General discussion

Locked

Document security policies and procedures

By MaryWeilage Editor ·
This week's Application Developer Management e-newsletter discusses documenting security policies and procedures and lists key components to include in an information security manual.

Does your company have security policies and procedures in place? If so, what elements are included in your strategy that Scott Withrow doesn't list? How does your security strategy help you thwart attacks? If you don't have a security strategy, does the e-newsletter motivate you to create one? Share your thoughts on information security policies and procedures.

If you aren't subscribed to the Application Developer Management TechMail, visit our e-newsletter subcenter to subscribe to this free e-newsletter:
http://nl.com.com/MiniFormHandler?brand=builder&subs_channel=bldr_front_door&list_id=e053&;;;tag=fb

* Please delete any extra spaces that appear when you paste this link into your browser.

This conversation is currently closed to new comments.

0 total posts (Page 1 of 1)  
| Thread display: Collapse - | Expand +

All Comments

Back to IT Employment Forum
0 total posts (Page 1 of 1)  

Related Discussions

Related Forums