Preview

Summary: Companies Should Not Be Held Liable For Losses

Good Essays
Open Document
Open Document
838 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Summary: Companies Should Not Be Held Liable For Losses
Companies Should not be Held Liable for Losses Sustained in a Successful Attack Made on Their AIS by Outside Sources.
ACCT451

2013

I argue against the statement" Companies should not be held liable for losses sustained in a successful attack made on their AIS by outside sources." There are several reasons for my contention. The Accounting Information Systems has been used by businesses to improve their recording, processing, and reporting of accounting information. At the same time it is the responsibility of the companies to adequately protect their information systems from outside sources. Since, the company benefits and consequently profits from the use of accounting information system, it should bear the losses that arise from attacks on the accounting information system.
The argument in favor of the contention is that the accounting information system not only processes financial transactions to provide internal reports to managers but also does external reporting to outside parties such as stockowners, government and lenders. Since, it is essential that the accounting information system should be accessed by outsiders the system is particularly vulnerable to outside attacks (1). Still the onus of the security of its accounting information system clearly lies with the company and
…show more content…
These risks have to be borne by the business as a part of its normal business risks. Further it is the responsibility of the company to maintain the highest level of security for its accounting information system. The physical security should be fool proof, authentication system should be the most advanced, virus protection should be the latest, and backup should be done at a safe place outside the premises. Such measures are required to ensure that attacks on the accounting information system like identity theft and loss of irreplaceable data do not take

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 971 Words
    • 4 Pages

    Core Concepts of Accounting Information System Author: Nancy A. Bagranoff copyright © 2008 John Wiley & Sons, Inc.…

    • 971 Words
    • 4 Pages
    Better Essays
  • Good Essays

    External audits will assess computer-base accounting systems. The purpose of the audit is to determine how the computerized system impacts Kudler’s financial statements. Substantive test will be done to ensure proficiency; and it will begin with a preliminary test. A risk assessment will be another objective of the audit. “Risks of material misstatement can arise from a variety of sources, including external factors, such as conditions in the company 's industry and environment, and company-specific factors, such as the nature of the company, its activities, and internal control over financial reporting” (Audited No.12, 2012). The risk must be evaluated because the system controls strengths and weakness affects the scope of the audit. “The risk-base audit approach provides auditors with a good understanding…

    • 986 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There are many types of risks that a company has to confront each day in information technology (IT). The four main types of risk are business, audit, security, and continuity risks. A business risk is when a company will not be able to achieve its goals and objectives; this could be union issues, a competing company, fraud, or production equipment failure. Audit risks include misstatement of financials by an auditor or a failure by an auditor to uncover fraud or material errors. A security risk can be a host of things that would ruin the integrity and access of the data, which can also lead to fraud or misuse of other information from internal (like employees) to external (like hackers) sources. And, finally, continuity risks are information system risks that have to do with backup, recovery and day to day availability of the system. When unplanned risks occur, management and auditor need to act quickly to intercept the risk, balance the risk with cost-effective countermeasures, since it is impossible to plan all risks (Hunton, Bryant, & Bagranoff, 2004).…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Case Study

    • 625 Words
    • 3 Pages

    References: Beard, Deborah & Wen (2007). Reducing the Threat Levels for Accounting Information Systems. The CPA Journal Online. Retrieved from http://www.nysscpa.org/cpajournal/2007/507/essentials/p34.htm…

    • 625 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are many rules companies must follow whenever documenting financial information or any other data which is gather during any business transactions. In order for said companies to report financial information internal controls have to be put in place as companies have to adhere to certain laws and regulations. Internal controls can be defined as a process which companies follow in order to ensure all financial reporting is done in a reliable and lawful manner. Some think of it as a system which works within a system as it plays a major role on the success of a company’s accounting system. At the organizational level, internal control objectives relate to the reliability of financial reporting, timely feedback on the achievement of operational or strategic goals, and compliance with laws and regulations (Anderson, Chris, 2008). Internal controls in accounting are considered an essential business function which gives companies the growth potential necessary to succeed. Included in the internal controls are the elements of risk assessment, information communication and goes as far as defining the roles and responsibilities of each employee.…

