Input Controls

Page 1 of 4

Input Controls

By | November 2012
Page 1 of 4
| | |Input Controls | | | | |

Many company’s do their best to protect data entry of the company, clients, consumers, and employees. The user interfaces consist of process-control which allows screen command from user in the system. Input controls will ensure that the data entered is safe, secure, complete and accurate. “Data can be entered into a computer application from either manual online input or by scheduled automated processing. The input control reviewer should determine the adequacy of both manual and automated controls over data input to ensure that data is input accurately with optimum use of computerized validation and editing and that error handling procedures facilitate the timely and accurate resubmission of all corrected data” ( Application Self Evaluation., September 25, 2012).

The four types of input controls are audit trails, encryption, password security, and data security. An audit trail takes the source of the data from the each system, and record it once entered. In most businesses they have an audit group that records everything within the system. It can also reconstruct events after problems have occurred, monitor the system or problem, and prevent unauthorized access. “A company might also use an audit trail to provide a basis for account reconciliation, to provide a historical report to plan and support budgets, and to provide a record of sales in case of a tax audit” (Rouse, M., n.d.). Audit trails is broken into many parts such as individual accountability, reconstruction of events, problem monitoring...