Repair and Approval of Irregular Activity

Print Version

Key tasks in the management of end user computing (EUC) or user developed applications (UDA) include the detection and location of irregular changes (or lack of change), followed by their repair and/or authorization. Successful adoption of these tasks into the EUC / UDA management process requires six critical elements:

1. Appropriate security at sheet and cell level
This will minimize the opportunity for erroneous changes to occur.

2. Intelligent detection
The routine use of EUC / UDA applications generates thousands, even millions, of changes that are entirely normal. Although important from an audit perspective, they must be automatically filtered out of any approval process in order to avoid users being buried in data.

3. Rapid location
Once an anomaly is highlighted by email, traffic light or exception report, users must find it easy to locate the problematic change within the file. They will not want to conduct additional lengthy desktop analysis.

4. Facilitated repair
In order to rapidly repair the files, users will need access to previous versions of the cell contents as provided by a complete cell history. A full cell history drawn from multiple previous versions will also demonstrate whether the problem is frequent and requires a more robust solution.

5. Multi-level electronic sign-off
For those business processes living under strict compliance requirements it will be necessary for all changes to be electronically signed off. Multi-level sign-offs may be required in particularly sensitive processes.

6. Process reporting
The completion of these tasks must be automatically reported, including related performance metrics such as outstanding and overdue approvals.

ClusterSeven provides all of these requirements from one central location to ensure a consistent, reportable repair and approval process across your entire EUC / UDA environment.

Print Version

“With ClusterSeven, we have an extra layer of checking. If there are any discrepancies, we can spot them immediately and correct them as they happen.”

George Flynn, business analyst of product control, European Credit Management (ClusterSeven client)

“The main area of difficulty with spreadsheets is the change control process. Having built them and gone through a rigorous testing process, they are left exposed to errors, and, over time, they can eventually corrupt. By implementing a systematic tool, you are no longer reliant on the users to put manual controls in place to flag up these errors.

ClusterSeven’s technology has functionality in a number of areas, but its core strength is that it gives a fully auditable view of each spreadsheet. We can configure the technology to take all the manual efforts away from ensuring only the right changes occur.”

Stephen Ashton, Head of IT business management, Dresdner Kleinwort (ClusterSeven client)