Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

ME3.3 - Evaluation of Compliance With External Requirements

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective ME3.3 - Evaluation of Compliance With External Requirements is contained within Process Popup Ensure Compliance With External Requirements.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

This Topic Has:
4 Members
0 Online
3795 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

Evaluation of Compliance With External Requirements

Confirm compliance of IT policies, standards, procedures and methodologies with legal and regulatory requirements.

View value and Risk Drivers  help

Hide value and Risk Drivers help

Value Drivers

  • Good practices for dealing with laws and regulations incorporated effectively into enterprise arrangements
  • Increasing process performance and compliance with laws and regulations
  • Deviations identified to support timely corrective action
  Risk Drivers
  • Financial losses and penalties
  • Decreased customer and business partner satisfaction
  • Non-compliance incidents not identified, adversely impacting the enterprise’s performance and reputation
  • Increased likelihood of disputes

View Control Practices  help

Hide Control Practices  help

  1. Regularly evaluate IT organisational policies, standards, procedures and methodologies to ensure compliance with relevant legal, regulatory and contractual requirements. Ensure that gaps are addressed and changes are reflected in the policies, standards and procedures on a timely basis.
  2. Periodically evaluate IT processes and activities to ensure adherence to applicable legal, regulatory and contractual requirements.
  3. Regularly evaluate recurring patterns of compliance failures. Where necessary, improve policies, standards, procedures, methodologies, and associated processes and activities.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 500 total

Must be a Topic member to contribute
View All »
Posted by ISACA 597 days ago
Posted by ISACA 608 days ago
This document provides a preview of the information contained in COBIT 5.
Posted by ISACA 1011 days ago
This presentation by Robert Stroud, CGEIT, CRISC, ISACA Strategic Advisory Board, addresses the COBIT 5 framework, the critical aspects of COBIT 5, and what is available.
Posted by ISACA 1011 days ago
Posted by ISACA 1119 days ago
Posted by ISACA 1119 days ago

Events & Online Learning: 20 total

24 Sep 2012
ISACA International Event
Chicago, IL, USA
17 Jun 2013
ISACA International Event
Parsippany, NJ, USA
14 Oct 2013
ISACA International Event
Boston, MA, USA
6 Nov 2013
ISACA International Event
Las Vegas, NV, USA
North America ISRM features relevant security and risk management topics presented by leading industry experts and practitioners.

Journal Articles: 500 total

Volume 6, 2015
by Vasant Raval, DBA, CISA, ACMA
The word “transparency” originated in the field of engineering. It has to do with the physical property that allows the transmission of light through a material, such as glass or plastic.
Volume 6, 2015
by Ed Gelbstein, Ph.D.
What causes large software projects to have huge cost and timescale overruns and/or fail to meet expectations or, at worst, be abandoned before completion?
Volume 6, 2015
by Steven J. Ross, CISA, CISSP, MBCP
A few issues back, I wrote about the US National Institute of Standards and Technology’s (NIST) Framework for Improving Critical Infrastructure Cybersecurity.
Volume 6, 2015
by Nickson Choo, CISA, CRISC, CFE
Get to know your network.
Volume 6, 2015
by Doron Rotman, CIPP, Chris Kypreos, CIPP, and Sarah Pipes, CIPP
The Internet of Things (IoT) represents an unknown set of forces. However, one known is that IoT-connected devices will generate exponential levels of new data that will lead to powerful insights...
Volume 6, 2015
by Wanbil W. Lee, DBA
Of all the human inventions since the dawn of civilization, the computer is the only one that extends our intellectual power.

Wikis: 2 total

Blog Posts: 131 total

Information Security Managers (ISMs) are task with providing security oversight in defending organisations data, systems and building Infrastructures it depends on for making profit, against threats, risks and vulnerabilities such as cyber attacks from th...
Posted By : Prince143 | 0 comments
I am currently recruiting for a Senior IT Auditor - Financial Services , to join the team in Paddington. If you’re a CISA qualified Auditor and keen to travel internationally, please click on the link below. NO AGENCIES
Posted By : Stephen913 | 0 comments
ENISA's CCSL - the Cloud Certification Schemes List should gain transparency and clarity under the European Cloud Strategy Key Action Nr. 1 "Cutting through the jungle of standards". Is it helpful for the Cloud Users/Customers as well as for the Cloud Pro...
Posted By : Kresimir_Kristic | 1 comments
Many a times we encounter situations where we find that certain Information Security Policy requirements and considerations are not in line with the Global Security Best Practices and they actually are not in-line with the Global Standards to that effect....
Posted By : Mayank | 0 comments
It is interesting to note that the Government of India's Department of Engineering and Information Technology has issued National Encryption Policy for public comment.  And today the first addendum for the same has been issued for the people to refer to. ...
Posted By : Mayank | 0 comments
Information Security and IT operations generally do not go hand in hand or I rather make a not so controversial statement that IT Operations Folks generally don't like Information Security Folks for they see the Information security folks to be the Show S...
Posted By : Mayank | 0 comments