๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Is your auditor protecting your confidential data?

โœ Scribed by Abbie Gail Parham; Leslie B. Fletcher; A. Lee Gurley III


Publisher
John Wiley and Sons
Year
1998
Tongue
English
Weight
342 KB
Volume
9
Category
Article
ISSN
1044-8136

No coin nor oath required. For personal study only.

โœฆ Synopsis


Independent auditors are required to maintain the confidentiality of client-related information. But a published study suggests that accounting firms may not be providing adequate protection for confidential client electronic data on PCs or laptops. The authors detail some key steps CFOs should take to make sure that auditors safeguard sensitive company information.

alk into any business office today and one of the first things you will notice is a PC at every workstation. Notice executives w on business trips and they will more than likely be carrying laptop computers. This increase in the use of personal computers has changed the way information security is evaluated and implemented. Management has always been charged with the responsibility of safeguarding assets. Now assets include more than cash, inventory, and equipment. Systemsmustbedesignedtosafeguardproprietarycompany information (for example, new product developments, market surveys, pricing strategies, and financial projections), confidential customer files, and personnel records and compensation agreements.


๐Ÿ“œ SIMILAR VOLUMES


How to protect your data
โœ Helen Meyer ๐Ÿ“‚ Article ๐Ÿ“… 1996 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 254 KB

word processor to hunt through them for particular names or keywords like 'password'or 'cash'. Once likely fraud or theft targets have been established, they can then fine-tune the original scanning program to record only messages sent to the pagers they identify Pager messages in Britain are sent o

How Safe is Your Data Center?
โœ John E. Nevola ๐Ÿ“‚ Article ๐Ÿ“… 1995 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 264 KB