Xoxoday
search
Ctrlk
Xoxoday
  • πŸ““User Resources
    • πŸ‘¨β€πŸ’ΌFor Admins
      • πŸ“ŒGetting Started
      • πŸš€Plum Launch Communication Kit
      • Xoxo Points
      • Xoxo Codes
      • Points vs Codes
      • Xoxo Links
      • Domain Authentication Guide
      • πŸ’°Add Funds
      • Campaigns
      • 🏬Reports
      • πŸ’³Prepaid Card User Guide
      • πŸ”Security and Compliance
        • Cryptography & Encryption
        • Email Whitelisting
        • Governance, Risk, & Data Compliance
        • Application,Dev & Security
        • Cloud Security
        • HR Compliance
        • Identity & Access Management
        • Solution Development
        • Security Operations
        • Training and Awareness
        • Vulnerability and Threat Management
        • Security Operations & Technical Capabilities and Support
        • Data Management
        • Policies & Procedures
        • Tax Compliance
        • Privacy Compliance
        • Cloud Security Alliance
        • Others
        • Documents
          • Data Security
          • Information Security
          • Admin/Business
          • Others
          • Finance Compliance
    • πŸ§‘β€πŸ€β€πŸ§‘For End-Users
    • πŸ”—Pre-Built Integrations
    • πŸ›£οΈProduct Roadmap
  • πŸ‘¨β€πŸ’»Developer Resources
  • πŸ“…Release Notes
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. πŸ““User Resourceschevron-right
  2. πŸ‘¨β€πŸ’ΌFor Adminschevron-right
  3. πŸ”Security and Compliancechevron-right
  4. Documents

Information Security

hashtag
1.Terms and Definitionarrow-up-right

hashtag
2.Acceptable Usage Policyarrow-up-right

hashtag
3.Cloud Computing Security Policyarrow-up-right

hashtag
4.Mobile device Management Policyarrow-up-right

hashtag
5.Encryption Policyarrow-up-right

hashtag
6.Clear Screen and Clear Disk Policyarrow-up-right

hashtag
7.Virtual Private Network Policyarrow-up-right

hashtag
8.Password Management Policyarrow-up-right

hashtag
9.Business Continuity Policyarrow-up-right

hashtag
10.Email Security Policyarrow-up-right

hashtag
11.Information Technology Policyarrow-up-right

hashtag
12.Compliance Procedurearrow-up-right

hashtag
13.Threat and Vulnerability Managementarrow-up-right

hashtag
14.Risk Management Procedurearrow-up-right

hashtag
15.Cyber Crisis Management Plan arrow-up-right

hashtag
16.Backup Recovery Procedurearrow-up-right

hashtag
17.Procedure for Control of Documents and Recordsarrow-up-right

hashtag
18.Virus Management Procedurearrow-up-right

hashtag
19.Patch Management Procedurearrow-up-right

hashtag
20.Access Control Procedurearrow-up-right

hashtag
21.Network Control Access and Security Procedurearrow-up-right

hashtag
22.Information System Acquisition Development and Maintenance Procedurearrow-up-right

PreviousData Securitychevron-leftNextAdmin/Businesschevron-right

Last updated 4 years ago

Was this helpful?

  • 1.Terms and Definition
  • 2.Acceptable Usage Policy
  • 3.Cloud Computing Security Policy
  • 4.Mobile device Management Policy
  • 5.Encryption Policy
  • 6.Clear Screen and Clear Disk Policy
  • 7.Virtual Private Network Policy
  • 8.Password Management Policy
  • 9.Business Continuity Policy
  • 10.Email Security Policy
  • 11.Information Technology Policy
  • 12.Compliance Procedure
  • 13.Threat and Vulnerability Management
  • 14.Risk Management Procedure
  • 15.Cyber Crisis Management Plan
  • 16.Backup Recovery Procedure
  • 17.Procedure for Control of Documents and Records
  • 18.Virus Management Procedure
  • 19.Patch Management Procedure
  • 20.Access Control Procedure
  • 21.Network Control Access and Security Procedure
  • 22.Information System Acquisition Development and Maintenance Procedure

Was this helpful?