8 BAB 2 LANDAS AN TEORI 2.1 Evaluasi 2.1.1 Pengertian Evaluasi M enurut Umar (2005, p36), evaluasi adalah suatu proses untuk menyediakan informasi tentang sejauh mana suatu kegiatan tertentu telah dicapai, bagaimana perbedaan pencapaian itu dengan suatu standar tertentu untuk mengetahui apakah ada selisih diantara keduanya, serta bagaimana manfaat yang telah dikerjakan itu bila dibandingkan dengan harapan-harapan yang ingin diperoleh. M enurut Kamus Besar Bahasa Indonesia (2002) evaluasi adalah proses penilaian yang sistematis, mencakup pemberian nilai, atribut, apresiasi, pengenalan permasalahan dan pemberian solusi atas permasalahan yang ditemukan. Dari pengertian di atas maka dapat disimpulkan bahwa evauasi adalah proses untuk memberikan informasi kepada pihak yang terkait tentang pencapaian suatu kegiatan yang dinilai dengan sistematis berdasarkan suatu standar tertentu. 2.2 Sistem Pengendalian Internal 2.2.1 Pengertian Sistem Pengendalian Internal M enurut Gondodiyoto (2003, p.78), sistem pengendalian intern meliputi metode dan kebijakan yang terkoordinasi di dalam perusahaan untuk mengamankan kekayaan perusahaan, menguji ketepatan, ketelitian dan kehandalan catatan atau data akuntansi serta untuk mendorong ditaatinya kebijakan manajemen. Pengertian pengendalian internal menurut The Committee of Sponsoring Organization (COSO) yang dikutip oleh Amin (2000, p.3) dalam bukunya yang berjudul COSO Based Auditing adalah sebagai berikut: “Internal control is process, effected by 9 an entity’s board of director, management, and other personnel designed to provide reasonable assurance regarding achievement of objectives in the following categories: a. Realibility of financial reporting. b. Effectiveness and efficiency of operation. c. Compliance with applicable laws and regulations”. Dari pengertian diatas dapat disimpulkan bahwa sistem pengendalian internal adalah proses yang dapat dipengaruhi manajemen dan karyawan dalam menyediakan secara layak suatu kepastian mengenai prestasi yang diperoleh secara objektif dalam penerapannya tentang bagian laporan keuangan yang dapat dipercaya, diterapkannya efisiensi dan efektivitas dalam kegiatan operasional perusahaan dan diterapkannya peraturan dan hukum yang berlaku agar ditaati oleh semua pihak. 2.2.2 Tujuan Pengendalian Internal M enurut Hall (2001, p.150), “The internal control system is comprised on policies, practices, and procedures employed by the organization to achieve four broad objectives: 1. To safeguard assets of the firm. 2. To ensure the accuracy and reliability of accounting records and information. 3. To promote effeciency in the firm’s operation. 4. To measure compliance with management’s prescribed policies and procedures.” M aksudnya secara umum adalah sistem pengendalian internal merangkum kebijakan, praktik, dan prosedur yang digunakan oleh organisasi untuk mencapai empat tujuan utama, yaitu: 10 1. Untuk menjaga aktiva perusahaan. 2. Untuk memastikan akurasi dan dapat diandalkan catatan dan informasi akuntansi. 3. Untuk mempromosikan efisiensi operasi perusahaan. 4. Untuk mengukur kesesuaian dengan kebijakan dan prosedur yang telah ditetapkan oleh manajemen. M enurut Gondodiyoto (2007, p260), tujuan disusunnya sistem kontrol atau pengendalian intern komputerisasi adalah untuk: 1. M eningkatkan pengamanan (improve safeguard) assets sistem informasi (data/catatan akuntansi (accounting records) yang bersifat logical assets, maupun physical assets seperti hardware, infrastructures, dan sebagainya). 2. M eningkatkan integritas data (improve data integrity), sehingga dengan data yang benar dan konsisten akan dapat dibuat laporan yang benar. 3. M eningkatkan efektivitas sistem (improve system effectiveness). 4. M eningkatkan efisiensi sistem (improve system efficiency). 2.2.3 Elemen-Elemen Pengendalian Internal M enurut Gondodiyoto (2007, p.144-149), pengendalian internal terdiri dari lima unsur atau komponen yang saling berintegrasi, antara lain : 1. Lingkungan Pengendalian (Control Environment) Komponen yang berperan dalam membangun atmosfer (iklim) yang konduktif bagi para karyawan mengenai kesadaran pentingnya kontrol sehingga dapat menciptakan suasana yang dapat membuat karyawan dapat menjalankan dan menyelesaikan tugas kontrol dan tanggung jawabnya masing-masing. 11 2. Penaksiran Resiko (Risk Assessment) M erupakan proses identifikasi dan analisis resiko yang dapat menghambat atau berhubungan dengan pencapaian tujuan perusahaan, serta menentukan cara bagaimana resiko tersebut ditangani. 3. Aktivitas Pengendalian (Control Activities) M erupakan kebijakan dan prosedur yang dirancang untuk memastikan dilaksanakannya kebijakan manajemen dan bahwa resiko sudah diantisipasi dan dapat membantu memastikan bahwa tindakan yang diperlukan untuk penanganan resiko telah dilakukan sesuai dengan apa yang telah direncanakan. 4. Informasi dan Komunikasi (Information and Communication) Komponen ini menjelaskan bahwa sistem informasi sangat penting bagi keberhasilan atau peningkatan untuk operasional organisasi. 5. Pemantauan (Monitoring) M erupakan proses yang menilai kualitas dari kinerja sistem dan internal control dari waktu ke waktu, yang melakukan aktivitas monitoring dan melakukan evaluasi secara terpisah. 2.3 Pengertian Resiko Kata resiko berasal dari bahasa Italia risicare yang dalam Bahasa Inggris artinya to dare, maknanya adalah the action we dare to take wich depends on how free we are to make a choises (Pickett, 2005, p.34). Peltier (2001, p.1) mendefinisikan risk : “the probability that a particular threat will exploit a particular vulnerability.” 12 2.3.1 Jenis-Jenis Resiko M enurut Gondodiyoto (2009, p110-111), dari berbagai sudut pandang, resiko dapat dibedakan dalam beberapa jenis: 1. Resiko Bisnis (Business Risk) Resiko bisinis adalah resiko yang dapat disebabkan oleh fakto-faktor intern maupun ekstern yang berakibat kemungkinan tidak tercapainya tujuan organisasi (business goals atau objective). 2. Resiko Bawaan (Inherent Risks) Resiko bawaan ialah potensi kesalahan atau penyalahgunaan yang melekat pada suatu kegiatan, jika tidak ada pengendalian intern. 3. Resiko Pengendalian (Control Risks) Dalam suatu organisasi yang baik seharusnya sudah ada risks assessment, dan dirancang pengendalian intern secara optimal terhadap setiap potensi resiko. Resiko pengendalian adalah masih adanya resiko meskipun sudah ada pengendalian. 4. Resiko Deteksi (Detection Risks) Resiko deteksi adalah resiko yang terjadi karena prosedur audit yang dilakukan mungkin tidak dapat mendekati adanya error yang cukup materialitas atau adanya kemungkinan fraud. Resiko deteksi mungkin dapat terjadi karena auditor ternyata dalam prosedur auditnya tidak dapat mendeteksi terjadinya existing control failures (sistem pengendalian intern yang ternyata tidak berjalan dengan baik). 13 2.4 Pengertian Sistem Hall (2006) mendefinisikan, “Sistem adalah sekelompok dua atau lebih komponen-komponen yang saling berkaitan (interrelated) atau subsistem –subsistem yang saling bersatu untuk mencapai tujuan yang sama (common purpose)”.(h.5) O’Brien (2005) menyatakan, “Sistem adalah sekelompok komponen yang saling berhubungan, bekerja sama untuk mencapai tujuan bersama dengan menerima input serta menghasilkan output dalam proses transformasi yang teratur.”(h.29). Jadi dapat disimpulkan bahwa sistem adalah kumpulan dari komponenkomponen yang saling berhubungan satu dengan yang lainnya membentuk satu kesatuan untuk mencapai tujuan tertentu. 2.5 Pengertian Informasi M cleod yang diterjemahkan oleh Hendra (2007) mendefinis ikan, “Informasi adalah data yang telah diproses atau data yang memiliki arti” (h.15). M cLeod (2004) menyatakan, ”information is processed data that is meaningful it usually tells the user something that she or he did not already know.” (p.10). (informasi adalah data yang diproses yang biasanya memberitahukan kepada user sesuatu yang tidak mereka ketahui). Jadi dapat disimpulkan bahwa informasi adalah data yang sudah diproses atau sudah mempunyai arti dan berguna untuk pengguna khusus. M enurut Hall (2006) menuliskan bahwa informasi dapat berupa dokumen operasional seperti pesanan penjualan, suatu laporan yang terstruktur, atau pesan di layar komputer. Tanpa memperhatikan bentuk fisiknya, informasi yang berguna memiliki karakteristik seperti berikut : 14 1. Akurat Informasi harus bebas dari kesalahan yang sifatnya material. Namun demikian, materialitas merupakan suatu konsep yang sulit dikuantifasikan. M aterialitas tidak memiliki nilai yang absolute, ia merupakan konsep masalah spesifik (problem-specifik concept). Kita kadang-kadang harus mengorbankan keakuratan yang absolute untuk memperoleh informasi yang tepat waktu. Sering kali, informasi yang sempurna tidak dapat disediakan dalam kerangka waktu keputusan pemakai. Oleh karena itu, dalam menyiapkan informasi, para desainer sistem mencari keseimbangan antara informasi seakurat mungkin, tetapi tetap cukup waktu, agar berguna. 2. Lengkap Tidak boleh ada bagian informasi yang essential bagi pengambilan keputusan atau pelaksanaan tugas yang hilang. 3. Umpan Balik Isi sebuah laporan atau dokumen harus melayani suatu tujuan. Dengan demikian, laporan ini dapat mendukung keputusan manajer atau tugas petugas administrasi. Kita telah menentukan bahwa hanya ada data yang relevan dengan tindakan pemakai yang memiliki kandungan informasi. Oleh karena itu, sistem informasi harus menyajikan hanya data yang relevan dalam laporannya. Laporan yang berisi data tidak relevan hanya memboroskan sumber daya dan tidak produktif bagi pemakai. Data yang tidak relevan mengurangi perhatian dari pesan laporan yang sebenarnya dan dapat menghasilkan keputusan atau tindakan yang tidak benar. 15 4. Tepat Waktu Umur informasi merupakan faktor yang kritikal dalam menentukan kegunaannya. Informasi harus tidak lebih tua dari periode waktu tindakan yang didukungnya. M isalnya, jika seorang manajer melakukan keputusan setiap hari untuk membeli persediaan dari pemasok berdasarkan status laporan persediaan, maka informasi dalam laporan itu harus berumur tidak lebih dari sehari. 5. Rangkuman Informasi harus bebas dari kesalahan yang sifatnya material agar sesuai dengan kebutuhan pemakai. M anajer tingkat lebih rendah cenderung memerlukan informasi yang sangat rinci. Semakin arus informasi mengalir ke atas melalui organisasi kemanajemen tingkat atas, semakin ia dirangkumkan. 2.6 Pengertian Sistem Informasi M enurut Gondodiyoto (2007, p.112), menyatakan bahwa sistem informasi masih dapat didefinisikan sebagai kumpulan elemen-elemen atau sumber daya dan jaringan prosedur yang saling berkaitan secara terpadu, terintegrasi dalam suatu hubungan hierarki tertentu, dan bertujuan untuk mengolah data menjadi informasi. M enurut O’Brien (2008, p.7), mendefinisikan, “Information system can be any organized combination of people, hardware, software, communication networks, and data resource that collect, transform, disseminates information in an organization”. Dengan demikian “ Sistem informasi adalah suatu kesatuan yang terdiri dari manusia (brainware), perangkat keras (hardware), perangkat lunak (software), jaringan 16 komputer, dan sumber daya data yang mengumpulkan, mentransformasikan dan mendistribusikan informasi di dalam suatu organisasi ”. M enurut whitten et al (2004, P12), “ information system is an arrangement of people, data process, data, processes, and information technology that interact to collect, proses, store and provide as output the information needed to support an organization “. Dengan demikian, sistem informasi merupakan suatu pengturan dari orang-orang, data, proses dan teknologi informasi yang saling berinteraksi untuk mengumpulkan, memproses, menyimpan dan menyediakan kebutuhan informasi untuk mendukung organisasi. M enurut Laudon ( 2004, P8), “ information system can be defined technically as a set of interrelated components that collect ( or retrieve ), process, store and distribute information to support decision making, coordination, and control in an organization “. Dengan demikian, sistem informasi adalah komponen-komponen yang saling berhubungan dan bekerja sama untuk mengumpulkan, memproses, menyimpan dan mendistribusikan informasi untuk mendukung pengambilan keputusan, koordinasi dan pengendalian pada organisasi. Dari pengertian sistem informasi diatas, maka ditarik kesimpulan bahwa sistem informasi adalah suatu kesatuan berbagai komponen yang diproses untuk menghasilkan informasi yang berguna bagi perusahaan dalam mencapai sasaran dan tujuannya. 2.6.1 Tujuan Sistem Informasi Tujuan sistem informasi menurut Hall (2001, p.18) dibedakan atas tiga tujuan umum bagi semua sistem, yaitu: 17 1. Untuk mendukung fungsi kepengurusan (stewardship) manajemen. Kepengurusan yang merujuk ke tanggung jawab manajemen untuk mengatur sumber daya perusahaan secara benar. 2. Untuk mendukung pengambilan keputusan manajemen. Sistem informasi menyediakan para manajer informasi yang mereka butuhkan untuk melakukan tanggung jawab pengambilan keputusan. 3. Untuk mendukung kegiatan operasi perusahaan. Sistem informasi menyediakan informasi bagi personal operasi untuk membantu kegiatan operasi perusahaan secara efesien dan efektif. 2.6.2 Komponen S istem Informasi M enurut Hall yang dikutip oleh Gondodiyoto (2003, p.22-23), ada tiga jenis syarat yang harus dipatuhi agar suatu informasi dapat dikatakan mempunyai kualitas yang tinggi, yaitu: 1. Akurat Artinya informasi harus bebas dari kesalahan-kesalahan dan harus jelas mencerminkan maksudnya sehingga tidak menimbulkan banyak gangguan yang dapat merubah dan merusak informasi. 2. Tepat Waktu Artinya informasi yang datang pada penerima tidak boleh terlambat. Sebab informasi yang terlambat menjadi tidak bernilai lagi karena informasi yang terlambat menjadi tidak bernilai lagi karena informasi merupakan landasan di dalam melakukan pengambilan keputusan. 3. Relevan Artinya informasi tersebut harus mempunyai manfaat bagi para pemakai. 18 2.7 Audit Sistem Informasi 2.7.1 Pengertian Audit Sistem Informasi. M enurut Gondodiyoto (2003, p151)), audit sistem informasi merupakan suatu pengevaluasian untuk mengetahui bagaimana tingkat kesesuaian antara aplikasi sistem informasi dengan prosedur yang telah telah ditetapkan dan mengetahui apakah suatu sistem informasi telah didesain dan diimplementasikan secara efektif, efisien, dan ekonomis, memiliki mekanisme pengamanan asset yang memadai, serta menjamin integritas data yang memadai. Sedangkan menurut Rommey dan Steinbart (2003, p321), audit sistem informasi mengkaji ulang pengendalian sistem informasi akuntansi untuk menilai pemenuhannya dengan kebijakan dan prosedur pengendalian internal dan keefektifan perlindungan terhadap aset. M enurut Alberts dan Dorofee (2003, p.6), “Information systems audit are independent appraisals of a company’s internal control to assure management, regulatory authorities, and company shareholders that information is accurate and valid”. Audit sistem informasi adalah penilaian independen atas pengendalian internal suatu perusahaan yang dilakukan untuk meyakinkan pihak manajemen, pemerintah dan para pemegang saham bahwa informasi yang ada adalah akurat dan benar. O’brien (2003) menyatakan, “information systemscan be any organized combination of people, hardware, software, communications networks, and data resource that collects, organization.”(p.7). transforms, (Sistem and informasi disseminates dapat information diorganisasikan in an dengan mengkombinasikan manusia, hardware, software, jaringan komunikasi dan sumber daya 19 data dimana informasi dikumpulkan, ditransformasikan dan disebarkan dalam organisasi). M engacu pada pendapat Turban, Rainer, Potter (2003) Sistem Informasi adalah mengumpulkan, memproses, menyimpan, meneliti, dan menghamburkan informasi untuk suatu tujuan spesifik yang memproses masukan dan menghasilkan keluaran yang dikirim kepada pemakai atau kepada sistem itu sendiri. M enurut pengertian diatas maka dapat disimpulkan bahwa Audit Sistem Informasi adalah suatu proses mengumpulkan dan mengevaluasi bukti-bukti untuk mengetahui apakah sistem aplikasi sudah menerapkan pengendalian intern yang memadai agar dapat dilindungi dengan baik dan terhindar dari penyalahgunaan. 2.7.2 Tujuan Audit Sistem Informasi M enurut Romney dan Steinbart (2006, p.316), “ The purpose of an information system audit is to review and evaluate the internal control that protect the system”. Tujuan dari audit sistem informasi adalah untuk mengkaji ulang dan mengevaluasi pengendalian-pengendalian intern yang diterapkan untuk melindungi sistem yang ada. M enurut Webber (1999) yang dikutip oleh Gondodiyoto (2007, p474-475), tujuan audit teknologi informasi (audit objectives) lebih ditekankan pada beberapa aspek penting, yaitu pemeriksaan dilakukan untuk dapat menilai: (a) apakah sistem komputerisasi suatu organisasi atau perusahaan dapat mendukung pengamanan aset (assets safeguarding), (b) apakah sistem komputerisasi dapat mendukung pencapaian tujuan organisasi/perusahaan (systems effectiveness), (c) apakah sistem komputerisasi tersebut sudah memanfaatkan sumber daya secara efisien (efficiency), dan (d) apakah terjamin konsistensi dan keakuratan datanya (data integrity). 20 1. Pengamanan Aset Aset informasi suatu perusahaan seperti perangkat keras (hardware), perangkat lunak (software), sumber daya manusia, file atau data dan fasilitas lain harus dijaga dengan sistem pengendalian intern yang baik agar tidak terjadi penyalahgunaan aset perusahaan. 2. Efektivitas Sistem Efektivitas sistem informasi perusahaan memiliki peranan penting dalam proses pengambilan keputusan. Suatu sistem informasi dapat dikatakan efektif bila sistem informasi tersebut telah dirancang dengan benar, telah sesuai dengan kebutuhan user. Informasi yang dibutuhkan oleh para manajer dapat dipenuhi dengan baik. 3. Efisiensi Sistem Efisiensi menjadi sangat penting ketika sumber daya kapasitasnya terbatas. Jika cara kerja dari sistem aplikasi komputer menurun maka pihak manajemen harus mengevaluasi apakah efisiensi sistem masih memadai atau harus menambah sumber daya, karena suatu sistem dapat dikatakan efisien jika sistem informasi dapat memenuhi kebutuhan user dengan sumber daya informasi yang minimal. 4. Ketersediaan (Availability) Berhubungan dengan ketersediaan dukungan/layanan teknologi informasi (TI). TI hendaknya dapat mendukung secara kontinyu terhadap proses bisnis (kegiatan perusahaan). M akin sering terjadi gangguan (sistem down) maka berarti tingkat ketersediaan sistem rendah. 21 5. Kerahasiaan (Confidentiality) Fokusnya ialah pada proteksi terhadap informasi agar terlindungi dari akses pihak-pihak yang tidak berwenang. 6. Kehandalan (Reliability) Berhubungan dengan kesesuaian dan keakuratan bagi manajemen dalam pengelolaan organisasi, pelaporan dan pertanggungjawaban. 7. M enjaga Integritas Data Integritas data (data integrity) adalah salah satu konsep dasar sistem informasi. Data memiliki atribut-atribut seperti: kelengkapan, kebenaran, dan keakuratan. Jika integritas data tidak terpelihara, maka suatu perusahaan tidak akan lagi memiliki informasi atau laporan yang benar, bahkan perusahaan dapat menderita kerugian karena pengawasan tidak tepat atau keputusan-keputusan yang salah. 2.7.3 Metode Audit M etode audit yang digunakan, dibagi menjadi : 1. M etode auditing around the computer M enurut Purnomo (2004,p37), dalam audit around the computer auditor hanya memeriksa masukan dan keluaran saja tanpa memeriksa lebih dalam terhadap penggunaan program. 2. M etode auditing through the computer M enurut Purnomo(2004,p38) audit through the computer adalah pelaksanaan EDP audit, dimana auditor selain memeriksa data masukan dan keluaran juga melakukan uji coba proses pada komputer, sehingga auditor tersebut merasakan sendiri langkah demi langkah pelaksanaan komputerisasi, serta mengetahui bagaimana proses yang dilakukan melalui program tersebut. 22 3. M etode auditing with the computer M enurut Gondodiyoto (2003, p155) auditing with the computer adalah merupakan suatu pendekatan audit dengan bantuan komputer, dimana prosedur auditnya dapat dilaksanakan dengan beberapa cara yaitu : a. M emproses atau melakukan pengujian dengan sistem komputer klien itu sendiri sebagai bagian dari pengujian pengendalian. b. M enggunakan komputer untuk melaksanakan tugas audit yang terpisah dari catatan klien, yaitu copy data atau file untuk dites dengan komputer lain. c. M enggunakan komputer sebagai alat bantu dalam audit, menyangkut: 1. Dalam pengujian program atau file yang dipergunakan dan dimiliki oleh perusahaan ( sebagai software bantu audit ) 2. M enggunakan komputer untuk dukungan kegiatan audit, misalnya untuk administrasi dan surat menyurat. Kelemahan utama sistem audit berbasis komputer yang digeneralisasi adalah upaya dan biaya pengembangannya tentu relative besar dan mungkin memerlukan keahlian teknis yang memadai. Dari ketiga metode audit diatas dapat disimpulkan bahwa metode around the computer dan through the computer yang paling banyak digunakan pada saat dilakukannya audit sistem informasi karena biaya yang dibutuhkan relative lebih murah dibandingkan dengan metode with the computer. 23 2.7.4 Tahapan Audit Tabel 2.1 Tahapan Audit (Sumber: Gondodiyoto (2007, p487) yang mengutip dari CIS A Review Manual (2003, p35)) Tahapan Audit Subjek Audit Sasaran Audit Jangkauan Audit Rencana Pre-audit Prosedur audit dan langkah-langkah pengumpulan bukti audit Prosedur untuk evaluasi Pelaporan hasil audit 2.7.5 Tentukan/identifikasi unit/lokasi yang diaudit Tentukan sistem secara spesi fik, fungsi atau unit organisasi yang akan diperiksa Identi fikasi sistem secara spesi fik, fungsi at au unit organisasi untuk dimasukkan lingkup pemeriksaan 1. Identi fikasi kebutuhan keahlian teknik dan sumber daya yang diperlukan untuk audit. 2. Identi fikasi sumber bukti untuk tes atau review seperti fungsi flow chart, kebijakan, standard prosedur dan kert as kerja audit sebelumnya. 1. Identi fikasi dan pilih pendekatan audit untuk m emeriksa dan menguji pengendalian intern. 2. Identi fikasi daftar individu untuk interview. 3. Identi fikasi dan menghasilkan kebijakan yang berhubungan dengan bagian, standar dan pedoman untuk interview. 4. Mengembangkan instrument audit dan m etodologi penelitian dan pemeriksaan kontrol internal 1. Organisasikan sesuai kondisi dan situasi. 2. Identi fikasi prosedur evaluasi atas tes efektivitas dan efisiensi sistem, evaluasi kekuatan dari dokum en, kebijakan dan pros edur yang diaudit Siapkan laporan yang objekti f, konstruktif (bersi fat membangun) dan menampung penjelasan auditee. Pendekatan Audit Sistem Informasi M enurut Gondodiyoto (2007, p451), Auditor harus memutuskan pendekatan mana yang akan ditempuh, diantara tiga pendekatan audit yang berkaitan dengan komputer: 1. Audit di sekitar (input/output) komputer (audit around the computer) Dalam pendekatan audit di sekitar komputer, auditor (dalam hal ini harus akuntan yang registered, dan bersertifikasi akuntan publik) dapat mengambil kesimpulan dan merumuskan opini dengan hanya menelaah struktur 24 pengendalian dan melaksanakan pengujian transaksi dan prosedur verifikasi saldo perkiraan dengan cara sama seperti pada sistem akuntansi manual. Auditor tidak perlu menguji pengendalian SI berbasis teknologi informasi klien (file program atau pengendalian atas file atau data di komputer), melainkan cukup terhadap input (dokumen) serta output (laporan) sistem aplikasi saja. Keunggulan metode audit di sekitar komputer adalah: a. Pelaksanaan audit lebih sederhana b. Auditor yang memiliki pengetahuan minimal di bidang komputer dapat dilatih dengan mudah untuk melaksanakan audit. Kelemahannya adalah jika kondisi (user requirements) berubah, mungkin sistem itupun perlu diredesain dan perlu penyesuaian (update) program-program, bahkan mungkin struktur data, sehingga auditor perlu menilai ulang apakah sistem masih berjalan baik. 2. Audit terhadap komputer (audit through the computer) Dalam pendekatan audit ke sistem komputer (audit through the computer) auditor melakukan pemeriksaan langsung terhadap program-program dan file-file komputer pada audit SI berbasis TI. Auditor menggunakan komputer (software bantu) atau dengan cek logika atau listing program untuk menguji logika program dalam rangka pengujian pengendalian yang ada pada komputer. Selain itu auditor juga dapat meminta penjelasan dari para teknisi komputer mengenai spesifikasi sistem dan atau program yang diaudit. 25 Keunggulan pendekatan audit dengan pemeriksaan sistem komputerisasi ialah: a. Auditor memperoleh kemampuan yang besar dan efektif dalam melakukan pengujian terhadap sistem komputer. b. Auditor akan merasa lebih yakin terhadap kebenaran hasil kerjanya. c. Auditor dapat menilai kemampuan sistem komputer tersebut untuk menghadapi perubahan lingkungan. Sebetulnya mungkin tidak dapat dikatakan sebagai suatu kelemahan dalam pendekatan audit ini, namun jelas bahwa audit through the computer memerlukan tenaga ahli auditor yang terampil dalam pengetahuan teknologi informasi, dan mungkin perlu biaya yang besar pula. 3. Audit menggunakan dukungan komputer (audit with the computer) Pada pendekatan ini audit dilakukan dengan menggunakan komputer dan software untuk mengotomatisasi prosedur pelaksanaan audit. Pendekatan audit dengan bantuan komputer merupakan cara audit yang sangat bermanfaat, khususnya dalam pengujian substantif atas file dan record perusahaan. Software audit yang digunakan merupakan program komputer yang dipakai auditor untuk membantu pengujian dan evaluasi keandalan record atau data perusahaan. Keunggulan menggunakan pendekatan ini adalah: a. M erupakan program komputer yang diproses untuk membantu pengujian pengendalian sistem komputer klien itu sendiri. b. Dapat melaksanakan tugas audit yang terpisah dari catatan klien, yaitu dengan mengambil copy data atau file untuk dites dengan komputer lain. Kelemahannya adalah upaya dan biaya untuk pengembangan relatif besar. 26 2.7.6 Jenis Audit Sistem Informasi M enurut Gondodiyoto (2007, p443-446), sesungguhnya audit SI berbasis teknologi informasi dapat digolongkan dalam tipe atau jenis-jenis pemeriksaan : 1. Audit laporan keuangan (general audit on financial statements) Dalam hal ini audit terhadap aspek-aspek teknologi informasi pada suatu sistem informasi akuntansi berbasis teknologi adalah dilaksanakan dalam rangka audit keuangan (general financial audit) yang sistem akuntansinya berbasis komputer (sering disebut audit teknologi informasi). Audit objectives-nya adalah sama dengan audit tradisional, yaitu memeriksa kesesuaian financial statements dengan standar akuntansi keuangan dan ada atau tidak adanya salah saji material pada laporan keuangan. 2. Audit sistem informasi (SI) sebagai kegiatan tersendiri, terpisah dari audit keuangan. Sebetulnya audit SI pada hakekatnya merupakan salah satu dari bentuk audit operasional, tetapi kini audit SI sudah dikenal sebagai satu satuan jenis audit tersendiri yang tujuan utamanya lebih untuk meningkatkan IT governance. Jadi dapat disimpulkan bahwa pengertian audit SI dapat dikelompokkan dalam dua tipe, yaitu : audit SI akuntansi berbasis teknologi informasi yang merupakan bagian dari kegiatan audit atau pemeriksaan laporan keuangan (general financial audit). Di pihak lain audit SI juga dapat dikategorikan sebagai jenis audit operasional, khususnya kalau pemeriksaan yang dilakukan adalah dalam rangka penilaian terhadap kinerja unit fungsional atau fungsi sistem informasi (pusat/instalasi komputer), atau untuk mengevaluasi sistem-sistem aplikasi yang telah diimplementasikan pada suatu organisasi (general information systems review), untuk memeriksa keterandalan sistem-sistem 27 aplikasi komputer tertentu yang sedang dikembangkan (system development) maupun yang sudah dioperasikan (post implementation audit). 2.8 CobIT Standar merupakan pedoman bagi auditor dalam menjalankan tanggungjawab profesionalnya. Standar-standar ini meliputi pertimbangan mengenai kualitas profesional mereka, seperti keahlian dan independensi, persyaratan pelaporan dan bahan bukti. Dalam audit sistem informasi, penulis menggunakan standar CobIT (Control Objectives for Information and Related Technology) yang dikembangkan oleh IT Governance Institute kemudian dipiblikasikan oleh ISACA (Information Audit and Control Association). ISACA merupakan sebuah asosiasi profesional dalam audit sistem informasi, pengendalian, keamanan dan governance. ISACA yang beranggotakan auditor sistem informasi internasional mempunyai fungsi sebagai sumber informasi, pihak yang memberikan panduan-panduan praktek bagi auditor sistem informasi serta menyediakan standar, panduan (guidelines), dan prosedur dalam hal audit, pengendalian dan keamanan sistem informasi oleh para profesional audit sistem informasi di seluruh dunia. Kredit mempunyai fungsi yang unik. M enurut muchdarsyah (2000:173), secara singkat fungsi kredit adalah: a. meningkatkan daya guna dari uang, b. meningkatkan daya guna dari barang, c. meningkatkan peredaran dan lalu lintas uang, d. sebagai salah satu alat stabilisasi ekonomi e. menimbulkan kegairahan berusaha masyarakat, 28 f. sebagai jembatan untuk mempercepat dan meningkatkan pendapatan nasional, dan g. sebagai alat untuk meningkatkan hubungan ekonomi dan perdagangan internasional. 2.8.1 Pengertian CobIT M enurut Gondodiyoto (2009, p161&163), CobIT adalah merupakan a set of best practices (framework) bagi pengelolaan teknologi informasi (IT management). CobIT adalah sekumpulan dokumentasi best practices untuk IT governance yang dapat membantu auditor, pengguna (user), dan manajemen, untuk menjembatani gap antara risiko bisnis, kebutuhan kontrol dan masalah-masalah teknis TI. 2.8.2 Manfaat CobIT CobIT bermanfaat bagi auditor, IT users, manager yaitu: a. Bagi Auditor, karena merupakan teknik yang dapat membantu dalam identifikasi IT controls issues. b. Bagi IT users, karena memperoleh keyakinan atas kehandalan sistem aplikasi yang dipergunakan. c. Bagi Manager, memperoleh manfaat dalam keputusan investasi di bidang TI serta infrastrukturnya, menyusun strategic IT Plan, menentukan information architecture, dan keputusan atas procurement (pengadaan atau pembelian) mesin. 29 2.8.3 Kriteria Kerja CobIT Table 2.2 Kriteria Kerja CobIT Efekti fitas Untuk memperoleh inform asi yang relevan dan berhubungan dengan proses bisnis seperti penyampaian inform asi dengan benar, konsisten, dapat dipercaya dan tepat waktu. Efisiensi Memfokuskan pada ketentuan informasi melalui penggunaan sumber daya yang optimal. Kerahasiaan Mempfokuskan prot eksi terhadap inform asi yang penting dari orang yang tidak memiliki hak otorisasi. Integritas Berhubungan dengan keakuratan dan kelengkapan informasi sebagai kebenaran yang sesuai dengan harapan dan nilai bisnis. Keters ediaan Berhubungan dengan informasi yang ters edia ketika diperlukan dalam proses bisnis sekarang dan yang akan datang. Kepatuhan Sesuai menurut hukum, peraturan dan rancana perjanjian untuk pros es bisnis. Keakuratan Informasi Berhubungan dengan ketentuan kecocokan informasi untuk manajem en mengoperasikan entitas dan mengatur pelatihan keuangan dan kelengkapan laporan pert anggung jawaban. Sumber (CobIT Framework, 2003) 2.8.4 Produk CobIT Di dalam IT Governance Institute (2007, p7), produk CobIT meliputi: 1. Board Briefing on IT Governance, 2nd Edition—Helps executive understand why IT Governance is important, what its issues are and what their responsibility is for managing it. 2. Management guidelines atau maturity models—Help assign responsibility, measure performance, and benchmark and address gaps in capability. 3. Frameworks—Organize IT governance objectives and good practices by IT domains and processes, and link them to business requirements. 4. Control objectives—Provide a complete set of high-level requirements to be considered by management for effective control of each IT process. 5. ® ™ nd IT Governance Implementation Guide: Using CobIT and Val IT , 2 Edition— Provides a generic road map for implementing IT governance using the CobIT and Val IT™ resources. 30 6. ® CobIT Control Practices: Guidance to Achieve Control Objectives for Succesfull nd IT Governance, 2 Edition—Provides guidance on why controls are worth implementing and how to implement them. 7. IT Assurance Guide: Using CobIT®—Provides guidance on how CobIT can be used to support a variety of assurance activity together with suggested testing steps for all the IT processes and control objectives. 2.8.5 domain CobIT CobIT Framework mencakup tujuan pengendalian yang terdiri dari 4 domain yaitu : 1. Perencanaan & Organisasi (Planning & Organization) Yaitu mencakup pembahasan tentang identifikasi dan strategi investasi TI yang dapat memberikan yang terbaik untuk mendukung pencapaian tujuan bisnis. Selanjutnya identifikasi dan visi strategi perlu direncanakan, dikomunikasikan, dan diatur pelaksanaanya (dari bebagai persepektif). 2. Perolehan dan Implementasi (Acquisition and Implementation) Yaitu untuk merealisasikan strategi TI, perlu diatur kebutuhan TI, diidentifikasi, dikembangkan, atau diimplementasikan secara terpadu dalam proses bisnis perusahaan 3. Penyerahan dan Pendukung (delivery and support) Domain ini lebih dipusatkan pada ukuran tentang aspek ukuran tentang aspek dukungan TI terhadap kegiatan operasioanl bisnis (tingkat jasa layanan TI aktual atau service level) dan aspek urutan (prioritas implementasi dan untuk pelatihannya). 4. Monitoring Yaitu semua proses TI yang perlu dinilai secara berkala agar kualitas dan tujuan dukungan TI tercapai, dan kelengkapannya berdasarkan pada syarat kontrol intenal yang baik. 31 Tabel 2.3 Domain & High Level Controls CobIT CobIT Domain High Level Objectives 1. Plan and Organize 1. Define a strategic IT Plan and direction 2. Define the information architecture 3. Define technological direction 4. Define IT processes, organization and relationship 5. Manage the IT investment 6. Communicate management aim and direction 7. Manage IT human resources 8. Manage Quality 9. Assess and manage IT risks 10. Manage projects 2. Acquire and Implement 1. 2. 3. 4. 5. 6. 7. Identify automated solutions Acquire and maintain application software Acquire and maintain technology infrastructure Enable operation and use Procure IT resource Manage Changes Install and accredit solutions and changes 3. Deliver and Support 1. 2. 3. 4. Define and manage service levels Manage third-party services Manage performance and capacity Ensure continuous service CobIT Domain High Level Objectives 3. Deliver and Support 5. Ensure systems security 6. Identify and allocate costs 7. Educate and train users 8. Manage service desk and incidents 9. Manage the configuration 10. Manage problems 11. Manage data 12. Manage the physycal environment 13. Manage operation 4. Monitor and Evaluate 1. 2. 3. 4. Monitor and evaluate IT process Monitor and evaluate internal control Ensure regulatory compliance Provide IT Governance Sumber: Gondodiyoto (2007, p.160) 32 Dalam bentuk gambar, hubungan antara Business Objectives, IT Governance, Information, IT Resources, 4 Domains, dan 34 High-level Control Objectives adalah sebagai berikut : Gambar 2.1 CobIT Processes Defined Within The Four Domain Sumber : ITGI-CobIT 4.1th edition (2007, p26) BUSINEGambar ini adalah sama (tetapi dengan diagram atau cara penggambaran lain) dengan gambar terakhir uraian CobIT. 4 domains dan 34 high-level control objectives 33 tersebut menyangkut seluruh sumber daya informasi (IT resources), yaitu orang (people, user maupun brainware teknisi TI lainnya), aplikasi TI, teknologi, fasilitas dan infrastruktur lainnya dan data untuk menuju ke ukuran atau kriteria IT governance seperti gambar yang terdapat pada lampiran. CobIT diharapkan dapat membantu menemukan berbagai macam kebutuhan manajemen berkaitan dengan teknologi informasi, membantu mengoptimalkan investasi teknologi informasi, dan menyediakan ukuran (kriteria) ketika terjadi penyelewengan atau penyimpangan serta dapat diterapkan dan diterima sebagai standar teknologi informasi dan praktek kendali untuk mendukung kebutuhan manajemen dalam menentukan dan memantau tingkatan yang sesuai dengan keamanan dan kendali perusahaan mereka. 2.8.6 Control COBIT 2.8.6.1 Appendix I Tables Linking Goals and Processes This appendix provides a global view of how generic business goals relate to IT goals, the IT processes and information criteria. There are three tables: a. The first table maps the business goals, organized according to a balanced scorecard, to the IT goals and information criteria. This helps show, for a given generic business goal, the IT goalsthat typically support this goal and the COBIT information criteria that relate to the business goal. The set of 17 business goals should not be regarded as a complete set of possible business goals; it is a selection of relevant business goals that can have a clear impact on IT (ITrelated business goals). b. The second table maps the IT goals to COBIT’s IT processes and the information criteria on which the IT goal is based. c. The third table provides a reserve mapping showing for each IT process the IT goals that are supported. The tables help demonstrate the scope of CobiT and the overall business relationship between COBIT and business drivers, enabling typical IT-related business goals to be mapped via IT goals to the IT processes needed to support them. The tables are based on generic goals and, therefore, should be used as a guide and tailored for a specific enterprise. 34 Gambar 2.2 CobIT Linking IT Goals to IT Processes Sumber : ITGI-CobIT 4.1th edition (2007,p.170) 35 Gambar 2.3 CobIT Linking Business Goals To IT Goals Sumber : ITGI-CobIT 4.1th edition (2007,p.169) Gambar 2.4 CobIT Reserve Mapping S howing for Each IT Process the IT Goals Sumber : ITGI-CobIT 4.1th edition (200 36 2.8.6.2 Appendix II Mapping IT Processes IT Governace Focus Areas, COSO, COBIT IT Resources and COBIT Information Criteria This appendix provides a mapping between the COBIT IT processes and the five IT governance focus areas, the components of COSO, IT resources and the information criteria. The table also provides a relative importance indicator (high, medium, low) based on benchmarking via COBIT online. This matrix demonstrates on one page and at a high level how the COBIT framework addresses IT governance and COSO requirements, and shows the relationship between IT processes and the IT resources and information criteria. P is used when there is a primary relation and S when there is only a secondary relation. No P or S does not mean that there is no relation, only that it is less important, or marginal. The importance values are based on a survey and the opinions of experts, and are provided only as a guide. Users should consider what processes are important within their own organizations. Gambar 2.5 Mapping IT Processes to IT Governance Sumber : ITGI-CobIT 4.1th edition (2007, p173) 37 2.8.6.3 Appendix III Maturity Model For Internal Control This appendix provides a generic maturity model showing the states of the internal control environment and the establishment of internal controls in an enterprise. It shows how the management of internal control an awareness of need to establish better internal control, typically develops from an adhoc to an optimised level. The model provide a high level guide to help COBIT users appreciate that is required for effective internal controls in IT and to help position there enterprise on the maturity scale. Gambar 2.6 Maturity Model For Internal Control Sumber : ITGI-CobIT 4.1th edition (2007) 38 2.8.6.4 Control Objective PO1.1 IT Value Management Work with the business to ensure that the enterprise portofolio of IT-enable investment contains programmes that have solid business cases. Recognize that there are mandatory, sustaining and discretionary investment that differ in complexity and degree of freedom in allocating funds. IT processes should provide effective and efficient delivery of the IT components of programs and early warning of any deviations from plan, including cost, schedule or functionality, that might impact the expected outcomes of te programs. IT services should be executed against equitable and enforceable service level agreements (SLAs). Accountability for achieving the benefits and controlling the costs should be clearly assigned and monitored. Astablish fair, transparent, repeatable and comparable evaluation of business cases, including financial worth, risk of not delivering a capability and the risk of not realising the expected benefits. PO1.2 Business-IT Aligment Establish processes of bi-directional education and reciprocal involvement in strategic planning to achieve business and IT alignment and integration. Mediate between business an IT imperatives so priorities can be mutually agreed. PO1.3 Assesment of Current Capability and Performance Assess the current capability and performance of solution an service delivery to establish a baseline against which future requirements can be compared. Defone performance in terms of IT’s contribution to business objective, functionality, stability, complexcity, costs, strengths and weaknesses. PO1.4 IT Strategic Plan Create a strategic plan that defines, in co-operation with relevant stakeholders, how IT goals will contribute to the enterprise’s strategic objectives and related costs and risks. It should include how IT will support IT-enable investment programmes, IT services and IT assets. IT should define how the objectives will be met, the measurements to be used and procedures to obtain formal sign-off from the stakeholders. The IT strategic plan should cover investment/operational budget, funding sources, sourcing strategy, acquisition strategy, and legal and regulatory requirements. The strategic plan should be sufficiently detailed to allow for the definition of tactical IT plans PO1.5 Tactical Plans Create a portofolio of tactical IT plans that are derived from the IT strategic plan. The tactical plans should address IT-enabled programme investments, IT services an IT assets. The tactical plans should describe required IT initiatives, resource requirements, and how the use of recources and achievement of benefits will be monitored an managed. The tactical plans should be sufficiently detailes to allow the definition of project plans. Actively manage the set of tactical IT plans and initiatives through analysis of project and service portofolios. PO1.6 IT Portofolio Management Actively manage with the business the portofolio of IT-enabled investment programmes required to achieve spesific strategic business objectives by identifying, defining, evaluating, prioritizing, selecting, initiating, managing and controlling programmes. This should include clarifying desired business outcomes, ensuring that programme objectives support achievement of the outcomes, understanding the full scope of effort required to achieve the outcomes, assigning clear accountability with 39 supporting measures, defining projects within the programme, allocating resources and funding, delegating authority, and commissioning required projects at programme launch. PO2 Define the Information Architecture PO2.1 Enterprise Information Architecture Model Establish and maintain an enterprise information model to enable applications development and decision-supporting activities, consistent with IT plans an described in PO1. The model should facilitate the optimal creation, useand sharing of information by the business in a way tha maintains integrity and is flexible, functional, costs-effective, timely, secure and resilient to failure. PO2.2 Enterprise Data Dictionary ana Data Syntax Rules Maintain an enterprise data dictionary that incur[porates the organisation’s data syntax rules. This dictionary should enable the sharing of data elements amongst applications and system, promote a common understanding of data amongst IT and business users, and prevent incompatible data elements from being created. PO2.3 Data Classification Scheme Establish a classification scheme that applies throughout the enterprise, based on the criticality and sensitivity ( e.g,.piblic,confidential, top sevret) of enterprise data. This scheme should include details about data ownership;definition of appro[iate security levels and protection controls; and a brief description of data retention and destruction requirements, criticality and sensitivity. It should be used as the basis for applying controls such as access controls, achieving or encryption. PO2.4 Integrity Management Define and implement procedures to ensure the integrity and consistency of all data stored in electronic from, such as databases, data warehouses and data archieves. PO3 Determine Technological Direction PO3.1 Technological Direction Planning Analyse existing and emerging technologies, and plan which technological direction is appropriate to realise the IT strategy and the business systems architecture. Also identify in the plan which technologies have the potential to create business opportunities. The plan should address systems architecture, technological direction, migration strategies and contingency aspects of infrastructure components. PO3.2 Technology Infrastructure Plan Create and maintain a technology infrastructure plan that is in accordance with the IT strategic and tactical plans. The plan should be based on the technological direction and include contingency arrangements and direction for acquisition of technology resources. It should consider changes in the competitive environtment, economies of scale for information system staffing and investments, and improved interoperability of platforms and applications. PO3.3 Monitor Future Trends and Regulations Establish a process to monitor the business sector, industry, technology, infrastructure, legal and regulatory environment trends. Incorporate the consequences of these trends into the development of the IT technology infrastructure plan. 40 PO3.4 Technology Standards To provide consistent, effective and secure technological solutions enterprisewide, establish a technology forum to provide technology guidelines, advice on infrastructure products and guidance on the selection of technology, and measure compliance with these standards and guidelines. This forum should direct technology standards and practices based in their business relevance, risks and compliance with external requirements. PO3.5 IT Architectu re Board Establish an IT architecture board to provide architectureguidelines and advice on their application, and to verify compliance. This entity should direct IT architecture design, ensuring that it enables the business strategy and considers regulatory compliance and continuity requirements. This is related/linked to PO2 Define the Information Architecture. PO4 Define the IT Processes, Organisation and Relationship PO4.1 IT Process Framework Define an IT process framework to execute the ITn strategic plan. This framework should include an IT process structure and relationship (e.g., to manage process gaps and overlaps), ownership, maturity, performance measurement, improvement, compliance, quality targets and plans to achieve them. It should provide integration amongst the processes that are specific to IT, enterprise portofolio management, business processes and business change processes. The IT process framework should be integrated into a quality management system (QMS) and the internal control framework. PO4.2 IT Strategy Comitee Establish an IT strategy committee at the board level. This committee should ensure that IT governance, as part of enterprise governance, is adequately addressed; advise on strategicdirection; and review major investments on behalf of the full board. PO4.3 IT steering Committee Establish an IT steering (or equivalent) composed of executive, business and IT management to: 1. Determine prioritisation of IT-enabled investment programmes in line with the enterprise’s business strategy and priorities 2. Track status of projects and resolve resource conflict 3. Monitor service levels and service improvements PO4.4 Organisational Placement of the IT Function Place the IT function in the overall organisational structure with a businessmodel contingent on the importance of IT within the enterprise, specifically its criticality to business strategy and the level of operational dependence on IT. The reporting line of the CIO should be commensurate with the importance of IT within the enterprise. PO4.5 IT Organisational structure Establish an internal and external IT organizational structure with a business model contingent on the importance of IT within the enterprise, specifically its criticality 41 to business strategy and the level of operational dependence on IT. The reporting line of the CIO should be commensurate with the importance of IT within the enterprise. PO4.6 Establishment of Roles and Responsibilities Establish and communicate roles and responsibilities for IT personnel and end users that delineate between IT personnel and end-user authority, responsibilities and accountabilitiy for meeting the organisation’s needs. PO4.7 Responsibility for IT Quality Assurance Assign responsibility for the performance of the quality assurance (QA) function and provide the QA group with appropriate QA systems, controls and communications expertise. Ensure that the organisational placement and the responsibilities and size of the QA group satisfy the requirements of the organization. PO4.8 Responsibility for Risk, Security and Compliance Embed ownersip and responsibility for IT-related risks within the business at an appropriate senior level. Define and assign roles critical for managing IT risks, including the specific responsibility for information security, physical security and compliance. Establish risk and security management responsibilities may need to be assigned at a system-specific level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk and approval of any residual IT risks. PO4.9 Data and System Ownership Provide the business with procesures and tools, enabling it to address its responsibilities for ownership of data and information systems. Owners should make decisions about classifying information and systems and protecting them in line with this classification. PO4.10 Supervision Implement adequate supervisory practices in the IT function to ensure that roles and responsibilities are properly exercised, to assess whether all personnel have sufficient authority and resources to execute their roles and responsibilities, and to generally review KPIs. PO4.11 Segregation of Duties Implement a division of roles and responsibilities that reduces the possibility for a single invidual to compromise a critical process. Make sure that personnel are performing only authorized duties elevant to their respective jobs and positions. PO4.12 IT Staffing Evaluate staffing requirements on a regular basis or upon major changes to the business, operational or IT environments to ensure that the IT function has sufficient resources to adequately and appropriately support the business goals and aobjectives. PO4.13 Key IT Personnel Define and identify key IT personnel (e.g.,replacements/backup personnel), and minimize reliance on single individual performing a critical job function. PO4.14 Contracted Staff Policies and Procedures Ensure that consultants and contract personnel who support the IT function know and comply with the organization’s policies for the protection of the organization’s information assets such that they meet agreed-upon contractual requirements. 42 PO4.15 Relationship Establish and maintain an optimal co-ordination, communication and liaison structure between the IT function and various other interests inside and outside and outside the IT function, various other interests inside and outside the IT function, such as the board, executives, business units, individual users, suppliers, security officers, risk managers, the corporate compliance group, outsourcers and offsite management. PO5 Manage IT Investment PO5.1 Financial Management Framework Establish and maintain a financial framework to manage the investment and cost of IT assets and services through portfolios of IT-enabled investments, business cases and IT budgets. PO5.2 Prioritisation Within IT Budget Implement a decision-making process to priorities the allocation of IT resources for operations, projects and maintenance to maximize IT’s contribution to optimizing the return on the enterprise’s portfolio of IT-enabled investment programmes and other IT services and assets. PO5.3 IT Budgeting Establish and implement practices to prepare a budget reflecting the priorities established by the enterprise’s portfolio of IT-enabled investment programmes, and including the outgoing costs of operating and maintaining the current infrastructure. The practices should support development of an overall IT budget as well as development of budgets for individual programmes, with specific emphasis on the IT components of those programmes. The practices should allow for ongoing review, refinement and approval of the overall budget and the budgets for individual programmes. PO5.4 Cost Management Implement a cost management process comparing actual costs to budgets. Costs should be monitored and reported. Where there are deviations, these should be identified in a timely manner and the impact of those deviations on programmes should be assessed. Together with the business sponsor of those programmes, appropriate remedial action should be taken and, if necessary, the programme business case should be updated. PO5.5 Benefit Management Implement a process to monitor the benefits from providing and maintaining appropriate IT capabilities. IT’s contribution to the business, either as a component of IT-enabled investment programmes or as part of regular operational support, should be identified and documented in a business case, agreed to, monitored and reported. Reports should be reviewed and, where there are opportunities to improve IT’s contribution, appropriate actions should be defined and taken. Where changes in IT’s contribution impact the programme, or where changes to other related projects impact the programme, the programme business case should be updated. 43 PO6Communicate Management Aims and Direction PO6.1 IT Policy and Control Environment Define the elements of a control environment for IT, aligned with the enterprise’s management philosophy and operating style. These elements should include expectation/requirements regarding delivery of value from IT investments, appetite for risk, integrity, ethical values, staff competence, accountability and responsibility. The control environment should be based on a culture that supports value delivery whilst managing significant risk, encourages cross-divisional co-operation and teamwork, promotes compliance and continuous process improvement, and handles process deviations (including failure) well. PO6.2 Enterprise IT Risk and Control Framework Develop and maintain a framework that defines the enterprise’s overall approach to IT risk and control and that aligns with the IT policy and control environment and the enterprise risk and control framework. PO6.3 IT Policies Management Develop and maintain a set of policies to support IT strategy. These policies should include policy intent; roles and responsibilities; exception process; compliance approach; and reference to procedures, standards and guidelines. Their relevance should be confirmed and approved regularly. PO6.4 Policy, Standard and Procedu res Rollout Roll out and enforce IT policies to all relevant staff, so they are built into and are an integral part of enterprise operations. PO6.5 Communication of IT Objectives and Direction Communicate awareness and understanding of business and IT objectives and direction to appropriate stakeholders and users throughout the enterprise. PO7 Manage IT Human Resources PO7.1 Personnel Requirement and Retention Maintain IT personnel requirement processes in line with the overall organisation’s personnel policies and procedures (e.g., hiring, positive work environment, orienting). Implement processes to ensure that the organization has an appropriately deployed IT workforce with the skills necessary to achieve organizational goals. PO7.2 Personnel Competencies Regularly verify that personnel have the competencies to fulfil their roles on the basis of their education, training and/or experience. Define core IT competency requirements and verify that they are being maintained, using qualification and certification programmes where appropriate. PO7.3 Staffing of Roles Define, monitor and supervise roles, responsibilities and compensation framework for personnel, including the requirement to adhere to management policies and procedures, the code of ethics, and professional practices. The level of supervision should be in line with the sensitivity of the position and extent of responsibilities assigned. 44 PO7.4 Personnel Training Provide IT employees with appropriate orientation when hired and ongoing training to maintain their knowledge, skills, abilities, internal controls and security awareness at the level required to achieve organizational goals. PO7.5 Dependence Upon Individuals Minimize the exposure to critical dependency on key individuals through knowledge capture (documentation), knowledge sharing, succession planning and staff backup. PO7.6 Personnel Clearance Procedu res Include background check in the recruitment process. The extent and frequency of periodic reviews of these checks should depend on the sensitivity and/or criticality of the function and should be applied for employees, contractors and vendors. PO7.7 Employee Job Performance Evaluation Require a timely evaluation to be performed on a regular basis against individual objectives derived from the organisation’s goals, establish standards and specific job responsibilities. Employees should receive coaching on performance and conduct whenever appropriate. PO7.8 Job Change and Termination Take expedient actions regarding job changes, especially job terminations. Knowledge transfer should be arranged, responsibilities reassigned and access rights removed such that risk are minimized and continuity of the function is guaranteed. PO8 Manage Quality PO8.1 Quality Management System Establish and maintain a QMS that provides a standard, formal and continuous approach regarding quality management that is aligned with business requirements. The QMS should identify quality requirements and criteria; key IT processes and their sequence and interaction; and the policies, criteria and methods for defining, detecting, correcting and preventing non-conformity. The QMS should define the organizational structure for quality management, covering the roles, task and responsibilities. All key areas should develop their quality plans in line with criteria and policies and record quality data. Monitor and measure the effectiveness and acceptance of the QMS, and improve it when needed. PO8.2 IT Standards and Quality Practies Identify and maintain standards, procedures and practice for key IT processes to guide the organization in meeting the intent of the QMS. Use industry good practices for reference when improving and tailoring the organisation’s quality practices. PO8.3 Development and Acquisition Standards Adopt and maintain standards for all development and acquisition that follow the life cycle of the ultimate deliverable, and include sign-off at key milestones based on agreed-upon sign-off criteria. Consider software coding standards; naming conventions; file formats; schema and data dictionary design standards; user interface standards; interoperability; system performance efficient; scalability; standards for development and testing; validation against requirements; test plans; and unit, regression and integration testing. 45 PO8.4 Customer Focu s Focus quality management on customers by determining their requirement and aligning them to the IT standards and practices. Define roles and responsibilities concerning conflict resolution between the user/customer and the IT organization. PO8.5 Continuous Improvement Maintain and regularly communicate an overall quality plan that promotes continuous improvement. PO8.6 Quality Measurement, Monitoring and Review Define, plan and implement measurements to monitor continuing compliance to the QMA, as well as the value the QMS provides. Measurement, monitoring and recording of information should be used by the process owner to take appropriate corrective and preventive actions. PO10 Manage Project PO10.1 Programme Management Framework Maintain the programme of projects, related to the portfolio of IT-enabled investment programmes, by identifying, defining, evaluating, prioritizing, selecting, initiating, managing and controlling projects. Ensure that the projects support the programme’s objectives. Co-ordinate the activities and interdependencies of multiple projects, manage the contribution of all the projects within the programme to expected outcomes, and resolve resource requirements and conflicts. PO10.2 Project Management Framework Establish and maintain a project management framework that defines the scope and boundaries of managing project, as well as the method to be adopted and applied to each project undertaken. The framework and supporting method should be integrated with the programme management processes. PO10.3Project Management Approach Establish a project management approach commensurate with the size, complexity and regulatory requirements of each project. The project governance structure can include the roles, responsibilities and accountabilities of the programme sponsor, project sponsors, steering committee, project office and project manager, and the mechanisms through which they can meet those responsibilities (such as reporting and stage reviews). Make sure all IT projects have sponsors with sufficient authority to own the execution of the project within the overall strategic programme. PO10.4 Stakeholder Commitment Obtain commitment and participation from the affected stakeholders in the definition and the execution of the project within the context of the overall IT-enabled investment programme. PO10.5 Project Scope Statement Define and document the nature and scope of the project to confirm and develop amongst stakeholders a common understanding of project scope and how it relates to other projects within the overall IT-enabled investment programme. The definition should be formally approved by the programme and project sponsor before project initiation. PO10.6 Project Phase Initiation Approve the initiation of each major project phase and communicate it to all stakeholders. Base the approval of the initial phase on programme governance 46 decisions. Approval of subsequent phases should be based on review and acceptance of the deliverables of the previous phase, and approval of an updated business case at the next major review of the programme. In the event of overlapping project phases, an approval point should be established by programme and project sponsors to authorize project programme. PO10.7 Integrated Project Plan Establish a formal, approved integrated project plan (covering business and information systems resources) to guide project execution and control throughout the life of the project. The activities and interdependencies of multiple projects within a programme should be understood and documented. The project plan should be maintained throughout the life of the project. The project plan, and change to it, should be approved in line with the programme and project governance framework. PO10.8 Project Resou rces Define the responsibilities, relationships, authorities and performance criteria of project team members, and specify the basis for acquiring and assigning competent staff members and/or contractors to the project. The procurement of the products and services required for each project should be planned and managed to achieve project objective using the organisation’s procurement practices. PO10.9 Project Risk Management Eliminate or minimize specific risk associated with individual projects through a systematic process of planning, identifying, analyzing, responding to, monitoring and controlling the areas or events that have the potential to cause unwanted change. risk faced by the project management process and the project deliverable should be established and centrally recorded. PO10.10 Project Quality Plan Prepare a quality management plan that describes the project quality system and how it will be implemented. The plan should be formally review and agreed to by all parties concerned and then incorporated into the integrated project plan. PO10.11 Project Change Control Establish a change control system for each project, so all changes to the project baseline (e.g., cost, schedule, scope, quality) are appropriately reviewed, approved and incorporated into the integrated project plan in line with the programme and project governance framework. PO10.12 Project Planning of Assurance Methods Identify assurance task required to support the accreditation of new or modified system during project planning, and include them in the integrated project plan. The task should provide assurance that internal controls and security features meet the defined requirements. PO10.13 Project Performance Measurement, Reporting and Monitoring Measure project performance against key performance scope, schedule, quality, cost and risk criteria. Identify any deviations from the plan, assess the impact of deviations on the project and overall programme, and report results to key stakeholders. Recommend, implement and monitor remedial action, when required, in line with the programme and project governance framework. PO10.14 Project Closu re Require that, at the end of each project, the project stakeholders ascertain whether the project delivered the planned results and benefits. Identify and communicate 47 any outstanding activities required to achieve the planned results of the project and the benefits of the programme, and identify and document lessons learned for use on future project and programmes. AI1 Identify Automated Solutions AI1.1 Definition and Maintenance of Business Functional and Technical Requirements Identify, priorities, specify and agree on business functional and technical requirements covering the full scope of all initiatives required to achieve the expected outcomes of the IT-enabled investment programme. AI1.2 Risk Analysis Report Indentify, document and analysis risk associated with the business requirements and solution design as part of the organisation’s process for the development of requirements. AI1.3 Feasibility Study and Formulation of Alternative Courses of Action Develop a feasibility study that examines the possibility of implementing the requirements. Business management, supported by the IT function, should assess the feasibility and alternative courses of action and make a recommendation to the business sponsor. AI1.4 Requirements and Feasibility Decision and Approval Verify that the process requires the business sponsor to approve and sign off on business functional and technical requirements and feasibility study reports at predetermined key stages. The business sponsor should make the final decision with respect to the choice of solution and acquisition approach. AI2 Acquire and Maintain Application Software AI2.1 High-level Design Translate business requirements into a high-level design specification for software acquisition, taking into account the organisation’s technological direction and information architecture. Have the design specifications approved by management to ensure that the high-level design responds to the requirements. Reassess when significant technical or logical discrepancies occur during development or maintenance. AI2.2 Detailed Design Prepare detailed design and technical software application requirements. Defines the criteria for acceptance of the requirements. Have the requirements approved to ensure that they correspond to the high-level design. Reassessment when significant technical or logical discrepancies occur during development or maintenance. AI2.3 Application Control and Auditability Implement business controls, where appropriate, into automated controls such that processing is accurate, complete, timely, authorized an auditable. AI2.4 Application Security and Availability Address application security and availability requirements in response to identified risk and in line with the organisation’s data classification, information architecture, information security architecture and risk tolerance. 48 AI2.5 Configuration and Implementation of Acquired Application Software Configure and implement acquired application software to meet business objectives. AI2.6 Major Upgrades to Existing Systems In the event of major changes to existing systems that result in significant chance in current design and/or functionality, follow a similar development process as that used for the development of new systems. AI2.7 Development of Application Software Ensure that automated functionality is developed in accordance with design specifications, development and documentation standards. QA requirements, and approval standards. Ensure that all legal and contractual aspects are identified and addresses for application software developed by third parties. AI2.8 Software Quality Assurance Develop, resources and execute a software QA plan to obtain the quality specified in the requirements definition and the organisation’s quality policies and procedures. AI2.9 Application Requirements Management Track the status of individual requirements (including all rejected requirements) during the design, development and implementation, and approve change to requirements through an established change management process. AI2.10 Application Software Maintenance Develop a strategy and plan for the maintenance of software applications. AI3 Acquire and Maintain Technology Infrastructure AI3.1 Technological Infrastructu re Acquisition Plan Produce a plan for the acquisition, implementation and maintenance of the technological infrastructure that meets established business functional and technical requirements and is in accord with the organisation’s technology direction. AI3.2 Infrastructure Resou rces Protection and availability Implement internal control, security and auditability measures during configuration, integration and maintenance of hardware and infrastructural software to protect resources and ensure availability and integrity. Responsibilities for using sensitive infrastructure components should be clearly defined and understood by those who develop and integrate infrastructure components. Their use should be monitored and evaluated. AI3.3 Infrastructure Maintenance Develop a strategy and plan for infrastructure maintenance, and ensure that changes are controlled in line with the organisation’s change management procedure. Include periodic review against business needs, patch management, upgrade strategies, risk, vulnerabilities assessment and security requirements. AI3.4 Feasibility Test Environment Establish development and test environments to support effective and efficient feasibility and integration testing of infrastructure components. 49 AI4 Enable Operation and Use AI4.1 Planning for Operational Solutions Develop a plan to identify and document all technical, operational and usage aspects such that all those who will operate, use and maintain the automated solutions can execise their responsibility. AI4.2 Knowledge Transfer to Business Management Transfer knowledge to business management to allow those individuals to take ownership of the system and data, and exercise responsibility for service delivery and quality, internal control, and application administration. AI4.3 Knowledge Transfer to End Users Transfer knowledge and skills to allow end users to effectively and efficiently use the system in support of business processes. AI4.4 Knowledge Transfer to Operations and Support Staff Transfer knowledge and skills to enable operations and technical support staff to effectively and efficiently deliver, support and maintain the system and associated infrastructure. AI5 Procure IT Resources AI5.1 Procurement Control Develop and follow a set of procedures and standards that is consistent with the business organisation’s overall procurement process and acquisition strategy to acquire IT-related infrastructure, facilities, hardware, software and services need by the business. AI5.2 Supplier Contract Management Set up a procedure for establishing, modifying and terminating contracts for all suppliers. The procedure should cover, at a minimum, legal, financial, organizational, documentary, performance, security, intellectual property, and termination responsibilities and liabilities (including penalty clauses). All contracts and contract change should be reviewed by legal advisors. AI5.3 Supplier Selection Select suppliers according to a fair and formal practice to ensure a viable best fit based on specified requirements. Requirements should be optimized with input from potential suppliers. AI5.4 IT Resources Acquisition Protect and enforce the organisation’s interests in all acquisition contractual agreement, including the right and obligations of all parties in the contractual terms for the acquisition of software, development resources, infrastructure and services. AI6 Manage Changes AI6.1 Change Standards and Procedures Set up formal change management procedures to handle in a standardized manner all requests (including maintenance and patches) for changes to applications, procedures, processes, system and service parameters, and the underlying platforms. AI6.2 Impact Assessment, Prioritisation and Authorisation Assess all requests for change in a structured way to determine the impact on the operational system and its functionality. Ensure that change are categorized, prioritized and authorized. 50 AI6.3 Emergency Changes Establish a process for defining, raising, testing, documenting, assessing and authorizing emergency changes that do not follow the establish change process. AI6.4 Change Status Tracking and Reporting Establish a tracking and reporting system to document rejected changes, communicate the status of approved and in-process change, and complete changes. Make certain that approved change are implemented as planned. AI6.5 Change Closure and Documentation Whenever changes are implemented, update the associated system and user documentation and procedures accordingly. AI7 Install and Accredit Solution and Changes AI7.1 Training Train the staff members of the affected user department and the operations group of the IT function in accordance with the defined training and implementation plan and associated materials, as part of every information systems development, implementation or modification project. AI7.2 Test Plan Establish a test plan based on organization wide standards that defines roles, responsibilities, and entry and exit criteria. Ensure that the plan is approved by relevant parties. AI7.3 Implementation Plan Establish an implementation and fallback/backout plan. Obtain approval from relevant parties. AI7.4 Test Environment Define and establish a secure test environment representative of the planned operations environment relative to security, internal controls, operational practices, data quality and privacy requirements, and work loads. AI7.5 System and Data Conversion Plan data conversion and infrastructure migration as part of the organisation’s development methods, including audit trails, rollback and fallbacks. AI7.6 Testing of Changes Test changes independently in accordance with the defined test plan prior to migration to the operational environment. Ensure that the plan considers security and performance. AI7.7 Final Acceptance Test Ensure that business process owners and IT stakeholders evaluate the outcome of the testing process as determined bye the test plan. Remediate significant errors identified in the testing process, having completed the suite of test identified in the test plan and any necessary regression test. Following evaluation, approve promotion to production. AI7.8 Promotion to Production Following testing, control the hardover of the changed system to operations, keeping it in line with the implementation plan. Obtain approval of the key stakeholders, such us users, system owner and operational management. Where appropriate, run the system in parallel with the old system for a while, and compaire behavior and results. 51 AI7.9 Post-implementation Review Establish procedures in line with the organizational change management standards to require a post-implementation review as set out in the implementation plan. DS1 Define and Manage Services Levels DS1.1 Service Level Management Framework Define a framework that provides a formalized service level management process between the customer and service provider. The framework should maintain continuous alignment with business requirements and priorities and facilitate common understanding between the customer and provider(s). The framework should include processes for creating service requirements, service definitions, SLAs, OLAs and funding sources. These attributes should be organized in a service catalogue. The framework should define the organizational structure for service level management, covering the roles, tasks and responsibilities of internal and external service providers and customers. DS1.2 Definition of Services Base definitions of IT service characteristies and business requirements. Ensure that they are organised and stored centrally via the implementation of a service catalogue portofolio approach. DS1.3 Service Level Agreements Define and agree to SLAs for all critical IT services based on customer requirements and IT capabilities. This should cover customer commitments; service support requirements; quantitative and qualitative metrics for measuring the service signed off on by the stakeholders; funding and commercial arrangements, if applicable; and roles and responsibilities, including oversight of the SLA. Consider items such as availability, reliability, performance, capacity for growth, levels of support, continuity planning, security and demand constraints. DS1.4 Operating Level Agreement Define OLAs that explain how the services will be technically delivered to support the SLA(s) in an optimal manner. The OLAs should be specify that technical processes in terms meaningful to the provider and may support several SLAs. DS1.5 Monitoring and Reporting of Service Level Achievements Continuously monitor specified service level performance criteria. Reports on achievement of service levels should be provided in a format that is meaningful to the stakeholder. The monitoring statistics should be analysed and acted upon to indentify negative and positive trends for individual services as well as for services overall. DS1.6 Review of Service Level Agreement and Contracts Regulary review SLAs and underpinning contract (UCs) with internal and external service providers to ensure that they are effective and up to date and that changes in requirements have been taken into account. DS2 Manage Third-party Services DS2.1 Identification of All Supplier Relationships Identify all supplier services, and categories the according to supplier type, significance and criticality. Maintain formal documentation of technical and organizational relationships covering the roles and responsibilities, goals, expected deliverables, and credentials of representatives of these suppliers. 