Information Security Policies

Back in July, The Trusted Toolkit Blog published a series of sample information security policies. They included:

I sure wish these were around eighteen months ago when I started this job! I still have a few policies to complete and I’m sure these will be helpful. It’s probably time to revisit those I’ve written and compare them to these guidelines.

Advertisements

Steve Mullen has been involved in information technology for over 35 years. He is also actively involved in the music program (voice and English hand bells) and Vestry of St. Anne’s Episcopal Church in Damascus, MD.

Posted in Information Security, IT Management, IT Security, policies, Security

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories
August 2007
M T W T F S S
« Jun   Nov »
 12345
6789101112
13141516171819
20212223242526
2728293031  
%d bloggers like this: