# Information Security

### 1.[Terms and Definition](https://drive.google.com/file/d/1l23BTr1RStFZq_QmF-5V2vpS06cBJnHb/view?usp=sharing)

### 2.[Acceptable Usage Policy](https://drive.google.com/file/d/1oww6vB7PxwXGafO33h0jG-T1VlD0Wm8q/view?usp=sharing)

### 3.[Cloud Computing Security Policy](https://drive.google.com/file/d/1WxUI_BnLLbeNzQHtWgkgLFqzhuZxIwax/view?usp=sharing)

### 4.[Mobile device Management Policy](https://drive.google.com/file/d/1P_7-nKbRI8AIWUgm66Q9aUsYr83nN85r/view?usp=sharing)

### 5.[Encryption Policy](https://drive.google.com/file/d/10UXddHd9CxaCO6OLyqEM5PC1iGS2vFEz/view?usp=sharing)

### 6.[Clear Screen and Clear Disk Policy](https://drive.google.com/file/d/1bRjJvB4gDqvkp-WY_NlwTNL35K-Y6_YS/view?usp=sharing)

### 7.[Virtual Private Network Policy](https://drive.google.com/file/d/1LQsURIqAmb8waKgI5DJac2D5hUVDNjua/view?usp=sharing)

### 8.[Password Management Policy](https://drive.google.com/file/d/10JIrklIh9EzHWYQYLUvw-oDoTd3THwY2/view?usp=sharing)

### 9.[Business Continuity Policy](https://drive.google.com/file/d/1PpWRocTmV2CKzZPvVf-9b60qi0Pe3Gx3/view?usp=sharing)

### 10.[Email Security Policy](https://drive.google.com/file/d/1pzfi-zYodRujjPR5RzktjqyE4LME2jT_/view?usp=sharing)

### 11.[Information Technology Policy](https://drive.google.com/file/d/18qj9Cu55TuMileF7ppUJTNqfklabZFAX/view?usp=sharing)

### 12.[Compliance Procedure](https://drive.google.com/file/d/1FLNuR6I5uy3DHyuH6joR6v5KvlP-_aI-/view?usp=sharing)

### 13.[Threat and Vulnerability Management](https://drive.google.com/file/d/17eIpv1sBhYTS8mqLPlf1OuZYAkvGmBxo/view?usp=sharing)

### 14.[Risk Management Procedure](https://drive.google.com/file/d/1BgY8w7K2gaxg2zlVcYaIc32VbdclBuCz/view?usp=sharing)

### 15.[Cyber Crisis Management Plan ](https://drive.google.com/file/d/1ajHzFdqttTek0APJhj9Z5bWr9QS6q6N_/view?usp=sharing)

### 16.[Backup Recovery Procedure](https://drive.google.com/file/d/1d25BY9fxNhLUb6GmoDtrQ8WDPYtRf3Lh/view?usp=sharing)

### 17.[Procedure for Control of Documents and Records](https://drive.google.com/file/d/1ZFnMWlz_RtvrbYQbXxnQV4N7HNmT-MKn/view?usp=sharing)

### 18.[Virus Management Procedure](https://drive.google.com/drive/u/0/folders/1q1hVwUQ0fEYzFZFXMatHn3UIeIOXM7tU\\)

### 19.[Patch Management Procedure](https://drive.google.com/file/d/1n02SoROiB1L3V27dFGd4G1vszZneoAr0/view?usp=sharing)

### 20.[Access Control Procedure](https://drive.google.com/file/d/1OZcypu7cVjHjwVFLnI5XY9zYKqjklMcq/view?usp=sharing)

### 21.[Network Control Access and Security Procedure](https://drive.google.com/file/d/1FlyOOf8Nf6_eNgXFnnII8KZzyzVarCmc/view?usp=sharing)

### 22.[Information System Acquisition Development and Maintenance Procedure](https://drive.google.com/file/d/1FSl84TJ1kd-LWSQgs62609I5Xwz9KSyj/view?usp=sharing)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://xoxoday.gitbook.io/plum/user-guide/admins/security-and-compliance/documents-1/information-security.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
