Data Security

The following 189 items are listed by Content Data.

Memos

Minimum Testing Standards for Systems and Data Memo

This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content
Mon, Oct 3, 2016
Memos

Network Audit Management Memo

This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Mon, Aug 22, 2016
Memos

Data Governance Review Phase I Memo

This memo documents internal audit's summary of findings from a data governance review.
Subscriber Content
Mon, Aug 1, 2016
Memos

Data Breach Notification Memo

This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Mon, May 2, 2016
Process Flows

Data Conversion Process Flow

Data conversion is the conversion of computer data from one format to another. This process flow details the steps invol...
Subscriber Content
Mon, Jul 6, 2015
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015
Newsletters

Managing Cyber Threats with Confidence

This issue of Board Perspectives: Risk Oversight articulates why it’s important to focus on protecting an organization’s...
Subscriber Content
Mon, Apr 13, 2015
Newsletters

Managing Cybersecurity Risk

In this issue of Board Perspectives: Risk Oversight, we present four considerations for managing cybersecurity risk.
Subscriber Content
Mon, Jun 10, 2013
Blog

Risks Associated with Data Integrity and Management Best Practices

Failure to manage data integrity risk can have the following impact:Authorization, completeness, and a...
Mon, Oct 29, 2012