Search results

Jump to navigation Jump to search
  • ...ry as a basic framework for implementing effective corporate governance of Information and communication technologies within any organization.<br> ...tm?refid=Ref1135 ISO/IEC standard for corporate governance of information technology].<br> ...
    1 KB (150 words) - 16:22, 20 April 2010
  • ...nce of information technology standard, provides a framework for effective governance of IT to assist those at the highest level of organizations to understand a ...ganizations on the effective, efficient, and acceptable use of Information Technology (IT) within their organizations. It is organized into three prime sections, ...
    1 KB (147 words) - 12:21, 2 May 2010
  • ...cial institution risk management processes to ensure effective information technology (IT) management.<br> ...of technology raise the importance of IT management in effective corporate governance.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...Framework (MOF) 4.0''' is a series of guides aimed at helping information technology (IT) professionals establish and implement reliable, cost-effective service ...2008, MOF 4.0 integrates community-generated processes; [[It-governance | governance]], [[Risk_management | risk]], and [[compliance]] activities; management re ...
    3 KB (461 words) - 14:19, 23 April 2010
  • [[Category:Information technology management|Governance]] [[Category:Information technology governance| ]] ...
    2 KB (235 words) - 09:48, 23 October 2012
  • ...It is about the management, control and protection of '''all''' aspects of Information / Data in whatever form for example paper records or X-Ray Film and fiche. ...of information and data that is critical to the organization. Weather the information data is Held, Obtained, Recorded, Used, Shared (HORUS)*. The data may be pe ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...performance management and [[risk management]]. The rising interest in IT governance is partly due to compliance initiatives, for instance [[Sarbanes-Oxley]] in ...ssues was to defer all key decisions to the company's IT professionals. IT governance implies a system in which all stakeholders, including the board, internal c ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...rocess''' that tracks all of the individual Configuration Items (CI) in an information system which may be as simple as a single server, or as complex as the enti ...mental component of CM is the CM database ([[CMDB]]) which contains the CI information and is used to understand the CI relationships and track their configuratio ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...most comprehensive, most beneficial, most accessible, and freely available information security guidance framework on the planet.<br> ...zation no matter what the size, shape, or form they come in. By protecting information, you protect identities, profits, reputations, and the list goes on and on. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...in delivering on the strategy. Work with the board to define and implement governance bodies, such as an IT strategy committee, to provide strategic direction to Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    3 KB (410 words) - 13:30, 4 May 2006
  • ...tled ''Information technology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version pu ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...ons and requirements on the proper and appropriate business use of Company Technology Resources while using a Company supported and or Employee-owned device. ## Company Technology Resources are provided primarily for official and authorized Company busine ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ==FFIEC Information Technology Examination Handbook Executive Summary== ...ve effort of the FFIEC’s five member agencies, has replaced the 1996 FFIEC Information Systems Examination Handbook (1996 Handbook). ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...ing information management costs through automated categoriza... | Cutting information management costs through automated categoriza...]] #[[Enterprise Fax Technology: Changing with the Times | Enterprise Fax Technology: Changing with the Times]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...tled ''Information technology - Security techniques - Code of practice for information security management''. ...ng or maintaining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...res that all user organizations and their auditors have access to the same information and in many cases this will satisfy the user auditor's requirements.<br> ...ol oriented professionals who have experience in accounting, auditing, and information security. A SSAE 16 engagement allows a service organization to have its co ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...systems and processes used for those purposes. While focused dominantly on information in digital form, the full range of IA encompasses not only digital but also Information assurance as a field has grown from the practice of [[information security]] which in turn grew out of practices and procedures of [[computer ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...ly dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...tion’s operations, including risks in new products, emerging technologies, information systems, and electronic banking.<br> '''Control issues and risks associated with reliance on technology can include:''' ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...poration (or company) is directed, administered or controlled. Corporate [[governance]] also includes the relationships among the many Stakeholder (corporate) in ...rporate governance subject, such as the stakeholder view and the corporate governance models around the world.<br> ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...ities, such as control and [[risk assessment]]s, on a more frequent basis. Technology plays a key role in continuous audit activities by helping to automate the ...mation can be evaluated at any given point of time, it also means that the information is able to be verified constantly for errors, fraud, and inefficiencies. It ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • ...' describes the legal issues related to use of inter-networked information technology. It is less a distinct field of law in the way that property or contracts a ...d address them by our means. We are forming our own Social Contract . This governance will arise according to the conditions of our world, not yours. Our world i ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...nology Security Policies Demystified which is a combination of governance, technology and vigilance. If you are preparing to lead a company’s security function o ...tions however that does not provide a return on your investment; one being information security, both physical and digital unless IT security is your business.<br ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ==Information Security Audit== ...dit. However, information security encompasses much more than IT. Auditing information security covers topics from auditing the physical security of data centers ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...hem. Query each of your third-party commercial software suppliers for this information as well; then, examine each product to ensure you are using it in complianc ...ties. Most importantly, project mechanics dictate the level of control and governance that influence a wide variety of factors, ranging from security to IP risk ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...proaches intended to facilitate the delivery of high quality [[information technology]] (IT) services. ITIL outlines an extensive set of management [[procedure]] ...op ITIL. IBM claims that its "Yellow Books" (''A Management System for the Information Business'') were key precursors. According to IBM: ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ...orporation (or company) is directed, administered or controlled. Corporate governance also includes the relationships among the many Stakeholders (corporate) inv ...rporate governance subject, such as the stakeholder view and the corporate governance models around the world. ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • Personal data are defined as "any information relating to an identified or identifiable natural person ("data subject"); ...o be very broad. Data are "personal data" when someone is able to link the information to a person, even if the person holding the data cannot make this link. Som ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...panies. The act also covers issues such as auditor independence, corporate governance, internal control assessment, and enhanced financial disclosure. ...ate oversight of accountants, lack of auditor independence, weak corporate governance procedures, stock analysts' conflict of interests, inadequate disclosure pr ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...ns for those public companies not accurately representing data and company information. ...step in any risk assessment process. Senior management should incorporate information on IT issues such as resource limitations, threats, priorities, and key con ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ==Information Technology Auditor's Glossary== A service that gathers information from many websites, presents that information to the customer in a consolidated format, and, in some cases, may allow the ...
    74 KB (11,078 words) - 13:08, 9 April 2007