The following 175 items are listed by Content Data.
Policies & Procedures
End-User Information Security Background Policy
This policy sample establishes guidelines and procedures common to use of all company information technology systems.
Subscriber Content
Policies & Procedures
Data Classification Standard Policy
This sample policy can be used by auditors to ensure that all of the organization’s classified information is properly i...
Subscriber Content
Policies & Procedures
Connection to Untrusted Network Standard Policy
This sample policy documents security requirements surrounding network access between a company’s computer network and u...
Subscriber Content
Policies & Procedures
IT Auditing and Logging Standard Policy
The purpose of this auditing and logging standard is to ensure that all company systems are auditable and that proper pr...
Subscriber Content
Policies & Procedures
IT and Telephony Systems Acceptable Use Policy
This sample policy outlines guidelines and procedures common to proper use of a debt manager’s IT and telephony equipmen...
Subscriber Content
Policies & Procedures
Printer Policy
This sample printer policy can be used by organizations to facilitate the appropriate and responsible business use of th...
Subscriber Content
Checklists & Questionnaires
Identity Management Tool Questionnaire
The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content
Audit Reports
Technical Support Function Audit Report
This sample audit report can be used by auditors for reviewing and noting opportunities for operational and control impr...
Subscriber Content
Audit Reports
IT Asset Management Audit Report
This sample audit report can be used to improve and better understand an organization's IT asset management (ITAM) proce...
Subscriber Content
Memos
Data Governance Audit Scoping Memo
This sample memo serves as a report of an internal audit function’s high-level assessment of the company’s data governan...
Subscriber Content
Blog
External Access Risk: Key Factors You Need to Know
Many businesses today exchange goods, services, information and knowledge using network-enabled technologie...
Newsletters
Responsible Privacy: Is the Board Doing Its Part?
This issue of Board Perspectives: Risk Oversight discusses some of the important points covered during Protiviti’s meeti...
Subscriber Content