Mobile Device Security Audit Program
Description BYOD Security! As a manager of information technology, you are well aware of the benefits that BYOD presents your organization in terms of increased
Description BYOD Security! As a manager of information technology, you are well aware of the benefits that BYOD presents your organization in terms of increased
Description This document certifies that your organization believes the IT function is critical to the organization’s success. You can use this document with your IT
Description This simple questionnaire can help you determine whether or not your company has the right amount of IT governance in place. This list of
Description The roles and responsibilities policy describes a standard of “due care” for the ownership, use and transmittal of information resources. The audience for this
Description The Data Security Policy template provides comprehensive language defining the rules and procedures for how employees create, store, move, handle, reproduce, transmit and dispose
Description Since the IT Department plays a critical role in business continuity and disaster recovery, you need to conduct a Business Impact Analysis (BIA). A
Description This policy acknowledges the fact that your users and coworkers demand the ability to check their corporate email wherever and whenever they want. This
Description The Remote System Access Policy establishes rules and procedures for any employee, vendor or partner who is given remote access to the corporate computer
Description The rules in this policy apply to physical access to any corporate facilities, but you own access to the computer rooms along with facilities
Description This policy is written for the benefit of end users who bristle at the thought of setting a password on more than a once-only