450 KB | 3 files | DOC, PDF
Employees should know by now that installing file-sharing software on company hardware is a major security threat. Use this policy to ensure that they understand the rules against peer-to-peer file sharing and the consequences for breaking them.
Sharing company files via any platform other than secure FTP is a major security and intellectual property risk. Employees need to understand that they cannot use peer-to-peer file sharing software on company-owned devices or any hardware that connects to the company network.
Use this template to set file-sharing policies for your organization.
Included in this zip file are:
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations. ... More >>
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities. ... More >>
In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise. ... More >>