Use this tool to conduct interviews with data owners in your organization. Discover what and where your data exists and the current data handling procedures in place.
|
|
Use this tool to track and classify corporate data. Gain insight on the location and security of various data and repositories to drive strategic security decisions.
|
|
This template can be customized and used as either a pamphlet or a poster to educate your organization on the importance of data classification.
|
|
This template can be customized and used as either a pamphlet or a poster to educate your organization on the importance of data classification.
|
|
This tool will help you verify the classification levels of your data by ensuring a balance of protection for sensitive data with limited cost and user friction.
|
|
Use this tool to summarize important metrics in your organization.
|
|
The mobile device reimbursement policy will outline the devices and voice/data plans that qualify for corporate reimbursement and the limits of corporate reimbursement of...
|
|
It can be challenging to develop policies that balance security with productivity, while weighing the needs of today against the disruption of tomorrow. Use this example...
|
|
The mobile device connectivity and allowance policy enables a secure and productive workforce by outlining the policies regarding mobile device connectivity.
|
|
Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...
|
|