52 DS2.2 Supplier Relationship Management Formalise the relationship management process for each supplier. The relationship owners should lialise on customer and supplier issues and ensure the quality of the relationship based on trust and transparency (e.g., through SLAs). DS2.3 Supplier Risk Management Identify and mitigate risk relating to suppliers’ ability to continue effective service delivery in a secure and efficient manner on a continual basis. Ensure that contracts conform to universal business standards in accordance with legal and regulatory requirements. Risk management should further consider non-disclosure agreement (NDAs), escrow contracts, continued viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc. DS2.4 Supplier Performance Monitoring Establish a process to monitor service delivery to ensure that the supplier is meeting current business requirements and continuing to adhere to the contract agreements and SLAs, and that performance is competitive with alternative suppliers and market conditions. DS3 Manage Performance and Capacity DS3.1 Performance and Capacity Planning Establish a planning process for the review of performance and capacity of IT resources to ensure that cost-justifiable capacity and performance are available to process the agreed-upon workloads as determined by the SLAs. Capacity and performance plans should leverage appropriate modeling techniques to produce a model of the current and forecasted performance, capacity and throughput of the IT resources. DS3.2 Current Performance and Capacity Assess current performance and capacity forecasting of IT resources to determine if sufficient capacity and performance exist to deliver against agreed-upon service levels. DS3.3 Future Performance and Capacity Conduct performance and capacity forecasting of IT resources at regular interval to minimize the risk of service disruptions due to insufficient capacity or performance degradation, and identify excess capacity for possible redeployment. Identify work load trends and determine forecasts to be input to performance and capacity plans. DS3.4 IT Resources Availability Provide the required capacity and performance, taking into account aspects such as normal workloads, contingencies, storage requirements and IT resource life cycles. Provisions such as prioritizing tasks, fault-tolerance mechanisms and resource allocation performance if individual IT resources. DS3.5 Monitoring and Reporting Continuously monitor the performance and capacity of IT resources. Data gathered should serve two purposes: 1. To maintain and tune current performance within IT and address such issues as resilience, contingency, current and projected workloads, storage plans, and resource acquisition. 53 2. To report delivered service availability to the business, as required by the SLAs Accompany all exception reports with recommendations for corrective action. DS4 Ensure Continuous Service DS4.1 IT Continuity Framework Develop a framework for IT continuity to support enterprisewide continuity management using a consistent process. The objective of the framework should be to assist in determining the required resilience of the infrastructure and to drive the development of disaster recovery and IT contingency plans. The framework should address the organizational structure for continuity management, covering the roles, task and responsibilities of internal and external service providers, their management and their customers, and the planning processes that create the rules and structures to document, test and execute the disaster recovery and IT contingency plans. The plan should also address item such as the identification of critical resources, noting key dependencies, the monitoring and reporting of the availability of critical resources, alternative processing, and principles of backup and recovery. DS4.2 IT Continuity Plans Develop IT continuity plans based on the framework and designed to reduce the impact of a major disruption on key business functions and processes. The plans should be based on risk understanding of potential business impact and address requirements for resilience, alternative processing and recovery capability of all critical IT services. They should also cover usage guidelines, roles and responsibilities, procedures, communication processes, and the testing approach. DS4.3 Critical IT Resources Focus attention on items specified as most critical in the continuity plan to built in resilience and establish priorities in recovery situations. Avoid the distraction of recovering less-critical items and ensure response and recovery in line with prioritized business needs, while ensuring that costs are kept at an acceptable level and complying with regulatory and contractual requirements. Consider resilience, response and recovery requirements for different tiers, e.g., one to four hours, four to 24 hours, more than 24 hours and critical business operational periods. DS4.4 Maintenance of the IT Continuity Plan Encourage IT management to define and execute change control procedures to ensure that the IT continuity plan is kept up to date and continually reflects actual business requirements. Communicate changes in procedures and responsibilities clearly and in a timely manner. DS4.5 Testing of the IT Continuity Plan Test the IT continuity plan on a regular basis to ensure that IT systems can be effectively recovered , shortcomings are addressed and the plan remains relevant. This require careful preparation, documentation, reporting of test result and according to the results, implementation of an action plan. Consider the extent of testing recovery of single application to integrated testing scenarios to en-to-end testing and integrated vendor testing. DS4.6 IT Continuity Plan Training Provide all concerned parties with regular training sessions regarding the procedures and their roles and responsibilities in case of an incident or disaster. Verify and enhance training according to the result of the contingency test. 54 DS4.7 Distribution of the IT continuity Plan Determine that a defined and managed distribution strategy exists to ensure that plans are properly and securely distributed and available to appropriately authorized interested parties when and where needed. Attention should be paid to making the plans accessible under all disaster scenarios. DS4.8 IT Services Recovery and Resumption Plan the action to betaken for the period when IT is recovering and resuming services. This may include activation of backup sites, initiation of alternative processing, customer and stakeholder communication, and resumption procedures. Ensure that the business understands IT recovery times and the necessary technology investment to support business recovery and resumption needs. DS4.9 Offsite Backup Storage Store offsite all critical backup media, documentation and other IT resources necessary for IT recovery and business continuity plans. Determine the content of backup storage in collaboration between business process owners and IT personnel. Management of the offsite storage facility should respond to the data classification policy and the enterprise’s media storage practices. IT management should ensure that offsite arrangements are periodically assessed, at least annually, for content, environmental protection and security. Ensure compatibility of hardware and software to restore archived data, and periodically test and refresh archived data. DS4.10 Post-resumption Review Determine whether IT management has established procedures for assessing the adequacy of the plan in regard to the successful resumption the IT function after a disaster, and update the plan accordingly. DS5 Ensure System Secu rity DS5.1 Management of IT security Manage IT security the highest appropriate organizational level, so the management of security actions is in line with business requirements. DS5.2 IT Security Plan Translate business, risk and compliance requirements into overall IT security plan, taking into consideration the IT infrastructure and the security culture. Ensure that the plan is implementation in security policies and procedures together with appropriate investments in services, personnel, software and hardware. Communicate security policies and procedures to stakeholders and users. DS5.3 Identify Management Ensure that all users (internal, external and temporary) and their activity on IT systems (business application, IT environment, system operation, development and maintenance) are uniquely identifiable. Enabled user identities via authentication mechanisms. Confirm that user access rights to systems and data are in line with defined and documented business needs and that job requirements are attached to user identities. Ensure that user access right are requested by user management, approved by system owners and implemented bye the security-responsible person. Maintain user identities and access rights in a central repository. Deploy cost-effective technical and procedural measures, and keep them current to establish user identification, implement authentication and enforce access rights. 55 DS5.4 User Account Management Address requesting, establishing, issuing, suspending, modifying and closing user account and related user privileges with a set of user account management procedures. Include an approval procedure outlining the data or system owner granting the access privileges. These procedures should apply for all users, including administrators (privileged users) and internal and external users, for normal and emergency cases. Rights and obligations relative to access to enterprise systems and information should be contractually arranged for all types of users. Perform regular management review of all accounts and related privileges. DS5.5 Security Testing, Surveillance and Monitoring Test and monitor the IT security implementation in a proactive way. IT security should be reaccredited in a timely manner to ensure that the approved enterprise’s information security baseline in maintained. S logging and monitoring function will enable to early prevention and/or detection and subsequent timely reporting of unusual and/or abnormal activities that may need to be addressed. DS5.6 Security Incident Definition Clearly define and communicate the characteristics of potential security incident so they can be properly classified and treated by the incident and problem management process. DS5.7 Protection of Security Technology Make security-related technology resistance to tampering, and do not disclose security documentation unnecessarily. DS5.8 Cryptographic Key Management Determine that policies and procedures are in place to organize the generation, change, revocation, destruction, distribution, certification, storage, entry, use and archiving of cryptographic keys to ensure the protection of keys against modification and un authorized disclosure. DS5.9 Malicious Software Prevention, Detection and Correction Put preventive, detective and corrective measures in place (especially up-to-date security patches and virus control) across the organization to protect information systems and technology from malware (e.g., viruses, worms, spyware, spam). DS5.10 Network Security Use security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, intrusion detection) to authorize access and control information flow from and to networks. DS5.11 Exchange of Sensitive Data Exchange sensitive transaction data only over a trusted path or medium with control to provide authenticity of content, proof of submission, proof of receipt and nonrepundation of origin. DS6 Identify and Allocate Costs DS6.1 Definition of Services Identify all IT cost, and map them to IT services to support a transparent cost model. IT services should be linked to business processes such that the business can identify associated service billing levels. 56 DS6.2 IT Accounting Capture and allocate actual cost according to the enterprise cost model. Variance between forecasts and actual costs should be analysed and reported on, in compliance with the enterprise’s financial measurement systems. DS6.3 Cost Modeling and Charging Establish and use an IT costing model based on the service definitions that support the calculation of chargeback rates per services. The IT cost model should ensure that charging for services is identifiable, measurable and predictable bye users to encourage proper use of resources. DS6.4 Cost Model Maintenance Regularly review and benchmark the appropriateness of the cost/recharge model to maintain its relevance an appropriateness to the evolving business and IT activities. DS7 Educate and Train Users DS7.1 Identification of Education and Training Needs Establish and regularly update a curriculum for each target group of employees considering: 1. Current and future business needs and strategy 2. Value of information as an asset 3. Corporate values (ethical values, control and security culture, etc) 4. Implementation of new information infrastructure and software (i.e., packages, applications) 5. Current and future skills, competence profiles and certification and/or credentialing needs as well as required reaccreditation 6. Delivery methods (e.g., classroom, web-based), target group size, accessibility and timing DS7.2 Delivery of Training and Education Based on the identified education and training needs, identify target groups and their members, efficient delivery mechanisms, teachers, trainers, and mentors. Appoint trainers and organize timely training sessions. Record registration (including prerequisites), attendance and training session performance evaluations. DS7.3 Evaluation of Training Received Evaluate education and training content delivery upon completion for relevance, quality, effectiveness, the retention of knowledge, cost and value. The results of this evaluation should serve as input for future curriculum definition and the delivery of training sessions. DS8 Manage Service Desk and Incidents DS8.1 Service Desk Establish a service desk function, which is the user interface with IT, to register, communicate, dispatch and analyse all calls, reported incidents, service requests and information demands. There should be monitoring and escalation procedures based on 57 agreed-upon service levels relative to the appropriate SLA that allow classification and prioritisation of any reported issues as an incident, service request or information request. Measure end users’ satisfaction with the quality of the service desk and IT services. DS8.2 Registration of Customer Queries Establish a function and system to allow logging and tracking of calls, incidents, service requests and information needs. It should work closely with such processes as incident management, problem management, change management, capacity management and availability management. Incidents should be classified according to a business and service priority and routed to the appropriate problem management team, where necessary. Customers should be kept informed of the status of their queries. DS8.3 Incident Escalation Establish service desk procedures, so incidents that cannot be resolved immediately escalated according to limits defined in the SLA and, if appropriate, workarounds are provided. Ensure that incident ownership and life cycle monitoring remain with the service desk for user-based incidents, regardless which IT group is working on resolution activities. DS8.4 Incident Closure Establish procedures for the timely monitoring of clearance of customer queries. When the incident has been resolved, ensure that the service desk records the resolution steps, and confirm that the action taken has been agreed to by costumer. Also record and report unresolved incident (known errors and workarounds) to provide information for proper problem management. DS8.5 Reporting and Trend Analysis Produce reports of service desk activity to enable management to measure service performance and service response time and to identify trends or recurring problems, so service can be continually improved. DS10 Manage Problems DS10.1 Identification and Classification of Problems Implement processes to report and classify problems that have identified as part of incident management. The steps involved in problem classification are similar to the steps in classifying incidents; they are to determine category, impact, urgency and priority. Categories problems as appropriate into related groups or domains (e.g., hardware, software, support software). These groups may match the organisational responsibilities of the user and customer base, and should be the basis for allocating problems to support staff. DS10.2 Problem Tracking and Resolution Ensure that the problem management system provides for adequate audit trail facilities that allow tracking, analyzing and determining the root cause of all reported problems considering: 1. All associated configuration items 2. Outstanding problems and incidents 3. Known and suspected errors 58 4. Tracking of problem trends Identify and