The following 211 items are listed by Content Data.
Policies & Procedures
Data Classification Standard Policy
This sample policy can be used by auditors to ensure that all of the organization’s classified information is properly i...
Subscriber Content
Policies & Procedures
Connection to Untrusted Network Standard Policy
This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Policies & Procedures
Authorization to Use or Disclose PHI: HIPAA Policy
This sample policy outlines procedures organizations should follow common to proper use or disclosure of protected healt...
Subscriber Content
Policies & Procedures
Technology Purchasing Policy
This sample policy establishes standards and procedures organizations should follow when handling technology-related pur...
Subscriber Content
Policies & Procedures
IT Auditing and Logging Standard Policy
The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Audit Programs
Big Data Audit Work Program: Data Security Management
This work program template highlights general steps an organization should follow with respect to effective data securit...
Subscriber Content
Articles
Data Privacy Isn’t Just One and Done: How to Stay on Top of Changes and Ensure Ongoing Compliance
Here, we provide an overview of recent data privacy regulations and explain steps organizations must take to operate an ...
Subscriber Content
Policies & Procedures
IT and Telephony Systems Acceptable Use Policy
This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Policies & Procedures
Social Media Policy
This sample policy establishes standards and procedures employees should follow when engaging in social media networking...
Subscriber Content
Policies & Procedures
Printer Policy
This sample printer policy can be used by organizations to facilitate the appropriate and responsible business use of th...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Checklists & Questionnaires
Identity Management Tool Questionnaire
The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content