Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ==Sources of standards for Information Security== ...[[Information Security Management System]]s" are of particular interest to information security professionals.<br> ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ==Sample Information Systems and Technology Security Policy== ...protection of the confidentiality, integrity, and availability of Company information assets. ...
    4 KB (465 words) - 15:46, 13 January 2014
  • ==Service Desk Management== ...called for in IT Service Management (ITSM) as defined by the [[Information Technology Infrastructure Library]] (ITIL). It is intended to provide a Single Point o ...
    4 KB (552 words) - 16:15, 20 March 2007
  • ...rces under sub-chapter I of chapter 35 of this title, or the disclosure of information to Congress or the Comptroller General of the United States. ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • ==IT Management Booklet== ...risk management processes to ensure effective information technology (IT) management.<br> ...
    5 KB (645 words) - 18:03, 27 April 2007
  • ...rces under sub-chapter I of chapter 35 of this title, or the disclosure of information to the Congress or the Comptroller General of the United States. While this ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • =='''Asset Management'''== ...It is about the management, control and protection of '''all''' aspects of Information / Data in whatever form for example paper records or X-Ray Film and fiche. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ==IT Risk Management Process== ...essments. Senior management should identify, measure, control, and monitor technology to avoid risks that threaten the safety and soundness of an institution.<br ...
    4 KB (528 words) - 16:58, 28 March 2010
  • '''PO 3.4 Technology Standards'''<br> ...measure compliance with these standards and guidelines. This forum directs technology standards and practices based on their business relevance, risks and compli ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...nal standard for [[Compliance#ITIL_IT_Infrastructure_Library: | IT Service Management]]. It was developed in 2005, by the BSI Group. It is based on and intended ...ogether, these form a top-down framework to define the features of service management processes that are essential for the delivery of high quality services.<br> ...
    2 KB (298 words) - 14:25, 23 April 2010
  • ==Change Management== ...anges (fixes) - with minimum risk to IT infrastructure. The goal of Change Management is to ensure that standardized methods and procedures are used for efficien ...
    4 KB (588 words) - 16:23, 21 March 2007
  • ....316). Policies provide the necessary authority to establish and implement technology- and solution-specific standards.<br> :1. [[Sample_Information_Security_Program_Charter:|'''Sample HIPAA Information Security Program Charter''']]<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • Policies are the broad rules for ensuring the protection of information assets, and for implementing a security strategy or program. Generally brie :[[Sample Information Security Program Charter:|'''Sample Information Security Program Charter''']]<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...ncorporate the consequences of these trends into the development of the IT technology infrastructure plan.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    2 KB (290 words) - 17:49, 25 April 2007
  • ==Configuration Management== ...rocess''' that tracks all of the individual Configuration Items (CI) in an information system which may be as simple as a single server, or as complex as the enti ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...sually created by an organization's [[Chief Information Officer]] (CIO) or technology manager and should be designed to support the organization's overall [[busi One of the principal purposes of creation of a technology strategy is to create consensus and stakeholder buy-in. There are many met ...
    5 KB (777 words) - 17:59, 16 February 2007
  • [[Organizing Information Security:|'''Organizing Information Security''']]<br> [[Asset Management:|'''Asset Management''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ==Financial Management== ...ery section of the [[ITIL]] best practice framework. The aim of Financial Management for IT Services is to give accurate and cost effective stewardship of IT as ...
    6 KB (885 words) - 10:12, 23 March 2007
  • '''Policies''' are the broad rules for ensuring the protection of information assets, and for implementing a security strategy or program. Generally brie ...s to a companies Board of Directors. Standards are approved by a companies technology review board.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ==Sample End User Computing and Technology Policy== ...tablishing specific standards on appropriate business use of the Company's information and telecommunications systems and equipment. ...
    4 KB (507 words) - 14:58, 21 January 2014
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)