Computerized devices must have adequate controls to stop unauthorized access or variations to info. There need to be controls to prevent omissions in details (e.Except if there is another procedure to forestall the unintentional or unauthorized utilization of quarantined, turned down, returned, or recalled materials, independent storage locations o