Altius IT Policy Collection

Similar documents
Altius IT Policy Collection Compliance and Standards Matrix

Client Security Risk Assessment Questionnaire

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Security Controls What Works. Southside Virginia Community College: Security Awareness

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Security Manual Template Policy and Procedure Manual Compliance Management Made Easy ISO / HIPAA / SOX / CobiT / FIPS 199 Compliant

Four Top Emagined Security Services

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

INCIDENT RESPONSE CHECKLIST

CHIS, Inc. Privacy General Guidelines

1B1 SECURITY RESPONSIBILITY

Miami University. Payment Card Data Security Policy

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

HIPAA/HITECH Compliance Using VMware vcloud Air

Retention & Destruction

Cyber, Security and Privacy Questionnaire

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Network and Security Controls

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

HIPAA Security & Compliance

STREAM FRBC

Newcastle University Information Security Procedures Version 3

QUESTIONS & RESPONSES #2

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Checklist of Requirements for Protection of Restricted Data College of Medicine Departments (v 03/2014)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

ISO 27002:2013 Version Change Summary

System Security Plan University of Texas Health Science Center School of Public Health

How To Protect Your School From A Breach Of Security

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

HIPAA Privacy and Security Risk Assessment and Action Planning

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

2011 NATIONAL SMALL BUSINESS STUDY

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Information Security Policy

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Hengtian Information Security White Paper

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Disaster Recovery Plan (Business Continuity) Template - Version 8.2

Georgia Institute of Technology Data Protection Safeguards Version: 2.0

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Vendor Risk Assessment Questionnaire

Information Blue Valley Schools FEBRUARY 2015

The Protection Mission a constant endeavor

Information Technology Branch Access Control Technical Standard

Vendor Audit Questionnaire

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Cybersecurity Health Check At A Glance

Project Title slide Project: PCI. Are You At Risk?

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

STATE OF NEW JERSEY Security Controls Assessment Checklist

IT Networking and Security

Intel Enhanced Data Security Assessment Form

Critical Controls for Cyber Security.

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Information Security: A Perspective for Higher Education

Table of Contents. Auditor's Guide to Information Systems Auditing Richard E. Cascarino Copyright 2007, John Wiley & Sons, Inc.

The Second National HIPAA Summit

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Information security controls. Briefing for clients on Experian information security controls

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

A Technical Template for HIPAA Security Compliance

Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

A Rackspace White Paper Spring 2010

Bridging the HIPAA/HITECH Compliance Gap

Transcription:

Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software to download or install - no conflicts with your computer or applications Security - quickly enhance your level of security with our complete collection Compliance - quickly meet compliance (request compliance matrix) Proven - trusted by government and Fortune 500 companies Flat fee - one flat fee gets you the entire collection Subscription plan - Altius IT Gold Collection keeps your collection up-to-date The Silver Collection includes over 100 information systems security policies, plans, and forms. The Altius IT Gold Collection includes everything in the Silver Collection plus you automatically receive one year of free updates to existing policies as well as any new policies created by our experts. In the future, Gold Collection members have the option of paying $99* per year to keep their collection up-to-date. What is a Policy? A policy is a written document that specifies requirements and/or outcomes to control and manage risks. Instead of implementing one large policy document, most organizations have an information security policy manual, a collection of policies with each policy addressing a specific area. Procedures are then developed to identify the methodologies and steps needed to support the policies. Frequently Asked Questions Q: Why are there different collections? A: Each organization has different needs. We provide the best value by offering you a choice of options. By purchasing the Altius IT Gold Collection, you will automatically receive one year of free updates to existing policies as well as new policies created by our experts. In future years you have the option of keeping your collection up-to-date through our subscription service. We will notify you when your subscription is coming up for renewal and you may cancel at any time. Q: What if I need a policy that isn't included in the above list? A: Gold Collection clients can send us an e-mail and we will evaluate your request. If we believe other organizations can benefit from the policy we will develop the policy and add it to our policy collection. Collection members will receive the new policy at no additional charge during their subscription period. 1

