New Notes AutoRecovered
New Notes AutoRecovered
Finance and accounting areas have long been the traditional domain of the internal auditor, perhaps to the
extent that management only thought of internal auditing in terms of conducting reviews of accounting
records.
2. Payroll—incorporates the initial authorized set-up of new employees, the processing of suitably
authorized amendments (salary increase, holiday pay, bonuses), periodic payroll runs, payment
arrangements, correct accounting for taxation, national insurance deductions, reconciliation of
payroll, and removal of employees from the payroll.
Control Objectives:
a. Only valid employees are paid and at the correct and authorized rate.
b. Ensure that calculations of all payments and deductions are correct and in accord with the
relevant taxation and other regulations and requirements.
c. Ensure that all deductions are correctly disbursed.
d. Ensure that unauthorized access to the payroll system and data is prevented.
e. Ensure that all payroll transactions are accurately reflected in the accounting systems.
f. Ensure that regular, accurate management. And statutory information is produced,
3. Accounts Payable—incorporates related processes such as linking to the original purchase orders or
instructions, confirmation of the receipt of goods/ services, conforming the accuracy and validity of
invoices, obtaining the authority to pay =, maintenance of accurate creditor records, and account
settlement.
Control Objectives:
a. Ensure that all payments are for valid and suitably approved creditor accounts for goods and
services actually received.
b. Ensure that all payments are correct and accurately reflected in the accounting system.
c. Ensure that the prevailing sales tax or Vatt regulations are correctly complied with.
d. Ensure that good relationships are maintained with key suppliers.
e. Prevent the possibility of supplier or staff malpractice.
4. Accounts Receivable—linkages to the vetting of customers of their stability and sales ordering
processing.
Control Objectives
a. Ensure that all income generating activities are identified and accurately invoiced to customers.
b. Ensure that all invoices are paid, and the income is correctly identified and accounted for and
reflected in accounts.
c. Minimize the extent of debt and provide for the prompt follow-up of overdue accounts.
d. Maintain the integrity of the accounts receivable system and data.
5. General Ledger/ Management Accounts—effects of all the economic events are reflected in the
general ledger system/ general Ledgering System will be used to generate financial information for
both internal and external consumptions, and must operate in a stable and secure environment.
Control Objectives:
a. Ensure that the general ledger and management accounts are accurate, reliable, and
appropriately reflect the structure and operations of the organization.
b. Ensure that the accounting data is capable of meaningful and accurate analysis in order to
support management decisions and actions.
c. Ensure that the accounting records are maintained and in accordance with the prevailing laws,
regulations, and professional good practice.
d. Ensure that the accounting information can be used to generate all the required statutory
published accounting statements.
6. Fixed Assets (and Capital Charges)—investments in fixed assets, appropriate authorization for
capital acquisition, accurate and complete accounting processes covering the purchase, depreciation,
verification, and eventual disposal of the assets.
Control Objectives:
a. Ensure that assets ate correctly and accurately reflected in the accounts.
b. Ensure that all capital expenditure is justified and approved.
c. Ensure that all assets are identified, recorded and regularly verified.
d. Ensure that depreciation is appropriate and in accordance with both company policy and the
prevailing regulations.
e. Ensure that all asset disposals and write-offs are valid, authorized, and correctly reflected in the
accounts.
f. Ensure that assets are appropriately protected and insured.
7. Budgeting and Monitoring—general budgeting framework (how the budgets are initially generated,
authorized and rolled out) and the allocated responsibilities for subsequently monitoring actual
performance against budget (identifying, reacting to significant variances, authorizing budget
amendments.
Control Objectives:
a. Provide an accurate and reliable budgeting system as a means to ensure that agreed financial and
business objectives are achieved,
b. Provide a realistic and accurate budgeting framework and plan which accurately reflects the
structure and operations of the organization.
c. Provide management with a means to progress against financial targets.
d. Ensure that variations, deviations, and failures to achieve targets are promptly identified fort
management action.
8. Bank Accounts and Banking Arrangements—affects all businesses. Due attention should be paid
to the control and monitoring of account usage. Especially in terms of devolved authorities such as
cheque signatories and fund transfers. Independent and effective account reconciliations to internal
records are essential, as they can limit the possibility of defalcation passing undetected.
Control Objectives:
a. Ensure that banking arrangement and facilities are appropriate and adequate for the businesses.
b. Ensure that all transactions are bona fide, accurate, and authorized whenever necessary.
c. Ensure that overdraft facilities are authorized and correctly operated within the limits defined by
management and the organization’s bankers.
d. Ensure that fund transfers and automated methods of effecting banking transactions are valid, in
the best interest of the organization, and authorized.
e. Ensure that the potential for staff malpractice and fraud are minimized.
f. Ensure that all income is banked without delay.
g. Ensure that banking charges are effectively monitored and minimized.
