Acceptable Encryption Policy
Defines requirements for encryption algorithms used within the organization. [PDF]
Acceptable Use Policy
Defines acceptable use of equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information. [PDF]
Acceptable Use Policy Report
This is a report on the Acceptable Usage Policy: what corporations expect of it, an instance of a commercially used policy, and a framework for creating your own policy.
Acquisition Assessment Policy
Defines responsibilities regarding corporate acquisitions, and defines the minimum requirements of an acquisition assessment to be completed by the information security group. [PDF]
Analog/ISDN Line Policy
Defines standards for use of analog/ISDN lines for Fax sending and receiving, and for connection to computers. [PDF]
Anti-Virus Guidelines
Defines guidelines for effectively reducing the threat of computer viruses on the organization's network.
Application Service Provider Policy
Defines minimum security criteria that an ASP must execute in order to be considered for use on a project by the organization.
Application Service Provider Standards
Sample set of minimum security standards that an application service provider must meet to be considered for use by a corporation.
Audit Policy
Defines the requirements and provides the authority for the information security team to conduct audits and risk assessments to ensure integrity of information/resources, to investigate incidents, to ensure conformance to security policies, or to monitor user/system activity where appropriate.
Automatically Forwarded Email Policy
Documents the requirement that no email will be automatically forwarded to an external destination without prior approval from the appropriate manager or director.
Company Email Policy
Every company needs to establish a policy regarding use of and access to company email systems -- and then tell all employees what its policy is.
Computing Policies
The electronic resource usage and security policy for the University of Pennsylvania.
Database Password Policy
Defines requirements for securely storing and retrieving database usernames and passwords.
Dial-in Access Policy
Sample policy controlling the use of dial-in connection to corporate networks.
DMZ Lab Security Policy
Sample policy establishing the minimum security requirements of any equipment to be deployed in the corporate DMZ.
Extranet Policy
Defines the requirement that third party organizations requiring access to the organization's networks must sign a third-party connection agreement. [PDF, 80 KB]
Information Sensitivity Policy
Sample policy to assist users to assign sensitity levels to information they own.
Internal Lab Security Policy
Defines requirements for internal labs to ensure that confidential information and technologies are not compromised, and that production services and interests of the organization are protected from lab activities.
Internet DMZ Equipment Policy
Sample policy defining the minimum requirement for all equipment located outside the corporate firewall.
Lab Anti-Virus Policy
Defines requirements which must be met by all computers connected to an organization's lab networks to ensure effective virus detection and prevention.
Results: 1 2 3 4 5 6 Next