The following 177 items are listed by Content Data.
Policies & Procedures
IT Equipment and Information Control Policy
This policy sample establishes guidelines and procedures common to effective company equipment and system information pr...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Reference and Master Data Management RCM
This document outlines risks and controls common to reference and master data management in a risk control matrix (RCM) ...
Subscriber Content
Policies & Procedures
Systems Audit Logging and Monitoring Policy
This sample policy is designed to help organizations define and comply with system audit logging and monitoring requirem...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Data Warehouse and Business Intelligence Management RCM
This document outlines risks and controls common to data warehouse and business intelligence management in a risk contro...
Subscriber Content
Data Analytics CPE Courses
Robotic Process Automation and Internal Audit – Are You Ready? (KLplus CPE Course)
This course covers robotic process automation (RPA) and why internal audit leaders should care about it.
Articles
Building a Comprehensive Data Privacy Program
Protiviti offers advice on how companies can both formalize and improve data privacy practices, including a four-step ap...
Subscriber Content
Policies & Procedures
Separation of Duties Policy
In this sample policy, we outline the standards for applying separation of duties to protect a company’s information ass...
Subscriber Content
Audit Programs
Data Conversion Audit Work Program
This tool contains two sample audit programs that provide steps organizations can take to perform a data conversion audi...
Subscriber Content
Policies & Procedures
Data Backup and Retention Policy
This tool contains three sample policies that highlight guidelines and procedures common to recognizing and retaining da...
Subscriber Content
Policies & Procedures
Physical Security Standard Policy
The purpose of this policy is to create and maintain a physically secure environment that protects company property and ...
Subscriber Content
Articles
Preparing for a Dynamic Post-Pandemic Fraud Landscape
The five strategies described in this article can help organizations strengthen their fraud prevention practices and avo...
Subscriber Content
Benchmarking Tools
Privacy Program Leading Practices
This tool features several leading practices to consider when establishing a privacy program.
Subscriber Content