• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Treasury department is the financial hub of the government of ST. Vincent and the Grenadines. A partial Wide Area Network is in place and this links the major government departments to the treasury so they can perform online transaction processing. T

Extracts from this document...

Introduction

TABLE OF CONTENTS

TABLE OF CONTENTS

INTRODUCTION

Overview of the firm

Current Business Issues

Statement and discussion of the problems under study

Goals and objectives of the study

METHODOLOGY

FINDINGS

RECOMMENDATIONS

BUSINESS CONTINUITY DISCLOSURE

INTRODUCTION

Overview of the firm

The Treasury department is the financial hub of the government of ST. Vincent and the Grenadines.  Its responsibilities include

  1. Ensuring that proper and adequate accounting systems are established and maintained in every Department of Government
  2. Receipts of Government Revenues.
  3. Disbursement from consolidated fund of amount duly authorized.
  4. Custody of Government Cash and Securities.
  5. Maintenance of Accounts of all appropriations and Revenue Receipts.
  6. Preparation of the Public Accounts of the State as required by Law.
  7. Investigation of losses and irregularities in financial administration
  8. Providing Treasury Services in out districts
  9. To enhance and modernize the Treasury Accounting Systems.

All financial transactions of the government are conducted through the treasury.  A partial Wide Area Network is in place and this links the major government departments to the treasury so they can perform online transaction processing.  This network is using a combination of high speed (1 Gbps) fiber optic link and low speed (32 Kbps) Frame Relay rented from Cable and Wireless, the lone telecommunication company in the country.  

Smartstream is the main application being used by the treasury.  Smartstream is a client/server system that enables companies to effectively manage financial and operational information and dynamically upgrade business processes across the entire enterprise. Smartstream application comprise of a complete set of solutions for managing your company’s back office, including general ledger, budget administration, receivables and payables, billing, asset management, procurement, and human resources.  

...read more.

Middle

FINDINGS

The single points of failure identified in the system are as follows

SPOF

Services Affected

Applications

Affected

Application

Description

Database Server

Processing of transactions

Smartstream

Financial System that process trans.

Authentication Server

Login on to Network

Processing of transactions

Smartstream

Financial System that process trans.

Frame Relay Links

Processing of transactions by ministries using it

Smartstream

Financial System that process trans.

Fiber Optic links

Financial System that process trans.

CS/DSU units

Processing of transactions

Smartstream

Financial System that process trans.

Job Servers

Printing of checks and purchase orders

Smartstream

Financial System that process trans.

Switches and routers

Processing of transactions

Smartstream

Financial System that process trans.

ISP Provider

Network access and processing activities

Smartstream

Financial System that process trans.

When the database server is down no one can perform any processing of activities since there is no redundant server to failover to.  If the authentication server is down the users cannot log on to the system therefore they cannot process transactions. The frame relay only affects the ministries that use it likewise the fiber optic link, if any of these are down then only certain users will be without access.  The ISP provider supplies the frame relay thus if the service provider is down then the users on frame relay will not have access to the system.  There are no spare for the resources therefore if any equipment goes bad there is no replacement, an order has to placed for one, if none is available locally then you might have to wait at least a day or two to get one from a neighboring Island or the USA.

The system is mainly used for the Smartstream application.

...read more.

Conclusion

  • Identification of mission critical systems
  • Backup facilities and arrangements, data recovery.
  • Alternate communication between Treasury and the various accounts units of the Ministries of Government and sub treasuries and customers.
  • Alternate physical site location
  • Customers access to receiving their wages, other allowances or any monies due to them by the Government of St. Vincent and the Grenadines.

 This plan is reviewed on a regular basis to modify it for any changes our operations or changes in laws and government regulations.  The plan is also periodically tested to ensure that it will operate and operates successfully in the event of a disaster.

It is virtually impossible to plan for every possible disaster however we are confident that the major threats faced by the department have been addressed in the plan.  However there is a possibility that due to our dependence on other third parties that we could be adversely affected after a disaster.  

The plan is subject to change and changes will be reflected in an updated notice to all our customers.  This notice will be posted on the governments’ website www.svg.sv.  You may obtain a written copy of this disclosure by sending a written request to the Accountant General, Treasury Department, Kingstown, St. Vincent.

Page  of

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. Wireless network security

    802.11g is backwards compatible with 802.11b, meaning that 802.11g access points will work with 802.11b wireless network adapters and vice versa. 802.11g supports CCK and will fall back to it when an 802.11b client connects to an 802.11g network (802.11g-2003 13).

  2. Datbase management system v. Traditional file processing system

    organisation to ensure that every occurrence of redundant data has the same values" (Laudon and Laudon 2006). This will help "reducing the risk of inconsistencies occurring" (Connolly and Begg 2003). With the traditional file systems, information is duplicated throughout the system without any real control (Goyal 2008).

  1. Creating a shopping website with Project management

    User can log out Minnor problems J.Aziz K.Hussain 18 Do the search functions work? User can search Minnor problems J.Aziz K.Hussain 19 Can users update basket? User can update the basket/ Same As expected J.Aziz K.Hussain 20 Can user choose quantity of products?

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    An accurate timeline of the project can be produced ensuring better management and control of the later stages. 2.3 Suitability If an organisation needs a well-documented and accurate information system, then SSADM is very capable. Thus, it is suitable for Government organisations where Information Systems need to be precise and well documented.

  1. Website Design. This is a Texans Credit Union online website. It has recently ...

    of a new CD Purchase Request Relationships: Include: Verify Account Information, Verify Necessary Funds Extend: Normal Flow of Events 1. Verify that the the CD purchase request is valid and complete 2. Execute Verify Account Information Use Case 3. Execute Verify Necessary Funds Use Case 4.

  2. Security System for Ad-hoc Wireless Networks

    38 3.3 CERTIFICATION OBJECTS ....................................................................................... 38 3.4 SECURE SESSION OBJECTS..................................................................................... 41 3.5 ACCESS CONTROL AND AUTHORIZATION OBJECTS................................................ 42 3.6 SMART CARD OBJECTS .......................................................................................... 43 CHAPTER 4: PROTOCOLS AND USAGE OF SECURITY OBJECTS ............. 45 4.1 LOCAL LOGIN ........................................................................................................ 45 vi 4.2 CREATING A SECURE SESSION ...............................................................................

  1. Types of IT Security Threats

    Once completed, all Bad PC has to do to is monitor the traffic as it so pleases, both good systems now thinking that it is the other good system.

  2. Building Information Management. In this paper we asked the question how Facility Managers can ...

    use the building but we believe that the Facility Manager should have influence during the whole life cycle of the building, the Facility Manager knows what his/her company wants, what their demands are. The BIM model is a tool that is meant for the entire life cycle of the building.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work