All
NORCONS
direct connect
Events
Transcripts
Poll Results
Not a Member? Learn More
 

The following documents, direct connect discussions, and events meet your search criteria. The resources are sorted under the tabs below. You may download documents now or save them to your My Library for future reference. To add to the discussion or post a question relating to your search on direct connect, a Username is required and can be quickly set in your Individual Profile.

Your Information Team is eager to help. Click here for more assistance.

Search Results
Showing 1 - 10 of 40 Results
BlankPrev Page 1 3 4
Document Pages Document
Number
File Type Blank Document Type
Blank
Date PostedBlank Get
Documents

POLICIES AND PROCEDURES TOOLKIT

These NOREX member-contributed documents include Acceptable Use, Cloud Computing, Data Management, E-Mail, Equipment, HR/Personnel, Incident Management, Mobile Computing, Network Access, Password, Project/Change Management, Records Management, Remote Access, Security, Social Media, Storage, Telecommuting and Vendor Management.

15 TK009 Blank Toolkits 11/2017 Add to My Library
Download

SYSTEM AVAILABILITY OBJECTIVES.

System availability is tracked for key components of the infrastrutcure and for critical applications. The expected availabilities for infrastructure, enterprise software, web presence, application software, and council remote access are defined.

3 20-310 Blank NORCON 10/2017 Add to My Library
Download

TELENETWORKING/MOBILE POLICY.

This policy defines control requirements for access to information resources and applies to employees and non-employees who access information resources remotely.

3 20-290 Blank NORCON 09/2017 Add to My Library
Download

INMATE VIDEO VISITATION.

The purchase, installation, and maintenance of an Inmate Video Visitation System to provide remote video visitation for the public, attorneys, and officials are explored in this presentation.

11 20-214 Blank NORCON 06/2017 Add to My Library
Download

iPHONE RESTRICTION TEMPLATE.

This is a list of common iPhone (and other mobile device) features and applications that potentially need permissions or restrictions in the business setting.

1 20-161 Blank NORCON 04/2017 Add to My Library
Download

SPAM FILTERS & ANTIVIRUS TOOLS

In February 2017, participants inquire and share their experiences and research on spam and anti-virus tools. Several polls identify trends, opinions and strategies to combat spam and virus infection. Member chats and suggested links are also included.

21 NV2154 Blank Transcript 02/2017 Add to My Library
Download

DISASTER RECOVERY

NOREX members discuss the fine line between Disaster Recovery and Business Continuity plans, recovery options for remote locations and the use of cloud-based DR during this November 2016 session.

22 NV2138 Blank Transcript 11/2016 Add to My Library
Download

MOBILITY/BYOD

Nearly 90 NOREX participants share their mobility and BYOD solutions during this July 2016 discussion. OS preferences; MDM solutions; migration best practices; managing the network; remote wiping; and more. This transcript begins with a member overview of their mobility/BYOD strategy and includes a variety of polls.

27 NV2120 Blank Transcript 07/2016 Add to My Library
Download

SECURITY ASSESSMENT SOW.

The security audit will be focused on finding vulnerabilities within the customer's site and infrastructure, to determine vulnerability to defacement, remote code execution, data exposure/exfiltration, privilege escalation or other malicious exploits.

5 10-2208 Blank NORCON 05/2016 Add to My Library
Download

MOBILE DEVICE SECURITY POLICY.

This document describes the minimum security policy for remote access to company information and systems both from company-owned and user-owned authorized mobile devices.

9 10-2148 Blank NORCON 03/2016 Add to My Library
Download