Search Results

    Page  1 2
    Showing results 1 - 10 of 13
    Order by:


    Federal, State and Other Professional Regulations

    Overview CPAs engaged to perform privacy advisory services and attestation engagements must follow the pertinent, laws, rules, and standards
    Published on March 08, 2013

    2008 TTI Case Studies Best Practices Yield Results

    Member Profile Scott Cytron interviews Dan Ramey on the 2008 Top Technology Initiatives list.
    Published on February 19, 2013

    Business Process Reengineering

    Article Although the "BPR" label is applied to many situations, a proper BPR project may involve a thorough assessment. In this article, Janis Parthun explores implications to accounting.
    Published on February 05, 2013

    CAATTs Ideal for Efficient Audits

    Article With new issued and revised auditing standards and audit risk standards, this article explores the renewed emphasis on risk identification and certain key financial statement areas and assertions.
    Published on February 05, 2013

    Generally Accepted Privacy Principles in WebTrust Engagements

    FAQ These frequently asked questions provide clarification on the application of GAPP,WebTrust Online Privacy and other Trust Services engagements
    Published on January 16, 2014

    Privacy / Data Protection

    Overview Privacy encompasses the rights and obligations of individuals and organizations with respect to the collection, use, disclosure, and retention of personal information.
    Published on March 31, 2014

    Performing an Audit of Internal Control in an Integrated Audit

    Overview The Center for Audit Quality (CAQ) has developed a new practical pointers reference source for public company auditors that provides lessons learned from integrated audits of internal control over financial reporting (ICFR).
    Published on February 27, 2013

    How ISO 27002 Relates to GAPPs Security for Privacy Principle

    Executive Summary This mapping document provides users of ISO 27002 with an understanding of how information security management criteria relate to privacy requirements of GAPP.
    Published on January 16, 2014

    CAATTs Identifies Potentially Fraudulent Activities

    Article This case study explores how Computer Assisted Auditing Tools and Techniques (CAATTs) enables you to discover fraud in a very short timeframe.
    Published on March 18, 2013

    2014 AICPA Top Technology Initiatives Resource Index

    Overview The Top Technology Initiatives Resource Index provides resources to address this year’s Top 10 Priorities.
    Published on April 04, 2014

    Page  1 2
    Showing results 1 – 10 of 13
    Show Results per page
    Copyright © 2006-2014 American Institute of CPAs.