IT Security

  • The Ten Point Guide to Email Security for Small Businesses

    Author name: Star Technology
    Author organisation: Start Technology
    Publication date: 08/02/2006
    Upload date: 14/04/2011

    A quick guide to creating an email security policy.

  • ICT Policy - Peel Institute

    Author name: Not supplied
    Author organisation: Peel Institute
    Publication date: 25/03/2010
    Upload date: 14/04/2011

    This document covers telephone policy, email, email efficiency, (no) auto-forwarding, password requirements, monitoring of email accounts, hardware and software, and saving information to peel computer systems.

  • World Vision UK - Data Protection & Information Security Policy

    Author name: Not supplied
    Author organisation: World Vision UK
    Publication date: 28/10/2011
    Upload date: 19/06/2012

    The purpose of this policy is to establish the confidentiality of personal data and the repercussions of any breach of trust in this area.

  • ICT Policy - Wales Council for Voluntary Action

    Author name: Not supplied
    Author organisation: Wales Council for Voluntary Action
    Publication date: 01/02/2007
    Upload date: 14/04/2011

    ICT Policy for Wales Council for Voluntary Action

  • Network Security and the Small to Mid-size Business

    Author name: Dan Scobie
    Author organisation: Star Technology
    Publication date: 01/01/2004
    Upload date: 14/04/2011

    An overview of the main threats to network security and the measures required for protection against these.

  • Use of Information Technology and Telecommunications Policy

    Author name: Not supplied
    Author organisation: Breast Cancer Care
    Publication date: 01/10/2002
    Upload date: 14/04/2011

    The document outlines policy guidelines for internal and external communication.

  • Security and Internet Policy

    Author name: Not supplied
    Author organisation: Wales Council for Voluntary Action
    Publication date: 16/06/2003
    Upload date: 14/04/2011

    The security policy is designed to protect the organisation’s information assets within the overall strategy that access to information should be permitted on the basis of “need to restrict” rather than “need to know”.

  • Practical Measures for Combating Spam

    Author name: Star Technology
    Author organisation: Star Technology
    Publication date: 08/02/2006
    Upload date: 15/04/2011

    This guide from Star Technology identifies measures (in the form of do’s and don’t’s) that every email user can take to protect their inbox.

  • Email
  • Twitter
  • Facebook
  • Linkedin

© Charity Finance Group / © Charities Resource Network / Registered Office: 15-18 White Lion Street, London, N1 9PG.
A Company Limited by Guarantee. Registered in England No. 3182826, Registered Charity No. 1054914, Registered VAT No. 945 6038 09.