Information Management and Technology Assurance (IMTA) Resources 

    The Information Management and Technology Assurance Center helps members and the accounting community leverage technology to provide expertise in information assurance, internal controls, business process improvement, data analytics, and enhanced business reporting. 
     A desktop computer to search for the Top Technology Initiatives  A key to maintaining IT privacy  A folder of documents for IT Assurance Services

     Top Technology Initiatives

    The objective of the annual survey is to understand what are the top technology priorities and concerns for accounting professionals and how to manage risks associated with those concerns.


    Privacy encompasses the rights and obligations of individuals and organizations with respect to the collection, use, disclosure, and retention of personal information.

     IT Assurance

    Assurance Services are independent professional services to improve the quality of information to management as well as other decision makers within an organization.

    Highlighted Resources

    Cloud Computing

    Laptops in the cloud represent cloud computingWith the increasing trend for companies to outsource (such as certain accounting or IT functions), cloud computing has increasingly become a solution for organizations.  It’s an innovative and increasingly popular model of software deployment that offers enterprise-class software function without traditional up-front infrastructure costs or the unpredictable support and maintenance costs of on-site software and hardware.

    From infrastructure to security to personal productivity to workflow, CRM, accounting and ERP, there are today mature, cloud-based applications available in nearly every segment of the software marketplace.

    Visit the Cloud Computing page for additional information.

    Information Security Management

    Desktops to search for information security managementInformation Security is one of the major areas of concern for our government as it faces threats to the nation's critical infrastructure. For organizations, prevention of compromise to their information assets makes this issue a priority as focus and resources are placed on the formation of information security policy and the implementation of control measures to prevent access and/or manipulation of their systems and data.

    With the ever-increasing demands and requirements to ensure your organization’s or clients' business data, information, and systems are secure, the AICPA’s Information Management and Technology Assurance Center website provides the following content designed to help you in your own practice, as well as to serve as resources when advising or providing assurance to others. 

    Visit the Information Security Management page for additional information.

    Business Intelligence

    A grid represents business intelligenceBusiness intelligence (BI) refers to the coordinated deployment of technologies, applications and business processes to support the collection, integration, analysis, and presentation of business information. The purpose of business intelligence is to help managers and others responsible for business strategy better understand their organization’s operations, make wiser, more informed business decisions, and manage operational performance. 

    BI systems use data that has been gathered into a data warehouse or a data mart to present historical, current, and predictive views of business operations. Operational data may also be used. The software components of a BI system support the extraction, analysis, and reporting of information, providing detailed sales, production, financial and other business data. This information may be compared to historical data, or data related to comparable companies in order to provide valuable benchmarks.

    Visit the Business Intelligence page for additional information.

    Additional IMTA Resources
    A stack of additional IMTA resourcesBusiness Continuity Management and Disaster Recovery Planning
    Business continuity management is the development, monitoring, and updating of the process by which organizations plan for continuity of their business in the event of loss or disaster through theft, virus/malware infestation, weather damage, accidents, or other malicious destruction.

    Enterprise Risk Management
    Enterprise risk management expands on internal control function, providing a more robust and extensive focus on the subject of risk management.

    Internal Control
    This page explores Internal Control and the control environment, risk assessment, control activities, and information and communication monitoring.

    IT Governance
    IT governance is a framework that ensures that technology decisions are made in support of the business' goals and objectives.

    Performance Management and Business Reporting
    Performance Management involves the monitoring and evaluation of individual business processes to ensure that distinct business segments are operating in the service of broader, organization-wide strategic goals.

    Systems Implementation and Technology Integration
    System implementation is the practice of creating or modifying a system to create a new business process or replace an existing business process. Technology integration is the practice of integrating multiple system activities to interact and generate information efficiently.

    Trust Services
    Trust Services are defined as a set of professional assurance and advisory services based on a common framework to address the risks and opportunities of IT.

    Copyright © 2006-2015 American Institute of CPAs.