College of Medicine - Phoenix: Controls over Business Operations and Building/Data Security

Size: px
Start display at page:

Download "College of Medicine - Phoenix: Controls over Business Operations and Building/Data Security"

Transcription

1 Internal Audit of College of Medicine - Phoenix: Controls over Business Operations and Building/Data Security October 2010 FY10 - #13 Submitted to: College of Medicine Phoenix Stuart D. Flynn, Dean Gail P. Barker, Special Assistant to the Dean Howard D. Silverman, Associate Dean, Information Resources and Educational Technology Nancy H. Tierney, Associate Dean, Planning and Facilities Judith M. Apostolik, Director, Financial Affairs Patricia L. Knox, Manager, Campus Operations Marshall J. MacFarlane, Coordinator, Facilities Management Copies to: Audit Committee, Arizona Board of Regents Robert N. Shelton, President Meredith Hay, Executive Vice President and Provost Robert R. Smith, Interim Senior Vice President for Business Affairs William M. Crist, Vice President, Health Affairs Administration B. Glenn George, Vice President, Legal Affairs and General Counsel Jacqueline L. Mok, Vice President and Chief of Staff, President s Office Charles E. Ingram, Associate Vice President, Financial Services Office Michele L. Norin, Chief Information Officer Issued by: Sara J. Click, CPA, Chief Auditor Internal Audit Department

2 Summary This is our first audit of building/data security and internal controls over business operations at the College of Medicine Phoenix, and it was included in the approved Fiscal Year ( FY ) 2009 and 2010 Audit Plans. As part of its Strategic Plan, The University of Arizona is leading the development of the Phoenix Biomedical Campus, which includes the College of Medicine Phoenix, to expand clinical services and increase the number of health professionals to meet the needs of the population of the state of Arizona. Absent good controls, there is the risk of inappropriate access to University buildings/rooms by unauthorized individuals resulting in the theft of assets, physical harm to persons or property, or disruption of University operations. Additionally, with its remote location from the main campus, there is the risk that university policies and procedures may not be properly or consistently applied. Background: According to the website ( The University of Arizona ( UA ) College of Medicine Phoenix is a full, four-year program that was dedicated in October It is an expansion to downtown Phoenix of the UA College of Medicine program begun in 1992, which offered third and fourth year medical students the opportunity to complete their training at Phoenix-area hospitals. Initially, the College of Medicine ( COM ) Phoenix was a partnership between UA and Arizona State University ( ASU ); however, ASU withdrew from the partnership in April The Phoenix program is located in three renovated historic buildings on the Phoenix Biomedical Campus ( PBC ) in downtown Phoenix. A fourth building, Arizona Biomedical Collaborative ( ABC ), houses the Department of Basic Medical Sciences and the Arizona State University Department of Biomedical Informatics. Additional PBC buildings are planned including the Health Sciences Education Building, Vivarium Phase I, and Arizona Cancer Center Phoenix. There are approximately 450 regular campus users, e.g., students, employees, and faculty, at the COM Phoenix. The inaugural class of 24 students will be graduating in May Currently, COM Phoenix business operations, building access, and information technology functions housed at the Phoenix campus ultimately report to the COM Phoenix Dean. The Associate Dean for Information Resources and Educational Technology has other responsibilities in addition to information technology. The University of Arizona Page 1 of 17 October 2010

3 Amer-X Security Inc., the UA s authorized sole source provider of electronic access management services and equipment, provides building electronic access management services and equipment for PBC. Audit Objectives: Our audit objectives were to determine whether: access to University buildings/rooms is controlled, data is secured in accordance with applicable policies and procedures, and the internal control structure in place is adequate to ensure that financial transactions are supported, authorized, and safeguard University assets. Scope: The scope of the audit was FY Our work on building/room access focused on the PBC access card ( PBC card ), because the electronic key is required to access building perimeter doors. Existing internal controls over selected types of financial transactions (e.g., cash handling and receiving, petty cash, payroll processing, purchasing card transactions) were evaluated, as well as management reports, effort reporting, and conflict of interest. Methodology: We accomplished our audit objectives through: discussions and/or correspondence with COM Phoenix representatives, including the Dean s Office, Campus Operations, Facilities Management, Information Resources, Financial Affairs, and Basic Medical Sciences; discussions and correspondence with University of Arizona main campus representatives from COM - Administration and Information Technology Services; University Information Technology Services Chief Information Officer and Information Security Office; Facilities Management; Procurement and Contracting Services Contracting and PCard Administration; University of Arizona Police Department; Risk Management and Safety; Sponsored Projects Services; Parking and Transportation Services; University of Arizona Bookstores; and Financial Services Office Tax Compliance, Bursar: Banking Services/Bursar Representatives and UA CatCard Office, Financial Management: Cash & Clearing, Financial Compliance, Operating Funds, and Payroll Operations; meeting with third party vendor Amer-X Security Inc. senior management; onsite visit on February 18, 2009 to observe PBC on-site building access procedures, Information Technology ( IT ) processes, and Amer-X controls; use of Audit Command Language ( ACL ) data mining software for assistance in identifying a random sample of 25 issued PBC cards for detailed review; The University of Arizona Page 2 of 17 October 2010

4 review of documentation in support of building access processes, information systems backup procedures and other IT-related documentation, and selected financial transactions; review of applicable University policies and procedures; and review of Departmental Responsibility Assignments Review matrices ( matrix ) that selected COM-Phoenix departments were requested to complete. The matrix was developed by Internal Audit based on University policies to identify responsible employees for business processes. Conclusion: Overall, we found that the existing internal control structure is adequate to ensure that financial transactions are supported, authorized, and safeguard University assets; however, controls related to University building access and data security are not adequate and require improvement. Some of the opportunities for improvement, e.g., building access card, resulted from the manner in which the College of Medicine Phoenix partnership was originally set-up, that is, a less-secure PBC card was agreed upon as a compromise between UA and ASU. Information technology is considered high risk. The current structure, wherein the person responsible for campus information technology has other non-it responsibilities, may have been acceptable for the initial campus structure. However, as the Phoenix campus expands, a dedicated, full-time director of information technology will be required to effectively manage this high risk area. We found that employees responsible for building access, information technology, and financial affairs were receptive for suggestions to improve processes/controls and took action to improve controls and obtain necessary training. Management is supportive of our recommendations and has actively begun the process of implementing their identified action plan items. According to the Institute for Internal Auditors International Professional Practices Framework, an organization is expected to establish and maintain effective risk management and control processes. These control processes are expected to ensure, among other things, that: financial and operational information is reliable and possesses integrity, operations are performed efficiently and achieve established objectives, assets are safeguarded, and actions and decisions of the organization are in compliance with laws, regulations, and contracts. The University of Arizona Page 3 of 17 October 2010

5 General Control Objectives Control Environment Recommendation Reliability and Integrity of Financial and Operational Information Controls over payroll processing, cash handling and receiving, purchasing card transactions, petty cash fund expenditures, and effort reporting were adequate to ensure accurate reporting. Effectiveness and Efficiency of Operations Monthly financial reports were provided to management. PBC card issuance processes and controls were adequate. Safeguarding of Assets Reasonable to Strong Controls in Place Reasonable to Strong Controls in Place Opportunity for Improvement No Page Checks and cash were adequately safeguarded prior to deposit. Reasonable to Strong Controls in Place Petty cash funds were adequately safeguarded. Reasonable to Strong Controls in Place Physical access controls are adequate. Opportunity for Improvement Access to server room and backup data Opportunity for tapes are restricted to authorized Improvement persons. Compliance with Laws and Regulations Compliance with UA policies and procedures regarding payroll processing, cash handling and receiving, effort reporting, conflict of interest, and petty cash. Compliance with UA PCard Policies pertaining to service/tax exempt purchases and assessment of use tax. Compliance with UA Information Security standards, procedures, and industry best practices. Reasonable to Strong Controls in Place Opportunity for Improvement Opportunity for Improvement 2,3,4 9,11, ,4 5,13 We appreciate the assistance of UA staff during the audit. /s/ Kurt M. Weirich, CIA, CISA Auditor-In-Charge (520) weirichk@arizona.edu /s/ Sara J. Click, CPA Chief Auditor (520) clicks@arizona.edu The University of Arizona Page 4 of 17 October 2010

6 Audit Results, Recommendations and Responses 1. Information Technology Issues Condition: The following logical and physical control weaknesses were identified. Lack of Required Documentation Roles and responsibilities are not clearly defined or documented for PBC IT functions, e.g. server maintenance duties. PBC IT network and data flow diagrams have not been documented. PBC IT data backup written procedures have not been documented. Completed documentation for the PBC 2008 Personal Information Sweep, due December 31, 2008, was received by the University Information Security Office in the fall of Unauthorized Access A total of 128 issued metal keys permit access to the server room located in Building 1. Some of the metal keys have been issued to Tucson Facilities Management personnel who would not routinely require access to the server room. A PBC card reader has not been installed on the inner server room door. A visitor log has not been created for server room visitors. PBC IT staff does not know how many individuals have access via metal key to the storage room containing the backup data tapes. The backup tape storage room is located in the ABC building, a different building than the server room. PBC IT staff does not have metal key access to this room. A total of 42 individuals have electronic access to the storage room that contains the backup data tapes. Of these, 28 (67%) have no business need for access. Other Issues There is no inventory listing of the backup data tapes located in the storage room. Environmental monitoring remote notification software 1 is currently installed; however it is not utilized. 1 Environmental monitoring software continuously monitors server room temperatures and humidity levels required for server hardware to operate effectively. The software provides automatic notification to IT personnel via telephone or when critical operating temperatures or humidity thresholds are exceeded in the server room. The University of Arizona Page 5 of 17 October 2010

7 Criteria: University of Arizona Information Security Office Business Continuity and Disaster Recovery, IS-S900, states, University units must establish procedures and policies for backup and recovery of the units data. IT Governance Institute Information Security Audit and Control Association ( ISACA ), Control Objectives for Information and Related Technology (CobiT 4.1) states, Establish and maintain an enterprise information model to enable application development and decision-supporting activities consistent with IT plans. Establish and communicate roles and responsibilities for IT personnel. University of Arizona Office of Information Security, Personal Information Sweep, IS- P301, states, UA personnel are responsible for the security of UA information stored, sent or displayed using computing resources and communications resources, whether or not those resources are owned by the University. If you work with personal information, you must be aware of and comply with applicable legal requirements and policies. Vice Presidents, Deans, Directors, Department Heads and Heads of Centers have ultimate responsibility for computing resources, including personal information, and for their units compliance with legal requirements and policies. Office of the President, Personal Information Sweep, Memorandum, states, I ask all personnel who use computerized UA information to complete the Personal Information Sweep between October 1 and December 31, University of Arizona Office of Information Security, Data Facility Physical Security, IS-S501, states, Access control procedures must be in place to reasonably ensure that only authorized personnel have access to a data facility. Cause: The Associate Dean for Information Resources and Educational Technology advised the auditor that the Chief Information Officer at the COM Tucson would be developing and documenting PBC IT network and data flow diagrams, and data backup written procedures, and that he has requested this information numerous times from the Chief Information Officer. However, the Chief Information Officer is not located in Phoenix and may not be aware of their processes. The Chief Information Officer advised the auditor that he does not have knowledge of PBC IT data flows and is therefore unable to complete the Phoenix IT diagrams. Additionally, there is no reporting relationship between the Associate Dean for Information Resources and Educational Technology and the Chief Information Officer. When the information was not provided, the Associate Dean for Information Resources and Educational Technology did not follow-up and/or take ownership of tasks for which he was responsible. The University of Arizona Page 6 of 17 October 2010

8 The Facilities Management Lock Shop Manager, who is located in Tucson, advised the auditor that the Lock Shop was unaware that this was a server room; thus, the Lock Shop had not performed a special server room doors and locks review. Effect: Absent written procedures appropriately implemented and monitored, employees may leave with institutional knowledge, which could lead to delays or errors by new employees. Unauthorized individuals could have access to the server room and backup data tapes. Backup data may not be available or accessible if needed. Recommendations: 1. Document PBC IT roles and responsibilities, network and data flow diagrams, and backup data procedures; then, communicate in writing to COM personnel. 2. Complete the Lock Shop special server room review; change server room metal locks; provide metal key to PBC IT staff; install an electronic PBC card reader on the inner server room door. Periodically, review physical access (via both metal and electronic keys) to the server room and the storage room containing the backup data tapes; once identified, remove unnecessary access. 3. Create and utilize a visitor log for the server room; monitor for compliance. 4. Inventory backup data tapes. 5. Utilize the remote notification environmental control software feature and monitor environmental conditions in the server room. Management Responses: 1. Target Implementation Date: December 31, IT roles and responsibilities have been discussed over the years with the Dean COM Phoenix, the Vice President Health Affairs Administration and the COM PBC Associate Dean for Information Resources and Educational Technology during several meetings conducted in February 2009 through April The COM PBC Associate Dean for Information Resources and Educational Technology met with the University Chief Information Officer to discuss IT services coordination during February This topic was the focus of considerable work in Tucson utilizing a consultant (Vantage) during May 2007; however, this consultation did not include discussion of Tucson-Phoenix roles and responsibilities. Conversations about analysis and planning server responsibilities have been ongoing for the past two years. We have defined a planning process and a group including Phoenix and Tucson COM staff. The University of Arizona Page 7 of 17 October 2010

9 COM IT Tucson staff provided some verbal guidance to PBC IT staff during telephone discussions from late November 2009 through February 2010 regarding IT data backup processes. By December 31, 2010, PBC Associate Dean for Information Resources and Educational Technology will develop and document backup IT data procedures, IT Data Flows, and IT roles and responsibilities. 2. Implemented. A review of key access to server room was initiated in March 2010 and will be done on an annual basis. The server room was rekeyed in March 2010 based upon recommendations received from the UA Lock Shop and access restricted. A quote was obtained in July 2010 to install a PBC access card reader on the server room inner door and the PBC Safety Committee reviewed the quote in August A decision was made not to install the inner server room card reader because of the improved physical access controls; the outer server room door locks have been changed and access restricted to individuals who require access; the building s perimeter doors are now kept locked and reviews of electronic access to the server room are now regularly performed by PBC IT management. The backup tape storage room was originally a storage room, and included a variety of assigned access levels. The access levels that were not needed for business purposes have since been removed. A metal key to the storage room was issued to PBC IT staff in March Implemented. A server room visitor log was created and implemented during March Implemented. A backup data tape inventory log was created on June 12, 2009 and periodic audits of the backup data tapes were started at that time by PBC IT staff. 5. Implemented. A phone line was installed in March 2010 for the remote notification software alarm to dial out to the Trane technician s 24/7 phone when the server room temperature or humidity level exceeds the operational threshold. Trane is the third-party heating, ventilation and air conditioning systems ( HVAC ) vendor contracted by PBC; their technician is located on-site at PBC. The University of Arizona Page 8 of 17 October 2010

10 2. Physical Building Access Condition: Weaknesses with current PBC building access processes could permit unauthorized access. These weaknesses are: Building 1 remains unlocked during normal business hours and the receptionist s location does not permit her to see who enters the building. Locked main entrance doors can be inadvertently opened when an individual inside the building approaches the door to see who is knocking; when approached from the inside, a motion detector automatically unlocks the doors. With the campus urban location, members of the general public frequently knock on the locked main entrance doors to gain entrance. On March 26, 2009, an Arizona Telemedicine Program ( ATP ) employee advised the auditor about incidents in which she was frightened, and fearful of her safety, by unauthorized individuals who were present in the locked building. Criteria: Good business practices include reviewing physical access controls on a regular basis. Cause: Building 1 is unlocked during the day to allow visitors to access the building. The Amer-X Security, Inc. Chief Executive Officer advised the auditor that the architect s design of the main entrance doors required an automated motion sensor to meet City of Phoenix building codes. Effect: Unauthorized individuals could gain access to University buildings placing staff, students, and visitors at risk of physical harm. Recommendation: Lock Building 1 during normal business hours; contact Risk Management and Safety and the University of Arizona Police Department ( UAPD ) to request a building security risk analysis to address staff concerns expressed regarding physical safety. The University of Arizona Page 9 of 17 October 2010

11 Management Responses: a. Implemented. The building is locked during normal business hours instituted on June 15, A Security Task Force, which includes UAPD and Risk Management, reviewed PBC security on-site in December b. Implemented. We have consulted with Amer-X Security, but options are limited at this time due to the design of the door and City of Phoenix Fire Code Requirements. We will continue to explore options. At the time of orientation, our students and employees are informed about the 7-second delay in the relocking of the doors. Door closers have been adjusted to close as fast as allowed by the Americans with Disabilities Act ( ADA ). This process was implemented in January c. Implemented. After the staff member reported the incidents to PBC management, panic buttons were provided to all three ATP staff on the third floor of Building 2. In addition, security staff have included the third floor of Building 2 on their security rounds. They visit the floor no less than twice daily. The employee stated she has currently no concerns about her physical safety since these measures have been put in place. These changes were implemented in December The University of Arizona Page 10 of 17 October 2010

12 3. Electronic Building Access Card Condition: The PBC card was created to provide electronic building access for PBC employees, students and vendors. This access process is different from the main UA campus in Tucson that utilizes the CatCard for electronic building access. The following weaknesses were identified with the PBC card: New PBC electronic access cards, produced by the CatCard Office, are delivered to an unsecured mail room; mail distribution duties are not assigned. PBC access cards utilize pre-programmed dumb prox chip technology that provides lower security capability than currently available smart chip (programmable) technology. The cardholder s photograph is not included on the electronic access card. Criteria: FRS Departmental Manual, Policy #8.10 states The department is responsible for the control of value added inventory, for example, UA CatCards, and photocopy cards. Cause: The auditor was advised by CatCard Office personnel that the decision to use non-programmable chips was a compromise between the University of Arizona and Arizona State University based upon cost considerations. Effect: Unauthorized individuals may gain access to buildings placing staff, students, and visitors at risk. Recommendations: 1. Secure mail room doors and ensure only authorized individuals have access; consider hand delivering electronic access cards to the appropriate personnel. 2. Contact the CatCard Office to discuss potential deployment of programmable chip card technology and displaying the cardholder s photograph. The University of Arizona Page 11 of 17 October 2010

13 Management Responses: 1. Implemented. Securing PBC mail room doors is hard to implement. This room also serves as the third floor Work Room. Virtually everyone on this floor, and in fact on this campus needs access to that room. We believe we can address this through administrative controls. The new administrative controls include producing PBC Cards at PBC starting in February 2010 and the cards are no longer distributed via the mail room effective February 2010, rather they are provided to employees in person. The perimeter doors of the building where the mail room is located are now kept locked as of June 15, 2009 and unauthorized individuals can no longer walk into the building without a PBC Card; and the PBC Facilities Management Coordinator s and the Campus Operations Manager s office location permits visual observation of mail room contents. 2. Implemented. PBC Cards are printed in-house beginning in February 2010 and are no longer sent from Tucson via courier. We keep stock for PBC Cards on hand and have a local supplier. All new cards currently include a photograph. The University Committee for the Coordinated Integration of Security Technologies is reviewing PBC Card technology and potential changes beginning on May 26, The University of Arizona Page 12 of 17 October 2010

