IT Security

The following 175 items are listed by Content Data.

Policies & Procedures

End-User Information Security Background Policy

This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Mon, Mar 29, 2021
Policies & Procedures

Data Classification Standard Policy

This sample policy can be used by auditors to ensure that all of the organization’s classified information is properly i...
Subscriber Content
Mon, Mar 15, 2021
Policies & Procedures

Connection to Untrusted Network Standard Policy

This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Mon, Mar 8, 2021
Policies & Procedures

IT Auditing and Logging Standard Policy

The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Mon, Feb 8, 2021
Policies & Procedures

IT and Telephony Systems Acceptable Use Policy

This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Mon, Jan 25, 2021
Policies & Procedures

Printer Policy

This sample printer policy can be used by organizations to facilitate the appropriate and responsible business use of th...
Subscriber Content
Mon, Jan 18, 2021
Checklists & Questionnaires

Identity Management Tool Questionnaire

The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content
Mon, Nov 9, 2020
Audit Reports

Technical Support Function Audit Report

This sample audit report can be used by auditors for reviewing and noting opportunities for operational and control impr...
Subscriber Content
Mon, Sep 14, 2020
Audit Reports

IT Asset Management Audit Report

This sample audit report can be used to improve and better understand an organization's IT asset management (ITAM) proce...
Subscriber Content
Mon, Aug 31, 2020
Memos

Data Governance Audit Scoping Memo

This sample memo serves as a report of an internal audit function’s high-level assessment of the company’s data governan...
Subscriber Content
Mon, Jun 1, 2020
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Wed, Feb 19, 2020
Newsletters

Responsible Privacy: Is the Board Doing Its Part?

This issue of Board Perspectives: Risk Oversight discusses some of the important points covered during Protiviti’s meeti...
Subscriber Content
Mon, Oct 28, 2019