Policies & Procedures
Information Technology (IT) Security Policy
This document contains three sample policies that establish guidelines an organization should follow to ensure that its IT security meets standard best practices.
Methodologies & Models
IT Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT management process and to assist its progress from the initial/ad-hoc state toward the optimiz...
Subscriber Content
Policies & Procedures
Technology Acquisition Policy
Organizations can use this policy to establish guidelines and set forth the appropriate accounting policies related to the acquisition of technology, equity and other nonmarketable inve...
Policies & Procedures
Vehicle Procurement Policy
Utilize this policy to define and establish the responsibilities, internal controls and required authorizations for the creation, processing and issuance of purchase orders related to c...
Methodologies & Models
Security Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security management process and to assist its progress from the initial/ad-hoc state toward the o...
Subscriber Content
Audit Programs
Accounts Payable Audit Work Program
This audit program sample provides best-practice general steps for an accounts payable review audit.
Tool Categories
Select a category to learn more.
Can't find what you are looking for ?
KnowledgeLeader subscribers get access to AuditNet’s premium audit templates at no extra cost. Dive in and explore hundreds of additional tools, including audit programs and internal control questionnaires.