14 4. Access Card Issuance Condition: The following weaknesses were identified with the electronic building access process: PBC building access reviews have not been conducted. Building access levels are not reviewed and/or modified, as necessary, when an employee s job responsibilities change. Required Phoenix Biomedical Campus Access Card Agreement form listing cardholder responsibilities, was not obtained for 8 (32%) of the 25 sampled cardholders. A total of 4 (16%) of the 25 sampled cardholders were terminated employees that still had active electronic building access cards. Standardized electronic building access templates have not been developed; supervisors determine electronic access levels on a case-by-case basis. Written procedures for issuing electronic building access cards to vendors have not been developed. Thus, vendors have been issued generic cards, e.g., cards assigned to the company as opposed to a specific individual, and multiple cards to a single individual. DSX System, the electronic access system, user passwords are not changed and do not have minimum password construction requirements. Criteria: The PBC Card Request Flowchart requires that individuals receiving PBC cards complete a PBC card acknowledgement form prior to card issuance. Good business practices include regularly reviewing logical access controls and obtaining required documentation to ensure cardholders acknowledge their responsibilities regarding electronic building/room access. University of Arizona Information Security Office, Password Construction and Maintenance, IS-G701, states, Users should construct a password/passphrase that meets the minimum following criteria: Passwords should ALWAYS contain: At least eight characters (but more is highly recommended). The recommended password/passphrase change interval is every 180 days. The University of Arizona Page 13 of 17 October 2010

15 Cause: PBC cards were distributed before the Phoenix Biomedical Campus Access Card Agreement forms were developed. As a new branch campus, PBC had not yet developed processes to identify terminated employees and deactivate their electronic building access, conduct access reviews, develop standardized access templates and issue cards to vendors. The DSX System does not have an automated system reminder to change the password and PBC staff were not aware of the requirement to change the password. Effect: Without a regular review of access levels, it is not possible to know if access levels are appropriate or if terminated employees have access. Thus, unauthorized individuals may have access to buildings placing staff, students, and visitors at risk. Recommendations: 1. Periodically review building/room access levels provided by PBC cards to ensure access is appropriate; remove access for terminated employees in a timely manner; create standard access templates; develop written access review procedures that include controls for change management and issuing cards to vendors and employees; obtain signed PBC access cardholder responsibilities documentation for all PBC current and future cardholders; monitor for compliance. 2. Change DSX System passwords every 180 days and construct passwords in accordance with University Information Security Office guidelines. The University of Arizona Page 14 of 17 October 2010

16 Management Responses: 1.a. Implemented. Beginning in July 1, 2009, annual Phoenix Biomedical Campus Access Card Agreement forms were sent to all cardholders with the original held in their personnel file and a copy sent to them for their records. This process was fully implemented in February b. Implemented. As of February 16, 2009, PBC card access for terminated employees is being removed within 2-3 days of notification from the department. 1.c. Implemented. The PBC Access Control Coordinator/PBC Management began a process in October 2009 to review PBC access levels on an annual basis. The review will include employee and student status and access levels assigned, current department, etc. The review is ongoing; several access levels have been eliminated, or combined with other levels. 1.d. Target Implementation Date: January The PBC Facilities Management Coordinator will implement an improved annual (minimum) review of PBC cardholders. All PBC access card holders will be required to complete a new Phoenix Biomedical Campus Access Card Agreement form and a more detailed review of access levels for active cardholders will be completed by the PBC Facilities Management Coordinator by the end of January This new access review process will be much more detailed than the prior access reviews that were started in October e. Target Implementation Date: December The PBC Facilities Management Coordinator will develop standardized access level templates. This has been a work-in progress since mid February We plan to complete standardization access level templates by December f. Implemented. Multiple cards issued to the same individual have only occurred with vendors in the past. This practice has ceased and we have completed updating our records in January Additionally, PBC access cards are currently issued in names only beginning in January 2010, not generic company names, and are currently the practice with most vendors. 1.g. Implemented. Beginning in March 2010, all cards are now requested through an online system. We follow the same procedure for vendor cards that we use for PBC card issuance for everyone else. We will document specific procedures for vendors. 2. Implemented. The password update process was initiated in April We will find out how to automate changing of DSX System passwords every 180 days and have set a reminder in Outlook, for now. The University of Arizona Page 15 of 17 October 2010

17 5. Use Tax Assessed on Purchasing Card ( PCard ) Transactions Condition: Controls over PCard purchases were adequate to ensure items purchased were valid business-related expenses. However, we found issues with use tax assessments on service and/or tax exempt purchases that resulted in unnecessary charges to departmental accounts. A total of $622 in use tax was unnecessarily assessed on 20 (35%) of the 57 sampled PCard purchases. Criteria: University of Arizona Purchasing Card Reconciliation/Approval Review Training Guide states, If the transaction was not charged tax by the vendor and the purchase was for a service or tax exempt item, check the service/tax exempt box PaymentNet protects users from being charged Use Tax in error by not assessing Use Tax if the vendor is from Arizona or if any of the following Object Codes are used Freight/Shipping and handling The list below identifies some types of purchases that are NOT assessed State Sales tax or Use Tax. They should be coded as service/tax exempt Airline Tickets...Transactions subject to Use Tax where the invoice includes freight charges must be split to break out the freight on a separate line. Freight charges should be coded with object code 5560 to prevent Use Tax from being charged on the freight portion of the invoice. Procurement and Contracting Services Tax Information states, Purchases that are exempt include equipment and chemicals used in research. Cause: PaymentNet reconcilers and/or approvers were unaware of the policy regarding service and/or tax exempt purchases and the requirement to check the Service/Tax Exempt button to prevent the unnecessary assessment of use tax. Effect: Noncompliance with University policy; use tax was unnecessarily assessed, and paid, from departmental accounts. The University of Arizona Page 16 of 17 October 2010

18 Recommendations: 1. Re-train PaymentNet reconcilers and approvers about the importance of correctly identifying service/tax exempt purchases in PaymentNet; monitor for compliance. 2. Management should evaluate whether prior use tax assessments should be reviewed and corrections made as necessary. The Financial Services Office ( FSO ) will permit use tax corrections to be made for three years the current fiscal year and the prior two fiscal years. Should management determine that use tax corrections should be made, Request for Accounting Assistance ( RFAA ) forms will need to be completed; contact FSO for assistance. Management Responses: 1. Implemented. The finance staff for COM Phoenix Administration and Basic Medical Sciences ( BMS ) had a training session on August 26, 2010 with the PCard Office and the FSO Tax Compliance Office to discuss the policies and procedures for not paying Use Tax on shipping/freight expenses on PCard charges. Additionally, the new BMS finance office staff who reconcile purchasing card transactions attended PCard Summer School on July 28, Implemented. With more than 10,000 PCard purchases within the last three years, management determined that it was more cost effective to prevent future payment of Use Tax instead of the time-consuming and costly process of looking at past transactions. The University of Arizona Page 17 of 17 October 2010

Depending on building design and layout, access points will operate in the following manner:

Depending on building design and layout, access points will operate in the following manner: Scope Electronic Access Guidelines AG-101 The scope of the keyless access upgrade project is to provide increased security and public safety by deploying electronic access controls, door status monitoring/security

More information

Audit Follow-up: Mobile Computing Security

Audit Follow-up: Mobile Computing Security Audit Follow-up: Mobile Computing Security September 2015 FY15 - #07 Submitted to: Michele L. Norin, Vice President for Information Technology and Chief Information Officer Derek A. Masseth, Senior Director,

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Department of Rehabilitation Report No. 14-15

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Department of Rehabilitation Report No. 14-15 THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES Report No. 14-15 OFFICE OF INTERNAL AUDITS THE UNIVERSITY OF TEXAS - PAN AMERICAN 1201 West University Drive Edinburg, Texas

More information

LEHMAN COLLEGE: DEPARTMENTAL RETENTION SCHEDULE 8/7/2014 INFORMATION TECHNOLOGY (IT)

LEHMAN COLLEGE: DEPARTMENTAL RETENTION SCHEDULE 8/7/2014 INFORMATION TECHNOLOGY (IT) IT-1 Contracts/ Software Licenses/ Use Agreements Legal agreements, including contracts, legal releases, software licenses, and use agreements involving the College or the University 6 years after expiration

More information

The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division

The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division WILLIAM C. THOMPSON, JR. Comptroller Follow-Up Report on the New York City Fire Department Arson Information

More information

The Commonwealth of Massachusetts

The Commonwealth of Massachusetts A. JOSEPH DeNUCCI AUDITOR The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 BOSTON, MASSACHUSETTS 02108 TEL. (617) 727-6200 No. 2008-1308-4T OFFICE OF THE STATE

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Department of Environmental Health & Safety

Department of Environmental Health & Safety THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES Report No. 14-05 OFFICE OF INTERNAL AUDITS THE UNIVERSITY OF TEXAS - PAN AMERICAN 1201 West University Drive Edinburg, Texas

More information

Affiliation Agreement with Eller Executive Education

Affiliation Agreement with Eller Executive Education December 2014 FY14 - #13 Submitted to: Andrew C. Comrie, Senior Vice President for Academic Affairs and Provost Melissa Vito, Senior Vice President, Student Affairs and Enrollment Management, and Senior

More information

COLORADO SCHOOL OF MINES. Procurement Card Program

COLORADO SCHOOL OF MINES. Procurement Card Program COLORADO SCHOOL OF MINES Procurement Card Program Who Can Have a P-Card Faculty and staff Graduate Students with a stipulated contract start and end date Other Persons of Interest All users must be approved

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

Sample audit Data Center - A Topical Overview

Sample audit Data Center - A Topical Overview LEGISLATIVE AUDIT DIVISION Scott A. Seacat, Legislative Auditor Tori Hunthausen, Chief Deputy Legislative Auditor Deputy Legislative Auditors: James Gillett Angie Grove MEMORANDUM TO: CC: FROM: DATE: June

More information

University System of Maryland University of Baltimore

University System of Maryland University of Baltimore Audit Report University System of Maryland University of Baltimore May 2005 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up

More information

Overall Conclusion. Summary of Significant Results. Patient Billings and Collections at the Family Medicine Clinic

Overall Conclusion. Summary of Significant Results. Patient Billings and Collections at the Family Medicine Clinic Overall Conclusion The Texas A&M Health Science Center s patient billing and collection processes at the College of Medicine s Family Medicine Clinic in College Station do not provide reasonable assurance

More information

MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE

MANAGEMENT AUDIT REPORT ACCOUNTS PAYABLE MANAGEMENT AUDIT REPORT OF ACCOUNTS PAYABLE REPORT NO. 04-108 CITY OF ALBUQUERQUE OFFICE OF INTERNAL AUDIT AND INVESTIGATIONS of Accounts Payable Report No. 04-108 Executive Summary Background The Department

More information

Security, Access Management and Key Control Policy and Procedures

Security, Access Management and Key Control Policy and Procedures 1 Policy Security, Access Management and Key Control Policy 1.1.1 The goal of the Vice President, Business Affairs and Facilities and Services is to provide a safe, comfortable, secure learning environment

More information

PITT. Community College PROCUREMENT CARD POLICY PROCEDURES

PITT. Community College PROCUREMENT CARD POLICY PROCEDURES PITT Community College PROCUREMENT CARD POLICY & PROCEDURES PCC Purchasing & Contracts Office 2064 Warren Drive Facility Service Complex Winterville, NC 28590 Phone (252) 493-7279 / Fax (252) 321-4214

More information

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014 The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local

More information

Internal Control Guide & Resources

Internal Control Guide & Resources Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

Eugene Smith Executive Director of Athletics Department of Intercollegiate Athletics Arizona State University Box 872505 Tempe, AZ 85287-2505

Eugene Smith Executive Director of Athletics Department of Intercollegiate Athletics Arizona State University Box 872505 Tempe, AZ 85287-2505 January 16, 2003 Eugene Smith Executive Director of Athletics Department of Intercollegiate Athletics Arizona State University Box 872505 Tempe, AZ 85287-2505 Dear Mr. Smith: In accordance with National

More information

Office of Internal Audit

Office of Internal Audit Internal Audit Taylor Health and Wellness Center - Pharmacy October 17, 2014 Office of Internal Audit Report No. 108-15 DATE: October 17, 2014 TO: FROM: CC: RE: Dr. Frederick D. Muegge, Director of Health

More information

City of Berkeley. Prepared by:

City of Berkeley. Prepared by: City of Berkeley Berkeley Public Library Purchasing and Accounts Payable Audit Prepared by: Ann-Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit Manager, CIA, CGAP Frank Marietti, Senior

More information

Auditing in an Automated Environment: Appendix C: Computer Operations

Auditing in an Automated Environment: Appendix C: Computer Operations Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations

More information

THE EVERGREEN STATE COLLEGE

THE EVERGREEN STATE COLLEGE The Evergreen State College Procurement Card Guide JP Morgan Chase VISA THE EVERGREEN STATE COLLEGE PROCUREMENT CARD HANDBOOK For Cardholders & Authorized Users Card Custodians Approving Officials Rev

More information

FASHION INSTITUTE OF TECHNOLOGY SELECTED FINANCIAL MANAGEMENT PRACTICES. Report 2006-S-71 OFFICE OF THE NEW YORK STATE COMPTROLLER

FASHION INSTITUTE OF TECHNOLOGY SELECTED FINANCIAL MANAGEMENT PRACTICES. Report 2006-S-71 OFFICE OF THE NEW YORK STATE COMPTROLLER Thomas P. DiNapoli COMPTROLLER OFFICE OF THE NEW YORK STATE COMPTROLLER DIVISION OF STATE GOVERNMENT ACCOUNTABILITY Audit Objective... 2 Audit Results - Summary... 2 Background... 3 FASHION INSTITUTE OF

More information

ARIZONA STATE UNIVERSITY W. P. CAREY SCHOOL OF BUSINESS BUSINESS INFORMATION TECHNOLOGY

ARIZONA STATE UNIVERSITY W. P. CAREY SCHOOL OF BUSINESS BUSINESS INFORMATION TECHNOLOGY ARIZONA STATE UNIVERSITY W. P. CAREY SCHOOL OF BUSINESS BUSINESS INFORMATION TECHNOLOGY Audit Report No. ASU 04 04 June 30, 2004 Arizona Board of Regents Audit Services 2020 N. Central Avenue, Suite 230

More information

Northeast Higher Education District Itasca Community College

Northeast Higher Education District Itasca Community College Northeast Higher Education District Itasca Community College Internal Control and Compliance Audit Office of Internal Auditing June 6, 2016 Reference Number 2016-06 Report Classification: Public Northeast

More information

Sample audit - A Review of the IT Department (PCDA)

Sample audit - A Review of the IT Department (PCDA) 2006-1265-4 A. JOSEPH DeNUCCI AUDITOR The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 Boston, MASSACHUSETTS 02108 TEL. (617) 727-6200 No. 2006-1265-4T OFFICE

More information

UNIVERSITY OF NEVADA, RENO WOLF PACK MEATS Internal Audit Report July 1, 2009 through February 28, 2011

UNIVERSITY OF NEVADA, RENO WOLF PACK MEATS Internal Audit Report July 1, 2009 through February 28, 2011 UNIVERSITY OF NEVADA, RENO WOLF PACK MEATS Internal Audit Report July 1, 2009 through February 28, 2011 GENERAL OVERVIEW Wolf Pack Meats was established in 1967 and falls administratively under the College

More information

The University of Oklahoma NORMAN PCARD TRAINING

The University of Oklahoma NORMAN PCARD TRAINING The University of Oklahoma NORMAN PCARD TRAINING 1 Pcard Team Email. Proadmin@ouhsc.edu Phone. (405) 325-2811 Address. 2750 Venture Drive Norman, Oklahoma 73069 Website. www.ou.edu/purchasing 2 University

More information

REPORT NO. 2013-027 OCTOBER 2012 UNIVERSITY OF FLORIDA. Operational Audit

REPORT NO. 2013-027 OCTOBER 2012 UNIVERSITY OF FLORIDA. Operational Audit REPORT NO. 2013-027 OCTOBER 2012 UNIVERSITY OF FLORIDA Operational Audit BOARD OF TRUSTEES AND PRESIDENT Members of the Board of Trustees and President who served during the 2011-12 fiscal year are listed

More information

Department of Public Utilities Customer Information System (BANNER)

Department of Public Utilities Customer Information System (BANNER) REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

R345, Information Technology Resource Security 1

R345, Information Technology Resource Security 1 R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,

More information

SECTION 15 INFORMATION TECHNOLOGY

SECTION 15 INFORMATION TECHNOLOGY SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

PURCHASE CARD POLICIES AND PROCEDURES MANUAL

PURCHASE CARD POLICIES AND PROCEDURES MANUAL PURCHASE CARD POLICIES AND PROCEDURES MANUAL Effective July 1, 2010 Alma College Purchase Card Policies and Procedures Manual 1.0 INTRODUCTION Alma College has established a Purchase Card (PCARD) Program

More information

The Commonwealth of Massachusetts

The Commonwealth of Massachusetts A. JOSEPH DeNUCCI AUDITOR The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 BOSTON, MASSACHUSETTS 02108 TEL. (617) 727-6200 No. 2005-0202-4T OFFICE OF THE STATE

More information

KAREN E. RUSHING. Audit of Purchasing Card Program

KAREN E. RUSHING. Audit of Purchasing Card Program KAREN E. RUSHING Clerk of the Circuit Court and County Comptroller Audit of Purchasing Card Program Audit Services Jeanette L. Phillips, CPA, CGFO, CIG Director of Internal Audit and Inspector General

More information

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES PHYSICAL SECURITY. Report No. 13-11

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES PHYSICAL SECURITY. Report No. 13-11 THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES PHYSICAL SECURITY Report No. 13-11 OFFICE OF INTERNAL AUDITS THE UNIVERSITY OF TEXAS - PAN AMERICAN 1201 West University Drive

More information

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior GAO United States General Accounting Office Report to the Secretary of the Interior July 2001 INFORMATION SECURITY Weak Controls Place Interior s Financial and Other Data at Risk GAO-01-615 United States

More information

Samford University Purchasing Card (PCARD) Program Policy and Procedures May 1, 2016

Samford University Purchasing Card (PCARD) Program Policy and Procedures May 1, 2016 Samford University Purchasing Card (PCARD) Program Policy and Procedures May 1, 2016 1 Table of Contents I. Overview A. Introduction..3 B. Definitions.... 3 II. Card Issuance A. Cardholder Eligibility...4

More information

Information Technology Internal Controls Part 2

Information Technology Internal Controls Part 2 IT Controls Webinar Series Information Technology Internal Controls Part 2 Presented by the Arizona Office of the Auditor General October 23, 2014 Part I Overview of IT Controls and Best Practices Part

More information

Audit of Tax Data Security. Final Report Approved by Internal Audit Committee on June 29, 2005

Audit of Tax Data Security. Final Report Approved by Internal Audit Committee on June 29, 2005 Final Report Approved by Internal Audit Committee on June 29, 2005 Audit and Evaluation Division March 2005 Table of Contents Auditor s Statement... 1 I. Introduction... 2 II. Findings and Recommendations...

More information

INTERNAL AUDIT REPORT K-CASH PROCESSES AND INTERNAL CONTROLS

INTERNAL AUDIT REPORT K-CASH PROCESSES AND INTERNAL CONTROLS INTERNAL AUDIT REPORT K-CASH PROCESSES AND INTERNAL CONTROLS November 28, 2011 Audit Report Number 12-01 Issued by: Kennesaw State University Internal Audit Department Audit Team Clayton B. Dean, MBA,

More information

University of Nevada, Reno. UNR Building Access Cards and Key Control Procedures 1

University of Nevada, Reno. UNR Building Access Cards and Key Control Procedures 1 University of Nevada, Reno Building Access Cards and Key Control Procedures PURPOSE The purpose of this document is to specify procedures for obtaining access to facilities using card keys and hard keys,

More information

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Department of Public Affairs & Security Studies Report No.

