Information Security Policy Topics in ISPME
Information Security Policies Made Easy contains the most complete library of security policies available anywhere. Here is just a partial list of the information security topics covered within ISPME:
Sample Security Policies Included:
- Access Control
- Acceptable Use
- Application Development
- Biometrics
- Computer emergency response teams
- Computer viruses
- Contingency planning
- Corporate Governance
- Data Classification and Labeling
- Data Destruction
- Digital signatures
- Economic Espionage
- Electronic commerce
- Electronic mail
- Employee surveillance
- Encryption
- Firewalls
- FAX communications
- Incident Response
- Identity Theft
- Information Ownership
- Information Security Related Terrorism
- Internet
- Intranets
- Local area networks
- Logging controls
- Microcomputers
- Mobile Devices
- Network Security
- Outsourcing security functions
- Password Management
- Personnel Screening and Security
- Portable computers (PDA, Laptops)
- Physical Security
- Privacy issues
- Security Roles and Responsibilities
- Social Engineering (including “phishing”)
- SPAM Prevention
- Telecommuting
- Telephone systems
- Third Party Access
- User security training
- Web Site Security
- Wireless Security
- Voice Over IP (VOIP)
- And many more!
Sample Complete Documents Included:
- Sample High-Level Information Security Policy
- Sample Computer Network Security Policy
- Sample Detailed Information Security Policy
- Sample Data Classification Policy
- Sample Data Classification Quick Reference Table
- Sample Electronic Mail Policy
- Sample External Communications Security Policy
- Sample External Party Information Disclosure Policy
- Sample Firewall Policy
- Sample Information Ownership Policy
- Sample Internet Security Policy For Users
- Sample Intranet Security Policy
- Sample Personal Computer Security Policy
- Sample Privacy Policy – Stringent
- Sample Privacy Policy – Lenient
- Sample Telecommuting and Mobile Computer Security Policy
- Sample Web Privacy Policy
Policy Mapping Tables:
- HIPAA Security Rule
- PCI-DSS
- COBIT 4.X
- FERC/NERC
- FISMA