{"id":527,"date":"2004-02-23T00:00:00","date_gmt":"2004-02-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/23\/stuck-in-the-sas-70s\/"},"modified":"2021-12-30T11:37:34","modified_gmt":"2021-12-30T11:37:34","slug":"stuck-in-the-sas-70s","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/23\/stuck-in-the-sas-70s\/","title":{"rendered":"Stuck in the SAS 70s"},"content":{"rendered":"<p>As Sarbanes-Oxley Section 404 meets up with an obscure auditing standard, many companies are thinking hard about offshoring their business processes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A little-known and perhaps largely outdated auditing standard for outsourcers could be the next big hurdle for Sarbanes-Oxley compliance.  The standard in question is Statement on Auditing Standards No. 70, &#8220;Reports on the Processing of Transactions by Service Organizations.&#8221;  Set up by the American Institute of Certified Public Accountants in 1993, SAS 70 spells out how an external auditor should assess the internal controls of an outsourcing service provider and issue an attestation report to outside parties or to a client.<\/p>\n<p>Auditors and other critics of the standard say SAS 70 is in need of a major overhaul, especially considering the June deadline for Section 404 compliance facing many public companies.<\/p>\n<p>Stan Lepeak, vice president of the research firm Meta Group, believes that incompatibilities between SAS 70 and Sarbanes-Oxley will &#8220;dampen outsourcing, at least in the short run, until outsourcers can show that they have both the adequate controls in place [and] evidence to prove that.&#8221;  Tom Eubanks, of IBM business consulting services, isn&#8217;t so sure.  &#8220;On first blush,&#8221; he says, &#8220;one might think, &#8216;Why would you outsource in a world where Sarbox is in place&#8230;and the magnifying glass is on the finance function?&#8217;  &#8221; But what Eubanks and his colleagues are finding, he adds, is that &#8220;companies are looking at outsourcing as a valid way to address some [Sarbanes-Oxley] issues.&#8221;<\/p>\n<p>All in the Timing Under SAS 70, an outsourcing-service provider undergoes an annual audit, performed either by its own independent auditor or by the auditors of its outsourcing clients. There are two types of service-auditor reports.<\/p>\n<p>Type I includes the service auditor&#8217;s opinion on the fairness of the presentation of the provider&#8217;s description of its controls and how well they&#8217;re designed to meet specified control objectives.<\/p>\n<p>Type II reports, generally preferred for their greater depth, include the same data as Type I as well as the auditor&#8217;s opinion on the effectiveness of the controls during the period under review.<\/p>\n<p>More info: http:\/\/www.cfo.com\/article\/1,5309,12161|0|C|1|,00.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-527","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=527"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/527\/revisions"}],"predecessor-version":[{"id":3014,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/527\/revisions\/3014"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}