Home
|
Table of Contents
|
Overview Map
|
Icon Legend
Mortgage Origination Business Model System
Don DeRespinis CPA 203 - 778 - 9999
danbury@snet.net
Home
>
1. Welcome
>
1.6 Compliance With Federal and State Laws
>
1.6.11 Developing a Compliant System
Previous
Next
1.6.11
Developing a Compliant System
1.6.11.1 Information Security and Privacy Policy
1.6.11.2 Acceptable Use and Access Control
1.6.11.3 Hiring and Termination
1.6.11.4 Date Storage and Date Classification
1.6.11.5 Documentation Labeling and storage
1.6.11.6 Wireless Networking Policy
1.6.11.7 Firewall Policy
1.6.11.8 Laptop Policy
1.6.11.9 Discard and Disposal Policy
1.6.11.10 Firewall and encryption Policy
1.6.11.11 Intrusion Detection Policy
1.6.11.12 Work Station Policy
1.6.11.13 Perimeter Security Policy
Developing a compliant System must cover the following:
Information Security and Privacy Policy
Acceptable Use and Access Control
Hiring and Termination
Date Storage and Date Classification
Documentation Labeling and storage
Wireless Networking Policy
Firewall Policy
Laptop Policy
Discard and Disposal Policy
Firewall and encryption Policy
Intrusion Detection Policy
Work Station Policy
Perimeter Security Policy
Top
Powered By Charter Oak Systems, LLC
Last updated:
08/13/14