The following 14 items are listed by Content Data.
Policies & Procedures
Intranet and Internet Security Policy
This tool contains two sample policies that outline guidelines for a company's internet and intranet security.
Subscriber Content
Guides
Social Media Risks Guide
This document can be used as a guide for identifying and mitigating social media risks within an organization.
Subscriber Content
Performer Profiles
Saudi Telecom Company: Instilling a Business Resilience Mindset
Saudi Telecom Company Group Chief Audit Executive Abdullah Alanizi shares how his team has enhanced the company’s value ...
Subscriber Content
Benchmarking Reports
2020 Finance Trends Survey Report: Technology, Media and Telecommunications Industry Group Results
This report illustrates the top risks TMT organizations should keep in mind throughout 2021, according to the results of...
Subscriber Content
Articles
Cybersecurity Should Be a High Priority for Media Companies Making Crisis Management Plans
This article highlights the scope of media companies’ past cybersecurity efforts and identifies a four-step action plan ...
Subscriber Content
Performer Profiles
NTT Communications: Enablers of Digital Transformation
In this profile, Masakazu Inori, communications team leader of legal affairs and internal auditing, discusses how his in...
Subscriber Content
Benchmarking Reports
Executive Perspectives on Top Risks in 2020: Technology, Media and Telecommunications Industry Group Results
This report illustrates the top risks technology, media and telecommunications organizations should keep in mind through...
Subscriber Content
Audit Reports
Security Policy and Procedure Evaluation Report: Communications
This report records the result of a security policies and procedures evaluation. The sample illustrates communications s...
Subscriber Content
Policies & Procedures
Do Not Call Registry Policy
This sample policy ensures that all rules and regulations related to telemarketing are complied with and nothing is done...
Subscriber Content
Newsletters
Leveraging Social Business for Results: Moving Beyond Media
This issue of The Bulletin explores the potential disruptive implications of social media for businesses and what it can...
Subscriber Content
Policies & Procedures
User Malicious Software Policy
The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Blog
Communicating With Shareholders: What You Need to Know
Communicating with shareholders is about capital – the ability to access either equity or debt at the lowes...