Department of Education. Internal Audit. Data Access Controls Review. Issue Date: November Report Number: FY
|
|
|
- Jasmine Scott
- 10 years ago
- Views:
Transcription
1 Internal Audit Issue Date: November 2014 Report Number: FY
2 Executive Summary AUDIT OF: DATE: Fieldwork performed July 2014 November 2014 AUDIT RATING: Acceptable [ ] Marginal [ X ] Unacceptable [ ] INTRODUCTION: In connection with the s (DOE) Updated Risk Assessment and Internal Audit Plan approved on August 5, 2014, Internal Audit (IA) performed a. The purpose of this project was to review access controls of select systems and/or records to ensure (1) only authorized individuals are permitted to request or approve access; (2) access provided aligns with job responsibilities; and (3) individuals are disabled or removed from the system when they no longer require access. BACKGROUND: As stated in the Global Technology Audit Guide, identity and access management (IAM) is a process of managing who has access to what information over time. IAM processes are used to initiate, capture, record, and manage the user identities and related access permissions to the DOE s proprietary information. Although this is usually viewed as an information technology (IT) function, IAM affects every office throughout the DOE. There are several stages of the IAM process: provisioning, administration, and enforcement. Provisioning refers to an identity s creation, change, termination, validation, approval, propagation, and communication. Administration or identity management includes the establishment of an IAM strategy, administration of IAM policy statement changes, establishment of identity and password parameters, management of manual or automated IAM systems and processes, and periodic monitoring, auditing, reconciliation, and reporting of IAM systems. Enforcement includes the authentication, authorization, and logging of identities as they are used within the organization s IT systems. Below is a depiction of IAM and its related components: Identity andaccessmanagement Provision Request Validate Approve Propagate Communicate Identity Administer Monitor Managepasswords Auditandreconcile Administerpolicies Strategize Managesystems Access Enforce Authenticate Authorize Logactivity Components Processes Activities Information SystemsandData 1
3 Executive Summary The DOE collects data with two goals in mind: 1) To provide an evolving snapshot of the academic and social health of the public education system, and 2) To create real-time feedback for teachers and administrators to help them regularly assess student performance, and create learning interventions when and where students need them. Some of the main data systems in the DOE include: Student Information Systems Accountability System - Compiles scores from the state assessment (and alternate and Hawaiian language versions), student scores from quarterly assessments, and School Quality Survey results. ARCHdb Database - Provide schools with secure access to their student rosters that will be used to calculate Adequate Yearly Progress (AYP). The student-level data reflects the requirements of No Child Left Behind. Blackboard - Database of formative assessments for teachers. Curriculum Development & Learning Management System - Data for formative assessments, grades, attendance, and instructional & curricular management. Data for School Improvement (DSI) - Provides assessment items for the classroom teacher and is part of the formative assessment strategy in the Hawaii DOE's strategic plan to provide data to inform and adjust instruction to address student needs. Electronic Comprehensive Student Support System (ecsss) - Includes student information relating to special education, English Language Learners, behavior assessments, progress monitoring, intervention and Response to Intervention (RTI) management, along with support program data, action plans for at-risk students, and early warning system. Electronic Student Information System (esis) - Includes student biographical data, attendance, elementary homeroom class lists, school master schedule, student and teacher schedules, grades/marks/report cards, enrollment, parent information, emergency contacts, diploma types available, projected graduation date, student credit accumulation, Career Technical Education progress, student health information, and homelessness. eschool - Standards-based, online classes for students enrolled at any Hawaii public school (including charter schools). Hawaii Growth Model, aka SchoolView - Data on achievement and growth. This private (staff) view of the Hawaii Growth Model website drills down to protected student-level data. Hawaii Statewide Assessment Portal (HSAP) - The official site for the Hawaii State Assessments, the Hawaii State Alternate Assessments, and the End-of-Course Exams, with secured sites for teachers, test administrators, test coordinators, principals, complex area superintendents, and other DOE employees. Hawaii Virtual Learning Network - Online courses for Hawaii's students, WebEx services. Longitudinal Data System (LDS) - Provides reports and dashboards where teachers and administrators can access data about student academic progress and performance. The LDS enables teachers and administrators to customize existing reports by selecting specified report filters on student demographics, staff, etc., and develop what s known as Response to Intervention (RTI) - custom supports designed to meet the specialized learning of the student. LDS data are compiled along a continuum that begins with early education and continues through K-12. Migrant - Database with student-level data for students eligible for migrant services. 2
