The following 237 items are listed by Content Data.
Policies & Procedures
IT Data Management Policy
Our IT Data Management Policy outlines guidelines to ensure that critical data stored in applications and on servers is ...
Subscriber Content
Policies & Procedures
IT Support Policy
Explore our detailed IT support policy for employees, covering request submission, urgent assistance after hours and iss...
Subscriber Content
Policies & Procedures
IT Automated Controls Policy
Define your company’s internal control testing processes and the testing frequency of its automated controls.
Subscriber Content
Blog
New Content on KnowledgeLeader - 3/18/2024
ToolsThe following tools were published on KnowledgeLeader this week:Assessing the Effectiveness of a ...
Guides
Sarbanes-Oxley Auditor Walkthrough Guide
This sample document can be used as a guide to help prepare company personnel for the walkthrough process related to Sar...
Subscriber Content
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Blog
Sample Audit Reports Available on KnowledgeLeader
KnowledgeLeader's sample audit reports provide you with an outline of how to conduct and report on a variet...
Methodologies & Models
IT Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT governance and to assist its ...
Subscriber Content
Policies & Procedures
Production Equipment Security Policy
Govern the security of your organization’s production equipment used in an internet-facing environment with the best-pra...
Subscriber Content
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Subscriber Content
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...
Subscriber Content
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Subscriber Content