Procedure Templates

€49.00

Purchase

The Security Incident Procedure provides a method for investigation of security incidents. The objective of this procedure is to provide clarity and consistency to the process of conducting Security investigations…

€49.00

Purchase

The Security Logging Policy was developed by the Company in order to allow the secure and effective use of the Information Technology Asset like computer, systems or data.

€79.00

Purchase

The Segregation of IT Environments Standard supports the IT control framework with respect to segregation of IT environments. It outlines the minimum information security controls for segregation of labs, development,…

€49.00

Purchase

The objective of this Service Level Agreement is to state those services provided by IT Department to all Client Departments and any guidelines, parameters and procedures to be followed between…

€79.00

Purchase

The objective of this policy is to reminds personnel of their responsibilities with respect to electronic communications, and specifically to social media.

€79.00

Purchase

The Software Patches Management Procedure defines the procedure of software upgrade and patches installation. It is applicable to IT department and more specific to the software under responsibility of IT…

€49.00

Purchase

Purpose of the Software Testing Policy is to describe all the required (“rules”) and optional (“recommendations”) elements which have to be covered during any project implementation.

€49.00

Purchase

The Sponsored Access Policy sets forth the requirements for handling Sponsored Access to the information assets.

€79.00

Purchase

The objective of the System Development Procedure is to ensure the integrity and availability of the Company’s information and to prevent damages from uncontrolled implementation of IT systems.