Privacy

The following 210 items are listed by Content Data.
Audit Programs

IT Physical Security Audit Work Program

This work program sample can be used to perform an audit of the physical security of your IT facilities.
Subscriber Content
Mon, Mar 27, 2023
Policies & Procedures

Cellular Phone Policy

Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Subscriber Content
Mon, Feb 20, 2023
Articles

Robert Half Chief Digital Officer: Connecting and Collaborating Will Be Critical in 2035

Protiviti’s Joe Kornik sat down with Colin Mooney, chief digital officer at Robert Half, to talk about emerging technolo...
Subscriber Content
Mon, Feb 20, 2023
Articles

Hong Kong CEO: Business With a Purpose — and Partnerships — Is the Future of ESG

The Mekong Club’s CEO believes that when it comes to business with a purpose, a company needs to do more than commit to ...
Subscriber Content
Mon, Jan 30, 2023
Policies & Procedures

IT Personnel Security Policy

This tool contains two sample policies that define the security standards that must be applied regarding personnel.
Subscriber Content
Mon, Jan 30, 2023
Policies & Procedures

Building and Data Center Physical Security Policy

This policy sample can be used by organizations to ensure that company buildings and data centers remain secure. 
Subscriber Content
Tue, Jan 17, 2023
Performer Profiles

ConocoPhillips: Evolving Internal Audit Toward a Technology-Enabled Future

Bob Heinrich, general auditor at ConocoPhillips, highlights his team’s critical efforts toward developing an organizatio...
Subscriber Content
Mon, Jan 9, 2023
Guides

Data Migration Strategy Guide

This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Mon, Jan 9, 2023
Audit Reports

Internal Audit Strategic Vision Report

Auditors can use this audit report template to form an internal audit strategic plan and develop a road map to achieve t...
Subscriber Content
Mon, Dec 12, 2022
Risk & Control Matrices - RCMs

Manage Data Center Operations: Database Management RCM

This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Mon, Dec 12, 2022
Newsletters

The Board’s Role in the Transformation of Work

In this issue of Board Perspectives, we explore how boards and directors can facilitate a hybrid work model.
Subscriber Content
Mon, Oct 31, 2022
Policies & Procedures

Infrastructure Security Policy

Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Mon, Sep 26, 2022