You are on page 1of 2

Sl NoIT Policies Status

1 Backup Policy Done


2 Change Management Policy Done
3 Password Usage Policy Done
4 Router Security Policy Done
5 Information Security Policy Done
6 E-mail Policy and Internet Usage Done
7 Firewall Security Policy Done
8 Remote Access Policy Done
9 Acceptable Use Policy Done
10 Non-Disclosure Agreement Done
11 Account Management Policy
12 Acquisition and Procurement Policy
13 Admin Special Access Policy
14 Anti-Malware Policy
15 Asset Control Policy
16 Domain Controller Policy
17 E-commerce Policy
18 Electronic Disposal Policy
19 Encryption Policy
20 Network Access Policy
21 Network Configuration Policy
22 Network Documentation Policy
23 Logging Policy
24 Patch Management Policy
25 Physical Access Security Policy
26 Removable Media Policy
27 Securing Information Systems Policy
28 Securing Sensitive Information Policy
29 Security Monitoring Policy
30 Server Hardening Policy
31 Software Licensing Policy
32 System Update Policy
33 User Privilege Policy
34 Vendor Access Policy
35 VPN Policy
36 Wireless Access Policy
37 Workstation Security Policy Done
38 Incident Response Plan
39 Incident Response Policy
40 Intrusion Detection Policy
41 Computer Training Policy
42 IT Governance Policy
43 IT Management Policy
44 IT Support Staffing Policy
45 Mass Communication Policy
46 Portable Computing Policy
47 Privacy Policy
48 Reporting Violations Policy
49 Business Impact Analysis Policy
50 Compliance Policy
51 Risk Assessment Policy
52 Business Continuity Resumption Plan
53 Business Continuity Communications Plan
54 Business Continuity Disaster Recovery Plan
55 Business Continuity Department Plan
56 Business Continuity Plan
57 Business Continuity Policy
58 Application Implementation Policy
59 Approved Application Policy
60 System Development Process Policy
61 Web Policy
62 Capacity Planning Policy
63 Risk Management Policy

You might also like