Xoxoday
Ctrlk
  • πŸ““User Resources
    • πŸ‘¨β€πŸ’ΌFor Admins
      • πŸ“ŒGetting Started
      • πŸš€Plum Launch Communication Kit
      • Xoxo Points
      • Xoxo Codes
      • Points vs Codes
      • Xoxo Links
      • Domain Authentication Guide
      • πŸ’°Add Funds
      • Campaigns
      • 🏬Reports
      • πŸ’³Prepaid Card User Guide
      • πŸ”Security and Compliance
        • Cryptography & Encryption
        • Email Whitelisting
        • Governance, Risk, & Data Compliance
        • Application,Dev & Security
        • Cloud Security
        • HR Compliance
        • Identity & Access Management
        • Solution Development
        • Security Operations
        • Training and Awareness
        • Vulnerability and Threat Management
        • Security Operations & Technical Capabilities and Support
        • Data Management
        • Policies & Procedures
        • Tax Compliance
        • Privacy Compliance
        • Cloud Security Alliance
        • Others
        • Documents
          • Data Security
          • Information Security
          • Admin/Business
          • Others
          • Finance Compliance
    • πŸ§‘β€πŸ€β€πŸ§‘For End-Users
    • πŸ”—Pre-Built Integrations
    • πŸ›£οΈProduct Roadmap
  • πŸ‘¨β€πŸ’»Developer Resources
  • πŸ“…Release Notes
Powered by GitBook
On this page
  1. πŸ““User Resources
  2. πŸ‘¨β€πŸ’ΌFor Admins
  3. πŸ”Security and Compliance
  4. Documents

Information Security

1.Terms and Definition

2.Acceptable Usage Policy

3.Cloud Computing Security Policy

4.Mobile device Management Policy

5.Encryption Policy

6.Clear Screen and Clear Disk Policy

7.Virtual Private Network Policy

8.Password Management Policy

9.Business Continuity Policy

10.Email Security Policy

11.Information Technology Policy

12.Compliance Procedure

13.Threat and Vulnerability Management

14.Risk Management Procedure

15.Cyber Crisis Management Plan

16.Backup Recovery Procedure

17.Procedure for Control of Documents and Records

18.Virus Management Procedure

19.Patch Management Procedure

20.Access Control Procedure

21.Network Control Access and Security Procedure

22.Information System Acquisition Development and Maintenance Procedure

PreviousData SecurityNextAdmin/Business

Last updated 4 years ago

Was this helpful?

  • 1.Terms and Definition
  • 2.Acceptable Usage Policy
  • 3.Cloud Computing Security Policy
  • 4.Mobile device Management Policy
  • 5.Encryption Policy
  • 6.Clear Screen and Clear Disk Policy
  • 7.Virtual Private Network Policy
  • 8.Password Management Policy
  • 9.Business Continuity Policy
  • 10.Email Security Policy
  • 11.Information Technology Policy
  • 12.Compliance Procedure
  • 13.Threat and Vulnerability Management
  • 14.Risk Management Procedure
  • 15.Cyber Crisis Management Plan
  • 16.Backup Recovery Procedure
  • 17.Procedure for Control of Documents and Records
  • 18.Virus Management Procedure
  • 19.Patch Management Procedure
  • 20.Access Control Procedure
  • 21.Network Control Access and Security Procedure
  • 22.Information System Acquisition Development and Maintenance Procedure

Was this helpful?