Modem Policy Sample policy from Sandstorm, designed as an addition to an existing Remote Access Policy, if one exists, or simply to stand alone. http://www.sandstorm.net/products/phonesweep/modempolicy.php Sandstorm.net~Site InfoWhoisTrace RouteRBL Check
Network Security Policy Guide Watchguard's guide to creating an overarching network information security policy, supported by subsidiary policies. http://www.watchguard.com/docs/whitepaper/securitypolicy_wp.pdf Watchguard.com~Site InfoWhoisTrace RouteRBL Check
HSPD-12 Privacy Policy Sample privacy policy including Privacy Act systems of records notices, Privacy Act statements and a privacy impact assessment, designed to satisfy the requirements of HSPD-12 “Policy for a Common Identification Standard for Federal Employees and Contrac http://www.whitehouse.gov/omb/memoranda/fy2006/m06-06_att.doc Whitehouse.gov~Site InfoWhoisTrace RouteRBL Check
IT Security Policy IT security policy example/how-to guide from Enterprise Ireland. http://www.enterprise-ireland.com/ebusinesssite/guides/internal_security/internal_security_index.asp Enterprise-ireland.com~Site InfoWhoisTrace RouteRBL Check
Encryption Policy Defines encryption algorithms that are suitable for use within the organization. [MS Word] http://www.sans.org/resources/policies/Acceptable_Encryption_Policy.doc Sans.org~Site InfoWhoisTrace RouteRBL Check
Acceptable Use Policy Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information. [MS Word] http://www.sans.org/resources/policies/Acceptable_Use_Policy.doc Sans.org~Site InfoWhoisTrace RouteRBL Check