ITGI SOX404 ITControls - Final
ITGI SOX404 ITControls - Final
FOR SARBANES-OXLEY
THE IMPORTANCE OF IT
IN THE DESIGN, IMPLEMENTATION
AND SUSTAINABILITY OF INTERNAL
CONTROL OVER DISCLOSURE AND
FINANCIAL REPORTING
2 IT Control Objectives for Sarbanes-Oxley
IT Governance Institute®
The IT Governance Institute (www.itgi.org) was established in 1998 to
advance international thinking and standards in directing and controlling an
enterprise’s information technology. Effective IT governance helps ensure
that IT supports business goals, optimizes business investment in IT, and
appropriately manages IT-related risks and opportunities. The IT Governance
Institute offers symposia, original research and case studies to assist
enterprise leaders and boards of directors in their IT governance
responsibilities.
Disclosure
Copyright © 2004 by the IT Governance Institute. Reproduction of
selections of this publication for academic use is permitted and must include
full attribution of the material’s source. Reproduction or storage in any form
for commercial purpose is not permitted without ITGI’s prior written
permission. No other right or permission is granted with respect to this work.
IT Governance Institute
3701 Algonquin Road, Suite 1010
Rolling Meadows, IL 60008 USA
Phone: +1.847.590.7491
Fax: +1.847.253.1443
E-mail: [email protected]
Web site: www.itgi.org and www.isaca.org
ISBN: 1-893209-67-9
Printed in the United States of America
IT Governance Institute 3
Table of Contents
PREFACE........................................................................................................5
AUDIENCE ...............................................................................................5
BACKGROUND..........................................................................................5
ATTESTATION RULES................................................................................6
DEVELOPMENT METHOD .........................................................................7
ALIGNMENT WITH THE PCAOB..............................................................7
WHAT HAS CHANGED FROM OCTOBER 2003? ........................................8
DISCLAIMER ............................................................................................9
ACKNOWLEDGEMENTS ...........................................................................10
SARBANES-OXLEY—A FOCUS ON INTERNAL CONTROL ............................12
SARBANES-OXLEY—ENHANCING CORPORATE ACCOUNTABILITY ...........12
SPECIFIC MANAGEMENT REQUIREMENTS OF
THE SARBANES-OXLEY ACT ..................................................................13
Preface
Audience
This research is intended as a reference for executive management and IT
control professionals, including IT management and assurance professionals,
when evaluating an organization’s IT controls as required by the US
Sarbanes-Oxley Act of 2002 (the “Act”).
Background
The Act provides for new corporate governance rules, regulations and
standards for specified public companies including SEC registrants. The US
Securities and Exchange Commission (SEC) has mandated the use of a
recognized internal control framework. The SEC in its final rules regarding
the Sarbanes-Oxley Act made specific reference to the recommendations of
the Committee of the Sponsoring Organizations of the Treadway
Commission (COSO). While there are many sections within the Sarbanes-
Oxley Act, this document focuses on section 404, which addresses internal
control over financial reporting. Section 404 requires the management of
public companies specified by the Act to assess the effectiveness of the
organization’s internal control over financial reporting and annually report
the result of that assessment.
Much has been written on the importance of the Act and internal controls in
general; however, little exists on the significant role that information
technology plays in this area. Most would agree that the reliability of
financial reporting is heavily dependent on a well-controlled IT environment.
Accordingly, there is a need for information for organizations to consider in
addressing IT controls in a financial reporting context. This document is
intended to assist SEC registrants in considering IT controls as part of their
assessment activities.
Attestation Rules
On 9 March 2004, the US Public Company Accounting Oversight Board
(PCAOB) approved PCAOB Auditing Standard No. 2, titled “An Audit of
Internal Control Over Financial Reporting Performed in Conjunction with an
Audit of Financial Statements.” This audit standard establishes the
requirements for performing an audit of internal control over financial
reporting and provides some important directions on the scope and approach
required of auditors.
The PCAOB suggests that these IT controls have a pervasive effect on the
achievement of many control objectives. They also provide guidance on the
controls that should be considered in evaluating an organization’s internal
control, including program development, program changes, computer
operations, and access to programs and data. While general in nature, these
PCAOB principles provide direction on where SEC registrants likely should
focus their efforts to determine whether specific IT controls over transactions
are properly designed and operating effectively.
Development Method
In developing this document, the contributors engaged in two activities.
