SlideShare a Scribd company logo
1 of 4
• Safeguard assets
• Ensure reliable FS
• Encourage adherence to mgt. directives
• Promote operating efficiency
Data subject to theft, loss, and manipulation in the
same ways all electronic data are
Coding process is subject to the risk that humans will
make errors in coding.
Consider risks of hardware and software failure in an
XBRL environment.
RISKS POTENTIAL CONTROL ACTIVITIES
Compromised Data Daily data backups, firewalls, mandatory
password changes, “strong” password
requirements
Tagging Errors Electronic tagging, independent review after
tagging, periodic user training
Hardware and Software failure Disaster recovery plans, physical security, backup
power supplies
Inappropriate/ missing authorizations Internal audit review of selected transactions,
periodic user training, up-t—date procedures
manuals
Selection of an inappropriate taxonomy Periodic review and approval of taxonomies used,
centralized approval process for taxonomy
extensions

More Related Content

Similar to AIS INTERNAL CONTROL

Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsMicrosoft Österreich
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityAIS Network
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
Question 1Discuss why those in the human resource development po.docx
Question 1Discuss why those in the human resource development po.docxQuestion 1Discuss why those in the human resource development po.docx
Question 1Discuss why those in the human resource development po.docxmakdul
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsMohammad Abdul Matin Emon
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerceMentalist Akram
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in DatabaseMentalist Akram
 
ResearchProjectPPT
ResearchProjectPPTResearchProjectPPT
ResearchProjectPPTdannyboi17
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringTieu Luu
 

Similar to AIS INTERNAL CONTROL (20)

Pci Req
Pci ReqPci Req
Pci Req
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
Question 1Discuss why those in the human resource development po.docx
Question 1Discuss why those in the human resource development po.docxQuestion 1Discuss why those in the human resource development po.docx
Question 1Discuss why those in the human resource development po.docx
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Unit v
Unit vUnit v
Unit v
 
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and StandardsICAB - ITA Chapter 5 class 7-8 - Controls and Standards
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerce
 
Threats of E-Commerce in Database
Threats of E-Commerce in DatabaseThreats of E-Commerce in Database
Threats of E-Commerce in Database
 
ResearchProjectPPT
ResearchProjectPPTResearchProjectPPT
ResearchProjectPPT
 
SuprTEK Continuous Monitoring
SuprTEK Continuous MonitoringSuprTEK Continuous Monitoring
SuprTEK Continuous Monitoring
 
Intro.ppt
Intro.pptIntro.ppt
Intro.ppt
 

More from Charliez Jane Soriano

Romanesque and Gothic Architecture (Analysis, Info etc.)
Romanesque and Gothic Architecture (Analysis, Info etc.)Romanesque and Gothic Architecture (Analysis, Info etc.)
Romanesque and Gothic Architecture (Analysis, Info etc.)Charliez Jane Soriano
 
Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)
Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)
Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)Charliez Jane Soriano
 
SCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESA
SCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESASCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESA
SCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESACharliez Jane Soriano
 
STARRY NIGHT, VINCENT SONG AND SPOLARLIUM
STARRY NIGHT, VINCENT SONG AND SPOLARLIUMSTARRY NIGHT, VINCENT SONG AND SPOLARLIUM
STARRY NIGHT, VINCENT SONG AND SPOLARLIUMCharliez Jane Soriano
 
renaissance art (david by donatello, david and c reation of adam by michelang...
renaissance art (david by donatello, david and c reation of adam by michelang...renaissance art (david by donatello, david and c reation of adam by michelang...
renaissance art (david by donatello, david and c reation of adam by michelang...Charliez Jane Soriano
 
Sample paragraphs and essay (methods of paragraph
Sample paragraphs and essay (methods of paragraphSample paragraphs and essay (methods of paragraph
Sample paragraphs and essay (methods of paragraphCharliez Jane Soriano
 

More from Charliez Jane Soriano (20)

Romanesque and Gothic Architecture (Analysis, Info etc.)
Romanesque and Gothic Architecture (Analysis, Info etc.)Romanesque and Gothic Architecture (Analysis, Info etc.)
Romanesque and Gothic Architecture (Analysis, Info etc.)
 
Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)
Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)
Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)
 
SCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESA
SCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESASCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESA
SCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESA
 
POST MODERN ARCHITECTURE
POST MODERN ARCHITECTUREPOST MODERN ARCHITECTURE
POST MODERN ARCHITECTURE
 
STARRY NIGHT, VINCENT SONG AND SPOLARLIUM
STARRY NIGHT, VINCENT SONG AND SPOLARLIUMSTARRY NIGHT, VINCENT SONG AND SPOLARLIUM
STARRY NIGHT, VINCENT SONG AND SPOLARLIUM
 
modern architecture
modern architecturemodern architecture
modern architecture
 
renaissance art (david by donatello, david and c reation of adam by michelang...
renaissance art (david by donatello, david and c reation of adam by michelang...renaissance art (david by donatello, david and c reation of adam by michelang...
renaissance art (david by donatello, david and c reation of adam by michelang...
 
Baroque and rococo architecture
Baroque and rococo architectureBaroque and rococo architecture
Baroque and rococo architecture
 
Aphrodite of melos
Aphrodite of melosAphrodite of melos
Aphrodite of melos
 
Chauvet cave
Chauvet caveChauvet cave
Chauvet cave
 
Discobolus
DiscobolusDiscobolus
Discobolus
 
market segmentation
market segmentationmarket segmentation
market segmentation
 
Statistics report THE RANGE
Statistics report THE RANGEStatistics report THE RANGE
Statistics report THE RANGE
 
Sample paragraphs and essay (methods of paragraph
Sample paragraphs and essay (methods of paragraphSample paragraphs and essay (methods of paragraph
Sample paragraphs and essay (methods of paragraph
 
SCRABBLE
SCRABBLESCRABBLE
SCRABBLE
 
Aralin 21: Pang-unawa sa Implasyon
Aralin 21: Pang-unawa sa ImplasyonAralin 21: Pang-unawa sa Implasyon
Aralin 21: Pang-unawa sa Implasyon
 
Baron coburg ppt Case Study and all
Baron coburg ppt Case Study and allBaron coburg ppt Case Study and all
Baron coburg ppt Case Study and all
 
TLE
TLETLE
TLE
 
Girl scout songs
Girl scout songsGirl scout songs
Girl scout songs
 
German education system (2)
German education system (2)German education system (2)
German education system (2)
 

Recently uploaded

一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理SS
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书c6eb683559b3
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理AS
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理AS
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27APNIC
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...mikehavy0
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样AS
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书F
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxthinamazinyo
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样AS
 
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Dewi Agency
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Dewi Agency
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样AS
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证hfkmxufye
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样AS
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 

Recently uploaded (20)

一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
Abortion Clinic in Germiston +27791653574 WhatsApp Abortion Clinic Services i...
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
一比一原版(Polytechnic毕业证书)新加坡理工学院毕业证原件一模一样
 
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303Lowongan Kerja LC Yogyakarta Terbaru 085746015303
Lowongan Kerja LC Yogyakarta Terbaru 085746015303
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
一比一原版(毕业证书)新西兰怀特克利夫艺术设计学院毕业证原件一模一样
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 

AIS INTERNAL CONTROL

  • 1. • Safeguard assets • Ensure reliable FS • Encourage adherence to mgt. directives • Promote operating efficiency
  • 2. Data subject to theft, loss, and manipulation in the same ways all electronic data are Coding process is subject to the risk that humans will make errors in coding. Consider risks of hardware and software failure in an XBRL environment.
  • 3.
  • 4. RISKS POTENTIAL CONTROL ACTIVITIES Compromised Data Daily data backups, firewalls, mandatory password changes, “strong” password requirements Tagging Errors Electronic tagging, independent review after tagging, periodic user training Hardware and Software failure Disaster recovery plans, physical security, backup power supplies Inappropriate/ missing authorizations Internal audit review of selected transactions, periodic user training, up-t—date procedures manuals Selection of an inappropriate taxonomy Periodic review and approval of taxonomies used, centralized approval process for taxonomy extensions