Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

ME3.3 - Evaluation of Compliance With External Requirements

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective ME3.3 - Evaluation of Compliance With External Requirements is contained within Process Popup Ensure Compliance With External Requirements.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
4 Members
0 Online
3593 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Evaluation of Compliance With External Requirements

Confirm compliance of IT policies, standards, procedures and methodologies with legal and regulatory requirements.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Good practices for dealing with laws and regulations incorporated effectively into enterprise arrangements
  • Increasing process performance and compliance with laws and regulations
  • Deviations identified to support timely corrective action
  Risk Drivers
  • Financial losses and penalties
  • Decreased customer and business partner satisfaction
  • Non-compliance incidents not identified, adversely impacting the enterprise’s performance and reputation
  • Increased likelihood of disputes

View Control Practices  help

Hide Control Practices  help

  1. Regularly evaluate IT organisational policies, standards, procedures and methodologies to ensure compliance with relevant legal, regulatory and contractual requirements. Ensure that gaps are addressed and changes are reflected in the policies, standards and procedures on a timely basis.
  2. Periodically evaluate IT processes and activities to ensure adherence to applicable legal, regulatory and contractual requirements.
  3. Regularly evaluate recurring patterns of compliance failures. Where necessary, improve policies, standards, procedures, methodologies, and associated processes and activities.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 500 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 407 days ago
Downloads
Posted by ISACA 417 days ago
This document provides a preview of the information contained in COBIT 5.
Posted by ISACA 820 days ago
This presentation by Robert Stroud, CGEIT, CRISC, ISACA Strategic Advisory Board, addresses the COBIT 5 framework, the critical aspects of COBIT 5, and what is available.
Posted by ISACA 820 days ago
Posted by ISACA 928 days ago
Posted by ISACA 928 days ago

Events & Online Learning: 18 total

24 Sep 2012
ISACA International Event
Chicago, IL, USA
17 Jun 2013
ISACA International Event
Parsippany, NJ, USA
14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.

Journal Articles: 500 total

Volume 3, 2015
by Steve Woo
The adoption of cloud-based retail applications, as well as increasing demands for agility, for example, with pop-up retail, is changing the requirements for network access.
Volume 3, 2015
by Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina and Mario Piattini | Reviewed by A. Krista Kivisild, CISA, CA, CPA
With new technology supporting all areas of life, management increasingly needs to evaluate the areas of risk and concern that they need to be aware of and address within the business.
Volume 3, 2015
by Graciela Braga, CGEIT, COBIT 5 Foundation, CPA
Stakeholders expect that businesses create value, but at what cost? In the end, stakeholders and businesses are looking for the same thing: to protect their future.
Volume 3, 2015
by Vasant Raval, DBA, CISA, ACMA
Any organized form of a community needs rules. Even when we trust each other to do the right thing, rules may help induce and guide proper behavior.
Volume 3, 2015
by Ed Gelbstein, Ph.D.
Here, we explore those soft skills that do not appear in the Certified Information Systems Auditor (CISA) examination, but are important components of an auditor’s life and work.
Volume 3, 2015
by Roberto Puricelli, CISM
In recent years, numerous cases of advanced persistent threats (APTs) and data breaches have been seen, with those involving the largest, most high-profile enterprises garnering the most media attention.

Wikis: 2 total

Blog Posts: 117 total

Findings report is about report on gaps.Compliance report is about reportingobservations that you have sighted and describe how you attest that thiscontrol is met.  It is normally used toreport to regulatory bodies.It’s comes as a surprise when I startedm...
Posted By : lancePENG | 0 comments
Lately i have been pre-occupied with how to add value to the Audit function as against the more established assurance service Audit has been known for. I see the value in the consulting approach, this is a more pre-emptive approach, allowing the organizat...
Posted By : Clemmento | 0 comments
Recently, I participated in the First Annual Conference of ICT SECURITY WORLD held on Wednesday, March 4, 2015 at the National Centre for Public Administration and Local Government in Tavros, Athens. The presence of ISACA Athens Chapter was a pleasant sur...
Posted By : Konstantinos741 | 0 comments
29 Mar 2015
As I interview IA professionals I get the feeling that as organizations move toward the adoption of the big-data fueled decision-making paradigm senior decision makers are focusing on the implications of big-data as it pertains to their locust of control....
Posted By : Ben Apple | 0 comments
  Rob Stroud is the New York based Vice President of Strategy and Innovation at CA Technologies and is the current President for the 2014-15 administrative term.  I caught up with Rob in Australia when he visited Canberra in June 2014...
Posted By : Rob Hanson | 2 comments
I saw Garry at the Sydney Chapter’s successful Strategic Planning event in July 2014.  He was animated and gregarious during the evening’s cocktail event and it felt good to see him again and catch...
Posted By : Rob Hanson | 0 comments