DETAIL AUDIT PROGRAM Information Systems General Controls Review

Size: px
Start display at page:

Download "DETAIL AUDIT PROGRAM Information Systems General Controls Review"

Transcription

1 Contributed 4/23/99 by DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures, practices, and the organizational structure so as to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected, and corrected. The audit program is divided into the following sections: Section 2.0: General Organization Control Procedures Section 3.0 IS Processes Section 4.0 Disaster Recovery Section 5.0 Logical Security Access Section 6.0 Physical Access and Asset Protection Section 7.0 IS Budget Process References: 1. Corporate Financial Standards Guidelines, Section 3, Data Processing Standards 2. Corporate Internal Audit, Information Systems Audit Overview 3. Corporate Policies and Procedures 4. Corporate Internal Audit, Help Manual 5. Handbook of IT Auditing, by J. Donald Warren, Jr., Lynn W. Edelson, Xenia Ley 6. COBIT - Control Objectives for Information and Related Technology 2.0 General Organization Control Procedures To identify and gain an overall general understanding of the Information System organization's operating environment and control structure. Emphasis is placed on Policies and Procedures which govern the IS organization and its processes. a) Conduct entrance meeting and request briefing on IS operations, if needed. b) Auditor should become familiar with the various IS control groups, (review file: IS controls.doc). c) Interview senior management and understand their issues and concerns pertaining to IS. d) Obtain and review copies of any previous IS audit reports, and follow-up on any previous Action Plans to ensure all recommendations from previous reports are corrected and still in place. In addition, review IS audit reports from other divisions to see what type of deficiencies were uncovered. If previous action plans are not resolved or corrected, make audit e) Obtain and review copies of IS policies, procedures, and standards, (you should make a comparison to standards used, reference 1.) If IS policies and

2 procedures and/or an Information Security Policy does not exist, this would warrant an audit f) Ask the IS manager for a copy of the IS strategic plan, it should be documented and approved by senior management. If one does not exist an audit comment should be made. g) Ask the IS manager if a planning or steering committee is in place to oversee IS Department activities (should consist of senior management, IS, and user departments and they should ensure efficient use of data processing resources and set priorities, examine costs and provide support to various projects.) If one does not exist an audit comment should be made. h) Determine how IS items are procured, and if they are aware of and using corporate agreements (CAs). If they are not utilized, make an audit i) Determine if there is a current organization chart and if job descriptions are clearly defined as to responsibility and authority, to ensure proper segregation of duties within IS (review the file: IS matrix.xls to understand what duties are not compatible.) If a current organization chart does not exist, make audit Ask IS personnel if they understand their roles and responsibilities. If they do not, then make an audit Determine if the IS department is independent from other organizational influences. If IS manager reports to an operational organization such as Procurement or Operations, make an audit j) Assess audit risk and determine the scope of audit and extent of compliance testing to be performed. 3.0 IS Processes The purpose of this domain is to determine what processes are in place and ensure controls exist and followed by employees. Emphasis is placed on the IS department infrastructure and internal practices to support the company's objectives and goals; and to support system development and implementation. a) Determine the Change Control process/procedure through interview with IS manager. (Ask for a copy of the change request form.) If a formal change request process is not documented and/or changes are not documented on Change Request forms and do not have provisions for the following items, an audit comment should be made. Are the forms serially numbered and contain provisions for approval by supervisors from both IS and user departments? Does the form identify the reason for, effective date and person who made change? Determine how changes are bought off/completed (should require approval from supervisor and meet successful testing criteria).

