Use flowcharts and checklists to create effective SOP documents.
|
8
|
The purpose of this policy is to ensure proper protection of a company’s assets that are accessed by suppliers.
|
8
|
The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized...
|
7
|
Use Info-Tech's Configuration Management Policy to define how configurations will be managed.
|
7
|
An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements. This...
|
7
|
The Information Security Policy Charter is the “policy of policies” which outlines high-level security governance within the organization and the expectations associated...
|
7
|
Use Info-Tech's Risk Assessment Policy to define the parameters of your risk assessment program, including the frequency of evaluation.
|
6
|
Without a charter to control and set clear objectives for security, the responsibility of security governance initiatives will likely be undefined within the enterprise,...
|
6
|
Use Info-Tech's Identification and Authentication Policy to document the requirements and methods in which systems will be accessed.
|
6
|
The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.
|
6
|