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Department of Public Affairs & Security Studies Report No. THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES Report No. 15-06 OFFICE OF INTERNAL AUDITS THE UNIVERSITY OF TEXAS - PAN AMERICAN 1201 West University Drive Edinburg, Texas

More information

- PUBLIC REPORT - CITY OF SAN ANTONIO INTERNAL AUDIT DEPARTMENT

- PUBLIC REPORT - CITY OF SAN ANTONIO INTERNAL AUDIT DEPARTMENT - PUBLIC REPORT - CITY OF SAN ANTONIO INTERNAL AUDIT DEPARTMENT Audit of Aviation Network and Systems Security Project No. AU05-016 Release Date: October 24, 2005 Patricia Major CPA, CIA, CTP, CGFM Mark

More information

CREDIT CARDS CALIFORNIA STATE UNIVERSITY, EAST BAY. Audit Report 13-28 June 28, 2013

CREDIT CARDS CALIFORNIA STATE UNIVERSITY, EAST BAY. Audit Report 13-28 June 28, 2013 CREDIT CARDS CALIFORNIA STATE UNIVERSITY, EAST BAY Audit Report 13-28 June 28, 2013 Henry Mendoza, Chair Lupe C. Garcia, Vice Chair Rebecca D. Eisen Steven M. Glazer William Hauck Hugo N. Morales Members,

More information

TABLE OF CONTENTS OBJECTIVES, SCOPE, AND METHODOLOGY... 1 BACKGROUND... 1. 1. Authorized Signers Not Updated... 5

TABLE OF CONTENTS OBJECTIVES, SCOPE, AND METHODOLOGY... 1 BACKGROUND... 1. 1. Authorized Signers Not Updated... 5 TABLE OF CONTENTS Page OBJECTIVES, SCOPE, AND METHODOLOGY... 1 BACKGROUND... 1 FINDINGS AND RECOMMENDATIONS 1. Authorized Signers Not Updated... 5 2. Insufficient Employee Background Checks... 6 3. Discrepancy

More information

8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON

8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES. Policy Statement COLLEGE OF CHARLESTON POLICY ON OFFICIAL POLICY 8.1.6 POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 03/21/11 Policy Statement COLLEGE OF CHARLESTON POLICY ON KEYS AND OTHER BUILDING ACCESS DEVICES 1.0 PURPOSE OF POLICY The purpose

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

PHYSICAL ACCESS CONTROL

PHYSICAL ACCESS CONTROL Contact: Administrative Services Issued: June 24, 2013 Supersedes: Keys - Administration and Control of Keys, September 2007; and Keys - Issuance and Retrieval, March 1986 Pages: 13 OVERVIEW PHYSICAL ACCESS

More information

Purchasing Card (P-Card) JP Morgan Chase VISA. Procedure and Reference Manual

Purchasing Card (P-Card) JP Morgan Chase VISA. Procedure and Reference Manual Purchasing Card (P-Card) JP Morgan Chase VISA Procedure and Reference Manual July 2013 1 Contents 1. INTRODUCTION... 2 2. DEFINITIONS... 3 3. ISSUANCE OF CARDS... 3 3.1 Authorization... 3 3.2 Issuance

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

DETAIL AUDIT PROGRAM Information Systems General Controls Review

DETAIL AUDIT PROGRAM Information Systems General Controls Review Contributed 4/23/99 by Steve_Parker/TBE/Teledyne@teledyne.com DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,

More information

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic

More information

Arkansas Tech University Procurement Card (P-Card) Program Policies and Guidelines Manual

Arkansas Tech University Procurement Card (P-Card) Program Policies and Guidelines Manual Arkansas Tech University Procurement Card (P-Card) Program Policies and Guidelines Manual March 5, 2013 (revised) Policies and guidelines will be changed to meet the needs of the Procurement Card (P-Card)

More information

We would like to extend our appreciation to the staff that assisted us throughout this audit. Attachment

We would like to extend our appreciation to the staff that assisted us throughout this audit. Attachment Date: June 25, 2014 To: Brenda S. Fischer, City Manager From: Candace MacLeod, City Auditor Subject: Audit of Glendale Fire Department s Payroll Process The City Auditor s Office has completed an audit

More information

MANAGEMENT AUDIT REPORT SECURING CRITICAL DATA CITYWIDE REPORT NO. 09-106. City of Albuquerque Office of Internal Audit and Investigations

MANAGEMENT AUDIT REPORT SECURING CRITICAL DATA CITYWIDE REPORT NO. 09-106. City of Albuquerque Office of Internal Audit and Investigations MANAGEMENT AUDIT REPORT OF SECURING CRITICAL DATA CITYWIDE REPORT NO. 09-106 City of Albuquerque Office of Internal Audit and Investigations Securing Critical Data Citywide Report No. 09-106 Executive

More information

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Office of Alumni Relations Report No. 15-10

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Office of Alumni Relations Report No. 15-10 THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES Report No. 15-10 OFFICE OF INTERNAL AUDITS THE UNIVERSITY OF TEXAS - PAN AMERICAN 1201 West University Drive Edinburg, Texas

More information

INTERNAL AUDIT DIVISION CLERK OF THE CIRCUIT COURT

INTERNAL AUDIT DIVISION CLERK OF THE CIRCUIT COURT INTERNAL AUDIT DIVISION CLERK OF THE CIRCUIT COURT FOLLOW UP REVIEW TO AUDIT OF COURTROOM AUTOMATION Karleen F. De Blaker Clerk of the Circuit Court Ex officio County Auditor Robert W. Melton, CPA*, CIA,

More information

Information Technology Operational Audit DEPARTMENT OF STATE. Florida Voter Registration System (FVRS) Report No. 2016-002 July 2015

Information Technology Operational Audit DEPARTMENT OF STATE. Florida Voter Registration System (FVRS) Report No. 2016-002 July 2015 July 2015 Information Technology Operational Audit DEPARTMENT OF STATE Florida Voter Registration System (FVRS) Sherrill F. Norman, CPA Auditor General Secretary of State Section 20.10, Florida Statutes,

More information

in The Institute of Internal Auditor's

in The Institute of Internal Auditor's Office of Internal Audit January 8, 2014 Dr. Kirk A. Calhoun, M.D. UT Health Northeastt 11937 U. S. Hwy 271 Tyler, TX 75708 Dr. Calhoun: The was completed as part off our Audit Plan. The objective of this

More information

ELECTRONIC INFORMATION SECURITY A.R.

