Literary Warrant for Functional Requirement #7c2
This requirement derives from the law, customs, standards and
professional best practices accepted by society and codified in the literature of different professions concerned with records and
recordkeeping. The warrant is as follows:
Citation Electronic Industry Data Exchange. ASC 12 Convention : Version 3 : Electronic Industry Data
Guidelines. Washington Publishing Co., 1994.
Extract Businesses require control over their contractual correspondence. Such control includes
determination of when correspondence is transmitted, to whom it is transmitted, when it reaches the
recipient, and an appraisal of the accuracy, integrity and risks of the communication.
Citation American Institute of Certified Public Accountants. Statements on Auditing Standards 55.
Consideration of the Internal Control Structure in a Financial Statement Audit
Extract The accounting system consists of the methods and records established to identify, assemble,
analyze, classify, record, and report an entity's transaction and to maintain accountability for the related
assets and liabilities. An effective accounting system gives appropriate consideration to establishing
methods and records that will ...Determine the time period in which transaction occurred to permit
recording of transaction in the proper accounting period.
Citation "Internal Control Structure" Bailey, Larry P. Miller GAAS Guide: A Comprehensive Restatement
of Generally Accepted Auditing Standards . 1995
Extract An adequately designed accounting system should incorporate methods and records that will satisfy
the following...Determine the time period in which transactions occurred to permit recording of
transactions in the proper accounting period.
Citation Accredited Standard Committee; ASC X12 Standards: Draft Version 3 Release 3; published 12/92.
Volume 1: Control Standards, Transaction Set Tables, and Segment Directory; Document No. ASC
Extract 5 X12 SECURITY SEGMENT SPECIFICATIONS 5.1 General The basic requirements for a
secured business interchange include the ability to securely detect attempts at insertion, deletion, and
replay of messages. In order to satisfy these requirements, the originating application shall place a
combination of the date and a unique message identifier into the authenticated message, and the
receiving application shall use these fields, along with the originator's application ID to check for
repeated or deleted messages.