The following 311 items are listed by Content Data.
Policies & Procedures
Remote Network Access Policy
This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Guides
IT General Controls Guide
Use the automation and standardization best practices in this guide to enhance IT processes and improve compliance.
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
This comprehensive tool includes two sample IT disaster recovery plan checklists with best-practice questions for pre-pl...
Policies & Procedures
Virus Protection Policy
Implement the procedures outlined in this sample policy to protect your company's computing environment from viruses, wo...
Policies & Procedures
Production System Access Policy
Define approved procedures governing access to production systems and applications as well as the documentation of chang...
Audit Programs
IT Application Management Audit Work Program
Enhance your IT application management audit capabilities with our comprehensive work program, tailored for risk assessm...
Audit Programs
Purchasing, AP, Travel and Entertainment Audit Work Program
The purpose of this work program is to provide the general steps used to perform an audit of purchasing, A/P, travel and...
Subscriber Content
Audit Programs
System Implementation Audit Work Program
Access the general steps for reviewing system implementation, including guidance on data conversion strategy and process...
Subscriber Content
Audit Programs
Security Management Audit Work Program
Use the steps included in this sample work program to conduct an efficient security management audit.
Subscriber Content
Audit Programs
Distribution Center and Consigned Inventory Audit Work Program
The purpose of this work program is to provide the general steps used for an inventory audit of a distribution center fo...
Subscriber Content
Policies & Procedures
Network Security Policy
Our Network Security Policy is designed to help companies protect their user accounts, corporate data and intellectual p...
Subscriber Content
Policies & Procedures
Access Management Policy
Ensure that access to all your organization’s systems and applications is properly approved and monitored with our Acces...
Subscriber Content