Business Its Legal Ethical & Global Environment
10th Edition
ISBN: 9781305224414
Author: JENNINGS
Publisher: Cengage
expand_more
expand_more
format_list_bulleted
Question
error_outline
This textbook solution is under construction.
Students have asked these similar questions
Which preventive, detective, and/or corrective controls would best mitigate the following threat, and why?
(d) An employee received an email purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the email to view the new policy, she infected her laptop.
Mark Buffalo works for a mid-size accounting firm in Boston. One day he overhears a colleague talking to a friend on his cellphone. Mark gasps when he realizes the colleague is sharing one of their client's confidential information, likely as an insider trading tip. As a member of the AICPA, Mark is required to report this discreditable act to the Boston chapter of the AICPA.
Select one:
True
False
Do you think it is ethical for an employer to use social media information as a factor when considering whether to hire an employee? What about monitoring social networking activities of employees while on the job? Use ethical reasoning in answering these questions.
Knowledge Booster
Similar questions
- Which of the following is NOT an example of an opportunity to commit fraud in the accounting information system? a. The need to sell confidential information from the database for cash to pay for his medical bills b. User names and passwords of most employees are stored in a shared Google document file c. The employee's discovery that passwords are not required to enter any modules in the accounting information system d. Supervisors are not required to approve transactions entered into by their staff in the accounting systemarrow_forwardProvide an appropriate response based on the following scenarios. Assume that the accounting clerk posts a customer’s payment for the wrong amount, giving the customer credit for less than he or she actually paid. How will this error be detected? How might this error have been prevented? Assume that the employee who opens the mail steals a customer payment. How will this theft be detected? How might this theft have been prevented?arrow_forwardAccording to the AICPA Code of Professional Conduct, which of the following actions will impair independence? A. Preparing client financial statements based on information in a trial balance. B. Processing payroll for a client's signature based on client record keeping. C. Participating in the hiring or termination of a client's employees. D. Assisting a client in drafting a stock-offering document or memorandom.arrow_forward
- Before hiring someone for a position involving access to cash, checks or inventory, a company should check the applicant’s: past employment references criminal convictions all of the abovearrow_forwardHow can companies handle the possible increase in lawsuits, derived from the legislation on workplace harassment.arrow_forwardSome companies use internal social media networks for work-related employee communications. Would the same legal rules that apply to monitoring public social media platforms, such as Twitter and Facebook also apply to company-provided social media platforms?arrow_forward
- The use of information technology raises significant ethical issues such as computer crime, data security, privacy and so on. Computer ethics is the analysis of the nature and social impact of computer technology, as well as formulation of appropriate policies for the ethical use of such technology. The following statements address computer ethics, except :A. The company restricts access to external websites.B. Company policy to prevent the use of portable storage devices on work computers.C. Keep dan maintain software licenses legal and up-to-date.D. Enforces policies for employees who share information about customers on social media. Explain why you choose your answer, and not the other (in max 200 words).arrow_forwardWhich preventive, detective, and/or corrective controls would best mitigate the following threat, and why? (i)To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.arrow_forwardIn some occupations and in some industries, the running of a business may involve sensitive information. It could be something as simple as a recipe or as complex as a medical file but, regardless, the employee must sign an employment contract with very specific requirements that the employee not take certain actions. In short, these are called restrictive covenants, which are terms in an employment contract that outline conditions, promises, and restrictions of the employee with regard to the business. What are 2 examples of restrictive covenants? List and explain why you chose them.arrow_forward
- Two very common ways that employees commit fraud against their employers is the misstatement of reimbursable expense accounts and the misuse of office supplies for personal purposes. Although these schemes are usually not individually significant, their magnitude can be damaging if these practices are widespread. Please comment on these types of fraud (and other examples of employee fraud) and what internal controls they would put in place in an organization to curb this activity.arrow_forwardResponsibilities to Clients’ Cases. Read the following cases. For each case, state whetherthe action or situation shows a violation or potential for violation of the AICPA Code ofProfessional Conduct, explain why, and cite the relevant rule.a. CPA Sal Colt has discovered a way to eliminate most of the boring work of processingroutine accounts receivable confirmations by contracting with the Cohen Mail Service.After the auditor has prepared the confirmations, Cohen stuffs them in envelopes, mailsthem, receives the return replies, opens the replies, and returns them to Colt.b. Cadentoe Corporation, without consulting Jora Cramer, its CPA, has changed itsaccounting so that it is not in conformity with GAAP. During the regular audit engagement, Cramer discovers that the statements based on the accounts are so grossly misleading that they might be considered fraudulent. Cramer resigns the engagement aftera heated argument. Cramer knows that the statements will be given to Sandy Panzer,…arrow_forwardHaving a corporate code of ethics that prohibits employees from accepting gifts from customers or vendors is an example of which component of internal control?a. Control environmentb. Risk assessmentc. Control proceduresd. Information systemarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Business Its Legal Ethical & Global EnvironmentAccountingISBN:9781305224414Author:JENNINGSPublisher:CengageAuditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Business Its Legal Ethical & Global Environment
Accounting
ISBN:9781305224414
Author:JENNINGS
Publisher:Cengage
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,