Recommendations to avoid errors and potential fraud are to appoint another person to overview and check the work. Another option is to employ second trained person or train one of the current employees to help Payroll and Personnel Database Clerk in duties, as well as replace in case of illness or holidays or to train one of the current employees from another department.
3.2. Company’s employees do not comply with the policy. Passwords are not kept secret and had not been changed since they were set-up. Every computer uses the same password. Unauthorised people have access to the computers, which may lead to fraud.
Change the password on each computer and remind everyone to regularly change it, for instance, every six months. In addition, arrange a meeting with the staff and explain the policy with examples what may happen, if the staff does not comply with the policy. Point out that, if the rules continue to be broken, disciplinary actions would be taken.
3.3. Shops, warehouse and administration staff does not have system to sign in and out when arriving and leaving work. All wages paid rely on managers’ honesty to provide accurate and honest information.
Recommendation is to purchase software, for instance ‘BePunctual Biometric Time and Attendance Tracking Software for Employee’. As well as set up a Network where all computers can be connected and data is available to other departments.
3.4. All computers in the company work as stand-alone. There is no network set-up to allow transfer of data, as well as access shared files in case of absence of the member of staff.
Very useful would be to set-up a network connected by one server, when computers would integrate. This would save time on writing e-mails and copying data.
You May Also Find These Documents Helpful
-
1. The payroll clerk receives the time cards from the various department supervisors at the end of each pay period, checks the employee’s hourly rate against information provided by the personnel department, and records the regular and overtime hours for each employee.…
- 792 Words
- 4 Pages
Good Essays -
All of the shortcomings mentioned above could lead to material errors and irregularities. The lack of the segregation of duties is a material weakness. The payroll clerk could easily submit false or fictitious input data and could hide the irregularities by making unapproved changes to the reconciliations of the payroll register. Also, the procedure for voiding computer-generated checks and issuing manual replacement checks could result in major irregularities that might not be noticed by others within their spectrum of duties.…
- 656 Words
- 3 Pages
Satisfactory Essays -
1. Using the table below, identify how quality standards link to legislation, policy and procedures in your current health sector organisation (or one that you know well).…
- 1445 Words
- 6 Pages
Good Essays -
Ms. Davidson would like to have the office computers available to her people on the road. They carry mobile phones and laptops.…
- 596 Words
- 3 Pages
Good Essays -
Email might also be an option but the entire staff cannot function efficiently without a password for the computer, it might be better to use the phone.…
- 598 Words
- 3 Pages
Satisfactory Essays -
I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…
- 565 Words
- 3 Pages
Satisfactory Essays -
Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…
- 777 Words
- 3 Pages
Good Essays -
The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related…
- 696 Words
- 3 Pages
Good Essays -
To suggest an implementation of new systems that will help to reduce errors and fraudulent activity with in the financial accounting systems of the organisation, particularly payroll and improving the current systems relating to the storage of cheques and petty cash.…
- 4123 Words
- 17 Pages
Powerful Essays -
The utilization of LDAP for the employee directory will ensure that information about employees such as phone, email, department and office location is updated. The automation process will start with the recruitment of talent from the up-to-date database. Existing and future employees will have the ability to research available jobs on the Intranet or company website. Payroll will be automated to empower employees to make changes to benefit deductions as well as manage time off requests electronically. The updates of timecards will also be done by employees, through a self-service portal. This process will get automated via a business workflow, where the manager will automatically get notified of HR/payroll changes of their direct reports. The new system will also address a major concern- the ability for employees to take fractional time off during a…
- 689 Words
- 3 Pages
Satisfactory Essays -
We have to train the employees on the protection of their user IDs and login information to the companies system. Show the employees how to create a better password and security questions and not to write there passwords down on sticky notes to help remember. Making them aware of friends, family, or people that ask questions out of the ordinary, because the questions could possibly your security questions or part of your password. The user only has three attempts and they are locked out and will have to see a admin to be unlocked.…
- 506 Words
- 3 Pages
Satisfactory Essays -
Let’s look at confidentiality which is one of the most important measures to maintain safety and security. Not following procedures according to Data Protection Act 1998, which objectives aim at secure data processing and storage, may result in legal action against employers. These procedures may vary depend on the nature of the business. Nowadays vast majority of the business relay on computerised filling system, therefore, employers must take every necessary measure to protect that system from for example, hackers. Employees, on the other hand must follow all procedures to ensure they use system correctly and legally. Consequently, not following health, safety and security procedures may also lead to economic crises of an organisation, for example, court may order to pay very high fine or close down the business and loss of the customers. Moreover, an employer who failed to follow health, safety and security procedures where as a result employees are getting harmed at work is highly likely to be exposed to organisational grievance or disciplinary procedures. For example, in a care home failure to provide moving and handling training to induction staff would have catastrophic consequences such as: spine injuries acquired by using incorrectly equipment or by not using it at all when necessary or even a death of a care taker if handled inappropriately using unsecured hoist. This scenario would not…
- 335 Words
- 1 Page
Satisfactory Essays -
The widespread use of Internet and e-mail has transformed the way business is conducted in the typical American workplace. Undeniably, the Internet and e-mail have also given employees a means of escaping briefly from long days at the office. How many of you have used work computers for your personal use? More than likely all of us have at one point or another. Should our employers even allow us to use the business computers for our own personal benefit on company time? Of course, the answer to this question varies from business to business depending on the computer use policy of the particular company. Employees should know and understand their employers’ computer use policy before accessing business computers for personal use. Disciplinary action, up to and potentially including termination of employment, could result if misuse occurs.…
- 996 Words
- 4 Pages
Better Essays -
Employees who want to go on leave are asked to fill the leave request form which would be approved by both the supervisor and the HR department. Leave balances are accumulated and subtracted manually using the bin card system. The problem is that at the end of every period these balances on the cards would not tally with those at the payroll, audit calculation and those known by individual employees. Most audit reports showed that some people had more days than actual and some were left in negative after these audit calculation. Disagreements usually arise between the employees and the HR department. It is assumed that the main cause of this problem is due to pressure of work, mix-up between other request forms and leave forms, error in calculations and some leave forms are lost before subtracted on the cards. There is no enough security in the department since only approved papers are filled in a secure cabinet. Therefore in conclusion the loss of revenue in the company due to accumulated leave balances which is an expense added to that of consumables (bond papers, files pens,…
- 1386 Words
- 6 Pages
Powerful Essays -
computers. These employees are people who are responsible to do the daily routine work other…
- 3937 Words
- 16 Pages
Powerful Essays