Title 36. Technology
Part 1. Enterprise Security Policy
- Chapter 1. General Security Policy
- Chapter 2. State Network Resource Usage
- Chapter 3. Incident Reporting
- Chapter 4. Data Classification
- Chapter 5. Servers
- Chapter 6. Email
- Chapter 7. Virus Prevention
- Chapter 8. Firewalls
- Chapter 9. Data Encryption
- Chapter 10. Remote Access
- Chapter 11. Passwords
- Chapter 12. Physical Access
- Chapter 13. Wireless Access
- Chapter 14. Laptop and Mobile Device Usage
- Chapter 15. Disposal of Hardware/media
- Chapter 16. Application Assessment and Certification
- Chapter 17. Removable Media
Part 2. Information Systems Services
- Chapter 1. Its Roles In It Procurement
- Chapter 2. Faqs
- Chapter 3. Glossary of Terms
- Chapter 4. Procurement Contacts
- Chapter 5. Procurement Process
- Chapter 6. Procurement Instruments
- Chapter 7. Procurement Types
- Chapter 8. Procurement Limits Policies
- Chapter 9. Awards and Contracts
- Chapter 10. Procurement Policies
- Chapter 11. Its Board
- Chapter 12. Information For Vendors
- Chapter 13. State Holidays
Part 3. Enterprise Cloud and Offsite Hosting Security Policy
Part 101. Wireless Communication Commission (Wcc)
Part 201. Electronic Recording Commission Rules and Standards