Software Licensing AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE
|
|
|
- Helena Welch
- 10 years ago
- Views:
Transcription
1 Systems Audit and Control Association Formatted Software Licensing AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE Formatted The Systems Audit and Control Association With more than 23,000 members in over 100 countries, the Systems Audit and Control Association (ISACA ) is a recognized global leader in IT governance, control and assurance. Founded in 1969, ISACA sponsors international conferences, administers the globally respected CISA (Certified Systems Auditor ) designation earned by more than 25,000 professionals worldwide, and develops globally applicable information systems (IS) auditing and control standards. An affiliated foundation undertakes the leading-edge research in support of the profession. The IT Governance Institute, established by the association and foundation in 1998, is designed to be a "think tank" offering presentations at both ISACA and non-isaca conferences, publications and electronic resources for greater understanding of the roles and relationship between IT and enterprise governance. Purpose of These Audit Programs and Internal Control Questionnaires One of the goals of ISACA s Education Board is to ensure that educational products developed by ISACA support member and industry information needs. Responding to member requests for useful audit programs, the Education Board has recently released audit programs and internal control questionnaires on various topics for member use through the member-only web site and K-NET. These products are intended to provide a basis for audit work. E-business audit programs and internal control questionnaires were developed from material recently released in ISACA s e-commerce Security Technical Reference Series. These technical reference guides were developed by Deloitte & Touche and ISACA s Research Board and are recommended for use with these audit programs and internal control questionnaires. Audit programs and internal questionnaires on other subjects were developed by ISACA volunteers and reviewed and edited by the Education Board. The Education Board cautions users not to consider these audit programs and internal control questionnaires to be all-inclusive or applicable to all organizations. They should be used as a starting point to build upon based on an organization s constraints, policies, practices and operational environment. Disclaimer The topics developed for these Audit Programs and Internal Control Questionnaires have been prepared for the professional development of ISACA members and others in the IS Audit and Control community. Although we trust that they will be useful for that purpose, ISACA cannot warrant that the use of this material would be adequate to discharge the legal or professional liability of members in the conduct of their practices. September
2 Software Inventories Obtain software inventories of all programs located on the network. Obtain the inventory of all software that is officially authorized to be installed on the organization s workstations. This should include: - Software - the name, platform and current version(s) of the software. There can be multiple entries for identical software purchased at different times if this is more convenient for the administrator. There can also be multiple entries if the company has mixed versions of the same software - Number of copies purchased - Date purchased - the original purchase date(s) - Updates - a history of any updates applied, including a statement of the original version number - Evidence of License - a statement of how the administrator can demonstrate a right to use the software. This could be the location of the license certificates; a purchase order number or whatever is acceptable. The entry should be specific enough to allow locating the actual evidence. - Deployment - how the licenses are being used and controlled. For example, a list of the PCs on which it is installed or the server(s) it is installed on together with a statement of the license management mechanism and the level set. - Comments - any restrictions on the use of the license, maintenance contracts in place, "sharing" agreements with other units within the Company, etc. If the organization does not have this information readily available, that s the first audit issue. If there is no central person/group charged with the responsibility of maintaining this information, that s the next audit issue. Applicable policies and procedures Get operating procedures and policies for software acquisition, - Obtain procedures and policies relating to acquisition of non-official software on organization equipment. If the policies do not contain explicit guidance on both official and nonofficial software, this is another audit issue 2
3 Applicable policies and procedures Get operating procedures and policies for license compliance, including continuous and periodic monitoring. Obtain procedures and policies relating to installation of non-official software on organization equipment. If the policies do not contain explicit guidance on both official and nonofficial software, this is another audit issue. Proof of monitoring Get proof and summaries of the latest results of Services compliance testing and monitoring, both continuous and periodic. Organizational Practices Corrective Actions Determine what corrective actions are in place when non-compliance is determined. - Are they written? - Have they been published to the user community? - Do they provide for escalating solutions? - Have corrections been confirmed? Organizational Practices Monitoring for License Compliance Analyze whether monitoring techniques for continued compliance follow specified policies and operational guidance. Inventory Control Goals Determine if a risk analysis has been done and, if so, the results. Determine whether the goals for monitoring, control of the software inventory and the distribution over the network include the concept of risk. 3
