Privacy

The following 198 items are listed by Content Data.

Policies & Procedures

Facility Access Controls Policy

This sample policy provides an overview of procedures organizations should perform during the facility access controls p...
Subscriber Content
Mon, Dec 2, 2019
Audit Reports

Privacy and Data Sensitivity Audit Report

This audit report focuses on the process of ensuring that effective controls are in place for the handling of sensitive ...
Subscriber Content
Mon, Oct 14, 2019
Audit Reports

Privacy Compliance Program Review Audit Report

This sample report focuses on the privacy compliance state at a financial institution and uses a capability maturity con...
Subscriber Content
Mon, Oct 7, 2019
Blog

Consider Different Approaches When It Comes to Cybersecurity

Cybercrime is now considered a top risk to most enterprises. Many organizations seek to build security by a...
Fri, Jun 28, 2019
Blog

What You Need to Know About Robotic Process Automation

Are You Familiar With Robotic Process Automation?Robotic process automation (RPA) has been gaining traction...
Thu, Jun 20, 2019
Blog

What is the Internet of Things?

The internet of things (IoT) is an environment in which “things” – objects, animals or people – are given u...
Thu, May 23, 2019
Protiviti Booklets

FAQ: Understanding the General Data Protection Regulation

Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Mon, May 13, 2019
Audit Reports

ISO 27001 Information Security Assessment Report

This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Mon, May 6, 2019
Blog

What You Need to Know About GDPR Compliance

Are You Familiar With GDPR?The General Data Protection Regulation (GDPR) became effective May 25, 2018, and...
Fri, Apr 5, 2019
Newsletters

Sharpening the Focus on Cybersecurity

This issue of Board Perspectives: Risk Oversight takes a fresh look at the often-discussed topic of cybersecurity, offer...
Subscriber Content
Mon, Apr 1, 2019
Blog

Intellectual Property: Risks You Need to Know

Copyright pirates, brand impersonators, patent flouters and trade secret thieves are a major threat to busi...
Fri, Feb 22, 2019
Audit Reports

Security Policy and Procedure Evaluation Report: Data Security

This report records the results of an evaluation of data security policies and procedures. This report format that can b...
Subscriber Content
Mon, Nov 26, 2018