## Abstract Information technology (IT) and systems have become the backbone of almost every organization. So, good IT audits are essential to ensure proper controls, security, and efficient functioning. But it's not easy to implement an IT audit strategy that justifies its cost and promotes effect
The legal side of IT auditing
β Scribed by James A. Tackett; Fran Wolf
- Publisher
- John Wiley and Sons
- Year
- 2011
- Tongue
- English
- Weight
- 152 KB
- Volume
- 22
- Category
- Article
- ISSN
- 1044-8136
No coin nor oath required. For personal study only.
β¦ Synopsis
Abstract
Information technology (IT) audit professionals have traditionally viewed themselves as computer and information systems specialists. However, recent legal and regulatory trends require every IT auditor to be familiar with the rules and regulations for storing, securing, and transmitting digital business information. Companies that fail to store mandated eβdataβor send it to third parties without meeting certain legal conditionsβcan get into serious legal trouble.
So how much do you know about the legal side of IT auditing? What you don't know can hurt your firm and your career. But the information and advice in this article can help protect you . Β© 2011 Wiley Periodicals, Inc.
π SIMILAR VOLUMES
## Abstract The role of the audit committee seems to be constantly changing. Audit committees are being given everβgreater responsibilities lately. Some authorities seem to use them as a dumping ground for whatever extra responsibilities they want companies to shoulder. The latest controversy may
## Abstract Investigations into employee embezzlement, theft, and money laundering have taken on a new wrinkle: many now fall under the requirements of the Fair Credit Reporting Act. How does this affect audits and investigations? __Β© 2003 Wiley Periodicals, Inc.__
## Abstract An expert in IT audit and security reveals the greatest audit risks discovered by his firm in 2006. An overemphasis on SarbanesβOxley (SOX)βrelated servers left companies with fewer resources to identify other risks. The author explains what they are and how to eliminate them. __Β© 2007