Download Free Antivirus Control Policy Templates
A very good antivirus technology would be useless if without proper internal control, especially people control. Or in extreme example even the world best antivirus technology would not give any advantageous if the user turn off the automatic update do to it will reduce the computer performance.
Download Free ISO 27001 Information Security Management Questionnaire Certification as per ISO 27001
The purpose of this ISO 27001 Information Security Management Questionnaire Certification is to collate information within the scope of the project meeting in order to prepare a quotation and assist the certification body in contract review. It forms part of the audit documentation. The statements will be verified during audit stage
ISMS responsibility for the ISMS
- has been fully and separately regulated on all levels (e.g. independent ISMS representative)
- to some extent includes supervisory, cross-site functions (e.g. at operating level)
- is administered at all levels by the persons responsible for the other MS
Download Free The ITIL V3 Qualification Scheme FAQ (Frequently Asked Questions)
What is a "qualification scheme"?
A qualification scheme is a roadmap for achieving a Professional Certification. It typically consists of a set of intermediate Credentials which build and depend upon each other which in total demonstrate that the skills and knowledge embedded in the Certification have been achieved. The ITIL V3 qualification scheme is very different from the V2 in that it defines different subject matter ladders to climb, has more levels to the scheme, provides guidance on how to achieve each type and level of Certification, delineates the prerequisites for each level and lays out the roles and responsibilities of the different organizations participating in the scheme.
Why is there a new ITIL qualification scheme?
Although much of ITIL content is the same between version 2 and version 3, its scope, its orientation and the structure of its advice have evolved significantly. The new scheme takes these changes into account and therefore has become a modular points-based system
Download Free Wireless Network Communication Security Policy
The purpose of this policy is to secure and protect the information assets owned by
This policy specifies the conditions that wireless infrastructure devices must satisfy to connect to
Download Free Information Risk Management Templates
The processes outlined in this Best Practice Guide, have been developed in line with the current Australian Standard for Risk Management AS/NZS 4360:1999, HB 143:1999 Guidelines for managing risk in the Australian and New Zealand public sector and the MAB-MIAC Advisory Board - Guidelines for Managing Risk in the Australian Public Service (1996).
The Guide also takes agency requirements in terms of responsibilities for establishing a policy and systems for risk management into consideration, in accordance with the Financial Management Standard (1997) (S 83,84 & 85).