2. Data subject to theft, loss, and manipulation in the
same ways all electronic data are
Coding process is subject to the risk that humans will
make errors in coding.
Consider risks of hardware and software failure in an
XBRL environment.
3.
4. RISKS POTENTIAL CONTROL ACTIVITIES
Compromised Data Daily data backups, firewalls, mandatory
password changes, “strong” password
requirements
Tagging Errors Electronic tagging, independent review after
tagging, periodic user training
Hardware and Software failure Disaster recovery plans, physical security, backup
power supplies
Inappropriate/ missing authorizations Internal audit review of selected transactions,
periodic user training, up-t—date procedures
manuals
Selection of an inappropriate taxonomy Periodic review and approval of taxonomies used,
centralized approval process for taxonomy
extensions