Problem 1segregation of duties in the personal computing

Assignment Help HR Management
Reference no: EM13347962

Problem 1

Segregation of duties in the personal computing environment:

What role should the HR organization play in this space? Also, what about the culture of the organization and its role in ensuring compliance?

Problem 2

Provide examples (include citations) of how control activities (access control, segregation of duties, transaction authority, supervision, accounting records, for example) have been implemented along with how they have helped or failed to mitigate risks within an organization.

Problem 3

Look at the specifics in the changes made between SAS 70 and SSAE 16. Select a specific change and share your thoughts on whether the change makes an improvement or not. Support your assertion.

Problem 4

Reply to the reading below:

• What is the purpose behind segregation of duties in the personal computing environment?

Special considerations should be taken when auditing the personal computer environment. The challenge arises from the mobility or fluidity attributed to personal computing and the lack of internal control features usually found in larger, enterprise-wide systems. In this context, the general purpose behind segregation of duties (SoD) is to prevent unauthorized access or modification to the operating system(s), applications, or data found in a multi-user computer system by a single individual or party. For example, management can employ different techniques to prevent unauthorized access to a specific resource including the use of hidden files or secret file names, and employing passwords and cryptography (Gupta, 2005). In particular, these controls can be specifically divided into preventive, detective, and corrective. As aforementioned, preventive controls include aspects such as usernames (IDs) and passwords used by all modern operating systems prior to granting access to a particular user. Additional preventive controls may inhibit the same individual from being in charge of developing, maintaining, and running a specific financial software. Detective controls can be achieved by restricting access via physical security measures as well as logical approaches such as detecting inaccurate data being uploaded to a financial application. Corrective controls can be achieved via audit trails and exception reports. If any control weaknesses are found in the SoD process, direct supervision and work reviews should be enforced to counteract the deficiencies.

• Why is inadequate segregation of duties a problem in the personal computing environment?

Without proper SoD, unauthorized access to data and applications can occur in a variety of ways. For example, there is an inherent risk in having a single individual in charge of data processing also possess the ability to change program files. This increases the chances of errors going undetected or, in the worst cases, the potential for concealment and fraud. An employee may also have access to multiple applications that process incompatible transactions. For example, a single individual may be responsible for entering all transaction data, including sales orders, cash receipts, invoices, and disbursements. This degree of authority would be similar, in a manual system, to assigning accounts receivable, accounts payable, cash receipts, cash disbursement, and general ledger responsibility to the same person (Hall, 2011).

Problems 5

Reply to the reading below:

What is the purpose behind segregation of duties in the personal computing environment?

The personal computer (PC) is intended to be used by a single user. The user has individual applications, files, and access to the computer. However, a company could have general PCs available to all employees with applications that store and manipulate customer data, keep inventory, handle accounting functions, access on-line applications, and surf the internet. Separation of duties is a key internal control concept. (Hall, 2011) The purpose of segregation of duties is to minimize incompatible functions. No single person should have control over an entire transaction. For example, the secretary should not have access to accounting information. The accountant shouldn't have access to inventory and customer information. The duties of authorization, custody of assets and record-keeping should be the responsibility of three different people - each trained in that particular duty. Duties are considered to be incompatible if one person can get into the system and hide irregularities while performing day-to-day activities without detection.

Why is inadequate segregation of duties a problem in the personal computing environment?

Many small companies may have access to multiple applications that perform incompatible tasks. For example, one person may be in charge of entering employee and customer information, invoices, payments, and other such transactions. If all of these transactions are performed on a general company PC, the other employees could access the applications and manipulate the data. Also, other employees that are not trained in the applications could inadvertently change information and data on the PC. Without individualized password protection on the PC itself and each application, there is no way to tell who is responsible for any errors that occur.

Reference no: EM13347962

Questions Cloud

Question 1joanna greenhas started a domestic cleaning : question 1joanna greenhas started a domestic cleaning business clear view cleaning cvc. she started the business on 1st
Air conditioning1- cooling and heating load estimate using : air conditioning1- cooling and heating load estimate using camel program library and the data from da-9 perform a
Write an essay on marketing design innovation : write an essay on marketing design innovation assignmentdissertation in research methods for managers along with
Introductionthe australian medical association ama 2010 : introductionthe australian medical association ama 2010 noted that the world health organisation who alma-ata
Problem 1segregation of duties in the personal computing : problem 1segregation of duties in the personal computing environmentwhat role should the hr organization play in this
Part iquestion 1a 90 confidence interval estimate shows : part i.question 1.a 90 confidence interval estimate shows that there is a 90 percent chance that the true population
Analyze security requirements and develop a security policy : analyze security requirements and develop a security policy that fully addresses them. the project will enable the
Consideration does not have to be adequate or commercially : consideration does not have to be adequate or commercially realistic nor does it have to be expressed in monetary
Question 1which of the following statements is true for a : question 1which of the following statements is true for a trapdoor function f?a. the function f can be computed

Reviews

Write a Review

HR Management Questions & Answers

  Vision, mission, and employee cooperation

Visions and missions should be motivating, inspiring, encouraging. They should give everyone a purpose... But, there has to be a mix of "heart" and "science" to both motivate people and achieve goals.

  Explain the goals of the change initiative

Prepare a memo to the department heads of Pegasus to explain the goals of the change initiative, which is the reorganization. In this memo you must gain the trust of the department heads by a clear explanation for the need for change.

  Show the types of benefits offered

If you were in a position to decide the benefits to offer a team what type of benefits would you consider offering and why? How would you justify the cost of these benefits?

  Question related to intrinsic motivators

How will intrinsic motivators and extrinsic rewards blend to maximize productivity and how do social needs motivate behavior

  Explain the importance of organization development

Explain the importance of organization development and training professionals working together to manage the change process within an organization. Also, describe how these groups benefit from gaining competencies in each other's area of expertise..

  Human resource style and employee run

Explain What are the differences and similarities between these two companies in reference to Human Resource style, union/non-union, employee run

  Explain the roles and responsibilities of the project manage

Explain the roles and responsibilities of the project manager and the contract manager, according to Garrett, then compare and contrast them.

  Explain how would you handle this situation

Explain How would you handle this situation and What steps can you take to ensure that she is heard

  Managerial accounting - budgeted direct labor cost

Managerial Accounting - Budgeted Direct Labor Cost

  Annual performance evaluation-knowledge of motivation theory

Using your knowledge of motivation theory, suggest three possible reasons that could explain why participation rates are down. If, after investigation, those reasons turned out to be true causes, what night you are able to do to improve participat..

  When should variances be investigated

When should variances be investigated and Who should be responsible for correcting a negative variance? Why? What are some factors that can lead to variances? How can variances be corrected?

  Outsourcing a portion of the companys operation

Outsourcing a Portion of the Company's Operation - A researcher has observed that some firms in the furniture industry outsource activity such as transportation services while others do not.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd