IT & Communication Package Contents
IT systems monitoring and employee usage
1. Bring Your Own Device Policy (SMB)
2. IT Usage Policy (SMB)
3. IT Usage Procedure (SMB)
4. IT Access Control Policy & Procedure (SMB)
5. Internet Usage Policy (SMB)
Information management and protection
6. Privacy Policy (SMB)
7. Information Management Policy (SMB)
8. IT Security Policy (SMB)
9. Clean Desk Policy (SMB)
10. Information Asset Register (SMB)
11. Social Engineering Awareness Policy (SMB)
12. Password Construction Guidelines (SMB)
13. Removable Media Policy (SMB)
14. Email Retention Policy & Procedure (SMB)
Cyber security risk management
15. Cyber Security Guidance (SMB)
IT Security incident response
16. Cyber Incident Response Procedure (SMB)
17. Cyber Security Incident Response Guidelines (SMB)
3rd party supply chain management
18. Data Breach Response Policy & Procedure (SMB)
19. IT Supplier Security Policy (SMB)
20. Cyber Supply Chain Risk Management Guidelines (SMB)
21. Supply Chain Cyber Security Risk Management (SMB)
Business continuity and disaster recovery
22. Disaster Recovery Policy (SMB)
23. Disaster Recovery Plan (SMB)
24. IT Disaster Recovery Planning Policy (SMB)