The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014
|
|
|
- Eustace Boone
- 10 years ago
- Views:
Transcription
1 The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014
2 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local government as a whole, when possible. Assign a separate cash drawer to each employee responsible for collecting cash. Restrictively endorse checks as soon as they are received. Instruct collectors that personal or payroll checks cannot be cashed from moneys in their cash drawers. Instruct collectors not to accept checks for amounts over the amount due. Page 2 July 18, 2014
3 Cash Receipts (Collection procedures) Where no other evidence satisfactory for the purpose of audit is available, a serially pressnumbered duplicate receipt form should be issued for any cash, checks, or money orders received. One copy should be provided to the customer and one copy should be retained for audit purposes. The office copy of issued receipt forms should be periodically reviewed by supervisory personnel, and any gaps or missing receipt forms should be investigated. Both copies of voided receipts should also be retained. Page 3 July 18, 2014
4 Cash Receipts (Collection procedures) At locations or departments that collect fines or fees, such as a justice court or a solid waste facility, post a sign that states, Please call xxxxxx-xxxx if you don t receive a receipt. Page 4 July 18, 2014
5 Cash Receipts (Deposit procedures) Secure deposited cash and prepared deposits in a vault or safe (or other locked storage) until they are deposited in the bank. Restrict access to the vault or safe, or keep other storage methods locked when not in use. Deposit cash timely. Deposit cash receipts intact. Prepare and maintain detailed deposit slips. Deposit slips must be detailed enough to identify the composition of the deposit between cash collected and individual checks deposited. Page 5 July 18, 2014
6 Cash Receipts (Deposit procedures) The person who performs the bank reconciliation should be the final custodian of all deposit slips. The governing board should establish a charge for checks returned for non-sufficient funds (NSF). Notification of the NSF check charge should be included on all billings and posted in public view. Page 6 July 18, 2014
7 Cash Receipts (Record-keeping procedures) Record receipts in the accounting system timely. For each cash drawer, daily cash collection records or cash register tapes should be reconciled to the amount of cash on hand at the end of the day (sometimes referred to as the daily cash-out ). Employees responsible for collecting cash and preparing bank deposits should not record cash transactions in the accounting records. Page 7 July 18, 2014
8 Payroll (Authorization procedures) The governing board, or such other body or officer as authorized by law, should establish and approve all salary and hourly wages by position or as part of a collective bargaining agreement. Subject to statutory requirements and collective bargaining agreement provisions, the board or officer should also establish the frequency of all payroll distributions (biweekly, monthly, etc.). The terms and conditions of collective bargaining agreements should be clearly communicated to those responsible for payroll processing. Page 8 July 18, 2014
9 Payroll (Authorization procedures) If not otherwise segregated under the law, segregate payroll authorizations (hiring/firing, pay rate setting, and other payroll changes) from the preparation and processing of payroll records and checks. In a computerized payroll system, payroll changes should be entered into the system by the personnel department or an employee who does not process the payroll register and checks, if possible. Limit access to computerized payroll applications and data files containing potentially confidential information such as social security numbers and deductions. Page 9 July 18, 2014
10 Payroll (Payroll change procedures) All changes in employment status (e.g., additions and terminations), salary, and wage rates should be properly authorized, approved, and documented to support employment status changes. When appropriate, payroll change forms should be used to document and authorize wage and salary changes authorized by the governing board. If payroll forms are used, control access to these forms by keeping them in a locked cabinet or drawer. Page 10 July 18, 2014
11 Payroll (Payroll change procedures) Prior written authorization should be required for all nonemergency overtime hours and should be granted only for specific, verifiable purposes, consistent with any collective bargaining agreements. In emergency situations, supervisors should verbally preapprove overtime to be incurred, and follow up with a review of overtime records to determine the appropriateness of overtime hours incurred. Page 11 July 18, 2014
12 Payroll (Time and attendance records) Require employees to document days and hours worked and leave credits used on either time sheets or time cards. Time sheets and time cards should be reviewed and approved by supervisory personnel who have direct contact with the employee. Using time clocks to record arrival and departure times will provide additional control over days and hours worked by employees. Electronic time clocks can also reduce manual processing of payroll data if the time clock and payroll application are compatible. Page 12 July 18, 2014
13 Payroll (Time and attendance records) Time clocks should be placed in an area where their use can be observed by supervisors. Require the use of leave request forms to document advance requests to use accrued leave credits and to document absences covered by the use of leave credits. Maintain leave accrual records and communicate leave balances to employees regularly. Page 13 July 18, 2014
14 Payroll (Verification procedures) Even if not otherwise required by law, before checks are distributed, payroll registers or similar records should be certified by the officer or employee having direct supervision over specific departments or individual employees. The certification should indicate that to the best of the supervisor s knowledge, services were actually performed by persons listed on the payroll and that days and hours worked are accurate and justified. Page 14 July 18, 2014
15 Payroll (Verification procedures) Management or the internal auditor should periodically review payroll change reports. When unusual changes are identified, those items should be traced to authorization documents (i.e., board minutes, payroll change forms, or collective bargaining agreements). Page 15 July 18, 2014
16 Payroll (Payroll check procedures) Payroll checks should not be distributed to employees prior to the actual pay dates. Undelivered payroll checks should be returned directly to the chief fiscal officer or other authorized officer for safekeeping and eventual cancellation, if warranted. Requests for direct deposit should be made in writing and kept on file for audit purposes. Page 16 July 18, 2014
17 Payroll (Payroll check procedures) In local governments with more than 100 employees, as part of the direct deposit program, periodically require employees to pick up their payroll statement in person. Paychecks should be distributed by a responsible employee who is not otherwise connected with any of the steps of payroll preparation. Page 17 July 18, 2014
18 Payroll (Reconciliation procedures) Establish a separate bank account for payroll transactions. Reconcile the payroll account monthly. The payroll bank reconciliation should be performed by an employee who is not connected with the authorization of payroll changes or with payroll preparation. Page 18 July 18, 2014
19 Payroll (Statutory controls) A complete payroll should be submitted timely to the appropriate civil service agency or officer for certification. Page 19 July 18, 2014
20 (Establishing the it framework) The governing board or other authorized body or officer should establish a centralized IT administration for overseeing computer and network operations. Options include appointing a Chief Information Officer, establishing an IT department, or assigning IT oversight to an upper-level manager. Small units of local government may need to consider other options for administering the IT environment such as intermunicipal cooperation or outsourcing. IT administration should be in charge of and responsible for all IT matters and should report to executive management and the governing boards. Page 20 July 18, 2014
21 (Establishing the it framework) IT administration should approve all new hardware (keyboards, monitors, servers) and software (operating systems and applications) acquisitions, with governing board consent for major acquisitions in accordance with legal requirements. Adopt a comprehensive IT security plan. Generally, security plans show the results of a risk assessment and explain what measures the local government will put in place to mitigate prioritized risks. The overall security plan should include a disaster recovery plan, back-up procedures, computer use policy, rules for the users accounts, and a remote access policy. Disseminate the security plan to appropriate IT users. Page 21 July 18, 2014
22 (User Accounts) Establish procedures for creating, modifying, and deleting user accounts. Ensure all users have a unique user name. IT administration should only add users to the network after human resources, payroll, or other appropriate officers notify IT administration that they are legitimate users. The notification should be documented and retained. Page 22 July 18, 2014
23 (User Accounts) Human resources, payroll, or other appropriate officials should notify IT administration immediately when an individual s employment or contract is terminated so that IT administration can deactivate the user s access to all computer-related applications. This notification should be documented and retained. Terminate dormant accounts (those that have not been used for a long period of time) on the network and in specific applications. IT administration should determine the length of inactivity that indicates a dormant account. Page 23 July 18, 2014
24 (User Accounts) Use an authentication system to log-on to the network and specific applications. An authentication system forces the user to prove they are authorized to use the account by requiring them to type a password, insert a key card, or pass a biometric test. Passwords should contain complexity requirements. They should be at least eight characters and contain an uppercase character, lowercase character, a numeric character, and a special character. They should not include the use of names or words that can be easily guessed or identified using a password-cracking mechanism, should be required to be changed periodically (every days), and should not allow the last six passwords to be reused. Page 24 July 18, 2014
25 (User Accounts) Encourage users to refrain from writing down passwords. Disguise passwords upon entry into the computer, such as showing asterisks on the screen when a password is typed in. Also, passwords that are stored in the network should be disguised. Require users to log off their account before stepping away from the computer and require users to shut off computers before they leave for the day. Lock user accounts after three to seven consecutive attempts with an incorrect password. Page 25 July 18, 2014
26 (User Accounts) Lock user accounts after a certain period of inactivity. There are usually settings that can be established that will lock the user s account after a specified period of time. IT administration should give users access only to the areas of the applications (including within financial software) and the network they need to perform their job duties. IT administration must ensure that the default accounts for servers and applications are deleted, or at least the passwords are changed. Page 26 July 18, 2014
27 (Monitoring computer users) Require employees and officers to sign a computer use policy. This policy should explain that information stored on government computers is not private; specify that computers should not be used for personal purposes, unless the policy allows for incidental personal use; and outline penalties for misuse of equipment, subject to collective bargaining agreements. Monitor user access into the network. IT administration should use a web filter and review the logs it creates. Review audit logs of the applications, including the financial software. Page 27 July 18, 2014
28 (monitoring computer users) When audit logs or other red flags indicate possible improper computer use, executive management should consider having IT administration review a sample of users hard drives at unannounced intervals. Provide training to computer users on the use and protection of the IT assets related to the network. Page 28 July 18, 2014
29 (Data security) Classify all local government data according to sensitivity, and when possible, segregate high and low sensitivity data on the network. If a public web server is used for business purposes also, confidential information should be stored on a separate server. Encourage computer users to store all sensitive data on the network, not on their hard drives. If financial transactions are made through a public web server, use Secure Sockets Layer (SSL). SSL is widely used to do two things: validate the identity of a website, and create an encrypted connection for sending credit card and other personal data. Page 29 July 18, 2014
30 (Data security) Encrypt and/or password protect information that flows in and out of the system (through or a portable device such as a data stick) or use portable devices that have password security. If portable devices (for example data sticks) are shared among users, ensure all sensitive data is erased from the device before it is distributed to another user. Ensure that all sensitive data is removed from devices being sent out for service or warranty work. Use sanitizing software (which completely erases data) and/or physically destroy a computer s hard drive before disposing of computers. Page 30 July 18, 2014
31 (software security) Test software before general dissemination to computers. In addition, back up original files before installing new software in case data does not transfer properly. Only install software necessary for local government business. Restrict rights to download or install software to as few individuals as practical. IT administration should backup software by securing the master copies of the software and its user instructions. Page 31 July 18, 2014
32 (Software security) Give licensed software only to appropriate users who need it to perform their duties. Maintain inventory of software applications installed on all computers. Page 32 July 18, 2014
33 (Network security) Install an appropriate firewall. Install an intrusion detection system (IDS). Periodically review activity logs recorded by the firewall and IDS. Utilize virus protection and ensure all computers have an up-to-date version. Ensure updates to servers, the operating system, and applications are done timely. IT administration should ensure there are no open ports on the servers. Page 33 July 18, 2014
34 (Network security) If wireless access is used, ensure the wireless connection is authorized and protected (via password or encryption) so that people with other portable devices (PDAs, laptops, cell phones) cannot get on the network. If a wireless access point is installed, change the default service set identifier (SSID) to something unique and change the default password to match the complexity requirements of the password policy in place. Disabling SSID broadcasting is also recommended. Restrict remote access to those that need it to perform their duties offsite. Ensure that all remote access is authorized prior to use and that users adhere to the local government s security policies. Page 34 July 18, 2014
35 (Network security) Consider using a VPN (virtual private network) for remote access users. Control and monitor remote access by limiting access through ports and reviewing firewall or software audit logs. If some or all of IT administration s duties are outsourced to a vendor, evaluate the risk of having this vendor access your network. The contract with the vendor should provide that the vendor sign an authorization form agreeing to services to be provided and stating they will follow the local government s security policies. Ensure that vendor access to the network is restricted only to files and applications needed to perform their duties. Page 35 July 18, 2014
36 (Physical security) Lock up or otherwise secure servers and wiring closets. Limit access to those who need it, restrict access by keys or key cards, and monitor access. Ensure servers and wiring closets cannot by reached from the outside by windows or doors. When feasible, consider using equipment to secure the room, such as window bars, an alarm system, motion detectors, or video cameras. Server rooms and wiring closets should have proper environmental controls. This includes maintaining temperature and humidity in accordance with the manufacturer s specifications, protecting cabling and wiring from foot traffic, keeping equipment away from air conditioning and heating units, and banning food and drinks from these rooms. Page 36 July 18, 2014
37 (physical security) Install automatic and manual fire-suppression systems in the server rooms and wiring closets and periodically test them. In addition, IT administration should be trained in how to use the fire-suppression system. Plug all equipment into surge protectors and use an uninterrupted power supply (UPS) or a backup power source. Maintain and repair equipment as needed, either with in-house staff or outside vendors. If vendors are used, monitor and restrict access to the intended equipment. The computer use policy should inform users how to secure laptops, such as by not leaving them unattended in their cars or in public places. Page 37 July 18, 2014
38 (Service continuity) Adopt a disaster recovery plan. The local government would carry out this plan in case of an emergency (such as a flood or fire) to resume orderly operations as soon as possible. This plan could include an alternate processing location and a plan to procure computers with the appropriate software to resume normal operations. Test the disaster recovery plan to ensure it works as intended and that users know their duties during a disaster. Adopt a policy for backing up data. The policy should indicate how often and to what extent backups will be performed, how many backups will be maintained, and if backups will be incremental or complete. Page 38 July 18, 2014
39 (Service continuity) Maintain a list that describes each time a backup was performed and the type of backup that took place. Backup sensitive data with encryption. Store backups at a secured, off-site location. Periodically restore backups. Page 39 July 18, 2014
FINANCE COMMITTEE PROCEDURES. Audit Process. Cash Handling
1 FINANCE COMMITTEE PROCEDURES Audit Process 1. Internal audits are conducted once a year. 2. The bookkeeper will provide the following information: bank statements, prior year vouchers, and access to
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Protection of Computer Data and Software
April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
PART 10 COMPUTER SYSTEMS
PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board
The Practice of Internal Controls
Office of the New York State Comptroller Division of Local Government and School Accountability LOCAL GOVERNMENT MANAGEMENT GUIDE The Practice of Internal Controls Thomas P. DiNapoli State Comptroller
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
VIRGINIA STATE UNIVERSITY RISK ANALYSIS SURVEY INFORMATION TECHNOLOGY
ASSESSABLE UNIT: ENTER THE NAME OF YOUR ASSESSABLE UNIT HERE BUSINESS PROCESS: ENTER YOUR BUSINESS PROCESS HERE BANNER INDEX CODE: ENTER YOUR BANNER INDEX CODE HERE Risk: If you monitor the activity and
TECHNICAL SECURITY AND DATA BACKUP POLICY
TECHNICAL SECURITY AND DATA BACKUP POLICY PURPOSE Effective technical security depends not only on technical measures, but also on appropriate policies and procedures and on good user education and training.
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)
Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology
6G Putnam/Northern Westchester BOCES Internal Audit Report on Information Technology TABLE OF CONTENTS Page Report on Internal Controls Related to Information Technology Network and Network Security 1
Chapter 7 Trustee. Internal Control Questionnaire
Chapter 7 Trustee Instructions for the trustee: The purpose of the (ICQ) is to provide the United States Trustee with an understanding of the internal controls and financial record keeping and reporting
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE
HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE How to Use this Assessment The following risk assessment provides you with a series of questions to help you prioritize the development and implementation
BEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL
BEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL Revised 3-27-2014 TABLE OF CONTENTS Section 1: Section 2: Section 3: Section 4: Section 5: Section 6: Section 7: Section 8: Section 9: Cash Management
Internal Control Guide & Resources
Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
Internal Control Risks Associated with Information Technology. Kevin M. Bronner, Ph.D.
