IT Controls

The following 169 items are listed by Content Data.

Blog

What is Transaction Authenticity?

What Is Transaction Authenticity?"Transaction authenticity" can be defined as the authentication of a party...
Thu, Feb 15, 2018
Policies & Procedures

Workstation Use Policy

This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Mon, Jan 22, 2018
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

IT System Pre-Implementation Review Audit Report

This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Mon, Nov 27, 2017
Audit Reports

IT Risk Assessment Audit Report

This risk assessment audit report outlines findings from a high-level IT risk assessment at a company.
Subscriber Content
Mon, Oct 23, 2017
Policies & Procedures

Software Acquisition, Implementation and Maintenance: Application Development and Implementation Policy

The purpose of this sample policy is to control application development and to ensure that application development is ef...
Subscriber Content
Mon, Sep 18, 2017
Checklists & Questionnaires

IT Risk Assessment Questionnaire

This tool includes risk assessment questions for both IT management and executive IT management.
Subscriber Content
Mon, Sep 4, 2017
Blog

Electronic Discovery Risks, Challenges and Procedures

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Mon, Jul 17, 2017
Checklists & Questionnaires

IT Due Diligence Questionnaire

This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Mon, Jun 19, 2017
Checklists & Questionnaires

IT Process Questionnaire: Computer Operations Management

This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Mon, Apr 17, 2017
Memos

Sarbanes-Oxley Walkthrough Preparation Memo

This Sarbanes-Oxley process memo informs and prepares business process control managers to engage in “walkthrough” discu...
Subscriber Content
Mon, Oct 3, 2016
Risk & Control Matrices - RCMs

Manage IT Assets RCM

This document outlines risks and controls common to the "manage IT assets" process in an RCM format.
Subscriber Content
Mon, Aug 29, 2016