Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.1 Chapter 22 Computers and accounting.

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

Chapter 14 Sales day book and sales ledger
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
The Data Protection (Jersey) Law 2005.
Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 40.1 Chapter 40 Joint venture accounts.
Chapter 8 Statements of financial position
Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 12.1 Chapter 12 The banking system.
Data Protection & Freedom of Information The Practical Implications of Data Protection and Freedom of Information Caroline Dominey Data Protection Officer.
Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 20.1 Chapter 20 Columnar day books.
Chapter 29 The valuation of inventory
Chapter 3 Inventory Chapter 3 Inventory.
Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 10.1 Chapter 10 Accounting concepts.
Chapter 23 Computerised accounting systems
Chapter 15 Purchases day book and purchases ledger
Chapter 27 Double entry records for depreciation
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
General Purpose Packages
Health & Social Care Apprenticeships & Diploma
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Local Government Reform and Compliance with the DPA Ken Macdonald Assistant Commissioner (Scotland & Northern Ireland) Information Commissioner’s Office.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Database Management Systems (DBMS)
Computing and Information Science 1 Databases START.
Information Systems Unit 3.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Scientific data storage: How are computers involved in the following?
Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 35.1 Chapter 35 Single entry and.
The Data Protection Act 1998
The Data Protection Act 1998
Handling Personal Data
Level 2 Diploma in Customer Service
Data Protection Act.
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
CIPD Foundation Certificate and Diploma in Human Resource Practice
G.D.P.R General Data Protection Regulations
LO2 - Be Able to Design IT Systems to Meet Business Needs
Presentation transcript:

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.1 Chapter 22 Computers and accounting

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.2 Learning objectives After you have studied this chapter, you should be able to:  Explain that different computer hardware configurations are used, depending largely upon company size  Explain why financial accounting packages tend to be bought ‘off-the-shelf’, possibly customised to the business, or the software (particularly in larger companies) may be commissioned from computer software specialists either within the business or from external agencies

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.3 Learning objectives (Continued)  Explain why accountants use spreadsheets to write many of their own computer programs, particularly for managerial accounting purposes  Explain that an accounting information system is just one part of the management information system  Describe the structure and flexibility of spreadsheets

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.4 Learning objectives (Continued)  Explain why a database package is a useful tool  Explain the importance of backing up data in a computerised environment  Explain the importance of and benefits of the use of passwords  Describe the requirements and implications of the Data Protection Act 1998

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.5 Computers in accounting  Computers can be used to complete a virtually every task in the entire accounting function.  Systems used include spreadsheets, databases and accounting software that can be specially written for the particular company.  However they are used, the operator needs to understand the accounting processes.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.6 Large versus small systems  The scale of technology a business uses will vary according to the needs of a business.  A large company may use a networked system so that all staff can access the accounting system as needed.  A small company may have one stand- alone computer operated by one person.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.7 Networks  Where a central computer is used to hold the data, terminals are networked together via wires or the Internet.  A network can be over a smaller area, known as a local area network (LAN), or a wider area, known as a wide area network (WAN).  Some networks hold an internal form on the Internet, known as an intranet.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.8 Software  Small or medium-sized businesses will use purchased off-the-shelf software packages.  These sorts of packages can usually be customised to the needs of an organisation.  Larger businesses will develop their own software in-house or have it written for them by an outside business.  These sorts of bespoke systems will be tailored to exactly what the business wants.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.9 Benefits from computers The benefits of using a computerised accounting system include:  Saving time in transaction processing  Increased accuracy  Immediate production of reports  More efficient use of time

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Spreadsheets  The spreadsheet is a very popular tool for accountants.  Spreadsheets allow data to be entered into a large area of cells and calculations can be made from this data.  Data can be changed at any time and new results will be shown immediately meaning that the effects of decisions can be seen.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Use of spreadsheets  Financial plans and budgets, with columns for time periods.  Tax, investment and loan calculations.  Statistics using the built-in functions  Consolidations.  Multi-dimensional spreadsheets for deeper analysis of data.  Currency conversion.  Timetabling and roster planning of staff.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Databases  A database is a collection of related files that can be organised into records, for example inventory.  For instance, you could have fields for reference, description, quantity, reorder level and so on, that are updated regularly.  A database is more flexible and cheaper than an accounting package.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Data back-ups  Backing-up is the most important task when using a computer.  Backing-up simply means to copy the relevant files to another storage medium.  It means that if anything goes wrong with the data, the business can revert to the back-up.  Most software packages routinely back-up in case of disaster.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Passwords  It is usual for both a computer and an accounting package to be passworded.  Passwords can restrict access to certain parts of the computer system.  This ensures that management have tighter control of the system and that the system is not exposed to all operators.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Data security  Businesses that use computers and hold the personal details of individuals need to register with the Information Commissioner’s Office.  The business must declare what information they have access to and what uses that information will have.  This ensures that individuals are aware of what information is being held about them and allows them access to this information.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Data Protection Act 1998 The DPA 1998 holds that: 1. Personal data shall be processed fairly and lawfully. 2. Personal data shall only be obtained for the specified purposes. 3. Personal data shall be adequate, relevant and not excessive. 4. Personal data shall be accurate.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Data Protection Act 1998 (Continued) 5. Personal data shall not be kept for longer than is necessary. 6. Personal data shall be processed in accordance with the rights of the data subjects. 7. Measures will be taken against unauthorised or unlawful processing, or accidental loss, damage or destruction of personal data. 8. Personal data shall not be transferred.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Learning outcomes You should have now learnt that: 1. Computers can be and normally are linked together when they are used as part of the accounting system. 2. Software may be written from scratch or bought ‘off-the-shelf’. 3. Software bought ‘off-the-shelf’ is often customised to fit the needs of the organisation.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Learning outcomes (Continued) 4. Accounting information systems are just one part of an overall management information system. 5. Output can be excessive and cause information overload if not controlled to ensure it is useful to the person who receives it. 6. Spreadsheets are in general use by accountants who commonly develop their own software applications with them. 7. Databases are well suited to recording facts such as names, addresses and stock levels.

Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide Learning outcomes (Continued) 8. Backing up data is an essential task in a computerised environment. 9. Use of passwords assists in limiting access to parts of an information system and to the system as a whole and should not be ignored, particularly as the Internet has opened up the possibility of information systems being penetrated by outsiders. 10. The Data Protection Act 1998 must be observed when personal data is held on computer.