You are on page 1of 31

(eBook PDF) Accounting Information

Systems: Controls and Processes, 4th


Edition
Visit to download the full and correct content document:
https://ebooksecure.com/download/ebook-pdf-accounting-information-systems-control
s-and-processes-4th-edition/
vi  About the Authors

Professor Copeland’s research interests include the impact of technology and digital
transformation in the accounting and audit profession, accounting information systems,
financial and managerial accounting, ethical and values-based leadership. Her research
has been published in The CPA Journal, International Journal of Information Systems in the
Service Sector, Research on Professional Responsibility and Ethics in Accounting, The Journal of
Leadership, Accountability and Ethics, International Journal of Leadership Studies and Busi-
ness Education Forum. Dr. Copeland also has had numerous conference proceeding pub-
lications with the American Accounting Association. Dr. Copeland has co-published a
Microsoft Dynamics GP® text with Armond Dalton Publishers and authored hands on
Microsoft Dynamics coursework for Microsoft Dynamics AX, Dynamics 365, and Micro-
soft Dynamics GP ERP systems.
Professor Copeland is a member of the American Accounting and the Microsoft
Dynamics National Academic Advisory Board.
PREFAC E

Instructor
Overview Each of us who teaches Accounting Information Systems (AIS) faces the
problem of providing students a comprehensive, but interesting knowledge base of AIS.
However, we all know that it is difficult to find the right balance of coverage of technical
concepts and student comprehension. When addressing this issue of balance, we began
to see clearly that a better, more comprehensible approach was needed. With this book,
faculty have argued that we have achieved a good balance of covering technical concepts
and adding real world examples, while still making the text easy to read and understand.
Our textbook also reinforces AIS concepts with relevant, real-world examples and reason-
able end-of-chapter materials.
This text incorporates the important content found in a typical AIS course, but has
five distinguishing characteristics. Five characteristics we focus on throughout the text
are simplicity and understandability of the writing, business processes, accounting and
IT controls, examples from Microsoft Dynamics GP (an ERP/AIS system), and ethics as it
relates to accounting systems.
We place extra emphasis on the students’ understanding. We explain AIS in the context
of business processes and incorporate many real-world examples. The richness of these
examples improves the text, the discussion questions, and end-of-chapter exercises and
cases. We explain IT controls by employing the framework in the AICPA Trust Criteria. This
is an encompassing, but easy to understand, framework of IT controls. We provide exam-
ples in the text of an AIS/ERP system, Microsoft Dynamics GP. Instructors are able to add
a hands-on learning of Microsoft Dynamics GP that complements the theoretical concepts
in the text. Finally, we believe that ethics continues to increase in importance as a topic to
be included in accounting texts. We have included an ethics section in each chapter.
We think that including all these characteristics in a single text has resulted in an
extremely user-friendly product: one that will help your students achieve a better founda-
tion in AIS.

Features
The book is designed to enhance student learning with a focus on ease of use, business
processes and the related controls, and ethics and corporate governance as they relate to
accounting information systems (AIS).

Ease of Use This AIS textbook will allow students to easily read and comprehend the mate-
rial, understand the charts and graphs, and successfully answer questions and cases at the end
of the chapters. To attain ease of use, we included several features, including the following:
• An approach to technical topics with a writing style that is easy to understand.
• Process maps and document flowcharts that provide a picture of business processes
and that are easy to understand. While there are several approaches to charts that
vii
viii  Preface

depict systems, we have used the types of charts that illustrate business processes in
the simplest, yet complete manner. Especially in the chapters focused on business
processes, we use matched process maps, document flowcharts, and data flow dia-
grams to illustrate the processes that occur, and the related flow of information and
documents. These charts are easy to follow and they will enhance the understanding
of the business processes.
• AICPA Trust Services Principles framework for IT controls. Controls within
Information Technology can be a very difficult subject to comprehend because
of the underlying complexity of the technology. While COBIT is the most com-
prehensive source of IT control information, it is not typically easy for students
to understand. This is especially true for students who have not had the opportu-
nity to gain work experience with IT systems and business processes. We use the
simplest framework available for the explanation of IT controls: the AICPA Trust
Criteria. The Trust Services Principles categorize IT Controls into five areas:
security, availability, processing integrity, online privacy, and confidentiality.
• Control and risk tables that summarize internal controls and the related risks. Inter-
nal controls are easier to understand when students can see the corresponding types
of risks that the controls are intended to lessen. We use control/risk exhibits to pre-
sent risks that are reduced when controls are used.
• Real-world examples to illustrate important concepts. Concepts are often easier to
comprehend when presented in a real-world scenario. Each chapter includes exam-
ples of issues faced by actual business organizations that help illustrate the nature
and importance of concepts in the chapter. Real-world discussions are boxed in a
feature titled “The Real World.”
• Microsoft Dynamics GP screen shots to present topics in the context of a real
computer system. New concepts are often easier for students to understand
while presented within a real-life application. We use screen shots from Microsoft
Dynamics GP software to show how various aspects of business processes would
appear in this computer system. In addition, in this version, we have added the
ability for instructors to add hands-on learning of Microsoft Dynamics GP to the
coursework. See the textbook website for details. This add-on tool provides access
to a cloud-based version of Microsoft Dynamics minimizing the involvement of a
university’s IT staff.
• The IT technology that underlies AIS continually evolves and allows enhancements
to those systems. Several chapters integrate the concept of cloud computing and the
increasing use of cloud computing. The effects of cloud computing on the risk ben-
efits and auditing in AIS are also described. Several chapters also include sections
on the most recent technology innovations affecting AIS. These two innovations
are digital transformation and Blockchain. In addition, the chapter on auditing
IT systems incorporates the impact on auditing caused by the use of these newer
technologies.
• End-of-chapter questions, problems, and cases that match well with the chapter con-
tent. It is important to provide material at the end of each chapter that helps stu-
dents reinforce the topics presented. It is equally important that this material be
relevant and understandable. We have devoted our attention to providing a variety
of end-of-chapter activities that are meaningful and manageable, including a con-
cept check, discussion questions, brief exercises, Web exercises, problems, cases, and
a continuing case. In addition, most chapters include activities adapted from profes-
sional (CPA, CMA, and CIA) examinations.
Preface  ix

Business Processes, Accounting Controls, and IT Controls Business transactions


are portrayed within the text in terms of business processes, which are widely recognized
throughout the accounting profession. These business processes are described in a man-
ner that is applicable to many different business environments.
We incorporate the COSO framework and integrate discussions of risks and controls
in all business process chapters. These discussions are also carried out in as many of the
other chapters as possible. The COSO framework, especially the control procedure com-
ponent, is used as a framework to describe accounting controls. This continued use of
the framework across several chapters is intended to increase student understanding and
retention of risk and control concepts.
In addition, we place a strong emphasis on IT controls. We accomplish this by using
the guidance provided by the AICPA in the revised (2017) Trust Services Principles for
WebTrust® and SysTrust® assurance engagements. The Trust Services Principles are the
AICPA’s guidance that is closely related to COBIT.
The Trust Services Principles risk and control procedures are incorporated into the chap-
ters covering business processes and controls. These controls are also discussed in chapters
on databases, ERP systems, auditing IT systems, and the system development life cycle.

Ethics and Corporate Governance It is indisputable within the business world


that honest, consistent reporting and management of information has never been more
important. Considering the increased responsibility on corporate managers for the overall
financial reporting of the company, the study and use of accounting information systems
is critical. Accordingly, business ethics and corporate governance continue to increase in
focus and we made them a focus of this textbook. An ethics discussion is also found at
the end of each chapter and an ethics icon highlights applicable end-of-chapter material.
In order to place emphasis on business ethics in many chapters, it is important to
establish a foundation of ethics to build upon. Chapter 3 includes a significant section
on ethics in the current environment and the relation of ethical problems to the need
for internal controls and ethics codes. We establish Chapter 3 as the foundation for the
chapters that follow. The ethics and control concepts in Chapter 3 are reinforced as
themes throughout the text. We also include ethics-related questions or cases in the end-
of-chapter materials.
In addition to business ethics, corporate governance is a related topic that has received
much attention in the business world without a corresponding increase in focus by AIS
texts. In addition, each process chapter in Module 3 discusses corporate governance in its
application to the various business processes. Sarbanes–Oxley discussions are highlighted
in the textbook margins with the letters “SOX.”

Supplements
In addition to the textbook, the following materials are provided for faculty and students.
Supplemental materials provided:
• Instructors manual
• Solutions manual
• Student Study Guide
• Test bank
• Computerized test bank
• Over 100 additional articles/readings by chapter that can be used for additional
discussion.
x  Preface

• Supplemental hands on exercises in an ERP system, Microsoft Dynamics GP, pro-


vided with cloud access (Provided at a minimal charge for materials and cloud access)
• Wiley CPA Excel CPA review videos, questions and solutions provided by topic/chap-
ter (Provided at a minimal charge)
They are available on the instructor companion site available with this textbook. The
fourth edition of the text also provides instructors the option of adding hands-on learn-
ing of an ERP/AIS system, Microsoft Dynamics GP, to their coursework. This additional
supplement provides instructional materials and cloud access to Microsoft Dynamics GP
at a nominal cost. Details are provided in the textbook website.
ACKN OWL E DGM E N T S

We would like to thank every instructor whose feedback helped us in all stages of the
writing, editing, and production of this textbook. In particular, we thank Amelia B
­ aldwin,
University of Alabama; Somnath Bhattacharya, Florida Atlantic University; Pascal A.
Bizzaro, University of Mississippi; Richard Dull, Clemson University; John Butler, Ohio
State University; Danielle DiMeglio, St. Francis College; Stephanie Farewell, University
of Arkansas–Little Rock; Lawrence Grasso, Central Connecticut State University; Neal
Hannon, University of Hartford; Michael Harkness, University of Michigan–Dearborn;
Kenneth Henry, Florida International University; Frank Ilett, Boise State University;
Jack Kissinger, Saint Louis University; David Knight, Borough of Manhattan Commu-
nity College; Antoinette Lynch, Miami University; Dorothy McMullen, Rider University;
Johna Murray, University of Missouri–St. Louis; Michael Palley, Baruch College; Karen
Otto, University of Arizona; Tom Oxner, University of Central Arkansas; Jeffery Payne,
University of Kentucky; Georgia Smedley, University of Nevada–Las Vegas; George
Schmelzle, Indiana University–Purdue University Fort Wayne; Wallace Wood, University
of Cincinnati; Curt Westbook, California State University–San Bernadino; and Yan Xiong,
California State University–Sacramento.

xi
TO T H E STU DE N TS

Businesses, and the products and services they provide, are unquestionably a critically
important part of our society. We would not have food, shelter, cars, computers, iPhones,
or the other things we need and use daily without smoothly functioning businesses to
provide those goods and services. Likewise, individual businesses could not operate at a
level to sustain our society without accounting information. Accounting information is
the lifeblood of business. Without the regular flow of accurate accounting information to
managers and investors, businesses would collapse. Operating a business or investing in
businesses without accounting information would be as difficult as driving with a covered
windshield. You would have no feedback information about where you are going and
what corrections you must make to get there. Just as your view through the windshield
tells you when to make steering, braking, and accelerating corrections, accounting infor-
mation allows managers and investors to determine how to make corrections that will
allow them to achieve business objectives.
Accountants generate, evaluate, summarize, report, and confirm the information that
managers and investors need to make good choices in their operations or objectives. The
system that allows accountants to accomplish this is the accounting information system.
The study of AIS provides a very important set of concepts to prepare you for an
accounting and business career. We hope the features of this book make your study of
AIS a little more pleasant, interesting, and understandable. Now, go forward and learn
more about AIS and its role in providing critical information to managers and investors!

xiii
A LI S T OF R E A L - WO R L D E X A M P L E S
I N T H IS TE X TBOOK

Chapter Company Example Subject


1 McDonald’s remote order taking at drive-throughs Business processes
1 McDonald’s and a dedicated supplier of buns, East Balt Supply chain
1 Ford and its reengineered vendor payment system Business processes
reengineering
1 American Institute of CPAS report on AI, Robotic Impact of technology
processes, and Digital Transformation on CPAs
1 BP and Deep Water Horizon oil spill Risks
1 Anonymous company that inflated revenues Ethics
2 Au Bon Pain updated ordering systems Business processes
2 Bowen implementing a new system Legacy systems
2 Thomas Kemper Soda Company’s updated systems Cloud computing
2 Cole Haan, a subsidiary of Nike and system integration Legacy systems
2 Hawaii Commercial Real Estate, LLC’s data sharing Business processes
3 Phar-Mor fraud Top management ethics
3 Johnson & Johnson fraud Top management ethics
3 Association of Certified Fraud Examiners 2018 fraud Fraud
statistics
3 Enron and its demise Fraud
3 Xerox GAAP violations Fraud
3 Koss Corporation embezzlement scheme Fraud
3 Dow Chemical’s warning signs of fraud Fraud
3 Security and data breaches at several companies Hackers
3 Survey results: Ethical conduct in corporations Ethics codes
4 Network break-ins at Target computers Hackers
4 2003 North American power blackout Disaster recovery
4 Sudden death of CEO Business continuity
4 Microsoft Windows operating system Hackers
4 Boeing’s automated shop floor Wireless networking
4 Cloud Computing problems at Amazon and Cloud computing
SalesForce.com
4 Public and private cloud applications at Starbucks Cloud computing
4 Pornography on Federal computers at SEC Fraud
5 Information and technology strategy committee at UPS IT governance

