Procedure Templates

€79.99

Purchase

This IT Security Policy describes how to use information systems resources to ensure information security within the Company.

€49.99

Purchase

The objective of the Making Corporate Information Publicly Available Procedure is to determine whether the disclosure of information is appropriate, to prepare information for disclosure and resolve problems with disclosure…

€79.99

Purchase

The Managing IS Risks in IT Services Provided by Third Parties Standard requires the use of risk management techniques to stipulate controls necessary for the management of the relationship with…

€49.99

Purchase

This objective of this standard is to document the security requirements for Windows SQL Server Configuration.

€49.99

Purchase

Company expects its employees and contingent workers to maintain the highest standards of professional conduct, including adhering to applicable laws, rules and regulations, as well as applicable internal policies, alerts…

€49.99

Purchase

The Mobile Computing Policy addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.

€49.99

Purchase

The Mobile Computing Procedure addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.

€49.99

Purchase

The main purposes of the Monitoring of System Use Policy is to maintain the confidentiality, integrity and availability of information processing and communication services, to detect failures and unauthorized activities…

€49.99

Purchase

The objective of the Network Security Policy is to ensure the security of data transfers across Company’s networks and that an adequate level of security exists to protect the network…