IT Acceptable Use Policy
The IT Acceptable Use Policy sets out the principles and instructions to follow for acceptable and appropriate use of information technology hardware, software, systems, applications, data, facilities, networks, and telecommunications…
IT Security Policy – Template 1
The objective of the IT Security Policy is to ensure the security of Company’s information assets.
IT Security Policy – Template 2
This IT Security Policy has been developed to protect all systems within the Company to an adequate level from events which may jeopardize company activity. These events will include accidents…
IT Security Policy – Template 3
This IT Security Policy describes the standard operating policies that will be followed to maintain high level of security for the data processed in the Company.
IT Security Policy – Template 4
This IT Security Policy describes how to use information systems resources to ensure information security within the Company.
Mobile Computing Policy
The Mobile Computing Policy addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.
Mobile Computing Procedure
The Mobile Computing Procedure addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.
Privacy and Data Protection Policy
The Privacy and Data Protection Policy sets forth minimum standards for the collection, access, use, disclosure, disposal, safeguarding and other handling of certain nonpublic identifiable information on current, former, and…
Public Cloud Security Standard
The Public Cloud Security Standard (the Standard) establishes security requirements and controls to maintain the Confidentiality, integrity, and availability of the Company’s data in the public cloud.