SlideShare a Scribd company logo
End User Computing Technology Controls in Business Renetta Ho-Antonio PMCP, ERM, CISM
Introduction The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act. The use of spreadsheets in financial reporting and operational processes, is a key tool for some corporations, and is an integral part of the information and decision-making framework.  Spreadsheet functionality is easy and flexible however, if companies heavily rely on the information contain in these spreadsheets, then they should ensure to increase their focus on controls related to the development and maintenance as related to Section 404 of the Sarbanes-Oxley Act. This presentation gives an idea as to the assessment of specific control activities that should be considered by management in evaluating the use of significant spreadsheets.
Coverage EUC Definition EUC Application Controls EUC Audits EUC Challenges and Feedback
End User Computing Definition: From an Audit perspective, End User Computing (i.e. spreadsheets) is defined as a tool designed for the purpose of extracting information and performing data manipulation prior to the transfer of and/or downstream of results to a book of record system, i.e financial reporting In addition, EUC as files in standalone software programs, such as Excel and MS Access, that are created and maintained locally by end users, and are not formally support by technology groups, are generally classified as EUCs since they may not be covered by General IT Controls.
EUC Application Controls An End User Computing work program should cover 4 controls: Identification of all EUC as they relate to the Financial and Operational control.  Security and Access of the network path where the EUC is located.  Functional Integrity within a change management process to analyze how are changes completed, tested, reviewed and approved.  Inventory and Testing. This is the Risk assessment and the impact to the organization.
Impact Testing & Security SOC Gen impact testing, Security, End User Computing (EUC) Environment and Disaster Recovery. Security testing for applications (non-euc) : end to end data flow level testing to ensure access privileges and system settings are adequately designed to prevent fraudulent activities, such as:-  Soc-Gen Impact : Test password controls at the operating system, application and database layers with appropriate segregation of duties, proper approval, “need-to-know” privileges, logging and monitoring reviews and active directory access controls. Identify and test if roaming profile has been initiated . Security and Integrity of data.
EUC Controls An independent person reviews and confirms the functionality built into the EUC file on creation and in the event of a change.  Functionality for review includes but is not limited to programming, formulae, sorting of the data, aggregation of data, report creation, links between spreadsheets and/or other applications. Functional Integrity:- Development LifeCycle; Ownership; Change control processes; Version control; Input control; Logical inspection; Overall analytics and Documentation. Is the licence for EUC application maintained through enterprise program acquisition? Are there third party agreements with technology vendors that host technology services for the entity in respect of EUC application? Is there a technology contract with an outside service provider to perform technology services such as development of code, integration testing and conversion of data?
Risk Assessment Impact of an error on the organization: No or Minimal impact, does not compromise business decisions, regulatory requirements or corporate reputation. Use & sensitivity of the data: Either not sensitive or if some what sensitive, is only used inside the organization or Either used inside or outside the organization and contains sensitive data. Complexity of dependencies: Single or multiple EUC activity, no linkages or dependencies.  There may be multiple EUC activities with linkages and interdependencies  Functionality: Simple to some advanced functions (macros, embedded codes), complex codes.  There may be advanced functions that will require a manual to support and have interactions across EUC activities. Number of users updating content or functions. Frequency of use: Monthly, weekly or more frequently. Anticipated length of Use: From a ‘One off’ up to a year or Greater than a year or in perpetuity  Development Time: Minor or no time pressure to restricted or severe time pressures.
Disaster Recovery Disaster recovery (non-BCP): business is engaged with technology to ensure continuous service. Application and Systems Recovery adequacy. Business requirements and processes provide adequate disaster recovery.  Business owners conduct Business Impact Analysis (BIA) to define priority/criticality of application and identify maximum allowable time (RTO) and acceptable level of data loss (RPO) and provide Fail Over criteria for mission critical applications.
Conclusion Every corporation would need to define their own process, tools and mechanisms to ensure that there are appropriate controls when there is an existence of end user computing, especially if this relates to SOX. Spreadsheets specifically is woven into the management fabric of every organization today.  It is important from a CEO/CFO Certification standpoint that management understands how spreadsheets are used to ensure adequacy of related controls.  This will play a critical part in management’s assessment of the effectiveness of their internal control over financial reporting. Good article to read is  France's SocGen hit by $7.1 billion alleged fraud   http://www.marketwatch.com/news/story/rogue-traders-fraud-led-71/story.aspx?guid=%7B1C980919-2F3E-4A28-AAC4-A2FB129BE6E8%7D

More Related Content

PPTX
Data Governance for End-User Computing
PPTX
End User Computing (EUC)
PPTX
End User Computing
PDF
Notes from the field - End User Computing
PDF
Presentation end-user computing in the post-pc era
PPTX
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
PDF
Improving BPM Time To Value
PPTX
Blue Central and the world of End User Computing
Data Governance for End-User Computing
End User Computing (EUC)
End User Computing
Notes from the field - End User Computing
Presentation end-user computing in the post-pc era
Master the Ever Expanding Puzzle of End-User Computing with a Strategy and Ro...
Improving BPM Time To Value
Blue Central and the world of End User Computing

What's hot (20)

