The objective of the Business Continuity Management Policy is to establish the framework for the proper business continuity management of the Company, in order to restrict, to the extent possible, the impacts deriving from potential interruption to its business activities and ensure the continuity of critical operations in case of partial or total destruction.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3.1 DEVELOPMENT OF A BUSINESS CONTINUITY PLANNING FRAMEWORK
3.2 BUSINESS CONTINUITY PLAN DEVELOPMENT
3.3 DISASTER RECOVERY PLAN DEVELOPMENT
3.4 PLAN IMPLEMENTATION AND TESTING
3.5 BACKUP MANAGEMENT
5. FINAL CONSIDERATIONS
5.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
5.2 DOCUMENT REVISION
The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically, this Standard focuses on key management requirements, acceptable algorithms, appropriate key lengths, and raises pertinent regulatory considerations relating to the use of cryptography.
The purpose of the Protection Against Malicious Software Policy is to capture the requirements of the Company regarding controls preventing, detecting, suppressing and countering malicious software.