Small Enterprise Resources - Templates & Policies

Cryptography Policy – ISO

The purpose of this policy is to ensure correct use of cryptography to protect the confidentiality, authenticity, and integrity of the organization’s information.

Compliance Policy – ISO

The purpose of this policy is to ensure proper measures are in place to avoid non-adherence to information security compliance requirements – legal, contractual,...

DRP High-Level Process

Overview of Info-Tech's DRP development workflow.

Purchasing Policy

The purchasing policy outlines the standards and procedures associated with company purchases of IT computer-related components and technical services.

Operations Security Policy – ISO

The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Systems Monitoring and Auditing Procedural Policy

System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...

Asset Management Policy – ISO

The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.

Data Protection Procedural Policy

The data protection policy will outline the standards for protecting corporate data from any risk that it may be exposed to.

Contingency Planning Procedural Policy

Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us