Mobile and Remote Computing Internal IT Policy
Provided is a sample policy statement developed to detail the proper usage of organization resources and the organization's expectations for all employees utilizing them
Published on May 05, 2010
Critical Security Audit Considerations
This article will address specific policies, procedures, and methods related to the security portion of an information technology internal audit
Published on February 25, 2013
A Practice Aid for Records Retention
This is an overview of what record retention is and its policy and procedures requirements
Published on December 06, 2012
Information Security Management
Available resources to broaden understanding of information security issues and concerns.
Published on October 09, 2014
Generally Accepted Privacy Principles
The AICPA/CICA Privacy Task Force, developed the Generally Accepted Privacy Principles (GAPP). This document supersedes the AICPA/CICA Privacy Framework.
Published on January 22, 2014
How ISO 27002 Relates to GAPPs Security for Privacy Principle
This mapping document provides users of ISO 27002 with an understanding of how information security management criteria relate to privacy requirements of GAPP.
Published on September 24, 2014
Generally Accepted Privacy Principles in WebTrust Engagements
These frequently asked questions provide clarification on the application of GAPP,WebTrust Online Privacy and other Trust Services engagements.
Published on September 25, 2014
2010 Top Ten Initiatives
The 2010 Top Ten Initiatives list include technology issues from an accounting firm or a business’s perspective.
Published on July 03, 2013
Cloud computing resources for AICPA Information Management and Technology Assurance (IMTA) section members.
Published on October 23, 2014
International Privacy Regulations
This section provides an overview of international developments on information privacy.
Published on June 06, 2013