by IT Procedure Template | Oct 4, 2020
This IT Security Policy has been developed to protect all systems within the Company to an adequate level from events which may jeopardize company activity. These events will include accidents as well as behavior deliberately designed to cause difficulties.
by IT Procedure Template | Oct 3, 2020
The main purposes of the Monitoring of System Use Policy is to maintain the confidentiality, integrity and availability of information processing and communication services, to detect failures and unauthorized activities and to define guidelines for the implementation of on-going review and monitoring activities at Company.
by IT Procedure Template | Oct 3, 2020
The Information Security Strategy and General Principles outlines the information security strategy and the principles defined by Senior Management that are used to establish the Company Information Security Framework.
by IT Procedure Template | Oct 3, 2020
The objective of this document is to identify the boundaries for the Information Security Management System (ISMS) and detail the security structure in place to manage and control the ISMS for the Company.
by IT Procedure Template | Oct 3, 2020
The objective of the Information Security Incident Policy is to set up the foundation of security incidents management in order to minimize the damage and malfunctions, and to monitor and learn from such incidents.