Procedure Templates

€49.99

Purchase

The objective of the Internet Access Policy is to allow the secure and effective use of the Internet. This policy set the standard for appropriate behavior of users when accessing…

€49.99

Purchase

The objective of this standard is to define the configuration to be met by all servers owned or managed by Company that are located outside of the firewalls. The standards…

€49.99

Purchase

The objectives of the Internet Usage Procedure are establish the main rules to ensure appropriate protection of the Company's connections to the Internet.

€49.99

Purchase

The objective of this document is to identify the boundaries for the Information Security Management System (ISMS) and detail the security structure in place to manage and control the ISMS…

€79.99

Purchase

The IT Acceptable Use Policy sets out the principles and instructions to follow for acceptable and appropriate use of information technology hardware, software, systems, applications, data, facilities, networks, and telecommunications…

€49.99

Purchase

IT Operation and Maintenance Policy is designed to provide a common framework for all operational activities carried out in the IT Department, consistent with company policies and best practices.

€79.99

Purchase

The objective of the IT Security Policy is to ensure the security of Company’s information assets.

€79.99

Purchase

This IT Security Policy has been developed to protect all systems within the Company to an adequate level from events which may jeopardize company activity. These events will include accidents…

€79.99

Purchase

This IT Security Policy describes the standard operating policies that will be followed to maintain high level of security for the data processed in the Company.