Home    |Web Directory    |Metasearch    |Message Boards    |Classified Ads|

Web Directory

Home

Web Directory

Metasearch

Message Boards

Classified Ads








Sample Policies (72)

See Also:
Sites:

http://www.first.org/resources/guides/aup_generic.doc
» Acceptable Use Policy Open in a new browser window
   Template policy clarifying the acceptable use of IT devices and networks. [MS Word]
   http://www.first.org/resources/guides/aup_generic.doc
http://www.cio.ca.gov/OIS/Government/library/documents/ACCEPTABLEUSEPOLICYTEMPLATE.doc
» Acceptable Use Policy Template Open in a new browser window
   A template in MS Word for a basic acceptable use policy, from the State of California Office of Information Security.
   http://www.cio.ca.gov/OIS/Government/library/documents/ACCEPTABLEUSEPOLICYTEMPLATE.doc
http://www.sans.org/resources/policies/Aquisition_Assessment_Policy.doc
» Acquisition Assessment Policy Open in a new browser window
   Defines responsibilities regarding corporate acquisitions and the minimum requirements of an acquisition assessment to be completed by the information security group. [MS Word]
   http://www.sans.org/resources/policies/Aquisition_Assessment_Policy.doc
http://www.sans.org/resources/policies/Analog_Line_Policy.doc
» Analog/ISDN Line Policy Open in a new browser window
   Defines policy for analog/ISDN lines used for FAXing and data connections.
   http://www.sans.org/resources/policies/Analog_Line_Policy.doc
http://dii.vermont.gov/sites/dii/files/pdfs/DII-Malware_Standard.pdf
» Antivirus Policy Open in a new browser window
   From the State of Vermont Agency of Administration. Mandates the use of antivirus software on applicable systems.
   http://dii.vermont.gov/sites/dii/files/pdfs/DII-Malware_Standard.pdf
http://www.sans.org/resources/policies/Application_Service_Providers.pdf
» Application Service Provider Policy Open in a new browser window
   Security criteria for an ASP.
   http://www.sans.org/resources/policies/Application_Service_Providers.pdf
http://www.sans.org/resources/policies/Audit_Policy.pdf
» Audit Policy Open in a new browser window
   Defines requirements and provides authority for the information security team to conduct IT audits and risk assessments.
   http://www.sans.org/resources/policies/Audit_Policy.pdf
http://www.gpc.edu/Governance/policies/1100/1154SecurityAwarenessTraining01-10.pdf
» Awareness and Training Policy Open in a new browser window
   From Georgia Perimeter College. Mandates an ongoing and creative general security awareness program supplemented with more specific training where needed.
   http://www.gpc.edu/Governance/policies/1100/1154SecurityAwarenessTraining01-10.pdf
http://its.uncg.edu/Policy_Manual/Computer_Backup/
» Backup Policy Open in a new browser window
   Sample policy from the University of North Carolina requires daily, weekly and monthly backups (sometimes known as 'grandfather, father, son').
   http://its.uncg.edu/Policy_Manual/Computer_Backup/
http://www.wustl.edu/policies/infosecurity.html
» Campus Security Policy Open in a new browser window
   High level information security policy from Washington University.
   http://www.wustl.edu/policies/infosecurity.html
http://www.sans.org/resources/policies/DMZ_Lab_Security_Policy.doc
» DMZ Security Policy Open in a new browser window
   Sample policy establishing security requirements of equipment to be deployed in the corporate De-Militarized Zone. [MS Word]
   http://www.sans.org/resources/policies/DMZ_Lab_Security_Policy.doc
http://www.sans.org/resources/policies/DB_Credentials_Policy.doc
» Database Password Policy Open in a new browser window
   Defines requirements for securely storing and retrieving database usernames and passwords. [MS Word]
   http://www.sans.org/resources/policies/DB_Credentials_Policy.doc
http://www.sans.org/resources/policies/Dial-in_Access_Policy.doc
» Dial-in Access Policy Open in a new browser window
   Policy regarding the use of dial-in connections to corporate networks. [MS Word]
   http://www.sans.org/resources/policies/Dial-in_Access_Policy.doc
http://www.templatezone.com/pdfs/Disaster-Recovery-policy.pdf
» Disaster Recovery Policy Open in a new browser window
   Basic DR policy in just over one side.
   http://www.templatezone.com/pdfs/Disaster-Recovery-policy.pdf
http://www.socialmedia.org/wp-content/uploads/2009/07/SMBC-Disclosure-Best-Practices-Toolkit.docx
» Disclosure And Blogging Policies Open in a new browser window
   An open source document containing a suite of information security policy statements regarding employees blogging or contributing to other online media, written in the form of checklists. [MS Word]
   http://www.socialmedia.org/wp-content/uploads/2009/07/SMBC-Disclosure-Best-Practices-Toolkit.docx
http://www.ucop.edu/ucophome/coordrev/policy/PP081805ECP.pdf
» Electronic Communications Policy Open in a new browser window
   Formal policy from the University of California covering email and other electronic communications mechanisms
   http://www.ucop.edu/ucophome/coordrev/policy/PP081805ECP.pdf
http://www.sans.org/resources/policies/Automatically_Forwarded_Email_Policy.pdf
» Email Forwarding Policy Open in a new browser window
   Email must not be forwarded automatically to an external destination without prior approval from the appropriate manager.
   http://www.sans.org/resources/policies/Automatically_Forwarded_Email_Policy.pdf
https://www.cusys.edu/policies/policies/IT_Email.html
» Email Policy Open in a new browser window
   Policy from the University of Colorado on the use of, access to, and disclosure of electronic mail.
   https://www.cusys.edu/policies/policies/IT_Email.html
http://www.sans.org/resources/policies/email_retention.doc
» Email Retention Policy Open in a new browser window
   Sample policy to help employees determine which emails should be retained and for how long.
   http://www.sans.org/resources/policies/email_retention.doc
http://www.sans.org/resources/policies/Acceptable_Encryption_Policy.doc
» Encryption Policy Open in a new browser window
   Defines encryption algorithms that are suitable for use within the organization. [MS Word]
   http://www.sans.org/resources/policies/Acceptable_Encryption_Policy.doc
http://www.spirent.com/about/technology.cfm?media=7&ws=324&ss=177
» Ethics Policy Open in a new browser window
   Ethical behavior underpins all procedural security controls. This ethics policy from Spirent is a useful model.
   http://www.spirent.com/about/technology.cfm?media=7&ws=324&ss=177
http://www.sans.org/resources/policies/Extranet_Policy.doc
» Extranet Policy Open in a new browser window
   Defines the requirement that third party organizations requiring access to the organization's networks must sign a third-party connection agreement. [MS Word]
   http://www.sans.org/resources/policies/Extranet_Policy.doc
http://openssl.org/docs/fips/SecurityPolicy-1.1.1.pdf
» FIPS 140-2 Security Policy Open in a new browser window
   Security policy for the OpenSSL FIPS software object module, required for validation against FIPS (Federal Information Processing Standard) 140-2.
   http://openssl.org/docs/fips/SecurityPolicy-1.1.1.pdf
http://www.securityfocus.com/infocus/1497
» IP Network Security Policy Open in a new browser window
   Example security policy to demonstrate policy writing techniques introduced in three earlier articles.
   http://www.securityfocus.com/infocus/1497
http://www.ricoh.ca/pdfs/ISMS%20Policy%20Statement.pdf
» ISMS Policy Open in a new browser window
   A high level (single page) policy statement from Ricoh, supporting their Information Security Management System.
   http://www.ricoh.ca/pdfs/ISMS%20Policy%20Statement.pdf
http://www.27001-online.com/secpols.htm
» ISO/IEC 27001 Policies Open in a new browser window
   Typical headings for a security policy aligned broadly with the ISO/IEC 27002 standard for information security management systems.
   http://www.27001-online.com/secpols.htm
http://www.iso27001security.com/html/iso27k_toolkit.html
» ISO27k Toolkit Open in a new browser window
   Collection of information security policies, procedures etc. aligned with the ISO/IEC 27000-series standards and provided under the Creative Commons license.
   http://www.iso27001security.com/html/iso27k_toolkit.html
http://www.enterprise-ireland.com/ebusinesssite/guides/internal_security/internal_security_index.asp
» IT Security Policy Open in a new browser window
   IT security policy example/how-to guide from Enterprise Ireland.
   http://www.enterprise-ireland.com/ebusinesssite/guides/internal_security/internal_security_index.asp
http://www.yale.edu/ppdev/policy/5143/5143.pdf
