1. Establishing an Internal Audit Function
2. Internal Audit Manual
3. IT Internal Audit Framework
4. IT Risk Assessment
5. IA Risk Assessment Process
6. Audit Business Risk Universe
7. Audit Document Request List
8. Audit Satisfaction Survey
9. Auditee Roles and Responsibilities and Timeline
10. Internal Audit Charter
11. Internal Audit Kick Off Meeting
12. Internal Audit Plan
13. Internal Audit Quality Assurance Checklist
14. Internal Audit Report
15. Internal Audit Self Assessment
16. Issue Log Tracker
17. Questionnaire to Develop Internal Audit Plan
18. Risk Matrix Distribution
19. Risk Ranking Criteria
20. Risk Register Presentation
21. Risk Register Template
22. Root Cause Analysis
23. Scope Template
24. Weekly Status Update
25.Internal Audit Roadmap Plan
26.Internal Auditing Capability Maturity Model Matrix
FAQ
1. Is it safe to provide my credit card/payment information?
YES, our store is powered by Shopify which is one of the most trusted e-commerce platforms. Shopify is certified Level 1 PCI DSS compliant. All Shopify stores include an SSL certificate that uses industry standard 256-bit encryption technology. This is the same level of encryption used by large banks to keep your information secure.
2. Will I get support if I have an issue or a query?
Definitely, yes, we have a dedicated support team who will happily assist. It can be an issue or any help with our templates. Our support policy is to address the customer query ASAP regardless of the product they purchase.
3. Is this a one time payment or monthly membership?
All our products are ONE TIME PAYMENT. We do not offer subscriptions so whatever you pay will be be one time.
4. How do I access my downloads?
After you checkout, you will be taken to a download page. You will also get a download link in your email.
5. What if the download link does not work?
Sometimes links can be blocked by a corporate firewall so please try using the link from a different network or from home. If you still cannot access drop an email to support@itsm-docs.com and use our Contact Us Page.
6. Do you provide refunds?
We will REFUND the full amount in the following scenarios -
- Templates don't work as described, and we cannot fix your problem in a reasonable time.
- Templates are missing from your download and we cannot provide you the same templates shown on the site.
- You are not able to access the download. We will try to provide different mediums but if none of them work for you then we will refund your amount. Check our Refund Policy.
7. What are the different types of payments accepted?
We accept PayPal, Apple Pay, Google Pay, Master Card , Amex and VISA.
8. Do these templates work with Excel?
Yes, the templates are built using MS Office so will work on Excel.
9. Can the templates be customized or edited?
Yes, our templates can be edited and changed as you need. But reselling of templates is not allowed.
10. Why do you have a logo on the documents?
The ITSM Docs logo is only visible on the template images. We do not use logos on templates so you can customize the template as needed.
Step-by-Step Guide to Establishing an Internal Audit Framework
The "Establishing an Internal Audit Function (IAF)" toolkit provides a comprehensive guide for setting up an internal audit function, along with tools for evaluating business processes, controls, and systems to boost organizational performance and meet business goals. This detailed guide includes 83 slides packed with valuable information.
Internal Audit Manual
Our comprehensive internal audit manual has close to 40 pages detailing everything from the audit charter's role and scope to diverse audit engagements such as IT and ethics investigations. This outlines the structured approach of the guide through initiation, planning, fieldwork, reporting, and wrap-up phases across various internal audit types.
Unsure About Our Templates? Schedule a Demo With Us!
Book a demo and explore how our templates can address your unique needs. Our SME will walk you through the templates and answer all your questions.
Risk Assessment Process
We recognize the critical role of risk assessment in effective risk management, leading us to develop two distinct risk assessment processes: one tailored for general risk assessment and another specifically designed for IT risk assessment.