Displaying 1-20 of 20 results
Faculty news: March 2024
- 11 Mar 2024
- ICAEW
- Corporate Financier
The latest from ICAEW’s centre of professional expertise in corporate finance, including the launch of the faculty’s cyber security guide, a new member firm, a call for comment on two consultations, plus forthcoming events.
Exclusive
IFRS FACTSHEET
ICAEW KNOW HOW
IFRS 15 Revenue from contracts with customers
- 19 Jul 2023
- PDF (562kb)
- Corporate Reporting Faculty
IFRS 15 Revenue from Contracts with Customers sets out the principles for when revenue should be recognised and how it should be measured, together with related disclosures. This factsheet answers some key frequently asked questions about the standard.
Cyber security: How to keep your organisation safe and secure online
- 23 May 2023
This cyber security guide explains how to best protect yourself, your business and your clients from cyber risks and threats. You can also find additional information in our dedicated cyber security resource centre.
Is your business cyber secure?
- 24 Feb 2023
- Marsh Commercial
A guide to protecting your accountancy business from cyber-attacks.
Exclusive
CPL guidance form
- 11 May 2022
- PDF (1,740kb)
Application guidance for Higher Education Institutions - Credit for prior learning.
ICAEW KNOW HOW
How to audit operational resilience
- 12 Feb 2021
In this second paper on operational resilience, we will look at how to develop the audit approach.
ICAEW KNOW HOW
GUIDE
ICAEW Know-How: Personal data breaches
- 01 Jan 2020
- PDF (563kb)
- Business Law Department
The Data Protection Act 2018 (DPA 2018) came into force on 25 May 2018 to replace the Data Protection Act 1998. It sits alongside the General Data Protection Regulation (GDPR). This guide is part of a series that explain some of the new or more difficult concepts introduced by the DPA 2018 and the GDPR.
Cyber attack response plan
- 07 Mar 2019
- Tech Faculty
This guide provides an overview of a cyber attack response plan. Organisations of all sizes and types should download this plan today in readiness for when a cyber incident takes place. This will help reduce your business risk and improve business resiliency.
Exclusive
TECH ESSENTIALS
The essential guide to cyber recovery
- 06 Feb 2019
- PDF (308kb)
- Tech Faculty
How to recover in the event of a data breach. This guide draws on expert insights from our volunteers and members, with some very helpful case studies outlining real life examples – one of which is a ransomware example similar to the scenario above, and where the firm did have a backup.
Exclusive
How to audit the cloud
- 29 Nov 2018
- PDF (387kb)
- Audit and Assurance Faculty
Cloud computing is transforming business IT services, increasing its operational efficiencies and reducing its costs. But the use of cloud computing services also poses significant risks that need to be planned for by audit committees, boards and management if they are to be handled effectively.
GDPR and pension funds
- 11 May 2018
- PDF (165kb)
- Business Law, Tech Faculty
This guide outlines the issues the General Data Protection Regulation (GDPR) raises for the trustees of pension funds, including their dealings with administrators and auditors. It is part of a series designed to answer the questions that members have been asking about the GDPR.
GDPR - practical issues for insolvency practitioners and breach issues
- 01 May 2018
- PDF (251kb)
- Professional Standards Department
FAQs for insolvency practitioners on the General Data Protection Regulations (GDPR).
Exclusive
TECHNICAL ADVISORY SERVICES HELPSHEET
UK GDPR - Data mapping and documentation
- 25 Apr 2018
- PDF (148kb)
- Technical Advisory Services
Helpsheet issued by ICAEW’s Technical Advisory Service to help ICAEW members to understand how data mapping and documentation can assist in meeting the requirements of the GDPR.
TECH ESSENTIALS
Tech essentials - 10 steps to cyber security for smaller firms
- 22 Sep 2017
- PDF (376kb)
- IT Faculty
While the fundamentals on how to protect yourself, your business and your clients remain essentially unchanged, the context in which we write about them continues to shift. Cyber criminals are always finding new means of attack and we all need to keep up to keep them out.
Internal audit in the age of data analytics
- 16 Jun 2017
- Audit and assurance Faculty
How internal auditors should strengthen their governance frameworks to cover emerging data-analytics risks in the areas of quality, talent, independence and security.
Exclusive
Cloud adoption – understanding the risk of cloud services
- 31 Jan 2017
- PDF (371kb)
- IT Faculty
This first part in the series on cloud adoption provides the process to follow when identifying and addressing the risks that arise from adopting a cloud-based strategy for a small business.
Exclusive
Financial Modelling, Issue 63
- 06 Jul 2016
- PDF (4,453kb)
This 2nd edition is a practical guide to financial modelling in a corporate finance transaction context. That rider is important. The guide is aimed at corporate financiers and modellers who need to prepare, use or review financial models for deals; it is not aimed at financial modellers who need to develop their understanding of corporate finance.
Glossary of IT Security terms
- 23 May 2016
- IT Faculty
Clear and concise explanations are given for the most common IT security expressions, phrases, acronyms and jargon.
Exclusive
IP in M&A – legal considerations, Issue 62
- 23 Feb 2015
- PDF (547kb)
This guideline identifies key intellectual property (IP) rights and comments on how such rights should be considered in the context of M&A transaction and contractual protections. It also addresses IP transfer and integration.
5 things to think about when considering your IT options
- 16 Jan 2015
- Practice Department
Factors to consider when choosing IT infrastructure and systems for your practice.
Displaying 1-20 of 20 results