Risk Management

€49.00

Purchase

The objectives of the Internet Usage Procedure are establish the main rules to ensure appropriate protection of the Company's connections to the Internet.

€49.00

Purchase

The objective of this document is to identify the boundaries for the Information Security Management System (ISMS) and detail the security structure in place to manage and control the ISMS…

€49.00

Purchase

The objective of the Making Corporate Information Publicly Available Procedure is to determine whether the disclosure of information is appropriate, to prepare information for disclosure and resolve problems with disclosure…

€79.00

Purchase

The Managing IS Risks in IT Services Provided by Third Parties Standard requires the use of risk management techniques to stipulate controls necessary for the management of the relationship with…

€49.00

Purchase

The Recording of Telephone Conversations Policy governs the admissibility, procedures, responsibilities and authorities that apply to the recording, retention, reproduction and archiving of telephone conversations.

€49.00

Purchase

The objective of this Service Level Agreement is to state those services provided by IT Department to all Client Departments and any guidelines, parameters and procedures to be followed between…

€49.00

Purchase

The Sponsored Access Policy sets forth the requirements for handling Sponsored Access to the information assets.

€49.00

Purchase

The objectives of the Technology Risk Policy are to ensure that Technology Risks are proactively identified, well understood, and prudently managed in order to support the achievement of business objectives…

€49.00

Purchase

Information and the supporting business applications, IT processes, databases and underlying infrastructure are important assets of Company and, like other important assets, must be suitably protected. The availability, integrity and…