The following 164 items are listed by Content Data.
Policies & Procedures
Software Acquisition, Implementation and Maintenance: Application Development and Implementation Policy
The purpose of this sample policy is to control application development and to ensure that application development is ef...
Subscriber Content
Policies & Procedures
Sustainability Policy
This sample policy helps to ensure that principles of sustainability are incorporated into actions carried out by the co...
Subscriber Content
Checklists & Questionnaires
Due Diligence Checklist
Use our customizable due diligence checklist to make sure you have a complete financial picture of potential acquisition...
Subscriber Content
Checklists & Questionnaires
IT Due Diligence Questionnaire
This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Checklists & Questionnaires
IT Process Questionnaire: Computer Operations Management
This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Industry & Process CPE Courses
Physical Inventory - Performing the Physical Inventory (KLplus CPE Course)
In this course, we will cover performing the physical inventory and the risks associated with this phase of the inventor...
Audit Reports
Financial Due Diligence Report
This sample report presents findings from a financial due diligence analysis of a company being acquired.
Subscriber Content
Checklists & Questionnaires
Internal Controls Structure Questionnaire
The purpose of this questionnaire is to help in the assessment of a company’s general controls and internal controls by ...
Subscriber Content
Checklists & Questionnaires
Internal Controls Checklist
This sample internal controls checklist provides a list of items to consider when assessing internal controls for common...
Subscriber Content
Audit Programs
Virtual Private Network (VPN) Administration Audit Work Program
This audit work program includes test steps in the areas of documentation, logging, monitoring and user pool for VPN adm...
Subscriber Content
Policies & Procedures
Server Configuration Policy
This policy defines the standard security settings utilized on a company's servers.
Subscriber Content
Process Flows
Impairment Process Flow
This process flow details the various steps involved in the impairment process, covering determination of reporting unit...
Subscriber Content