Previous Topic: Verification of Systems and Data IntegrityNext Topic: Compliance Testing


Verification of Authorizations

Access authorizations must be periodically evaluated and any discrepancies justified. Some of the sources that are used to verify the authorizations are: