While working remotely, the Vendor Coordinator team is noticing an uptick in the number of ACH requests for new and existing vendors. This is good from an efficiency and cost-saving perspective.
Category: Internal Controls News
June column by Director of Internal Controls Rod Smith.
The past couple of months have not been easy. Moreover, we’re having to operate a little differently, but I know UNC is capable of adapting to change and doing great things. Unfortunately, and during times like these, scams abound — … Read more
I’m aware that everyone is reading through a lot of information these days and that you’re having to adjust to doing business a new way, so I will be succinct. I want to remind folks to not let your guard … Read more
This month, I want to share information on data analytics and business intelligence, two topics that are emerging as critical in the world of internal controls. Ironically, they’ve always been available to us, but with all the advances in technology, … Read more
I was invited to give a presentation and assist a group with strengthening their system and controls, specifically their reimbursement process. So, I researched their organization and their policies, and while meeting with them, invited one of the team members … Read more
I attended a Certified Professional Education (CPE) conference out-of-state. My group’s assigned topics evolved around data privacy and data security. As we shared introductions, I recognized that some folks in our group spoke interchangeably of the two. However, data security … Read more
This month, I would like to discuss preventing fraud versus detecting it. Organizations often have an overreliance on detection versus prevention. While the first method is good, it’s often very time consuming, costly, and sometimes, it’s a little too late. … Read more
Rod Smith’s October column for Internal Controls
So, here’s a question for you: Can you quickly and accurately define intellectual property? Do all of our students, faculty, staff and support services know the definition to this question? Likewise, what is the definition of sensitive information? What controls do you have in place to secure and protect sensitive information?