SOC Reporting September 22, 2015

Slides:



Advertisements
Similar presentations
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Advertisements

Internal Control–Integrated Framework
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
March 6, 2012 SOC Reporting: What is New in the Audit Guides?
Discussion on SA-500 – AUDIT EVIDENCE
Auditing Computer Systems
Auditing Computer-Based Information Systems
Chapter 20 Additional Assurance Services: Other Information
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Other Assurance Services Chapter 25.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Other Assurance Services Chapter 24.
Auditing A Risk-Based Approach To Conducting A Quality Audit
18- 1 © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 18 Integrated Audits of Internal Control (For Public Companies Under Sarbanes-Oxley.
Code of Conduct for Mobile Money Providers 6 November 2014 All material © GSMA The policy advocacy and regulatory work of the GSMA Mobile Money team.
Purpose of the Standards
Session 3 – Information Security Policies
Information Systems Controls for System Reliability -Information Security-
4. Quality Management System (QMS)
Service Organization Control (SOC) Reporting Options and Information
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
INTERNAL CONTROL OVER FINANCIAL REPORTING
Chapter Three IT Risks and Controls.
Chapter 5 Internal Control over Financial Reporting
Internal Control in a Financial Statement Audit
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Internal Control in a Financial Statement Audit
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Auditing Internal Control over Financial Reporting Chapter Seven.
Data protection—training materials [Name and details of speaker]
The NIST Special Publications for Security Management By: Waylon Coulter.
ISO 9001:2015 Subject: Quality Management System Clause 8 - Operation
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
SAS No. 70, Service Organizations A standard for reporting on a service organization’s controls affecting user entities' financial statements. Only for.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Other Assurance Services Chapter 25.
Service Organization Control Reports What Have We Learned? Chris Bruhn DIRECTOR, IT RISK SERVICES, BKD, LLP SAS 70 ENDS EXIT TO SSAE 16.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Understanding Privacy An Overview of our Responsibilities.
1 Presented by: Chris Pembrook, CPA, MBA, CGAP, Cr.FA Frank Crawford, CPA Crawford & Associates, P.C.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Understanding Privacy An Overview of our Responsibilities.
Privacy principles Individual written policies
Service Organization Control (SOC)
Chapter 20 Additional Assurance Services: Other Information
Defining Internal Control
Other Assurance Services
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Chapter 20 Additional Assurance Services: Other Information
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

SOC Reporting September 22, 2015 Kathy Lovejoy, Audit Manager, IL Office of the Auditor General Roger Boyd, Director, IT Services, GA Department of Audits and Accounts Holli Harrison, Sr. Security, Risk & Compliance Analyst, Citrix Systems, Inc.

Agenda Introduction to SOC Reporting Review of IL SOC 2 Report Roundtable: Balancing Transparency & Cybersecurity Panel Discussions & Exercises Scoping & Planning Description of System Evaluating Exceptions Conclusions What if You Can’t Get a Report? Q & A Agenda

Introduction to SOC Reporting

Three Shades of SOC SOC 1 SOC 2 SOC 3 AKA: SSAE 16 AKA: AT 101 AKA: AT 101, SysTrust Internal Control Over Financial Reporting Operational Controls Trust Services Principles Detailed Report Short Report Restricted Use – Existing Customers & Their Auditors Restricted Use – Existing Customers & Their Auditors, Specified Parties General Use – Often Publicly Available

Types of SOC 1 and SOC 2 Reports Evaluates design of controls only Does not evaluate operating effectiveness Often used for the initial report Point-in-time Type 2 Evaluates design of controls and operating effectiveness Report covers a period of time (minimum 3 months) Included detailed tests of controls

HOW TO IDENTIFY THE SOC REPORT THAT IS   HOW TO IDENTIFY THE SOC REPORT THAT IS RIGHT FOR YOU Will the report be used by your customers and their auditors to plan and perform an audit or integrated audit of your customer’s financial statements?   Yes SOC 1 Report Will the report be used by your customers as part of their compliance with the Sarbanes-Oxley Act or similar law or regulation?     Will the report be used by your customers or stakeholders to gain confidence and place trust in a service organization’s systems?  SOC 2 or 3 Report Do you need to make the report generally available or seal?  Yes SOC 3 Report Do your customers have the need for and ability to understand the details of the processing and controls at a service organization, the tests performed by the service auditor and results of those tests? SOC 2 Report No

SOC 1

SOC 1 Reporting Replaced SAS 70 Fun Facts! Replaced SAS 70 Use when service provider processes or supports financial transactions Service provider specifies control objectives tailored to services provided Two types of controls Transaction processing Supporting IT general controls* * Some service providers may only cover ITGCs in the report

SOC 1 Reporting Report Structure Auditor’s Opinion Management Assertion System Description (including controls) Control Objectives Control Activities Tests of Operating Effectiveness Results of Tests Other Information (if applicable)

SOC 1 Reporting Type 2 reports only Tests of Operating Effectiveness Report Structure Auditor’s Opinion Management Assertion System Description (including controls) Control Objectives Control Activities Tests of Operating Effectiveness Results of Tests Other Information (if applicable) Type 2 reports only

SOC 1 Reporting Report Structure Control Objective #1: New Account Setup and Administration Controls provide reasonable assurance that accounts are established and modified in accordance with client guidelines in a complete, accurate, and timely manner. Control Test Procedures Results of Tests Investment Management Agreements (IMA) and amendments to these agreements are prepared by the Client Services group. All IMAs are approved and signed-off by a Principal. The Chief Compliance Officer (CCO) also reviews the agreements before the account is to be established. Selected a sample of IMAs executed during the audit period and determined if: Each IMA was signed-off by a Principal Evidence of CCO review of agreement We inspected a sample of 25 IMAs executed between 4/1/14 and 3/31/15. All IMAs selected were signed-off by a Principal; however, 2 of 25 did not have evidence of CCO review of the agreement.

SOC 2

SOC 2 Reporting More Fun Facts! Covers controls over Infrastructure, Software, Procedures, People and Data Service provider chooses Trust Services Principles (TSPs) to have in the report Security (aka Common Criteria) Availability* Processing Integrity* Confidentiality* Privacy Each TSP has pre-defined criteria; service providers select controls to meet the criteria * When selecting these TSPs, the Security TSP is also required.

SOC 2 Reporting Report Structure Auditor’s Opinion Management Assertion System Description (including controls) Criteria Control Activities Tests of Operating Effectiveness Results of Tests Other Information (if applicable)

SOC 2 Reporting Type 2 reports only Tests of Operating Effectiveness Report Structure Auditor’s Opinion Management Assertion System Description (including controls) Control Objectives Control Activities Tests of Operating Effectiveness Results of Tests Other Information (if applicable) Type 2 reports only

SOC 2 Reporting Report Structure Criteria Controls Test Procedures Results of Tests CC2.0 Common Criteria Related to Communications CC2.2 The Department’s security, availability, and processing integrity commitments are communicated to external users, as appropriate, and those commitments and the associated system requirements are communicated to internal system users to enable them to carry out their responsibilities. New Department staff are required to sign a statement signifying that they will comply with the security policies. Reviewed the security awareness training report to determine if confirmation with policies was required. No deviation noted. determine if new employees had confirmed compliance with policies. 1 new employee and 1 new contractor of 573 employees/ contractors had not completed security awareness training.

SOC 3

SOC 3 Reporting Covers the same content as a SOC 2 report More Fun Facts! Covers the same content as a SOC 2 report Less detailed system description Does not contain detailed control activities or tests Service providers must meet all tested criteria in order to display the SOC 3 seal

SOC 3 Reporting Report Structure Auditor’s Opinion Management Assertion System Description (including controls) Criteria (referenced)

The TSPs Trust Services Principles

Security/Common Criteria Required for all TSPs except for Privacy Covers seven general areas Organization and Management Communications Risk Management/Design & Implementation of Controls Monitoring of Controls Logical & Physical Access Controls System Operations Change Management

CC1.0 – Common Criteria Related to Organization and Management The entity has defined organizational structures, reporting lines, authorities, and responsibilities for the design, development, implementation, operation, maintenance and monitoring of the system enabling it to meet its commitments and requirements as they relate to [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof]. CC1.2 Responsibility and accountability for designing, developing, implementing, operating, maintaining, monitoring, and approving the entity’s system controls are assigned to individuals within the entity with authority to ensure policies and other system requirements are effectively promulgated and placed in operation. CC1.3 Personnel responsible for designing, developing, implementing, operating, maintaining and monitoring the system affecting [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] have the qualifications and resources to fulfill their responsibilities. CC1.4 The entity has established workforce conduct standards, implemented workforce candidate background screening procedures, and conducts enforcement procedures to enable it to meet its commitments and requirements as they relate to [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof].

