How Do You Audit an Elephant? (Learning Management and Student Information Systems)



Similar documents
Internal Audit Testing and Sampling Techniques. Chartered Institute of Internal Auditors May 2014

Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014

University of Houston-Downtown Information Technology

How to survive an Audit

IT Application Controls Questionnaire

Planning for College. What you need to know about the college admission process

Graduate School Guide

Application controls testing in an integrated audit

Counselor Forms Summary

GRADUATE SCHOOL. Should I go? When to go? Where? Tests Applying SMITH COLLEGE CAREER DEVELOPMENT OFFICE

FREQUENTLY ASKED QUESTIONS GRADUATE PROGRAM. Q: I have an engineering/architecture/other background do I qualify to study construction management?

ELECTRONIC TRANSCRIPT EXCHANGES AT THE UNIVERSITY OF ARIZONA

System Requirement Specifications (SRS)

INTERNATIONAL STANDARD ON AUDITING 401 AUDITING IN A COMPUTER INFORMATION SYSTEMS ENVIRONMENT CONTENTS

SELF-STUDY REPORT DIVIDERS

Service-Oriented Cloud Automation. White Paper

Information Technology Internal Audit Report

Deciding When to Go to Graduate School

Reading Specialist Certification

Internal Controls. A short presentation from Your Internal Audit Department

Understanding SOC Reports for Effective Vendor Management. Jason T. Clinton January 26, 2016

Top Seven Risks to Consider When Selecting a Life Science LMS

SCHOOL COUNSELING PRACTICUM AND INTERNSHIP MANUAL

5 Steps To Successful ERP Implementation

The State of Identity Management Self-assessment Questionnaire

Update on Strategic Plan Goals

Eastern Illinois University New Course Proposal AET 3163, Computer Programming in Technology. 2. Course prefix and number: AET 3163

An Online Application System for Civil Service Employment

Getting Started Guide for Online Campus Students

Office of the Registrar STRATEGIC PLAN

Chapter 15 Auditing the Expenditure Cycle

Essex County College INFORMATION TECHNOLOGY MASTER PLAN

Abstract ( ) Introduction

Buy-Side EDM Managed Service Case Study

Planning for Graduate School

INTERNATIONAL STUDENT APPLICATIONS TO THE UNDERGRADUATE PROGRAMS FOR THE ACADEMIC YEAR

General Computer Controls

NIPISSING UNIVERSITY DIRECTORY OF RECORDS

University of Houston-Downtown Information Technology

DATA GOVERNANCE AND INSTITUTIONAL BUSINESS INTELLIGENCE WORKSHOP

California University Online Distance elearning Simplified Student Handbook. CONTENTS I. Introduction Welcome Mission Statement

Graduate School Guide

Education Systems Roadmap

Using a Dashboard to Improve Classroom Utilization. Academic Support Resources

NetSuite The Sarbanes-Oxley Compliance Engine

SAP HER CM Implementation the ISB Experience and Challenges

Educational Programs: All:Acceptance of academic credit. Judgment. Narrative

RIT Degree Audit Training. Summer 2015

ANNUAL PROGRAM LEARNING OUTCOMES ASSESSMENT SUMMARY REPORT

Successful Implementation of Enterprise-Wide Information Governance

Faculty Introduction to Self-Service

Creating a Big Impact IR Office on a Small Budget

UBC Mailing List Replacement Project. Feedback Summary Survey & Focus Groups

Master of Science in Computer Science Degree Requirements, Policies, and Procedures

College Planning Calendar

Transaction Processing and Enterprise Resource Planning Systems. Goal of Transaction Processing. Characteristics of Transaction Processing

Practice Workflow & Information Management Redesign Specialist Program Application Packet

Graduate School Preparation at a Glance

GRADUATE SCHOOL A GUIDE FOR UNDERGRADS

INSTUCTIONS FOR SUBMITTING SERVICE REQUESTS THROUGH THE FAMIS WORK ORDER SYSTEM

ASMC Guide to Gaining College Level Credit for EDFMC Completion Earning college credit for ASMC s Enhanced Defense Financial Management Course (EDFMC)

Strategic Plan for Technology

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Industry Trends An Introduction to Security Breach Prevention, BYOD, & ERP System Implementation

An Integrated Approach to Performing Pre-implementation Reviews. Securities Industry and Financial Markets Association February 29, 2012

WELCOME TO EASTERN IOWA COMMUNITY COLLEGE

Master of Science in Nursing. Learning Outcomes

Blended Course Evaluation Standards

Aboriginal Affairs and Northern Development Canada. Internal Audit Report. Audit of Internal Controls Over Financial Reporting.

How to Build Effective Online Learner Support Services

Strategic Asset Management Program Controls Design Is Generally Sound, But Improvements Can Be Made. Final Audit Report No

Proposal to. Transfer Administration of the Graduate Certificate in Regulatory and Quality Compliance. from

The Board s Role in Risk Management

"To achieve excellence by guiding individuals as they become professionals... " M.Ed. Curriculum & Instruction in Accomplished Teaching Handbook

Chapter 6--Audit Evidence, Audit Objectives, Audit Programs and Working Papers

Frequently Asked Questions About the Pre-licensure BSN Program at Ferris

Transcription:

How Do You Audit an Elephant? (Learning Management and Student Information Systems) DAVID MAGGARD & KIM RUTLEDGE Texas A&M University System Internal Audit

Very simple answer.

