68
results found in
9 ms
Page 1
of 7
Finally updating the central information system for VAT control
IT system to support combating VAT frauds German Bundesrechnungshof demanded to update the IT system, which plays crucial role in the European system of fighting fraud related to the Value Added Tax (VAT). This BRH's case shows that reminding about appropriate follow-up can be as important as the very recommendation.
Full description
IT system to support combating VAT frauds German Bundesrechnungshof demanded to update the IT system, which plays crucial role in the European system of fighting fraud related to the Value Added Tax (VAT). This BRH's case shows that reminding about appropriate follow-up can be as important as the very recommendation.
Full description
Bundesrechnungshof
, issued in 2014
Risk cases: 1
General and Creation Control of the Information Systems of the Ministry of Foreign Affairs
The objective of the audit was to assess general and creation control of the information systems of the Ministry of Foreign Affairs. Since the beginning of 2009, the Ministry of Foreign Affairs has ... achieved considerable progress in the management of the information systems. The auditors reviewed and assessed all key elements of the process. ... Overview of problems - area by area ... SAI Lithuania looked into all critical elements of a Ministry's information system, starting from IT architecture, through information security to automation of data processing.
Full description
The objective of the audit was to assess general and creation control of the information systems of the Ministry of Foreign Affairs. Since the beginning of 2009, the Ministry of Foreign Affairs has ... achieved considerable progress in the management of the information systems. The auditors reviewed and assessed all key elements of the process. ... Overview of problems - area by area ... SAI Lithuania looked into all critical elements of a Ministry's information system, starting from IT architecture, through information security to automation of data processing.
Full description
National Audit Office of the Republic of Lithuania
, issued in 2013
Risk cases: 4
Opportunities Exist for SEC to Improve Its Controls over Financial Systems and Data
. In carrying out its mission, the SEC relies on computerized information systems to collect, process, and store sensitive information, including financial data. Having effective information security controls ... of the commission’s fiscal years 2015 and 2014 financial statements. GAO’s objective was to determine the effectiveness of information security controls for protecting the confidentiality, integrity, and availability ... of SEC’s key financial systems and information. To do this, GAO examined information security policies, plans, and procedures; tested controls over key financial applications; interviewed agency officials ... IT security basics under scrutiny ... Financial audit by US GAO was accompanied by an IT examination focused on information security measures in the Securities and Exchange Commission (SEC). GAO found that SEC’s systems could ... be compromised, because of risks jeopardizing the confidentiality, integrity, and availability of sensitive financial information.
Full description
. In carrying out its mission, the SEC relies on computerized information systems to collect, process, and store sensitive information, including financial data. Having effective information security controls ... of the commission’s fiscal years 2015 and 2014 financial statements. GAO’s objective was to determine the effectiveness of information security controls for protecting the confidentiality, integrity, and availability ... of SEC’s key financial systems and information. To do this, GAO examined information security policies, plans, and procedures; tested controls over key financial applications; interviewed agency officials ... IT security basics under scrutiny ... Financial audit by US GAO was accompanied by an IT examination focused on information security measures in the Securities and Exchange Commission (SEC). GAO found that SEC’s systems could ... be compromised, because of risks jeopardizing the confidentiality, integrity, and availability of sensitive financial information.
Full description
General Accountability Office
, issued in 2016
Risk cases: 5
Effectiveness of internal controls in the protection of personal data in national databases
of internal controls which must ensure the accuracy and preservation of data and avoid information leaks. ... The NAO analysed seven national databases in order to find out how the legitimate use of personal data is ensured. In accordance with the Personal Data Protection Act, the agencies who run databases ... must ensure that personal data is protected from abuse. The information system of the database must function appropriately, incl. be reliable and safe. Log files must be retained of all instances ... ... Basic controls analysis can fail in data protection ... Estonian SAI analyzed personal data safety. Main finding were: poor log analysis and unprotected data.
Full description
of internal controls which must ensure the accuracy and preservation of data and avoid information leaks. ... The NAO analysed seven national databases in order to find out how the legitimate use of personal data is ensured. In accordance with the Personal Data Protection Act, the agencies who run databases ... must ensure that personal data is protected from abuse. The information system of the database must function appropriately, incl. be reliable and safe. Log files must be retained of all instances ... ... Basic controls analysis can fail in data protection ... Estonian SAI analyzed personal data safety. Main finding were: poor log analysis and unprotected data.
