The following 515 items are listed by Content Data.
Blog
Consider the Distinguishing Characteristics of Risk
Making Your Risk Assessments Count: Consider the Distinguishing Characteristics of RiskTraditional risk ass...
Blog
COSO Integrated Control Framework: Important Changes You Need to Know
In January 2013, the updated version of the Committee of Sponsoring Organizations of the Treadway Commissi...
Blog
Develop a Credit Card Information Policy to Mitigate Financial and Credit Risk
What Are Financial and Credit Risks?
Financial risk and credit risk are related risks that should often be...
Blog
Document Retention Policy Basics
We live and do business in a highly regulated, litigious society. It’s an inevitable but beneficial consequ...
Blog
Electronic Discovery Risks, Challenges and Procedures
Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Blog
Ethics Program Best Practices
Well-written, well-disseminated ethics policies are essential aspects of modern business. Ethics are, in fa...
Blog
Exploring the Big Picture of IT Risk Assessment
Most, if not all, business transactions executed today touch the information technology (IT) environment at...
Blog
How Can Human Resources Risk Be Managed?
“All of the blame and none of the praise”
This was how one Human Resource professional described their job...
Blog
How to Approach Governance Risk and Compliance
When viewed as a single corporate project or objective, governance, risk and compliance, often referred to ...
Blog
How to Build an Effective Business Process
Key Performance Measures Improving the Process
An effective business process is built on a set of well-def...
Blog
How to Ensure a Robust Compliance Policy
Introduction“Compliance” is defined as adherence to policies, plans, procedures, laws, regulations, contrac...
Blog
How to Keep Your Organization’s Policies Up to Date
Defined policies and procedures play an integral role in efficient and effective company operations. They a...