3 b) Ask the IS manager how changes are tested and moved into production (there should be a test environment separate and apart from the production environment, for developing new software and testing modifications, and programmers should not be allowed to have access to the production environment.) If these environments are not separate, make an audit If the programmers are able to move the code into production, make an audit c) Ask the IS Manager for a copy of programming and documentation standards used by the software developers. (There should be written standards on the type and format of required documentation which is followed by all programmers and/or consultants and include naming conventions for programs, libraries, and data sets; standards for program documentation; program testing procedures.) If they do not have documented standards, make an audit d) Ask the IS manager if there are quality checks performed on modified software to ensure standards are followed, and documentation and testing are complete before moving the changes into production. If this is not a separate function in IS and does not occur, make an audit e) Ask the IS manager for a LAN Administration Manual (should include Network Security parameters, recovery procedures, hardware/software standardization guides.) If they do not have one, make an audit f) Obtain copies of PC/LAN user documentation/manual and ask the IS manager if it is provided to all users (should cover user responsibilities for using the LAN and PC, protection of sensitive files, loading unapproved software onto the LAN or PC, proper use of the Internet and , and software copyright violation.) If one does not exist, make an audit g) Query some users and determine if they know what to do if they encounter a problem (users should know who to contact if they encounter a problem and receive timely responses.) If they are unsure of what to do or who to contact, make an audit h) Ask for copies of policies pertaining to the use of the Internet and (these should be documented and communicated to all users.) If they do not exist, make an audit i) Determine if there is a Software/Systems Development Life Cycle (SDLC) in place, documented and used by the IS department. If one does not exist, make an audit 4.0 Disaster Recovery The purpose of this domain is to determine what Disaster Recovery and Contingency plans exist and assess their adequacy to ensure continuity of operations if either a complete system failure or the failure of system components occurs. There should be procedures in place to provide for the recovery of files, address disaster recovery, and identify critical processing (data). The plan should allow for periodic testing (at least

4 annually), to ensure personnel understand their respective roles during a disaster and validate the plan. There should be provisions for the backup of critical information and materials both on-site and off-site. a) Review backup materials/procedures. If backups are not performed, make an audit comment and skip the rest of this section. Determine who performs the backups and ask if it is done on a regular basis (backups should be performed nightly on files which have changed during the previous day and weekly for the whole system.) If this is not done, make an audit * Ask how many copies of the files are maintained, at least three generations of important files as well as copy of the transactions needed to bring all files to current status should exist.) If not, make an audit Ask if system files and operating software is also backed up periodically (especially if there is a change to the system settings.) If not, make an audit Determine if the media is labeled and if it is stored in a secure location (off-site, and while on-site is it stored in a secure area - fireproof file cabinet.) If it is not stored off-site, or not kept in a secure area with limited access while on-site, make an audit Ask to see if there are tests performed on the backup media to ensure files are indeed written there.) If such a test is not performed, make an audit See if there are documented desk procedures which reflect current backup and restoration steps. If not, make an audit b) Ask the IS manager if there are contingency plans to handle emergency situations such as hard disk crashes and central processing unit (CPU) failures. If not, make and audit c) Obtain copy of the Disaster Recovery Manual/Plan (each site should have one.) If one does not exit, make an audit comment and skip the rest of this section. Find out who maintains copies and where they are kept (should maintain a copy off-site with other Disaster Recovery information.) If one is not stored off-site, make an audit Determine if applications (critical processes and data) are identified and prioritized as to criticality to the business and its operations. If one does not exist, make audit Are there provisions for an alternate site to handle processing needs if a disaster should occur? (Should have contract with outside firm or agreement with other ATI site.) If not, then make an audit Verify the plan has provisions for periodic testing (there should be scheduled time to test the plan, and document and resolve problems.) If the test plan has not been tested or plans to be tested, make an audit d) Ask IS employees if they are aware of the steps they should take in case of Disaster.

