IT Security

The following 253 items are listed by Content Data.
Blog

What is Cloud Computing?

What is Cloud Computing? Cloud computing is defined as the use of a collection of services, applications, ...
Blog

Electronic Discovery Risks, Challenges and Procedures

Electronic discovery (eDiscovery) refers to the process of searching, locating and securing electronic data...
Blog

External Access Risk: Key Factors You Need to Know

Many businesses today exchange goods, services, information and knowledge using network-enabled technologi...
Audit Programs

Financial Institution Security Audit Work Program

This work program is an aid to assess the quantity of risk and the effectiveness of a financial institution’s risk manag...
Subscriber Content
Mon, Jul 13, 2009
Process Flows

User Access Security Process Flow

This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Mon, Jun 20, 2011
Policies & Procedures

Remote Network Access Policy

This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Subscriber Content
Mon, Sep 19, 2011
Policies & Procedures

Website Privacy Policy

This sample can be used to create an information privacy policy for a company website.
Subscriber Content
Mon, Oct 3, 2011
Audit Programs

System Intrusion Audit Work Program

The objective of this audit work program is to evaluate a business’s ability to detect unauthorized system access attemp...
Subscriber Content
Mon, Mar 5, 2012
Policies & Procedures

Background Checks and Confidentiality Policy: Contractors

This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Subscriber Content
Mon, Apr 2, 2012
Policies & Procedures

Third-Party Access Policy

The purpose of this policy is to define security policies that apply to temporaries, contractors, consultants, and third...
Subscriber Content
Mon, May 28, 2012
Policies & Procedures

User Malicious Software Policy

The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Mon, May 28, 2012
Policies & Procedures

Credit Card Data Purge Policy

This policy outlines a set of procedures for the credit card data purge process including specific purge procedures, a p...
Subscriber Content
Mon, Jun 11, 2012