FY 2007 Annual Report

advertisement
The University of Texas of the Permian Basin
Institutional Compliance Program
Annual Report
For the Year Ended August 31, 2007
Section I – Organizational Matters



Quarterly meetings of the Institutional Compliance Committee were held on November
30, 2006, February 15, 2007, May 17, 2007 and August 23, 2007.
One change in membership on the Institutional Compliance Committee was completed at
the beginning of the fiscal year with the addition of the Director of Information
Resources to a position previously held by a faculty member.
There were no changes in the Compliance staff.
Section II - Risk Assessment, Monitoring Activities and Specialized Training
(Performed by Responsible Party)
High-Risk Area #1: Information Security
Responsible Party: Keith Yarbrough, Director of Information Resources
Key “A” risk(s) identified:



Unauthorized Information disclosure through password access obtained by deceiving
user
Inadequate protection of confidential information including Social Security Numbers
Lack of training on information security
Key Monitoring Activities:



Monitoring of campus network traffic. This monitoring is performed by a network
intrusion detection/prevention system manufactured by Nitro Security. Software in
this system is updated by the vendor as required to insure that the system can detect
and respond to current network threats. Unauthorized software within the UTPB
local area network is identified and responded to by this system. Recently UTPB
purchased additional capabilities in this area. In addition to monitoring network
traffic at additional sensor points, the expanded system also provides essential log
correlation capabilities across multiple network devices. Using these capabilities,
network traffic flows can be traced through multiple network devices. This
capability greatly improves our ability to understand the traffic on our local network.
The network intrusion detection/prevention system is blocking selected network
traffic when that traffic matches certain risk signatures. These risk signatures are
updated on a regular basis to insure current risks are recognized. Logs of these
activities are reviewed daily.
A periodic review of successful logins and unsuccessful logon attempts for the
student information system is conducted. Monitoring revealed several attempts to
penetrate the system from outside the local area network. Consequently, access to
this system from the outside has been restricted at the firewall. Logon attempt
monitoring for this system continues on a routine basis
1
Specialized Training:
A training program is being developed for users that require access to our systems. The
first course will be for users requiring access to the student information system. Potential
users will be required to complete the course and pass a quiz before the user will be given
an account on the system. One section of this training has been incorporated into the
training for faculty use of the student information system.
High-Risk Area #2: Change Control
Responsible Party: Keith Yarbrough, Director of Information Resources
Key “A” risk(s) identified:

Inadequate control over network and server configuration changes
Key Monitoring Activities:
UTPB has a well documented process for monitoring and approving changes to the
student information system environment. However, in the network and Windows server
environment UTPB is still developing the change control process. This environment is
much less homogenous than the student information system environment so that it is
much more difficult to construct and maintain a development environment that accurately
models the production environment. The end result is that changes are made in the
production environment without extensive validation and testing. UT System is in the
process of procuring System-wide licensing for a product called Configuresoft. This
product should provide a set of tools that will greatly facilitate change control for the
Windows server and client environment.
Specialized Training:
Specialized training in the use of the Configuresoft product will be required for selected
technical staff.
High-Risk Area #3: Research
Responsible Party: J. Tillapaugh, Assistant Vice President for Graduate Studies and
Sponsored Research
Key “A” risk(s) identified:



Inadequate training about Federal reporting requirements
Noncompliance with new Federal reporting requirements such as Time and
Effort
Inappropriate use of animal and human subjects, research subjects and materials
Key Monitoring Activities:
A draft Time and Effort Policy to be included in the UTPB Handbook of Operating
Procedures was presented to the Institutional Compliance Committee on November 30,
2006. The Compliance Committee approved the policy at its meeting on February 15,
2007. Time and effort reports submitted by Principal Investigators for the months of
March, April and May were reviewed for accuracy and concerns were discussed with the
investigators and cleared.
2
The Tier II Risk Assessment for Research was completed including additional risk
concerns for effort commitment and certification.
Specialized Training:
The Time and Effort Reporting training program provided by UT System is being
customized to the policy that is currently under consideration. No training was conducted
during FY 2007.
High-Risk Area #4: Animal and Human Subjects Research
Responsible Party: J. Tillapaugh, Assistant Vice President for Graduate Studies and
Sponsored Research
Key “A” risk(s) identified:


Inadequate training about Federal reporting requirements
Inappropriate use of animal and human subjects, research subjects and materials
Key Monitoring Activities:
The human subject research review and approval system continues to function well,
with 129 protocols submitted in the first two quarters of FY 2007. Four were not
completed through the approval process, and forty four were revised for compliance and
final approval. In the last two quarters, there were an additional 135 protocols, one was
not completed and 26 were revised for compliance and final approval. The total for FY
2007 was 264.
Institutional Animal Care and Use has received important attention in the first two
quarters, with the development of revisions in policies and procedures as called for by the
USDA’s Standards and UT System recommendations for compliance. The new
statements proposed by the Institutional Animal Care and Use Committee received
internal approvals. The revised policies and application forms have been posted to two
web sites at UTPB, administrative forms and the Graduate Studies home page.
Monitoring plan activities will be prepared based on the new policies.
Specialized Training:
Investigators must certify that they have received training on the posted federal
guidelines and regulations in order to present a protocol for review and approval. No
additional training was required or conducted during the first and second quarters of FY
2007.
In May, the ex-officio head of the Institutional Review Board (IRB), the chair of the
Institutional Animal Care and Uses Committee (IACUC) and the UTPB lab director
attended a called-U. T. System workshop for training and updates on IRB/IACUC issues.
Presentations were made about accreditation of IACUCs.
3
Section III – Monitoring and Assurance Activities (Performed by Compliance /
Audit Office)
High-Risk Area: Research
Assessment of Control Structure: Significant Opportunity for Enhancement
Monitoring/Assurance Activities Conducted: Audit of UTS163 – Guidance on Effort
Reporting Policies issued in August 2007.
Significant Findings: Recommendations regarding implementation of the required
education and training program and establishment of a monitoring and reporting plan
were considered significant.
High-Risk Area: Information Security
Assessment of Control Structure: Opportunity for Enhancement
1) Assurance Activities in Process: Audit of Confidentiality and Integrity of Digital
Research Data—progress on implementation of BPM 75 / UTS165. Audit report will be
issued in the next fiscal year.
2) Assurance Activities in Process: TAC 202 Audit—compliance with DIR Rules and
Regulations regarding IT Security. Audit report will be issued in the next fiscal year.
High-Risk Area: Inadequate financial information to establish financial position
throughout the year and to close financial records at year end; Bad financial rating status;
Failure to achieve budget assumptions
Assessment of Control Structure: Opportunity for Enhancement
Monitoring/Assurance Activities Conducted: Deloitte & Touche financial audit for
Fiscal Year Ended August 31, 2006.
High-Risk Area: Inappropriate relationships and activities by faculty and staff
Assessment of Control Structure: Opportunity for Enhancement
Monitoring/Assurance Activities Conducted: In response to confidential compliance
reports received as well as identification of inappropriate relationships and activities by
faculty and staff, training for 282 faculty and staff members was conducted by The Office
of General Counsel in October 2006. This represented 88% of the total faculty and staff
of the University.
Section IV – General Compliance Training Activities
The University uses the Training Post computer-based training system for its general compliance
training. All new employees were required to complete twelve training modules for the basic risk
areas. All continuing employees were expected to complete seven modules. For Fiscal Year
2007 the completion rate for all assigned general compliance training modules was 97.1%. This
represented an improvement from the 96.7% completion rate for Fiscal Year 2006.
In addition to the general training, a special mandatory Sexual Harassment training program was
provided by the Office of General Counsel in October 2006. A total of 282 or 88% of the total
faculty and staff of 322 attended the training. General compliance issues were discussed with
several groups including the Athletic Department staff, School of Education and School of
Business faculty and staff and the department heads in the College of Arts and Sciences.
Computer software problems continue to limit the availability of the Training Post modules and
completion reports. Breeze software was purchased to replace the Training Post. Staff turnover
4
in Information Resources resulted in the loss of staff trained to work with Breeze. Alternate
solutions are being considered.
Section V – Action Plan Activities
Action Plan activities that were completed during the year include: final approval and
distribution of revised Standards of Conduct for all university staff; completion of surveys by the
Committee to assess the compliance program and the compliance officers and a self-assessment
survey of the program by the Compliance Officer; completion of individual certification letters by
all budget heads and responsible parties that provide assurances and note exceptions to
compliance activities within each area; review of compliance certification letters; training for
responsible parties of high risk areas on preparation of monitoring plans and required reports;
completion of a campus-wide compliance awareness survey and comparison to previous year
results; approval of a training plan for the 2008 fiscal year; and receipt and review of compliance
inquiry line reports and related issues.
Due to time and staff constraints, action plan items for which completion was deferred to Fiscal
Year 2008 include: final approval by Executive Staff and distribution of the revised Compliance
Manual; receipt and review of monitoring plans and quarterly reports for top risks; completion of
the process of identifying and accumulating information for inclusion in a revised Compliance
Manual for committee members to be used in orienting new committee members and as a
resource for continuing members; completion of the update of the Management Responsibilities
Handbook; completion of a timeline that will incorporate training to be offered throughout the
campus; and continue to update the Compliance web page. Conversion of Training Post to a new
delivery method will occur when the method of delivery is determined.
Section VI – Confidential Reporting
The Institutional Compliance Program provides the following mechanisms for reporting
compliance issues: a confidential “888” hotline, an internal telephone line, and an email address
that may be accessed directly or through the Compliance website. In addition, the Compliance
Officer or Assistant Compliance Officer may be contacted directly. In practice, calls or personal
visits that initially are made to the President or other individuals in the university are transferred
to the Compliance Officer or Assistant Compliance Officer in order to expedite the review and
reporting of the call. Fifty-two compliance inquiries were reported during the 2006-2007 fiscal
year. Two inquiries were by internal hotline, thirteen by regular phone line, two in writing,
twenty-one by email, and fourteen in person. Forty-two inquiries have been resolved and ten are
under continuing review.
The composition of the compliance inquiries was as follows:
Type
Improper Use of University
Property & Resources
Human Resources
Privacy
Miscellaneous
Fiscal Reporting/Audit
Total
Number
% of Total
14
11
4
13
10
52
27 %
21
8
25
19
100%
5
All reports are handled through a three-person triage team comprised of the Compliance Officer,
Assistant Compliance Officer and Director of Human Resources. Five of the issues were referred
to the Office of General Counsel for review. One of the five was considered significant and the
System-wide Compliance Officer was appropriately notified and briefed on the issues and
resolution.
The 2007 Annual Report is submitted by:
_________________________________________________
Christopher R. Forrest, Ph.D.
Compliance Officer
Vice President for Business Affairs
_________________________________________________
W. David Watts, Ph.D.
President
Date Submitted: ___________________________________
6
Download