Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • '''ME 3.4 Positive Assurance of Compliance'''<br> ...n a timely basis to address any compliance gaps. Integrate IT reporting on compliance progress and status with similar output from other business functions.<br> ...
    2 KB (327 words) - 13:18, 4 May 2006
  • ==Compliance With Legal Requirements== The objective of this category is to ensure compliance with all statutory, regulatory, certificatory or contractual obligations.<b ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat ...<Your Company Name> to gauge and promote end-user awareness of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat ...<Your Company Name> to gauge and promote end-user awareness of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • '''10. Risk: Reactive security monitoring results in data compromise and financial loss or liability.'''<b :a. SOX.4.2.1.10: UNIX administration team is notified when security violations occur.<br> ...
    3 KB (421 words) - 20:20, 12 June 2006
  • ...otification message produced by the system being tested to verify that the security administrators are being proactively notified of possible access violations ...ovide a date, time, source, destination, and responsible entity to satisfy compliance requirements.<br> ...
    3 KB (422 words) - 00:09, 13 June 2006
  • ...ver authorization, authentication, nonrepudiation, data classification and security monitoring may result in inaccurate financial reporting.''' ...security standards has been developed that supports the objectives of the security policy. ...
    3 KB (360 words) - 16:59, 25 June 2006
  • '''PO 4.8 Responsibility for Risk, Security and Compliance'''<br> ...es may need to be assigned at a system-specific level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • '''DS 12.2 Physical Security Measures '''<br> ...ilities for monitoring and procedures for reporting and resolving physical security incidents need to be established. ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''(a)''' The Director shall oversee agency information security policies and practices, by—<br> :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • ...sting templates containing questions that can be used to gauge and promote security awareness in specific areas. The testing can be distributed and responses c ...ity Best Practices and Addressing Regulatory Mandates Testing Template:|'''Security Best Practices and Addressing Regulatory Mandates test Template''']]<br> ...
    2 KB (289 words) - 16:08, 3 August 2006
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...rmation security, including through ensuring timely agency adoption of and compliance with standards promulgated under section 11331 of title 40;<br> ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (303 words) - 17:36, 5 May 2006
  • ...ant risks, encourages cross-divisional co-operation and teamwork, promotes compliance and continuous process improvement, and handles process deviations (includi ...performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements analysis from t ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ...c attention to communicating IT security awareness and the message that IT security is everyone’s responsibility.<br> ...f, information asset owners, etc.) are not informed of or trained in their security responsibilities.'''<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed. ''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (340 words) - 17:40, 5 May 2006
  • ...Security roles are not defined leading to an ineffective implementation of security responsibilities within the organization.'''<br> :::a. SOX.2.7.3: Roles of the security organization and individuals within it are clearly defined and communicated ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ...1:|'''SOX.2.7.1''']] End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed.<br> ITIL Security Management, Security Management Measures.<br> ...
    3 KB (420 words) - 14:06, 8 August 2006
  • ...s responsibility for information security, internal control and regulatory compliance. The level of supervision should be in line with the sensitivity of the pos ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (329 words) - 19:26, 1 May 2006
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)