The following 233 items are listed by Content Data.
Newsletters
Emerging Risks: Looking Around the Corner
This article summarizes practical principles for recognizing emerging risks.
Subscriber Content
Memos
Data Breach Notification Memo
This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Memos
Mobile Device Procurement Memo
This memo outlines an internal audit review of an organization's mobile device procurement process.
Subscriber Content
Newsletters
The Most Important Risks for 2016
This issue of Board Perspectives summarizes the top risks for 2016 as identified by North Carolina State University’s ER...
Subscriber Content
Risk & Control Matrices - RCMs
Define IT Strategy and Organization RCM
This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Memos
Sarbanes-Oxley Section 404 Project Conclusion Memo
This memo documents an organization’s approach to Sarbanes-Oxley Section 404 compliance and concluding results from the ...
Subscriber Content
Audit Programs
HR System Pre-Implementation Audit Work Program
This audit program focuses on testing human resources system controls during the pre-implementation phase.
Subscriber Content
Memos
SOX Year-End Update Testing Memo
This memo defines the process a company uses to update testing of internal controls for Sarbanes-Oxley compliance purpos...
Subscriber Content
Newsletters
COSO 2013: What Have We Learned?
This issue of Board Perspectives: Risk Oversight outlines important lessons for board members to consider as directors e...
Subscriber Content
Audit Programs
Program Changes Audit Work Program
This audit program focuses on auditing program change controls.
Subscriber Content
Process Flows
Data Conversion Process Flow
Data conversion is the conversion of computer data from one format to another. This process flow details the steps invol...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content