C376 Different responsibilities of IS auditor
docx
keyboard_arrow_up
School
Republic Polytechnic *
*We aren’t endorsed by this school
Course
C376
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
17
Uploaded by 7uphysics
C376_WO01_6P.pdf
X
B
Understand
IT
compliance
and
IT
audit
M
In
supporting
organisational
strategies
and objectives,
W
Apply
IT
strategy
B
Identify
different
types
of
IT
governance
framework
and assess
the
effectiveness
B
Apply
IT
risk
and
compliance
as
well
as
internal audit
organisational
structure
concepts
M
Understand
IS
auditor’s
role
in
Project
Management
M
A
typical
project
management
processes
include
W
Initiating
E
Planning
L}
M
Executing
E
B
Controlling
§
W
Closing.
Hand
project
over
to
end
users
once
closed,
it
is.
During
project closure
B
Assign
outstanding
issues
to
someone
to
follow
up
FINISH
B
Archive
project
documentation
M
Discuss
lessons
learned
B
Considerations
for
IS
Auditor include
Program
B
Connection
between
organisation’s
strategy
and
the
project
e
end
closely
linked
M
Relationship
between
the
project
and
other
projects
through
a
common
B
Connection
between
the
project
and
the
underlying
business
case
i
B
Going
through
the
considerations
helps
IS
Auditor
to
identify
Start
with
project
Usually
have
a
)
o
charter,
end
with
longer
duration,
B
Common
objectives
for
the
organisation
eompletiono,
higher
budget
and
B
Risk
project
higher
risk
B
Resource
connections
Managed
by
a
Managed
by
a
project
manager
program manager
M
Project
organisational
form
B
Projectised,
Matrix
o
Influence
B
IS
auditor
should review
the
adequacy
of
the
W
IS
Auditor
plays
the
role
of
control
experts
B
Amount
of
involvement
from
project
in
application
development
projects
committee/board,
e.g.
via
meeting
minutes
B
Auditor
may
be
included
in
the
project
B
Risk
management
methods
team
as
an
advisor
but
may
be
ineligible
to
R
perform
audit
of
the
system
when
it
educe
.
becomes
operational
u
Avoid
B
Transfer
B
Helshe
should
be
clear
about
the
roles
and
responsibilities
in
project
management,
B
Accepuable
including:
B
Processes
for
planning
and
dependency
management
B
Tasks
include
B
Identifying
significant
application
components
and
the
flow
of
transactions
(data
flow)
E
Systems
e
project
team
B
Identifying
the
application
control
strengths
and
evaluating
the
impact
of
the
control
weaknesses
M
Evaluating
control
environment
by
analysing
test
Security
officer
results
and
other
audit
evidence
to
determine
that
control
objectives
are
achieved
engineer
B
Considering
the
operational
aspects
of
the
application
to
ensure
its
efficiency
and
effectiveness
C376_WO02_6P.pdf
X
Bl
Understand
Systems
Development
Life
Cycle
(SDLC)
and
evaluate
business
case
for
proposed
investments
M
Evaluate
project
management
framework
and
controls
to
determine
if
organisational
business
requirements
achieved
are
cost-effective
while
risks
are
managed
M
Understand
methods
of
migrating
system
into
production
environment
after
UAT
B
Business
Case
Provide information,
including
cost
and
benefits
analysis
and
provide
justification
for
an
organisation
or
IT
Steering
Committee
to
decide
whether
a
project
should
proceed
or
not
First
step
of
a
project
and
output
of
a
feasibility
study.
Includes
B
Define
the
project
scope
Conduct
a
current
analysis
Identify
requirements
based
on
stakeholder
needs
.
B&t
Recommend
an
approach
Evaluate
cost-effectiveness
of
approach
B
Conduct
formal
review
with
stakeholders
M
S
auditor
should
Review
documentation
for
the
phase
to
ensure
it
is
reasonable
Check
that
cost
and
benefits
analysis
is
performed
and
anticipated
costs
and
expected
benefits
are
calculated
Check
if
solution
can
be
achieved
with
current
systems.
If
not,
review
the
evaluation
of
alternative
solutions
to
ensure
reasonableness.
Determine
if
chosen
solution
is
suitable
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
B
Management
need
to
know
if
high
investment
in
IT
projects/solutions
is
worth
it.
Projects
are
judged
based
on
B
Cost
B
Time
M
Scope
B
Quality
B
To
assess
projects,
IS
auditor
need
to
understand
how
the
business
define
Return
of
Investments
(ROI)
ROI
=
Net
income
/
Total
investment
Example
from
the
worksheet
in
week
02:
Total
investment
=
$2,000
Total
investment
=
$2,500
Net
income
=
$50,000
Net
income
=
$50,000
ROl
=
Net
income
/
Total
investment
ROl
=
Net
income
/
Total
investment
=50,000/2,000
=25
=150,000/2,500
=20
B
During
testing,
the
IS
auditor
should
B
Review
the
test plan
and
end-user
procedures
for
accuracy
and
completeness
B
Interview
end-users
of
the
system
for
their
understanding
of
operating
instructions
W
Verify
that
system
security
works
as
designed
Review
user
acceptance
testing
results
M
Review
unit
and
system
test
plans
to
determine
whether
tests
for
internal
controls
are
planned
and
performed
B
Review
the
user
acceptance
testing
and
ensure
that
the
accepted
software
has
been
delivered
to
the
implementation
team.
The
vendor
should
not
be
able
to
replace
this
version.
=
Prior
to
system
production
cut-over,
IS
auditors
must
be
able
to
effectively
provide
management
with
their
assessment
about
the
system
readiness
Plan
ahead
-
Should
be
prepared
well
in
advance
of
the
implementation
date
Each
step
of
setting
up
the
production
environment
should
be
documented,
including
who
will
be
responsible,
how
the
steps
will
be
verified
and
the
back-out
procedures
Step
|
—
Develop
Support
Structures
B
Define
required
roles
M
Find
out
the
skills
that
support
personnel
need
to
improve
by
conducting
workshops
with
the
support
personnel
to
understand
their
current
tasks,
skills,
and
tools
Step
2
—
Establish
Support
Functions
W
Develop
plans
for
W
Staff
training
;;
o
18
7\r
W
End user
training
During
the
implementation
phase,
the
IS
auditor
should
M
Verify
appropriate
sign-offs
have
been
obtained
M
Review
all
system
documentation
to
ensure
that
all
recent
updates
from
the
testing
phase
are
included
M
Verify
all
data
conversion
to
ensure
that
they
are
correct
and
complete
Certification
&
Accreditation
M
Certification
is
the
technical
review
of
the
system
or
product,
e.g.
Palo
Alto
Firewall
is
tested
against
Common
Criteria
certification
at
EAL4+.
B
Involves
an
audit
of
security
controls,
a
risk
assessment,
or
a
security
evaluation
W
Typically,
the
results
of
the
certification
testing
are
compiled
into
a
report.
It
is
the
auditor
opinion
to
management
as
to
whether
the
system
meets
the
business
requirements,
appropriate
controls,
and
is
ready
to
go-live.
B
Accreditation
is
the
management
formal
acceptance
of
a
system.
M
Itis
an
important
step
before
system
goes
live.
C376_WO03_6P.pdf
X
B
Apply
post
implementation
review
to
determine
if
project
deliverables,
controls
and
the
organisation’s
requirements
are
met
M
Analyse
results
of
Information
Systems
periodic
reviews
so
as
to
meet
organisation's
objectives
B
Understand
practices
in
problem
and
incident
management
to
determine
whether
incidents,
problems
or
errors
are
timely
recorded,
analysed
and
resolved
B
To
determine
whether
project
deliverables,
controls
and
the
organisation’s
requirements
are
met
B
Conduct
after
the
system
has
been
in
production
for
a
period
of
time
to
measure
the
project’s
overall
success
and
impact
on
the
business
B
Metrics
include
@
B
Total
cost
of
ownership
(TCO)
Click
here
for
the
|
/=
oo
or
ownersie
-
video
on
TCO
5
M
Return
on
investment
(ROI)
A
M
S
auditor
should
B
Determine
if
the
system’s
objectives
and
requirements
were
met
B
Determine
if
the
cost
benefits
are
being
measured,
analysed
and
accurately
reported
to
management
Review
program
change
requests
to
understand
the
changes
made
to
the
system
Review
security
controls
to
ensure
that
they
are
operating
according
to
design
Review
error
logs
to
check
if
there
are
any
operating
problems
Review
reports
to
verify
that
the
system
is
processing
data
accurately
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Change
management
process
should
be
formal,
documented
and
should
include
the
following
procedures
B
Authorisation
Detailed
of
the
request
=
=
Testing
of
changes
Implementation,
i.e.
deploy
changes
into
production
Communication
to
end users
B
Handling
unauthorised
changes
Procedures
associated
may
vary
according
to
the
type
of
change
request,
such
as
B
Emergency
changes
B
Major
changes
M
Minor
changes
Enhancement
or
defect
IS
auditor
should
review
change
management
process
for
possible
improvements
in
methodology
and
procedures
M
Response
time
and
response
effectiveness
EMERGENCY
M
Emergency
procedures
M
Change
requests
raised
and
whether
appropriate
operations
documents
are
updated
Problem
Management
deals
with
solving
underlying
cause
of
one
or
more
incidents
to
resolve
the
root
cause
of
errors
and
to
find
permanent
solutions.
This
process
deals
at
the
enterprise
level.
Incident
Management
is
to
restore
service
as
quickly
as
possible
to
meet
Service
Level
Agreements
(SLA).The
process
is
primarily
aimed
at
the
user
level.
M
Prioritisation
of
incidents,
in
the
aspects
of
urgency
and
impact
aspects,
needs
to
be
considered
B
IS
management
should
have
criteria
for
assigning
incident
priority,
e.g.in
an
e-
commerce
company,
network
failure
of
the
web
server should
be
given
high
priority.
IS
auditor
should
examine
problem
reports
and
logs
to
ensure
that
incidents
are
resolved
in
time
and
by
those
most
capable
of
resolving
the
problem
B
When
auditing
a
network,
the
IS
auditor
should
review
controls
over
network
implementations,
ensuring
that
standards
are
present
for:
B
The
design and
selection
of
network
architecture
B
A
suitable
cost-benefit
relationship
between
network
procurement
and
operation
G
S
*
Network
hardware
«
Controls
in
the
server
*
Passwords
devices
facility,
including
«
Network
user
access
*
Documentation
tem_perature_,_humidity_
and
change
requests
*
Key
logs
static
electricity,
surge,
*
Security
reports
and
*
Network
wiring
closet
(e
pro'tectlon.and
U
mechanisms
and
transmission
wiring
*
Protection
of
backup
media
*
Cleanliness
C376_WO04_6P.pdf
X
B
Understand
the
need
for
release
management
and
recognise
best
practices
for
it
M
Evaluate
IT
operations,
e.g.
job
scheduling,
configuration
management,
capacity
and
performance
management,
to
determine
if
they
are
effectively
controlled
and
continue
to
support
organisation’s
objectives
B
Recognise
the
importance
of
Information
Systems
maintenance
to
support
organisation’s
objectives
B
Evaluate
IT
maintenance
(patches,
upgrades)
to
determine
whether
they
are
controlled
effectively
and
continue
to
support
the
organisation’s
objectives
B
Recognise
the
importance
of
Confidentiality,
Integrity
and
Availability
M
Evaluate
IS
policies,
standards,
guidelines
and
procedures
for
completeness
and
alignment
with
generally
accepted
practices
and
compliance
with
applicable
external
requirements
W
|T
Operations
team
is
responsible
for
ongoing
support
of
organisation’s
computing
and
IS
environment,
ensuring
that
B
Computer
processing
requirements
are
met
B
End
users
are
satisfied
B
Information
is
processed
securely
B
Outside
parties
(third
parties,
cloud
computing)
meet
the
company's
processing
requirements
B
The
organisational
structure
of
IT
operations
depends
on
the
size
of
the
computing
environment,
e.g.it
can
be
one
manager
and
one
system
admin
only
or
a
team
of
hundreds
that
support
global
operations
B
IS
auditor
should
understand
the
scope
of
IT
operations
when
conducting
an
audit
of
this
area
B
IT
control
environment
requires
procedures
detailing
operational
tasks
and
processes
as
well
as
IS
management
oversight.
