Kd reference whether 6

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: r VoiceMail, are verified by callback or other means of authentication 119 120 121 • A prearranged method is used for independent verification of the authenticity of source and contents of transaction requests received via fax or image system • Electronic signature or certification is used to verify the integrity and authenticity of incoming electronic documents KD Reference: _______________________________ ___________________________________________ Manage facilities Whether facility location is not obvious externally, is in least accessible area or organisation and access is limited to least number of people? KD Reference: _______________________________ ___________________________________________ Whether logical and physical access procedures are sufficient, including security access profiles for employees, vendors, equipment and facility maintenance staff? KD Reference: _______________________________ ___________________________________________ Whether "Key" and "including ongoing card reader" management procedures and practices are adequate, update and review on a least-access-needed basis? IT Audit Manual Volume III 53 IT Audit Manual No. 122 123 124 125 126 127 128 129 130 131 Item Yes Response No KD KD Reference: _______________________________ _ Whether access and authorisation policies on entering/leaving, escort, registration, temporary required passes, surveillance cameras as appropriate to all and especially sensitive areas are adequate? KD Reference: _______________________________ ___________________________________________ Whether periodic and ongoing review of access profiles, including managerial review is occurring? KD Reference: _______________________________ ___________________________________________ Whether revocation, response and escalation process occurs in event of security breach? KD Reference: _______________________________ ___________________________________________ Whether security and access control measures include portable and/or off-site used information devices? KD Reference: _______________________________ ___________________________________________...
View Full Document

This note was uploaded on 10/27/2013 for the course LAW 10-100 taught by Professor Parsons during the One '10 term at Bond College.

Ask a homework question - tutors are online