Computerized systems should have adequate controls to circumvent unauthorized obtain or improvements to data. There ought to be controls to circumvent omissions in information (e.Appropriate procedures really should be in position to detect contamination and identify the system of action to be taken. Procedures really should be accessible to ascert