History four internal control methods are used

This preview shows page 26 - 29 out of 38 pages.

history. Four internal control methods are used:Setting up user names, passwords, and access rights.The ability to associate the user currently logged into the company with thedata that is being entered.Limit access to information in Sage 50’s Navigation Centers.Audit Trail reports that show what each user entered.If User Security is set up, Sage 50 can associate the user currently logged intothe company with the data being entered. For example, USER1 adds a customer
General Ledger, Inventory, and Internal Control179McGraw-Hill Education,Computer Accounting with Sage 50 2017, 20erecord. USER2 then logs on and modifies the customer record. The Audit Trailreport will show that USER2 was the last person who worked with the customerrecord, and it will display what was changed. By limiting access to accountingdata, the user security feature addresses an important purpose of internal control.Assigning users to one Navigation Center increases the accuracy of records andreports. Also, since one user assumes responsibility for repetitive tasks, theefficiency of operations increases. User security reduces the business's risk ofusers changing or deleting data inappropriately. User security allows thecompany to track who has performed various maintenance and recording tasks.User Security and Access to the Sage 50 Navigation CentersIf you are an administrator responsible for setting up and maintaining useraccess, you can choose settings that will limit access to information inNavigation Centers. For example, if you want a user to have limited access tocompany revenue information, you could make sure the user has no access to thegeneral ledger master list and transaction list reports or financial statements.However, you might want that same user to be able to view company budgetsbut not change them in any way. You can fine-tune settings to give users exactlythe kind of access you want them to have. The Selected AccessRole Setupwindow has embedded Help for each security setting. Just select a setting to seeHelp about it. This will aid you in deciding which areas users have access to andwhich areas are not accessible.Selected AccessThe Selected Access window allows the administrator to grant rights to work incertain areas of the Sage 50 program within the current company. Sage 50program areas include the following roles:Customers & SalesVendors & Purchases
180Chapter 5McGraw-Hill Education,Computer Accounting with Sage 50 2017, 20eInventory & ServicesEmployees & PayrollBanking & General LedgerSystemIn addition to full or no access, the administrator can set different levels ofaccess within subareas such as maintenance, tasks, and reports. For example, inthe Customers & Sales area, the administrator could choose to give a userlimited access to Customer Information or Customer Beginning Balances. Drop-down lists let the administrator set different access levels for different subareasof the program; for example, Payments; Write Checks.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 38 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture