Tag: data governance

Usint forensic analytics

Internal Audit Still Lags in Use of Data Analytics

GUEST BLOG These are difficult days for many companies. Recent developments, including the economic downturn and other problems stemming from the coronavirus crisis, threaten the very existence of businesses across several industries, from airlines to retail, to manufacturing. With so much uncertainty and disarray, corporate boards and senior executives are Read More

digital payments

Digital Payments Prompt Review of Internal Audit Procedures in India

India’s Ministry of Finance is examining internal audit procedures and tools to implement a standard internal audit protocol for all government ministries and departments, The Tribune of India reports. The Department of Expenditure requested the update in response to the government’s increased reliance on digital financial transactions. “The Public Financial Read More

GDPR image

EU Courts Strike Down Data Privacy Shield Leaving U.S. Companies Vulnerable

Businesses will need to find new ways of transferring data from the European Economic Area (EEA) to the United States after European courts struck down the EU-U.S. Data Privacy Shield program. The rulings sets new hurdles for companies trying to operate across borders, especially as data and information are increasingly Read More

cybersecurity

Keep Privacy Regs in Mind During COVID-19

The aftermath of COVID-19 may change the way attorneys and other legal professionals think about or execute their work, but the privacy landscape could remain largely untouched. While obligations under the Health Insurance Portability and Accountability Act have been temporarily relaxed to facilitate the public’s access to telemedicine, the enforcement Read More

New Guide Aids Internal Audit Work on Data Privacy Framework

The Institute of Internal Auditors has released a new report to assist internal auditors in assessing their current level of preparedness regarding privacy and data protection issues. The first guide in a three-part series, “Privacy and Data Protection — Internal Audit’s Role in Establishing a Resilient Framework,” provides guidance on Read More

Internal Audit Identifies Data Breach at Nebraska Medical Company

A data breach at health care provider Nebraska Medicine came to light during an internal audit of the system’s electronic medical record system. The hospital notified the Nebraska Attorney General’s office on November 27, and notified affected patients on December 2. The breach involves unauthorized access by an employee, who Read More

data governance tops list of internal audit concerns

Data Governance Tops Cybersecurity as Top Internal Audit Concern

As organizations continue to collect customer and employee data, chief audit executives are becoming increasingly concerned about how their organizations govern and protect it, according to a new report from research and advisory firm Gartner. According to Gartner’s annual Audit Plan Hot Spots Report, data governance has risen to the Read More

cybersecurity image

Survey Identifies Top Tech Challenges for IT Auditors

A new study examines the biggest challenges impacting IT audit professionals as they navigate an evolving risk landscape in an era of digital transformation. The 2019 Global IT Audit Benchmarking Study is the eighth annual audit research project conducted by consulting firm Protiviti and ISACA, a professional association for IT Read More

FB suspends apps

Facebook Banishes Thousands of Apps After Internal Audit

Facebook has suspended tens of thousands of applications on its platform during an internal audit investigation it launched into app developers following the Cambridge Analytica scandal. Many were found to be improperly harvesting user data. “To date, this investigation has addressed millions of apps. Of those, tens of thousands have Read More

living in a digital world

How to Keep Your Cyber Risk Under Control

Businesses today cannot be separated from their digital assets. Data drives every aspect of business, from strategic decisions to tactical operations, and all that data is stored in, accessed by, and transmitted across networked systems. Keeping cyber risks under control is a critical issue for any company. Even small, non-tech-oriented Read More