Internal Control Risks Associated with Information Technology By Kevin M. Bronner, Ph.D. Introduction: The Risk of Information Technology Fraud The information technology (IT) function is important to
Information Systems and Technology
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice
Appendix 4-2: Administrative, Physical, and Technical Safeguards Breach Notification Rule How Use this Assessment The following sample risk assessment provides you with a series of sample questions help
Physical Security Policy
Physical Security Policy Author: Policy & Strategy Team Version: 0.8 Date: January 2008 Version 0.8 Page 1 of 7 Document Control Information Document ID Document title Sefton Council Physical Security
RISK ASSESSMENT TOOL: Business Processes
: Business Processes Purpose This tool can be utilized by departments and units to determine where risks and opportunities for control activities exist within their administrative business processes. For
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
How To Write A Health Care Security Rule For A University
INTRODUCTION HIPAA Security Rule Safeguards Recommended Standards Developed by: USF HIPAA Security Team May 12, 2005 The Health Insurance Portability and Accountability Act (HIPAA) Security Rule, as a
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Small Business IT Risk Assessment
Small Business IT Risk Assessment Company name: Completed by: Date: Where Do I Begin? A risk assessment is an important step in protecting your customers, employees, and your business, and well as complying
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Information Technology Security Policies
Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral
Estate Agents Authority
INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY
DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed
Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014
Islington ICT Physical Security of Information Policy A council-wide information technology policy Version 0.7 June 2014 Copyright Notification Copyright London Borough of Islington 2014 This document
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
HMIS Privacy/Security Plan
Page 1 of 8 Memphis and Shelby County Homeless Management Information System Community Alliance for the Homeless, MIS Department Memphis TN 38103 (901) 527-1302 Phone, (901) 527-1308 Fax www.cafth.org
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
How To Protect Your School From A Breach Of Security
SECURITY MANAGEMENT IT Security Policy (ITSP- 1) 1A Policy Statement District management and IT staff will plan, deploy, and monitor IT security mechanisms, policies, procedures, and technologies necessary
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
DETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/[email protected] DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
Remote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
Cash Receipts Internal Controls
3 3 Start If gift is stock If gift is credit card If gift is cash/check Mail opened, checks stamped FDO Community Foundation, totals logged & verified 1 Administrative Assistant & mail verifier Cash Receipts
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Volume UC DAVIS HEALTH SYSTEM. HIPAA Security Compliance Workbook. Multi User Guide
Volume 1 UC DAVIS HEALTH SYSTEM HIPAA Security Compliance Workbook Multi User Guide UC DAVIS HEALTH SYSTEM HIPAA Security Compliance Workbook Guide Table of Contents Introduction General Instructions SECTION
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
Internal Control Guidelines
Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth
DIXON MONTESSORI CHARTER SCHOOL FISCAL CONTROL POLICY
DIXON MONTESSORI CHARTER SCHOOL FISCAL CONTROL POLICY 1. Purpose The Dixon Montessori Charter School Board of Directors ( Board ) has reviewed and adopted the following policies and procedures to ensure
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE
HMIS SECURITY PLAN of the PHILADELPHIA CONTINUUM OF CARE This plan describes the standards for the security of all data contained in the Philadelphia Continuum of Care Homeless Management Information System
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center
MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Computer Security Policy (Interim)
Computer Security Policy (Interim) Updated May, 2001 Department of Information Systems & Telecommunications Table of Contents 1. SCOPE...1 2. OVERVIEW...1 3. RESPONSIBILITIES...3 4. PHYSICAL SECURITY...4
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
Administrators Guide Multi User Systems. Calendar Year
Calendar Year 2012 Enter Facility Name Here HIPAA Security Compliance Workbook For Core Measure 15 of Meaningful Use Requirements Annual Risk Analysis Administrators Guide Multi User Systems 1 HIPPA Compliance
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
ASSOCIATED STUDENTS, INCORPORATED CALIFORNIA STATE UNIVERSITY, LONG BEACH DATE REVISED: 04/10/2013
Cash Handling BACKGROUND AND PURPOSE...1 POLICY STATEMENT...2 WHO SHOULD KNOW THIS POLICY...2 DEFINITIONS...2 STANDARDS AND PROCEDURES...3 1.0 CONDITIONS FOR EMPLOYMENT IN CASH HANDLING ENVIRONMENT...3
BERKELEY COLLEGE DATA SECURITY POLICY
BERKELEY COLLEGE DATA SECURITY POLICY BERKELEY COLLEGE DATA SECURITY POLICY TABLE OF CONTENTS Chapter Title Page 1 Introduction 1 2 Definitions 2 3 General Roles and Responsibilities 4 4 Sensitive Data
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
CARRIAGE MUSEUM OF AMERICA ACCOUNTING POLICIES AND PROCEDURES MANUAL. February 2014
CARRIAGE MUSEUM OF AMERICA ACCOUNTING POLICIES AND PROCEDURES MANUAL February 2014 I. Introduction The purpose of this manual is to describe all accounting policies and procedures currently in use at The
ADM:49 DPS POLICY MANUAL Page 1 of 5
DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
INTERNAL ACCOUNTING CONTROLS CHECKLIST FOR NTMA CHAPTERS
P R E C I S I O N INTERNAL ACCOUNTING CONTROLS CHECKLIST FOR NTMA CHAPTERS Presented at NTMA 2004 Annual Convention Palm Springs, CA February 2004 National Tooling & Machining Association 9300 Livingston
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
BUSINESS ONLINE BANKING AGREEMENT
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
