Drone Usage Policy

Unmanned aircraft systems, more commonly known as drones, have quite literally taken off by performing many new and inventive commercial applications. Delivering packages, recording terrain, reporting news, documenting wildlife and even providing internet access are just a few of the functions drones can offer. The list is sure to grow longer and more diverse as …

Read More

Encryption Policy

Encryption is vital for securing data, whether in transit or stored on devices. It can provide peace of mind that communications will not be intercepted and that sensitive information stored on devices can’t be exfiltrated in the event of loss or theft. This policy from TechRepublic Premium provides guidelines for adopting encryption technologies for organizational …

Read More

Data Encryption Policy

The Data Encryption Policy’s purpose is to define for employees, computer users and IT department staff the encryption requirements to be used on all computer, device, desktop, laptop, server, network storage and storage area network disks, and drives that access or store organization information to prevent unauthorized access to organization communications, email, records, files, databases, …

Read More

Intrusion Detection Policy

All modern enterprises must accept the fact that at some point their systems or networks will very likely experience an unauthorized intrusion of some kind. This is the state of the world’s current security environment and for the most part enterprises, especially well-managed ones, have come to terms with this fate while also doing their …

Read More

Password Management Policy

This policy from TechRepublic Premium provides guidelines for the consistent and secure management of passwords for employees and system and service accounts. These guidelines include mandates on how passwords should be generated, used, stored and changed as well as instructions for handling password compromises. From the policy: GENERAL REQUIREMENTS Blank or easily guessed passwords, such …
The post Password Management Policy appeared first on TechRepublic.

Read More

Information Security Policy

This policy from TechRepublic Premium provides guidelines to safeguard company information, reduce business and legal risks and protect company investments and reputation. It covers data. Its adjunct policy, the Network security policy, covers the systems and devices that transport and store data. This policy can be customized as needed to fit the needs of your …
The post Information Security Policy appeared first on TechRepublic.

Read More

IT Physical Security Policy

This policy will help your organization safeguard its hardware, software and data from exposure to persons (internal or external) who could intentionally or inadvertently harm your business and/or damage physical assets. From the policy: PHYSICAL SECURITY GUIDELINES AND REQUIREMENTS The following guidelines should be followed in designing and enforcing access to IT assets. Server room/IT …
The post IT Physical Security Policy appeared first on TechRepublic.

Read More

Safeguarding customer information policy

Data breaches can cost companies tens of thousands of dollars or more and can pose a significant risk to company operations and reputation. Customer information is usually one of the favorite targets of hackers as it entails confidential details which can be used to commit property or identity theft. Even innocent mistakes such as a …
The post Safeguarding customer information policy appeared first on TechRepublic.

Read More

Network security policy

This policy from TechRepublic Premium will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy: The IT department will be responsible for implementing, adhering to and maintaining these controls. For the purposes …
The post Network security policy appeared first on TechRepublic.

Read More

Information security incident reporting policy

PURPOSE This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation. From the policy: POLICY DETAILS An information security incident is defined …
The post Information security incident reporting policy appeared first on TechRepublic.

Read More
X