Para 3.22.58 — MSO (Audit)
Original Rule Text
3.22.58 These controls are built into IT Applications to ensure that data transmitted over local or wide area networks are valid, accurate and complete. Organisations using networks should ensure that there are adequate controls to reduce, to an acceptable level, the risk of data loss, addition of unauthorised transactions and data corruption. Some computer systems are connected to either local or wide area networks (LANs or WANs), which permit them to receive and send data from remote locations. The more common data transmission media include telephone wires, coaxial cables, infrared beams, optical fibres and radio waves.
What This Means
Data transmission controls are built into IT applications to ensure that data sent over local area networks (LANs) or wide area networks (WANs) remains valid, accurate, and complete. Organisations using networks must have adequate controls to reduce risks of data loss, unauthorised transactions, and data corruption to acceptable levels. These controls are important because computer systems increasingly send and receive data from remote locations using various transmission media like telephone wires, cables, optical fibres, and radio waves.
This explanation was generated with AI assistance for educational purposes. Always refer to the official gazette notification for authoritative text.
Key Points
- 1Data transmission controls ensure validity, accuracy, and completeness of data sent over networks
- 2Risks include data loss, addition of unauthorised transactions, and data corruption
- 3Controls must reduce these risks to an acceptable level
- 4Common transmission media include telephone wires, coaxial cables, optical fibres, and radio waves
- 5Both LAN and WAN environments require data transmission controls
Practical Example
A Central Government department has its headquarters in Delhi connected via a WAN to 28 state-level offices. When a state office transmits monthly expenditure data to headquarters, data transmission controls ensure the data arrives complete and unaltered. The system uses checksums to verify data integrity — if even one digit is corrupted during transmission, the receiving system detects the mismatch and requests retransmission. Transaction sequence numbers ensure no records are lost or added during transfer.
This explanation was generated with AI assistance for educational purposes. Always refer to the official gazette notification for authoritative text.
Frequently Asked Questions
What is the difference between data transmission controls and network security controls?▼
Why is data particularly vulnerable during transmission?▼
This explanation was generated with AI assistance for educational purposes. Always refer to the official gazette notification for authoritative text.