Skip to main content

Menu

View Menu ⇧
Close Menu

Resources

View Resources ⇧
Close Resources

Rating

0
Your rating: None

Incident Management

requirements for dealing with computer security incidents.
Files

Rating

0
Your rating: None

Information Technology

uses information technologies to support employees and other authorized users to work efficiently in delivering services.
Files

Rating

0
Your rating: None

Password Guidelines

Password Guideline is to establish the rules for the creation, distribution, safeguarding, termination, and reclamation of the user authentication mechanisms
Files

Rating

0
Your rating: None

Social Networking Policies- a guide

“Social networking” or “Web 2.0” is the portion of internet activity that includes blogging, as well as the use of the following tools:  Facebook, Twitter, LinkedIn, flickr and YouTube.  This list is likely to expand, contract or otherwise change based on emerging trends.

Rating

0
Your rating: None

Virus Protection

The purpose of the Computer Virus Detection Guideline is to describe the requirements for dealing with computer virus, worm and Trojan Horse prevention, detection and cleanup.
Files
Contact Us