This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice (http://www2.deloitte.com/ca/en/legal/cookies.html) for more information on the cookies we use and how to delete or block them.
The full functionality of our site is not supported on your browser version, or you may have 'compatibility mode' selected. Please turn off compatibility mode, upgrade your browser to at least Internet Explorer 9, or try using another browser such as Google Chrome or Mozilla Firefox.

How to demonstrate data security compliance for even the most skeptical auditor

  • United States Image

Aug 07, 2018

On August 7, 2018, Accounting Today published an article on how in order for organizations to ensure compliance with federal mandates to protect the privacy of financial, investor and personal data that’s visible to your employees, one crucial requirement is an indisputable audit trail that satisfies the evidence requirements of even the most scrutinizing auditor.

This audit trail needs to include complete visibility into every action performed by staff, especially those with access to customer, financial and investor data. A good system should track every application used, webpage visited, record copied, file saved, print screen generated, and page printed, etc. Only then will the organization truly know whether protected data has been appropriately accessed and used, or if users, whether their intent was malicious or even accidental, properly used that information. The system should also be able to detect external attackers posing as insiders via stolen credentials.

Review the full article on Accounting Today's website.

Correction list for hyphenation

These words serve as exceptions. Once entered, they are only hyphenated at the specified hyphenation points. Each word should be on a separate line.