    • 1015 Words
    • 4 Pages
    Better Essays
  • Good Essays

    In addition to the audit plan for the analyzed processes, of Kudler Fine Foods, encouragement of ways to improve audit documentation and process, by using computer technology was addressed to Kudler’s management team. As a result, Kudler Fine Foods management team is considering incorporating proposed computer assisted auditing techniques (CAATs) within its systems. CAATs will increase efficiency levels of an auditor’s personal productivity during analysis and data extraction of the audit which is beneficial to the performance of Kudler. CAAT will also service as a validation agent providing assurance of data integrity and reliability to the operations of Kudler Fine Foods for its users. CAAT surfaces inconsistencies that can be verified timely.…

    • 1007 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    inflation

    • 475 Words
    • 2 Pages

    Do you agree with this statement? Are there any circumstances where a company may be held liable…

    • 475 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Farahmand, & F., Navathe, & S., Sharp, G., & Enslow, P., Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach, Retrieved March 11, 2012, from http://infosecon.net/workshop/pdf/39.pdf…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Cool Paper

    • 781 Words
    • 4 Pages

    The theft of data is the least significant cause of financial loss due to a security breach. True or false?…

    • 781 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The iPremier and Denial of Service Attack case study is a made up case from the Harvard Business School. This case shows clearly how companies may not be taking their security seriously and after several high profile hacking stories, we can see that is the truth. The background of the case is that iPremier, a high end online store, suffered a DOS attack during the night. Those in charge of operations attempted to find the cause of the attack but were met with resistance from their collocation facility. Once granted access and after almost the entire company’s senior management team was involved, the attack stopped. There was no rhyme or reason as to how or why but it stopped and business was back to normal on the site.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An information system security breach could result in serious financial losses, the disclosure of protected private information, loss of research and development data or fines by regulatory agencies. Losses due to intrusions into an information system could negatively affect the general public (i.e. power failures). This might result in costly class action lawsuits that could exceed an organization's ability to pay and result in its dissolution. Even an individual might be sued for negligence and be financially ruined.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Security Issues

    • 291 Words
    • 2 Pages

    The article talks about the most unexpected of data breaches. Mostly in cyber crime, data-thieves, target large-scale networks as a means of hijacking important information about credit card numbers of customers or other bank details. However, in this situation, the on-campus clinic database of UC Berkeley (University of California) was breached. "Coughing up tons of data about parents, students and spouses" (Fox, 2009). The unexpected nature of this security breach may be overlooked, since it is "just" a schools clinical database. However such systems contain invaluable information to identity thieves. Information like credit card numbers addresses, etc, which could undermine the safety and security of the individual. This indicates a shift from the normal conventional attacks on financial institutions to poorly secured alternative databases, where cyber criminals can retrieve information about people. The article stipulates that in such a situation, the end users are no longer the weakest link in the security chain. In this sense, most of the blame cannot be put on the end users. "The distinction belongs to the corporations above the chain" (Fox, 2009). It is necessary as end users to keep our computers and all other relevant information safe. However, if companies who are in charge of such sensitive information employ an insecure and shoddy way of doing their job, then security will always be an issue. My verdict is, companies who house information, should know that all data is relevant to a client. So, important mechanisms and policies should be put in place to secure their data.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer Security Issues

    • 1058 Words
    • 31 Pages

    According to American FBI (US Federal Bureau of Investigation) investigation, the network security creates the economic loss surpasses 17,000,000,000 dollars every year. 75% corporation report finance loss is because the computer system security problem creates. More than 50% safe…

    • 1058 Words
    • 31 Pages
    Better Essays
  • Good Essays

    Protect Your Computer

    • 1198 Words
    • 5 Pages

    individuals and companies around the globe have lost millions of dollars in terms of revenue by one form of attack or the other.let us take a look at this few mentioned one after another;…

    • 1198 Words
    • 5 Pages
    Good Essays