Search results

Jump to: navigation, search

Page title matches

  • ...s on an annual basis. This section provides access to Information Security Policy Framework templates (for example, policies and standards) that are needed t '''SOX Policy Sample Library'''<br>
    1 KB (204 words) - 13:03, 14 July 2006
  • ...ogy Security Policy:|'''Sample Information Systems and Technology Security Policy''']]<br> :The Sample Information Systems and Technology Security Policy serves as the top level document setting the holistic tone for the subseque
    4 KB (581 words) - 17:06, 30 December 2013
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...ementation, and maintenance of the Asset Identification and Classification Policy and associated standards and guidelines.<br>
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br>
    5 KB (673 words) - 18:16, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br>
    3 KB (389 words) - 17:40, 14 January 2014
  • ...would reflect adversely on Company, can be considered a violation of this policy.<br> ...ipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of
    3 KB (464 words) - 17:48, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br>
    2 KB (230 words) - 19:16, 14 January 2014
  • ...tion and Classification Policy:|'''Asset Identification and Classification Policy''']].<br> ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br>
    3 KB (365 words) - 19:25, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br>
    3 KB (418 words) - 19:53, 14 January 2014
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']]
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...d Classification Policy:|'''Sample Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy defines objectives for establishing specific standards to define, identify,
    3 KB (404 words) - 14:53, 25 July 2006
  • ...s that wish to exceed GLBA requirements and establish a more comprehensive Policy Framework.<br> ...ssification Policy:|'''Sample GLBA Asset Identification and Classification Policy''']]<br>
    4 KB (535 words) - 16:51, 25 July 2006
  • ==Information Security Policy== ==Information security policy document==
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...sification Policy:|'''Sample HIPAA Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy is required to comply with HIPAA (Subpart C Section 164.308(a)1C,2 and Sect
    5 KB (614 words) - 16:46, 25 July 2006
  • ==Guidance Towards Establishing an Enterprise Wide Open-Source Usage Policy== A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software m
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ==Sample Information Systems and Technology Security Policy== This Information Systems and Technology Security Policy define Company objectives for establishing specific standards on the protec
    4 KB (465 words) - 15:46, 13 January 2014

Page text matches

  • ...ttps://auditmachine.com/ IT Audit Machine], [http://policymachine.com/ The Policy Machine], [https://lazarusalliance.com/services/your-personal-cxo/ Cybervis ...'s], [http://lazarusalliance.com/services/policies-governance/ governance, policy development], [http://lazarusalliance.com/services/audit-compliance/ IT aud
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...mply with the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] and associated standards, guidelines, and procedures can result in dis
    8 KB (1,123 words) - 16:01, 2 August 2009
  • [[PO6.1:| 6.1 IT Policy and Control Environment]]<br> [[PO6.4:| 6.4 Policy Rollout]]<br>
    4 KB (517 words) - 19:07, 14 June 2007
  • ...ement leadership should be established to approve the information security policy, assign security roles and co-ordinate the implementation of security acros
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...ement leadership should be established to approve the information security policy, assign security roles and co-ordinate the implementation of security acros
    3 KB (470 words) - 13:39, 6 March 2007
  • ISO 17799 3.1 Information security policy.<br> ISO 17799 12.2 Reviews of security policy and technical compliance.<br>
    3 KB (377 words) - 14:55, 1 May 2006
  • ISO 17799 3.1 Information security policy 6.3 Responding to security incidents and malfunctions.<br>
    2 KB (353 words) - 18:22, 1 May 2006
  • ISO 177993.1 Information security policy.<br>
    2 KB (346 words) - 18:25, 1 May 2006
  • '''PO 6.1 IT Policy and Control Environment'''<br> * ISO 17799 3.1 Information security policy.<br>
    4 KB (580 words) - 18:00, 23 June 2006
  • ISO 17799 3.1 Information security policy 4.1 Information security infrastructure.<br>
    2 KB (331 words) - 18:47, 1 May 2006
  • ...in a set of policies to support IT strategy. These policies should include policy intent, roles and responsibilities, exception process, compliance approach * ISO 17799 3.1 Information security policy 6.1 Security in job definition and resourcing.<br>
    3 KB (421 words) - 18:02, 23 June 2006
  • '''PO 6.4 Policy Rollout'''<br> ISO 17799 3.1 Information security policy.<br>
    3 KB (420 words) - 14:06, 8 August 2006
  • ISO 17799 3.1 Information security policy.<br> ISO 12.2 Reviews of security policy and technical compliance.<br>
    3 KB (442 words) - 18:58, 1 May 2006
  • ...vices is performed in accordance with the organization's vendor management policy.<br>
    2 KB (321 words) - 15:35, 25 June 2006
  • * ISO 177993.1 Information security policy.<br>
    3 KB (377 words) - 14:10, 8 August 2006
  • ISO 17799 3.1 Information security policy 4.1 Information security infrastructure.<br>
    2 KB (317 words) - 20:10, 1 May 2006
  • ...t. Any accounts that remain should be investigated as they are most likely policy violations and a breakdown in the segregation of duties has occurred.<br> ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss
    3 KB (459 words) - 17:56, 21 June 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss
    2 KB (304 words) - 20:21, 1 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss
    5 KB (738 words) - 20:24, 1 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss
    2 KB (325 words) - 01:16, 2 May 2006

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)