CC2.0 – Common Criteria Related to Communications Information regarding the design and operation of the system and its boundaries has been prepared and communicated to authorized internal and external system users to permit users to understand their role in the system and the results of system operation. CC2.2 The entity's [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] commitments are communicated to external users, as appropriate, and those commitments and the associated system requirements are communicated to internal system users to enable them to carry out their responsibilities. CC2.3 The entity communicates the responsibilities of internal and external users and others whose roles affect system operation. CC2.4 Internal and external personnel with responsibility for designing, developing, implementing, operating, maintaining, and monitoring controls, relevant to the [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] of the system, have the information necessary to carry out those responsibilities. CC2.5 Internal and external system users have been provided with information on how to report [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] failures, incidents, concerns, and other complaints to appropriate personnel. CC2.6 System changes that affect internal and external system user responsibilities or the entity's commitments and requirements relevant to [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] are communicated to those users in a timely manner.

CC3.0 – Common Criteria Related to Risk Management and Design and Implementation of Controls The entity (1) identifies potential threats that would impair system [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] commitments and requirements, (2) analyzes the significance of risks associated with the identified threats, and (3) determines mitigation strategies for those risks (including controls and other mitigation strategies). CC3.2 The entity designs, develops, and implements controls, including policies and procedures, to implement its risk mitigation strategy. CC3.3 The entity (1) identifies and assesses changes (for example, environmental, regulatory, and technological changes) that could significantly affect the system of internal control for [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] and reassesses risks and mitigation strategies based on the changes and (2) reassesses the suitability of the design and deployment of control activities based on the operation and monitoring of those activities, and updates them as necessary.

CC4.0 – Common Criteria Related to Monitoring of Controls The design and operating effectiveness of controls are periodically evaluated against [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] commitments and requirements, corrections and other necessary actions relating to identified deficiencies are taken in a timely manner.

CC5.0 – Common Criteria Related to Logical & Physical Access Controls Logical access security software, infrastructure, and architectures have been implemented to support (1) identification and authentication of authorized users; (2) restriction of authorized user access to system components, or portions thereof, authorized by management, including hardware, data, software, mobile devices, output, and offline elements; and (3) prevention and detection of unauthorized access. CC5.2 New internal and external system users are registered and authorized prior to being issued system credentials, and granted the ability to access the system. User system credentials are removed when user access is no longer authorized. CC5.3 Internal and external system users are identified and authenticated when accessing the system components (for example, infrastructure, software, and data). CC5.4 Access to data, software, functions, and other IT resources is authorized and is modified or removed based on roles, responsibilities, or the system design and changes to them. CC5.5 Physical access to facilities housing the system (for example, data centers, backup media storage, and other sensitive locations as well as sensitive system components within those locations) is restricted to authorized personnel. CC5.6 Logical access security measures have been implemented to protect against [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] threats from sources outside the boundaries of the system. CC5.7 The transmission, movement, and removal of information is restricted to authorized users and processes, and is protected during transmission, movement, or removal enabling the entity to meet its commitments and requirements as they relate to [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof]. CC5.8 Controls have been implemented to prevent or detect and act upon the introduction of unauthorized or malicious software.

CC6.0 – Common Criteria Related to System Operations Vulnerabilities of system components to [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] breaches and incidents due to malicious acts, natural disasters, or errors are monitored and evaluated and countermeasures are implemented to compensate for known and new vulnerabilities. CC6.2 [Insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] incidents, including logical and physical security breaches, failures, concerns, and other complaints, are identified, reported to appropriate personnel, and acted on in accordance with established incident response procedures.

CC7.0 – Common Criteria Related to Change Management [Insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] commitments and requirements, are addressed, during the system development lifecycle including design, acquisition, implementation, configuration, testing, modification, and maintenance of system components. CC7.2 Infrastructure, data, software, and procedures are updated as necessary to remain consistent with the system commitments and requirements as they relate to [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof]. CC7.3 Change management processes are initiated when deficiencies in the design or operating effectiveness of controls are identified during system operation and monitoring. CC7.4 Changes to system components are authorized, designed, developed, configured, documented, tested, approved, and implemented in accordance with [insert the principle(s) being reported on: security, availability, processing integrity, or confidentiality or any combination thereof] commitments and requirements.

Additional Criteria for Availability Current processing capacity and usage are maintained, monitored, and evaluated to manage capacity demand and to enable the implementation of additional capacity to help meet availability commitments and requirements. A1.2 Environmental protections, software, data backup processes, and recovery infrastructure are designed, developed, implemented, operated, maintained, and monitored to meet availability commitments and requirements. A1.3 Procedures supporting system recovery in accordance with recovery plans are periodically tested to help meet availability commitments and requirements.

Additional Criteria for Processing Integrity PI1.1 Procedures exist to prevent, detect, and correct processing errors to meet processing integrity commitments and requirements. PI1.2 System inputs are measured and recorded completely, accurately, and timely in accordance with processing integrity commitments and requirements. PI1.3 Data is processed completely, accurately, and timely as authorized in accordance with processing integrity commitments and requirements. PI1.4 Data is stored and maintained completely and accurately for its specified life span in accordance with processing integrity commitments and requirements. PI1.5 System output is complete, accurate, distributed, and retained in accordance with processing integrity commitments and requirements. PI1.6 Modification of data is authorized, using authorized procedures in accordance with processing integrity commitments and requirements.

Additional Criteria for Confidentiality Confidential information is protected during the system design, development, testing, implementation, and change processes in accordance with confidentiality commitments and requirements. C1.2 Confidential information within the boundaries of the system is protected against unauthorized access, use, and disclosure during input, processing, retention, output, and disposition in accordance with confidentiality commitments and requirements. C1.3 Access to confidential information from outside the boundaries of the system and disclosure of confidential information is restricted to authorized parties in accordance with confidentiality commitments and requirements. C1.4 The entity obtains confidentiality commitments that are consistent with the entity’s confidentiality requirements from vendors and other third parties whose products and services comprise part of the system and have access to confidential information. C1.5 Compliance with confidentiality commitments and requirements by vendors and others third parties whose products and services comprise part of the system is assessed on a periodic and as-needed basis and corrective action is taken, if necessary. C1.6 Changes to confidentiality commitments and requirements are communicated to internal and external users, vendors, and other third parties whose products and services are included in the system.

Generally Accepted Privacy Principles (GAPP) Privacy is defined as "the rights and obligations of individuals and organizations with respect to the collection, use, retention, disclosure, and disposal of personal information." Generally Accepted Privacy Principles (GAPP)

Privacy Personal information Sensitive personal information Name Home or e-mail address Identification number (for example, a Social Security or Social Insurance Number) Physical characteristics Consumer purchase history Sensitive personal information Information on medical or health conditions Financial information Racial or ethnic origin Political opinions Religious or philosophical beliefs Trade union membership Sexual preferences Information related to offenses or criminal convictions

Confidentiality “Need-to-know” Transaction details Engineering drawings Business plans Banking information about businesses Inventory availability Bid or ask prices Price lists Legal documents Revenue by client and industry

Generally Accepted Privacy Principles Management. The entity defines, documents, communicates, and assigns accountability for its privacy policies and procedures. Notice. The entity provides notice about its privacy policies and procedures and identifies the purposes for which personal information is collected, used, retained, and disclosed. Choice and consent. The entity describes the choices available to the individual and obtains implicit or explicit consent with respect to the collection, use, and disclosure of personal information.

Generally Accepted Privacy Principles Collection. The entity collects personal information only for the purposes identified in the notice. Use, retention, and disposal. The entity limits the use of personal information to the purposes identified in the notice and for which the individual has provided implicit or explicit consent. The entity retains personal information for only as long as necessary to fulfill the stated purposes or as required by law or regulations and thereafter appropriately disposes of such information. Access. The entity provides individuals with access to their personal information for review and update.

Generally Accepted Privacy Principles Disclosure to third parties. The entity discloses personal information to third parties only for the purposes identified in the notice and with the implicit or explicit consent of the individual. Security for privacy. The entity protects personal information against unauthorized access (both physical and logical). Quality. The entity maintains accurate, complete, and relevant personal information for the purposes identified in the notice. Monitoring and enforcement. The entity monitors compliance with its privacy policies and procedures and has procedures to address privacy related complaints and disputes.

Ch-ch-ch-changes AICPA Exposure Draft released June 15 Integrates Privacy Criteria into Common Criteria/Additional Considerations model Clarifies language Adds retention & disposal requirements to Confidentiality

Let’s Play a Game!

Payroll processing vendor SOC 1 Payroll processing vendor SOC 2/3 Security Availability Processing Integrity Confidentiality Privacy

Data center co-location SOC 1 Data center co-location SOC 2/3 Security Availability Processing Integrity Confidentiality Privacy

SOC 1 SOC 2/3 Security Availability Processing Integrity SaaS-based HR service SOC 2/3 Security Availability Processing Integrity Confidentiality Privacy

Healthcare claims processing SOC 1 Healthcare claims processing SOC 2/3 Security Availability Processing Integrity Confidentiality Privacy

Enterprise file sharing SOC 1 Enterprise file sharing SOC 2/3 Security Availability Processing Integrity Confidentiality Privacy

SOC 1 SOC 2/3 Security Availability Processing Integrity Cloud ERP service SOC 2/3 Security Availability Processing Integrity Confidentiality Privacy

State of Illinois SOC 2 Report

Journal of Urban Affairs Cybersecurity demands are forcing public officials across the globe to focus on two core values that often conflict—transparency (the public good) and privacy (citizen and private sector confidentiality). Susan A. Macmanus Journal of Urban Affairs

SOC Panel

Three Perspectives Service Auditor User Auditor Service Organization

Scoping & Planning

Questions?

Useful Links http://www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/Pages/SOC2 AdditionalSubjectMatter.aspx https://d0.awsstatic.com/whitepapers/compliance/AWS_Auditing_Security_Checkli st.pdf

Sources "Effectively Using SOC 1, SOC 2, and SOC 3 Reports for Increased Assurance over Outsourced Operations." KPMG, LLC, 2012. Web. 2015. <http://www.kpmg.com/US/en/IssuesAndInsights/ArticlesPublications/Documents/SOCWhitepaper.pdf>. "Assurance and Advisory Services." Service Organization Controls (SOC) Reports for Service Organ. Web. 14 Sept. 2015. <http://www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/Pages/ServiceOrganization'sManagement.aspx>. "Assurance and Advisory Services." SOC Reports Information for CPAs. Web. 14 Sept. 2015. <http://www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/Pages/CPAs.aspx>. "Assurance and Advisory Services." Users and User Entities. Web. 14 Sept. 2015. <http://www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/Pages/Users.aspx>. Reporting on Controls at a Service Organization Relevant to Security, Availability, Processing Integrity, Confidentiality or Privacy (SOC 2). Toronto: Chartered Professional Accountants of Canada, 2013. Print. "TSP Exposure Draft." 15 June 2015. Web. 14 Sept. 2015. <http://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/tspc/exposure_draft/ed_tsp_principles.pdf>. Hugelfink, Casey. "David Bowie - Sound and Vision." Flickr. Yahoo! Web. 14 Sept. 2015. <https://www.flickr.com/photos/caseyhugelfink/9396168926/in/photolist-fjiPEw-gn88qC-mbXiS-8Z4kbZ-EeyH-4UaRbh-6wgdtH-5Zn12H-6EPTR9-6EKHSx-6EKJiF-8LUHUv-D2iKQ-9joN5x-kNqKC-gVr4b-gtmxUn-g5ZVi8-658N9X-rdbGDU-PMbjd-buNjQj-s6fuUw-biGLre-rYsh-dZjhZ2-dZjhMr-dZjhYr>. MACMANUS, S. A., CARUSON, K. and MCPHEE, B. D. (2013), CYBERSECURITY AT THE LOCAL GOVERNMENT LEVEL: BALANCING DEMANDS FOR TRANSPARENCY AND PRIVACY RIGHTS. Journal of Urban Affairs, 35: 451–470. doi: 10.1111/j.1467-9906.2012.00640.x "Assurance and Advisory Services." Service Organization Controls (SOC) Reports for Service Organ. Web. 18 Sept. 2015. <http://www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/Pages/ServiceOrganization'sManagement.aspx>.