My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025 Regular & Special SA
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Security Policies and Procedures <br />Table of Contents <br />Virtru <br />Document control <br />B. Security Document Library <br />II. Preface and Background Material <br />Overview <br />B. Policy <br />III. Key Concepts <br />Information Security Principles <br />Confidentiality <br />Integrity <br />Availability <br />Provability <br />Definitions <br />Information Security Policy <br />Privacy Policy <br />Acceptable Use Policy for IT Systems Users <br />Employment Policies <br />IV. Using These Standards <br />Audience — Who will use this document <br />Technology and business process providers should comply with these Standards as a <br />matter of contractual obligation <br />Employees and Business units within Virtru should comply, unless a Risk Assessment <br />has been done and a deviation is approved by the ISO <br />How the document is used <br />Review of existing controls, procedures and tools against the Standards <br />Documenting compliance or deviations <br />Gap Analysis to determine where improvements are needed <br />A Risk Assessment to validate that the improvements are justified against the costs <br />of the controls and the value of the information involved <br />Creation of a plan to close the gaps OR signoff of a deviation <br />Documentation of the new controls, procedures and tools <br />C. Maintaining this document <br />V. Roles and Responsibilities <br />A. Rules for ownership of information <br />B. Information users <br />C. Information Security Officer <br />Manage awareness programs relating to security and privacy topics <br />Maintain a central record of exceptions to this Standards document <br />Manage changes to this Standards document <br />Rev.2015.8.6 <br />
The URL can be used to link to this page
Your browser does not support the video tag.