The following 152 items are listed by Content Data.
Policies & Procedures
Computing Operations and Support: Service-Levels Policy
The purpose of this policy is to ensure that there are defined and documented IT services, service times and user-agreed...
Subscriber Content
Audit Programs
Database Audit Work Program
This tool includes two sample audit programs that provide steps organizations can take to perform a database administrat...
Subscriber Content
Checklists & Questionnaires
System Development Life Cycle Questionnaire
This tool contains two sample documents that highlight questions to consider when creating and measuring an organization...
Subscriber Content
Policies & Procedures
Business Continuity Plan Exercise and Testing Policy
Organizations can use the guidelines included in this policy to test their business continuity plans.
Subscriber Content
Articles
Protiviti, ING and Closed Loop Partners Panel Explores Relationship Between Sustainability and Finance
Read the highlights of a panel discussion on sustainable finance with industry experts, hosted by Protiviti, ING and the...
Subscriber Content
Policies & Procedures
Building and Data Center Physical Security Policy
This policy sample can be used by organizations to ensure that company buildings and data centers remain secure.
Subscriber Content
Methodologies & Models
IT Program and Project Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT program and project managemen...
Subscriber Content
Policies & Procedures
Approved Software Policy
This sample policy outlines procedures for the usage and maintenance of approved software in a company.
Subscriber Content
Risk & Control Matrices - RCMs
Manage and Administer Benefits: Process Benefits and Retiree Information RCM
This document outlines risks and controls common to processing benefits and retiree information during the benefits admi...
Subscriber Content
Checklists & Questionnaires
Data Governance Questionnaire
The questions included in this tool can be used by organizations to create an effective data governance framework.
Subscriber Content
Policies & Procedures
Third-Party Access Policy
This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Subscriber Content
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content