Menu
Submit Site
Home
Computer
Security
All sites of Security
Third Party Connectivity Policy
Third Party Connectivity Policy- From the State of Vermont Agency of Administration. Connections require business cases, audits etc. ...
Acceptable Use of Computing and Electronic Resources Policy
Acceptable Use of Computing and Electronic Resources Policy- From the University of North Carolina, Greensboro. Specifies responsibilities and prohibited activities in relation to IT use. ...
Data Classification Policy
Data Classification Policy- From the University of North Carolina, Greensboro. Deliberately simple: defines just two classification levels. Includes responsibilities. ...
Electronic Records Retention Policy
Electronic Records Retention Policy- From the University of North Carolina, Greensboro. Covers the retention of various data files, including those subject to litigation. ...
Identity Theft Prevention Program Policy
Identity Theft Prevention Program Policy- From the University of North Carolina, Greensboro. Lays out controls for detecting and reacting to 'red flag' situations linked to identity theft. ...
Personal Information Security Breach Notification Policy
Personal Information Security Breach Notification Policy- From the University of North Carolina, Greensboro. Policy about mandatory notification of breaches involving the disclosure of personal information. ...
Social Security Numbers Policy
Social Security Numbers Policy- From the University of North Carolina, Greensboro. Specifies security controls to protect SSNs. ...
Wireless Communications Policy
Wireless Communications Policy- From the University of North Carolina, Greensboro. Prohibits wireless devices that may interfere with authorized wireless systems. ...
Copyright Compliance Policy
Copyright Compliance Policy- From the University of North Carolina, Greensboro. Covers compliance with copyright law when using information belonging to others. ...
Copyright Ownership and Use Policy
Copyright Ownership and Use Policy- From the University of North Carolina, Greensboro. Policy on protecting the organization's own intellectual property through copyright. ...
HIPAA Compliance Policy
HIPAA Compliance Policy- From the University of North Carolina, Greensboro. Policy on compliance with the Health Insurance Portability and Accountability Act. ...
eCommerce Privacy Policy
eCommerce Privacy Policy- Policy concerning privacy of visitors to websites, covering logs, cookies and information volunteered. ...
Information Security Policies
Information Security Policies- SANS consensus research project offering around 30 editable information security policies. ...
SUNPKI
SUNPKI- Sun Microsystems Inc.'s Public Key Infrastructure. ...
Privacy Policy
Privacy Policy- One of many many examples on the WWW, this one from the School of Graduate Studies at Norwich University. ...
Information Security Policy
Information Security Policy- High-level information security policy statement for the Childhood Cancer Research Group at Oxford University. ...
Standard Practice Guide
Standard Practice Guide- Policy covering appropriate use of information resources and IT at the University of Michigan. ...
Information Security Policies
Information Security Policies- An extensive set of ISO27k-based policies for universities from University Colleges and Information Systems Association. ...
IP Network Security Policy
IP Network Security Policy- Example security policy to demonstrate policy writing techniques introduced in three earlier articles. ...
Awareness and Training Policy
Awareness and Training Policy- From Georgia Perimeter College. Mandates an ongoing and creative general security awareness program supplemented with more specific training where needed. ...
Information Security Policy
Information Security Policy- From the New School university in New York. Includes a set of 21 high level principles, cross-referenced to ISO/IEC 27002:2005. ...
Information Security Policy
Information Security Policy- From the University of North Carolina, Greensboro. Very succinct - just 5 policy goals. ...
Teleworking Policy
Teleworking Policy- From the University of North Carolina, Greensboro. Covers health and safety and employment issues as well as IT security aspects of home working. ...
Digital Media and Hardware Disposal Policy
Digital Media and Hardware Disposal Policy- From the State of Vermont Agency of Administration. Policy on disposing of IT systems and media securely, without carelessly discarding confidential data. ...
Blogging Policy
Blogging Policy- From the State of Vermont Agency of Administration. Policy re blogging and microblogging (e.g. on Twitter). ...
Laptop Security Policy
Laptop Security Policy- From the National Health Service. [MS Word] ...
Incident Management Policy
Incident Management Policy- From Herriot-Watt University. Clarifies the respective roles of students, faculty and administrators in reporting and dealing with information security incidents. ...