PPTX
New Horizons for End-User Computing Event - VMware
PDF
End User Computing
PDF
VMworld 2014: End-User Computing for the Mobile-Cloud Era
PDF
End-user computing is not a trend, it's a transformational shift
PDF
VMworld 2013: End User Computing Solutions for Financial Services
PDF
Microsoft India – Managing the Dynamic Desktop Whitepaper
DOCX
Computers in management
PPT
Computer Management Short Version Ppt
PPT
System Development Proecess
PPT
Office automation sysmtems
PPTX
Executive support system (ess)
PDF
C. executive information systems
PPTX
Lect 2 assessing the technology landscape
PPTX
Enterprise application
PPTX
Mobile Bill Management System - Project Proposal
PPT
MIS-executive information system
PPTX
Bua 235 teamwork
DOCX
Managed Print Services
PPT
Chap12 Developing Business It Solutions[1]
PDF
Unified Device Management
New Horizons for End-User Computing Event - VMware
End User Computing
VMworld 2014: End-User Computing for the Mobile-Cloud Era
End-user computing is not a trend, it's a transformational shift
VMworld 2013: End User Computing Solutions for Financial Services
Microsoft India – Managing the Dynamic Desktop Whitepaper
Computers in management
Computer Management Short Version Ppt
System Development Proecess
Office automation sysmtems
Executive support system (ess)
C. executive information systems
Lect 2 assessing the technology landscape
Enterprise application
Mobile Bill Management System - Project Proposal
MIS-executive information system
Bua 235 teamwork
Managed Print Services
Chap12 Developing Business It Solutions[1]
Unified Device Management
Ad

Similar to Technology Controls in Business - End User Computing (20)

DOCX
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
DOCX
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
PPT
bankauditinITEnv
PPT
bankauditinITEnv
PPT
Bankauditin it env
DOCX
TOPIC Staggered duty days to reduce congestion at the gates .docx
PDF
Auditing Systems Development
PPT
How much does it cost to be Secure?
PDF
A Comprehensive Look at Application Observability_ What it is and Why it Matt...
PDF
Technology Audit
PDF
Book 2_Bab 11_Information Technology and ERM.pdf
DOC
Sample audit plan
PPTX
Compliance Management Software | Corporate Compliance
PDF
Technology Audit
PDF
Principles of Auditing Other Assurance Services 19th Edition Whittington Solu...
DOC
Unit Iii
PDF
Technology audit presentation
PPT
An IT Governance program
PPTX
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
PPTX
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
Running head AUDITING INFORMATION SYSTEMS PROCESS .docx
bankauditinITEnv
bankauditinITEnv
Bankauditin it env
TOPIC Staggered duty days to reduce congestion at the gates .docx
Auditing Systems Development
How much does it cost to be Secure?
A Comprehensive Look at Application Observability_ What it is and Why it Matt...
Technology Audit
Book 2_Bab 11_Information Technology and ERM.pdf
Sample audit plan
Compliance Management Software | Corporate Compliance
Technology Audit
Principles of Auditing Other Assurance Services 19th Edition Whittington Solu...
Unit Iii
Technology audit presentation
An IT Governance program
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
293504541-ict-its4-03-0811-assist-with-policy-development-for-client-support-...
Ad

Recently uploaded (20)

PDF
financing insitute rbi nabard adb imf world bank insurance and credit gurantee
PPTX
The discussion on the Economic in transportation .pptx
PDF
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
PPTX
Session 11-13. Working Capital Management and Cash Budget.pptx
PDF
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
PPTX
Introduction to Managemeng Chapter 1..pptx
PDF
Copia de Minimal 3D Technology Consulting Presentation.pdf
PPTX
4.5.1 Financial Governance_Appropriation & Finance.pptx
PDF
Q2 2025 :Lundin Gold Conference Call Presentation_Final.pdf
PDF
ADVANCE TAX Reduction using traditional insurance
PDF
Predicting Customer Bankruptcy Using Machine Learning Algorithm research pape...
PPTX
Introduction to Essence of Indian traditional knowledge.pptx
PPTX
EABDM Slides for Indifference curve.pptx
PDF
final_dropping_the_baton_-_how_america_is_failing_to_use_russia_sanctions_and...
PDF
discourse-2025-02-building-a-trillion-dollar-dream.pdf
PDF
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
PPTX
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
PDF
way to join Real illuminati agent 0782561496,0756664682
PPTX
Basic Concepts of Economics.pvhjkl;vbjkl;ptx
PDF
caregiving tools.pdf...........................
financing insitute rbi nabard adb imf world bank insurance and credit gurantee
The discussion on the Economic in transportation .pptx
Spending, Allocation Choices, and Aging THROUGH Retirement. Are all of these ...
Session 11-13. Working Capital Management and Cash Budget.pptx
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
Introduction to Managemeng Chapter 1..pptx
Copia de Minimal 3D Technology Consulting Presentation.pdf
4.5.1 Financial Governance_Appropriation & Finance.pptx
Q2 2025 :Lundin Gold Conference Call Presentation_Final.pdf
ADVANCE TAX Reduction using traditional insurance
Predicting Customer Bankruptcy Using Machine Learning Algorithm research pape...
Introduction to Essence of Indian traditional knowledge.pptx
EABDM Slides for Indifference curve.pptx
final_dropping_the_baton_-_how_america_is_failing_to_use_russia_sanctions_and...
discourse-2025-02-building-a-trillion-dollar-dream.pdf
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
way to join Real illuminati agent 0782561496,0756664682
Basic Concepts of Economics.pvhjkl;vbjkl;ptx
caregiving tools.pdf...........................

