The following 206 items are listed by Content Data.
Policies & Procedures
Cellular Phone Policy
Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Subscriber Content
Articles
Robert Half Chief Digital Officer: Connecting and Collaborating Will Be Critical in 2035
Protiviti’s Joe Kornik sat down with Colin Mooney, chief digital officer at Robert Half, to talk about emerging technolo...
Subscriber Content
Articles
Hong Kong CEO: Business With a Purpose — and Partnerships — Is the Future of ESG
The Mekong Club’s CEO believes that when it comes to business with a purpose, a company needs to do more than commit to ...
Subscriber Content
Policies & Procedures
IT Personnel Security Policy
This tool contains two sample policies that define the security standards that must be applied regarding personnel.
Subscriber Content
Policies & Procedures
Building and Data Center Physical Security Policy
This policy sample can be used by organizations to ensure that company buildings and data centers remain secure.
Subscriber Content
Performer Profiles
ConocoPhillips: Evolving Internal Audit Toward a Technology-Enabled Future
Bob Heinrich, general auditor at ConocoPhillips, highlights his team’s critical efforts toward developing an organizatio...
Subscriber Content
Guides
Data Migration Strategy Guide
This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Audit Reports
Internal Audit Strategic Vision Report
Auditors can use this audit report template to form an internal audit strategic plan and develop a road map to achieve t...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Database Management RCM
This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Newsletters
The Board’s Role in the Transformation of Work
In this issue of Board Perspectives, we explore how boards and directors can facilitate a hybrid work model.
Subscriber Content
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Policies & Procedures
Data Center Security Policy
This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content