You may be trying to access this site from a secured browser on the server. Please enable scripts and reload this page.
Turn on more accessible mode
Turn off more accessible mode
Skip Ribbon Commands
Skip to main content
Turn off Animations
Turn on Animations
Follow
customer call centre:
0800
-
201-
049
|Follow us on
FRAUD RISK ASSESSMENT QUESTIONNAIRE
Home
About Us
Vision, Mission & Strategic Objectives
Office of the MEC
Office of the HOD
Organogram
Strategic Documents
Strategic Objectives
Fraud and Corruption
Newsroom
Media Statements
Budget Speeches
Speeches
Media
Audio Clips
Resource center
Currently selected
Documents
Forms
Guideline Documents
Legislation
Publications
Resource Sharing Portal
Infrastructure Management and Economic Services
Municipal Finance
National Treasury Docs
Public Finance
Strategic Documents
Surveys
FRAUD RISK ASSESSMENT
Opportunities
Tenders
2022 Floods Disaster
Advertisements
Awards
Cancellations
Closed Tenders
Publication of Bidders
Vacancies
Online Forms
Adobe Sign
Bid Appeals Tribunal System
CallLog System
Central Suppliers Database
CURA
E-Leave
E-Recruitment System
IRM System
KZN Treasury OutLook
Loss Control
Suppliers Database
System Training Schedule
Travel Bookings
FAQ's
Contact Us
It looks like your browser does not have JavaScript enabled. Please turn on JavaScript and try again.
Frequent small thefts can add up to a lot of money. If you knew that someone was stealing from the department, what would you do?
Tech Critter
Do you know of anyone who might be stealing or taking unfair advantage of the department?
Tech Critter
Suppose someone who works in the department decided to steal or commit fraud. How could he or she do it and get away with it?
Tech Critter
In your opinion, who is beyond suspicion when it comes to committing fraud in the department?
Tech Critter
Has anyone asked you to commit an improper, illegal, or unprofessional act(s), or a breach or circumvention of a policy, procedure, or practice? If so, please provide details.
Tech Critter
Have you witnessed an improper, illegal, or unprofessional act(s), or a breach or circumvention (by-passing) of a policy, procedure, or practice? If so, please provide details.
Tech Critter
Are there any areas where you believe controls are not sufficient to catch someone stealing money or other assets in a timely manner? Please explain.
Tech Critter
Do section heads and supervisors demonstrate integrity and honesty in all of their conduct? (Describe examples of such conduct.)
Tech Critter
Has anyone ever threatened you or intimidates you, regarding your disclosure of any potential workplace impropriety? (Describe) Have you reported these incidents and was any action taken?
Tech Critter
Because of your employment position, do you feel pressure not to report anything you feel is not right? If so, can you suggest a method to report your concerns.
Internet Service Providers (ISPs) often impose restrictions that can severely affect online gaming experiences, such as blocking access to popular gaming platforms and tools. To combat these challenges, gamers can use Virtual Private Networks (VPNs) or proxy servers. VPNs offer a secure, encrypted connection that masks the user's IP address, thereby circumventing geo-restrictions and ISP throttling. Proxy servers, although faster, provide less security as they do not encrypt data. Additionally, changing DNS servers is another effective method to bypass ISP filtering, allowing gamers to access blocked services by using alternative DNS addresses that do not restrict traffic to gaming sites.
WEB:
https://www.tech-critter.com/what-are-the-common-methods-isps-use-to-block-online-gaming-platforms/
Enterprise Keywords
Created at 5/1/2024 1:17 AM by ***
Last modified at 5/1/2024 1:17 AM by ***