CPA Practice Advisor

AUG 2013

Today's Technology for Tomorrow's Firm.

Issue link: https://cpapracticeadvisor.epubxp.com/i/146073

Contents of this Issue

Navigation

Page 15 of 23

FEATURE 4 Tips for Managing Outsourcing Risks T By Benjamin A. Sady, CIA, CISA, CRISC here are numerous benefts to outsourcing business processes and technology resources. You can shif some of the responsibility to another party, gain specialized knowledge and solutions, gain operational and fnancial efciencies, increase the ability for management to focus on core business functions, accelerate the delivery of products or services, increase the ability to acquire and support current technology and avoid obsolescence and possibly reduce costs and conserve capital for other business ventures. Tat being said, the perceived and real risk of outsourcing also seems to be increasing daily. News media and published reports frequently highlight cases of data breaches through rogue employees, hackers and lost/stolen devices. Additionally, there is a risk of receiving poor services from a vendor which can result in operational inefciencies, lower quality of products and decreasing customer satisfaction. Companies should be managing their outsourced vendor relationships to ensure their processes, data and systems are protected. The employees tasked with vendor management and managing these risks should consider implementing the following processes: • Requirements Defnition • Vendor Selection and Due Diligence • Contract Negotiation and Implementation • Ongoing Monitoring Requirements Defnition Before the decision is made to use a third party to outsource a process or technology, a company should identify the concerns and pitfalls associated with outsourcing and the risks associated with each perspective vendor. This process should include the appropriate stakeholders (e.g. process owners, IT, legal, internal audit) and can be used as the starting point to create risk-based written requirements. Documented requirements for each outsourced process are important to guide and 16 manage the process from vendor selection through monitoring. Vendor Selection and Due Diligence A well defned vendor selection process will include evaluating proposals against the requirements defnitions, performing vendor due diligence, obtaining the necessary approvals and retention of contracts in a central fling system or contract database. Involving the appropriate stakeholders in the vendor selection process is essential and provides the different perspectives needed to make sound decisions. Te scope and efort of the vendor selection procedures should be consistent with the riskiness of the outsourced process. As for due diligence efforts, this should be risk-based and done prior to entering into a contract. For low risk vendors, it may involve phone inquiries and reviewing company websites. For high risk vendors, it may involve site visits, reviewing fnancials, reviewing policies and procedures, reviewing internal controls and reviewing third party assessments. Contract Negotiation and Implementation Te vendor management policy should identify who has the authority to execute contracts. Engage legal counsel to review the contract. You do not want to enter a contract that legal counsel disapproves, so use counsel in contract negotiation August 2013 • www.CPAPracticeAdvisor.com SECURITY AND YOUR F IRM to flter out the unfavorable terms. Te contract should clearly defne the rights and responsibilities of both parties and contain adequate and measurable service level agreements. A few service level agreements to consider, include: timeliness of report delivery, timeliness of transaction processing, percentage of errors in processing, instances of IT security issues and non-compliance, and system uptime. Most people think that service level agreements are meant only as a protective measure. Tey are protective, but the measurements can also be used to help identify chronic issues by all parties involved. Look for areas of consistent non-compliance or non-performance and ask your vendor, "Why is that occurring? Does there need to be a personnel, process, or technology change to improve?" Ongoing Monitoring Te vendor management policy should identify an annual risk assessment approach that can be followed to identify high, medium and low risk vendors. To begin the monitoring process, you frst need to identify your population of vendors and then perform your risk assessment for vendors according to your policy and methodology. Be careful to avoid the trap of focusing only on traditional IT companies. Te topic is bigger than just IT outsourcing. Companies ofen provide physical access, logical access and share sensitive information with not IT companies. Tink about a bank that outsources direct marketing. Tey are not outsourcing to a traditional IT company, but they are most likely sharing their customers' names, mailing and email addresses, and account numbers. Look out for these types of companies in your population of vendors. If vendors have access to the businesses data, then the ongoing monitoring program should include a plan on how to obtain assurance on the vendor's control environment. Tere are three primary methods to obtain assurance and any combination of them may be used. Te frst is to require vendors to perform self assessments annually. Te business should provide standardized questions to be completed by the vendor. Te questions should include a mix of yes/no and open ended questions. Consider requiring evidence to support the questions. The second is for the business to conduct an assessment annually. Always seek to obtain a "right to audit" clause in the contracts, even if the business does not initially plan to perform an audit. Tere may be a day when it is needed. Te assessment may include interviews of vendor staf, observations of controls, systems, tools, controls and confgurations. The third is to review third party assessments (e.g. SOC 1 / SSAE 16 reports, SOC 2 / 3 reports, PCI compliance, ISO certificate, Agreed Upon Procedures reports). When reviewing reports, there are a few key items to make sure of: • Te report covers the appropriate timeframe. • Te report covers signifcant services that you use. • There are no significant control weaknesses identifed in the report. • Management should sign of that they have performed this review. A simple cover sheet, checklist and signature should do. Tere is certainly a lot to consider in the outsourcing process. The most important thing to keep in mind is that a business can outsource the process and technology, but not the responsibility. Benjamin A. Sady, CIA, CISA, CRISC, is the senior manager of Risk Advisory Services at Keiter, one of the largest accounting and business consulting firms in Virginia.

Articles in this issue

Links on this page

Archives of this issue

view archives of CPA Practice Advisor - AUG 2013