StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Confidentiality and Integrity of the Solution - Essay Example

Cite this document
Summary
The essay "Confidentiality and Integrity of the Solution" focuses on the critical analysis of the major issues in the confidentiality and integrity of the solution. The issue facing Lisa as the Finance manager of the Home and Personal Care Products is proving to the CFO of the company…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Confidentiality and Integrity of the Solution
Read Text Preview

Extract of sample "Confidentiality and Integrity of the Solution"

Ethical case study Affiliation Ethical case study Introduction The issue facing Lisa as the Finance manager of the Home andPersonal Care Products is proving to the CFO of the company that was acquired why the marketing costs were not to be capitalized. She was concerned about maintaining ethical standards when the acquired company was coming together with the parent organization. According to the IMA guidelines that are used for resolution of an ethical conflict, Lisa is supposed to discuss the conflict with her immediate supervisor who is Jeffrey Anderson. She was more concerned to know if the acquired company had used inappropriate accounting practices to inflate their earnings or sales. She took the initiative to consult Jeffrey Anderson and was well prepared with the accounting manual of the parent company and the plan for valuation of the assets that belong to the company. Since, Jeffrey Anderson was a respected individual in the company, having served for more than a decade Lisa expected that he would have advised her on the way to approach the issue professionally to find a solution and to maintain confidentiality and integrity. Discussion The acquired company and the parent company are the main stakeholders in the issue that Lisa is trying to get solutions for. Lisa finds herself unprepared for the cultures within the corporate, and she did not believe that the acquired firm had used the appropriate financial rules and regulations. She was tasked to make sure that the assets of the corporate she was working for were secure. Lisa noted that the employees were more concerned in securing their jobs. Workplace ethics are some causes that make employees sacked especially during such strategic transitions that Lisa is encountering (Lawrence & Weber, 2013). According to the IMA guidelines that are used for ethical conflict resolution, Lisa is supposed to maintain confidentiality and ensure that she discusses it in details with the Controller. The reason why ethical standards should be maintained in businesses is to ensure that there is smooth flow and function of the advanced market economy. In addition, if there were no ethical standards in business, so many aspects would suffer particularly the economy and the people who depend on it for goods, services and jobs (Lawrence & Weber, 2013). Lisa provides clear, accurate and concise evidence to support her discoveries regardless of being turned down three times by Mr. Anderson. Lisa is keen not to abandon the ethical standards in the company as the finance manager. In her line of work, Lisa focused on the acquired assets and noted the unusual high proportion of some of the assets that were indicated in the balance sheets. Most company managers will tend to overlook this section for the reason that the items in that category are noncore assets. Lisa found it hard to determine the nature for the items that were on the list of the acquired company and how they were relevant to the company’s activities. Lisa did not give up after the first meeting with Anderson. She put more efforts to conduct a detailed evaluation of the assets in the list and discovered that there were many capitalized marketing expenses. She noted that the company had used expensive and controversial commercials such as television ad print to campaign for the prestige fragrances. Lisa took the expected measure and consulted Anderson after she made these discoveries. Mr. Anderson does not seem to take the issue as an urgent matter. Instead, he rubbishes Lisa’s claim by saying that it is not a significant issue, and she should not worry about it. Lisa is stuck since, Anderson is her immediate controller of her department, and she has to follow his directions. She is however concerned about the ethical standards of the issue at hand since she knows well that if she approves the acquired company with the issue of capitalized costs; she will at some point be answerable when evaluation is done. Since the first option that Lisa has does not work out, she is tasked to look for an alternative. Mr. Anderson keeps dismissing the issue every time she comes with new discoveries. On the last instance, Lisa approaches Anderson regarding the issue of other accrued liabilities. She requests for the standing journal entry that support the documentation of the other accrued liabilities. Anderson turns her down and insists that it is none of her business. Anderson is quick to assert that Lisa does not understand and comprehend the business, and the journal entries are standard practice. He claims that if Lisa understood the nature of uncertainty of the prestige fragrance business, she would be able to go in line with what the company wants. The dilemma that Lisa faces is how to challenge Mr. Anderson ad keep the acquired team close to her. She is also not ready to lose the trust of both the finance team and Mr. Anderson. She still does not believe that these costs should be capitalized and the other acquired liabilities do not provide evidence. The only alternative she is left with is discussing the conflict with the next highest uninvolved manager (Lawrence & Weber, 2013). Lisa is keen not to engage in activities that might discredit her profession. Since Anderson is not able to mitigate for the conflict due to either hidden interests of ignorance, Lisa has to protect her profession by going deeper into the issue until she finds the story behind the issue. Conclusion I would advice, Lisa to inform the next highest uninvolved manager in the company about the issue. However, this should be done without the knowledge of Mr. Anderson since he might take it as a challenge for his position. It is however difficult not to involve Mr. Anderson since the board of directors has entrusted him because he has served in the company for quite a long time. Lisa should maintain all the discoveries she made and discussed with Mr. Anderson. Despite risking her profession, she should ensure that she would not be held responsible for the problems that may arise in the future when the acquired company is evaluated. Such as situation is normal for many businesses and it takes the efforts of the finance a manager to identify and question where they do not understand, or there appears to be inappropriate values on the statements. References Lawrence, A. T., & Weber, J. (2013). Business and society: Stakeholders, ethics, public policy. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethical case study Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/finance-accounting/1666893-ethical-case-study
(Ethical Case Study Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/finance-accounting/1666893-ethical-case-study.
“Ethical Case Study Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/finance-accounting/1666893-ethical-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Confidentiality and Integrity of the Solution

Effective Communication in Advising Workgroups on Contract Negotiations

The paper "Effective Communication in Advising Workgroups on Contract Negotiations" reflects a system through which the Association of flight attendants communicates to their members on maintaining professional conduct and safe services to the airline's clients while negotiating their contracts.... ....
10 Pages (2500 words) Essay

Health and Wellness Hospital Network Simulation

Comply with market and regulatory requirements as prescribed by Center for Medical Systems (CMS) and Health Insurance Portability and Accountability Act (HIPAA) regulations regarding data safety regulations, client confidentiality, and data security.... y system administration strategy is to manage the administration in-house to protect confidentiality, security, retrieval speed, and costs less to maintain.... hese decisions meet the goals of stakeholders Dunn (cost-efficiency, eliminate redundancies, and streamlined network), Wood (low cost and downtime, data security and confidentiality), and Leibermann (speed, low cost, and staff support)....
2 Pages (500 words) Essay

Security through Authentication and Encryption

It is evident that a firewall is not enough and not the only solution that guarantees security.... Instead, there is a need for strong user authentication and encryption along with other techniques and policies that can help in creating user accountability and confidentiality so as to ensure the security of an e-business.... Encryption not only provides confidentiality to an organization when most often used with 'https' protocol but by authenticating the data it provides non-repudiation that travels over a network or stored on a system....
8 Pages (2000 words) Coursework

Effective Communication in Advising Workgroups on Contract Negotiations

This essay "Effective Communication in Advising Workgroups on Contract Negotiations" examines various unions' and workgroups' communication to particular member problems with a discussion to help employees to maintain a positive work environment despite their grievances.... .... ... ... This portfolio supports the most effective process of communicating when advising workgroups of contract negotiations to maintain a positive work environment through a study and a literature review....
10 Pages (2500 words) Essay

Information Assurance Perspective on Cloud ERP Solution Implementation for Lesley Stowe Fine Foods (LSFF)

This paper evaluates the comprehensive concept of IA offered by the cloud ERP solution to ensure that IS serves LSFF's transactional needs like operational capability and transformational needs like rapid adaptation, innovation and knowledge management.... Implementation of cloud ERP solution is a viable option for the enterprise; however, its implementation needs to meet information assurance objectives.... Implementation of cloud ERP solution is a viable option for the enterprise; however, its implementation needs to meet information assurance objectives....
20 Pages (5000 words) Term Paper

Disaster Recovery and/or Business Continuity Plan

As such, data integrity is assured and maintained through providing accurate and consistent data over the solution's lifecycle (Sredni, 2015).... Cyber security is a process of applying security measures to ensure data availability, its confidentiality and also its integrity as a plan for Disaster Recovery and Business Continuity Plan.... Computer Security is applied to Cyber security Disaster Recovery and Business Continuity Cyber security is a process of applying security measures to ensure data availability, its confidentiality and also its integrity as a plan for Disaster Recovery and Business Continuity Plan....
2 Pages (500 words) Essay

Client agreement letter

the solution will be clear and simple to understand.... They have accepted that they know where the solution can be accessed and how they can pay for them according to the prices and tariffs (Harrigan and Miles, 2014).... ow about confidentiality and data protection, we will collect the data concerning the client's circumstances in the process of our fact-finding.... Secondly, we as a team accepts to deliver provide cost effective solution that are easy to use to substitute the large-scale platform....
2 Pages (500 words) Essay

GAP Analysis Issues

'integrity and authentication' as well as confidentiality are some of the security issues that are apparent to the company's operations, based on the assessment (The United Nations, 2007, p.... These expose the company to integrity and authentication issues among its employees as fraudulent programs could lead to undetected malicious errors.... Assessment results also note that measures for addressing security incidents towards preservation of evidence lack and mean the easy leak of information and data, contrary to expectations of confidentiality doctrine....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us