| |     |     
| | | AUDIT & ADVISORY SERVICES | 
 | 
|---|
 | 
 |  |  |  |  |     
| | | In this issue:     
    
Operational – Internal ControlsIT Security – SOC 2 ReportsFiscal Year 2021-2022 Audit PlanUSC Integrity Line – Expense Reimbursement FraudNews LinksContact Information | 
 | 
|---|
 | 
     
| | | Operational - Internal Controls | 
 | 
|---|
 | 
     
| | |     
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) defines     
internal control as “a process, effected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives.” The following are the five key components of internal control:     
    
Control Environment - a set of standards, structures, and processes providing the foundation for executing internal control across the organizationRisk Assessment - forms the basis for determining how risks will be managedControl Activities - actions that assist management in mitigating the risks associated with the achievement of objectivesInformation and Communication - the distribution of information needed to perform control activities and to understand internal control responsibilities to personnel internal and external to the entityMonitoring Activities - ongoing evaluations of the implementation and operation of the five components of internal control | 
 |  | |     
For departments that rely heavily on specific employees to perform internal control processes, the following steps should be taken to provide coverage against key employee turnover:     
    
Document control systems - Identify key tasks and document the expectations for performing those tasks in a checklist, desk procedure, flow chart, or narrative.Cross-train staff - Implement cross-training and duty rotations for employees performing key processes. The staff in training should follow the documented procedures to complete the tasks and provide feedback to identify potential improvements.Documentation repositories - Organize and store procedure documentation in a centralized repository to allow for ease of reference during a transition. The University has established an Internal Control Policy to provide the internal control objectives of the Board of Trustees to the University community. | 
 | 
|---|
 | 
 |  |     
| | | IT Security – SOC 2 Reports | 
 | 
|---|
 | 
     
| | |     
The American Institute of Certified Public Accountants created System and Organizational Control (SOC) reports in 2011 to provide assurance to user organizations and stakeholders that a particular service is being provided securely.  In accordance with the current SOC audit framework, SOC reports must be conducted and issued by CPA firms.  There are three types of SOC reports:     
    
SOC 1 reports are used as assurance that financial information provided to customers is accurate.SOC 2 reports provide assurance that service providers are protecting sensitive data and minimizing risk for their customers.SOC 3 reports are similar to SOC 1 and SOC 2 but are generated for public distribution for marketing purposes. These reports are typically used by enterprise-level service providers. A SOC 2 report provides assurance that the service is being provided in a secure and reliable manner by addressing one or more of the following Trust Services Criteria:       
    
    
| Criteria | Description |      
| Security | Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect the entity’s ability to achieve its objectives.   |      
| Availability | Information and systems are available for operation and use to meet the entity’s objectives.   |      
| Confidentiality | Information designated as confidential is protected to meet the entity’s objectives.   |      
| Processing Integrity | System processing is complete, valid, accurate, timely, and authorized to meet the entity’s objectives.   |      
| Privacy | Personal information is collected, used, retained, disclosed, and disposed of to meet the entity’s objectives.   |  The rise in cloud computing and outsourcing has created an increased need for user organizations to utilize SOC 2 reviews to assess and address the risks associated with third party technology services.  University personnel should obtain and thoroughly review SOC 2 reports prior to engaging third party service providers. As controls may change over time, periodic reviews of the service provider during the engagement should also be performed. | 
 | 
|---|
 | 
     
| | | Fiscal Year 2021-2022 Audit Plan     
Each year, we complete a University-wide risk assessment to identify key risks. Based on the results of this assessment, we determine what areas shoud be audited to provide the greatest value to the University.  Below is the Audit Plan for the 2021-22 Fiscal Year, as approved by the Board of Trustees. | 
 | 
|---|
 | 
     
| | | |     
Academics/Student Support     
    
Carolina Online Management – Admissions Processes Athletics Financial     
    
University Stress Testing Operational     
    
Data Integrity – Institutional Data ReportingCampus Project Management – Campus VillageCARES Act Compliance – HEERFDeferred MaintenanceIT Intrusion Detection/Incident ManagementIT Asset ManagementInformation Security Program CompliancePeopleSoft – Strategic SourcingResearch Computing Infrastructure SecurityServer Security | 
 |  | | Operational (continued)     
    
    
    
Student Athletes’ Medical Records PrivacySuccession PlanningUSC Upstate Business OperationsIT Vulnerability Management – Comprehensive Universities/Palmetto Colleges Research     
    
Foreign Influence – Affiliate AppointmentsResearch Compliance – Late Cost Transfers Safety     
    
Campus Safety – Comprehensive Universities/Palmetto College CampusesChemical and Biological SafetyTitle IX - Advisory | 
 | 
|---|
 | 
 | 
     
| | | USC Integrity Line - Expense Reimbursement Fraud | 
 | 
|---|
 | 
 |  |  |     
| | | The Association of Certified Fraud Examiners (ACFE) defines     
expense reimbursement fraud as “a fraudulent disbursement scheme in which an employee makes a claim for the reimbursement of fictitious or inflated business expenses.  According to the     
2020 Report to the Nations on Occupational Fraud and Abuse, published by the ACFE, employee reimbursement fraud existed in 14% of all asset misappropriation cases reported, which resulted in a median cost of approximately $33,000 per incident with a median detection time of 24 months. Expense fraud can fall into the following four major categories:   I. Mischaracterized expenses: an employee claims a personal expense for reimbursement as a business expense.   Red Flags     
    
Items that don’t seem to have a business connectionMeals and entertainment when employees aren’t working/travelling or on weekends or holidaysItems or meals for children, or fromEstablishments in the employee’s neighborhood   II. Overstated (or inflated) expenses: an employee submits a claim for a legitimate expense but increases the amount.   Red Flags     
    
Incomplete or inadequate expense reportSupporting documents such as receipts that are suspicious and/or show signs of fabrication (e.g. inconsistent font, color, visible correcting fluid/tape, pixelation, scratched out information) | 
 |  | |     
    
III. Fictitious expenses: an employee submits a fake expense and/or false receipts for reimbursement.   Red Flags     
    
Multiple expense reports submitted close together from the same company, from the same employeeTaxi, hotel, flight, or other travel-related receipts for dates and times the employee was known to NOT be on company businessReceipt amounts that are significantly higher than similar reports submitted by other employeesExpenses that were not pre-approved   IV. Multiple reimbursements: an employee submits the same expenses and receipts more than once for reimbursement.   * * *   USC Integrity Line Reporting   You can report your concern anonymously to the USC Integrity Line:     
Reports are shared with a select group of three individuals:      
    
    
Chair of the Audit, Compliance and Risk Committee of the Board of Trustees    
Chief Audit Executive    
General Counsel     
These individuals determine the appropriate path forward for investigating your report.     
Click     
here    
 for more information on the USC Integrity Line | 
 | 
|---|
 | 
     
| | |       
Relevant University Policies: University employees are expected to report any concerns regarding possible noncompliance with laws, regulations, and policies. | 
 | 
|---|
 | 
     
| | | Contact Audit & Advisory Services 1600 Hampton St. Suite 610 Columbia, SC 29208       
    
    
Have suggestions or requests for future newsletter topics? Send us an email.
   | 
 | 
|---|
 | 
 |  | 
 |