/
Policies, Procedures and Guidelines
Policies, Procedures and Guidelines
Technology Policies, Procedures and Guidelines
CIS Procedures and Guidelines
- Administrative Account Access
- Backup and Data Recovery
- CIS Change Management Policy
- CIS NetTel Standards - Division 27 Requirements
- CIS Network and Telecommunications Charge-back
- CIS Privileged Account Usage
- CIS Service Disruption Notification Procedures
- Email / Document Retention and Recovery
- Email-Retraction Policy (Spam/Phishing)
- Employment Separation Procedures
- Lifecycle Replacement of Building Active Electronics (Infrastructure)
- Server Maintenance Policy
- Server Provisioning, Hosting and Remote Access Policy
Campus Technology Policies
- Authorization of Third-Party Email Senders via DKIM SPF DMARC
- Centralized PC Purchasing Policy
- Centralized Printing Policy
- Cloud Computing Policy
- Computer Acceptable Use Policy
- Computer User Accounts and Resources
- Email Signature Policy
- Employee Email List Use and Guidelines
- Enterprise Software Acquisition
- Guest Network Access
- Internet Content Filtering
- Password Policies and Guidelines
- Privileged System Access Policy
- Profile Photo Guidelines
- Use of Personal / Un-Managed Devices for Work
- Website Terms of Use
Technology Regulatory Compliance
- DMCA Copyright Compliance / Peer-to-Peer File Sharing
- Identity Theft Prevention Program - Red Flags Rule
- PCI DSS Credit Card Handling
- Preservation and Collection of Electronic Records (eDiscovery)
- Security Incident: Management and Reporting
- Technology Security Laws and Regulations
, multiple selections available,
Related content
Computer Acceptable Use Policy
Computer Acceptable Use Policy
Read with this
Academic Policy
Academic Policy
More like this
CIS Privileged Account Usage
CIS Privileged Account Usage
Read with this
IT Workload and Project Roadmaps
IT Workload and Project Roadmaps
Read with this
Technology Policy
Technology Policy
More like this