YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname.    Price: USD 49.900,-    Phone: +49(176)74919078
     
     
www.yurtseven.org
 www.yurtseven.org
 

 
 Computers » Security » Policy » Sample Policies


 Web Pages    31 - 40   of   71 Back to Sample Policies Home 


Collaborative open project building a library of sample information security policies, supporting standards and other documents through a wiki.

http://www.lazarusalliance.com/horsewiki/index.php/Documents

[more pages from this URL] 


Example policy covering pre-employment screening, security policy training etc.

http://www.datasecuritypolicies.com/wp-content/uploads/2007/04/generic-personnel-security-policy.pdf

[more pages from this URL] 


High level security policy/guideline from the Department of Health and Human Resources.

http://www.pdfku.com/download-pdf-828.html

[more pages from this URL] 


 34 - CSPO Tools Inc. Browse Website open in new window
Information security policies, some of which are available without charge as PDF files or for an annual subscription as MS Word files, along with additional content.

http://www.cspotools.com

[more pages from this URL] 


 35 - ISMS Policy Browse Website open in new window
A high level (single page) policy statement from Ricoh, supporting their Information Security Management System.

http://www.ricoh.ca/pdfs/ISMS%20Policy%20Statement.pdf

[more pages from this URL] 


SANS consensus research project offering around 30 editable information security policies.

http://www.sans.org/resources/policies/

[more pages from this URL] 


Security policy for the OpenSSL FIPS software object module, required for validation against FIPS (Federal Information Processing Standard) 140-2.

http://openssl.org/docs/fips/SecurityPolicy-1.1.1.pdf

[more pages from this URL] 


General advice for those new to writing information security policies.

http://www.sans.org/resources/policies/Policy_Primer.pdf

[more pages from this URL] 


Defines encryption algorithms that are suitable for use within the organization. [MS Word]

http://www.sans.org/resources/policies/Acceptable_Encryption_Policy.doc

[more pages from this URL] 


Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information. [MS Word]

http://www.sans.org/resources/policies/Acceptable_Use_Policy.doc

[more pages from this URL] 




«« Previous 1  2  3  4  5  6  7  8  Next »»




Easy Web Admin


Add URL  |  My Listings  |  My Account  |  New Membership  |  Contact