Chapter 1: 6.9 - Final note about data security Flashcards

(8 cards)

1
Q

What do auditors needs to recognise about client info and working with others?

A

Need to recognise when to disclose info with our without client’s permission and when to take precautions if acting for competing clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As well as being able to recognise when to disclose information with or without clients’ permission and when to take precautions if acting for competing clients, what do auditors also need to understand?

A

Importance of data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must be done in relation to data during the course of an audit?

A

During course of an audit (both internal and external), will be significant amounts of evidence collected which must be stored securely to maintain confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is the evidence likely to be stored in 21st century and why?

A

Increasingly likely to be some kind of electronic or digital storage due to significant advantages of being able to access and share data as part of an efficient audit, sometimes spread across different locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why can shared access data create problems?

A

Cyber threats are becoming more significant and the loss or theft of confidential data can have serious implications for auditors, who must now invest in ongoing cybersecurity controls to ensure they are adequately protected from such threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What doe the implications of loss or theft of confidential data include?

A

Range from losing clients to being fined for non-compliance with data protection legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do examples of suitable cybersecurity controls include? (4)

A
  1. The appointment of qualified IT staff who can implement and support appropriate policies and controls
  2. Investment in suitable IT infrastructure such as firewalls and anti-virus software
  3. Education and awareness of cybersecurity among staff, such as training for staff on neutralising suspicious emails that might contain a cyber threat
  4. Adoption of suitable cybersecurity accreditation, such as ISO 270001
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define cybersecurity and cyberthreats.

A

Awareness of the issues surrounding the use of digital means of storing and accessing confidential client information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly