The following 1416 tools are listed based on publish date.
Policies & Procedures
Insider Trading Policy
The guidelines and procedures included in this policy sample can be used for developing a robust insider trading policy.
Mon, Dec 4, 2023
Checklists & Questionnaires
Preliminary Controls Self-Assessment Questionnaire
This document includes eleven sample questionnaires that internal audit can use to evaluate management's view of the organization’s internal control environment.
Mon, Dec 4, 2023
Guides
IT Security Awareness and Training Program Guide
We've designed this guide to help companies implement and strengthen security training and awareness.
Mon, Dec 4, 2023
Policies & Procedures
Financial Information to Third-Parties Policy
Use the procedures and best practices in this sample policy to improve your processes for disclosing company financial information to third parties.
Mon, Dec 4, 2023
Checklists & Questionnaires
Intellectual Property Fraud Risk Questionnaire
The questions included in this tool should be addressed when handling intellectual property theft.
Mon, Dec 4, 2023
Policies & Procedures
Infrastructure Policy: Laptops
This policy describes the security precautions that must be taken by all individuals who have a company-issued laptop or are temporarily using a “shared” company laptop or the laptop of...
Mon, Nov 27, 2023
Policies & Procedures
Inventory Valuation Policy
Ensure that your organization’s inventory is properly controlled and prevent losses or shortages with this sample valuation policy.
Mon, Nov 27, 2023
Guides
Procurement Card Programs Guide: Internal Control
This guide covers the most effective components of a procurement card program’s internal control structure.
Mon, Nov 27, 2023
Guides
Process Overview Form Guide
This sample document provides instructions on using process overview forms and includes a blank template and a completed example.
Mon, Nov 27, 2023
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organization’s security of information.
Mon, Nov 20, 2023
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers and networks against inadvertent exposure to external threats.
Mon, Nov 20, 2023
Guides
Process Mapping Guidelines Flow Charting
This guide defines primary symbols and provides specific guidelines for preparing a flow chart.
Mon, Nov 20, 2023