Using Dual Input Controls

Establishing and using a means of verifying and / or validating data by inputting it a second time to a system, and having the results compared to ensure consistency. Such features are often found where the validation of a financial entry is critical, e.g. a payment system.

To view the related Policy click      

  • Fraudulent data, input to your system, can result in loss for the organisation.

  • The original data entry and the re-key must be undertaken by two different operators, each with a separate logon and ID.
  • The re-key must use original source documents and not the system printout provided by the first data entry operator.
  • The re-key should not display the data that was keyed originally.
  • Any discrepancies should be routed (by the system) to a supervisor or manager for resolution.
Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page