Security Policies Tracker
Security Policies Tracker
IT Acceptable-Use-Of-Information-Systems
IT Account Management
IT Anti-Virus
IT Owned-Mobile-Device-Acceptable-Use-and-Security
IT Clean Desk
IT E-Commerce
IT Email
IT Firewall
IT Hardware-and-Electronic-Media-Disposal
IT Security Security-Incident-Management
IT 11. Information-Technology-Purchasing
IT 12. Internet
SRE 13. Log Management
IT 14. Safeguarding-Member-Information
IT 15. Network-Security-And-VPN-Acceptable-Use
IT 16. Personal-Device-Acceptable-Use-And-Security-BYOD
IT 17. Password Management
IT Security IOT
Remarks
LS is working with the
Legal team to get the
required details, post
that DOE team will take
it up and work on it
Status Pre-requisites
Approved
Policy for giving devices, Policy for
connecting personal devices to Wifi.
Approved NA
Approved
SMTP server info
Approved
Present Intra organization internet policies
On-Hold for Discussion
The purpose of this policy is to establish rules for the use of [LS/DOE] email for sending,
receiving, or storing of electronic mail.
This policy outlines the guidelines for filtering Internet traffic through firewalls to minimize
the potential risks and damages resulting from security threats to [LS/DOE]'s network and
information systems.
This policy applies to surplus hardware, obsolete machines, and any equipment that
[LS/DOE] owns, which are beyond reasonable repair or reuse, including media. Its purpose
is to establish and define the regulations, protocols, and limitations for disposing of non-
leased IT equipment and media in a legal and cost-effective manner.
This policy establishes the necessary steps for reporting and handling incidents related to
[LS/DOE]'s information systems and business activities. By responding to incidents,
"[LS/DOE]" is able to detect security breaches as they occur.
The purpose of this policy is to set forth guidelines, procedures, and restrictions for the
acquisition of IT hardware, software, computer-related components, and technical services
that are procured using [LS/DOE] funds. All purchases of technology and technical services
must be authorized and coordinated by the IT Department.
This policy aims to define the regulations for accessing the Internet or Intranet using
[LS/DOE]'s network.
This policy aims to guarantee that [LS/DOE] adheres to all applicable federal and state laws
and to safeguard the confidentiality and security of information concerning its members.
The purpose of this policy is to create a standard for connecting to the [LS/DOE] network
from any host. These standards are intended to limit the harm [LS/DOE] may suffer from
unauthorized use of its resources.
This policy will outline the process of getting there own devices(Laptop/mobile/tab)
This policy aims to create a guideline for generating robust passwords, safeguarding them,
and determining the frequency of password changes.
Req Clarification/understand Document draft/in-progress Review
End Date Remarks St Date End Date % completRemarks St Date
Review Completed
End Date % completRemarks St Date End Date % completRemarks