal Audit Report Disaster Recovery Planning. June 2007. Report 6c Page 1 of 15

Appendix 6c. Final Internal Audit Report Disaster Recovery Planning. June 2007. Report 6c Page 1 of 15 Appendix 6c Final Internal Audit Report Disaster Recovery Planning June 2007 Report 6c Page 1 of 15 Contents Page Executive Summary 3 Observations and Recommendations 8 Appendix 1 - Audit Framework 13

More information

SOUTH NORTHAMPTONSHIRE COUNCIL. 11/31 ICT Capacity Management FINAL REPORT. June 2011

SOUTH NORTHAMPTONSHIRE COUNCIL. 11/31 ICT Capacity Management FINAL REPORT. June 2011 SOUTH NORTHAMPTONSHIRE COUNCIL 11/31 ICT Capacity Management FINAL REPORT June 2011 This report and the work connected therewith are subject to the Terms and Conditions of the contract dated 18/06/07,

More information

Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory. Assurance Rating:

Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory. Assurance Rating: Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory Assurance Rating: Distribution List: Draft Report: Principal Vice Principal, (Finance, Estates and Information Services) Clerk to the Corporation

More information

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011

SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 SOUTH NORTHAMPTONSHIRE COUNCIL 10/11 REMOTE WORKING FINAL REPORT MARCH 2011 This report and the work connected therewith are subject to the Terms and Conditions of the contract dated 18/06/07 between South

More information

Dacorum Borough Council Final Internal Audit Report. IT Business Continuity and Disaster Recovery

Dacorum Borough Council Final Internal Audit Report. IT Business Continuity and Disaster Recovery Dacorum Borough Council Final Internal Audit Report IT Business Continuity and Disaster Recovery Distribution list: Chris Gordon Group Manager Performance, Policy and Projects John Worts ICT Team Leader

More information

Coleg Gwent Internal Audit Report 2014/15 Staff Performance Management. Assurance Rating:

Coleg Gwent Internal Audit Report 2014/15 Staff Performance Management. Assurance Rating: Coleg Gwent Internal Audit Report 2014/15 Staff Performance Management Assurance Rating: Distribution List: Final Report Audit Committee Principal Vice Principal, (Resources and Financial Planning)/Director

More information

Business Planning & Budgetary Control 2012/13

Business Planning & Budgetary Control 2012/13 Cymdeithas Tai Cantref Cyf Final Internal Audit Report Business Planning & Budgetary Control 2012/13 Date of fieldwork: October November 2012 Date of draft report: November 2012 Date of final report: November

More information

Internal Audit at the University of Cambridge.

Internal Audit at the University of Cambridge. Internal Audit at the University of Cambridge. Contents Introduction to Deloitte 1 Our team 2 What is Internal Audit? 4 Our approach to Internal Audit 5 Authority and reporting lines 7 Planning 8 Ad Hoc

More information

How To Audit A Windows Active Directory System

How To Audit A Windows Active Directory System South Northamptonshire Council Windows Active Directory Final Internal Audit Report - September Distribution list: Mike Shaw IT & Customer Services Manager David Price Director of Community Engagement

More information

Aberdeen City Council IT Asset Management

Aberdeen City Council IT Asset Management Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates

More information

Internal Audit Report 2010/11 North Norfolk District Council. February 2011

Internal Audit Report 2010/11 North Norfolk District Council. February 2011 Internal Audit Report 2010/11 North Norfolk District Council NN/11/17 Network Infrastructure, Security and Telecommunications February 2011 This report has been prepared on the basis of the limitations

More information

Coleg Gwent Internal Audit Report 2012/13 Payroll and HR. Assurance Rating: Payroll

Coleg Gwent Internal Audit Report 2012/13 Payroll and HR. Assurance Rating: Payroll Coleg Gwent Internal Audit Report 2012/13 Payroll and HR Assurance Rating: Payroll HR Distribution List: Final Report Audit Committee Principal Vice Principal, (Finance, Estates and Information Services)

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

REVIEW OF THE FIREWALL ARRANGEMENTS

REVIEW OF THE FIREWALL ARRANGEMENTS WEST DORSET DISTRICT COUNCIL REVIEW OF THE FIREWALL ARRANGEMENTS Report issued: December 2007 The matters raised in this report are only those, which came to the attention of the auditor during the course

More information

University of South Wales Software Policies

University of South Wales Software Policies University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets

More information

Avon & Somerset Police Authority

Avon & Somerset Police Authority Avon & Somerset Police Authority Internal Audit Report IT Service Desk FINAL REPORT Report Version: Date: Draft to Management: 19 February 2010 Management Response: 12 May 2010 Final: 13 May 2010 Distribution:

More information

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement

Auditor General s Office. Governance and Management of City Computer Software Needs Improvement Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Internal Revenue Service Should Improve Server Software Asset Management and Reduce Costs September 25, 2014 Reference Number: 2014-20-042 This report

More information

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011 APPENDIX 1 GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT January 7, 2011 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS

More information

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers:

ITEM NO: 4. Date: 23 March 2010. Pam Williams Borough Treasurer Wendy Poole Head of Risk Management Audit Services. Reporting Officers: ITEM NO: 4 Report To: AUDIT PANEL Date: 23 March 2010 Reporting Officers: Subject: Report Summary: Recommendations: Links to Community Strategy: Policy Implications: Financial Implications: (Authorised

More information

Governance and Audit Committee 23 November 2015

Governance and Audit Committee 23 November 2015 Agenda Item 7 Governance and Audit Committee 23 November 2015 Welland Internal Audit Consortium Internal Audit Plan & Performance Update 2015/16 Purpose of report: To provide Members with information on

More information

Corporate ICT Asset Management

Corporate ICT Asset Management Policy Corporate ICT Asset Management Please note this policy is mandatory and staff are required to adhere to the content Summary A comprehensive program to monitor the location, use and value of all

More information

Comhairle nan Eilean Siar Internal Audit Follow Up Review Document Management. Final Report FU01 14/15

Comhairle nan Eilean Siar Internal Audit Follow Up Review Document Management. Final Report FU01 14/15 Comhairle nan Eilean Siar Internal Audit Follow Up Review Document Management Final Report FU01 14/15 11 November 2014 CONTENTS Page SECTION 1 - EXECUTIVE SUMMARY 1 4 SECTION 2 - DETAILED FINDINGS AND

More information

Aberdeen City Council. Fleet Management Final Report

Aberdeen City Council. Fleet Management Final Report Aberdeen City Council Fleet Management Final Report Internal Audit Report 2013/2014 for Aberdeen City Council February 2014 Internal Audit KPI Targets Target Dates Actual Dates Red/Amber/ Green Commentary

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

IT06 - Information Technology (IT) Hardware and Software Policy

IT06 - Information Technology (IT) Hardware and Software Policy IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion

Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion Essex Fire Authority Fleet Management Internal Audit Report (4.12/13) 28 February 2013 FINAL Overall Opinion Essex Fire Authority Fleet Management 4.12/13 CONTENTS Section Page Executive Summary 1 Action

More information

APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT. Auditor: Chris Power & Michael Lacey Date: April 2003 Reference: 320

APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT. Auditor: Chris Power & Michael Lacey Date: April 2003 Reference: 320 APPENDIX 4 GREATER LONDON AUTHORITY SUN ACCOUNTS UNIX REVIEW FINAL AUDIT REPORT Auditor: Chris Power & Michael Lacey Date: April Reference: 320 Table of Contents 1 INTRODUCTION 2 Page 2 OBJECTIVES AND

More information

Customer Retention Management

Customer Retention Management Customer Retention Management Course outline 2011 Outcomes In 2011, best practice dealers are getting serious about CRM, this includes: Developing their CRM model Structuring their CRM activities Employing

More information

Information & ICT Security Policy Framework

Information & ICT Security Policy Framework Information & ICT Security Framework Version: 1.1 Date: September 2012 Unclassified Version Control Date Version Comments November 2011 1.0 First draft for comments to IT & Regulation Group and IMG January

More information

Date 23 November 2010. Version 02.02. Information Security & Strategy Group. Authorising Body. Chris Drake Julia Harris. Contact

Date 23 November 2010. Version 02.02. Information Security & Strategy Group. Authorising Body. Chris Drake Julia Harris. Contact Software Licensing Policies DQ Status Approved Policy DQ Content Authority Supplier Authoriser Contact(s) for Help Description Head of Information security, Julia Harris N/A Software Compliance Manager,

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 21/09/2015 HSCIC Audit of Data Sharing

More information

Aberdeen City Council

Aberdeen City Council Aberdeen City Council Internal Audit Report Final Contract management arrangements within Social Care & Wellbeing 2013/2014 for Aberdeen City Council January 2014 Internal Audit KPI Targets Target Dates

More information

How To Improve Mainframe Software Asset Management

How To Improve Mainframe Software Asset Management TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION The Internal Revenue Service Should Improve Mainframe Software Asset Management February 20, 2014 Reference Number: 2014-20-002 This report has cleared

More information

Purchasing and Managing Software Licences

Purchasing and Managing Software Licences Purchasing and Managing Software Licences REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 579 Session 2002-2003: 1 May 2003 LONDON: The Stationery Office 8.25 Ordered by the House of Commons to be printed

More information

Office of the Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary

Office of the Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary Office of the Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary Internal Audit Report () FINAL Risk Management: Follow Up of Previous Internal Audit Recommendations

More information

DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA

DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF CORPORATE GOVERNANCE, STRATEGIC PLANNING AND PERFORMANCE FRAMEWORKS INTEGRATING NEW AREAS OF GLA BUSINESS

More information

University of Hartford. Software Management and Compliance Guidelines

University of Hartford. Software Management and Compliance Guidelines University of Hartford Software Management and Compliance Guidelines This policy is issued in an effort to remind the University community of the importance of complying with that policy and to reiterate

More information

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION Desktop and Laptop Software License Management June 25, 2013 Reference Number: 2013-20-025 This report has cleared the Treasury Inspector General for Tax

More information

Information and Compliance Management Information Management Policy

Information and Compliance Management Information Management Policy Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and

More information

Charity Audit Committee performance evaluation Self assessment checklist. October 2014

Charity Audit Committee performance evaluation Self assessment checklist. October 2014 Charity Audit Committee performance evaluation Self assessment checklist October 2014 With increasing responsibilities and complexities, being a member of the Audit Committee has never been more challenging

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

Software License and Hardware Use October 3, 2011

Software License and Hardware Use October 3, 2011 Software License and Hardware Use October 3, 2011 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015 Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud

More information

APPENDIX 23 ATTACHMENT 1. City of Joondalup. 2014 Review of Financial Management Systems and Procedures. March 2015

APPENDIX 23 ATTACHMENT 1. City of Joondalup. 2014 Review of Financial Management Systems and Procedures. March 2015 APPENDIX 23 ATTACHMENT 1 City of Joondalup 2014 Review of Financial Management Systems and Procedures March 2015 Deloitte Touche Tohmatsu ABN 74 490 121 060 Woodside Plaza Level 14 240 St Georges Terrace

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader

AGENDA ITEM: SUMMARY. Author/Responsible Officer: John Worts, ICT Team Leader AGENDA ITEM: SUMMARY Report for: Committee Date of meeting: 30 May 2012 PART: 1 If Part II, reason: Title of report: Contact: Purpose of report: Recommendations Corporate objectives: Implications: INFORMATION

