The following 138 items are listed by Content Data.
Charters
Business Continuity Program Charter
Uncover top business continuity plan strategies with this program charter that prioritizes safety, protection and swift ...
Subscriber Content
Audit Programs
Intranet Audit Work Program
This work program sample highlights general steps an organization should follow when performing an intranet audit.
Subscriber Content
Benchmarking Tools
Data Integrity Risk Key Performance Indicators (KPIs)
What is data integrity? Use this tool to discover its meaning and key performance indicators that ensure data integrity....
Subscriber Content
Articles
Tech Can Help Oil and Gas Firms Survive Market Turmoil
Protiviti’s Tyler Chase and Justin Turner explain how technology benefits the energy industry and suggest key actions or...
Subscriber Content
Policies & Procedures
Data Access and User Authentication Policy
The purpose of this access management policy is to ensure that access to all company systems and applications is properl...
Subscriber Content
Policies & Procedures
System Software Development Policy
This template can be used to record a company’s system software development policy and requirements and the responsibili...
Subscriber Content
Policies & Procedures
IT and Telephony Systems Acceptable Use Policy
This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Policies & Procedures
Printer Policy
This sample printer policy can be used by organizations to facilitate the appropriate and responsible business use of th...
Subscriber Content
Blog
How to Conduct an Up-to-Date Information Security Audit
The point of the article, of course, was that people must focus their attention in the correct places when ...
Blog
How to Remarkably Audit Your IT Initiatives
Changes to a company’s information technology (IT) environment, both information systems and the underlying...
Blog
What You Need to Align IT Management With Business Priorities
The "Holy Grail" for IT has always been to be closely aligned with business efforts. For years, business ha...
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...