9. Sales Tax (VAT) Accounting—uses VAT as standard model but can be easily modified and applied to
other sales taxation regimes. VAT considers the registration, calculation of, accounting for input and
output VAT, production and submission of regular VAT returns, and settlement of any taxes due.
Control Objectives:
a. Ensure that all valid input and output VAT is accurately identified at the appropriate rate,
recorded, and reported.
b. Ensure that the correct net value of VAT is either reclaimed or paid over and supported by the
relevant return.
c. Ensure that the prevailing VAT regulations are correctly observed at all times.
d. Ensure that the business remains correctly registered for VAT and correctly displays its
registration number on all relevant documentation.
10. Taxation—each organization will have in place a taxation policy which takes into account all the
factors relevant to its own trading and fiscal situation. Subject of taxation can be simply viewed as a
balance between minimizing liabilities and ensuring compliance with often very complex regulations.
Control Objectives:
a. Ensure that all tax affairs are appropriately planned and managed.
b. Ensure that clear objectives are established in relation to taxation matters with a view to
minimizing tax liabilities within the confines of the prevailing legislation and regulations.
c. Ensure that all tax liabilities are accurately determined and supported by accounting data.
d. Ensure that all required taxation returns are correctly completed and filed on time.
e. Ensure compliance with all relevant taxation, legislation and regulations.
f. Ensure that allowances and concessions are identified, accurately assessed and accordingly
claimed.
g. Ensure that all tax payments are suitably authorized.
h. Provide management with adequate and accurate information on taxation matters and liabilities.
11. Inventory
Control Objectives:
a. Ensure that the accounting system and statutory accounts accurately reflect the value of current
inventory stocks.
b. Ensure that all stock purchases, issues, and other movements are valid and correctly reflected in
the inventory accounts.
c. Ensure that stocks are correctly priced.
d. Ensure that inventory values are periodically verified as correct.
e. Ensure that all adjustments to stock valuations are suitably investigated and authorized.
f. Ensure that inventory items utilized in production and customer sales activities are correctly
charged out of the inventory accounts and accounted for in target systems.
g. Ensure that write-offs of excess, scarp, or obsolete stocks are valid, and authorized.
h. Provide adequate, accurate, and timely management information.
13. Petty Cash Expenses—related to question of scale, level of petty cash and general expenses vary
between organizations.
Control Objectives:
a. Ensure that all expenses are valid and authorized.
b. Ensure that all expenses are correctly identified, recorded, and accurately reflected in the
accounting system.
c. Ensure that all expense payments are in accord with company policy and any relevant external
regulations.
14. Financial Information and Reporting—concerns related to accuracy, completeness, timeliness, and
security of the information.
Control Objectives:
a. Ensure that management are provided with accurate and timely financial information to support
their decision-making and activities.
b. Ensure that all relevant financial reports and returns are accurately prepared and distributed to
external bodies in accordance with the prevailing legislation, regulation, and contractual
obligations.
c. Ensure that accounting records and statements are correctly maintained and prepared in
accordance with the prevailing accounting standards and good practice.
d. Ensure that all financial information is adequately protected from loss, misuse, or unauthorized
leakage.
15. Investments—financial and timing implications associated with investment activities, it is crucial
that authorized policies are in place and adhered.
Control Objectives:
a. Ensure that all investment decision are adequately researched and authorized in accordance with
the established objectives.
b. Ensure that investment commitments do nit interfere with the required cash flow and that
sufficient working funds are maintained.
c. Ensure that timescale and liquidity implications of investments are adequately considered and
catered for.
d. Ensure that invested funds and the income generated are correctly accounted for.
e. Ensure that all relevant regulations, exchange controls, and accountancy standards are complied
with.
f. Ensure that investment documentation is adequately and securely stored.
Spreadsheets are often woven into the corporate information system. Approachable and easy to use, often
evade any scrutiny during their development or live use.
There are real risks associated with the use of spreadsheets especially of they form a significant part of the
management information and decision-making processes, and their development has been undertaken.
“The use of spreadsheet to augment mainstream system information and greater dependence being placed on
spreadsheet when they become part of the mainstream system.
Key critical spreadsheet should be identified as information asset and recorded on organization’s Information
Asset Register; the following should be captured for key spreadsheets.
- File Name
- File/ Data Owner and Information Steward.
- Data of Introduction
- An overview of its functionality and purpose
- If it is financial or operational in nature.
Documenting Spreadsheet
Operationally critical spreadsheet should be treated in the same way as key application systems and be
specified and documented so ongoing maintenance and update can be understood. Specification of a software
application, the following should be defined:
- Purpose of the spreadsheet
- Assessment of how critical the sheet will be to the organization.
