Info-Tech's Security Policy templates allow you to easily develop new policy documents.
|
|
The data center access policy will outline the standards for regulating access to the company data center(s).
|
|
The email acceptable use policy outlines the standards for appropriate use of corporate email accounts.
|
|
The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
|
|
The PDA usage policy outlines standards for connecting to company network(s) or related technology resources via any means involving mobile devices that are categorized as...
|
|