Search results

Jump to navigation Jump to search
View ( | next 20) (20 | 50 | 100 | 250 | 500)
  • ...ities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in continuous audit activities by helping to automate the ...mation can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fraud, and inefficiencies. It ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...' describes the legal issues related to use of inter-networked information technology. It is less a distinct field of law in the way that property or contracts a ...d address them by our means. We are forming our own Social Contract . This governance will arise according to the conditions of our world, not yours. Our world i ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...nology Security Policies Demystified which is a combination of governance, technology and vigilance. If you are preparing to lead a company’s security function o ...tions however that does not provide a return on your investment; one being information security, both physical and digital unless IT security is your business.<br ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...hem. Query each of your third-party commercial software suppliers for this information as well; then, examine each product to ensure you are using it in complianc ...ties. Most importantly, project mechanics dictate the level of control and governance that influence a wide variety of factors, ranging from security to IP risk ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...proaches intended to facilitate the delivery of high quality [[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]] ...op ITIL. IBM claims that its "Yellow Books" (''A Management System for the Information Business'') were key precursors. According to IBM: ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...orporation (or company) is directed, administered or controlled. Corporate governance also includes the relationships among the many Stakeholders (corporate) inv ...rporate governance subject, such as the stakeholder view and the corporate governance models around the world. ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • Personal data are defined as "any information relating to an identified or identifiable natural person ("data subject"); ...o be very broad. Data are "personal data" when someone is able to link the information to a person, even if the person holding the data cannot make this link. Som ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...panies. The act also covers issues such as auditor independence, corporate governance, internal control assessment, and enhanced financial disclosure. ...ate oversight of accountants, lack of auditor independence, weak corporate governance procedures, stock analysts' conflict of interests, inadequate disclosure pr ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...ns for those public companies not accurately representing data and company information. ...step in any risk assessment process. Senior management should incorporate information on IT issues such as resource limitations, threats, priorities, and key con ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ==Information Technology Auditor's Glossary== A service that gathers information from many websites, presents that information to the customer in a consolidated format, and, in some cases, may allow the ...
    74 KB (11,078 words) - 13:08, 9 April 2007
View ( | next 20) (20 | 50 | 100 | 250 | 500)