Bring Your Own Device Policy
€49.00
The objective of this policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to Company’s organization network for business purposes.
Compliance and Auditing Policy
€49.00
The Compliance and Auditing Policy defines the approach to be taken to ensure the Company is compliant with legal, statutory, regulatory and contractual obligations related to information security and of…
Compliance with Legal Requirements Policy
€49.00
The Compliance with Legal Requirements Policy is designed to avoid breaches of any criminal and civil law, statutory, regulatory or contractual obligations and of any security requirements.
Desktop Usage Policy
€49.00
The Desktop Usage Policy is intended to maintain the security of Company information processing on desktop computers equipment against the risks associated with the exposure or loss of sensitive, unique…
Email Usage Policy
€49.00
The Email Usage Policy was developed by Company in order to allow the secure and effective use of the electronic mail (e-mail) service inside and outside Company. This policy set…
Information Risk Management Policy
€49.00
The Company has adopted an Information Risk Management Policy (“Policy”) to describe rules and expectations for both itself and all its direct and indirect subsidiaries countrywide (together with the Company)…
Information Security Training Strategy
€49.00
The Information Security Training Strategy was developed by the Company as a tool to prepare for and implement the internal security training and awareness program.
Internet Access and Usage Policy
€49.00
The objective of the Internet Access and Usage Policy is to define standards for systems that monitor and limit web use from any host within Company’s network.
Internet Access Policy
€49.00
The objective of the Internet Access Policy is to allow the secure and effective use of the Internet. This policy set the standard for appropriate behavior of users when accessing…