ATG 383, EDI Internal Control Check List
Last modified on
The following contains a list of some of the
internal controls that are appropriate
for an EDI operation. The absence of these controls, or appropriate
compensating controls, may indicate threats that will prevent
the effective and efficient operation of EDI activities. This
checklist is adapted from material published by the
AICPA
and
AuditNet.
- General Controls
- EDI transmissions occur at scheduled times.
- EDI file retention requirements have been established.
- EDI back-up, recovery, and contingency plans exist.
These plans undergo periodic testing.
- Physical controls are in place to restrict access to
data centers that process EDI transactions.
- Access control software retricts access to EDI software
and data. This software includes ID and password rules,
and violation monitoring and reporting.
- EDI transactions are encrypted.
- EDI document format standards are used and kept up-to-date.
- Procudures exist to define and maintain
trading partner relationships.
- Written agreements exist with the VAN describing all services
to be provided.
- All changes to the EDI system are documented and tested
prior to implementation.
- Input Controls
- An interface has been established to translate
transactions from the application system to
the EDI system.
- Input data are edited for EDI standards, verification
to trading partners files, etc.
- Sequence numbers and batch totals are assigned
to EDI transactions.
- Rejected inputs are sent to a suspense file.
- Processing Controls
- Transmission protocols use redundancy and parity checks.
- Output Controls
- Edit checks are applied to EDI transactions
before they are routed to
the appropriate application.
- An interface has been established to translate transactions
received from the EDI system to the application
system.
- Balancing and control procedures ensure that all
transaction sets received from trading partners
are completely input to an application system.
Return to the Technology Impact Page.