Internal Controls for Data Security

Laptop displaying the word password with fishing hooks surrounding it
Course Level
Delivered via
2 Credits


In the modern business environment, the security of an organization’s data is as important as that of its tangible assets, if not more. While revolutionary breakthroughs in technology and information have greatly increased productivity, these developments have also yielded a host of new security concerns. Awareness of these threats to data security, as well as how to address them, is critical to maintaining competitiveness, preserving regulatory compliance and preventing fraud.

Internal Controls for Data Security examines the threats to data security and provides context for the environments in which they flourish, as well as strategies for their mitigation. This course will provide you with an overview of basic internal controls, current threats facing data security and the potential consequences of technological trends such as cloud computing and Bring Your Own Device (BYOD).

Key Takeaways:

  • Strategies for mitigating threats to data security
  • How data is compromised from internal and external threats
  • Legislative acts tied to data security
  • Historical trends of technology and their effect on data security
  • Types of environments in which data security threats thrive



You Will Learn How To:

Ascertain the appropriate controls needed to secure data and prevent fraud

Choose the appropriate actions needed to protect information systems

Identify potential sources of data loss

Determine how data is compromised by employees and other external threats

Identify key legislative acts related to data security

Recognize technological trends and their impacts on data security

Table of Contents

Part I Introduction to Internal Data Controls
Lesson 1 Internal Controls
Lesson 2 Physical Access Controls
Lesson 3 Logical Access Controls
Lesson 4 Data Storage Controls
Lesson 5 Separation of Duties
Part II Data Security Risks
Lesson 6 Data Loss Prevention
Lesson 7 Perpetrators of Data Loss
Lesson 8 Consequences of Data Loss
Part III Current Data Threats
Lesson 9 Bring Your Own Device
Lesson 10 Securing the Cloud
Lesson 11 Social Media
Lesson 12 Conclusion

CPE Information

CPE Credit: 2
NASBA Information: Information Technology
Advanced Preparation: None
Last Updated: February 2023
Delivery Method: QAS Self-Study


CPE Credit

Please note: To be eligible for CPE credit, you must complete the final exam within one year of purchase date. You may only claim CPE credit for a course once.

ACFE Online Self-Study Courses


  • 24/7 access to courses through your Internet browser
  • Save time and quickly earn CPE credits with instant access, grading and printable certificate
  • The flexibility to start or stop a course and pick-up right where you left off
  • No additional shipping fees

Learn More about accessing your online self-study course

Learn More about online self-study courses and their features

System Requirements:

  • Internet access: High-speed connection recommended
  • Speakers required for video sound


The Association of Certified Fraud Examiners, Inc. is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website:


Ordering and Returns

Satisfaction Guarantee

If you are not 100% satisfied with any ACFE product, you may return it to us, provided it is in excellent condition, for a full refund of the item minus the cost of shipping. Toolkits and bundles may only be returned as a complete set.

Ordering & Returns Policy