Whistleblower policy
Whistleblower policy- By Euronext N.V. Requires employees to report serious noncompliance incidents, offering whistleblowers protection against disadvantage. ...
Media disposal policy
Media disposal policy- Succinct policy from Oregon State University requires that a competent person signs a release form before disposing of storage media from which the data have been securely erased (e.g. by 7x overwr ...
Electronic Communications Policy
Electronic Communications Policy- Formal policy from the University of California covering email and other electronic communications mechanisms ...
Electronic Communications Policy
Electronic Communications Policy- Policy from the University of Colorado on the use of email and other means of electronic communication for official purposes. ...
Governance Policies Handbook
Governance Policies Handbook- Corporate governance policies for Connexis, a power company ...
Wireless Communication Policy
Wireless Communication Policy- Concerns the use of wireless networking devices. ...
Retention Policy
Retention Policy- Covers retention of documents/information for business and compliance purposes. From Yale University ...
Records Preservation Policy
Records Preservation Policy- Concerns the need to retain formal records associated with ongoing legal actions. From Yale University. ...
Development or Revision and Posting of Policies, Procedures and Forms Policy
Development or Revision and Posting of Policies, Procedures and Forms Policy- Formalities around the development or update and publication of policies, procedures and forms. From Yale University. ...
Social Security Numbers Confidentiality Policy
Social Security Numbers Confidentiality Policy- Controls to maintain the secrecy of SSNs. From Yale University. ...
Information Technology Appropriate Use Policy
Information Technology Appropriate Use Policy- Lays down the rules concerning acceptable ways of using the institution's IT facilities. From Yale University. ...
Electronic Signatures and Records Policy
Electronic Signatures and Records Policy- Concerns what systems can be used for electronic signatures, and under what conditions. From Yale University. ...
Server Security Policy
Server Security Policy- Defines standards for minimal security configuration for servers inside the organization's production network, or used in a production capacity. ...
Providing and Using Information Technology Policy
Providing and Using Information Technology Policy- Concerns ownership and rights over corporate IT equipment, in the University of Colorado. This policy includes an explanatory FAQ section. ...
ISO27k Toolkit
ISO27k Toolkit- Collection of information security policies, procedures etc. aligned with the ISO/IEC 27000-series standards and provided under the Creative Commons license. ...
Accidental Disclosure of Confidential Information Policy
Accidental Disclosure of Confidential Information Policy- An example policy from a dentistry company concerning the inadvertent disclosure of personal information. ...
Email Policy
Email Policy- Policy from Northern Illinois University's IT Services group. Outlines some unacceptable uses. ...
Email Forwarding Policy
Email Forwarding Policy- Email must not be forwarded automatically to an external destination without prior approval from the appropriate manager. ...
Information Security Policy
Information Security Policy- From Euronet Services India. In addition to a page of information security policy statements, it lists roles and responsibilities, plus supporting policies. ...
Privacy Policy
Privacy Policy- Google's privacy policy is clearly written. ...
Information Governance Limited
Information Governance Limited- Supplier of Proteus Enterprise security risk management software for compliance with ISO/IEC 27002 and related information security, risk management and IT governance standards. ...
ISO 27001 Security
ISO 27001 Security- Up to date information and news about the ISO/IEC 27000-series information security standards, with discussion forum, FAQ, implementation support info and links to other security standards. ...
ISO 27000 Toolkit
ISO 27000 Toolkit- Commercial package containing the ISO/IEC 27001 and 27002 standards plus supporting materials such as policies and a glossary. ...
« First
Previous
Page 20 of 42.
Next
Last »
Latest sites from Security
HoneyDrive Desktop
SecureLab
Security Focus
CERT Coordination Center
CR80 News
Heimdal
CyberEvidence, Inc.
JurInnov Ltd.
G-C Partners
Secure Crossing
Privacy Scan
Red Iron
Degausser.co.uk
TSFactory
Nmap
Avatier Corporation
Yoggie Security Systems
Nsauditor.com
Inguama
Sybari Software, Inc.
Declude Virus
Avira
CAcert
Checkpoint
InfoExpress
Send feedback
submit