conducted. If this engagement will not satisfy the requirements of all audit report users, laws, and regulations, we will notify you as soon as this comes to our attention. 1. To determine if adequate administrative security controls, such as policies and procedures, are in place to deter unauthorized access, alteration, theft, or physical damage to utilities or properties. 2. To determine if adequate physical and logical security controls are in place to restrict access by unauthorized users…
Words 1518 - Pages 7