Computing Policy
Computing Policy
A memberof
,
..IIIIIf I LAUREATE
INTtRNATONAl
u;IV(RSITI(S"
f LAUREAT
A member of
,
~I I'"'UNMRSI!ltS'
TtRW.T.o-"l
Purpose
The purpose of this policy is to establish control guidelines for key end-user computing (EUC)
tools at Stamford International University ("STIU" or "Stamford"). The intent is to define a series
of guidelines and procedures to deal with the security and use of EUC tools such as
spreadsheets, databases, report writers, etc. This policy is to be used in conjunction with other
applicable policies and practices.
Scope
This policy applies to all employees of STIU in all locations including the temporary employees,
part-time and contractors, who use Electronic Tools that are:
Developed and managed by users and process owners, typically within office automation
software like spreadsheets, databases, and report tools (e.g. Crystal Reports);
Not subject to IT general controls; and
Either:
- Used to assist with the calculation of an amount that is recorded in the general ledger
or as the basis for disclosure in the financial statements (which has a significant
financial impact), or
- Used in the execution of a control that is relied upon by management to support their
assessment of the effectiveness of internal controls over financial reporting (e.g., a
spreadsheet used to prepare and review reconciliation).
Policy Information
Responsible Office: Department of Information Technology, Stamford International University
Issued Date: july, 2014
2
IT-P-009
END-USER COMPUTING POLICY
Revision History
Revision
Document Number Description Effective Date
Number
00 IT-P-009 New Release 101h july, 20 14
3
IT-P-009
EN D-USER COMPUTING POLICY
Contents
Stamford International University ................................................................................................. 2
End-User Computing Policy ............................................................................................................ 2
Purpose ....................................................................................................................................... 2
Scope: 2
Policy Information ...................................................................................................................... 2
Revision History .......................................................................................................................... 3
Recommendation and Approvals ............................................................................................... 5
Policy ........................................................................................................................................... 6
Procedures .................................................................................................................................. 7
Inventory EUC Tools .................................................................................................................... 7
Evaluate Risk related to each EUC Tool ...................................................................................... 7
Determine the Necessary Level of Control ................................................................................ 8
High-Risk End-User Computing Tool Controls ........................................................................ 8
Medium-Risk End-User Computing Tool Controls .................................................................. 9
Low-Risk End-User Computing Tool Controls ....................................................................... 10
Responsibilities .................................................................................................................. ....... 10
APPENDIX A - RISK-RANKING EVALUATION MATRIX ............................................................... 11
APPENDIX B- OWNER CONTROL CHECKLIST .......................................................................... 12
4
IT-P-009
END-USER COMPUTING POLICY
Prepared by:
Approved by:
___________________C:_~ ------
Name: Gilles Mahe
Position: CEO, Stamford International University
Date: 1Oth July, 2014
- -------------~:d:_ _ _ _ _ _ _ _ _
Name: Dr. Boon mark Sirinaovakul
Position: President, Stamford International University
Date: 10th July, 2014
5
IT-P-009
END-USER COMPUTING POLICY
Policy
Stamford International University relies on key EUC tools in the financial reporting process.
Given the importance related to the integrity and reliability of the information generated by EUC
tools, appropriate measures for ensuring that appropriate controls exist for EUC tools must be
adopted.
DEFINITIONS:
Access Control - Limiting access at the file level to EUC tools on a central server and
assigning appropriate rights.
Archiving- Maintaining historical files no longer available for update in a segregated drive
and locking them as read only.
Backups- Implementing a process to backup EUC tools on a regular basis so that
complete and accurate information is available for financial reporting and can be restored
if the original file is compromised.
Input Control- Ensuring that reconciliations occur to make sure that the data is inputted
completely and accurately. Data may be inputted into EUC tools manually or
systematically through downloads.
Logic Inspection -Inspecting the logic in critical EUC tools by the Owner each time the
EUC tool is used or completed for financial purposes.
Overall Analytics- Implement analytics as a detective control to find errors in EUC tools
used for calculations. However, analytics alone are not a sufficient control to completely
address risk of financial amounts generated in EUC tools.
Version Control- Ensuring only current and approved version of EUC tools are being used
by creating naming conventions and directory structures.
6
IT-P-009
END-U SER COMPUTING POLICY
Procedures
Stamford has implemented three high-level steps for ensuring that successful EUC tool
controls exist for compliance purposes:
A risk-rating evaluation matrix can be found in Appendix A of this policy. Based on the results
of the eva luation exercise, each EUC tool is assigned a risk score and a risk rating. The risk score
of each EUC Tool will be based on the complexity evaluation.
7
IT-P-009
END-USER COMPUTING POLICY
Analytics
" None None
The following types of controls will be required for all HIGH-risk EUC tools in order to confirm
the reliability of the information contained within the EUC tool:
Security & Access Control -Access to a HIGH-risk EUC tool will be limited to only those
employees identified as someone who can create and I or modify a HIGH -ris k EUC tool.
)> EUC tool owners (OWNER) and authorized users (USER) are approved by the
Controller or designee. Approval must be obtained in the first month that the EUC
tool meets the definition of an EUC tool, which is included in the Purpose section of
this policy. This approval should be documented and maintained.
)> Both OWNER and USER will have access to the secure network location where the
file will reside for modification. Access to this location is limited to appropriate
personnel in each area.
)> Access rights for each key network location noted above are reviewed quarterly by
the Controller, or designee, to verify that all active accounts belong to active
employees and that the access is accurately assigned.
)> HIGH-risk EUC tools must utilize software features, such as cell-locking and
password protecting in Excel and locking tables to create read-only access in
Access, to protect EUC tool logic.
8
IT-P-009
END-USER COMPUTING POLICY
Input Control- Inspection of inputs MUST be performed each time the HIGH-risk EUC
tool is used I completed for financial purposes. A checklist has been developed that
contains an item for the OWNER to review all inputs (please see Appendix B).
Backups I Archiving- All HIGH-risk EUC tools MUST be located in a secure network
location that is backed up on a daily basis by the Information Technology organization.
EUC tools to be retained for historical support will be retained in a folder which will have
read only access.
Logic Inspection- Inspection of logic MUST be performed when reviewing HIGH-risk EUC
tool modifications.
);> OWNER is responsible for ensuring logic is free of errors that may invalidate the
figures within an EUC tool. This is included in the Owner Control Checklist
displayed in Appendix B.
);> A change control document is requi red for all HIGH-risk EUC tools to log changes in
formulas and logic (e.g., formulas in Excel, structure in Access, or formatting in
Crystal Reports). This would not include data entry changes. For an Excel
spreadsheet, this can be accomplished by logging the changes in a separate tab
within the workbook. For other EUC tools, a Word document will be sufficient.
);> Formula and logic changes will be independently inspected and approved prior to
using the EUC tool for its intended purpose. This is included in the Owner Control
Checklist displayed in Appendix B.
Overall Analytics- A reasonableness test must be performed on the EUC tool results and
documented. This may include comparison of results to historical amounts or some other
external comparative amounts or ratios. This is also included on the Owner Control
Checklist displayed in Appendix B.
The following types of EUC tool controls will be utilized for all MEDIUM-risk EUC tools in order
to confirm the reliability of the information contained within the EUC tools:
Security & Access Control- Access to a MEDIUM-risk EUC tool will be limited to the EUC
tool owner and any personnel who directly report to the EUC tool owner unless specifically
authorized by the owner.
);> Both OWNER and USER will have access to the secure network location where the
file will reside for modification. Access to this location is limited to appropriate
personnel in each area.
);> Access rights for each key network location noted above are reviewed quarterly by
the Controller, or designee, to verify that all active accounts belong to active
employees and that the access is accu rately assigned.
);> MEDIUM-risk EUC tools must utilize software features, such as cell-locking and
password protecting in Excel and locking tables to create read-only access in
Access, to protect EUC tool logic.
9
IT-P-009
END-USER COMPUTING POLICY
Backups- All MEDIUM-risk EUC tools MUST be stored in a secure network location. Files
stored in a secure network location are backed-up on a daily basis by the Information
Technology organization.
The following types of EUC tool controls will be utilized for all LOW-risk EUC tools in order to
confirm the reliability of the information contained within the EUC tools:
Security & Access Control- Access to a LOW-risk EUC tool will be limited to the EUC tool
owne r and any personnel who directly report to the EUC tool owner unless specifically
authorized by the owner.
> Both OWNER and USER will have access to the secure network location where the
file will reside for modification. Access to this location is li mited to appropriate
personnel in each area.
)> Access rights for each key network location noted above are reviewed quarterly by
the Controller, or designee, to verify that all active accounts belong to active
employees and that the access is accurately assigned.
Responsibilities
The maintenance of this policy document is the responsibility of the IT Department along with
procurement & maintenance of the infrastructure required to mitigate the risks of an EUC
environment.
Execution & governance of the procedures documented here are the responsibility of all
departments that have an impact on financial reporting.
10
IT-P-009
END-USER COMPUTING POLICY
Complex
Simpl e calcu lati o ns:
Complexity Logging and Tracking calculat ions:
Tota ling
Macros
11
IT-P-009
END-USER COMPUTING POLICY
Owner: - -- - -- -- -- -- - -
Spreadsheet File Name: _ __ __ __ _
Purpose: - - -- -- - -- -- --
For formula and logic changes, has the EUC tool been rndependently inspected
and approved?
12