Vous êtes sur la page 1sur 24

IT General and

Application Controls
INTRODUCTION TO INPUT CONTRO
LS
 Designed to ensure that the transactions that bring
data into the system are valid, accurate, and compl
ete
 Data input procedures can be either:
 Source document-triggered (batch)
 Direct input (real-time)

 Source document input requires human involveme


nt and is prone to clerical errors.

 Direct input employs real-time editing techniques t


o identify and correct errors immediately
CLASSES OF INPUT CONTROLS

1) Source document controls


2) Data coding controls
3) Batch controls
4) Validation controls
5) Input error correction
6) Generalized data input syste
ms
#1-SOURCE DOCUMENT CONTROL
S
 Controls in systems using physical source doc
uments
 Source document fraud
 To control for exposure, control procedures ar
e needed over source documents to account f
or each one

 Use pre-numbered source documents


 Use source documents in sequence
 Periodically audit source documents
#2-DATA CODING CONTROLS
 Checks on data integrity during processing
 Transcription errors
 Addition errors, extra digits
 Truncation errors, digit removed
 Substitution errors, digit replaced
 Transposition errors
 Single transposition: adjacent digits transposed (reversed)
 Multiple transposition: non-adjacent digits are transposed
 Control = Check digits
 Added to code when created (suffix, prefix, embedde
d)
 Sum of digits (ones): transcription errors only
 Modulus 11: different weights per column: transposition and
transcription errors
 Introduces storage and processing inefficiencies
#3-BATCH CONTROLS
 Method for handling high volumes of transactio
n data – esp. paper-fed IS

 Controls of batch continues thru all phases of s


ystem and all processes (i.e., not JUST an inp
ut control)

1) All records in the batch are processed together


2) No records are processed more than once
3) An audit trail is maintained from input to output

 Requires grouping of similar input transactions


#3-BATCH CONTROLS
 Requires controlling batch throughout
 Batch transmittal sheet (batch control record)
 Unique batch number (serial #)
 A batch date
 A transaction code
 Number of records in the batch
 Total dollar value of financial field
 Sum of unique non-financial field
 Hash total
 E.g., customer number

 Batch control log

 Hash totals
#4-VALIDATION CONTROLS
 Intended to detect errors in data befo
re processing

 Most effective if performed close to th


e source of the transaction

 Some require referencing a master fil


e
#4-VALIDATION CONTROLS
 Field Interrogation
 Missing data checks
 Numeric-alphabetic data checks
 Zero-value checks
 Limit checks
 Range checks
 Validity checks
 Check digit
 Record Interrogation
 Reasonableness checks
 Sign checks
 Sequence checks
 File Interrogation
 Internal label checks (tape)
 Version checks
 Expiration date check
#5-INPUT ERROR CORRECTION
 Batch – correct and resubmit
 Controls to make sure errors dealt with co
mpletely and accurately
1) Immediate Correction
2) Create an Error File
 Reverse the effects of partially processe
d, resubmit corrected records
 Reinsert corrected records in processin
g stage where error was detected
3) Reject the Entire Batch
#6-GENERALIZED DATA INPUT SYSTE
MS (GDIS)
 Centralized procedures to manage data input
for all transaction processing systems
 Eliminates need to create redundant routines
for each new application
 Advantages:

 Improves control by having one common sy


stem perform all data validation
 Ensures each AIS application applies a con
sistent standard of data validation
 Improves systems development efficiency
#6-GDIS

 Major components:

1) Generalized Validation Module


2) Validated Data File
3) Error File
4) Error Reports
5) Transaction Log
CLASSES OF PROCESSING CON
TROLS
1) Run-to-Run Controls

2) Operator Intervention Control


s

3) Audit Trail Controls


#1-RUN-TO-RUN (BATCH)

 Use batch figures to monitor


the batch as it moves from o
ne process to another
1) Recalculate Control Totals
2) Check Transaction Codes
3) Sequence Checks
#2-OPERATOR INTERVENTION

 When operator manually enters


controls into the system

 Preference is to derive by logic


or provided by system
#3-AUDIT TRAIL CONTROLS

 Every transaction becomes traceable fr


om input to output
 Each processing step is documented
 Preservation is key to auditability of AIS
 Transaction logs
 Log of automatic transactions
 Listing of automatic transactions
 Unique transaction identifiers [s/n]
 Error listing
OUTPUT CONTROLS
 Ensure system output:

1) Not misplaced
2) Not misdirected
3) Not corrupted
4) Privacy policy not violated
 Batch systems more susceptible to exposure, r
equire greater controls
 Controlling Batch Systems Output
 Many steps from printer to end user
 Data control clerk check point
 Unacceptable printing should be shredded
 Cost/benefit basis for controls
 Sensitivity of data drives levels of controls
OUTPUT CONTROLS
 Output spooling – risks:
 Access the output file and change criti
cal data values
 Access the file and change the numbe
r of copies to be printed
 Make a copy of the output file so illega
l output can be generated
 Destroy the output file before printing t
ake place
OUTPUT CONTROLS
 Print Programs
 Operator Intervention:

1) Pausing the print program to load output paper


2) Entering parameters needed by the print run
3) Restarting the print run at a prescribed checkpoint after a
printer malfunction
4) Removing printer output from the printer for review and di
stribution
 Print Program Controls
 Production of unauthorized copies
 Employ output document controls similar to source document cont
rols
 Unauthorized browsing of sensitive data by employees
 Special multi-part paper that blocks certain fields
OUTPUT CONTROLS
 Bursting
 Supervision
 Waste
 Proper disposal of aborted copies an
d carbon copies
 Data control
 Data control group – verify and log
 Report distribution
 Supervision
OUTPUT CONTROLS
 End user controls
 End user detection

 Report retention:
 Statutory requirements (gov’t)
 Number of copies in existence
 Existence of softcopies (backups)
 Destroyed in a manner consistent wit
h the sensitivity of its contents
OUTPUT CONTROLS
 Controlling real-time systems output
 Eliminates intermediaries

 Threats:
 Interception
 Disruption
 Destruction
 Corruption

 Exposures:
 Equipment failure
 Subversive acts

 Systems performance controls

 Chain of custody controls

Vous aimerez peut-être aussi