5 If they do not understand their roles and responsibilities, make an audit 5.0 Logical Access Security Users of the computer systems should be accurately identified and employees permitted to have access as authorized and required to accomplish their assigned duties. In addition, logs or audit trails should exist and be maintained to reflect user access and changes to sensitive data files, (i.e., Vendor Master file, Accounts Payable/Receivable Master files, Employee Master file, Payroll files). a) Ask for copy of Logical Access Security Policies. If one does not exist, make audit b) Ask the IS manager if there is a written procedure to control addition or changes to current users' access restrictions (should include a standardized form containing written approval by appropriate level of management and process should be managed and maintained by IS personnel.) If there is not a form or procedure, make audit Obtain copies of a couple of access authorization forms and validate for proper authorization and access (These should be retained by IS as an audit trail.) If the form is not adequately filled out or retained, make an audit c) Ask the IS manager how the IS department is notified when employees are terminated or change job responsibilities. If there is not a procedure in place to notify IS in a timely manner, make an audit d) Ask the IS manager if there are any users who have supervisory capability users who have unlimited access, sometimes referred to as "super users", to files, applications and operator commands, this should be limited to only a few select IS employees. How are transactions or actions approved and documented when initiated by these employees (there should be a log for recording their activities within the system which should be reviewed by management.) If their actions are not logged and reviewed by IS manager, make audit e) Ask the IS manager if Network changes are authorized and documented (should be an audit trail of network equipment changes.) If they are not, make an audit f) Ask the IS manager if system logs are maintained. Are there system access logs to record access to computer resources or data communications network? (should include User ID and should be reviewed on a regular basis for unusual activity such as invalid logon attempts). Are there transaction logs/audit trails to record additions, deletions, and changes to data elements? (should include user and time change was made) If the answer to any of these questions is no, make an audit

6 g) Ask the IS manager if problem logs are maintained by the data center/operations. (These are used to identify system and application problems and ensure resolution.) If not, make audit h) Ask the IS manager if system activity logs are in use to capture utilization of hardware resources associated with the servers, CPU utilization, access storage activity and utilization, and job activity. (This is a primary means for identifying processing problems created by inadequate or failing components.) If not used, make audit i) Ask the IS manager what process/procedure ensures compliance with software license agreements. If process or procedure does not exist, make an audit Audit Program Steps for Logical Access Security (cont.) j) Review Access Controls and Password Administration: (the following are usually initialized when the system is installed.) Ask the IS manager if logons are shared between users (shared logons and passwords should be disallowed unless several users require inquiry access only to non-confidential data/information). Passwords should be a minimum of 5, maximum of 8 characters and not easily guessed. Passwords should be masked (not displayed) when entered by user. Passwords should be changed periodically (every days). Sample some employees to see if required to change password within certain amount of time (this will support password change procedure). User Ids or workstations should be automatically revoked after a predetermined number of unauthorized access attempts (should be three attempts). PCs should be automatically logged off after a period of non-use (30 minutes). If logon Ids and passwords are shared except under the aforementioned condition, or the settings for passwords and workstations are not set properly, then make an audit k) Ask the IS manager if modems are attached to the server (provides remote access). If not, skip the rest of this section. Ask if there are additional security measures in place (there should be additional security for this type access - user ID's and password protection, dial-back feature, authorized dial-in user list). If additional security measures are not in place, make an audit Determine who controls remote access activity and ask them how they control security to the modems and the phone numbers (verify this activity is monitored and phone numbers for the modems are not published).

