Identify corporate governance requirements

Assignment Help Basic Computer Science
Reference no: EM13935572

Using this case study information provided, complete the following steps.
1. Identify corporate governance requirements described in the case study and in provided policy documents for the organisation.
2. Identify corporate governance requirements described in the listed published sources of information. Page 4
3. Review and analyse all corporate governance requirements (from previous steps) against current policy documents (attached), and identify revisions that need to be made to the policy documents to reflect the current requirements and ensure compliance.
4. Identify and describe how ongoing compliance with requirements can be monitored and measured (i.e. performance indicators).
5. Prepare a draft compliance report, containing information using the following standardised format.
a. Corporate governance requirements (reflecting information from steps 1 and 2).
b. Revisions required to current policy (reflecting information from step 3).
c. Proposed timing for implementing revisions (to incorporate governance requirements, reflecting step 3).
d. Monitoring processes (reflecting information from step 4).
6. Following on from step 5, gather feedback (oral notes or written email, etc.) from two of the following authoritative sources.
a. An Australian Tax Office (ATO) representative in your area.
b. A professional association (e.g. CPA Australia, AIM).
c. Australian Securities and Investments Commission (ASIC)
d. The office of the Privacy Commissioner.
e. Australian Accounting Standards Board (AASB).
You need to check that the revisions comply with corporate governance requirements. Include contact details for the sources contacted, including name, department and phone or email address, and a statement from the source indicating clarification and/or confirmation of the implementations you are recommending (50 words maximum per source).
7. Organise to meet with your manager (your assessor) to review your draft Compliance Report. In particular, you need to provide them a copy of your draft Compliance Report and review with your manager the timetable you have outlined for implementation of corporate governance requirements, and note required changes or recommendations they make for the timetable you
have proposed.
8. Review the feedback you have gathered from authoritative sources (step 6) and stakeholders (step 7) and incorporate this into your final version of your Compliance Report.

Reference no: EM13935572

Questions Cloud

Javascript program that will read a message string : Write a JavaScript program that will read a message string and a number from text boxes on a Web page. The program will then use those values to display some information to the user.
Evaluating a companys external environment : The design of robust value-creating supply chain networks. Focused swot: diagnosing critical strengths and weaknesses and Evaluating a companys external environment
The supplies inventory : The supplies inventory on August 1, 2012 was $7,350. Supplies costing $22,150 were acquired during the year and charged to the supplies inventory. A count on July 31, 2013 indicated supplies on hand of $8,810.
What is dollar amount of cash flows that baxter will receive : Baxter plans to hedge its cash flows with a forward contract. What is the dollar amount of cash flows that Baxter will receive in five years if it accepts this project?
Identify corporate governance requirements : Identify corporate governance requirements described in the case study and in provided policy documents for the organisation. Identify corporate governance requirements described in the listed published sources of information. Page 4
Determine the npv under the given conditions : Determine the NPV under these conditions. Rather than use all cash, Cantoon could partially finance the acquisition. It could obtain a loan of 3 million euros today that would be used to cover a portion of the acquisition.
Prepare an organized report for the strategic officers : For the purpose of this course, it is located it in Tennessee. As members of the senior management team of ToolsCorp Corporation, your group has been asked to prepare a neat and organized report for the Strategic Officers Steering Committee (SOS-C..
Improve jsp functionto traverse and list on the screen : Create an XHTML document with the JavaScript code to open and build the DOM tree for orders.xml as in the seminar, but them also loads in and builds another DOM tree for another fileâ?¦ say orders2.xml as shown below
Differentiate between western blotting and southern blotting : Differentiate between an intermediate host and a definitive host and give an example of what parasite stage is seen in humans as intermediate and definitive hosts.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The flyandstay ltd system case study

Your software house decided to design and build the system using the object-oriented methodology, to allow for more flexible design/build iterations and re-use of design and code. You have therefore now been asked to produce the analysis and desig..

  Why is security of operation useful

1. Why is security of operation useful to overall information assurance

  Find the height level of the tree

Find the height - level of the tree and how many leaves does the tree have - Find the probability that the battery will last between 11 and 15 hours.

  Telecommunications-networking discussion

The TCP, UDP, and IP were designed to provide best-effort service without quality of service (QoS) guarantees. Today's multimedia applications are implemented using these protocols.

  Develop a system vision document

Develop a system vision document for Especially for You Jewelers, detailing the overall vision or plan for the new direct sales and accounting system - Propose at least system capabilities for the company.

  Calculate 185+122. is there overflow

Assume 185 ad 122 are signed 9-bit decimal integers.Calculate 185+122. Is there overflow?

  Explaining notifier sends e-mail to system administrator

Suppose a notifier sends e-mail to the system administrator when a successful compromise of that system is detected. What are the drawbacks of this approach?

  Show how the value ascii miriam is stored in memory

Show how the value ASCII "MIRIAM" is stored in memory in Big Endian format starting at location 100 hexadecimal. Assume that each memory location stored two ASCII characters.

  What u think about the article database fight funding cuts

What u think about the article Database fight funding cuts

  Question about compiler theory

Determine some common compilers available? Based on regular expressions, can all input be validated if it is correct, or not, based on compilation?

  Compare and contrast the features of both the apple ipad

Compare and contrast the features of both the Apple iPad and the Samsung Galaxy Tab.Compare and contrast the available accessories, potential for future upgrades, warranties, and available support of both the iPad and the Galaxy Tab.

  What is achievable steady-state throughput

The receiver uses a conservative flow control policy and updates its credit allocation at every opportunity. What is the achievable steady-state throughput?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd