TIAPS Module 1 Audit and Assurance workbook

10.04.2023 Views

C.3.4 Data Privacy There are strict requirements regarding data privacy. Although laws and regulations vary and continue to evolve, when someone provides an organization with personal data they generally have a right to: • Know the purpose for collecting the data. • Know what personal information an organization has. • Control what information is collected and how it is used, including who has access to it. • Request to change and delete any personal information held at any time for any reason. Organizations can find themselves operating outside of these requirements due to inadequate controls, such as: • The processes used for data collection are poorly designed and maintained and as a result the organization is collecting unnecessary, incomplete, or inaccurate information, or they do not gain appropriate permission from the owner of personal data for its usage and storage. • The organization allows data to be corrupted, stolen, or leaked, or shares it – contrary to the agreement with the data owner – with a third party that misuses it. • Data is stored beyond a permissible or useful period when it should be deleted. Organizations must maintain awareness of internal and external requirements for data privacy, keep staff informed, and ensure policies and processes are regularly reviewed and kept up to date. 70

C.3: Reflection Fraud: How are suspected frauds handled in your organization? Do internal auditors receive sufficient training? Are internal auditors involved in awareness raising about fraud risk? IT: How does your internal audit function ensure it has the skills and expertise needed to audit IT risks and controls? To what extent is automated controls testing utilized? Who in your organization takes the lead on managing IT risks? How does internal audit collaborate with and support those responsible for IT risk management? Cybersecurity: How does your internal audit function ensure it has the skills and expertise needed to audit cybersecurity risks and controls? Who in your organization takes the lead on managing cybersecurity risks? How does internal audit collaborate with and support those responsible for cybersecurity risk management? Data Privacy: Who in your organization takes the lead on managing data privacy risks? How does internal audit collaborate with and support those responsible for data privacy risk management? 71

C.3: Reflection<br />

Fraud:<br />

How are suspected frauds h<strong>and</strong>led in your organization?<br />

Do internal auditors receive sufficient training?<br />

Are internal auditors involved in awareness raising about fraud risk?<br />

IT:<br />

How does your internal audit function ensure it has the skills <strong>and</strong> expertise needed to audit<br />

IT risks <strong>and</strong> controls?<br />

To what extent is automated controls testing utilized?<br />

Who in your organization takes the lead on managing IT risks?<br />

How does internal audit collaborate with <strong>and</strong> support those responsible for IT risk<br />

management?<br />

Cybersecurity:<br />

How does your internal audit function ensure it has the skills <strong>and</strong> expertise needed to<br />

audit cybersecurity risks <strong>and</strong> controls?<br />

Who in your organization takes the lead on managing cybersecurity risks?<br />

How does internal audit collaborate with <strong>and</strong> support those responsible for cybersecurity<br />

risk management?<br />

Data Privacy:<br />

Who in your organization takes the lead on managing data privacy risks?<br />

How does internal audit collaborate with <strong>and</strong> support those responsible for data privacy<br />

risk management?<br />

71

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!