Privacy Risk Assessment Questionnaire
Key questions businesses should ask about privacy risk, implementing sound privacy policies and practices, managing privacy risk, and obtaining privacy assurance.
Published on March 12, 2013
2010 Top Ten Initiatives
The 2010 Top Ten Initiatives list include technology issues from an accounting firm or a business’s perspective.
Published on July 03, 2013
Information Security Management
Available resources to broaden understanding of information security issues and concerns.
Published on October 09, 2014
Digital Identity and Authentication Technologies
This article provides an overview of digital identity and authentication technologies used to verify a user's identity.
Published on May 09, 2013
Information Security Management Content Suite
The following content is intended to introduce CPAs to the basic concepts and terminology surrounding IT security.
Published on February 15, 2013
Outsourcing and Privacy
This article discusses the 10 critical questions management should ask about outsourcing and discusses specific privacy concerns associated with outsourcing.
Published on January 16, 2014
Critical Security Audit Considerations
This article will address specific policies, procedures, and methods related to the security portion of an information technology internal audit.
Published on February 25, 2013
Non-CPA Volunteer Sponsor Form
This form allows non-CPAs to obtain membership within IMTA task forces with CPA sponsorship
Published on September 18, 2013
Find a CITP
The CITP Directory is a centralized, searchable database that provides contact information for CITPs across the country. It is also designed to help CITPs advertize their services.
Published on April 17, 2014
Join the Information Management and Technology Assurance Section
The premier technology resource for CPAs! Become part of the community of over 3,600 AICPA members who specialize in information management and technology assurance.
Published on October 02, 2014