Skip to main content

Resources

View Resources ⇧
Close Resources

Incident Management

0
Your rating: None
requirements for dealing with computer security incidents.

Information Technology

0
Your rating: None
uses information technologies to support employees and other authorized users to work efficiently in delivering services.

Password Guidelines

0
Your rating: None
Password Guideline is to establish the rules for the creation, distribution, safeguarding, termination, and reclamation of the user authentication mechanisms

Social Networking Policies- a guide

0
Your rating: None

“Social networking” or “Web 2.0” is the portion of internet activity that includes blogging, as well as the use of the following tools:  Facebook, Twitter, LinkedIn, flickr and YouTube.  This list is likely to expand, contract or otherwise change based on emerging trends.

Virus Protection

0
Your rating: None
The purpose of the Computer Virus Detection Guideline is to describe the requirements for dealing with computer virus, worm and Trojan Horse prevention, detection and cleanup.
Contact Us