Information technology controls

Results: 1397



#Item
31Identifiers / Military technology / United States Department of Commerce / United States administrative law / International trade / International Traffic in Arms Regulations / Security / Office of Management and Budget / Freedom of information legislation / Government / Directorate of Defense Trade Controls / Weapons trade

asabaliauskas on DSK5VPTVN1PROD with NOTICESFederal Register / Vol. 80, NoTuesday, June 2, Notices

Add to Reading List

Source URL: pmddtc.state.gov

Language: English - Date: 2015-06-02 12:13:48
32Computing / Cloud computing security / Sarbanes–Oxley Act / Internal control / Cloud computing / Audit / Information technology controls / Governance /  risk management /  and compliance / Auditing / Accountancy / Business

Sarbanes-Oxley Compliance for Cloud Applications What Is Sarbanes-Oxley? Sarbanes-Oxley Act (SOX) aims to protect investors and the general public from accounting errors and fraudulent practices. For this purpose, corpo

Add to Reading List

Source URL: www.cloudlock.com

Language: English - Date: 2015-05-27 09:39:22
33Business / Internal audit / Internal control / Audit committee / Audit / External auditor / Risk assessment / Information technology audit process / Entity-level controls / Auditing / Risk / Accountancy

CARLSBERG BREWERY MALAYSIA BERHAD 35 Statement on Internal Control Responsibility

Add to Reading List

Source URL: carlsbergmalaysia.com.my

Language: English - Date: 2012-03-17 05:38:04
34EBay / PayPal / Credit card / Fee / Seoul Broadcasting System / Professional certification / Electronic commerce / Business / Technology

SBS Institute Policies Overview The Certification Policy enables and charges The SBS Institute to establish processes and requirements to manage information and security controls related to The SBS Institute. The Certifi

Add to Reading List

Source URL: www.protectmybank.com

Language: English - Date: 2015-05-31 17:52:18
35Computing / Computer network security / National security / Information technology management / Security service / Information security / Service-level agreement / Security controls / Data center / Security / Data security / Computer security

DOC Document

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:35
36Information technology audit / United States Department of Homeland Security / Risk / Financial audit / Audit / Information technology controls / Entity-level controls / Internal control / Information technology audit process / Auditing / Accountancy / Business

Information Technology Management Letter for the FY 2014 Department of Homeland Security Financial Statement Audit

Add to Reading List

Source URL: www.oig.dhs.gov

Language: English - Date: 2015-05-27 13:16:32
37Borders of the United States / National security / Science / Office of Field Operations / U.S. Customs and Border Protection / Auditing / Inspector General / Information technology controls / Reliability engineering / Customs services / United States Department of Homeland Security / Government

CBP is on Track to Meet ACE Milestones, but It Needs to Enhance Internal Controls May 11, 2015 OIG-15-91

Add to Reading List

Source URL: www.oig.dhs.gov

Language: English - Date: 2015-05-26 07:29:03
38Prevention / Identity management / Certification Commission for Healthcare Information Technology / CCOW / Information technology security audit / Access control / Password / Audit trail / Kerberos / Security / Computer security / Public safety

Instructions: Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

Add to Reading List

Source URL: www.himss.org

Language: English - Date: 2013-02-13 10:28:31
39Ethics / Information technology audit / Actuarial science / Nonprofit organization / Audit / Entity-level controls / Information technology audit process / Auditing / Risk / Business

Finance Unlocked for Nonprofits (FUN) Oversight Nonprofit  board  members  are  ultimately  responsible  for  the  effective,  responsible  use  of  a   nonprofit’s  resources

Add to Reading List

Source URL: wfc.memberclicks.net

Language: English - Date: 2014-09-12 15:00:51
40Computer security / Business / Information technology audit / Information security / ICQ / Internal control / Information technology security audit / Business continuity planning / Security controls / Auditing / Data security / Security

As public servants, it is our responsibility to use taxpayers’ dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons to place

Add to Reading List

Source URL: finance.utah.gov

Language: English - Date: 2015-05-11 14:09:28
UPDATE