• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Treasury department is the financial hub of the government of ST. Vincent and the Grenadines. A partial Wide Area Network is in place and this links the major government departments to the treasury so they can perform online transaction processing. T

Extracts from this document...

Introduction

TABLE OF CONTENTS

TABLE OF CONTENTS

INTRODUCTION

Overview of the firm

Current Business Issues

Statement and discussion of the problems under study

Goals and objectives of the study

METHODOLOGY

FINDINGS

RECOMMENDATIONS

BUSINESS CONTINUITY DISCLOSURE

INTRODUCTION

Overview of the firm

The Treasury department is the financial hub of the government of ST. Vincent and the Grenadines.  Its responsibilities include

  1. Ensuring that proper and adequate accounting systems are established and maintained in every Department of Government
  2. Receipts of Government Revenues.
  3. Disbursement from consolidated fund of amount duly authorized.
  4. Custody of Government Cash and Securities.
  5. Maintenance of Accounts of all appropriations and Revenue Receipts.
  6. Preparation of the Public Accounts of the State as required by Law.
  7. Investigation of losses and irregularities in financial administration
  8. Providing Treasury Services in out districts
  9. To enhance and modernize the Treasury Accounting Systems.

All financial transactions of the government are conducted through the treasury.  A partial Wide Area Network is in place and this links the major government departments to the treasury so they can perform online transaction processing.  This network is using a combination of high speed (1 Gbps) fiber optic link and low speed (32 Kbps) Frame Relay rented from Cable and Wireless, the lone telecommunication company in the country.  

Smartstream is the main application being used by the treasury.  Smartstream is a client/server system that enables companies to effectively manage financial and operational information and dynamically upgrade business processes across the entire enterprise. Smartstream application comprise of a complete set of solutions for managing your company’s back office, including general ledger, budget administration, receivables and payables, billing, asset management, procurement, and human resources.  

...read more.

Middle

FINDINGS

The single points of failure identified in the system are as follows

SPOF

Services Affected

Applications

Affected

Application

Description

Database Server

Processing of transactions

Smartstream

Financial System that process trans.

Authentication Server

Login on to Network

Processing of transactions

Smartstream

Financial System that process trans.

Frame Relay Links

Processing of transactions by ministries using it

Smartstream

Financial System that process trans.

Fiber Optic links

Financial System that process trans.

CS/DSU units

Processing of transactions

Smartstream

Financial System that process trans.

Job Servers

Printing of checks and purchase orders

Smartstream

Financial System that process trans.

Switches and routers

Processing of transactions

Smartstream

Financial System that process trans.

ISP Provider

Network access and processing activities

Smartstream

Financial System that process trans.

When the database server is down no one can perform any processing of activities since there is no redundant server to failover to.  If the authentication server is down the users cannot log on to the system therefore they cannot process transactions. The frame relay only affects the ministries that use it likewise the fiber optic link, if any of these are down then only certain users will be without access.  The ISP provider supplies the frame relay thus if the service provider is down then the users on frame relay will not have access to the system.  There are no spare for the resources therefore if any equipment goes bad there is no replacement, an order has to placed for one, if none is available locally then you might have to wait at least a day or two to get one from a neighboring Island or the USA.

The system is mainly used for the Smartstream application.

...read more.

Conclusion

  • Identification of mission critical systems
  • Backup facilities and arrangements, data recovery.
  • Alternate communication between Treasury and the various accounts units of the Ministries of Government and sub treasuries and customers.
  • Alternate physical site location
  • Customers access to receiving their wages, other allowances or any monies due to them by the Government of St. Vincent and the Grenadines.

 This plan is reviewed on a regular basis to modify it for any changes our operations or changes in laws and government regulations.  The plan is also periodically tested to ensure that it will operate and operates successfully in the event of a disaster.

It is virtually impossible to plan for every possible disaster however we are confident that the major threats faced by the department have been addressed in the plan.  However there is a possibility that due to our dependence on other third parties that we could be adversely affected after a disaster.  

The plan is subject to change and changes will be reflected in an updated notice to all our customers.  This notice will be posted on the governments’ website www.svg.sv.  You may obtain a written copy of this disclosure by sending a written request to the Accountant General, Treasury Department, Kingstown, St. Vincent.

Page  of

...read more.

This student written piece of work is one of many that can be found in our University Degree Information Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Information Systems essays

  1. In this coursework we will be designing a component based model for a business ...

    as well as having varying content. This heterogeneity caused by autonomous systems poses problems for system integration since sources are stored and maintained differently. Although the system will be based on the internet it has been discovered recently that decentralisation in the growth of data has become common, and that

  2. Systems Life Cycle. The main disadvantage of the traditional waterfall method is with the ...

    It is also a flexible methodology, being able to accommodate changes in user requirements throughout. The end result quality may not be as good as that in SSADM. This is because the scope and purpose of the project is not always initially clear.

  1. Website Design. This is a Texans Credit Union online website. It has recently ...

    License Number + Issuing State + Mother's Maiden Name + Daytime Phone Number + Account Type + Interest Payment Method + Transfer Amount + Transfer From Account Account Type = [Term CD + Term CD Term | Jumbo CD + Jumbo CD Term | Bump CD + Bump CD Term]

  2. This research is about Management of network operating system at Natural Forest Resources management ...

    Just to mention a few, I would like to acknowledge contributions from my case study supervisor Mr. Charles Ngatigwa, Mr. Andrew Chibwana, Pastory Mwesigwa, and Mr.Minja Emmanuel, George Mlenge and Rosalia shimba. Finally, but not least, I would like to recognize contributions from management, staff and students of the university of Dar-es-salaam and Saint Augustine university of Tanzania (SAUT)

  1. Types of IT Security Threats

    Viruses spread throughout the system, continually compromising and corrupting, before often moving onto new systems through eMail, file sharing, further spreading, now across multiple systems. Viruses can find many point of entries to a system. Many of them enter a computer through an executable file.

  2. RFID and GPS in Business

    RFID technology is implemented by organizations in many aspects, including logistic-tracking, asset tracking, personal identification, payment systems, business processes and healthcare. (Citation http://www.rfidc.com/docs/introductiontorfid.htm, retrieved on 4th Jan 2010) An example for logistic and tracking is the Gulf States Toyota company.

  1. Information Security System

    General Merchandise and Action. Where goods are sold (not or through auctions) but never delivered or misrepresented. 3. Nigerian Money Offers. False promises of riches if consumers pay to transfer money to their bank accounts. 4. Lotteries. Request for payment to claim lottery winnings or get help to win, often foreign lotteries.

  2. Security System for Ad-hoc Wireless Networks

    15 CHAPTER 2: SECURITY OBJECTS - CONCEPTS AND PRINCIPLES.......... 19 2.1 INTRODUCTION ...................................................................................................... 19 2.2 ADVANTAGES OF SECURITY OBJECTS.................................................................... 20 2.2.1 Security Functionality.................................................................................... 20 2.2.2 Compatibility and Scaling ............................................................................. 20 2.2.3 Rapid development and broader applicability .............................................. 21 2.2.4 Commercial Off-The Server Systems.............................................................

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work