Such
IT
Operations
documentation
includes
procedures
for
B
Operating
instructions
for
computers
and
peripheral
equipment,
e.g.
photocopiers
M
Monitoring
systems
and
applications,
e.g.
file
server
capacity
M
Detection
of
system
and
application
errors
and
issues
u
Handling
of
IS
problems
and
the
escalation
of
unresolved
issues,
e.g.
helpdesk
to
escalate
to level
2
engineer
for
critical
issues
Backup
and
recovery,
e.g.
backup
and
recovery
to
offsite
or
tapes
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
M
Job
scheduling
is
a
major
function
within
the
IT
department,
and
in
environments
with
a
large
number
of
jobs
to
run.This
may
be
managed
with
a
job
scheduling
software,
e.g.
Systemwalker
(Fujitsu)
or
Linux
Cronjobs
B
Server
resources
must
be
able
to
support
the
number
of
jobs
running!
B
The
schedule
includes
B
Jobs
that
must
be
run
Batch
A
B
The
sequence
of
job
execution
(et
Snck)
B
The
conditions
that
cause
job
execution
Batch
8
Batch
¢
B
The
ability
to
prioritize
jobs
according
to
time
availability
(WeskiyRactupl,
|(Monthly
Beokvp)
B
Scheduling
review
by
the
IS
auditor
includes
the
below:
Schedule
daily
job
Process
priorities
Check
console
log
or
“status
”
-
Output
of
the
daily
job
saved?
Jobs
prioritised
in
correct
order?
screen
-
Status
of
jobs
monitored?
Jobs
run
according
to
schedule?
Processing
log
and
exception
Re-execute
task/job
Personnel
-
Is
written
or
electronic
approval
-
Re-execute
jobs
authorised
&
logged?
|
Is
the
personnel
who
can
assign,
change
from
owners
obtained
when
S
g
job
schedules
or job
priorities
scheduling
ad-hoc
jobs?
ensure
correct
input
files
and
rerun
of
authorised
to
do
so?
-
Are
exception
processing
requests
subsequent
jobs
exist?
recorded?
B
When
performing
an
audit
on
hardware
maintenance,
IS
auditor
should
ensure
that
a
formal
maintenance
plan
has
been
developed
and
it
must
be
B
Approved
by
management
B
Implemented
and
followed
B
To
perform
optimally,
hardware
needs
be
cleaned
and
serviced
on
a
routine
basis,
e.g.
photocopier
M
Identify
maintenance
costs
that
exceed
budget
or are
excessive.
B
In
the
case
of
the
photocopier,
it
needs
to
be
serviced
every
3
months.As
the
company
would
like
to
save
money,
it
is
serviced
once
a
year.Thus,
although
there
is
savings
in
the
first
year
but
in
the
second
year,
due
to
wear
and
tear,
there
is
the
need
to
replace
parts
of
the
photocopier
and
this
may
cost
even
more.
M
This
is
likely
an
indication
of
not
following
maintenance
procedures
Source
code
are
lines of
computer
programs
written,
e.g.
in
Java
System.out.println(“Hello
World!”);
—
There
are
two
types
of
version control
system
(VCS)
namely,
.
B
Centralized
version control
system
(CVCS),
e.g.
Subversion
B
Distributed
version
control
system
(DVCS),
e.g.
Git
0
git
Key
advantages
of
DVCS
M
Commits
new
changes
locally
first
before
anyone
else
sees
them
M
Allows
developers
to
work
remotely
as
entire
source
code
is
replicated
to
local
PC
IS
auditor
should
be
concerned
about
the
following
B
Who
has
access
to
the
source
code?
Who
can
commit
the
code?
Is
the
correct
source
code
used
for
compiling
to
object
code?
Is
the
change
and release
procedures
followed?
Is
the
source
code backup?
C376_WO05_6P.pdf
X%
M
Evaluate
IT
service
management
framework
and
practices
(internal
or
third
party)
to
determine
whether
the
controls
and
service
levels
expected
by
the
organisation
are
being
adhered
to
and
whether
strategic
objectives
are
met
M
Evaluate
the
organisation’s
IT
policies,
standards,
and
procedures,
and
the
processes
for
their
development,
approval,
implementation,
maintenance,
and
monitoring,
to
determine
whether
they
support
the
IT
strategy
and
comply
with
regulatory
and
legal
requirements
B
Demonstrate
the
optimal
selection
of
logical
security
controls
B
Understand
generally
accepted
practices
to
protect
Information
Assets
B
Information
Security
Management
(ISM)
is
the
most
critical
factor
in
protecting
information
assets.
Key
elements
include:
Senior
management
Establish
policies,
.
leadership,
commitment
standards,
and
Roles
Defintion
Securltg
dauvgggess
and
&
support
procedures
P
Monitoring
and
Incident
handling
and
e
e
compliance
response
M
ISM
Roles:
Information
Executive
Chief
information
Chief
pri
Information
asset
security steering
Imamagement
security
officer
fr'“
P'g;g
owners
and
data
Users
committee
28
(CIsO)
i
(EHe)
owners
Information
Security
1S
auditors
security
specialist/
IT
developers
External
parties
administrator
advisors
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
B
Very
often,
organisations/system
administrators/IS
auditors
are
faced
with
challenge
to
check
if
their
controls
are
effective/enough
B
CRITERIA
for
effective/enough
is
at
least
ONE
control
in
each
of
the
three
areas
namely
Preventive,
Detective,
and
Corrective
M
Preventive
control
is
to
prevent
an
unwanted
event
M
Detective
control
is
to
record
wanted
and
unwanted
event
M
Corrective
control
is
to
check
on
a
existing
process
in
order
to
improve
the
process
if
found
to
be
defective
Type
Area
|:Preventive
Area
2:
Detective
=
Area
3:
Corrective
Administrative
X
Technical
X
Physical
X
C376_WO06_6P
(2).pdf
x
M
Evaluate
the
design,
implementation
and
monitoring
of
system
and
logical
security
controls
to
verify
confidentiality,
integrity,
and
availability
of
Information
M
Evaluate
the
design,
implementation,
and
monitoring
of
data
classification
processes
and
procedures
for
alignhment
with
the
organisation’s
policies,
standards,
procedures
and
applicable
external
requirements
M
Identify
best
practices
for
storage,
retrieval,
transportation,
and
disposal
of
information
assets
M
Evaluate
the
processes
and
procedures
to
store,
retrieve,
transport
and
dispose
information
assets
to
ensure
adequate
protection
M
I|dentify
Personal
Data
from
the
perspective
of
an
individual
as
well
as
organisation
W
Logical
access
controls
are
the
primary
means
used
to
Application
HITP,FTP,
TP
manage
and
protect
information
assets
U
pr
Presentation
JPEG,
GIF,
MPEG
i
TR
ayers
|
IS
auditors
need
to
understand
organisation’s
IT
e
.
environment,
consisting
of
the
below
security
layers,
so
as
to
effectively
assess
logical
access
controls
Transport
TCP.UDP.
SPX
A
.
WP,
1PX
B
Application
—
Network
bt
u
3
Ethemet
ATH
B
Database
@e
||
Datalink
|
povie
=T
|
OS
platform
Physical
Em;r::"v::::zmg
B
Network
Paths
of
Logical
Access
B
Access
or
points
of
entry
to
an
organization’s
IS
infrastructure
can
be
gained
through
M
Direct
e.g
standalone
PC
M
Local
Area
Network
e
g
RP
wireless
network
fl
B
Remote
eg.
FTR
VPN
o
B
Any
point
of
entry
not
controlled
effectively can
e
e
potentially
compromise
the
security
of
an
organisation’s
critical
information
resources
o
Local
Area
Network
M
IS
auditor
should
determine
whether
all
points
of
entry
are
identified
and
managed
Process
of
establishing
and
proving
a
user’s
identity
For
most
systems,
I&A
is
the
first
line
of
defense
as
it
prevents
unauthorised
people
(or
processes)
from
entering
a
computer
system
or
accessing
an
information
asset
Common
I&A
vulnerabilities
include
Use
of
simple
or
easily
guessed
passwords
Lack
of
encryption
for
authentication
and
protection
of
information
transmitted
over
a
network,
e.g.
using
TELNET
to
access
FTP,
Cisco
switches,
passwords
are
in
cleartext!
