Computerized systems ought to have adequate controls to stop unauthorized access or alterations to details. There must be controls to forestall omissions in information (e.Suitable treatments should be in place to detect contamination and identify the study course of action for being taken. Techniques ought to be out there to find out the effects o