IT Governance, Risk, and Compliance

Jun 28 2013   6:10AM GMT

Government-Audit Convergence Part VI



Posted by: Robert Davis
Tags:
Accountability
Administrative Control
Audit Oversight Committee
Compliance Management
Control Evaluation
Due Care
Due Diligence
Fiduciary Responsibility
Framework
Governance
Government Agencies
Illegal Acts
Information Assets Protection
Laws and Regulations
Management
Safeguarding

The most common audit practice laws and regulations influences are evidence collection and perseverance. Where legal compliance audits are decreed, if an illegal act is suspected, IT auditors must ensure evidential legal mandates are satisfied in order to successfully provide authorities with untainted items to prosecute alleged perpetrators. Additionally, when an IT auditor is performing audits on an international scale, understanding various evidentiary requirements can become critical to a professional audit practice. Under most circumstances, reflective of ISACA’s standard for Irregularities and Illegal Acts, audit evidence available to the IT auditor during an IAP legal compliance audit should be persuasive in nature rather than conclusive for demonstrating due diligence.

Source:

ISACA. “Irregularities and Illegal Acts.” In Information Systems Standards, Guidelines, and Procedures for Auditing and Control Professionals. Rolling Meadows, IL: ISACA, September 2005. http://www.isaca.org/AMTemplate.cfm?Section=Standards2&Template=/ContentManagement/ContentDisplay.cfm&ContentID=40571 (accessed May 3, 2008).

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: