Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • ==Information Security Policy== ==Information security policy document== ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...d Classification Policy:|'''Sample Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy defines objectives for establishing specific standards to define, identify, ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...sification Policy:|'''Sample HIPAA Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy is required to comply with HIPAA (Subpart C Section 164.308(a)1C,2 and Sect ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...s that wish to exceed GLBA requirements and establish a more comprehensive Policy Framework.<br> ...ssification Policy:|'''Sample GLBA Asset Identification and Classification Policy''']]<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • ...s on an annual basis. This section provides access to Information Security Policy Framework templates (for example, policies and standards) that are needed t '''SOX Policy Sample Library'''<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...ogy Security Policy:|'''Sample Information Systems and Technology Security Policy''']]<br> :The Sample Information Systems and Technology Security Policy serves as the top level document setting the holistic tone for the subseque ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...would reflect adversely on Company, can be considered a violation of this policy.<br> ...ipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ==Guidance Towards Establishing an Enterprise Wide Open-Source Usage Policy== A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software m ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...tion and Classification Policy:|'''Asset Identification and Classification Policy''']].<br> ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (365 words) - 19:25, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...ementation, and maintenance of the Asset Identification and Classification Policy and associated standards and guidelines.<br> ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ==Sample Information Systems and Technology Security Policy== This Information Systems and Technology Security Policy define Company objectives for establishing specific standards on the protec ...
    4 KB (465 words) - 15:46, 13 January 2014

Page text matches

  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...lse: Security can be communicated, taught, or measured effectively without policy.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...lse: Security can be communicated, taught, or measured effectively without policy.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ...d Classification Policy:|'''Sample Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy defines objectives for establishing specific standards to define, identify, ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...s on an annual basis. This section provides access to Information Security Policy Framework templates (for example, policies and standards) that are needed t '''SOX Policy Sample Library'''<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...curity (and privacy) of customer information. This section provides sample Policy Framework templates (for example, policies and standards) that are needed t '''GLBA Policy Sample Library'''<br> ...
    2 KB (263 words) - 12:52, 14 July 2006
  • ...sification Policy:|'''Sample HIPAA Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy is required to comply with HIPAA (Subpart C Section 164.308(a)1C,2 and Sect ...
    5 KB (614 words) - 16:46, 25 July 2006
  • :::a. [[SOX.2.0.17:|'''SOX.2.0.17''']] An information security policy exists and has been approved by an appropriate level of executive managemen Obtain a copy of the organization’s security policy and evaluate the effectiveness. Points to be taken into consideration inclu ...
    3 KB (351 words) - 16:49, 25 June 2006
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (281 words) - 14:46, 2 March 2007
  • ...s that wish to exceed GLBA requirements and establish a more comprehensive Policy Framework.<br> ...ssification Policy:|'''Sample GLBA Asset Identification and Classification Policy''']]<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (296 words) - 14:47, 2 March 2007
  • ...s to support the protection objectives established in the Asset Protection Policy.<br> ...s to support the protection objectives established in the Asset Protection Policy.<br> ...
    5 KB (597 words) - 15:27, 16 November 2006
  • ==Sample Information Systems and Technology Security Policy== This Information Systems and Technology Security Policy define Company objectives for establishing specific standards on the protec ...
    4 KB (465 words) - 15:46, 13 January 2014
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (294 words) - 14:46, 2 March 2007
  • ...he templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain '''HIPAA Policy Sample Library'''<br> ...
    2 KB (260 words) - 13:17, 15 June 2007
  • ...s to support the protection objectives established in the Asset Protection Policy.<br> ...s to support the protection objectives established in the Asset Protection Policy.<br> ...
    4 KB (512 words) - 12:05, 25 July 2006
  • ...rter and supporting policies that are required to comply with ISO Security Policy objectives.<br> ...formation Security Program Charter is required to comply with ISO Security Policy objectives and serves as the capstone document for the Information Security ...
    2 KB (202 words) - 12:40, 15 June 2007
  • ==Sample End User Computing and Technology Policy== The End User Computing and Technology Policy define the Company objectives for establishing specific standards on approp ...
    4 KB (507 words) - 14:58, 21 January 2014
  • ..."Company) [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...Policy''']] builds on the objectives established in the Security Awareness Policy, and provides specific instructions and requirements for providing security ...
    5 KB (662 words) - 17:54, 25 July 2006
  • ...objectives established in the Asset Protection Policy and Asset Management Policy.<br> ...bjectives and builds on the objectives established in the Asset Management Policy by providing specific requirements and instructions for life cycle manageme ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ==Information Security Policy== ==Information security policy document== ...
    8 KB (1,063 words) - 13:25, 23 May 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)