The following 187 items are listed by Content Data.
Audit Programs
Email Surveillance Audit Program
Ensure that email surveillance activities align with organizational objectives and regulatory requirements, identify gap...
Policies & Procedures
Credit Card Information Handling Policy
Establish best-practice procedures for securing and managing credit card data with our sample credit card data handling ...
Audit Programs
System Post-Implementation Audit Work Program
Assess system performance and compliance, ensure data integrity, and optimize security with this audit program sample.
Articles
Cyberattacks on Schools – Steps Toward Resilience
Discover recommendations from governments and associated establishments to make the education sector more resilient to c...
Articles
Oracle Cloud Security: Preventing Unauthorized Access and Data Theft
How organizations can significantly enhance the security of their Oracle Cloud and protect themselves from potential dat...
Policies & Procedures
Access Management Policy
Ensure secure access to company systems with this policy, detailing approval, monitoring and removal procedures for user...
Audit Programs
Database Audit Work Program
This tool includes two sample audit programs that provide steps organizations can take to perform a database administrat...
Blog
New Content on KnowledgeLeader - 6/30/2025
ToolsThe following tools were published on KnowledgeLeader this week:Vendor Setup and Maintenance Poli...
Audit Programs
Security Management Audit Work Program
Evaluate your organization’s information security programs and identify vulnerabilities using this audit program sample.
Blog
New Content on KnowledgeLeader - 5/26/2025
ToolsThe following tools were published on KnowledgeLeader this week:Invoice Exception PolicyThe purpo...
Audit Programs
Spreadsheet Audit Work Program
Master spreadsheet auditing with our detailed guide on procedures, controls and evaluation for enhanced data integrity a...
Audit Programs
Privacy Audit Work Program
Explore essential strategies for conducting privacy audits, managing data risks, and ensuring compliance with privacy la...