Browse Definitions :
Definition

four eyes principle

The four eyes principle is a requirement that two individuals approve some action before it can be taken. The four eyes principle is sometimes called the two-man rule or the two-person rule.

In a business context, the four eyes required for approval are often those of the CEO (Chief Executive Officer) and the CFO (Chief Financial Officer), who must both sign off on any significant business decision. In editing, proofreading and translation,  documents typically have a second reader to detect errors and typos that a single pair of eyes might miss. Although neither individual might detect all errors, two readers are likely to miss different things so that, collaboratively, they will catch more mistakes.

Here are a few other examples of the four eyes principle at work:

  • Many legal and financial documents require the signatures of two individuals.
  • Banks, casinos and sensitive military areas often include no-lone zones: areas in which two people must be present and within each other's line of vision at all times.
  • The Emergency War Orders (EWO) safe, which contains missile launch keys and codes, is locked by two padlocks with keys held by different launch officers.
  • Some data management systems require that important record updates be approved by two separate people before the data is committed.

Although the four eyes principle adds an element of security to any decision-making process, its effectiveness relies upon the ability, integrity and diligence of the individuals involved. In a refinement of the basic principle, a random rotation of authorized individuals serves as the second pair of eyes, so that it cannot be known with any certainty which two individuals will be dealing with a given decision.

 

This was last updated in May 2013

Continue Reading About four eyes principle

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

SearchSecurity

  • RSA algorithm (Rivest-Shamir-Adleman)

    The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security ...

  • remote access

    Remote access is the ability to access a computer or a network remotely through a network connection.

  • IP Spoofing

    IP spoofing is the crafting of Internet Protocol (IP) packets with a source IP address that has been modified to impersonate ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close