Spelling suggestions: "subject:"dissertations -- accountancy"" "subject:"dissertations -- accountancys""
51 |
The right to privacy : how the proposed POPI Bill will impact data security in a cloud computing environmentBasson, Benhardus 04 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2014. / ENGLISH ABSTRACT: The growing popularity and continuing development of cloud computing services is ever evolving and is slowly being integrated into our daily lives through our interactions with electronic devices. Cloud Computing has been heralded as the solution for enterprises to reduce information technology infrastructure cost by buying cloud services as a utility. While this premise is generally correct, in certain industries for example banking, the sensitive nature of the information submitted to the cloud for storage or processing places information security responsibilities on the party using the cloud services as well as the party providing them. Problems associated with cloud computing are loss of control, lack of trust between the contracting parties in the cloud relationship (customer and cloud service provider) and segregating data securely in the virtual environment.
The risk and responsibilities associated with data loss was previously mainly reputational in nature but with the promulgation and signing by the South African Parliament of the Protection of Personal Information Bill (POPI) in August 2013 these responsibilities to protect information are in the process to be legislated in South Africa. The impact of the new legislation on the cloud computing environment needs to be investigated as the requirements imposed by the Bill might render the use of cloud computing in regard to sensitive data nonviable without replacing some of the IT infrastructure cost benefits that cloud computing allows with increased data security costs.
In order to investigate the impact of the new POPI legislation on cloud computing, the components and characteristics of the cloud will be studied and differentiated from other forms of computing.
The characteristics of cloud computing are the unique identifiers that differentiate it from Grid and Cluster computing. The component study is focused on the service and deployment models that can be associated with cloud computing. The understanding obtained will be used to compile a new definition of cloud computing. By utilizing the cloud definition of what components and processes constitute cloud computing the different types of data security processes and technical security measures can be implemented are studied. This will include information management and governance policies as well as technical security measures such as encryption and virtualisation security. The last part of the study will be focussed on the Bill and the legislated requirements and how these can be complied with using the security processes identified in the rest of the study. The new legislation still has to be signed by the State President after which businesses will have one year to comply and due to the short grace period businesses need to align their business practices with the proposed requirements. The impact is wide ranging from implementing technical information security processes to possible re-drafting of service level agreements with business partners that share sensitive information. The study will highlight the major areas where the Bill will impact businesses as well as identifying possible solutions that could be implemented by cloud computing users when storing or processing data in the cloud. / AFRIKAANSE OPSOMMING: Die groei in gewildheid en die ontwikkeling van wolkbewerking dienste is besig om te verander en is stadig besig om in ons daaglikse lewens geintegreer te word deur ons interaksie met elektroniese toestelle. Wolkbewerking word voorgehou as ‘n oplossing vir besighede om hul inligtings tegnologie infrastruktuur kostes te verminder deur dienste te koop soos hulle dit benodig. Alhoewel die stelling algemeen as korrek aanvaar word, kan spesifieke industrië soos byvoorbeeld die bankwese se inligting so sensitief wees dat om die inligting aan wolkbewerking bloot te stel vir berging en prosesseering dat addisionele verantwoodelikhede geplaas op die verantwoordelike partye wat die wolk dienste gebruik sowel as die persone wat dit voorsien. Probleme geassosieër met wolk- bewerking is die verlies aan beheer, gebrekkige vertroue tussen kontakteurende partye in die wolk verhouding (verbruiker en wolk dienste verskaffer) en die beveiliging van verdeelde inligting in die virtuele omgewing.
Die risiko’s en verantwoordelikhede geassosieër met inligtings verlies was voorheen grootliks gebasseer op die skade wat aan die besigheid se reputasie aangedoen kan word, maar met die publiseering en ondertekening deur die Suid-Afrikaans Parliament van die Beskerming van Persoonlike Inligting Wet (BVPI) in Augustus 2013 is hierdie verantwoordelikhede in die proses om in wetgewing in Suid Afrika vas gelê te word. Die impak van die nuwe wetgewing op die wolkbewering omgewing moet ondersoek word omdat die vereistes van die Wet die gebruik van wolkbewerking in terme van sensitiewe inligting so kan beinvloed dat dit nie die moeite werd kan wees om te gebruik nie, en veroorsaak dat addisionele verminderde IT infrastruktuur koste voordele vervang moet word met addisionele inligting beveiligings kostes.
