Password Procedure
The purpose of the Password Procedure is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change.
The purpose of the Password Procedure is to establish a standard for creation of strong passwords, the protection of those passwords, and the frequency of change.
The Mobile Computing Procedure addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.
The Mobile Computing Policy addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.
The IT Acceptable Use Policy sets out the principles and instructions to follow for acceptable and appropriate use of information technology hardware, software, systems, applications, data, facilities, networks, and telecommunications equipment based on information security control objectives and requirements to protect Company’s IT information assets.
The objectives of the Internet Usage Procedure are establish the main rules to ensure appropriate protection of the Company’s connections to the Internet.