Software Auditing Panel Discussion QUESTION ? How many of you are being Audited now or have been in the last year? Please stand…. How many have been Audited.

Slides:



Advertisements
Similar presentations
The Business of Modularity The Modern Way to Bring ERP Solutions to Market March, 2010.
Advertisements

Project Estimates There are two types of estimates 1Partial Payment Estimate 2Final Payment Estimate.
UNIVERSITY SOFTWARE LICENSING COLLABORATION NEXT GENERATION SPUSC 2010.
Contract Maintenance. Two Main Functions of the Collective Bargaining Agent Defining the relationship between the employer and the employee - Negotiations.
Get in touch with Microsoft Dynamics Sure Step Saied Alhamwi, PMP Business Application Manager ACWA Holding
Region 3 Monitors April What is a REED? It is a “process” whereby the IEP team reviews existing evaluation data to make evaluation decisions about.
Peirsonpatterson,llp eDisclosure Solution ppdocs.com.
Office of the Auditor General of Canada CANADA’S ADOPTION OF INTERNATIONAL STANDARDS ON AUDITING 20 FACTS PREPARERS of FINANCIAL STATEMENTS SHOULD KNOW.
QUALITY ASSURANCE AND IMPROVEMENT PROGRAM (QAIP)
Segment Five: Provider Communication Idaho ICD-10 Site Visit Training segments to assist the State of Idaho with the ICD-10 Implementation January 26-27,
Office of Operations 2010 Fall Conference Contract Monitoring Elizabeth Bogdanowicz Joseph Morrissey, MBA, CGAP Roslyn Watrobski, CFE, CIA, CGAP.
How to be a less attractive software audit target Helpful intelligence from License Dashboard Presented by: Matt Fisher, Director.
Steven Clark Smile Business Products  Network Services Manager  Managed IT Clients vCIO  MCITP: Server Administrator  MCITP: Support Tech & Virtualization.
A Presentation for the Enterprise Architect © 2008 IBM Corporation IBM Technology Day - SOA SOA Governance Miroslav Petrek IT Software Architect
John Langsford 13 September 2006 CI Implementation Project.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
The Camp Audit “Keep your friends close and your auditor closer”
Miami University Fall 2009 Software Asset Management.
1 Exemption AdministrationTraining Related to Accepting Certificates Prepared by the Streamlined Sales Tax Governing Board Audit Committee Prepared January.
IT Service Delivery And Support Week Five IT Auditing and Cyber Security Spring 2014 Instructor: Liang Yao (MBA MS CIA CISA CISSP) 1.
Auditing Standards IFTA\IRP Audit Guidance Government Auditing Standards (GAO) Generally Accepted Auditing Standards (GAAS) International Standards on.
Release & Deployment ITIL Version 3
Hartley, Project Management: Integrating Strategy, Operations and Change, 3e Tilde Publishing Chapter 11 Procurement Management Embedding value into the.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Confidential: University of California San Francisco Medical Center Situation and background Risks Opportunities Evaluation of candidates Security compliance.
TickIT Standard1 Advanced Software Engineering COM360 University of Sunderland.
Bring Your Business into the 21 st Century : Part 1 WasteExpo 2011 Improving Your Financial Management System.
Why software vendors audit their customers Helpful intelligence from License Dashboard Presented by: Matt Fisher, Director.
Adobe License Compliance Program (LCP) Audit. The Laboratory was notified last Thursday – via – of a request from Adobe to audit, within 30 days,
Roles and Responsibilities
A Legacy of Integrity and Trust State Compliance Audits What Can We Expect? Stephen Hart Lewis and Roca LLP.
Packaging & Distribution Project Summary Report Project Name: Brief Project Description: The Packaging and Distribution Project can deal with three different.
A. Aimar - EP/SFT LCG - Software Process & Infrastructure1 Software Process panel SPI GRIDPP 7 th Collaboration Meeting 30 June – 2 July 2003 A.Aimar -
INTERNAL AUDIT WORKSHOP: 19 JUNE 2007 JUANITA WILKENS.
Employment. Organization Strategy HR and Staffing Strategy Staffing Policies and Programs Staffing System and Retention Management Support Activities.
Chapter 21 Internal, Operational, and Compliance Auditing McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
HIPAA PRACTICAL APPLICATION WORKSHOP Orientation Module 1B Anderson Health Information Systems, Inc.
©2014 FIS and/or its subsidiaries. All Rights Reserved. FIS confidential and proprietary information. Managing Project Schedule Gail Lumsden, FIS July.
Rhonda Anderson, RHIA, President  …is a PROCESS, not a PROJECT 2.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. In most cases, the information.
1 Kingsley Karunaratne, Department of Accounting, University of Sri Jayewardenepura, Colombo - Sri Lanka Practice Management.
Robert J. Scott. Agenda Licensing Models Perpetual vs. Subscription User vs. Device Agreement Types Microsoft Business and Services Agreement Online Subscription.
PARENT POWER BY TAMI JOIA, ADVOCATE. Controlling the Outcome Create a Paper-trail Everything is in writing Wait 3 days for a response from the district.
Post-Award basics MATTHEW MOORE ASSOCIATE DIRECTOR, POST-AWARD OPERATIONS.
FAPE “The Big Three”. FAPE Free and Appropriate Public Education Legal and Effective IEP Process Eligibility Procedural Safeguards.
“SPEAR” W ORKSHOP P RESENTED BY : C ATHERINE S TRESING S USANNE S TAMM A WARDS.
Fiscal Compliance Corner – Uniform Guidance Update MRAM October 2014 Ted Mordhorst Assistant Director for Post Award Financial Compliance Research Accounting.
State of Georgia Release Management Training
Connecting for Health Common Framework: the Model Contract for Health Information Exchange Gerry Hinkley com July 18, 2006 Davis Wright.
Successfully Defending Software Audits Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
© Imperial College LondonPage 1 Health and safety audit Imperial College’s methodology Julia Cotton College Safety Auditor.
Arkansas Department of Emergency Management Arkansas’ Homeland Security & Preparedness Agency Sandy Recovery Improvement Act of 2013 Public Assistance.
Prepared for Auditor’s Report to the Board of Education June 30, 2015.
IFTA BALLOT #3 Overview of changes. Overview of Changes The new Language in Ballot #3 introduces 5 new requirements and defines “should” as a conditional.
Professor Alkis John Corres Ship Sale and Purchase.
Internal Audit Quality Assessment Guide
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
Auditor’s Process in Considering Tests of Controls and Substantive Tests of Details of Tx.
Procurement Card Policy 2017
Meyer Consulting Group, LLC
Cover.
Relational Security Corporation
Pre-Authentication Authentication of Management Frames
Principles of Effective Contract Drafting
Auctions 101 March 2019.
Exemption AdministrationTraining Related to Accepting Certificates
Closing a Project Close a Project or Phase Close Procurements.
Presentation transcript:

Software Auditing Panel Discussion QUESTION ? How many of you are being Audited now or have been in the last year? Please stand…. How many have been Audited by Adobe, Oracle, MS, IBM, Symantec? Please remain standing ….. This is the reason for our discussion

Pre-Audit Considerations Attempt to avoid or discourage audits NDA? Obtain broad use & perpetual licensing Include limited/restrictive audit language in contract Once every 3 years 90 day notice Completed within 1 day Mutual acceptance of results Know how audit will be conducted Make audit provision mutual

Pre-Audit Considerations Implement software asset management program (tools & processes) Assist in reporting & compliance Terminate software no longer in use or needed Conduct internal audit Know the habitual auditors Have stronger discipline, contract language, and preparation Credits – include right to receive credit if no issues are found in the audit

During the Audit Limit communications Research and benchmark with outside sources (peers, Gartner, Forrester, etc.) Know your contracts Use rights and restrictions Contract language vs. web-published policies Proof of entitlements Know the lifecycle of your deployments (installs, upgrades, moves, etc.)

During the Audit Document everything Review / validate all data before sharing Review all script results before sending (scrub if possible or notate anomalies) Challenge any inaccuracies in the findings Do not agree to the findings or admit non-compliance

Post Audit Considerations Negotiate – Negotiate – Negotiate Negotiate the Audit Final Report Findings and Results Negotiate all true up costs Negotiate - licensing - conversions and upgrades

Post Audit Considerations Consider your future needs Consider moving to an ELA Consider co-terming Consider getting rid of shelf-ware Leverage your product strategy to negotiate Leverage your account Rep to negotiate

Post Audit Considerations Make sure you get a COMPLIANCE RELEASE and RESET effective to the signature date of the audit completion and release. Some Documents to review:

QUESTIONS?

Software Auditing Panel Discussion PLEASE COMPLETE YOUR SURVEY