Om die impak van die nuwe BVPI wetgewing op wolkbewerking te ondersoek moet die komponente en karakter eienskappe van die wolk ondersoek word om vas te stel wat dit uniek maak van ander tipes rekenaar bewerking. Die karakter eienskappe van wolkbewerking is die unieke aspekte wat dit apart identifiseer van Rooster en Groep rekenaar bewerking. Die komponente studie sal fokus op die dienste en implimenterings modelle wat geassosieer word met wolkbewerking. Die verstandhouding wat deur voorsafgaande studie verkry is sal dan gebruik word om ‘n nuwe definisie vir wolkbewerking op te stel. Deur nou van die definisie gebruik te maak kan die inligtings sekuriteit prosesse en tegniese sekuriteits maatreëls wat deur die verantwoordelike party en die wolkbewerkings dienste verskaffer gebruik kan word om die komponente en prosesse te beveilig bestudeer word. Die studie sal insluit, inligtings bestuur prosesse en korporatiewe bestuur asook tegniese beveiligings maatreels soos kodering en virtualisasie sekuriteit. Die laaste deel van die studie sal fokus op die BVPI wetgewing en die vereistes en hoe om daaraan te voldoen deur die sekuritiets maatreëls geidentifiseer in die res van die studie te implimenteer. Die nuwe wetgewing moet nog deur die Staats President onderteken word waarna besighede ‘n jaar sal he om aan die vereistes te voldoen en omdat die periode so kort is moet besighede hulself voorberei en besigheid prosesse aanpas. Die impak van die wetgewing strek baie wyd en beinvloed van tegnise inligtings beveiligings prosesse tot kontrakte aangaande diens lewering wat dalk oor opgestel moet word tussen partye wat sensitiewe inligting uitruil. Die studie sal die prominente areas van impak uitlig asook die moontlike oplossings wat gebruik kan word deur partye wat wolkbewerking gebruik om inligting te stoor of te bewerk.
|
52 |
Merchant cash advances : investigating the taxation consequences in South AfricaKilian, Eduard 04 1900 (has links)
Thesis (MAcc)--Stellenbosch University, 2014. / ENGLISH ABSTRACT: Since the recent credit crisis in 2008, innovative lending products have emerged to address the need for enterprises to maintain and improve their cash flows. One such product is the merchant cash advance (MCA). This form of finance is related to debt factoring and is essentially the business equivalent of a payday loan. In its most common form, a lump sum payment is made to a business in exchange for an agreed upon percentage of future credit and/or debit card receivables. A percentage of the merchant’s daily credit or debit card receivables is retained, either directly from the processor that clears and settles the credit or debit card payment or via a debit order from the merchant’s bank account, until the obligation has been met. The future receivables are purchased at a discount and a processing fee is also charged.
Many merchant cash advance service providers (MCASP) structure their business in such a way that it resembles traditional debt factoring. In this manner, MCASPs endeavour to distinguish their product offering from traditional loans, in an effort to elude legislation that would affect loans, for example the limiting of interest rates charged.
There is however currently a lack of definitive guidance on the taxation consequences from the perspective of the merchant utilising the product and the MCASP providing it. The purpose of this research is to investigate the taxation consequences of MCA transactions in South Africa in an attempt to provide such guidance. The key issue for consideration affecting the taxation consequences of MCAs is the classification of these transactions as either a form of debt factoring or as loans. The research considers and suggests the appropriate classification of these transactions. The taxation treatment is then considered based on this classification from the perspective the merchant utilising the product and the MCASP providing the product. Taxation issues investigated, include the income tax treatment of the discounting cost as “interest”, the availability of deductions allowed by the Income Tax Act and the Value-Added Tax consequences. / AFRIKAANSE OPSOMMING: Sedert die onlangse kredietkrisis in 2008 het innoverende leningsprodukte na vore gekom om te voorsien in die vraag van ondernemings om hul kontantvloei te handhaaf en verbeter. Een van hierdie produkte is die handelaarskontantvoorskot (HKV). Hierdie vorm van finansiering is verwant aan skuldfaktorering en is basies die besigheidsekwivalent van ‘n betaaldaglening. In die mees algemene vorm, word ‘n enkelbdragbetaling aan ‘n besigheid gemaak in ruil vir ‘n voorafbepaalde persentasie van die toekomstige krediet- en/of debietkaartdebiteure. ’n Persentasie van die handelaar se daagliske krediet- of debietkaart debiteure word teruggehou totdat die skuld afgelos is. Invordering vind plaas direk vanaf die verwerker wat die krediet- of debietkaartbetaling goedkeur en betaal, of deur middel van ‘n debietorder direk vanaf die handelaar se bankrekening. Die toekomstige debiteure word teen ‘n diskonto aangekoop en ‘n verwerkingsfooi kan ook gehef word.
Baie handelaarskontantvoorskot-diensverskaffers (HKVD) struktureer hul besighede op so ‘n wyse dat dit soos tradisionele skuldfaktorering voorkom. Op hierdie manier beoog HKVD’s om hul produk van tradisionele lenings te onderskei, met die doel om wetgewing vry te spring wat lenings sou beïnvloed, byvoorbeeld beperkings op rentekoerse gehef.
Daar is egter tans ‘n tekort aan beslissende leiding, wat die belastinggevolge betref, uit die perspektief van die handelaar wat die produk benut en die HKVD wat dit verskaf. Die doel van hierdie navorsing is om te ondersoek wat die belastinggevolge van HKV’e in Suid-Afrika is in ‘n poging om hierdie leiding te verskaf. Die kernaangeleentheid vir oorweging wat die belastinghantering affekteer, is die klassifisering van HKV-transaksies as ‘n vorm van skuldfaktorering of as lenings. Hierdie navorsing skenk oorweging aan hierdie transaksies en stel ‘n toepaslike klassifikasie voor. Die belastinghantering word dan oorweeg, gebaseer op hierdie klassifikasie uit die perskeptief van die handelaar wat die produk benut en die HKVD wat die produk verskaf. Belastingaangeleenthede wat ondersoek word, sluit die inkomstebelastinghantering van die diskonto gehef as “rente” in, die beskikbaarheid van aftrekkings toegelaat kragtens die Inkomstebelastingwet en die gevolge vir Belasting op Toegevoegde Waarde.