IT controls from Control Objectives for Information and related Technology
(COBIT®) (see next paragraph) were linked to the IT general control
categories identified in the PCAOB standard, and these identified control
objectives were linked to the COSO internal control framework.
Development
Operations
Computer
Programs
Access to
and Data
Program
Program
Changes
COBIT Control Objective Heading
1. Acquire or develop application software. ● ● ● ●
2. Acquire technology infrastructure. ● ● ●
3. Develop and maintain policies and procedures. ● ● ● ●
4. Install and test application software and
technology infrastructure. ● ● ● ●
5. Manage changes. ● ●
6. Define and manage service levels. ● ● ● ●
7. Manage third-party services. ● ● ● ●
8. Ensure systems security. ● ●
9. Manage the configuration. ● ●
10. Manage problems and incidents. ●
11. Manage data. ● ●
12. Manage operations. ● ●
varied, ranging from concerns that more controls were needed to concerns
that there were too many controls. By far, the most common comment was
that guidance on IT controls was needed to provide direction on the nature of
IT controls over financial reporting and the extent of testing that should be
performed. In response, the contributors weighed the comments from all
parties and revised this document to reflect suggested changes and
improvements.
The most significant change was made to the appendices. Many of the
comments suggested that the control objectives included in the October 2003
document were too numerous. As a result, control objectives that formed part
of the Plan and Organize and Monitor and Evaluate components of COBIT
were removed and replaced with a company-level IT control environment
questionnaire. It was felt that this would provide a more efficient and
representative means to understand the IT control environment and its
impact on the activities of the IT organization. The control objectives that
formed the Acquire and Implement and Deliver and Support areas of COBIT
were redrafted, and illustrative control activities and a summary control
objective was created for each.
Another change reflected the desire for testing suggestions. To support the
illustrative control activities, tests of controls were prepared as examples for
senior management and business process owners looking for ways to
evaluate the effectiveness of these controls. A further change was made to
more closely model the order and categorization of controls after the IT
general control concepts discussed in the PCAOB rules, namely program
development, program change, computer operations, and access to programs
and data.
Disclaimer
The IT Governance Institute, Information Systems Audit and Control
Association® and other contributors make no claim that use of this document
will assure a successful outcome. This publication should not be considered
inclusive of IT controls, procedures and tests, or exclusive of other IT
controls, procedures and tests that may be reasonably present in an effective
internal control system over financial reporting. In determining the propriety
of any specific control, procedure or test, SEC registrants should apply
appropriate judgment to the specific control circumstances presented by the
particular systems or information technology environment.
Readers should note that this document has not received endorsement from
the SEC, the PCAOB or any other standard-setting body. The issues that are
dealt with in this publication will evolve over time. Accordingly, companies
should seek counsel and appropriate advice from their risk advisors and/or
auditors. The contributors make no representation or warranties and provide
10 IT Control Objectives for Sarbanes-Oxley
Internal controls, no matter how well designed and operated, can provide
only reasonable assurance of achieving an entity’s control objectives. The
likelihood of achievement is affected by limitations inherent to internal
control. These include the realities that human judgment in decision-making
can be faulty and that breakdowns in internal control can occur because of
human failures such as simple errors or mistakes. Additionally, controls,
whether manual or automated, can be circumvented by the collusion of two
or more people or inappropriate management override of internal controls.
Acknowledgements
The contributors to this document include many representatives from
industry and the public accounting profession. As such, this document is a
combination of the input obtained from all contributors and does not
expressly represent the viewpoint of any specific contributor, nor the
companies or firms at which they are employed.
The ITGI Research Board, for overseeing and guiding the project
Chairperson, Lily M. Shue, CISA, CISM, CCP, CITC, LMS Associates, USA
Jayant Ahuja, CISA, CPA, CMA, PricewaterhouseCoopers LLP, USA
Candi Carrera, CF 6 Luxembourg, Luxembourg
John Ho Chi, CFE, Ernst & Young LLP, Singapore
Avinash W. Kadam, CISA, CISSP, CBCP, GSEC, CQA, MIEL E-Security Pvt.
Ltd., India
Elsa K. Lee, CISA, CSQA, Crowe Chizek LLP, USA
Robert G. Parker, CISA, CA, FCA, CMC, Deloitte & Touche LLP, Canada
Michael Schirmbrand, Ph.D., CISA, CISM, CPA, KPMG LLP, Austria
Johann Tello Meryk, CISA, CISM, Banco del Istmo, Panama
Frank van der Zwaag, CISA, CISSP, Air New Zealand, New Zealand
Paul A. Zonneveld, CISA, CISSP, CA, Deloitte & Touche LLP, Canada
12 IT Control Objectives for Sarbanes-Oxley
For those organizations that have begun the compliance process, it has
quickly become apparent that IT plays a vital role in internal control.
Systems, data and infrastructure components are critical to the financial
reporting process. PCAOB Auditing Standard No. 2 discusses the
importance of IT in the context of internal control. In particular, it states:
The nature and characteristics of a company’s use of
information technology in its information system affect the
company’s internal control over financial reporting.
Under the Sarbanes-Oxley Act, standards for the auditor’s attestation are now
the responsibility of the PCAOB. While the 404 attestation is “as of ” a
specific date, PCAOB Auditing Standard No. 2 specifically addresses financial
reporting controls that should be in place for a period before the attestation
date and controls that may operate after the attestation date. It states:
The auditor’s testing of the operating effectiveness of such
controls should occur at the time the controls are operating.
Controls “as of” a specific date encompass controls that are
relevant to the company’s internal control over financial
reporting “as of” that specific date, even though such controls
might not operate until after that specific date.
Business Process
Business Process
Business Process
Business Process
Examples include: best-of-breed systems, are
Manufacturing
• Operating style
Logistics
commonly referred to as
Finance
Etc.
• Enterprise application controls.
policies Examples include:
• Governance • Completeness
• Collaboration • Accuracy
• Information • Validity
sharing IT Services • Authorization
OS/Data/Telecom/Continuity/Networks
• Segregation of duties
General Controls
Controls embedded in IT services
form general controls.
Examples include:
• Program development
• Program changes
• Computer operations
• Access to programs and data
More and more, IT systems are automating business process activities and
providing functionality that enables as much or as little control as necessary.
As such, compliance programs need to include system-based controls to
keep up-to-date with contemporary financial systems.
The SEC regulations that affect the Sarbanes-Oxley Act are undeniably
intricate, and implementation will be both time-consuming and costly. In
proceeding with an IT control program, there are two important
considerations that should be taken into account:
1. There is no need to reinvent the wheel; virtually all public companies have
some semblance of IT control. While they may be informal and lacking
sufficient documentation of the control and evidence of the control
functioning, IT controls generally exist in areas such as security and
change management.
22 IT Control Objectives for Sarbanes-Oxley
While some industries, such as financial services, are familiar with stringent
regulatory and compliance requirements of public market environments,
most are not. To meet the demands of the Sarbanes-Oxley Act, most
organizations will require a change in culture. More likely than not,
enhancements to IT systems and processes will be required, most notably in
the design, documentation, retention of control evidence and evaluation of IT
controls. Because the cost of noncompliance can be devastating to an
organization, it is crucial to adopt a proactive approach and take on the
challenge early.
IT Control Environment
The control environment has become more important in PCAOB Auditing
Standard No. 2. The standard states that:
…Because of the pervasive effect of the control environment on
the reliability of financial reporting, the auditor’s preliminary
judgment about its effectiveness often influences the nature,
timing, and extent of the tests of operating effectiveness
considered necessary. Weaknesses in the control environment
should cause the auditor to alter the nature, timing, or extent of
tests of operating effectiveness that otherwise should have been
performed in the absence of the weaknesses.
Computer Operations
These include controls over the definition, acquisition, installation,
configuration, integration and maintenance of the IT infrastructure. Ongoing
controls over operation address the day-to-day delivery of information
services, including service level management, management of third-party
services, system availability, customer relationship management,
configuration and systems management, problem and incident management,
operations management scheduling and facilities management.
Multilocation Considerations
Among the many factors that must be considered in complying with the
Sarbanes-Oxley Act, some will uniquely impact multilocation organizations.
For example, global organizations or non-US-based companies that are
required to comply with the Sarbanes-Oxley Act need to examine their IT
operations and determine if they are significant to the organization as a
whole.
COSO Defined
COSO is a voluntary private sector organization dedicated to improving the
quality of financial reporting through business ethics, effective internal
control and corporate governance. It was originally formed in 1985 to
sponsor the National Commission on Fraudulent Financial Reporting, an
independent private sector organization often referred to as the Treadway
Commission. The sponsoring organizations include the American Institute of
Certified Public Accountants (AICPA), American Accounting Association
(AAA), Financial Executives International (FEI), Institute of Internal
Auditors (IIA) and Institute of Management Accountants (IMA). The
sections that follow provide further insight into COSO as well as its
implications for IT.
• Control activities
• Information and communication
• Monitoring
Each of the five is described briefly in the following sections. Following that
description are high-level IT considerations as they relate to each specific
component. More detailed IT control objectives are included at the end of
this document to provide considerations for compliance with the Sarbanes-
Oxley Act.
Control Environment
Control environment creates the foundation for effective internal control,
establishes the “tone at the top” and represents the apex of the corporate
governance structure. The issues raised in the control environment
component apply throughout an organization. The control environment
primarily addresses the company level.
Risk Assessment
Risk assessment involves the identification and analysis by management of
relevant risks to achieve predetermined objectives, which form the basis for
determining control activities. It is likely that internal control risks could be
more pervasive in the IT organization than in other areas of the organization.
Risk assessment may occur at the company level (for the overall
organization) or at the activity level (for a specific process or business unit).
Control Activities
Control activities are the policies, procedures and practices that are put into
place to ensure that business objectives are achieved and risk mitigation
strategies are carried out. Control activities are developed to specifically
address each control objective to mitigate the risks identified.
General controls, which are designed to ensure that the financial information
generated from an organization’s application systems can be relied upon,
include the following types:
• Data center operation controls—Controls such as job setup and scheduling,
operator actions, and data backup and recovery procedures
• System software controls—Controls over the effective acquisition,
implementation and maintenance of system software, database
management, telecommunications software, security software and utilities
• Access security controls—Controls that prevent inappropriate and
unauthorized use of the system
• Application system development and maintenance controls—Controls over
development methodology, including system design and implementation,
that outline specific phases, documentation requirements, change
management, approvals and checkpoints to control the development or
maintenance of the project
Monitoring
Monitoring, which covers the oversight of internal control by management
through continuous and point-in-time assessment processes, is becoming
increasingly important to IT management. There are two types of monitoring
activities: continuous monitoring and separate evaluations.
• Control self-assessments
• Independent security reviews
• Project implementation reviews
COBIT Objectives
d nd nd
d
an ze an t ra t ra
i re en e o
it te
al n ani qu em liv or on a
P rg
O Ac pl De upp M valu
Im S E
Control Environment
COSO Components
Section 404
Section 302
Risk Assessment
Control Activities
Monitoring
8. Document 9. Build
Process and Sustainability
• Internal evaluation
Results • External evaluation
• Coordination with auditors
• Internal sign-off (302, 404)
• Independent
sign-off (404)
5. Evaluate
3. Identify Control
Significant Design
Accounts/Controls • Mitigate control
2. Perform • Application controls risk to an
Risk over initiating, acceptable level
Assessment recording, processing • Understood by
• Probability and and reporting users
Business Value
Sarbanes-Oxley Compliance
36 IT Control Objectives for Sarbanes-Oxley
Financial Applications
Application
Application A Application B Application C Controls
• Completeness
General Controls • Accuracy
• Program • Validity
development IT Infrastructure Services • Authorization
• Program changes • Segregation of
• Computer Database duties
operations
• Access to programs Operating System
and data
• Control
environment Network
The next step in the road map is to perform risk assessments on the selected
components. Risk assessment enables organizations to understand how
events can inhibit the achievement of business objectives. The purpose of the
risk assessment is to help determine the inherent and residual risks to
establish the level of documentation and the extent of testing that needs to be
performed.
It is anticipated that the level of risk would have an impact on the extent and
nature of expected controls as well as the type and extent of testing. For
example, it would be anticipated that the higher risk areas would require
more extensive testing to validate that adequate controls are in place.
For general controls, organizations should assess those controls that support
the quality and integrity of information and that are designed to mitigate the
identified risks.
Understanding control theory and the concepts that define IT control design
will be an important competency of IT organizations in the future. Put
simply, IT control design defines the approach an organization follows to
reduce IT risk—the risk that IT prevents the business from achieving its
objectives—to an acceptable level. Once the control is properly designed, its
implementation and continued effectiveness become the focus. The existence
of controls and their effectiveness are discussed in subsequent phases.
S
Op tag
tim e 5
M ize
an d
ag
ed Stag
an e 4
dM
ea
Design and Operating Effectiveness
sur
De ab
S le
fin tag
ed e 3
Pr
Re oc
es
pe s
ata Sta
ble ge
bu 2
tI
Ini Sta ntu
tia ge itiv
l/A 1 e
dH
oc
No Stag
ne e 0
xis
ten
t
Figure 8 demonstrates the stages of control reliability that may exist within
organizations. For the purposes of establishing internal control, some
organizations may be willing to accept IT controls that fall somewhere short
of stage 3. However, given the Sarbanes-Oxley Act’s requirements for
independent attestation of controls by external audit, controls will more than
likely require the attributes and characteristics of stage 3 or higher for key
control activities.
assertion. certification and The level of effort The level of effort quality, timely
assertion. to document, test to document, test information.
The level of effort and remedy and remedy
to document, test The level of effort controls may be controls may be Internal resources
and remedy to document, test significant less significant are used
controls is very and remedy depending on the depending on the effectively and
significant. controls is organization’s organization’s efficiently.
significant. circumstances. circumstances.
Information is
timely and
reliable.
44 IT Control Objectives for Sarbanes-Oxley
Build Sustainability
The final phase ensures that internal controls are sustainable. At this point,
IT management should be in a position to sign off on the IT internal control
program effectiveness. Control assessment and management competencies
must become part of the IT department’s organization and culture and must
sustain themselves over the long term. Control is not an event; it is a process
that requires continuous support and evaluation to stay current.
• Activity level
– Description of the processes and related subprocesses (It may be in
narrative form; however, it may be more effective to illustrate as a
flowchart.)
– Description of the risk associated with the process or subprocess,
including an analysis of its impact and probability of occurrence.
Consideration should be given to the size and complexity of the process
or subprocess and its impact on the organization’s financial reporting
process.
– Statement of the control objective designed to reduce the risk of the
process or subprocess to an acceptable level and a description of its
alignment to the COSO framework
– Description of the control activity(ies) designed and performed to satisfy
the control objective related to the process or subprocess
– Description of the approach followed to confirm (test) the existence and
operational effectiveness of the control activities
– Conclusions reached about the effectiveness of controls, as a result of
testing
Lessons Learned
Parallels can be drawn between the effect of the Sarbanes-Oxley Act of 2002
on public companies and the impact of the US Federal Deposit Insurance
Corporation Improvement Act of 1991 (FDICIA) on the banking industry.
Both statutes introduced regulations to remedy perceived market failures,
and each enacted significant new reporting requirements. There are several
lessons public companies can learn from the FDICIA example:
• Accept that the environment has changed. Companies must recognize that
they operate in a new environment—one that demands more effort and
accountability.
• Promote understanding of internal control within the organization.
Companies may be tempted to show superficial compliance with the
Sarbanes-Oxley Act, but such an approach may backfire if controls fail
because form was stressed over substance.
• Factor into the business model the cost of developing an internal control
program. Good internal control is not a one-time expense; rather, it changes
the cost of doing business.
While focus has been provided on what is required for financial reporting,
the control objectives and considerations set forth in this document may
exceed what is necessary for organizations seeking to comply with the
requirements of the Sarbanes-Oxley Act. The suggested internal control
framework (COSO) to be used for compliance with the Sarbanes-Oxley Act,
as recommended by the SEC, addresses the topic of IT controls, but does not
dictate requirements for such control objectives and related control activities.
Similarly, PCAOB Auditing Standard No. 2 states the importance of IT
controls, but does not specify which in particular must be included. Such
decisions remain the discretion of each organization. Accordingly,
organizations should assess the nature and extent of IT controls necessary to
support their internal control program on a case-by-case basis.
The reader may find the following materials particularly useful. This guide
was not prepared to suggest a one-size-fits-all approach; instead, it
recommends that each organization tailor the control objective template to fit
its specific circumstances. For example, if systems development is
considered to be of low risk, an organization may choose to amend or delete
some or all of the suggested control objectives. An organization should also
consult with its external auditors to help ensure that all attestation-critical
control objectives are addressed.
Information and
Communication
Company Level
Environment
Assessment
Monitoring
Activity Level
Activities
Control
Control
Risk
COBIT Area
Control Environment
The control environment creates the foundation for effective internal control,
establishes the “tone at the top,” and represents the apex of the corporate
governance structure. The issues raised in the control environment
component apply throughout an IT organization.
IT Strategic Planning
1. Has management prepared strategic plans for IT that align Yes No Comments
business objectives with IT strategies? Does the planning
approach include mechanisms to solicit input from relevant
internal and external stakeholders affected by the IT strategic
plans?
