Desktop Move/Add/Change Policy

The desktop move/add/change policy provides guidelines for end users to request a move, add, or change to their desktop computing environments.

Mobile Device Connectivity & Allowance Policy

The mobile device connectivity and allowance policy enables a secure and productive workforce by outlining the policies regarding mobile device connectivity.

Equipment Use Policy

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...

GPS Cell Phone Policy

The GPS Cell Phone policy allows employees to do their jobs effectively. This policy supports the guidelines for appropriate use and other administrative issues relating...

Asset Management Policy – ISO

The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.

Hardware Sanitization Policy

The hardware sanitization policy protects the intellectual property of an organization’s confidentiality and personal information.

Guest Wireless Internet Acceptable Use Policy

The guest wireless internet acceptable use policy outlines the appropriate and inappropriate use of guest wireless internet resources within a company.

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Systems Monitoring and Auditing Procedural Policy

System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...

BYOC Acceptable Use Policy

The purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a...
GET HELP Contact Us
×
VL Methodology