|
|
Application System Internal Control Questionnaire
- Are there written instructions or online help available for processing all transactions for this application?
- When transactions are initiated through program logic, are listings or reports sent to the user department?
- Are the procedures for controlling input the same when applied to correcting entries?
- Are there controls or procedures which effectively prevent persons outside the company from accessing, via terminals, the files of this application?
- Are the installation's standard sign-on and sign-off procedures used on this application?
- Does the system record which users processed transactions that altered the contents of the file?
- In the event that unauthorized access is attempted, what procedures prevent additional attempts?
- Is a computer generated log entry created for:
- Each message?
- Each sign-on?
- Each sign-off?
- All transactions?
- Other:
- Are the computer generated logs reviewed and summarized for:
- Unusual activity?
- Error rates by user?
- Are record counts and control totals generated through the online input process and used to validate the completeness of data entry?
- Does management take strong corrective action when security violations are noted?
- Is ACF2 password protection used?
- Are all security violations logged?
- Is adequate documentation maintained on security procedures?
- Can each transaction be associated with a USERID number?
- Is a non-printing feature used when the operator keys in a password?
- Does each user of the application have a unique LOGONID?
- Are users instructed on how to keep their passwords secure?
- Are passwords changed at least every 90 days?
PROCESSING CONTROLS
- Are on-line data validation and editing performed as early as possible in the transaction processing cycle to ensure that errors are detected and corrected quickly?
- Are use of overriding or bypassing data validation and editing routines restricted to designated personnel?
- Are all uses of the override/bypass feature logged and analyzed for appropriateness and correctness?
- Does the application include edit routines to check each transaction for:
- Completeness?
- Consistency within the transaction?
- Transaction validity?
- Proper processing period?
- Proper cross-footing?
- Does the application include edit routines to check each applicable field in the transaction types for:
- Missing date?
- Limit checks?
- Range checks?
- Check digit validity?
- Valid Codes?
- Proper sequence?
- Proper format?
- Does the application include edit routines to check each character in a transaction, where applicable, for:
- Numerics?
- Alphabetic?
- Special characters?
- Sign?
- Blanks?
- Are there written instructions or online help available for correcting all errors detected?
- Are resubmitted transactions processed identically to those submitted for a first time?
- For on-line real-time processing, are all transactions automatically logged, stamped and dated to provide a complete audit trail?
- Can messages and data be traced back to the terminal and user or origin?
- For applications that update files, does the system protect against concurrent file updates?
- Are all changes to the application thoroughly tested and approved by the user before being placed into production?
- Have users received sufficient training on use of the application?
- Can users correct errors before they are transmitted?
- Have adequate user manuals been prepared and distributed to the users?
- Are operators in IT prohibited from:
- Initiating any transactions?
- Processing an unusual program without an approved written request?
- Duplicating a file without an approved written request?
- When processing transactions against a master file:
- Does the program prevent duplicate master records from being established?
- Are listings printed for all master changes showing:
- The master record before change?
- The master records after change?
- The nature of the change?
- Does the program check for illogical results prior to changing the master record?
- Are all transactions not processed:
- Reported with reason?
- Placed in a suspense file?
- Are master files periodically reviewed by a program which reads the entire file and:
- Counts all records?
- Totals all fields used to control the file?
- Crossfoots records where applicable?
- Are master files periodically purged of obsolete records?
- Does the application include routines to check the results of calculations for reasonableness?
- Is the application processed according to a predefined schedule?
- Are IT's standard library procedures followed for this application?
- Are programmers prohibited from using live data files from this application for testing?
OUTPUT
- Is all output from computer operations reviewed for reasonableness, accuracy, and legibility before distribution?
- Are totals on output reconciled to predetermined totals?
- Does Data Control have written procedures which include:
- Frequency or due dates?
- Number of copies to be sent?
- Persons authorized to receive output?
- Does the control group maintain a control schedule?
- Is all output sent directly to the user groups from the control group?
|