Search alphaZ documents
Products meeting the search criteria
Training talk on General Information Security and including GG-8-01 Information Security General.Talk Description;• General Information Security – guidance, employee responsibilities• D..
Training talk on Data Backup and including the General Guidance document - GG-8-02 Data Backup.Talk Description;• Guidance for workers on data backup requirements to maintain information sec..
Training talk on Software and Malware and including the General Guidance document - GG-8-03 Software and Malware.Talk Description;• Guidance on the use and installation of software to maintain in..
Training talk on Access Control and User Authentication and including the General Guidance document - GG-8-04 Access Control and User Authentication.Talk Description;• Guidance on control o..
Training talk on Secure Project Management and Outsourcing and including the General Guidance document - GG-8-05 Secure Project Management and Outsourcing.Talk Description;• Guida..
Training talk on Secure Project Management and Outsourcing and including the General Guidance document - GG-8-06 Information TransferTalk Description;• Guidance on the secure transfer ..
Training talk on Information Classification and Protection and including the General Guidance document - GG-8-07 Information Classification and ProtectionTalk Description;• Guidance on the ..
Training talk on Managing Users and including the General Guidance document - GG-8-08 Managing UsersTalk Description;• Guidance on managing user accounts –new starters, leavers and change o..
This form allows you identify and record your information assets in order to protect them. Can include software systems, organisational knowledge, and key documents. This form is only mandatory for in..
For recording details of personal data held by the company, including what the data is, where it's stored, how it's used or shared, and any protection measures in place.This file may be used for compl..
Template for a data transfer and processing agreement, required under GDPR to be in place with any organisation that processes personal data held by the company.Includes summary, purpose and duration ..
Form including the agenda for focus committee findings where the minutes can be recorded directly in the form. Areas of covered by this form include arrangements for:Health and safetyQualityEnvironmen..
Form for reviewing a suggested change where the impact related to health & safety is assessed as part of the change. Actions can be defined within the form to mitigate any risks identified.[Inform..
Policy-procedure on management of files, documents and records detailing the arrangements in place to manage own and externally supplied documents, files and records covering;- Management o..
Policy-procedure on information backup detailing the arrangements in place to manage and control backups of all data to ensure it can be recovered in the event of an incident.Procedure includes;-..
Policy-procedure detailing the arrangements in place to control the use of software used on equipment and the installation of software on IT equipment and handheld devices.Procedure covers;- Control o..
Policy-procedure detailing the arrangements in place to manage and control access to information throughout the organisation to prevent unauthorised access.Procedure covers;- Management of Risks Assoc..
Policy-procedure detailing the arrangements in place to control the use of internet and electronic messaging within the organisation.Procedure includes: -Management of Risks Associated with Electronic..
Policy-procedure on information transfer detailing the arrangements in place to control and protect information during any type of transfer as part of the business activities being carried out.Procedu..
Policy-procedure detailing the arrangements in place to detect and prevent any technical vulnerability and the control in place within the organisation.Procedure covers;Management of Risks Associated ..
Policy-procedure on secure development that outlines the controls to ensure Information Security is incorporated into project management methodology, regardless of type or owner of project.Procedure c..
Policy-procedure detailing the arrangements in place to outline the process for cloud computing used within the company and the controls in place.Procedure covers;Management of Risks Associated with C..
General guidance to all employees on general information security to increase awareness and ensure everyone knows what their responsibilities are.Topics covered; Purpose of an Information Securit..
General guidance to all employees on general information security to increase awareness and ensure everyone knows what their responsibilities are.Topics covered; Definition of BackupWhat is inclu..
General guidance to all employees on on the use and installation of software on computer systems and electronic devices to maintain the required level of information security.Topics covered; Defi..
General guidance on how access to systems and applications are controlled to maintain the required level of information security.Topics covered; Definition of Access ControlManagement of Access C..
General guidance on how to manage and include considerations regarding information security and associated risks for all projects.Topics covered; Definition of ProjectImportance of Information Se..