Example: dental hygienist

Control Descriptions - Internal Control Institute

ICI Encyclopedia Of Internal Controls Control Descriptions ICI Technical Library How to use the Controls: Overview: This resource document was devised at the Internal Control Institute to provide a single reference source of Internal Control activities and processes that an organization may consider. These processes are particularly useful when increasing Control over certain activities is warranted. Obviously, most organizations need not employ all of these techniques. But this encyclopedia is invaluable when auditing activities recognize shortfalls in certain areas and additional controls are needed.

Table of Contents Control Descriptions Generic Category Name of Control Reference Access Authorization Hierarchy 1.0.A.P Authorization Lists 1.9.B.P

Tags:

  Control

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Control Descriptions - Internal Control Institute

1 ICI Encyclopedia Of Internal Controls Control Descriptions ICI Technical Library How to use the Controls: Overview: This resource document was devised at the Internal Control Institute to provide a single reference source of Internal Control activities and processes that an organization may consider. These processes are particularly useful when increasing Control over certain activities is warranted. Obviously, most organizations need not employ all of these techniques. But this encyclopedia is invaluable when auditing activities recognize shortfalls in certain areas and additional controls are needed.

2 Organization: The Descriptions are categorized and listed in various fashions to facilitate and simplify identification. The reference numbering system has been specifically devised to further identify the type of specific Control . The identification listing follows: Reference Number (example) 9. 2. D. C. 9=Accounting 2=Entry D=Minimal C=Corrective Generic Usage Strength Control Category Activity of Control Type 1. Access 1. Origination A.

3 Very Strong P. Preventive 2. Authorization 2. Entry B. Strong D. Detective 3. Containment 3. Communications C. Average C. Corrective 4 Limit 4. Process D. Minimal 5. Procedures 5. Storage (on-line) 6. Segregate 6. Storage (off-line) 7. Standards 7. Output 8. Void 8. Use of Data 9. Accounting 9. General Purpose 10 .Confirm 0. Authorization 11. Compliance 12. Identify 13. Simulate 14. Observe 15. Redundancy 16. Feedback 17. Sample 18 .Tag 19.

4 Verify 20. Scan 21. Copy 22. Defaults 23. Prompt 24. Retrain Table of Contents Control Descriptions Generic Category Name of Control Reference Access Authorization Hierarchy Authorization Lists Data Encryption Distributed Systems Security Control Group Security

5 Classification Identification Badges Output Security Classification Print on Demand Privacy Classification Security Classification Terminal Sign On Accounting Accountable Document Reconciliation Accounting Period Cutoff Aging Open Items Anticipation Control Totals Application System Totals Automated Control File Batch Header

6 Listing Computer-Generated Transaction Accounting Totals Computer Media Usage Indicator Control Total Adjustments Controlled Data Entry Document Log Controlled Data Origination Document Log Cutoff Date Review Delayed Processing Distributed Systems

7 Cost/Benefit Analysis File Control Totals. File Update Simple Accounting Proof Independent Control Totals Input/Output Transaction Reconciliation Job Accounting Generic Category Name of Control Reference Accounting (Continued)

8 Manual Footing and cross footing Multilevel Charging Physical Inventory of Accountable Documents Physical Inventory of Computer Media Printer Form Replenishment Control Remote Terminal to Control Facility Reconciliation Risk

9 Quantification Sequence Checking Sequence Number Control List Sequential Page Numbering Simple Accounting Proof Step-by-Step Totals System-to-System Totals Transaction Accounting User Chargeback

10 Authorization Automatic Callback Automatic Security Violation Shutdown Distributed Systems Planning Committee Lead Node Function Lead Node Master Commands Magnetically Encoded Cards Master Command Control


Related search queries