4 Cost vs. Benefit Identify the cost factors that management considers appropriate (monetary loss, lawsuit potential, public embarrassment, etc.) Analyze whether the cost of the exposure exceeds the monitoring for noncompliance. Security Methods Evaluate the security methods in place to ensure the proper protection of copyright agreements, licensing agreements, and monitoring methods. - Include both physical (i.e., physical protection of software media, such as CDs), and logical (i.e., access restrictions to installed software libraries). Obsolete Software Identify who is responsible for identifying and disposing of obsolete and/or surplus software. - Inquire as to whether there is any obsolete or surplus software on hand. If there is no one responsible for the determination (another audit issue) observe the premises and inquire of organizational personnel. Review the records of prior disposals. If there is obsolete and/or surplus software on hand: - Inquire as to what steps have been taken to arrange for the disposal or sharing of the items and what supporting documentation exists to verify the actions. - Determine the disposition of depreciable but obsolete software. Depending on the wording of the software license, software that is of no further use in the organization may be sold, disposed of or transferred (providing that it was purchased by the organization in the first place). The sale or disposal must include all of the original media, licenses, user manuals and must be deleted or de-installed from the existing system including backup copies. 4
5 Storage Determine the adequacy of all software storage areas in terms of environmental protection, access security, and monitoring methods. Sample Inventory Test Policy/Guidance: These steps should be done in a variety of departments and offices. Depending on the determined risk it may be necessary to, on a sample basis, inventory the software installed on the computers attached to the LAN or on departmental computers. - Using software such as SPAudit by Software Publisher's Association can facilitate this process. - If such tool is not available, obtain a current inventory of all installed software packages. If primary licensing controls appear sound, in place, and are functioning, then determine when the last physical inventory of installed software was made. - If current, an independent sample inventory may not be necessary. - If somewhat dated, a sample inventory should be taken. Restrictions on installation of non-official software Identify the specific restrictions on non-official software contained in organizational policy. This may include downloads from the Internet, certain screensaver programs, games, etc. Monitoring for Determine whether the organization has reviewed for compliance with the specific restrictions set out above. - If so, and the review is current, a sample inventory may not be necessary. - If not or the review is not current, a sample inventory is necessary to validate compliance with the policy. Note: If the software original discs, CDROMS, licenses and user manuals have been legally upgraded then there is no legal way that one can dispose of the prior versions as the original upgrades all require original proof of the purchase and as an auditor it needs to be traced. 5
Business Continuity Planning
Information Systems Audit and Control Association www.isaca.org Business Continuity Planning AUDIT PROGRAM & INTERNAL CONTROL QUESTIONNAIRE The Information Systems Audit and Control Association With more
SOFTWARE MANAGEMENT EXECUTIVE SUMMARY
SOFTWARE MANAGEMENT EXECUTIVE SUMMARY Under a task order with the Office of Inspector General, Jefferson Wells reviewed the Commission s software management. Our review found that some controls and best
Software Asset Management Toolkit
Software Asset Management Toolkit Autodesk License Compliance I stay compliant Get the Benefits of Software Asset Management Implementing a software asset management (SAM) program can help you effectively
10 Reasons why Visma is the best software supplier for your business
10 Reasons why Visma is the best software supplier for your business 10 Reasons to choose Visma Even the best software or service available on the market, will not benefit your business unless it meets
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
CREDIT CARD MERCHANT PROCEDURES MANUAL. Effective Date: 5/25/2011
CREDIT CARD MERCHANT PROCEDURES MANUAL Effective Date: 5/25/2011 Updated: May 25, 2011 TABLE OF CONTENTS Introduction... 1 Third-Party Vendors... 1 Merchant Account Set-up... 2 Personnel Requirements...
WHO SHOULD READ THIS POLICY
NEW YORK UNIVERSITY Asset Management Policies & Procedures (October, 2010) POLICY STATEMENT New York University requires every school, department, or unit to acquire, record, inventory, and dispose of
IT Governance and Outsourcing
Copyright 2004 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. IT Governance and Outsourcing By Hugh Parkes, CISA, FCA is a subset of corporate governance. It refers
The University of Georgia Service Center Policy
TABLE OF CONTENTS The University of Georgia Service Center Policy 1. INTRODUCTION... 4 2. SCOPE... 4 2.1. Recharge Activities... 4 2.2. Service Centers... 4 2.3. Specialized Service Centers... 4 3. INTENT....
