Trang

Thứ Năm, 29 tháng 8, 2013

Master Course Documents

Here is your materials:
1. Slide handout:http://www.mediafire.com/download/i7x8223bueo1ame/corporategovernence1.pdf
2. Chapter 2: Financial Introductions
 http://www.mediafire.com/download/3a1dtne8hckouen/Introduction_of_financial_functions.pdf
3. Chapter 2: Financial function Reference Document: http://www.mediafire.com/download/2o6h5x1lekou6pl/Financial_Functions.pdf
4. Chapter 2: Solver
http://www.mediafire.com/download/3r5pj5tbc5s8d0o/Solver2.pdf
http://www.mediafire.com/download/guza7hpf1rf88ko/Solver1.pdf

Enjoy yourself,


Thứ Tư, 28 tháng 8, 2013

Questions For Practices



Questions For Practices

1.       What is Information Technology and Communication (ICT)? Classify it in alternative types and give the examples.

2.      Classify the phases in a life cycle of IT project? List the alternative methods and these advantages/disadvantages.

3.      List the alternative steps to manage an ITC project? Give an example list of activities needed for ITC project.

4.      What is E-HRM? Analyse the different between E-HRM and HRM according to their advantages and disadvantages?

5.      What is E-HRM objectives? Classify E-HRM types and give the examples for each type.

6.      Analyse the E-Employee Profile function in E-HRM system. Give an example of its activities.

7.      Analyse the E-Employee Recruitment function in E-HRM system. Give an example of its activities.

8.      Analyse the E-Employee Training function in E-HRM system. Give an example of its activities.

9.      Analyse the E-Employee Performance Management function in E-HRM system. Give an example of its activities.

10. Analyse the E-Employee Compensation function in E-HRM system. Give an example of its activities.

11. What is PayRoll System? List and analyse its basic functions.

12. What is Time and Attendant System? List and analyse its basic functions

13. What is Recruiting System? List and analyse its basic functions

14. What is Fraud, and How to prevent the Business Fraud?

15. Classify levels of Risk. Analyse 7 steps of Control Implementation.

16. What is transaction Risk? Analyse the levels of transaction risk in alternative levels.

17. What is PayRoll Risk? How to governance its risks?

18. What is  Organization duties to governance the Fraud Risks?

19. What is Personal Responsibilities to manage the Fraud Risk?

20. List and analyse of threats in employment practice in payroll system?

WORKS
1.      Write a Project Plan for an E-HRM Function which you chosen
2.      Write a potential report about Risk Assessment for your company payroll system.

Control checklist Payroll

Link to download excel file: http://www.mediafire.com/download/s90a15g5b3o0b08/Control_Checklists_Payroll.xls

Payroll Process-Fraud and error risks and controls to mitigate them




Risk
Risks Details
Control
Incorrect processing/payment of payroll by mistake or with intention  (fraud)
Payroll system access not properly controlled/managed
System controls should be in place. Access to the payroll system and data is restricted based on the job duties and established in such a way to avoid the risk of fraud.Example: The persons responsible to record salaries should not have the access to record the salaries payment.
Incorrect processing/payment of payroll by mistake or with intention  (fraud)
Segregation(divide) of Duties in the Payroll system access and of duties between payroll team members are not properly managed
Duties should be properly segregated. The duties  between diff payroll team employees should be properly segregated to ensure there are no conflicts of interest and to avoid fraud risks
Incorrect input by mistake or with intention  (fraud)  of payroll information
Most important changes like: bank account no.,  salary value change, new hires (risk: fictive), leavers are incorrectly input
Data input/changes should not only be controlled by the person doing the actual inputting, but also should be subject to a peer review (100% or by sample) and high level review and approval from the Manager.
Incorrect processing of payroll
Inaccurate computation of salaries (gross to net)
Few random checks should be executed to confirm the correctness of the salaries computation, each month via simulation programs outside of the payroll tool.
Incorrect processing/payment of payroll by mistake or with intention  (fraud)
Avoid wrong payroll processing/double payments/ fictitious payments
Design Payroll controls Reports to ensure correct payroll process and  help identify potential issues/or fraud. These analytics reports do not replace the other controls but represent complementary checks.                                                                             Examples of payroll control reports: 1.Report of changes in the system
2. Payroll should be reviewed and authorized by an independent reviewer/approver before  release
3.Payroll overview total amount report (summary of gross pay, deductions, net pay, etc), including a comparison to the previous month for reasonableness
4. Payroll Control report per each employee month by month including a min/max threshold to identify errors.
5.  System access rights regular review—including information as to what each individual can do in the system. This is to ensure that access rights were not changed without authorization and are in line with roles responsibilities.
6. New hires report, to avoid fictitious payrolls
7. Control report of leavers for the months post termination to detect if payroll payments are not stopped next month
8. Control report for multiple payments to same account. To ensure accurate bank and to help prevent fraud.
9. Control report of changes to bank account numbers, etc
Payroll payment (bank transmission)
Incorrect payment of payroll
The preferred method for payroll payment is a transfer  via an electronic payment file generated by the payroll system. Bank files to be uploaded are locked for editing/ prevent unintentional or deliberate changes to the payroll file.  Data integrity and secure the bank transfer-file with electronic signature and encrypted.  If preferred method is not possible additional controls should be put in place to ensure the integrity and security of the bank transfer.  One key control in this case is ” segregation of duties” -Payroll processing, check generation, check approval/signature, recording to the cash book all should be in different hands. All payments/checks over a certain limit should be blocked.
Inaccurate Taxation (computation and reporting)
Tax amount incorrectly computed or reported to Authorities (wrong Tax Declarations, sent with delay)
Ensure control to validate proper computation of taxes (right % applied, legislative changes properly updated in the payroll application). Control to ensure proper preparation of Tax Returns/Declarations and submition in due time to avoid penalties.
Payroll Accounting
Incorrect accounting records/Accounting records does not reconcile with payroll report, payroll payment-bank statement
Review of accounting records to validate the correct accounts used and to ensure accounting records reconciled with supporting documents (reports)
Payroll Accounting
Automated records versus manual records/journals
In case of automated payroll records (postings generated directly by the payroll system) without manual intervention, control before loading any file to GL. In case of manual journals should have proper back up to justify the journal entry and should be approved by a more supervisor individual.
Payroll related documents are not kept as per legal requirements
Record Retention
A process in place to ensure all payroll related documents are properly kept for the required period and can be easily accessed if required.
Sensitive payroll information is not properly protected may lead to loss in reputation, loss of competitive advantage, loss of revenue, or legal consequences
Data Privacy
Company should classify data based on sensitivity and generally payroll info including personal info should be considered sensitive and carefully trated when stored or transferred to 3rd parties. Hard copies should be properly locked. Information sent by email outside the company (email out of company to vendors for example)  should be encrypted and password, to avoid the risk of being intercepted. Examples of Personal Info: National ID; Driver licence; credit/debit card no, bank account no, -when stored -password protected or limited control access and when transmitted even within company should be encrypted.


































Thứ Hai, 19 tháng 8, 2013

Material Documents for ICT lecture (e-HRM)

This is material document, which relevant to your works (e-HRM)

Try yourself to look the appropriate sections

Thứ Năm, 8 tháng 8, 2013

Information Technology and Communication slides

Here is link to download: http://www.mediafire.com/download/6dnn13xcgw164dl/Information_Technology_and_Communication.pdf