White Paper: FSA Data Audit

Size: px
Start display at page:

Download "White Paper: FSA Data Audit"

Transcription

1 Background In most insurers the internal model will consume information from a wide range of technology platforms. The prohibitive cost of formal integration of these platforms means that inevitably a significant proportion of the data feeding internal models is held in, passes through or is manipulated by, End User Computing (EUC) applications (such as Microsoft Excel and Access) or similar files such as.csvs. The integrity of these processes is a specific focus for Data Audits. The has developed a review tool to help assess whether a firm s data management complies with the standards set out in the Solvency II Directive for the purposes of internal model approval. This tool will be used as part of the s Internal Model Approval Process (IMAP). It informs firms on what they might do in order to satisfy the standards set out in the Directive and is also based on what is expected to be required from the delegated acts (formerly referred to as the Level 2 implementing measures). The scope of the review is all data (internal and external) that could materially impact the Internal Model. After conducting the review the firm is expected to provide summary findings to the and be ready to provide the evidence that formed the basis of the conclusions. The review schedule has five sections as follows: 1. The approach (i.e. matters of policy) to managing data 2. The level of oversight of the implementation of the data policy 3. The level of understanding of the data used in the internal model 4. Data issues that may undermine the integrity of the internal model 5. Unreliable processes that may undermine the integrity of the model The areas of potential risk and expected controls in each of these sections are documented in detail below, alongside the capabilities of the ClusterSeven solution to meet these control s where they are applicable to End User Computing applications. Risk 1: The approach to managing data for use in the internal model does not ensure consistency in quality and application of the internal model Control objective: To ensure that data quality is maintained throughout the process of the internal model as required by Solvency II. A data policy has been established and implemented. The policy, its associated procedures, and standards include: Central monitoring and associated reporting provide robust evidence of implementation. Flexible control models enable data policies to be efficiently tuned for different data streams. Data management is the process of collecting data from disparate sources and combining it in a way that the [internal] model can use. Data operations: Any point in the system where you do something with data e.g.: - interpretation (e.g.when a user takes a freeform field and interprets it as a structured one) - formatting (e.g.changing a date format from to 1/3/2010) - alteration (e.g. data cleaning) - joining (e.g.contractual data such as annuity policies with observational data such as mortality tables) - restructuring (e.g. Excel Pivot function) - aggregation (e.g.sumif function in Excel) - extraction (e.g. a SQL query downloading a CSV file) - derivation (e.g. matrix multiplication) - merging (e.g. cut and paste from different sources) - translation (a term which has a meaning for one system is translated into a different term that has the same meaning for another system). Spreadsheets and Solvency II July 2010 Page 1

2 a definition of the different data sets that are to be covered by the policy; a definition of materiality (which is aligned to the firm s risk appetite where appropriate e.g. when an expert judgement is made to adjust for insufficient observational data); the respective ownership and - responsibility for the data sets, including the system of governance and assurance over data quality; a definition of the standards for maintaining and assessing quality of data, including specific qualitative and quantitative standards for the data sets, based on the criteria of accuracy, completeness and appropriateness; the use of assumptions made in the collection, processing and application of data; the process for carrying out data updates to the internal model, including the frequency of regular updates and the circumstances that trigger additional updates and recalculations of the probability distribution forecast; a high level description of the risk and impact assessment process including the frequency with which the assessment process is conducted, and; the frequency of the review of the data policy, associated procedures, and standards. Full inventory reports available on demand Materiality of an EUC may be defined by users as a tag within the EUC or by independent technology-based assessment. This metadata can drive the application of different control processes. Expert judgement amendments are automatically caught as manual changes and reported. Client may establish multiple attributes for an EUC to allow for such roles as ownership, testing, auditing, alerting, approval. All such attributes can be reported across the EUC inventory, including the exposure of gaps such as non-existent owners. Flexible controls allow a wide range of qualitative and quantitative standards to be automatically applied to any chosen data set. Data and metadata assumptions held in a spreadsheet can be routinely checked for timeliness and consistency. Changes to assumptions can be automatically notified. Where spreadsheet-based updates to the internal model require a specific set of actions to be completed in a specific order these processes can be automatically logged and checked. Anomalies to the expected process can be automatically notified. The Risk of a spreadsheet can be automatically assessed against clientdefined rules. Users can extend the documentation of the Risk status by tags inserted into the spreadsheet. These metadata items can automatically drive the application of different control processes. The frequency and completeness of all spreadsheet review processes is automatically monitored and may be reported as required. I still see audit reports or project plans that recommend replacing spreadsheets and manual processes with IT solution This will never happen - It is impractical to replace 2 or more fragmented systems with a single system - Replacing the spreadsheet operations with IT designed ones only compounds the problem and removes any ability of users to address problems. The only solution is to eliminate the worst processes, and to apply appropriate controls to the ones that remain. Spreadsheets and Solvency II July 2010 Page 2

