Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction...
-
date post
22-Dec-2015 -
Category
Documents
-
view
219 -
download
2
Transcript of Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction...
![Page 1: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/1.jpg)
Chapter 9-1
![Page 2: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/2.jpg)
Chapter 9-2
Chapter 9Computer Controls for
Accounting Information Systems
Introduction
General Controls For OrganizationsIntegrated Security for the Organization
Organization-Level, Personnel, File Security Controls
Fault-Tolerant Systems, Backup, and Contingency
Planning and Computer Facility Controls
Access to Computer Files
![Page 3: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/3.jpg)
Chapter 9-3
Chapter 9Computer Controls for
Accounting Information Systems
Information Technology General ControlsSecurity for Wireless Technology
Controls for Hardwired Network Systems
Security and Controls for Microcomputers
IT Control Objectives for Sarbanes-Oxley
Application Controls For Transaction ProcessingInput, Processing, and Output Controls
![Page 4: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/4.jpg)
Chapter 9-4
Introduction
Internal control systems with focus onspecific security in organizationscontrol procedures to ensure effective use of resources efficient utilization of resources
Primary challenges associated with connectivity protection of sensitive data and information stored or transferred
providing appropriate security and control procedures
![Page 5: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/5.jpg)
Chapter 9-5
General Controls For Organizations
Developing an appropriate security policy involves
Identifying and evaluating assetsIdentifying threats Assessing riskAssigning responsibilitiesEstablishing security policies platformsImplementing across the organizationManaging the security program
![Page 6: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/6.jpg)
Chapter 9-6
Integrated Security forthe Organization
Organizationsare dependent on networks for transactions,data sharing, and communications. need to give access to customers, suppliers, partners, and others
Security threats for organizations arise fromthe complexity of these networks the accessibility requirements present
![Page 7: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/7.jpg)
Chapter 9-7
Integrated Security forthe Organization
Key security technologies that can beintegrated include
intrusion detection systems
firewalls
biometrics and others
An integrated security system reduces the risk of attack
increases the costs and resources needed by an intruder
![Page 8: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/8.jpg)
Chapter 9-8
General Controls withinIT Environments
Organizational level controls
Personnel Controls
File Security Controls
Fault-Tolerant Systems, Backup,and Contingency Planning
Computer Facility Controls
Access to Computer Files
![Page 9: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/9.jpg)
Chapter 9-9
Organization-Level Controls
Important controls includeconsistent policies and proceduresmanagement’s risk assessment processcentralized processing and controlscontrols to monitor results of operationscontrols to monitor the internal audit function, the audit committee, and self-assessment programsthe period-end financial reporting processBoard-approved policies that address significant business control and risk management practices
![Page 10: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/10.jpg)
Chapter 9-10
Personnel Controls
An AIS depends heavily on people for the creation of the system,
the input of data into the system,
the supervision of data processing
distribution of processed data, and
the use of approved controls
![Page 11: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/11.jpg)
Chapter 9-11
General controls that affect personnel include
separation of duties
use of computer accounts
separation of duties control procedures
Personnel Controls
![Page 12: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/12.jpg)
Chapter 9-12
Separation of Duties
Separation of duties should be designed and implemented in two ways:
separate accounting and information processing subsystems
separate the responsibilities within the IT environment
![Page 13: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/13.jpg)
Chapter 9-13
Separation of Duties
Separate Responsibilities within IT Environment.Designated operational subsystems
initiate and authorize asset custodydetect errors in processing data enter them on an error log, and refer them back to the specific user subsystemfor correction.
![Page 14: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/14.jpg)
Chapter 9-14
Division of Responsibility
Division of responsibility functions within anIT environment can be on the following lines:
Systems Analysis FunctionData Control FunctionProgramming FunctionComputer Operations FunctionTransaction Authorization FunctionAIS Library Function
![Page 15: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/15.jpg)
Chapter 9-15
Use of Computer Accounts
Use of computer accounts helps to ensure access is limited to specific users mostly by using passwords nowadays by use of biometrics
(digital fingerprinting)
protects use of scarce resources
![Page 16: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/16.jpg)
Chapter 9-16
Use of Computer Accounts
limit user access to particular computer filesor programsprotect files from unauthorized useprotect computer time from unauthorized use place resource limitations on account numbers which limits programmer/operator errors
![Page 17: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/17.jpg)
Chapter 9-17
File Security Controls
The purpose of file security controls is to protect computer files from
accidental abuse
intentional abuse
![Page 18: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/18.jpg)
Chapter 9-18
File Security Controls
Some examples of file security controls areexternal file labels
internal file labels
lockout procedures
file protection rings
read-only file designation
![Page 19: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/19.jpg)
Chapter 9-19
Fault-Tolerant Systems
Fault-tolerant systemsare designed to tolerate computer errorsand keep functioning
are often based on the concept of redundancy
are created by instituting duplicate communication paths and communications processors
![Page 20: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/20.jpg)
Chapter 9-20
Redundancy in CPU processing can be achieved with consensus-based protocols
with a second watchdog processor
Disks can be made fault-tolerant by a process called disk mirroring
by rollback processing
Fault-Tolerant Systems
![Page 21: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/21.jpg)
Chapter 9-21
Backup
Backupis essential for vital documents
is batch processed using Grandfather-parent-child procedure
can be electronically transmittedto remote sites (vaulting)
needs an uninterruptible power system (UPS) as an auxiliary power supply
![Page 22: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/22.jpg)
Chapter 9-22
Backup
similar to the redundancy concept infault-tolerant systems a hot backup is performed while the database
is online and available for read/write a cold backup is performed while the database is
offline and unavailable to its users
![Page 23: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/23.jpg)
Chapter 9-23
Contingency Planning
Contingency planning includes the development of a formal disasterrecovery plan. describes procedures to be followed in an emergency describes the role of each member of the team.appoint one person to be in command and another to be second-in-commandinvolves a recovery site that can either bea hot site or cold site
![Page 24: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/24.jpg)
Chapter 9-24
Computer Facility Controls
Locate the Data Processing Center in asafe place where the public does not have access it is guarded by personnel there are limited number ofsecured entrances
there is protection againstnatural disasters
![Page 25: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/25.jpg)
Chapter 9-25
Computer Facility Controls
Limit employee access byincorporating magnetic, electronic,or optical coded identification badges
Buy insurance
![Page 26: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/26.jpg)
Chapter 9-26
Access to Computer Files
Logical access to data is restricted
Password codes identifications (encourage strong passwords)
biometric identifications with voice patterns, fingerprints, and retina prints
![Page 27: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/27.jpg)
Chapter 9-27
INFORMATION TECHNOLOGYGENERAL CONTROLS
The objectives of controls is to provide assurance that
the development of and changes to computer programs are authorized, tested, and approved before their usage
access to data files is restrictedprocessed accounting data are accurate and
complete
![Page 28: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/28.jpg)
Chapter 9-28
Control Concerns
Errors may be magnified
Inadequate separation of duties
Audit trails
Greater access to data
Characteristics of magnetic or optical media
![Page 29: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/29.jpg)
Chapter 9-29
INFORMATION TECHNOLOGYGENERAL CONTROLS
IT general controls involveSecurity for Wireless Technology
Controls for Hardwired Network Systems
Security and Controls for Microcomputers
IT Control Objectives for Sarbanes-Oxley
![Page 30: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/30.jpg)
Chapter 9-30
Security for Wireless Technology
Security for wireless technology involves A virtual private network (VPN) Data encryption
![Page 31: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/31.jpg)
Chapter 9-31
Controls for HardwiredNetwork Systems
The routine use of systems such as DDPand client/server computing increases
control problems for companies, which include
electronic eavesdropping hardware or software malfunctions causing
computer network system failures errors in data transmission
![Page 32: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/32.jpg)
Chapter 9-32
Controls for HardwiredNetwork Systems
To reduce the risk of system failures, networks are designed
to handle periods of peak transmission volume
to use redundant components,such as modems,
to recover from failure using checkpoint control procedure
to use routing verification procedures
to use message acknowledgment procedures
![Page 33: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/33.jpg)
Chapter 9-33
Security and Controls for Microcomputers
General and application control procedures are important to microcomputers.
