450 KB | 3 files | DOC, PDF
Employees should know by now that installing file-sharing software on company hardware is a major security threat. Use this policy to ensure that they understand the rules against peer-to-peer file sharing and the consequences for breaking them.
Sharing company files via any platform other than secure FTP is a major security and intellectual property risk. Employees need to understand that they cannot use peer-to-peer file sharing software on company-owned devices or any hardware that connects to the company network.
Use this template to set file-sharing policies for your organization.
Included in this zip file are:
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ... More >>
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to manage defects, and an analysis of the root causes of defects. ... More >>
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ... More >>