All
NORCONS
direct connect
Events
Transcripts
Poll Results
Not a Member? Learn More
 

The following documents, direct connect discussions, and events meet your search criteria. The resources are sorted under the tabs below. You may download documents now or save them to your My Library for future reference. To add to the discussion or post a question relating to your search on direct connect, a Username is required and can be quickly set in your Individual Profile.

Your Information Team is eager to help. Click here for more assistance.

Search Results
Showing 1 - 10 of 223 Results
BlankPrev Page 1 23
Document Pages Document
Number
File Type Blank Document Type
Blank
Date PostedBlank Get
Documents

INCIDENT REPORT LOG.

This document provides the guidelines for the creation, maintenance, management, and secured storage of the Incident Report Log (IRL).

27 20-350 Blank NORCON 11/2017 Add to My Library
Download

INCIDENT RESPONSE PLAN.

This document details the procedure to follow when a potential incident is identified. An incident may be a malicious code attack, unauthorized access to systems, unauthorized utilization of services, denial of service attacks, general misuse of systems, or sabotage/theft.

33 50-252 Blank NORCON 11/2017 Add to My Library
Download

ACCEPTABLE USE ANNUAL CONTRACT.

This agreement is about the acceptable use and confidentiality of company Information Technology assets, computers, networks, systems, and data.

2 20-318 Blank NORCON 10/2017 Add to My Library
Download

COMPUTER CRIMES POLICY.

The company's policy on computer misuse and crime is addressed here, including examples of such and the process of reporting such crimes.

4 20-319 Blank NORCON 10/2017 Add to My Library
Download

APPROPRIATE USE OF ELECTRONIC COMMUNICATION.

Electronic mail, data, and system activity logs, including the Internet, are subject to audit and review. The appropriate use of these systems is detailed below.

5 20-320 Blank NORCON 10/2017 Add to My Library
Download

SECURITY MONITORING POLICY.

This policy defines rules & requirements for securing & protecting electronic communications systems and defines requirements for Information Security (InfoSec) monitoring, Cybersecurity, and Network security.

3 20-317 Blank NORCON 10/2017 Add to My Library
Download

HIPAA PROTECTION CHEAT SHEET.

This poster gives an at-a-glance reference for the protection and disposal of Protected Health Information (PHI).

1 20-311 Blank NORCON 10/2017 Add to My Library
Download

IT SECURITY POLICY.

Standards for the maintenance & protection of the IT infrastructure, including all equipment, software, and systems owned, operated, or maintained by or on behalf of the company.

8 20-302 Blank NORCON 09/2017 Add to My Library
Download

IT USE POLICY.

This policy provides standards for the acceptable use of company IT resources, and is designed to prevent use that may be illegal, improper, abusive, or which may have an adverse impact on the company or its IT resources.

9 20-303 Blank NORCON 09/2017 Add to My Library
Download

HOSPITALITY PAYMENT PROCEDURES.

In a hotel/motel industry, the following procedures are taken when accepting a credit card as payment.

6 20-285 Blank NORCON 09/2017 Add to My Library
Download