Privacy

The following 206 items are listed by Content Data.
Process Flows

Determining Data Requirements Process Flow

This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Mon, Sep 17, 2018
Audit Reports

Data Privacy Maturity Audit Report

This report provides findings from the data privacy maturity assessment at any given company.
Subscriber Content
Mon, Aug 6, 2018
Articles

Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics

Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Mon, Jul 9, 2018
Checklists & Questionnaires

System Privileges for Terminated Employees Checklist

This sample provides action steps to consider for protecting an organization’s critical systems and data and secure syst...
Subscriber Content
Mon, Jun 18, 2018
Checklists & Questionnaires

Self-Assessment Questionnaire: IT Security Remediation

This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Mon, Apr 30, 2018
Newsletters

The Cyber Risk Oversight Challenge

Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Mon, Apr 23, 2018
Protiviti Booklets

U.S. Anti-Money Laundering Requirements

This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Mon, Jan 29, 2018
Policies & Procedures

Workstation Use Policy

This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Mon, Jan 22, 2018
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Newsletters

How Long Does It Take to Implement a Patch?

A recent breach has raised serious questions about whether boards of directors and senior management are asking the righ...
Subscriber Content
Mon, Dec 4, 2017
Audit Reports

Cybersecurity Audit Report

This audit report presents the results of vulnerability assessments and penetration testing performed on an organization...
Subscriber Content
Mon, Jul 31, 2017