Department of Corrections and Rehabilitation - Operations Manual

Chapter 4 – Information Technology

Article 45 – Information Security

View All Sections >

49020.11.1.1 Input Data Validation

  • Checks shall be applied to the input of transactions. The following guidelines should be considered:

    • Dual input or other input checks, such as boundary checking or limiting fields to specific ranges of input data;

    • Periodic review of the content of key fields or data files to confirm their validity and integrity;

    • Inspecting hard-copy input documents for any unauthorized changes (all changes to input documents should be authorized);

    • Procedures for responding to validation errors;

    • Procedures for testing the plausibility of the input data;

    • Defining the responsibilities of all personnel involved in the data input process;

    • Creating a log of the activities involved in the data input process.