06.01.2013 Views

Standards of Internal Controls - Arizona State University

Standards of Internal Controls - Arizona State University

Standards of Internal Controls - Arizona State University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

6.3.8 Computer systems or programs are<br />

considered in production status if<br />

systems/programs are relied upon by<br />

management for conducting,<br />

recording or reporting business<br />

operations. S<strong>of</strong>tware for production<br />

systems may be developed by IT<br />

departments, end users or vendors.<br />

Production systems may operate on<br />

mainframe, departmental, personal<br />

computers or wide-area/local-area<br />

networks. The following controls<br />

should exist to protect production<br />

computer s<strong>of</strong>tware and data files:<br />

a. Application programmers should<br />

not be provided with permanent<br />

update access to production s<strong>of</strong>tware<br />

or data files. Management should<br />

grant specific authorization to<br />

programmers to change production<br />

s<strong>of</strong>tware or data files to correct<br />

system failures; and<br />

b. Update access to production<br />

s<strong>of</strong>tware or data files that are<br />

classified as confidential or<br />

proprietary to computer operations<br />

personnel or programmers who<br />

maintain or execute computer<br />

operating systems and/or system<br />

management s<strong>of</strong>tware. Management<br />

should designate an appropriate<br />

individual to maintain records<br />

evidencing timely review <strong>of</strong> these<br />

logs.<br />

Refer to risks: C-1, C-11, C-15, C-16<br />

6.3.9 Suppliers, contract programmers and<br />

other non-university users should<br />

sign non-disclosure agreements<br />

before they are given direct access to<br />

our computer systems. Outside users<br />

who use our computer systems<br />

should have separate and unique<br />

computer accounts or user IDs.<br />

Refer to risks: C-1, C-11, C-15, C-16<br />

C-8 Access to university data files and<br />

programs may be granted without<br />

proper authorization.<br />

C-9 Unauthorized access attempts may<br />

be made on a regular basis without<br />

detection.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!