The following 71 items are listed by Content Data.
Articles
Back Off, Inefficiencies: Conquering Chaos in the Back Office Is Closer Than You Think
This article explains how a hard-working team of internal resources and external partners can apply their respective exp...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Service Contracts: Entering Contracts into the System RCM
This document outlines risks and controls common to the ‘‘support end users” process in a risk control matrix (RCM) form...
Subscriber Content
Articles
Regulation at the Speed of Innovation: Developing an Adaptive Risk Strategy for Agile and DevOps Environments
DevOps—a concatenation of development and operations—is a fast and flexible approach to developing and delivering softwa...
Subscriber Content
Policies & Procedures
Do Not Call Registry Policy
This sample policy ensures that all rules and regulations related to telemarketing are complied with and nothing is done...
Subscriber Content
Guides
Service-Level Agreement Guide
This sample document can be used by organizations as a guide to developing and understanding service-level agreements (S...
Subscriber Content
Policies & Procedures
Software Acquisition, Implementation and Maintenance: Application Development and Implementation Policy
The purpose of this sample policy is to control application development and to ensure that application development is ef...
Subscriber Content
Policies & Procedures
Sustainability Policy
This sample policy helps to ensure that principles of sustainability are incorporated into actions carried out by the co...
Subscriber Content
Checklists & Questionnaires
IT Due Diligence Questionnaire
This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Policies & Procedures
Portable Computing Device Security Policy
This sample policy establishes safeguards for the use of portable media and computing devices, including their connectio...
Subscriber Content
Policies & Procedures
Help Desk Infrastructure Policy
This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Systems Development Lifecycle (SDLC) RCM
This document outlines risks and controls common to the “manage systems development lifecycle (SDLC)” process in a risk ...
Subscriber Content
Audit Programs
Virtual Private Network (VPN) Administration Audit Work Program
This audit work program includes test steps in the areas of documentation, logging, monitoring and user pool for VPN adm...
Subscriber Content