Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)

Page title matches

Page text matches

  • ==Sample End User Computing and Technology Policy== The End User Computing and Technology Policy define the Company objectives for establishing specific standards on approp ...
    4 KB (507 words) - 14:58, 21 January 2014
  • ..."Company) [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...Policy''']] builds on the objectives established in the Security Awareness Policy, and provides specific instructions and requirements for providing security ...
    5 KB (662 words) - 17:54, 25 July 2006
  • ...objectives established in the Asset Protection Policy and Asset Management Policy.<br> ...bjectives and builds on the objectives established in the Asset Management Policy by providing specific requirements and instructions for life cycle manageme ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ==Information Security Policy== ==Information security policy document== ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...vices is performed in accordance with the organization’s vendor management policy.<br> ...vices is performed in accordance with the organization’s vendor management policy. .<br> ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...vices is performed in accordance with the organization's vendor management policy.<br> 1. Obtain the organization’s vendor management policy and discuss with those responsible for third-party service management if th ...
    2 KB (295 words) - 15:40, 25 June 2006
  • ...the objectives established in the Asset Identification and Classification Policy.<br> ...the objectives established in the Asset Identification and Classification Policy by providing specific requirements for classifying information assets.<br> ...
    1 KB (159 words) - 17:08, 25 July 2006
  • ...he templates from the Best Practice Policy Framework library (for example, policy and standards controls)that are needed to create, implement, and maintain a '''ISO 17799 Policy Sample Library'''<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...r needs delivered in minutes? Take a look at [http://policymachine.com The Policy Machine - a Lazarus Alliance service.]<br> == Adaptive Policy Best Practices == ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...h the document hierarchy displayed. It will become a standard instead of a policy for one.<br> ...
    319 bytes (54 words) - 01:56, 27 February 2008
  • ...standards has been developed that supports the objectives of the security policy. ...r the standards framework effectively meets the objectives of the security policy. ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...distributed media including that distributed to individuals, and that this policy requires the following: ...
    2 KB (295 words) - 14:23, 2 March 2007
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...violations to the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] and its associated standards.<br> ...
    6 KB (857 words) - 12:22, 19 July 2007
  • ::* Obtain and review the policy requiring updates to anti-virus software and definitions. ...hat the logs are being retained in accordance with the company’s retention policy. ...
    1 KB (199 words) - 18:10, 28 February 2007
  • ...distributed media including that distributed to individuals, and that this policy requires the following: ...
    2 KB (307 words) - 14:24, 2 March 2007
  • ...nd prevent the use of unauthorized software. Obtain and review the company policy as it relates to software use to see that this is clearly articulated. ...ns and computers to determine if they are in conformance with organization policy. ...
    2 KB (314 words) - 18:27, 25 June 2006
  • ...would reflect adversely on Company, can be considered a violation of this policy.<br> ...ipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...storage and maintenance of hardcopy and electronic media, and verify this policy requires periodic media inventories. Verify related processes by performing ...
    2 KB (310 words) - 14:28, 2 March 2007
  • ..."Company) [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...ed in the [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']], and provides specific instructions and requirements for providing sec ...
    6 KB (752 words) - 14:02, 1 May 2010
  • ...ication_and_Classification_Policy:|Asset Identification and Classification Policy]], and provides specific instructions and requirements for handling informa ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (258 words) - 16:26, 24 September 2014
  • ...tablished in the [[Sample_Security_Awareness_Policy:|'''Security Awareness Policy''']], and provides specific instructions and requirements for providing ong ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (275 words) - 17:10, 23 January 2014
  • ...ogy Security Policy:|'''Sample Information Systems and Technology Security Policy''']]<br> :The Sample Information Systems and Technology Security Policy serves as the top level document setting the holistic tone for the subseque ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...tion and Classification Policy:|'''Asset Identification and Classification Policy''']].<br> ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (365 words) - 19:25, 14 January 2014
  • :::* Obtain and review the policy requiring updates to anti-virus software and definitions. ...hat the logs are being retained in accordance with the company’s retention policy. ...
    2 KB (333 words) - 18:15, 28 February 2007
  • Job descriptions, employment agreements, and policy awareness acknowledgements increase accountability for security. Management ...or desktop and workstation users would typically review the acceptable-use policy and include issues like desktop security, log-on requirements, password adm ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • '''PO 6.4 Policy Rollout'''<br> ISO 17799 3.1 Information security policy.<br> ...
    3 KB (420 words) - 14:06, 8 August 2006
  • ..."Company) [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...ed in the [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']], and provides specific instructions and requirements for providing sec ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • ...ael S. Baum, Federal Certification Authority Liability and Policy: Law and Policy of Certificate-Based Public Key and Digital Signatures 9 (National Institut ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ...s. Information Security standards provide more measurable guidance in each policy area. Information Security procedures describe how to implement the standar ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (316 words) - 15:19, 13 January 2014
  • ...www.lazarusalliance.com/horsewiki/index.php/HIPAA_Policy_References: HIPAA Policy References]<br> ...
    800 bytes (122 words) - 03:19, 28 February 2008
  • ...uration file enforcing the password parameters as defined by the corporate policy document: '''Technical Standard – Access Controls.'''<br> <p><font color=#008000>Passwords on all platforms adhere to the corporate policy document: '''Technical Standard – Access Controls.'''</font></p><br> ...
    3 KB (405 words) - 00:10, 13 June 2006
  • ...cknowledge in writing they have read and understood the company’s security policy and procedures.''' ISO 3.1 Information security policy<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ...tion_and_Classification_Policy:|'''Asset Identification and Classification Policy''']], and provides specific instructions and requirements for classifying i ...e not to exceed five (5) years unless otherwise required by law or Company policy.<br> ...
    5 KB (583 words) - 17:44, 23 January 2014
  • ...ss, legal, and/or regulatory purposes, as documented in the data retention policy.'''<br> ...
    3 KB (420 words) - 14:46, 28 February 2007
  • == Requirement 12: Maintain a policy that addresses information security. == *A strong security policy sets the security tone for the whole company, and lets employees know what ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ...dard builds on the objectives established in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Standard''']], and provides specific auditing a ### Change security policy or configuration settings ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ISO 17799 3.1 Information security policy.<br> ISO 17799 12.2 Reviews of security policy and technical compliance.<br> ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (295 words) - 15:20, 13 January 2014
  • ...in a set of policies to support IT strategy. These policies should include policy intent, roles and responsibilities, exception process, compliance approach * ISO 17799 3.1 Information security policy 6.1 Security in job definition and resourcing.<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • This Asset Protection Policy defines Company objectives for establishing specific standards on the prote ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...al review of the code-based policies is recommended. Without a P3P Privacy Policy in place, a site’s cookies could be blocked or impaired by Internet Explore ...
    2 KB (251 words) - 09:52, 16 September 2011
  • ISO 17799 3.1 Information security policy.<br> ISO 12.2 Reviews of security policy and technical compliance.<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • ...' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFAN_6_3.pdf]]<br> :Discusses how computer security funds should be allotted into various areas: policy, awareness and training, risk assessment, technology, and process.<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ===Compliance Oriented Policy Samples=== :1. [[Security_Policy:|'''ISO Security Policy''']]<br> ...
    6 KB (774 words) - 12:41, 25 May 2007
  • ...Company") [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...ed in the [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']], and provides specific instructions and requirements for providing app ...
    5 KB (728 words) - 14:07, 1 May 2010
  • ...t. Any accounts that remain should be investigated as they are most likely policy violations and a breakdown in the segregation of duties has occurred.<br> ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (459 words) - 17:56, 21 June 2006
  • *[[Network security policy]] ...
    1 KB (168 words) - 18:26, 14 June 2007
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']], and provides specific instructions and requirements on the proper and ...
    7 KB (953 words) - 14:13, 1 May 2010
  • The '''<Your Company Name>''' (the "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Standard''']] defines objectives for establishi ...dard builds on the objectives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Standard''']], and provides specific instructio ...
    9 KB (1,213 words) - 13:20, 9 March 2009
View ( | ) (20 | 50 | 100 | 250 | 500)