More information

Software Licenses Managing the Asset and Related Risks

Software Licenses Managing the Asset and Related Risks AUDITOR GENERAL S REPORT ACTION REQUIRED Software Licenses Managing the Asset and Related Risks Date: February 4, 2015 To: From: Wards: Audit Committee Auditor General All Reference Number: SUMMARY The

More information

Comhairle nan Eilean Siar Internal Audit Follow Up Review Licensing. Final Report FU16 12/13

Comhairle nan Eilean Siar Internal Audit Follow Up Review Licensing. Final Report FU16 12/13 Comhairle nan Eilean Siar Internal Audit Follow Up Review Licensing Final Report FU16 12/13 09 October 2012 CONTENTS Page SECTION 1 - EXECUTIVE SUMMARY 1 2 SECTION 2 - DETAILED FINDINGS AND RECOMMENDATIONS

More information

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014 Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

An Approach to Records Management Audit

An Approach to Records Management Audit An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION

More information

Audit of IT Asset Management Report

Audit of IT Asset Management Report Audit of IT Asset Management Report Recommended by the Departmental Audit Committee for approval by the President on Approved by the President on September 4, 2012 e-doc : 3854899 1 Table of Contents EXECUTIVE

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 26/10/2015 HSCIC Audit of Data Sharing

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF INTERNET- BASED NETWORK SECURITY DISTRIBUTION LIST Audit Team David Esling, Head of Audit Assurance, Risk

More information

BIG LOTTERY FUND Document archive and retention policy

BIG LOTTERY FUND Document archive and retention policy BIG LOTTERY FUND Document archive and retention policy December 2010 Sonia Howe Head of Information Governance For further information regarding retention schedules please contact Page 1 of 18 Version

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

APPENDIX 2 GENERIC OPERATIONAL RISKS RISK TABLES & ADDITIONAL ACTION PLANS MONITORING REPORT MARCH 2006

APPENDIX 2 GENERIC OPERATIONAL RISKS RISK TABLES & ADDITIONAL ACTION PLANS MONITORING REPORT MARCH 2006 APPENDIX 2 GENERIC OPERATIONAL S TABLES ADDITIONAL ACTION PLANS MONITORING REPORT MARCH 2006 GENERIC S AFFECTING MOST OR ALL SERVICES OPERATIONAL S OF HYNDBURN BOROUGH COUNCIL PROFESSIONAL LIKELI- HOOD

More information

Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2. Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants...

Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2. Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student Assistants... Contents Workstation Refresh & Virtual Desktop Infrastructure Program Introduction and Purpose... 2 Scope... 2 Auxiliary units... 2 Part-Time, Temporary faculty/staff, Volunteer, Contractor and Student

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

HSCIC Audit of Data Sharing Activities:

HSCIC Audit of Data Sharing Activities: Directorate / Programme Data Dissemination Services Project Data Sharing Audits Status Approved Director Terry Hill Version 1.0 Owner Rob Shaw Version issue date 20/04/2016 HSCIC Audit of Data Sharing

More information

Data Security Policy

Data Security Policy Policy Number: Revision Number: 0 QP1.44 Date of issue: March 2009 Status: Approved Date of approval: April 2009 Responsibility for policy: Responsibility for implementation: Responsibility for review:

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

Internal Audit Monitoring Report. Audit Report status Assurance. Payroll Final Limited

Internal Audit Monitoring Report. Audit Report status Assurance. Payroll Final Limited Appendix 1 Internal Audit Monitoring Report Audit Report status Assurance Payroll Final Limited The Payroll system was reviewed to seek assurance that processes and procedures are operating effectively

More information

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy Version History Author Approved Committee Version Status date Eddie Jefferson 09/15/2009 Full Governing 1.0 Final Version Body Eddie Jefferson 18/08/2012 Full Governing Body 2.0 Emended due to the change

More information

How To Get A License From A Business To A Computer (For A Business)

How To Get A License From A Business To A Computer (For A Business) Six Steps to Completing a Software Audit and Ensuring Compliance While Saving Money A Guide to Assessing Vulnerabilities and Ensuring Ongoing Software License Compliance 200 West Mercer Street Suite E300

More information

Office of the City Auditor. Audit Report. AUDIT OF SOFTWARE LICENSE COMPLIANCE (Report No. A14-010) April 11, 2014. City Auditor. Craig D.

Office of the City Auditor. Audit Report. AUDIT OF SOFTWARE LICENSE COMPLIANCE (Report No. A14-010) April 11, 2014. City Auditor. Craig D. CITY OF DALLAS Dallas City Council Office of the City Auditor Audit Report Mayor Michael S. Rawlings Mayor Pro Tem Tennell Atkins AUDIT OF SOFTWARE LICENSE COMPLIANCE (Report No. A14-010) Deputy Mayor

More information

Essex Fire Authority

Essex Fire Authority Internal Audit Report (2.13/.14) FINAL with the Civil Contingencies Act 1 October 2013 Contents Section Page Executive Summary 1 Action Plan 5 Findings and Recommendations 6 Debrief meeting 15 August 2013

More information

BULLETIN. The Senior Statutory Auditor under the United Kingdom Companies Act 2006. April 2008 2008/6

BULLETIN. The Senior Statutory Auditor under the United Kingdom Companies Act 2006. April 2008 2008/6 April 2008 The Senior Statutory Auditor under the United Kingdom Companies Act 2006 2008/6 BULLETIN This Bulletin applies to financial years beginning on or after 6 April 2008. The Auditing Practices Board

More information

Information Management Policy

Information Management Policy Information Management Policy Document Control Title Organisation Description Author(s) Information Management Policy London Legacy Development Corporation The Information Management Policy describes how

More information

Governance of Controlled Drugs using Automated Cabinet-based Stock-control Systems

Governance of Controlled Drugs using Automated Cabinet-based Stock-control Systems T: 0870 4328 250 F: 0870 4328 251 E: info@avantec.uk.com W: www.avantec.uk.com Governance of Controlled Drugs using Automated Cabinet-based Stock-control Systems An evaluation of ward practice and how

More information

Northumberland National Park Authority Report on the audit for the year ended 31 March 2012

Northumberland National Park Authority Report on the audit for the year ended 31 March 2012 Northumberland National Park Authority Report on the audit for the year ended 31 March 2012 September 2012 Dear Sirs We have pleasure in setting out in this document our report to the Northumberland National

More information

Software compliance policy

Software compliance policy Software compliance policy Name of policy, procedure or regulation Software compliance policy Purpose of policy, procedure or regulation To provide a coordinated approach to software asset management Who

More information

Caedmon College Whitby

Caedmon College Whitby Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be

More information

REMOTE WORKING POLICY

REMOTE WORKING POLICY Reference number Approved by Information Management and Technology Board Date approved 30 April 2013 Version 1.0 Last revised Review date March 2014 Category Owner Target audience Information Assurance

More information

University of Liverpool

University of Liverpool University of Liverpool IT Asset Disposal Policy Reference Number Title CSD 015 IT Asset Disposal Policy Version Number v1.2 Document Status Document Classification Active Open Effective Date 22 May 2014

More information

INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION

INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION INSPECTION CLOUD COMPUTING SECURITY DOCUMENTATION IN THE CYBER SECURITY ASSESSMENT MANAGEMENT SOLUTION Report No.: 2015-ITA-017 November 2015 OFFICE OF INSPECTOR GENERAL U.S.DEPARTMENT OF THE INTERIOR

More information

Business Continuity Business Impact Analysis arrangements

Business Continuity Business Impact Analysis arrangements Aberdeen City Council Internal Audit Report 2012/2013 for Aberdeen City Council May 2013 Business Continuity Business Impact Analysis arrangements Final Report Contents Section Page 1. Executive Summary

More information

Sarbanes-Oxley Section 404: Compliance Challenges for Foreign Private Issuers

Sarbanes-Oxley Section 404: Compliance Challenges for Foreign Private Issuers Sarbanes-Oxley Section 404: Compliance s for Foreign Private Issuers Table of Contents Requirements of the Act.............................................................. 1 Accelerated Filer s...........................................................