7 l) Interview System Administrators to determine if they have been provided formal training which is related to securing the servers. (There are a number of security settings unique to each platform which are related to users, files, operating system, audit trails, etc. which affect the overall security and reporting of security related events which Administrators should know how to initialize and manage.) If they have not been given formal training, make and audit m) Determine if there is a network topology in existence (there should be a diagram of all computing equipment with all access paths depicted - routers, multiplexers, modems, communication links between servers and printers.) If one does not exist, make and audit n) Ask the IS manager if someone is responsible for accounting for all hardware and software within the company. (A current inventory list should exist.) If not, make an audit o) Ask the IS manager how the servers and PCs are protected from viruses. If servers and/or PCs do not have virus software loaded, make an audit Determine what procedures are in place to prevent or detect the presence of a virus on the servers, and verify who is responsible for performing these procedures. Is virus software loaded on the workstations and do users know how to run the software? Query some users to determine if they know what steps to take if a virus is detected or suspected on their workstation? If not, make an audit 6.0 Physical Access and Asset Protection This section of the audit program deals with those controls which should be in place to physically protect computing assets from unauthorized modification, theft, damage and/or destruction. a) Determine location of: Operator consoles Computer storage rooms UPS/Generator Location of all communications equipment Servers Tape library b) Determine through observation how these assets are protected (should be restricted to authorized personnel only.) If they are not located in a secure area where access is controlled, make an audit c) Ask the IS manager how equipment is covered in case of damage or loss, (insurance policies should be in place.) If insurance policies do not exist or assets are not covered by Corporate Policies, make audit

8 d) Ask the IS manager if there are vendor agreements in place to cover responding to hardware failures (should have contract with vendors to respond in a timely manner to failures which cause loss of service.) If they do not exist, make an audit e) Check physical/environmental protection of equipment by touring the data center with the IS manager. Delinquency in any of the following should be noted by audit comments. Verify the presence of water and smoke detectors and verify back up power, i.e. batteries, in case power is lost to this area. Verify hand-held fire extinguishers are strategically located and visible (ask operators if they know how to operate the fire extinguishers.) Verify extinguishers have been inspected within the last year (should be a tag attached to each one reflecting the last time they were inspected). Determine if there are emergency lights installed within the computer room? Obtain copy of emergency Evacuation Plan (should be copies posted near the computer room and ask operators if they know what to do if they are required to evacuate the building.) Do Emergency Power Off switch(es) exist and labeled? Are housekeeping rules documented and practiced (i.e. dusting). f) Ask the IS manager if Uninterrupted Power Supply (UPS) is connected to all significant systems. If there is not a UPS connected to servers, make an audit If UPS is used, ask the IS manager if it has been tested. g) Ask the IS manager who has access to the computer room and how is it controlled, (should only be network operators and repair personnel.) Is there a list of those who have been given access? Is there a log to record visitors to the computer room? 7.0 IS Budget Process This section's objective is to determine if a formal process exists and is functioning in a reasonable manner. Review supporting controls and detail for reasonableness. a) Ask the IS manager for a copy of procedure to verify one exists. If one does not exist, make and audit b) Identify significant components of the Overall Budget Process (Macro View / Macro Flowchart). c) Determine how IS Budget ties into Company Budget. d) Trace and tie IS Budget Totals to IS totals in Company Budget. e) Review procedures for comparing Actual to Budget.

9 f) Obtain an understanding of how management reviews and analyzes Variances of Actual Cost to Budgeted Cost. If a review is not performed, make and audit g) Obtain Management's response regarding the effectiveness of the Budgeting Process for managing and controlling Costs. h) Obtain an understanding of the approval process. If one does not exist, make an audit i) Re-evaluate and summarize your understanding of the Overall Budget Process (Macro View / Macro Flowchart) and verify using a walkthrough method with IS Management. j) Review detail line items of Budget for appropriateness and reasonableness. If large volume of line items identify and concentrate on high dollar amount items or large volumes that add up to large dollar amounts. Review appropriateness of volumes purchased. Review redundancy of technology purchased. Validate Contract Services. Perform steps to determine how details tie into Budget Categories.

General IT Controls Audit Program

General IT Controls Audit Program Contributed February 5, 2002 by Paul P Shotter General IT Controls Audit Program Purpose / Scope Perform a General Controls review of Information Technology (IT). The reviews

More information

Master Document Audit Program

Master Document Audit Program Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS Workpaper Reference Date(s) Completed Organization and Staffing procedures used to define the organization of the IT Department. 2. Review the organization

More information

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division

The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division The City of New York Office of the Comptroller Bureau of Financial Audit EDP Audit Division WILLIAM C. THOMPSON, JR. Comptroller Follow-Up Report on the New York City Fire Department Arson Information

More information

Auditing in an Automated Environment: Appendix C: Computer Operations

Auditing in an Automated Environment: Appendix C: Computer Operations Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations

More information

DISASTER RECOVERY PLAN

DISASTER RECOVERY PLAN DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and

More information

SECTION 15 INFORMATION TECHNOLOGY

SECTION 15 INFORMATION TECHNOLOGY SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County

More information

Sample audit - A Review of the IT Department (PCDA)

Sample audit - A Review of the IT Department (PCDA) 2006-1265-4 A. JOSEPH DeNUCCI AUDITOR The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 Boston, MASSACHUSETTS 02108 TEL. (617) 727-6200 No. 2006-1265-4T OFFICE

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

PBGC Information Security Policy

PBGC Information Security Policy PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.

More information

The Commonwealth of Massachusetts

The Commonwealth of Massachusetts A. JOSEPH DeNUCCI AUDITOR The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 BOSTON, MASSACHUSETTS 02108 TEL. (617) 727-6200 No. 2008-1308-4T OFFICE OF THE STATE

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

Information System Audit Report Office Of The State Comptroller

Information System Audit Report Office Of The State Comptroller STATE OF CONNECTICUT Information System Audit Report Office Of The State Comptroller AUDITORS OF PUBLIC ACCOUNTS KEVIN P. JOHNSTON ROBERT G. JAEKLE TABLE OF CONTENTS EXECUTIVE SUMMARY...1 AUDIT OBJECTIVES,

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014 The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local

More information

Information Systems Security Assessment

Information Systems Security Assessment Physical Security Information Systems Security Assessment 1. Is the server protected from environmental damage (fire, water, etc.)? Ideal Answer: YES. All servers must be housed in such a way as to protect

More information

MCR Checklist for Automated Information Systems (Major Applications and General Support Systems)

MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) Name of GSS or MA being reviewed: Region/Office of GSS or MA being reviewed: System Owner: System Manager:

More information

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool Instructions for Using Online HIPAA Security Plan Generation Tool Contents Step 1 Set Up Account... 2 Step 2 : Fill out the main section of the practice information section of the web site.... 3 The next

More information

Information Systems and Technology

Information Systems and Technology As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons

More information

INTERNAL AUDIT REPORT. Review of Software Change Management. Fairfax County Internal Audit Office

INTERNAL AUDIT REPORT. Review of Software Change Management. Fairfax County Internal Audit Office INTERNAL AUDIT REPORT Review of Software Change Management FAIRFAX COUNTY, VIRGINIA INTERNAL AUDIT OFFICE M E M O R A N D U M TO: Anthony H. Griffin DATE: May 2, 2002 County Executive FROM: SUBJECT: Ronald

More information

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date: A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine

More information

Computer Security Policy (Interim)

Computer Security Policy (Interim) Computer Security Policy (Interim) Updated May, 2001 Department of Information Systems & Telecommunications Table of Contents 1. SCOPE...1 2. OVERVIEW...1 3. RESPONSIBILITIES...3 4. PHYSICAL SECURITY...4

More information

Department of Public Utilities Customer Information System (BANNER)

Department of Public Utilities Customer Information System (BANNER) REPORT # 2010-06 AUDIT of the Customer Information System (BANNER) January 2010 TABLE OF CONTENTS Executive Summary..... i Comprehensive List of Recommendations. iii Introduction, Objective, Methodology

More information

San Francisco Chapter. Information Systems Operations

San Francisco Chapter. Information Systems Operations Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with

More information

Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP

Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP Final Audit Report Audit of Data Integrity MCCS Feeder System Interfacing with SAP April 2008 Table of Contents Executive Summary... ii Introduction...........1 Background... 1 Audit Objectives... 1 Scope

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

Sample Career Ladder/Lattice for Information Technology

Sample Career Ladder/Lattice for Information Technology Click on a job title to see examples of descriptive information about the job. Click on a link between job titles to see the critical development experiences needed to move to that job on the pathway.

More information

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior

GAO INFORMATION SECURITY. Weak Controls Place Interior s Financial and Other Data at Risk. Report to the Secretary of the Interior GAO United States General Accounting Office Report to the Secretary of the Interior July 2001 INFORMATION SECURITY Weak Controls Place Interior s Financial and Other Data at Risk GAO-01-615 United States

More information

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) 591-5553 Email: bronackt@dcag.com Fax: (718) 380-7322 Business Continuity and Disaster Recovery Job Descriptions Table of Contents Business Continuity Services Organization Chart... 2 Director Business Continuity Services Group... 3 Manager of Business Recovery

More information

Managed Security Services SLA Document. Response and Resolution Times

Managed Security Services SLA Document. Response and Resolution Times Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response

More information

MANAGEMENT AUDIT REPORT SECURING CRITICAL DATA CITYWIDE REPORT NO. 09-106. City of Albuquerque Office of Internal Audit and Investigations

MANAGEMENT AUDIT REPORT SECURING CRITICAL DATA CITYWIDE REPORT NO. 09-106. City of Albuquerque Office of Internal Audit and Investigations MANAGEMENT AUDIT REPORT OF SECURING CRITICAL DATA CITYWIDE REPORT NO. 09-106 City of Albuquerque Office of Internal Audit and Investigations Securing Critical Data Citywide Report No. 09-106 Executive

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

CENTER FOR NUCLEAR WASTE REGULATORY ANALYSES

CENTER FOR NUCLEAR WASTE REGULATORY ANALYSES Page 1 of 5 ELECTRONIC FILE ARCHIVAL AND BACKUP PROCEDURES EFFECTIVITY AND APPROVAL Revision 1 of this procedure became effective on July 6, 2004. This procedure consists of the pages and changes listed

More information

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000.

Memorandum. ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098. May 23, 2000. U.S. Department of Transportation Office of the Secretary of Transportation Office of Inspector General Memorandum ACTION: Report on Computer Security Controls of Financial Management System, FTA FE-2000-098

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

1. Describe the staffing levels maintained in the IT department (change titles as needed): K. Tollefsen/1

1. Describe the staffing levels maintained in the IT department (change titles as needed): K. Tollefsen/1 Page 1 of 14 Chabot-Las Positas Community College District Reference: T500 Information System Memo Prepared by: Jeannine Methe June 30, 2005 Date: 6/8/05 Reviewed by: Instructions: This memo is designed

More information

Internal Control Guide & Resources

Internal Control Guide & Resources Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed

More information

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY

YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September

More information

IT Onsite Service Contract Proposal. For. <<Customer>> Ltd

IT Onsite Service Contract Proposal. For. <<Customer>> Ltd IT Onsite Service Contract Proposal For Ltd 1 of 14 I N T R O D U C T I O N This Service Contract for Onsite Deskside PC Support (this Service Contract ) is made effective as of February 5th,

More information

How To Plan For A Disaster At The University Of Texas

How To Plan For A Disaster At The University Of Texas Disaster Recovery Planning The Process Introduction We began our planning processes after experiencing several disasters, including a building fire, an environmental contamination, faulty discharge of

More information

DOT.Comm Oversight Committee Policy

DOT.Comm Oversight Committee Policy DOT.Comm Oversight Committee Policy Enterprise Computing Software Policy Service Owner: DOTComm Operations Effective Date: TBD Review Schedule: Annual Last Review Date: Last Revision Date: Approved by:

More information

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls

Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint

More information

HIPAA RISK ASSESSMENT

HIPAA RISK ASSESSMENT HIPAA RISK ASSESSMENT PRACTICE INFORMATION (FILL OUT ONE OF THESE FORMS FOR EACH LOCATION) Practice Name: Address: City, State, Zip: Phone: E-mail: We anticipate that your Meaningful Use training and implementation

