Search Results

    Page  1 2 3 4
    Showing results 1 - 10 of 36
    Order by:


    2009 Top Technology Initiatives and Honorable Mentions

    Survey This list includes the top ten initiatives as well as five additional initiatives that IT decision makers should keep an eye on.
    Published on February 19, 2013

    Red Flags Rule Overview

    Federal Law Under the Red Flags Rules, financial institutions and creditors must develop and implement a written Identity Theft Prevention Program.
    Published on March 07, 2013

    2010 Top Ten Initiatives

    Toolkit The 2010 Top Ten Initiatives list include technology issues from an accounting firm or a business’s perspective.
    Published on July 03, 2013

    Sample Employee Privacy Notice

    Sample Policy Use this example letter of a customer privacy notice when reviewing or assisting with the preparation of a privacy policy.
    Published on March 12, 2013

    Privacy Risk Assessment Questionnaire

    Article Key questions businesses should ask about privacy risk, implementing sound privacy policies and practices, managing privacy risk, and obtaining privacy assurance.
    Published on March 12, 2013

    2010 Top Technology Initiatives Complete Listing

    Survey This page lists technology initiatives along with survey questions that were used in the 2010 TTI survey.
    Published on February 19, 2013

    2008 TTI Case Study Technology is Job One

    Member Profile Scott Cytron interviews James Bourke on the 2008 Top Technology Initiatives list.
    Published on March 15, 2013

    2008 Top Technology Initiatives Case Studies

    Case Study Scott Cytron interviews three users of the Top Technology Initiatives list to help drive their work decisions and prioritize their projects.
    Published on January 30, 2013

    2009 Top Technology Initiatives

    Survey The initiatives included in the 2009 TTI survey are intended to represent the CPA’s unique perspective regarding the initiatives that may impact financial management
    Published on February 19, 2013

    Digital Identity and Authentication Technologies

    Article This article provides an overview of digital identity and authentication technologies used to verify a user's identity.
    Published on May 09, 2013

    Page  1 2 3 4
    Showing results 1 – 10 of 36
    Show Results per page
    Copyright © 2006-2014 American Institute of CPAs.