More information

Cambridgeshire and Peterborough Fire Authority. Internal Audit Progress Report Overview & Scrutiny Committee meeting 16 October 2014

Cambridgeshire and Peterborough Fire Authority. Internal Audit Progress Report Overview & Scrutiny Committee meeting 16 October 2014 Cambridgeshire and Peterborough Fire Authority Internal Audit Progress Report Overview & Scrutiny Committee meeting 16 October 2014 Cambridgeshire & Peterborough Fire Authority 1 Introduction This report

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

Comhairle nan Eilean Siar Internal Audit Review DISASTER RECOVERY ARRANGEMENTS Information Technology. Final Report 2014/15-06

Comhairle nan Eilean Siar Internal Audit Review DISASTER RECOVERY ARRANGEMENTS Information Technology. Final Report 2014/15-06 Comhairle nan Eilean Siar Internal Audit Review Information Technology Final Report 2014/15-06 3 rd November 2014 CONTENTS Page SECTION 1 - EXECUTIVE SUMMARY 1-6 SECTION 2 - DETAILED FINDINGS AND RECOMMENDATIONS

More information

Interim Audit Report. Borough of Broxbourne Audit 2010/11

Interim Audit Report. Borough of Broxbourne Audit 2010/11 Interim Audit Report Borough of Broxbourne Audit 2010/11 The Audit Commission is an independent watchdog, driving economy, efficiency and effectiveness in local public services to deliver better outcomes

More information

Software Asset Management High Risk, High Reward

Software Asset Management High Risk, High Reward Software Asset Management High Risk, High Reward January 2014 Andy Deas adeas@deloitte.com Travis Markowitz tmarkowitz@deloitte.com Eli Black eliblack@deloitte.com Contents What is Software Asset Management

More information

Subject: Remote Working

Subject: Remote Working GREATERLONDONAUTHORITY LONDONASSEMBLY Subject: Remote Working Report Number: 5 Report to: Business Management and Administration Committee Date: 11 March 2008 Report of: Head of Paid Service 1. Recommendation

More information

SOFTWARE MANAGEMENT EXECUTIVE SUMMARY

SOFTWARE MANAGEMENT EXECUTIVE SUMMARY SOFTWARE MANAGEMENT EXECUTIVE SUMMARY Under a task order with the Office of Inspector General, Jefferson Wells reviewed the Commission s software management. Our review found that some controls and best

More information

Software Licence Compliance. A guide to Software Asset Management in the Enterprise

Software Licence Compliance. A guide to Software Asset Management in the Enterprise Software Licence Compliance A guide to Software Asset Management in the Enterprise Prepared by the xassets Software Development Team Paul Lambert, 22 nd March 2004 Overview Software Asset Management (SAM)

More information

How To Manage A University Computer System

How To Manage A University Computer System PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Audit, Risk and Compliance Committee Charter

Audit, Risk and Compliance Committee Charter 1. Background Audit, Risk and Compliance Committee Charter The Audit, Risk and Compliance Committee is a Committee of the Board of Directors ( Board ) of Syrah Resources Limited (ACN 125 242 284) ( Syrah

More information

Coleg Gwent. Business Continuity Plan Test - Post Implementation Review (PIR) Internal Audit Report (12.09/10)

Coleg Gwent. Business Continuity Plan Test - Post Implementation Review (PIR) Internal Audit Report (12.09/10) Internal Audit Report 1 June 2010 Business Continuity Plan Test Post Implementation Review (PIR) CONTENTS Section Page Executive Summary 1 Action Plan 4 Findings and Recommendations 5 Debrief meeting 28

More information

Mapping the Technical Dependencies of Information Assets

Mapping the Technical Dependencies of Information Assets Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital

More information