Saga Fly Fishing

Improved Essays
The third weakness is detected in the Work Centres. Saga Fly Fishing, Inc. not filed the work order after it has been received from the Production Planning and Control Department. This is because the Production Planning and Control Department and also Work Centre Department must have record of it. If not it will cause an audit trail to be happen. Thus, the work order supposedly must being filed in the Work Centre.
Moreover, Saga Fly Fishing, Inc. has lack of supervision to observe or check the employee time cards and job tickets in the Work Centre. According to James Hall (2013), in order to promote accurate employee time cards and job tickets, timekeeping activities must being observe and review by supervisor. This is because it is the supervisor
…show more content…
also has weakness regarding the accounting records. The company does not have the proper and sufficient documentation for its source documents. Saga Fly Fishing, Inc. did not perform the physical control technique which is pre-numbering the documents. According to Claudia Gilbertson and Mark Lehman (2008), pre-numbered documents meant the source documents has number printed on it and help to ensure transactions are recorded correctly. Documents such as material requisition, production schedule, work order, move ticket and others should have the number code on it, so that Saga Fly Fishing, Inc. could easily identify the document and minimize future errors that may occur. Not only that, the audit trail process can be performed much faster by the independent auditors.
Last but not least, the access control does not exist in Saga Fly Fishing, Inc. The management and employee can easily access the information throughout the departments. No limitation of access control especially in the sensitive areas such as storekeeping, work centre and inventory control may endanger the company’s assets (inventory and cash especially) and information. Proper actions or measures need to be taken into consideration. For instance, implementation of the electronic sensor and alarm, identification badges, CCTV, security guards, backup schedule and so

Related Documents

  • Superior Essays

    try to 'match the hatch,' which means, replicating what the trout are hitting on any given day. This is not cut and dry, because sometimes there are no hatches. So, I try fishing with what worked in the past. Sometimes this doesn't work either.…

    • 1104 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Control K. If employees were required to compare the amounts recorded in the accounts receivable ledger with the total amounts from the invoices, they would be able to see if one or more of the invoices had been missed when recording the amounts to accounts receivable. e. Control I. If employees were required to compare orders from customers with a list of approved customers, employees would not make credit sales to customers with poor credit because those customers' names would not appear on the list of approved customers. f. Control B.…

    • 911 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Media information systems should be controlled and physically protected to prevent damage to assets and interruption to business activities. Appropriate procedure should be established to protect documents, computer media, the data input / output and documented system from damage, theft and unauthorized access. 7. Attention should be given to protect the integrity of electronically published information to prevent modifications that may harm the company's reputation. The information provided to the public, such as information on the web that can be accessed via the internet must be in accordance with the laws, rules, and regulations in the jurisdiction 8.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Hrm 415 Week 6 Assignment

    • 644 Words
    • 3 Pages

    An interesting aspect of the technology is the many options offered for tracking employee hours. With different ways to track hour’s optimum solutions is able to integrate into any work environment. A benefit of this product is the alert system that can be used to alert management on different aspects of employee time and attendance. This product is better suited for mid-sized organizations giving them the ability to track employee time sheets and attendance taking the pressure off the HR de-partment to maintain this portion of…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    These information systems are: • LAN – Switches, routers and firewall • Servers -- SHGTS Microsoft Access 97 database, Remote access server (RAS) • Workstations • Communication network – Phone and IP phones • Agency data processing center including its operating systems and utilities • Tactical radio network • Shared information processing service facilities (Bowen, Hash, & Swanson, 2006). A5: IT infrastructure that includes a description of information flow JINX application server is housed in room 1234, located at the HBWC’s executive office facility. This is a Microsoft Windows NT application server that is customized to run several applications including Microsoft Access 97 database that is used specifically for SHGTS. The database tracks all data and activities related to the grant distribution, grant users access the database to complete their grant…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computerized tracking systems have the advantages of capturing disclosures for the entire entity based on the computer network being used. Also this method utilizes can easily locate records of disclosure and are able to print upon request. However, the use of any computer system are not always safe due to systems crashing or being hacked. On the other hand, manual logs have the advantage of tracking disclosures and information by written proof from the individual requesting PHI.…

    • 349 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The mission statement of the Tennessee Department of Safety and Homeland Security, which is the statement, which is used as a way of communicating the purpose of the organization is as follows: Mission Statement To serve, secure, and protect the people of Tennessee ("Tennessee Department of Safety and Homeland Security Mission Statement," 2014). The Tennessee Department of Safety and Homeland Security currently doesn’t have an official goals or value statement. Employees of the State of Tennessee are expected to act in a manner that will enhance the name, service and general impression of the State in the eyes of the general public. This Code of Conduct provides general rules of conduct based on fundamental ethical principles.…

    • 945 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    These safeguards include access control, audit controls, integrity controls, and transmission security (HSS.org). Access control requires a covered entity to implement policies and procedures to restrict a certain level of individuals from obtaining technical access to the electronic information. Audit controls must be implemented including but limited to hardware, software, and procedures to examine the access of electronic information and ensure the information is…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Case Study 8 The Ccmma

    • 783 Words
    • 3 Pages

    CASE STUDY-8 THE CCPM DILEMMA Executive Summary: Pinyarat worked in IT department of diversified firm. Firm increment budget by 10 percent to all activity because all project were coming to late while people was working too hard and wants to relief. Result this approach failed, after this firm decide to give extra time and 10 percent for complete project on given time schedule but overall result failed. Nothing improved and project continued late from actual date.…

    • 783 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Importance Of Duty Of Care

    • 4284 Words
    • 18 Pages

    Employers have what is termed ‘ a Duty of Care ‘ to employees. This means Employers must ensure all reasonable steps are taken to ensure that the employees health, safety and well being are protected. In real terms employers are bound by health and safety and employment law, together with common law duty of care. For an employer to ensure the physical and mental well-being of it’s employees, it should not be seen simply as a legal obligation but more as sound business sense; for this consideration from an employer builds trust and so increases productivity, staff retention and employee engagement. The main considerations for an employer under Duty of Care are: *…

    • 4284 Words
    • 18 Pages
    Great Essays
  • Improved Essays

    Examine the company’s competitive position and their current strategy for competitiveness, considering required performance and performance measures. Suggest further information that would help analysis of the competitive position and suggest improvements to their strategy. Fly fishing reels are one of their major manufacturers of the fly fishing reels, they have got two major competitors; these are located in USA and Japan. Fly fishing reels have a good reputation on having good quality and both the "feel" and the performance of their products and often superior to their competitors.…

    • 1291 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Farm Raid Fish

    • 1222 Words
    • 5 Pages

    Farm raised fish are good to eat, good for the environment and good for your health. If we eliminated farm raised fish from the menus, kitchen and homes around the world, the harm that would be done is almost incalculable. There is much misinformation, pop science and web sourced rumors to the contrary, but the real facts are quite clear. In the first place, fish is very healthy food for people.…

    • 1222 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    What is Time Management? Time management is the manner in which you plan, prioritise and organise specific activities as well as how long you will spend on each of them. Some people may feel that there isn’t enough time in the day, although everyone gets the same 24 hours in a day. Some may attain much more with their time than what others do. The only difference is that, the former may achieve more due to good time management.…

    • 1441 Words
    • 6 Pages
    Great Essays