Lack
of
knowledge
on
the
risk
associated
with
sharing
authentication
elements,
e.g.
sharing
administrator
password
Lack
of
confidentiality
and
integrity
for
stored
authentication
information,
e.g.
/etc/shadow,
SAM
file
Authentication
methods
IS
auditor
should
be
familiar
with
the
organisation’s
authentication
Multifactor
authentication:
Combination
of
more
than
one
authentication
method
Single
sign-on
(SSO):
Process
for
consolidating
all
of
an
iation'
A
-
Logon
ID:
organisation’s
platform-based
administration,
authentication
and
=
authorisation
functions
into
a
centralised
administrative
function
Passwords
Tokens
|
Biometrics
policies
M
Authorisation
refers
to
the
access
rules
that
specify
who
can
access
what
B
Access
control
is
often
based
on
principle
of
least
privilege,
which
refers
to
the
granting
to
users
of
only
those
accesses required
to
perform
their
duties
M
IS
auditor
needs
to
know
what
can
be
done
with
the
access
and
what
is
restricted
M
IS
auditor
must
review
access
control
lists
(ACLs).
B
AnACL
is
a
register
of
users
who
have
permission
to
use
a
particular
system
and
the
types
of
access
permitted.
B
Access
controls
administration
are
reviewed
to
determine
that
B
Policy exists
to
ensure
access
rights
are
reviewed
periodically
B
Procedures
exist
for
adding
individuals
to
access
list,
changing
their
access
capabilities
and
deleting
them
from
the
list
M
Password
controls
administration
are
reviewed
to
determine
that
B
Policy exists
to
ensure
that
individual
passwords
are
not
disclosed
B
Standards
exists
to
ensure
that
B
Passwords
are
of an
adequate
length
(at
least
8
characters)
and
complexity
(combination
of
special
characters,
digits,
and
capital
letters)
B
Passwords
are
periodically
changed
every
60
days
B
User
IDs
are
locked
after
a
3
attempts
B
System
Logs
B
Audit
trail
records
should
be
protected
by
strong access
controls
as
compromised
logs
can
hamper
IT
security
investigations
W
IS
auditor
should
check
that
organisation
is
able
to
B
show
evidences
that
their
logs
cannot
be
tampered
with,
or
altered
without
leaving
an
audit
trail
e.g.
using
read-only
CD,
centralised
log
server
B
prevent
system
administrators
from
having
physical
and
network
access
to
logs
of
their
own
activities
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
B
Management
should
define and
implement
procedures
to
prevent
access
to,
or
loss
of,
sensitive
information
when
it
is
stored,
disposed
of
or
transferred
to
another
user
M
Procedures
must
be
created
for
M
Storing
information
assets
using
magnetic
tape
or
portable
hard
disk
B
Destroying
information
assets
using
Eraser
software
or
Degausser
B
Transporting
information
using
Secure
Email
System,
or
instant
messaging
M
IS
auditor
must
understand
and
be
able
to
evaluate
acceptable
methods
for
data
management
from
creation
through
destruction
om‘.
i
et
e
S
ot
oy
.
i
e
e
C376_WO07_6P.pdf
X
Understand
Personal
Data
Protection
Act
(PDPA)
and
its
impact
on
individual
and
organisation
Understand
how
organisation
asks
for
personal
data
and
handles
to
view
or
delete
personal
data
Understand
obligations
of
PDPA,
especially
on
accountability
and
consent
obligations
Understand
the
usage
of
Do
Not
Call
(DNC)
registry
and
the
various
modes
of
registration
Explain
the
protection
of
NRIC
by
individual
and
organisation
and
identify
non-
legitimate
requests
for
NRIC
by
organisation
Understand
the
penalty
for
individual
and
organisation
for
non-compliance
to
PDPA
Apply
policies,
standards,
procedures,
and
security
controls
in
organisation
that
aligns
to
PDPA
Understand
amendments
to
PDPA
and
Spam
Control
Act