Siemens Medical Solutions USA, Inc. INVISION ACO and RCO Services

Size: px
Start display at page:

Download "Siemens Medical Solutions USA, Inc. INVISION ACO and RCO Services"

Transcription

1 Siemens Medical Solutions USA, Inc. INVISION ACO and RCO Services Independent Service Auditor s Report on s Placed in Operation and Tests of Operating Effectiveness For the Period of April 1, 2008, to September 30, 2008

2 TABLE OF CONTENTS SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 1 SECTION 2 DESCRIPTION OF CONTROLS PLACED IN OPERATION... 4 OVERVIEW OF OPERATIONS... 5 Company Background... 5 Description of Other Services Provided... 5 CONTROL ENVIRONMENT... 6 Integrity and Ethical Values... 6 Commitment to Competence... 6 Senior Executive and Audit Committee Participation... 7 Management s Philosophy and Operating Style... 7 Organizational Structure and Assignment of Authority And Responsibility... 7 Human Resource Policies and Practices... 9 RISK ASSESSMENT CONTROL OBJECTIVES AND RELATED CONTROL ACTIVITIES MONITORING INFORMATION AND COMMUNICATION SYSTEMS Information Systems Communication Systems COMPLEMENTARY CONTROLS AT USER ORGANIZATIONS SECTION 3 TESTING MATRICES PHYSICAL SECURITY ENVIRONMENTAL SECURITY COMPUTER OPERATIONS INFORMATION SECURITY APPLICATION CHANGE CONTROL DATA COMMUNICATIONS PATIENT ACCOUNTING GENERAL LEDGER ACCOUNTS PAYABLE HUMAN RESOURCES (PAYROLL) SECTION 4 OTHER INFORMATION PROVIDED BY MANAGEMENT REGULATORY AND COMPLIANCE STRATEGIC SUPPORT OF DISASTER RECOVERY MANAGEMENT S RESPONSE TO TESTING EXCEPTIONS Siemens Medical Solutions USA, Inc. Proprietary and Confidential i

3 SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT Siemens Medical Solutions USA, Inc. 1

4 INDEPENDENT SERVICE AUDITOR S REPORT To Siemens Medical Solutions USA, Inc.: We have examined the accompanying description of controls related to the INVISION ACO and RCO services of Siemens Medical Solutions USA, Inc. ( Siemens or the service organization ) performed at the Malvern, Pennsylvania, facility. Our examination included procedures to obtain reasonable assurance about whether (1) the accompanying description presents fairly, in all material respects, the aspects of Siemens controls that may be relevant to a user organization s internal control as it relates to an audit of financial statements; (2) the controls included in the description were suitably designed to achieve the control objectives specified in the description, if those controls were complied with satisfactorily, and user organizations applied the controls contemplated in the design of Siemens controls; and (3) such controls had been placed in operation as of September 30, The control objectives were specified by the management of Siemens. Our examination was performed in accordance with standards established by the American Institute of Certified Public Accountants and included those procedures we considered necessary in the circumstances to obtain a reasonable basis for rendering our opinion. In our opinion, the accompanying description of the aforementioned INVISION ACO and RCO services presents fairly, in all material respects, the relevant aspects of Siemens controls that had been placed in operation as of September 30, Also, in our opinion, the controls, as described, are suitably designed to provide reasonable assurance that the specified control objectives would be achieved if the described controls were complied with satisfactorily and user organizations applied the controls contemplated in the design of Siemens controls. In addition to the procedures we considered necessary to render our opinion as expressed in the previous paragraph, we applied tests to specific controls, listed in Section 3 (the Testing Matrices ), to obtain evidence about their effectiveness in meeting the control objectives, described in the Testing Matrices, during the period from April 1, 2008, to September 30, The specific controls and the nature, timing, extent, and results of the tests are listed in the Testing Matrices. This information has been provided to user organizations of Siemens and to their auditors to be taken into consideration, along with information about the internal control at user organizations, when making assessments of control risk for user organizations. In our opinion, the controls that were tested, as described in the Testing Matrices, were operating with sufficient effectiveness to provide reasonable, but not absolute, assurance that the control objectives specified in the Testing Matrices were achieved during the period from April 1, 2008, to September 30, However, the scope of our engagement did not include tests to determine whether control objectives not listed in the Testing Matrices were achieved; accordingly, we express no opinion on the achievement of control objectives not included in the Testing Matrices. The relative effectiveness and significance of specific controls at Siemens and their effect on assessments of control risk at user organizations are dependent on their interaction with the controls and other factors present at individual user organizations. We have performed no procedures to evaluate the effectiveness of controls at individual user organizations. The description of controls at Siemens is as of September 30, 2008, and information about tests of the operating effectiveness of specific controls covers the period from April 1, 2008, to September 30, Any projection of such information to the future is subject to the risk that, because of change, the description may no longer portray the controls in existence. The potential effectiveness of specific controls at Siemens is subject to inherent limitations and, accordingly, errors or fraud may occur and not be detected. Furthermore, the projection of any conclusions, based on our findings, to future periods is subject to the risk that changes made to the system or controls, or the failure to make needed changes to the system or controls, may alter the validity of such conclusions. Siemens Medical Solutions USA, Inc. 2

5 The information in Section 4 is presented by Siemens to provide additional information and is not a part of Siemens description of controls that may be relevant to a user organization s internal control as it relates to an audit of financial statements. Such information has not been subjected to the procedures applied in the examination of the description of the INVISION ACO and RCO services, and accordingly, we express no opinion on it. This report is intended solely for use by the management of Siemens, its user organizations, and the independent auditors of its user organizations. November 7, 2008 Siemens Medical Solutions USA, Inc. 3

6 SECTION 2 DESCRIPTION OF CONTROLS PLACED IN OPERATION Siemens Medical Solutions USA, Inc. Proprietary and Confidential 4

7 OVERVIEW OF OPERATIONS Company Background Siemens Medical Solutions of Siemens AG (Siemens) (NYSE: SI), with headquarters in Malvern, Pennsylvania and Erlangen, Germany, is one of the largest suppliers to the healthcare industry in the world. The company is known for bringing together innovative medical technologies, healthcare information systems, consulting, and support services to help customers achieve tangible, sustainable, clinical, and financial outcomes. In 2007, Siemens finalized the acquisition on Bayer Diagnostics as well as Dade Behring Holdings, Inc., making Siemens Medical Solutions Diagnostics the largest clinical diagnostics company in the world. As the world s first full-service diagnostics company, Siemens is committed to addressing the complex challenges facing the healthcare industry, today and tomorrow. Siemens Medical Solutions employs approximately 15,000 people in the United States and 48,000 people worldwide in over 130 countries and is a key business unit of Siemens AG (Munich, Germany, NYSE: SI), a leading global electronics and engineering company. Siemens Medical Solutions reported 2007 fiscal year revenue of billion EURO. From imaging systems for diagnosis, to therapy equipment for treatment, to patient monitors and hearing instruments and beyond, Siemens innovations contribute to the health and well-being of people across the globe, while improving operational efficiencies and optimizing workflow in hospitals, clinics, and doctors offices. Siemens also offers a variety of data management solutions for customers and is currently a leading Application Service Provider in the healthcare industry. Also headquartered in Malvern, the healthcare information technology (IT) division of Siemens Medical Solutions is Siemens Medical Solutions USA (Siemens Health Services). The contributions of this division have been widely recognized among industry leaders. Holding the leadership position in healthcare IT for over 35 years, Siemens Health Services is committed to helping health organizations achieve proven outcomes and improve quality of care, financial performance, and strategic position through innovative, workflow-based solutions. The group operates one of the health industry s largest processing environments including the Siemens Health Services Information Systems Center (ISC) and Health Information Network for application hosting, E-commerce, enterprise systems management, and managed Internet and infrastructure services. As a leading Application Service Provider (ASP) in healthcare, the company operates health applications for over 1,000 health providers with connections to over 500,000 customer workstations, and processes 157 million transactions each day. Description of Other Services Provided Siemens Health Services products are offered to healthcare facilities of all types (urban, teaching, suburban, rural, specialty, proprietary hospital companies, not-for-profit multi-entity groups, and integrated health networks). These products include a full range of software systems that use diverse computing and networking technologies including remote processing, distributed processing systems, and onsite systems. Siemens Health Services also provides professional services related to its information processing systems business. Domestically, Siemens Health Services markets its products and provides installation services and ongoing technical and educational support with a field staff working from branch offices. The Siemens Health Services Corporate Headquarters and ISC are based in Chester County, Pennsylvania, residing on a 116-acre campus. The Siemens Health Services customer service staff, applications specialists, and communications and computer operations personnel who assist customers in their day-to-day use of Siemens Health Services products are located at the Corporate Headquarters. System designers and programmers, who work to enhance existing programs and develop additional data processing products, are also located at the Corporate Headquarters. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 5

8 INVISION Financials INVISION Financials is a cost-effective billing and receivables management solution that presents clear, concise patient accounting information. Access to patient accounting information can be gained through a Web-enabled browser enabling online access across the enterprise. INVISION Financials helps streamline your patient accounting processes by improving the way you look at and analyze data. Relevant information is captured on main screens with one-click access to supporting data. All patient accounting information can be selected by the appropriate patient view from a single top-level navigator area. The information screens reside at the same level and are accessible from one navigation point; no pathways are hidden from your view. And by offering online access across the enterprise, INVISION Financials helps the patient accounting team communicate and collaborate. INVISION Financials is complemented by and integrated with other Siemens Patient Financial Service solutions including INVISION Contract Management. This full suite of solutions supports a variety of care settings with insurance processing, billing, claims, and collection solutions. CONTROL ENVIRONMENT Integrity and Ethical Values The effectiveness of controls cannot rise above the integrity and ethical values of the people who create, administer, and monitor them. Integrity and ethical values are essential elements of Siemens control environment, affecting the design, administration, and monitoring of other components. Integrity and ethical behavior is the product of Siemens ethical and behavioral standards, how they are communicated, and how they are reinforced in practices. They include management s actions to remove or reduce incentives and temptations that might prompt personnel to engage in dishonest, illegal, or unethical acts. They also include the communication of entity values and behavioral standards to personnel through policy statements and codes of conduct. Specific control activities that Siemens has implemented in this area are described below. Management maintains documented standards of performance and conduct that communicate entity values and behavioral standards. Management requires employees to sign a series of acknowledgment forms indicating that they have been given access to the company policies and understand their responsibility for adhering to the policies and procedures. Management requires that employees sign a confidentiality statement agreeing not to disclose proprietary or confidential information, including client information, to unauthorized parties. Management performs background checks for employment candidates as a component of the hiring process. Management performs drug screenings for employment candidates as a component of the hiring process. Commitment to Competence Siemens management defines competence as the knowledge and skills necessary to accomplish tasks that define employees roles and responsibilities. Siemens commitment to competence includes management s consideration of the competence levels for particular jobs and how those levels translate into requisite skills and knowledge. Siemens has an internal education department responsible for educating Siemens employees on Siemens products and new technologies. Siemens employees also attend industry trade shows, conferences, seminars, and external education classes. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 6

9 Siemens tuition reimbursement programs encourage employees to continue their educational development. Specific control activities that Siemens has implemented in this area are described below. Management considers the competence levels for particular jobs and translates required skills and knowledge levels into written position requirements. Management maintains processes to assess job candidates to determine whether the candidates possess the requisite level of competence to hold positions. Management provides training sessions to employees in the Hosting and Support Services departments (EHS and CSC) to maintain and advance the skill level of personnel. Senior Executive and Audit Committee Participation Siemens control consciousness is influenced significantly by the participation of Siemens senior executives and audit committee. Specific control activities that Siemens has implemented in this area are described below. The senior executive team (SET) oversees the health services (HS) management activities and meets on a monthly basis to discuss matters pertinent to the HS operations. Management utilizes internal audits to assess the effectiveness of internal controls and management s compliance with organizational objectives. Management s Philosophy and Operating Style Siemens management philosophy and operating style encompasses a broad range of characteristics. Such characteristics include management s approach to taking and monitoring business risks; and management s attitudes toward information processing, accounting functions and personnel. A written set of accounting policies and procedures has been developed and updated when needed. Frequent analysis and review is performed on all financial reporting. Internal leadership meetings are held to discuss current operations and forecast projects. There are also management meetings among the various operational business units. Specific control activities that Siemens has implemented in this area are described below. Management is periodically briefed on regulatory and industry changes affecting services provided. Management requires employees to complete online compliance training. Enterprise hosting services (EHS) senior management meetings are held on a monthly basis to discuss operational issues. Additionally, EHS managers meet weekly to discuss operational and training issues. Management has implemented a compliance hotline for worldwide employees to contact regarding questions related to compliance. Organizational Structure and Assignment of Authority and Responsibility Siemens organizational structure provides the framework within which its activities for achieving entitywide objectives are planned, executed, controlled, and monitored. Siemens management believes that establishing a relevant organizational structure includes considering key areas of authority and responsibility and appropriate lines of reporting. Siemens has developed an organizational structure suited to its needs. This organizational structure is based, in part, on its size and the nature of its activities. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 7

10 Siemens assignment of authority and responsibility activities include factors such as how authority and responsibility for operating activities are assigned and how reporting relationships and authorization hierarchies are established. It also includes policies relating to appropriate business practices, knowledge and experience of key personnel, and resources provided for carrying out duties. In addition, it includes policies and communications directed at ensuring that all personnel understand the entity s objectives, know how their individual actions interrelate and contribute to those objectives, and recognize how and for what they will be held accountable. Specific control activities that Siemens has implemented in this area are described below. Management utilizes organizational charts to communicate key areas of authority, responsibility and lines of reporting to personnel. Management establishes segregation of duties for key areas of authority, job responsibilities and lines of reporting. The Siemens Health Services organizational control structure (see Figures 1 and 2 below) is divided into four primary areas as it relates to the INVISION ACO and RCO product lines: Global Services (GS) is responsible for Enterprise Hosting Solutions (including Systems Administration & Operations) and the Customer Service Center. Foundation Enterprise Systems (FES) is responsible for application development and support, software management, and application quality control. Business Administration is responsible for Siemens Health Services accounting and finance, and legal, functions. Health Services Human Resources reports into a Siemens Health Services Human Resources organization, but is matrixed to the President and CEO of Health Services. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 8

11 Figure 1 Siemens Health Services Organization Chart (Malvern, Pennsylvania) Figure 2 Siemens AG (Germany) Organization Chart Human Resource Policies and Practices Siemens human resources policies and practices relate to employee hiring, orientation, training, evaluation, counseling, promotion, compensation, and disciplinary activities. Siemens employs a number of policies and procedures to standardize the hiring process and employee performance and conduct. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 9

12 Siemens uses a third party vendor to verify information listed on the Siemens Application for Employment. Specific control activities that Siemens has implemented in this area are described below. Management completes annual performance evaluations for employees. Management has established employee termination procedures to guide personnel in the termination process. RISK ASSESSMENT Siemens management has placed into operation a risk assessment process to identify and manage risks that could affect the organization's ability to provide reliable transaction processing for user organizations. This process requires management to identify significant risks in their areas of responsibility and to implement appropriate measures to address those risks. Risks that are considered during management s risk assessment activities include consideration of the following events: Changes in operating environment New personnel New or revamped information systems Rapid growth New technology New business models, products, or activities Corporate restructurings Expanded operations New accounting pronouncements Management s recognition of risks that could affect the organization s ability to provide reliable transaction processing for its user organizations is generally implicit, rather than explicit. Management s involvement in the daily operations allows them to learn about risks related to transaction processing through direct personal involvement with employees and outside parties, thus reducing the need for formalized and structured risk assessment processes. CONTROL OBJECTIVES AND RELATED CONTROL ACTIVITIES Siemens control objectives and related control activities are included in Section 3 (the Testing Matrices ) of this report in order to eliminate the redundancy that would result from listing them in this section and repeating them in the Testing Matrices. Although the control objectives and related control activities are included in the Testing Matrices, they are, nevertheless, an integral part of the description of controls. The description of the service auditor s tests of operating effectiveness and the results of those tests are also presented in the Testing Matrices, adjacent to the service organization s description of controls. The description of the tests of operating effectiveness and the results of those tests are the responsibility of the service auditor and should be considered information provided by the service auditor. Note: The scope of this service auditor s report is limited to the INVISION ACO services (also known as the Auxiliary Computing Option ) and the INVISION RCO (also known as the Remote Computing Option and Application ). The following control objectives relate to RCO services only: Computer Operations, Information Security, Application Change and Data Communications. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 10

13 MONITORING Monitoring is generally performed through active hands-on management, including the monthly management meeting to discuss operational issues, key performance statistics such as daily sales volume, customer service call volume and response rate, chargeback ratios, etc. Members of executive management, including the chief executive officer and chief operating officer/president, visit satellite offices on a regular basis and hold Town Hall Meetings to convey an open culture, discuss issues with employees, and to ensure businesses are operating at management s expectation. Executive management is hands on, and extremely active in the business. Siemens monitors business units and other auditable entities throughout the organization utilizing a risk-based approach in the selection of its audit population to ensure that enterprise-wide risks are prioritized and addressed in order of significance. Results from these audits are documented in formal communications to executive management and other relevant parties. INFORMATION AND COMMUNICATION SYSTEMS Information Systems The healthcare information systems Siemens offers gives customers flexibility when setting up and configuring their computing alternatives. Customers select their transaction processing options and activate related audit trails. Similarly, each customer has the ability to verify the accuracy of transaction processing activity through the use of control reports or other audit trails. The ISC serves as the central processing site for Siemens Health Services. The ISC is a 94,000 square foot facility housing servers, online disk storage (DASD), tape management, tape library, production, and distribution. Office space in the ISC is dedicated to ISC support personnel. The ISC and its support areas are responsible for all data processing. The physical construction of the building is designed to provide the security and integrity of a 24 hour per day, 365 days per year processing operation. The building is made of precast and poured concrete with firewalls separating computer operations to minimize potential fire damage through containment. Exterior emergency exit doors are made of steel and designed to prohibit outside access. All exterior doors are secured and monitored by an electronic alarm system and surveillance cameras. The main entrance to the ISC is equipped with a cardkey reader and a biometric palm scanner to restrict access to authorized personnel. Additional cardkey readers are installed throughout the building to provide access to restricted areas by authorized personnel. The only exterior windows are located in the second floor offices, cafeteria, and first floor reception area. The ISC is equipped with redundant environmental control systems to provide for continuous, uninterrupted operation. The following is a description of the functional and support areas of the organizations that participate in the development, operations, and support of the INVISION product: Systems Management and Operations. This group ensures that all processing is performed for customers 24 hours/day, seven days/week. This includes supporting all Siemens Health Services product lines that run in the ISC as well as all environments required for development and support of these products. Operations are also responsible for ensuring the integrity of the Data Storage Facility, and for printing and distributing patient statements, reports, and CD-ROM. o Change Administration. As a subgroup within Systems Management and Operations, this group is responsible for reviewing all change requests for approval and performs updates to source and executable program libraries upon authorization and approval. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 11

14 Business Recovery Services and Security. o o Business Recovery Services. As a subgroup within Business Recovery Services and Security, this group is responsible for the business recovery planning process for ISCbased Siemens Health Services products. Security. As a subgroup within Business Recovery Services and Security, Security consists of two groups, the Security Analysts and the Security Admins. The Security Analysts are responsible for coordinating company-wide standards and guidelines for Information Security safeguards pertaining to data residing in the ISC. They provide support for the review, counsel, education, and communication of computer security administration procedures. Information Security implements and maintains Security software products. The Security Admins administer security rights and privileges in accordance with the standards and guidelines developed by the Security Analysts. Systems and R&D. This group is responsible for the installation, maintenance, and support of the operating systems, network, and all other third party software. The Systems and R&D groups maintain high availability and performance for the ISC by providing appropriate hardware and software products. The Systems and R&D groups consist of the following: o o o Storage & Backup Technologies. This group is responsible for the storage subsystem and for backup technologies. zseries Systems and Networking. This group is responsible for the administration of CICS systems. This includes systems maintenance, availability, performance, support, and related software development. Infrastructure. This group is responsible for providing the third party software products to run as the infrastructure for the hosted products in the ISC. Network Support Center. This group is responsible for the support of Siemens Health Services customer data network and Siemens Health Services data and voice networks. Foundation Enterprise Systems. This group is responsible for developing and implementing new applications and maintaining and enhancing current applications. Within this group are the General Ledger, Patient Accounting, Human Resources (Payroll), Accounts Payable, and Online Architectural Software Groups. Siemens does not record, process, summarize, or report the financial transactions of our user organizations. Additionally, Siemens does not maintain accountability for any client assets, liabilities, or equity. Communication Systems Siemens Health Services has implemented various methods of communication to help ensure that significant events are communicated in a timely manner and that employees understand their roles and responsibilities regarding transaction processing and controls. These methods include orientation and training programs for newly hired employees and the use of electronic and voice mail messages to communicate time-sensitive messages. Siemens Health Services managers also hold regular staff meetings to communicate these matters. Employees are responsible for communicating significant issues in a timely manner to an appropriate higher level within the organization or through the Compliance Hotline. Siemens Health Services has also implemented various methods of communication to notify user organizations of the role and responsibilities of Siemens Health Services in processing their transactions and to notify customers of significant concerns in a timely manner. These methods include onsite training, periodic newsletters, product announcements, and a Relationship Manager who maintains contact with customers to inform them of new issues and developments. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 12

