{"id":16072,"date":"2016-03-18T04:09:47","date_gmt":"2016-03-18T04:09:47","guid":{"rendered":"http:\/\/qes-cs.cloudapp.net\/it-outsourcing\/?page_id=16072"},"modified":"2016-08-02T02:17:01","modified_gmt":"2016-08-02T02:17:01","slug":"audit-and-performance-evaluation","status":"publish","type":"page","link":"https:\/\/www.itoutsourcing.com.my\/index.php\/audit-and-performance-evaluation\/","title":{"rendered":"Audit and Performance Evaluation"},"content":{"rendered":"<p>[vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column width=&#8221;4\/12&#8243;]<div class=\"image_with_text\"><img decoding=\"async\" itemprop=\"image\" src=\"https:\/\/www.itoutsourcing.com.my\/wp-content\/uploads\/2014\/07\/fotolia_88514874.jpg\" alt=\"\" \/><h3 ><\/h3><span style=\"margin: 6px 0px;\" class=\"separator transparent\"><\/span><\/div>[\/vc_column][vc_column width=&#8221;8\/12&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">A process of collecting and evaluating evidence to determine whether an environment has been designed to maintain data integrity, safeguard assets, allows organisational goals to be achieved effectively, and uses resources efficiently.<\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;10&#8243;][vc_column_text]<\/p>\n<p style=\"text-align: justify;\">In line with Usage Efficiency Management, sustaining constant usages while up-keeping the business application and database is taxing and demanding especially facing ever-changing technology in commercial market. Our services aim to increase productivity focusing in mainstream activities with sufficient application and database support in migration, upkeep and upgrading.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column][vc_separator type=&#8221;transparent&#8221; up=&#8221;60&#8243;][\/vc_column][\/vc_row][vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column]<a  itemprop=\"url\" href=\"?p=16388\" target=\"_self\"  class=\"qbutton  center default\" style=\"\">PREVIOUS<i class=\"qode_icon_font_awesome fa fa-angle-double-left qode_button_icon_element\" style=\"\" ><\/i><\/a><a  itemprop=\"url\" href=\"https:\/\/www.itoutsourcing.com.my#services\" target=\"_self\"  class=\"qbutton  center default\" style=\"margin: 10px; \">HOME<i class=\"qode_icon_font_awesome fa fa-home qode_button_icon_element\" style=\"\" ><\/i><\/a><a  itemprop=\"url\" href=\"?p=16062\" target=\"_self\"  class=\"qbutton  center default\" style=\"\">NEXT<i class=\"qode_icon_font_awesome fa fa-angle-double-right qode_button_icon_element\" style=\"\" ><\/i><\/a>[vc_separator type=&#8221;transparent&#8221; up=&#8221;60&#8243;][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css_animation=&#8221;&#8221;][vc_column width=&#8221;4\/12&#8243;][\/vc_column][vc_column width=&#8221;8\/12&#8243;][vc_column_text] A process of collecting and evaluating evidence to determine whether an environment has&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-16072","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.itoutsourcing.com.my\/index.php\/wp-json\/wp\/v2\/pages\/16072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itoutsourcing.com.my\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itoutsourcing.com.my\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itoutsourcing.com.my\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itoutsourcing.com.my\/index.php\/wp-json\/wp\/v2\/comments?post=16072"}],"version-history":[{"count":6,"href":"https:\/\/www.itoutsourcing.com.my\/index.php\/wp-json\/wp\/v2\/pages\/16072\/revisions"}],"predecessor-version":[{"id":16401,"href":"https:\/\/www.itoutsourcing.com.my\/index.php\/wp-json\/wp\/v2\/pages\/16072\/revisions\/16401"}],"wp:attachment":[{"href":"https:\/\/www.itoutsourcing.com.my\/index.php\/wp-json\/wp\/v2\/media?parent=16072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}