• Image-243
  • Image-509
  • Image-246
  • 1 Security Policy

  •  
  • Image-277
  • 1 Security Policy

  • 1.2) Is your Company-wide Computers, Network and Information Security policy been approved by the Board of Directors (industry regulation such as GLBA) and/or by executive management? *

  •  
  • Image-284
  • 1 Security Policy

  •  
  • Image-286
  • 1 Security Policy

  • 1.4) Is your Information Security Policy supported with set of :

    1. Approved standards

    2. Guidelines and procedures *

  •  
  • Image-288
  • 2 Security Organization

  • 2.1) Is there a documentation describing the following:

    Report (A-B) Publish the Documents ( C - D)

    A. Inventory of assets

    B. Identifies the owner and prioritizes information classification program

    C. Corporate Intranet

    D. Employee handbook *

  •  
  • Image-290
  • 2 Security Organization

  •  
  • Image-292
  • 2 Security Organization

  •  
  • Image-300
  • 2 Security Organization

  •  
  • Image-301
  • 3 Information Asset and Classification Control

  •  
  • Image-390
  • 4 Personal Security

  •  
  • Image-305
  • 4 Personal Security

  •  
  • Image-248
  • 5 Physical & Environment Security

  •  
  • Image-307
  • 5 Physical & Environment Security

  •  
  • Image-316
  • 6 Communication and Operation Management

  • Image-352
  • 7 Access Control

  • Image-348
  • 8 System Development and Maintenance

  •  
  • Image-338
  • 9 Disaster Recovery and BCP

  •  
  • Image-251
  • 10 Privacy

  •  
  • Image-513
  • Should be Empty: