The following 205 items are listed by Content Data.
Policies & Procedures
User Information Security Policy
This sample policy provides guidelines for securing user information.
Subscriber Content
Memos
Delegated Entity Review Memo
This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Memos
Data Breach Notification Memo
This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Audit Programs
System Backup Review Audit Work Program
The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Audit Programs
Security Policy Review Audit Work Program
The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Newsletters
Social Business: What it Means to Your Risk Profile
This issue of Board Perspectives: Risk Oversight discusses 10 examples of social business risks every company should mon...
Subscriber Content
Policies & Procedures
Blog and Social Networking Policy
The purpose of this policy is to ensure that all employee blog and social networking activities incorporate consistent s...
Subscriber Content
Policies & Procedures
Security of Data Policy (with UNIX Example)
The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Protiviti Booklets
The Global Privacy and Information Security Landscape: Frequently Asked Questions
This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Blog
Business Intelligence Competency Centers Overview and Guide
The objectives of a business intelligence competency center (BICC) are to provide the organization with bet...
Blog
Consider Different Approaches When It Comes to Cybersecurity
Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Blog
Guide to the State of Data Analytics
What is Data Analytics?Data analytics is the practice of embedding insight into operations to drive busines...