Professional Documents
Culture Documents
for IT Auditors
ETHICS
principles of conduct that is
Ethical Responsibility
Every major decision has
Computer Ethics
Analysis of nature and social
ETHICAL SYSTEM
Describes the duties
and behaviors
commonly considered
correct for a given
circumstance
Codes of Ethical
Conduct
values of an enterprise or
organization
Can be:
a) Normative
b) Descriptive
7
5)
6)
MORALS
ETHICS
LEGAL
10
Illegal Acts
willful
violation of
the law
11
FRAUD
According
FRAUD Levels
Employee Fraud
Management Fraud
Stealing of asset
Conversion to usable
form
Concealment of
crime
Management level
Involves the financial
statements
Involvement of related
3rd parties
13
Fraud Triangle
Situational
Pressure
Opportunity
Ethics
14
ISACA Guideline
auditors are not qualified to determine
whether an irregular, illegal or simply
erroneous act has occurred. Instead, it
should be made by a qualified expert (i.e.
lawyer, judge).
the extent to which the observed
unusual act if material to the financial
statements taken as a whole is outside
15
16
Elements in a Contract
OFFER
CONSIDERATION
ACCEPTANCE
17
What to check
IT Auditors typically will examine
written contracts dealing with
the purchase and sale of goods
and services.
18
Employment Contracts
19
Confidentiality Agreements
Describe the nature of information
protected by the agreement
List permissible uses of such information
Affirm a duty of confidentiality
Identify remedies for noncompliance
Qualify the term of the agreement
20
21
Discovery Agreements
22
Noncompete Agreements
Has the following elements:
a) Offer
b) Consideration
c) Agreement
d) Period of time
e) Geographic radius
23
Computer Crime or
Cybercrime
Direct
24
Intellectual Property
A. Industrial Property
Patents
grant an inventor the right to exclude
others from producing or using the
inventors discovery or invention for a
limited period of time.
to be patented it must be:
a) Novel
b) Useful
c) Not of an obvious nature
27
A. Industrial Property
Patents
a)
b)
c)
d)
28
A. Industrial Property
Trademarks
reflect distinctive images or words
that sellers affix to distinguish the
origin of their products.
29
B. Individual Property
Copyright
protects creative works from being
reproduced, performed or
disseminated by others without
permission.
life of copyright begins the moment
the work is created and lasts for the
life of the creator plus and additional
fifty years.
30
Cyber Information
Crimes
When
electric information is
compromised, the ramifications fall
into 3 categories:
Confidentiality
Integrity
Availability
31
Privacy Issues
The
Can be:
a) Factual
b) Subjective
32
Organizations
Accounting
Profession
33