Browse Definitions :
Definition

four eyes principle

The four eyes principle is a requirement that two individuals approve some action before it can be taken. The four eyes principle is sometimes called the two-man rule or the two-person rule.

In a business context, the four eyes required for approval are often those of the CEO (Chief Executive Officer) and the CFO (Chief Financial Officer), who must both sign off on any significant business decision. In editing, proofreading and translation,  documents typically have a second reader to detect errors and typos that a single pair of eyes might miss. Although neither individual might detect all errors, two readers are likely to miss different things so that, collaboratively, they will catch more mistakes.

Here are a few other examples of the four eyes principle at work:

  • Many legal and financial documents require the signatures of two individuals.
  • Banks, casinos and sensitive military areas often include no-lone zones: areas in which two people must be present and within each other's line of vision at all times.
  • The Emergency War Orders (EWO) safe, which contains missile launch keys and codes, is locked by two padlocks with keys held by different launch officers.
  • Some data management systems require that important record updates be approved by two separate people before the data is committed.

Although the four eyes principle adds an element of security to any decision-making process, its effectiveness relies upon the ability, integrity and diligence of the individuals involved. In a refinement of the basic principle, a random rotation of authorized individuals serves as the second pair of eyes, so that it cannot be known with any certainty which two individuals will be dealing with a given decision.

 

This was last updated in May 2013

Continue Reading About four eyes principle

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close