15 Customer questions and problems communicated to Customer Service Representatives are logged and tracked until resolved; and the resolution is reported to the user organizations. COMPLEMENTARY CONTROLS AT USER ORGANIZATIONS Siemens services are designed with the assumption that certain controls will be implemented by user organizations. Such controls are called complementary user organization controls. It is not feasible for all of the control objectives related to Siemens services to be solely achieved by Siemens control procedures. Accordingly, user organizations, in conjunction with the services, should establish their own internal controls or procedures to complement those of Siemens. The following complementary user organization controls should be implemented by user organizations to provide additional assurance that the control objectives described within this report are met. As these items represent only a part of the control considerations that might be pertinent at the user organizations locations, users auditors should exercise judgment in selecting and reviewing these complementary user organization controls. Complementary User Organization s: 1. User organizations are responsible for informing Siemens of any regulatory issues that may affect the services provided by Siemens to the user organization. 2. User organizations are responsible for understanding and complying with their contractual obligations to Siemens. 3. User organizations are responsible for maintaining their own system(s) of record. 4. User organizations are responsible for notifying Siemens, in a timely manner, when changes are made to technical, billing or administrative contact information. 5. User organizations are responsible for developing their own disaster recovery and business continuity plans that address their inability to access or utilize Siemens services. 6. User organizations are responsible for defining the communications method utilized to connect to Siemens systems (e.g., direct connections, over public networks, etc.). 7. User organizations are responsible for ensuring that user ids and passwords are assigned to only authorized individuals and that the roles assigned to the user account are appropriate. Each user should have a unique ID to ensure adequate accountability. 8. User organizations are responsible for ensuring that users have appropriate access within the application. 9. User organizations are responsible for maintaining sufficient documentation to support existing user access capabilities. 10. User organizations are responsible for ensuring the confidentiality of any user IDs and passwords assigned to them for use with Siemens systems. 11. User organizations are responsible for changing the default passwords associated with the standard IDs provided with the system. 12. User organizations are responsible for ensuring that Siemens is notified of any required user account maintenance in a timely manner. 13. User organizations are responsible for immediately notifying Siemens of any actual or suspected information security breaches, including compromised user accounts. 14. User organizations are responsible for determining whether Siemens security infrastructure is appropriate for its needs and for notifying the service organization of any requested modifications. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 13

16 15. User organizations are responsible for reviewing all client reports generated via the OAS reporting tools, or from other environments not included within the scope of this review, to ensure the completeness and accuracy of information processed. 16. User organizations are responsible for ensuring that access to the various OAS Builders is restricted to only appropriate personnel. 17. User organizations are responsible for establishing standards, procedures, and controls for using each of the OAS builders to help ensure that the builders are used in accordance with management s control objectives. 18. User organizations are responsible for regularly reviewing OAS logs to ensure that only authorized Siemens Health Services account representatives are using the SMSMAS ID within their system, that all use is appropriate and authorized, and that there are no unauthorized access attempts. 19. User organizations are responsible for ensuring that access is restricted to the VSAM transfer utility by removing the menu option from user profiles or by creating an access rule that only allows certain users to use the tool. 20. User organizations are responsible for producing and reviewing all automated balancing reports (ABS) and reconcile daily processing activities to source documentation and/or input control totals. 21. User organizations are responsible for producing and reviewing the transaction control and error (TCE) report to identify transaction errors and processing rejects on a daily basis. Appropriate procedures should be implemented to ensure the timely correction of these items. 22. User organizations are responsible for ensuring that their employees are adequately trained to use Siemens Health Services applications. 23. User organizations are responsible for understanding all application control features, system options, and reporting capabilities of the Siemens Health Services Patient Accounting, General Ledger, Accounts Payable, Human Resources (Payroll), and OAS applications and ensure that application parameters, log files, and reporting options are set in a manner that promotes adequate control and are set in accordance with management s control objectives. 24. User organizations are responsible for checking the customer memo Intranet site daily to receive customer memo information. 25. User organizations are responsible for reviewing the transmittal summary reports to ensure that the payroll totals were accurate and matched the payroll day end processing report totals. 26. User organizations are responsible for submitting accurate and complete payroll data. 27. User organizations are responsible for implementing appropriate controls to ensure that the W-2 master files are complete and accurate for tax reporting purposes. 28. User organizations are responsible for determining that parameters within the General Ledger application, which permit debits to equal (not equal) credits for all entries, have been properly set in accordance with management s objectives. 29. User organizations are responsible for ensuring that the General Ledger Master File and the various conversion tables for interfacing products are error free. This includes reviewing and disposing of information submitted from Accounts Payable, Human Resources (Payroll), or other applications to the General Ledger default account numbers to ensure that information is accurately recorded. It is the user organization s responsibility to properly address and dispose of all noted errors. 30. User organizations are responsible for ensuring that all appropriate General Ledger and Statistical account numbers have been included in the appropriate report lines. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 14

17 31. User organizations are responsible for reviewing their GC or general queue daily for error, balancing and reconciliation reports. 32. User organizations are responsible for reviewing the Accounts Payable Register (AP-REG) for Accounts Payable Data Collection, Accounts Payable Online Invoice File Maintenance Report (APPOMAR), the Balance Report (APBAL) to reconcile the ending balances, and the Accounts Payable Update-Error List Report (APREGER) for transmissions errors. 33. User organizations are responsible for ensuring that AP related invoices are entered into the system at the individual invoice level rather than summary form to provide an appropriate level of accountability over invoice activity. 34. User organizations are responsible for ensuring that appropriate physical security controls, with respect to Accounts Payable and Human Resources (Payroll) check printing activities, are in place to promote an adequate physical security environment over check stock, signature plates, and check printing areas, and adequate segregation of duties over check printing activities. 35. User organizations are responsible for ensuring that the AP related option is activated to enable checking for duplicate voucher numbers. 36. User organizations are responsible for ensuring that the AP 1099 master files are complete and accurate for tax reporting purposes. 37. User organizations are responsible for ensuring that the electronic AP information forwarded by Siemens Health Services to the IRS or relevant third parties, such as financial institutions, is complete and accurate and reconciles to their 1099 records. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 15