Full description
National Audit Office of Estonia
, issued in 2008
Risk cases: 2
Management and protection of assets in the field of the information-communication technologies at the ME SR
and lawbreaking, violation of the conditions determined in the particular contracts, documents and agreements (if they were ever found or valid), obsolete conception of the ISPA development, not established ... control of backup's functionality), restoring and security, possibility of unauthorised persons to access the IS and data, which increases the risk of information leakage and security risk, and inadequate ... The Supreme Audit office of the Slovak Republic (SAO SR) has conducted the audit at the Ministry of Environment of the Slovak Republic (ME SR) for the audit period 2011 and 2012 to examine ... ... Started from contracting, ended in security ... The perceptive and filled with findings audit - conducted by the Slovak SAI - discovered the list of issues which started in careless contracting procedures, failure to update the development concept ... and ended in exposing the organization to high security risks.
Full description
and lawbreaking, violation of the conditions determined in the particular contracts, documents and agreements (if they were ever found or valid), obsolete conception of the ISPA development, not established ... control of backup's functionality), restoring and security, possibility of unauthorised persons to access the IS and data, which increases the risk of information leakage and security risk, and inadequate ... The Supreme Audit office of the Slovak Republic (SAO SR) has conducted the audit at the Ministry of Environment of the Slovak Republic (ME SR) for the audit period 2011 and 2012 to examine ... ... Started from contracting, ended in security ... The perceptive and filled with findings audit - conducted by the Slovak SAI - discovered the list of issues which started in careless contracting procedures, failure to update the development concept ... and ended in exposing the organization to high security risks.
Full description
Supreme Audit Office of the Slovak Republic
, issued in 2012
Risk cases: 4
Audit to the Social Security Systems of Collection of Contributions and Quotes and Relationship with Banking and other Entities Engaged in Collection Initiatives
and respective accounting, and also check compliance with the contracts celebrated with banking entities. ... The audit aims to evaluate the effectiveness and efficiency of the processes implemented in respect of the processing schemes of contributions/quotas, whose Wages Statements (WS) entered ... into the system in the first quarter of 2007, test the reliability, stability and confidence level of the application systems developed and the respective values processed in the entire collection circuit ... ... Application level of Social Security IS analyzed ... Processes maturity and automation of controls appeared to be main problems in the system which reliability, stability and confidence level were tested.
Full description
and respective accounting, and also check compliance with the contracts celebrated with banking entities. ... The audit aims to evaluate the effectiveness and efficiency of the processes implemented in respect of the processing schemes of contributions/quotas, whose Wages Statements (WS) entered ... into the system in the first quarter of 2007, test the reliability, stability and confidence level of the application systems developed and the respective values processed in the entire collection circuit ... ... Application level of Social Security IS analyzed ... Processes maturity and automation of controls appeared to be main problems in the system which reliability, stability and confidence level were tested.
Full description
TRIBUNAL DE CONTAS DE PORTUGAL
, issued in 2008
Risk cases: 2
Coordinated Audit on Information Technology Governance
IT governance needs awareness and SAIs' support The OLACEFS auditors found that the greatest challenge for the SAIs is to raise the awareness of the audit institutions about the importance of IT governance and the benefits that could be obtained by improving its degree of maturity. The audit was conducted by 11 SAIs and coordinated by TCU of Brasil. They concluded: 'It is important, even urgent, to invest resources to implement or enhance: the IT committees; the IT planning process; strategic IT planning; monitoring the IT contracting process; the business continuity plan; the designation of a responsible person or unit to manage security information; a risk management process; an asset inventory process; an information security committee; and a policy for access control.'
Full description
IT governance needs awareness and SAIs' support The OLACEFS auditors found that the greatest challenge for the SAIs is to raise the awareness of the audit institutions about the importance of IT governance and the benefits that could be obtained by improving its degree of maturity. The audit was conducted by 11 SAIs and coordinated by TCU of Brasil. They concluded: 'It is important, even urgent, to invest resources to implement or enhance: the IT committees; the IT planning process; strategic IT planning; monitoring the IT contracting process; the business continuity plan; the designation of a responsible person or unit to manage security information; a risk management process; an asset inventory process; an information security committee; and a policy for access control.'
Full description
Risk cases: 5
Audit of the key ICT project federal GEVER programme Federal Chancellery
procurement project). CHF 1.6 million was spent on these. The departments and Federal Chancellery (departments/FCh) had to choose one of the two products within three months of the contract being awarded. ... During the first stage, two new GEVER (electronic records and process management) products were procured in an open WTO tender within the framework of the two-product strategy (federal GEVER WTO ... ... Advanced process management system's cost-effectiveness and deadlines at risk ... Ever since 1990, sequential controls and file management have been part of the Federal Administration's IT landscape (GEVER business administration). Significant obstacles have to be overcome ... in order to ensure the successful creation and introduction of GEVER. Previous efforts did not have any widespread success and led to a diverse GEVER landscape. The federal GEVER project has now laid ... the foundations for simplification and centralisation.
Full description
procurement project). CHF 1.6 million was spent on these. The departments and Federal Chancellery (departments/FCh) had to choose one of the two products within three months of the contract being awarded. ... During the first stage, two new GEVER (electronic records and process management) products were procured in an open WTO tender within the framework of the two-product strategy (federal GEVER WTO ... ... Advanced process management system's cost-effectiveness and deadlines at risk ... Ever since 1990, sequential controls and file management have been part of the Federal Administration's IT landscape (GEVER business administration). Significant obstacles have to be overcome ... in order to ensure the successful creation and introduction of GEVER. Previous efforts did not have any widespread success and led to a diverse GEVER landscape. The federal GEVER project has now laid ... the foundations for simplification and centralisation.
Full description
Swiss Federal Audit Office
, issued in 2015
Risk cases: 2
Audit on the broadband internet infrastructure access
of assumed financing was contracted, namely PLN 3.9 billion. By the end of 2015, Poland should complete the investment and account for the expenses. According to NIK there is a risk that the infrastructure ... Poland has been granted over PLN 4 billion from the European Regional Development Fund to build the broadband internet access infrastructure. As part of three operational programmes 90 percent ... construction will not be completed by the deadline and the EU funds may not be used to the full. ... ... Simpler regulations and better supervision needed ... Polish SAI audited a project, which aim had been to develop broadband internet network across the country. They revealed that legal obstacles, idleness and lack of supervision were the main causes ... of delays. Some of the projects are in danger of not being completed on time and some of the EU funds may not be fully used.
Full description
of assumed financing was contracted, namely PLN 3.9 billion. By the end of 2015, Poland should complete the investment and account for the expenses. According to NIK there is a risk that the infrastructure ... Poland has been granted over PLN 4 billion from the European Regional Development Fund to build the broadband internet access infrastructure. As part of three operational programmes 90 percent ... construction will not be completed by the deadline and the EU funds may not be used to the full. ... ... Simpler regulations and better supervision needed ... Polish SAI audited a project, which aim had been to develop broadband internet network across the country. They revealed that legal obstacles, idleness and lack of supervision were the main causes ... of delays. Some of the projects are in danger of not being completed on time and some of the EU funds may not be fully used.
Full description
Supreme Audit Office of Poland
, issued in 2015
Risk cases: 2
Preparations and realization of the State A-levels
The aim of the audit was to scrutinise the utilisation of the state budget and EU budget funds that had been spent on preparing and implementing the State A-levels examinations. The auditing ... operation was performed from May to November 2011. The audited period extended from January 1, 2005, to June 30, 2011; where relevant, the data from the previous period and the period until the end ... of the auditing operation were also scrutinized. Among the audited bodies were the Ministry of Education, the Education Result Survey Centre, and the National Institute for Further Education. The auditing operation ... ... Begin with good strategy ... Analyzing problems of state examinations system, Czech Republic SAI found that commonplace strategy effected in shortsighted planning, poor procurement and disadvantageous contracting.
Full description
The aim of the audit was to scrutinise the utilisation of the state budget and EU budget funds that had been spent on preparing and implementing the State A-levels examinations. The auditing ... operation was performed from May to November 2011. The audited period extended from January 1, 2005, to June 30, 2011; where relevant, the data from the previous period and the period until the end ... of the auditing operation were also scrutinized. Among the audited bodies were the Ministry of Education, the Education Result Survey Centre, and the National Institute for Further Education. The auditing operation ... ... Begin with good strategy ... Analyzing problems of state examinations system, Czech Republic SAI found that commonplace strategy effected in shortsighted planning, poor procurement and disadvantageous contracting.
Full description
Supreme Audit Office of Czech Republic
, issued in 2011
Risk cases: 4