4 Executive Summary Roster Verification Battelle for Kids - Validates teacher-student linkages within a specific time period and attributes Student Growth Percentile (SGP) data to teachers for evaluation purposes. Statewide Student Enrollment System (SSES) - DOE s student enrollment system Employee Information Systems Electronic Human Resources (ehr) System - Human resource system for DOE employees where employees can apply for jobs and modify online resumes. Kronos - Time and attendance tracking system. PDE3 - Accounts for staff professional development (courses taken and completed) along with teacher evaluation data. Project Inspire - Online professional development credit program to assist teachers in the integration of technology to a standards-based curriculum. Financial Systems Budget HyperAccess Program - Repository for service verification and budget data. Financial Management System (FMS) - Automated, integrated, multi-user accounting and financial system which performs financial and school based accounting functions. FMS applications cannot be accessed off the DOE Network. Financial Reporting System (FRS) - DOE s financial reporting system. Student Activity Fund (SAF) System - DOE s accounting and financial system for nonappropriated funds. Other Support Systems DOE Intranet - Staff-only website for internal communications, resources, key forms, and more. DOE Memos and Notices - Online searchable/sortable database of the Department's memos and notices to staff. Facilities - Data about school facilities, space and infrastructure. (The Department also hosts a separate external application, FacTrak, to manage the pipeline of the state's Capital Improvement Projects for schools). Factrak - Track Repair & Maintenance and Capital Improvement Projects. Lotus Notes Webmail - Access DOE webmail, calendar, address book online Maximo - Tracks work order and inventory Official Enrollment Count - Official enrollment count for all schools used for WSF funding Password Self-Service System - Allows employees to set their password for applications using the DOE Internet Password. School Bus Transportation - Real-time data about bus transportation and routes. Manages applications and accounting for student bus passes. SMS Food Services - Produces data resulting from the Free and Reduced Price Lunch program. Virtual Private Network (VPN) - extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. 3
5 Executive Summary For new employees, a Form 5 is generated and automatically places the employee on a Lotus Notes database as well as a Microsoft Active Directory (Directory). To process any requests to grant new employees access to other applications (i.e. Kronos, LDS, etc.), program administrators use this Directory to authenticate that the employee is, in fact, a legitimate DOE employee. For current DOE employees, access to various systems is generally requested through the business owners (i.e. Office of Fiscal Services (OFS), Office of School Facilities and Support Services (OSFSS), etc.) who then will contact the program administrators in the Office of Information Technology Services (OITS) to set up access. David Wu is the Assistant Superintendent and Chief Information Officer of OITS. His management staff includes Tom Gerrish, Director of Enterprise Systems Branch (ESB) and Dean Horiuchi, Director of Enterprise Infrastructure Services Branch (EISB). Different branches in OITS are responsible for different systems. Policies and procedures are posted in various sources including DOE Memos and Notes in Lotus Notes and the DOE Intranet. Through research, IA identified Chapter 487N of the Hawaii Revised Statutes (HRS), regarding security breach of personal information as the main regulatory governance. SCOPE and OBJECTIVES: The scope of our review included an examination of the data access controls processes in the DOE. We reviewed the design and operating effectiveness of the existing control procedures in place. The scope of our review specifically focused on the processes related to the following systems that IA deemed as high risk: Kronos LDS esis Password Self-Service System (Single Sign-On) FMS VPN For the purpose of this review, we identified the program administrators in OITS as the process owners in regards to data access controls of the selected systems. However, with the exception of esis and VPN, each system is owned by different offices/branches outside of OITS. OFS is the business owner of Kronos and FMS. Data Governance and Analysis Branch is the business owner of LDS. Password Self- Service System (Single Sign-On) is directly linked to ehr, which is owned by the Office of Human Resources (OHR). The scope of the detailed testing covered fiscal year and fiscal year 2015 up to fieldwork date. This review excluded detailed testing of data access controls for ehr as it was covered by the ehr Post-Implementation Review issued by IA in July
