#6 Security

Paramount in the implementation is safeguarding the assets of the organization. This means allowing only authorized employees to have access to parts of the application, the data, or the business processes in which they are responsible.  Users should have their own log-in and password with expiration dates and account lockouts.  In a hosted environment, the system should provide added security for those who work from home.  The system should log itself out after a certain amount of time.  The policies and procedures should be well documented (in accordance with Sarbanes Oxley).   The policies and procedures documentation should reside with the company in a secure location.  Last, the project manager should own all documentation regarding the implementation and change control.


About Cameron Ackbury, CPA

Founding Director at DaggerFoil Group
This entry was posted in Best Practices. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s