The following 209 items are listed by Content Data.
Blog
What You Need to Know About GDPR Compliance
Are You Familiar with GDPR?
The General Data Protection Regulation (GDPR) became effective May 25, 2018, a...
Blog
What Are the Benefits and Risks Associated With Data Integrity?
Data integrity is the assurance that information can only be accessed or modified by those authorized to a...
Blog
Intellectual Property: Risks You Need to Know
Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
Risks Associated with Data Integrity and Management Best Practices
Failure to manage data integrity risk can have the following impact:
Authorization, completeness, and ac...
Policies & Procedures
Building and Data Center Physical Security Policy
This sample outlines a set of policies and procedures for governing access to company buildings and data centers, to ens...
Subscriber Content
Policies & Procedures
End-User Computing (EUC) Tools Policy
This sample outlines a set of policies and procedures for dealing with the security and use of end-user computing (EUC) ...
Subscriber Content
Policies & Procedures
Internal Lab Security Policy
The purpose of this policy is to ensure that company confidential information and technologies are not compromised.
Subscriber Content
Newsletters
Managing Cybersecurity Risk
In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Newsletters
Managing Cyber Threats with Confidence
This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Audit Programs
IT Data Management Audit Work Program
This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content