Internal Controls

The following 556 items are listed by Content Data.

Checklists & Questionnaires

Self-Assessment Process Questionnaire: Process Owner Accountability

This questionnaire provides a format to evaluate current self-assessment practices and identify areas for improvement.
Subscriber Content
Mon, Jun 10, 2013
Newsletters

Setting the 2013 Audit Committee Agenda

This issue of The Bulletin provides observations and ideas for consideration by boards of directors and their audit comm...
Subscriber Content
Mon, Dec 31, 2012
Protiviti Booklets

Guide to the Sarbanes-Oxley Act: IT Risks and Controls

In this booklet, we provide guidance to Section 404 compliance project teams on the consideration of information technol...
Subscriber Content
Mon, Dec 17, 2012
Blog

How to Mitigate Risks Using Effective Business Continuity Planning

Thorough business continuity plans help organizations minimize the risks of a disaster and restore vital bu...
Mon, Dec 3, 2012
Policies & Procedures

User Authentication and Authorization Policy

The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Mon, Oct 29, 2012
Process Flows

SOX Process Flow: High-Level Methodology

This process flow documents a high-level methodology for Sarbanes-Oxley compliance.
Subscriber Content
Mon, Jul 30, 2012
Newsletters

Communicating Critical Enterprise Risks to the Board

In this issue of Board Perspectives: Risk Oversight, we focus on what we define as the top risks that can threaten a com...
Subscriber Content
Mon, Jun 4, 2012
Newsletters

Social Media: What It Means to Your Risk Profile

In this issue of Board Perspectives: Risk Oversight, we reveal 10 examples of business risks to consider associated with...
Subscriber Content
Mon, Feb 6, 2012
Newsletters

Reducing the Risk of Rogue Trading

This issue of Board Perspectives: Risk Oversight provides seven important questions for boards and senior executives to ...
Subscriber Content
Mon, Nov 7, 2011
Process Flows

User Access Security Process Flow

This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Mon, Jun 20, 2011
Newsletters

Finding the Right Chief Risk Officer

In this issue of Board Perspectives: Risk Oversight, we argue what qualifications a company should look for when evaluat...
Subscriber Content
Mon, Mar 7, 2011
Newsletters

Recommendations from Protiviti’s Board Risk Oversight Survey

This issue of Board Perspectives: Risk Oversight lists some recommendations for board members to consider about the curr...
Subscriber Content
Mon, Jan 17, 2011