The following 311 items are listed by Content Data.
Policies & Procedures
Security of Data Policy (with UNIX Example)
The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Newsletters
Setting the 2011 Audit Committee Agenda
This issue of The Bulletin provides observations for consideration by boards of directors and their audit committees as ...
Subscriber Content
Protiviti Booklets
Internal Auditing Around the World: Volume 6
In this booklet, we profile nine international companies that value technology-based audit and data analysis techniques ...
Subscriber Content
Protiviti Booklets
The Global Privacy and Information Security Landscape: Frequently Asked Questions
This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Newsletters
Making Internal Audit a Value-Adding Contributor to Economic Recovery
This issue of The Bulletin explores how internal audit can contribute to an organization as it recovers from crisis goin...
Subscriber Content
Protiviti Booklets
Spreadsheet Risk Management: Frequently Asked Questions
This booklet represents a pragmatic response to spreadsheet risk based on real business needs.
Subscriber Content
Protiviti Booklets
Guide to the Sarbanes-Oxley Act
The questions answered in this booklet have risen in our discussions with clients and others in the marketplace who freq...
Subscriber Content
Newsletters
Wanted: A Cost-Effective Approach to Validating Performance of the Internal Control Structure
This issue of The Bulletin addresses the importance of integrating self-assessment, entity-level monitoring, and indepen...
Subscriber Content
Newsletters
Technology Risks and Controls: What You Need to Know
In this issue of The Bulletin, we focus on the relevance of IT risks and controls to a company’s meeting the internal co...
Subscriber Content
Blog
Change Management Audits: Key Factors You Need to Know
Information technology is critical to the long-term success of most organizations. It is a key driver for t...
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
Electronic Discovery Risks, Challenges and Procedures
Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...