IT Audit

The following 311 items are listed by Content Data.
Policies & Procedures

Security of Data Policy (with UNIX Example)

The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Mon, Mar 14, 2011
Newsletters

Setting the 2011 Audit Committee Agenda

This issue of The Bulletin provides observations for consideration by boards of directors and their audit committees as ...
Subscriber Content
Mon, Jan 17, 2011
Protiviti Booklets

Internal Auditing Around the World: Volume 6

In this booklet, we profile nine international companies that value technology-based audit and data analysis techniques ...
Subscriber Content
Mon, Jun 28, 2010
Protiviti Booklets

The Global Privacy and Information Security Landscape: Frequently Asked Questions

This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Mon, May 3, 2010
Newsletters

Making Internal Audit a Value-Adding Contributor to Economic Recovery

This issue of The Bulletin explores how internal audit can contribute to an organization as it recovers from crisis goin...
Subscriber Content
Mon, Dec 14, 2009
Protiviti Booklets

Spreadsheet Risk Management: Frequently Asked Questions

This booklet represents a pragmatic response to spreadsheet risk based on real business needs.
Subscriber Content
Mon, Jul 6, 2009
Protiviti Booklets

Guide to the Sarbanes-Oxley Act

The questions answered in this booklet have risen in our discussions with clients and others in the marketplace who freq...
Subscriber Content
Mon, Jun 5, 2006
Newsletters

Wanted: A Cost-Effective Approach to Validating Performance of the Internal Control Structure

This issue of The Bulletin addresses the importance of integrating self-assessment, entity-level monitoring, and indepen...
Subscriber Content
Thu, Aug 25, 2005
Newsletters

Technology Risks and Controls: What You Need to Know

In this issue of The Bulletin, we focus on the relevance of IT risks and controls to a company’s meeting the internal co...
Subscriber Content
Mon, Jan 19, 2004
Blog

Change Management Audits: Key Factors You Need to Know

Information technology is critical to the long-term success of most organizations. It is a key driver for t...
Thu, Feb 27, 2020
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Blog

Electronic Discovery Risks, Challenges and Procedures

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Sun, Jul 16, 2017