18 SECTION 3 TESTING MATRICES Siemens Medical Solutions USA, Inc. Proprietary and Confidential 16

19 MATRIX 1 Objective Specified : PHYSICAL SECURITY activities provide reasonable assurance that business premises and information systems are protected from unauthorized access, damage and interference. 1.1 Management maintains Information Service Center (ISC) physical security policies and procedures that define requirements for access, authentication and monitoring. 1.2 Security personnel monitor access to the ISC facility 24 hours per day. 1.3 Surveillance cameras monitor and record activity at entrances and throughout the ISC. 1.4 ISC visitors are required to register with security personnel and provide valid government issued identification before gaining access to the facility. Inspected the ISC physical security policies to determine that ISC physical security policies and procedures defined requirements for access and authentication. Inspected the CCTV Monitoring Facilities Policies and Procedures to determine that policies and procedures defined requirements for monitoring. Inspected the ISC surveillance monitoring procedures and security personnel work schedules to determine that security personnel monitored access to the ISC facility 24 hours per day. Observed ISC surveillance cameras to determine that surveillance cameras monitored and recorded activity at entrances and throughout the ISC. Observed visitor procedures to determine that ISC visitors registered with security personnel and provided valid government issued identification before gaining access to the facility. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 17

20 MATRIX 1 Objective Specified : PHYSICAL SECURITY activities provide reasonable assurance that business premises and information systems are protected from unauthorized access, damage and interference. 1.4 (Cont.) Inspected the electronic ISC visitor log to determine that visitors registered with security personnel when accessing the facility during the review period. 1.5 Visitors to the ISC are required to be escorted by an employee assigned to the ISC. 1.6 The ability to perform tours of the ISC is restricted to the following personnel: Senior director of information technology Director of information technology Operations analyst (5) 1.7 Vendor access to the ISC is restricted to vendors listed on an authorized vendor list. Observed visitor access procedures to determine that visitors to the ISC were escorted by an employee assigned to the ISC. Inspected the authorized tour guide list to determine that the ability to perform tours of the ISC was restricted to the following personnel: Senior director of information technology Director of information technology Operations analyst (5) Inspected tour logs for a nonstatistical sample of tours performed during the review period to determine that each tour sampled was performed by an authorized tour guide. Inquired of the IT director regarding vendor access to determine that vendor access to the ISC was restricted to an authorized vendor list. Inspected a nonstatistical sample of vendors from the data center badge access list and compared to the authorized vendor access list to determine that vendor badge access holders were listed on the authorized vendor list. Siemens Medical Solutions USA, Inc. Proprietary and Confidential 18

CoreSite A Carlyle Company. 70 Innerbelt Colocation Services

CoreSite A Carlyle Company. 70 Innerbelt Colocation Services CoreSite A Carlyle Company 70 Innerbelt Colocation Services Independent Service Auditor s Report on s Placed in Operation and Tests of Operating Effectiveness For the Period of October 1, 2009, to March

More information

Tom J. Hull & Company Type 1 SSAE 16 2014

Tom J. Hull & Company Type 1 SSAE 16 2014 Tom J. Hull & Company Type 1 SSAE 16 2014 REPORT ON MANAGEMENT S DESCRIPTION OF TOM J. HULL & COMPANY S SYSTEM AND THE SUITABILITY OF THE DESIGN OF CONTROLS Pursuant to Statement on Standards for Attestation

More information

AND ONLINE SETTLEMENT REPORTING APPLICATION (ACCESSibility)

AND ONLINE SETTLEMENT REPORTING APPLICATION (ACCESSibility) AUTOMATED MidAmerica CLEARINGHOUSE Administrative & Retirement CALL Solutions, Inc. EXCHANGE Plan SETTLMENT Administration Services SYSTEM (ACCESS) AND ONLINE SETTLEMENT REPORTING APPLICATION (ACCESSibility)

More information

IT - General Controls Questionnaire

IT - General Controls Questionnaire IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow

More information

SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013

SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES

More information

UCS Level 2 Report Issued to

UCS Level 2 Report Issued to UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification

More information

SOC 2 Report Seattle, WA (SEF)

SOC 2 Report Seattle, WA (SEF) SOC 2 Report Seattle, WA (SEF) October 1, 2013 January 31, 2014 Independent Service Auditor s Report INTERNAP NETWORK SERVICES CORPORATION Company-Controlled Data Center Services Type 2 Report on Controls

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

Information Technology General Controls Review (ITGC) Audit Program Prepared by: Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology

Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology 6G Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology TABLE OF CONTENTS Page Report on Internal Controls Related to Information Technology Network and Network Security 1

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

System Security Plan University of Texas Health Science Center School of Public Health

System Security Plan University of Texas Health Science Center School of Public Health System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many

More information

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Managed Hosting & Datacentre PCI DSS v2.0 Obligations Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version

More information

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures 1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities

More information

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office. GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers

More information

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.

More information

SOC 1 (SSAE NO. 16) TYPE 2 REPORT ON CONTROLS PLACED IN OPERATION FOR DATA CENTER SERVICES BROADRIVER INC. AUGUST 1, 2014 TO JULY 31, 2015

SOC 1 (SSAE NO. 16) TYPE 2 REPORT ON CONTROLS PLACED IN OPERATION FOR DATA CENTER SERVICES BROADRIVER INC. AUGUST 1, 2014 TO JULY 31, 2015 SOC 1 (SSAE NO. 16) TYPE 2 REPORT ON CONTROLS PLACED IN OPERATION FOR DATA CENTER SERVICES BROADRIVER INC. AUGUST 1, 2014 TO JULY 31, 2015 BROADRIVER INC. Table of Contents SECTION 1: INDEPENDENT SERVICE

More information

Powering the Cloud Desktop: OS33 Data Centers

Powering the Cloud Desktop: OS33 Data Centers OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets

More information

SECTION I: REPORT OF INDEPENDENT SERVICE AUDITORS... 3 SECTION II: MANAGEMENT OF INTERNAP NETWORK SERVICES CORPORATION'S ASSERTION 5