2. Does management obtain feedback from business process Yes No Comments
owners and users regarding the quality and usefulness of its
IT plans for use in the ongoing risk assessment process?
3. Does an IT planning or steering committee exist to oversee the Yes No Comments
IT function and its activities? Does committee membership
include representatives from senior management, user
management and the IT function?
4. Are IT strategies and ongoing operations formally communicated Yes No Comments
to senior management and the board of directors, e.g., through
periodic meetings of an IT steering committee?
5. Does the IT organization ensure that IT plans are communicated Yes No Comments
to business process owners and other relevant parties across
the organization?
6. Does IT management communicate its activities, challenges and Yes No Comments
risks on a regular basis with the CEO and CFO? Is this
information also shared with the board of directors?
7. Does the IT organization monitor its progress against the Yes No Comments
strategic plan and react accordingly to meet established
objectives?
IT Organization and Relationships
8. Do IT managers have adequate knowledge and experience to Yes No Comments
fulfill their responsibilities?
9. Have key systems and data been inventoried and their owners Yes No Comments
identified?
52 IT Control Objectives for Sarbanes-Oxley
Risk Assessment
Risk assessment involves the identification and analysis by management of
relevant risks to achieve predetermined objectives, which form the basis for
determining control activities. It is likely that internal control risks could be
more pervasive in the IT organization than in other areas of the company.
Risk assessment may occur at the company level (for the overall
organization) or at the activity level (for a specific process or business unit).
Monitoring
Monitoring, which covers the oversight of internal control by management
through continuous and point-in-time assessment processes, is becoming
increasingly important to IT management. There are two types of monitoring
activities: continuous monitoring and separate evaluations.
For the most part, control objectives presented in the following figures can
be enabled through the use of built-in application control functionality. This
functionality is commonly found in integrated ERP environments, such as
SAP, PeopleSoft, Oracle, JD Edwards and others. Where this functionality
does not exist, these control objectives may require a combination of manual
and automated control procedures to satisfy the control objective.
Figures 23-27 refer to controls that extend into applications and business
processes that contribute to completeness, accuracy, validity and
authorization controls.
References
“An Audit of Internal Control Over Financial Reporting Performed in
Conjunction with an Audit of Financial Statements,” Public Company
Accounting Oversight Board, Final Auditing Standard: Release
No. 2004-001, USA, 9 March 2004
COBIT, IT Governance Institute, Rolling Meadows, Illinois, USA, July 2000
Committee of Sponsoring Organizations of the Treadway Commission
(COSO), www.coso.org
Common Criteria and Methodology for Information Technology Security
Evaluation, CSE (Canada), SCSSI (France), BSII (Germany), NLNCSA
(Netherlands), CESG (United Kingdom), NIST (USA) and NSA (USA),
1999
Exposure Draft Enterprise Risk Management Framework, Committee of
Sponsoring Organizations of the Treadway Commission (COSO), USA,
July 2003
“Final Rule: Management's Reports on Internal Control Over Financial
Reporting and Certification of Disclosure in Exchange Act Periodic
Reports,” Release Nos. 33-8238; 34-47986; IC-26068; File Nos.
S7-40-02; S7-06-03, US Securities and Exchange Commission, USA,
June 2003, www.sec.gov/rules/final/33-8238.htm
Internal Control—Integrated Framework, Committee of Sponsoring
Organizations of the Treadway Commission (COSO), American Institute
of Certified Public Accountants, USA, 1992
ISO IEC 17799, Code of Practice for Information Security Management,
International Organization for Standardization (ISO), Switzerland, 2000
IT Infrastructure Library (ITIL), British Office of Government Commerce
(OCG), Central Computer and Telecommunications Agency (CCTA),
London, 1989
Moving Forward–A Guide to Improving Corporate Governance Through
Effective Internal Control, Deloitte & Touche, 2003
“Taking Control, A Guide to Compliance with Section 404 of the Sarbanes-
Oxley Act of 2002,” Deloitte & Touche, 2003
“The Defining Issues—Implications of Proposed Auditing Standard on
Internal Control,” KPMG, 2003
“The Sarbanes-Oxley Act of 2002, Strategies for Meeting New Internal
Control Reporting Challenges,” PricewaterhouseCoopers, 2003
“The Sarbanes-Oxley Act of 2002, The Current Landscape—Rules, Updates
and Business Trends,” Ernst & Young, 2003
“Understanding the Independent Auditor’s Role in Building Trust,”
PricewaterhouseCoopers, 2003