Auditor should verify:
1. Controls in place to protect data, programs, and computers from unauthorized access, manipulation, destruction, and theft.
2. Adequate supervision and operating procedures exist to compensate for lack of segregation between the duties of users, programmers, and operators.
3. Backup procedures are in place to prevent data and program loss due to system failures, errors and so on.
4. Systems selection and acquisition procedures produce applications that are high quality, and protected from unauthorized changes.
5. System virus free and adequately protected to minimize the risk of becoming infected with a virus or similar object.