|
53 |
The development of a best practice framework for the formulation of overall audit strategies for insurance contracts and the related earnings of listed South African longterm insurersVon Wielligh, Simon Petrus Johannes 12 1900 (has links)
Thesis (PhD (Accounting))--University of Stellenbosch, 2005. / ENGLISH ABSTRACT: The South African long-term insurance industry is currently believed to be at an
important crossroads in its existence. The industry is haunted by concerns about
high cost structures, a lack of transparency in disclosure to policyholders, unfulfilled
expectations of policyholders and the proliferation of available investment vehicles in
the market. These concerns are exerting pressure on the existing products and
practices of South African long-term insurers.
The audits of these insurers are of a complex and high-risk nature as a result of the
complexity of their operations and, in particular, the highly complex actuarial
valuation process in respect of policy liabilities. The prevailing auditing standards in
South Africa require auditors to include policy liabilities in the ambit of their audit
opinions.
Recent investigations into failed long-term insurers and their audits, including those
of local Fedsure Life, British Equitable Life Assurance Society and Australian HIH
Insurance, demonstrate the high risk involved in the audits of long-term insurers.
Against this background, the objective of this research was to develop a best
practice framework for the formulation of overall audit strategies for policy liabilities
arising under insurance contracts and the related earnings of listed South African
long-term insurers.
To justify the focus of the research on the abovementioned components of the
financial statements of listed South African long-term insurers, a questionnaire was
developed and sent to auditors of all long-term insurers listed on the JSE Securities
Exchange South Africa for completion. Responses were processed to calculate a
Relative Inherent Risk Index specifically developed for use in this research, ranking
various industry-specific account balances and classes of transactions on the basis
of their potential exposure to inherent risk. The results of this process provided
significant support for the hypotheses that policy liabilities and the related earnings
are potentially exposed to the highest levels of inherent risk. The remainder of the
research consequently focused on these components. A further very comprehensive questionnaire was developed to collect data with
respect to respondents’ views of potential best practices for the audit of various
aspects relating to policy liabilities arising under insurance contracts and the related
earnings of listed South African long-term insurers, on the basis of their extensive
experience in the industry. This questionnaire was sent to experienced auditors
responsible for the audits of the five largest listed long-term insurers in South Africa
for completion.
Responses were received from four of the five potential respondents, resulting in an
80% response rate, enabling meaningful analysis and interpretation of the data.
Responses were analysed, interpreted and documented in the form of a detailed
best practice framework for the formulation of overall audit strategies for policy
liabilities arising under insurance contracts and the related earnings.
The lack of a fifth response was compensated for by a review of the research
findings by experienced auditors of Deloitte and the provision of their opinions
thereon. Deloitte was selected for this purpose as the fact that this auditing firm is
the only one of the so-called “Big Four” auditing firms that does not act as auditor of
one of the selected target long-term insurers, resulted in the initial exclusion of the
firm’s views from the research. The framework was updated to reflect these
opinions and now incorporates input from all of the so-called “Big Four” auditing
firms.
The framework provides a comprehensive discussion of all possible types of audit
procedures that may be relevant to the audit of all aspects of policy liabilities arising
under insurance contracts and the related earnings of listed South African long-term
insurers. As no such framework existed prior to this research, the development
thereof made a significant contribution to existing knowledge. This contribution is
the result of, inter alia, the method followed in designing the framework, resulting in it
representing a synthesis of, inter alia, the following:
• existing international and limited local guidance for auditors and, in particular,
auditors of long-term insurers, customised for the South African environment; • best practices currently in use on the audits of listed South African long-term
insurers; and
• views of experienced practitioners on the abovementioned types of best
practices that might not be employed at the moment, but that should, in their
views, be employed in future.
The valuable contribution of this research to existing knowledge is clear from the fact
that numerous publications in popular professional as well as accredited academic
journals, plus a paper delivered at a conference have resulted from it (refer to the
source list and Appendix A). Furthermore, the South African Institute of Chartered
Accountants has approved a project to update existing South African guidance for
auditors of long-term insurers on the basis of the findings of this research.
|
54 |
Die invloed van kapitaalwinsbelasting op boedelbeplanning en boedelbelasting en die toepaslikheid van trusts in boedelbeplanning na die inwerkingtreding van KapitaalwinsbelastingKotze, Jan Harmse, Van Wyk, E. 03 1900 (has links)
Thesis (MAcc)--University of Stellenbosch, 2009. / AFRIKAANSE OPSOMMING: Met die bekendstelling van kapitaalwinsbelasting in 2000 was belastingpligtiges en
belastingadviseurs bekommerd oor die invloed daarvan op belasting- en
boedelbeplanning. Om die volle impak daarvan te verstaan moet die werking van
kapitaalwinsbelasting ondersoek word.