3 Risk 2: Inadequate oversight of the development and implementation of the data policy increases the risk of poorly informed decision-making and noncompliance with the required quality and standards Control Objective 2.1: To set the tone and provide appropriate oversight of the implementation of the data policy necessary for sound decision making Control Objective 2.2: To ensure appropriate and timely reporting to support required governance and management decision making process and timely detection of issues The data governance structures and processes are operating as defined in the data policy and associated procedures and effective in: providing appropriate oversight in the application of the data policy ensuring that the data policy, associated procedures, and standards including the responsibilities and accountabilities of the various stakeholders across the firm, the quantity and quality of data metrics reported to management, the data directory, and the risk and impact assessment are kept under regular review; ensuring appropriate assurance is carried out and received for validating the quality of data used in the internal model. Data quality metrics (qualitative and quantitative) defined in the data policy are reported (individually, aggregated or categorised) to appropriate levels of management on a regular basis to enable them to assess the quality of data and take remedial action when there are material issues The system of reporting should include a deficiency management process whereby exceptions identified as a Central monitoring and associated reporting provide robust evidence of processes operating as per policy. Flexible control models enable data policies to be efficiently tuned for different data streams. Summary reports are available to meet all stakeholder needs including Executive, Management, Risk, Compliance and IT. Summary reports are available to highlight the frequency of operational issues that will drive escalation for the improvement of underlying business processes. Where required the client can require that anomalies to data or processes are signed off /approved before running the internal model A wide range of data checks are available and may be reported in detail or summary form to designated management. These checks include the presence (or absence) of change, tolerance levels (max, min, percentage) and trends over time. Where required the client can require that anomalies to data or processes are signed off /approved In many firms, spreadsheets provide a key area of risk, because they are typically not owned by IT, but by other business or control areas, such as the actuarial function. They may not be subject to the same general IT controls as the firm s formal IT systems (e.g. change controls, disaster recovery planning, security etc) and firms need to develop a control system around this. Solvency II: IMAP, Thematic Review findings February 2011 Controls we expect to see Audit trail - Tamper proof record of changes Version control + backup Segregation of duties Code checking / code reading Testing Maintainability 2007 Audit trail Page 3

4 result of data quality checks and controls, which could have a material impact on the internal model, are escalated to appropriate levels of management and actions taken to address them on a timely basis. before running the internal model Risk 3: Lack of a clear understanding of the data used in the internal model, and of its impact and vulnerabilities, can create gaps in ownership and control Control Objective: To ensure that data used in the internal model, its impact and vulnerabilities has been clearly identified and maintained. A directory of all data used in the ClusterSeven automatically compiles internal model has been compiled an inventory of files linked to the specifying source, usage and feeds of the internal model (presented characteristics including: in spider diagrams and associated reports) and captures and reports associated metadata. This metadata may be enhanced by defining additional spreadsheet attributes that are automatically compiled for storage (e.g. location, multiple copies) across the data flow to internal model how data is used in internal model including any transformation (e.g. aggregation, enrichment, derivation) processes For each data set, a risk and impact (sensitivity) assessment has been performed to identify:- whether the impact of poor quality data(individually or in aggregation) on the internal model is material; the points in the data flow from source to internal model where likelihood of data errors is the greatest, and therefore, what specific reporting as required. Spreadsheet locations, historical versions and version copies can be automatically identified. ClusterSeven can monitor the changes (or lack of changes) within spreadsheets to confirm that the observed activity matches the expected transformation. Reports/alerts can be delivered based on anomalies or business-related changes in the process (e.g the arrival of new transactions). Risk assessments can be tailored to client specific needs and run on an ad hoc (but monitored) basis or on a prescheduled basis. Cell and range-level tolerances can be placed on all critical values imported into the internal model Spidering and cell-precedent analysis allow key data nodes to be identified for the application of appropriate controls. Possible controls Peer (non-independent) review Independent expert review Segregation of production from test version Version control over production version The list is long think in terms of what controls would be applicable to corporate IT application. A userdeveloped application, if business critical, should be no different Version control Where controls can be difficult Any firms books and records e.g. those involving legal or contractual records - These typically require access control and an audit trail of changes Any application where changes would have significant economic impact - These require monitoring, access control and frequent independent checking 2011 Access control Page 4

5 data quality controls are required; tolerance threshold beyond which a data error could become material (individually or in aggregation). Cell and range-level tolerances can be placed on all critical values imported into the internal model Risk 4: Errors, omissions and inaccuracies in the data can undermine the integrity of the internal model and management decision making. Control Objective: To ensure that data quality (complete, accurate, appropriate, and timely/current) is maintained in the internal model. The management and data quality controls (preventative, detective, and corrective) proportional to the probability and materiality of potential data errors have been identified and implemented effectively. The controls should include (at a minimum): having individuals with sufficient competence to conduct the manual data checks on accuracy, completeness and appropriateness A well-defined and consistent process for refreshing or updating all data items in line with the data policy (timeliness and currency of data). The process must include appropriate change controls (automated or manual) that take into account any material impact (individually or in aggregation) on the internal model. Data input validations (auto/manual) that prevent data having incorrect or inconsistent format or invalid values. Risk assessment enables the detection of control vulnerabilities such as inadequate use of passwords on spreadsheet files, VBA modules and lock down of critical cells. Additional reports provide analysis of ACL vulnerabilities (e.g. single name user groups attached to file shares). Once vulnerabilities have been closed and a new baseline established, alerts provide immediate notifications of regression of these controls. It is usually the case that manual checks require much higher user competency than the automated processes delivered by ClusterSeven. The automation provided by ClusterSeven enables well-defined processes to be consistently applied, including a full audit log of changes. In addition the materiality of changes in terms of individual/aggregation, action/inaction, and data/structure may be separately highlighted and reported for specific attention. ClusterSeven enables an automated data validation process to be conducted across millions of data items from spreadsheets and flat files (e.g..csvs) prior to being uplifted into internal models in order to capture inconsistent or invalid data. It is unrealistic to assume that manual checks will be reliable on anything but a small number of data items. Controls over accuracy A recognised check over accuracy is to compare the data received with the original source - Reasonable checks, or random checks against the primary (i.e. objectively verifiable) data may often be sufficient - Internal coherency/consistency checks based on known properties of the data (e.g. its expected distribution) can also be effective - Think about possible worst/bad cases and place appropriate controls Tolerance alerts Controls over completeness Reconciliation is a recognised check on completeness - Reconciliation means a check on records that were received against the records that were expected to be received - This can be difficult to achieve, as it requires transparency about what records were requested e.g. by a complex SQL query - Reconciliation can also be more difficult with end-user applications 2011 Reconciliation Page 5

6 Completeness checks such as: Reconciliation of data received against data expected A process to assess if data is available for all relevant model variables and risk modules Accuracy checks such as Comparison directly against the source (if available). Internal consistency and coherence checks of the received/output data against expected properties of the data such as age-range, standard deviation, number of outliers, and mean. Comparison with other data derived from the same source, or sources which are correlated. Appropriateness checks such as Consistency and reasonableness checks to identify outliers and gaps through comparison against known trends, historic data and external independent sources. A definition and consistent application of the rules that govern the amount and nature of data used in the internal model. A process to assess the data used in internal model for any inconsistencies with the assumptions underlying the actuarial and statistical techniques or made during the collection, processing and application of data. ClusterSeven enables automated reconciliations of data against both expected control values and expected processes (such as transaction maturity dates). ClusterSeven enables automated checks on the presence of up-to-date data extracts from third party systems. ClusterSeven enables automated checks of values held in spreadsheets and flat files against values held in other locations such as source data. ClusterSeven reports can apply a range of consistency and coherence checks on output data. However, for more complex analysis (e.g. statistical) these calculations may be completed in a spreadsheet and automatically captured and reported using standard ClusterSeven functionality. In addition to formal value reconciliations ClusterSeven enables visual comparisons (e.g. trending) via graphs to confirm expected correlations. Unlike a spreadsheet file or.csv which typically only contains a snapshot of data in time, ClusterSeven retains the full time series of each cell history, enabling full analysis of historic data and trends. Policy definitions applicable to spreadsheets and flat file data sources may be established within ClusterSeven, enabling the consistent application of these rules during the peaks and troughs of other business activity. Inconsistencies in process or data highlighted by ClusterSeven may be surfaced by alerts or reports to trigger workflow for amendment or approval. Data management appeared to be one area where firms still have comparatively more to do to achieve the likely Solvency II s. Also firms did not have a documented validation policy that clearly explained all the processes used to validate their internal model. We will be looking at these areas in more detail at a firm-by-firm level during the preapplication phase of IMAP. Solvency II: IMAP, Thematic Review findings February, 2011 Risk 5: Unreliable IT environment, technology or tools can compromise the Page 6

7 quality and integrity of the data and its processing within the internal model Control Objective: To ensure that the quality of data and its processing for use in the internal model is maintained IT general computer (ITGC) controls ClusterSeven provides a complete over the data environment (for e.g. solution for End User Computing (EUC) Mainframes, End User Computing applications such as spreadsheets and applications such as spreadsheets, MS Access databases as well as flat file etc) that may have material impact extracts such as.csv and.dat. on the internal model are established, such as logical access management ClusterSeven provides analysis of access vulnerabilities (e.g. inappropriate ACLs or inadequate application of Excel passwords) and facilitates the application and maintenance of these controls together with the adoption of development and change management (infrastructure, applications, and database); security (network and physical); business continuity; incident management and reporting, and; other operational controls that support the collection (including data feeds), storage, analysis and processing. Information Rights Management. ClusterSeven provides complete lifecycle support for EUC applications including test and audit cycles. N/a ClusterSeven provides the opportunity for disaster recovery and business continuity with respect to monitored files. ClusterSeven provides a full alerting and reporting environment for EUC activity (or inactivity). ClusterSeven provides operational controls appropriate to these processes when conducted within EUCs e.g. confirming that data feeds have been updated. ClusterSeven success stories in insurance to date: Part of our financial close process used to take hours, now it takes minutes Financial controller, Global insurer This is the first time I can show the rest of the business how it all works Head of Actuarial, Lloyds managing agent We will use data dictionary terms within our spreadsheets and then automatically upload validated information into our corporate BI solution UK General Insurer Conclusions The presence of spreadsheets and flat files (e.g. CSVs) within the data processing chain, between source systems and the internal model, presents significant challenges in meeting the wide-ranging s of the Data Audit. The Data Audit specifically allows manual controls to be established provided that they are applied consistently. However, the practicality and cost constraints of applying experienced staff to these processes means that automation is likely to be a far more effective and robust solution for anything beyond the simplest and smallest of files. Page 7

DATA AUDIT: Scope and Content

DATA AUDIT: Scope and Content DATA AUDIT: Scope and Content The schedule below defines the scope of a review that will assist the FSA in its assessment of whether a firm s data management complies with the standards set out in the

More information

Solvency II Data audit report guidance. March 2012

Solvency II Data audit report guidance. March 2012 Solvency II Data audit report guidance March 2012 Contents Page Introduction Purpose of the Data Audit Report 3 Report Format and Submission 3 Ownership and Independence 4 Scope and Content Scope of the

More information

How To Improve Data Quality

How To Improve Data Quality The Data Quality Challenge What about all the spreadsheets? Ralph Baxter, CEO, ClusterSeven Agenda Spreadsheets...and Business...and Regulators.and Cost...and Management...and Data Exploitation/Opportunity

More information

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act*

The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act* July 2004 *connectedthinking The Use of Spreadsheets: Considerations for Section 404 of the Sarbanes-Oxley Act Introduction

More information

Lloyd s Managing Agents FSA Solvency II Data Audit

Lloyd s Managing Agents FSA Solvency II Data Audit Lloyd s Managing Agents FSA Solvency II Data Audit Working in partnership with you to provide the independent assurance that your Data Audit Report fulfils Lloyd s and FSA Solvency II requirements Lloyd

More information

Internal Model Approval Process (IMAP) Contents of Application (CoA) Template. August 2011 Version 1.0

Internal Model Approval Process (IMAP) Contents of Application (CoA) Template. August 2011 Version 1.0 Internal Model Approval Process (IMAP) Contents of Application (CoA) Template August 2011 Version 1.0 C O N T A C T D E T A I L S Physical Address: Riverwalk Office Park, Block B 41 Matroosberg Road (Corner

More information

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES... Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation

More information

Functional and technical specifications. Background

Functional and technical specifications. Background Functional and technical specifications Background In terms of the Public Audit Act, 2004 (Act No. 25 of 2004) (PAA), the deputy auditor-general (DAG) is responsible for maintaining an effective, efficient

More information

Capacity Management PinkVERIFY

Capacity Management PinkVERIFY CAP-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? CAP-11-G-002 Does the tool have security controls in place

More information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information

Royal Borough of Kensington and Chelsea. Data Quality Framework. ACE: A Framework for better quality data and performance information Royal Borough of Kensington and Chelsea Data Quality Framework ACE: A Framework for better quality data and performance information March 2010 CONTENTS FOREWORD 2 A CORPORATE FRAMEWORK FOR DATA QUALITY

More information

Session 190 PD, Model Risk Management and Controls Moderator: Chad R. Runchey, FSA, MAAA

Session 190 PD, Model Risk Management and Controls Moderator: Chad R. Runchey, FSA, MAAA Session 190 PD, Model Risk Management and Controls Moderator: Chad R. Runchey, FSA, MAAA Presenters: Michael N. Failor, ASA, MAAA Michael A. McDonald, FSA, FCIA Chad R. Runchey, FSA, MAAA SOA 2014 Annual

More information

Central Bank of Ireland Guidelines on Preparing for Solvency II Pre-application for Internal Models

Central Bank of Ireland Guidelines on Preparing for Solvency II Pre-application for Internal Models 2013 Central Bank of Ireland Guidelines on Preparing for Solvency II Pre-application for Internal Models 1 Contents 1 Context... 1 2 General... 2 3 Guidelines on Pre-application for Internal Models...

More information

LLOYD S MINIMUM STANDARDS

LLOYD S MINIMUM STANDARDS LLOYD S MINIMUM STANDARDS Ms1.7 UNDERWRITING DATA QUALITY October 2015 1 Ms1.7 UNDERWRITING DATA QUALITY UNDERWRITING MANAGEMENT PRINCIPLES, MINIMUM STANDARDS AND REQUIREMENTS These are statements of business

More information

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012

GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012 GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental

More information

Prudential Practice Guide

Prudential Practice Guide Prudential Practice Guide CPG 235 Managing Data Risk September 2013 www.apra.gov.au Australian Prudential Regulation Authority Disclaimer and copyright This prudential practice guide is not legal advice

More information

Role of Analytics in Infrastructure Management

Role of Analytics in Infrastructure Management Role of Analytics in Infrastructure Management Contents Overview...3 Consolidation versus Rationalization...5 Charting a Course for Gaining an Understanding...6 Visibility into Your Storage Infrastructure...7

More information

Internal Audit FINAL INTERNAL AUDIT REPORT. Management Initiated Review of Child Support Master Program Payments

Internal Audit FINAL INTERNAL AUDIT REPORT. Management Initiated Review of Child Support Master Program Payments Australian Government Department of Human Services Internal Audit FINAL INTERNAL AUDIT REPORT Management Initiated Review of Child Support Master Program Payments Report Number Conducted May - June 2012

More information

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY POLICY Name Of Policy: Security Audit Logging Policy Domain: Security Date Issued: 05/23/11 Date

