|Acceptable Use Policy|
This Policy outlines the acceptable use of computer equipment in an organization.
|Access Control Policy|
This policy establishes the rules for safe and secure access to the network infrastructure.
This policy intends to prevent computer systems from viruses and other malicious code.
This policy sets rules for regular backup of data.
|Clear Desk and Clear Screen Policy|
This Policy requires the users to maintain a Clean Desk and Clear Screen.
|Cryptographic Control Policy|
This policy is important to keep information confidential.
This policy helps in disposal of technology equipment, components and documents.
|Information Security Policy|
This policy ensures protection of information.
|Information Transfer Policy|
This policy protects the transfer of information through all types of communication channels.
|Internal Audit Policy|
This policy ensures that all the Infosec Policies and Procedures are implemented and adhered.
|Intrusion Detection Policy|
This policy strengthens information resources via feedback and trigger mechanism.
|Mobile Device & Tele-working Policy|
This policy describes the procedure for handling systems and for tele-working.
|Network Access Policy|
This policy preserves the integrity, availability and confidentiality of an organization’s network infrastructure.
This policy establishes standard for creating strong passwords.
|Patch Management Policy|
This policy ensures installed systems must contain the latest authentic, tested and approved security patches.
|Secure System Engineering Policy|
This policy gives guidance for design, development and operation of information systems.
|Wireless Communication Policy|
This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to an organization’s network.