Front | Back |
(AUP) acceptable use policy
|
Policy that defines the actions users may perform while accessing systems and networking equipment
|
Andragogical
|
Instructional approach for teaching adults
|
Change management policy
|
Policy that defines how changes will be managed and documented
|
Classification of information policy
|
Policy to produce a standardized framework for classifiying information assets
|
Computer hoax
|
E-mail message containing a false warning to the recipient of a malicious entity circulating through the internet
|
Disposal and destruction policy
|
Policy that addresses the disposal of resources that are entity circulating through the internet
|
Due care
|
Obligations that are imposed on owners and operators of assets to exercise reasonable care of the assets and take necessary precautions to protect them
|
Due process
|
Principle of treating all accused persons in an equal fashion using established rules and principles
|
Dumpster diving
|
Digging through trash receptacles to find computer manuals, printouts, or password lists that have been thrown away.
|
Ethics policy
|
Policy intended to be a central guide and reference for employee in support of day to day decision making
|
Google phishing
|
Phishing that involves phisher setting up their own search engines to direct traffic to illegitimate sites
|
Guideline
|
A collection of suggestions that should be implemented
|
Password management and complexity policy
|
Policy that addresses how passwords are created and managed
|
Pedagogical
|
Instructional approach for teaching children
|
PII (personally identifiable information policy
|
Policy that outlines how the organization uses personal information it collects
|