audit trail


Also found in: Thesaurus, Medical, Legal, Financial, Acronyms, Encyclopedia, Wikipedia.

audit trail

n
(Commerce) a record of all the transactions or data entries that a person or firm has carried out over a specific period

au′dit trail`


n.
a trace of the processing steps that produced a particular item of computer data.
References in periodicals archive ?
Audit trail reports can be reviewed to identify system security issues, errors in sequencing of activities, investigation of errors and unexpected events, training issues, and data integrity events.
The starting point for the audit trail discussion will be FDA 21 CFR 11 (5) and EU GMP Annex 11, (4) as shown in Table 1.
com)-- To-Increase, a provider of Microsoft Dynamics solutions for Industrial Equipment Manufacturers (IEM), details the benefits of Microsoft Dynamics audit trails in a new blog post.
Meeting stringent regulatory standards, tracking documents through their lifecycles, and creating audit trails is becoming an increasingly complex activity that requires the integration of workflow, e-mail, documents, and images into a records management strategy.
The audit trail system consists of a series of functions that create and service a master record (the audit trail), comprising any number of object records corresponding to specific user activities.
While e-business lost its number one spot from last year, four new issues appeared: quality of IT personnel, quality of service, electronic audit trail and application service providers (ASPs).
Digital certificates also offer the security of audit trails.
Rather, data is in a relational database and that is where the audit trail needs to be created and protected.
Is there an audit trail to show changes since the last version?
software functions including code check-in, code check-out and audit trail information.
Storage of audit trail with the record: The audit trail is an integral part of the record, and separating the two into different areas reduces confidence in the audit trail.
0 enables enterprises to reinforce their existing security and compliance policies by controlling third party authentication, authorization and audit trails.