Procedure Templates

€79.00

Purchase

This objective of the Third Party Security Policy is to define Company’s information security management process for Third Parties that have access to / handle/ process and /or store the…

€49.00

Purchase

The Training Management Policy describes the implementation at the Company of the training management strategy.

€49.00

Purchase

The Use of Electronic Communications Policy sets out the principles and procedures applicable to electronic communications, including email, instant messaging, digital faxing and other electronic communication services, of Company personnel.

€49.00

Purchase

The objective of the Use of Network Services Policy is to establish management direction, procedural requirements, and technical guidance to ensure the appropriate protection of Company’s information handled by computer…

€49.00

Purchase

The objective of the User Access Management Procedure is to define the actors and processes to grant/revoke/modify users access rights, together with a method of reviewing and re-confirming the user’s…

€49.00

Purchase

The objective of the User Account Management Procedure is to design a generic, maintainable solution for the whole community of system and service managers.

€49.00

Purchase

The User Administration Procedure has been designed to provide a unified guideline for creating, modifying or deleting user accounts from Company business systems.

€49.00

Purchase

The objective of this policy is to set the framework and regulations for controlling the logical access of users (employees and third-parties) to the Company information systems.

€49.00

Purchase

The objective of the Vulnerability Alerts Procedure is to describe the vulnerability alerts process, which sets a consistent approach for the distribution, evaluation and follow-up of vulnerability alerts regarding Information…