YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname.    Price: USD 49.900,-    Phone: +49(176)74919078
     
     
www.yurtseven.org
 www.yurtseven.org
 

 
 Computers » Security » Policy » Sample Policies


 Web Pages    61 - 70   of   71 Back to Sample Policies Home 


Sample policy establishing security requirements of equipment to be deployed in the corporate De-Militarized Zone. [MS Word]

http://www.sans.org/resources/policies/DMZ_Lab_Security_Policy.doc

[more pages from this URL] 


Policy regarding the use of dial-in connections to corporate networks. [MS Word]

http://www.sans.org/resources/policies/Dial-in_Access_Policy.doc

[more pages from this URL] 


Sample policy establishing the minimum security requirements for all routers and switches connecting to production networks. [MS Word]

http://www.sans.org/resources/policies/Router_Security_Policy.doc

[more pages from this URL] 


IT security policy applicable to the Victoria Police in Australia. 93 pages based on ISO/IEC 27002 and related standards.

http://www.cleds.vic.gov.au/retrievemedia.asp?Media_ID=20338

[more pages from this URL] 


An overarching security policy from Berkeley University includes links to more specific and detailed policies.

https://security.berkeley.edu/IT.sec.policy.html

[more pages from this URL] 


 66 - Privacy Policy Browse Website open in new window
Concise policy (just 3 paragraphs) published by the School of Graduate Studies at Norwich University.

http://www.graduate.norwich.edu/privacy_policy.php

[more pages from this URL] 


 67 - Ethics Policy Browse Website open in new window
Ethical behavior underpins all procedural security controls. This ethics policy from Spirent is a useful model.

http://www.spirent.com/about/technology.cfm?media=7&ws=324&ss=177

[more pages from this URL] 


Policy template by Walt Kobus defines requirements for resilience, redundancy and fault tolerance in information systems.

http://www.tess-llc.com/Resource Utilization PolicyV4.pdf

[more pages from this URL] 


111-page security policy manual from the Australian New South Wales Department of Commerce, based on ISO/IEC 27001.

http://www.gcio.nsw.gov.au/products-and-services/policies-guidelines/InformationSecurityGuidelineV1.1.pdf/at_download/file

[more pages from this URL] 


The New Zealand Government's information security policy, based on the 2000 version of ISO/IEC 17799. [ZIP file containing PDF and MS Word versions]

http://www.security.govt.nz/sigs/sigs.zip

[more pages from this URL] 




«« Previous 1  2  3  4  5  6  7  8  Next »»




Easy Web Admin


Add URL  |  My Listings  |  My Account  |  New Membership  |  Contact