The following 255 items are listed by Content Data.
Audit Programs
Computer Operations/Job Scheduling Audit Work Program
Effectively evaluate the alignment of computer operations with the organization's strategic plan, assess the adequacy of...
Policies & Procedures
Spreadsheet Controls Policy
Ensure compliance and enhance financial reporting accuracy for critical spreadsheets in alignment with SOX guidelines wi...
Audit Programs
IT Project Governance Audit Work Program
Execute an effective IT project governance audit with the best-practice steps in this sample audit program.
Policies & Procedures
Virus Protection Policy
Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Policies & Procedures
User Information Security Policy
Maintain the security and integrity of your organization’s information systems with this sample user information securit...
Policies & Procedures
Third-Party Access Policy
This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Audit Programs
EDI Audit Work Program
Explore our EDI Audit Work Program to master the setup, testing and oversight of secure data exchanges between clients a...
Policies & Procedures
Sustainability Policy
Develop a clear framework for integrating sustainability principles into all levels of company operations with this sust...
Policies & Procedures
System, Database and Application Administrator Policy
Define the roles, activities and responsibilities of administrators regarding access rights to applications running on c...
Policies & Procedures
IT System Access and Re-Certification Policy
Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Policies & Procedures
Software Upgrade Policy
Identify and define your company's philosophy toward maintaining up-to-date software applications with this sample polic...
Audit Programs
System Intrusion Audit Work Program
Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...