System Development Procedure – Template 2
€79.00
The main objective of the System Development Procedure is to ensure that standardized methods and procedures are used for efficient and prompt handling of all internal developments decided in the…
System Operations Standard
€79.00
This System Operations Standard is aimed at IT Operations processes rather than normal end user activities and addresses IT requirements which must be incorporated into system deployment, system support, system…
Systems & Applications Development and Operations Policy
€79.00
The purpose of the Systems & Applications Development and Operations Policy is to set the principles used in the acquisition, the development and the implementation of the Company information assets.
Systems Management Policy
€49.00
The Systems Management Policy outlines the security requirements for the management of Company’s IT networks, Information Systems and the integrity of related business processes. All IT networks and Information Systems…
Technical Vulnerability Management and Control of Malware Standard
€79.00
The objective of the Technical Vulnerability Management and Control of Malware Standard is to set the minimum requirements for Technical Vulnerability Management and for Control of Malware.
Technology Risk Policy – Template 1
€49.00
The objectives of the Technology Risk Policy are to ensure that Technology Risks are proactively identified, well understood, and prudently managed in order to support the achievement of business objectives…
Technology Risk Policy – Template 2
€49.00
Information and the supporting business applications, IT processes, databases and underlying infrastructure are important assets of Company and, like other important assets, must be suitably protected. The availability, integrity and…
Third Party Access Policy
€49.00
The objective of the Third Party Access Policy is to maintain the security of information processing facilities of Company accessed by third parties.
Third Party Access Procedure
€49.00
The Third Party Access Procedure describes the security rules that must be followed at the Company in order to maintain the security of information processing facilities of Company accessed by…