Technology Controls in Business - End User Computing

  • 1. End User Computing Technology Controls in Business Renetta Ho-Antonio PMCP, ERM, CISM
  • 2. Introduction The Use of Spreadsheets: As it relates to Section 404 of the Sarbanes-Oxley Act. The use of spreadsheets in financial reporting and operational processes, is a key tool for some corporations, and is an integral part of the information and decision-making framework. Spreadsheet functionality is easy and flexible however, if companies heavily rely on the information contain in these spreadsheets, then they should ensure to increase their focus on controls related to the development and maintenance as related to Section 404 of the Sarbanes-Oxley Act. This presentation gives an idea as to the assessment of specific control activities that should be considered by management in evaluating the use of significant spreadsheets.
  • 3. Coverage EUC Definition EUC Application Controls EUC Audits EUC Challenges and Feedback
  • 4. End User Computing Definition: From an Audit perspective, End User Computing (i.e. spreadsheets) is defined as a tool designed for the purpose of extracting information and performing data manipulation prior to the transfer of and/or downstream of results to a book of record system, i.e financial reporting In addition, EUC as files in standalone software programs, such as Excel and MS Access, that are created and maintained locally by end users, and are not formally support by technology groups, are generally classified as EUCs since they may not be covered by General IT Controls.
  • 5. EUC Application Controls An End User Computing work program should cover 4 controls: Identification of all EUC as they relate to the Financial and Operational control. Security and Access of the network path where the EUC is located. Functional Integrity within a change management process to analyze how are changes completed, tested, reviewed and approved. Inventory and Testing. This is the Risk assessment and the impact to the organization.
  • 6. Impact Testing & Security SOC Gen impact testing, Security, End User Computing (EUC) Environment and Disaster Recovery. Security testing for applications (non-euc) : end to end data flow level testing to ensure access privileges and system settings are adequately designed to prevent fraudulent activities, such as:- Soc-Gen Impact : Test password controls at the operating system, application and database layers with appropriate segregation of duties, proper approval, “need-to-know” privileges, logging and monitoring reviews and active directory access controls. Identify and test if roaming profile has been initiated . Security and Integrity of data.
  • 7. EUC Controls An independent person reviews and confirms the functionality built into the EUC file on creation and in the event of a change. Functionality for review includes but is not limited to programming, formulae, sorting of the data, aggregation of data, report creation, links between spreadsheets and/or other applications. Functional Integrity:- Development LifeCycle; Ownership; Change control processes; Version control; Input control; Logical inspection; Overall analytics and Documentation. Is the licence for EUC application maintained through enterprise program acquisition? Are there third party agreements with technology vendors that host technology services for the entity in respect of EUC application? Is there a technology contract with an outside service provider to perform technology services such as development of code, integration testing and conversion of data?
  • 8. Risk Assessment Impact of an error on the organization: No or Minimal impact, does not compromise business decisions, regulatory requirements or corporate reputation. Use & sensitivity of the data: Either not sensitive or if some what sensitive, is only used inside the organization or Either used inside or outside the organization and contains sensitive data. Complexity of dependencies: Single or multiple EUC activity, no linkages or dependencies. There may be multiple EUC activities with linkages and interdependencies Functionality: Simple to some advanced functions (macros, embedded codes), complex codes. There may be advanced functions that will require a manual to support and have interactions across EUC activities. Number of users updating content or functions. Frequency of use: Monthly, weekly or more frequently. Anticipated length of Use: From a ‘One off’ up to a year or Greater than a year or in perpetuity Development Time: Minor or no time pressure to restricted or severe time pressures.
  • 9. Disaster Recovery Disaster recovery (non-BCP): business is engaged with technology to ensure continuous service. Application and Systems Recovery adequacy. Business requirements and processes provide adequate disaster recovery. Business owners conduct Business Impact Analysis (BIA) to define priority/criticality of application and identify maximum allowable time (RTO) and acceptable level of data loss (RPO) and provide Fail Over criteria for mission critical applications.
  • 10. Conclusion Every corporation would need to define their own process, tools and mechanisms to ensure that there are appropriate controls when there is an existence of end user computing, especially if this relates to SOX. Spreadsheets specifically is woven into the management fabric of every organization today. It is important from a CEO/CFO Certification standpoint that management understands how spreadsheets are used to ensure adequacy of related controls. This will play a critical part in management’s assessment of the effectiveness of their internal control over financial reporting. Good article to read is France's SocGen hit by $7.1 billion alleged fraud http://www.marketwatch.com/news/story/rogue-traders-fraud-led-71/story.aspx?guid=%7B1C980919-2F3E-4A28-AAC4-A2FB129BE6E8%7D