Article 45 – Information Security
49020.11.1.1 Input Data Validation
-
Checks shall be applied to the input of transactions. The following guidelines should be considered:
-
Dual input or other input checks, such as boundary checking or limiting fields to specific ranges of input data;
-
Periodic review of the content of key fields or data files to confirm their validity and integrity;
-
Inspecting hard-copy input documents for any unauthorized changes (all changes to input documents should be authorized);
-
Procedures for responding to validation errors;
-
Procedures for testing the plausibility of the input data;
-
Defining the responsibilities of all personnel involved in the data input process;
-
Creating a log of the activities involved in the data input process.
-