» Incident Response Policy Open in a new browser window
   Yale University's policy regarding assessing IT security incidents, forming response teams and responding.
   http://www.yale.edu/ppdev/policy/5143/5143.pdf
http://www.ucisa.ac.uk/ist/
» Information Security Policies Open in a new browser window
   The Information Security Toolkit from UCISA (University Colleges and Information Systems Association) contains a suite of security policy and guidance documents reflecting and cross-referenced against BS7799, intended for use in universities. [PDF documen
   http://www.ucisa.ac.uk/ist/
http://www.pdfku.com/download-pdf-828.html
» Information Security Policy Open in a new browser window
   High level security policy/guideline from the Department of Health and Human Resources.
   http://www.pdfku.com/download-pdf-828.html
http://www.sans.org/resources/policies/Information_Sensitivity_Policy.pdf
» Information Sensitivity Policy Open in a new browser window
   Sample policy defining the assignment of sensitivity levels to information.
   http://www.sans.org/resources/policies/Information_Sensitivity_Policy.pdf
http://www.ruskwig.com/docs/internet_policy.pdf
» Internet Acceptable Use Policy Open in a new browser window
   One page Acceptable Use Policy example.
   http://www.ruskwig.com/docs/internet_policy.pdf
http://www.sans.org/resources/policies/Internet_DMZ_Equipment_Policy.pdf
» Internet DMZ Equipment Policy Open in a new browser window
   Sample policy defining the minimum requirement for all equipment located outside the corporate firewall.
   http://www.sans.org/resources/policies/Internet_DMZ_Equipment_Policy.pdf
http://www.sans.org/resources/policies/Internal_Lab_Security_Policy.doc
» Laboratory Security Policy Open in a new browser window
   Policy to secure confidential information and technologies in the labs and protect production services and the rest of the organization from lab activities. [MS Word]
   http://www.sans.org/resources/policies/Internal_Lab_Security_Policy.doc
https://www.igt.connectingforhealth.nhs.uk/WhatsNewDocuments/Exemplar%20Laptop%20Security%20Policy.doc
» Laptop Security Policy Open in a new browser window
   From the National Health Service. [MS Word]
   https://www.igt.connectingforhealth.nhs.uk/WhatsNewDocuments/Exemplar%20Laptop%20Security%20Policy.doc
http://www.cleds.vic.gov.au/retrievemedia.asp?Media_ID=20338
» Law Enforcement Data Security Standards Open in a new browser window
   IT security policy applicable to the Victoria Police in Australia. 93 pages based on ISO/IEC 27002 and related standards.
   http://www.cleds.vic.gov.au/retrievemedia.asp?Media_ID=20338
http://www.sandstorm.net/products/phonesweep/modempolicy.php
» Modem Policy Open in a new browser window
   Sample policy from Sandstorm, designed as an addition to an existing Remote Access Policy, if one exists, or simply to stand alone.
   http://www.sandstorm.net/products/phonesweep/modempolicy.php
http://www.utoronto.ca/security/documentation/policies/policy_5.htm
» Network Security Policy Open in a new browser window
   Example security policy for a data network from the University of Toronto.
   http://www.utoronto.ca/security/documentation/policies/policy_5.htm
http://www.watchguard.com/docs/whitepaper/securitypolicy_wp.pdf
» Network Security Policy Guide Open in a new browser window
   Watchguard's guide to creating an overarching network information security policy, supported by subsidiary policies.
   http://www.watchguard.com/docs/whitepaper/securitypolicy_wp.pdf
http://www.umflint.edu/its/units/initiatives/publicity/password.htm
» Password Policy Open in a new browser window
   A password policy presented in the form of a series of security awareness posters. "Passwords are like underwear ..."
   http://www.umflint.edu/its/units/initiatives/publicity/password.htm
http://plone.e.govt.nz/standards/e-gif/authentication/password/password.pdf
» Password Standard Open in a new browser window
   32 page extended policy document from the New Zealand government, explains both risks and control requirements.
   http://plone.e.govt.nz/standards/e-gif/authentication/password/password.pdf
http://www.datasecuritypolicies.com/wp-content/uploads/2007/04/generic-personnel-security-policy.pdf
» Personnel Security Policy Open in a new browser window