More information

Improving information to support decision making: standards for better quality data

Improving information to support decision making: standards for better quality data Public sector November 2007 Improving information to support decision making: standards for better quality data A framework to support improvement in data quality in the public sector Improving information

More information

Spreadsheets and Access Databases Enterprise Control, Efficiency and Insight. Find It. Audit. Profit

Spreadsheets and Access Databases Enterprise Control, Efficiency and Insight. Find It. Audit. Profit Spreadsheets and Access Databases Enterprise Control, Efficiency and Insight Find It. Audit. Profit Everybody has problems with spreadsheets Clients Exec Brand Protection Loss of Reputation Avoiding major

More information

7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers

7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers Contents Page 1 Introduction 2 2 Objectives of the Strategy 2 3 Data Quality Standards 3 4 The National Indicator Set 3 5 Structure of this Strategy 3 5.1 Awareness 4 5.2 Definitions 4 5.3 Recording 4

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015

Solihull Metropolitan Borough Council. IT Audit Findings Report September 2015 Solihull Metropolitan Borough Council IT Audit Findings Report September 2015 Version: Responses v6.0 SMBC Management Response July 2015 Financial Year: 2014/2015 Key to assessment of internal control

More information

PHASE 9: OPERATIONS AND MAINTENANCE PHASE

PHASE 9: OPERATIONS AND MAINTENANCE PHASE PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.

More information

NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE

NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE STAATSKOERANT, 19 DESEMBER 2014 No. 38357 3 BOARD NOTICE NOTICE 158 OF 2014 FINANCIAL SERVICES BOARD REGISTRAR OF LONG-TERM INSURANCE AND SHORT-TERM INSURANCE LONG-TERM INSURANCE ACT, 1998 (ACT NO. 52

More information

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS Our solutions dynamically connect business transactions, strategy, and operations to the ever-changing regulatory environment,

More information

Making Business Intelligence Easy. Whitepaper Measuring data quality for successful Master Data Management

Making Business Intelligence Easy. Whitepaper Measuring data quality for successful Master Data Management Making Business Intelligence Easy Whitepaper Measuring data quality for successful Master Data Management Contents Overview... 3 What is Master Data Management?... 3 Master Data Modeling Approaches...

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Solvency II Detailed guidance notes

Solvency II Detailed guidance notes Solvency II Detailed guidance notes March 2010 Section 1 - System of governance Section 1: System of Governance Overview This section outlines the Solvency II requirements for an effective system of governance,

More information

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:

More information

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists Incident ITSM Maturity Model 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident process exists Incident policies governing incident Incident urgency, impact and priority

More information

IMPLEMENTATION FRAMEWORK

IMPLEMENTATION FRAMEWORK IMPLEMENTATION FRAMEWORK Credit unions not members of a federation, trust companies and savings companies wishing to adopt a standardized approach for calculating operational risk capital charges January

More information

ORACLE HYPERION DATA RELATIONSHIP MANAGEMENT

ORACLE HYPERION DATA RELATIONSHIP MANAGEMENT Oracle Fusion editions of Oracle's Hyperion performance management products are currently available only on Microsoft Windows server platforms. The following is intended to outline our general product

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

Basel Committee on Banking Supervision. Review of the Principles for the Sound Management of Operational Risk

Basel Committee on Banking Supervision. Review of the Principles for the Sound Management of Operational Risk Basel Committee on Banking Supervision Review of the Principles for the Sound Management of Operational Risk 6 October 2014 This publication is available on the BIS website (www.bis.org). Bank for International

More information

Data Quality Assessment. Approach

Data Quality Assessment. Approach Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source

More information

Prudential Practice Guide

Prudential Practice Guide Prudential Practice Guide SPG 220 Risk Management July 2013 www.apra.gov.au Australian Prudential Regulation Authority Disclaimer and copyright This prudential practice guide is not legal advice and users

More information

<workers> Online Claims and Injury Management

<workers> Online Claims and Injury Management Global Resources... Local Knowledge With over 30 years experience in workers compensation, our claims management systems have been adopted by Self-Insured Organisations, Third Party Administrators and

More information

Using Assurance Models in IT Audit Engagements

Using Assurance Models in IT Audit Engagements Using Assurance Models in IT Audit Engagements Adrian Baldwin, Yolanta Beres, Simon Shiu Trusted Systems Laboratory HP Laboratories Bristol HPL-2006-148R1 January 29, 2008* audit, assurance, compliance,

More information

<risk> Enterprise Risk Management

<risk> Enterprise Risk Management Global Resources... Local Knowledge is vital in supporting business continuity across diverse and challenging environments and operating models. By consolidating risk management activities into a single,

More information

Creating a compliant data management framework: the regulatory perspective

Creating a compliant data management framework: the regulatory perspective Creating a compliant data management framework: the regulatory perspective Paolo Cadoni EIOPA Internal Model Committee Chair Life & Pension Risk Nordics - Stockholm, 15 th May 2012 Outline The importance

More information

Technology Risk Management

Technology Risk Management 1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore 2 MAS Supervisory Framework Impact

