Data Governance

€49.99

Purchase

The Confidential Information – Breaches and Escalation Policy sets out the escalation procedures to follow in the event of a breach of confidential information within Company and requirements regarding the…

€49.99

Purchase

The Cryptographic Control Policy intends to draw the general principles acceptable to the Company for the usage of cryptography. This policy applies to all employees and partners and to all…

€79.99

Purchase

The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically,…

€79.99

Purchase

The objective of the Cryptography Policy and controls is to address confidential data that is at rest (including portable devices and removable media), in motion (transmission security), and encryption key…

€49.99

Purchase

The Data Protection Policy outlines the principles that must generally be complied with when processing personal data, in particular when transferring such data. The objective of this policy is to…

€49.99

Purchase

The Document Control Procedure details the procedure, which needs to be following, regarding the development and maintenance of internal policies and procedures at the Company.

€49.99

Purchase

The objective of the Individual Computing Equipment Usage Policy is to help the Company Management enforce the rules regarding the use of individual computing equipment.

€49.99

Purchase

The Information Assets Classification Policy sets out the principles under which information is to be classified.

€49.99

Purchase

Information classification is a process intended assigning a level of sensitivity to information/ data as it is being created, processed, stored or transmitted.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link