“Preventing the unauthorized disclosure and loss of data has become almost impossible. Employees and others can use iPods, flash drives, cameras, and PDAs, such as Blackberries and Treos, to download data and remove it from an organization’s premises.” Do you agree? Describe some controls from this chapter that might be applied to reduce the risk of data disclosure and loss for these devices.
Answer to relevant QuestionsYour boss was heard to say, “If we implemented every control plan discussed in this chapter, we’d never get any work done around here.” Do you agree? Discuss fully.Assume that accounts payable are processed on a computer and that the options in the accounts payable system module are as follows: 1. Maintain vendor master data (i. e., add, change, or delete vendors in the vendor master ...The AICPA has adopted a framework called Trust Services Principles and Criteria. a. Look up this framework on the Internet and explain each of the principles. b. What types of assurance services are already based on the ...In evaluating business process controls and application controls, some auditors differentiate between the point in the system at which the control is “established” and the later point at which that control is ...Figure lists 10 control plans from this chapter and three control goals for the information process. Fill in the table cells, as appropriate, to indicate which control plans can accomplish which control goals. Number your ...
Post your question