The following 318 items are listed by Content Data.
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
This comprehensive tool includes two sample IT disaster recovery plan checklists with best-practice questions for pre-pl...
Audit Programs
Purchasing, AP, Travel and Entertainment Audit Work Program
The purpose of this work program is to provide the general steps used to perform an audit of purchasing, A/P, travel and...
Audit Programs
System Implementation Audit Work Program
Access the general steps for reviewing system implementation, including guidance on data conversion strategy and process...
Audit Programs
Security Management Audit Work Program
Use the steps included in this sample work program to conduct an efficient security management audit.
Audit Programs
Distribution Center and Consigned Inventory Audit Work Program
The purpose of this work program is to provide the general steps used for an inventory audit of a distribution center fo...
Policies & Procedures
Network Security Policy
Our Network Security Policy is designed to help companies protect their user accounts, corporate data and intellectual p...
Policies & Procedures
Access Management Policy
Ensure that access to all your organization’s systems and applications is properly approved and monitored with our Acces...
Audit Reports
Expenditure Process Review Report
Our Expenditure Process Review Report includes a future-state design to consider when reviewing your organization’s expe...
Audit Programs
System Post-Implementation Audit Work Program
Organizations can use the three audit program samples in this tool to assess the usage, supporting information technolog...
Guides
Auditing IT Governance Guide
Use this comprehensive guide to focus on the optimal investment in, and the proper management of, critical IT resources.
Policies & Procedures
IT System Development Lifecycle (SDLC) Methodology Policy
This policy defines the methodologies and processes for the effective implementation of application development projects...
Policies & Procedures
Intranet and Internet Security Policy
This tool contains two sample policies that outline guidelines for a company's internet and intranet security.