IT Security Policies, Network Security Policies & Effective Delivery

IT Security Policies

No previous topic


Network, IT And Information Security Policies

Next topic


Try it!

information security policies



Buy It Here!



The Policies


Policy Delivery

Sample Page

Security Web Links

Reciprocal Link
Information Security



"Where to find Information Security Policies - How to Deliver Them!"

The content and structure of an organization's security policies is of fundamental importance. They must be complete, up to date, and fully reflect its needs. Should this NOT be the case, substantial problems could manifest themselves - policies are, after all, the basic building blocks to protect the organization's assets. They help define the organization itself and its culture with respect to security.

Fortunately, there is a solution available to help address these issues: you can now purchase a complete set of networ, IT and information security policies off the shelf. These can also be tailored to meet any specific or individual need, and are shipped in various formats (such as MS-Word). They can be downloaded immediately on purchase.


A common problem with security policies is that they are too often neither instructional nor descriptive. They simply represent the rules which must be adhered to.

This tends to create problems - the implementation of policies actually requires an understanding not only of the individual policies but also of the circumstances in which policy compliance is expected during day to day activities. Essentially, having the policies is only part of the equation - you also need to know how and when they should be applied.

To help address these issues, the SOS/RUsecure Security Policies include the following: Explanatory notes giving background to each Policy; Some of the key information security issues which should be considered when implementing each policy; The related ISO 17799 cross references (ISO17799 is the international standard against which information security can be measured).

The SOS/RUsecure set comprises hundreds of policies, arranged in discrete chapters, covering a full gamut of topics: Controlling Access To Information And Systems; Controlling E-Commerce Information Security; Securing Hardware, Peripherals And Other Equipment; Purchasing And Maintaining Commercial Software; Planning For Business Continuity, and of course many more.

These chapters are handily organized into sub-chapters, which hold the policies themselves. This allows full flexibility and easy reference, for both the information security expert and the casual user.

The SOS/RUsecure Policies are provided in both MS-Word and PDF format. They can be changed or added to with ease, published on an intranet or printed as required. For convenience, they can be downloaded immediately on purchase.

Order the SOS/RUsecure Information Security Policies

Only $595

Contact us by Email

Copyright © 2003