SlideShare a Scribd company logo
1 of 21
Relying on the Third Party Sabrina Maeng
Agenda What is Outsourcing? What to Outsource? Types of Outsourcing Criticisms and Support Why to Outsource? Risks Mitigating Risks: Audit Audit Focus Specific Standards Recommendations
What is Outsourcing? “the outsourcing process can be perceived as the activity transferred to be carried out by another company”1 1Source: Andone, Ioan I and Pavaloaia, Vasile-Daniel. “Outsourcing the Business Services.”InformaticaEconomica.  14.1 (2010) : 163-172. ESCO Host. Web. 28 May 2011.
What to Outsource? Business Process Outsourcing (BPO) Accounting Customer Support Marketing Analysis (Financial and Economic) Information Technology Outsourcing (ITO) Software development Application support and maintenance Infrastructure management
Types of Outsourcing Offshoring: transfer of business activity to another country Domestic outsourcing: transfer of business activity to a non-affiliated company within the same country
What is Outsourcing? Support Cost savings for the company – up to 50-60%  “Transformational Outsourcing” 2 Price reductions for consumers Criticisms Reputation at stake Loss of product quality Loss of intellectual capital (ie. data security) 2Engardio, Peter. “The Future of Outsourcing.”Bloomberg Business Week.(2006). Web. 28 May 2011. <http://www.businessweek.com/magazine/content/06_05/b3969401.htm>
Why to Outsource? Current financial situation of the company Actual outsourcing costs Control of business functions Access to documents Cultural differences Organizational differences Hiring practices Management attitude Competencies required
Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
Risks The Agreement  Roles and responsibilities Expertise and experience of supplier System capabilities Staffing requirements
Risks Data Security Reputation System functions and capabilities “You can delegate accountability, but not responsibility.”4 Service providers are accountable User organizations are responsible 4Source: Van Dyk, Peter. “Cloud Computing: Validating accountability and responsibility.” NZ Business.24.10 (2010). ESCO Host. Web. 28 May 2011.
Mitigating Risk: Audit Why Audit? SOX requires that publicly traded companies with outsourced processes obtain audits Many companies won’t use a service provider that doesn’t have an audit
Audit: Focus Security Data Network  Connectivity Contract Country-specific regulatory requirements
Audit: SAS 70 and CICA 5970 SAS 70 and CICA 5970 - similar in nature Type I-  evaluation of control design at point in time Type II- evaluation of control design and operating effectiveness of controls over a period of time
Audit: SAS 70 and CICA 5970 Service organization choose the controls Management can circumvent the process Too much reliance on management with no assertion
Audit: SSAE 16 and ISAE 3402 Assertion–based engagements Type I/Type II and Type A/B Reliance on internal audit processes
Audit: SSAE 16 New U.S. standard issued June 15, 2011 issued to replace SAS 70 Better aligns with international standards (ISAE 3402 discussed later)
Audit: SSAE 16 Management assertion requirement Expanded descriptions (inclusive of internal controls, systems and processes) Identification of risk points or weaknesses Addresses use of subservice organization Inclusive  Carve-out Assumptions on user role Reliance on internal audit processes
Audit: ISAE 3402 Current acting international standard Used as a basis to update existing standards “An International Assurance Standard for Third Party Reporting: Benefits and Implications for Service Organizations.” PricewaterHouseCoopers. 2009. Web. 10 June 2011. <http://www.pwc.com/en_CA/ca/controls/business-process-controls/publications/international-assurance-standard-0409-en.pdf>
Audit: ISAE 3402 Management assertion requirement Specifies criteria (preparing and presenting system description, control design and operating effectiveness) Disclosure of reliance on internal audit processes, and/or external experts used with regard to controls Extending the scope beyond financial reporting matters Regulatory, compliance, operational, business recovery matters
Recommendations Use of service organizations is not beneficial to every company Cost-benefit analysis  Risk analysis and mitigation Audit or Attest

More Related Content

What's hot

LexComply - Compliance Software India
LexComply - Compliance Software IndiaLexComply - Compliance Software India
LexComply - Compliance Software IndiaLexComply
 
September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)Amara Omar Kuyateh
 
Lexcomply - Compliance Management System
Lexcomply - Compliance Management SystemLexcomply - Compliance Management System
Lexcomply - Compliance Management SystemLexComply
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007Danial Khan
 
Planning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) reportPlanning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) reportJay Crossland
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
Exercise auditing
Exercise auditingExercise auditing
Exercise auditingsahaomar
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)Muhammad Azmy
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
Sas 70 Readiness
Sas 70 ReadinessSas 70 Readiness
Sas 70 Readinessmpotorti
 
Which SOC Report Do I need?
Which SOC Report Do I need?Which SOC Report Do I need?
Which SOC Report Do I need?VISTA InfoSec
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isacapooshu
 
KPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline ContractsKPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline ContractsIcertis
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCorporater
 

What's hot (20)

LexComply - Compliance Software India
LexComply - Compliance Software IndiaLexComply - Compliance Software India
LexComply - Compliance Software India
 
September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)September article SSAE 16 the SAS 70 Final Version (mp)
September article SSAE 16 the SAS 70 Final Version (mp)
 
Lexcomply - Compliance Management System
Lexcomply - Compliance Management SystemLexcomply - Compliance Management System
Lexcomply - Compliance Management System
 
El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007El-Paso SOX TestingTraining- June 2007
El-Paso SOX TestingTraining- June 2007
 
Planning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) reportPlanning for a new Service Organization Control (SOC) report
Planning for a new Service Organization Control (SOC) report
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Exercise auditing
Exercise auditingExercise auditing
Exercise auditing
 
Casa engl
Casa englCasa engl
Casa engl
 
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
Presentation 2, Audit methodologies, Workshop on System-based auditing, Tiran...
 
Lawrbit Global Regulatory Intelligence
Lawrbit Global Regulatory IntelligenceLawrbit Global Regulatory Intelligence
Lawrbit Global Regulatory Intelligence
 
Information System audit
Information System auditInformation System audit
Information System audit
 
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
CONTROL & AUDIT INFORMATION SYSTEM (HALL, 2015)
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
Sas 70 Readiness
Sas 70 ReadinessSas 70 Readiness
Sas 70 Readiness
 
Which SOC Report Do I need?
Which SOC Report Do I need?Which SOC Report Do I need?
Which SOC Report Do I need?
 
Sod remediation best practices for isaca
Sod remediation best practices for isacaSod remediation best practices for isaca
Sod remediation best practices for isaca
 
KPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline ContractsKPIT Selects Best Contract Management Software to Streamline Contracts
KPIT Selects Best Contract Management Software to Streamline Contracts
 
Database auditing models
 Database auditing models  Database auditing models
Database auditing models
 
Profile_Kishore Sundar
Profile_Kishore SundarProfile_Kishore Sundar
Profile_Kishore Sundar
 
Compliance Management | Compliance Solutions
Compliance Management | Compliance SolutionsCompliance Management | Compliance Solutions
Compliance Management | Compliance Solutions
 

Similar to Relying on the Third Party

Information Systems Audit-Related Designations
Information Systems Audit-Related DesignationsInformation Systems Audit-Related Designations
Information Systems Audit-Related DesignationsMichael Lin
 
Account Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptxAccount Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptxGaneshMeenakshiSunda4
 
Internal Audit And Review Reports
Internal Audit And Review ReportsInternal Audit And Review Reports
Internal Audit And Review ReportsLaura Martin
 
Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Daljit Banger
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007David Cunningham
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S proaxissolutions
 
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14said missoum
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsVisionet Systems, Inc.
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessLaura Perry
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...NextLabs, Inc.
 
A Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - CogneesolA Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - CogneesolCogneesol
 
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and EconomyAssurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economysophiacuiry
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTERRaj Kumar
 

Similar to Relying on the Third Party (20)

Information Systems Audit-Related Designations
Information Systems Audit-Related DesignationsInformation Systems Audit-Related Designations
Information Systems Audit-Related Designations
 
Account Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptxAccount Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptx
 
Internal Audit And Review Reports
Internal Audit And Review ReportsInternal Audit And Review Reports
Internal Audit And Review Reports
 
Presentation to the AEA (June 23)
Presentation to the AEA (June 23) Presentation to the AEA (June 23)
Presentation to the AEA (June 23)
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007Establishing a framework for it governance by dave cunningham 2007
Establishing a framework for it governance by dave cunningham 2007
 
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
I N F O R M A T I O N & C Y B E R S E C U R I T Y A U D I T S
 
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
James hall ch 15
James hall ch 15James hall ch 15
James hall ch 15
 
Information Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your BusinessInformation Security Program &amp; PCI Compliance Planning for your Business
Information Security Program &amp; PCI Compliance Planning for your Business
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
 
A Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - CogneesolA Guide to Business Process Outsourcing - Cogneesol
A Guide to Business Process Outsourcing - Cogneesol
 
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and EconomyAssurance and the 3 E’s: Efficiency, Effectiveness, and Economy
Assurance and the 3 E’s: Efficiency, Effectiveness, and Economy
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
EIS Amendments CA INTER
EIS Amendments CA INTEREIS Amendments CA INTER
EIS Amendments CA INTER
 

Recently uploaded

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 

Recently uploaded (20)

8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 

Relying on the Third Party

  • 1. Relying on the Third Party Sabrina Maeng
  • 2. Agenda What is Outsourcing? What to Outsource? Types of Outsourcing Criticisms and Support Why to Outsource? Risks Mitigating Risks: Audit Audit Focus Specific Standards Recommendations
  • 3. What is Outsourcing? “the outsourcing process can be perceived as the activity transferred to be carried out by another company”1 1Source: Andone, Ioan I and Pavaloaia, Vasile-Daniel. “Outsourcing the Business Services.”InformaticaEconomica. 14.1 (2010) : 163-172. ESCO Host. Web. 28 May 2011.
  • 4. What to Outsource? Business Process Outsourcing (BPO) Accounting Customer Support Marketing Analysis (Financial and Economic) Information Technology Outsourcing (ITO) Software development Application support and maintenance Infrastructure management
  • 5. Types of Outsourcing Offshoring: transfer of business activity to another country Domestic outsourcing: transfer of business activity to a non-affiliated company within the same country
  • 6. What is Outsourcing? Support Cost savings for the company – up to 50-60% “Transformational Outsourcing” 2 Price reductions for consumers Criticisms Reputation at stake Loss of product quality Loss of intellectual capital (ie. data security) 2Engardio, Peter. “The Future of Outsourcing.”Bloomberg Business Week.(2006). Web. 28 May 2011. <http://www.businessweek.com/magazine/content/06_05/b3969401.htm>
  • 7. Why to Outsource? Current financial situation of the company Actual outsourcing costs Control of business functions Access to documents Cultural differences Organizational differences Hiring practices Management attitude Competencies required
  • 8. Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
  • 9. Risks Source: Brandas, Claudiu. “Risks and Audit Objectives for IT Outsourcing.” InformaticaEconomica. 14.1. (2010): 113-118. 163-172. ESCO Host. Web. 28 May 2011.
  • 10. Risks The Agreement Roles and responsibilities Expertise and experience of supplier System capabilities Staffing requirements
  • 11. Risks Data Security Reputation System functions and capabilities “You can delegate accountability, but not responsibility.”4 Service providers are accountable User organizations are responsible 4Source: Van Dyk, Peter. “Cloud Computing: Validating accountability and responsibility.” NZ Business.24.10 (2010). ESCO Host. Web. 28 May 2011.
  • 12. Mitigating Risk: Audit Why Audit? SOX requires that publicly traded companies with outsourced processes obtain audits Many companies won’t use a service provider that doesn’t have an audit
  • 13. Audit: Focus Security Data Network Connectivity Contract Country-specific regulatory requirements
  • 14. Audit: SAS 70 and CICA 5970 SAS 70 and CICA 5970 - similar in nature Type I- evaluation of control design at point in time Type II- evaluation of control design and operating effectiveness of controls over a period of time
  • 15. Audit: SAS 70 and CICA 5970 Service organization choose the controls Management can circumvent the process Too much reliance on management with no assertion
  • 16. Audit: SSAE 16 and ISAE 3402 Assertion–based engagements Type I/Type II and Type A/B Reliance on internal audit processes
  • 17. Audit: SSAE 16 New U.S. standard issued June 15, 2011 issued to replace SAS 70 Better aligns with international standards (ISAE 3402 discussed later)
  • 18. Audit: SSAE 16 Management assertion requirement Expanded descriptions (inclusive of internal controls, systems and processes) Identification of risk points or weaknesses Addresses use of subservice organization Inclusive Carve-out Assumptions on user role Reliance on internal audit processes
  • 19. Audit: ISAE 3402 Current acting international standard Used as a basis to update existing standards “An International Assurance Standard for Third Party Reporting: Benefits and Implications for Service Organizations.” PricewaterHouseCoopers. 2009. Web. 10 June 2011. <http://www.pwc.com/en_CA/ca/controls/business-process-controls/publications/international-assurance-standard-0409-en.pdf>
  • 20. Audit: ISAE 3402 Management assertion requirement Specifies criteria (preparing and presenting system description, control design and operating effectiveness) Disclosure of reliance on internal audit processes, and/or external experts used with regard to controls Extending the scope beyond financial reporting matters Regulatory, compliance, operational, business recovery matters
  • 21. Recommendations Use of service organizations is not beneficial to every company Cost-benefit analysis Risk analysis and mitigation Audit or Attest