Topics
-
CIO1406
-
Infrastructure & Operations1838
-
Enterprise Architecture714
-
Applications1374
-
Project & Portfolio Management628
-
Data & Business Intelligence600
-
Security949
-
Vendor Management612
-
Templates & Policies163
-
-
Application Development19
-
Budgeting/Procurement14
-
Collaboration2
-
Communications4
-
Data & Digital Assets15
-
Department Governance27
-
Desktop Systems5
-
Disaster & Continuity11
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications14
-
Hardware17
-
HR Management10
-
Mobile & Wireless12
-
Network Management4
-
Operating Systems1
-
Operations13
-
Project Management19
-
Security37
-
Small Business Essentials9
-
Small Business Extras3
-
Storage8
-
Web Site Development4
-
Security in Supplier Relationships Policy – ISOThe purpose of this policy is to ensure proper protection of a company’s assets that are accessed by suppliers. |
|
System Acquisition, Development, and Maintenance Security Policy – ISOThe purpose of this policy is to ensure information is a forefront consideration throughout the lifecycle of information systems in the organization. |
|
Physical Access PolicyPhysical access controls define who is allowed physical access to facilities that house information systems, and to the information systems within those facilities and/or... |
|
Secure Acquisitions PolicyThe secure acquisitions policy outlines standards for wise acquisitions of information systems in terms of IT security. |
|
Instant Messaging Usage and Security PolicyThe instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging. |
|
GPS Cell Phone PolicyThe GPS Cell Phone policy allows employees to do their jobs effectively. This policy supports the guidelines for appropriate use and other administrative issues relating... |
|
Removable Media Acceptable Use PolicyThe removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable... |
|
Server Configuration PolicyThe server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company. |
|
System Change Control Procedural PolicyConfiguration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,... |
|
Systems Monitoring and Auditing Procedural PolicySystem monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these... |
|