Data Security

The following 209 items are listed by Content Data.
Blog

What You Need to Know About GDPR Compliance

Are You Familiar with GDPR? The General Data Protection Regulation (GDPR) became effective May 25, 2018, a...
Blog

What Are the Benefits and Risks Associated With Data Integrity?

Data integrity is the assurance that information can only be accessed or modified by those authorized to a...
Blog

Intellectual Property: Risks You Need to Know

Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog

Risks Associated with Data Integrity and Management Best Practices

Failure to manage data integrity risk can have the following impact: Authorization, completeness, and ac...
Policies & Procedures

Building and Data Center Physical Security Policy

This sample outlines a set of policies and procedures for governing access to company buildings and data centers, to ens...
Subscriber Content
Mon, Oct 15, 2012
Policies & Procedures

End-User Computing (EUC) Tools Policy

This sample outlines a set of policies and procedures for dealing with the security and use of end-user computing (EUC) ...
Subscriber Content
Mon, Oct 22, 2012
Policies & Procedures

Internal Lab Security Policy

The purpose of this policy is to ensure that company confidential information and technologies are not compromised.
Subscriber Content
Mon, Oct 29, 2012
Newsletters

Managing Cybersecurity Risk

In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Mon, Jun 10, 2013
Newsletters

Managing Cyber Threats with Confidence

This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Mon, Apr 13, 2015
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015
Audit Programs

IT Data Management Audit Work Program

This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content
Mon, May 25, 2015