1. Access to computer resources should be controlled to protect them against unauthorized use, damage, loss, or modifications. Proper access controls will assist in the prevention or detection of deliberate or accidental errors caused by improper use or manipulation of data files, unauthorized or incorrect use of computer programs, and/or improper use of computer resources. 2. Suggested interviewees for ICQ: a. Documentation Librarian b. System Programming Manager c. Applications Programming Manager d. Director of Information Systems e. Data Base Administrator
All materials contained on this site are protected by United States copyright law and may not be reproduced, distributed, transmitted, displayed, published, broadcast, performed nor used to prepare derivative works, without the prior written permission of AuditNet®. You may not alter or remove any trademark, copyright, logo or other notice from copies of the content. For further information, see section 1 of the Terms and Conditions and section 2 of the Subscriber Access Agreement.