The following 325 items are listed by Content Data.
Checklists & Questionnaires
Tax Process Questionnaire
The two sample questionnaires in this document focus on an organization’s tax process, including corporate income taxes,...
Subscriber Content
Methodologies & Models
Access Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s access controls process and to a...
Subscriber Content
Policies & Procedures
IT Equipment and Information Control Policy
This policy sample establishes guidelines and procedures common to effective company equipment and system information pr...
Subscriber Content
Benchmarking Tools
Transaction Authority Risk Key Performance Indicators (KPIs)
This tool contains performance measures and questions an organization can use to enforce and ensure the validity of tran...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Data Warehouse and Business Intelligence Management RCM
This document outlines risks and controls common to data warehouse and business intelligence management in a risk contro...
Subscriber Content
Audit Programs
Application Security Review and Testing Audit Work Program
This tool includes two sample audit programs that provide steps organizations can take to facilitate an application secu...
Subscriber Content
Audit Programs
Data Conversion Audit Work Program
This tool contains two sample audit programs that provide steps organizations can take to perform a data conversion audi...
Subscriber Content
Policies & Procedures
Telecommunication Usage Policy
This sample policy defines guidelines and procedures organizations should follow when using telecommunications systems.
Subscriber Content
Policies & Procedures
IT Risk Assessment Policy
The objective of this policy is to provide a standardized approach and operating instructions for the execution of a com...
Subscriber Content
Benchmarking Tools
IT Change Management Leading Practices
This tool features leading practices that can be used to evaluate and improve an organization’s IT infrastructure.
Subscriber Content
Policies & Procedures
Data Backup and Retention Policy
This tool contains three sample policies that highlight guidelines and procedures common to recognizing and retaining da...
Subscriber Content
Policies & Procedures
Information Security Management System Policy
This policy establishes the scope of a company's information security management system and characterizes the interfaces...
Subscriber Content