Privacy

The following 194 items are listed by Content Data.

Checklists & Questionnaires

Privacy and Data Protection Questionnaire

Ensure compliance with effective data privacy risk management strategies, protect sensitive information and maintain tru...
Subscriber Content
Mon, Oct 8, 2018
Process Flows

Determining Data Requirements Process Flow

This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Mon, Sep 17, 2018
Newsletters

The Cyber Risk Oversight Challenge

Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Mon, Apr 23, 2018
Protiviti Booklets

U.S. Anti-Money Laundering Requirements

This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Mon, Jan 29, 2018
Policies & Procedures

Workstation Use Policy

This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Mon, Jan 22, 2018
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Blog

Guide to the State of Data Analytics

What is Data Analytics?Data analytics is the practice of embedding insight into operations to drive busines...
Fri, Oct 6, 2017
Blog

Business Intelligence Competency Centers Overview and Guide

The objectives of a business intelligence competency center (BICC) are to provide the organization with bet...
Thu, Jun 29, 2017
Newsletters

Board Oversight of Cyber Risk

Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Mon, May 1, 2017
Memos

Delegated Entity Review Memo

This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Mon, Oct 10, 2016
Memos

Data Breach Notification Memo

This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Mon, May 2, 2016