Website Information
    Web Site Information :.   Site Info    Whois    Traceroute    RBL Check  

Enter Web Site URL Address:
 

Top / Computers / Security / Policy / Sample_Policies /

Information Security Policies
NIST's collection of well over 100 security policies and related awareness materials, mostly from US Government bodies.
http://csrc.nist.gov/fasp/jump.html
Nist.gov  ~   Site Info   Whois   Trace Route   RBL Check  
Information Security Policy
An information security policy from the University of Illinois.
http://www.obfs.uillinois.edu/manual/central_p/sec19-5.html
Uillinois.edu  ~   Site Info   Whois   Trace Route   RBL Check  
Modem Policy
Sample policy from Sandstorm, designed as an addition to an existing Remote Access Policy, if one exists, or simply to stand alone.
http://www.sandstorm.net/products/phonesweep/modempolicy.php
Sandstorm.net  ~   Site Info   Whois   Trace Route   RBL Check  
Network Security Policy Guide
Watchguard's guide to creating an overarching network information security policy, supported by subsidiary policies.
http://www.watchguard.com/docs/whitepaper/securitypolicy_wp.pdf
Watchguard.com  ~   Site Info   Whois   Trace Route   RBL Check  
HSPD-12 Privacy Policy
Sample privacy policy including Privacy Act systems of records notices, Privacy Act statements and a privacy impact assessment, designed to satisfy the requirements of HSPD-12 “Policy for a Common Identification Standard for Federal Employees and Contrac
http://www.whitehouse.gov/omb/memoranda/fy2006/m06-06_att.doc
Whitehouse.gov  ~   Site Info   Whois   Trace Route   RBL Check  
IT Security Policy
IT security policy example/how-to guide from Enterprise Ireland.
http://www.enterprise-ireland.com/ebusinesssite/guides/internal_security/internal_security_index.asp
Enterprise-ireland.com  ~   Site Info   Whois   Trace Route   RBL Check  
Security Policy Primer
General advice for those new to writing information security policies.
http://www.sans.org/resources/policies/Policy_Primer.pdf
Sans.org  ~   Site Info   Whois   Trace Route   RBL Check  
Encryption Policy
Defines encryption algorithms that are suitable for use within the organization. [MS Word]
http://www.sans.org/resources/policies/Acceptable_Encryption_Policy.doc
Sans.org  ~   Site Info   Whois   Trace Route   RBL Check  
Acceptable Use Policy
Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information. [MS Word]
http://www.sans.org/resources/policies/Acceptable_Use_Policy.doc
Sans.org  ~   Site Info   Whois   Trace Route   RBL Check  
Analog/ISDN Line Policy
Defines policy for analog/ISDN lines used for FAXing and data connections.
http://www.sans.org/resources/policies/Analog_Line_Policy.doc
Sans.org  ~   Site Info   Whois   Trace Route   RBL Check  
 


Page 2/8« Previous12345Next »
  IP Index    TLD Index    Domain Index    Site Index New   Copyright © 2025 Cybernet Quest.