Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this...
|
13
|
A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...
|
8
|
Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.
|
2
|
Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.
|
1
|
Responsibilities for governance of the internal controls system should be integrated into the risk management and overall governance function of the IT organization. Use...
|
2
|
Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...
|
1
|
Use this template as the one document where your metrics and their definitions live, and update it as needed.
|
1
|
The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...
|
12
|
Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.
|
3
|
The data protection policy will outline the standards for protecting corporate data from any risk that it may be exposed to.
|
8
|