The following 734 items are listed by Content Data.
Newsletters
Setting the 2019 Audit Committee Agenda
In this issue of The Bulletin, we have identified several agenda items for audit committees to consider in the year ahea...
Subscriber Content
Checklists & Questionnaires
Medical Clinic Operational Processes Questionnaire
This sample questionnaire can be used when performing an audit of a medical clinic’s operational processes.
Subscriber Content
Checklists & Questionnaires
Financial Reporting Risk Profile Questionnaire
Safeguard your organization with strategic financial risk and compliance questions that address financial reporting and ...
Subscriber Content
Blog
Key Performance Measures for Improving the Internal Audit Process
An effective business process is built on a set of well-defined and clearly stated business objectives. The...
Checklists & Questionnaires
Medical Records, Coding and Billing Processes Compliance Questionnaire
This tool provides questions to consider when performing audits of an organization's medical records, coding and billing...
Subscriber Content
Blog
Currency Risk: The Purpose and Risk of Money
What Is Money?People may say that “money is the root of all evil,” but is it? It may be best to point out t...
Audit Reports
Security Policy and Procedure Evaluation Report: Administrative Personnel
This report records the result of an evaluation of security policies and procedures. The sample illustrates administrati...
Subscriber Content
Checklists & Questionnaires
General Threat Questionnaire
This sample checklist can be used for risk assessment to identify failure scenarios and the likelihood and severity of d...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Tax Functions: Internal Tax Function RCM
This document outlines risks and controls common to the “internal tax function” aspect of the process in a risk control ...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Audit Reports
Entity-Level Fraud Risk Assessment Process Report
This sample fraud risk assessment report provides an overview of the process one company undertook to satisfy the requir...
Subscriber Content