computer based information systems control uaa – acct 316 – fall 2003 accounting information...
TRANSCRIPT
![Page 1: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/1.jpg)
Computer Based Information Systems Control
UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee
![Page 2: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/2.jpg)
Control Classifications
By Objectives By Settings By Risk Aversion
Administrative
Accounting
General
Application
Input Processing
Output
Corrective
Preventive
Detective
By System ArchitecturesManual Systems
Computer Based Systems
Batch Processing
Online Processing
Data Base
SAS 29 (1958)
Text Chapter 7
This Chapter
![Page 3: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/3.jpg)
Control Classifications
By Objectives By Settings By Risk Aversion
Administrative
Accounting
General
Application
Input Processing
Output
Corrective
Preventive
Detective
By System ArchitecturesManual Systems
Computer Based Systems
Batch Processing
Online Processing
Data Base
Encourage adherence to management policies and procedures.
Promote operational efficiency.
Safeguard assets
Ensure accuracy of accounting data and information.
![Page 4: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/4.jpg)
Input Process Output
Sensor
Bench-mark
Detective and Corrective Controls
Corrective Controls
Preventive, Detective, and Corrective Controls
![Page 5: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/5.jpg)
Discover the occurrence of adverse events.
Tend to be active in nature.
After the fact controls
![Page 6: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/6.jpg)
Lead to the righting of effects caused by adverse events.
Tend to be more active than detective controls.
![Page 7: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/7.jpg)
Block adverse events, such as errors or losses from occurring.
Tend to be passive in nature.
![Page 8: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/8.jpg)
Control Classifications
By Objectives By Settings By Risk Aversion
Administrative
Accounting
General
Application
Input Processing
Output
Corrective
Preventive
Detective
By System ArchitecturesManual Systems
Computer Based Systems
Batch Processing
Online Processing
Data Base
Ensure that overall IS is stable and well maintained. Ensure the
accuracy of specific applications, inputs, files, programs & outputs.
![Page 9: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/9.jpg)
Control Classifications
By Objectives By Settings By Risk Aversion
Administrative
Accounting
General
Application
Input Processing
Output
Corrective
Preventive
Detective
By System ArchitecturesManual Systems
Computer Based Systems
Batch Processing
Online Processing
Data Base
![Page 10: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/10.jpg)
What Constitutes A Reliable System
![Page 11: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/11.jpg)
What Constitutes Reliability?
Availability
Security
Maintainability
Integrity
![Page 12: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/12.jpg)
Corrective
Preventive
Detective
General
Application
Input Processing
Output
Administrative
Accounting
By Risk AversionBy SettingsBy Objectives
Control Classifications
By System ArchitecturesManual Systems
Computer Based SystemsBatch ProcessingOnline Processing
Data Base
![Page 13: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/13.jpg)
Controls – The Text Approach
Key General Reliability Controls (> than one reliability principle) - Table 8-1
Key Availability Controls - Table 8-2
Key Security Controls - Table 8-3
Key Maintainability Controls - Table 8-4
Key Integrity Controls – Table 8-5
![Page 14: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/14.jpg)
General Reliability Controls
Strategic Planning & Budgeting
Developing a System Reliability Plan
Documentation
![Page 15: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/15.jpg)
Key Availability Controls
Minimizing System Downtime
Disaster Recovery Plan
![Page 16: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/16.jpg)
Key Security Controls
Segregation of Duties in Systems Function
![Page 17: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/17.jpg)
The Text Notes . . .
In a highly integrated AIS, procedures that used to be performed by separate individuals are combined.
Therefore, any person who has unrestricted access to the computer, its programs, and live data could have the opportunity to both perpetrate and conceal fraud.
![Page 18: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/18.jpg)
The Text Notes . . .
To combat this threat, organizations must implement compensating control procedures such as the effective segregation of duties within the AIS function.
![Page 19: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/19.jpg)
Organizational Independence Within the
Information Systems Function of a Firm using
Computer-Based processing
Source: AIS, Wilkinson & Cerullo
![Page 20: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/20.jpg)
InformationSystemsManager
SteeringCommittee
PlanningStaff
Data-BaseAdministrator
TechnicalServicesManager
SystemsDevelopment
Manager
DataProcessingManager
InformationCenter
SystemsAnalysis &
ProjectsProgramming
DataPreparation
ComputerOperations
DataLibrary
DataControl
Tasks which CREATE systems.
