Aberdeen City Council IT Asset Management
|
|
|
- Jeffery Atkins
- 10 years ago
- Views:
Transcription
1 Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates Red/Amber/Green and commentary Internal Audit Charter where applicable 27 October September 2014 Green Planned fieldwork start date 24 November November 2014 Green Fieldwork completion date 5 December December 2014 Green Draft report issued for Management comment 19 December December 2014 Green Management Comments received 23 January January 2015 Green Report finalised 30 January January 2015 Green Submitted to Audit and Risk Committee February 2015 February 2015 Green
2 Contents Section Page 1. Executive Summary 3 2. Detailed findings and recommendations 4 Appendix 1 Background and Scope 9 Appendix 2 Basis of our classifications 10 Appendix 3 Agreed Terms of reference 12 Appendix 4 - Limitations and responsibilities 15 This report has been prepared solely for Aberdeen City Council in accordance with the terms and conditions set out in our engagement letter dated 4 October We do not accept or assume any liability or duty of care for any other purpose or to any other party. This report should not be disclosed to any third party, quoted or referred to without our prior written consent. Internal audit work will be performed in accordance with Public Sector Internal Audit Standards. As a result, our work and deliverables are not designed or intended to comply with the International Auditing and Assurance Standards Board (IAASB), International Framework for Assurance Engagements (IFAE) and International Standard on Assurance Engagements (ISAE) Internal Audit report for Aberdeen City Council PwC Contents
3 1. Executive Summary Report classification Total number of findings Section 3 Critical High Medium Low Advisory Medium Control design Operating effectiveness Total Responsible Director: Director of Corporate Governance Project Sponsor: Head of Customer Service and Performance Summary of findings 1.01 ICT is responsible for the management of the ICT inventory assets. The scope of our review was to assess the maintenance of the ICT assets and how it aligns with the Council s corporate strategies. In the course of our review we have identified two medium risk findings: The ICT asset inventory is not consistently updated following HR events (refer finding 3.01); and The assets stored within the ICT stock rooms are not subject to regular review to ensure that the records are complete and accurate, and all stock is appropriately accounted for (refer finding 3.02) The systems and processes in place are not wholly in line with current best practice. ICT are aware of this and currently have a project underway to introduce a new service delivery system, which will include provision for a new, centralised ICT asset inventory. This is planned to be implemented in 2015, and will replace the existing inventories maintained. This technology solution, along with process improvements under consideration by ICT management should allow for stronger controls for monitoring ICT assets throughout the Council In the course of our review we identified areas of good practice operating within ICT asset management. In particular, we noted that there is an ICT Asset Management plan in place which aligns with the Councils Corporate Strategy, and is reviewed on an annual basis at the Finance, Policy and Resource Committee. Management comments The auditor was knowledgeable on their subject matter and provided some additional suggestions for inclusion in our Asset Management procedures. The audit highlighted that we hold detailed information on our assets, but that this is not always recorded in such a way to maximise its use. The findings are not unexpected and tie up with our current planned IT Service Improvements. 3
4 2. Detailed findings and recommendations 2.01 Updating the ICT asset inventory following HR events Control design Finding There is no process in place to ensure that the ICT hardware inventory is updated following key Human Resources (HR) events such as recruitment, redeployment, extended leave, resignation or dismissal. At present ICT is solely reliant on the department managers informing ICT of any staff who have had any change to their job status. Furthermore, the specific users of the laptops are not able to be identified from the ICT asset management inventories for all users, as departmental managers may have all assets for their team recorded under their own name. Risks If ICT are not aware of changes to staff employment status, the ICT inventory assets will not be updated to reflect the changes. This could lead to, for example, a heightened risk that management would be unable to identify which assets needed to be returned, which could potentially result in equipment not being returned. Action plan Finding rating Agreed action Responsible person / title Medium 1. Timely information driven from HR records will be investigated, to ensure ICT are made aware of any changes to employee status. 2. Regular reconciliations between leavers and the asset database will be performed, to ensure that the inventory remains current, and all assets are known. 3. ICT analysts will be reminded of their requirement to document the name and signature of the user of the asset when updating the hardware sheet, even where a number of assets are signed out by the departmental manager. 1. & 3. Sandra Massey, IT Manager 2.Craig Falconer, Service Desk Co-ordinator Target date: April April January
