|
General
Internal Audit uses computers as tools for improving productivity and making
work easier. On a daily basis, we prepare working papers, create other documents,
and check e-mail. Because of their speed and reliability, computers sometimes
provide the only feasible way to perform tasks, such as obtaining information
from financial systems or analyzing data for unusual patterns or variances.
Computers also help prevent destruction of data since files can be backed up
and stored away from the computer.
Because our computers are a valuable resource, we must take steps to prevent
the loss or destruction of our machines, software programs, and data files.
Desktop Machines, Laptops, and Printers
Each staff member is responsible for safeguarding the desktop
and laptop computers in his or her office. Offices should be
locked after normal business hours, when a staff member is working
at other locations, or when the area will be unattended. Physical
security is the best line of defense against loss or damage of the
machines or data they contain.
The office has purchased several laptop computers for the
staff to use when working in offices of auditees. Laptop
computers are assigned to each staff member and should be accounted
for at all times. Peripheral devices such as a USB “flash drive”,
mouse, or keypad may also be issued to the auditor along with their
laptop. The department administrative assistant is responsible for
maintaining records of what desktop and laptop computers and
peripheral equipment are assigned to each member of the staff.
Laptop computers are highly susceptible to theft so extra
caution should be taken to protect them. At an audit site, an
auditor is responsible for securing the machines when they are left
unattended. Alternatives for securing laptops and printers include:
-
locking them in an office, a desk,
or a file cabinet;
-
powering them down and leaving
them with a trustworthy employee of the department being
reviewed; or
- carrying the machines when the auditor leaves the work
station.
If laptops can be properly secured, they may be left at an audit
site overnight. Otherwise, they should be returned to the office or
taken home.
Since computer equipment is sensitive to moisture and extremes of
temperature, laptops should not be left in an automobile for
extended periods of time, particularly in warm weather. Transit time
when moving computer hardware in an automobile should be kept to a
minimum; the machines should not be left in the automobile
overnight. Hardware should be placed out-of-sight, preferably in the
trunk, if they will be left in an unattended automobile.
Software and Data Files:
There should be no illegal software, “spyware”, or advertising
software installed on Internal Audit’s computers. Only software
approved by the Director of Internal Audit can be installed on our
computers. Each computer should have a corresponding software
license for all of its installed software. Software licensed to the
University or Internal Audit Department should only be copied for
back up purposes.
Electronic files for on-going projects and audits should be
stored centrally on a computer’s hard drive, compact disks (CD),
flash drive, or a diskette. In cases of highly sensitive
projects, additional steps should be taken to protect data files
such as "password protecting" files or saving the files only on
diskette or CD and the diskette or (CD) should be
physically controlled. Passwords can be assigned from the Tools menu
under Options and saved. If you chose to assign a password, write it
down and put in a secure place. Without the password, the document
can’t be opened.
Because items stored electronically can be lost or destroyed far
more easily than they were created, it is important to back-up these
items. Each staff member is responsible for performing periodic
back-up of their computer files and storing back-up CDs apart
from the computer or working copy of the data. Backup files of
on-going projects may also be saved on a laptop or flash drive.
Also, each auditor should activate the "Automatic Save" feature
of Word and Excel (found on the Tools menu, under Options) on his or
her machine. This feature automatically backs-up a file being
created or modified to the PC’s hard drive at specified intervals.
Automatic back-ups prevent large amount of work being lost if the
power supply to the machine is interrupted.
Passwords
In addition to the physical security measures referenced above
in “Desktop Computers and Laptops”, every department employee is
responsible for securing their desktop and laptop computers with a
strong password. The following tips for creating a strong password
are provided by University Technology Services:
| Does not contain the user name |
| Is at least eight characters long |
| Include lowercase letters a, b, c,... |
| Include uppercase letters A, B, C,...
|
| Numerals 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
|
| Symbols (all characters not defined as
letters or numerals) ` ~ ! @ # $ % ^ & * ( ) _ + -={ } | [ ]
\ : " ; ' < > ? , . / |
| Use a significant date (numbers),
followed with a symbol (* or #), followed by letters |
| Use the first letter of special sayings
followed by symbols and/or dates |
| Replace letters for numbers and
vice-versa |
Certain university computer resources require users to change
their passwords on a regular basis whereas other resources do not.
Internal Audit users should change their passwords on a regular
basis whether require to or not, if allowed by the computer system.
Users should logoff or “lock” their workstation when leaving it
unattended for an extended period of time. Refer to
E-mail and On-Line Resources
below.
Safeguarding CDs and Diskettes:
The staff should take special care to safeguard CDs, flash
drives, and diskettes. The following are some suggestions to
help safeguard them:
-
Use felt tip markers to label
compact disks or diskettes.
-
Store CDs in a manner that will
prevent them from being scratched. Scratching a CD may prevent
users from accessing the information stored on them.
-
Do not place diskettes near
magnetic field. Items that produce magnetic fields include:
telephones, speakers, appliances, microwaves, copiers,
televisions.
-
Do not touch the magnetic film
inside the floppy disk or allow dust to get on it.
- Keep the diskettes in a cool, dry, and safe location.
E-mail and On-Line Resources:
Each staff member will receive a free e-mail account. Due to the
ease with which E-mail can be read or forwarded, extra care should
go into its creation. Most E-mail systems, including those email
systems maintained by the university retain copies without the
knowledge of the creator. Staff members should exercise care with
any information or pictures they may post to a website or blog as
that information can be accessed with search engines such as
Google or Yahoo. Always consider the ramifications of the E-mail
being read by someone other than the intended recipient. When
replying to a person who sent an email to a listserv, it is
essential that users ensure they are replying to only the sender of
the email and not all recipients of the email.
Each staff member will also receive a log on ID for the
University’s Information Systems. Access to individual systems, will
be allowed on an as needed basis. Since our information needs as
auditors give us access to a wider range of computer records, we
must take special precautions to safeguard sensitive or confidential
items. Information obtained during the course of a project should
only be disclosed as part of the normal audit communication process
or with the permission of the Director of Internal Audit. Under no
circumstances should on-line information be obtained or used except
in connection with an audit project.
This portion of the policies was revised 11/7/06. Changes
are in bold.
[Back to Table of
Contents]
|