Paragraaf 10 van die Agste Bylae definieer die belasbare kapitaalwinste vir die jaar
van aanslag. Hiervolgens word kapitale winste in die hande van verskillende
belastingpligtiges teen verskillende “koerse” belas. In die algemeen word daar na
Paragraaf 10 verwys as die insluitingsartikel wat op kapitaalwinste van toepassing
is. Aangesien slegs ‘n “gedeelte” van kapitaalwinste onderhewig is aan normale
belasting is een van die grootste faktore in die huidige belastingomgewing steeds
om te onderskei tussen inkomste van ‘n kapitale of nie-kapitale aard.
Deur die toepassing van Paragraaf 10 word kapitaalwinste gerealiseer deur Trusts
en Maatskappye teen hoër koerse belas, as in die geval van individue. Dit het tot
gevolg dat belastingpligtiges en belastingadviseurs die gebruik van trusts as ‘n
effektiewe hulpmiddel vir boedelbeplanning begin bevraagteken het. Die effektiewe
belastingkoers van toepassing op kapitaalwinste gerealiseer deur individue is egter
die laagste van al die verskillende belastingpligtiges. Wanneer ‘n individue te
sterwe kom is sy boedel onderhewig aan boedelbelasting, wat ‘n verdere belasting
las tot gevolg het. Indien ‘n trust effektief toegepas word tydens die opstel van ‘n
boedelplan vir ‘n individu sal die bates van die trust nie onderhewig wees aan
boedelbelasting nie.
Deur die verskeie opsies wat beskikbaar is vir ‘n belastingpligtige, wanneer hy ‘n
besluit moet neem watter beleggingsvoertuig hy moet gebruik vir die belegging,
kan die effektiewe belastingkoerse vergelyk word. Deur die uitkomste van die
verskeie opsies teenoor mekaar te vergelyk bewys dit dat indien ‘n trust korrek
aangewend word, dit steeds as ‘n effektiewe hulpmiddel in ‘n boedelplan kan
aangewend word.
Tydens die uitvoer van die vergelyking van die verskillende opsies wat vir die
belastingpligtige beskikbaar is, is die tydwaarde van geld buite rekening gelaat.
Indien die lewensverwagting van ‘n individu in berekening gebring word kan die
uitkoms van die vergelyking moontlik anders wees.
Deur dit alles in ag te neem bevestig dit weereens dat elke individue se boedelplan
uniek sal wees indien sy persoonlike finansiële omstandighede in ag geneem
word. / ENGLISH ABSTRACT: With the introduction of capital gains taxation in 2000, taxpayers and their advisors
feared the impact thereof on tax planning and estate planning. To determine the
impact thereof the taxation of capital gains must be understood.
Paragraph 10 of the Eight Schedule define the taxable portion of capital gains for
the year of assesment. Paragraph 10 is also commonly known as the inclusion
clause applicaple on capital gains. This application of paragraph 10 has the effect
that capital gains realised by different types of taxpayers are taxed at different
rates. Due to the application of paragraph 10 only a portion of the capital gain
realised by the taxpayer is subject to normal taxation. Therefor one of the biggest
concerns for taxpayers still is to determine if income are of a capital nature or not.
The inclusion rate, according to paragraph 10, applicable on capital gains realised
by trusts and companies is higher than that of a individual and gives rise to a
bigger tax burden relating to capital profits for trusts and companies. Therefor
taxpayers and their advisors doubt wether a trust could still be used as an effective
tool for estate planning. The effective tax rate on caiptal gains for individuals is the
lowest for all types of taxpayers. But when an individual dies his estate is subject to
estate duty, which leaves an additional burden for an individual to take into
account. When a trust is effectively utilised in preparing an estate plan for an
individual, the assets of the trust should not be subject to estate duty.
By evaluating the effective tax rates applicable to the different options available to
a taxpayer when he needs to determine which investment vehicle to use when
making an investment, a comparision can be made. By comparing the effective tax
rates a conclusion can be drawn that a trust can still be used as an effective tool
for estate planning when utilised properly.
When the comparison was made the time value of money was ignored. If the life
expectancy of a individual are taken into account the outcome could be different.
When everything is taken into consideration the conclusion is that the estate plan
for every individual is unique and determined by his or her personal financial
circumstances.
|
55 |
Warranted and warrantless search and seizure in South African income tax law : the development, operation, constitutionality and remedies of a taxpayerBovijn, Silke 12 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2011. / ENGLISH ABSTRACT: Section 74D of the Income Tax Act No 58 of 1962 (the Act) grants the power of
search and seizure to the South African Revenue Service, the basic underlying
principle being that the Commissioner has to obtain a warrant from a judge prior to
a search and seizure operation. The previous section 74(3) of the Act provided that
the Commissioner was allowed himself to authorise and conduct a search and
seizure operation without the requirement of a warrant. Section 74D of the Act was
recently reviewed and the Tax Administration Bill (the TAB) contains the new
provisions on search and seizure that will replace section 74D of the Act.
In this assignment, the concept of search and seizure was examined by considering
the cases, academic writing and other material on the topic. The objectives were to
analyse the development of search and seizure in South African income tax law, to
provide a basic understanding of the warranted and warrantless search and seizure
provisions of the Act and the TAB, to determine their constitutionality and to
determine the remedies available to a taxpayer who has been subject to a search
and seizure.
It was found that search and seizure has developed from warrantless under the
previous section 74(3) of the Act into the requirement of a warrant under section
74D of the Act into a combination of both under the TAB.
The concept of an ex parte application was analysed, which was shown to be
permissible in certain circumstances under section 74D of the Act, while it is now
compulsory in terms of the TAB. It was shown that the TAB closed the lacuna in the
Act relating to the validity period of a warrant before it has been executed. It was,
however, concluded, regarding whether a warrant expires when exercised or whether the same warrant can be used again to conduct a second search and
seizure, that the position is not quite certain in terms of the Act and the TAB. It was
found that there is no defined meaning of the reasonable grounds criterion, which is
often required to be met in terms of the Act and the TAB, but that anyone that has
to comply with the criterion must be satisfied that the grounds in fact exist
objectively.
The new warrantless search and seizure provisions of the TAB were analysed. It was
established that warrantless search and seizure provisions are not uncommon in
other statutes, but that the content thereof often differs. The new warrantless
provisions were compared to the warrantless search and seizure provisions of, inter
alia, the Competition Act No 89 of 1998 (the Competition Act), and it was found that
the warrantless TAB provisions are not in all respects as circumscribed as those of
the Competition Act and recommendations for counterbalances were made.
It was concluded that the warranted search and seizure provisions of the Act and the
TAB should be constitutionally valid but that the constitutionality of the new
warrantless provisions of the TAB is not beyond doubt.
It was furthermore found that the remedies at the disposal of a taxpayer who has
been subject to a search and seizure should indeed be sufficient, but that there are
no remedies available to a taxpayer to prevent injustice or harm. / AFRIKAANSE OPSOMMING: Artikel 74D van die Inkomstebelastingwet No 58 van 1962, (die Wet) verleen aan die
Suid-Afrikaanse Inkomstediens die mag van deursoeking en beslaglegging, die
grondliggende beginsel synde dat die Kommissaris ’n lasbrief van ’n regter moet
verkry voor die deursoeking en beslaglegging kan plaasvind. Die vorige artikel 74(3)
van die Wet het bepaal dat die Kommissaris self ’n deursoeking en beslaglegging kon
magtig en uitvoer sonder die vereiste van ’n lasbrief. Artikel 74D van die Wet is
onlangs hersien en die nuwe Belastingadministrasie-wetsontwerp (BAW) bevat die
nuwe bepalings oor deursoeking en beslaglegging wat artikel 74D van die Wet sal
vervang.
In hierdie werkstuk is die konsep van deursoeking en beslaglegging ondersoek deur
oorweging van die hofsake, akademiese skrywe en ander materiaal oor die
onderwerp. Die doelstellings was om die ontwikkeling van deursoeking en
beslaglegging in die Suid-Afrikaanse inkomstebelastingreg te ontleed, om ’n basiese
begrip van die bepalings in die Wet en die BAW oor deursoeking en beslaglegging
met en sonder ’n lasbrief te verskaf, om die grondwetlikheid daarvan te bepaal en
om die remedies te bepaal wat beskikbaar is vir ’n belastingpligtige wat onderworpe
was aan deursoeking en beslaglegging.
Daar is bevind dat deursoeking en beslaglegging ontwikkel het vanaf sonder ’n
lasbrief ingevolge die vorige artikel 74(3) van die Wet tot die vereiste van ’n lasbrief
ingevolge artikel 74D van die Wet tot die kombinasie van albei ingevolge die BAW.
Die konsep van ’n ex parte-aansoek is ontleed, en dit blyk in sekere omstandighede
ingevolge artikel 74D van die Wet toelaatbaar te wees, terwyl dit nou ingevolge die
BAW verpligtend is. Daar is aangedui dat die BAW die lacuna in die Wet oor die geldigheidsperiode van ’n lasbrief voordat dit uitgevoer is, verwyder het. Daar is
egter bevind, rakende die vraag of ’n lasbrief verval wanneer dit uitgevoer word en
of dieselfde lasbrief weer gebruik kan word om ’n tweede deursoeking en
beslaglegging uit te voer, dat daar nie sekerheid ingevolge die Wet of die BAW
bestaan nie. Daar is bevind dat daar geen gedefinieerde betekenis vir die kriterium
van redelike gronde is nie, waaraan dikwels ingevolge die Wet en die BAW voldoen
moet word, maar dat enigiemand wat aan die kriterium moet voldoen tevrede moet
wees dat die gronde inderwaarheid objektief bestaan.
Die nuwe bepalings van die BAW oor deursoeking en beslaglegging sonder ’n lasbrief
is ondersoek. Daar is vasgestel dat bepalings oor deursoeking en beslaglegging
sonder ’n lasbrief nie ongewoon is in ander wette nie, maar dat die inhoud daarvan
dikwels verskil. Die nuwe bepalings oor deursoeking en beslaglegging sonder ’n
lasbrief is vergelyk met die bepalings oor deursoeking en beslaglegging sonder ’n
lasbrief van, inter alia, die Mededingingswet No 89 van 1998 (die Mededingingswet),
en daar is bevind dat die BAW-bepalings oor deursoeking en beslaglegging sonder ’n
lasbrief nie in alle opsigte so afgebaken is soos dié van die Mededingingswet nie en
voorstelle vir teenwigte is gemaak.
