EN world-icon
logo
Back arrow icon
السياسات والإجراءات العامة
pdf icon GC-ITS-002-Cybersecurity Review And Audit Policy.pdf
pdf icon GC-ITS-003-Cybersecurity Roles and Responsibilities Policy.pdf
pdf icon GC-ITS-004-Information Security Policy.pdf
pdf icon GC-ITS-005-Information Security Risk Management Policy.pdf
pdf icon GC-ITS-006-Organization of Information Security Policy .pdf
pdf icon GC-ITS-007-Human Resource Policy.pdf
pdf icon GC-ITS-008-Asset Managment Policy.pdf
pdf icon GC-ITS-009-Identity and Access Management Policy.pdf
pdf icon GC-ITS-010-Cryptography Policy.pdf
pdf icon GC-ITS-011-Physical and Environmental Security Policy.pdf
pdf icon GC-ITS-012-Operation Security Policy.pdf
pdf icon GC-ITS-013-Communications Policy.pdf
pdf icon GC90D7~1.PDF
pdf icon GC-ITS-015-Supplier Relationships Policy.pdf
pdf icon GC-ITS-016-Information Security Incident Management Policy.pdf
pdf icon GC-ITS-017-Business Continuity Management Policy.pdf
pdf icon GC-ITS-018-Compliance Policy.pdf
pdf icon GC-ITS-019-Acceptable Use Policy.pdf
pdf icon GC-ITS~2.PDF
pdf icon GC-ITS~1.PDF
pdf icon GC2EA8~1.PDF
pdf icon GC-ITS-023-Database security policy.pdf
pdf icon GC-ITS-024-Configuration and Hardening Policy.pdf
pdf icon GCE4F6~1.PDF
pdf icon GC-ITS-026 Personal Data Breach Policy and Procedures .pdf
pdf icon GC963E~1.PDF
pdf icon GC-ITS-028 Data Retention Policy.pdf