Tasks which OPERATE systems.
These two functions need to be ORGANIZATIONALLY and
PHYSICALLY separated
![Page 21: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/21.jpg)
Flow of batched data within several units of an organization using computer-based
processing.
Source: AIS, Wilkinson & Cerullo
![Page 22: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/22.jpg)
DataInput
DataInput
OutputsOutputs
Errors to becorrected
Errors to becorrected
Receive& Log
Receive& Log
ConvertData
ConvertData ProcessProcess FilesFiles
Log &Distribute
Log &Distribute OutputsOutputs
ErrorListing
ErrorListing
FilesFiles
User Departments
Computer-Based Data Processing Department
Control Section
Data Preparation Section
Computer Operations
Data Library
Record input data in control log. Follow progress of processing. Maintains control totals Reconciles totals during processing. Distribute output. Monitors correction of errors.
![Page 23: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/23.jpg)
DataInput
DataInput
OutputsOutputs
Errors to becorrected
Errors to becorrected
Receive& Log
Receive& Log
ConvertData
ConvertData ProcessProcess FilesFiles
Log &Distribute
Log &Distribute OutputsOutputs
ErrorListing
ErrorListing
FilesFiles
User Departments
Computer-Based Data Processing Department
Control Section
Data Preparation Section
Computer Operations
Data Library
Prepare and verify data for entry into processing.
What controls do we have here?Batch controlsVarious computer input controls.
![Page 24: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/24.jpg)
DataInput
DataInput
OutputsOutputs
Errors to becorrected
Errors to becorrected
Receive& Log
Receive& Log
ConvertData
ConvertData ProcessProcess FilesFiles
Log &Distribute
Log &Distribute OutputsOutputs
ErrorListing
ErrorListing
FilesFiles
User Departments
Computer-Based Data Processing Department
Control Section
Data Preparation Section
Computer Operations
Data Library
Processes data to produce outputs.
What controls do we have here?Various computer processing
controls.
![Page 25: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/25.jpg)
Simplified organizational separation in a computer-
based system using on-line processing.
Source: AIS, Wilkinson & Cerullo
![Page 26: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/26.jpg)
User Departments
Computer Operations
On-Line Files (Data Library)
Data InputsData Inputs
DisplayedOutputs
DisplayedOutputs
PrintedOutputs
PrintedOutputs
ProcessProcess
BatchFiles
BatchFiles
On-LineFiles
On-LineFiles
![Page 27: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/27.jpg)
Subdivisions of transaction (application) controls and
typical control points.
Source: AIS, Wilkinson & Cerullo
![Page 28: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/28.jpg)
SourceDocument
ManualEntry
ConvertTo MRF
Trans.Data
Ed
iting
Com
pu
ter-Based
Data P
rocessing
SourceDocument
User
User
Transaction Via Terminal
Soft-CopyOutput
Input ControlsProcessing
ControlsOutput
Controls
Control Point
![Page 29: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/29.jpg)
Key Security Controls
Segregation of Duties in Systems Function
Physical Access Controls
![Page 30: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/30.jpg)
Physical Access ControlsPerimeter Control
Building Controls
Computer Facility
Controls
![Page 31: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/31.jpg)
Key Security Controls
Segregation of Duties in Systems Function
Physical Access Controls
Logical Access Controls
![Page 32: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/32.jpg)
Logical Access ControlsIdentification
Authentication
Access Rights
Threat Monitoring
![Page 33: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/33.jpg)
Key Security Controls
Protection of Personal Computers and Client/Server Networks
Internet and e-commerce Controls
![Page 34: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/34.jpg)
Key Maintainability Controls
Project Development and Acquisition Controls.
Change Management Controls
![Page 35: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/35.jpg)
Control Classifications
By Objectives By Settings By Risk Aversion
Administrative
Accounting
General
Application
Input Processing
Output
Corrective
Preventive
Detective
By System ArchitecturesManual Systems
Computer Based Systems
Batch Processing
Online Processing
Data Base
Ensure that overall IS is stable and well maintained. Ensure the
accuracy of specific applications, inputs, files, programs & outputs.
![Page 36: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/36.jpg)
Objectives of Application Controls
To prevent, detect, and correct errors in transactions
as they flow through the various stages of a specific data processing program.
Input Process Output
![Page 37: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/37.jpg)
The text correctly notes . . .
If application controls are weak
AIS output is likely to contain errors.
Erroneous data leads to significant potential problems
Objectives of Application Controls
![Page 38: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/38.jpg)
Key Integrity Controls
Source Data Controls
Input Validation Controls
On-Line Data Entry Controls
Data Processing and Storage Controls
![Page 39: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/39.jpg)
Key Integrity Controls
Output Controls
Data Transmission Controls
![Page 40: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/40.jpg)
Input Process Output
Source Data
Input Validation
On-line Data Entry
Data Processing
Storage
Data Transmission
Output
![Page 41: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/41.jpg)
Key Integrity Controls
Source Data Controls
![Page 42: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/42.jpg)
Source Data Controls
Ensure that all source documents are authorized, accurate, complete, properly accounted for and entered into the system or sent to their intended destinations in a timely manner.
![Page 43: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/43.jpg)
Source Data Controls
Forms Design
Prenumbered Forms Sequence Test
Turnaround Documents
Cancelation and Storage of Documents
![Page 44: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/44.jpg)
Source Data Controls
Authorization and Segregation of Duties
Visual Scanning
Check Digit Verification
Key Verification
![Page 45: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/45.jpg)
Key Integrity Controls
Input Validation Controls
![Page 46: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/46.jpg)
Input Validation Routines
Routines that check the integrity of input data as the data are entered into the system.
Edit ProgramsEdit Checks
![Page 47: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/47.jpg)
Input Validation Routines
Sequence Check
Field Check
Sign Check
Validity Check
Limit Check
![Page 48: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/48.jpg)
Input Validation Routines
Range Check
Reasonableness Test
Redundant Data Check
Capacity Check
![Page 49: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/49.jpg)
Key Integrity Controls
On-Line Data Entry Controls
![Page 50: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/50.jpg)
On-Line Data Entry Controls
To ensure the integrity of transaction data entered from on-line terminals and PCs by minimizing errors and omissions.
![Page 51: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/51.jpg)
On-Line Data Entry Controls
Input Validation Routines
User ID and Passwords
Automatic Entering of Data
Prompting
Preformatting
![Page 52: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/52.jpg)
On-Line Data Entry Controls
Completeness Check
Closed-Loop Verification
Transaction Log
Error Messages
Record Retention
![Page 53: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/53.jpg)
Key Integrity Controls
Data Processing and Storage Controls
![Page 54: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/54.jpg)
Processing/Storage Controls
Preserve the integrity of data processing and stored data.
![Page 55: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/55.jpg)
Processing/Storage Controls
Policies and procedures
Data Control Function
Reconciliation procedures
External data Reconciliation
Exception reporting
![Page 56: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/56.jpg)
DataInput
DataInput
OutputsOutputs
Errors to becorrected
Errors to becorrected
Receive& Log
Receive& Log
ConvertData
ConvertData ProcessProcess FilesFiles
Log &Distribute
Log &Distribute OutputsOutputs
ErrorListing
ErrorListing
FilesFiles
User Departments
Computer-Based Data Processing Department
Control Section
Data Preparation Section
Computer Operations
Data Library
![Page 57: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/57.jpg)
Processing/Storage Controls
Data currency checks
Default values
Data matching
File labels
Write Protection mechanisms
![Page 58: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/58.jpg)
Processing/Storage Controls
Database Protection Mechanisms
Data Conversion Controls
Data Security
![Page 59: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/59.jpg)
Key Integrity Controls
Output Controls
![Page 60: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/60.jpg)
Output Controls
Review all output for reasonableness and proper format
Reconcile output and input control totals daily
Distribute output to appropriate user departments
![Page 61: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/61.jpg)
Output Controls
Protect sensitive or confidential outputs
Store sensitive/confidential data in secure area
Require users to review completeness and accuracy of all output
![Page 62: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/62.jpg)
Output Controls
Shred or otherwise destroy sensitive data.
Correct errors found on output reports.
![Page 63: Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee](https://reader036.vdocument.in/reader036/viewer/2022062321/56649e2d5503460f94b1d8c3/html5/thumbnails/63.jpg)
Key Integrity Controls
Transmission Controls