Die gevolgtrekking is gemaak dat die bepalings oor deursoeking en beslaglegging met
’n lasbrief van die Wet en die BAW grondwetlik geldig behoort te wees, maar dat die
grondwetlikheid van die nuwe bepalings van die BAW oor deursoeking en
beslaglegging sonder ’n lasbrief nie onweerlegbaar is nie.
Daar is verder bevind dat die remedies tot die beskikking van ’n belastingpligtige wat
onderworpe was aan deursoeking en beslaglegging inderdaad genoegsaam behoort
te wees, maar dat daar geen remedies aan ’n belastingpligtige beskikbaar is om
ongeregtigheid of skade te voorkom nie.
|
56 |
Cloud computing : COBIT-mapped benefits, risks and controls for consumer enterprisesEnslin, Zacharias 03 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: Cloud computing has emerged as one of the most hyped information technology topics of the decade. Accordingly, many information technology service offerings are now termed as cloud offerings. Cloud computing has attracted, and continues to attract, extensive technical research attention. However, little guidance is given to prospective consumers of the cloud computing services who may not possess technical knowledge, or be interested in the in-depth technical aspects aimed at information technology specialists. Yet these consumers need to make sense of the possible advantages that may be gained from utilising cloud services, as well as the possible incremental risks it may expose an enterprise to.
The aim of this study is to inform enterprise managers, who possess business knowledge and may also be knowledgeable on the main aspects of COBIT, on the topic of cloud computing. The study focuses on the significant benefits which the utilisation of cloud computing services may bring to a prospective consumer enterprise, as well as the significant incremental risks this new technological advancement may expose the enterprise to. Proposals of possible controls that the prospective consumer enterprise can implement to mitigate the incremental risks of cloud computing are also presented. / AFRIKAANSE OPSOMMING: “Cloud computing” (wolkbewerking) het na vore getree as een van die mees opspraakwekkende inligtingstegnologieverwante onderwerpe van die dekade. Gevolglik word talle inligtingstegnologie-dienste nou as “cloud”-dienste aangebied. Uitgebreide aandag in terme van tegnologiese navorsing is en word steeds deur “cloud computing” ontlok. Weinig aandag word egter geskenk aan leiding vir voornemende verbruikers van “cloud”-dienste, wie moontlik nie tegniese kennis besit nie, of nie belangstel in die diepgrondige tegniese aspekte wat op inligtingstegnologie-spesialiste gemik is nie. Tog moet hierdie verbruikers sin maak van die moontlike voordele wat die gebruik van “cloud”-dienste mag bied, asook die moontlike inkrementele risiko’s waaraan die onderneming blootgestel mag word.
Die doel van hierdie studie is om die bestuurders van ondernemings, wie besigheidskennis besit en moontlik ook kundig is oor die hoof aspekte van COBIT, in te lig oor wat “cloud computing” is. Die studie fokus op die beduidende voordele wat die benutting van “cloud computing”-dienste aan die voornemende verbruikersonderneming mag bied, asook die beduidende inkrementele risiko’s waaraan die onderneming blootgestel mag word as gevolg van hierdie tegnologiese vooruitgang. Voorstelle van moontlike beheermaatreëls wat die voornemende verbruikersonderneming kan implementeer ten einde die inkrementele risiko’s van “cloud computing” teë te werk word ook aangebied.
|
57 |
The development of an integrated framework in order to implement information technology governance principles at a strategic and operational level for medium-to-large sized South African businessGoosen, Riana 03 1900 (has links)
Thesis (MComm)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: In today's technologically advanced business environments, Information Technology (IT) has become the centre of most, if not all businesses' strategic and operational activities. It is for this reason that the King III report has dedicated a chapter to IT governance principles, in effect making the board of directors and senior management responsible for implementing such principles. King III's guidance on these principles is only described in broad terms and lack sufficient detail as how to implement these principles. Though various guidelines, in the form of IT control frameworks, -models and -standards exist, it remains highly theoretical in nature and companies tend to view these control frameworks, -models and -standards on an individual basis, implementing them in an ad hoc manner, resulting in the implementation of an inefficient IT governance system, that does not address the key strategic areas and risks in a business.
The purpose of this study is to develop an IT best practices integrated framework which can assist management in implementing an effective IT governance system at both a strategic and operational level. The integrated framework was developed by performing a detailed literature review of a best practice control framework, -model and -standard, including its underlying processes.
By combining and aligning the relevant processes of the control framework, -model and -standard to the business' imperatives, a framework was developed to implement IT governance principles at a strategic level. The integrated framework is extended to provide guidance on how to implement good IT controls at an operational level. The control techniques, of the applicable processes identified at a strategic level, are implemented as well as the controls around a company's various access paths, which are affected by a company's business imperatives. These access paths are controlled through the implementation of applicable configuration controls. By making use of the integrated framework which was developed, an effective and efficient IT governance system can be implemented, addressing all applicable IT risks relevant to the key focus areas of a business. / AFRIKAANSE OPSOMMING: In vandag se tegnologies gevorderde besigheids omgewings het Informasie Tegnologie (IT) die middelpunt geraak van die meeste, indien nie elke onderneming se strategiese en operasionele aktiwiteite nie. Dit is vir hierdie rede dat die King III verslag 'n hoofstuk aan die beginsels van IT korporatiewe beheer wy. Dié verslag hou die direkteure en bestuur verantwoordelik vir die implementering van hierdie beginsels. Die King III verslag verskaf egter slegs in breë trekke leiding in verband met die implementering van hierdie beginsels en 'n gebrek aan meer gedetailleerde beskrywings bestaan. Alhoewel verskeie riglyne, in die vorm van IT kontrole raamwerke, -modelle en -standaarde bestaan, bly dit steeds teoreties van aard en is maatskappye geneig om hierdie riglyne op 'n individuele vlak te hanteer en op 'n willekeurige wyse te implementeer. Hierdie proses lei tot die implementering van 'n ondoeltreffende IT korporatiewe beheerstelsel.
