All
NORCONS
direct connect
Events
Transcripts
Poll Results
Not a Member? Learn More
 

The following documents, direct connect discussions, and events meet your search criteria. The resources are sorted under the tabs below. You may download documents now or save them to your My Library for future reference. To add to the discussion or post a question relating to your search on direct connect, a Username is required and can be quickly set in your Individual Profile.

Your Information Team is eager to help. Click here for more assistance.

Search Results
Showing 1 - 10 of 27 Results
BlankPrev Page 1 3
Document Pages Document
Number
File Type Blank Document Type
Blank
Date PostedBlank Get
Documents

POLICIES AND PROCEDURES TOOLKIT

These NOREX member-contributed documents include Acceptable Use, Cloud Computing, Data Management, E-Mail, Equipment, HR/Personnel, Incident Management, Mobile Computing, Network Access, Password, Project/Change Management, Records Management, Remote Access, Security, Social Media, Storage, Telecommuting and Vendor Management.

15 TK009 Blank Toolkits 09/2017 Add to My Library
Download

ELECTRONIC MAIL USE & GUIDELINES.

These policy statements fall into five categories: privacy, acceptable use, security, retention, and monitoring/access.

7 20-071 Blank NORCON 12/2016 Add to My Library
Download

ACCEPTABLE USE OF TECHNOLOGY.

Proper and acceptable use of technology resources are explained in the following document.

6 20-069 Blank NORCON 12/2016 Add to My Library
Download

ACCEPTABLE USE / CONFIDENTIALITY.

This agreement describes the standard policy of the use of company Information Technology resources and data contained therein.

5 20-043 Blank NORCON 12/2016 Add to My Library
Download

IT ACCEPTABLE USE POLICY.

This defines acceptable use, procurement & possession of the company's Information Technology resources.

4 50-204 Blank NORCON 09/2016 Add to My Library
Download

INFORMATION TECHNOLOGY USE POLICY.

This provides authorized users with standards for the acceptable use of IT resources.

10 10-2242 Blank NORCON 08/2016 Add to My Library
Download

YAMMER POLICY.

This policy describes acceptable use of the social networking service Yammer for company communication.

2 10-2241 Blank NORCON 07/2016 Add to My Library
Download

INFORMATION SECURITY PROGRAM CHARTER.

The Information Security Program scope includes oversight of asset protection, vulnerability management, threat management, acceptable use, risk management, and security awareness.

2 10-2215 Blank NORCON 06/2016 Add to My Library
Download

ACCEPTABLE USE POLICY.

This policy describes acceptable use of company IT resources and the departments that govern that use.

2 10-1864 Blank NORCON 03/2015 Add to My Library
Download

IT USE POLICY.

This policy provides authorized users with standards for IT resource acceptable use standards.

6 10-1833 Blank NORCON 03/2015 Add to My Library
Download