This bundle contains all the products listed in the Data Governance section.
Take advantage of the 25% OFF when buying the bundle!
Confidential Information – Breaches and Escalation Policy
Cryptographic Control Policy
Cryptographic Controls Standard
Cryptography Policy
Data Protection Policy
Document Control Procedure
Individual Computing Equipment Usage Policy
Information Assets Classification Policy
Information Classification Policy
Information Classification Procedure
Information Ownership, Classification and Handling Policy
Information Security Incident Handling Policy
Information Security Incident Handling Procedure
Information Security Incident Policy
Information Security Policy – Template 1
Information Security Policy – Template 2
Information Security Policy – Template 3
Information Security Strategy and General Principles
IT Acceptable Use Policy
IT Security Policy – Template 1
IT Security Policy – Template 2
IT Security Policy – Template 3
IT Security Policy – Template 4
Mobile Computing Policy
Mobile Computing Procedure
Privacy and Data Protection Policy
Public Cloud Security Standard
Records Control Procedure
Records Management Policy
Review, Retention and Supervision of Electronic Communications Policy
Secure Operation and Compliance Standard
Security Incident Management Standard
Security Incident Procedure
Social Media Policy
Use of Electronic Communications Policy
Wireless Security Standard
This IT General Controls Catalogue contains a list of 98 controls (Excel format) with detailed descriptions which can be adjusted to fit any complex IT environment, for both Financial Services and Corporate domains. High quality of descriptions cover a range of new controls areas like Robotics and BOTs.
This document should be seen as a guideline which describes a good practice approach to migrating data from legacy or 3rd party systems into SAP. It reflects the expectations of the ERP Competence Center within the Company with respect to Data Migration activities. The Target audiences are the followings: Company SAP Project Teams Company Business […]
The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically, this Standard focuses on key management requirements, acceptable algorithms, appropriate key lengths, and raises pertinent regulatory considerations relating to the use of cryptography. Cryptographic controls […]
Review Data Governance Bundle.
You must be logged in to post a review.