IT Due Diligence Questionnaire
IT Due Diligence Questionnaire
Description Yes No
IT Management
Are IT policies and procedures developed, approved and centrally posted for key
IT processes?
Is there an acceptable use policy regarding company IT assets that all personnel
are required to acknowledge?
Personnel
Are there policies that expressly prohibit the use of company programs or data
for purposes other than work?
Contractors
Are contractors required to comply with the same policies and procedures as
employees, such as the requirement to sign non-disclosure agreements?
Are the contractors’ length of stay monitored so that they comply with IRS
regulations?
1
Description Yes No
Network
Is a tool used that monitors for rogue devices that are attached to the network?
Operating Systems
Are there any users with unsupported operating systems on their laptops or
workstations that transmit data into the network?
Applications – Developed
Is evidence, such as test results and approvals, maintained for future reference?
2
Description Yes No
Is there timely communication from human resources that results in the timely
decommissioning of accounts upon termination?
Is there a mechanism to track the labor involved during the development cycle so
that those costs can be capitalized?
Are the provisions of SOP 98-1, Accounting for the Costs of Computer Software
Developed or Obtained for Internal Use, understood by the programmers so that
non-qualifying costs are not capitalized?
Applications – Shrinkwrap
Change Management
Are all changes, other than infrastructure changes, initiated by the business?
3
Description Yes No
Data
Is sensitive data (e.g., credit card numbers, SSNs, etc.) encrypted or masked in
the database(s)?
Has the flow of key financial reporting or other key data been mapped so that all
programs are identified?
Disaster Recovery
Has a business impact assessment been performed that considers the impact of
systems failure on the financial reporting process?
Operations
4
Description Yes No
How many problem tickets are there that have been open for more than 3 days?
Third-Party Services
Are there contracts that clearly articulate the responsibilities of the third parties?
Are there performance metrics that third parties are required to adhere to?
Laptops/Workstations
Security
Are access rights at the application and operating system level periodically
reviewed and confirmed?
Spreadsheets
5
Description Yes No
Has the logic in each spreadsheet been verified by somebody other than the
creator of the spreadsheet?