The following 194 items are listed by Content Data.
Checklists & Questionnaires
Privacy and Data Protection Questionnaire
Ensure compliance with effective data privacy risk management strategies, protect sensitive information and maintain tru...
Subscriber Content
Process Flows
Determining Data Requirements Process Flow
This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Newsletters
The Cyber Risk Oversight Challenge
Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Protiviti Booklets
U.S. Anti-Money Laundering Requirements
This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Policies & Procedures
Workstation Use Policy
This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Policies & Procedures
Sensitive Data Handling Policy
The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Audit Reports
Application Access Audit Report
This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Blog
Guide to the State of Data Analytics
What is Data Analytics?Data analytics is the practice of embedding insight into operations to drive busines...
Blog
Business Intelligence Competency Centers Overview and Guide
The objectives of a business intelligence competency center (BICC) are to provide the organization with bet...
Newsletters
Board Oversight of Cyber Risk
Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Memos
Delegated Entity Review Memo
This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Memos
Data Breach Notification Memo
This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content