Texas A&M University System TEXAS A&M UNIVERSITY SYSTEM

System Size 11 universities, 7 state agencies, 2 service units, and a comprehensive health science center Approximately 131,000 students Nearly 28,000 faculty and staff Physical presence in 250 of the state s 254 counties Reaches 22 million people through service each year

Objectives Scoping the application review Identifying testing methods Role of general IT controls

The largest living land animal

Evolution Student Information Systems A software application for education establishments to manage student data. Equivalent to an ERP for corporate customers. Began as systems used only by administrators Students then began to register for classes Now they are used for financial aid, loan management, self degree audits, grades, etc Learning Management Systems A software application for the administration, documentation, tracking, reporting and delivery of e-learning education courses. Not used widespread until early 2000 s at TAMU, later for the regional campuses Used for true online courses and to enhance the traditional classroom Used for exams, calculating grades, communicating with students, etc.

Changing Environment Large complex mission critical systems. Difficulty in scheduling maintenance windows due to the reliance on these systems Due to their size and newness, determining how to audit them is a challenge. The topics we discuss can be applied to any application audit (financial, student, LMS, document imaging, personnel/payroll etc.)

Where do you start? Don t be afraid Don t wait on someone else to develop the perfect audit plan. If possible, obtain training (not a requirement) Don t focus on the whole thing, think of it as pieces. The pieces are the business processes and general IT controls.

Scoping the review Methodology Less about security more about availability and accuracy of information contained within the systems Focus is on business processes not specific systems Includes all environments (owner, custodians, and users) Identify key business processes that use a particular system (i.e. student information system or learning management system)

How to eat that elephant Interview the business folks Interview the custodians/administrators of the system Interview users Interview someone from any governing bodies Think of the processes in the traditional inputprocessing-output framework

Next bite Obtain documentation, user manuals, vendor manuals, anything you can get your hands on to determine the following: Identify the applications involved Identify the process owners Identify the key screens Identify what risk exists with each process Rank each process for likelihood and impact (L=5, M=10, H=15) Select sample of processes for further review

Things you want to know Interfaces Feeds Reports

Business Process Overview Input Accurate Complete Authorized Correct Data Processed as intended in acceptable time period Accurate Complete Output Accurate Complete A record is maintained that tracks the process of data input, storage and output.

Flowcharts

Our Approach to Planning Perform a risk assessment of processes Identify the scope Determine depth/range of coverage Develop and communicate plan

Process Identification Process Applications Involved Process Owner Key Screens Risk High School Transcripts EDI.Smart, Banner Registrar n/a EDI Application and Transcripts EDI.Smart, Banner Registrar SZRETPG, SAAEPAPS, SZR189U, SWPCLAD, SAAEAPS, SARETMT, GOAMTCH Transcript data is not entered accurately into Banner Application and transcript data is not loaded accurately or completely into Banner

Testwork Process Owner Process Control Identified Admissions High School Transcripts Access to SOAHSCH and SOATEST are appropriately restricted. Admissions High School Transcripts Transcript entries and updates in Banner are recorded in an audit trail and reviewed periodically. Testwork Obtained a list of users with access to the SOAHSCH and SOATEST forms in Banner and reviewed for appropriateness. Inquired of business owner and IT personnel if an audit trail for the transcript entry/updates exist.

Testing Methods Manual processes Inquiry, observation, inspection or reperformance Uses sampling to determine if effective Risk is inconsistency of control result due to human involvement Automated processes Edit checks or error reports Testing alternatives A mix of inquiry, observation, inspection or reperformance Negative assurance testing Testing to confirm that invalid input is detected Invalid dates, text in numeric field, override controls

General IT Controls Availability Data Integrity, Accuracy and Security IT Management

General IT Controls IT governance Systems Development IT Operations Physical Security and IT Continuity Information Security

General IT Controls Why do we care? When should we perform this assessment? How is it reported?

Student Information System Processes Input processes Data loads Manual vs. automated Output processes Reports Views Audit trails General Control issues Governance User accounts and security Infrastructure, system, and application maintenance Security physical and logical Hosted, in-house, mixed

Learning Management Processes Input processes Setting up courses Assigning faculty to the courses (manual, batch or realtime from the Student Information System) Populating the students in the courses Output processes Grades Interfaces with other applications such as Turnitin, Respondus, media, etc. General Control issues Setting up student accounts Setting up faculty accounts Setting up user access directly into the application Security/Password settings

LMS Governance Academic not IT Advisory committees Surveys Interview, Interview, Interview (faculty and students if possible.) Software as a service (The Cloud!) Things to look for in the contract

Conclusion: Scoping the application review Identify testing methods Role of general IT controls

Summary Remember one bite at a time. Identify the scope. Identify resources and key business processes. Open communication. No need to be the expert.

Questions? David- dmaggard@tamus.edu Kim krutledge@tamus.edu