The following 186 items are listed by Content Data.
Memos
Data Breach Notification Memo
This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Process Flows
Data Conversion Process Flow
Data conversion is the conversion of computer data from one format to another. This process flow details the steps invol...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Newsletters
Managing Cyber Threats with Confidence
This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Newsletters
Managing Cybersecurity Risk
In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Blog
Risks Associated with Data Integrity and Management Best Practices
Failure to manage data integrity risk can have the following impact:Authorization, completeness, and a...