No offense Ted, but saying it doesn't make it so.  I don't think I have ever
worked with a truly competent mainframe auditor in the corporate world.  I
have seen far better in some (but certainly not all) government
organizations.

I remember one government auditor who said he was going to remove the
sysprogs' permissions to write to any authorized library, and that any
desired updates would have to be reviewed and performed by by a member of
the IG staff... that was a long argument, but I won out through logic.

On Tue, Apr 26, 2011 at 10:37 AM, Ted MacNEIL <eamacn...@yahoo.ca> wrote:

> >happened that our payroll process occurred during the period
> > of the audit. Our
> > operations manager informed the auditors that payroll
> > processing would take
> > priority over the audit if they came on those days, on any
> > other days they
> > could have the machine. Guess which days they came. We were
> > written up
> > because we did not give then dedicated use of the machine.
>
> There are mean-spirited, vindictive, and incompetent people in all
> professions.
>
> Auditors, as anybody else, are not exempt from process and rules.
>
> They should not be able to pre-empt critical events for non-critical tasks.
>
> And, management should have backed the ops manager.
> -
> Ted MacNEIL
> eamacn...@yahoo.ca
> Twitter: @TedMacNEIL
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

CONFIDENTIALITY/EMAIL NOTICE: The material in this transmission contains
confidential and privileged information intended only for the addressee.
If you are not the intended recipient, please be advised that you have
received this material in error and that any forwarding, copying, printing,
distribution, use or disclosure of the material is strictly prohibited.
If you have received this material in error, please (i) do not read it,
(ii) reply to the sender that you received the message in error, and
(iii) erase or destroy the material. Emails are not secure and can be
intercepted, amended, lost or destroyed, or contain viruses. You are deemed
to have accepted these risks if you communicate with us by email. Thank you.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to