SlideShare a Scribd company logo
2
Most read
4
Most read
• Safeguard assets
• Ensure reliable FS
• Encourage adherence to mgt. directives
• Promote operating efficiency
Data subject to theft, loss, and manipulation in the
same ways all electronic data are
Coding process is subject to the risk that humans will
make errors in coding.
Consider risks of hardware and software failure in an
XBRL environment.
AIS INTERNAL CONTROL
RISKS POTENTIAL CONTROL ACTIVITIES
Compromised Data Daily data backups, firewalls, mandatory
password changes, “strong” password
requirements
Tagging Errors Electronic tagging, independent review after
tagging, periodic user training
Hardware and Software failure Disaster recovery plans, physical security, backup
power supplies
Inappropriate/ missing authorizations Internal audit review of selected transactions,
periodic user training, up-t—date procedures
manuals
Selection of an inappropriate taxonomy Periodic review and approval of taxonomies used,
centralized approval process for taxonomy
extensions

More Related Content

PPTX
Deputy it operations manager chris down -interview presentation - final
PPTX
Access control
PPTX
Mobile device management v5
PPT
DOCX
Risk Assessment
PDF
Goans-Helms-IT Security at Georgia Tech Library
PDF
Consumerization of IT: Mobile Infrastructure, Support and Security
PDF
Information systems security(1)
Deputy it operations manager chris down -interview presentation - final
Access control
Mobile device management v5
Risk Assessment
Goans-Helms-IT Security at Georgia Tech Library
Consumerization of IT: Mobile Infrastructure, Support and Security
Information systems security(1)

Similar to AIS INTERNAL CONTROL (20)

PDF
Pci Req
PPTX
Computer security concepts
PDF
Security Awareness Training
PPTX
How Medical Devices Risk Patient Safety and Security
PPTX
Security and control in mis
PPTX
Data Security Management - Data Analytics
PDF
Arbel Zinger | Microsoft Advanced Threat Analytics
PPTX
Application Security: What do we need to know?
PPTX
Secure Software Development Best Practices
PPTX
Managing IT Risk and Assessing Vulnerability
PPT
Securing your esi_piedmont
PPTX
CIS Critical Security Controls Foundations of Cybersecurity.pptx
PPTX
Chapter 5 Identity Access Management.pptx
DOCX
Question 1Discuss why those in the human resource development po.docx
PPTX
Vulenerability Management.pptx
PPT
Network Security, Change Control, Outsourcing
PDF
PPTX
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
PPT
Network security, change control, outsourcing
PPT
Threats of Database in ECommerce
Pci Req
Computer security concepts
Security Awareness Training
How Medical Devices Risk Patient Safety and Security
Security and control in mis
Data Security Management - Data Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
Application Security: What do we need to know?
Secure Software Development Best Practices
Managing IT Risk and Assessing Vulnerability
Securing your esi_piedmont
CIS Critical Security Controls Foundations of Cybersecurity.pptx
Chapter 5 Identity Access Management.pptx
Question 1Discuss why those in the human resource development po.docx
Vulenerability Management.pptx
Network Security, Change Control, Outsourcing
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
Network security, change control, outsourcing
Threats of Database in ECommerce
Ad

More from Charliez Jane Soriano (20)

PPTX
Romanesque and Gothic Architecture (Analysis, Info etc.)
PPTX
Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)
PPTX
SCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESA
PPTX
POST MODERN ARCHITECTURE
PPTX
STARRY NIGHT, VINCENT SONG AND SPOLARLIUM
PPTX
modern architecture
PPTX
renaissance art (david by donatello, david and c reation of adam by michelang...
PPTX
Baroque and rococo architecture
PPTX
Aphrodite of melos
PPTX
Chauvet cave
PPTX
PPTX
market segmentation
PPTX
Statistics report THE RANGE
PPTX
Sample paragraphs and essay (methods of paragraph
PPTX
PPTX
Aralin 21: Pang-unawa sa Implasyon
PPTX
Baron coburg ppt Case Study and all
PPTX
Girl scout songs
PPTX
German education system (2)
Romanesque and Gothic Architecture (Analysis, Info etc.)
Pantheon (WITH LITTLE DETAILS BUT IT'LL ALWAYS HELP)
SCHOOL OF ATHENS, LAST SUPPER, ECSTACY OF ST. TERESA
POST MODERN ARCHITECTURE
STARRY NIGHT, VINCENT SONG AND SPOLARLIUM
modern architecture
renaissance art (david by donatello, david and c reation of adam by michelang...
Baroque and rococo architecture
Aphrodite of melos
Chauvet cave
market segmentation
Statistics report THE RANGE
Sample paragraphs and essay (methods of paragraph
Aralin 21: Pang-unawa sa Implasyon
Baron coburg ppt Case Study and all
Girl scout songs
German education system (2)
Ad

Recently uploaded (20)

PPT
Ethics in Information System - Management Information System
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
Containerization lab dddddddddddddddmanual.pdf
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
TITLE DEFENSE entitle the impact of social media on education
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Course Overview and Agenda cloud security
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Cyber Hygine IN organizations in MSME or
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Understand the Gitlab_presentation_task.pdf
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
Ethics in Information System - Management Information System
simpleintnettestmetiaerl for the simple testint
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
AI_Cyberattack_Solutions AI AI AI AI .pptx
Introduction to cybersecurity and digital nettiquette
Containerization lab dddddddddddddddmanual.pdf
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
TITLE DEFENSE entitle the impact of social media on education
Mathew Digital SEO Checklist Guidlines 2025
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Course Overview and Agenda cloud security
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Cyber Hygine IN organizations in MSME or
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Exploring The Internet Of Things(IOT).ppt
Exploring VPS Hosting Trends for SMBs in 2025
Understand the Gitlab_presentation_task.pdf
Uptota Investor Deck - Where Africa Meets Blockchain

AIS INTERNAL CONTROL

  • 1. • Safeguard assets • Ensure reliable FS • Encourage adherence to mgt. directives • Promote operating efficiency
  • 2. Data subject to theft, loss, and manipulation in the same ways all electronic data are Coding process is subject to the risk that humans will make errors in coding. Consider risks of hardware and software failure in an XBRL environment.
  • 4. RISKS POTENTIAL CONTROL ACTIVITIES Compromised Data Daily data backups, firewalls, mandatory password changes, “strong” password requirements Tagging Errors Electronic tagging, independent review after tagging, periodic user training Hardware and Software failure Disaster recovery plans, physical security, backup power supplies Inappropriate/ missing authorizations Internal audit review of selected transactions, periodic user training, up-t—date procedures manuals Selection of an inappropriate taxonomy Periodic review and approval of taxonomies used, centralized approval process for taxonomy extensions