Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • #REDIRECT [https://lazarusalliance.com/privacy-policy/] ==Privacy Policy== ...
    189 bytes (21 words) - 12:43, 10 September 2016
  • ==Information Security Policy== ==Information security policy document== ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...d Classification Policy:|'''Sample Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy defines objectives for establishing specific standards to define, identify, ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...sification Policy:|'''Sample HIPAA Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy is required to comply with HIPAA (Subpart C Section 164.308(a)1C,2 and Sect ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...s that wish to exceed GLBA requirements and establish a more comprehensive Policy Framework.<br> ...ssification Policy:|'''Sample GLBA Asset Identification and Classification Policy''']]<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • ...s on an annual basis. This section provides access to Information Security Policy Framework templates (for example, policies and standards) that are needed t '''SOX Policy Sample Library'''<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...ogy Security Policy:|'''Sample Information Systems and Technology Security Policy''']]<br> :The Sample Information Systems and Technology Security Policy serves as the top level document setting the holistic tone for the subseque ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...would reflect adversely on Company, can be considered a violation of this policy.<br> ...ipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ==Guidance Towards Establishing an Enterprise Wide Open-Source Usage Policy== A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software m ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...tion and Classification Policy:|'''Asset Identification and Classification Policy''']].<br> ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (365 words) - 19:25, 14 January 2014
  • 16:15, 23 July 2012
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...ementation, and maintenance of the Asset Identification and Classification Policy and associated standards and guidelines.<br> ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • Is this supposed to be a policy or a standard? The heading says its a policy but the text of it says it's a standard. This is actually a legacy policy that evolved into the current standard located here: [[http://lazarusallian ...
    313 bytes (51 words) - 18:12, 16 October 2009
  • ==Sample Information Systems and Technology Security Policy== This Information Systems and Technology Security Policy define Company objectives for establishing specific standards on the protec ...
    4 KB (465 words) - 15:46, 13 January 2014
  • 14:55, 21 January 2014

Page text matches

  • #REDIRECT [https://lazarusalliance.com/privacy-policy/] ==Privacy Policy== ...
    189 bytes (21 words) - 12:43, 10 September 2016
  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...lse: Security can be communicated, taught, or measured effectively without policy.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...lse: Security can be communicated, taught, or measured effectively without policy.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • Is this supposed to be a policy or a standard? The heading says its a policy but the text of it says it's a standard. This is actually a legacy policy that evolved into the current standard located here: [[http://lazarusallian ...
    313 bytes (51 words) - 18:12, 16 October 2009
  • ...d Classification Policy:|'''Sample Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy defines objectives for establishing specific standards to define, identify, ...
    3 KB (404 words) - 14:53, 25 July 2006
  • '''Sample Asset Identification and Classification Policy:‎ has been rolled back.''' The changes you have made to this policy sample should not be made to the online sample. In the future, copy and pas ...
    328 bytes (51 words) - 12:31, 21 May 2007
  • '''Sample Asset Identification and Classification Policy:‎ has been rolled back.''' The changes you have made to this policy sample should not be made to the online sample. In the future, copy and pas ...
    330 bytes (51 words) - 15:13, 16 April 2007
  • ...s on an annual basis. This section provides access to Information Security Policy Framework templates (for example, policies and standards) that are needed t '''SOX Policy Sample Library'''<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...curity (and privacy) of customer information. This section provides sample Policy Framework templates (for example, policies and standards) that are needed t '''GLBA Policy Sample Library'''<br> ...
    2 KB (263 words) - 12:52, 14 July 2006
  • ...sification Policy:|'''Sample HIPAA Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy is required to comply with HIPAA (Subpart C Section 164.308(a)1C,2 and Sect ...
    5 KB (614 words) - 16:46, 25 July 2006
  • :::a. [[SOX.2.0.17:|'''SOX.2.0.17''']] An information security policy exists and has been approved by an appropriate level of executive managemen Obtain a copy of the organization’s security policy and evaluate the effectiveness. Points to be taken into consideration inclu ...
    3 KB (351 words) - 16:49, 25 June 2006
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (281 words) - 14:46, 2 March 2007
  • ...s that wish to exceed GLBA requirements and establish a more comprehensive Policy Framework.<br> ...ssification Policy:|'''Sample GLBA Asset Identification and Classification Policy''']]<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (296 words) - 14:47, 2 March 2007
  • ...s to support the protection objectives established in the Asset Protection Policy.<br> ...s to support the protection objectives established in the Asset Protection Policy.<br> ...
    5 KB (597 words) - 15:27, 16 November 2006
  • ==Sample Information Systems and Technology Security Policy== This Information Systems and Technology Security Policy define Company objectives for establishing specific standards on the protec ...
    4 KB (465 words) - 15:46, 13 January 2014
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (294 words) - 14:46, 2 March 2007
  • ...he templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain '''HIPAA Policy Sample Library'''<br> ...
    2 KB (260 words) - 13:17, 15 June 2007
  • ...s to support the protection objectives established in the Asset Protection Policy.<br> ...s to support the protection objectives established in the Asset Protection Policy.<br> ...
    4 KB (512 words) - 12:05, 25 July 2006
  • ...rter and supporting policies that are required to comply with ISO Security Policy objectives.<br> ...formation Security Program Charter is required to comply with ISO Security Policy objectives and serves as the capstone document for the Information Security ...
    2 KB (202 words) - 12:40, 15 June 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)