Is use confined to agreed persons only?
Is access to computer passwords controlled?
Are passwords kept secret and changed from time to time?
Is the computer room kept locked when not in use?
Is the computer equipment secured against removal?
Are laptops locked away outside of hours or removed off site?
Is data information backed up regularly?
Is back-up kept off site?
List any defects, who will fix them, and the time for completion.
Please understand that this checklist is intended as a guide only and should not be used in any other context, or as a replacement for tailored financial advice.Print