Professional Documents
Culture Documents
1. The audit committee does consist of at least three members as prescribed by the King
IV (principle 8, point 46) (1½)
2. All members of the audit committee must be independent non-executive directors
(principle 8, point 56). Only one member (Gibbs) is an independent non-executive
director. (1½)
3. The audit committee is chaired by the chairperson of the board. This is not in compliance
with the King IV Report, where it is recommended that the chairperson of the audit
committee should not be the chairperson of the board. (principle 7, point 36) (1½)
Due to the CEO in the scenario being the chairperson of the board, the student should
be awarded 1.5 marks should he/she mention that the CEO should not be the chairperson
of the audit committee (1 ½)
4. The audit committee should be chaired by an independent, non-executive director
(principle 8, point 57). Virat Amla is not an independent non-executive director. (1½)
(Max 4½ marks for this section)
d) General remarks
1. They do not comply with King IV Report recommendations as the audit committee’s
responsibilities are not confined to only nominating the external auditors for
appointment. (principle 8 point 59) (1½) Note: Give 1.5 marks when the student mentions
other duties.
2. The Board did not appoint a nomination, remuneration, risk or social & ethics
committees as required by the King IV Report. (1½)
1. Financial (½)
14
AUE2602/201/1/2021
2. Manufactured (½)
3. Intellectual (½)
4. Human(½)
5. Natural (½)
1 Only one password is Users can therefore reuse old passwords much sooner
remembered by the system
2 Maximum password age is This results in passwords which can easily be memorised
set to 6 months (1) OR or guessed (1)
Password is not frequently
changes (1)
OR
15
Password is only changes
twice a year (1)
3 Minimum password length is This results in weak passwords which can easily be
set to four characters (1) hacked or guessed (1)
5 Store password using Passwords can be readable when the file containing the
encryption is disabled (1) passwords is opened. Passwords should be changed
regularly and users should be forced by the system, to
change their password (1)
6 Users to change password at This means that users are allowed to continue using the
first logon is disabled (1) default password, which can normally be guessed easily,
and the IT person that generated the password, knows
the password. (1)
7 Characters are shown when This allows other people the opportunity to see what your
password are typed (1) password is while you are typing it (1)
(1 for each valid identification and 1mark for each description of weakness to the max. of
12 marks)
(Available in total 14 marks)
(1 marks for presenting in table)