The following 19 items are listed by Content Data.
Newsletters
Ransomware: Analyzing Risk and Protecting Critical Assets
In this issue of Board Perspectives, we provide four ways boards can respond strategically to ransomware exposures.
Subscriber Content
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Benchmarking Tools
Intellectual Property Risk: Key Performance Indicators (KPIs)
This tool defines core risks and key performance indicators related to an organization's intellectual property (IP) infr...
Subscriber Content
Blog
Intellectual Property: Risks You Need to Know
Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Audit Reports
Security Policy and Procedure Evaluation Report: Data Security
This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Checklists & Questionnaires
Record Retention Questionnaire
Unlock the benefits of a clear document retention policy to enhance your organization’s compliance and streamline your r...
Subscriber Content
Audit Reports
Intellectual Property Process Audit Report
This audit report shares findings from a review of a company’s patents, trademarks and trade secrets processes.
Subscriber Content