Computer Base Information Control
Computer Base Information Control
INFORMATION SYSTEMS
CONTROL
LEARNING OBJECTIVES
Data Transmission Controls take on added importance in organizations that utilize electronic data interchange
(EDI) or electronic funds transfer (EFT).
In these types of environments, sound internal control is achieved using the following control procedures:
1 . Physical access to network facilities should be strictly controlled.
2 Electronic identification should be required for all authorized network terminals.
3 .Strict logical access control procedures are essential, with passwords and dial-in phone
numbers changed on a regular basis.
4 .Encryption should be used to secure stored data as well as data being transmitted.
5 .Details of all transactions should be recorded in a log that is periodically reviewed.
DOCUMENTATION STANDARDS
l Every organization should have a disaster recovery plan so that data processing
capacity can be restored as smoothly and quickly as possible in the event of a
major disaster.
What are the objectives of a recovery plan?
1 Minimize the extent of the disruption, damage, and loss.
2 Temporarily establish an alternative means of processing information.
3 Resume normal operations as soon as possible.
4 Train and familiarize personnel with emergency operations.
DISASTER RECOVERY PLAN
There are a number of source data controls that regulate the accuracy,
validity, and completeness of input:
–key verification
–check digit verification
–prenumbered forms sequence test
–turnaround documents
–authorization
INPUT VALIDATION ROUTINES
l Input validation routines are programs that check the validity and accuracy of input data
as it is entered into the system.
l These programs are called edit programs.
l The accuracy checks they perform are called edit checks.
l What are some edit checks used in input validation routines?
– sequence check
– field check
– sign check
– validity check
– limit check
– range check
– reasonableness test
ON-LINE DATA ENTRY CONTROLS
l The goal of on-line data entry controls is to ensure the accuracy and integrity of
transaction data entered from on-line terminals and PCs or Laptop/notesbook.
l What are some on-line data entry controls?
– data checks
– user ID numbers and passwords
– comparability tests
– Prompting
– preformatting
– completeness check
– automatic transaction data entry
– closed-loop verifications
– transaction log
– clear error messages
DATA PROCESSING AND FILE
MAINTENANCE CONTROLS
l What are some of the more common controls that help preserve the accuracy and
completeness of data processing?
–data currency checks
–default values
–data matching
–exception reporting
–external data reconciliation
–control account reconciliation
–file security
–file conversion controls
OUTPUT CONTROLS
l The data control functions should review all output for reasonableness and proper
format and should reconcile corresponding output and input control totals.
l Data control is also responsible for distributing computer output to the
appropriate user departments.
OUTPUT CONTROLS
l Users are responsible for carefully reviewing the completeness and accuracy of all
computer output that they receive.
l A shredder can be used to destroy highly confidential data.
Assignments
How To Control and Secure Database in
Implementation of Revenue Cycle in global
Environment;
How To Control and Secure Communication
System Implementation of Revenue Cycle in
Global Environment;
How To Control and Secure Computer Access
in the Implementation of Revenue Cycle in
Global Environment;
How To Control and Secure Computer
Hardware in the Implementation of Revenue
Cycle in Global Environment;
How To Control and Secure Revenue Cycle
Application in Global Environment;