ISACA is responding to the PCAOB questions principally from an information technology (IT) perspective.
3701 Algonquin Road, Suite 1010 Telephone: 847.253.1545 Rolling Meadows, Illinois 60008, USA Facsimile: 847.253.1443 Web Sites: www.isaca.org and www.itgi.org 17 December 2007 Office of the Secretary Public
IT OUTSOURCING SECURITY
IT OUTSOURCING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Internal Control Guide & Resources
Internal Control Guide & Resources Section 5- Internal Control Activities & Best Practices Managers must establish internal control activities that support the five internal control components discussed
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Application for CISA Certification
Application for CISA Certification 4/2015 Requirements to Become a Certified Information Systems Auditor become a Certified Information Systems Auditor (CISA), an applicant must: 1. Score a passing grade
UW-EXTENSION BUSINESS SERVICES POLICY AND PROCEDURE DOCUMENT (BSPPD) #18 CAPITAL EQUIPMENT
UW-EXTENSION BUSINESS SERVICES POLICY AND PROCEDURE DOCUMENT (BSPPD) #18 CAPITAL EQUIPMENT INTRODUCTION UW-System policy F33 establishes a systemwide policy on the accountability for capital equipment.
Top 10 Most Popular Reports in Enterprise Reporter
Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software
IT06 - Information Technology (IT) Hardware and Software Policy
IT06 - Information Technology (IT) Hardware and Software Policy Introduction 1 This policy sets out the general rules for the use of Southampton Solent University IT hardware and software. Southampton
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected]
Contracting Guidelines with EHR Vendors
Doctors Office Quality - Information Technology (DOQ-IT) Project Contracting Guidelines with EHR Vendors In general, if a contract is presented to your group from a software company, it will be written
INFORMATION SECURITY Humboldt State University
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of
FINANCIAL AND PURCHASING RECORDS. Includes records showing a summary of receipts, disbursements and other activity against each account.
FINANCIAL AND PURCHASING RECORDS FN-1 Account Distribution Summaries (Treasurer s Report) Includes records showing a summary of receipts, disbursements and other activity against each account. Weekly/Monthly-
FINANCIAL POLICIES & PROCEDURES USER GUIDE SECTION 15
I. INTRODUCTION The following fixed asset control policies and procedures help ensure proper stewardship of the School s real property which includes land, buildings, improvements to land other than buildings
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
PRACTICE NOTE 1013 ELECTRONIC COMMERCE - EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (Issued December 2003; revised September 2004 (name change)) PN 1013 (September 04) PN 1013 (December 03) Contents Paragraphs
Software Asset Management (SAM) Standard Ver. 4.1
Software Asset Management (SAM) Standard Ver. 4.1 June 18, 2014 Disclaimer and Usage Restrictions of Software Asset Management (SAM) Standard Disclaimer: The (hereinafter referred to as SAMAC ) does not
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
Technical Upgrade Considerations for JD Edwards World Customers. An Oracle White Paper February 2013
Technical Upgrade Considerations for JD Edwards World Customers An Oracle White Paper February 2013 PURPOSE STATEMENT THIS DOCUMENT PROVIDES AN OVERVIEW OF CUSTOMER OPTIONS FOR GETTING TO THE MOST CURRENT
GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011
APPENDIX 1 GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT January 7, 2011 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS
Fixed Asset Policy & Procedures. Content
Content 1. Purpose... 3 2. Definitions... 3 3. Responsibility... 3 4. Tagging and Identifying Inventoriable Assets... 4 5. Additions to Fixed Assets... 4 6. Transfer of Assets... 5 7. Disposition of Assets...