- Owner and Designer of the sheet
- Filename of the sheet
- Any constant or standing data to be used in the formula.
Pivot Functions
Conditional Formatting
Conditional Highlighting
If Function
Concentrate Function
V-Look Up
Mail merge
Hyperlink
Shortcut Functions
¶ -- Pilcrow, indicates the start of a new paragraph within a block of text.
Levels of Flowchart
1. Macro Level—May not need detailed process. Fewer than six steps.
2. Mini Level—Big picture of macro level and fine detail of micro level.
3. Micro Level—Detailed depiction of process steps. Detailed picture of process by documenting every
action and decision.
Types of Flowcharts
1. Linear Flowchart—displays the sequence of work steps that make up a process. This helps to
identify rework and redundant or unnecessary steps within a process.
Steps:
a. Define the process to be flowcharted and the purpose of flowcharting.
b. Assemble the right people to develop the flowchart.
c. Establish process boundaries.
d. List the steps, activities, and decisions to be charted.
e. Put the steps in chronological sequence.
f. Assign flowchart symbols.
g. Review and title the flowchart.
2. Deployment Flowchart—shows the actual process flow and identifies the people or groups involved
at each step. Horizontal lines define customer-supplier relationships. This flowchart shows where the
people or groups fit into the process sequence, and how they relate to one another throughout the
process.
Steps:
a. List the major steps of the process vertically on the left side of a sheet of paper.
b. List the responsible process workers across the top, each in a separate column.
c. Place each step in the appropriate column under the responsible process worker’s name.
d. Connect the steps in order in which they relate to each other.
3. Opportunity Flowchart—a variation of the basic linear type, differentiates process activities that
add value from those that add cost only.
o Value Added Steps (VA)—essential for producing the required product or service. Output
cannot be produced without them.
o Cost-Added Only Steps (CAO)—essential for producing the required product or service.
Added to a process in anticipation of something that might go wrong, or something is wrong.
Steps:
a. Divide your paper into two columns headed Value Added (VA) and Cost Added Only (CAO).
b. List the steps in the process in these columns vertically, all VA steps in one column and all CAO
steps in the other.
c. Connect the steps.
ACTIVITY/ SYSTEM
TREASURY PROCESS
TREASURY PROCESS REVENUE PROCESS
Management and Administration Management and Administration
- Capital Projects - Risk Management
- Insurance
Financial and Accounting Financial and Accounting
- Treasury - Accounts Receivable
- Payroll
- Accounts Payable/ Receivable - Budgeting and Monitoring
- Fixed Assets - Bank Accounts & Banking Arrangements
- Budgeting and Monitoring - VAT Accounting
- Bank Accounts & Banking Arrangements - Taxation
- Taxation - Inventories
- Financial Information and Reporting - Product/ Project Accounting
- Investments - Financial Information and Reporting
- Investments
Procurement Stock and Material Handling
- Purchasing - Stock Control
- Warehousing/ Storage
- Distribution, Transport, and Logistics
Production/ Manufacturing Market & Sales
- Facilities, Plant and Equipment - Product Development
- Market Research
- Promotion and Advertising
- Pricing and Discount Policies
- Sales Management
- Sales Performance and Monitoring
- Distributors
- Relationship with Parent Company
- Agents
- Order Processing
Market & Sales After Sales Support
- Product Development - Warranty Arrangements
- Relationship with Parent Company - Maintenance and Servicing
- Spare Parts and Supply
Research and Development Research and Development
- Product Development - Product Development
- Project Appraisal and Monitoring - Project Appraisal and Monitoring
- Plant and Equipment
Information Technology Information Technology
- Processing Operations - IT Strategic Planning
- Back-up and Media Management - IT Policy Framework
- Facility Management - Information Asset Register
- Electronic Data Interchanges - Capacity Management
- BACS - Information Management
- Records Management
- Knowledge Management
- Processing Operations
- Back-up and Media Management
- Electronic Data Interchanges
Contracting Contracting
- Contract Management Environment - Contract Management Environment
- Project Assessment and Approval - Project Assessment and Approval
- Tendering Procedures - Performance Monitoring
- Materials, Plant & Project Assets - Extensions of Time
- Valuing Work for Interim Payments - Controlling Contractual Claims
- Controlling Contractual Claims - Liquidation and Bankrupties
- Liquidation & Bankrupties
- Recovery of Damages
- Review of Project Outturn and Performance
- Review of Project Outturn and Performance
Includes Information Management, Records Management, and Knowledge Management. Majority of this will
be primarily supported by electronic records.
The design and implementation of an organizations’ ISMS is influenced by their needs and objectives, security
requirements, the process employed, and size and structure of the organization.
12 Main Sections
1. Risk Assessment
2. Security Policy—management direction.
3. Organization of information security—governance of information security
4. Asset Management—inventory and classification of information assets
5. Human Resources Security—security aspects for employees joining, moving within, and leaving an
organization.
6. Physical and Environmental Security—Protection of computer facilities.
7. Communications and Operations Management—management of technical security controls in
systems and networks.
8. Access Control—restriction of access rights to networks, systems, applications, functions, and data.
9. Information System Acquisition, Development, and Maintenance—building a security inro systems.
10. Information Security Incident—anticipating and responding appropriately to information security
breaches.
11. Business Continuity Management—protecting, maintaining, and recovering business-critical
processes and systems.
12. Compliance—ensuring compliance with information security policies, standards, laws, and
regulations.
- This broad-brush approach is intended to unable auditors to identify and extract those elements that
match their own organization’s use of IT.
- IT Strategic Planning outputs may have direct relevance to system developments or the expansions
of local area networks.
- Information Asset Register, Information Management, Records Management, and Knowledge
Management are relevant to the wider aspects of information and knowledge including electronic
records. Also encompasses information and records in any form.
IT STRATEGIC PLANNING
- Concerned with planning for the use of IT in the organization to ensure that the business objectives
and operational requirements are effectively met.
- Applying formal strategic planning techniques to the operational use of IT will normally concentrate
on the key business requirements and the objectives set by management as part of their wider long-
term planning.
Action Plan:
o Acquiring and moving over to new hardware or software platforms.
o Improving or extending the data communications infrastructure.
o Improving or upgrading existing application systems
o Commissioning new application software to support business activities.
o Introducing new or improved IT development and management techniques to contribute to
efficiency and cost effectiveness.
o Implementing a training plan in order to ensure that It staff skill levels are maintained up to
date.
IT ORGANIZATION
- Targets the organizational structure of an in-house IT function.
o Optimum organizational structure
o Terms of reference for the IT function
o Service level agreements
o Definition of roles and responsibilities
o Required operational and technical standards.
Control Objective
o Ensure that an appropriate and efficient organizational structure is established for the IT
Functions.
o Ensure that responsibilities and accountabilities are defined, agreed, and allocated.
o Ensure that adequate and appropriate IT resources and skills are provided to support the
business.
o Ensure that an appropriate framework of operating standards, procedures and policies is
established, adhered to, maintained, and kept-up to date.
o Ensure that the required levels and standards of IT service provision are established, agreed,
and can be observed.
o Ensure that the key duties are appropriately segregated in order to protect the integrity of
operations, systems, and data.
o Ensure that skill requirements are identified and met through on-going training and staff
development.
o Ensure the accuracy and security of use application systems and data.
o Ensure that the continuity of operations can be maintained in the event of a disaster or
failure.
o Ensure that effective channels of communication are provided, and that staff remain aware of
the required performance, quality, and service objectives.
IT POLICY FRAMEWORK
- A framework of pragmatic policies surrounding the use and control of IT and information-related
facilities should fundamentally guide staff on what to do and what not to do.
Control Objectives
o To ensure that the appropriate policy and procedural framework is in place to provide secure
and reliable IT facilities in order to support the organization’s operational and administrative
requirements.
o To develop, agree and ratify a range of appropriate best practice policies suited to the
specific utilization of IT by the organization.
o To ensure that policies (and related procedural processes) are “owned” by a named manager
or officer, who is responsible for promoting, supporting and maintaining the allocated
policies.
o To ensure that all policies are ratified and formally agreed by senior management as a means
of ensuring that they are seen as significant parts of the culture and management oversight
of the organization.
o To ensure that policies incorporate any sector-specific issues and best practice exemplars.
o To ensure that any legislative or regulatory obligations are included in the relevant policies.
o To ensure that policies define how the related key activities will be monitored and managed.
o To ensure that the policies (and supporting materials) clearly state what is, in turn,
acceptable or unacceptable action or behavior.
o To ensure that policies include, where appropriate, the potential implications of a failure to
comply, including employee sanctions.
o To provide, where appropriate, documented practical guidance and procedures to support
the objectives and principles contained within the various IT policies.
o To ensure that general and specific roles and responsibilities are clearly defined within the
policies.
o To ensure that all policies are periodically reviewed and maintained up to date.
o To ensure that policies and the obligations they contain are suitably promoted within the
organization.
o To ensure that policies are accessible by all employees as sources of reference.
o To ensure that policy awareness is supported by appropriately targeted training.
o To ensure that there are reliable methods in place to monitor policy compliance and
promptly detect noncompliance or breaches of information security.
Information Assets
o Databases
o Electronic records, files, and documents
o Paper records and files
o Mailboxes
o Data Files
o Drawings
o Configuration Files
o Photographs
Collection Methods:
1. Centralized Data Gathering:
o More thorough but time-consuming; ensures consistency across all departments.
2. Self-assessment by Department:
o System owners/administrators collect data, requiring some quality control to ensure
accuracy.
Control Objectives
- To ensure that management take the steps necessary to assess the benefits of creating an Information
Asset Register or inventory and, if proven justified, to allocate adequate resources for its creation and
ongoing maintenance.
- To ensure that there is ownership of the register or inventory at both a senior management (e.g.
board) level and across the organization.
- To ensure that day-to-day responsibility for the creation and ongoing maintenance of the register or
inventory is allocated to a nominated person, manager or officer.
- To ensure that, where appropriate, the creation of an Information Asset
- Register or inventory is regarded as a project to be managed using formal project planning and
management method and led by a suitably experienced project manager.
- To ensure that the register provides senior management with the ability to accurately consider the
impacts of their decisions on the organization’s information assets and to support effective decision
making and planning.
- To ensure that senior management utilize the facility of an Information Asset Register to aid their
assessment of information governance and corporate governance.
- To ensure that all information assets are accurately identified as the basis for their effective
management and protection.
- To ensure that the data specification for the register is robust, practical and provides the necessary
reporting and monitoring functionality.
- To ensure that the application system or software environment hosting the register is robust, proven,
fit for purpose and adequately secure. This should include the application of any IT procurement
procedures aimed at assessing the financial stability of the supplier and the technical quality of the
system itself.
- To ensure that the optimum method of data collection is used to accurately populate the register. This
should include the validation of data (either manually or by some automated means) and some form
of data quality control process.
- To ensure that all information assets are correctly categorized and codified so as to accurately reflect
their significance, degree of sensitivity and operational importance to the organization.
- To ensure that only authorized and appropriate amendments are applied to the register; and that
only authorized users have access to the register system.
- To ensure information security measures are proportional to the value and sensitivity of the data.
- To facilitate the efficient identification of personal data sets that should be managed in accordance
with the prevailing Data Protection legislation and/or regulations should be specifically codified and
identifiable.
- To ensure that the register provides clear indications of the data that can be publicly disclosed, for
example under the prevailing Freedom of Information legislation or an approved Publication Scheme.
- To ensure that management take the action necessary to ensure that all staff are made aware of the
register, its various purposes and its use as a reference point for determining when information can
and cannot be released due to either being defined, as appropriate in each specific case, as publicly
accessible, personal or lawfully exempt.
- To ensure that there is the ability to readily detect situations which could have an impact on the
contents of the register (for example, the expansion of an existing system or the removal from service
of a legacy system) and to promptly reflect such changes on the register.
- To ensure that an Information Asset Register or inventory is accurately maintained and periodically
reviewed.
- To ensure that any gaps in controls exercised over information assets are promptly identified and
action taken to improve control to an adequate level.
Managing Change:
Planned vs. Sudden Change:
o IT capacity changes should be planned and coordinated, but sudden, drastic changes might
be required to seize business opportunities or respond to economic conditions (e.g.,
recession).
o It is essential to maintain contingency capacity to cope with unexpected peaks in demand.
Financial Considerations:
Cost Factor:
o The cost of providing increased capacity must be considered. It should be weighed against
the potential benefits, particularly in financial models for speculative ventures or new
business opportunities.
Control Objectives
- To ensure that the various IT capacities remain at an optimum level in order to support the
organization currently and in the future.
- To ensure that IT capacities are economically provided and to avoid unnecessary or excessive
provision costs.
- To ensure that any proposed changes in operations or service provision are appropriately planned for
and assessed in terms of potential IT capacity impacts.
- To ensure that IT management are engaged in the high-level organization planning process so that
they can assess and plan for the IT implications.
- To avoid the disruption or failure of operations or service provision due to a lack of available IT
capacities.
- To avoid sudden or unplanned operational changes that could adversely impact upon IT capacities.
5. Compliance:
o Information handling must comply with relevant laws, policies, and procedures.
6. Records Management:
o Information must be stored, archived, and disposed of in an organized and regulated
manner.
7. Sharing:
o Information must be shared appropriately within the organization, with Data Subjects,
strategic partners, and external bodies.
Control Objectives
- To ensure that all the organization’s information assets have been accurately identified as the basis
for applying effective Information Management.
- To ensure that information is effectively managed and exploited.
- To ensure that the creation and use of corporate information is geared to the overall objectives and
commitments of the organization.
- To ensure that there is a sufficiently defined and robust policy and procedural framework in place for
the application of best practice Information Management.
- To ensure the IM Policy and procedural requirements have been adequately promoted.
- To ensure that there is sufficient senior management buy in to the concepts of IM.
