The following 192 items are listed by Content Data.
Policies & Procedures
System Software Development Policy
This template can be used to record a company’s system software development policy and requirements and the responsibili...
Subscriber Content
Audit Programs
Big Data Audit Work Program: Data Security Management
This work program template highlights general steps an organization should follow with respect to effective data securit...
Subscriber Content
Benchmarking Reports
2021 IT Audit Benchmarking Survey
Cybersecurity, privacy, data and resilience dominate the top technology challenges for organizations, according to the a...
Subscriber Content
Articles
Data Privacy Isn’t Just One and Done: How to Stay on Top of Changes and Ensure Ongoing Compliance
Here, we provide an overview of recent data privacy regulations and explain steps organizations must take to operate an ...
Subscriber Content
Policies & Procedures
IT and Telephony Systems Acceptable Use Policy
This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Policies & Procedures
Social Media Policy
This sample policy establishes standards and procedures employees should follow when engaging in social media networking...
Subscriber Content
Performer Profiles
TopBuild Corp.: Installing an Analytics Champion
In this profile, TopBuild Director of Internal Audit and Chief Audit Executive Ninette Lewis shares how advanced analyti...
Subscriber Content
Articles
Countdown to CCPA: The 5 Most-Asked Questions
In this article, Protiviti’s Joel Wuesthoff and Pam Kamath answer the most frequently asked questions during a webinar o...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Checklists & Questionnaires
Identity Management Tool Questionnaire
The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content
Articles
A Different Front in the COVID-19 Outbreak: Information Security
This article explores some of the IT factors that administrative and IT health care workers must stay focused on through...
Subscriber Content
Articles
The Pandemic Crisis Draws Sharp Contrast Between Digital Leaders and the Rest
This article reviews leadership teams’ responses to the global pandemic and provides steps digital beginners should take...
Subscriber Content