More information

Patterns of Information Management

Patterns of Information Management PATTERNS OF MANAGEMENT Patterns of Information Management Making the right choices for your organization s information Summary of Patterns Mandy Chessell and Harald Smith Copyright 2011, 2012 by Mandy

More information

Audit of NSERC Award Management Information System

Audit of NSERC Award Management Information System Internal Audit Audit Report Audit of NSERC Award Management Information System TABLE OF CONTENTS 1. EXECUTIVE SUMMARY... 2 2. INTRODUCTION... 3 3. AUDIT FINDINGS- BUSINESS PROCESS CONTROLS... 5 4. AUDIT

More information

WHO WE ARE 3/31/2016. Philip Chukwuma, CTO, Securely Yours LLC Jayne Suess, Senior Security Analyst, Erie Insurance

WHO WE ARE 3/31/2016. Philip Chukwuma, CTO, Securely Yours LLC Jayne Suess, Senior Security Analyst, Erie Insurance 3/31/2016 Philip Chukwuma, CTO, Securely Yours LLC Jayne Suess, Senior Security Analyst, Erie Insurance WHO WE ARE Philip Chukwuma CTO, Securely Yours, LLC philipchukwuma@securelyyoursllc.com Jayne Suess

More information

19/10/2012. How do you monitor. (...And why should you?) CAS Annual Meeting - Henry Jupe

19/10/2012. How do you monitor. (...And why should you?) CAS Annual Meeting - Henry Jupe www.pwc.com How do you monitor data quality? (...And why should you?) CAS Annual Meeting - November 2012 Henry Jupe Antitrust notice The Casualty Actuarial Society is committed to adhering strictly to

More information

The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements.

The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision of resources to support service requirements. CAPACITY AND AVAILABILITY MANAGEMENT A Project Management Process Area at Maturity Level 3 Purpose The purpose of Capacity and Availability Management (CAM) is to plan and monitor the effective provision

More information

Product Financial Control Solutions Spreadsheet Workbench

Product Financial Control Solutions Spreadsheet Workbench Product Financial Control Solutions Spreadsheet Workbench Supporting Financial Transformation Through Increased Efficiency, Risk Mitigation and Control Product In many respects spreadsheets represent the

More information

RSA ARCHER OPERATIONAL RISK MANAGEMENT

RSA ARCHER OPERATIONAL RISK MANAGEMENT RSA ARCHER OPERATIONAL RISK MANAGEMENT 87% of organizations surveyed have seen the volume and complexity of risks increase over the past five years. Another 20% of these organizations have seen the volume

More information

Best Value toolkit: Information management

Best Value toolkit: Information management Best Value toolkit: Information management Prepared by Audit Scotland July 2010 Contents Introduction 2 The Audit of Best Value 2 The Best Value toolkits 4 Using the toolkits 4 Auditors evaluations 5 Best

More information

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug

More information

50238: Introduction to SQL Server 2008 Administration

50238: Introduction to SQL Server 2008 Administration 50238: Introduction to SQL Server 2008 Administration 5 days Course Description This five-day instructor-led course provides students with the knowledge and skills to administer SQL Server 2008. The course

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

Making Business Intelligence Easy. White Paper Spreadsheet reporting within a BI framework

Making Business Intelligence Easy. White Paper Spreadsheet reporting within a BI framework Making Business Intelligence Easy White Paper Spreadsheet reporting within a BI framework Contents Overview...4 What is spreadsheet reporting and why does it exist?...5 Risks and issues with spreadsheets

More information

Polish Financial Supervision Authority. Guidelines

Polish Financial Supervision Authority. Guidelines Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents

More information

For more information about UC4 products please visit www.uc4.com. Automation Within, Around, and Beyond Oracle E-Business Suite

For more information about UC4 products please visit www.uc4.com. Automation Within, Around, and Beyond Oracle E-Business Suite For more information about UC4 products please visit www.uc4.com Automation Within, Around, and Beyond Oracle E-Business Suite Content Executive Summary...3 Opportunities for Enhancement: Automation Within,

More information

EIOPACP 13/011. Guidelines on PreApplication of Internal Models

EIOPACP 13/011. Guidelines on PreApplication of Internal Models EIOPACP 13/011 Guidelines on PreApplication of Internal Models EIOPA Westhafen Tower, Westhafenplatz 1 60327 Frankfurt Germany Tel. + 49 6995111920; Fax. + 49 6995111919; site: www.eiopa.europa.eu Guidelines

More information

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff

Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business

More information

Service Integration &

Service Integration & This is a DRAFT document, being published for review & comment The content is therefore subject to change & revision This document is part of the XGOV Strategic SIAM reference set Service Integration &

More information

RISK MANAGEMENT AND COMPLIANCE

RISK MANAGEMENT AND COMPLIANCE RISK MANAGEMENT AND COMPLIANCE Contents 1. Risk management system... 2 1.1 Legislation... 2 1.2 Guidance... 3 1.3 Risk management policy... 4 1.4 Risk management process... 4 1.5 Risk register... 8 1.6

More information

The PNC Financial Services Group, Inc. Business Continuity Program

The PNC Financial Services Group, Inc. Business Continuity Program The PNC Financial Services Group, Inc. Business Continuity Program subsidiaries) 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis

More information

The Requirements Compliance Matrix columns are defined as follows:

The Requirements Compliance Matrix columns are defined as follows: 1 DETAILED REQUIREMENTS AND REQUIREMENTS COMPLIANCE The following s Compliance Matrices present the detailed requirements for the P&I System. Completion of all matrices is required; proposals submitted

More information

Data Management Implementation Plan

Data Management Implementation Plan Appendix 8.H Data Management Implementation Plan Prepared by Vikram Vyas CRESP-Amchitka Data Management Component 1. INTRODUCTION... 2 1.1. OBJECTIVES AND SCOPE... 2 2. DATA REPORTING CONVENTIONS... 2

More information

Administering Microsoft SQL Server Databases MOC 20462

Administering Microsoft SQL Server Databases MOC 20462 Administering Microsoft SQL Server Databases MOC 20462 Course Outline Module 1: Installing SQL Server 2014 This module introduces the SQL Server 2014 platform. It describes the components, editions, and

More information

Continuous Monitoring: Match Your Business Needs with the Right Technique

Continuous Monitoring: Match Your Business Needs with the Right Technique Continuous Monitoring: Match Your Business Needs with the Right Technique Jamie Levitt, Ron Risinger, September 11, 2012 Agenda 1. Introduction 2. Challenge 3. Continuous Monitoring 4. SAP s Continuous

More information

Basic Securities Reconciliation for the Buy Side

Basic Securities Reconciliation for the Buy Side Basic Securities Reconciliation for the Buy Side INTRODUCTION This paper focuses on the operational control requirements of a buy-side securities trading firm with particular reference to post trade reconciliation.

More information

MS 20462 Administering Microsoft SQL Server Databases

MS 20462 Administering Microsoft SQL Server Databases MS 20462 Administering Microsoft SQL Server Databases Description: Days: 5 Prerequisites: This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL

More information

Validating Third Party Software Erica M. Torres, CRCM

Validating Third Party Software Erica M. Torres, CRCM Validating Third Party Software Erica M. Torres, CRCM Michigan Bankers Association Risk Management & Compliance Institute September 29, 2014 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT

More information

ENTERPRISE RISK MANAGEMENT FRAMEWORK

ENTERPRISE RISK MANAGEMENT FRAMEWORK ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...

More information

360 perspective of EUC/Spreadsheet Management and Control for Solvency II

360 perspective of EUC/Spreadsheet Management and Control for Solvency II Presents 360 perspective of EUC/Spreadsheet Management and Control for Solvency II 40 Bank Street, 30 th Floor Canary Wharf, London www.solvency2compliance.co.uk Introductions Andrew Jones Program Manager

More information

Fortune 500 Medical Devices Company Addresses Unique Device Identification

Fortune 500 Medical Devices Company Addresses Unique Device Identification Fortune 500 Medical Devices Company Addresses Unique Device Identification New FDA regulation was driver for new data governance and technology strategies that could be leveraged for enterprise-wide benefit

More information

INTEGRATING RECORDS MANAGEMENT

INTEGRATING RECORDS MANAGEMENT INTERNATIONAL RECORDS MANAGEMENT TRUST INTEGRATING RECORDS MANAGEMENT IN ICT SYSTEMS Good Practice Indicators CONTENTS Figure 1: Designing a Records Management Improvement Programme iv Figure 2: Integrating

More information

Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September 2008. Version: 1.

Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September 2008. Version: 1. Implementing a CMS First Steps A Case Study by, National Australia Group September 2008 Introduction...1 Spreadsheet Cells and Brain Cells...1 The Goal...2 Stage 1 Planning...2 Sponsorship...2 The Scope...2

More information

Service Portfolio Management PinkVERIFY

Service Portfolio Management PinkVERIFY -11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to

More information

MSD Supply Chain Programme Strategy Workshop

MSD Supply Chain Programme Strategy Workshop MSD Supply Chain Programme Strategy Workshop Day 2 APPENDIX Accenture Development Partnerships Benchmarking MSD s Current Operating Supply Chain Capability 1.0 Planning 2.0 Procurement 3.0 Delivery 4.0

More information

Operationalizing Data Governance through Data Policy Management

Operationalizing Data Governance through Data Policy Management Operationalizing Data Governance through Data Policy Management Prepared for alido by: David Loshin nowledge Integrity, Inc. June, 2010 2010 nowledge Integrity, Inc. Page 1 Introduction The increasing

More information

Manage Compliance with External Requirements

Manage Compliance with External Requirements Manage Compliance with External Requirements Description IT is subject to requirements that are highly complex and constantly changing. The school jurisdiction s senior leadership is ultimately accountable

More information

MHRA GMP Data Integrity Definitions and Guidance for Industry March 2015

MHRA GMP Data Integrity Definitions and Guidance for Industry March 2015 MHRA GMP Data Integrity Definitions and Guidance for Industry Introduction: Data integrity is fundamental in a pharmaceutical quality system which ensures that medicines are of the required quality. This

More information

Resource Advisor OVERVIEW

Resource Advisor OVERVIEW Resource Advisor OVERVIEW Resource Advisor Features Customize Site Dashboards Localized Preferences Meter Integration Data Entry Flexibility Manage Project Management Goal Setting & Forecasting Scenario

More information

SIEM Implementation Approach Discussion. April 2012

SIEM Implementation Approach Discussion. April 2012 SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual

More information

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya

Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data

More information

Operations. Group Standard. Business Operations process forms the core of all our business activities

Operations. Group Standard. Business Operations process forms the core of all our business activities Standard Operations Business Operations process forms the core of all our business activities SMS-GS-O1 Operations December 2014 v1.1 Serco Public Document Details Document Details erence SMS GS-O1: Operations

More information

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec Improving Unstructured Data Governance Ryan Jancaitis Product Management Symantec Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance Summary Unstructured Information Growth Leads to

More information

A blueprint for an Enterprise Information Security Assurance System. Acuity Risk Management LLP

A blueprint for an Enterprise Information Security Assurance System. Acuity Risk Management LLP A blueprint for an Enterprise Information Security Assurance System Acuity Risk Management LLP Introduction The value of information as a business asset continues to grow and with it the need for effective

More information

Data Warehouse (DW) Maturity Assessment Questionnaire

Data Warehouse (DW) Maturity Assessment Questionnaire Data Warehouse (DW) Maturity Assessment Questionnaire Catalina Sacu - csacu@students.cs.uu.nl Marco Spruit m.r.spruit@cs.uu.nl Frank Habers fhabers@inergy.nl September, 2010 Technical Report UU-CS-2010-021

More information

RECORDKEEPING MATURITY MODEL

RECORDKEEPING MATURITY MODEL Introduction Maturity Rating Definitions 1 Level 1 Inadequate/Sub-standard Practice is not formalised or documented. Processes and practices are fragmented or non-existent. Where processes and practices

More information

Welcome to Metafile. Solving document issues for over 30 years. Matt Akin msa@metafile.com 800-638-2445 x 301

Welcome to Metafile. Solving document issues for over 30 years. Matt Akin msa@metafile.com 800-638-2445 x 301 Welcome to Metafile Solving document issues for over 30 years Matt Akin msa@metafile.com 800-638-2445 x 301 Janine Peck jgp@metafile.com 800-638-2445 x 303 Metafile helps many companies with their AP,

More information

Course 20462C: Administering Microsoft SQL Server Databases

Course 20462C: Administering Microsoft SQL Server Databases Course 20462C: Administering Microsoft SQL Server Databases Duration: 35 hours About this Course The course focuses on teaching individuals how to use SQL Server 2014 product features and tools related

More information

Internal controls Guidance for trustees

Internal controls Guidance for trustees Regulatory code of practice no. 9 Internal controls Guidance for trustees Contents Paragraph Page 1 Introduction 3 5 The status of codes of practice 3 6 Other regulatory requirements 3 7 Terminology 4

More information

POLICY. Number: 7311-10-005 Title: Enterprise Risk Management. Authorization

POLICY. Number: 7311-10-005 Title: Enterprise Risk Management. Authorization POLICY Number: 7311-10-005 Title: Enterprise Risk Management Authorization [ ] President and CEO [ X] Vice President, Finance and Corporate Services Source: Director, Enterprise Risk Management Cross Index:

More information

Three Fundamental Techniques To Maximize the Value of Your Enterprise Data

Three Fundamental Techniques To Maximize the Value of Your Enterprise Data Three Fundamental Techniques To Maximize the Value of Your Enterprise Data Prepared for Talend by: David Loshin Knowledge Integrity, Inc. October, 2010 2010 Knowledge Integrity, Inc. 1 Introduction Organizations

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

MOC 20462 Administering Microsoft SQL Server 2014 Databases

MOC 20462 Administering Microsoft SQL Server 2014 Databases To register or for more information call our office (208) 898-9036 or email register@leapfoxlearning.com MOC 20462 Administering Microsoft SQL Server 2014 Databases Class Duration 5 Days Class Overview

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

Master Data Management Decisions Made by the Data Governance Organization. A Whitepaper by First San Francisco Partners

Master Data Management Decisions Made by the Data Governance Organization. A Whitepaper by First San Francisco Partners Master Data Management Decisions Made by the Data Governance Organization A Whitepaper by First San Francisco Partners Master Data Management Decisions Made by the Data Governance Organization Master data

More information

AV-005: Administering and Implementing a Data Warehouse with SQL Server 2014

AV-005: Administering and Implementing a Data Warehouse with SQL Server 2014 AV-005: Administering and Implementing a Data Warehouse with SQL Server 2014 Career Details Duration 105 hours Prerequisites This career requires that you meet the following prerequisites: Working knowledge

More information

Integrated Stress Testing

Integrated Stress Testing Risk & Compliance the way we see it Integrated Stress Testing A Practical Approach Contents 1 Introduction 3 2 Stress Testing Framework 4 3 Data Management 6 3.1 Data Quality 6 4 Governance 7 4.1 Scenarios,

More information

IT Governance. What is it and how to audit it. 21 April 2009

IT Governance. What is it and how to audit it. 21 April 2009 What is it and how to audit it 21 April 2009 Agenda Can you define What are the key objectives of How should be structured Roles and responsibilities Key challenges and barriers Auditing Scope Test procedures

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information