IT Security Policy – Template 2

IT Security Policy – Template 2

This IT Security Policy has been developed to protect all systems within the Company to an adequate level from events which may jeopardize company activity. These events will include accidents as well as behavior deliberately designed to cause difficulties.

Monitoring of System Use Policy

Monitoring of System Use Policy

The main purposes of the Monitoring of System Use Policy is to maintain the confidentiality, integrity and availability of information processing and communication services, to detect failures and unauthorized activities and to define guidelines for the implementation of on-going review and monitoring activities at Company.

ISMS Framework

ISMS Framework

The objective of this document is to identify the boundaries for the Information Security Management System (ISMS) and detail the security structure in place to manage and control the ISMS for the Company.

Information Security Incident Policy

Information Security Incident Policy

The objective of the Information Security Incident Policy is to set up the foundation of security incidents management in order to minimize the damage and malfunctions, and to monitor and learn from such incidents.