Most risks associated with AISs result from errors, irregularities or fraud general threats to security (such as a computer
virus)
Some of the risks that are unique to the microcomputer are Hardware - microcomputers can be easily stolen
or destroyed Data and software - easy to access, modify, copy or
destroy; therefore are difficult to control
![Page 34: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/34.jpg)
Chapter 9-34
Control Procedures for Microcomputers
Some cost effective control procedures aretake inventory
install Keyboard locks
lock laptops in cabinets
follow software protectionprocedures
create back-up files and
lock office doors
![Page 35: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/35.jpg)
Chapter 9-35
Additional Controls for Laptops
Some specific controls for the laptop areidentify your laptop
use nonbreakable cables to attachlaptops to stationary furniture
load antivirus software
keep laptop informationbacked up
![Page 36: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/36.jpg)
Chapter 9-36
IT Control Objectives for Sarbanes-Oxley
The Sarbanes-Oxley Act of 2002 (SOX) profoundly impacts
public companies
managers
the internal auditors
the external auditors
![Page 37: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/37.jpg)
Chapter 9-37
IT Control Objectives for Sarbanes-Oxley
The IT Governance Institute (ITGI) issued ‘IT Control Objectives for Sarbanes-Oxley’ in April 2004, which
helps organizations comply with SOX requirements and
the PCAOB requirements
includes detailed guidance for organizations by starting with the IT controls from CobiT and
linking those to the IT general control categories in the PCAOB standard,
and then linking to the COSO framework
![Page 38: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/38.jpg)
Chapter 9-38
Application Controls for Transaction Processing
Application controls are designed to
prevent, detect, and correct errors and irregularities
in transactions in the input processing the output stages of data processing
![Page 39: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/39.jpg)
Chapter 9-39
Application Controlsfor Transaction
Processing
![Page 40: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/40.jpg)
Chapter 9-40
Input Controls
Input controls attempt to ensure the validity
accuracy
completeness of the data entered into an AIS
The categories of input controls include observation, recording, and transcription of data
edit tests
additional input controls
![Page 41: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/41.jpg)
Chapter 9-41
Observation, Recording,and Transcription of Data
The observation control procedures to assist in collecting data are
feedback mechanism
dual observation
point-of-sale (POS) devices
preprinted recording forms
![Page 42: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/42.jpg)
Chapter 9-42
Data Transcription
Data transcription the preparation of data for computerized
processing
Preformatted screens Make the electronic version
look like the printed version
![Page 43: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/43.jpg)
Chapter 9-43
Edit Tests
Input validation routines (edit programs) check the validity check the accuracy
after the data have been entered, and recorded on a machine-readable file of input
data
![Page 44: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/44.jpg)
Chapter 9-44
Edit Tests
Edit tests examine selected fields of input data and reject those transactions whose data fields do not
meet the pre-established standards of data quality
Real-time systems use edit checks duringdata-entry.
![Page 45: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/45.jpg)
Chapter 9-45
Examples of Edit Tests
The following are the tests for copy editingNumeric fieldAlphabetic fieldAlphanumeric fieldValid codeReasonablenessSignCompletenessSequenceConsistency
![Page 46: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/46.jpg)
Chapter 9-46
Processing Controls
Processing controls focus on the manipulation of accounting data after they are input to the computer system.
Key objective is a clear audit trail
Processing controls are of two kinds: Data-access controls
Data manipulation controls
![Page 47: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/47.jpg)
Chapter 9-47
Data-Access Control Totals
Some common processing control procedures are
batch control total
financial control total
nonfinancial control total
hash total
record count
![Page 48: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/48.jpg)
Chapter 9-48
Data Manipulation Controls
Once data has been validated by earlier portions of data processing, they usually must be manipulated in some way to produce useful output.
Data manipulation controls include:Software documentation,
i.e. flow charts and diagrams
Compiler
Test Data
![Page 49: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/49.jpg)
Chapter 9-49
Output Controls
The objectives of output controlsis to ensure
validity
accuracy
completeness
Two major types of output application controls are
validating processing results by Activity (or proof) listings
![Page 50: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/50.jpg)
Chapter 9-50
Output Controls
regulating the distribution anduse of printed output through Forms Prenumbered forms authorized distribution list Shredding sensitive documents
![Page 51: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/51.jpg)
Chapter 9-51
Copyright
Copyright 2008 John Wiley & Sons, Inc. All rights reserved.
Reproduction or translation of this work beyond that permitted in
Section 117 of the 1976 United States Copyright Act without the
express written permission of the copyright owner is unlawful.
Request for further information should be addressed to the
Permissions Department, John Wiley & Sons, Inc. The purchasermay make backup copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.
![Page 52: Chapter 9-1. Chapter 9-2 Chapter 9 Computer Controls for Accounting Information Systems Introduction General Controls For Organizations Integrated Security.](https://reader038.fdocuments.us/reader038/viewer/2022103005/56649d785503460f94a5a858/html5/thumbnails/52.jpg)
Chapter 9-52
Chapter 9