Die doel van hierdie studie is om 'n geïntegreerde beste praktykraamwerk te ontwikkel wat deur die direkteure en bestuur van 'n onderneming gebruik kan word om op beide 'n strategiese en operasionele vlak 'n doeltreffende IT korporatiewe beheermaatstelsel in plek te stel. 'n Geïntegreerde raamwerk is ontwikkel deur 'n volledige literatuurstudie uit te voer, gebaseer op 'n beste praktyk IT kontrole raamwerk, -model en -standaard en die gepaardgaande prosesse.
Deur die toepaslike prosesse van hierdie kontrole raamwerk, -model en -standaard te kombineer en te belyn met 'n besigheid se besigheidsimperatiewe, word IT korporatiewe beheerbeginsels op 'n strategiese vlak in plek gestel. Die geïntegreerde raamwerk sluit riglyne in om goeie IT kontroles op 'n operasionele vlak te implementeer. Die kontrole tegnieke, wat verbind word met die gepaardgaande prosesse wat tydens die strategiese vlak geïdentifiseerd is, word geimplementeer asook die die toepaslike konfigurasie kontroles oor die verskeie toegangspaaie wat beïnvloed word deur 'n besigheids se besigheidsimperatiewe. Deur gebruik te maak van die ontwikkelde geïntegreerde raamwerk kan alle geaffekteerde IT risikos nou aangespreek word en 'n doeltreffende IT korporatiewe beheerstelsel in plek gestel word.
|
58 |
A study of a feebate policy to reduce CO₂ emissions in the South African automotive industryDu Plooy, Johann Leroux 03 1900 (has links)
Thesis (MAcc)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: Globally, climate change is probably the biggest environmental challenge facing the world this century. To accommodate change, the South African government introduced a vehicle emission tax on 1 September 2010. However, the design of the vehicle emission tax focuses on consumers and it might not be most effective in reducing CO2 emissions to the desired level. Therefore, alternative initiatives need to be identified and implemented to address increasing CO2 emissions. A “feebate” policy is considered as a possible alternative to reduce CO2 emissions. A literature review was performed on the topic of “feebate” policies and current tax legislation that could encourage vehicle manufacturers to invest in energy-efficient technology aimed at reducing CO2 emissions. Based on the literature review, a qualitative empirical study was conducted by means of a questionnaire, which was distributed to nine vehicle manufacturers in South Africa. The study specifically focused on vehicle manufacturers as they have the opportunity to design, develop and introduce energy-efficient technology, which could reduce CO2 emissions. Results suggest that a “feebate” policy that leads to costs savings should be considered by government to encourage vehicle manufacturers to invest in energy-efficient technology in order to lower CO2 emissions. It was also noted that, in general, the provisions of the current Income Tax Act No. 58 of 1962 provides little incentive to encourage vehicle manufacturers to invest in energy-efficient technologies to reduce CO₂ emissions. / AFRIKAANSE OPSOMMING: Wêreldwyd is klimaatverandering waarskynlik die grootste uitdaging wat die wêreld in die gesig staar die eeu. Die Suid-Afrikaanse regering het op 1 September 2010 ʼn voertuig uitlatingsbelasting ingestel om verandering te akkommodeer. Aangesien die ontwerp van voertuig uitlatingsbelasting egter fokus op die verbruiker, is dit moontlik nie die effektiefste manier om CO2-uitlatings te verminder en tot ʼn aanvaarbare vlak nie. Dus moet alternatiewe inisiatiewe geïdentifiseer en geïmplementeer word om toenemende CO2-uitlatings aan te spreek. ʼn “Feebate” beleid word oorweeg as ʼn moontlike alternatief om CO2-uitlatings te verminder. ʼn Literatuurstudie is uitgevoer rakende die onderwerp van “feebate” beleide en huidige belastingwetgewing wat voertuigvervaardigers kan motiveer om te investeer in energie effektiewe tegnologie wat gemik is daarop om CO2-uitlatings te beperk. Gebaseer op die literatuurstudie is ʼn kwalitatiewe empiriese studie uitgevoer deur middel van ʼn vraelys, wat aan al nege voertuigvervaardigers in Suid-Afrika gestuur is. Die studie het spesifiek op voertuigvervaardigers gefokus, omrede hulle die geleentheid het om energie effektiewe tegnologie te ontwerp, te ontwikkel en voor te stel wat CO2-uitlatings kan verminder. Resultate dui daarop dat die regering ʼn “feebate” beleid, wat sal lei tot kostebesparing, behoort te oorweeg om sodoende voertuigvervaardigers te motiveer om in energie effektiewe tegnologie te investeer om CO2-uitlatings te verlaag. Daar is ook bevind dat die huidige Inkomstebelastingwet No. 58 van 1962 oor die algemeen min insentief verskaf om voertuigvervaardigers te motiveer om in energie effektiewe tegnologie te investeer om CO2-uitlatings te verlaag.