ENVIRONMENTAL, HEALTH & SAFETY MANAGEMENT SYSTEMS MANUAL
September 7, 202 940. General Requirements (ISO 400 4.; OHSAS 800 4.).. Alcoa Fastening Systems Republic Operations (AFS Republic) has established, documented, implemented, maintains, and continuously
Hardware and Software
Hardware and Software Purpose Bellevue School District (BSD) provides and requires faculty, staff and students to use data processing equipment and peripherals. BSD maintains multiple computer systems
Financial Reporting by Superannuation Plans
Australian Accounting Standard AAS 25 March 1993 Financial Reporting by Superannuation Plans Prepared by the Public Sector Accounting Standards Board of the Australian Accounting Research Foundation and
Draft Internal Audit Report Software Licensing Audit. December 2009
Draft Internal Audit Report Software Licensing Audit December 2009 Contents Page Executive Summary 3 Observations and Recommendations 6 Appendix 1 Audit Framework 9 Appendix 2 - Staff Interviewed 10 Statement
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
University of South Wales Software Policies
University of South Wales Software Policies Updated 23 rd January 2015 Page 1 University of South Wales - Software Policies The University s software policies are applicable to all software and datasets
Asset Replacement Strategy and Procedure Draft
Asset Replacement Strategy and Procedure Draft 1 Introduction Academies are required to establish systems of control to ensure that assets and resources used by the academy are recorded and adequately
Software Licenses Managing the Asset and Related Risks
AUDITOR GENERAL S REPORT ACTION REQUIRED Software Licenses Managing the Asset and Related Risks Date: February 4, 2015 To: From: Wards: Audit Committee Auditor General All Reference Number: SUMMARY The
DETAIL AUDIT PROGRAM Information Systems General Controls Review
Contributed 4/23/99 by Steve_Parker/TBE/[email protected] DETAIL AUDIT PROGRAM Information Systems General Controls Review 1.0 Introduction The objectives of this audit are to review policies, procedures,
Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement
Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT
Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory. Assurance Rating:
Coleg Gwent Internal Audit Report 2012/13 Assets and Inventory Assurance Rating: Distribution List: Draft Report: Principal Vice Principal, (Finance, Estates and Information Services) Clerk to the Corporation
ARKANSAS TECH UNIVERSITY
ARKANSAS TECH UNIVERSITY INVENTORY CONTROL MANUAL SEPTEMBER 2005 PROPERTY MANAGEMENT OFFICE 204 BRYAN EXT. 6087 FAX 968-0227 INTRODUCTION The purpose of this Inventory Manual is to present a uniform method
INSURANCE ACT R.S.A. c. I16
ANGUILLA REVISED REGULATIONS OF ANGUILLA under INSURANCE ACT R.S.A. c. I16 Showing the Law as at 15 December 2004 Regulation Citation Page INSURANCE REGULATIONS R.R.A. I16-1 3 Revises: R.A. 29/2004, in
Software License Asset Management (SLAM) Part 1
LANDesk White Paper Software License Asset Management (SLAM) Part 1 Five Steps to Reduce Software License Costs and Ensure Audit Preparedness Contents A Software Audit Looms in Your Future.... 3 Overbuying
Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.
Table of Contents PART I. IS Audit Process. CHAPTER 1. Technology and Audit. Technology and Audit. Batch and On-Line Systems. CHAPTER 2. IS Audit Function Knowledge. Information Systems Auditing. What
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
Mojave Water Agency. Fixed Assets and Surplus Property Policy
Mojave Water Agency Fixed Assets and Surplus Property Policy 2009 Table of Contents 1.0 PURPOSE... 3 2.0 DEFINITION OF A FIXED ASSET... 3 3.0 GENERAL FIXED ASSETS... 4 3.1 Purchasing a General Fixed Asset...
New Jersey City University Information Technology Equipment Policies & Procedures Page 1 of 5
Page 1 of 5 TABLE OF CONTENTS Page No. INTRODUCTION... 3 PURPOSE... 3 SCOPE... 3 POLICY... 3 INFORMATION TECHNOLOGY EQUIPMENT... 3 INVENTORY... 4 EQUIPMENT RECEIVED BY ITS DEPARTMENT... 4 EQUIPMENT RECEIVED
Cloud computing. Advantages and disadvantages
Cloud computing Advantages and disadvantages CPA Australia Ltd ( CPA Australia ) is one of the world s largest accounting bodies representing more than 139,000 members of the financial, accounting and
Auditor General s Office. Governance and Management of City Computer Software Needs Improvement
Auditor General s Office Governance and Management of City Computer Software Needs Improvement Transmittal Report Audit Report Management s Response Jeffrey Griffiths, C.A., C.F.E Auditor General, City
Interagency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
Symantec Endpoint Protection Analyzer Report
Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...
DISPOSAL OF MOVEABLE CAPITAL EQUIPMENT
DISPOSAL OF MOVEABLE CAPITAL EQUIPMENT Policy Statement This policy is intended to provide assistance in determining the proper accounting for moveable equipment (also referred to as capital equipment)
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
INFORMATION SECURITY California Maritime Academy
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:
TTC AUDIT COMMITTEE REPORT NO.
Form Revised: February 2005 TTC AUDIT COMMITTEE REPORT NO. MEETING DATE: July 14, 2009 SUBJECT: INTERNAL AUDIT REPORT MATERIALS & PROCUREMENT INVENTORY PLANNING INFORMATION ITEM RECOMMENDATION It is recommended
HITS HR & PAYROLL CLOUD MODEL WHITEPAPER
HITS HR & PAYROLL CLOUD MODEL WHITEPAPER Deciphering Total Cost of Ownership Total Cost of Ownership, or TCO, is commonly defined as the estimate of all direct and indirect costs associated with an asset
OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT. County of San Diego Auditor and Controller
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES MOBILE DEVICE MANAGEMENT COUNTYWIDE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Audit Manager: Lynne Prizzia, CISA,
President and Board of Trustees Miami University 107 Roudebush Hall Oxford, Ohio 45056
President and Board of Trustees Miami University 107 Roudebush Hall Oxford, Ohio 45056 We have reviewed the Independent Auditors Report of the Miami University, Butler County, prepared by Deloitte & Touche
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
Annual Risk Assessment and Audit Plan Fiscal Year 2015/2016
Annual Risk Assessment and Audit Plan Fiscal Year 2015/2016 Office of the Internal Auditor May 2015 Table of Contents Introduction... 3 Risk Assessment Process... 3 Interpreting Risk Assessment Results...
Website Administration and Development (WSAD)
FUNCTIONAL AREA 13 Website Administration and Development (WSAD) Incumbents in this functional area create departmental websites and portals, implement website design, and manage the web content. Incumbents
Risk Assessment Questionnaire
Risk Assessment Questionnaire Department/Area Name: This Department Reports to: Person completing survey: Briefly describe the department or area, its major activities and functions. Critical Measures:
Anchor Bay Schools Software Policy
Anchor Bay Schools Software Policy Table of Contents 1. Statement of Ethics... Page 1 2. Purchasing and Acquisition... Page 1 3. Registration... Page 1 4. Installation of Software... Page 2 5. Individual
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective for all the audits commencing on or after 01 April 2010) CONTENTS
INTERNATIONAL AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS (This Statement is effective) CONTENTS Paragraph Introduction... 1 5 Skills and Knowledge... 6 7 Knowledge
AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives
AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types
Department of Information Technology Data Center Disaster Recovery Audit Report Final Report. September 2006
Department of Information Technology Data Center Disaster Recovery Audit Report Final Report September 2006 promoting efficient & effective local government Executive Summary Our audit found that a comprehensive
Texas A&M University System. Asset Management Manual
Texas A&M University System Asset Management Manual Revised 06/2014 1 Texas A&M University System Asset Management Manual Table of Contents Chapter 1 Overview... 4 Chapter 2 Responsibilities... 8 Agency
Collin County Community College District Business Administrative Services Procedures Manual Section 8 Capital Assets
Revision Log: Collin County Community College District Business Administrative Services Procedures Manual Section 8 Capital Assets Sub Section Revision Date Summary of Change 8.1 Introduction The District
Dell Advanced Network Monitoring Services Service Description
Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day
Maintenance of Assets Records and Internal Audit
To all Secretaries to Ministries and Heads of Departments, Maintenance of Assets Records and Internal Audit 1. Safeguarding Public Assets is one of the primary responsibilities of the Chief Accounting
C-DAC Medical Informatics Software Development Kit End User License Agreement
C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL
Property Accountability and Inventory Control. Finance and Accounting
Property Accountability and Inventory Control Finance and Accounting Table of Contents Definitions...1 Definition of Property...1 Library Resources...1 Capitalized Property (Assets)...1 Non-capitalized
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