Q: Are these IT Policy Templates, Security Policy Templates, or a software program? A: The Altius IT Policy Collection is a collection of IT policies with an emphasis on security and privacy. Each policy, plan, and form has a consistent look and feel and is provided as a separate Microsoft Word file. This gives you the flexibility of only rolling out the policies, plans, and forms needed by your organization. Q: We need an information systems security policy, information security policy manual, IT security policy, cyber security policy, technology security policies, and network security policies. Can your collection help us? A: Yes. We provide over 100 information systems IT policy templates specifically designed to enhance your security posture by implementing controls to reduce security and privacy risks. Instead of assembling all policies in one large document, the Altius IT Policy Collection provides you with separate policy documents that are easier to maintain and distribute to your relevant staff. For example, web developers should receive software development related policies while network administrators should receive network infrastructure related policies (e.g. Firewall Policy, Server Hardening Policy, etc.). Please see above for the actual names of the IT policy templates included with our collection. Q: Does your collection help us meet security policy standards? A: Yes. The collection was developed by our experts after many years of performing security audits. The Altius IT Policy Collection was developed to help organizations meet security best practices, security policy standards, and compliance requirements. If you are looking for information policies, information security policy, cyber security policy, IT policies and procedures, or password security policies, our collection can help you. Q: How do I receive the Altius IT Policy Collection? A: Once we receive your payment, we will e-mail you instructions to download the collection. Q: How often is the Altius IT Policy Collection updated? A: It depends upon how frequently legislative changes are enacted and/or changes are made to security best practices. Typically we release two or three sets of updates per year. The advantage to you is that you don't need to monitor legislation and standards for changes. We do the work for you. Q: How do I receive the updates? A: If you purchased the Gold Collection no action is needed on your part. We automatically e-mail you the updates as soon as they are available. In future years 2

you have the option to continue to renew the updates for $99* per year. * Fee subject to change. 3

Policy Templates (included with your purchase and up-to-date) (www.altiusit.com/policies.htm) Network Security Compliance Risk Management Network Security Access Control Policy Acceptable Use Policy Account Management Policy Acquisition and Procurement Admin Special Access Anti-Malware Policy Asset Management Policy Audit Trails Policy Backup Plan Backup Policy Bluetooth Policy Certification and Accreditation Change Management Data Integrity Policy Data Marking Policy Data Privacy Policy Data Retention Policy Database Security Policy Disposal Policy Domain Controller Policy Domain Name System E-commerce Policy Encryption Policy Facility Security Plan Firewall Policy Guess Access Policy Hardware/Software Maint Identification & Authentication Internet Connection Policy Logging Policy Logical Access Controls Network Address Policy Network Configuration Network Documentation Password Policy Patch Management Policy Personnel Security Policy Physical Access Security Physical Security Policy Procedure Template Receipt & Acknowledgement Remote Access Policy Removable Media Policy Router Security Policy Securing Information Systems Securing Sensitive Information Compliance Policies Audit Policy Compliance Policy HIPAA and HITECH Policy Identity Theft Protection Outsourcing Policy PCI Policy Privacy Policy Security Awareness and Training Plan Security Awareness and Training Policy Security Controls Review Policy Third Party Service Providers Policy Security Governance Bring Your Own Device Context and Alignment Policy Cybersecurity Policy Cybersecurity Framework Documentation Policy E-mail Policy Green Computing Policy IT Governance Policy IT Management Policy Mass Communication Policy Mergers and Acquisitions Mobile Device Policy Portable Computing Policy Production Input Output Reporting Violations Policy Smartphone Policy Social Networking Policy Staffing Policy Wearable Computing Device Risk Management Policies Business Impact Analysis Data Classification Policy Quality Assurance Policy Risk Assessment Policy Risk Management Policy Business Continuity Resumption Plan Communications Plan Disaster Recovery Plan Department Plan Business Continuity Plan Business Continuity Policy Application Security Application Implementation Approved Application Software Dev Lifecycle Software Development Web Site Policy Forms Backup Log Form Change Management Log I.S. Access Request Form Third Party Service Provider Agreements Business Associate Non-disclosure Agreement 4

Security Monitoring Policy Security Policy Server Certificates Policy Server Hardening Policy Software Licensing Policy System Security Plan System Update Policy Terms and Definitions Policy User Privilege Policy Vendor Access Policy VPN Policy Wireless Access Policy Workstation Security Policy Incident Response Identity Theft Protection Incident Response Plan Incident Response Policy Intrusion Detection Policy 5