Privacy

The following 198 items are listed by Content Data.

Blog

What is IT Audit?

It is common to find organizations investing more and more resources – money, time, staff, etc. – thes...
Tue, Nov 20, 2018
Articles

Five Common Identity and Access Management Pitfalls

This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Mon, Oct 29, 2018
Articles

Integration Prioritization Model for Identity Access Management

Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Mon, Oct 29, 2018
Checklists & Questionnaires

Privacy and Data Protection Questionnaire

Ensure compliance with effective data privacy risk management strategies, protect sensitive information and maintain tru...
Subscriber Content
Mon, Oct 8, 2018
Process Flows

Determining Data Requirements Process Flow

This process flow provides steps for determining the data requirement process at a company.
Subscriber Content
Mon, Sep 17, 2018
Newsletters

The Cyber Risk Oversight Challenge

Every board today faces the challenge of overseeing the investment of finite protection resources in an ever-changing cy...
Subscriber Content
Mon, Apr 23, 2018
Protiviti Booklets

U.S. Anti-Money Laundering Requirements

This guide summarizes some basic principles of money laundering and terrorist financing, followed by discussions of the ...
Subscriber Content
Mon, Jan 29, 2018
Policies & Procedures

Workstation Use Policy

This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Mon, Jan 22, 2018
Policies & Procedures

Sensitive Data Handling Policy

The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Tue, Dec 5, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Blog

Guide to the State of Data Analytics

What is Data Analytics?Data analytics is the practice of embedding insight into operations to drive busines...
Fri, Oct 6, 2017
Blog

Business Intelligence Competency Centers Overview and Guide

The objectives of a business intelligence competency center (BICC) are to provide the organization with bet...
Thu, Jun 29, 2017