SlideShare a Scribd company logo
1 of 21
Relying on the Third Party Sabrina Maeng
Agenda What is Outsourcing? What to Outsource? Types of Outsourcing Criticisms and Support Why to Outsource? Risks Mitigating Risks: Audit Audit Focus Specific Standards Recommendations
What is Outsourcing? “the outsourcing process can be perceived as the activity transferred to be carried out by another company”1 1Source: Andone, Ioan I and Pavaloaia, Vasile-Daniel. “Outsourcing the Business Services.”InformaticaEconomica.  14.1 (2010) : 163-172. ESCO Host. Web. 28 May 2011.
What to Outsource? Business Process Outsourcing (BPO) Accounting Customer Support Marketing Analysis (Financial and Economic) Information Technology Outsourcing (ITO) Software development Application support and maintenance Infrastructure management
Types of Outsourcing Offshoring: transfer of business activity to another country Domestic outsourcing: transfer of business activity to a non-affiliated company within the same country
What is Outsourcing? Support Cost savings for the company – up to 50-60%  “Transformational Outsourcing” 2 Price reductions for consumers Criticisms Reputation at stake Loss of product quality Loss of intellectual capital (ie. data security) 2Engardio, Peter. “The Future of Outsourcing.”Bloomberg Business Week.(2006). Web. 28 May 2011. <http://www.businessweek.com/magazine/content/06_05/b3969401.htm>
Why to Outsource? Current financial situation of the company Actual outsourcing costs Control of business functions Access to documents Cultural differences Organizational differences Hiring practices Management attitude Competencies required
Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
Risks The Agreement  Roles and responsibilities Expertise and experience of supplier System capabilities Staffing requirements
Risks Data Security Reputation System functions and capabilities “You can delegate accountability, but not responsibility.”4 Service providers are accountable User organizations are responsible 4Source: Van Dyk, Peter. “Cloud Computing: Validating accountability and responsibility.” NZ Business.24.10 (2010). ESCO Host. Web. 28 May 2011.
Mitigating Risk: Audit Why Audit? SOX requires that publicly traded companies with outsourced processes obtain audits Many companies won’t use a service provider that doesn’t have an audit
Audit: Focus Security Data Network  Connectivity Contract Country-specific regulatory requirements
Audit: SAS 70 and CICA 5970 SAS 70 and CICA 5970 - similar in nature Type I-  evaluation of control design at point in time Type II- evaluation of control design and operating effectiveness of controls over a period of time
Audit: SAS 70 and CICA 5970 Service organization choose the controls Management can circumvent the process Too much reliance on management with no assertion
Audit: SSAE 16 and ISAE 3402 Assertion–based engagements Type I/Type II and Type A/B Reliance on internal audit processes
Audit: SSAE 16 New U.S. standard issued June 15, 2011 issued to replace SAS 70 Better aligns with international standards (ISAE 3402 discussed later)
Audit: SSAE 16 Management assertion requirement Expanded descriptions (inclusive of internal controls, systems and processes) Identification of risk points or weaknesses Addresses use of subservice organization Inclusive  Carve-out Assumptions on user role Reliance on internal audit processes
Audit: ISAE 3402 Current acting international standard Used as a basis to update existing standards “An International Assurance Standard for Third Party Reporting: Benefits and Implications for Service Organizations.” PricewaterHouseCoopers. 2009. Web. 10 June 2011. <http://www.pwc.com/en_CA/ca/controls/business-process-controls/publications/international-assurance-standard-0409-en.pdf>
Audit: ISAE 3402 Management assertion requirement Specifies criteria (preparing and presenting system description, control design and operating effectiveness) Disclosure of reliance on internal audit processes, and/or external experts used with regard to controls Extending the scope beyond financial reporting matters Regulatory, compliance, operational, business recovery matters
Recommendations Use of service organizations is not beneficial to every company Cost-benefit analysis  Risk analysis and mitigation Audit or Attest

More Related Content

What's hot

September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)
Amara Omar Kuyateh
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007
Danial Khan
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
NCTechSymposium
 
Information System audit
Information System auditInformation System audit
Information System audit
Pratapchandra
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isaca
pooshu
 

What's hot (20)

LexComply - Compliance Software India
LexComply - Compliance Software IndiaLexComply - Compliance Software India
LexComply - Compliance Software India
 
September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)
 
Lexcomply - Compliance Management System
Lexcomply - Compliance Management SystemLexcomply - Compliance Management System
Lexcomply - Compliance Management System
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007
 
Planning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) reportPlanning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) report
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Exercise auditing
Exercise auditingExercise auditing
Exercise auditing
 
Casa engl
Casa englCasa engl
Casa engl
 
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
 
Lawrbit Global Regulatory Intelligence
Lawrbit Global Regulatory IntelligenceLawrbit Global Regulatory Intelligence
Lawrbit Global Regulatory Intelligence
 
Information System audit
Information System auditInformation System audit
Information System audit
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Sas 70 Readiness
Sas 70 ReadinessSas 70 Readiness
Sas 70 Readiness
 
Which SOC Report Do I need?
Which SOC Report Do I need?Which SOC Report Do I need?
Which SOC Report Do I need?
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isaca
 
KPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline ContractsKPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline Contracts
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Profile_Kishore Sundar
Profile_Kishore SundarProfile_Kishore Sundar
Profile_Kishore Sundar
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 

Similar to Relying on the Third Party

Internal Audit And Review Reports
Internal Audit And Review ReportsInternal Audit And Review Reports
Internal Audit And Review Reports
Laura Martin
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
David Cunningham
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
sarah kabirat
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
Gene Kim
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your Business
Laura Perry
 

Similar to Relying on the Third Party (20)

Information Systems Audit-Related Designations
Information Systems Audit-Related DesignationsInformation Systems Audit-Related Designations
Information Systems Audit-Related Designations
 
Account Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptxAccount Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptx
 
Internal Audit And Review Reports
Internal Audit And Review ReportsInternal Audit And Review Reports
Internal Audit And Review Reports
 
Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Presentation to the AEA (June 23)
Presentation to the AEA (June 23)
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
 
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your Business
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
 
A Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - CogneesolA Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - Cogneesol
 
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and EconomyAssurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economy
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTER
 

Recently uploaded

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 

Recently uploaded (20)

Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 

Relying on the Third Party

  • 1. Relying on the Third Party Sabrina Maeng
  • 2. Agenda What is Outsourcing? What to Outsource? Types of Outsourcing Criticisms and Support Why to Outsource? Risks Mitigating Risks: Audit Audit Focus Specific Standards Recommendations
  • 3. What is Outsourcing? “the outsourcing process can be perceived as the activity transferred to be carried out by another company”1 1Source: Andone, Ioan I and Pavaloaia, Vasile-Daniel. “Outsourcing the Business Services.”InformaticaEconomica. 14.1 (2010) : 163-172. ESCO Host. Web. 28 May 2011.
  • 4. What to Outsource? Business Process Outsourcing (BPO) Accounting Customer Support Marketing Analysis (Financial and Economic) Information Technology Outsourcing (ITO) Software development Application support and maintenance Infrastructure management
  • 5. Types of Outsourcing Offshoring: transfer of business activity to another country Domestic outsourcing: transfer of business activity to a non-affiliated company within the same country
  • 6. What is Outsourcing? Support Cost savings for the company – up to 50-60% “Transformational Outsourcing” 2 Price reductions for consumers Criticisms Reputation at stake Loss of product quality Loss of intellectual capital (ie. data security) 2Engardio, Peter. “The Future of Outsourcing.”Bloomberg Business Week.(2006). Web. 28 May 2011. <http://www.businessweek.com/magazine/content/06_05/b3969401.htm>
  • 7. Why to Outsource? Current financial situation of the company Actual outsourcing costs Control of business functions Access to documents Cultural differences Organizational differences Hiring practices Management attitude Competencies required
  • 8. Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
  • 9. Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
  • 10. Risks The Agreement Roles and responsibilities Expertise and experience of supplier System capabilities Staffing requirements
  • 11. Risks Data Security Reputation System functions and capabilities “You can delegate accountability, but not responsibility.”4 Service providers are accountable User organizations are responsible 4Source: Van Dyk, Peter. “Cloud Computing: Validating accountability and responsibility.” NZ Business.24.10 (2010). ESCO Host. Web. 28 May 2011.
  • 12. Mitigating Risk: Audit Why Audit? SOX requires that publicly traded companies with outsourced processes obtain audits Many companies won’t use a service provider that doesn’t have an audit
  • 13. Audit: Focus Security Data Network Connectivity Contract Country-specific regulatory requirements
  • 14. Audit: SAS 70 and CICA 5970 SAS 70 and CICA 5970 - similar in nature Type I- evaluation of control design at point in time Type II- evaluation of control design and operating effectiveness of controls over a period of time
  • 15. Audit: SAS 70 and CICA 5970 Service organization choose the controls Management can circumvent the process Too much reliance on management with no assertion
  • 16. Audit: SSAE 16 and ISAE 3402 Assertion–based engagements Type I/Type II and Type A/B Reliance on internal audit processes
  • 17. Audit: SSAE 16 New U.S. standard issued June 15, 2011 issued to replace SAS 70 Better aligns with international standards (ISAE 3402 discussed later)
  • 18. Audit: SSAE 16 Management assertion requirement Expanded descriptions (inclusive of internal controls, systems and processes) Identification of risk points or weaknesses Addresses use of subservice organization Inclusive Carve-out Assumptions on user role Reliance on internal audit processes
  • 19. Audit: ISAE 3402 Current acting international standard Used as a basis to update existing standards “An International Assurance Standard for Third Party Reporting: Benefits and Implications for Service Organizations.” PricewaterHouseCoopers. 2009. Web. 10 June 2011. <http://www.pwc.com/en_CA/ca/controls/business-process-controls/publications/international-assurance-standard-0409-en.pdf>
  • 20. Audit: ISAE 3402 Management assertion requirement Specifies criteria (preparing and presenting system description, control design and operating effectiveness) Disclosure of reliance on internal audit processes, and/or external experts used with regard to controls Extending the scope beyond financial reporting matters Regulatory, compliance, operational, business recovery matters
  • 21. Recommendations Use of service organizations is not beneficial to every company Cost-benefit analysis Risk analysis and mitigation Audit or Attest