REPORT DIGEST DEPARTMENT OF EMPLOYMENT SECURITY FINANCIAL AUDIT For the One Year Ended: COMPLIANCE AUDIT For the Two Years Ended: Summary of Findings: Release Date: State of Illinois WILLIAM G. HOLLAND AUDITOR GENERAL To obtain a copy of the Report contact: (217)782-6046 or TDD (217) 524-4646 |
SYNOPSIS
|
ILLINOIS DEPARTMENT OF EMPLOYMENT SECURITY
FINANCIAL AND COMPLIANCE AUDIT
For the Two Years Ended June 30, 2001
FINANCIAL INFORMATION (in thousands) |
FY 2001 |
FY 2000 |
FY 1999 |
REVENUES (All Funds) |
$1,075,902 281,426 134,623 2,000 $1,493,951 $1,789,375
|
$1,156,161 205,070 135,362 466 $1,497,059 $1,379,192
|
$1,157,105 186,230 127,548 185 $1,471,068 $1,330,218
|
SELECTED ACCOUNT BALANCES (All Funds, in thousands) |
FY 2001 |
FY 2000 |
FY 1999 |
Cash and cash equivalents |
$1,979,633 |
$2,237,522 |
$2,094,703 |
SUPPLEMENTARY INFORMATION | *FY 2001 |
FY 2000 |
FY 1999 |
|
4.56 |
4.03 |
4.25 |
AGENCY DIRECTOR |
During Audit Period: Linda Renee Baker (July
1999-February 2000) |
*Calculation does not include fourth quarter.
Programming staff can access production data, thus creating a risk that unauthorized access to critical information could occur |
FINDING, CONCLUSION, AND RECOMMENDATIONS MAINFRAME COMPUTER PRODUCTION ACCESS Managers of computer application development areas have access to the computer production environment. Access is granted through super IDs which include access to the specific applications and data for which the area has support responsibility. Managers can elect to share this access with their programmers by sharing their passwords. Granting programmers access to production data creates a greater risk that unauthorized access to Department resources could occur, resulting in critical information being read, modified, or destroyed. The Department maintains critical applications such as unemployment compensation information. Access to such information should be restricted to help enforce proper segregation of duties and reduce the risk of unauthorized access. We recommended the Department conduct an independent review of the computer access logs and create a record to explain each instance of access to the production environment by programming staff. (Finding 1, page 9). Department officials concurred with our recommendation and stated a computer generated report, which captures the access date, time, and activity, will be produced each time a super ID is used by programmers for production. The Production Supervisor will match it against the manual form prepared by the programmer with managerial approval for use of the ID. AUDITORS OPINION Our auditors stated the Department of Employment Securitys financial statements present fairly, in all material respects, the financial position of the Department as of June 30, 2001.
_____________________________________ WILLIAM G. HOLLAND, Auditor General WGH:KMC:ak SPECIAL ASSISTANT AUDITORS KPMG LLP were our special assistant auditors for this audit. |