We Define IT
  • Home
  • Plans
  • Testimonials
  • Professional Services
  • Blog
  • Contact
  • Login

Understanding the Sarbanes-Oxley Act

Managed IT Services

Picture
For accountants that deal with publicly owned companies, ensuring your IT infrastructure is SOX-complaint is a must.

The Sarbanes-Oxley Act was adopted as law to ensure that investors have reliable data in which to make their financial decisions. The law was, in large part, a result of the accounting scandals that took place around the turn of the 21st century including within publicly-traded organizations such as Enron, Tyco International, Adelphia, and WorldCom. These scandals cost investors billions of dollars and resulted in a widespread loss in confidence in American securities. To remedy this loss-of-confidence, the United States congress took swift measures in a bipartisan co-sponsored bill that amended the necessary processes that publicly traded companies reported revenue. The bill is named after its co-sponsors, Senator Paul Sarbanes (D-MD) and Representative Michael G. Oxley (R-OH) and was signed into law by President George W. Bush on July 30, 2002.

By upgrading fiscal reporting laws, many of which were over 60 years old, the Sarbanes-Oxley Act (as it was known upon ratification) changed the way that accountants were required to go about presenting information to the boards of publicly traded companies, and thus places an emphasis on IT to assist in accomplishing this task. Since the law calls for dynamic reporting requirements to be put in place, including pro-forma figures, stock transactions of corporate officers, and off-balance-sheet transactions, computing now plays a much larger role in the execution of proper oversight under the Sarbanes-Oxley Act.

What is SOX Compliance?
​

SOX compliance is the observation of the protocols mandated by the Sarbanes-Oxley Act. The sprawling reform, made it necessary to report all numbers to the Securities Exchange Commission (SEC) in an effort to cut back on corporate scandals that had been defrauding investors. IT was a enacted as a few well known publicly-owned corporations were "cooking their books" in order to retain unjustifiably high stock prices, inflating the worth of their companies. When the fraud was realized, it was too late and billions of investment dollars were lost.
In regards to technology, a SOX-compliant infrastructure is the creation and maintenance of a secure computing system that allows for privacy for secure transfer of financial information directly to accountable parties (i.e. Company officers). The creation of this infrastructure must meet the requirements of a SOX third-party auditor. These auditors are hired at the expense of the organization that requires the audit.

SOX Compliance Questions
  • Some of the variables that SOX auditors look for in a compliant IT infrastructure:
  • Is there an identity-based security system in place on the applicable framework?
  • Do the right people have access to the right data?
  • Are services isolated to ensure that a compromised service can't compromise an otherwise compliant infrastructure?
  • Does the IT framework or database provide the confidentiality required by Article 404 of Sarbanes-Oxley?
  • Is there physical security in place for applicable servers?
  • Is there a firewall protecting that server from the internet, with applicable alterations that are to be made specifically for SOX compliance?
  • Are you connections to your server encrypted?

Conclusion

It's true that the protection against the misrepresentation of revenue often lays on the shoulder of a company's technology. The IT professionals at We Define IT Consulting can clarify network security and the role it plays in regulatory compliance. Our certified technicians can help you prepare for your SOX, HIPAA, or PCI DSS audit.

For more information on Sarbanes-Oxley compliance for accounting firms, call us today at 888-234-WDIT (9348) .

  • IT Threat Glossary
  • Understanding Business Continuity
  • Introducing Windows 10
  • Windows Server 2003: End of Life
  • Understand the Internet of Things
  • Understanding Network Security
  • Understanding SOX
  •  Understanding BYOD
  • Understanding PCI DSS
  • Windows XP End of Life
  • Understanding HIPAA
  • Cloud Computing
  • Understanding Windows 10

Free White Paper

Picture
This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.
Download
Need Consultation?

    IT Questions?

    If you have questions about whether or not our IT services platform is right for your business, simply complete and submit this form and one of our trusted IT professionals will promptly respond to your query! 
Contact Us
Connect With Us
Remote First - Our Company Blog
 Facebook
Twitter
E-Mail
Instagram
LinkedIn
RSS Feed
Services

24/7 Remote Help Desk & NOC Services

Unlimited On-Site Technical Repair Services

Managed Anti-Virus, Malware, Spyware, Greyware, Rootkit and Identity Theft Protection


Windows / Mac / Linux / Unix File Server, Exchange and SQL Backup & Disaster Recovery

Secure, Redundant Cloud Storage

Apple, Windows Activesync, Android, Blackberry & Nokia Symbian Mobile Device Management

Managed IT Services Consulting

Virtual Chief Information Officer (CIO) Services
Client Remote Support

Enter 6-Digit Remote Support Code




Picture
Search Our Site

Home  |  @Home - Residential  |  @Work - Business  |  @School - Educational  |  @Worship - Spiritual |  Virtual CIO  |  Contact Us  |   Login

CALL US TOLL-FREE:  888-234-WDIT
Copyright ©2021  We Define IT LLC, All Rights Reserved. 
Site Design by  Nu Web Order Designs.  Hosting Powered by  Hostivity.

New York, New Jersey,  Connecticut, Pennsylvania, Brooklyn, Manhattan, Queens, Bronx, Staten Island, Long Island, Technical, Computer,  Managed IT, Support, Services
  • Home
  • Plans
  • Testimonials
  • Professional Services
  • Blog
  • Contact
  • Login