xv
xvi  A List of Real-World Examples in This Textbook

Chapter Company Example Subject


5 Prioritizing IT projects at Allstate IT governance
5 Anheuser-Busch’s use of IT to improve beer sales IT governance
6 Minnesota Vikings use of Microsoft Dynamics 365 ERP
6 Advantages of an ERP system at Viper ERP
Motorcycle Company
6 SkullCandy’s growth and ERP system Cloud computing
6 Microsoft Azure Cloud outage Cloud computing
6 Failed ERP implementation at the city of Tacoma, ERP implementation
Washington and in Marin County, California
6 Successful ERP implementation at Marathon ERP implementation
6 Failed ERP Convesion at Avon ERP implementation
7 JCPenney’s vendor audit of Aurafin IT audit benefits
7 Ford Motor Company’s focus on financial processes Internal audit
and controls
7 Use of CAATs at EY IT audit
7 Audit mistakes at Phar-Mor Auditor independence
7 Koss Corporation’s lack of controls Audit failure
7 Crazy Eddie’s fraud Auditor independence
7 Enron, WorldCom, and Xerox and the need to Substantive testing
test balances
8 Sales processes performance measures at Staples Sales processes
8 B2B sales processes at Staples Sales processes
8 United Healthcare Services use of EDI Internet EDI
8 Advantages of a POS system at Pizza Hut POS systems
8 Fraud at MiniScribe Fraud
8 Brown Forman channel stuffing Ethics
9 General Electric’s electronic invoice IT enablement of purchasing
presentment system
9 City Harvest doubles deliveries without increasing costs Purchasing and
procurement process
9 Frymaster’s automated invoice matching system IT enablement of purchasing
9 Evaluated receipt settlement system at an IT enablement of purchasing
anonymous company
9 Federal government of the United States as strong IT enablement of purchasing
advocate of e-invoicing
9 General Electric’s procurement card use Business process
reengineering
9 Special checking account used at Phar-Mor Fraud
9 Multiple instances of fraud by Paul Pigeon Fraud
9 Walmart’s ethics guidelines for employees in Ethics
purchasing
10 City of Anchorage, Alaska payroll problems with ERP Payroll processes
10 Amtrak ERP systems Payroll processes
10 Automated payroll system at Scott Paper Company IT enablement of payroll
A List of Real-World Examples in This Textbook  xvii

Chapter Company Example Subject


10 Technology enhancements to property accounting at IT enablement of fixed assets
Tempel Steel and Pepsi-Cola
10 Misclassification of fixed asset at WorldCom Fraud
10 Sears poor corporate governance related to fixed assets Corporate governance
11 Nissan’s robotic plant IT enablement of
manufacturing
11 CAD/CAM at Jean Larrivée Guitars IT enablement of
manufacturing
11 CAD/CAM at Wild West Motorcycle Company IT enablement of
manufacturing
11 Walmart’s use of RFID IT enablement of logistics
11 Fraud in conversion processes at F&C Flavors Fraud
12 Typical timing of month-end closing processes Administrative processes
12 Fast closing process at Alcoa Administrative processes
12 Fraud in administrative processes at echapman.com Fraud
12 Automated authorization at Walmart Administrative processes
12 Interconnected systems at Walmart and Administrative processes
Procter & Gamble
12 Automatic triggering in ERP systems Administrative processes
12 Misleading data for investors at Krispy Kreme Ethics
13 Large database at Walmart Databases
13 High-impact processes at Anheuser-Busch and High-impact processes
Hewlett Packard
13 Failed ERP and IT projects Data mining
13 Data mining at Anheuser-Busch Data mining
13 Distributed databases at McDonald’s Distributed data
13 Procter & Gamble (P&G) and cloud-based Cloud computing
data analytics
13 Data mining activities in Walmart Data mining
13 Control breakdown at Netflix Ethics
14 Walmart’s change to Internet EDI Internet EDI
14 E-business at Domino’s E-business
14 E-business at General Motors E-business
14 E-business at Komatsu E-business
14 E-business at Kenworth Truck Company E-business
14 E-business at 3M E-business
14 GE’s cloud-based analytics and prediction system Digital Transformation
14 Extranet use at Staples Extranet
14 Abuse of private information at Gateway Learning Ethics
Corporation
CON TE N TS

