The Sponsored Access Policy sets forth the requirements for handling Sponsored Access to the information assets. The Company provides clients with direct access to certain operations in Company’s name (Sponsored Access). Sponsored Access differs from direct market access in that information flow is not routed through Company’s systems.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. SPONSORED ACCESS REQUIREMENTS
4. SPONSORED ACCESS PERMISSIONING
5. SPONSORED ACCESS AGREEMENT
6. REQUIRED CONTROLS
7. EXCEPTIONS
8. FINAL CONSIDERATIONS
8.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
8.2 DOCUMENT REVISION
Pages: 8
This bundle contains all the products listed in the Risk Management section. Take advantage of the 25% OFF when buying the bundle!
This document highlights the standard requirements for Information Security Incident Handling within the Company.
Adequate Capacity Management Policy must be defined and implemented at the Company, in order to be possible to correctly monitor the performance of the existing or future Company systems, to forecast their future evolution and identify possible bottlenecks.
Review Sponsored Access Policy.
You must be logged in to post a review.