Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

ME3.3 - Evaluation of Compliance With External Requirements

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective ME3.3 - Evaluation of Compliance With External Requirements is contained within Process Popup Ensure Compliance With External Requirements.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
3 Members
0 Online
3216 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!


Evaluation of Compliance With External Requirements

Confirm compliance of IT policies, standards, procedures and methodologies with legal and regulatory requirements.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Good practices for dealing with laws and regulations incorporated effectively into enterprise arrangements
  • Increasing process performance and compliance with laws and regulations
  • Deviations identified to support timely corrective action
  Risk Drivers
  • Financial losses and penalties
  • Decreased customer and business partner satisfaction
  • Non-compliance incidents not identified, adversely impacting the enterprise’s performance and reputation
  • Increased likelihood of disputes

View Control Practices  help

Hide Control Practices  help

  1. Regularly evaluate IT organisational policies, standards, procedures and methodologies to ensure compliance with relevant legal, regulatory and contractual requirements. Ensure that gaps are addressed and changes are reflected in the policies, standards and procedures on a timely basis.
  2. Periodically evaluate IT processes and activities to ensure adherence to applicable legal, regulatory and contractual requirements.
  3. Regularly evaluate recurring patterns of compliance failures. Where necessary, improve policies, standards, procedures, methodologies, and associated processes and activities.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 500 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 13 days ago
Downloads
Posted by ISACA 23 days ago
This document provides a preview of the information contained in COBIT 5.
Posted by ISACA 426 days ago
This presentation by Robert Stroud, CGEIT, CRISC, ISACA Strategic Advisory Board, addresses the COBIT 5 framework, the critical aspects of COBIT 5, and what is available.
Posted by ISACA 426 days ago
Posted by ISACA 534 days ago
Posted by ISACA 534 days ago

Events & Online Learning: 18 total

Journal Articles: 500 total

Volume 2, 2014
by James Baird, CISM, CISSP, ISO 27001 LI, ITIL (F)
There is an axiom for authors that states to be a successful writer, one must know the reader.
Volume 2, 2014
by Key Mak, CISM, CAP, CISSP, ITIL, PMP, Security Plus, ECMp
Whether launching an information security project or developing a road map for an enterprise, determining where to start can be overwhelming.
Volume 2, 2014
by M. Faisal Naqvi, CISA, AMBCI, CISSP, ISO 27000 A, ISO 27000 MI
Auditing is not a one-time exercise, but rather it is a continuous and ongoing process no matter what system or provider is in use.
Volume 2, 2014
by John H. White, Ph.D., CISA, CPA
IT professionals must be aware of the recent, important changes in the COSO framework.
Volume 2, 2014
by Myles Suer, Chane Cullens and Don Brancato
COBIT 5 fosters the use of balanced scorecards and goal cascades to help IT leaders show that IT is managing its ship for the good of the enterprise.
Volume 2, 2014
by Jide Olakunle, CISA, CISM, CISSP
Cyberattacks and the resulting security breaches are part of the rapidly expanding security threats organizations face.

Wikis: 2 total

Blog Posts: 218 total

22 Mar 2014
SGSI Risk Management in LATAM-Argentina
Posted By : GMB_Gustavo Blanco | 0 comments
21 Mar 2014
You are invited to comment on my post in ISACA Now which can be accessed using the following link: Title: From games to government, babies to business--the role of strategyLink: http://www.isaca.org/Knowledge-Center/Blog/Lists/Posts/Post.aspx?ID=386 Shahi...
Posted By : SA | 0 comments
"Combatirse a sí mismo es la guerra más difícil; vencerse a sí mismo es la victoria más bella"Friedrich von Logau (1605-1655) Poeta alemán.En estos momentos en que la contratación de un profesional para una empresa debe de ser un tema muy bien planteado, ...
Posted By : Javier | 0 comments
13 Mar 2014
Complying with a multitude of complex regulations, assessing risks of non-compliance with each statute and guideline, implementing controls for every process across multiple lines of business and at every level of an organization can be overwhelming. So m...
Posted By : CraigerGRC | 0 comments
11 Mar 2014
The concept of three “Value Disciplines” of “Operational Excellence,” “Product Leadership” and “Customer Intimacy” was introduced by Michael Treacy and Fred Wiersema in 1993. It defines the value creation strategy of the organization. It provides a focus ...
Posted By : SA | 0 comments
Community of Sponsoring Organizations, essentially the large audit/consulting firms are big proponents of COSO as an ERM framework of choice. However, ERM programs must work with ITRM programs as majority if not almost all enterprises have their key bus...
Posted By : Umesh391 | 0 comments