- To ensure that an appropriate IM culture is developed across the organization and that all employees
have a sufficient awareness of the key issues and their responsibilities for IM.
- To ensure that the IM environment fully meets with any legislative, regulatory or standard
requirements.
- To ensure that the organization and storage of information is both accessible to authorized users and
adequately protected from loss, corruption or inappropriate disclosure.
- To ensure that data is only transferred or shared when it is lawful to do so and for defined and
justifiable purposes.
- To ensure that the sharing of data with external parties is only permitted in authorized situations and
bound by the terms of a formal signed.
- Information Sharing Agreement that defines the expectations in relation to usage, storage, access
control, security, additional distribution and eventual disposal.
- To ensure that key information assets that are utilized in the creation and management of knowledge
are identified and protected.
Control Objectives
- To provide a sure and reliable environment for all IT activities.
- To ensure that all IT facilities are adequately protected from damage, loss or disruption.
- To ensure that adequate plans are in place to deal effectively with emergencies.
- To ensure that appropriate and reliable environmental and physical conditions are provided and
maintained.
- To prevent unauthorized access to the IT facility.
- To ensure that risks are assessed, and IT facilities are adequately and appropriately insured.
- To ensure that staff maintain an up-to-date awareness of their responsibilities for security and safety.
- To ensure that buildings, persons and property are effectively protected from fire.
Processing Operations
- Designed so that they can be applied to variety of processing situations.
- Traditional Batch Oriented Methods, associated with centralized systems or more direct entry of
data into freestanding or networked personal computers. Auditors will be mainly concerned with
matters of data accuracy, validity, authorization, and completeness.
- These factors are linked not only to the matters of access controls but also dependent on use of
authorized and valid versions of computer programs.
Control Objectives
- To ensure that all processing is valid, authorized and accurate.
- To ensure that data is protected from unauthorized access and use.
- To ensure that the required service levels are achieved in support of the business objectives.
- To ensure that only authorized and tested programs are used.
- To ensure that only accurate, complete and timely data is provided.
- To ensure that IT processing facilities are operated at optimum performance/ efficiency without
jeopardizing system integrity and reliability.
Control Objectives
- To ensure that critical systems and data are adequately and frequently backed up to protect the
business operations and integrity of the organization.
- To provide the means to recover promptly and accurately from system failure or invalid processing
situations.
- To ensure that the organization’s data is adequately protected from loss, damage and leakage.
- To ensure that all corporate data is safeguarded and retained.
- To ensure that retained data remains in a usable and accessible form.
- To ensure that the organization is capable of complying with the prevailing data retention legislation
and regulations.
- To ensure that data storage facilities provide the appropriate environmental conditions to prevent
deterioration or damage to media.
- To ensure that media staff are appropriately skilled in media handling techniques.
- To ensure that all media and data are accurately identified, trailed and accounted for.
- To ensure that media and data are not prematurely disposed of or destroyed.
- To prevent the infection of media and systems with viruses.
- To ensure that users are made aware of their responsibilities with regard to the back-up and
protection of PC data.
- To ensure that only the correct data are used for processing operations.
- To ensure that faulty or defective media are identified, replaced and disposed of by a means that
makes them unusable.
- To prevent the unauthorized use of media and data.
Removable Media
Risks Associated with Removable Media Devices:
Examples of Removable Media: USB memory sticks, data CDs, DVDs, portable external hard drives.
Key Risks: Loss, theft, or misuse of devices can result in breaches of sensitive information. Incidents
have included memory sticks or CDs with customer data being lost or left in public places.
Survey Findings:
o 78% of companies with stolen computers did not encrypt hard drives.
o 67% did not prevent confidential data from leaving on USB devices.
o Only 11% restricted or monitored the use of removable devices.
Security Considerations for Removable Media:
Sensitive Data: Organizations may ban removable media for handling personal, sensitive, or
confidential data to reduce risks of exposure or theft.
Control Objectives
- To ensure that the use of removable media devices is appropriate, sanctioned and protects the
organization from data loss, theft or authorized disclosure.
- To ensure that all employees are aware of required, appropriate and secure use of removable media
devices and of their specific responsibilities for data security.
- To avoid the loss, theft and/or subsequent misuse of data and information held on removable media
devices.
- To prevent the infection of removable media devices with viruses and other malicious software and
the associated onward transmission and dispersal of infected files.
- To ensure that management are fully aware of any actual or suspected information security incidents
relating to removable media devices as a means to take appropriate action to prevent or limit any
possible future reoccurrence.
Patch Management:
Patch Management is the process of managing updates to system and operating software. Key issues include:
1. Defined Approach: A clear process for managing updates and patching, ensuring that they are
tested, justified, and appropriately applied.
2. Central Control: Patch management should be centrally controlled, not left to individual users.
3. Inventory Maintenance: Keep an updated inventory of all hardware and software components
requiring patches.
4. Responsibility Allocation: Designate a Patch Administrator to oversee the process.
5. Access to Update Information: Ensure access to reliable sources for new patch releases, updates,
and virus definitions.
6. Costs, Resources, and Time: Consider the resource and time impact on staff for patch deployment,
testing, and management.
Deployment of Patches:
Testing: Test patches in a separate environment before deployment to ensure functionality and
prevent disruptions.
Automation: Automated patch deployment can be efficient but requires monitoring for failures.
Roll-back Capability: Always ensure the ability to revert to the previous version in case of
deployment problems.
Post-Deployment Monitoring:
After deployment, monitor the environment for any unexpected or adverse issues.
Update the central inventory with details of the deployment.
Control Objective
- To ensure that only authorised and reliable systems and operating software are used in order to
provide a stable basis for data processing operations.
- To ensure that the configuration of the systems/operating software supports the efficient running of
systems.
- To ensure that the operating system prevents unauthorised access to systems, data and facilities.
- To ensure that adequate and appropriately skilled staff are available to maintain the
systems/operating software.
- To ensure that all configuration changes or software amendments applied to the operating software
are valid, authorised and fully tested prior to implementation.
- To ensure that the use of privilege user or high-level facilities is valid, authorised, and suitably trailed.
- To ensure that the operating systems for personal computers are appropriately configured for
maximum performance and integrity.
- To ensure that personal computer operating systems are adequately protected from unauthorised
tampering.
- To ensure that the capability to recover from a major systems failure is maintained and periodically
tested.
- To ensure that error conditions, etc. are appropriately logged and followed up.
- To ensure that the use of powerful utility and diagnostic software is controlled and monitored in
order to prevent disruption of services or corruption of data and systems.
Control Objectives
- To ensure that systems and data are secure from unauthorised access and usage.
- To prevent disruption of the business caused by unauthorised access to computing facilities.
- To ensure that data are adequately protected from unauthorised amendment, loss or leakage.
- To ensure that all system usage is recorded and accounted for.
- To ensure that potential breaches of access security are promptly detected and reacted to.
- To ensure that staff are aware of their responsibilities for protecting company systems and data.
- To ensure that access passwords are of an acceptable standard and kept confidential.
- To ensure that access rights and associated records are kept up to date.
Control Objectives
- To ensure that personal computers are consistently and securely used throughout the organisation as
a means of contributing to efficiency and the achievement of business objectives.
- To ensure that the use of all personal computers is justified and authorised.
- To ensure that only suitable industry standard personal computers are acquired from stable and
reliable suppliers capable of providing the required support.
- To ensure that all personal computers and ancillary equipment are effectively protected from loss,
theft or damage.
- To ensure that staff are suitably trained in the effective and efficient use of personal computing
facilities.
- To ensure that only authorised and licensed versions of software are used throughout the
organisation.
- To ensure that all PC equipment is correctly installed and appropriately configured.
- To prevent unauthorised configuration and software amendments being applied.
- To ensure that only authorised users are granted access to PC facilities.
- To ensure that the organisation conforms to the prevailing software licensing conditions.
- To prevent the unauthorised copying and theft of PC software and data.
- To prevent the loading of unauthorised software.
- To ensure compliance with the requirements of the Data Protection legislation.
- To ensure that business disruption caused by hardware failure is minimised.
- To prevent the infection of PC equipment and other IT facilities with viruses, and to deal promptly
and effectively with any suspected or actual infection.
Remote Working
Remote access allows employees (e.g., those traveling, working from home, or at other locations) and
authorized contractors to access an organization’s network and data systems.
Key Findings from 2008 UK Information Security Breaches Survey:
54% of companies allow remote access for employees.
84% restrict which staff can access systems remotely and what systems they can use.
53% require additional passwords beyond standard network sign-on.
9% use strong authentication methods (e.g., tokens, smart cards, biometric verification).
44% use Virtual Private Networks (VPNs) for secure access.
Employee Responsibilities:
1. Equipment Protection:
o Employees must take care of the equipment, preventing damage, loss, or theft, especially
during transit or at remote locations.
o Avoid leaving equipment in open view (e.g., in cars or client sites).
2. Workplace Setup:
o If possible, use a secure area in the home for work purposes that can be locked when not in
use.
3. Computer Security:
o Log off or disable computers when unattended.
o Prevent unauthorized persons (e.g., visitors or other employees) from accessing corporate
information.
4. Device and Information Protection:
o Secure access devices, removable media, and hardcopy information, storing them separately
from computers when not in use.
5. Prohibited Actions:
o Do not change system or software configurations.
o No unauthorized software (e.g., screensavers) or hardware installations.
o No use of corporate equipment for personal business activities.
6. Compliance and Reporting:
o Report faults or suspected security breaches to the central IT Helpdesk.
o Comply with all IT and Information Management policies.
Control Objectives
- To ensure that remote access is only granted to and provided for use by authorised users (including
non employees) and in justified circumstances.
- To ensure that the technical basis for remotely accessing the organisation’s systems and data are
sufficiently robust and reliable in order to protect such information assets from loss, unauthorised
access or unlawful disclosure.
- To ensure that the basis for providing remote access to IT facilities is clearly defined together with
the employee’s specific responsibilities.
- To ensure that the non-work use of the provided facilities is clearly defined and enforced.
- To effectively protect systems and data and to retain their accuracy and integrity.
- To provide and install adequate, robust and industry standard hardware and supporting devices and
to maintain them in working order.
- To ensure that adequate physical security measures are in place to protect the hardware, software
and hardcopy information from theft, loss, damage or corruption.
- To ensure that appropriate and licensed software is provided and correctly configured for secure and
efficient use.
- To ensure that log-on processes are appropriately secure and operate in accord with any prevailing
required technical standards.
- To actively prevent the loading or use of unauthorised software or code.
- To prevent the interception or other misuse of network transactions and data flow.
- To ensure that the storage and back-up of data is suitably robust, including protecting the storage
devices from loss or theft.
- To ensure that all aspects of remote working are conducted lawfully and comply with the current
documented policies and procedures.
Email
Global Email Usage:
Email Marketing Reports (Austria) estimates that 247 billion emails are sent daily worldwide,
with the number projected to nearly double to 507 billion by 2013 (Radicati Group).
In 2009, 81% of email traffic was expected to be spam.
Email's Role in Organizations:
Email is a vital communication tool, used for both marketing and internal/external communication.
However, email can waste time, spread malware, and be a platform for inappropriate behavior.
Key Findings from 2008 BERR Information Security Breaches Survey (UK):
97% of companies filter incoming emails for spam.
95% scan incoming emails for viruses.
94% quarantine suspicious email attachments.
84% do not scan outgoing emails for confidential data.
33% encrypt email messages with main business partners.
26% scan email content for inappropriate material.
Employee Responsibilities:
1. Appropriate Use:
o Emails should support business activities; personal use of email should be limited to breaks
and not interfere with operations.
o Personal emails should include disclaimers stating that the contents are not official
communications from the organization.
2. Confidentiality:
o Confidential emails should be clearly marked and handled according to appropriate
standards (e.g., using encryption).
3. Monitoring:
o Emails may be monitored to ensure compliance with policies and to prevent inappropriate
use.
4. Prohibited Actions:
o Employees must not:
Use email to distribute inappropriate material (e.g., obscene, defamatory, or
discriminatory content).
Engage in activities that could damage the organization’s reputation.
Forward private communications without consent.
5. IT Security:
o Do not circumvent antivirus or security systems.
o Report any suspicious or unsolicited emails to IT immediately.
Control Objectives:
- To ensure that corporate email facilities are reliable and efficient.
- To ensure that the permitted use of email is clearly defined for all users.
- To prevent wastage of resources, operational disruption or other adverse effects generated by the
inappropriate use of email.
- To ensure that consistent standards are applied to the format and content of official emails.
- To retain and protect email records as part of the organisation’s official documentation.
- To prevent the disruptions caused by spam email and emails containing viruses or other malicious
code.
- To ensure that the use of email is lawful and complies with the prevailing regulations.
- To ensure that personal or sensitive information contained within emails or attachments is
appropriately protected from loss or inappropriate disclosure.
- To ensure that any highly sensitive or restricted information is only emailed using recognised and
approved secure networks.
- To prevent the interception of corporate emails by unauthorised persons.
- To ensure that access to employee’s email accounts, in exceptional circumstances, is lawful and
granted with the explicit permission of the employee concerned.
- To monitor email usage as a means of determining any excessive usage or abuse of the permitted
levels of activity.
Internet Usage
Internet's Role in Society:
The Internet has become one of the most powerful instruments of cultural and social change, akin
to the telephone, radio, and television.
Initially developed in the 1960s, it grew from academic and military use (e.g., ARPANET, MILNET) to
a global network. By 2009, 1.7 billion users, or 24.7% of the world population, were online.
Its impact has included the open availability of information, new ways of communication, and
business transformation.
Legal Implications:
Users must be aware of the legal consequences of accessing inappropriate or illegal content, such as
pornography or offensive materials, which can be subject to criminal prosecution.
Any incident involving illegal content (e.g., child pornography) must be reported to authorities
immediately.