The following 255 items are listed by Content Data.
Blog
What Are the Benefits and Risks Associated With Data Integrity?
Data integrity is the assurance that information can only be accessed or modified by those authorized to a...
Blog
What You Need to Build Remarkable Partnerships With the IT Organization
The strength of the partnership between IT audit and the IT organization is a significant differentiator in...
Blog
What is Transaction Authenticity?
What is Transaction Authenticity?
"Transaction authenticity" can be defined as the authentication of a par...
Blog
Guide to Records Management
Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving ...
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologi...
Blog
The Three Components of a Successful Systems Design
What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Blog
What You Need to Know About Robotic Process Automation
Are You Familiar With Robotic Process Automation?
Robotic process automation (RPA) has been gaining tracti...
Protiviti Booklets
Internal Auditing Around the World: Volume 6
In this booklet, we profile nine international companies that value technology-based audit and data analysis techniques ...
Subscriber Content
Newsletters
Setting the 2011 Audit Committee Agenda
This issue of The Bulletin provides observations for consideration by boards of directors and their audit committees as ...
Subscriber Content
Newsletters
Risk Management: A Look Back and a Look Forward
In this issue of The Bulletin, we look at how risk management has evolved over the past 25 years and some of the lessons...
Subscriber Content
Policies & Procedures
Website Privacy Policy
This sample can be used to create an information privacy policy for a company website.
Subscriber Content