5 2.02 Performance of regular stock takes Control design Finding ICT do not perform reconciliations to ensure that the asset database records completely and accurately reflects the actual stock held in the store rooms. Best practice of asset management includes performing regular stock takes of assets held within local stores, to ensure that they are accurately reflected within the Council s records. We note that access to the stock rooms is restricted to only those responsible for signing out assets, and staff who manage the communications equipment, which partially mitigates the risks. Risks There is a risk that the stock listed on the database is inaccurate or incomplete. This may be due to stock being removed from the store room and ICT not being informed in of any movement. There is a heightened risk of fraud or theft, as misplaced assets may not be identified. Action plan Finding rating Agreed action Responsible person / title Medium The Service Desk team will perform a periodic stock count to confirm that all assets recorded as being in stock within the inventories are complete and accurate. Any discrepancies will be investigated and documented accordingly within the asset register and financial systems. Craig Falconer, Service Desk Co-ordinator Target date: 31 January
6 2.03 Maintenance of the ICT Asset Inventory Control Design Finding From our review of the ICT inventories, we noted that: Risks 1. There are currently three different inventories maintained by ICT, for computers, mobile devices and historic assets. As such there is no overall view of ICT assets owned by the Council. We note that a new system is currently being investigated that would address this finding. 2. Management have limited access to data they require in order to compare current performance to what is stated in the ICT Asset Management Plan. At present they can gain information on measures such as spend per unit; however they cannot gain information for all the measures as listed on the ICT Asset Management plan. 3. There are no formal written procedures in place for the actions to be taken if stock is lost, stolen or requiring repair. 4. There is no assessment for the criteria used to justify asset disposal, to ensure that assets are correctly and appropriately disposed. By not maintaining a central inventory, that is fully reflective of all asset changes, there increased risks that: 1. Performance of ICT may not be aligned to the performance measurements which have been listed in the ICT Asset Management Plan. Inconsistencies may be introduced to the various inventories when updating asset details. 2. Data in the ICT Asset Inventory may be inaccurate, due to inconstancies in updating asset data in areas where no formal procedures have been defined. 3. Assets may be being disposed of which should not be disposed resulting in a waste of resources. Alternatively, assets may not be disposed of when they should be; therefore potentially incurring high repair costs. Action plan Finding rating Agreed action Responsible person / title Low 1. Implement a system that allows for information to be centrally recorded, and supports reporting to monitor performance of key indicators to those agreed within the ICT Asset Management Plan. This action is dependent on the implementation of the new IT Service Management tool, the purchase of which is subject to Committee approval in February Current timescales are for implementation by December In the meantime, we will undertake more consistency checks between the existing systems 2. Formal procedures will be introduced to define how to update the ICT Asset Database for events such as lost or stolen assets. These procedures should be reviewed on an annual basis 3. Disposal criteria of assets will be documented, assessed and evidenced on a quarterly basis. 1. Sandra Massey, IT Manager 2.& 3. Craig Falconer, Service Desk Co-ordinator Target date: December February January
7 2.04 Maintenance of ICT asset inventory Operating deficiency Finding Through our testing of a sample of 25 asset purchases, we noted: Two occasions where the purchase service sheet was not uploaded to the VQSM system, resulting in insufficient evidence of approval. Four occasions where the signature used to authorise purchases was not on the authorised signatory listing. For all instances, the purchase had been appropriately approved through the procurement process. Furthermore, it was noted that repairs to ICT assets are not recorded against specific assets within the Asset Database. Risks There is a risk that assets have not been approved by ICT before purchase. These assets may be of a higher cost, which would result in ICT not achieving their targets as set out in the ICT Asset Management Plan. As repairs are not being documented, management are unable to track recurring issues and repair costs associated with certain asset types. Action plan Finding rating Agreed action Responsible person / title Low 1. All supporting documentation and authorisation will be retained and uploaded onto VQSM. 2. The list of authorised signatures will be kept up to date and only employees on this list can authorise the purchase of assets. 3. A repair function will be built into the specification of the new IT Service Management Tool, in order to enable ACC to identify repair trends. This will allow reports to be run to see if there are particular assets which have high repair costs. Sandra Massey, IT Manager Target date: January January December
8 2.05 No asset lifecycle has been defined Control design Finding ICT assets do not have a defined life cycle; assets are only replaced when the asset is no longer functional, or during special projects requiring upgrades to hardware (such as the XP replacement programme). Per discussion with ICT Management, we noted that this is due to budget restrictions. Due to the nature of change within technology, most organisations seek to replace IT assets, such as laptops and mobile devices, within a 3-5 year life cycle, to ensure that they remain current, provide the required level of service and performance, and are capable of receiving all required security updates. Risks ICT Assets may become redundant and not function with software updates, which could result in work being performed by staff being inadequate. Action plan Finding rating Agreed action Responsible person / title Advisory Consider introducing an Asset life cycle to allow ICT to track costs and maintain appropriate assets to support the services operations. To be considered within the revised ICT Asset Management Plan. Sandra Massey, IT Manager Target date: 30 April
9 Appendix 1 Background and Scope Background 2.01 The scope of our review was to understand and evaluate the controls in place over the Council s technology assets. ICT are responsible for the management of over 20,000 1 different assets, including computers, mobile devices, corporate network, and key business applications. Management estimate the replacement value for these assets exceeds 16 million 1. We focussed on understanding how the ICT Asset Management Plan aligns with the overall Council asset strategy, and how ICT maintain the ICT assets to support the Council s operations. Policy and procedure 2.02 There is an ICT Asset Management Plan in place which is aligned to the Council s Corporate Asset Strategy, which is reviewed on an annual basis. ICT asset management is regularly discussed at the Finance, Policy and Resource Committee. At present there are only limited reports that can be run to measure actual performance against the suggested benchmarks in the ICT Asset Management Plan due to system limitations There are currently three separate ICT asset inventories in place. Management are currently investigating a new service desk system that would allow for a more automated, central asset management system to be introduced. Scope and limitations of scope 2.04 The detailed scope of this review is set out in Appendix 2 in the Terms of Reference. We have undertaken a review of the design and operating effectiveness of the Council s control s for ICT Asset Management specifically those controls disclosed in the scope in the Terms of Reference. Our work was undertaken using a sample based approach. 1 Statistics from management s assessment within the ICT Asset Management Plan
10 Appendix 2 Basis of our classifications Individual finding ratings Finding rating Assessment rationale Critical A finding that could have a: Critical impact on operational performance; or Critical monetary or financial statement impact; or Critical breach in laws and regulations that could result in material fines or consequences; or Critical impact on the reputation or brand of the organisation which could threaten its future viability. High A finding that could have a: Significant impact on operational performance; or Significant monetary or financial statement impact ; or Significant breach in laws and regulations resulting in significant fines and consequences ; or Significant impact on the reputation or brand of the organisation. Medium A finding that could have a: Moderate impact on operational performance; or Moderate monetary or financial statement impact; or Moderate breach in laws and regulations resulting in fines and consequences; or Moderate impact on the reputation or brand of the organisation. Low A finding that could have a: Minor impact on the organisation s operational performance; or Minor monetary or financial statement impact; or Minor breach in laws and regulations with limited consequences; or Minor impact on the reputation of the organisation. Advisory A finding that does not have a risk impact but has been raised to highlight areas of inefficiencies or good practice. 10
11 Report classifications Findings rating Critical Points 40 points per finding Report classification Low risk Points 6 points or less High 10 points per finding Medium risk 7 15 points Medium 3 points per finding High risk points Low 1 point per finding Critical risk 40 points and over 11
12 Appendix 3 Agreed Terms of reference Background Aberdeen City Council has a significant volume of ICT assets across a number of sites and services. To achieve value for money, and full use from the hardware and software in use, it is important that all ICT assets are: Tracked and managed appropriately; Able to support service delivery and planning requirements; Upgraded appropriately, and developments are rolled out to the correct PCs; Appropriately protected from impacts of loss or theft; and Replaced on a timely basis, once they reach the end of their useful life Scope We will review the design and operating effectiveness of the key controls operated by corporate ICT to monitor ICT asset management. The sub-processes included in this review are: 12
13 Sub-process Control objectives IT Asset Management Management have a formal IT Asset Management Plan in place that is aligned to the Council s Corporate Asset Strategy ICT and Corporate management have access to appropriate management information to enable them to measure performance in achieving the IT Asset Management plan IT Inventory Management maintain an IT hardware asset inventory; The IT hardware asset inventory is updated on a regular basis and responsibility for maintenance is assigned to appropriate individual(s) The IT hardware asset inventory is updated for the impact of certain key IT events including: o Purchase o Deployment o Redeployment o Reported loss or theft; and o Retirement The IT hardware asset inventory is updated for the impact of certain key HR events including : o Recruitment o Redeployment o Extended Leave o Resignation; and o Dismissal 13
14 Limitations of scope The scope of our review is outlined above, and will be focussed on IT assets controlled by Corporate ICT. All controls testing will be undertaken on a sample basis. Internal control, no matter how well designed and operated, can provide only reasonable and not absolute assurance regarding achievement of an organisation's objectives. The likelihood of achievement is affected by limitations inherent in all internal control systems. These include the possibility of poor judgment in decision-making, human error, control processes being deliberately circumvented by employees and others, management overriding controls and the occurrence of unforeseeable circumstances. Audit approach Our audit approach is as follows: Obtain an understanding of the procedures in place through discussion with key personnel, review of documentation and walkthrough tests where appropriate. Identify the key risks in respect of IT asset management. Evaluate the design of the controls in place to address the key risks. Test the operating effectiveness of the key controls on a sample basis. Key Council Contacts Name Paul Fleming Sandra Massey Title Head of Customer Service and Performance ICT Manager 14
15 Appendix 4 - Limitations and responsibilities Limitations inherent to the internal auditor s work We have undertaken a review of the IT Asset Management, subject to the limitations outlined below. Internal control Internal control, no matter how well designed and operated, can provide only reasonable and not absolute assurance regarding achievement of an organisation's objectives. The likelihood of achievement is affected by limitations inherent in all internal control systems. These include the possibility of poor judgment in decision-making, human error, control processes being deliberately circumvented by employees and others, management overriding controls and the occurrence of unforeseeable circumstances. Future periods Our assessment of controls relating to IT Asset Management is as at December Historic evaluation of effectiveness is not relevant to future periods due to the risk that: the design of controls may become inadequate because of changes in operating environment, law, regulation or other; or The degree of compliance with policies and procedures may deteriorate. Responsibilities of management and internal auditors It is management s responsibility to develop and maintain sound systems of risk management, internal control and governance and for the prevention and detection of irregularities and fraud. Internal audit work should not be seen as a substitute for management s responsibilities for the design and operation of these systems. We endeavour to plan our work so that we have a reasonable expectation of detecting significant control weaknesses and, if detected, we shall carry out additional work directed towards identification of consequent fraud or other irregularities. However, internal audit procedures alone, even when carried out with due professional care, do not guarantee that fraud will be detected. Accordingly, our examinations as internal auditors should not be relied upon solely to disclose fraud, defalcations or other irregularities which may exist. 15
16 In the event that, pursuant to a request which Aberdeen City Council has received under the Freedom of Information Act 2000 or the Environmental Information Regulations 2004 (as the same may be amended or re-enacted from time to time) or any subordinate legislation made thereunder (collectively, the Legislation ), Aberdeen City Council is required to disclose any information contained in this document, it will notify PwC promptly and will consult with PwC prior to disclosing such document. Aberdeen City Council agrees to pay due regard to any representations which PwC may make in connection with such disclosure and to apply any relevant exemptions which may exist under the Legislation. If, following consultation with PwC, Aberdeen City Council discloses any this document or any part thereof, it shall ensure that any disclaimer which PwC has included or may subsequently wish to include in the information is reproduced in full in any copies disclosed. This document has been prepared only for Aberdeen City Council and solely for the purpose and on the terms agreed with Aberdeen City Council in our agreement dated 4 October We accept no liability (including for negligence) to anyone else in connection with this document, and it may not be provided to anyone else PricewaterhouseCoopers LLP. All rights reserved. In this document, "PwC" refers to PricewaterhouseCoopers LLP (a limited liability partnership in the United Kingdom), which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.
Aberdeen City Council IT Governance
Aberdeen City Council IT Governance Internal Audit Report 2013/2014 for Aberdeen City Council May 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary where applicable Terms or
Aberdeen City Council IT Security (Network and perimeter)
Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary
Aberdeen City Council IT Disaster Recovery
Aberdeen City Council IT Disaster Recovery Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates
Aberdeen City Council. Fleet Management Final Report
Aberdeen City Council Fleet Management Final Report Internal Audit Report 2013/2014 for Aberdeen City Council February 2014 Internal Audit KPI Targets Target Dates Actual Dates Red/Amber/ Green Commentary
Oxford City Council Managing Capital Projects
www.pwc.co.uk Internal Audit Report 2014/2015 August 2015 Oxford City Council Managing Capital Projects Table of Contents 1. Executive Summary... 3 2. Background and scope... 5 3. Detailed findings...
Payroll Review. Internal Audit Final Report 09_10 1.4. Assurance rating this review. Moderate. Distribution List. Chief Executive - Peter Sloman
Review Internal Audit Final Report 09_10 1.4 Assurance rating this review Moderate Distribution List Chief Executive - Peter Sloman Interim Executive Finance Director Nigel Pursey Heads of Finance - Penny
South Northamptonshire Council Contract Assurance: Leisure Contract
South Northamptonshire Council Contract Assurance: Leisure Contract FINAL Internal Audit Report 2012/2013 January 2013 Contents 1. Executive summary 4 2. Background and scope 5 3. Detailed current year
Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory. Assurance Rating:
Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory Assurance Rating: Distribution List: Draft Report: Principal Vice Principal, (Finance, Estates and Information Services) Clerk to the Corporation
Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010
Item 10 Appendix 1d Final Internal Audit Report Performance Management Greater London Authority April 2010 This report has been prepared on the basis of the limitations set out on page 16. Contents Page
Dacorum Borough Council Final Internal Audit Report
Dacorum Borough Council Final Internal Audit Report ICT Change Management Distribution list: Chris Gordon Group Manager Neil Telkman - Information, Security and Standards Officer Gary Osler ICT Service
Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010
Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 This report has been prepared on the basis of the limitations set
FRAMEWORK FOR THE PREPARATION OF ACCOUNTS. Best Practice Guidance
FRAMEWORK FOR THE PREPARATION OF ACCOUNTS Best Practice Guidance Revised Edition April 2010 PUBLISHED IN APRIL 2010 THE INSTITUTE OF CHARTERED ACCOUNTANTS OF SCOTLAND This document is published by the
Draft Internal Audit Report Software Licensing Audit. December 2009
Draft Internal Audit Report Software Licensing Audit December 2009 Contents Page Executive Summary 3 Observations and Recommendations 6 Appendix 1 Audit Framework 9 Appendix 2 - Staff Interviewed 10 Statement
Inquiry Regarding Litigation and Claims
Auditing Standard AUS 508 (July 2002) Inquiry Regarding Litigation and Claims Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation Issued by the Australian
Bedfordshire Fire and Rescue Authority Corporate Services Policy and Challenge Group 16 September 2015 Item No. 11
For Publication REPORT AUTHOR(S): Bedfordshire Fire and Rescue Authority Corporate Services Policy and Challenge Group 16 September 2015 Item No. 11 ASSISTANT CHIEF OFFICER (HUMAN RESOURCES AND ORGANISATIONAL
2 Matters to report from internal audit work completed during the period
1 Introduction Appendix A 1.1 This report summarises the work undertaken during the nine months of the year to 31 December 2011 by the council's Internal Audit Service under the internal audit plan for
Information Commissioner's Office
Phil Keown Engagement Lead T: 020 7728 2394 E: [email protected] Will Simpson Associate Director T: 0161 953 6486 E: [email protected] Information Commissioner's Office Internal Audit 2015-16:
Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority
Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 700 THE AUDITOR S REPORT ON FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 700 THE AUDITOR S REPORT ON FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-4 Basic Elements of the Auditor s Report... 5-26-1 The Auditor
Annual Report of Internal Audit 2012/13
Open Decision Item 4 Audit & Governance Committee 19 th June 2013 Annual Report of Internal Audit 2012/13 SYNOPSIS To report on Internal Audit s opinion of the overall adequacy and effectiveness of the
Coleg Gwent Internal Audit Report 2012/13 Payroll and HR. Assurance Rating: Payroll
Coleg Gwent Internal Audit Report 2012/13 Payroll and HR Assurance Rating: Payroll HR Distribution List: Final Report Audit Committee Principal Vice Principal, (Finance, Estates and Information Services)
Governance, Risk and Best Value Committee
Governance, Risk and Best Value Committee 2.00pm, Wednesday 23 September 2015 Internal Audit Report: Integrated Health & Social Care Item number Report number Executive/routine Wards Executive summary
Essex County Council - Internal Audit Report 2007/08 -
Essex County Council - Internal Audit Report 2007/08 - Corporate Credit Cards FINAL REPORT 1. Executive Summary Department: Corporate Resources Audit Sponsor: Bob Coomber Interim Executive Director of
Proposed Auditing Standard: Inquiry Regarding Litigation and Claims (Re-issuance of AUS 508)
EXPOSURE DRAFT ED 27/05 (December 2005) Proposed Auditing Standard: Inquiry Regarding Litigation and Claims Prepared and Issued by the Auditing and Assurance Standards Board Commenting on this Exposure
Coleg Gwent Internal Audit Report 2014/15 Staff Performance Management. Assurance Rating:
Coleg Gwent Internal Audit Report 2014/15 Staff Performance Management Assurance Rating: Distribution List: Final Report Audit Committee Principal Vice Principal, (Resources and Financial Planning)/Director
Avon & Somerset Police Authority
Avon & Somerset Police Authority Internal Audit Report IT Service Desk FINAL REPORT Report Version: Date: Draft to Management: 19 February 2010 Management Response: 12 May 2010 Final: 13 May 2010 Distribution:
TREASURER S DIRECTIONS CASH MANAGEMENT TRANSACTION MANAGEMENT Section C3.3 : Corporate Credit Cards
TREASURER S DIRECTIONS CASH MANAGEMENT TRANSACTION MANAGEMENT Section C3.3 : Corporate Credit Cards STATEMENT OF INTENT The use of Corporate Credit Cards can provide an efficient and effective payment
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
Reporting on Control Procedures at Outsourcing Entities
Auditing Guidance Statement AGS 1042 (July 2002) Reporting on Control Procedures at Outsourcing Entities Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation
Special Purpose Reports on the Effectiveness of Control Procedures
Auditing Standard AUS 810 (July 2002) Special Purpose Reports on the Effectiveness of Control Procedures Prepared by the Auditing & Assurance Standards Board of the Australian Accounting Research Foundation
Essex Fire Authority. Fleet Management. Internal Audit Report (4.12/13) 28 February 2013 FINAL. Overall Opinion
Essex Fire Authority Fleet Management Internal Audit Report (4.12/13) 28 February 2013 FINAL Overall Opinion Essex Fire Authority Fleet Management 4.12/13 CONTENTS Section Page Executive Summary 1 Action
Appendix A. Call-off Terms and Conditions for the Provision of Services
Appendix A Call-off Terms and Conditions for the Provision of Services Where an Order Form is issued by the Authority that refers to the Framework Agreement, the Contract is made between the Authority
Clause 1. Definitions and Interpretation
[Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-
Office of the Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary
Office of the Police and Crime Commissioner for Avon and Somerset and Avon and Somerset Constabulary Internal Audit Report () FINAL Risk Management: Follow Up of Previous Internal Audit Recommendations
University of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
Caedmon College Whitby
Caedmon College Whitby Data Protection and Information Security Policy College Governance Status This policy was re-issued in June 2014 and was adopted by the Governing Body on 26 June 2014. It will be
LADYSMITH/EMNAMBITHI MUNICIPALITY Management Policy EMNAMBITHI/LADYSMITH MUNICIPALITY INVENTORY MANAGEMENT POLICY. Page 1 of 11
Management Policy Inventory EMNAMBITHI/LADYSMITH MUNICIPALITY Page 1 of 11 Contents Page No. 1. Definitions 3 2. Objective 5 3. Scope 5 4. Legal Framework 5 5. Inventory Procedure 7 Inventory Record 11
SCRUTINY COMMITTEE ITEM 04 28 MARCH 2012
SCRUTINY COMMITTEE ITEM 04 28 MARCH 2012 INTERNAL AUDIT PLAN Report of the: Director of Finance Contact: John Turnbull or Gillian McTaggart Urgent Decision?(yes/no) No If yes, reason urgent decision required:
Recommendations which have been implemented have been removed from this report. The original numbering of recommendations has been retained.
Audit Committee, 25 June 2013 Internal audit Review of recommendations Executive summary and recommendations At its meeting on 29 September 2011, the Committee agreed that it should receive a paper at
How To Audit A Company
INTERNATIONAL STANDARD ON AUDITING 315 IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT (Effective for audits of financial statements for
Independent Auditors Report to the Commissioner for Law Enforcement Data Security -
Commissioner for Law Enforcement Data Security Audit of Victoria Police Compliance with CLEDS standards on Access Control and Release June 2008 Reference: Version: FY07/08 Final Date of review: April -
APES 310 Dealing with Client Monies
EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies ISSUED: December 2010 Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) Prepared and issued by Accounting
PRACTICE NOTE 22 THE AUDITORS CONSIDERATION OF FRS 17 RETIREMENT BENEFITS DEFINED BENEFIT SCHEMES
PRACTICE NOTE 22 THE AUDITORS CONSIDERATION OF FRS 17 RETIREMENT BENEFITS DEFINED BENEFIT SCHEMES Contents Introduction Background The audit approach Ethical issues Planning considerations Communication
RISK MANAGEMENT AND COMPLIANCE
RISK MANAGEMENT AND COMPLIANCE Contents 1. Risk management system... 2 1.1 Legislation... 2 1.2 Guidance... 3 1.3 Risk management policy... 4 1.4 Risk management process... 4 1.5 Risk register... 8 1.6
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY
USER AGREEMENT FOR: ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY CONDITIONS OF USE FOR ELECTRONIC DEALINGS THROUGH THE CUSTOMS CONNECT FACILITY Between: the Commonwealth of Australia, acting
Appendix 1e DIRECTORATE OF AUDIT, RISK AND ASSURANCE INTERNAL AUDIT SERVICE TO THE GLA
Appendix 1e DIRECTORATE OF AUDIT, RISK AND ASSURANCE INTERNAL AUDIT SERVICE TO THE GLA REVIEW OF PAYROLL February 2012 DISTRIBUTION LIST Audit Team Karen Welsh, Auditor Prakash Gohil, Audit Manager Distribution
LONDON STOCK EXCHANGE HIGH GROWTH SEGMENT RULEBOOK 27 March 2013
LONDON STOCK EXCHANGE HIGH GROWTH SEGMENT RULEBOOK 27 March 2013 Contents INTRODUCTION... 2 SECTION A ADMISSION... 3 A1: Eligibility for admission... 3 A2: Procedure for admission... 4 SECTION B CONTINUING
YEARENDED31DECEMBER2013 RISKMANAGEMENTDISCLOSURES
RISKMANAGEMENTDISCLOSURES 2015 YEARENDED31DECEMBER2013 ACCORDINGTOCHAPTER7(PAR.34-38)OFPARTCANDANNEXXIOFTHECYPRUSSECURITIES ANDEXCHANGECOMMISSIONDIRECTIVEDI144-2007-05FORTHECAPITALREQUIREMENTSOF INVESTMENTFIRMS
APB ETHICAL STANDARD 5 (REVISED) NON-AUDIT SERVICES PROVIDED TO AUDITED ENTITIES
APB ETHICAL STANDARD 5 (REVISED) NON-AUDIT SERVICES PROVIDED TO AUDITED ENTITIES (Revised December 2010, updated December 2011) Contents paragraph Introduction 1 4 General approach to non-audit services
David MacBrayne HR (UK) Limited Directors report and financial statements Registered number SC282760 31 March 2010
David MacBrayne HR (UK) Limited Directors report and financial statements Registered number SC282760 Contents Directors report 1 Statement of Directors responsibilities 3 Independent auditors report 4
How To Manage A University Computer System
PC asset management policy Name of policy, procedure or regulation Purpose of policy, procedure or regulation PC asset management policy To provide a policy framework in relation to PC asset management
APES 310 Dealing with Client Monies
M EXPOSURE DRAFT ED 01/10 (April 2010) APES 310 Dealing with Client Monies Proposed Standard: APES 310 Dealing with Client Monies (Supersedes APS 10) [Supersedes APES 310 Dealing with Client Monies issued
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
Sarbanes-Oxley Section 404: Management s Assessment Process
Sarbanes-Oxley Section 404: Management s Assessment Process Frequently Asked Questions ADVISORY Contents 1 Introduction 2 Providing a Road Map for Management 3 Questions and Answers 3 Section I. Planning
AUDIT REPORT INTERNAL AUDIT DIVISION. Asset management at the UNHCR operations in Georgia
INTERNAL AUDIT DIVISION AUDIT REPORT Asset management at the UNHCR operations in Georgia Internal controls over the management of assets and inventory items were inadequate 8 March 2010 Assignment No.
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
Terms and Conditions for Online Services of BOC Credit Card (International) Limited
Terms and Conditions for Online Services of BOC Credit Card (International) Limited Online Services of BOC Credit Card (International) Limited ("BOCCC") are provided to you by Bank of China (Hong Kong)
Transmittal Letter... 1. Objectives and Scope... 2. Approach... 3-7. Financial System... 8. Permitting Application... 9
Internal Audit Committee of Information Technology Risk Assessment Public Report Prepared By: Internal Auditors of Brevard County September 30, 2009 Table of Contents Transmittal Letter... 1 Objectives
How To Understand The Importance Of Internal Control
FINANCIAL REPORTING COUNCIL INTERNAL CONTROL REVISED GUIDANCE FOR DIRECTORS ON THE COMBINED CODE OCTOBER 2005 FINANCIAL REPORTING COUNCIL INTERNAL CONTROL REVISED GUIDANCE FOR DIRECTORS ON THE COMBINED
BOC Credit Card (International) Limited - Terms and Conditions for Online Services
BOC Credit Card (International) Limited - Terms and Conditions for Online Services These terms and conditions are applicable to all users of the Online Services and govern the use of the Online Services,
Auditor General s Office. Governance and Management of City Computer Software Needs Improvement
Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City
F I N A N C I A L R E G U L A T I O N S
F I N A N C I A L R E G U L A T I O N S South Downs National Park Authority March 2014 Page 0 of 17 F I N A N C I A L R E G U L A T I O N S Contents Page 1 INTRODUCTION Purpose of Financial Regulations
Annual Governance Statement 2013/14
31 Annual Governance Statement 2013/14 1. SCOPE OF RESPONSIBILITY ESPO is responsible for ensuring that its business is conducted in accordance with the law and proper standards, and that public money
Human Resources Policy documents. Data Protection Policy
Policy documents Aims of the Policy apetito is committed to meeting its obligations under data protection law. As a business, apetito handles a range of Personal Data relating to its customers, staff and
Bridgend County Borough Council. Corporate Risk Management Policy
Bridgend County Borough Council Corporate Risk Management Policy December 2014 Index Section Page No Introduction 3 Definition of risk 3 Aims and objectives 4 Strategy 4 Accountabilities and roles 5 Risk
Entitlements Management System (EMS) Technology Update Project Health Check Review
Entitlements Management System (EMS) Technology Update Project Health Check Review February 2010 Final This report and PricewaterhouseCoopers deliverables are intended solely for the Department of Finance
Information Security Policy
Information Security Policy Author: Responsible Lead Executive Director: Endorsing Body: Governance or Assurance Committee Alan Ashforth Alan Lawrie ehealth Strategy Group Implementation Date: September
Interim Audit Report. Borough of Broxbourne Audit 2010/11
Interim Audit Report Borough of Broxbourne Audit 2010/11 The Audit Commission is an independent watchdog, driving economy, efficiency and effectiveness in local public services to deliver better outcomes
1.1 An initial request to enter into a contractual arrangement may be initiated by either Massey University or another party (Other Party).