ELECTRONIC INFORMATION SECURITY A.R. A.R. Number: 2.6 Effective Date: 2/1/2009 Page: 1 of 7 I. PURPOSE In recognition of the critical role that electronic information systems play in City of Richmond (COR) business activities, this policy

More information

STATE OF NORTH CAROLINA

STATE OF NORTH CAROLINA STATE OF NORTH CAROLINA INFORMATION SYSTEMS AUDIT OFFICE OF INFORMATION TECHNOLOGY SERVICES INFORMATION TECHNOLOGY GENERAL CONTROLS OCTOBER 2014 OFFICE OF THE STATE AUDITOR BETH A. WOOD, CPA STATE AUDITOR

More information

Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02

Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 Audit of Case Activity Tracking System Security Report No. OIG-AMR-33-01-02 BACKGROUND OBJECTIVES, SCOPE, AND METHODOLOGY FINDINGS INFORMATION SECURITY PROGRAM AUDIT FOLLOW-UP CATS SECURITY PROGRAM PLANNING

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 14 I. Policy II. A. The, the units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively

More information

Department of Consumer Affairs Cash Disbursements by Agency Checks

Department of Consumer Affairs Cash Disbursements by Agency Checks Internal Control Audit of the Department of Consumer Affairs Cash Disbursements by Agency Checks January 2008 Audit No. 2007-102 Internal Audit Office TABLE OF CONTENTS Report Summary Auditor s Report

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

Collections, Contributions, and Accounts Receivable Policies

Collections, Contributions, and Accounts Receivable Policies Collections, Contributions, and Accounts Receivable Policies The Office of the Student Financial Services is responsible for monitoring, processing and recording the collection of all funds collected by

More information

September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control

September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value

More information

Tulane Purchasing Card Policies and Procedures

Tulane Purchasing Card Policies and Procedures Tulane Purchasing Card Policies and Procedures I. Purpose The Purchasing Card program was established to provide a more efficient and cost-effective method for purchasing and paying for small dollar transactions,

More information

University System of Maryland University of Maryland Biotechnology Institute

University System of Maryland University of Maryland Biotechnology Institute Audit Report University System of Maryland University of Maryland Biotechnology Institute August 2006 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report

More information

Maryland Transportation Authority

Maryland Transportation Authority Audit Report Maryland Transportation Authority March 2014 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up correspondence

More information

Information Technology Services Guidelines

Information Technology Services Guidelines Page 1 of 10 Table of Contents 1. Purpose... 2 2. Entities Affected by This Guideline... 2 3. Definitions... 2 4. Guidelines... 3 4.1 Requesting Data Center or... 3 4.2 Requirements for Data Center or...

More information

Wheaton College. Updated November 2012. Park Hall, Room 205 Park Hall, Room 202 Phone: 3433/3438 Phone: 3439

Wheaton College. Updated November 2012. Park Hall, Room 205 Park Hall, Room 202 Phone: 3433/3438 Phone: 3439 Wheaton College Corporate Credit Card User Guide Updated November 2012 For General Information Contact: For Accounting/Reconciliation Info Contact: Business Services Office Accounts Payable Office Park

More information

Frederick County Public Schools

Frederick County Public Schools Financial Management Practices Audit Report Frederick County Public Schools April 2015 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY For further information

More information

Guideline on Access Control

Guideline on Access Control CMSGu2011-08 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Access Control National Computer Board Mauritius Version 1.0

More information

WESTERN NEVADA COLLEGE THEATER DEPARTMENT Internal Audit Report July 1, 2009 through January 31, 2011

WESTERN NEVADA COLLEGE THEATER DEPARTMENT Internal Audit Report July 1, 2009 through January 31, 2011 WESTERN NEVADA COLLEGE THEATER DEPARTMENT Internal Audit Report July 1, 2009 through January 31, 2011 GENERAL OVERVIEW The Western Nevada College (WNC) Theater Department falls administratively under the

More information

SOUTHEASTERN OKLAHOMA STATE UNIVERSITY PURCHASING CARD USER PROCEDURES GUIDE

SOUTHEASTERN OKLAHOMA STATE UNIVERSITY PURCHASING CARD USER PROCEDURES GUIDE SOUTHEASTERN OKLAHOMA STATE UNIVERSITY PURCHASING CARD USER PROCEDURES GUIDE The Southeastern Oklahoma State University Purchasing Card Program has been implemented in an effort to improve service to the

More information

September 8, 2015. Dr. Hobson Wildenthal, President ad interim Ms. Lisa Choate, Chair of the Institutional Audit Committee:

September 8, 2015. Dr. Hobson Wildenthal, President ad interim Ms. Lisa Choate, Chair of the Institutional Audit Committee: THE UNIVERSITY OF TEXAS SYSTEM AT THE UNIVERSITY OF TEXAS AT DALLAS OFFICE OF INTERNAL AUDIT 800 W. CAMPBELL RD. SPN 32 RICHARDSON, TX 75080 PHONE 972-883-4876 FAX 972-883-6846 September 8, 2015 Dr. Hobson

More information

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative

More information

Miami University Purchasing Card Policy & Procedure

Miami University Purchasing Card Policy & Procedure Miami University Purchasing Card Policy & Procedure MAY 22, 2015 1 Table of Contents Program Purpose... 3 Overview... 3 Advantages... 4 Getting Started- Card Application & Activation... 4 Capabilities,

More information

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1 Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4

More information

CAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business

CAMPUS KEY POLICY. Gerry, Bomotti, Senior Vice President for Finance and Business Gerry, Bomotti, Senior Vice President for Finance and Business 1. PURPOSE The purpose of this policy is to provide optimal physical security and safety for building occupants and to protect the assets

More information

Audit Summary. Departmental Background. Objective and Scope

Audit Summary. Departmental Background. Objective and Scope Audit Summary The Comet Center appears to have an adequate system of internal controls in place. However, the following report details ways by which the department can further enhance internal controls

More information

Cleveland State University Purchasing Card Policy and Procedure Revised June 2014. Program Overview

Cleveland State University Purchasing Card Policy and Procedure Revised June 2014. Program Overview Cleveland State University Purchasing Card Policy and Procedure Revised June 2014 Purpose This policy describes the proper use of a Cleveland State University (the University) purchasing card. It is in

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

Internal Control Guidelines

Internal Control Guidelines Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth

More information

Access Control Regulations

Access Control Regulations Access Control Regulations 6 August 2008 1 TABLE OF CONTENTS I. Regulations... 3 II. Introduction... 3 III. Definitions... 3 IV. Single Access Control Alarm Coordinator (SACC)... 4 V. Access to Closed

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000. U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

Texas A&M University - Commerce: Review of Faculty Human Resources Processes PROJECT SUMMARY. Summary of Significant Results

Texas A&M University - Commerce: Review of Faculty Human Resources Processes PROJECT SUMMARY. Summary of Significant Results PROJECT SUMMARY Overview Table of Contents Project Summary... 1 Detailed Observations... 3 Basis of Review... 10 Audit Team Information... 11 Distribution List... 11 Processes and controls at Texas A&M

More information

Continue to develop and enhance partnerships on all of the University of Montana campuses and in surrounding communities.

Continue to develop and enhance partnerships on all of the University of Montana campuses and in surrounding communities. GRIZ CARD CENTER STRATEGIC PLAN 2008-13 JANUARY 2008 Mission Statement The Griz Card Center offers a user friendly integrated one card system to University of Montana faculty, staff, students, alumni,

More information