More information

REVIEW OF THE INTERNAL CONTROLS OF THE RTA S INFORMATION SYSTEM

REVIEW OF THE INTERNAL CONTROLS OF THE RTA S INFORMATION SYSTEM REVIEW OF THE INTERNAL CONTROLS OF THE RTA S INFORMATION SYSTEM INTRODUCTION In accordance with the 2009 work plan, this report summarizes the results of the Audit & Review Division s annual review of

More information

Tom J. Hull & Company Type 1 SSAE 16 2014

Tom J. Hull & Company Type 1 SSAE 16 2014 Tom J. Hull & Company Type 1 SSAE 16 2014 REPORT ON MANAGEMENT S DESCRIPTION OF TOM J. HULL & COMPANY S SYSTEM AND THE SUITABILITY OF THE DESIGN OF CONTROLS Pursuant to Statement on Standards for Attestation

More information

How To Write A Health Care Security Rule For A University

How To Write A Health Care Security Rule For A University INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a

More information

Birkenhead Sixth Form College IT Disaster Recovery Plan

Birkenhead Sixth Form College IT Disaster Recovery Plan Author: Role: Mal Blackburne College Learning Manager Page 1 of 14 Introduction...3 Objectives/Constraints...3 Assumptions...4 Incidents Requiring Action...4 Physical Safeguards...5 Types of Computer Service

More information

Contingency Planning and Disaster Recovery Internal Control Questionnaire

Contingency Planning and Disaster Recovery Internal Control Questionnaire Contingency Planning and Disaster Recovery Internal Control Questionnaire [Institution s name] [Departments under review] [Heads of departments under review] A. POLICY AND SUPERVISION REVIEW 1. Was the

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups

More information

Guideline on risk management and other aspects of internal control in central securities depository

Guideline on risk management and other aspects of internal control in central securities depository until further notice 1 (11) Applicable to central securities depositories Guideline on risk management and other aspects of internal control in central securities depository By virtue of section 4, paragraph

More information

Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology

Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology 6G Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology TABLE OF CONTENTS Page Report on Internal Controls Related to Information Technology Network and Network Security 1

More information

Department of Education audit - A Case Study

Department of Education audit - A Case Study Second Follow-up Audit Report on Department of Education Internal Controls Over Its Data Center 7F04-137 September 27, 2004 THE CITY OF NEW YORK OFFICE OF THE COMPTROLLER 1 CENTRE STREET NEW YORK, N.Y.

More information

Audit Report on the New York City Police Department Data Center 7A06-093

Audit Report on the New York City Police Department Data Center 7A06-093 Audit Report on the New York City Police Department Data Center 7A06-093 August 14, 2006 THE CITY OF NEW YORK OFFICE OF THE COMPTROLLER 1 CENTRE STREET NEW YORK, N.Y. 10007-2341 WILLIAM C. THOMPSON, JR.

More information

VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY

VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY ASSESSABLE UNIT: ENTER THE NAME OF YOUR ASSESSABLE UNIT HERE BUSINESS PROCESS: ENTER YOUR BUSINESS PROCESS HERE BANNER INDEX CODE: ENTER YOUR BANNER INDEX CODE HERE Risk: If you monitor the activity and

More information

State HIPAA Security Policy State of Connecticut

State HIPAA Security Policy State of Connecticut Health Insurance Portability and Accountability Act State HIPAA Security Policy State of Connecticut Release 2.0 November 30 th, 2004 Table of Contents Executive Summary... 1 Policy Definitions... 3 1.

