AUDIT & ADVISORY SERVICES |
|
|
|
|
|
In this issue:
- Operational – Grant Accounting
- IT Security – Cybercrime
- Research Security - Introducing Steven Schrimpf
- USC Integrity Line
- News Links
- Contact Information
|
|
|
Operational - Grant Accounting |
|
|
In higher education, sponsored grants are critical for funding research, scholarships, and other initiatives. However, managing the grant life cycle can be complex and time-consuming. One function of the life cycle is grant accounting, which serves an important role in ensuring financial information related to sponsored projects is accurately reported in the University’s financial statements. It’s important to get grant accounting right the first time. Errors can lead to additional time and expense to correct, and if not corrected, may result in compliance issues, delayed funding, and potential penalties. Following are training opportunities related to grants administration:
Office of Research
Grant Administrators:
- Onboarding (on-demand recordings) – The research administrator onboarding program introduces those new to the University to research-specific policies and processes. You can find additional information or register at: Research Administrator Onboarding Training
|
|
|
- Strategic Training in Research Innovation and Administrative Excellence (STRIVE) – The STRIVE program is a comprehensive three-tiered program designed to enhance skills and knowledge across the life cycle of sponsored funding. For more information, click here. STRIVE Cohort Classes for fiscal year 2024-25 can be found at: Research Administrator Training Calendar
- Certified Research Administrator (CRA) – The CRA program prepares the participants to take the CRA exam. For more information on becoming a CRA, please click here.
Principal Investigator Trainings:
- PI Academy – The PI Academy introduces faculty members to grant processes at the University. Please visit PI Academy for more information.
Office of the Controller
While the Office of the Controller is in the process of developing a Post-Award Grant Administration Certification program to begin in Spring 2025, there is significant information already available on grant administration:
Grant Administration
Principal Investigators
Business Managers
|
|
|
|
Have you heard the saying, “you’re only as strong as your weakest link”? When it comes to protecting the University from cybercriminals, the saying could not be more true. What are cybercriminals?
According to Trend Micro, cybercriminals are individuals or teams of people who commit malicious activities on networks to steal sensitive company information or personal data, and generate profit. Whereas the risk of cyber-attacks cannot be prevented, it can be mitigated through preparation. For example, on Friday, October 14, 2024, the Division of Information Technology (DoIT), Office of General Counsel, Enterprise Risk Management, Communications and Marketing, University Law Enforcement and Audit and Advisory Services convened to simulate a cybercrime and assess our ability to successfully respond. Throughout the 3-hour exercise, each group appeared very knowledgeable of their respective incident-response roles and responsibilities.
So what is your role in fighting cybercriminals and mitigating the risk of a cybercrime? We are glad you asked. According to the Federal Bureau of Investigation (FBI), each of us are required to be aware and on guard when connecting to the network or internet. For clear instructions from the FBI, read here. |
|
|
Research Security - Introducing Steven Schrimpf - USC’s Director of Research Security and Chief Research Security Officer |
|
|
University of South Carolina recently established a Director of Research Security position in the Office of the Vice President for Research. On November 18th, Steven Schrimpf joins USC as the university’s first Director of Research Security and Chief Research Security Officer (CRSO). Steven brings extensive national security experience to USC from his background working in law enforcement, federal government, and the private sector.
In his new role at USC, Steven will oversee the design, development, implementation, and monitoring of an effective Research Security and Export Control program. He will be working collaboratively with a broad group of institutional leaders to lead and coordinate USC’s research security efforts including policies and procedures, education and training, systems improvements, and institutional compliance across USC’s research enterprise.
Stay tuned for more information from the Office of The Vice President for Research, and please join us in welcoming Steven to USC!
|
|
|
|
|
The USC Integrity Line is an anonymous reporting system, administered by an independent third-party provider, Lighthouse Services, Inc. Use this service to report a concern about questionable or unethical behavior.
* * *
USC Integrity Line Reporting
You can report your concern anonymously to the USC Integrity Line:
Reports are shared with a select group of three individuals:
-
Chair of the Audit, Compliance and Risk Committee of the Board of Trustees
-
Chief Audit Executive
-
General Counsel
These individuals determine the appropriate path forward for investigating your report.
Click
here
for more information on the USC Integrity Line
|
|
|
Relevant University Policy:
University employees are expected to report any concerns regarding possible noncompliance with laws, regulations, and policies.
|
|
|
Fraud & Ethics
Information Technology
Campus Life & Safety
|
|
|
Contact Audit & Advisory Services
1600 Hampton St.
Suite 610
Columbia, SC 29208
Have suggestions or requests for future newsletter topics? Send us an email.
|
|
|
|
|
|