About the Authors v


Prefacevii
Acknowledgmentsxi
To the Students xiii
A List of Real-World Examples in This Textbook xv

MODULE 1 INTRODUCTION Defines business processes, AIS,


and all foundational concepts. This module provides
the knowledge building blocks to support the
remaining chapters.

1 Introduction to AIS 1
Overview of Business Processes (Study Objective 1), 1
Overview of an Accounting Information System (Study Objective 2), 4
Business Process Linkage Throughout the Supply Chain
(Study Objective 3), 5
IT Enablement of Business Processes (Study Objective 4), 7
Basic Computer and IT Concepts (Study Objective 5), 10
Basic Computer Data Structures, 10
File Access and Processing Modes, 11
Data Warehouse and Data Mining, 13
Structured, Unstructured, and Big Data, 13
Networks and the Internet, 14
Examples of IT Enablement (Study Objective 6), 16
E-Business, 16
Electronic Data Interchange, 16
Point of Sale System, 16
Automated Matching, 17
Evaluated Receipt Settlement, 17
E-Payables and Electronic Invoice Presentment and Payment, 17
Enterprise Resource Planning Systems, 17
Blockchain Technology, 18

xix
xx  Contents

The Internal Control Structure of Organizations (Study Objective 7), 19


Enterprise Risk Management, 20
A Code of Ethics, 22
COSO Accounting Internal Control Structure, 22
IT Controls, 22
Corporate Governance, 23
IT Governance, 23
The Importance of Accounting Information Systems
to Accountants (Study Objective 8), 24
Users of the AIS, 24
Design or Implementation Team, 24
Auditors of the AIS, 24
The Relation of Ethics to Accounting Information Systems
(Study Objective 9), 25
Summary of Study Objectives, 26
Key Terms,  27
End of Chapter Material, 28
■■Concept Check, 28
■■Discussion Questions, 28
■■Brief Exercises, 29
■■Problems,  29
■■Cases,  31
Solutions to Concept Check,  31

2 Foundational Concepts of the AIS 33


Interrelationships of Business Processes and the AIS
(Study Objective 1), 34
Types of Accounting Information Systems (Study Objective 2), 36
Manual Systems, 37
Legacy Systems, 38
Modern Integrated Systems, 40
Client–Server Computing (Study Objective 3), 40
Cloud Computing (Study Objective 4), 41
Accounting Software Market Segments (Study Objective 5), 45
Input Methods Used in Business Processes (Study Objective 6), 48
Source Documents and Keying, 48
Bar Codes, 49
Point of Sale Systems, 49
Electronic Data Interchange, 50
E-Business and E-Commerce, 50
Processing Accounting Data (Study Objective 7), 50
Batch Processing, 50
Online and Real-Time Processing, 52
Outputs from the AIS Related to Business Processes
(Study Objective 8), 52
Contents  xxi

Documenting Processes and Systems (Study Objective 9), 53


Process Maps, 53
System Flowcharts, 54
Document Flowcharts, 55
Data Flow Diagrams, 57
Entity Relationship Diagrams, 57
Ethical Considerations at the Foundation of Accounting
Information Systems (Study Objective 10), 61
Summary of Study Objectives, 62
Key Terms,  63
End of Chapter Material, 64
■■Concept Check, 64
■■Discussion Questions, 65
■■Brief Exercises, 65
■■Problems,  66
■■Cases,  67
Solutions to Concept Check,  68

MODULE 2 CONTROL ENVIRONMENT Describes the proper


control environment to oversee and control processes.

3 Fraud, Ethics, and Internal Control 69


Introduction to the Need for a Code of Ethics and Internal
Controls (Study Objective 1), 69
Accounting-Related Fraud (Study Objective 2), 72
Categories of Accounting-Related Fraud, 74
The Nature of Management Fraud (Study Objective 3), 75
The Nature of Employee Fraud (Study Objective 4), 76
The Nature of Customer Fraud (Study Objective 5), 78
The Nature of Vendor Fraud (Study Objective 6), 78
The Nature of Computer Fraud (Study Objective 7), 78
Internal Sources of Computer Fraud, 79
External Sources of Computer Fraud, 80
Policies to Assist in the Avoidance of Fraud and Errors
(Study Objective 8), 82
Maintenance of a Code of Ethics (Study Objective 9), 82
Maintenance of Accounting Internal Controls (Study Objective 10), 83
The Details of the COSO Report, 85
Reasonable Assurance of Internal Controls, 93
Maintenance of Information Technology Controls (Study Objective 11), 94
The Sarbanes–Oxley Act of 2002 (Study Objective 12), 96
Section 404—Management Assessment of Internal Controls, 97
Section 406—Code of Ethics for Senior Financial Officers, 97
Summary of Study Objectives, 98
Key Terms,  99
xxii  Contents

End of Chapter Material, 100


■■Concept Check, 100
■■Discussion Questions, 101
■■Brief Exercises, 101
■■Problems,  102
■■Cases,  103
Solutions to Concept Check,  105

4 Internal Controls and Risks in IT Systems 107


An Overview of Internal Controls for IT Systems (Study Objective 1), 107
General Controls for IT Systems (Study Objective 2), 110
Authentication of Users and Limiting Unauthorized Users, 110
Hacking and Other Network Break-Ins, 113
Organizational Structure, 116
Physical Environment and Security, 117
Business Continuity, 119
General Controls from an AICPA Trust Services Criteria
Perspective (Study Objective 3), 120
Risks in Not Limiting Unauthorized Users, 122
Risks from Hacking or Other Network Break-Ins, 123
Hacking and Network Break-Ins Related to Blockchain, 124
Risks from Environmental Factors, 124
Physical Access Risks, 125
Business Continuity Risks, 125
Hardware and Software Exposures in IT Systems (Study Objective 4), 125
The Operating System, 127
The Database, 128
The Database Management System, 129
LANs and WANs, 130
Wireless Networks, 130
The Internet and World Wide Web, 131
Telecommuting Workers and Mobile Workers, 132
Electronic Data Interchange, 132
Cloud Computing, 133
Application Software and Application Controls (Study Objective 5), 135
Input Controls, 136
Processing Controls, 142
Output Controls, 142
Ethical Issues in IT Systems (Study Objective 6), 143
Summary of Study Objectives, 144
Key Terms,  145
End of Chapter Material, 146
■■Concept Check, 146
■■Discussion Questions, 147
■■Brief Exercises, 147
Contents  xxiii

■■Problems,  148
■■Cases,  149
Solutions to Concept Check,  150

5 IT Governance 153
Introduction to IT Governance (Study Objective 1), 153
An Overview of the SDLC (Study Objective 2), 157
The Phases of the SDLC, 160
Elements of the Systems Planning Phase of the SDLC
(Study Objective 3), 160
The Match of IT Systems to Strategic Objectives, 161
Feasibility Study, 161
Planning and Oversight of the Proposed Changes, 163
Elements of the Systems Analysis Phase of the SDLC
(Study Objective 4), 163
Preliminary Investigation, 163
System Survey: The Study of the Current System, 163
Determination of User Requirements, 165
Analysis of the System Survey, 166
Systems Analysis Report, 166
Elements of the Systems Design Phase of the SDLC (Study Objective 5), 167
The Purchase of Software, 168
In-House Design, 169
Conceptual Design, 169
Evaluation and Selection, 170
Cloud Computing as a Conceptual Design, 172
Detailed Design, 172
Elements of the Systems Implementation Phase of
the SDLC (Study Objective 6), 174
Software Programming, 175
Training Employees, 175
Software Testing, 176
Documenting the System, 176
Data Conversion, 176
System Conversion, 176
User Acceptance, 177
Post-Implementation Review, 177
Elements of the Operation and Maintenance Phase of
the SDLC (Study Objective 7), 177
The Critical Importance of IT Governance in an
Organization (Study Objective 8), 178
SDLC as Part of Strategic Management, 178
SDLC as an Internal Control, 178
Ethical Considerations Related to IT Governance (Study Objective 9), 179
Ethical Considerations for Management, 179
Ethical Considerations for Employees, 180
Ethical Considerations for Consultants, 180
Another random document with
no related content on Scribd:
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it
away or re-use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country where
you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you do
or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status by
the Internal Revenue Service. The Foundation’s EIN or federal
tax identification number is 64-6221541. Contributions to the
Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or
determine the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.

You might also like