Patriot Act Security BundlePatriot Act Security Bundle

Security Manual Template - Disaster Recovery Plan Template -
Sensitive Information Policy
Internet, E-Mail & Electronic Communications Policy
Internet and PC Workstation Policies and Procedures
3 Key Job Descriptions - Chief Security Officer (CSO)
Manager Internet - Intranet and Internet - Intranet Administrator
DiskMonitor Utility Program

 

 

The Patriot Act Security Bundle has been updated to reflect all of the legislation that has be enacted by the United States Congress.  You can purchase the entire bundle by clicking on the order button above or individual components by clicking on the images below.

Security Manual Template

Business & IT Impact Questionnaire

Threat & Vulnerability Assessment ToolThe Security Manual Template includes two of our most popular and successful tools - the Business & IT Impact Analysis Questionnaire and the Threat and Vulnerability Assessment Tool.
  
The Security Manual Template is 178 pages and includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for the following major sections for your security plan:

  • Security Manual Introduction

  • Risk Analysis

  • Staff Member Roles

  • Physical Security 

  • Facility Design, Construction and Operational Considerations

  • Media and Documentation

  • Data and Software Security

  • Network Security

  • Internet and Information Technology contingency Planning

  • Insurance

  • Outsourced Services

  • Waiver Procedures

  • Incident Reporting Procedures

  • Access Control Guidelines

  • Glossary

  • Sample Forms

View The Table of Contents And A Few Pages

Sensitive Information Policy

Policy defines how to treat Credit Card, Social Security, Employee, and Customer Data.  The policy is 15 pages in length. This policy complies with Sarbanes Oxley Section 404.

 

This policy applies to the entire enterprise, its vendors, its suppliers (including outsourcers) and co-location providers and facilities regardless of the methods used to store and retrieve sensitive information (e.g. online processing, outsourced to a third party, Internet, Intranet or swipe terminals).
 

 

Disaster Recovery Plan TemplateDisaster Recovery Plan (DRP)
This Disaster Recovery Plan (DRP) can be used as a template for any enterprise.   DRP is sent to you via e-mail in WORD and/or PDF format. Included is a 13 page Business Impact Questionnaire as well as a 3 page Job Description for the Disaster Recovery Manager.:

 

  • Plan Introduction

  • Business Impact Analysis

  • DRP Organization Responsibilities

  • Backup Strategy

  • Recovery Strategy 

  • Disaster Recovery Procedures Check List

  • Plan Administration Process

  • 13 page Risk Assessment - Business Impact Questionnaire

  • 3 page Job Description for Disaster Recovery Manager

View a the Table of Contents and some sample pages [Adobe PDF]
 

Internet and PC Workstation Policies & Procedures HandiGuideInternet and PC Workstation Policies and Procedures HandiGuide The use of the Internet and PCs is exploding.  Terms such as cyberspace, information highway and the Internet are now part of everyone's vocabulary.  New operating systems, complex networks, inter-company e-mail and work at home programs have made the management of most enterprises understand the total effort required to support PCs, LANs and workstations.   With this in mind, we've developed the Internet and PC Workstation Policies and Procedures HandiGuide® to assist you in managing your environment with valuable guidelines, rules, forms, and standards that many enterprises have already adopted.  Some of the chapter include:

  • Security Guidelines
  • Back-Up and Recovery
  • Service Requests
  • Electronic
  • Communication
  • Internet
  • Security Guidelines
  • Facility Requirements
  • Local Area Networks
  • Business Resumption
  • Plan
  • Applications Development Standards
  • Viruses
  • Justification, Acquisition & Support
  • Manager's PC & LAN
  • Responsibilities
  • Change Control
  • How to get Technical Support
  • Full Index

Internet, Email & Electronic Communication Policy - Internet, Email & Electronic Communication Policy sections include appropriate use of equipment, Internet access, Intellectual Property, e-mail, e-mail retention period, data security and ownership of information. This has been updated to reflect NABSTER, music and video file capture and use.

 

3 Key Job Descriptions:

  • Chief Security Officer (CSO)

  • Manager Internet and Intranet

  • Internet - Intranet Administrator

DiskMonitor

Network Administrators,  DRP Coordinators, and Security Managers - can use DiskMonitor (DSM) to view drive and folder usage. Local drives as well as network shares are supported. UNC pathing and Drive$ shares are supported as well.

View The Features and Functions

Site Map

Get General Accounting
Office Report on
Social Security Number Use  Download

More Security News... - View more Security news and analysis from Computerworld.com. more info

British ISP fires back at spammers - BT, the large British ISP, is undertaking an aggressive new campaign to rid itself of spammers and to help recover user machines that have covertly joined the zombie botnet legions. more info

Vista's DRM could bedevil antivirus packages - Microsoft's push for digital rights management in Vista could spell disaster for antivirus programs, as malware writers use the "protected processes" feature to avoid removal. more info

Windows CE, Symbian wide open to attack - A Kaspersky Labs researcher has published a report that describes Windows CE as particularly vulnerable to attack. However, rival mobile OS Symbian hardly fares better in Alexander Gostev's analysis. more info

Fujitsu to offer flash-disk, encryption options - Fujitsu has announced that it will offer laptops using flash memory rather than hard disk drives in its B and Q series, as well as a B-series option for a hard-disk drive that will automatically encrypt its data. more info

Microsoft security chief Fathi moves along - The reign of Microsot security czar Ben Fahti turned out to be a brief seven months. Fahti will shift to heading up development of the core components of the Windows operating system. His Security Technology unit will be absorbed by the company's Trustworthy Computing group. more info

Grievance panel: Ohio U. should rehire fired IT execs - Ohio University's grievance committee is recommending that two top IT managers who were fired in August following a series of data breaches be rehired. more info

 


© 2006 Janco Associates, Inc. - ALL RIGHTS RESERVED -- Revised: 10/04/06.