IT Security Professional Cambodia

Policy List

Enterprise Information Security Policy
1. High Risk Confidential Information (HRCI)
1.1 Storing High-Risk Confidential Information
1.2 Human Subject Information
1.3 Personally Identifiable Information
2. Confidential Information
2.1 Obtaining Harvard Confidential Information
2.2 Protecting Confidential Information on Networks
2.3 Making Information Available Through Directories
2.4 Identifying Users With Access to Confidential Information
2.5 Inhibit Password Guessing
2.6 Limit Application Availability Time
2.7 Limit User Access to Confidential Information
2.8 Confidential Information on Harvard Computing Devices
2.9 Internet Access to Confidential Information
2.10 Confidentiality Agreements
2.11 Harvard University ID Numbers
2.12 Training and Communication
3. Student Information
3.1 Student Information and FERPA Overview
3.2 FERPA Directory Information
3.3 FERPA Block Information
3.4 Frequently Asked Questions About FERPA
4. Credit Card Information
4.1 Accepting Payment Cards
5. Physical Environment and Recording the Activities of Individuals
5.1 Physical Environment
5.2 Recording Information About the Activities of Individuals
6. Working With Vendors
6.1 Contracts
7. Computers and Servers
7.1 Computer Operation
7.2 Computer Setup
7.3 Target Systems and Controllers
7.4 Network Take-down and Vulnerability Scanning
8. Other IT Policies
8.1 IT Service Resumption
8.2 Incident Response Process
8.3 Web Privacy Statements
9. Federal & Regulatory
9.1 Disposition and Destruction of Records
9.2 Reporting Security Breaches
9.3 Interacting with Legal Authorities
10. Web Based Surveys
10.1 Web Based Surveys