× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



   I hope this is not a duplicate posting.  Something went haywire with my
   e-mail.  I don't think this made it out.

     Subject: Re: [BPCS-L] ACP invoice voiding

     There is add on software from UPI that provides this kind of protection
     & much more.
       * Someone changes price on some part, has it shipped to a buddy almost
         for free, then changes price back to official price.
       * Someone changes vendor address to that of a confederate, issues a
         lot of money to that address, changes address back.
       * Someone makes an error, not know right way to correct it, just does
         a delete of the evidence.
     There's lots of potential BPCS actions that some people in management &
     auditing may consider to be inappropriate, should only be done by
     certain individuals, etc.  The UPI add-on will catch who did these
     inappropriate actions, reporting them to the appropriate management that
     wants to know about it going on.  More often than not, suspicious
     actions can be because someone lacks good BPCS education, and is making
     mistakes, or trying to make corrections, not knowing correct way to do
     it.

     In my opinion, the security officer is not the right person to notify
     for such actions.  Data should be under the supervision of the corporate
     department that is held accountable for its accuracy.  The head of that
     department, or someone he or she delegates authority to, should be the
     person consulted, notified, need to give approval, whatever, when some
     transaction appears to violate corporate business rules, that have been
     included in your BPCS implementation.

     The way BPCS software is written, you really do not want to be crashing
     some program because someone trying to do something, where the person to
     give approval is not around to do so.  Better to let the action take
     place, but log it in the BPCS security audit files, which should also
     contain record of any corrections to original actions, so anyone can see
     what happened, who did it, how it was corrected.

     I would not be surprised if some of UPI competitors have similar add
     ons.

       Hi,

       There is no such standard BPCS feature in 6.1.01. What is the business
       need
       behind of this request?

       Regards

       Klara

                                                                                
                               
       |
         |       Subject:  [BPCS-L] ACP invoice voiding     

       Hi All,

       Can we configure BPCS in such a way that a security officer will be
       prompted when someone tries to void and invoice or someone have to
       approve before an invoice is voided? We are on BPCS 6.1.01.

        Regards,

       Isaac A. Antwi
       Applications Manager
       AngloGold Ashanti Limited
       (Formerly Ashanti Goldfields Co. Ltd)
       Information Systems Department
       Obuasi Mine
       Tel: +233 (0)582 40494 Ext. 1591
       Fax: +233 (0)582 40268
       Mobile: +233 (0)24 4672164
       E-mail: iantwi@xxxxxxxxxxxxxxxxxxxxxxx
       < mailto:iantwi@xxxxxxxxxxxxxxxxxxxxxxx>

       Confidentiality Warning

     Inappropriate for a public discussion group.

     -
     Al Macintyre
     http://en.wikipedia.org/wiki/User:AlMac
     http://www.ryze.com/go/Al9Mac
     BPCS/400 Computer Janitor ... see
     http://radio.weblogs.com/0107846/stories/2002/11/08/bpcsDocSources.html

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.