The following 235 items are listed by Content Data.
Blog
Guide to Records Management
Technology has greatly expanded the methods of creating, editing, maintaining, transmitting and retrieving ...
Checklists & Questionnaires
Information Technology (IT) Infrastructure Questionnaire
Use the questions included in this IT audit checklist to better understand your organization's information technology in...
Subscriber Content
Audit Reports
Security Assessment Audit Report
This sample report presents the results of an organization's information security audit.
Subscriber Content
Internal Audit CPE Courses
Introduction to Information Technology (IT) Audit (KLplus CPE Course)
The objective of this course is to provide internal auditors with a basic understanding of the IT environment and the as...
Blog
The Three Components of a Successful Systems Design
What is design risk? To “design” is to create, fashion, execute or construct according to plan. The term de...
Protiviti Booklets
Internal Auditing Around the World: Volume 14
In Volume XIV of Protiviti’s Internal Auditing Around the World, we take a closer look at internal auditors’ challenges ...
Subscriber Content
Checklists & Questionnaires
Update Testing: Control Self-Assessment Questionnaire
This questionnaire helps to assess if the controls are operating effectively within a business unit.
Subscriber Content
Checklists & Questionnaires
General IT Controls Review: Passwords Questionnaire
This tool provides questions to consider while reviewing general IT controls password standards.
Subscriber Content
Checklists & Questionnaires
Self-Assessment Questionnaire: IT Security Remediation
This sample is intended to be used to assist with Sarbanes-Oxley Act (SOA) control remediation efforts.
Subscriber Content
Audit Reports
Pre-Year 1 SOX Roadmap Audit Report
This audit report summarizes the observations, recommendations, and related remediation prioritization for business and ...
Subscriber Content
Blog
What is Transaction Authenticity?
What Is Transaction Authenticity?"Transaction authenticity" can be defined as the authentication of a party...
Policies & Procedures
Workstation Use Policy
This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content