Templates & Policies - Templates & Policies

Security Incident Management Policy

The purpose of this policy is to ensure proper recognition, management, and communication of security events and weaknesses through a formal process.

Physical Protection Policy – NIST

Use Info-Tech's Physical Security Policy to outline the measures taken to protect physical security.

Mobile Device Reimbursement Policy

The mobile device reimbursement policy will outline the devices and voice/data plans that qualify for corporate reimbursement and the limits of corporate reimbursement of...

Cloud Integration Checklist

This Cloud Integration Checklist provides a guideline for assessing Cloud integration concerns across four critical areas within an organization.

Security Assessment Policy – NIST

Use Info-Tech's Security Assessment Policy to specify the requirements of security assessments and their associated controls.

Guest Wireless Internet Acceptable Use Policy

The guest wireless internet acceptable use policy outlines the appropriate and inappropriate use of guest wireless internet resources within a company.

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Data Cleansing and Quality Policy

The data cleansing and quality policy will outline the responsibilities for ensuring that all corporate data adheres to the principles of data quality and that redundant...

Incident Response Policy – NIST

Use Info-Tech's Incident Response Policy to specify the parameters of your incident response program.

Contingency Planning Procedural Policy

Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.
GET HELP Contact Us
×
VL Methodology