|
59 |
Die invloed van elektroniese handel op die toepaslikheid van die Wet op Belasting op Toegevoegde Waarde, no. 89 van 1991Oosthuizen, Sonia 12 1900 (has links)
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2006. / The advent of the internet made it possible to conduct business in a different manner
- electronically. Electronic commerce enables residents and vendors to transact with
residents and vendors of any other country (jurisdiction) at any time, making the
world indeed a smaller place.
Electronic commerce has, however, raised many questions internationally.
Determining the effect of such transactions on the tax take of a country is of great
importance to a government. The South African Revenue Service adjusted the
Income Tax Act in order to take globalisation into account in accordance with
international direction. In contrast, no changes have been suggested for the indirect
taxation, namely value added tax.
Electronic commerce were not contemplated when the Value-Added Tax Act was
introduced in 1991. The charging section (section 7 of the mentioned act) provides
that a transaction will be taxed in South Africa on the supply of goods or services, on
the import of goods and on the supply of an imported service. In traditional business
the place of supply was easy to define because a pure consumption test could be
applied: namely that the place of supply is where the goods or services have been
consumed. Today this rule will put an enormous compliance burden on vendors since
the physical place of consumption in electronic commerce is not that obvious (Masters, 2001). Not only must the precise place of supply be determined but the
vendor also has to value the supply in multiple jurisdictions.
This study highlights the applicable sections of the Value-Added Tax Act and applies
it to electronic commerce in order to determine if the existing legislation should be
modernised or if parts of it needs to be re-written.
The following concepts will be considered:
• Place of supply in order to determine the jurisdiction where tax must be
charged.
• Value of supply to determine the value on which tax must be charged.
• Vendor to determine which entities, South African or otherwise, have to
register for VAT in South Africa.
• Goods.
• Services to consider goods and services of digital content.
The international initiatives regarding the application of consumption tax, under the
leadership of the Fiscal Committee of the Organisation for Economic Co-operation
and Development, were taken into account in the study of any required amendments
to sections of the Value-Added Tax Act. A group, “The Consumption Tax Technical
Advisory Group”, was established in January 1999 by the OECD to consult with
business and non-members on the implementation of consumption tax on electronic
commerce transactions. The composition of the group is representative of the main
trading nations in the world, but also includes smaller countries, non-members and
private sector participants. It includes Australia, Japan, the United Kingdom, the United States of America and the European Commission. Considering the global
composition of the group this study will focus on the initiatives of the OECD and it is
not deemed necessary to investigate the initiatives of individual countries. The study
will however consider the research and initiatives of South Africa’s biggest
commercial partner, the European Union (OECD, 2004a: 285).
The South African initiatives regarding electronic commerce include the Green Paper
on Electronic Commerce released by the Department of Communication in
November 2000 and the Electronic Communications and Transactions Act
promulgated on 26 June 2002. The legislation does not address the tax implication
of electronic commerce but in chapter 4 of the mentioned green paper it was
discussed by the legislators.
There is growing international pressure to lower corporate income tax rates. As the
tax base erodes in this area other sources, possibly consumer taxation, must be
found to meet the shortfalls (Masters, 2001).
It is the aim of this study to show that the present Value-Added Tax Act is in need of
modernisation in order to take into account the wide range of electronic commerce
transactions.
|
60 |
Applying PRINCE2 project management disciplines to address key risks in ERP System Implementation ProjectsPlotnikova, Svetlana 03 1900 (has links)
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007. / The successful implementation of an Enterprise Resource Planning (ERP) System can help an organisation to redefine its business processes and enhance its competitive advantage. An ERP System Implementation is a transformation project, which changes the way an organisation thinks and acts about its business. An ERP System implementation is also a complex endeavour, and as such, it requires rigorous risk management. The understanding and management of risks relevant to ERP System Implementation Projects are critical in order to ensure that the project delivers on its objectives within the specified budget and timelines, and eventually realises the envisaged business benefits.
The purpose of this study is to discuss how key risks relevant to ERP System Implementation Projects could be addressed by applying project management disciplines derived from the PRINCE2 (PRojects IN Controlled Environment) project management methodology. This methodology was developed by the Office of Government Commerce in the United Kingdom. This study also provides a framework that could be applied at the outset and during an ERP System Implementation Project by business management, to understand the risks (“what could go wrong?”) and project management disciplines that should be applied to address these risks (“what must go right?”).
This framework was derived by:
• Identifying key risks relevant to ERP System Implementation Projects;
• Mapping these key risks onto SAP Implementation phases to highlight where these risks could materialise in the SAP Implementation process;
• Then mapping these key risks across PRINCE2 project management processes and SAP Implementation phases by creating the SAP Implementation Key Risks Map; and finally
• Providing a detailed description of how to apply PRINCE2 project management disciplines to address each risk in the SAP Implementation Key Risks Map.
|
Page generated in 0.1286 seconds