6 Executive Summary The objectives of our review included the following: 1. To review, evaluate, and test the design and operating effectiveness of the process to revise (i.e. add, change, or remove) employee access privileges. 2. To review, evaluate, and test the design and operating effectiveness of the process to monitor user/employee access levels to ensure: a. Employee s access privileges align with the employee job responsibilities; b. Adequate segregation of duties exist; and c. Employee/user IDs are valid. 3. To review, evaluate, and test the design and operating effectiveness of the process to ensure that only authorized employees are assigned administrator access and such access is only used to perform authorized activities. OBSERVATIONS: Based upon our review, we found the DOE s controls related to data access controls are functioning at a marginal level. A marginal rating indicates that there may be a potential for loss to the auditable area and ultimately to the DOE. Some improvements are necessary to bring the unit to an acceptable status, and if weaknesses continue without attention, further deterioration of the rating to an unacceptable status may occur. Please refer to the Risk Ratings section of this report for a complete definition of the ratings used by IA and the Observations and Recommendations section for a detailed description of our findings. We discussed our preliminary findings and recommendations with management and they were receptive to our findings and agreed to consider our recommendations for implementation. Each observation presented in this report is followed by specific recommendations that will help to ensure that control gaps are addressed and, if enforced and monitored, will mitigate the control weaknesses. In summary, our observations are as follows: 1. Lack of proper monitoring over access controls 2. Lack of data access control policies and procedures when employees separate from the DOE 3. Inefficiencies result from requests to terminate user access through each respective system Note: For the purpose of this review, separated employees include employees that retired, resigned, or was terminated from the DOE. PLANNED FOLLOW UP BY MANAGEMENT AND INTERNAL AUDIT: IA will follow up with management on their progress of completion for their action plans and report accordingly through the audit committee quarterly updates. 5
7 Acceptable Marginal Unacceptable OVERALL RATING SCALE No significant deficiencies exist, while improvement continues to be appropriate; controls are considered adequate and findings are not significant to the overall unit/department. Potential for loss to the auditable unit/department and ultimately to the DOE. Indicates a number of observations, more serious in nature related to the control environment. Some improvement is needed to bring the unit to an acceptable status, but if weaknesses continue without attention, it could lead to further deterioration of the rating to an unacceptable status. Significant deficiencies exist which could lead to material financial loss to the auditable unit/department and potentially to the DOE. Corrective action should be a high priority of management and may require significant amounts of time and resources to implement. High (1) Moderate (2) OBSERVATION RATING SCALE 1 - The impact of the finding is material 1 and the likelihood of loss is probable in one of the following ways: A material misstatement of the DOE s financial statements could occur; The DOE s business objectives, processes, financial results or image could be materially impaired; The DOE may fail to comply with applicable laws, regulations or contractual agreements, which could result in fines, sanctions and/or liabilities that are material to the DOE s financial performance, operations or image. Immediate action is recommended to mitigate the DOE s exposure 2 - The impact of the finding is significant 1 and the likelihood of loss is possible in one of the following ways: A significant misstatement of the DOE s financial statements could occur; The DOE s business objectives, processes, financial performance or image could be notably impaired; The DOE may fail to comply with applicable laws, regulations or contractual agreements, which could result in fines, sanctions and/or liabilities that are significant to the DOE s financial performance, operations or image. Corrective action by management should be prioritized and completed in a timely manner to mitigate any risk exposure. Low (3) 3 - The impact of the finding is moderate and the probability of an event resulting in loss is possible. Action is recommended to limit further deterioration of controls. 1 The application of these terms are consistent with the guidelines provided by the Institute of Internal Auditors 6
8 The detailed observations noted herein were based on work performed by IA through the last date of fieldwork and are generally focused on internal controls and enhancing the effectiveness of processes for future organizational benefit. Obs. No. Description Page # 1 Lack of proper monitoring over access controls Lack of data access control policies and procedures when employees separate from the DOE 3 Inefficiencies result from requests to terminate user access through each respective system 14 7
9 Observation Number: 1 Observation: Lack of proper monitoring over access controls Rating: High Each system selected for testing has different access controls procedures. We interviewed all six (6) system administrators for each respective system and performed detailed testing. We noted that some systems require manual processes to add and remove users from the respective system while other systems are automated based on an employee s employment status with the DOE. Access for vendors and non-doe employees are manually added and removed from each respective system. Each system has the ability to maintain security by user and role (user assigned to a role). The following table summarizes the exceptions noted during our review indicating inefficiencies and errors resulting from lack of proper monitoring over access controls. System(s) Lack of Reviews Kronos Summary of Observations Noted Lack of reviews performed including: periodic reviews performed where management traces access permissions to access request forms, reviews performed to monitor user/employee access levels for the system, and no verification and reconciliation processes performed to identify misaligned access rights. Lack of Policies and Procedures Kronos There is a lack of documented policies, procedures, flowcharts, or other documentation in regards to access controls. Users with Improper Access Rights Kronos Five (5) out of 858 users with active access where the user is no longer with the DOE but still had active access to Kronos. Management has terminated the accounts since the finding. LDS esis FMS VPN Six (6) out of 12,803 users with active access where the user is no longer with the DOE but still had active access to LDS. 236 out of 17,649 users with active access where the user is no longer with the DOE but still had active access to esis. For six (6) of the 286 active users selected for detailed testing, the user is no longer with the DOE but still had active access to FMS. For three (3) of the 60 active users selected for detailed testing, the user is no longer with the DOE but still had active access to VPN. 8
10 System(s) Summary of Observations Noted Users with Improper Access Rights (continued) ecsss, esis, For seven (7) of the 20 employees selected for testing that were FMS, Lotus separated during the testing period, employees still had access to Notes the respective systems. Four (4) of the seven (7) requested for revocation of employee's access after IA had informed the schools of the finding. Kronos Kronos Unknown to IA One (1) out of 858 users with active access where the user transferred to a different office but still had access to the previous office. Management has terminated the accounts since the finding. One (1) out of 42 super-users had two (2) active accounts in use. One (1) account is no longer in use and should have been terminated. Management has terminated the accounts since the finding. For three (3) of the 20 employees selected for testing that were separated during the testing period, user access could not be verified due to lack of response from schools. User Access Change Requests LDS For three (3) of the 40 active users selected for detailed testing, user access change requests could not be verified due to no responses from schools. VPN For two (2) of the 40 active users selected for detailed testing, no approval signatures were on the "DOE VPN Access Request Form." Unique User IDs Not Used FMS 3,595 out of 3,881 active users in FMS (93%) did not have unique user IDs for IA to perform detailed testing. These observations indicate a weakness with the data access controls procedures. Based on discussions with system administrators, IA noted that the main factor attributed to the findings is that there is no automated process to remove users from the respective system. In the past, some business owners of the respective systems did not want an automated process to remove users based on OHR databases of employment status. That resulted in the manual process of removing users when notified by the school/office. See the effects of a manual process in Observation Number 2 and 3 as it relates to the lack of an automated process. 9
11 Impact Lack of proper monitoring over access controls may lead to: Improper permission rights given to users. Improper access which may allow users to manipulate data in system. Inaccuracy of information which may lead to financial loss to the DOE. Inconsistencies between practices and policies and procedures. Improper access to systems which may lead to fraudulent acts and financial loss to the DOE. Improper access to confidential records by unauthorized users which may lead to possible violation of confidentiality laws. Recommendation Recommendations to address the lack of proper monitoring over access controls include: Management should work with OHR to develop an automated process to remove separated employees' access to respective systems. If business owners do not want an automated process, then business owners should be responsible for performing reviews on data access controls for their respective systems. Reminders should be sent out to the field to inform system administrators when separated employees no longer need access to respective systems. Reminders should be sent out to DOE sponsors to inform system administrators when consultants no longer need the access to the system. Business owners should notify system administrators to remove active users from the system if they receive no responses from the schools/offices regarding user access change requests. System administrators should periodically, on a test basis, check that active user accounts are valid. Periodic reviews should be performed by system administrators to trace access permissions to access request forms, monitor user/employee access levels, and identify misaligned access rights for Kronos. Management should develop policies and procedures for Kronos access controls and revisit these policies and procedures for any changes or updates. Management should enforce the proper completion of forms. Unique user IDs in FMS should be created in the system to accurately identify the users of the system. ESB Management Plan: Management Plan The following actions are to be taken to remediate the findings noted above. OITS and key business leads will meet to confirm who has the responsibility to ensure personnel are removed from each business system in a timely manner. ESB will coordinate. The ehr, TSEAS, and Casual payroll are the base systems for all employees. ESB will develop an automated process that will compare all users in these systems with all other systems. This script will run automatically on a regular scheduled basis and develop a report that will show users who should be removed from all systems noted above. OITS and OHR will meet to discuss developing a workflow process to address those users who are transferring within the DOE but have different responsibilities and terminations that need immediate attention. 10
12 Each business owner should develop a review process for each system they own that will act as an internal audit on a regular basis. OITS will provide technical assistance when requirements have been developed. All offices will be sent a list of FMS IDs and asked to identify who is using each ID with a deadline for response. After the deadline passes, DOE will either send non-respondents another list (if there are a large number) or contact each office to obtain the information. DOE will seek assistance from the complex areas for those offices that repeatedly fail to respond. Contract Person: Tom Gerrish, Director Enterprise Systems Branch Office of Information Technology Services Anticipated Completion Date: December 31, 2015 EISB Management Plan: The joint review of the Data Access Controls with EISB and the IA Office has been very productive and informative. EISB designed, installed, and manages the DOE virtual private network (VPN) access. During the review EISB acknowledges accuracy of the IA Office finding. EISB proposes the following management plans to address these findings. The three (3) users that should have been removed from the active access list were vendors/ consultants to OITS staff (sponsors) working on OITS systems. These users are only given access for a limited time. Based on this finding, EISB will review and emphasize with the OITS sponsors the importance of managing their active list of vendors/consultants. The two (2) VPN users without approved signatures were part of the initial group of VPN users added before the implementation of the DOE VPN Access Request Form. EISB has reviewed all VPN accounts for proper authorization and approvals. Going forward EISB plans to convert the paper forms into an electronic process to better manage these accounts. Contract Person: Dean Horiuchi, Director Enterprise Infrastructure Services Branch Office of Information Technology Services Anticipated Completion Date: August 31, 2015 Responsible Manager Tom Gerrish, Director, Enterprise Systems Branch, OITS Dean Horiuchi, Director, Enterprise Infrastructure Services Branch, OITS 11
13 Observation Number: 2 Observation: Lack of data access control policies and procedures when employees separate from the DOE Rating: Medium Based on discussions with system administrators/school personnel and test work performed, IA noted that for most of the systems selected for testing, user access is removed upon notification. System administrators have to rely on schools, district/state offices, and other departments to communicate the separation of employees/vendors before they can remove users from the respective systems. If information is not communicated, some of the system administrators have no way of knowing when to remove user access to the respective systems. Based on testing performed for access removal for separated employees, IA noted that five (5) out of 17 schools/offices that responded to our questionnaire did not terminate access for employees that had left their respective school/office as they had an understanding that OHR would terminate access to the IT systems. However, OHR did not notify the respective system administrator of the employment statuses. In addition, based on discussions with various schools/offices, there are no consistent policies and procedures in regards to data access controls when employees separate from the DOE. Impact Lack of data access control policies and procedures when employees separate from the DOE may lead to inconsistencies between practices and policies and procedures. Such inefficiencies may result in wasted resources and financial loss to the DOE. Recommendation Recommendations to address the lack of integrated systems include: Management should work with OHR to develop an automated process to remove separated employees' access to respective systems. If business owners do not want an automated process, then business owners should be responsible for performing reviews on data access controls for their respective systems. Management should provide guidance to the field to explain the process to remove separated employees from each respective system. Reminders should be sent out to the field stating that schools/offices are responsible for contacting each respective system administrator to remove access for separated and transferred employees. Management should create a standardized checklist for the field to track each respective system an employee is given access to. Please see Management s Plan in Observation #1. Management Plan Contract Person: Tom Gerrish, Director Enterprise Systems Branch, Office of Information Technology Services Anticipated Completion Date: December 31,
14 Contract Person: Dean Horiuchi, Director Enterprise Infrastructure Services Branch Office of Information Technology Services Anticipated Completion Date: August 31, 2015 Responsible Manager Tom Gerrish, Director, Enterprise Systems Branch, OITS Dean Horiuchi, Director, Enterprise Infrastructure Services Branch, OITS 13
15 Observation Number: 3 Observation: Inefficiencies result from requests to terminate user access through each respective system Rating: Low As noted in Observation Number 2, most system administrators have to rely on schools, district/state offices, and other departments to communicate the termination of employees/vendors before they can remove users from the respective systems. If information is not communicated, some of the system administrators have no way of knowing when to remove user access to the respective systems. Based on the testing performed, IA noted inefficiencies related to the termination of user access to systems. Schools and offices have to contact different system owners to remove a separated employee's access to respective systems. The DOE does not have a centralized department that handles the termination of user access when an employee/vendor is no longer with the DOE. Impact Inefficiencies resulting from requests to terminate user access through each respective system may lead to inconsistencies between practices and policies and procedures. Such inefficiencies may result in wasted resources and financial loss to the DOE. Recommendation Management should work with OHR and business owners to develop an automatic process to remove separated employees' access to respective systems without having schools/offices to contact each system the separated employee had access to. Please see Management s Plan in Observation #1. Management Plan Contract Person: Tom Gerrish, Director Enterprise Systems Branch, Office of Information Technology Services Anticipated Completion Date: December 31, 2015 Contract Person: Dean Horiuchi, Director Enterprise Infrastructure Services Branch Office of Information Technology Services Anticipated Completion Date: August 31, 2015 Responsible Manager Tom Gerrish, Director, Enterprise Systems Branch, OITS Dean Horiuchi, Director, Enterprise Infrastructure Services Branch, OITS 14
16 Acknowledgements We wish to express our appreciation for the cooperation and assistance afforded to the review team by management and staff during the course of this review. 15
Student Assessment Administrative Review Phase 1
Internal Audit Student Assessment Administrative Review Phase 1 Issue Date: March 2015 Report Number: FY2015-02 Executive Summary AUDIT OF: Student Assessment DATE: Fieldwork performed January 2015 February
Fixed Assets Management Review
Internal Audit Issue Date: April 2015 Report Number: FY2015-04 Executive Summary AUDIT OF: DATE: Fieldwork performed November 2015 April 2015 AUDIT RATING: Acceptable [ ] Marginal [ X ] Unacceptable [
Equipment and Fleet Maintenance Review
Internal Audit Issue Date: July 2014 Report Number: FY2014-04 Executive Summary AUDIT OF: Equipment and Fleet Maintenance Review DATE: Fieldwork performed May 2014 June 2014 AUDIT RATING: Acceptable [
Department of Education. Internal Audit. Payroll Review. Issue Date: April 2014. Report Number: FY2014-03
Internal Audit Issue Date: April 2014 Report Number: FY2014-03 Executive Summary AUDIT OF: DATE: Fieldwork performed January 2014 March 2014 AUDIT RATING: Acceptable [ ] Marginal [ X ] Unacceptable [ ]
Department of Education. Internal Audit. School Food Services Review. Issue Date: January 2013. Report Number: 2013-01
Internal Audit Issue Date: January 2013 Report Number: 2013-01 Executive Summary REVIEW OF: School Food Services DATE: Fieldwork performed October 2012 December 2012 REIVEW RATING: Acceptable [ ] Marginal
Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide UNIX Security Controls Department of Technology, Management, and Budget December 2015 State of Michigan Auditor General Doug A. Ringler,
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Establishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology
Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL. Doug A. Ringler, C.P.A., C.I.A. AUDITOR GENERAL ENTERPRISE DATA WAREHOUSE
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT PERFORMANCE AUDIT OF THE ENTERPRISE DATA WAREHOUSE DEPARTMENT OF TECHNOLOGY, MANAGEMENT, AND BUDGET August 2014 Doug A. Ringler, C.P.A., C.I.A. AUDITOR
Missouri Student Information System Data Governance
Nicole R. Galloway, CPA Missouri State Auditor ELEMENTARY AND SECONDARY EDUCATION Missouri Student Information System Data Governance October 2015 http://auditor.mo.gov Report No. 2015-093 Nicole R. Galloway,
CODING: Words stricken are deletions; words underlined are additions. hb7029-03-er
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 An act relating to education; amending s. 1002.321, F.S.; requiring the Department of Education to develop an online catalog of
North Carolina Government Data Analytics Center
North Carolina Government Data Analytics Center Report to the Chairs of the House of Representatives Appropriations Committee Chairs of the Senate Based Budget/Appropriations Committee Joint Legislative
CHAPTER 2013-225. Committee Substitute for House Bill No. 7029
CHAPTER 2013-225 Committee Substitute for House Bill No. 7029 An act relating to education; amending s. 1002.321, F.S.; requiring the Department of Education to develop an online catalog of digital learning
June 2008 Report No. 08-037. An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs
John Keel, CPA State Auditor An Audit Report on The Texas Education Agency s Oversight of Alternative Teacher Certification Programs Report No. 08-037 An Audit Report on The Texas Education Agency s Oversight
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
Strategic Plan A broadly-defined plan aimed at creating a desired future.
Strategic Plan A broadly-defined plan aimed at creating a desired future. The Parkland School District s Strategic Plan is a living document that is used as a basis for the district s annual goals process.
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER Material Weaknesses (0) No material weaknesses were reported for FY 2013. Significant Deficiencies (1) Grant Receivable Accounting
HIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
AUDIT REPORT 12-1 8. Audit of Controls over GPO s Fleet Credit Card Program. September 28, 2012
AUDIT REPORT 12-1 8 Audit of Controls over GPO s Fleet Credit Card Program September 28, 2012 Date September 28, 2012 To Director, Acquisition Services From Inspector General Subject Audit Report Audit
IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Solution Brief for ISO 27002: 2013 Audit Standard ISO 27002. Publication Date: Feb 6, 2015. EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief for ISO 27002: 2013 Audit Standard Publication Date: Feb 6, 2015 8815 Centre Park Drive, Columbia MD 21045 ISO 27002 About delivers business critical software and services that transform
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Illinois State Board of Education
Illinois State Board of Education 100 North First Street Springfield, Illinois 62777-000 I w,,,wisbe.net James T. Meeks Chairman Tony Smith, Ph.D. State Superintendent ofeducation September I, 2015 TO:
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
Accountability and Virginia Public Schools
Accountability and Virginia Public Schools 2008-2009 School Year irginia s accountability system supports teaching and learning by setting rigorous academic standards, known as the Standards of Learning
4 Testing General and Automated Controls
4 Testing General and Automated Controls Learning Objectives To understand the reasons for testing; To have an idea about Audit Planning and Testing; To discuss testing critical control points; To learn
What is FERPA? This act is enforced by the Family Policy Compliance Office, U.S. Department of Educational, Washington, D.C.
What is FERPA? The Family Educational Rights and Privacy Act of 1974 (FERPA), as amended (also referred to as the Buckley Amendment), is a Federal law designed to protect the confidentiality of a student
2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL ...The auditor general shall conduct post audits of financial transactions and accounts of the state and of
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Sarbanes-Oxley Compliance for Cloud Applications
Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this
Bank Account Reconciliation, Bank Account Access and Automated Clearing House (ACH) Transactions Review
Internal Audit Department 350 South 5th Street, Suite 302 Minneapolis, MN 55415-1316 (612) 673-2056 Audit Team on the Engagement: Kelcie Brady, Student Intern Jacob L. Claeys Lauren Heir, Student Intern
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
Following up recommendations/management actions
09 May 2016 Following up recommendations/management actions Chartered Institute of Internal Auditors At the conclusion of an audit, findings and proposed recommendations are discussed with management and
Health Insurance Portability and Accountability Act (HIPAA) Compliance Audit Final Report
Health Insurance Portability and Accountability Act (HIPAA) Compliance Audit Final Report April 2009 promoting efficient & effective local government Background The Health Insurance Portability and Accountability
White Paper: The Seven Elements of an Effective Compliance and Ethics Program
White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including
MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL
MICHIGAN OFFICE OF THE AUDITOR GENERAL AUDIT REPORT THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL The auditor general shall conduct post audits of financial transactions and accounts of the state and of all
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Service Agreement. UltraBranch Business Edition. alaskausa.org AKUSA 02952 R 05/15
Service Agreement UltraBranch Business Edition Your savings federally insured to at least $250,000 and backed by the full faith and credit of the United States Government. National Credit Union Administration,
CURRICULUM. Manage standards Create local curriculum Develop learning objectives Build scope and sequence Attach curriculum resources
The EduTrax Instructional Management (EIM) solution is a multi-faceted, web-based application that will assist school districts in developing quality standards-based curriculum, providing classroom-level
District Accountability Handbook Version 3.0 September 2012
District Accountability Handbook Version 3.0 September 2012 Colorado Department of Education Page 1 The purpose of this handbook is to provide an outline of the requirements and responsibilities for state,
Roadmap for Teacher Access to Student-Level Longitudinal Data
Roadmap for Teacher Access to Student-Level Longitudinal Data Key s to Ensure Quality Implementation Where are we going? Teachers have access to information about the students in their classrooms each
Don Nelson, Superintendent Drawer H, 4739 Ragus Road Miami, AZ 85539 Office: 928-425-3271 Fax: 928-425-7419 Miami Area Unified School Dist.
. Don Nelson, Superintendent Drawer H, 4739 Ragus Road Miami, AZ 85539 Office: 928-425-3271 Fax: 928-425-7419 Miami Area Unified School Dist. #40 November 3, 2008 Debra Davenport Auditor General 2910 North
State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard
State of Minnesota Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard Approval: Enterprise Security Office (ESO) Standard Version 1.00 Gopal Khanna
Aberdeen City Council IT Asset Management
Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates
Arkansas Department of Education Rules Governing The Arkansas Financial Accounting and Reporting System, and Annual Training Requirements August 2005
1.0 Regulatory Authority Arkansas Department of Education Rules Governing The Arkansas Financial Accounting and Reporting System, and Annual Training Requirements August 2005 1.01 These rules are promulgated
Appendix 1 CJC CONTRACT MANAGEMENT POLICIES AND PROCEDURES. Criminal Justice Commission Contract Management Policies and Procedures
CJC CONTRACT MANAGEMENT POLICIES AND PROCEDURES SNYOPSIS: The CJC was created by a Palm Beach County ordinance in 1988. It has 21 public sector members representing local, state, and federal criminal justice
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
Environmental Protection Agency Clean Water and Drinking Water State Revolving Funds ARRA Program Audit
Environmental Protection Agency Clean Water and Drinking Water State Revolving Funds ARRA Program Audit Audit Period: December 1, 2009 to February 12, 2010 Report number Issuance date: March 9, 2010 Contents
K12 Longitudinal Data System
K12 Longitudinal Data System Hawaii State Department of Education Data Governance and Analysis Branch What the LDS is: The LDS is. A collection of longitudinal data from various sources that can be used
Office of the City Auditor. Audit Report. AUDIT OF ACCOUNTS PAYABLE APPLICATION CONTROLS (Report No. A10-003) October 2, 2009.