SECTION I: REPORT OF INDEPENDENT SERVICE AUDITORS... 3 SECTION II: MANAGEMENT OF INTERNAP NETWORK SERVICES CORPORATION'S ASSERTION 5 SOC 2 - Availability Report on Internap Network Services Corporation's Description of its SEF Company-Controlled Data Center System and Suitability of Design and Operating of Controls Throughout the Period

More information

Stone Vault, LLC SOC 1 (SSAE NO. 16) TYPE 1 REPORT ON CONTROLS PLACED IN OPERATION FOR TAX RETURN AND FINANCIAL STATEMENT PORTAL SERVICES

Stone Vault, LLC SOC 1 (SSAE NO. 16) TYPE 1 REPORT ON CONTROLS PLACED IN OPERATION FOR TAX RETURN AND FINANCIAL STATEMENT PORTAL SERVICES SOC 1 (SSAE NO. 16) TYPE 1 REPORT ON CONTROLS PLACED IN OPERATION FOR TAX RETURN AND FINANCIAL STATEMENT PORTAL SERVICES Stone Vault, LLC JANUARY 31, 2013 STONE VAULT, LLC Table of Contents SECTION 1:

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

The Commonwealth of Massachusetts

The Commonwealth of Massachusetts A. JOSEPH DeNUCCI AUDITOR The Commonwealth of Massachusetts AUDITOR OF THE COMMONWEALTH ONE ASHBURTON PLACE, ROOM 1819 BOSTON, MASSACHUSETTS 02108 TEL. (617) 727-6200 No. 2008-1308-4T OFFICE OF THE STATE

More information

DETAIL AUDIT PROGRAM Information Systems General Controls Review

DETAIL AUDIT PROGRAM Information Systems General Controls Review Contributed 4/23/99 by Steve_Parker/TBE/Teledyne@teledyne.com DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant to Security and Availability

Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant to Security and Availability 15301 Dallas Parkway, Suite 960, Addison, TX 75001 MAIN 214 545 3965 FAX 214 545 3966 www.bkmsh.com Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Internal Control Guide & Resources

Internal Control Guide & Resources Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed

More information

Independent Service Auditors Report

Independent Service Auditors Report Independent Service Auditors Report To the Officers of Group Resources Duluth, Georgia We have examined the accompanying description of the controls of Group Resources. Our examination included procedures

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

INFORMATION TECHNOLOGY CONTROLS

INFORMATION TECHNOLOGY CONTROLS CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,

More information

SAS 70 Type II Audits

SAS 70 Type II Audits Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

Master Document Audit Program

Master Document Audit Program Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on

More information

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the

More information

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS

GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 sales@i2cinc.com www.i2cinc.com Table of

More information

Appendix 1 CJC CONTRACT MANAGEMENT POLICIES AND PROCEDURES. Criminal Justice Commission Contract Management Policies and Procedures

Appendix 1 CJC CONTRACT MANAGEMENT POLICIES AND PROCEDURES. Criminal Justice Commission Contract Management Policies and Procedures CJC CONTRACT MANAGEMENT POLICIES AND PROCEDURES SNYOPSIS: The CJC was created by a Palm Beach County ordinance in 1988. It has 21 public sector members representing local, state, and federal criminal justice

More information

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of

More information

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C

UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information

More information

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,

More information

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010

ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 ASCINSURE SPECIALTY RISK PRIVACY/SECURITY PLAN July 15, 2010 OBJECTIVE This Security Plan (the Plan ) is intended to create effective administrative, technical and physical safeguards for the protection

More information

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS

CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS 11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

<COMPANY> P01 - Information Security Policy

<COMPANY> P01 - Information Security Policy P01 - Information Security Policy Document Reference P01 - Information Security Policy Date 30th September 2014 Document Status Final Version 3.0 Revision History 1.0 09 November 2009: Initial release.

More information

Auditing in an Automated Environment: Appendix C: Computer Operations

Auditing in an Automated Environment: Appendix C: Computer Operations Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations

More information

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY

CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY CONNECTICUT RIVER WATERSHED COUNCIL, INC. DOCUMENT MANAGEMENT & WRITTEN INFORMATION SECURITY POLICY The Council s document management policy is intended to cover all documents produced and held by the

More information

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Dartmouth College Merchant Credit Card Policy for Managers and Supervisors Mission Statement Dartmouth College requires all departments that process, store or transmit credit card data remain in compliance

More information

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups

More information

Hengtian Information Security White Paper

Hengtian Information Security White Paper Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...

More information

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS Workpaper Reference Date(s) Completed Organization and Staffing procedures used to define the organization of the IT Department. 2. Review the organization

More information

AUDIT REPORT INTERNAL AUDIT DIVISION. Audit of the Riskmetrics system in the Investment Management Division of UNJSPF

AUDIT REPORT INTERNAL AUDIT DIVISION. Audit of the Riskmetrics system in the Investment Management Division of UNJSPF INTERNAL AUDIT DIVISION AUDIT REPORT Audit of the Riskmetrics system in the Investment Management Division of UNJSPF Overall results relating to the effective implementation of the Riskmetrics system were

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

1. Describe the staffing levels maintained in the IT department (change titles as needed): K. Tollefsen/1

1. Describe the staffing levels maintained in the IT department (change titles as needed): K. Tollefsen/1 Page 1 of 14 Chabot-Las Positas Community College District Reference: T500 Information System Memo Prepared by: Jeannine Methe June 30, 2005 Date: 6/8/05 Reviewed by: Instructions: This memo is designed

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

ECSA EuroCloud Star Audit Data Privacy Audit Guide

ECSA EuroCloud Star Audit Data Privacy Audit Guide ECSA EuroCloud Star Audit Data Privacy Audit Guide Page 1 of 15 Table of contents Introduction... 3 ECSA Data Privacy Rules... 4 Governing Law... 6 Sub processing... 6 A. TOMs: Cloud Service... 7 TOMs:

More information

HUMAN RESOURCES MANAGEMENT NETWORK (HRMN) SELF-SERVICE

HUMAN RESOURCES MANAGEMENT NETWORK (HRMN) SELF-SERVICE PERFORMANCE AUDIT OF HUMAN RESOURCES MANAGEMENT NETWORK (HRMN) SELF-SERVICE DEPARTMENT OF CIVIL SERVICE July 2004 ...The auditor general shall conduct post audits of financial transactions and accounts

More information

White paper. SAS Solutions OnDemand Hosting Overview

White paper. SAS Solutions OnDemand Hosting Overview White paper SAS Solutions OnDemand Hosting Overview Contents Overview...1 Cary 1 Facility Specifications...2 Cary 2 Facility Specifications (SAS New Cloud Computing Center)...3 Charlotte 1 Facility Specifications...4

More information

CREDIT CARD PROCESSING POLICY AND PROCEDURES

CREDIT CARD PROCESSING POLICY AND PROCEDURES CREDIT CARD PROCESSING POLICY AND PROCEDURES Note: For purposes of this document, debit cards are treated the same as credit cards. Any reference to credit cards includes credit and debit card transactions.

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3

MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 MAG DATACENTERS, LLC ( FORTRUST ) Service Organization Controls 3 Report on FORTRUST s Enterprise Data Center and Colocation Services System Relevant to Security and Availability For the Period October

More information

INFORMATION SECURITY POLICY. Policy for Credit Card Acceptance to Conduct College Business

INFORMATION SECURITY POLICY. Policy for Credit Card Acceptance to Conduct College Business DELAWARE COLLEGE OF ART AND DESIGN 600 N MARKET ST WILMINGTON DELAWARE 19801 302.622.8000 INFORMATION SECURITY POLICY including Policy for Credit Card Acceptance to Conduct College Business stuff\policies\security_information_policy_with_credit_card_acceptance.doc

More information

Tips to Prevent and Detect Workplace Fraud

Tips to Prevent and Detect Workplace Fraud 40 Tips to Prevent and Detect Workplace Fraud an E-book developed for you by: Table of Contents preventive controls detective controls 1. culture of ethics 2. free of moral hazards 3. risk management policy

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service) Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

Report on FTHC, LLC d/b/a Miami Data Vault s Description of its Data Center System and on the Suitability of the Design and Operating Effectiveness

Report on FTHC, LLC d/b/a Miami Data Vault s Description of its Data Center System and on the Suitability of the Design and Operating Effectiveness Report on FTHC, LLC d/b/a Miami Data Vault s Description of its Data Center System and on the Suitability of the Design and Operating (SOC 1) For the period August 1, 2014 through July 31, 2015 In Accordance

More information

Privacy Impact Assessment for the. Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS)

Privacy Impact Assessment for the. Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS) Privacy Impact Assessment for the Standardized Tracking and Accounting Reporting System- Financial Management System (STARS-FMS) United States Marshals Service Contact Point William E. Bordley Associate

More information

Audit of NSERC Award Management Information System

Audit of NSERC Award Management Information System Internal Audit Audit Report Audit of NSERC Award Management Information System TABLE OF CONTENTS 1. EXECUTIVE SUMMARY... 2 2. INTRODUCTION... 3 3. AUDIT FINDINGS- BUSINESS PROCESS CONTROLS... 5 4. AUDIT

More information

Service Organization Controls 3 Report. Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability

Service Organization Controls 3 Report. Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability Service Organization Controls 3 Report Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability for the period May 1, 2015 through October 31, 2015 Ernst &

More information

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction

More information

SERVICE ORGANIZATION CONTROL 3 REPORT

SERVICE ORGANIZATION CONTROL 3 REPORT SERVICE ORGANIZATION CONTROL 3 REPORT Digital Certificate Solutions, Comodo Certificate Manager (CCM), and Comodo Two Factor Authentication (Comodo TF) Services For the period April 1, 2013 through March

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget

Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

IT Security Standard: Computing Devices

IT Security Standard: Computing Devices IT Security Standard: Computing Devices Revision History: Date By Action Pages 09/30/10 ITS Release of New Document Initial Draft Review Frequency: Annually Responsible Office: ITS Responsible Officer:

More information

MCR Checklist for Automated Information Systems (Major Applications and General Support Systems)

MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) MCR Checklist for Automated Information Systems (Major Applications and General Support Systems) Name of GSS or MA being reviewed: Region/Office of GSS or MA being reviewed: System Owner: System Manager:

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

Draft Information Technology Policy

Draft Information Technology Policy Draft Information Technology Policy Version 3.0 Draft Date June 2014 Status Draft Approved By: Table of Contents 1.0 Introduction... 6 Background... 6 Purpose... 6 Scope... 6 Legal Framework... 6 2.0 Software

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

BUSINESS ONLINE BANKING AGREEMENT

BUSINESS ONLINE BANKING AGREEMENT BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank

More information

University System of Maryland University of Maryland Biotechnology Institute

University System of Maryland University of Maryland Biotechnology Institute Audit Report University System of Maryland University of Maryland Biotechnology Institute August 2006 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Level I - Public. Technical Portfolio. Revised: July 2015

Level I - Public. Technical Portfolio. Revised: July 2015 Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center

More information

Internal Control Guidelines

Internal Control Guidelines Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth

More information

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose

More information

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format. Policy Number: 339 Policy Title: Credit Card Processing Policy, Procedure, & Standards Review Date: 07-23-15 Approval Date: 07-27-15 POLICY: All individuals involved in handling credit and debit card transactions

More information