CONTRACT MANAGEMENT PROCEDURE Section Risk Management Contact Risk Manager Last Review February 2013 Next Review February 2016 Approval Not required Procedures Contract Initiation Request Mandatory Guidance
Audit, Risk and Compliance Committee Charter
1. Background Audit, Risk and Compliance Committee Charter The Audit, Risk and Compliance Committee is a Committee of the Board of Directors ( Board ) of Syrah Resources Limited (ACN 125 242 284) ( Syrah
Appendix 1C. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA PAYROLL CONTROL FRAMEWORK
Appendix 1C DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA PAYROLL CONTROL FRAMEWORK DISTRIBUTION LIST Audit Team Prakash Gohil, Audit Manager Karen Walker, Risk and Assurance
New Zealand Institute of Chartered Accountants
New Zealand Institute of Chartered Accountants FAES Issued 11/09 Amended 07/13 ENGAGEMENT STANDARD FINANCIAL ADVISORY ENGAGEMENTS Issued by the Board of the New Zealand Institute of Chartered Accountants
Smart Meters Programme Schedule 8.6. (Business Continuity and Disaster Recovery Plan) (CSP North version)
Smart Meters Programme Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Schedule 8.6 (Business Continuity and Disaster Recovery Plan) (CSP North version) Amendment History
Plan for the audit of the 2011 financial statements
INTERNATIONAL TRAINING CENTRE OF THE ILO Board of the Centre 73rd Session, Turin, 3-4 November 2011 CC 73/5/2 FOR INFORMATION FIFTH ITEM ON THE AGENDA Plan for the audit of the 2011 financial statements
Compliance. Group Standard
Group Standard Compliance Serco is committed to good governance practices and the management of risks supported by a robust business compliance process SMS-GS-G2 Compliance July 2014 v1.0 Serco Public
Citywide Contract Compliance Audit Report
City of Berkeley Office of the City Auditor Ann-Marie Hogan, City Auditor Citywide Contract Compliance Audit Report Prepared by: Ann Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit
Review of an SMSF audit engagement questionnaire
Review of an SMSF audit engagement questionnaire Introduction Instructions for the Reviewer This questionnaire has been designed to help you assess whether the audit of Self Managed Superannuation Funds
Overview of the Transfer of Undertakings (Protection of Employment) Regulations 2006
TUPE Overview of the Transfer of Undertakings (Protection of Employment) Regulations 2006... 1 Service Provision Changes... 1 Employer Liability Information... 2 Liability for Failure to Inform and Consult
Corporate Information Security Policy
Corporate Information Security Policy. A guide to the Council s approach to safeguarding information resources. September 2015 Contents Page 1. Introduction 1 2. Information Security Framework 2 3. Objectives
中 國 通 信 服 務 股 份 有 限 公 司
中 國 通 信 服 務 股 份 有 限 公 司 CHINA COMMUNICATIONS SERVICES CORPORATION LIMITED (A joint stock limited company incorporated in the People s Republic of China with limited liability) (Stock Code: 552) AUDIT COMMITTEE
APPENDIX 23 ATTACHMENT 1. City of Joondalup. 2014 Review of Financial Management Systems and Procedures. March 2015
APPENDIX 23 ATTACHMENT 1 City of Joondalup 2014 Review of Financial Management Systems and Procedures March 2015 Deloitte Touche Tohmatsu ABN 74 490 121 060 Woodside Plaza Level 14 240 St Georges Terrace
INTERNAL AUDIT SERVICES Glenorchy City Council Internal audit report of Derwent Entertainment Centre financial business and operating systems
INTERNAL AUDIT SERVICES Internal audit report of Derwent Entertainment Centre financial business and operating systems ADVISORY Contents Executive summary...2 Internal audit findings...4 Summary of other
Internal audit report Information Security / Data Protection review
Audit Committee 29 September 2011 Internal audit report Information Security / Data Protection review Executive summary and recommendations Introduction Mazars have undertaken a review of Information Security
