Internet Access and Usage Policy
The objective of the Internet Access and Usage Policy is to define standards for systems that monitor and limit web use from any host within Company’s network.
The objective of the Internet Access and Usage Policy is to define standards for systems that monitor and limit web use from any host within Company’s network.
The Information Security Training Strategy was developed by the Company as a tool to prepare for and implement the internal security training and awareness program.
The objective of this document is to identify the boundaries for the Information Security Management System (ISMS) and detail the security structure in place to manage and control the ISMS for the Company.
This objective of the Third Party Security Policy is to define Company’s information security management process for Third Parties that have access to / handle/ process and /or store the Company’s Information.
The objective of this Service Level Agreement is to state those services provided by IT Department to all Client Departments and any guidelines, parameters and procedures to be followed between IT Department and Client Department.