More information

Local Area Networking

Local Area Networking Local Area Networking prashant.mali@cyberlawconsulting.com By Prashant Mali LAN Issues Local Area Networks evolved from stand-alone PCs Control and safety features found commonly in multi-user systems

More information

ICT Disaster Recovery Plan

ICT Disaster Recovery Plan 7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011)

Functional Area 3. Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Functional Area 3 Skill Level 301: Applications Systems Analysis and Programming Supervisor (Mercer 1998 Job 011) Description: Supervises activities of all applications systems analysis and programming

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS

INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Department of Finance Department of Purchasing and Supply Management Fixed Assets System Audit Final Report

Department of Finance Department of Purchasing and Supply Management Fixed Assets System Audit Final Report Department of Finance Department of Purchasing and Supply Management Fixed Assets System Audit Final Report November 2006 promoting efficient & effective local government Executive Summary The Department

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Guideline on risk management and other aspects of internal control in stock exchange

Guideline on risk management and other aspects of internal control in stock exchange until further notice 1 (11) Applicable to stock exchanges Guideline on risk management and other aspects of internal control in stock exchange By virtue of section 4, paragraph 2, of the Act on the Financial

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

APPENDIX 7. ICT Disaster Recovery Plan

APPENDIX 7. ICT Disaster Recovery Plan APPENDIX 7 ICT Disaster Recovery Plan This policy was approved and ratified by the Governing Body of Cox Green School on 15 th October 2013 Signed: Chair of Governors Date: Ratified: Oct 2013 Review: Sep

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Main Reference : Hall, James A. 2011. Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications Suggested Reference : Senft, Sandra; Gallegos, Frederick., 2009.

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all

More information

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION

STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION STATE OF NEVADA Department of Administration Division of Human Resource Management LASS SPEIFIATION TITLE GRADE EEO-4 ODE IT TEHNIIAN SUPERVISOR 37 7.927 SERIES ONEPT Information Technology (IT) Technicians

More information

ULH-IM&T-ISP06. Information Governance Board

ULH-IM&T-ISP06. Information Governance Board Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible

More information

Information Resources Security Guidelines

Information Resources Security Guidelines Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive

More information

Business Continuity Planning

Business Continuity Planning Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more

More information

Tailored Technologies LLC

Tailored Technologies LLC 685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations

More information

Information Technology Internal Controls Part 2

Information Technology Internal Controls Part 2 IT Controls Webinar Series Information Technology Internal Controls Part 2 Presented by the Arizona Office of the Auditor General October 23, 2014 Part I Overview of IT Controls and Best Practices Part

More information

Disaster Recovery Plan

Disaster Recovery Plan Disaster Recovery Plan Disasters that can cause hardware, software and data loss such as fire are inevitable. One can minimize the losses by formulating a plan to recover from such disasters and to keep

More information

IT Service Management

IT Service Management IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security

More information

U. S. Department of Energy Consolidated Audit Program Checklist 5 Laboratory Information Management Systems Electronic Data Management

U. S. Department of Energy Consolidated Audit Program Checklist 5 Laboratory Information Management Systems Electronic Data Management U. S. Department of Energy Consolidated Audit Program Checklist 5 Laboratory Information Management Systems Electronic Data Management Revision 4.0 February 2014 Use of this DOECAP checklist is authorized

More information

INFORMATION SECURITY OVERVIEW

INFORMATION SECURITY OVERVIEW INFORMATION SECURITY OVERVIEW December 2003 TABLE OF CONTENTS 1 INTRODUCTION... 1 1.1 SECURITY POLICY HIGHLIGHTS... 1 1.1.1 INFORMATION SECURITY POLICY RECAP... 1 1.1.2 NETWORK POLICY RECAP... 2 1.2 COMPUTER

More information

HIPAA Privacy and Security Risk Assessment and Action Planning

HIPAA Privacy and Security Risk Assessment and Action Planning HIPAA Privacy and Security Risk Assessment and Action Planning Practice Name: Participants: Date: MU Stage: EHR Vendor: Access Control Unique ID and PW for Users (TVS016) Role Based Access (TVS023) Account

More information