CITY OF DALLAS Dallas City Council Office of the City Auditor Audit Report Mayor Tom Leppert Mayor Pro Tem Dwaine Caraway Deputy Mayor Pro Tem Pauline Medrano Council Members Jerry R. Allen Tennell Atkins
N.J.A.C. 6A:20, ADULT EDUCATION PROGRAMS TABLE OF CONTENTS
N.J.A.C. 6A:20, ADULT EDUCATION PROGRAMS TABLE OF CONTENTS SUBCHAPTER 1. GENERAL PROVISIONS 6A:20-1.1 Purpose and function 6A:20-1.2 Definitions 6A:20-1.3 Age and out-of-school requirements 6A:20-1.4 Certification
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
October 2007 Report No. 08-006. An Audit Report on The Medical Transportation Program at the Texas Department of Transportation
John Keel, CPA State Auditor An Audit Report on The Medical Transportation Program at the Texas Department of Transportation Report No. 08-006 An Audit Report on The Medical Transportation Program at the
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
Office of the Auditor General Performance Audit Report. Clarety Office of Retirement Services Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Clarety Office of Retirement Services Department of Technology, Management, and Budget July 2016 State of Michigan Auditor General Doug A. Ringler,
PeopleSoft Upgrade Post-Implementation Audit
PeopleSoft Upgrade Post-Implementation Audit Initially Issued on June 2015 Reissued on October 2015 with the updated management response to the first observation only on page 5 Table of Contents Executive
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,
School Support System Report and Support Plan. Compass Charter School. October 17-18, 2012
Rhode Island Department of Education Office of Student, Community and Academic Supports School Support System Report and Support Compass Charter School October 17-18, 2012 1 SCHOOL SUPPORT SYSTEM A Collaborative
L@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
Auditor General s Office. Governance and Management of City Computer Software Needs Improvement
Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City
Colorado s Current Use of a Single Count Day and Considerations if Average Daily Membership (ADM) is Used as a Funding Mechanism
Colorado s Current Use of a Single Count Day and Considerations if Average Daily Membership (ADM) is Used as a Funding Mechanism By: Audit Team, School Finance Division January 2013 Version 1.0 Audit Team,
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare
Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare Strengthening Cybersecurity Defenders #ISC2Congress Healthcare and Security "Information Security is simply a personal
First Northern Bank and Trust Co. Business Online Banking Application
First Northern Bank and Trust Co. Business Online Banking Application Company Name Tax ID: Address City State ZipCode Contact Name Title Phone # Email Address Fax # Please select the following services
Bucks County Intermediate Unit 22 Bucks County, Pennsylvania
PERFORMANCE AUDIT Bucks County Intermediate Unit 22 Bucks County, Pennsylvania April 2015 Name of Intermediate Unit County Name County, Pennsylvania Performance Audit Report The Honorable Tom W. Wolf Mr.
Company-wide Credit Card Policy
Company-wide Credit Card Policy Department: Corporate Finance Policy Number: CW-FIN-001-2008-11 Subject: Corporate Credit Cards Effective Date: 11/05/2008 Document Owner: Drew Hurt Title: Corporate Credit
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
Submitted by: Christopher Mead, Director, Department of Information Technology
Office of the City Manager INFORMATION CALENDAR March 21, 2006 To: From: Honorable Mayor and Members of the City Council Phil Kamlarz, City Manager Submitted by: Christopher Mead, Director, Department
HTSB Form RA 5010 C License Renewal Rev. 1/2015
HAWAI`I TEACHER STANDARDS BOARD LICENSE RENEWAL F SCHOOL COUNSELS VERIFICATION OF SATISFYING THE HAWAI`I SCHOOL COUNSEL PERFMANCE STANDARDS Name Social Security Number XXX-XX- Date of Birth / / This form