   Example policy covering pre-employment screening, security policy training etc.
   http://www.datasecuritypolicies.com/wp-content/uploads/2007/04/generic-personnel-security-policy.pdf
http://www.graduate.norwich.edu/privacy_policy.php
» Privacy Policy Open in a new browser window
   Concise policy (just 3 paragraphs) published by the School of Graduate Studies at Norwich University.
   http://www.graduate.norwich.edu/privacy_policy.php
http://www.sans.org/resources/policies/Remote_Access_Policy.doc
» Remote Access Policy Open in a new browser window
   Defines standards for connecting to a corporate network from any host. [MS Word]
   http://www.sans.org/resources/policies/Remote_Access_Policy.doc
http://www.tess-llc.com/Resource Utilization PolicyV4.pdf
» Resource Utilization Policy Open in a new browser window
   Policy template by Walt Kobus defines requirements for resilience, redundancy and fault tolerance in information systems.
   http://www.tess-llc.com/Resource Utilization PolicyV4.pdf
http://www.sans.org/resources/policies/Risk_Assessment_Policy.doc
» Risk Assessment Policy Open in a new browser window
   Defines requirements and authorizes the information security team to identify, assess and remediate risks to the organization's information infrastructure. [MS Word]
   http://www.sans.org/resources/policies/Risk_Assessment_Policy.doc
http://www.sans.org/resources/policies/Router_Security_Policy.doc
» Router Security Policy Open in a new browser window
   Sample policy establishing the minimum security requirements for all routers and switches connecting to production networks. [MS Word]
   http://www.sans.org/resources/policies/Router_Security_Policy.doc
http://www.sans.org/resources/policies/Policy_Primer.pdf
» Security Policy Primer Open in a new browser window
   General advice for those new to writing information security policies.
   http://www.sans.org/resources/policies/Policy_Primer.pdf
http://www.sans.org/resources/policies/Server_Security_Policy.pdf
» Server Security Policy Open in a new browser window
   Defines standards for minimal security configuration for servers inside the organization's production network, or used in a production capacity.
   http://www.sans.org/resources/policies/Server_Security_Policy.pdf
http://spg.umich.edu/pdf/601.07-0.pdf
» Standard Practice Guide Open in a new browser window
   Policy covering appropriate use of information resources and IT at the University of Michigan.
   http://spg.umich.edu/pdf/601.07-0.pdf
http://www.womans-work.com/teleworking_policy.htm
» Telecommuting/Teleworking Policy Open in a new browser window
   Sample policy on teleworking covering employment as well as information security issues.
   http://www.womans-work.com/teleworking_policy.htm
http://www.epolicyinstitute.com
» The ePolicy Institute Open in a new browser window
   Provides policies and resources on information security and other related topics.
   http://www.epolicyinstitute.com
http://www.sans.org/resources/policies/Third_Party_Agreement.pdf
» Third Party Connection Agreement Open in a new browser window
   Sample agreement for establishing a connection to an external party.
   http://www.sans.org/resources/policies/Third_Party_Agreement.pdf
http://security.louisville.edu/PolStds
» University Information Security Policies Open in a new browser window
   A set of information security policies from the University of Louisville.
   http://security.louisville.edu/PolStds
http://www.sans.org/resources/policies/Virtual_Private_Network.pdf
» Virtual Private Network Policy Open in a new browser window
   Defines the requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization's network.
   http://www.sans.org/resources/policies/Virtual_Private_Network.pdf
http://www.sans.org/resources/policies/Wireless_Communication_Policy.pdf
» Wireless Communication Policy Open in a new browser window
   Sample policy concerning the use of unsecured wireless communications technology.
   http://www.sans.org/resources/policies/Wireless_Communication_Policy.pdf

Category Editor: garyhins

Last Updated: 2010-06-16 05:14:02





Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor

The content of this directory is based on the Open Directory and has been modified by GoSearchFor.com

Free previews by Thumbshots.org