Indiana University Internal Audit



Similar documents
Client Security Risk Assessment Questionnaire

NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL

University of San Diego University Audit Office Self-Audit Tool. A - General

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Top Ten Technology Risks Facing Colleges and Universities

Example Accounting/Financial Policies

UTAH STATE UNIVERSITY POLICIES AND PROCEDURES MANUAL

plantemoran.com What School Personnel Administrators Need to know

Community Ambulance Service District

InfoGard Healthcare Services InfoGard Laboratories Inc.

INTERNAL CONTROL POLICIES

Northeast Higher Education District Itasca Community College

Purchasing Card Training

IT04 UO ACH Security Policy

SAS 70 Exams Of EBT Controls And Processors

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Department of Rehabilitation Report No

Fraud Protection, You and Your Bank

MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS

SUA - Payroll and Inventory Payroll System

INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Internal Controls and Political Committees

Vanderbilt University

Oklahoma Workers Compensation Commission

A8.700 TREASURY. This directive applies to all campuses of the University of Hawai i.

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Internal Controls: Best Practices for Political Campaigns in New York City

Fiscal Procedure Sequence page number

Accounting software & data

How To Manage A Corporation

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

HIPAA Compliance: Are you prepared for the new regulatory changes?

FINANCIAL MANAGEMENT POLICIES AND PROCEDURES

HIPAA/HITECH Compliance Using VMware vcloud Air

RISK ASSESSMENT TOOL: Business Processes

Connecting the dots: IT to Business

CITY OF SAN ANTONIO OFFICE OF THE CITY AUDITOR. Audit of the Finance Department. Payroll. Project No. AU June 9, 2014


WASHINGTON STATE UNIVERSITY MERCHANT ACCOUNT AGREEMENT FOR UNIVERSITY DEPARTMENTS

THE UNIVERSITY OF TEXAS-PAN AMERICAN OFFICE OF AUDITS & CONSULTING SERVICES. Office of Alumni Relations Report No

Accepting Payment Cards and ecommerce Payments

Department of Health and Mental Hygiene. Alcohol and Drug Abuse Administration

GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY

Understanding PCI Compliance

CREDIT CARD POLICY DRAFT

SUBSIDIARY LEDGER MANAGEMENT AND INTERNAL CONTROLS

PCI Compliance: How to ensure customer cardholder data is handled with care

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Information Technology

Gramm Leach Bliley Act. GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 7/1/2007

Internal Control Guidelines

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

Meeting the HIPAA Training and Business Associate Requirements Questions and Answers, with HIPAA Security Expert Mike Semel

ACCOUNTING POLICIES AND PROCEDURES SAMPLE MANUAL

City of Brentwood. Thomas A. Schweich Missouri State Auditor FOLLOW-UP REPORT ON AUDIT FINDINGS. October 2013 Report No

HIPAA Compliance Evaluation Report

HIPAA BUSINESS ASSOCIATE AGREEMENT

How To Protect Yourself From Cyber Threats

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

ACE Advantage PRIVACY & NETWORK SECURITY

ASC Financial Policies Page i of 18 Originally Approved by BOT: November 2006 Revised: July 2014/Revisions approved by BOT

Internal Controls Best Practices

Vulnerability Management Policy

Indiana University Payment Card Merchant Agreement

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Auditing your institution's cybersecurity incident/breach response plan. Baker Tilly Virchow Krause, LLP

Managing data security and privacy risk of third-party vendors

GENERAL PAYROLL CONTROLS Dates in scope:

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

PCI Compliance. Top 10 Questions & Answers

MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center

Reconciliation of Cash

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014

AUDITOR GENERAL WILLIAM O. MONROE, CPA

INCIDENT RESPONSE CHECKLIST

T H E R E A L C O S T O F A D ATA B R E A C H

ACCOUNTING AND FINANCIAL REPORTING REGULATION MANUAL

The policy and procedural guidelines contained in this handbook are designed to:

Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine

PCI General Policy. Effective Date: August Approval: December 17, Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:

Audit Guidelines. The Annual Church Audit. by Dan Busby. Key Concepts. Idea! Use this document as a checklist for your annual audit.

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

R345, Information Technology Resource Security 1

TABLE OF CONTENTS OBJECTIVES, SCOPE, AND METHODOLOGY... 1 BACKGROUND Authorized Signers Not Updated... 5

INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:

California State University, Sacramento INFORMATION SECURITY PROGRAM

Report on. Office of the Superintendent of Financial Institutions. Corporate Services Sector Human Resources Payroll. April 2010

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University Information Security Standard

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

Transcription:

Indiana University Internal Audit Top Ten Audit Issues March 6, 2013 Christine Swafford, CPA, CIA, CISA Director, Indiana University Internal Audit

2 Objectives Discuss the process of identifying audit issues. Learn the elements of audit issues. Provide awareness of Top 10 Audit Issues and examples of each with policy/law references.

3 Top 10 Audit Issues - Key Points in Identification Identified top 10 audit issues over past 3 years Issues and risk can change over time Risks are unique to each unit Use of Risk Assessment and Control Evaluation (RACE) Matrix to document risks Collaboration between Internal Audit and the fiscal officer/management is the key to addressing issues and implementing action plans

4

5 Elements of Audit Issues/Findings Current Condition - What is the problem? Why is this an issue? Criteria - What is the expected condition based on policy, law, best practice? Cause - Why is there a difference between current condition and criteria? What is the ROOT cause? Effect - What is the risk? What can happen if issues are not corrected? Action Plan - What can be done to fix the root cause of a problem? What can be done to improve processes?

6 Example of Audit Finding Elements Current Condition: Unit employees are not receiving the appropriate revenue training as required by IU policy FIN-TRE-VI-120 Processing Revenue. Sixteen of 25 (64%) employees reviewed did not have the appropriate revenue processing training and nine out of 19 (47%) employees reviewed did not have the appropriate Security Awareness Education (SAE) training.

7 Example of Audit Finding Elements Criteria - Policy FIN-TRE-VI-120 states, Ensure all full time employees involved in revenue processing or with access to university banking/payment card systems have attended a face to face Treasury revenue processing training session and part time and student hourly employees have either attended the Treasury delivered face to face training or taken the revenue processing tutorial available on the Office of the Treasurer website prior to performing any revenue processing transactions. Additionally, the policy states, Attend ongoing training sessions delivered by Treasury; annual training is required for those involved with processing credit and debit card transactions.

8 Cause Example of Audit Finding Elements We often times will not include the cause for the finding if it could reflect poorly on the audit client or appear as an excuse to the Board of Trustees. Cause usually comes down to willful disregard for policies/procedures or lack of knowledge of policies/procedures. We will ask a lot of questions in order to determine the ROOT cause of the issue to ensure the action plan will fix the problem.

9 Example of Audit Finding Elements Effect/RISK Lack of appropriate training prior to processing revenue increases the risk for the loss of university funds.

10 Example of Audit Finding Elements Action Plan All employees who have not taken the required Revenue training and/ or the SAE training will complete the training. All employees needing training have registered and all training was completed by December 15, 2012.

Top 10 Audit Issues

12 Audit Issue #10 Lack of Inventory Controls

13 AUDIT ISSUE #10 Current Condition = Inventory controls don t exist to control or monitor: Shrinkage Obsolete inventory Accounting for inventory Criteria = Best Practice; GAAP; Auxiliary SOP Risk = Lost funds due to theft, spoilage, obsolescence

14 #10 Lack of Inventory Controls Examples A department sells parking passes but does not account for the passes. Ideally passes should be pre-numbered and reconciled to sales. Inventory should also be accounted for monthly. Would be same situation for any other inventory item, books, prescription drugs, apparel, gifts, metal used in fabrication, etc.

15 Inventory Controls Policies & SOP Auxiliary Financial Standards FIN-ACC-I-600 Accrual Account FIN-ACC-I-350 Auxiliary Standard Operating Procedures

16 AUDIT ISSUE #9 Failure to Comply with Contracts or Agreements

17 AUDIT ISSUE #9 Current Condition = Contracts, agreements, and memorandums of understanding are not complied with Criteria = Provisions outlined in contract, agreements, memos Risk = Fines, penalties, reputation risk, legal risk for breach of contract

18 Failure to Comply with Contracts or Agreements Examples Signing contracts or agreements with no signature authority. Purchasing contracts Insurance certificates for a special event. Memorandums of understanding between IU and third parties

19 Failure to Comply with Contracts or Agreements - Relevant Policy Signature Authority and Delegation FIN-TRE- VI-100 (http://policies.iu.edu/policies/categories/financial/t reasurers-office/fin-tre-vi-100-signatureauthority-and-delegation.shtml) No officer, agent, or employee of the University has the authority to sign contracts or other agreements on behalf of the University or any unit, department or subdivision of the University

20 Audit Issue #8 Non-compliance with Purchasing Card Guidelines

21 AUDIT ISSUE #8 Current Condition = Purchasing cards used to: Circumvent dollar limits on cards by stacking transactions Purchase unallowable items Purchase items which were available in EPIC Criteria = P-card process & restrictions Risk = Thousands of dollars could be spent before being detected because transactions are not preapproved; theft

22 Non-compliance with P-card Guidelines Examples Stacking! - #1 thing we see in audits Unallowable purchases: Cell phones (must purchase and get reimbursed via supplemental pay) Ammunition Furniture Travel or travel related expenses

23 Non-compliance with P-card Guidelines Relevant Policy and Guidelines http://policies.iu.edu/policies/categories/financial/p urchasing/fin-pur-20.0-university-procurementcontracts.shtml http://www.indiana.edu/~purchase/pcard/pcard.sht ml

24 AUDIT ISSUE #7 Lack of Procedures to Mitigate Risk

25 AUDIT ISSUE #7 Current Condition = Common business processes not followed. Criteria = Financial policy I-470 Internal Controls; best business practice Risk = Undetected loss of funds, inefficiencies, theft

26 Lack of Procedures to Mitigate Risk - Examples No segregation of duties for collecting, depositing, and reconciling revenue. Reconciliation of accounts (monthly operating statement; credit cards; accounts receivable) Accountability for critical documents supporting transactions (revenue transactions, receipts, travel documents, etc.)

27 Lack of Procedures to Mitigate Risk - Policy http://policies.iu.edu/policies/categories/financial/a ccounting-administration/fin-acc-i-470-internalcontrols.shtml

28 AUDIT ISSUE #6 Non-Compliance with IU Policies and Related Laws

29 AUDIT ISSUE #6 Current Condition = Failure to have adequate internal controls to ensure policy compliance: Delegation of signature authority Programs Involving Children Fair Labor Standards Act Conflict of Commitment/Conflict of Interest Donor Intent Criteria = IU Policies; Relevant Laws Risk = loss of funds; fines and penalties; loss of reputation

30 Non-Compliance with IU Policies and Related Laws - Examples Delegation of signature authority Programs Involving Children Fair Labor Standards Act Conflict of Commitment/Conflict of Interest Donor Intent

31 Non-Compliance with IU Policies and Related Laws Policies http://policies.iu.edu/index.shtml Many of our policies reference or are based on state and federal laws Whistleblower Ghost employment Overtime

32

33 AUDIT ISSUE #5 Inadequate IT Physical Security

34 AUDIT ISSUE #5 Current Condition = Physical security inadequate. Criteria = Management of Institutional Data, IT Policy DM01, Information Security & Privacy Policies, Best Practice Risk = Loss of data, loss of equipment, harmed reputation, loss of funds

35 Inadequate IT Physical Security - Examples Access to server room not controlled People working in server room Lack of fire suppression device Location of server room (basement prone to flooding)

36 Inadequate IT Physical Security - Policy http://policies.iu.edu/policies/categories/informatio n-it/it/it-12.shtml - IT-12: Security of IT Resources DRAFT IT-28: Provisioning of IT Services http://policies.iu.edu/policies/categories/informatio n-it/data-management/dm-01.shtml -Management of Institutional Data https://protect.iu.edu/uipo https://protect.iu.edu/uiso

37 AUDIT ISSUE #4 Non-compliance with Revenue Processing Policy

38 AUDIT ISSUE #4 Current Condition = Revenue policy VI-120 is not followed. Common violations on next slide. Timely deposits Credit card reconciliation Training provisions Endorsing checks Payment Card Industry Data Security Standards (PCI DSS) Criteria = Processing Revenue Policy VI-120 Risk = Theft, lost revenue, fines/penalties, reputational risk

Non-compliance with Revenue Processing Policy - Examples Timely deposits not made/ Credit card reconciliation not performed daily. Training provisions not met. Checks are not endorsed immediately upon receipt. Payment Card Industry Data Security Standards (PCI DSS) are not met. 39

Non-compliance with Revenue Processing Policy - Policy http://policies.iu.edu/policies/categories/financial/tr easurers-office/fin-tre-vi-120-processingrevenue.shtml 40 This is a long policy but all of it is important!

41 AUDIT ISSUE #3 Failure to Pay Employees Accurately

42 AUDIT ISSUE #3 Current Condition = Employees not paid accurately Paid too much or not enough epto adjustments for Absent without pay Paid for not working (ghost employment) Criteria = IU must pay for time worked; must not pay for time not worked Fair Labor Standards Act Department of Labor state law IU policy MUST pay employees for time worked; must NOT pay employees if they are not working (ghost employment) Risk = Fines/penalties; low employee morale; reputation

43 Failure to Pay Employees Accurately Examples and Relevant Policy/Law Examples: Paid too much or not enough epto adjustments for Absent without pay Paid for not working (ghost employment) IU policy MUST pay employees for time worked; must NOT pay employees if they are not working (ghost employment) Policy/Law: HR and Payroll policies Fair Labor Standards Act Indiana Department of Labor

44 AUDIT ISSUE #2 Inadequate IT Logical Security

45 AUDIT ISSUE #2 Current Condition = Policy IT-12, Security of IT Resources is not followed, creating weaknesses in logical security. Criteria = Policy IT-12 and best practices Risk = Security breach/lost data Lost dollars Reputational risk Legal issues

46 Inadequate IT Logical Security - Examples Vulnerability scans Patch management issues Administrative rights Lack of disaster recovery plan/business continuity plan No review of system logs Backups on off site Failing to encrypt data Anti-virus scans not performed

47 Inadequate IT Logical Security - Policy http://policies.iu.edu/policies/categories/informatio n-it/it/it-12.shtml IT-12: Security of Information Technology Resources

48 AUDIT ISSUE #1 Failure to Secure Sensitive Data

49 AUDIT ISSUE #1 Current Condition = Sensitive data not secured (manual and electronic records) Criteria = guidance from Information Security & Privacy Program Risk = major fines, reputational risk, financial impact, personal liability, violations of state law

50 Failure to Secure Sensitive Data - Examples HIPAA data PHI protected health information Credit card numbers Check numbers SSN FERPA BOTH PAPER AND ELECTRONIC

Failure to Secure Sensitive Data Policy and Guidance DM01- Management of Institutional Data http://policies.iu.edu/policies/categories/informatio n-it/data-management/dm-01.shtml http://policies.iu.edu/policies/categories/informatio n- it/index.shtml#informationsecurityandprivacyprogr amispp = all IT policies UISO when in doubt, call! 51

52 What Did We Learn? Process of identifying audit issues Elements of audit issues (findings) Awareness of Top 10 Audit Issues, examples of each with policy/law references

53 Questions? Christine Swafford 812-855-0271 crswaff@indiana.edu

54 Next Topic What to Expect When You Are Audited May 22, 2013 Other topics of interest?

55