Mobile and Remote Computing Internal IT Policy
Provided is a sample policy statement developed to detail the proper usage of organization resources and the organization's expectations for all employees utilizing them
Published on May 05, 2010
Critical Security Audit Considerations
This article will address specific policies, procedures, and methods related to the security portion of an information technology internal audit
Published on February 25, 2013
A Practice Aid for Records Retention
This is an overview of what record retention is and its policy and procedures requirements
Published on December 06, 2012
Information Security Management
Available resources to broaden understanding of information security issues and concerns.
Published on October 09, 2014
Generally Accepted Privacy Principles
The AICPA/CICA Privacy Task Force, developed the Generally Accepted Privacy Principles (GAPP). This document supersedes the AICPA/CICA Privacy Framework.
Published on January 22, 2014
How ISO 27002 Relates to GAPPs Security for Privacy Principle
This mapping document provides users of ISO 27002 with an understanding of how information security management criteria relate to privacy requirements of GAPP.
Published on September 24, 2014
2010 Top Ten Initiatives
The 2010 Top Ten Initiatives list include technology issues from an accounting firm or a business’s perspective.
Published on July 03, 2013
International Privacy Regulations
This section provides an overview of international developments on information privacy.
Published on June 06, 2013
Frequently Asked Questions About Privacy Services
This article presents a series of frequently asked questions regarding privacy and privacy services.
Published on January 16, 2014
Information Security Management Content Suite
The following content is intended to introduce CPAs to the basic concepts and terminology surrounding IT security.
Published on February 15, 2013