IT Governance, Risk, and Compliance

Jul 25 2012   12:08AM GMT

IT Hardware Duplicity and Echo Checks – Part I

Robert Davis Robert Davis Profile: Robert Davis

Conceptual Connect To Server Image – Salvatore Vuono


Effective communication checks should be applied to small as well as large IT configurations. IT hardware duplicity and echo checks are a way of establishing the accuracy achieved during the transfer of data over a communication medium. They provide quality checks and error-control techniques for data transferred over a computer network or other communications link.

IT operation duplication as an error control

In contrast to data deduplication, IT hardware duplicity checks utilize the principle of duplicate, or complimentary, processing to detect and correct errors. When this control is deployed, an operation is performed twice to assist in detecting errors. If the repeated operation matches the base operation, it is a duplicate operation. With this check, the result of the repeated operation is compared, and any difference between them will indicate a hardware-induced error requiring corrective action.



Davis, Robert E. IT Auditing: Assuring Information Assets Protection. Mission Viejo, CA: Pleier Corporation, 2008. CD-ROM.

Gleim, Irvin N. CIA Examination Review. 3rd ed. Vol. 1. Gainesville, FL: Accounting Publications, 1989. 284

Watne, Donald A. and Peter B. B. Turney. Auditing EDP Systems. Englewood Cliffs, NJ: Prentice-Hall, 1984. 230-1, 490, 499


Post Notes: “IT Hardware Duplicity and Echo Checks – Part I” was originally published through under the title “IT Hardware Duplicity and Echo Checks”.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: