Privacy

The following 205 items are listed by Content Data.
Policies & Procedures

User Information Security Policy

This sample policy provides guidelines for securing user information.
Subscriber Content
Mon, Feb 20, 2017
Memos

Delegated Entity Review Memo

This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Mon, Oct 10, 2016
Memos

Data Breach Notification Memo

This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Mon, May 2, 2016
Audit Programs

System Backup Review Audit Work Program

The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Mon, Oct 26, 2015
Audit Programs

Security Policy Review Audit Work Program

The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Mon, Jun 1, 2015
Newsletters

Social Business: What it Means to Your Risk Profile

This issue of Board Perspectives: Risk Oversight discusses 10 examples of social business risks every company should mon...
Subscriber Content
Mon, May 6, 2013
Policies & Procedures

Blog and Social Networking Policy

The purpose of this policy is to ensure that all employee blog and social networking activities incorporate consistent s...
Subscriber Content
Mon, Apr 9, 2012
Policies & Procedures

Security of Data Policy (with UNIX Example)

The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Mon, Mar 14, 2011
Protiviti Booklets

The Global Privacy and Information Security Landscape: Frequently Asked Questions

This booklet provides legal overviews and insight regarding current laws and regulations, and guidance to implement and ...
Subscriber Content
Mon, May 3, 2010
Blog

Business Intelligence Competency Centers Overview and Guide

The objectives of a business intelligence competency center (BICC) are to provide the organization with bet...
Wed, Jun 28, 2017
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Blog

Guide to the State of Data Analytics

What is Data Analytics?Data analytics is the practice of embedding insight into operations to drive busines...
Thu, Oct 5, 2017