Home - JorgeOsvaldo/DTI GitHub Wiki

I. Policies a. General

  1.   Employee email use
    
  2.   Employee Internet Filtering
    
  3.   Employee Internet Use
    
  4. Sensitive Data b. Hardware and Software
  5.   Enterprise Application and Software
    
  6.   Smartphone Devices
    
  7. Information Technology Commodity Procurement Policy c. Network
  8.   Network Access
    

d. Security

  1.   Access Revocation
    
  2.   Anti-Virus
    
  3.   Bring Your Own Device (BYOD)
    
  4.   Computer Abuse Incident Reporting Response
    
  5.   Computer Security Incident Response
    
  6.   Email encryption
    
  7. Employee IT Security Certification Policy
  8.   Information Technology Protection
    
  9.   Mobile Device Policy
    
  10.   Mobile Device Security
    
  11. Patch and Vulnerability Management
  12. Security Incident Reporting
  13. User ID Security e. Telecommunications
  14.   Telecommunications Usage Policy
    

f. Web

  1.   Electronic Document Retention
    
  2.   Independent Verification and Validation of IT Projects
    

II. Standards a. General

  1.   Email Archiving
    
  2.   Email Maximum Message Size
    
  3.   Information Technology Project Documentation
    
  4.   Internet Filtering Categories and Protocols
    
  5.   Unsolicited Commercial – Bulk Email Blocking Criteria
    

b. Radio

  1.   Public Safety Voice Radio System
    

c. Security

  1.   Electronic File and Document Storage
    
  2.   Email Data
    
  3. Employee IT Security Certification Standard
  4.   Microsoft Windows and Security Updates
    
  5.   P2P Internet Based Applications Prohibited titles
    
  6.   Password Standards
    
  7.   User ID Security Exceptions
    
  8. User IDs
  9. Computer Abuse Incident Reporting and Response d. Telecommunications
  10.   Telecomm Equipment – Siemens Equipment
    
  11.   Telecommunications Small – Remote Site Network and Equipment
    

e. Hardware and Software

  1.   Enterprise Architecture
    
  2. Information Technology Commodities Standard f. Network
  3.   Network Cabling
    
  4. Network Infrastructure III. Procedures a. Security
  5.   Guide to Securing Networked Printers
    
  6.   Mobile Device Procedures