Founded in 2012

|
|

Resources (50)

Here are the important security policies and documents which are a part of Happay’s compliance program.

Data Retention Policy

Policy

Vendor Management Policy

Policy

Incident Management Policy

Policy

Password Policy

Policy

Acceptable Usage Policy

Policy

Risk Management Policy

Policy

Physical Security Policy

Policy

Confidentiality Policy

Policy

Access Control Policy

Policy

Code of Business Conduct Policy

Policy

Change Management Policy

Policy

Data Backup Policy

Policy

Data Classification Policy

Policy

Information Security Policy

Policy

Media Disposal Policy

Policy

Vulnerability Management Policy

Policy

Business Continuity Policy

Policy

Disaster Recovery Policy

Policy

Encryption Policy

Policy

Endpoint Security Policy

Policy

Data Protection Policy

Policy

Cloud Security Policy

Policy

Network Security Policy

Policy

Asset Management

Policy

Antivirus

Policy

Patch Management

Policy

Back Ground Verification Policy

Policy

BYOD

Policy

Capacity Management

Policy

Competency

Policy

Configuration and Hardening

Policy

Internal Audit Procedure

Policy

ISMS Objectives

Policy

Log Management

Policy

Operating Procedures for IT

Policy

Privacy Policy_2022

Policy

Roles and Responsibilities

Policy

Scope_Of_ISMS

Policy

SDLC

Policy

Secure System Engineering Principles

Policy

Statement of Applicability

Policy

Privacy Incident and Breach Management Policy

Policy

Internal Privacy Policy

Policy

Network Diagram

Document

Privacy Policy

Document

Term Of Service

Document

Pentest Report

Document

DR Drill Report

Document

Self Declaration for malware free software

Document

Vulnerability Assessment Report

Document