SlideShare a Scribd company logo
1 of 21
Relying on the Third Party Sabrina Maeng
Agenda What is Outsourcing? What to Outsource? Types of Outsourcing Criticisms and Support Why to Outsource? Risks Mitigating Risks: Audit Audit Focus Specific Standards Recommendations
What is Outsourcing? “the outsourcing process can be perceived as the activity transferred to be carried out by another company”1 1Source: Andone, Ioan I and Pavaloaia, Vasile-Daniel. “Outsourcing the Business Services.”InformaticaEconomica.  14.1 (2010) : 163-172. ESCO Host. Web. 28 May 2011.
What to Outsource? Business Process Outsourcing (BPO) Accounting Customer Support Marketing Analysis (Financial and Economic) Information Technology Outsourcing (ITO) Software development Application support and maintenance Infrastructure management
Types of Outsourcing Offshoring: transfer of business activity to another country Domestic outsourcing: transfer of business activity to a non-affiliated company within the same country
What is Outsourcing? Support Cost savings for the company – up to 50-60%  “Transformational Outsourcing” 2 Price reductions for consumers Criticisms Reputation at stake Loss of product quality Loss of intellectual capital (ie. data security) 2Engardio, Peter. “The Future of Outsourcing.”Bloomberg Business Week.(2006). Web. 28 May 2011. <http://www.businessweek.com/magazine/content/06_05/b3969401.htm>
Why to Outsource? Current financial situation of the company Actual outsourcing costs Control of business functions Access to documents Cultural differences Organizational differences Hiring practices Management attitude Competencies required
Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
Risks The Agreement  Roles and responsibilities Expertise and experience of supplier System capabilities Staffing requirements
Risks Data Security Reputation System functions and capabilities “You can delegate accountability, but not responsibility.”4 Service providers are accountable User organizations are responsible 4Source: Van Dyk, Peter. “Cloud Computing: Validating accountability and responsibility.” NZ Business.24.10 (2010). ESCO Host. Web. 28 May 2011.
Mitigating Risk: Audit Why Audit? SOX requires that publicly traded companies with outsourced processes obtain audits Many companies won’t use a service provider that doesn’t have an audit
Audit: Focus Security Data Network  Connectivity Contract Country-specific regulatory requirements
Audit: SAS 70 and CICA 5970 SAS 70 and CICA 5970 - similar in nature Type I-  evaluation of control design at point in time Type II- evaluation of control design and operating effectiveness of controls over a period of time
Audit: SAS 70 and CICA 5970 Service organization choose the controls Management can circumvent the process Too much reliance on management with no assertion
Audit: SSAE 16 and ISAE 3402 Assertion–based engagements Type I/Type II and Type A/B Reliance on internal audit processes
Audit: SSAE 16 New U.S. standard issued June 15, 2011 issued to replace SAS 70 Better aligns with international standards (ISAE 3402 discussed later)
Audit: SSAE 16 Management assertion requirement Expanded descriptions (inclusive of internal controls, systems and processes) Identification of risk points or weaknesses Addresses use of subservice organization Inclusive  Carve-out Assumptions on user role Reliance on internal audit processes
Audit: ISAE 3402 Current acting international standard Used as a basis to update existing standards “An International Assurance Standard for Third Party Reporting: Benefits and Implications for Service Organizations.” PricewaterHouseCoopers. 2009. Web. 10 June 2011. <http://www.pwc.com/en_CA/ca/controls/business-process-controls/publications/international-assurance-standard-0409-en.pdf>
Audit: ISAE 3402 Management assertion requirement Specifies criteria (preparing and presenting system description, control design and operating effectiveness) Disclosure of reliance on internal audit processes, and/or external experts used with regard to controls Extending the scope beyond financial reporting matters Regulatory, compliance, operational, business recovery matters
Recommendations Use of service organizations is not beneficial to every company Cost-benefit analysis  Risk analysis and mitigation Audit or Attest

More Related Content

What's hot

LexComply - Compliance Software India
LexComply - Compliance Software IndiaLexComply - Compliance Software India
LexComply - Compliance Software IndiaLexComply
 
September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)Amara Omar Kuyateh
 
Lexcomply - Compliance Management System
Lexcomply - Compliance Management SystemLexcomply - Compliance Management System
Lexcomply - Compliance Management SystemLexComply
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007Danial Khan
 
Planning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) reportPlanning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) reportJay Crossland
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
Exercise auditing
Exercise auditingExercise auditing
Exercise auditingsahaomar
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Sas 70 Readiness
Sas 70 ReadinessSas 70 Readiness
Sas 70 Readinessmpotorti
 
Which SOC Report Do I need?
Which SOC Report Do I need?Which SOC Report Do I need?
Which SOC Report Do I need?VISTA InfoSec
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isacapooshu
 
KPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline ContractsKPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline ContractsIcertis
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCorporater
 

What's hot (20)

LexComply - Compliance Software India
LexComply - Compliance Software IndiaLexComply - Compliance Software India
LexComply - Compliance Software India
 
September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)
 
Lexcomply - Compliance Management System
Lexcomply - Compliance Management SystemLexcomply - Compliance Management System
Lexcomply - Compliance Management System
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007
 
Planning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) reportPlanning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) report
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Exercise auditing
Exercise auditingExercise auditing
Exercise auditing
 
Casa engl
Casa englCasa engl
Casa engl
 
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
 
Lawrbit Global Regulatory Intelligence
Lawrbit Global Regulatory IntelligenceLawrbit Global Regulatory Intelligence
Lawrbit Global Regulatory Intelligence
 
Information System audit
Information System auditInformation System audit
Information System audit
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Sas 70 Readiness
Sas 70 ReadinessSas 70 Readiness
Sas 70 Readiness
 
Which SOC Report Do I need?
Which SOC Report Do I need?Which SOC Report Do I need?
Which SOC Report Do I need?
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isaca
 
KPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline ContractsKPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline Contracts
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Profile_Kishore Sundar
Profile_Kishore SundarProfile_Kishore Sundar
Profile_Kishore Sundar
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 

Similar to Relying on the Third Party

Information Systems Audit-Related Designations
Information Systems Audit-Related DesignationsInformation Systems Audit-Related Designations
Information Systems Audit-Related DesignationsMichael Lin
 
Account Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptxAccount Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptxGaneshMeenakshiSunda4
 
Internal Audit And Review Reports
Internal Audit And Review ReportsInternal Audit And Review Reports
Internal Audit And Review ReportsLaura Martin
 
Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Daljit Banger
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S proaxissolutions
 
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14said missoum
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsVisionet Systems, Inc.
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessLaura Perry
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...NextLabs, Inc.
 
A Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - CogneesolA Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - CogneesolCogneesol
 
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and EconomyAssurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economysophiacuiry
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTERRaj Kumar
 

Similar to Relying on the Third Party (20)

Information Systems Audit-Related Designations
Information Systems Audit-Related DesignationsInformation Systems Audit-Related Designations
Information Systems Audit-Related Designations
 
Account Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptxAccount Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptx
 
Internal Audit And Review Reports
Internal Audit And Review ReportsInternal Audit And Review Reports
Internal Audit And Review Reports
 
Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Presentation to the AEA (June 23)
Presentation to the AEA (June 23)
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
 
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your Business
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
 
A Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - CogneesolA Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - Cogneesol
 
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and EconomyAssurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economy
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTER
 

Recently uploaded

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 

Recently uploaded (20)

Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 

Relying on the Third Party

  • 1. Relying on the Third Party Sabrina Maeng
  • 2. Agenda What is Outsourcing? What to Outsource? Types of Outsourcing Criticisms and Support Why to Outsource? Risks Mitigating Risks: Audit Audit Focus Specific Standards Recommendations
  • 3. What is Outsourcing? “the outsourcing process can be perceived as the activity transferred to be carried out by another company”1 1Source: Andone, Ioan I and Pavaloaia, Vasile-Daniel. “Outsourcing the Business Services.”InformaticaEconomica. 14.1 (2010) : 163-172. ESCO Host. Web. 28 May 2011.
  • 4. What to Outsource? Business Process Outsourcing (BPO) Accounting Customer Support Marketing Analysis (Financial and Economic) Information Technology Outsourcing (ITO) Software development Application support and maintenance Infrastructure management
  • 5. Types of Outsourcing Offshoring: transfer of business activity to another country Domestic outsourcing: transfer of business activity to a non-affiliated company within the same country
  • 6. What is Outsourcing? Support Cost savings for the company – up to 50-60% “Transformational Outsourcing” 2 Price reductions for consumers Criticisms Reputation at stake Loss of product quality Loss of intellectual capital (ie. data security) 2Engardio, Peter. “The Future of Outsourcing.”Bloomberg Business Week.(2006). Web. 28 May 2011. <http://www.businessweek.com/magazine/content/06_05/b3969401.htm>
  • 7. Why to Outsource? Current financial situation of the company Actual outsourcing costs Control of business functions Access to documents Cultural differences Organizational differences Hiring practices Management attitude Competencies required
  • 8. Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
  • 9. Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
  • 10. Risks The Agreement Roles and responsibilities Expertise and experience of supplier System capabilities Staffing requirements
  • 11. Risks Data Security Reputation System functions and capabilities “You can delegate accountability, but not responsibility.”4 Service providers are accountable User organizations are responsible 4Source: Van Dyk, Peter. “Cloud Computing: Validating accountability and responsibility.” NZ Business.24.10 (2010). ESCO Host. Web. 28 May 2011.
  • 12. Mitigating Risk: Audit Why Audit? SOX requires that publicly traded companies with outsourced processes obtain audits Many companies won’t use a service provider that doesn’t have an audit
  • 13. Audit: Focus Security Data Network Connectivity Contract Country-specific regulatory requirements
  • 14. Audit: SAS 70 and CICA 5970 SAS 70 and CICA 5970 - similar in nature Type I- evaluation of control design at point in time Type II- evaluation of control design and operating effectiveness of controls over a period of time
  • 15. Audit: SAS 70 and CICA 5970 Service organization choose the controls Management can circumvent the process Too much reliance on management with no assertion
  • 16. Audit: SSAE 16 and ISAE 3402 Assertion–based engagements Type I/Type II and Type A/B Reliance on internal audit processes
  • 17. Audit: SSAE 16 New U.S. standard issued June 15, 2011 issued to replace SAS 70 Better aligns with international standards (ISAE 3402 discussed later)
  • 18. Audit: SSAE 16 Management assertion requirement Expanded descriptions (inclusive of internal controls, systems and processes) Identification of risk points or weaknesses Addresses use of subservice organization Inclusive Carve-out Assumptions on user role Reliance on internal audit processes
  • 19. Audit: ISAE 3402 Current acting international standard Used as a basis to update existing standards “An International Assurance Standard for Third Party Reporting: Benefits and Implications for Service Organizations.” PricewaterHouseCoopers. 2009. Web. 10 June 2011. <http://www.pwc.com/en_CA/ca/controls/business-process-controls/publications/international-assurance-standard-0409-en.pdf>
  • 20. Audit: ISAE 3402 Management assertion requirement Specifies criteria (preparing and presenting system description, control design and operating effectiveness) Disclosure of reliance on internal audit processes, and/or external experts used with regard to controls Extending the scope beyond financial reporting matters Regulatory, compliance, operational, business recovery matters
  • 21. Recommendations Use of service organizations is not beneficial to every company Cost-benefit analysis Risk analysis and mitigation Audit or Attest