Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...tablished in the [[Sample_Security_Awareness_Policy:|'''Security Awareness Policy''']], and provides specific instructions and requirements for providing ong ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (275 words) - 17:10, 23 January 2014
  • ...ogy Security Policy:|'''Sample Information Systems and Technology Security Policy''']]<br> :The Sample Information Systems and Technology Security Policy serves as the top level document setting the holistic tone for the subseque ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...tion and Classification Policy:|'''Asset Identification and Classification Policy''']].<br> ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (365 words) - 19:25, 14 January 2014
  • :::* Obtain and review the policy requiring updates to anti-virus software and definitions. ...hat the logs are being retained in accordance with the company’s retention policy. ...
    2 KB (333 words) - 18:15, 28 February 2007
  • Job descriptions, employment agreements, and policy awareness acknowledgements increase accountability for security. Management ...or desktop and workstation users would typically review the acceptable-use policy and include issues like desktop security, log-on requirements, password adm ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • '''PO 6.4 Policy Rollout'''<br> ISO 17799 3.1 Information security policy.<br> ...
    3 KB (420 words) - 14:06, 8 August 2006
  • ..."Company) [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...ed in the [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']], and provides specific instructions and requirements for providing sec ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • ...ael S. Baum, Federal Certification Authority Liability and Policy: Law and Policy of Certificate-Based Public Key and Digital Signatures 9 (National Institut ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ...s. Information Security standards provide more measurable guidance in each policy area. Information Security procedures describe how to implement the standar ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (316 words) - 15:19, 13 January 2014
  • ...www.lazarusalliance.com/horsewiki/index.php/HIPAA_Policy_References: HIPAA Policy References]<br> ...
    800 bytes (122 words) - 03:19, 28 February 2008
  • ...uration file enforcing the password parameters as defined by the corporate policy document: '''Technical Standard – Access Controls.'''<br> <p><font color=#008000>Passwords on all platforms adhere to the corporate policy document: '''Technical Standard – Access Controls.'''</font></p><br> ...
    3 KB (405 words) - 00:10, 13 June 2006
  • ...cknowledge in writing they have read and understood the company’s security policy and procedures.''' ISO 3.1 Information security policy<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ...tion_and_Classification_Policy:|'''Asset Identification and Classification Policy''']], and provides specific instructions and requirements for classifying i ...e not to exceed five (5) years unless otherwise required by law or Company policy.<br> ...
    5 KB (583 words) - 17:44, 23 January 2014
  • ...ss, legal, and/or regulatory purposes, as documented in the data retention policy.'''<br> ...
    3 KB (420 words) - 14:46, 28 February 2007
  • == Requirement 12: Maintain a policy that addresses information security. == *A strong security policy sets the security tone for the whole company, and lets employees know what ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ...dard builds on the objectives established in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Standard''']], and provides specific auditing a ### Change security policy or configuration settings ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ISO 17799 3.1 Information security policy.<br> ISO 17799 12.2 Reviews of security policy and technical compliance.<br> ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (295 words) - 15:20, 13 January 2014
  • ...in a set of policies to support IT strategy. These policies should include policy intent, roles and responsibilities, exception process, compliance approach * ISO 17799 3.1 Information security policy 6.1 Security in job definition and resourcing.<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
View ( | ) (20 | 50 | 100 | 250 | 500)