initiate sustainable solutions addressing the root cause, raising change request via the establish change management process. Throughout the resolution process, problem management should obtain regular reports from change management on progress in resolving problems and errors. Problem management should monitor the continuing impact of problems and known errors on user services. In the event that this impact become severe, problem management should escalate the problem, perhaps referring it to appropriate board to increase the priority of the RFC or to implement an urgent change as appropriate. Monitor the progress of problem resolution against SLAs. DS10.3 Problem Closure Put in place a procedure to close problem records either after confirmation or successful elimination of the known error or after agreement with the business on how to alternatively handle the problem. DS10.4 Integration of Configuration, Incident and Problem Management Integrate the related processes of configuration, incident and problem management to ensure effective management of problems and enable improvements. DS11 Manage Data DS11.1 Business Requirement for Data Management Verify that all data expected for processing are received and processed completely, accurately and in a timely manner, and all output is delivered in accordance with business requirements. Support restart and reprocessing needs. DS11.2 Storage and Retention Arrangements Define and implement procedures for effective and efficient data storage, retention and archiving to meet business objectives, the organisation’s security policy and regulatory requirements. DS11.3 Media Library Management System Define and implement Procedures to maintain an inventory of stored and archived media to ensure their usability and integrity. DS11.4 Disposal Define and implement procedures to ensure that business requirements for protection of sensitive data and software are met when data and hardware are disposed or transferred. DS11.5 Backup and Restoration Define and implement procedures for backup and restoration of systems, applications, data and documentation in line with business requirements and the continuity plan. DS11.6 Security Requirements for Data Management Define and implement policies and procedures to indentify and apply security requirements applicable to the receipt, processing, storage and output of data to meet business objectives, the organisation’s security policy and regulatory requirements. DS12 Manage the Physical Environment DS12.1 Site Selection and Layout Define and select the physical sites for IT equipment to support the technology strategy linked to the business strategy. The selection and design of the layout of a site should take into account the risk associated with natural and man-made disasters, whilst 59 considering relevant laws and regulations, such as occupational health and safety regulations. DS12.2 Physical Security Measures Define and implement physical security measures in line with business requirements to secure the location and the physical assets. Physical security measures must be capable of effectively preventing, detecting and mitigating risk relating to theft, temperature, fire, smoke, water, vibration, terror, vandalism, power outages, chemicals or explosive. DS12.3 Physical Access Define and implement procedures to grant, limit and revoke access to premises, buildings and areas according to business needs, including emergencies. Access to premises, buildings and area should be justified, authorized, logged and monitored. This should apply to all persons entering the premises, including staff, temporary staff, clients, vendors, visitors or any other third party. DS12.4 Protection Against Environmental Factors Design and implement measures for protection against environmental factors. Install specialized equipment and devices to monitor and control the environment. DS12.5 Physical Facilities Management Manage facilities, including power and communications equipment, in line with laws and regulations, technical and business requirements, vendor specifications, and health and safety guidelines. DS13 Manage Operations DS13.1 Operations Procedures and Instructions Define, implement and maintain procedures for IT operations, ensuring that the operations staff members are familiar with all operations task relevant to them. Operational procedures should be cover shift handover (formal handover of activity, status update, operational problems, escalation procedures and reports on current responsibilities) to support agreed-upon service levels and ensure continuous operations. DS13.2 Job Scheduling Organize the scheduling of job, processes and tasks into the most efficient sequence, maximizing throughput and utilization to meet business requirements. DS13.3 IT Infrastructu re Monitoring Define and implement procedures to monitor the IT infrastructure and related events. Ensure that sufficient chronological information is being stored in operations logs to enable the reconstruction, review and examination of the time sequences of operations and the other activities surrounding or supporting operations. DS13.4 Sensitive Document and Output Devices Establish appropriate physical safeguards, accounting practices and inventory management over sensitive IT assets, such as special forms, negotiable instruments, special purpose printers a security tokens. DS13.5 Preventive Maintenance for Hardware Define and implement procedures to ensure timely maintenance of infrastructure to reduce the frequency and impact of failures or performance. 60 ME1 Monitor and Evaluate IT Performance ME1.1 Monitoring Approach Establish a general monitoring framework and approach to define the scope, methodology and process to be followed for measuring IT’s solution and service delivery, and monitor IT’s contribution to the business. Integrate the framework with the corporate performance management system. ME1.2 Definition and Collection of Monitoring Data Work with the business to define a balanced set of performance targets and have them approved by the business and other relevant stakeholders. Define benchmarks with which to compare the targets, and identify available data to be collected to measure the targets. Establish processes to collect timely and accurate data to report on progress against targets. ME1.3 Monitoring Method Deploy a performance monitoring method (e.g., balanced scorecard) that records targets; captures measurements; provides a succinct, all-around view of IT performance; and fits within the enterprise monitoring system. ME1.4 Performance Assessment Periodically review performance against targets, analyse the cause of any deviations, and initiate remedial action to address the underlying causes. At appropriate times, perform root cause analysis across deviations. ME1.5 Board and Executive Reporting Develop senior management reports on IT’s contribution to the business, specifically in terms of the performance of the enterprise’s portfolio, IT-enabled investment programmes, and the solution and service deliverable performance of individual programmes. Include in status reports the extent to which planned objectives have been achieved, budgeted resources used, set performance targets met and identified risk mitigated. Anticipate senior management’s review by suggesting remedial actions for major deviations. Provide the report to senior management, and solicit feedback from management’s review. ME1.6 Remedial Actions Identify and initiate remedial actions based on performance monitoring, assessment and reporting. This includes follow-up of all monitoring, reporting and assessments through: 1. Review, negotiation and establishment of management responses 2. Assignment of responsibility for remediation 3. Tracking of results of actions committed ME4 Provide IT Governance ME4.1 Establishment of an IT Governance Framework Define, establish and align the IT governance framework with the overall enterprise governance and control environment. Base the framework on suitable IT process and control model and provide for unambiguous accountability and practices to avoid a breakdown in internal control and oversight. Confirm that the IT governance framework ensures compliance with laws and regulations and is aligned with, and 61 confirms delivery of, the enterprise’s strategies and objectives. Report IT governance status and issues. ME4.2 Strategic Alignment Enable board and executive understanding of strategic IT issues, such as the role of IT, technology insight and capabilities. Ensure that there is a shared understanding between the business and IT regarding the potential contribution of IT to the business strategy. Work with the board and the established governance bodies, such as an IT strategy committee, to provide strategic direction to management relative to IT, ensuring that the strategy and objectives are cascaded into business units and IT functions, and that confidence and trust are developed between the business and IT. Enable the alignment of IT to the business in strategy and operations, encouraging co-responsibility between the business and IT for making strategic decisions and obtaining benefits from IT-enabled investment. ME4.3 Value Delivery Manage IT-enabled investment programmes and other IT assets and services to ensure that they deliver the greatest possible value in supporting the enterprise’s strategy and objectives. Ensure that the expected business outcomes of IT-enabled investments and the full scope of effort required to achieve those outcomes are understood; that comprehensive and consistent business cases are created and approved by stakeholders; that assets and investments are managed throughout their economic life cycle; and that there is active management of the realization of benefits, such as contribution to new services, efficiency gains and improved responsiveness to customer demands. Enforce a disciplined approach to portfolio, programme and project management, insisting that the business takes ownership of all IT-enabled investments and IT ensures optimization of the costs of delivering IT capabilities and services. ME4.4 Resource Management Oversee the investment, use and allocation of IT resources through regular assessments of IT initiatives and operations to ensure appropriate resourcing and alignment with current and future strategic objectives and business imperatives. ME4.5 Risk Management Work with the board to define the enterprise’s appetite for IT risk, and obtain reasonable assurance that IT risk management practices are appropriate to ensure that the actual IT risk does not exceed the board’s risk appetite. Embed risk management responsibilities inti organization, ensuring that the business and IT regularly assess and report IT-related risk and their impact and that the enterprise’s IT risk position is transparent to all stakeholders. ME4.6 Performance Measurement Confirm that agreed-upon IT objectives have been met or exceeded, or that progress toward IT goals meets expectations. Where agreed-upon objectives have been missed or progress is not as expected, review management’s remedial action. Report to the board relevant portfolios, programme and IT performance, supported by reports to enable senior management to review the enterprise’s progress toward identified goals. ME4.7 Independent Assurance Obtain independent assurance (internal or external) about the conformance of IT with relevant has and regulations; the organisation’s policies, standards and procedures; generally accepted practices; and the effective and efficient performance of IT. 62 2.9 Perkreditan 2.9.1 Penggolongan Kredit M enurut M unir Fuady dalam Usman (2001:238) penggolongan kredit dibagi menjadi: a. Penggolongan berdasarkan jangka waktu, dibedakan antara kredit jangka pendek (1 tahun), kredit jangka menengah (1-3tahun) dan kredit jangka panjang (diatas5 tahun). Pembedaan ini berdasarkan pengamatan penulis adalah bersifat nisbi karena mungkin saja kredit jangka pendek diperpanjang setiap tahunnya tanpa diperjanjikan floating. b. Penggolongan berdasarkan dokumentasi yang dapat dibagi ke dalam: 1. Kredit dengan perjanjian kredit tertulis (formal). 2. Kredit dengan instrument promissory notes, bonds atau obligasi, kartu kredit, dan sebagainya. 3. Kredit cerukan atau overdraft. M enurut penulis,semua kredit tentu ada dokumentasinya, paling tidak ada cover letter yang menyertainya. Bila tidak, agak sukar kiranya untuk mentrasirnya lebih-lebih bila itu dengan klausul with recourse. c. Penggolongan bidang ekonomi, antara lain untuk bidang pertanian, pertambangan, perindustrian, listrik gas dan air, konstruksi, perdagangan, restoran, hotel, pengangkutan, sector jasa, dan lain-lain sector. d. Pengolongan berdasarkan tujuan penggunaannya, yaitu kredit konsumtif, kredit produktif, kredit investasi, kredit modal kerja, dan kredit likuiditas. 63 e. Penggolongan kredit berdasarkan objek yang ditransfer: 1. Kredit uang (money credit), di mana pemberian dan pengembalian kredit dilakukan dalam bentuk uang. 2. Kredit bukan uang (non money credit, mercantile credit, merchant credit) dimana diberikan dalam bentuk barang dan jasa, dan pengembaliannya dilakukan dalam bentuk uang. f. Penggolongan kredit berdasarkan waktu pencairannya: 1. Kredit tunai (cash credit) dimana pencairan kredit dilakukan dengan tunai atau pemindahbukuan ke dalamrekening debitur. 2. Kredit tidak tunai (non cash credit), dimana kredit tidak dibayar pada saat pinjaman dibuat, antar lain garansi bank atau stand by LC (yang bersifat conditional/bersyarat, yakni pembayaran dilakukan hanya jika syarat tertentu dipenuhi), letter of credit dalam hal ini impor barang ( dimana pembayaran dilkukan bank bila syarat dokumen perkapalan, yakni bill of lading atau airway bill memenuhi persyaratan letter of credit). g. Penggolongan kredit menurut cara penarikannya: 1. Kredit sekali jadi (aflopend) seperti cara kredit tunai sekaligus. 2. Kredit rekening Koran, yaitu kredit dimana penyediaan dan penarikannya dilakukan melalui rekening Koran yang tidak sekaligus terjadi, tetapi berangsur-angsur dan berulang-ulang selama ceiling kredit mencukupi. Debitur diharuskan menarik dengan cek, bilyet giro, dan warkat lainnya, lalu menyetorkan hasil usahanya melalui rekening ini baik tunai langsung ataupun melalui kliring. Cara ini yang paling umum dilakukan sehingga bank dapat mengontrol aktivitas usaha nasabah debitur. 64 3. Kredit berulang-ulang (revolving loan). Hampir sama dengan kredit diatas, hanya penggunaan rekening korannya secara terbatas. 4. Kredit bertahap, yakni kredit pencairan dana kreditnya dilakukan secara bertahap, misalnya tranche I, II, III, dan IV. 5. Kredit tiap transaksi (self liquidating atau eenmalige transactie crediet) merupakan kredit yang diberikan untuk satu transaksi tertentu, dimana pengembalian kredit diambil dari hasil transaksi yang bersangkutan. Sisi mana ( penjualan atau pembelian atau transaksi ) yang mengandung self liquidating ini sering tidak jelas sehingga kredit ini mungkin lebih tepat dimasukkan sebagai “golongan lain”. h. Penggolongan kredit dilihat dari pihak debiturnya. 1. Kredit terorganisasi, yakni kredit yang diorganisasi oleh lembaga legal dan dengan cara legal pula. 2. Kredit tak terorganisasi oleh berbagai lembaga atau perseorangan yang profesinya bukan sebagai lembaga kredit, seperti rentenir, penjual barang, dan lain-lain. i. Penggolongan kredit berdasarkan Negara asal: 1. Kredit domestic (domestic atau onshore credit) 2. Kredit luar negeri(foreign atau offshore credit) j. Pengolongan kredit berdasarkan jumlah kreditur: 1. Kredit dengan debitur tunggal 2. Kredit dengan debitur banyak (syndicated loan) 65 2.9.2 Pengertian Kredit dan Pembiayaan M enurut asal mulanya kata kredit berasal dari kata credere yang artinya adalah kepercayaan, maksudnya adalah apabila seseorang memperoleh kredit maka berarti mereka memperoleh kepercayaan. Sedangkan bagi si pemberi kredit artinya memberikan kepercayaan kepada seseorang bahwa uang yang dipinjamkan pasti kembali. Pengertian kredit menurut Undang-Undang Perbankan nomor 10 tahun 1998 adalah penyediaan uang atau tagihan yang dapat dipersamakan dengan itu, berdasarkan persetujuan atau kesepakatan pinjam meminjam antara bank dengan pihak lain yang mewajibkan pihak peminjam melunasi utangnya setelah jangka waktu tertentu dengan pemberian bunga. Sedangkan pengertian pembiayan adalah penyediaan uang atau tagihan yang dapat dipersamakan dengan itu, berdasarkan persetujuan atau kesepakatan antara bank dengan pihak lain yang mewajibkan pihak yang dibiayai untuk mengembalikan uang atau tagihan tersebut setelah jangka waktu tertentu dengan imbalan atau bagi hasil. Yang menjadi perbedaan antara kredit yang diberikan oleh bank berdasarkan konvensional dengan pembiayaan yang diberikan oleh bank berdasarkan prinsip syariah adalah terletak pada keuntungan yang diharapkan. Bagi bank berdasarkan prinsip konvensional keuntungan yang diperoleh melalui bunga, sedangkan bagi bank yang berdasarkan prinsip syariah keuntungan yang diperoleh berupa imbalan atau bagi hasil. 2.9.3 Unsur-Unsur Kredit Adapun unsur-unsur yang terkandung dalam pemberian suatu fasilitas kredit adalah sebagai berikut: 66 1. Kepercayaan Yaitu suatu keyakinan pemberi kredit (bank) bahwa kredit yang diberikan baik berupa uang, barang atau jasa akan benar-benar diterima kembali dimasa tertentu dimasa datang. 2. Kesepakatan Disamping unsur kepercayaan di dalam kredit juga mengandung unsur kesepakatan antara si pemberi kredit dengan si penerima kredit. Kesepakatan ini dituangkan dalam suatu perjanjian dimana masing-masing pihak menandatangani hak dan kewajibannya masing-masing. 3. Jangka waktu Setiap kredit yang diberikan pasti memiliki jangka waktu tertentu, jangka waktu ini mencakup masa pengembalian kredit yang telah disepakati. Hampir dapat dipastikan bahwa tidak ada kredit yang tidak memiliki jangka waktu. 4. Resiko Faktor resiko kerugian dapat diakibatkan dua hal yaitu resiko kerugian yang diakibatkan nasabah sengaja tidak mau membayar kreditnya pada hal mampu dan resiko kerugian yang diakibatkan karena nasabah tidak disengaja yaitu akibat terjadinya musibah seperti bencana alam. Penyebab tidak tertagih sebenarnya dikarenakan adanya suatu tenggang waktu pengembalian (jangka waktu). Semakin panjang waktu suatu kredit semakin besar resikonya tidak tertagih, demikian pula sebaliknya. Resiko ini menjadi tanggungan bank, baik resiko yang disengaja maupun resiko yang tidak disengaja. 67 5. Balas jasa Akibat dari pemberian fasilitas kredit bank tentu mengharapkan suatu keuntungan dalam jumlah tertentu. Keuntungan atas pemberian suatu kredit atau jasa tersebut yang kita kenal dengan nama bunga bagi bank prinsip konvensional. Balas jasa dalam bentuk bunga, biaya provisi dan komisi serta biaya administrasi kredit ini merupakan keuntungan utama bank. Sedangkan bagi bank yang berdasarkan prinsip syariah balas jasanya ditentukan dengan bagi hasil. 2.9.4 Jenis-Jenis Kredit Secara umum jenis-jenis kredit yang disalurkan oleh bank dan dilihat dari berbagai segi adalah: 1. Dilihat dari Segi Kegunaan M aksud jenis kredit dilihat dari segi kegunaannya adalah untuk melihat penggunaan uang tersebut apakah untuk digunakan dalam kegiatan utama atau hanya kegiatan tambahan. Jika ditinjau dari segi kegunaan terdapat dua jenis kredit yaitu: a. Kredit investasi Yaitu kredit yang biasanya digunakan untuk keperluan perluasan usaha atau membangun proyek atau pabrik baru dimana masa pemakaiannya untuk suatu periode yang relative lebih lama dan biasanya kegunaan kredit ini adalah untuk kegiatan utama suatu perusahaan. b. Kredit modal kerja M erupakan kredit yang digunakan untuk keperluan meningkatkan produksi dalam operasionalnya. Kredit modal kerja merupakan kredit yang dicarikan untuk mendukung kredit investasi yang sudah ada. 68 2. Dilihat dari Segi Tujuan Kredit Kredit jenis ini dilihat dari tujuan pemakaian suatu kredit, apakah bertujuan untuk diusahakan kembali atau dipakai untuk keperluan pribadi. Jenis kredit dilihat dari segi tujuan adalah: a. Kredit produktif Kredit yang digunakan untuk peningkatan usaha atau produksi atau investasi. Kredit ini diberikan untuk menghasilkan barang atau jasa. Artinya kredit ini digunakan untuk diusahakan sehingga menghasilkan suatu baik berupa barang maupun jasa. b. Kredit konsumtif M erupakan kredit yang digunakan untuk dikonsumsi atau dipakai secara pribadi. Dalam kredit ini tidak ada pertambahan barang dan jasa yang dihasilkan, karena memang untuk digunakan atau dipakai oleh seseorang atau badan usaha. c. Kredit perdagangan Kredit perdagangan merupakan kredit yang digunakan untuk kegiatan perdagangan dan biasanya untuk membeli barang dagangan yang pembayarannya diharapkan dari hasil penjualan barang dagangan tersebut. Kredit ini sering diberikan kepada supplier atau agen-agen perdagangan yang akan membeli barang dalam jumlah tertentu. 3. Dilihat dari Segi Jangka Waktu Dilihat dari segi jangka waktu, artinya lamanya masa pemberian kredit mulai dari pertama sekali diberikan sampai masa pelunasannya jenis kredit ini adalah: 69 a. Kredit jangka pendek Kredit ini merupakan kredit yang memiliki jangka waktu kurang dari 1 tahun atau p aling lama 1 tahun dan bisanya digunakan untuk keperluan modal kerja. b. Kredit jangka menengah Jangka waktu kreditnya berkisar antara 1 tahun sampai dengan 3 tahun, kredit jenis ini dapat diberikan untuk modal kerja. Beberapa bank mengklasifikasikan kredit menengah menjadi kredit jangka panjag. c. Kredit jangka panjang M erupakan kredit yang masa pengembaliannya paling panjang yaitu diatas 3 tahun atau 5 tahun. 4. Dilihat dari Segi Jaminan Dilihat dari segi jaminan maksudnya adalah setiap pemberian suatu fasilitas kredit harus dilindungi dengan suatu barang atau surat-surat berharga minimal senilai kredit yang diberikan. Jenis kredit dilihat dari segi jaminan adalah: a. Kredit dengan jaminan M erupakan kredit yang diberikan dengan suatu jaminan tertentu. Jaminan tersebut dapat berbentuk barang berwujud atau tidak berwujud. Artinya setiap kredit yang dikeluarkan akan dilindungi senilai jaminan yang diberikan si calon debitur. b. Kredit tanpa jaminan Yaitu kredit yang diberikan tanpa jaminan barang atau orang tertentu. Kredit jenis ini diberikan dengan melihat prospek usaha, karakter serta loyalitas si calon debitur selama berhubungan dengan bank yang bersangkutan. 70 5. Dilihat dari Segi Sektor Usaha Setiap sektor usaha memiliki karakteristik yang berbeda-beda, oleh karena itu pemberian fasilitas kredit pun berbeda pula. Jenis kredit jika dilihat dari sektor usaha sebagai berikut: a. Kredit pertanian, merupakan kredit yang dibiayai untuk sektor perkebunan atau pertanian rakyat. Sektor usaha pertanian dapat berupa jangka pendek atau jangka panjang. b. Kredit peternakan, dalam hal ini kredit diberikan untuk jangka waktu yang relative pendek misalnya peternakan ayam dan untuk kredit jangka panjang seperti sapi atau kambing. c. Kredit industri, yaitu kredit untuk membiayai industri pengolahan baik untuk industri kecil, menengah atau besar. d. Kredit pertambangan, yaitu jenis kredit untuk usaha tambang yang dibiayainya, biasanya dalam jangka panjang, seperti tambang emas, minyak atau tambang timah. e. Kredit perikanan, merupakan kredit yang diberikan untuk membangun sarana dan prasarana pendidikan atau dapat pula berupa kredit untuk para mahasiswa yang sedang belajar. f. Kredit profesi g. Kredit perumahan, yaitu kredit untuk membiayai pembangunan atau pembelian perumahan. h. Dan sektor-sektor usaha 71 2.10 Bank 2.10.1 Pengertian Bank Bank secara sederhana dapat diartikan sebagai:”lembaga keuangan yang kegiatan utamanya adalah menghimpun dana dari masyarakat dan menyalurkannya kembali dana tersebut kemasyarakat serta memberikan jasa bank lainnya.” Selanjutnya jika ditinjau dari asal mula terjadinya Bank maka pengertian bank adalah meja atau tempat untuk menukarkan uang. Kemudian pengertian Bank menurut Undang – undang RI nomor 10 tahun 1998 tanggal 10 november 1998 tentang perbankan adalah:”Badan usaha yang menghimpun dana dari masyarakat dalam bentuk simpanan dan menyalurkannya kepada masayarakat dalam bentuk kredit dan atau bentuk-bentuk lainnya dalam rangka meningkatkan taraf hidup rakyat banyak.” Dari uraian diatas dapat dijelaskan bahwa Bank merupakan perusahaan yang bergerak dalam bidang keuangan, artinya usaha perbankan selalu berkaitan masalah bidang keuangan. Jadi dapat disimpulkan bahwa usaha perbankan meliputi tiga kegiatan utama yaitu: 1. M enghimpun dana, adalah mengumpulkan atau mencari dana (uang) dengan cara membeli dari masyarakat luas dalam bentuk simpanan giro, tabungan dan deposito. Jenis simpanan yang dapat dipilih oleh masayarakat adalah simpanan giro, tabungan, serifikat deposit serta deposito berjangka dimana masing-masing jenis simpanan yang ada memeliki kelebihan dan keuntungan tersendiri. Kegiatan penghimpunan dana ini sering disebut dengan istilah funding. 2. M enyalurkan dana, adalah melemparkan kembali dana yang diperoleh lewat simpanan giro, tabungan dan deposito kemasyarakat dalam bentuk pinjaman (Kredit) bagi Bank yang berdasarkan prinsip konvensional atau pembiayaan bagi 72 Bank yang berdasarkan prinsip syariah. Kegiatan penyaluran dana ini juga dikenal dalam perbankan dengan istilah lending. 3. M emberikan jasa Bank lainnya, adalah jasa pendukung atau pelengkap kegiatan perbankan. Jasa-jasa ini diberikan terutama untuk mendukung kelancaran kegiatan menghimpun dan menyalurkan dana, baik yang berhubungan langsung dengan kegiatan penyimpanan dan kredit maupun tidak langsung. 2.10.2 Sejarah Bank Sejarah perbankan yang dikenal oleh dunia berawal darai daratan benua Eropa mulai dari zaman Babylonia yang kemudian dilanjutkan ke zaman Yunani Kuno dan Romawi. Bank – bank yang sudah terkenal pada saat itu di benua Eropa adalah Bank Venesia tahun 1171, kemudian menyusul Bank of Genoa dan Bank of Barcelona tahun 1320. Perkembangan perbankan di dataran Inggris baru dimulai pada abad ke-16. Namun karena Inggris yang begitu aktif mencari daerah penjajahan, maka perkembangan perbankan pun ikut dibawa ke Negara jajahannya seperti Benua Amerika, Afrika dan Asia yang memang sudah di kenal pada saat itu memegang peran penting dalam bidang perdagangan. Seiring dengan perkembangan perdagangan dunia maka perkembangan perkembangan perbankan pun semakin pesat karena perkembangan dunia perbankan tidak terlepas dari perkembangan perdagangan. Perkembangan perdagangan yang semula hanya berkembang dan maju didaratan Eropa akhirnya menyebar keseluruh benua Asia, Amerika, dan Afrika. 73 Dalam perjalanannya perkembangan perbankan di Indonesia tidak terlepas dari zaman penjajahan Hindia Belanda. Pemerintah Hindia Belandalah yang memperkenalkan dunia perbankan kepada masayrakat Indonesia. Di zaman kemerdekaan perkembangan perbankan di Indonesia bertambah maju dan berkembang lagi. Beberapa bank milik Belanda dinasionalisir oleh Pemerintahan Indonesia menjadi Bank milik pemerintahan Indonesia, sehingga menambah deretan Bank yang memang sudah ada sebelumnya. 2.10.3 Jenis-jenis Bank Praktik perbankan diindonesia saat ini yang diatur dalam Undang-undang Perbankan memiliki beberapa jenis Bank. Di dalam Undang-Undang Perbankan nomor 10 tahun 1998 dengan sebelumnya yaitu Undang-Undang nomor 14 tahun 1967, terdapat beberapa perbedaan jenis perbankan. Untuk jelasnya jenis perbankan dewasa ini dapat ditinjau dari berbagai segi antara lain: 1. Dilihat dari Segi Fungsinya Dalam Undang-Undang Pokok Perbankan nomor 14 tahun 1967 jenis perbankan menurut fungsinya terdiri dari: a. Bank Umum; b. Bank Pembangunan; c. Bank Tabungan; d. Bank Pasar; e. Bank Desa; f. Lumbung Desa; g. Bank Pegawai; h. Dan Bank jenis lainnya. Kemudian menurut Undang-Undang Pokok Perbankan nomor 7 tahun 1992 dan ditegaskan lagi dengan keluarnya Undang-Undang RI nomor 10 tahun 1998 maka jenis perbankan terdiri dari dua jenis bank yaitu: a. Bank Umum b. Bank Perkreditan Rakyat (BPR) 74 Pengertian Bank Umum sesuai dengan Undang-undang nomor 10 tahun 1998 adalah Bank yang melaksanakan kegiatan usaha secara konvensional dan atau berdasarkan prinsip syariah yang dalam kegiatannya memberikan jasa dalam lalu lintas pembayaran. Sedangkan pengertian Bank Perkreditan Rakyat menurut Undang-undang nomor 10 tahun 1998 adalah Bank yang melaksanakan kegiatan usaha secara konvensional atau berdasarkan prinsip syariah yang dalam kegiatannya tidak memberikan jasa dalam lalu lintas pembayaran. Disamping kedua jenis Bank di atas dalam praktiknya masih terdapat satu lagi jenis Bank yang ada di Indonesia yaitu bank Sentral. Jenis bank ini tidak bersifat komersial seperti halnya Bank Umum dan BPR. Bahkan disetiap Negara jenis ini selalu ada dan di Indonesia fungsi Bank Sentral di pegang oleh Bank Indonesia (BI). 2. Dilihat dari Segi Kepemilikan Jenis bank dilihat dari segi kepemilikan maksudnya adalah siapa saja yang memiliki bank tersebut. Kepemilikian ini dapat dilihat dari akte pendirian dan penguasaan usaha yang dimiliki bank yang bersangkutan. Jenis Bank dilihat dari segi kepemilikan adalah sebagai berikut: a. Bank milik Pemerintah Akte pendiri maupun modalnya dimiliki oleh Pemerintah, sehingga seluruh keuntungan bank ini dimiliki oleh pemerintah. b. Bank milik Swasta Nasional Bank yang seluruh atau sebagian besarnya dimiliki oleh swasta nasional serta akte pendiriannya pun didirikan oleh swasta, begitu pula pembagian keuntungannya diambil oleh swasta. 75 3. Dlihat dari Segi Status Pembagian jenis Bank dari segi status merupakan pembagian berdasarkan kedudukan atau status Bank tersebut. Kedudukan atau status ini menunjukkan ukuran kemampuan Bank dalam melayani masyarakat baik dari segi jumlah produk, modal maupun kualitas pelayanannya. Jenis Bank bila dilihat dari segi status biasanya khusus untuk Bank umum. Dalam praktiknya jenis Bank dilihat dari status dibagi ke dalam dua macam yaitu: a. Bank Devisa Bank yang berstatus devisa atau Bank Devisa merupakan Bank yang dapat melaksanakan transaksi keluar negeri atau yang berhubungan dengan mata uang asing secara keseluruhan. b. Bank non devisa Bank yang belum mempunyai izin untuk melaksanakan transaksi sebagai bank devisa, sehingga tidak dapat melaksanakan transaksi seperti halnya Bank Devisa. 4. Dilihat dari Segi Cara M enentukan Harga Jenis Bank jika dilihat dari segi atau caranya dalam menentukan harga baik harga jual maupun harga beli terbagi dalam 2 kelompok yaitu: a. Bank yang berdasarkan Prinsip Konvensional M ayoritas Bank yang berkembang di Indonesia dewasa ini adalah Bank yang berorientasi pada prinsip Konvensional. Hal ini disebabkan tidak terlepas dari sejarah bangsa Indonesia dimana asal mula Bank di Indonesia dibawa oleh kolonial belanda (barat). Dalam mencari keuntungan dan menentukan harga kepada para nasabahnya, Bank yang berdasarkan prinsip konvensional menggunakan 2 metode yaitu: 76 1. M enetapkan harga jual, baik untuk produk simpanan seperti giro, tabungan maupun deposito. Demikian pula harga beli produk pinjamannya (kredit) juga ditentukan berdasarkan tingkat suku bunga tertentu. Penentuan harga seperti ini disebut dengan istilah spread based. 2. Untuk jasa-jasa Bank lainnya pihak perbankan konvensional menggunakan atau menerapkan berbagai biaya-biaya dalam nominal atau persentase tertentu seperti biaya administrasi, biaya provisi, sewa, iuran dan biaya-biaya lainnya. System pengenaan biaya ini disebut dengan istilah fee based. b. Bank yang berdasarkan Prinsip Syariah Penentuan harga Bank yang berdasarkan Prinsip Syariah terhadap produknya sangat berbeda dengan Bank yang berdasarkan Prinsip Konvensional. Bank berdasarkan Prinsip Syariah menetapkan aturan perjanjian berdasarkan hukum islam antara Bank dengan pihak lain baik dalam hal untuk menyimpan dana atau pembiayaan usaha atau kegiatan perbankan lainnya. Penentuan harga atau menari keuntungan bagi bank yang berdasarkan Prinsip Syariah adalah dengan cara: 1. Pembiayaan berdasarkan prinsip bagi hasil (mudharabah). 2. Pembiayaan berdasarkan prinsip penyertaan modal (musbarakah). 3. Prinsip jual beli barang dengan memperoleh keuntungan (murabahah). 4. Pembiayaan barang modal berdasarkan sewa murni tanpa pilihan (ijarah). 5. Atau dengan adanya pilihan pemindahan kepemilikan atas barang yang disewa dari pihak Bank oleh Pihak lain (ijarah wa iqtina). 77