• Home
  • Shop
  • About us
  • Contact us
  • Blog
Login / Register
My Account

Lost password?

site logo
site logo
Categories Menu
  • Home
  • Shop
  • About us
  • Contact us
  • Blog
  • Policies
  • Management System Packages
  • Training Material
  • Risk Assessments
  • Procedures
  • Registers
  • Forms
  • Manuals
Login / Register
Wishlist 0
0 My Wishlist

No products in the wishlist.

View Wishlist

4 Cart 4
4 Shopping Cart
Shopping cart (4)
Subtotal: £150.00

View cartCheckout

  • Management System Packages
  • Manuals
  • Procedures
  • Policies
  • Registers
  • Forms
  • Risk Assessments
  • Training Material
site logo
Categories Menu
  • Home
  • Shop
  • About us
  • Contact us
  • Blog
  • Policies
  • Management System Packages
  • Training Material
  • Risk Assessments
  • Procedures
  • Registers
  • Forms
  • Manuals
Login / Register
site logo
4 Cart 4
4 Shopping Cart
Shopping cart (4)
Subtotal: £150.00

View cartCheckout

Home Policies
Return to previous page

Worldwide Delivery

Instant Download

Secure Payment

Pay with the world most payment methods.

Support

24/7 Customer Support

Access Policy

Access Policy

£10.00

An access policy is used manage access to all controlled information and information security equipment. Access to systems is granted following the principle of ‘Least Privilege’, which means allowing only enough access to perform the required job.

Category: Policies
Tag: ISO 27001
Description
New Arrivals
Payment security

An Access Policy define how to protect information by controlling the access rights for different types and classifications of information and protect against to unauthorised access.

Access Policy does not only explain how to access the information, but also set the minimum requirements for creating strong passwords, protecting the passwords and changing requirements of the passwords.

You can present a set of password rules to your employees through the Access Policy. You will also define the access rights, user responsibilities and access control steps in the organisation through this document.

This policy mention applying different kind of access controls such as:

  • Passwords
  • Employee access
  • Operating systems access control
  • Application & Information access

If you are managing or implementing and Information Security Management System in your organisation, this document will be one of the key elements to show that your management system is working correctly.

You can also use our Acceptable Use Policy in addition to this policy, to enrich your information security precautions.

This document can be purchased individually or as part of a package. If you are implementing a management system based on one or more of the main ISO standards, then our management system packages might be more cost effective.

Our standard management system packages cover a combination of ISO 9001, ISO 14001, ISO 27001 and ISO 45001. However, additional standards can easily be included if needed.

Quality Policy
Add to wishlist

Quality Policy

£10.00
Environmental Policy
Add to wishlist

Environmental Policy

£10.00
Information Security Policy
Add to wishlist

Information Security Policy

£10.00

Payment security

Encryption ensures increased transaction security. SSL technology protects data linked to personal and payment info.

Related products

Mobile Device and Teleworking Policy
Add to wishlist
Add to cart Quick View

Mobile Device and Teleworking Policy

£10.00
The purpose of a Mobile Device and Teleworking Policy is to ensure employees are aware of their responsibilities and possible risks when working on the move or remotely. The policy ensure information is kept secure from unauthorised access and protected from loss or corruption.
Data Classification Policy
Add to wishlist
Add to cart Quick View

Data Classification Policy

£10.00
The Data Classification Policy shows the organisation how to define and classify its data, to ensure that the method by which it is secured is appropriate for its content.
IT Equipment and Secure Disposal Policy
Add to wishlist
Add to cart Quick View

IT Equipment and Secure Disposal Policy

£10.00
The IT Equipment and Secure Disposal Policy is complying with ISO 27001 and General Data Protection Regulation (GDPR). This policy helps the organisation to define its own secure disposal methods for IT equipment.
Confined Spaces Policy
Add to wishlist
Add to cart Quick View

Confined Spaces Policy

£10.00
The Confined Spaces Policy complies with ISO 45001 and can be customised based on your specific requirements and needs. This policy will document your approach related to working within a confined space and can be used for training of employees.
Data Classification Policy

£10.00

Data Classification Policy
Information Transfer Policy
Information Transfer Policy

£10.00

Instant Download

Safe & securely shopping

24/7 Customer Support

IMS Manual

Get access to full management systems ready to implement.

  • Information

    • >   Privacy Policy

    • >   Teams & Conditions

    • >   Contact Us

    • >   Blog

  • My Account

    • >   My Account

    • >   Downloads

    • >   My Orders

Contact Info.

Phone : (0)1276 942 000
International : +44 1276 942 000

info@imsmanual.com

Copyright © IMS Manual

Home
Shop
4 Cart
More
More
  • Home
  • Shop
  • About us
  • Contact us
  • Blog
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.