Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this...
|
14
|
Passwords are the primary form of user authentication used to grant access to information systems. To ensure that passwords provide as much security as possible, they...
|
14
|
The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...
|
13
|
The administrative rights policy grants access to individuals’ desktop, laptop, or other end-user devices within a company for those who are qualified and cleared to use...
|
13
|
The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...
|
12
|
The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
|
12
|
Use Info-Tech's Access Control Policy to define and document the necessary access control levels and processes across your organization.
|
10
|
The data protection policy will outline the standards for protecting corporate data from any risk that it may be exposed to.
|
8
|
The purpose of this policy is to ensure proper protection of a company’s assets that are accessed by suppliers.
|
8
|
System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...
|
8
|